99,072 research outputs found

    The Abertay Code Bar – unlocking access to university-generated computer games intellectual poperty

    Get PDF
    Progress report on a digital platform and dual licensing model developed to unlock access to a University repository of new and legacy computer games based Intellectual Property (IP) assets for educational and commercial use. The digital creative industries have been identified by a number of governments as a priority area in delivering sustainable economic growth. Code Bar is an innovation that allows digital products to be commercially successful beyond the end of the Dare competition or coursework submission. To be selected for Code Bar, game products must be well designed for both player and market; technically robust (i.e. operating consistently and reliably on a single/multiple platforms), and be free from ambiguity around 3rd party IP. We describe various technical, pedagogic and legal challenges in developing the digital platform, licensing model and packaging of computer games products for release through the platform. The model is extendable beyond computer games to other software products

    Analysing qualitative data from virtual worlds: using images and text mining

    Get PDF
    There is an increasing interest within both organisational and social contexts in virtual worlds and virtual reality platforms. Virtual worlds are highly graphical systems in which avatars interact with each other, and almost every event and conversation is logged and recorded. This presents new challenges for qualitative researchers in information systems. This paper addresses the challenges of analyzing the huge amounts of qualitative data that can be obtained from virtual worlds (both images and text). It addresses how images might be used in qualitative studies of virtual worlds, and proposes a new way to analyze textual data using a qualitative software tool called Leximancer. This paper illustrates these methods using a study of a social movement in a virtual world

    Using motivation derived from computer gaming in the context of computer based instruction

    Get PDF
    This paper was originally presented at the IEEE Technically Sponsored SAI Computing Conference 2016, London, 13-15 July 2016. Abstract— this paper explores how to exploit game based motivation as a way to promote engagement in computer-based instruction, and in particular in online learning interaction. The paper explores the human psychology of gaming and how this can be applied to learning, the computer mechanics of media presentation, affordances and possibilities, and the emerging interaction of playing games and how this itself can provide a pedagogical scaffolding to learning. In doing so the paper focuses on four aspects of Game Based Motivation and how it may be used; (i) the game player’s perception; (ii) the game designers’ model of how to motivate; (iii) team aspects and social interaction as a motivating factor; (iv) psychological models of motivation. This includes the increasing social nature of computer interaction. The paper concludes with a manifesto for exploiting game based motivation in learning

    How can I use video to improve teacher engagement with my school’s abundant ICT equipment?

    Get PDF
    This paper examines how video can be used to enhance teacher engagement with ICT as a teaching tool. The Connect School Project, South Dublin County Council’s ubiquitous computing initiative, equipped St. Aidan’s with a vast amount of information and communication technologies (ICT). A review of appropriate literature indicated that the use of such technologies in class could lead to effective teaching and learning environments, increase student self-esteem and could bridge the ‘digital-divide’ that might exist between students in disadvantaged areas and those in more affluent communities. Through two cycles of enquiry, I planned and produced a video which modelled how the laptops and associated hard and software could be used effectively in class. The video aimed to represent all stakeholders in the school: management, teachers and students. In this way a top-down endorsement of the use of ICT as a teaching and learning tool was communicated. I feel that if teachers are to embrace the use of technology in class, pedagogical as well as technical support must be provided. Using video to model effective practice could be an ideal way to provide such support

    Using affective avatars and rich multimedia content for education of children with autism

    Get PDF
    Autism is a communication disorder that mandates early and continuous educational interventions on various levels like the everyday social, communication and reasoning skills. Computer-aided education has recently been considered as a likely intervention method for such cases, and therefore different systems have been proposed and developed worldwide. In more recent years, affective computing applications for the aforementioned interventions have also been proposed to shed light on this problem. In this paper, we examine the technological and educational needs of affective interventions for autistic persons. Enabling affective technologies are visited and a number of possible exploitation scenarios are illustrated. Emphasis is placed in covering the continuous and long term needs of autistic persons by unobtrusive and ubiquitous technologies with the engagement of an affective speaking avatar. A personalised prototype system facilitating these scenarios is described. In addition the feedback from educators for autistic persons is provided for the system in terms of its usefulness, efficiency and the envisaged reaction of the autistic persons, collected by means of an anonymous questionnaire. Results illustrate the clear potential of this effort in facilitating a very promising autism intervention

    What does touch tell us about emotions in touchscreen-based gameplay?

    Get PDF
    This is the post-print version of the Article. The official published version can be accessed from the link below - Copyright @ 2012 ACM. It is posted here by permission of ACM for your personal use. Not for redistribution.Nowadays, more and more people play games on touch-screen mobile phones. This phenomenon raises a very interesting question: does touch behaviour reflect the player’s emotional state? If possible, this would not only be a valuable evaluation indicator for game designers, but also for real-time personalization of the game experience. Psychology studies on acted touch behaviour show the existence of discriminative affective profiles. In this paper, finger-stroke features during gameplay on an iPod were extracted and their discriminative power analysed. Based on touch-behaviour, machine learning algorithms were used to build systems for automatically discriminating between four emotional states (Excited, Relaxed, Frustrated, Bored), two levels of arousal and two levels of valence. The results were very interesting reaching between 69% and 77% of correct discrimination between the four emotional states. Higher results (~89%) were obtained for discriminating between two levels of arousal and two levels of valence

    Multi-Layer Cyber-Physical Security and Resilience for Smart Grid

    Full text link
    The smart grid is a large-scale complex system that integrates communication technologies with the physical layer operation of the energy systems. Security and resilience mechanisms by design are important to provide guarantee operations for the system. This chapter provides a layered perspective of the smart grid security and discusses game and decision theory as a tool to model the interactions among system components and the interaction between attackers and the system. We discuss game-theoretic applications and challenges in the design of cross-layer robust and resilient controller, secure network routing protocol at the data communication and networking layers, and the challenges of the information security at the management layer of the grid. The chapter will discuss the future directions of using game-theoretic tools in addressing multi-layer security issues in the smart grid.Comment: 16 page
    corecore