Kuala Lumpur city is located at the confluence of two rivers and are flood prone area. With rapid development and uncontrolled town planning, the city had experience several major flash flood incidents and have caused...
详细信息
ISBN:
(纸本)9780769533599
Kuala Lumpur city is located at the confluence of two rivers and are flood prone area. With rapid development and uncontrolled town planning, the city had experience several major flash flood incidents and have caused tremendous damage to country. This research describes a study made to model and simulate the flash flood incident that struck Kuala Lumpur on 10 June 2007 using 3D computer Graphic and fluid simulation techniques. The aim is to examine the stability and effectiveness of this approach as a solution tool for environmental hazard studies. Particle-Based method used to model the fluid objects using MAYA software. Light Detection and Ranging (LIDAR) data and remote sensing imagery were used to model the study area. The main contribution of this study is the introduction of this approach to enhance realistic visualization for environmental studies thus enable better planning and countermeasures created to prevent the disaster.
Small and medium-sized enterprises (SMEs) rarely conduct a thorough cyber-risk assessment and they may face various internal issues when attempting to set up cyber-risk strategies. In this work, we apply a user journe...
详细信息
ISBN:
(纸本)9789897584886
Small and medium-sized enterprises (SMEs) rarely conduct a thorough cyber-risk assessment and they may face various internal issues when attempting to set up cyber-risk strategies. In this work, we apply a user journey approach to model human behaviour and visually map SMEs' practices and threats, along with a visualisation of the socio-technical actor network, targeted specifically at the risks highlighted in the user journey. By using a combination of cybersecurity-related visualisations, our goals are: i) to raise awareness about cybersecurity, and ii) to improve communication among IT personnel, security experts, and non-technical personnel. To achieve these goals, we combine two modelling languages: Customer Journey Modelling Language (CJML) is a visual language for modelling and visualisation of work processes in terms of user journeys. System Security Modeller (SSM) is an asset-based risk-analysis tool for socio-technical systems. By demonstrating the languages' supplementary nature through a threat scenario and considering related theories, we believe that there is a sound basis to warrant further validation of CJML and SSM together to raise awareness and handle cyber threats in SMEs.
Non-Photorealistic Rendering (NPR) is a class of techniques defined by what they do not aim, the realistic rendering of artificial scenes. NPR techniques, on the other hand, aim to reproduce artistic techniques render...
详细信息
To date, the techniques used in most real-time graphics applications (eg. computer games) for modelling and representing dust clouds, centre around the use of flat, pre-drawn sprites, layered onto the screen as 'b...
详细信息
Recent years have seen an increasing number of computer vision applications focusing on humans as their objects of interest. Such applications include video surveillance, domotics, multimedia semantic annotation and i...
详细信息
We propose a method for interactively generating a model-based reconstruction of a scene from a set of images. The method facilitates the fitting of multiple object models to the data in a manner that provides the bes...
详细信息
This paper describes a methodology and software engine for generating dynamic vegetation models for archaeological reconstruction and interactive visualisation, integrating the disciplines of Artificial Life (Alife) a...
详细信息
The vast majority of 15-litre water cooler bottles produced in the world today are made of blow moulded polycarbonate (PC) plastic and are returnable / refillable. This paper presents the design and development of a c...
详细信息
The construction of a bivariate C1 interpolant to scattered data is considered in which the interpolant is positive everywhere if the original data are positive. This study is motivated by earlier work in which suffic...
详细信息
The node-node overlaps, which occur in drawing of labeled graphs, and more importantly, in the dynamic drawing, have been a problem in graph visualization. Several approaches have recently been proposed to solve such ...
详细信息
暂无评论