期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
The Relationship between Presence and Performance in Virtual Simulation Training
1
作者 Jonathan A. Stevens J. Peter Kincaid 《Open Journal of Modelling and Simulation》 2015年第2期41-48,共8页
The use of virtual simulation-based training continues to expand, as organizations explore alternative methods to reduce the cost of training. While virtual simulation has been empirically validated to be effective in... The use of virtual simulation-based training continues to expand, as organizations explore alternative methods to reduce the cost of training. While virtual simulation has been empirically validated to be effective in the transfer of skills to the live environment, what is still unknown is what effect, if any, that an individual’s sense of presence in the simulation has on their performance. In this paper, we examine the relationship between presence and performance while performing a psychomotor task in a virtual environment. The independent variables were visual display and expertise level. The dependent variables were presence and performance. We found evidence of a moderate relationship between the degree of presence experienced in the simulation and an individual’s performance over three training trials. Results of this study may inspire future research to investigate whether higher presence in virtual simulation results in higher performance. 展开更多
关键词 PRESENCE PERFORMANCE Simulation-Based TRAINING VIRTUAL SIMULATION
下载PDF
Analyzing Virtual World Region Fidelity on Scalability and Simulation Performance
2
作者 Sean C. Mondesire Jonathan Stevens +1 位作者 Rebecca Leis Douglas B. Maxwell 《Open Journal of Modelling and Simulation》 2015年第3期126-135,共10页
Virtual world simulation offers tremendous potential opportunities to improve, and optimize, individual and collective echelon training for the military. The US Army Research Laboratory (ARL) Military Open Simulator E... Virtual world simulation offers tremendous potential opportunities to improve, and optimize, individual and collective echelon training for the military. The US Army Research Laboratory (ARL) Military Open Simulator Enterprise Strategy (MOSES) project’s charter is to investigate simulation-based training technology for use in military specific training domains. Of particular interest are attributes of virtual worlds such as geographically distributed large-scale trainee support. We have initiated a series of experiments to determine appropriate benchmarks for simulator performance and to determine appropriate independent variables in order to create a robust predictive model that will enable virtual world training scenario designers to calculate, a priori, the number of trainees that may synchronously operate in a virtual world. The present paper’s purposes were to determine the effect that virtual world region fidelity had on server performance and determine whether this independent variable would be appropriate for inclusion into our predictive model. We found that region fidelity had a statistically significant effect on the simulator’s processor memory usage but had no significant effect on the simulator’s vertical scalability, CPU usage nor network performance. In this paper, we discourse on the purpose of this research, our experimental methodology and results, and discuss the significance of our findings. 展开更多
关键词 REGION FIDELITY Vertical SCALING Virtual World SIMULATION PERFORMANCE Analysis Distributed SIMULATION
下载PDF
Study of neural network disturbance learning and application in RoboCup 被引量:1
3
作者 彭军 Wu Ming +1 位作者 Guo Rui Kuo-chi Lin 《High Technology Letters》 EI CAS 2007年第2期203-206,共4页
关键词 神经网络 干扰学习 机械记忆 计算机
下载PDF
Review and insight on the behavioral aspects of cybersecurity
4
作者 Rachid Ait Maalem Lahcen Bruce Caulkins +1 位作者 Ram Mohapatra Manish Kumar 《Cybersecurity》 CSCD 2020年第1期123-140,共18页
Stories of cyber attacks are becoming a routine in which cyber attackers show new levels of intention by sophisticated attacks on networks.Unfortunately,cybercriminals have figured out profitable business models and t... Stories of cyber attacks are becoming a routine in which cyber attackers show new levels of intention by sophisticated attacks on networks.Unfortunately,cybercriminals have figured out profitable business models and they take advantage of the online anonymity.A serious situation that needs to improve for networks’defenders.Therefore,a paradigm shift is essential to the effectiveness of current techniques and practices.Since the majority of cyber incidents are human enabled,this shift requires expanding research to underexplored areas such as behavioral aspects of cybersecurity.It is more vital to focus on social and behavioral issues to improve the current situation.This paper is an effort to provide a review of relevant theories and principles,and gives insights including an interdisciplinary framework that combines behavioral cybersecurity,human factors,and modeling and simulation. 展开更多
关键词 CYBERSECURITY Behavioral aspects Human factors Crime theories
原文传递
Review and insight on the behavioral aspects of cybersecurity
5
作者 Rachid Ait Maalem Lahcen Bruce Caulkins +1 位作者 Ram Mohapatra Manish Kumar 《Cybersecurity》 2018年第1期749-766,共18页
Stories of cyber attacks are becoming a routine in which cyber attackers show new levels of intention by sophisticated attacks on networks.Unfortunately,cybercriminals have figured out profitable business models and t... Stories of cyber attacks are becoming a routine in which cyber attackers show new levels of intention by sophisticated attacks on networks.Unfortunately,cybercriminals have figured out profitable business models and they take advantage of the online anonymity.A serious situation that needs to improve for networks’defenders.Therefore,a paradigm shift is essential to the effectiveness of current techniques and practices.Since the majority of cyber incidents are human enabled,this shift requires expanding research to underexplored areas such as behavioral aspects of cybersecurity.It is more vital to focus on social and behavioral issues to improve the current situation.This paper is an effort to provide a review of relevant theories and principles,and gives insights including an interdisciplinary framework that combines behavioral cybersecurity,human factors,and modeling and simulation. 展开更多
关键词 CYBERSECURITY Behavioral aspects Human factors Crime theories
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部