12,480 research outputs found

    The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions

    Full text link
    The Metaverse offers a second world beyond reality, where boundaries are non-existent, and possibilities are endless through engagement and immersive experiences using the virtual reality (VR) technology. Many disciplines can benefit from the advancement of the Metaverse when accurately developed, including the fields of technology, gaming, education, art, and culture. Nevertheless, developing the Metaverse environment to its full potential is an ambiguous task that needs proper guidance and directions. Existing surveys on the Metaverse focus only on a specific aspect and discipline of the Metaverse and lack a holistic view of the entire process. To this end, a more holistic, multi-disciplinary, in-depth, and academic and industry-oriented review is required to provide a thorough study of the Metaverse development pipeline. To address these issues, we present in this survey a novel multi-layered pipeline ecosystem composed of (1) the Metaverse computing, networking, communications and hardware infrastructure, (2) environment digitization, and (3) user interactions. For every layer, we discuss the components that detail the steps of its development. Also, for each of these components, we examine the impact of a set of enabling technologies and empowering domains (e.g., Artificial Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on its advancement. In addition, we explain the importance of these technologies to support decentralization, interoperability, user experiences, interactions, and monetization. Our presented study highlights the existing challenges for each component, followed by research directions and potential solutions. To the best of our knowledge, this survey is the most comprehensive and allows users, scholars, and entrepreneurs to get an in-depth understanding of the Metaverse ecosystem to find their opportunities and potentials for contribution

    Economia colaborativa

    Get PDF
    A importância de se proceder à análise dos principais desafios jurídicos que a economia colaborativa coloca – pelas implicações que as mudanças de paradigma dos modelos de negócios e dos sujeitos envolvidos suscitam − é indiscutível, correspondendo à necessidade de se fomentar a segurança jurídica destas práticas, potenciadoras de crescimento económico e bem-estar social. O Centro de Investigação em Justiça e Governação (JusGov) constituiu uma equipa multidisciplinar que, além de juristas, integra investigadores de outras áreas, como a economia e a gestão, dos vários grupos do JusGov – embora com especial participação dos investigadores que integram o grupo E-TEC (Estado, Empresa e Tecnologia) – e de outras prestigiadas instituições nacionais e internacionais, para desenvolver um projeto neste domínio, com o objetivo de identificar os problemas jurídicos que a economia colaborativa suscita e avaliar se já existem soluções para aqueles, refletindo igualmente sobre a conveniência de serem introduzidas alterações ou se será mesmo necessário criar nova regulamentação. O resultado desta investigação é apresentado nesta obra, com o que se pretende fomentar a continuação do debate sobre este tema.Esta obra é financiada por fundos nacionais através da FCT — Fundação para a Ciência e a Tecnologia, I.P., no âmbito do Financiamento UID/05749/202

    Testing the nomological network for the Personal Engagement Model

    Full text link
    The study of employee engagement has been a key focus of management for over three decades. The academic literature on engagement has generated multiple definitions but there are two primary models of engagement: the Personal Engagement Model of Kahn (1990), and the Work Engagement Model (WEM) of Schaufeli et al., (2002). While the former is cited by most authors as the seminal work on engagement, research has tended to focus on elements of the model and most theoretical work on engagement has predominantly used the WEM to consider the topic. The purpose of this study was to test all the elements of the nomological network of the PEM to determine whether the complete model of personal engagement is viable. This was done using data from a large, complex public sector workforce. Survey questions were designed to test each element of the PEM and administered to a sample of the workforce (n = 3,103). The scales were tested and refined using confirmatory factor analysis and then the model was tested determine the structure of the nomological network. This was validated and the generalisability of the final model was tested across different work and organisational types. The results showed that the PEM is viable but there were differences from what was originally proposed by Kahn (1990). Specifically, of the three psychological conditions deemed necessary for engagement to occur, meaningfulness, safety, and availability, only meaningfulness was found to contribute to employee engagement. The model demonstrated that employees experience meaningfulness through both the nature of the work that they do and the organisation within which they do their work. Finally, the findings were replicated across employees in different work types and different organisational types. This thesis makes five contributions to the engagement paradigm. It advances engagement theory by testing the PEM and showing that it is an adequate representation of engagement. A model for testing the causal mechanism for engagement has been articulated, demonstrating that meaningfulness in work is a primary mechanism for engagement. The research has shown the key aspects of the workplace in which employees experience meaningfulness, the nature of the work that they do and the organisation within which they do it. It has demonstrated that this is consistent across organisations and the type of work. Finally, it has developed a reliable measure of the different elements of the PEM which will support future research in this area

    Bayesian networks for disease diagnosis: What are they, who has used them and how?

    Full text link
    A Bayesian network (BN) is a probabilistic graph based on Bayes' theorem, used to show dependencies or cause-and-effect relationships between variables. They are widely applied in diagnostic processes since they allow the incorporation of medical knowledge to the model while expressing uncertainty in terms of probability. This systematic review presents the state of the art in the applications of BNs in medicine in general and in the diagnosis and prognosis of diseases in particular. Indexed articles from the last 40 years were included. The studies generally used the typical measures of diagnostic and prognostic accuracy: sensitivity, specificity, accuracy, precision, and the area under the ROC curve. Overall, we found that disease diagnosis and prognosis based on BNs can be successfully used to model complex medical problems that require reasoning under conditions of uncertainty.Comment: 22 pages, 5 figures, 1 table, Student PhD first pape

    Technical Dimensions of Programming Systems

    Get PDF
    Programming requires much more than just writing code in a programming language. It is usually done in the context of a stateful environment, by interacting with a system through a graphical user interface. Yet, this wide space of possibilities lacks a common structure for navigation. Work on programming systems fails to form a coherent body of research, making it hard to improve on past work and advance the state of the art. In computer science, much has been said and done to allow comparison of programming languages, yet no similar theory exists for programming systems; we believe that programming systems deserve a theory too. We present a framework of technical dimensions which capture the underlying characteristics of programming systems and provide a means for conceptualizing and comparing them. We identify technical dimensions by examining past influential programming systems and reviewing their design principles, technical capabilities, and styles of user interaction. Technical dimensions capture characteristics that may be studied, compared and advanced independently. This makes it possible to talk about programming systems in a way that can be shared and constructively debated rather than relying solely on personal impressions. Our framework is derived using a qualitative analysis of past programming systems. We outline two concrete ways of using our framework. First, we show how it can analyze a recently developed novel programming system. Then, we use it to identify an interesting unexplored point in the design space of programming systems. Much research effort focuses on building programming systems that are easier to use, accessible to non-experts, moldable and/or powerful, but such efforts are disconnected. They are informal, guided by the personal vision of their authors and thus are only evaluable and comparable on the basis of individual experience using them. By providing foundations for more systematic research, we can help programming systems researchers to stand, at last, on the shoulders of giants

    How to Be a God

    Get PDF
    When it comes to questions concerning the nature of Reality, Philosophers and Theologians have the answers. Philosophers have the answers that can’t be proven right. Theologians have the answers that can’t be proven wrong. Today’s designers of Massively-Multiplayer Online Role-Playing Games create realities for a living. They can’t spend centuries mulling over the issues: they have to face them head-on. Their practical experiences can indicate which theoretical proposals actually work in practice. That’s today’s designers. Tomorrow’s will have a whole new set of questions to answer. The designers of virtual worlds are the literal gods of those realities. Suppose Artificial Intelligence comes through and allows us to create non-player characters as smart as us. What are our responsibilities as gods? How should we, as gods, conduct ourselves? How should we be gods

    Interactive Sonic Environments: Sonic artwork via gameplay experience

    Get PDF
    The purpose of this study is to investigate the use of video-game technology in the design and implementation of interactive sonic centric artworks, the purpose of which is to create and contribute to the discourse and understanding of its effectiveness in electro-acoustic composition highlighting the creative process. Key research questions include: How can the language of electro-acoustic music be placed in a new framework derived from videogame aesthetics and technology? What new creative processes need to be considered when using this medium? Moreover, what aspects of 'play' should be considered when designing the systems? The findings of this study assert that composers and sonic art practitioners need little or no coding knowledge to create exciting applications and the myriad of options available to the composer when using video-game technology is limited only by imagination. Through a cyclic process of planning, building, testing and playing these applications the project revealed advantages and unique sonic opportunities in comparison to other sonic art installations. A portfolio of selected original compositions, both fixed and open are presented by the author to complement this study. The commentary serves to place the work in context with other practitioners in the field and to provide compositional approaches that have been taken

    Vulnerability, decision-making and the protection of prisoners in Scotland and England

    Get PDF
    Vulnerable and protection prisoners currently make up a sizeable proportion of the prison populations in England and Scotland, and designated physical space to house them, an approach that has developed significantly in both countries since the 1960s, remains under studied. Within research on prisons, vulnerability has been predominantly associated with risks to the self, for example, mental health problems, self-harm and suicide, internal vulnerabilities that prisoners either bring into an establishment or which are a consequence of the stressors of prison life. This literature further tends to focus on certain categories of prisoner, namely those who have committed sexual crimes. This framing of vulnerability in prison means academic research typically studies vulnerability as a settled status, and there has been a move away from exploring meanings, experiences and determinations of vulnerability as these arise and change at different points of a person’s journey through prison. This study addresses these gaps by sharing the perspectives directly from those at risk of victimization in prison as well as from those in charge of deciding who will get protection from risks. The focus is on prisoner and staff decisions to relocate to protective housing (vulnerable prisoner units (VPU) in England and protection halls in Scotland). This research utilised qualitative methods, interviewing staff (13) involved in designating or managing vulnerability in prison as well as prisoners (23) who had been identified as needing protective housing. The research was conducted in one prison in England and two prisons in Scotland. It highlights the significant levels of victimization, trauma and fear experienced by prisoner research participants, and in doing so complicates prevailing ideas of vulnerability in prison. The findings chapters show: staff perspectives on what counts as a valid basis of vulnerability and therefore how it is managed and to some extent rationed (Chapter 5); the importance of journeys into and through prisons which shape and intensify experiences of vulnerability (Chapter 6); the perspectives of prisoners housed in a VPU in England which reinforced the idea that vulnerability is fluid and that there are some common factors affecting decisions to relocate from mainstream wings, but ultimately each decision is situated in the personal circumstances of an individual (Chapter 7); the perspectives of prisoners housed in protection halls in Scotland highlighting the factors that influence decisions to seek out or resist protective accommodation where, like England, common factors influenced decisions but were situated in highly individual circumstances (Chapter 8), and how these feelings were managed. The conclusion (Chapter 9) summarises key findings and calls for a sociology of the vulnerable prisoner (building on a conceptualisation of vulnerability in Chapter 3) to understand not only how they navigate risk from others and the prison itself, but how they make sense of their newly acquired yet further stigmatized identity. Finally, it sets out some implications and suggestions for policy based on its new contribution to a sociology of vulnerability
    • …
    corecore