Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 3D model database (1)
- Ab-initio (1)
- Augmented reality (1)
- Chaos (1)
- Chaotic maps (1)
-
- Conformance testing (1)
- Culture (1)
- Cybersecurity (1)
- Cyberwarfare (1)
- Data hiding (1)
- EFB (1)
- Electronic flight bag (1)
- Evaluation framework (1)
- First person view (1)
- Flight debriefing system (1)
- Flight planning applications (1)
- Flight simulation (1)
- Image forensics (1)
- Immersive display (1)
- Indoor crime scene presentation (1)
- Information Warfare (1)
- Information security (1)
- Macedonia (1)
- Mixed reality (1)
- Pilot training system (1)
- Pixel pairs (1)
- Pixel selection (1)
- Psychiatry (1)
- Psychological Warfare (1)
- Rapid modeling (1)
Articles 1 - 8 of 8
Full-Text Articles in Computer Engineering
An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir
An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir
Journal of Digital Forensics, Security and Law
The boom of digital cameras, photography, and social media has drastically changed how humans live their day-to-day, but this normalization is accompanied by malicious agents finding new ways to forge and tamper with images for unlawful monetary (or other) gains. Disinformation in the photographic media realm is an urgent threat. The availability of a myriad of image editing tools renders it almost impossible to differentiate between photo-realistic and original images. The tools available for image forensics require a standard framework against which they can be evaluated. Such a standard framework can aid in evaluating the suitability of an image forensics …
Integrating The First Person View And The Third Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh, Kwanghee Lee, Myunghoon Oh
Integrating The First Person View And The Third Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh, Kwanghee Lee, Myunghoon Oh
Journal of Aviation/Aerospace Education & Research
Virtual reality (VR)-based flight simulator provides pilots the enhanced reality from the first-person view. Mixed reality (MR) technology generates effective 3D graphics. The users who wear the MR headset can walk around the 3D graphics to see all its 360 degrees of vertical and horizontal aspects maintaining the consciousness of real space. A VR flight simulator and an MR application were connected to create the capability of both first-person view and third-person view for a comprehensive pilot training system. This system provided users the capability to monitor the aircraft progress along the planned path from the third-person view as well …
A Sketch-Based Rapid Modeling Method For Crime Scene Presentation, Pu Ren, Wuyang Shui, Jin Liu, Yachun Fan, Wenshuo Zhao, Mingquan Zhou
A Sketch-Based Rapid Modeling Method For Crime Scene Presentation, Pu Ren, Wuyang Shui, Jin Liu, Yachun Fan, Wenshuo Zhao, Mingquan Zhou
Journal of Digital Forensics, Security and Law
The reconstruction of crime scene plays an important role in digital forensic application. This article integrates computer graphics, sketch-based retrieval and virtual reality (VR) techniques to develop a low-cost and rapid 3D crime scene presentation approach, which can be used by investigators to analyze and simulate the criminal process. First, we constructed a collection of 3D models for indoor crime scenes using various popular techniques, including laser scanning, image-based modeling and geometric modeling. Second, to quickly obtain an object of interest from the 3D model database, a sketch-based retrieval method was proposed. Finally, a rapid modeling system that integrates our …
A Data Hiding Scheme Based On Chaotic Map And Pixel Pairs, Sengul Dogan Sd
A Data Hiding Scheme Based On Chaotic Map And Pixel Pairs, Sengul Dogan Sd
Journal of Digital Forensics, Security and Law
Information security is one of the most common areas of study today. In the literature, there are many algorithms developed in the information security. The Least Significant Bit (LSB) method is the most known of these algorithms. LSB method is easy to apply however it is not effective on providing data privacy and robustness. In spite of all its disadvantages, LSB is the most frequently used algorithm in literature due to providing high visual quality. In this study, an effective data hiding scheme alternative to LSB, 2LSBs, 3LSBs and 4LSBs algorithms (known as xLSBs), is proposed. In this method, random …
A Usability Study For Electronic Flight Bag (Efb) Flight Planning Applications On Tablet Devices For Ab-Initio Pilots, Jeff Schwartzentruber
A Usability Study For Electronic Flight Bag (Efb) Flight Planning Applications On Tablet Devices For Ab-Initio Pilots, Jeff Schwartzentruber
International Journal of Aviation, Aeronautics, and Aerospace
The proliferation of mobile technology has prompted the use of tablet devices in the cockpit and during ground operations in general aviation. Due to the increase in affordable and reliable hardware (i.e. iPads etc.), the development of pilot-specific software has led to the creation of a commercial-of-the-shelf (COTS), electronic flight bag (EFB) market. EFBs have many advantages, such as reducing the space requirements for flight documents, enabling faster searching and indexing of files, providing useful tools for flight planning, and providing automatic updates. The increase in availability of mobile technology and flight applications has allowed general aviation enthusiast and ab-initio …
Cybersecurity: Growing Like Topsy!, Ibpp Editor
Cybersecurity: Growing Like Topsy!, Ibpp Editor
International Bulletin of Political Psychology
This article discusses cybersecurity in an intelligence context – what it is, what it does to us, and the sudden (and somewhat unplanned) increase in financial support for the area.
The Other Information Warfare: A Mind Full Of Macedonia, Ibpp Editor
The Other Information Warfare: A Mind Full Of Macedonia, Ibpp Editor
International Bulletin of Political Psychology
This article highlights ongoing aspects of psychological warfare in Macedonia between government and rebel forces.
A Political Psychological Primer Of Virtual Reality Sequelae For Mental Health Professionals, Ibpp Editor
A Political Psychological Primer Of Virtual Reality Sequelae For Mental Health Professionals, Ibpp Editor
International Bulletin of Political Psychology
This paper describes a number of sequelae stemming from virtual reality (VR) and VR technology (VRT) based on theoretical and empirical research in the behavioral sciences, social sciences, humanities.