Scene art design based on human-computer interaction and multimedia information system: an interactive perspective

  • Wei Liang


With the concept of the information superhighway being proposed, the educational model with the aid of information technology has developed rapidly. This paper uses constructivist learning theory to construct a new teaching model, including innovative teaching content and methods of change. Realizing the development of educational informatization and meeting the challenges brought by the information society to education has become an inevitable trend of today’s education. The development and innovation of emerging technologies has become the main references in the field of teaching to help learners set up effective self-learning methods and develop the ability to continuously update knowledge. As a second-generation Web language, this article introduces VRML as a methodology. Combined with the characteristics of actual cases, this paper analyzes the application of VRML in virtual teaching environment and gives a concrete implementation method. In view of the application of virtual reality modeling language (VRML) in online teaching, this paper summarizes and analyzes the functions, basic features and development direction of VRML. This paper explores the basic theory of CAI and the principles of network teaching. We divide the online teaching mode based on VRML into two application methods and propose a network teaching mode based on VRML.


VRML Virtual environment Assistant Computer teaching System Construction 



  1. 1.
    Akbarov, S.D.; Yahnioglu, N.; Karatas, E.E. 3D FEM analysis of the buckling delamination of a rectangular viscoelastic composite plate with an embedded rectangular crack under two-axial compression. Computers, Materials and Continua, v 30, n 1, p 1–18, 2012Google Scholar
  2. 2.
    Atalay HA, Canat HL, Ülker V, Alkan İ, Özkuvanci Ü, Altunrende F (2017) Impact of personalized three-dimensional (3D) printed pelvicalyceal system models on patient information in percutaneous nephrolithotripsy surgery: a pilot study. International braz j urol 43(3):470–475CrossRefGoogle Scholar
  3. 3.
    Brusilovsky P, Oh JS, López C, Parra D, Jeng W (2017) Linking information and people in a social system for academic conferences. New Review of Hypermedia and Multimedia 23(2):81–111CrossRefGoogle Scholar
  4. 4.
    Claesson A, Bäckman A, Ringh M, Svensson L, Nordberg P, Djärv T, Hollenberg J (2017) Time to delivery of an automated external defibrillator using a drone for simulated out-of-hospital cardiac arrests vs emergency medical services. Jama 317(22):2332–2334CrossRefGoogle Scholar
  5. 5.
    Datta D, Varma S, Singh SK (2017) Multimodal retrieval using mutual information based textual query reformulation. Expert Syst Appl 68:81–92CrossRefGoogle Scholar
  6. 6.
    Francalanci C, Guglielmino P, Montalcini M, Scalia G and Pernici B (2017). IMEXT: A method and system to extract geolocated images from Tweets-Analysis of a case study. In IEEE Conference on Research Challenges in Information Systems (RCIS'17) (pp. 1–9). IEEEGoogle Scholar
  7. 7.
    Li X, Lv Z, Zheng Z, Zhong C, Hijazi IH, Cheng S (2017) Assessment of lively street network based on geographic information system and space syntax. Multimedia Tools and Applications 76(17):17801–17819CrossRefGoogle Scholar
  8. 8.
    Li Y, Gai K, Qiu M, Dai W, Liu M (2017) Adaptive human detection approach using FPGA-based parallel architecture in reconfigurable hardware. Concurrency and Computation: Practice and Experience 29(14):e3923CrossRefGoogle Scholar
  9. 9.
    Li T, Xie N, Zeng C, Zhou W, Zheng L, Jiang Y, Yang Y, Ha HY, Xue W, Huang Y, Chen SC (2017) Data-driven techniques in disaster information management. ACM Computing Surveys (CSUR) 50(1):1CrossRefGoogle Scholar
  10. 10.
    Niyat AY, Moattar MH, Torshiz MN (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225–237CrossRefGoogle Scholar
  11. 11.
    Pankow, M.; Waas, A.M.; Yen, C.F. Modeling the response of 3D textile composites under compressive loads to predict compressive strength. Computers, Materials and Continua, v 32, n 2, p 81–106, 2012Google Scholar
  12. 12.
    Park N, Lee D (2018) Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment. Pers Ubiquit Comput 22(1):3–10CrossRefGoogle Scholar
  13. 13.
    Rossetto L, Giangreco I, Tănase C, Schuldt H, Dupont S and Seddati O, (2017). Enhanced retrieval and browsing in the IMOTION system. In International Conference on Multimedia Modeling (pp. 469–474). Springer, ChamGoogle Scholar
  14. 14.
    Swamy MS (2017). Energy-Efficient Geographical Multi-path Routing Protocol with Adaptive Load Balancing for Wireless Multimedia Sensor Networks. Jour of Adv Research in Dynamical & Control Systems, 9(9)Google Scholar
  15. 15.
    Tang, Zhenjun; Ling, Man; Yao, Heng; Qian, Zhenxing; Zhang, Xianquan; Zhang, Jilian; Xu, Shijie. Robust image hashing via random gabor filtering and DWT. Computers, Materials and Continua, v 55, n 2, p 331–344, 2018Google Scholar
  16. 16.
    Varatharajan R, Manogaran G, Priyan MK (2018) A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimedia Tools and Applications 77(8):10195–10215CrossRefGoogle Scholar
  17. 17.
    Wiseman Y (2017) Computerized traffic congestion detection system. International Journal of Transportation and Logistics Management 1(1):1–8Google Scholar
  18. 18.
    Yang J, He S, Lin Y, Lv Z (2017) Multimedia cloud transmission and storage system based on internet of things. Multimedia Tools and Applications 76(17):17735–17750CrossRefGoogle Scholar
  19. 19.
    Yin C, Wang J, Park JH (2017) An Improved Recommendation Algorithm for Big data Cloud Service based on the Trust in Sociology, Neurocomputing, online, March 2017,
  20. 20.
    Yun S, Gaobo Y, Hongtao X, Dengyong Z (2017) Residual domain dictionary learning for compressed sensing video recovery. Multimedia Tools and Applications 76(7):10083–10096CrossRefGoogle Scholar
  21. 21.
    Zhu J, Jiang D, Ba S, Zhang Y (2017) A game-theoretic power control mechanism based on hidden Markov model in cognitive wireless sensor network with imperfect information. Neurocomputing 220:76–83CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.College of Arts and MediaNingbo Dahongying UniversityNingboChina

Personalised recommendations