17,049 research outputs found

    Security and Privacy Problems in Voice Assistant Applications: A Survey

    Full text link
    Voice assistant applications have become omniscient nowadays. Two models that provide the two most important functions for real-life applications (i.e., Google Home, Amazon Alexa, Siri, etc.) are Automatic Speech Recognition (ASR) models and Speaker Identification (SI) models. According to recent studies, security and privacy threats have also emerged with the rapid development of the Internet of Things (IoT). The security issues researched include attack techniques toward machine learning models and other hardware components widely used in voice assistant applications. The privacy issues include technical-wise information stealing and policy-wise privacy breaches. The voice assistant application takes a steadily growing market share every year, but their privacy and security issues never stopped causing huge economic losses and endangering users' personal sensitive information. Thus, it is important to have a comprehensive survey to outline the categorization of the current research regarding the security and privacy problems of voice assistant applications. This paper concludes and assesses five kinds of security attacks and three types of privacy threats in the papers published in the top-tier conferences of cyber security and voice domain.Comment: 5 figure

    The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions

    Full text link
    The Metaverse offers a second world beyond reality, where boundaries are non-existent, and possibilities are endless through engagement and immersive experiences using the virtual reality (VR) technology. Many disciplines can benefit from the advancement of the Metaverse when accurately developed, including the fields of technology, gaming, education, art, and culture. Nevertheless, developing the Metaverse environment to its full potential is an ambiguous task that needs proper guidance and directions. Existing surveys on the Metaverse focus only on a specific aspect and discipline of the Metaverse and lack a holistic view of the entire process. To this end, a more holistic, multi-disciplinary, in-depth, and academic and industry-oriented review is required to provide a thorough study of the Metaverse development pipeline. To address these issues, we present in this survey a novel multi-layered pipeline ecosystem composed of (1) the Metaverse computing, networking, communications and hardware infrastructure, (2) environment digitization, and (3) user interactions. For every layer, we discuss the components that detail the steps of its development. Also, for each of these components, we examine the impact of a set of enabling technologies and empowering domains (e.g., Artificial Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on its advancement. In addition, we explain the importance of these technologies to support decentralization, interoperability, user experiences, interactions, and monetization. Our presented study highlights the existing challenges for each component, followed by research directions and potential solutions. To the best of our knowledge, this survey is the most comprehensive and allows users, scholars, and entrepreneurs to get an in-depth understanding of the Metaverse ecosystem to find their opportunities and potentials for contribution

    Strategies for Early Learners

    Get PDF
    Welcome to learning about how to effectively plan curriculum for young children. This textbook will address: • Developing curriculum through the planning cycle • Theories that inform what we know about how children learn and the best ways for teachers to support learning • The three components of developmentally appropriate practice • Importance and value of play and intentional teaching • Different models of curriculum • Process of lesson planning (documenting planned experiences for children) • Physical, temporal, and social environments that set the stage for children’s learning • Appropriate guidance techniques to support children’s behaviors as the self-regulation abilities mature. • Planning for preschool-aged children in specific domains including o Physical development o Language and literacy o Math o Science o Creative (the visual and performing arts) o Diversity (social science and history) o Health and safety • Making children’s learning visible through documentation and assessmenthttps://scholar.utc.edu/open-textbooks/1001/thumbnail.jp

    On the Mechanism of Building Core Competencies: a Study of Chinese Multinational Port Enterprises

    Get PDF
    This study aims to explore how Chinese multinational port enterprises (MNPEs) build their core competencies. Core competencies are firms’special capabilities and sources to gain sustainable competitive advantage (SCA) in marketplace, and the concept led to extensive research and debates. However, few studies include inquiries about the mechanisms of building core competencies in the context of Chinese MNPEs. Accordingly, answers were sought to three research questions: 1. What are the core competencies of the Chinese MNPEs? 2. What are the mechanisms that the Chinese MNPEs use to build their core competencies? 3. What are the paths that the Chinese MNPEs pursue to build their resources bases? The study adopted a multiple-case study design, focusing on building mechanism of core competencies with RBV. It selected purposively five Chinese leading MNPEs and three industry associations as Case Companies. The study revealed three main findings. First, it identified three generic core competencies possessed by Case Companies, i.e., innovation in business models and operations, utilisation of technologies, and acquisition of strategic resources. Second, it developed the conceptual framework of the Mechanism of Building Core Competencies (MBCC), which is a process of change of collective learning in effective and efficient utilization of resources of a firm in response to critical events. Third, it proposed three paths to build core competencies, i.e., enhancing collective learning, selecting sustainable processes, and building resource base. The study contributes to the knowledge of core competencies and RBV in three ways: (1) presenting three generic core competencies of the Chinese MNPEs, (2) proposing a new conceptual framework to explain how Chinese MNPEs build their core competencies, (3) suggesting a solid anchor point (MBCC) to explain the links among resources, core competencies, and SCA. The findings set benchmarks for Chinese logistics industry and provide guidelines to build core competencies

    Metaphors of London fog, smoke and mist in Victorian and Edwardian Art and Literature

    Get PDF
    Julian Wolfreys has argued that after 1850 writers employed stock images of the city without allowing them to transform their texts. This thesis argues, on the contrary, that metaphorical uses of London fog were complex and subtle during the Victorian and Edwardian periods, at least until 1914. Fog represented, in particular, formlessness and the dissolution of boundaries. Examining the idea of fog in literature, verse, newspaper accounts and journal articles, as well as in the visual arts, as part of a common discourse about London and the state of its inhabitants, this thesis charts how the metaphorical appropriation of this idea changed over time. Four of Dickens's novels are used to track his use of fog as part of a discourse of the natural and unnatural in individual and society, identifying it with London in progressively more negative terms. Visual representations of fog by Constable, Turner, Whistler, Monet, Markino, O'Connor, Roberts and Wyllie and Coburn showed an increasing readiness to engage with this discourse. Social tensions in the city in the 1880s were articulated in art as well as in fiction. Authors like Hay and Barr showed the destruction of London by its fog because of its inhabitants' supposed degeneracy. As the social threat receded, apocalyptic scenarios gave way to a more optimistic view in the work of Owen and others. Henry James used fog as a metaphorical representation of the boundaries of gendered behaviour in public, and the problems faced by women who crossed them. The dissertation also examines fog and individual transgression, in novels and short stories by Lowndes, Stevenson, Conan Doyle and Joseph Conrad. After 1914, fog was no more than a crude signifier of Victorian London in literature, film and, later, television, deployed as a cliche instead of the subtle metaphorical idea discussed in this thesis

    Sensors and Methods for Railway Signalling Equipment Monitoring

    Get PDF
    Signalling upgrade projects that have been installed in equipment rooms in the recent past have limited capability to monitor performance of certain types of external circuits. To modify the equipment rooms on the commissioned railway would prove very expensive to implement and would be unacceptable in terms of delays caused to passenger services due to re-commissioning circuits after modification, to comply with rail signalling standards. The use of magnetoresistive sensors to provide performance data on point circuit operation and point operation is investigated. The sensors are bench tested on their ability to measure current in a circuit in a non-intrusive manner. The effect of shielding on the sensor performance is tested and found to be significant. The response of the sensors with various levels of amplification produces linear responses across a range of circuit gain. The output of the sensor circuit is demonstrated for various periods of interruption of conductor current. A three-axis accelerometer is mounted on a linear actuator to demonstrate the type of output expected from similar sensors mounted on a set of points. Measurements of current in point detection circuits and acceleration forces resulting from vibration of out of tolerance mechanical assemblies can provide valuable information on performance and possible threats to safe operation of equipment. The sensors seem capable of measuring the current in a conductor with a comparatively high degree of sensitivity. There is development work required on shielding the sensor from magnetic fields other than those being measured. The accelerometer work is at a demonstration level and requires development. The future testing work with accelerometers should be at a facility where multiple point moves can be made; with the capability to introduce faults to the point mechanisms. Methods can then be developed for analysis of the vibration signatures produced by the various faults

    Statistical Learning for Gene Expression Biomarker Detection in Neurodegenerative Diseases

    Get PDF
    In this work, statistical learning approaches are used to detect biomarkers for neurodegenerative diseases (NDs). NDs are becoming increasingly prevalent as populations age, making understanding of disease and identification of biomarkers progressively important for facilitating early diagnosis and the screening of individuals for clinical trials. Advancements in gene expression profiling has enabled the exploration of disease biomarkers at an unprecedented scale. The work presented here demonstrates the value of gene expression data in understanding the underlying processes and detection of biomarkers of NDs. The value of novel approaches to previously collected -omics data is shown and it is demonstrated that new therapeutic targets can be identified. Additionally, the importance of meta-analysis to improve power of multiple small studies is demonstrated. The value of blood transcriptomics data is shown in applications to researching NDs to understand underlying processes using network analysis and a novel hub detection method. Finally, after demonstrating the value of blood gene expression data for investigating NDs, a combination of feature selection and classification algorithms were used to identify novel accurate biomarker signatures for the diagnosis and prognosis of Parkinson’s disease (PD) and Alzheimer’s disease (AD). Additionally, the use of feature pools based on previous knowledge of disease and the viability of neural networks in dimensionality reduction and biomarker detection is demonstrated and discussed. In summary, gene expression data is shown to be valuable for the investigation of ND and novel gene biomarker signatures for the diagnosis and prognosis of PD and AD

    Coverage measurements of NB-IoT technology

    Get PDF
    Abstract. The narrowband internet of things (NB-IoT) is a cellular radio access technology that provides seamless connectivity to wireless IoT devices with low latency, low power consumption, and long-range coverage. For long-range coverage, NB-IoT offers a coverage enhancement (CE) mechanism that is achieved by repeating the transmission of signals. Good network coverage is essential to reduce the battery usage and power consumption of IoT devices, while poor network coverage increases the number of repetitions in transmission, which causes high power consumption of IoT devices. The primary objective of this work is to determine the network coverage of NB-IoT technology under the University of Oulu’s 5G test network (5GTN) base station. In this thesis work, measurement results on key performance indicators such as reference signal received power (RSRP), reference signal received quality (RSRQ), received signal strength indicator (RSSI), and signal to noise plus interference (SINR) have been reported. The goal of the measurement is to find out the NB-IoT signal strength at different locations, which are served by the 5GTN cells configured with different parameters, e.g., Tx power levels, antenna tilt angles. The signal strength of NB-IoT technology has been measured at different places under the 5GTN base station in Oulu, Finland. Drive tests have been conducted to measure the signal strength of NB-IoT technology by using the Quectel BG96 module, Qualcomm kDC-5737 dongle and Keysight Nemo Outdoor software. The results have shown the values of RSRP, RSRQ, RSSI, and SINR at different locations within several kilometres of the 5GTN base stations. These values indicate the performance of the network and are used to assess the performance of network services to the end-users. In this work, the overall performance of the network has been checked to verify if network performance meets good signal levels and good network coverage. Relevant details of the NB-IoT technology, the theory behind the signal coverage and comparisons with the measurement results have also been discussed to check the relevance of the measurement results
    • …
    corecore