15,080 research outputs found

    The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions

    Full text link
    The Metaverse offers a second world beyond reality, where boundaries are non-existent, and possibilities are endless through engagement and immersive experiences using the virtual reality (VR) technology. Many disciplines can benefit from the advancement of the Metaverse when accurately developed, including the fields of technology, gaming, education, art, and culture. Nevertheless, developing the Metaverse environment to its full potential is an ambiguous task that needs proper guidance and directions. Existing surveys on the Metaverse focus only on a specific aspect and discipline of the Metaverse and lack a holistic view of the entire process. To this end, a more holistic, multi-disciplinary, in-depth, and academic and industry-oriented review is required to provide a thorough study of the Metaverse development pipeline. To address these issues, we present in this survey a novel multi-layered pipeline ecosystem composed of (1) the Metaverse computing, networking, communications and hardware infrastructure, (2) environment digitization, and (3) user interactions. For every layer, we discuss the components that detail the steps of its development. Also, for each of these components, we examine the impact of a set of enabling technologies and empowering domains (e.g., Artificial Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on its advancement. In addition, we explain the importance of these technologies to support decentralization, interoperability, user experiences, interactions, and monetization. Our presented study highlights the existing challenges for each component, followed by research directions and potential solutions. To the best of our knowledge, this survey is the most comprehensive and allows users, scholars, and entrepreneurs to get an in-depth understanding of the Metaverse ecosystem to find their opportunities and potentials for contribution

    Startup Home-Based Social Media Businesses

    Get PDF
    Purpose: The objective of this study is to investigate and analyze issues faced by small-business owners while running their businesses via social media sites, and to emphasize the opportunities for conducting business via social media.   Theoretical framework:  Small businesses are vital to the success of any economy, through job creation, sparking innovation, and providing opportunities for many people to achieve financial success and independence. In today’s social media-driven environment, it is essential that small business’ owners engage with social media networking sites and understand how social media can play a crucial role in developing their businesses.   Design/methodology/approach: The research focuses on analyzing the day-to-day operations and procedures of small businesses involving social media networking sites. Two questionnaires were developed to analyze and investigate these issues effectively.   Findings:  The results reveal the importance of organizing the operations and procedures of social media businesses, also emphasize the opportunities for conducting business via social media sites.   Research, Practical & Social implications:  this study was conducted to help business owners to engage with social media sites, as well as to solve issues that they face while running their online businesses.   Originality/value: The results of the first questionnaire indicate issues from customers’ perspectives, while the second questionnaire indicate issues from merchants’ perspectives. The results reveal the importance of organizing the operations and procedures of social media businesses, also emphasize the opportunities for conducting business via social media sites

    The Viability and Potential Consequences of IoT-Based Ransomware

    Get PDF
    With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested. As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed. For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim. Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research

    The developing maternal-infant relationship: a qualitative longitudinal study

    Get PDF
    Aim The study aimed to explore maternal perceptions and the use of knowledge relating to their infant’s mental health over time using qualitative longitudinal research. Background There has been a growing interest in infant mental health over recent years. Much of this interest is directed through the lens of infant determinism, through knowledge regarding neurological development resulting in biological determinism. Research and policy in this field are directed toward individual parenting behaviours, usually focused on the mother. Despite this, there is little attention given to maternal perspectives of infant mental health, indicating that a more innovative approach to methodology is required. Methods This study took a qualitative longitudinal approach, and interviews were undertaken with seven mothers from the third trimester of pregnancy and then throughout the first year of the infant’s life. Interviews were conducted at 34 weeks of pregnancy, and then when the infant was 6 and 12 weeks, 6, 9, and 12 months, alongside the collection of researcher field notes—a total of 41 interviews. Data were analysed by creating case profiles, memos, and summaries, and then cross-comparison of the emerging narratives. A psycho-socially informed approach was taken to the analysis of data. Findings Three interrelated themes emerged from the data: evolving maternal identity, growing a person, and creating a safe space. The theme of evolving maternal identity dominated the other themes of growing a person and creating a safe space in a way that met perceived socio-cultural requirements for mothering and childcare practices. Participants’ personal stories give voice to their perceptions of the developing maternal-infant relationship in the context of their socio-cultural setting, relationships with others, and experiences over time. Conclusions This study adds new knowledge by giving mothers a voice to express how the maternal-infant relationship develops over time. The findings demonstrate how the developing maternal-infant relationship grows in response to their mutual needs as the mother works to create and sustain identities for herself and the infant that will fit within their socio-cultural context and individual situations. Additionally, the findings illustrate the importance of temporal considerations, social networks, and intergenerational relationships to this evolving process. Recommendations for practice, policy, and education are made that reflect the unique relationship between mother and infant and the need to conceptualise this using an ecological approach

    TOWARDS AN UNDERSTANDING OF EFFORTFUL FUNDRAISING EXPERIENCES: USING INTERPRETATIVE PHENOMENOLOGICAL ANALYSIS IN FUNDRAISING RESEARCH

    Get PDF
    Physical-activity oriented community fundraising has experienced an exponential growth in popularity over the past 15 years. The aim of this study was to explore the value of effortful fundraising experiences, from the point of view of participants, and explore the impact that these experiences have on people’s lives. This study used an IPA approach to interview 23 individuals, recognising the role of participants as proxy (nonprofessional) fundraisers for charitable organisations, and the unique organisation donor dynamic that this creates. It also bought together relevant psychological theory related to physical activity fundraising experiences (through a narrative literature review) and used primary interview data to substantiate these. Effortful fundraising experiences are examined in detail to understand their significance to participants, and how such experiences influence their connection with a charity or cause. This was done with an idiographic focus at first, before examining convergences and divergences across the sample. This study found that effortful fundraising experiences can have a profound positive impact upon community fundraisers in both the short and the long term. Additionally, it found that these experiences can be opportunities for charitable organisations to create lasting meaningful relationships with participants, and foster mutually beneficial lifetime relationships with them. Further research is needed to test specific psychological theory in this context, including self-esteem theory, self determination theory, and the martyrdom effect (among others)

    RELATIONSHIP BETWEEN BODY-SEAT INTERFACE PRESSURE AND DISCOMFORT DURING ROWING

    Get PDF
    Discomfort and pressure-related tissue injury to the buttocks are common complaints among rowers. The soft tissues of the buttocks are non-uniformly loaded during rowing. The current state of literature on seating discomfort is inconclusive as to a desirable body-seat interface pressure pattern. The purpose of this study was to determine whether localising pressure under bony protuberances or diffusing pressure over soft tissues would result in the least amount of discomfort. Force sensing arrays were used to measure body-seat interface pressures in 11 elite female rowers during rowing. Peak pressure measures were identified and pressure gradients were calculated. Discomfort was quantified using a questionnaire, and pressure data were then correlated with discomfort scores.Discomfort was weakly correlated with each of maximal pressure gradient (r=0.45) and peak pressure (r=0.43). The findings indicate pressure should be redistributed in order to avoid concentrating pressure under the bony protuberances o f the buttocks

    A productive response to legacy system petrification

    Get PDF
    Requirements change. The requirements of a legacy information system change, often in unanticipated ways, and at a more rapid pace than the rate at which the information system itself can be evolved to support them. The capabilities of a legacy system progressively fall further and further behind their evolving requirements, in a degrading process termed petrification. As systems petrify, they deliver diminishing business value, hamper business effectiveness, and drain organisational resources. To address legacy systems, the first challenge is to understand how to shed their resistance to tracking requirements change. The second challenge is to ensure that a newly adaptable system never again petrifies into a change resistant legacy system. This thesis addresses both challenges. The approach outlined herein is underpinned by an agile migration process - termed Productive Migration - that homes in upon the specific causes of petrification within each particular legacy system and provides guidance upon how to address them. That guidance comes in part from a personalised catalogue of petrifying patterns, which capture recurring themes underlying petrification. These steer us to the problems actually present in a given legacy system, and lead us to suitable antidote productive patterns via which we can deal with those problems one by one. To prevent newly adaptable systems from again degrading into legacy systems, we appeal to a follow-on process, termed Productive Evolution, which embraces and keeps pace with change rather than resisting and falling behind it. Productive Evolution teaches us to be vigilant against signs of system petrification and helps us to nip them in the bud. The aim is to nurture systems that remain supportive of the business, that are adaptable in step with ongoing requirements change, and that continue to retain their value as significant business assets

    Response of saline reservoir to different phaseCOâ‚‚-brine: experimental tests and image-based modelling

    Get PDF
    Geological CO₂ storage in saline rocks is a promising method for meeting the target of net zero emission and minimizing the anthropogenic CO₂ emitted into the earth’s atmosphere. Storage of CO₂ in saline rocks triggers CO₂-brine-rock interaction that alters the properties of the rock. Properties of rocks are very crucial for the integrity and efficiency of the storage process. Changes in properties of the reservoir rocks due to CO₂-brine-rock interaction must be well predicted, as some changes can reduce the storage integrity of the reservoir. Considering the thermodynamics, phase behavior, solubility of CO₂ in brine, and the variable pressure-temperature conditions of the reservoir, there will be undissolved CO₂ in a CO₂ storage reservoir alongside the brine for a long time, and there is a potential for phase evolution of the undissolved CO₂. The phase of CO₂ influence the CO₂-brine-rock interaction, different phaseCO₂-brine have a unique effect on the properties of the reservoir rocks, Therefore, this study evaluates the effect of four different phaseCO₂-brine reservoir states on the properties of reservoir rocks using experimental and image-based approach. Samples were saturated with the different phaseCO₂-brine, then subjected to reservoir conditions in a triaxial compression test. The representative element volume (REV)/representative element area (REA) for the rock samples was determined from processed digital images, and rock properties were evaluated using digital rock physics and rock image analysis techniques. This research has evaluated the effect of different phaseCO₂-brine on deformation rate and deformation behavior, bulk modulus, compressibility, strength, and stiffness as well as porosity and permeability of sample reservoir rocks. Changes in pore geometry properties, porosity, and permeability of the rocks in CO₂ storage conditions with different phaseCO₂-brine have been evaluated using digital rock physics techniques. Microscopic rock image analysis has been applied to provide evidence of changes in micro-fabric, the topology of minerals, and elemental composition of minerals in saline rocks resulting from different phaseCO₂-br that can exist in a saline CO₂ storage reservoir. It was seen that the properties of the reservoir that are most affected by the scCO₂-br state of the reservoir include secondary fatigue rate, bulk modulus, shear strength, change in the topology of minerals after saturation as well as change in shape and flatness of pore surfaces. The properties of the reservoir that is most affected by the gCO₂-br state of the reservoir include primary fatigue rate, change in permeability due to stress, change in porosity due to stress, and change topology of minerals due to stress. For all samples, the roundness and smoothness of grains as well as smoothness of pores increased after compression while the roundness of pores decreased. Change in elemental composition in rock minerals in CO₂-brine-rock interaction was seen to depend on the reactivity of the mineral with CO₂ and/or brine and the presence of brine accelerates such change. Carbon, oxygen, and silicon can be used as index minerals for elemental changes in a CO₂-brine-rock system. The result of this work can be applied to predicting the effect the different possible phases of CO₂ will have on the deformation, geomechanics indices, and storage integrity of giant CO₂ storage fields such as Sleipner, In Salah, etc

    Interactive Sonic Environments: Sonic artwork via gameplay experience

    Get PDF
    The purpose of this study is to investigate the use of video-game technology in the design and implementation of interactive sonic centric artworks, the purpose of which is to create and contribute to the discourse and understanding of its effectiveness in electro-acoustic composition highlighting the creative process. Key research questions include: How can the language of electro-acoustic music be placed in a new framework derived from videogame aesthetics and technology? What new creative processes need to be considered when using this medium? Moreover, what aspects of 'play' should be considered when designing the systems? The findings of this study assert that composers and sonic art practitioners need little or no coding knowledge to create exciting applications and the myriad of options available to the composer when using video-game technology is limited only by imagination. Through a cyclic process of planning, building, testing and playing these applications the project revealed advantages and unique sonic opportunities in comparison to other sonic art installations. A portfolio of selected original compositions, both fixed and open are presented by the author to complement this study. The commentary serves to place the work in context with other practitioners in the field and to provide compositional approaches that have been taken
    • …
    corecore