• Title/Summary/Keyword: computer-based training

Search Result 1,256, Processing Time 0.034 seconds

Impact of the Fidelity of Interactive Devices on the Sense of Presence During IVR-based Construction Safety Training

  • Luo, Yanfang;Seo, JoonOh;Abbas, Ali;Ahn, Seungjun
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.137-145
    • /
    • 2020
  • Providing safety training to construction workers is essential to reduce safety accidents at the construction site. With the prosperity of visualization technologies, Immersive Virtual Reality (IVR) has been adopted for construction safety training by providing interactive learning experiences in a virtual environment. Previous research efforts on IVR-based training have found that the level of fidelity of interaction between real and virtual worlds is one of the important factors contributing to the sense of presence that would affect training performance. Various interactive devices that link activities between real and virtual worlds have been applied in IVR-based training, ranging from existing computer input devices (e.g., keyboard, mouse, joystick, etc.) to specially designed devices such as high-end VR simulators. However, the need for high-fidelity interactive devices may hinder the applicability of IVR-based training as they would be more expensive than IVR headsets. In this regard, this study aims to understand the impact of the level of fidelity of interactive devices in the sense of presence in a virtual environment and the training performance during IVR-based forklift safety training. We conducted a comparative study by recruiting sixty participants, splitting them into two groups, and then providing different interactive devices such as a keyboard for a low fidelity group and a steering wheel and pedals for a high-fidelity group. The results showed that there was no significant difference between the two groups in terms of the sense of presence and task performance. These results indicate that the use of low-fidelity interactive devices would be acceptable for IVR-based safety training as safety training focuses on delivering safety knowledge, and thus would be different from skill transferring training that may need more realistic interaction between real and virtual worlds.

  • PDF

Development of a Multimedia Package on Operation and Maintenance of Air Brake System for Indian Railways - A Case Study

  • Lalla, G.T.;Mehra, Chanchal
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.4
    • /
    • pp.668-675
    • /
    • 2003
  • Now a days many industries and bigger organisation (Indian Railways, Bharat Heavy Electricals Ltd.) are facing difficulties in implementing the new technology because of non-availability of fully trained staff. Also for the employed technical and other staff lot of resistance management has to face to get them trained for adoption of new technology. There are also very less organisations who can design effective training programmes and at the same time develop course material specially multimedia packages and computer base training (CBT) which can satisfy the need of different target groups of industries. Indian Railways was also facing similar situation while implementing the Air Brake System technology In Indian Railways. TTTI Bhopal took that challenge and designed, developed and trained Indian Railways trainer for implementation of the package on different target group. The present paper offers a case study on the same.

  • PDF

The Study on Marker-less Tracking for the Car Mechanics e-Training AR(Augmented Reality) System (자동차 정비 e-Training 증강현실 시스템에서의 Marker-less Tracking 방안 연구)

  • Yoon, Ji-Yean;Kim, Yu-Doo;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.264-270
    • /
    • 2012
  • e-Training focusing on the experience and practice accelerates actual-active learning and enforces the learning effects against the existing theory based education. The most typical hans-on training system is augmented reality. Especially, in the training field installed augmented reality system, the automobile maintenance trainee experiences effective training with the immediate information, which is indicating the location of parts and the procedure of repairing. The tracking is the core technology of the augmented reality system. The performance of augmented reality system depends on the tracking technology. Therefore, this paper suggests the tracking technology which is proper to the e-Training augmented reality service technology for the car mechanics.

Improving Performance of Machine Learning-based Haze Removal Algorithms with Enhanced Training Database

  • Ngo, Dat;Kang, Bongsoon
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.948-952
    • /
    • 2018
  • Haze removal is an object of scientific desire due to its various practical applications. Existing algorithms are founded upon histogram equalization, contrast maximization, or the growing trend of applying machine learning in image processing. Since machine learning-based algorithms solve problems based on the data, they usually perform better than those based on traditional image processing/computer vision techniques. However, to achieve such a high performance, one of the requisites is a large and reliable training database, which seems to be unattainable owing to the complexity of real hazy and haze-free images acquisition. As a result, researchers are currently using the synthetic database, obtained by introducing the synthetic haze drawn from the standard uniform distribution into the clear images. In this paper, we propose the enhanced equidistribution, improving upon our previous study on equidistribution, and use it to make a new database for training machine learning-based haze removal algorithms. A large number of experiments verify the effectiveness of our proposed methodology.

Face-Mask Detection with Micro processor (마이크로프로세서 기반의 얼굴 마스크 감지)

  • Lim, Hyunkeun;Ryoo, Sooyoung;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.490-493
    • /
    • 2021
  • This paper proposes an embedded system that detects mask and face recognition based on a microprocessor instead of Nvidia Jetson Board what is popular development kit. We use a class of efficient models called Mobilenets for mobile and embedded vision applications. MobileNets are based on a streamlined architechture that uses depthwise separable convolutions to build light weight deep neural networks. The device used a Maix development board with CNN hardware acceleration function, and the training model used MobileNet_V2 based SSD(Single Shot Multibox Detector) optimized for mobile devices. To make training model, 7553 face data from Kaggle are used. As a result of test dataset, the AUC (Area Under The Curve) value is as high as 0.98.

Implementation of 2D Active Shape Model-based Segmentation on Hippocampus

  • Izmantoko, Yonny S.;Yoon, Ho-Sung;Adiya, Enkhbolor;Mun, Chi-Woong;Huh, Young;Choi, Heung-Kook
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.1
    • /
    • pp.1-7
    • /
    • 2014
  • Hippocampus is an important part of brain which is related with early memory storage and spatial navigation. By observing the anatomy of hippocampus, some brain diseases effecting human memory (e.g. Alzheimer, schizophrenia, etc.) can be diagnosed and predicted earlier. The diagnosis process is highly related with hippocampus segmentation. In this paper, hippocampus segmentation using Active Shape Model, which not only works based on image intensity, but also by using prior knowledge of hippocampus shape and intensity from the training images, is proposed. The results show that ASM is applicable in segmenting hippocampus from whole brain MR image. It also shows that adding more images in the training set results in better accuracy of hippocampus segmentation.

ANN-based Evaluation Model of Combat Situation to predict the Progress of Simulated Combat Training

  • Yoon, Soungwoong;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.7
    • /
    • pp.31-37
    • /
    • 2017
  • There are lots of combined battlefield elements which complete the war. It looks problematic when collecting and analyzing these elements and then predicting the situation of war. Commander's experience and military power assessment have widely been used to come up with these problems, then simulated combat training program recently supplements the war-game models through recording real-time simulated combat data. Nevertheless, there are challenges to assess winning factors of combat. In this paper, we characterize the combat element (ce) by clustering simulated combat data, and then suggest multi-layered artificial neural network (ANN) model, which can comprehend non-linear, cross-connected effects among ces to assess mission completion degree (MCD). Through our ANN model, we have the chance of analyzing and predicting winning factors. Experimental results show that our ANN model can explain MCDs through networking ces which overperform multiple linear regression model. Moreover, sensitivity analysis of ces will be the basis of predicting combat situation.

Social Engineering Attack Graph for Security Risk Assessment: Social Engineering Attack Graph framework(SEAG)

  • Kim, Jun Seok;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.75-84
    • /
    • 2018
  • Social engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. Each company plans employee education and social training as a countermeasure to prevent social engineering. However, it is difficult for a security officer to obtain a practical education(training) effect, and it is also difficult to measure it visually. Therefore, to measure the social engineering threat, we use the results of social engineering training result to calculate the risk by system asset and propose a attack graph based probability. The security officer uses the results of social engineering training to analyze the security threats by asset and suggests a framework for quick security response. Through the framework presented in this paper, we measure the qualitative social engineering threats, collect system asset information, and calculate the asset risk to generate probability based attack graphs. As a result, the security officer can graphically monitor the degree of vulnerability of the asset's authority system, asset information and preferences along with social engineering training results. It aims to make it practical for companies to utilize as a key indicator for establishing a systematic security strategy in the enterprise.

An improved kernel principal component analysis based on sparse representation for face recognition

  • Huang, Wei;Wang, Xiaohui;Zhu, Yinghui;Zheng, Gengzhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2709-2729
    • /
    • 2016
  • Representation based classification, kernel method and sparse representation have received much attention in the field of face recognition. In this paper, we proposed an improved kernel principal component analysis method based on sparse representation to improve the accuracy and robustness for face recognition. First, the distances between the test sample and all training samples in kernel space are estimated based on collaborative representation. Second, S training samples with the smallest distances are selected, and Kernel Principal Component Analysis (KPCA) is used to extract the features that are exploited for classification. The proposed method implements the sparse representation under ℓ2 regularization and performs feature extraction twice to improve the robustness. Also, we investigate the relationship between the accuracy and the sparseness coefficient, the relationship between the accuracy and the dimensionality respectively. The comparative experiments are conducted on the ORL, the GT and the UMIST face database. The experimental results show that the proposed method is more effective and robust than several state-of-the-art methods including Sparse Representation based Classification (SRC), Collaborative Representation based Classification (CRC), KCRC and Two Phase Test samples Sparse Representation (TPTSR).

Comparison of Korean Informatics & Computer Teacher Training Curriculum and J07-CS Curriculum (한국의 중등 정보·컴퓨터 교사양성 교육과정과 J07-CS 교육과정의 비교)

  • An, YoungHee;Kim, JaMee;Lee, WonGyu
    • The Journal of Korean Association of Computer Education
    • /
    • v.20 no.4
    • /
    • pp.37-46
    • /
    • 2017
  • Since 2018, the level of informatics education that is mandatory in junior high schools depends on the subject matter expertise of Informatics & Computer teachers. The purpose of this study is to analyze whether secondary teacher training institutes provide curriculum that guarantees the subjectivity of Informatics & Computer teachers. In order to achieve the goal, this study first compares curriculum courses for educating Informatics & Computer teachers of Korea secondary teacher training institutes with subjects based on the content system of J07-CS, the informatics education in Japan. Second, we compare the basic subjects offered by the Ministry of Education with the vocational subjects. Third, we analyzed the basic subjects of each university. As a result of the study, the number of informatics-related courses opened by Korean secondary teacher training institutions was insufficient compared to the number of subjects in J07-CS. Even though the standard of comparison was limited to basic subjects, the content elements were insufficient, and the ratio of the basic subjects of each university was low. In order to achieve the goal of informatics education from 2018, it is urgent to improve the curriculum of secondary education teachers.