Browse Author

Bruce Barnes

Configurable Joints – Part 2

In the last tutorial, we learned about configurable joints, anchors, XYZ Motion, Angular XYZ Motion, Angular XYZ Limits, Target Rotation and Angular Velocity, as well as, Angular XYZ Drives.

In this lesson, we are going to learn how it works when connected to one or more other configurable joints to start to create a body. The final tutorial will go over configuring a rigged character and making it stand and balance. So let’s get started.

Rename our Cube to Forearm. Press Ctrl+D or right click and click duplicate. Rename this to Upper Arm and drag the green arrow directly up to look below. Leave a little space so we can see the rotations a bit better. If we just press play, the joints act like the aren’t connected and will both swing like how we set up our forearm.

Next we are going to reset the configurable joint to our elbow. Right click the upper arm and click reset. First we want to lock the XY and Z motions as we don’t want it to move laterally. Next we want to look closer at the connected body. If we drag the ForeArm rigidbody to the Upper Arm we get the below. Not what we are going for. In this case it looks like the top of the forearm is connected to the top of the upperarm by an imaginary line. So they rotate around themselves. (for the purpose of this gif, i locked the Y and Z axis on the upperarm).

Keep Reading

Tracking Technostress: A Task Interruption of Data Entry Study

Coauthored with Dr. Randall Minas, University of Hawaii at Manoa and Presented at Human Computer Interaction International 2020

As of writing this, I have yet to conduct the experiment due to COVID-19. I intended to conduct it right after Spring Break, but we never returned. Now I am in the midst of my Dissertation, so will need to balance that and finishing this. Hopefully I can finish this soon. I enjoyed coming up with the experiment and hope it has some lasting impacts for understanding technostress individuals and how interruptions can impact performance.


Abstract. The prevalence of information systems and the resulting increase in continuous notifications have blurred the lines of work and leisure, resulting in increased stress. These changes in the work environment have had detrimental effects on workers ability to sustain attention and remain productive. Despite academic interest in both IT-mediated interruptions and technostress, there has been little research on the juncture of both of these while also utilizing eye tracking. We propose an experimental design on a sampling of undergraduate students in order to study the relationship of IT-mediated interruptions on task performance and the moderating effect of technostress on this relationship. In addition to we will utilize eyetracking (pupillary dilation and gaze duration) to tie the level of
IT-mediated interruptions to cognitive resources in low and high technostress individuals.

Research Model

Link to Paper
Link to Official Site
Link to Presentation (sorry for recording the wrong portion of the screen)

Learning Configurable Joints

Good Day,
I am working on a VR project in Unity and wanted to learn more about Active Ragdoll physics. With this the idea is a character is always able to be affected by gravity and external forces. I found some cool people doing the same (MetalCore999, RedStoneBR and DavidKim). They all use something called configurable joints in unity to achieve this affect. Naturally I wanted to know more, and started looking around. The unity manual has some ok documentation, but not enough to do what we want. Even other pages have some decent additional information, but still not quite what I was looking for. So my purpose is to understand what the different settings do and to capture animations of these changes so I (and perhaps we), can better understand configurable joints as it pertains to active ragdoll.

Getting Started

To get started, we open up a new unity project. I added a plane and extended the scale by setting the values to (10,1,10). I then added a lighter red material to the plane. I added a sphere and added a rigid body and unclicked both use gravity. I kept the mass at 1 and set scale to (.5,.5,.5). This sphere will be our collider to help determine what is happening.

Configurable Joint in Unity empty settings

We then add a cube. I set the scale to (0.5,1,0.5) to better represent an arm. This will be our forearm. In the inspector, add a configurable joint to the cube. It should look like this. There is a lot here and easy to get overwhelmed. So let’s try and understand some more. If we press play game, our cube will fall straight to the ground.

This might be a good time to talk about axes. From the perspective of the cube looking at the camera. The Y axis is up (+) and down (-). The X axis is left (-) and right (+) and the Z axis if forward (+) and back (-). These are important to have a base understanding of. So if we look at our configurable joint, we see X,Y,Z motion and Angular X,Y,Z motion. Since our cube is falling down due to gravity, what happens if we adjust the Y motion from Free to Locked. As you can see below, it stops movement downwards, but if we hit it with a sphere it topples over. This is because it is allowed to rotate (on the Z in this case) and then the X axis gets affected by gravity and its falls down.

Keep Reading

Password Requirement Analysis of 100 Major Internet Sites

This paper is quite a bit old, but was mine and another Cadet’s Senior paper.  I feel like it was pretty adequate, but failed to take the next leap, which was actually come up with suggested standards depending upon information sensitivity.  Interesting enough with the addition of Risk Management Framework in the Department of Defense, Information sensitivity level is one of the key steps to identifying what precautions are necessary.  I still get a kick out of reading the data we gathered at the time, especially like American Express in 2008 required the password to be no more than 8 character, but no less than 6.  It needed one letter and one number, but no spaces or special characters.  It could not be your User ID and it was NOT case sensitive.

Abstract

Many sites have different requirements for the complexity of the password required to login. There is no prescribed industry standard, just site specific recommendations for passwords. This causes specific sites to have inherently weaker passwords than their similar counter-parts. We have created a comparative analysis of one hundred major on-line websites in thirteen sectors that illustrate the disconnect between information sensitivity stored on the site and the minimum password strength used to protect it. Through this comparative analysis, we have created a web application allowing the user to input a password and be able to identify its strength and compare it to the password requirements in the analysis.

Link to Paper

Link to Data

Review: Leader’s Eat Last by Simon Sinek

Leaders Eat LastLeaders Eat Last by Simon Sinek
My rating: 4 of 5 stars

The very first vignette enthralled me as a service member. Showcasing the values in the military and applied to a combat scenario with lives on the line. After that it was very enjoyable.

Leaders eat last comes from the Military custom that the Commander eats after all his Soldiers eat. Make sure your people are taken care of and in turn you will be taken care of. Being a leader is earned…continually.

Sinek uses this baseline to then evaluate why some teams thrive and others don’t. He falls back heavily on the four basic chemicals in all humans and ties most interactions to the rise and fall of these chemicals. Why biologically it makes sense to reward teamwork.

I personally enjoyed his comparison about earning the rewards. He said something to the effect of, no one would bat an eye at someone giving a million dollars to Mother Theresa, but a million dollar payout to a CEO…maybe it wasn’t well earned.

Altogether, I enjoyed this book, more so than Start With Why. A couple vignettes overlap between the two. If you are interested in a leadership book with good examples, I would strongly recommend this one.

View all my reviews

Review: Red Rising

Red Rising (Red Rising, #1)Red Rising by Pierce Brown
My rating: 4 of 5 stars

A quite enjoyable affair. This book reads like a typical dystopian, young adult novel…and it is, but that doesn’t make it any less fun. I finished this rather quickly and part was due to the ease it was to read it, the other being I wanted to know what happened next. The whole premise is all different types of people are put into castes. Reds are the lowest of the low, the janitors, the miners…the slaves. There are those in the middles like Pinks are brothel types and I think it was Green was the Artists. Above them all are the Golds. They are rich and have rich blood. The highest of the Golds are the Peerless, which requires attending and surviving an unknown academy.

This story follows that of Darrow, a young red that is very agile. Stuff happens and he gets launched into this academy as one of the Golds. Obviously he must keep it secret. Obviously he is at ends with his overall goal versus his current needs. This book takes Darrow up and through the academy. The main action is a Roman Gods inspired faction versus faction war. Deaths are sort of allowed, hunger, thirst are ever present and who rises to be the leader in this situation. Obviously Darrow does, but INTRIGUE, backstabbing, lying, are all there. It makes for a fun ride.

I will read the next one, I anticipate it will be a bit more of the same. I wonder if it will bigger (space battles) or smaller (politics scheming) or both? Either way, this book was a very good read and I had a great time.

View all my reviews

Enterprise Use of Security Information and event Management Software

Abstract

This paper will analyze and justify the utilization of a security information and event management (SIEM) software. SIEM software is software that provides real-time monitoring of events, correlation of audit logs and notification of incidents to appropriate personnel. Large enterprises would benefit greatly from procuring SIEM software as it saves resources while researching potential incidents due to the correlation assembled by the SIEM. Conducting all the actions required to respond to an incident or actively monitor possible intrusions would require several full time employees in large organizations. This can be easily accomplished with the right SIEM software. By procuring a SIEM software, although expensive, it is a worthwhile investment in the defense of an enterprise network and fully justifiable if all duties were done manually. In addition, it meets regulatory compliance requirements such as Sarbanes-Oxley, Risk Management Framework or Health Information Accountability and Portability Act. It also assists in the identification and post-incident event management to implement lessons learned.

Link to Paper