د/ايمان زغلول قاسم

استاذ تكنولوجيا التعليم المساعد بكلية التربية بالزلفي

Interaction

Interaction
Since we visualize security protocols with 3D digital Legos,
it is important to provide suitable interactive methods that
allow users to browse Lego contents freely and assist them
in constructing protocols. As examples show in Figs. 9 and
10, our system is capable of the following specialized
interaction functions:
. Rotating: Viewers can rotate individual or a group of
Lego blocks.
. Moving: Viewers can also move individual or a
group of Lego blocks around the screen space.
. Displaying messages: The message contained in a
selected Lego block is displayed in a floating
window.
. Facing-to-viewer: We design a special facing-toviewer
rendering function, which turns the message
content surfaces of selected Lego blocks to viewers
while preserving the central positions of these Lego
blocks, as shown in Fig. 9.
. Merging: Viewers can adjust the distances between
adjacent Lego blocks and finally merge all of them,
just like playing with real Legos. An example of this
merging function is shown in Fig. 10.
. Labeling: We also allow viewers to select important
primitives or protocol portions and adjust their
rendering parameters to emphasize the important
contents.
5.3 Experiments
We also design an experiment function for our digital Lego
system so that it can be used for practice and homework.
An experiment panel is provided with the supporting
functions, such as start, next, and complete. Suitable
rendering settings are also adopted during the visualization
process. For example, Fig. 11a shows a Lego block in our
filling experiment. This experiment is designed to emphasize
important portions of protocols and strengthen related
concepts by asking students to complete a predesigned
protocol. For each of our sample protocols used in the class,
we randomly remove a portion of Lego blocks or messages
that are related to the lecture contents. A difficulty level is
used to control the amount of information that is hidden. As
shown in Fig. 11, our Lego construction method can
automatically visualize the protocol. We can also change
the settings of 3D Legos to direct the attention of users to
specific portions of a protocol, such as using the facing-toviewer
motion

الوقت من ذهب

اذكر الله


المصحف الالكتروني