11,815 research outputs found
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions
The Metaverse offers a second world beyond reality, where boundaries are
non-existent, and possibilities are endless through engagement and immersive
experiences using the virtual reality (VR) technology. Many disciplines can
benefit from the advancement of the Metaverse when accurately developed,
including the fields of technology, gaming, education, art, and culture.
Nevertheless, developing the Metaverse environment to its full potential is an
ambiguous task that needs proper guidance and directions. Existing surveys on
the Metaverse focus only on a specific aspect and discipline of the Metaverse
and lack a holistic view of the entire process. To this end, a more holistic,
multi-disciplinary, in-depth, and academic and industry-oriented review is
required to provide a thorough study of the Metaverse development pipeline. To
address these issues, we present in this survey a novel multi-layered pipeline
ecosystem composed of (1) the Metaverse computing, networking, communications
and hardware infrastructure, (2) environment digitization, and (3) user
interactions. For every layer, we discuss the components that detail the steps
of its development. Also, for each of these components, we examine the impact
of a set of enabling technologies and empowering domains (e.g., Artificial
Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on
its advancement. In addition, we explain the importance of these technologies
to support decentralization, interoperability, user experiences, interactions,
and monetization. Our presented study highlights the existing challenges for
each component, followed by research directions and potential solutions. To the
best of our knowledge, this survey is the most comprehensive and allows users,
scholars, and entrepreneurs to get an in-depth understanding of the Metaverse
ecosystem to find their opportunities and potentials for contribution
Recommended from our members
Ensuring Access to Safe and Nutritious Food for All Through the Transformation of Food Systems
The Viability and Potential Consequences of IoT-Based Ransomware
With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested.
As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed.
For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim.
Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research
Annual report of the officers of the town of Jackson, New Hampshire for the fiscal year ending December 31, 2022.
This is an annual report containing vital statistics for a town/city in the state of New Hampshire
Victims' Access to Justice in Trinidad and Tobago: An exploratory study of experiences and challenges of accessing criminal justice in a post-colonial society
This thesis investigates victims' access to justice in Trinidad and Tobago, using their own narratives. It seeks to capture how their experiences affected their identities as victims and citizens, alongside their perceptions of legitimacy regarding the criminal justice system. While there have been some reforms in the administration of criminal justice in Trinidad and Tobago, such reforms have not focused on victims' accessibility to the justice system. Using grounded theory methodology, qualitative data was collected through 31 in-depth interviews with victims and victim advocates. The analysis found that victims experienced interpersonal, structural, and systemic barriers at varying levels throughout the criminal justice system, which manifested as institutionalized secondary victimization, silencing and inequality. This thesis argues that such experiences not only served to appropriate conflict but demonstrates that access is often given in a very narrow sense. Furthermore, it shows a failure to encompass access to justice as appropriated conflicts are left to stagnate in the system as there is often very little resolution. Adopting a postcolonial lens to analyse victims' experiences, the analysis identified othering practices that served to institutionalize the vulnerability and powerlessness associated with victim identities. Here, it is argued that these othering practices also affected the rights consciousness of victims, delegitimating their identities as citizens. Moreover, as a result of their experiences, victims had mixed perceptions of the justice system. It is argued that while the system is a legitimate authority victims' endorsement of the system is questionable, therefore victims' experiences suggest that there is a reinforcement of the system's legal hegemony. The findings suggest that within the legal system of Trinidad and Tobago, legacies of colonialism shape the postcolonial present as the psychology and inequalities of the past are present in the interactions and processes of justice. These findings are relevant for policymakers in Trinidad and Tobago and other regions. From this study it is recognized that, to improve access to justice for victims, there needs to be a move towards victim empowerment that promotes resilience and enhances social capital. Going forward it is noted that there is a need for further research
Animating potential for intensities and becoming in writing: challenging discursively constructed structures and writing conventions in academia through the use of storying and other post qualitative inquiries
Written for everyone ever denied the opportunity of fulfilling their academic potential, this is ‘Chloe’s story’. Using composite selves, a phrase chosen to indicate multiplicities and movement, to story both the initial event leading to ‘Chloe’s’ immediate withdrawal from a Further Education college and an imaginary second chance to support her whilst at university, this Deleuzo-Guattarian (2015a) ‘assemblage’ of post qualitative inquiries offers challenge to discursively constructed structures and writing conventions in academia. Adopting a posthuman approach to theorising to shift attention towards affects and intensities always relationally in action in multiple ‘assemblages’, these inquiries aim to decentre individual ‘lecturer’ and ‘student’ identities. Illuminating movements and moments quivering with potential for change, then, hoping thereby to generate second chances for all, different approaches to writing are exemplified which trouble those academic constraints by fostering inquiry and speculation: moving away from ‘what is’ towards ‘what if’.
With the formatting of this thesis itself also always troubling the rigid Deleuzo-Guattarian (2015a) ‘segmentary lines’ structuring orthodox academic practice, imbricated in these inquiries are attempts to exemplify Manning’s (2015; 2016) ‘artfulness’ through shifts in thinking within and around an emerging PhD thesis. As writing resists organising, the verb thesisising comes into play to describe the processes involved in creating this always-moving thesis. Using ‘landing sites’ (Arakawa and Gins, 2009) as a landscaping device, freely creating emerging ‘lines of flight’ (Deleuze and Guattari, 2015a) so often denied to students forced to adhere to strict academic conventions, this ‘movement-moving’ (Manning, 2014) opens up opportunities for change as in Manning’s (2016) ‘research-creation’. Arguing for a moving away from writing-representing towards writing-inquiring, towards a writing ‘that does’ (Wyatt and Gale, 2018: 127), and toward writing as immanent doing, it is hoped to animate potential for intensities and becoming in writing, offering opportunities and glimmerings of the not-yet-known
Healthcare Innovation Absenteeism: The Rise of Physician Entrepreneurs & Medical Startups
For years, warning signs have illuminated imminent days of reckoning for stalled healthcare innovation across the dynamic American healthcare landscape. An evolving epic battle for healthcare innovation delivery has silently raged and set arena stages throughout the healthcare industry. Urgent innovative healthcare delivery is needed to ameliorate longstanding points of failures in providing healthcare delivery to society. Historically, the science of medicine has fostered cultural practices of innovation absenteeism and resistance to change. Mired by archaic processes, legacy systems, and fractionally useful equipment, our current healthcare ecosystems are unsustainable. Recently, some unhindered frontline physicians opted to take on a portion of critical healthcare challenges and followed their ideas to leverage clinical expertise and drive the agenda for changing healthcare innovation delivery.
Our qualitative multi-case study design centered around empirical evidence that answered the research question: How do physician entrepreneurs navigate decision-making strategies for medical startups from ideation, innovation, to commercialization of new medical products and services? We examined 21 cases of physician founded medical startups to understand particularizations around physician entrepreneurship. Findings suggest three contributions towards knowledge accumulation about physician entrepreneurs and medical startups: exclusive decision-making processes, industry-specific insights, and illuminations of physician voices that might not otherwise be heard
Cost-effective non-destructive testing of biomedical components fabricated using additive manufacturing
Biocompatible titanium-alloys can be used to fabricate patient-specific medical components using additive manufacturing (AM). These novel components have the potential to improve clinical outcomes in various medical scenarios. However, AM introduces stability and repeatability concerns, which are potential roadblocks for its widespread use in the medical sector. Micro-CT imaging for non-destructive testing (NDT) is an effective solution for post-manufacturing quality control of these components. Unfortunately, current micro-CT NDT scanners require expensive infrastructure and hardware, which translates into prohibitively expensive routine NDT. Furthermore, the limited dynamic-range of these scanners can cause severe image artifacts that may compromise the diagnostic value of the non-destructive test. Finally, the cone-beam geometry of these scanners makes them susceptible to the adverse effects of scattered radiation, which is another source of artifacts in micro-CT imaging.
In this work, we describe the design, fabrication, and implementation of a dedicated, cost-effective micro-CT scanner for NDT of AM-fabricated biomedical components. Our scanner reduces the limitations of costly image-based NDT by optimizing the scanner\u27s geometry and the image acquisition hardware (i.e., X-ray source and detector). Additionally, we describe two novel techniques to reduce image artifacts caused by photon-starvation and scatter radiation in cone-beam micro-CT imaging.
Our cost-effective scanner was designed to match the image requirements of medium-size titanium-alloy medical components. We optimized the image acquisition hardware by using an 80 kVp low-cost portable X-ray unit and developing a low-cost lens-coupled X-ray detector. Image artifacts caused by photon-starvation were reduced by implementing dual-exposure high-dynamic-range radiography. For scatter mitigation, we describe the design, manufacturing, and testing of a large-area, highly-focused, two-dimensional, anti-scatter grid.
Our results demonstrate that cost-effective NDT using low-cost equipment is feasible for medium-sized, titanium-alloy, AM-fabricated medical components. Our proposed high-dynamic-range strategy improved by 37% the penetration capabilities of an 80 kVp micro-CT imaging system for a total x-ray path length of 19.8 mm. Finally, our novel anti-scatter grid provided a 65% improvement in CT number accuracy and a 48% improvement in low-contrast visualization. Our proposed cost-effective scanner and artifact reduction strategies have the potential to improve patient care by accelerating the widespread use of patient-specific, bio-compatible, AM-manufactured, medical components
- …