Dynamics

Simulation is the most popular method to create computer animation procedurally.

Unlike kinematics, dynamics concerns forces and their effect on motion.

Animation Equation

The basic equation: F=maF=ma??

Read more »

4G/5G cellular networks

The solution for wide-area mobile internet!
We have more mobile-broadband-connected devices than fixed-broadband-connected devices.

Widespread deployment/use!
4G is available 97% of the time in Korea!

Comparison with wired internet

Similarities:

Read more »

History of Animation

Ancient Egypt, Leonardo da Vinci, ...
Lots of people drew movement as a series of frame!

Phenakistoscope: Draw frames on the disk, then spin it to animate it!
In fact we have a 3D version of phenakistoscope, called zoetrope!

The first film captured movement of the horse!
Multiple cameras were placed in the path of the horse.
In fact this was only a set of photos, not a real animation.

The first animation on film was made by hand!
Photos of chalkboard drawing were taken and animated. (about 15 min)

Read more »

Wireless and mobile networks

  • More wireless (mobile) phone subscribers than fixed (wired) phone subscribers!
  • More mobile-broadband-connected devices than fixed-broadband-connected devices.

Two important challenges:

  • Wireless: Communication over wirelss link.
  • Mobility: Handling the mobile user who changes point of attachment to network.

Elements of a wireless network

Read more »

Qualitative vs Quantitative

  • Qualitative
    • Develop understanding of human experience
    • Emphasis on preserving the richness of the data
    • Better external validity
  • Quantitative
    • Objectively measure human performance
    • More narrowly focused
    • Better internal validity

Qualitative approach

Qualitative approaches focus on high-level effects!

  • Identifies task flow problems
  • Highlights ambiguities in task description
  • Revel contextual and situational insights e.g. conflict with social norms or expectations, usability mismatches
Read more »

Transport-layer security (TLS)

Widely deployed security protocol above the transport layer!
It is supported by almost all browsers, and web servers.

TLS provides:

  • Confidentiality via symmetric encryption
  • Integrity via cryptographic hashing
  • Authentication via public key cryptography

TLS protocol

Read more »

Radiometry

Radiometry is a set of techniques for measuring electromagnetic radiation, including visible light.

  • Many physcial processes convert energy into photons. (e.g. incandescent lightbulb turns heat into light)
  • Each photon carries a small amount of energy.
  • Brightness is determined by energy of photons hitting an object. We need this information to make accurate images!

Solid angle

Angle and solid angle

Read more »

Network security

  • Confidentiality: only sender, intended receiver should understand message contents
    • Sender encrypts message
    • Receiver decrypts message
  • Authentication: sender, receiver want to confirm identity of each other
  • Message integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection
  • Access and availability: services must be accessible and available to users

Attacks on internet security

Bob and Alice want to communicate securely each other.
Trudy (intruder) may interrupt!

  • Eavesdrop: intercept messages
  • Actively insert messages into connection
  • Impersonation: can fake (spoof) source address in packet (or any field in packet)
  • Hijacking: take over ongoing connection by removing sender or receiver, then inserting himself in place
  • Denial of Service: prevent service from being used by others (e.g. by overloading resources)
Read more »

User Testing

Test the interface with real users!
Problem: Users are human beings with feelings and rights...
The ethics and responsibility of evaluators are necessary.

  • Qualitative/Naturalistic
  • Quantitative/Experimental
  • Field Study (usually long term and qulitative)

Milgram's Obedience Experiment

Measured the willingness of study participants to obey an authority figure who instructed them to perform acts that conflicted with their personal conscience.
e.g. Martial law by president Yoon?

Read more »

VLAN (Virtual Local Area Network)

Motivation

If user change point of attachment, All layer-2 broadcast traffic must cross entire LAN. (e.g. ARP, DHCP, unknown MAC)
Also, user might wants to remain logically attached to certain switch even when it moves.

Port-based VLANs

Switch ports are grouped by switch management software.
Single physical switch can operate as multiple virtual switches!

Read more »
0%