Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066602
S. Sharma, V. Balasubramanian
Use of remote healthcare monitoring application (HMA) can not only enable healthcare seeker to live a normal life while receiving treatment but also prevent critical healthcare situation through early intervention. For this to happen, the HMA have to provide continuous monitoring through sensors attached to the patient's body or in close proximity to the patient. Owing to elasticity nature of the cloud, recently, the implementation of HMA in cloud is of intense research. Although, cloud-based implementation provides scalability for implementation, the health data of patient is super-sensitive and requires high level of privacy and security for cloud-based shared storage. In addition, protection of real-time arrival of large volume of sensor data from continuous monitoring of patient poses bigger challenge. In this work, we propose a self-protective security framework for our cloud-based HMA. Our framework enable the sensor data in the cloud from (1) unauthorized access and (2) self-protect the data in case of breached access using biometrics. The framework is detailed in the paper using mathematical formulation and algorithms.
{"title":"A biometric based authentication and encryption Framework for Sensor Health Data in Cloud","authors":"S. Sharma, V. Balasubramanian","doi":"10.1109/ICIMU.2014.7066602","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066602","url":null,"abstract":"Use of remote healthcare monitoring application (HMA) can not only enable healthcare seeker to live a normal life while receiving treatment but also prevent critical healthcare situation through early intervention. For this to happen, the HMA have to provide continuous monitoring through sensors attached to the patient's body or in close proximity to the patient. Owing to elasticity nature of the cloud, recently, the implementation of HMA in cloud is of intense research. Although, cloud-based implementation provides scalability for implementation, the health data of patient is super-sensitive and requires high level of privacy and security for cloud-based shared storage. In addition, protection of real-time arrival of large volume of sensor data from continuous monitoring of patient poses bigger challenge. In this work, we propose a self-protective security framework for our cloud-based HMA. Our framework enable the sensor data in the cloud from (1) unauthorized access and (2) self-protect the data in case of breached access using biometrics. The framework is detailed in the paper using mathematical formulation and algorithms.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132680391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066603
K. Qureshi, A. Abdullah, R. W. Anwar
The vehicular Ad hoc network is new emerging technology to enhance traffic safety and comfort for automotive users. Most of the safety applications in this field need real time information with high reliability and in time delivery. In dense network a large number of vehicles nodes disseminate the messages to all accessible nodes with high frequency and control channels will be easily congested and cause of broadcast storm. There is a need to prevent control channels from these types of storms and ensure the reliable and in time devilry of messages for safety applications. The congestion control mechanism is one of the most popular approach to control the load and ensure in time and efficient delivery of messages. We proposed a congestion control scheduling scheme to provide an efficient operation, congestion avoidance or mitigation. The performance of proposed scheme is evaluated in different congested scenarios and compared with existing congestion control scheduling schemes and improve packet loss rate and packet delay.
{"title":"Congestion control scheduling scheme for vehicular networks","authors":"K. Qureshi, A. Abdullah, R. W. Anwar","doi":"10.1109/ICIMU.2014.7066603","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066603","url":null,"abstract":"The vehicular Ad hoc network is new emerging technology to enhance traffic safety and comfort for automotive users. Most of the safety applications in this field need real time information with high reliability and in time delivery. In dense network a large number of vehicles nodes disseminate the messages to all accessible nodes with high frequency and control channels will be easily congested and cause of broadcast storm. There is a need to prevent control channels from these types of storms and ensure the reliable and in time devilry of messages for safety applications. The congestion control mechanism is one of the most popular approach to control the load and ensure in time and efficient delivery of messages. We proposed a congestion control scheduling scheme to provide an efficient operation, congestion avoidance or mitigation. The performance of proposed scheme is evaluated in different congested scenarios and compared with existing congestion control scheduling schemes and improve packet loss rate and packet delay.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132728860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066618
A. Hussain, H. Abubakar, Norlaily Binti Hashim
Usability has greatly been considered as one of the significant quality attributes to determine the success of mobile application. Mobile banking application is increasingly recognized as an emergent m-commerce application which dignified to become the giant killer mobile application arena. However, prominent usability evaluation models for mobile applications are too general and do not adequately capture the complexities of interacting with m-banking application platform. Similarly, there are no sufficient descriptions concerning the relationship between phases and appropriate usability measures for a specific application. Some banks do not offer m-banking application, while those that offer have inadequate functionalities and this shows that their interfaces are still insufficient and not user friendly. To date, usability and measurements for mbanking application in particular is very limited or even isolated and this makes usability evaluation of m-banking more of challenging. Consequently, this report proposes to address this matter by proposing a suitable and an appropriate set of usability dimensions and measurements for m-banking evaluation. The systematic literature review was employed to review relevant journals and conference proceedings. Seven hundred and eight papers were downloaded but merely forty nine papers have been selected and fully reviewed/analysed. Five usability dimensions and twelve relevant criteria (sub-dimensions) have been created that can be used to evaluate m-banking application.
{"title":"Evaluating mobile banking application: Usability dimensions and measurements","authors":"A. Hussain, H. Abubakar, Norlaily Binti Hashim","doi":"10.1109/ICIMU.2014.7066618","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066618","url":null,"abstract":"Usability has greatly been considered as one of the significant quality attributes to determine the success of mobile application. Mobile banking application is increasingly recognized as an emergent m-commerce application which dignified to become the giant killer mobile application arena. However, prominent usability evaluation models for mobile applications are too general and do not adequately capture the complexities of interacting with m-banking application platform. Similarly, there are no sufficient descriptions concerning the relationship between phases and appropriate usability measures for a specific application. Some banks do not offer m-banking application, while those that offer have inadequate functionalities and this shows that their interfaces are still insufficient and not user friendly. To date, usability and measurements for mbanking application in particular is very limited or even isolated and this makes usability evaluation of m-banking more of challenging. Consequently, this report proposes to address this matter by proposing a suitable and an appropriate set of usability dimensions and measurements for m-banking evaluation. The systematic literature review was employed to review relevant journals and conference proceedings. Seven hundred and eight papers were downloaded but merely forty nine papers have been selected and fully reviewed/analysed. Five usability dimensions and twelve relevant criteria (sub-dimensions) have been created that can be used to evaluate m-banking application.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115641580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066652
Aw Kien Sin, H. Zaman, Azlina Ahmad, R. Sulaiman
Malaysia is expected to reach population ageing in year 2021. There are many ways to tackle with the problems of population ageing and technology is one of them in supporting elderly in their daily life. However, elderly have problem when using technology because of their decreasing ability. In this research, we carried out 2 interviews with different groups of elderly to identify their problems of using technology, and their daily activities based on their location in a house. Based on the finding, we listed down all the important requirements in designing a wearable device. They are (a) Replacing Graphical User Interface (GUI) with Tangible User Interface (TUI) (b) Considering mental model of elderly when designing interaction and user interface, and (c) Able to provide implicit interaction to elderly.
{"title":"A wearable device for the elderly: A case study in Malaysia","authors":"Aw Kien Sin, H. Zaman, Azlina Ahmad, R. Sulaiman","doi":"10.1109/ICIMU.2014.7066652","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066652","url":null,"abstract":"Malaysia is expected to reach population ageing in year 2021. There are many ways to tackle with the problems of population ageing and technology is one of them in supporting elderly in their daily life. However, elderly have problem when using technology because of their decreasing ability. In this research, we carried out 2 interviews with different groups of elderly to identify their problems of using technology, and their daily activities based on their location in a house. Based on the finding, we listed down all the important requirements in designing a wearable device. They are (a) Replacing Graphical User Interface (GUI) with Tangible User Interface (TUI) (b) Considering mental model of elderly when designing interaction and user interface, and (c) Able to provide implicit interaction to elderly.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115821926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066633
Nurzeatul Hamimah Abdul hamid, M. S. Ahmad, Azhana Ahmad, M. Mahmoud, Mohd Zaliman Mohd Yusoff, A. Mustapha
Research in normative multi-agent systems (NorMAS) have progressed from norm representation towards investigation of mechanisms in social sciences to support for agents' tasks in open multi-agent systems (open-MAS) settings. Open-MAS characteristics pose new challenges in regulating and coordinating agents' behavior. Norms are no longer assumed to be built into agents during design time, but emerged from interactions with other agents. These developments entail the needs to discover other factors that influence agents' reasoning and decision-making for norms execution in open systems. In this paper, we explore and review the general concepts of norms in normative multi-agent systems, its classifications and life cycles. We then discuss and propose norm's trust as an important factor which influences an agent's norms compliance behavior and norms stability in normative multi-agent systems.
{"title":"Trusting norms in normative multi-agent systems","authors":"Nurzeatul Hamimah Abdul hamid, M. S. Ahmad, Azhana Ahmad, M. Mahmoud, Mohd Zaliman Mohd Yusoff, A. Mustapha","doi":"10.1109/ICIMU.2014.7066633","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066633","url":null,"abstract":"Research in normative multi-agent systems (NorMAS) have progressed from norm representation towards investigation of mechanisms in social sciences to support for agents' tasks in open multi-agent systems (open-MAS) settings. Open-MAS characteristics pose new challenges in regulating and coordinating agents' behavior. Norms are no longer assumed to be built into agents during design time, but emerged from interactions with other agents. These developments entail the needs to discover other factors that influence agents' reasoning and decision-making for norms execution in open systems. In this paper, we explore and review the general concepts of norms in normative multi-agent systems, its classifications and life cycles. We then discuss and propose norm's trust as an important factor which influences an agent's norms compliance behavior and norms stability in normative multi-agent systems.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114805080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066601
N. A. Musa, M. Yusoff, Yunus Yusoff, Roslan Ismail
This paper describes a data analysis technique used to extract threshold values of a Fuzzy Inference System's (FIS) inputs. In this work, the FIS is used to classify malicious agents' behaviour in a Multi-Agent System (MAS) environment. The extraction of suitable FIS inputs threshold values in the MAS environment are based on data analysis derived from several simulation runs. Subsequently, the extracted threshold values are applied in the rules of the FIS framework for classifying malicious agents' behaviors. Results indicated that extracting the fuzzy threshold values using the data analysis technique is an acceptable alternative method when no domain expert is available.
{"title":"Data analysis technique to extract threshold value for Fuzzy Inference System in classifying malicious agents","authors":"N. A. Musa, M. Yusoff, Yunus Yusoff, Roslan Ismail","doi":"10.1109/ICIMU.2014.7066601","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066601","url":null,"abstract":"This paper describes a data analysis technique used to extract threshold values of a Fuzzy Inference System's (FIS) inputs. In this work, the FIS is used to classify malicious agents' behaviour in a Multi-Agent System (MAS) environment. The extraction of suitable FIS inputs threshold values in the MAS environment are based on data analysis derived from several simulation runs. Subsequently, the extracted threshold values are applied in the rules of the FIS framework for classifying malicious agents' behaviors. Results indicated that extracting the fuzzy threshold values using the data analysis technique is an acceptable alternative method when no domain expert is available.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121950731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066664
Ag. Asri Ag. Ibrahim, Alter Jimat Embug
Most of instructions by trainers or therapists in body movements, such as walking, turning, rising arms or legs are mostly done through voice instructions or touches. This does not have much problem to normal people as they can see it at the same time. To follow these instructions without seeing it can cause confusion in terms of actions and directions. Unfortunately, there is no other option for people who are blind. Thus, this research will try to replace those voice and touches form of instructions into non-speech sound instructions. The method involves transforming 3-dimensional data of body movements (kinematics) into sounds. It is hoped by only listening to the sounds, a person should be able to follow the exact movements of the body of another person or instructor without any voice commands or instructions. The novel contribution of this research is to produce an effective and efficient sonification technique (converting the data into sound) to represent the actions and directions of the body movements in 3-dimensional space. The conversion approach to be used is Parameter Mapping, where the movement properties will be mapped to sound properties. The parameter mapping will involve at least 3 transformation processes - data, acoustics parameters and sound representations. The effectiveness and efficiency of this approach is depending on all of these transformation processes. This research will use Kinect (a device used to play game with Microsoft Xbox game console) as the live 3D movements input data stream. This device is intentionally used in this research, as it is readily available and cheap. Thus, the potential applications or products from this research later on can also use this device.
{"title":"Sonification of 3D body movement using parameter mapping technique","authors":"Ag. Asri Ag. Ibrahim, Alter Jimat Embug","doi":"10.1109/ICIMU.2014.7066664","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066664","url":null,"abstract":"Most of instructions by trainers or therapists in body movements, such as walking, turning, rising arms or legs are mostly done through voice instructions or touches. This does not have much problem to normal people as they can see it at the same time. To follow these instructions without seeing it can cause confusion in terms of actions and directions. Unfortunately, there is no other option for people who are blind. Thus, this research will try to replace those voice and touches form of instructions into non-speech sound instructions. The method involves transforming 3-dimensional data of body movements (kinematics) into sounds. It is hoped by only listening to the sounds, a person should be able to follow the exact movements of the body of another person or instructor without any voice commands or instructions. The novel contribution of this research is to produce an effective and efficient sonification technique (converting the data into sound) to represent the actions and directions of the body movements in 3-dimensional space. The conversion approach to be used is Parameter Mapping, where the movement properties will be mapped to sound properties. The parameter mapping will involve at least 3 transformation processes - data, acoustics parameters and sound representations. The effectiveness and efficiency of this approach is depending on all of these transformation processes. This research will use Kinect (a device used to play game with Microsoft Xbox game console) as the live 3D movements input data stream. This device is intentionally used in this research, as it is readily available and cheap. Thus, the potential applications or products from this research later on can also use this device.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129491292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066612
H. Sulaiman, Asma I. Magaireah
Cloud computing is one of the most prominent technological trends as it allows modernization of healthcare organization. The purpose of this study is to explore the factors that affect adoption of integrated cloud-based e-health record EHR system in healthcare organizations in Jordan based on TOE framework. The study is done by conducting interviews with IT experts in healthcare organization in Jordan. The three contexts of TOE that affect adoption of cloud-based EHR are: Technological context “privacy, security, and reliability”, Organizational context “top management support, and technology readiness”, and Environmental context “government policy, legal environment, and competition”.
{"title":"Factors affecting the adoption of integrated cloudbased e- health record in healthcare organizations: a case study of Jordan","authors":"H. Sulaiman, Asma I. Magaireah","doi":"10.1109/ICIMU.2014.7066612","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066612","url":null,"abstract":"Cloud computing is one of the most prominent technological trends as it allows modernization of healthcare organization. The purpose of this study is to explore the factors that affect adoption of integrated cloud-based e-health record EHR system in healthcare organizations in Jordan based on TOE framework. The study is done by conducting interviews with IT experts in healthcare organization in Jordan. The three contexts of TOE that affect adoption of cloud-based EHR are: Technological context “privacy, security, and reliability”, Organizational context “top management support, and technology readiness”, and Environmental context “government policy, legal environment, and competition”.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127059124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066635
G. S. Basheer, M. S. Ahmad, Alicia Y. C. Tang
In open multi-agent systems, agents may hide or lie about information regarding some events. In order to avoid such deception, a multi-agent system must be designed to test the confidence of agents. In this paper, we present a new approach to agent-based confidence modeling. This approach integrates two confidence requirements, namely, trust and certainty. We use fuzzy logic in representing the importance of trust and certainty to model an agent's confidence reasoning. The modeling mechanism eliminates the influence of untrusted agents' opinions because certainty level and importance of trust may not be valuable in all circumstances.
{"title":"A fuzzy framework for modelling confidence in multi-agent system","authors":"G. S. Basheer, M. S. Ahmad, Alicia Y. C. Tang","doi":"10.1109/ICIMU.2014.7066635","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066635","url":null,"abstract":"In open multi-agent systems, agents may hide or lie about information regarding some events. In order to avoid such deception, a multi-agent system must be designed to test the confidence of agents. In this paper, we present a new approach to agent-based confidence modeling. This approach integrates two confidence requirements, namely, trust and certainty. We use fuzzy logic in representing the importance of trust and certainty to model an agent's confidence reasoning. The modeling mechanism eliminates the influence of untrusted agents' opinions because certainty level and importance of trust may not be valuable in all circumstances.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129264116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICIMU.2014.7066663
Imran Mahalil, M. Rusli, Azmi Bin Mohd Yusof, Mohd Zaliman Mohd Yusoff, Ahmad Redza Razieff Zainudin
Stress problems often causes negative emotional response which tends to lead to a negative work performance. There are many treatments for stress such as going to gymnasium, undergoing hypnosis and taking medicine. Lately, virtual reality therapy (VRT) has been proposed as an alternative technique for stress treatment. In this VR-based treatment, one of the important elements to ensure its effectiveness is the level of immersion. In order to prove that the level of immersion does contribute to the effectiveness of the VR-based stress treatment, comparative studies with imaginary technique was conducted and analysed. In this paper, we present a comprehensive study on the effect of immersion level to participants when using our VR-based stress therapy [1] that includes typical Malaysian environment in 3D, zikr, and soothing audio.
{"title":"Study of immersion effectiveness in VR-based stress therapy","authors":"Imran Mahalil, M. Rusli, Azmi Bin Mohd Yusof, Mohd Zaliman Mohd Yusoff, Ahmad Redza Razieff Zainudin","doi":"10.1109/ICIMU.2014.7066663","DOIUrl":"https://doi.org/10.1109/ICIMU.2014.7066663","url":null,"abstract":"Stress problems often causes negative emotional response which tends to lead to a negative work performance. There are many treatments for stress such as going to gymnasium, undergoing hypnosis and taking medicine. Lately, virtual reality therapy (VRT) has been proposed as an alternative technique for stress treatment. In this VR-based treatment, one of the important elements to ensure its effectiveness is the level of immersion. In order to prove that the level of immersion does contribute to the effectiveness of the VR-based stress treatment, comparative studies with imaginary technique was conducted and analysed. In this paper, we present a comprehensive study on the effect of immersion level to participants when using our VR-based stress therapy [1] that includes typical Malaysian environment in 3D, zikr, and soothing audio.","PeriodicalId":408534,"journal":{"name":"Proceedings of the 6th International Conference on Information Technology and Multimedia","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114607863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}