15,715 research outputs found
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions
The Metaverse offers a second world beyond reality, where boundaries are
non-existent, and possibilities are endless through engagement and immersive
experiences using the virtual reality (VR) technology. Many disciplines can
benefit from the advancement of the Metaverse when accurately developed,
including the fields of technology, gaming, education, art, and culture.
Nevertheless, developing the Metaverse environment to its full potential is an
ambiguous task that needs proper guidance and directions. Existing surveys on
the Metaverse focus only on a specific aspect and discipline of the Metaverse
and lack a holistic view of the entire process. To this end, a more holistic,
multi-disciplinary, in-depth, and academic and industry-oriented review is
required to provide a thorough study of the Metaverse development pipeline. To
address these issues, we present in this survey a novel multi-layered pipeline
ecosystem composed of (1) the Metaverse computing, networking, communications
and hardware infrastructure, (2) environment digitization, and (3) user
interactions. For every layer, we discuss the components that detail the steps
of its development. Also, for each of these components, we examine the impact
of a set of enabling technologies and empowering domains (e.g., Artificial
Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on
its advancement. In addition, we explain the importance of these technologies
to support decentralization, interoperability, user experiences, interactions,
and monetization. Our presented study highlights the existing challenges for
each component, followed by research directions and potential solutions. To the
best of our knowledge, this survey is the most comprehensive and allows users,
scholars, and entrepreneurs to get an in-depth understanding of the Metaverse
ecosystem to find their opportunities and potentials for contribution
Recommended from our members
Ensuring Access to Safe and Nutritious Food for All Through the Transformation of Food Systems
The Viability and Potential Consequences of IoT-Based Ransomware
With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested.
As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed.
For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim.
Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research
One Small Step for Generative AI, One Giant Leap for AGI: A Complete Survey on ChatGPT in AIGC Era
OpenAI has recently released GPT-4 (a.k.a. ChatGPT plus), which is
demonstrated to be one small step for generative AI (GAI), but one giant leap
for artificial general intelligence (AGI). Since its official release in
November 2022, ChatGPT has quickly attracted numerous users with extensive
media coverage. Such unprecedented attention has also motivated numerous
researchers to investigate ChatGPT from various aspects. According to Google
scholar, there are more than 500 articles with ChatGPT in their titles or
mentioning it in their abstracts. Considering this, a review is urgently
needed, and our work fills this gap. Overall, this work is the first to survey
ChatGPT with a comprehensive review of its underlying technology, applications,
and challenges. Moreover, we present an outlook on how ChatGPT might evolve to
realize general-purpose AIGC (a.k.a. AI-generated content), which will be a
significant milestone for the development of AGI.Comment: A Survey on ChatGPT and GPT-4, 29 pages. Feedback is appreciated
([email protected]
A Design Science Research Approach to Smart and Collaborative Urban Supply Networks
Urban supply networks are facing increasing demands and challenges and thus constitute a relevant field for research and practical development. Supply chain management holds enormous potential and relevance for society and everyday life as the flow of goods and information are important economic functions. Being a heterogeneous field, the literature base of supply chain management research is difficult to manage and navigate. Disruptive digital technologies and the implementation of cross-network information analysis and sharing drive the need for new organisational and technological approaches. Practical issues are manifold and include mega trends such as digital transformation, urbanisation, and environmental awareness.
A promising approach to solving these problems is the realisation of smart and collaborative supply networks. The growth of artificial intelligence applications in recent years has led to a wide range of applications in a variety of domains. However, the potential of artificial intelligence utilisation in supply chain management has not yet been fully exploited. Similarly, value creation increasingly takes place in networked value creation cycles that have become continuously more collaborative, complex, and dynamic as interactions in business processes involving information technologies have become more intense.
Following a design science research approach this cumulative thesis comprises the development and discussion of four artefacts for the analysis and advancement of smart and collaborative urban supply networks. This thesis aims to highlight the potential of artificial intelligence-based supply networks, to advance data-driven inter-organisational collaboration, and to improve last mile supply network sustainability. Based on thorough machine learning and systematic literature reviews, reference and system dynamics modelling, simulation, and qualitative empirical research, the artefacts provide a valuable contribution to research and practice
Use of physical activity measures in rehabilitation interventions following lower extremity amputation
Purpose of review: This systematic review aims to evaluate physical performance outcome tools that are used most frequently to assess rehabilitation interventions. The scope of this paper focused on outcomes used with established lower limb amputees when assessing interventions such as exercise programs or changes in prescription published in the last five years. Recent Findings: The most recorded outcome measures used across all the papers were timed walk tests and the Activity Balance Confidence Scale. Many outcomes did not produce statistically significant results with established amputee cohorts. Understanding the minimal important clinical difference is key. Summary: The use of outcome measures is essential. Training and education are likely to increase the use of outcome measures. Quality of life measures are important in conjunction with physical outcomes. Simple timed walk tests are commonly used. These are in general easy to administer requiring a small space, limited equipment, and a short time frame
Countermeasures for the majority attack in blockchain distributed systems
La tecnología Blockchain es considerada como uno de los paradigmas informáticos más importantes posterior al Internet; en función a sus características únicas que la hacen ideal para registrar, verificar y administrar información de diferentes transacciones. A pesar de esto, Blockchain se enfrenta a diferentes problemas de seguridad, siendo el ataque del 51% o ataque mayoritario uno de los más importantes. Este consiste en que uno o más mineros tomen el control de al menos el 51% del Hash extraído o del cómputo en una red; de modo que un minero puede manipular y modificar arbitrariamente la información registrada en esta tecnología. Este trabajo se enfocó en diseñar e implementar estrategias de detección y mitigación de ataques mayoritarios (51% de ataque) en un sistema distribuido Blockchain, a partir de la caracterización del comportamiento de los mineros. Para lograr esto, se analizó y evaluó el Hash Rate / Share de los mineros de Bitcoin y Crypto Ethereum, seguido del diseño e implementación de un protocolo de consenso para controlar el poder de cómputo de los mineros. Posteriormente, se realizó la exploración y evaluación de modelos de Machine Learning para detectar software malicioso de tipo Cryptojacking.DoctoradoDoctor en Ingeniería de Sistemas y Computació
Redefining quality interpersonal communication and communication activities in marriage from divorcees’ perspectives
Quality interpersonal communication is essential in the development and maintenance of any relationship, including marriage. As society adapts to new avenues of communication, married couples often underestimate the relevance of interpersonal communication in their relationship due to their lack of understanding of quality interpersonal communication. Therefore, this study investigated the conceptualisation of quality interpersonal communication through the lens of Relational Dialectic Theory and communication activities in marriage from the perspectives of divorcees. This study also explored the antecedents of poor-quality interpersonal communication and its repercussions on married couples. The present study also extended Knapp’s Relational Development Model by incorporating communication technology as a medium of communication. In-depth interviews were conducted on 20 divorcees from different states in Malaysia, chosen through a purposive sampling technique. The gathered data was then evaluated and combined in a thematic data analysis using the NVivo 12 software. This study discovers that the definitions of quality interpersonal communication are divided into seven (7) categories, with communication skills, intimacy, and characters identified as the top three significant traits. Results of this study also indicate that spouses use various medium of communication based on their circumstances but prefer face-to-face communication. However, communication occurrences between spouses are low and mostly negative, with the majority of them mainly involving households and children. The other antecedents of poor-quality interpersonal communication are communication skills, attitudes, third-party involvement, and emotional condition. The current study concludes that emotional condition is one of the protuberant effects of poor-quality interpersonal communication. All in all, the current study provides a new paradigm in Knapp’s Relational Development Model through the incorporation of the effects of poor-quality interpersonal communication into the deterioration stages of the model
Recommended from our members
Effects of a games-based physical education lesson on cognitive function in adolescents
Despite the importance of physical education (PE) lessons for physical activity in adolescents, the acute cognitive responses to PE lessons have not been explored; a gap in the literature that this study addresses. Following familiarisation, 76 (39 female) adolescents (12.2 ± 0.4 y) completed two trials (60 min games-based PE lesson and 60 min academic lesson) separated by 7-d in a counterbalanced, crossover design. Attention, executive function, working memory, and perception were assessed 30 min before, immediately post, and 45 min post-lesson in both trials. Participants were split into high-and low-fit groups based on a gender-specific median split of distance run on the multi-stage fitness test. Furthermore, participants were split into high and low MVPA groups based on a gender-specific median split of MVPA time (time spent >64% HR max) during the PE lesson. Overall, a 60 min games-based PE lesson had no effect on perception, working memory, attention, or executive function in adolescents (all p > 0.05) unless MVPA time is high. The physical activity-cognition relationship was moderated by MVPA, as working memory improved post-PE lesson in adolescents who completed more MVPA during their PE lesson (time*trial*MVPA interaction, p < 0.05, partial η2 = 0.119). Furthermore, high-fit adolescents displayed superior cognitive function than their low-fit counterparts, across all domains of cognitive function (main effect of fitness, all p < 0.05, partial η2 0.014–0.121). This study provides novel evidence that MVPA time moderates the cognitive response to a games-based PE lesson; and emphasises that higher levels of fitness are beneficial for cognitive function in adolescents
Central-provincial Politics and Industrial Policy-making in the Electric Power Sector in China
In addition to the studies that provide meaningful insights into the complexity of technical and economic issues, increasing studies have focused on the political process of market transition in network industries such as the electric power sector. This dissertation studies the central–provincial interactions in industrial policy-making and implementation, and attempts to evaluate the roles of Chinese provinces in the market reform process of the electric power sector. Market reforms of this sector are used as an illustrative case because the new round of market reforms had achieved some significant breakthroughs in areas such as pricing reform and wholesale market trading. Other policy measures, such as the liberalization of the distribution market and cross-regional market-building, are still at a nascent stage and have only scored moderate progress. It is important to investigate why some policy areas make greater progress in market reforms than others. It is also interesting to examine the impacts of Chinese central-provincial politics on producing the different market reform outcomes. Guangdong and Xinjiang are two provinces being analyzed in this dissertation. The progress of market reforms in these two provinces showed similarities although the provinces are very different in terms of local conditions such as the stages of their economic development and energy structures. The actual reform can be understood as the outcomes of certain modes of interactions between the central and provincial actors in the context of their particular capabilities and preferences in different policy areas. This dissertation argues that market reform is more successful in policy areas where the central and provincial authorities are able to engage mainly in integrative negotiations than in areas where they engage mainly in distributive negotiations
- …