10,499 research outputs found
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions
The Metaverse offers a second world beyond reality, where boundaries are
non-existent, and possibilities are endless through engagement and immersive
experiences using the virtual reality (VR) technology. Many disciplines can
benefit from the advancement of the Metaverse when accurately developed,
including the fields of technology, gaming, education, art, and culture.
Nevertheless, developing the Metaverse environment to its full potential is an
ambiguous task that needs proper guidance and directions. Existing surveys on
the Metaverse focus only on a specific aspect and discipline of the Metaverse
and lack a holistic view of the entire process. To this end, a more holistic,
multi-disciplinary, in-depth, and academic and industry-oriented review is
required to provide a thorough study of the Metaverse development pipeline. To
address these issues, we present in this survey a novel multi-layered pipeline
ecosystem composed of (1) the Metaverse computing, networking, communications
and hardware infrastructure, (2) environment digitization, and (3) user
interactions. For every layer, we discuss the components that detail the steps
of its development. Also, for each of these components, we examine the impact
of a set of enabling technologies and empowering domains (e.g., Artificial
Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on
its advancement. In addition, we explain the importance of these technologies
to support decentralization, interoperability, user experiences, interactions,
and monetization. Our presented study highlights the existing challenges for
each component, followed by research directions and potential solutions. To the
best of our knowledge, this survey is the most comprehensive and allows users,
scholars, and entrepreneurs to get an in-depth understanding of the Metaverse
ecosystem to find their opportunities and potentials for contribution
The Viability and Potential Consequences of IoT-Based Ransomware
With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested.
As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed.
For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim.
Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research
Redefining Community in the Age of the Internet: Will the Internet of Things (IoT) generate sustainable and equitable community development?
There is a problem so immense in our built world that it is often not fully realized. This problem is the disconnection between humanity and the physical world. In an era of limitless data and information at our fingertips, buildings, public spaces, and landscapes are divided from us due to their physical nature. Compared with the intense flow of information from our online world driven by the beating engine of the internet, our physical world is silent. This lack of connection not only has consequences for sustainability but also for how we perceive and communicate with our built environment in the modern age. A possible solution to bridge the gap between our physical and online worlds is a technology known as the Internet of Things (IoT). What is IoT? How does it work? Will IoT change the concept of the built environment for a participant within it, and in doing so enhance the dynamic link between humans and place? And what are the implications of IoT for privacy, security, and data for the public good? Lastly, we will identify the most pressing issues existing in the built environment by conducting and analyzing case studies from Pomona College and California State University, Northridge. By analyzing IoT in the context of case studies we can assess its viability and value as a tool for sustainability and equality in communities across the world
Recommended from our members
Antecedents of business intelligence system use
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University London.Organisational reliance on information has become vital for organisational competitiveness. With increasing data volumes, Business Intelligence (BI) becomes a cornerstone of the decision-support system. However, employee resistance to use Business Intelligence Systems (BIS) is evident. This creates a problem to organisations in realising the benefits of BIS. It is thus important to study the enablers of sustained use of BIS amongst employees.
This thesis identifies existing theories that can be used to study BI system use. It integrates and extends technology use theories through a framework focusing on Business Intelligence System Use (BISU). Empirical research is then conducted in Kuwait’s telecom and banking industries through a close-ended, self-administered questionnaire using a five-point Likert scale. Responses were received from 211 BI users. The data was analysed using SmartPLS to study the convergent and discriminant validity and reliability. Partial least squares structural equation modelling (PLS-SEM) was used to study the direct and indirect relationships between constructs and answer the hypotheses. In addition to SmartPLS, SPSS was used for descriptive analysis.
The results indicated that UTAUT factors consisting of performance expectancy, effort expectancy and social influence positively impact BI system use. Voluntariness of use was found to positively moderate the relationship between social influence and BI system use. Furthermore, BI system quality positively impacts both performance expectancy and effort expectancy. The BI user’s self-efficacy also positively impacts effort expectancy. In addition, social influence was found to be positively influenced by organisational factors, namely top management support and information culture.
The findings of this research contribute to literature by determining and quantifying the factors that influence BISU through the lens of employee perspectives. This thesis also explains how employees’ object-based beliefs about BI affect their behavioural beliefs, which in turn impact BISU. Limitations of this research include the omission of UTAUT’s facilitating conditions and the limited variance of respondent demographics
Post-Millennial Queer Sensibility: Collaborative Authorship as Disidentification in Queer Intertextual Commodities
This dissertation is examining LGBTQ+ audiences and creatives collaborating in the creation of new media texts like web shows, podcasts, and video games. The study focuses on three main objects or media texts: Carmilla (web series), Welcome to Night Vale (podcast), and Undertale (video game). These texts are transmedia objects or intertextual commodities. I argue that by using queer gestures of collaborative authorship that reaches out to the audience for canonical contribution create an emerging queer production culture that disidentifies with capitalism even as it negotiates capitalistic structures. The post-millennial queer sensibility is a constellation of aesthetics, self-representation, alternative financing, and interactivity that prioritizes community, trust, and authenticity using new technologies for co-creation.
Within my study, there are four key tactics or queer gestures being explored: remediation, radical ambiguity and multi-forms as queer aesthetics, audience self-representation, alternative financing like micropatronage & licensed fan-made merchandise, and interactivity as performance. The goal of this project is to better understand the changing conceptions of authorship/ownership, canon/fanon (official text/fan created extensions), and community/capitalism in queer subcultures as an indicator of the potential change in more mainstream cultural attitudes. The project takes into consideration a variety of intersecting identities including gender, race, class, and of course sexual orientation in its analysis. By examining the legal discourse around collaborative authorship, the real-life production practices, and audience-creator interactions and attitudes, this study provides insight into how media creatives work with audiences to co-create self-representative media, the motivations, and rewards for creative, audiences, and owners. This study aims to contribute towards a fuller understanding of queer production cultures and audience reception of these media texts, of which there is relatively little academic information. Specifically, the study mines for insights into the changing attitudes towards authorship, ownership, and collaboration within queer indie media projects, especially as these objects are relying on the self-representation of both audiences and creatives in the formation of the text
The Adirondack Chronology
The Adirondack Chronology is intended to be a useful resource for researchers and others interested in the Adirondacks and Adirondack history.https://digitalworks.union.edu/arlpublications/1000/thumbnail.jp
GENDERED EMBODIMENT, STABILITY AND CHANGE: WOMEN’S WEIGHTLIFTING AS A TOOL FOR RECOVERY FROM EATING DISORDERS
This thesis explores the everyday embodied experiences of women who use amateur weightlifting as a vehicle for recovery from eating disorders. Within online spaces and on social media, women frequently share their experiences of using weightlifting to overcome issues relating to disordered eating, body image, and mental health. In particular, women with a history of eating disorders credit weightlifting to be integral to their recovery journey. However, there is a dearth of research on women’s experiences with exercise during eating disorder recovery and no research that identifies weightlifting as beneficial to this process. To the contrary, discursive links are drawn between the practices of self-surveillance exercised by both eating disorder sufferers and weightlifters alike. In this regard, engagement with weightlifting during eating disorder recovery may signal the transferal of pathology from one set of behaviours to another. That is, from disordered eating to rigid and self-regulatory exercise routines. This thesis examines how women subjectively navigate and make sense of this pathologisation.
The data for this research comes from longitudinal semi-structured interviews and photo elicitation with 19 women, living in the United Kingdom, who engaged in weightlifting during their eating disorder recovery. In addition, to build up a holistic picture and to explore how this phenomenon also ‘takes place’ online, I conducted a netnography of the overlapping subcultures of female weightlifting and eating disorder recovery on Instagram. Women’s standpoint theory and interpretative phenomenological analysis are combined to form the underpinning theoretical and analytical tools used to engage with these three rich data sets. Moreover, throughout I draw on an eclectic range of disciplinary perspectives, in order to bring together multiple fields of research and develop novel theoretical frameworks.
In the findings, I argue that women’s experiences using weightlifting as a tool for recovery from eating disorders manifests in an embodied sense of multiplicity. In this sense, understandings of the body that are often viewed as ontologically distinct (muscularity/thinness/fatness) hang-together at once in the lived experience of a single individual.
I argue that women, particularly those who have previously struggled with an eating disorder, are too readily positioned as vulnerable to media and representation. To theoretically combat these ideas regarding women’s assumed passivity, I develop the concept of ‘digital pruning’ to account for women’s agency in relation to new media.
I contend that weightlifting offers women in recovery from eating disorders a new framework for approaching eating and exercise. Specifically, weightlifting’s norms and values legitimate occupying a larger body, which gives women in recovery permission to eat and gain-weight in a way that is both culturally sanctioned and health-promoting.
Finally, I explore identity transformation as a specific tenet of recovery from eating disorders. I argue that, on social media, recovery identities are characterised by personal empowerment, resilience, and independence. While offline, quieter and less culturally glorified aspects of recovery (such as relationships of care) are central to women’s accounts of developing a new sense of self as they transition away from an eating disorder identity.
In summary, this thesis is an examination of the ways in which women strategically navigate pathology in relation to their bodies, social media, food/exercise practices, and identity. I argue that women develop a set of ‘DIY’ recovery practices that allow them to consciously channel and draw on their negative experiences with eating disorders, to develop new ways of living that serve their overall wellbeing. Weightlifting is integral to this process, as it provides women transitioning out of this difficult phase in their lives with new ways of relating to their bodies and of being in the world. I situate this phenomenon within a neoliberal socio-political climate in which individuals are required to take personal responsibility for their mental health and wellbeing, despite living within conditions which are not conducive to recovery
Registration accuracy of the optical navigation system for image-guided surgery
Abstract. During the last decades, image-guided surgery has been a vastly growing method during medical operations. It provides a new opportunity to perform surgical operations with higher accuracy and reliability than before. In image-guided surgery, a navigation system is used to track the instrument’s location and orientation during the surgery. These navigation systems can track the instrument in many ways, the most common of which are optical tracking, mechanical tracking, and electromagnetic tracking. Usually, the navigation systems are used primarily in surgical operations located in the head and spine area. For this reason, it is essential to know the registration accuracy and thus the navigational accuracy of the navigation system, and how different registration methods might affect them.
In this research, the registration accuracy of the optical navigation system is investigated by using a head phantom whose coordinate values of holes in the surface are measured during the navigation after different registration scenarios. Reference points are determined using computed tomography images taken from the head phantom. The absolute differences of the measured points to the corresponding reference points are calculated and the results are illustrated using bar graphs and three-dimensional point clouds. MATLAB is used to analyze and present the results.
Results show that registration accuracy and thus also navigation accuracy are primarily affected by how the first three registration points are determined for the navigation system at the beginning of the registration. This should be considered in future applications where the navigation system is used in image-guided surgery.Kuvaohjatun kirurgian optisen navigointilaitteen rekisteröintitarkkuus. Tiivistelmä. Viimeisten vuosikymmenien aikana kuvaohjattu kirurgia on yleistynyt laajalti lääketieteellisten toimenpiteiden aikana ja se tarjoaa entistä paremman mahdollisuuden tarkkaan ja luotettavaan hoitoon. Kuvaohjatussa kirurgiassa navigointilaitteisto seuraa käytetyn instrumentin paikkaa ja orientaatiota operaation aikana. Navigointilaitteistoilla on erilaisia toimintaperiaatteita, joiden perusteella ne seuraavat instrumenttia. Yleisimmin käytetyt navigointilaitteistot perustuvat optiseen, mekaaniseen, tai sähkömagneettiseen seurantaan. Yleensä kuvaohjattua kirurgiaa käytetään pään ja selkärangan alueen kirurgisissa operaatioissa, joten on erittäin tärkeää, että navigointilaitteiston rekisteröinti- ja siten myös navigointitarkkuus tunnetaan, sekä erilaisten rekisteröintitapojen mahdolliset vaikutukset kyseisiin tarkkuuksiin.
Tässä tutkimuksessa optisen navigointilaitteen rekisteröintitarkkuutta tutkitaan päämallin avulla, jonka pintaan luotujen reikien koordinaattiarvot mitataan navigointitilanteessa erilaisten rekisteröintitapojen jälkeen. Referenssipisteet kyseisille mittauspisteille määritetään päämallin tietokonetomografiakuvista. Mitattujen pisteiden, sekä vastaavien referenssipisteiden väliset absoluuttiset erot lasketaan ja tulokset esitetään palkkikuvaajien, sekä kolmiulotteisten pistepilvien avulla käyttäen apuna MATLAB-ohjelmistoa.
Tulokset osoittavat, että rekisteröintitarkkuuteen ja siten navigointitarkkuuteen vaikuttaa eniten rekisteröintitilanteen alussa määritettävien kolmen ensimmäisen rekisteröintipisteen sijainti ja tämä tuleekin ottaa huomioon jatkossa tilanteissa, joissa navigointilaitetta käytetään kuvaohjatussa kirurgiassa
Recommended from our members
After Creation: Intergovernmental Organizations and Member State Governments as Co-Participants in an Authority Relationship
This is a re-amalgamation of what started as one manuscript and became two when the length proved to be more than any publisher wanted to consider. The splitting consisted of removing what are now Parts 3, 4, and 5 so that the manuscript focused on the outcome-related shared beliefs holding an authority relationship together. Those parts were last worked on in 2018. The rest were last worked on in late 2021 but also remain incomplete.
The relational approach adopted in this study treats intergovernmental organizations and the governments of member states as co-participants in an authority relationship with the governments of their member states. Authority relationships link two types of actor, defined by their authority-holder or addressee role in the relationship, through a set of shared beliefs about why the relationship exists and how the participants should fulfill their respective roles. The IGO as authority holder has a role that includes a right to instruct other actors about what they should or should not do; the governments of member states as addressees are expected to comply with the instructions. Three sets of shared beliefs provide the conceptual “glue” holding the relationship together. The first defines the goal of the collective effort, providing both the rationale for having the authority relationship and providing a lode star for assessments of the collective effort’s success or lack of success. The second set defines the shared understanding about allocation of roles and the process of interaction by establishing shared expectations about a) the selection process by which particular actors acquire authority holder roles, b) the definitions identifying one or more categories of addressees expected to follow instructions, and c) the procedures through which the authority holder issues instructions. The third set focus on the outcomes of cooperation through the relationship by defining a) the substantive areas in which the authority holder may issue instructions, b) the bases for assessing the relevance actions mandated in instructions for reaching the goal, and c) the relative efficacy of action paths chosen for reaching the goal as compared to other possible action paths.
Using an authority relationship framework for analyzing cooperation through IGOs highlights the inherently bi-directional nature of IGO-member government activity by viewing their interaction as involving a three-step process in which the IGO as authority holder decides when to issue what instruction, the member state governments as followers react to the instruction with anything from prompt and full compliance through various forms of pushback to outright rejection, and the IGO as authority holder responds to how the followers react with efforts to increase individual compliance with instructions and reinforce continuing acceptance of the authority relationship. Foregrounding the dynamics produced by the interaction of these two streams of perception and action reveals more clearly how far intergovernmental organizations acquire capacity to operate as independent actors, the dynamic ways they maintain that capacity, and how much they influence member governments’ beliefs and actions at different times. The approach fosters better understanding of why, when, and for how long governments choose cooperation through an IGO even in periods of rising unilateralism
- …