Pub Date : 2010-11-24DOI: 10.1504/IJIDSS.2010.037088
Michael Garrett, M. McMahon
Three-dimensional (3D) gaming technologies can be used to create experiential based learning environments that realistically represent real world places. Such learning environments are well suited for cognitive tasks that include navigation and locomotion in three dimensional environments (Munro et al., 2002). This paper reports on a study to explore the effectiveness of the Location and Scenario Training System (LASTS) to enhance the spatial awareness of trainee submariners. The simulation was used to engage participants in a simplified version of the 12 point safety round (12 PSR) performed inside the main generator room (MGR) on a Royal Australian Navy Collins class submarine. Results indicated that LASTS trainees performed the simplified 12 PSR more effectively than non-LASTS trainees. There was also some evidence to suggest that LASTS trainees possessed a comparatively better overall spatial representation of the MGR, including the development of higher order spatial knowledge.
三维(3D)游戏技术可以用来创造基于体验的学习环境,真实地代表现实世界的地方。这样的学习环境非常适合于认知任务,包括在三维环境中导航和运动(Munro et al., 2002)。本文研究了位置与情景训练系统(last)在提高潜艇训练员空间意识方面的有效性。该模拟用于在澳大利亚皇家海军柯林斯级潜艇的主发电机室(MGR)内进行简化版的12点安全射击(12 PSR)。结果表明,last学员比非last学员更有效地执行了简化的12 PSR。有证据表明,last学员对MGR的整体空间表征相对较好,包括高阶空间知识的发展。
{"title":"Enhancing the spatial awareness of trainee submariners using 3D game engines as training tools","authors":"Michael Garrett, M. McMahon","doi":"10.1504/IJIDSS.2010.037088","DOIUrl":"https://doi.org/10.1504/IJIDSS.2010.037088","url":null,"abstract":"Three-dimensional (3D) gaming technologies can be used to create experiential based learning environments that realistically represent real world places. Such learning environments are well suited for cognitive tasks that include navigation and locomotion in three dimensional environments (Munro et al., 2002). This paper reports on a study to explore the effectiveness of the Location and Scenario Training System (LASTS) to enhance the spatial awareness of trainee submariners. The simulation was used to engage participants in a simplified version of the 12 point safety round (12 PSR) performed inside the main generator room (MGR) on a Royal Australian Navy Collins class submarine. Results indicated that LASTS trainees performed the simplified 12 PSR more effectively than non-LASTS trainees. There was also some evidence to suggest that LASTS trainees possessed a comparatively better overall spatial representation of the MGR, including the development of higher order spatial knowledge.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121390327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-24DOI: 10.1504/IJIDSS.2010.037096
Irena Loutchkina, Sergey Nesterov
Modern computer systems are becoming more powerful and complex. This growth in system complexity results in corresponding increase of system integration process (SIP) complexity. System integration (SI) phase of system development life cycle (SDLC) has the highest risks in system development, and is critical for system of systems (SOS) development. This paper examines the research efforts of research community in SI conceptual modelling. The potential risk factors associated with SI are identified, analysed and classified to form taxonomy. One of the recommended and helpful strategies for alleviating the SI risks relates to increase attention to potential integration issues throughout the life cycle. Based on the reviewed literature examples the paper explores cause-and-effect relationships of the specific system's quality attributes and SIP complexity. Those attributes are thoroughly addressed at every development phase starting from requirements, system architecture design, detailed software design and development, design for integration. The paper focuses primarily on technical aspects of SIP.
{"title":"Exploring the factors contributing to system integration risks","authors":"Irena Loutchkina, Sergey Nesterov","doi":"10.1504/IJIDSS.2010.037096","DOIUrl":"https://doi.org/10.1504/IJIDSS.2010.037096","url":null,"abstract":"Modern computer systems are becoming more powerful and complex. This growth in system complexity results in corresponding increase of system integration process (SIP) complexity. System integration (SI) phase of system development life cycle (SDLC) has the highest risks in system development, and is critical for system of systems (SOS) development. This paper examines the research efforts of research community in SI conceptual modelling. The potential risk factors associated with SI are identified, analysed and classified to form taxonomy. One of the recommended and helpful strategies for alleviating the SI risks relates to increase attention to potential integration issues throughout the life cycle. Based on the reviewed literature examples the paper explores cause-and-effect relationships of the specific system's quality attributes and SIP complexity. Those attributes are thoroughly addressed at every development phase starting from requirements, system architecture design, detailed software design and development, design for integration. The paper focuses primarily on technical aspects of SIP.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116088599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-24DOI: 10.1504/IJIDSS.2010.037091
D.Th. Armenis
Military command and control is becoming increasingly sophisticated in technological terms. One important technology currently being employed on the battlefield is 'blue force tracker'. The system provides a real-time situation map of friendly forces' locations. The technology has not yet been adequately investigated in the literature to determine its effectiveness and limitations. In this paper aspects of this gap are addressed by empirically investigating the cognitive costs and benefits of an exemplar blue force tracker using military personnel. Two section commanders and a section of eight soldiers completed a series of simple command and control missions, half with blue force tracker, and half without. A measure of cognitive load was taken for each scenario which allowed a comparison between conditions. The findings suggest that blue force tracker is an effective command and control technology at the fire-team level, and has no additional cognitive impact compared with the use of a paper map.
{"title":"An experiment on the utility of blue force tracker: the costs and benefits of having God's eye view","authors":"D.Th. Armenis","doi":"10.1504/IJIDSS.2010.037091","DOIUrl":"https://doi.org/10.1504/IJIDSS.2010.037091","url":null,"abstract":"Military command and control is becoming increasingly sophisticated in technological terms. One important technology currently being employed on the battlefield is 'blue force tracker'. The system provides a real-time situation map of friendly forces' locations. The technology has not yet been adequately investigated in the literature to determine its effectiveness and limitations. In this paper aspects of this gap are addressed by empirically investigating the cognitive costs and benefits of an exemplar blue force tracker using military personnel. Two section commanders and a section of eight soldiers completed a series of simple command and control missions, half with blue force tracker, and half without. A measure of cognitive load was taken for each scenario which allowed a comparison between conditions. The findings suggest that blue force tracker is an effective command and control technology at the fire-team level, and has no additional cognitive impact compared with the use of a paper map.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129842051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-16DOI: 10.1504/IJIDSS.2010.033676
M. Pighin, Lucio Ieronutti
Information systems allow companies to collect a large number of operational and transactional data. Data warehouses are increasingly used by organisations to extract concise information supporting decision processes. However, data warehouse design strategies as well as the structure and content of the original database largely influence the effectiveness of such tools. Our research is focused on data-driven approaches, and in this paper, we present a solution that, based on a set of metrics measuring different characteristics of the original data sources, effectively supports the creation of data warehouses. Moreover, combining the indexes computed by our metrics on selected dimensions and measures, it is also possible to derive quantitative information on the design quality of the final data warehouse. To demonstrate the effectiveness of our solution, we briefly present the results obtained from the analysis of a selling data warehouse derived from a real-word ERP system.
{"title":"Quantitative analysis of data warehouse design quality","authors":"M. Pighin, Lucio Ieronutti","doi":"10.1504/IJIDSS.2010.033676","DOIUrl":"https://doi.org/10.1504/IJIDSS.2010.033676","url":null,"abstract":"Information systems allow companies to collect a large number of operational and transactional data. Data warehouses are increasingly used by organisations to extract concise information supporting decision processes. However, data warehouse design strategies as well as the structure and content of the original database largely influence the effectiveness of such tools. Our research is focused on data-driven approaches, and in this paper, we present a solution that, based on a set of metrics measuring different characteristics of the original data sources, effectively supports the creation of data warehouses. Moreover, combining the indexes computed by our metrics on selected dimensions and measures, it is also possible to derive quantitative information on the design quality of the final data warehouse. To demonstrate the effectiveness of our solution, we briefly present the results obtained from the analysis of a selling data warehouse derived from a real-word ERP system.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116859934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-16DOI: 10.1504/IJIDSS.2010.033679
M. Cupic
In this paper, we will present a case study of using multiple-choice tests for university level courses such as digital logic and artificial intelligence. It is a well known fact that multiple-choice questions can be used to assess student's knowledge – not only student's recall, but also the verification of student's analysis and synthesis abilities. We will give an example of questions for assessment of all three types. We will consider how computers can be used to prepare such tests and what is needed to automatically grade such tests. We will present an open source application that we developed to foster such a process.
{"title":"A case study: using multiple-choice tests at university level courses - preparation and supporting infrastructure","authors":"M. Cupic","doi":"10.1504/IJIDSS.2010.033679","DOIUrl":"https://doi.org/10.1504/IJIDSS.2010.033679","url":null,"abstract":"In this paper, we will present a case study of using multiple-choice tests for university level courses such as digital logic and artificial intelligence. It is a well known fact that multiple-choice questions can be used to assess student's knowledge – not only student's recall, but also the verification of student's analysis and synthesis abilities. We will give an example of questions for assessment of all three types. We will consider how computers can be used to prepare such tests and what is needed to automatically grade such tests. We will present an open source application that we developed to foster such a process.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125579361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-16DOI: 10.1504/IJIDSS.2010.033677
S. Pivac, Mia Zoric, Ivo Eskinja
Engel's Laws have been frequently used in economic analysis. In this paper, the concrete relations in Croatian economy are studied according to basic postulates of Engel curve. The parameters of relevant model are estimated by respecting wages movement and luxury consumption. Beside standard method, parameters estimation has also been done by Monte Carlo simulation, which enables the basic assumptions to be fulfilled. By using such multi-objective approach, the obtained results have been presented, interpreted and comparatively analysed. All calculations are accomplished very simply in Excel. This user-friendly approach will help many users to easily solve similar complex statistical and mathematical calculations, which is useful and important for students of economic sciences in quantitative analysis.
{"title":"Parameters estimation according to Engel's Law in Excel","authors":"S. Pivac, Mia Zoric, Ivo Eskinja","doi":"10.1504/IJIDSS.2010.033677","DOIUrl":"https://doi.org/10.1504/IJIDSS.2010.033677","url":null,"abstract":"Engel's Laws have been frequently used in economic analysis. In this paper, the concrete relations in Croatian economy are studied according to basic postulates of Engel curve. The parameters of relevant model are estimated by respecting wages movement and luxury consumption. Beside standard method, parameters estimation has also been done by Monte Carlo simulation, which enables the basic assumptions to be fulfilled. By using such multi-objective approach, the obtained results have been presented, interpreted and comparatively analysed. All calculations are accomplished very simply in Excel. This user-friendly approach will help many users to easily solve similar complex statistical and mathematical calculations, which is useful and important for students of economic sciences in quantitative analysis.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125113984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-16DOI: 10.1504/IJIDSS.2010.033678
H. Jaakkola, O. Uusitalo, J. Henno
Enterprise migration is the process in which two or more companies are merged into one. In practice, it means that different company cultures are unified, information systems of the merged companies are renewed, working practices are unified, and the administrative structure will change, etc. From the employees' point of view, it is a question of learning and adaptation process. This adaptation can be supported by proactive operations: training of the staff and the well-prepared integration of the information systems. Our paper is based on the foundations of two 'frameworks' – the first is an understanding of enterprise migration and the second is the adaptation process in the case of mergers and acquisitions. In the adaptation phase, the goal is seen as a learning organisation and the adaptation support as learning/training activities. The integration of information systems (IS) of the merged organisations plays a central role in our paper. We are developing a framework that provides a means to decompose the complexity in connection with the migration process. In addition, some migration and adaptation cases are introduced briefly and analysed – based on publicly available information.
{"title":"IS integration and enterprise migration - adaptation in global context","authors":"H. Jaakkola, O. Uusitalo, J. Henno","doi":"10.1504/IJIDSS.2010.033678","DOIUrl":"https://doi.org/10.1504/IJIDSS.2010.033678","url":null,"abstract":"Enterprise migration is the process in which two or more companies are merged into one. In practice, it means that different company cultures are unified, information systems of the merged companies are renewed, working practices are unified, and the administrative structure will change, etc. From the employees' point of view, it is a question of learning and adaptation process. This adaptation can be supported by proactive operations: training of the staff and the well-prepared integration of the information systems. Our paper is based on the foundations of two 'frameworks' – the first is an understanding of enterprise migration and the second is the adaptation process in the case of mergers and acquisitions. In the adaptation phase, the goal is seen as a learning organisation and the adaptation support as learning/training activities. The integration of information systems (IS) of the merged organisations plays a central role in our paper. We are developing a framework that provides a means to decompose the complexity in connection with the migration process. In addition, some migration and adaptation cases are introduced briefly and analysed – based on publicly available information.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122444602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-16DOI: 10.1504/IJIDSS.2010.033674
Ceraj Ivica, Justin T. Riley, Charles Shubert, Lourdes M. Aleman, M. Kosinski-Collins, M. Rokop, K. Vandiver
Teaching about proteins, how their structure is specified and how in turn this influences their function has become an integral curriculum component for both introductory biology and biochemistry undergraduate courses. To understand how proteins work, students first learn about protein structure and its relationship to protein function. StarBiochem is a protein visualisation tool that is used to assist in teaching key structural biology concepts in an interactive manner. StarBiochem allows for the visualisation and manipulation of protein data bank (PBD) molecules in a 3D environment. In this manuscript, we provide examples of StarBiochem usage within high school and undergraduate curricula. Specifically, we will highlight how StarBiochem is currently used in undergraduate courses at the Massachusetts Institute of Technology (MIT), Brandeis University, and in high school outreach programs at the Broad Institute of Harvard and MIT and at the MIT Museum.
{"title":"Integrating protein visualisation in the classroom with StarBiochem","authors":"Ceraj Ivica, Justin T. Riley, Charles Shubert, Lourdes M. Aleman, M. Kosinski-Collins, M. Rokop, K. Vandiver","doi":"10.1504/IJIDSS.2010.033674","DOIUrl":"https://doi.org/10.1504/IJIDSS.2010.033674","url":null,"abstract":"Teaching about proteins, how their structure is specified and how in turn this influences their function has become an integral curriculum component for both introductory biology and biochemistry undergraduate courses. To understand how proteins work, students first learn about protein structure and its relationship to protein function. StarBiochem is a protein visualisation tool that is used to assist in teaching key structural biology concepts in an interactive manner. StarBiochem allows for the visualisation and manipulation of protein data bank (PBD) molecules in a 3D environment. In this manuscript, we provide examples of StarBiochem usage within high school and undergraduate curricula. Specifically, we will highlight how StarBiochem is currently used in undergraduate courses at the Massachusetts Institute of Technology (MIT), Brandeis University, and in high school outreach programs at the Broad Institute of Harvard and MIT and at the MIT Museum.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133595338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-16DOI: 10.1504/IJIDSS.2010.033672
Katherine Hanton, J. Sunde, M. Butavicius, V. Gluscevic
The ability to detect and recognise dangerous objects at a safe distance is a very important task in a number of defence, police and security applications. In this paper, we look at ways of increasing the effectiveness of infrared imagery for object recognition through processes such as super-resolution image reconstruction and deconvolution methods. In this paper, we propose two techniques for assessing image quality improvement: operator assessment and edge detection; and report on some initial work recently undertaken.
{"title":"Infrared image enhancement and human detection performance measures","authors":"Katherine Hanton, J. Sunde, M. Butavicius, V. Gluscevic","doi":"10.1504/IJIDSS.2010.033672","DOIUrl":"https://doi.org/10.1504/IJIDSS.2010.033672","url":null,"abstract":"The ability to detect and recognise dangerous objects at a safe distance is a very important task in a number of defence, police and security applications. In this paper, we look at ways of increasing the effectiveness of infrared imagery for object recognition through processes such as super-resolution image reconstruction and deconvolution methods. In this paper, we propose two techniques for assessing image quality improvement: operator assessment and edge detection; and report on some initial work recently undertaken.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132845062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-06-16DOI: 10.1504/IJIDSS.2010.033673
Krunoslav Bedi, Suzana Sestan, N. Z. Hrustek
The purpose of the research is to identify the factors of the visual identification by means of graphically shaped elements – avatars. In the contemporary times of the online games, communication and visual domination, the virtual identification by means of avatars qualifies as an inevitable element of the visual distinction and identification. Within an online course that was taken by means of Moodle LMS, 'Manipulating images with GIMP', the students were given the opportunity of setting up avatars in order to create visual identities.
{"title":"Avatars and identification in online communication","authors":"Krunoslav Bedi, Suzana Sestan, N. Z. Hrustek","doi":"10.1504/IJIDSS.2010.033673","DOIUrl":"https://doi.org/10.1504/IJIDSS.2010.033673","url":null,"abstract":"The purpose of the research is to identify the factors of the visual identification by means of graphically shaped elements – avatars. In the contemporary times of the online games, communication and visual domination, the virtual identification by means of avatars qualifies as an inevitable element of the visual distinction and identification. Within an online course that was taken by means of Moodle LMS, 'Manipulating images with GIMP', the students were given the opportunity of setting up avatars in order to create visual identities.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123476245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}