scholarly journals Editors’ Note

2017 ◽  
Vol 8 (2) ◽  
pp. 1
Author(s):  
Alberto Raposo ◽  
Cléber Corrêa

It is our pleasure to introduce you the second issue of JIS in 2017. This issue contains six papers of the Special Issue of the 15th Brazilian Symposium on Human Factors in Computing Systems (IHC 2016). As we have been doing since IHC 2014, the best papers of the conference are invited to submit extended versions to a special issue of JIS, guest edited by the conference program chairs. In the current publication, our guest editors are Profs. Carla Leitão, from Pontifícia Universidade Católica - Rio de Janeiro (PUC-Rio), and Luciana Salgado, from Universidade Federal Fluminense (UFF), who we thank a lot for the dedication in the preparation of this issue. We invited you to read their editorial in the following.We also have in this issue an original paper by Paulo Paiva, Liliane Machado, Jauvane de Oliveira, and Ronei de Moraes, entitled “Networking Issues for 3D Medical Collaborative Virtual Environments: Design and Applications”. The authors discuss specific networking issues for Collaborative Virtual Environments (CVEs) applied to the simulation of medical procedures. They designed, developed, and validated a peer-to-peer multicast architecture on the collaborative module of the CyberMed Virtual Reality framework, aiming at providing better network scalability.Finally, we would like to thank the authors and reviewers that contributed to JIS. At the end of the issue we acknowledge the reviewers that contributed to JIS in 2015, 2016, and 2017.JIS Editorial Board is looking forward to receiving your contributions. We hope you enjoy reading this issue!

2017 ◽  
Vol 8 (2) ◽  
pp. 1
Author(s):  
Paulo V. F. Paiva ◽  
Liliane dos S. Machado ◽  
Jauvane C. de Oliveira ◽  
Ronei M. de Moraes

Collaborative Virtual Environments (CVEs) are Virtual Reality (VR) systems and can simulate medical procedures such as surgeries performed by a group of remote users which can interact with one another through the simulation in real-time, with the aid of a network such as the Internet.Therefore, it is important to note that research on CVE-specific networking issues allows us to better understand the requirements for real-time applications. This paper discloses design and implementation issues of a peer-to-peer multicast architecture on the collaborative module of theCyberMed VR framework, aiming at providing better network scalability, as well as it shows as results, some developed applications as validation. Finally, we compared the performance of the newly implemented peer-to-peer multicast architecture with the peer-to-peer unicast previously existent with simulated models designed with OPNET Network Modeler and R statistical software. As result of our experiments, the null hypothesis was rejected (p = 2.2e-16, level of significance = 5%) confirming what we expected about the behavior of CyberMed’s multicast protocol.


2015 ◽  
Vol 6 (1) ◽  
pp. 1
Author(s):  
Alberto Raposo

The year of 2015 starts with the first issue of JIS dedicated to HCI. The journal was created in 2008, within the scope of the Brazilian Virtual Reality community, and in 2013 and 2014 it made an approximation with the Games and HCI communities, becoming the first periodic in Brazil specifically on these areas. We believe this way the journal may open the door for more interdisciplinary research.This issue contains extended versions of five papers selected among the best full papers of IHC 2014 - XIII Brazilian Symposium on Human Factors in Computer Systems. I would like to thank Carla Leitão, Cristiano Maciel, and Simone Barbosa for their dedication acting as guest editors for this special issue, and invite you to read their editorial in the following.We also have in this issue an original paper by José Paulo de Lima and Helton Bíscaro, entitled "Compressive Representation of Three-dimensional Models''. The authors investigate the applicability of a recent approach to the theory of signs, called Compressive Sensing, to obtain a compressive representation of geometric meshes.I would like to thank the authors and reviewers that contributed to this issue of JIS, and I hope it fulfills your expectations. JIS Editorial Board is looking forward to receiving your contributions.


2020 ◽  
Vol 11 (1) ◽  
pp. 99-106
Author(s):  
Marián Hudák ◽  
Štefan Korečko ◽  
Branislav Sobota

AbstractRecent advances in the field of web technologies, including the increasing support of virtual reality hardware, have allowed for shared virtual environments, reachable by just entering a URL in a browser. One contemporary solution that provides such a shared virtual reality is LIRKIS Global Collaborative Virtual Environments (LIRKIS G-CVE). It is a web-based software system, built on top of the A-Frame and Networked-Aframe frameworks. This paper describes LIRKIS G-CVE and introduces its two original components. The first one is the Smart-Client Interface, which turns smart devices, such as smartphones and tablets, into input devices. The advantage of this component over the standard way of user input is demonstrated by a series of experiments. The second component is the Enhanced Client Access layer, which provides access to positions and orientations of clients that share a virtual environment. The layer also stores a history of connected clients and provides limited control over the clients. The paper also outlines an ongoing experiment aimed at an evaluation of LIRKIS G-CVE in the area of virtual prototype testing.


Author(s):  
Sarah Beadle ◽  
Randall Spain ◽  
Benjamin Goldberg ◽  
Mahdi Ebnali ◽  
Shannon Bailey ◽  
...  

Virtual environments and immersive technologies are growing in popularity for human factors purposes. Whether it is training in a low-risk environment or using simulated environments for testing future automated vehicles, virtual environments show promise for the future of our field. The purpose of this session is to have current human factors practitioners and researchers demonstrate their immersive technologies. This is the eighth iteration of the “Me and My VE” interactive session. Presenters in this session will provide a brief introduction of their virtual reality, augmented reality, or virtual environment work before engaging with attendees in an interactive demonstration period. During this period, the presenters will each have a multimedia display of their immersive technology as well as discuss their work and development efforts. The selected demonstrations cover issues of designing immersive interfaces, military and medical training, and using simulation to better understand complex tasks. This includes a mix of government, industry, and academic-based work. Attendees will be virtually immersed in the technologies and research presented allowing for interaction with the work being done in this field.


Author(s):  
Randall Spain ◽  
Benjamin Goldberg ◽  
Jeffrey Hansberger ◽  
Tami Griffith ◽  
Jeremy Flynn ◽  
...  

Recent advances in technology have made virtual environments, virtual reality, augmented reality, and simulations more affordable and accessible to researchers, companies, and the general public, which has led to many novel use cases and applications. A key objective of human factors research and practice is determining how these technology-rich applications can be designed and applied to improve human performance across a variety of contexts. This session will demonstrate some of the distinct and diverse uses of virtual environments and mixed reality environments in an alternative format. The session will begin with each demonstrator providing a brief overview of their virtual environment (VE) and a description of how it has been used to address a particular problem or research need. Following the description portion of the session, each VE will be set-up at a demonstration station in the room, and session attendees will be encouraged to directly interact with the virtual environment and ask demonstrators questions about their research and inquire about the effectiveness of using VE for research, training, and evaluation purposes. The overall objective of this alternative session is to increase the awareness of how human factors professionals use VE technologies and increase the awareness of the capabilities and limitations of VE in supporting the work of HF professionals.


1999 ◽  
Vol 8 (2) ◽  
pp. 218-236 ◽  
Author(s):  
Véronique Normand ◽  
Christian Babski ◽  
Steve Benford ◽  
Adrian Bullock ◽  
Stéphane Carion ◽  
...  

COVEN (Collaborative Virtual Environments) is a European project that seeks to develop a comprehensive approach to the issues in the development of collaborative virtual environment (CVE) technology. COVEN brings together twelve academic and industrial partners with a wide range of expertise in CSCW, networked VR, computer graphics, human factors, HCI, and telecommunications infrastructures. After two years of work, we are presenting the main features of our approach and results, our driving applications, the main components of our technical investigations, and our experimental activities. With different citizen and professional application scenarios as driving forces, COVEN is exploring the requirements and supporting techniques for collaborative interaction in scalable CVEs. Technical results are being integrated in an enriched networked VR platform based on the dVS and DIVE systems. Taking advantage of a dedicated Europe-wide ISDN and ATM network infrastructure, a large component of the project is a trial and experimentation activity that should allow a comprehensive understanding of the network requirements of these systems as well as their usability issues and human factors aspects.


2010 ◽  
Vol 9 (1) ◽  
pp. 61-71 ◽  
Author(s):  
Timothy Wright ◽  
Greg Madey

As collaborative virtual environments (CVEs) are more widely used, participant access to CVE objects and information becomes a significant concern. In virtual reality games, storefronts, classrooms, and laboratories, for example, the need to control access to spaces and objects is integral to the security of activities taking place there. However, limited access controls are typically available in CVEs. Often, such controls are course-grained, only protecting against movements by unauthorized participants into specific areas. In answer to this deficiency, we offer a discretionary access control (DAC) system based on traditional concepts of users and groups, and tailored to the needs of a CVE. Our system, called WonderDAC, includes the ability to restrict movement into areas, as well as control interactions with objects. A basic WonderDAC prototype has been implemented within the Project Wonderland CVE.


Sign in / Sign up

Export Citation Format

Share Document