10,499 research outputs found

    The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions

    Full text link
    The Metaverse offers a second world beyond reality, where boundaries are non-existent, and possibilities are endless through engagement and immersive experiences using the virtual reality (VR) technology. Many disciplines can benefit from the advancement of the Metaverse when accurately developed, including the fields of technology, gaming, education, art, and culture. Nevertheless, developing the Metaverse environment to its full potential is an ambiguous task that needs proper guidance and directions. Existing surveys on the Metaverse focus only on a specific aspect and discipline of the Metaverse and lack a holistic view of the entire process. To this end, a more holistic, multi-disciplinary, in-depth, and academic and industry-oriented review is required to provide a thorough study of the Metaverse development pipeline. To address these issues, we present in this survey a novel multi-layered pipeline ecosystem composed of (1) the Metaverse computing, networking, communications and hardware infrastructure, (2) environment digitization, and (3) user interactions. For every layer, we discuss the components that detail the steps of its development. Also, for each of these components, we examine the impact of a set of enabling technologies and empowering domains (e.g., Artificial Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on its advancement. In addition, we explain the importance of these technologies to support decentralization, interoperability, user experiences, interactions, and monetization. Our presented study highlights the existing challenges for each component, followed by research directions and potential solutions. To the best of our knowledge, this survey is the most comprehensive and allows users, scholars, and entrepreneurs to get an in-depth understanding of the Metaverse ecosystem to find their opportunities and potentials for contribution

    The Viability and Potential Consequences of IoT-Based Ransomware

    Get PDF
    With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested. As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed. For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim. Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research

    Redefining Community in the Age of the Internet: Will the Internet of Things (IoT) generate sustainable and equitable community development?

    Get PDF
    There is a problem so immense in our built world that it is often not fully realized. This problem is the disconnection between humanity and the physical world. In an era of limitless data and information at our fingertips, buildings, public spaces, and landscapes are divided from us due to their physical nature. Compared with the intense flow of information from our online world driven by the beating engine of the internet, our physical world is silent. This lack of connection not only has consequences for sustainability but also for how we perceive and communicate with our built environment in the modern age. A possible solution to bridge the gap between our physical and online worlds is a technology known as the Internet of Things (IoT). What is IoT? How does it work? Will IoT change the concept of the built environment for a participant within it, and in doing so enhance the dynamic link between humans and place? And what are the implications of IoT for privacy, security, and data for the public good? Lastly, we will identify the most pressing issues existing in the built environment by conducting and analyzing case studies from Pomona College and California State University, Northridge. By analyzing IoT in the context of case studies we can assess its viability and value as a tool for sustainability and equality in communities across the world

    Post-Millennial Queer Sensibility: Collaborative Authorship as Disidentification in Queer Intertextual Commodities

    Get PDF
    This dissertation is examining LGBTQ+ audiences and creatives collaborating in the creation of new media texts like web shows, podcasts, and video games. The study focuses on three main objects or media texts: Carmilla (web series), Welcome to Night Vale (podcast), and Undertale (video game). These texts are transmedia objects or intertextual commodities. I argue that by using queer gestures of collaborative authorship that reaches out to the audience for canonical contribution create an emerging queer production culture that disidentifies with capitalism even as it negotiates capitalistic structures. The post-millennial queer sensibility is a constellation of aesthetics, self-representation, alternative financing, and interactivity that prioritizes community, trust, and authenticity using new technologies for co-creation. Within my study, there are four key tactics or queer gestures being explored: remediation, radical ambiguity and multi-forms as queer aesthetics, audience self-representation, alternative financing like micropatronage & licensed fan-made merchandise, and interactivity as performance. The goal of this project is to better understand the changing conceptions of authorship/ownership, canon/fanon (official text/fan created extensions), and community/capitalism in queer subcultures as an indicator of the potential change in more mainstream cultural attitudes. The project takes into consideration a variety of intersecting identities including gender, race, class, and of course sexual orientation in its analysis. By examining the legal discourse around collaborative authorship, the real-life production practices, and audience-creator interactions and attitudes, this study provides insight into how media creatives work with audiences to co-create self-representative media, the motivations, and rewards for creative, audiences, and owners. This study aims to contribute towards a fuller understanding of queer production cultures and audience reception of these media texts, of which there is relatively little academic information. Specifically, the study mines for insights into the changing attitudes towards authorship, ownership, and collaboration within queer indie media projects, especially as these objects are relying on the self-representation of both audiences and creatives in the formation of the text

    The Adirondack Chronology

    Get PDF
    The Adirondack Chronology is intended to be a useful resource for researchers and others interested in the Adirondacks and Adirondack history.https://digitalworks.union.edu/arlpublications/1000/thumbnail.jp

    GENDERED EMBODIMENT, STABILITY AND CHANGE: WOMEN’S WEIGHTLIFTING AS A TOOL FOR RECOVERY FROM EATING DISORDERS

    Get PDF
    This thesis explores the everyday embodied experiences of women who use amateur weightlifting as a vehicle for recovery from eating disorders. Within online spaces and on social media, women frequently share their experiences of using weightlifting to overcome issues relating to disordered eating, body image, and mental health. In particular, women with a history of eating disorders credit weightlifting to be integral to their recovery journey. However, there is a dearth of research on women’s experiences with exercise during eating disorder recovery and no research that identifies weightlifting as beneficial to this process. To the contrary, discursive links are drawn between the practices of self-surveillance exercised by both eating disorder sufferers and weightlifters alike. In this regard, engagement with weightlifting during eating disorder recovery may signal the transferal of pathology from one set of behaviours to another. That is, from disordered eating to rigid and self-regulatory exercise routines. This thesis examines how women subjectively navigate and make sense of this pathologisation. The data for this research comes from longitudinal semi-structured interviews and photo elicitation with 19 women, living in the United Kingdom, who engaged in weightlifting during their eating disorder recovery. In addition, to build up a holistic picture and to explore how this phenomenon also ‘takes place’ online, I conducted a netnography of the overlapping subcultures of female weightlifting and eating disorder recovery on Instagram. Women’s standpoint theory and interpretative phenomenological analysis are combined to form the underpinning theoretical and analytical tools used to engage with these three rich data sets. Moreover, throughout I draw on an eclectic range of disciplinary perspectives, in order to bring together multiple fields of research and develop novel theoretical frameworks. In the findings, I argue that women’s experiences using weightlifting as a tool for recovery from eating disorders manifests in an embodied sense of multiplicity. In this sense, understandings of the body that are often viewed as ontologically distinct (muscularity/thinness/fatness) hang-together at once in the lived experience of a single individual. I argue that women, particularly those who have previously struggled with an eating disorder, are too readily positioned as vulnerable to media and representation. To theoretically combat these ideas regarding women’s assumed passivity, I develop the concept of ‘digital pruning’ to account for women’s agency in relation to new media. I contend that weightlifting offers women in recovery from eating disorders a new framework for approaching eating and exercise. Specifically, weightlifting’s norms and values legitimate occupying a larger body, which gives women in recovery permission to eat and gain-weight in a way that is both culturally sanctioned and health-promoting. Finally, I explore identity transformation as a specific tenet of recovery from eating disorders. I argue that, on social media, recovery identities are characterised by personal empowerment, resilience, and independence. While offline, quieter and less culturally glorified aspects of recovery (such as relationships of care) are central to women’s accounts of developing a new sense of self as they transition away from an eating disorder identity. In summary, this thesis is an examination of the ways in which women strategically navigate pathology in relation to their bodies, social media, food/exercise practices, and identity. I argue that women develop a set of ‘DIY’ recovery practices that allow them to consciously channel and draw on their negative experiences with eating disorders, to develop new ways of living that serve their overall wellbeing. Weightlifting is integral to this process, as it provides women transitioning out of this difficult phase in their lives with new ways of relating to their bodies and of being in the world. I situate this phenomenon within a neoliberal socio-political climate in which individuals are required to take personal responsibility for their mental health and wellbeing, despite living within conditions which are not conducive to recovery

    Registration accuracy of the optical navigation system for image-guided surgery

    Get PDF
    Abstract. During the last decades, image-guided surgery has been a vastly growing method during medical operations. It provides a new opportunity to perform surgical operations with higher accuracy and reliability than before. In image-guided surgery, a navigation system is used to track the instrument’s location and orientation during the surgery. These navigation systems can track the instrument in many ways, the most common of which are optical tracking, mechanical tracking, and electromagnetic tracking. Usually, the navigation systems are used primarily in surgical operations located in the head and spine area. For this reason, it is essential to know the registration accuracy and thus the navigational accuracy of the navigation system, and how different registration methods might affect them. In this research, the registration accuracy of the optical navigation system is investigated by using a head phantom whose coordinate values of holes in the surface are measured during the navigation after different registration scenarios. Reference points are determined using computed tomography images taken from the head phantom. The absolute differences of the measured points to the corresponding reference points are calculated and the results are illustrated using bar graphs and three-dimensional point clouds. MATLAB is used to analyze and present the results. Results show that registration accuracy and thus also navigation accuracy are primarily affected by how the first three registration points are determined for the navigation system at the beginning of the registration. This should be considered in future applications where the navigation system is used in image-guided surgery.Kuvaohjatun kirurgian optisen navigointilaitteen rekisteröintitarkkuus. Tiivistelmä. Viimeisten vuosikymmenien aikana kuvaohjattu kirurgia on yleistynyt laajalti lääketieteellisten toimenpiteiden aikana ja se tarjoaa entistä paremman mahdollisuuden tarkkaan ja luotettavaan hoitoon. Kuvaohjatussa kirurgiassa navigointilaitteisto seuraa käytetyn instrumentin paikkaa ja orientaatiota operaation aikana. Navigointilaitteistoilla on erilaisia toimintaperiaatteita, joiden perusteella ne seuraavat instrumenttia. Yleisimmin käytetyt navigointilaitteistot perustuvat optiseen, mekaaniseen, tai sähkömagneettiseen seurantaan. Yleensä kuvaohjattua kirurgiaa käytetään pään ja selkärangan alueen kirurgisissa operaatioissa, joten on erittäin tärkeää, että navigointilaitteiston rekisteröinti- ja siten myös navigointitarkkuus tunnetaan, sekä erilaisten rekisteröintitapojen mahdolliset vaikutukset kyseisiin tarkkuuksiin. Tässä tutkimuksessa optisen navigointilaitteen rekisteröintitarkkuutta tutkitaan päämallin avulla, jonka pintaan luotujen reikien koordinaattiarvot mitataan navigointitilanteessa erilaisten rekisteröintitapojen jälkeen. Referenssipisteet kyseisille mittauspisteille määritetään päämallin tietokonetomografiakuvista. Mitattujen pisteiden, sekä vastaavien referenssipisteiden väliset absoluuttiset erot lasketaan ja tulokset esitetään palkkikuvaajien, sekä kolmiulotteisten pistepilvien avulla käyttäen apuna MATLAB-ohjelmistoa. Tulokset osoittavat, että rekisteröintitarkkuuteen ja siten navigointitarkkuuteen vaikuttaa eniten rekisteröintitilanteen alussa määritettävien kolmen ensimmäisen rekisteröintipisteen sijainti ja tämä tuleekin ottaa huomioon jatkossa tilanteissa, joissa navigointilaitetta käytetään kuvaohjatussa kirurgiassa
    corecore