8,919 research outputs found

    The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions

    Full text link
    The Metaverse offers a second world beyond reality, where boundaries are non-existent, and possibilities are endless through engagement and immersive experiences using the virtual reality (VR) technology. Many disciplines can benefit from the advancement of the Metaverse when accurately developed, including the fields of technology, gaming, education, art, and culture. Nevertheless, developing the Metaverse environment to its full potential is an ambiguous task that needs proper guidance and directions. Existing surveys on the Metaverse focus only on a specific aspect and discipline of the Metaverse and lack a holistic view of the entire process. To this end, a more holistic, multi-disciplinary, in-depth, and academic and industry-oriented review is required to provide a thorough study of the Metaverse development pipeline. To address these issues, we present in this survey a novel multi-layered pipeline ecosystem composed of (1) the Metaverse computing, networking, communications and hardware infrastructure, (2) environment digitization, and (3) user interactions. For every layer, we discuss the components that detail the steps of its development. Also, for each of these components, we examine the impact of a set of enabling technologies and empowering domains (e.g., Artificial Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on its advancement. In addition, we explain the importance of these technologies to support decentralization, interoperability, user experiences, interactions, and monetization. Our presented study highlights the existing challenges for each component, followed by research directions and potential solutions. To the best of our knowledge, this survey is the most comprehensive and allows users, scholars, and entrepreneurs to get an in-depth understanding of the Metaverse ecosystem to find their opportunities and potentials for contribution

    The Viability and Potential Consequences of IoT-Based Ransomware

    Get PDF
    With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested. As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed. For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim. Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research

    Minimum income support systems as elements of crisis resilience in Europe: Final Report

    Full text link
    Mindestsicherungssysteme dienen in den meisten entwickelten Wohlfahrtsstaaten als Sicherheitsnetz letzter Instanz. Dementsprechend spielen sie gerade in wirtschaftlichen Krisenzeiten eine besondere Rolle. Inwieweit Mindestsicherungssysteme in Zeiten der Krise beansprucht werden, hängt auch von der Ausprägung vorgelagerter Sozialschutzsysteme ab. Diese Studie untersucht die Bedeutung von Systemen der Mindestsicherung sowie vorgelagerter Systeme wie Arbeitslosenversicherung, Kurzarbeit und arbeitsrechtlichem Bestandsschutz für die Krisenfestigkeit in Europa. Im Kontext der Finanzkrise von 2008/2009 und der Corona-Krise wird die Fähigkeit sozialpolitischer Maßnahmen untersucht, Armut und Einkommens­verluste einzudämmen und gesellschaftliche Ausgrenzung zu vermeiden. Die Studie setzt dabei auf quantitative und qualitative Methoden, etwa multivariate Analysen, Mikrosimulationsmethoden sowie eingehende Fallstudien der Länder Dänemark, Frankreich, Irland, Polen und Spanien, die für unterschiedliche Typen von Wohlfahrtsstaaten stehen.The aim of this study is to analyse the role of social policies in different European welfare states regarding minimum income protection and active inclusion. The core focus lies on crisis resilience, i.e. the capacity of social policy arrangements to contain poverty and inequality and avoid exclusion before, during and after periods of economic shocks. To achieve this goal, the study expands its analytical focus to include other tiers of social protection, in particular upstream systems such as unemployment insurance, job retention and employment protection, as they play an additional and potentially prominent role in providing income and job protection in situations of crisis. A mixed-method approach is used that combines quantitative and qualitative research, such as descriptive and multivariate quantitative analyses, microsimulation methods and in-depth case studies. The study finds consistent differences in terms of crisis resilience across countries and welfare state types. In general, Nordic and Continental European welfare states with strong upstream systems and minimum income support (MIS) show better outcomes in core socio-economic outcomes such as poverty and exclusion risks. However, labour market integration shows some dualisms in Continental Europe. The study shows that MIS holds particular importance if there are gaps in upstream systems or cases of severe and lasting crises

    Perfect is the enemy of test oracle

    Full text link
    Automation of test oracles is one of the most challenging facets of software testing, but remains comparatively less addressed compared to automated test input generation. Test oracles rely on a ground-truth that can distinguish between the correct and buggy behavior to determine whether a test fails (detects a bug) or passes. What makes the oracle problem challenging and undecidable is the assumption that the ground-truth should know the exact expected, correct, or buggy behavior. However, we argue that one can still build an accurate oracle without knowing the exact correct or buggy behavior, but how these two might differ. This paper presents SEER, a learning-based approach that in the absence of test assertions or other types of oracle, can determine whether a unit test passes or fails on a given method under test (MUT). To build the ground-truth, SEER jointly embeds unit tests and the implementation of MUTs into a unified vector space, in such a way that the neural representation of tests are similar to that of MUTs they pass on them, but dissimilar to MUTs they fail on them. The classifier built on top of this vector representation serves as the oracle to generate "fail" labels, when test inputs detect a bug in MUT or "pass" labels, otherwise. Our extensive experiments on applying SEER to more than 5K unit tests from a diverse set of open-source Java projects show that the produced oracle is (1) effective in predicting the fail or pass labels, achieving an overall accuracy, precision, recall, and F1 measure of 93%, 86%, 94%, and 90%, (2) generalizable, predicting the labels for the unit test of projects that were not in training or validation set with negligible performance drop, and (3) efficient, detecting the existence of bugs in only 6.5 milliseconds on average.Comment: Published in ESEC/FSE 202

    Strategies for Early Learners

    Get PDF
    Welcome to learning about how to effectively plan curriculum for young children. This textbook will address: • Developing curriculum through the planning cycle • Theories that inform what we know about how children learn and the best ways for teachers to support learning • The three components of developmentally appropriate practice • Importance and value of play and intentional teaching • Different models of curriculum • Process of lesson planning (documenting planned experiences for children) • Physical, temporal, and social environments that set the stage for children’s learning • Appropriate guidance techniques to support children’s behaviors as the self-regulation abilities mature. • Planning for preschool-aged children in specific domains including o Physical development o Language and literacy o Math o Science o Creative (the visual and performing arts) o Diversity (social science and history) o Health and safety • Making children’s learning visible through documentation and assessmenthttps://scholar.utc.edu/open-textbooks/1001/thumbnail.jp

    Learning disentangled speech representations

    Get PDF
    A variety of informational factors are contained within the speech signal and a single short recording of speech reveals much more than the spoken words. The best method to extract and represent informational factors from the speech signal ultimately depends on which informational factors are desired and how they will be used. In addition, sometimes methods will capture more than one informational factor at the same time such as speaker identity, spoken content, and speaker prosody. The goal of this dissertation is to explore different ways to deconstruct the speech signal into abstract representations that can be learned and later reused in various speech technology tasks. This task of deconstructing, also known as disentanglement, is a form of distributed representation learning. As a general approach to disentanglement, there are some guiding principles that elaborate what a learned representation should contain as well as how it should function. In particular, learned representations should contain all of the requisite information in a more compact manner, be interpretable, remove nuisance factors of irrelevant information, be useful in downstream tasks, and independent of the task at hand. The learned representations should also be able to answer counter-factual questions. In some cases, learned speech representations can be re-assembled in different ways according to the requirements of downstream applications. For example, in a voice conversion task, the speech content is retained while the speaker identity is changed. And in a content-privacy task, some targeted content may be concealed without affecting how surrounding words sound. While there is no single-best method to disentangle all types of factors, some end-to-end approaches demonstrate a promising degree of generalization to diverse speech tasks. This thesis explores a variety of use-cases for disentangled representations including phone recognition, speaker diarization, linguistic code-switching, voice conversion, and content-based privacy masking. Speech representations can also be utilised for automatically assessing the quality and authenticity of speech, such as automatic MOS ratings or detecting deep fakes. The meaning of the term "disentanglement" is not well defined in previous work, and it has acquired several meanings depending on the domain (e.g. image vs. speech). Sometimes the term "disentanglement" is used interchangeably with the term "factorization". This thesis proposes that disentanglement of speech is distinct, and offers a viewpoint of disentanglement that can be considered both theoretically and practically

    The Psychology of Trust from Relational Messages

    Get PDF
    A fundamental underpinning of all social relationships is trust. Trust can be established through implicit forms of communication called relational messages. A multidisciplinary, multi-university, cross-cultural investigation addressed how these message themes are expressed and whether they are moderated by culture and veracity. A multi-round decision-making game with 695 international participants assessed the nonverbal and verbal behaviors that express such meanings as affection, dominance, and composure, from which people ultimately determine who can be trusted and who not. Analysis of subjective judgments showed that trust was most predicted by dominance, then affection, and lastly, composure. Behaviorally, several nonverbal and verbal behaviors associated with these message themes were combined to predict trust. Results were similar across cultures but moderated by veracity. Methodologically, automated software extracted facial features, vocal features, and linguistic metrics associated with these message themes. A new attentional computer vision method retrospectively identified specific meaningful segments where relational messages were expressed. The new software tools and attentional model hold promise for identifying nuanced, implicit meanings that together predict trust and that can, in combination, serve as proxies for trust

    INVESTIGATING THE PERCEPTION OF EXPATRIATES TOWARDS IMMIGRATION SERVICE QUALITY IN SHARJAH, UNITED ARAB EMIRATES THROUGH MIXED METHOD APPROACH

    Get PDF
    The public sectors in UAE are under immense pressure to demonstrate that their services are customer-focused and that continuous performance improvement is being delivered. The United Arab Emirates is a favoured destination for expatriates due to its own citizens form a minority of the population and are barely represented in the private sector workforce. These highly unusual demographics confer high importance on the national immigration services. Recently, increased interest in international migration, specifically within the United Arab Emirates, has been shown both by government agencies and by the governments of industrialised countries. Given the importance of the expatriate labour force to economic stability and growth in the Emirates, this research investigates how immigration services are perceived, with the aim of contributing to their improvement, thus ultimately supporting economic growth. It proposes a service quality perception framework to improve understanding within SID of how to raise levels of service delivered to migrants and other persons directly or indirectly affected by SID services. Qualitative data were collected by means of semi-structured interviews and quantitative data by means of a questionnaire survey based on the abovementioned framework. The survey data, on the variables influencing participants’ experiences and perceptions of SID services, were subjected to statistical analysis. The framework was then used to evaluate quality of service in terms of general impressions, delivery, location, response, SID culture and behaviour. Numerical data were analysed using inferential and descriptive statistics. It was found that service quality positively influenced service behaviour and that this relationship was mediated by SID culture. This research makes an original contribution to knowledge as one of the few studies of immigration to the United Arab Emirates. By examining the workings of one immigration department, it adds to the literature on immigration departments and organisational development in developing countries. It illuminates the mechanics of immigration services and demonstrates their increasing importance to the world economy

    Targeting Fusion Proteins of HIV-1 and SARS-CoV-2

    Get PDF
    Viruses are disease-causing pathogenic agents that require host cells to replicate. Fusion of host and viral membranes is critical for the lifecycle of enveloped viruses. Studying viral fusion proteins can allow us to better understand how they shape immune responses and inform the design of therapeutics such as drugs, monoclonal antibodies, and vaccines. This thesis discusses two approaches to targeting two fusion proteins: Env from HIV-1 and S from SARS-CoV-2. The first chapter of this thesis is an introduction to viruses with a specific focus on HIV-1 CD4 mimetic drugs and antibodies against SARS-CoV-2. It discusses the architecture of these viruses and fusion proteins and how small molecules, peptides, and antibodies can target these proteins successfully to treat and prevent disease. In addition, a brief overview is included of the techniques involved in structural biology and how it has informed the study of viruses. For the interested reader, chapter 2 contains a review article that serves as a more in-depth introduction for both viruses as well as how the use of structural biology has informed the study of viral surface proteins and neutralizing antibody responses to them. The subsequent chapters provide a body of work divided into two parts. The first part in chapter 3 involves a study on conformational changes induced in the HIV-1 Env protein by CD4-mimemtic drugs using single particle cryo-EM. The second part encompassing chapters 4 and 5 includes two studies on antibodies isolated from convalescent COVID-19 donors. The former involves classification of antibody responses to the SARS-CoV-2 S receptor-binding domain (RBD). The latter discusses an anti-RBD antibody class that binds to a conserved epitope on the RBD and shows cross-binding and cross-neutralization to other coronaviruses in the sarbecovirus subgenus.</p
    • …
    corecore