• Title/Summary/Keyword: Virtual Reality Security

Search Result 60, Processing Time 0.027 seconds

Multimodal Interaction Framework for Collaborative Augmented Reality in Education

  • Asiri, Dalia Mohammed Eissa;Allehaibi, Khalid Hamed;Basori, Ahmad Hoirul
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.268-282
    • /
    • 2022
  • One of the most important technologies today is augmented reality technology, it allows users to experience the real world using virtual objects that are combined with the real world. This technology is interesting and has become applied in many sectors such as the shopping and medicine, also it has been included in the sector of education. In the field of education, AR technology has become widely used due to its effectiveness. It has many benefits, such as arousing students' interest in learning imaginative concepts that are difficult to understand. On the other hand, studies have proven that collaborative between students increases learning opportunities by exchanging information, and this is known as Collaborative Learning. The use of multimodal creates a distinctive and interesting experience, especially for students, as it increases the interaction of users with the technologies. The research aims at developing collaborative framework for developing achievement of 6th graders through designing a framework that integrated a collaborative framework with a multimodal input "hand-gesture and touch", considering the development of an effective, fun and easy to use framework with a multimodal interaction in AR technology that was applied to reformulate the genetics and traits lesson from the science textbook for the 6th grade, the first semester, the second lesson, in an interactive manner by creating a video based on the science teachers' consultations and a puzzle game in which the game images were inserted. As well, the framework adopted the cooperative between students to solve the questions. The finding showed a significant difference between post-test and pre-test of the experimental group on the mean scores of the science course at the level of remembering, understanding, and applying. Which indicates the success of the framework, in addition to the fact that 43 students preferred to use the framework over traditional education.

Design of Data Exchange Technique for Power Facilities Monitoring using Augmented Reality (증강현실을 이용한 전력 설비 모니터링 시스템의 데이터 교환 기법 설계)

  • Kim, Donghyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.16-22
    • /
    • 2020
  • Since it is difficult for individual power producers and non-professionals who lack basic knowledge to control, manage, and operate facilities through EMS (Energy Management System), augmented reality and virtual reality monitoring systems are applied. However, in the existing systems, data access efficiency is inferior due to the process of analyzing column values for analog signal values collected from sensors and converting data after combining the columns. In addition, high-speed operation processing is difficult due to a large number of indexes for accommodating access patterns for various analog signal waveforms. Therefore, in this paper, a bitmap generator is inserted into a non-tree structure to convert the data collected from power facilities into physical property information, and the converted information is encrypted with a common key, so that the resources for the resources shared between each device are We propose a method of exchanging data for an augmented reality-based power system that is controlled by measurement.

Ukrainian Students' Analysis of Abuse Treatment by Parents: Retrospective and Perspective in Virtual and Real Environments

  • Stoliarchuk, Olesia;Kokhanova, Olena;Prorok, Nataliia;Khrypko, Svitlana;Shevtsova, Olena;Tkachyshyna, Oksana;Lobanchuk, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.197-207
    • /
    • 2022
  • Given the prevalence of violence in Ukrainian families, measures to prevent parental abusive treatment against children are urgent. It is important to study today's youth awareness about violence within families in order to enhance a culture of engagement with spouses and children in future. The aim of the study is to examine students' reflective experiences and their attitudes towards forms, frequency, causes and effects of parental abusive treatment. During the research the following methods were used step-by-step: theoretical analyses of scientific resources, anonymous questionnaire, quantitative and correlation analyses. According to result of survey 98 students who were interviewed, none of them fell victim of sexual abuse in their families. However, more than a half (51%) of the students surveyed experienced some forms of parental physical punishment. All the interviewed students encountered psychological cases of parental violence. The mostprevalent forms of parental abuse among the interviewees are criticism, negative comparison, emotional detachment, arrogance, intimidation, blackmail and humiliation. The most prevalent consequences of parental abuse among students are anxiety, low self-esteem, insecurity, impatience, suspiciousness, constraint in communication. Students agree that budget limitations, forced labor, criticism, spanking, emotional detachment, ignoring type of communication, reproach, blackmail are acceptable methods of punishment to use when raising their own children. These results clearly demonstrate the problem of the impact of parental abuse on children and its consequences in the future. A virtual dimension of the actualized problem is considered, namely: - virtualization of aggression and cruelty in the postmodern world. - the level of determining the factor of cruelty from the space of virtual culture. - the mirror image of everyday cruelty in the virtual environment; - the phenomenon of video games as a source and context of representation of the factor of cruelty in behavioral realities; - cybercrime as a virtualized result of cruelty in family and everyday realities. - futurological perspectives of virtualization of cruelty in communicative culture in general and in family relations in particular. The postmodern world is fundamentally different from the traditions and culture of the past, primarily due to the development of computer technologies and the virtualization of life in general. So, for example, virtual communities have become, in a certain way, another world, a second reality of life in general. And certain behavioral factors, in particular cruelty in the private environment, became a projection of such a phenomenon as cybercrime. Video games are a unique modern phenomenon, which multipolarly absorb all facets of human potential, communicative tendencies, behavioral and characterological factors, from the warmth of interpersonal relationships to the extreme degree of cruelty.

A Study on 2D/3D Map Navigation System Based on Virtual Reality (VR 기반 2D/3D Map Navigation 시스템에 관한 연구)

  • Kwon Oh-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.928-933
    • /
    • 2006
  • This paper aims to build a 2D/3D map navigation that the user can efficiently operate in terms of feeding attribute information after securing 2D/3D space data. This system provides 2D/3D screen navigation that supports variety of operational visual effects and displays the location that the user is retrieving. Also it presents picture information of buildings with higher resolution and URL, name of store, phone number, other related information. Effectiveness of this system is as follows: first, development and distribution of a new technology of 2D/3D spatial database that changes the previous 2D/3D based system concept to the 2D/3D based one. Second, increase of developmental productivity by utilizing the integrated 2D/3D spatial database for developing various interfaces. Finally, it provides security of the preemptive technological position with world class domestic 2D/3D spatial database technologies.

A Study of Clothing Design in the Digital Age (디지털 시대의 의상 디자인 개발에 관한 연구)

  • 배리사;이인성
    • Journal of the Korean Society of Costume
    • /
    • v.54 no.4
    • /
    • pp.63-74
    • /
    • 2004
  • This study shows that clothes to be just the same as the real thing can be Produced through the third dimension computer graphics, and then presents that not only the area of fashion design can be expanded in the virtual reality field by doing the simulation of the fashion show, but also the information can be made the real time public ownership and the communication can be fulfilled smoothly. In this study, analyzing the third dimension computer graphic programs to be used much at present, Alias Wavefront Company's Maya software which was the most effective in the clothes simulation and the clothes CAD SGS OptiTex 8.7 which went well substitutive for it were used of them. The conclusions of this study that got through the work manufacture are as follows: The first, if the file manufacturing in the clothes CAD by using the computer was stored, the pattern used 3D simulation was available because it could be summoned in 3D software. The second, if the data of DXF form in Maya program was summoned, they could not be applied by Maya Cloth supported in Nurbs only because they were recognized as the DXF_layer. So the curve along the outer lines of the pattern was drawn and Maya Cloth was applied to be possible to get the natural silhouette of clothes. The third, when the clothes were manufactured by 3D, if the draping character was applied according to the textile special quality, not only the control of textile's thickness, weight, quality feeling, and silhouette was available, but also the clothes were available to graft the special textile materials. The fourth, the natural motion of model was produced by capturing the actual model's walking action In order to produce the fashion show motion and also the dynamic fashion show was available by the angle of camera, the establishment of lighting, and etc. in the final rendering. The clothes manufactured by 3D are available to change the design by changing the materials, or by adding the details, or by utilizing the special materials on clothes. Therefore, the trial and error following at the clothes manufacture can be reduced. But the elevation of the rendering speed, the price down, the strengthening of personal security, and etc. are required.

A Study on Serious Game Application of Disabled Sports (장애인스포츠 적용을 위한 기능성 게임에 관한 연구)

  • Kang, Seungae;Kang, Sunyoung;Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.61-68
    • /
    • 2013
  • Compared to the past, the number of disabled people in Korea is continuing to increase. As for the scope of the disability, it is expanding as well since it now includes all types of illnesses, car accidents, complications resulting from aging, industrial accidents and others accidents. Attempts are made in terms of applying sports game method that grafts IT technology in order to ensure that the disabled people participate continually in sports. While casting away the notion of play which was the role of a game in the past, new roles and domains were developed. In fact, serious game genre is what leads this change. Because serious game is leading the game industry fast, centered on education, sports, fitness and medical use, its market value can be considered very significant since it can be both fund and effective as it targets the disabled who cannot enjoy sports easily in reality. Accordingly, this research seeks to present the direction for the application of serious game for the disabled people by analyzing the current situation pertaining to the integrated and converged cases applied to the field of sports for the disabled when it comes to the serious game that uses contents based on the IT technology.

Developing an XR based Hyper-realistic Counter-Terrorism, Education, Training, and Evaluation System (확장현실(XR) 기반 초실감 대테러 교육훈련체계 구축 방안 연구)

  • Shin, Kyuyong;Lee, Sehwan
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.65-74
    • /
    • 2020
  • Recently, with the rapid development of eXtended Reality(XR) technology, the development and use of education and training systems using XR technology is increasing significantly. In particular, in areas that involve great risks and high costs such as military training and counter-terrorism training, the use of XR based simulators is preferred because they can improve training performance, reduce training costs, and minimize the risk of safety issues that may occur in actual training, by creating a training environment similar to actual training. In this paper, we propose a plan to build and evaluate an XR based hyper-realistic counter-terrorism education, training, and evaluation system to improve the ROK police's ability to respond to terrorist situations using the 5G and AR based Integrated Command and Control Platform previously developed by the Korea Military Academy. The proposed system is designed to improve counter-terrorism capabilities with virtual training for individual and team units based on hyper-realistic content and training scenarios. Futhermore, it can also be used as a on-site command and control post in connection with a simulation training site and an actual operation site.

Potential Risks Associated with eSportsmen Activities: an Empirical Study

  • Bonkalo, Tatyana I.;Stepanova, Olga N.;Latushkina, Elena N.;Kozlyatnikov, Oleg A.;Kumancova, Elizaveta S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.280-284
    • /
    • 2022
  • The purpose of the study was to identify the level of development of gaming disorder among e-sportsmen as a potential risk of their activity. Three groups were formed for the study. The first group consisted of 102 e-sportsmen aged between 18 and 32; the second group consisted of boys of the same age who, according to preliminary questionnaires, played computer games fairly frequently - at least once a week (n = 102); the third group consisted of individuals of the same gender and age, but who did not share a passion for computer games (n = 102). The study was performed using semi-structured interview during which the respondents filled out the Computer gaming disorder questionnaire developed and tested by O.M. Vidova under our supervision. Our study showed that among 102 e-sportsmen, 82,3% did not have any computer gaming disorder, only some tendency thereto. While 17,6% of e-sportsmen were characterized by a pronounced gaming disorder. E-sportsmen who prefer strategies, less than all other e-sportsmen, tend to escape from reality and accept the game role, to express their emotions through the game, and in general have the lowest level of dependence on games. Additionally, strategic e-sportsmen are most likely to study the game thoroughly and to develop themselves with it. Many Starcraft e-sportsmen tend to explore the possibilities of the game in detail and, at the same time, protect themselves from escaping into virtual reality. The risk of computer gaming disorder among e-sportsmen is largely determined by their sports achievements, the type of sports activity (individual or team), and genre of the preferred computer game.

A Real-Time Spatial DSS for Security Camera Image Monitoring

  • Park, Young-Hwan;Lee, Ook
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.413-414
    • /
    • 1998
  • This paper presents a real-time Spatial Decision Support System(SDSS) for security camera image monitoring. Other SDSSs are not real-time systems, i.e., they show the images that are already transformed into data format such as virtual reality. In our system, the image is broadcasted in real-time since the purpose of the security camera needs to do it in real-time. With these real-time images, other systems do not add up anything more; the screen just shows the images from the camera. However in our system, we created a motion detection system so that the supervisor(Judge) of a sec.urity monitoring system does not have to pay attention to it constantly. In other words, we created a judge advising system for the supervisor of the security monitoring system. Most of small objects do not need the supervisor's attention since they could be birds, cats, dogs, etc. if they show up in the screen image. In this new system the system only report the unusual change to the supervisor by calculating the motion and size of objects in the screen. Thus the supervisor can be liberated from the 24-hour concentration duty; instead he/she can be only alerted when the real security threat such as a big moving object like an human intruder appears. Thus this system can be called a real-time Spatial DSS. The utility of this system is proved mathematically by using the concept of entropy. In other words, big objects like human intruders increase the entropy of the screen images significantly therefore the supervisor must be alerted. Thus by proving its utility of the system theoretically, we can claim that our new real-time SDSS is superior to others which do not use our technique.hnique.

  • PDF

A Survey Analysis of Internet of Things Security Issues and Combined Service

  • Kim, HyunHo;Lee, HoonJae;Lee, YoungSil
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.73-79
    • /
    • 2020
  • Since the start of the 4th industrial revolution, technologies have been developed in the Internet of Things (IoT), artificial intelligence (AI), virtual reality (VR), and 5G. Compared to other technologies IoT is currently being commercialized more than other technologies where the numbers of connected things are increases every year. The IoT has a huge advantage to provide convenience and lots of information to users, but security cannot keep up with the speed of development. IoT services continue to provide services for related devices, but at present, more and more types of new services are being combined with other technologies by utilizing the services of devices. This paper reviews and analyzes research on security issues and services related to the Internet of Things to explore how security trends and service delivery will develop in the future.