Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Enhancing Identity Protection in Metaverse-Based Psychological Counseling System

    Jun Lee1, Hanna Lee2, Seong Chan Lee2, Hyun Kwon3,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 617-632, 2024, DOI:10.32604/cmc.2023.045768

    Abstract Non-face-to-face psychological counseling systems rely on network technologies to anonymize information regarding client identity. However, these systems often face challenges concerning voice data leaks and the suboptimal communication of the client’s non-verbal expressions, such as facial cues, to the counselor. This study proposes a metaverse-based psychological counseling system designed to enhance client identity protection while ensuring efficient information delivery to counselors during non-face-to-face counseling. The proposed system incorporates a voice modulation function that instantly modifies/masks the client’s voice to safeguard their identity. Additionally, it employs real-time client facial expression recognition using an ensemble of decision trees to mirror the client’s… More >

  • Open Access

    ARTICLE

    Research on Metaverse Security and Forensics

    Guangjun Liang1,2,3, Jianfang Xin4,*, Qun Wang1,2, Xueli Ni1,2,3, Xiangmin Guo1,2,3, Pu Chen1

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 799-825, 2023, DOI:10.32604/cmc.2023.038403

    Abstract As a subversive concept, the metaverse has recently attracted widespread attention around the world and has set off a wave of enthusiasm in academic, industrial, and investment circles. However, while the metaverse brings unprecedented opportunities for transformation to human society, it also contains related risks. Metaverse is a digital living space with information infrastructure, interoperability system, content production system, and value settlement system as the underlying structure in which the inner core is to connect real residents through applications and identities. Through social incentives and governance rules, the metaverse reflects the digital migration of human society. This article will conduct… More >

  • Open Access

    ARTICLE

    AI-Enabled Grouping Bridgehead to Secure Penetration Topics of Metaverse

    Woo Hyun Park1, Isma Farah Siddiqui3, Nawab Muhammad Faseeh Qureshi2,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5609-5624, 2022, DOI:10.32604/cmc.2022.030235

    Abstract With the advent of the big data era, security issues in the context of artificial intelligence (AI) and data analysis are attracting research attention. In the metaverse, which will become a virtual asset in the future, users’ communication, movement with characters, text elements, etc., are required to integrate the real and virtual. However, they can be exposed to threats. Particularly, various hacker threats exist. For example, users’ assets are exposed through notices and mail alerts regularly sent to users by operators. In the future, hacker threats will increase mainly due to naturally anonymous texts. Therefore, it is necessary to use… More >

  • Open Access

    ARTICLE

    Enhancing the Prediction of User Satisfaction with Metaverse Service Through Machine Learning

    Seon Hong Lee1, Haein Lee1, Jang Hyun Kim2,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4983-4997, 2022, DOI:10.32604/cmc.2022.027943

    Abstract Metaverse is one of the main technologies in the daily lives of several people, such as education, tour systems, and mobile application services. Particularly, the number of users of mobile metaverse applications is increasing owing to the merit of accessibility everywhere. To provide an improved service, it is important to analyze online reviews that contain user satisfaction. Several previous studies have utilized traditional methods, such as the structural equation model (SEM) and technology acceptance method (TAM) for exploring user satisfaction, using limited survey data. These methods may not be appropriate for analyzing the users of mobile applications. To overcome this… More >

Displaying 1-10 on page 1 of 4. Per Page