Advertisement

Analyzing and Predicting Player Performance in a Quantum Cryptography Serious Game

  • Dilanga Abeyrathna
  • Srikanth Vadla
  • Vidya Bommanapally
  • Mahadevan Subramaniam
  • Parvathi ChundiEmail author
  • Abhishek Parakh
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11385)

Abstract

An adaptive 3D serious game, QuaSim for imparting to learners the fundamental concepts of quantum cryptography and their applications in designing computer security protocols is described. QuaSim emulates an often used instructional model of practice exercises followed by timed-tests (practice-timed-test) in a serious game setting by automatically designing timed-tests guided by models learned from data about the performance of players in practice exercises. QuaSim also automatically selects next practice exercises based on player performance in previous exercises. The game was played by 150 students and the results are highly encouraging. They show that the model learned by the game is able to select next practice exercises to improve player performance in the timed tests and is able to generate meaningful timed-tests.

References

  1. 1.
    Arnab, S., et al.: Mapping learning and game mechanics for serious games analysis. Br. J. Edu. Technol. 46(2), 391–411 (2015)CrossRefGoogle Scholar
  2. 2.
    Benjamin, S.C., Hayden, P.M.: Multiplayer quantum games. Phys. Rev. A 64(3), 030301 (2001)CrossRefGoogle Scholar
  3. 3.
    Bommanapally, V., Subramaniam, M., Chundi, P.: Navigation hints in serious games. In: Beck, D., et al. (eds.) Online Proceedings from Fourth Immersive Learning Research Network Conference, Technischen Universitat Graz, Missoula, Montana (2018)Google Scholar
  4. 4.
    Boopathi, K., Sreejith, S., Bithin, A.: Learning cyber security through gamification. Indian J. Sci. Technol. 8(7), 642–649 (2015)CrossRefGoogle Scholar
  5. 5.
    Cone, B.D., Irvine, C.E., Thompson, M.F., Nguyen, T.D.: A video game for cybersecurity training and awareness. Comput. Secur. 26(1), 63–72 (2007)CrossRefGoogle Scholar
  6. 6.
    Cone, B.D., Thompson, M.F., Irvine, C.E., Nguyen, T.D.: Cyber security training and awareness through game play. In: Fischer-Hübner, S., Rannenberg, K., Yngström, L., Lindskog, S. (eds.) SEC 2006. IIFIP, vol. 201, pp. 431–436. Springer, Boston, MA (2006).  https://doi.org/10.1007/0-387-33406-8_37CrossRefGoogle Scholar
  7. 7.
    Dicheva, D., Dichev, C., Agre, G., Angelova, G.: Gamification in education: a systematic mapping study. J. Educ. Technol. Soc. 18(3), 75–88 (2015)Google Scholar
  8. 8.
    Frutos-Pascual, M., Zapirain, B.G.: Review of the use of AI techniques in serious games: decision making and machine learning. IEEE Trans. Comput. Intell. AI Games 9(2), 133–152 (2017)CrossRefGoogle Scholar
  9. 9.
    Gibaja, E., Ventura, S.: A tutorial on multilabel learning. ACM Comput. Surv. (CSUR) 47(3), 52 (2015)CrossRefGoogle Scholar
  10. 10.
    Hall, G.: Pearsons correlation coefficient. Other Words 1(9) (2015)Google Scholar
  11. 11.
    Labuschagne, W., Veerasamy, N., Burke, I., Eloff, M.: Design of cyber security awareness game utilizing a social media framework. In: Information Security South Africa (ISSA), pp. 1–9. IEEE (2011)Google Scholar
  12. 12.
    Situ, H.: A quantum approach to play asymmetric coordination games. Quantum Inf. Process. 13(3), 591–599 (2014)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Smith, K., Shull, J., Shen, Y., Dean, A., Michaeli, J.: Overcoming challenges in educational stem game design and development. In: 2017 Winter Simulation Conference (WSC), pp. 849–859. IEEE (2017)Google Scholar
  14. 14.
    Tsoumakas, G., Katakis, I.: Multi-label classification: an overview. Int. J. Data Warehouse. Min. (IJDWM) 3(3), 1–13 (2007)CrossRefGoogle Scholar
  15. 15.
    Tsoumakas, G., Vlahavas, I.: Random k-labelsets: an ensemble method for multilabel classification. In: Kok, J.N., Koronacki, J., de Mantaras, R.L., Matwin, S., Mladenič, D., Skowron, A. (eds.) ECML 2007. LNCS (LNAI), vol. 4701, pp. 406–417. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-74958-5_38CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Dilanga Abeyrathna
    • 1
  • Srikanth Vadla
    • 1
  • Vidya Bommanapally
    • 1
  • Mahadevan Subramaniam
    • 1
  • Parvathi Chundi
    • 1
    Email author
  • Abhishek Parakh
    • 1
  1. 1.Computer Science DepartmentUniversity of NebraskaOmahaUSA

Personalised recommendations