13,680 research outputs found

    The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions

    Full text link
    The Metaverse offers a second world beyond reality, where boundaries are non-existent, and possibilities are endless through engagement and immersive experiences using the virtual reality (VR) technology. Many disciplines can benefit from the advancement of the Metaverse when accurately developed, including the fields of technology, gaming, education, art, and culture. Nevertheless, developing the Metaverse environment to its full potential is an ambiguous task that needs proper guidance and directions. Existing surveys on the Metaverse focus only on a specific aspect and discipline of the Metaverse and lack a holistic view of the entire process. To this end, a more holistic, multi-disciplinary, in-depth, and academic and industry-oriented review is required to provide a thorough study of the Metaverse development pipeline. To address these issues, we present in this survey a novel multi-layered pipeline ecosystem composed of (1) the Metaverse computing, networking, communications and hardware infrastructure, (2) environment digitization, and (3) user interactions. For every layer, we discuss the components that detail the steps of its development. Also, for each of these components, we examine the impact of a set of enabling technologies and empowering domains (e.g., Artificial Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on its advancement. In addition, we explain the importance of these technologies to support decentralization, interoperability, user experiences, interactions, and monetization. Our presented study highlights the existing challenges for each component, followed by research directions and potential solutions. To the best of our knowledge, this survey is the most comprehensive and allows users, scholars, and entrepreneurs to get an in-depth understanding of the Metaverse ecosystem to find their opportunities and potentials for contribution

    The Viability and Potential Consequences of IoT-Based Ransomware

    Get PDF
    With the increased threat of ransomware and the substantial growth of the Internet of Things (IoT) market, there is significant motivation for attackers to carry out IoT-based ransomware campaigns. In this thesis, the viability of such malware is tested. As part of this work, various techniques that could be used by ransomware developers to attack commercial IoT devices were explored. First, methods that attackers could use to communicate with the victim were examined, such that a ransom note was able to be reliably sent to a victim. Next, the viability of using "bricking" as a method of ransom was evaluated, such that devices could be remotely disabled unless the victim makes a payment to the attacker. Research was then performed to ascertain whether it was possible to remotely gain persistence on IoT devices, which would improve the efficacy of existing ransomware methods, and provide opportunities for more advanced ransomware to be created. Finally, after successfully identifying a number of persistence techniques, the viability of privacy-invasion based ransomware was analysed. For each assessed technique, proofs of concept were developed. A range of devices -- with various intended purposes, such as routers, cameras and phones -- were used to test the viability of these proofs of concept. To test communication hijacking, devices' "channels of communication" -- such as web services and embedded screens -- were identified, then hijacked to display custom ransom notes. During the analysis of bricking-based ransomware, a working proof of concept was created, which was then able to remotely brick five IoT devices. After analysing the storage design of an assortment of IoT devices, six different persistence techniques were identified, which were then successfully tested on four devices, such that malicious filesystem modifications would be retained after the device was rebooted. When researching privacy-invasion based ransomware, several methods were created to extract information from data sources that can be commonly found on IoT devices, such as nearby WiFi signals, images from cameras, or audio from microphones. These were successfully implemented in a test environment such that ransomable data could be extracted, processed, and stored for later use to blackmail the victim. Overall, IoT-based ransomware has not only been shown to be viable but also highly damaging to both IoT devices and their users. While the use of IoT-ransomware is still very uncommon "in the wild", the techniques demonstrated within this work highlight an urgent need to improve the security of IoT devices to avoid the risk of IoT-based ransomware causing havoc in our society. Finally, during the development of these proofs of concept, a number of potential countermeasures were identified, which can be used to limit the effectiveness of the attacking techniques discovered in this PhD research

    Annual report of the officers of the town of Jackson, New Hampshire for the fiscal year ending December 31, 2022.

    Get PDF
    This is an annual report containing vital statistics for a town/city in the state of New Hampshire

    Corporate Social Responsibility: the institutionalization of ESG

    Get PDF
    Understanding the impact of Corporate Social Responsibility (CSR) on firm performance as it relates to industries reliant on technological innovation is a complex and perpetually evolving challenge. To thoroughly investigate this topic, this dissertation will adopt an economics-based structure to address three primary hypotheses. This structure allows for each hypothesis to essentially be a standalone empirical paper, unified by an overall analysis of the nature of impact that ESG has on firm performance. The first hypothesis explores the evolution of CSR to the modern quantified iteration of ESG has led to the institutionalization and standardization of the CSR concept. The second hypothesis fills gaps in existing literature testing the relationship between firm performance and ESG by finding that the relationship is significantly positive in long-term, strategic metrics (ROA and ROIC) and that there is no correlation in short-term metrics (ROE and ROS). Finally, the third hypothesis states that if a firm has a long-term strategic ESG plan, as proxied by the publication of CSR reports, then it is more resilience to damage from controversies. This is supported by the finding that pro-ESG firms consistently fared better than their counterparts in both financial and ESG performance, even in the event of a controversy. However, firms with consistent reporting are also held to a higher standard than their nonreporting peers, suggesting a higher risk and higher reward dynamic. These findings support the theory of good management, in that long-term strategic planning is both immediately economically beneficial and serves as a means of risk management and social impact mitigation. Overall, this contributes to the literature by fillings gaps in the nature of impact that ESG has on firm performance, particularly from a management perspective

    Exploring the Training Factors that Influence the Role of Teaching Assistants to Teach to Students With SEND in a Mainstream Classroom in England

    Get PDF
    With the implementation of inclusive education having become increasingly valued over the years, the training of Teaching Assistants (TAs) is now more important than ever, given that they work alongside pupils with special educational needs and disabilities (hereinafter SEND) in mainstream education classrooms. The current study explored the training factors that influence the role of TAs when it comes to teaching SEND students in mainstream classrooms in England during their one-year training period. This work aimed to increase understanding of how the training of TAs is seen to influence the development of their personal knowledge and professional skills. The study has significance for our comprehension of the connection between the TAs’ training and the quality of education in the classroom. In addition, this work investigated whether there existed a correlation between the teaching experience of TAs and their background information, such as their gender, age, grade level taught, years of teaching experience, and qualification level. A critical realist theoretical approach was adopted for this two-phased study, which involved the mixing of adaptive and grounded theories respectively. The multi-method project featured 13 case studies, each of which involved a trainee TA, his/her college tutor, and the classroom teacher who was supervising the trainee TA. The analysis was based on using semi-structured interviews, various questionnaires, and non-participant observation methods for each of these case studies during the TA’s one-year training period. The primary analysis of the research was completed by comparing the various kinds of data collected from the participants in the first and second data collection stages of each case. Further analysis involved cross-case analysis using a grounded theory approach, which made it possible to draw conclusions and put forth several core propositions. Compared with previous research, the findings of the current study reveal many implications for the training and deployment conditions of TAs, while they also challenge the prevailing approaches in many aspects, in addition to offering more diversified, enriched, and comprehensive explanations of the critical pedagogical issues

    Countermeasures for the majority attack in blockchain distributed systems

    Get PDF
    La tecnología Blockchain es considerada como uno de los paradigmas informáticos más importantes posterior al Internet; en función a sus características únicas que la hacen ideal para registrar, verificar y administrar información de diferentes transacciones. A pesar de esto, Blockchain se enfrenta a diferentes problemas de seguridad, siendo el ataque del 51% o ataque mayoritario uno de los más importantes. Este consiste en que uno o más mineros tomen el control de al menos el 51% del Hash extraído o del cómputo en una red; de modo que un minero puede manipular y modificar arbitrariamente la información registrada en esta tecnología. Este trabajo se enfocó en diseñar e implementar estrategias de detección y mitigación de ataques mayoritarios (51% de ataque) en un sistema distribuido Blockchain, a partir de la caracterización del comportamiento de los mineros. Para lograr esto, se analizó y evaluó el Hash Rate / Share de los mineros de Bitcoin y Crypto Ethereum, seguido del diseño e implementación de un protocolo de consenso para controlar el poder de cómputo de los mineros. Posteriormente, se realizó la exploración y evaluación de modelos de Machine Learning para detectar software malicioso de tipo Cryptojacking.DoctoradoDoctor en Ingeniería de Sistemas y Computació

    Victims' Access to Justice in Trinidad and Tobago: An exploratory study of experiences and challenges of accessing criminal justice in a post-colonial society

    Get PDF
    This thesis investigates victims' access to justice in Trinidad and Tobago, using their own narratives. It seeks to capture how their experiences affected their identities as victims and citizens, alongside their perceptions of legitimacy regarding the criminal justice system. While there have been some reforms in the administration of criminal justice in Trinidad and Tobago, such reforms have not focused on victims' accessibility to the justice system. Using grounded theory methodology, qualitative data was collected through 31 in-depth interviews with victims and victim advocates. The analysis found that victims experienced interpersonal, structural, and systemic barriers at varying levels throughout the criminal justice system, which manifested as institutionalized secondary victimization, silencing and inequality. This thesis argues that such experiences not only served to appropriate conflict but demonstrates that access is often given in a very narrow sense. Furthermore, it shows a failure to encompass access to justice as appropriated conflicts are left to stagnate in the system as there is often very little resolution. Adopting a postcolonial lens to analyse victims' experiences, the analysis identified othering practices that served to institutionalize the vulnerability and powerlessness associated with victim identities. Here, it is argued that these othering practices also affected the rights consciousness of victims, delegitimating their identities as citizens. Moreover, as a result of their experiences, victims had mixed perceptions of the justice system. It is argued that while the system is a legitimate authority victims' endorsement of the system is questionable, therefore victims' experiences suggest that there is a reinforcement of the system's legal hegemony. The findings suggest that within the legal system of Trinidad and Tobago, legacies of colonialism shape the postcolonial present as the psychology and inequalities of the past are present in the interactions and processes of justice. These findings are relevant for policymakers in Trinidad and Tobago and other regions. From this study it is recognized that, to improve access to justice for victims, there needs to be a move towards victim empowerment that promotes resilience and enhances social capital. Going forward it is noted that there is a need for further research

    EVALUACIÓN ANALGÉSICA PERIOPERATORIA DEL ACETAMINOFÉN EN PERRAS SOMETIDAS A OVARIOHISTERECTOMÍA ELECTIVA

    Get PDF
    Tesis de doctorado que evalúa el efecto analgésico del acetaminofén en perras ovarihisterectomizadas.La administración de analgésicos antiinflamatorios no esteroidales (AINES) para el control del dolor post-quirúrgico en perros es una práctica común, debido a sus efectos analgésicos, antiinflamatorios y antipiréticos. En el presente trabajo se realizaron dos estudios. En el experimento 1, el objetivo fue evaluar la analgesia post-operatoria del acetaminofén (paracetamol) a través de la utilización de las escalas de reconocimiento clínico del dolor DIVAS (Escala Dinámica e Interactiva Analógica Visual) y UMPS (Escala de la Universidad de Melbourne), en perras sometidas a ovariohisterectomía electiva. Además de valorar la seguridad y eficacia clínica del uso del acetaminofén en perros mediante pruebas de funcionamiento hepático y renal en el post-operatorio inmediato. Para ello, se utilizaron 30 perras de diferentes razas que fueron asignadas aleatoriamente a uno de los tres grupos de tratamiento: acetaminofén [GACET; n=10, 15 mg kg-1 intravenoso (IV)], carprofeno (GCARP; n=10, 4 mg kg-1 IV) y meloxicam (GMELOX; n=10, 0.2 mg kg-1 IV). Todos los tratamientos se administraron 30 minutos antes de la cirugía y posterior a esta durante 48 horas. En este período el acetaminofén se administró por vía oral cada 8 horas (15 mg kg-1); el carprofeno (4 mg kg-1) y el meloxicam (0.1 mg kg-1) se administraron por vía IV cada 24 horas. Durante el postoperatorio, los sistemas de puntuación del dolor DIVAS y UMPS fueron medidos a las 1, 2, 4, 6, 8, 12, 16, 20, 24, 36 y 48 horas post-cirugía. Para evaluar la seguridad clínica de los tratamientos, se recolectaron muestras de sangre de la vena yugular para realizar la medición de enzimas ALT, AST, ALP, y los metabolitos bilirrubina directa, bilirrubina indirecta, bilirrubina total, creatinina, urea, albúmina y glucosa. Esto fue realizado en T0 (pre-anestesia; TBASAL), 48 y 96 horas después de la cirugía (T48, T96). Los resultados indican que en la evaluación clínica del dolor de todos los grupos de estudio, hubo una reducción gradual en la percepción del mismo durante el postoperatorio en ambos sistemas de puntuación; no obstante, también fue observado que ninguna escala difirió significativamente entre los tres grupos de tratamiento (P>0.05) en cada momento de evaluación durante las 48 horas post-cirugía. En cuanto a los parámetros bioquímico séricos, sólo la ALT aumentó significativamente en T96 en el GACET y GCARP con respecto a los valores basales (P<0.01). El resto de los analitos séricos evaluados se mantuvo en rangos normales. En el experimento 2 bajo el mismo diseño experimental de tratamientos administrados, el objetivo fue evaluar el efecto analgésico perioperatorio del acetaminofén 2 administrado pre y post-quirúrgicamente en perras sometidas a ovariohisterectomía electiva a través de la medición del índice de la actividad del tono parasimpático (PTA). Este parámetro hemodinámico fue medido 60 minutos antes de la cirugía (TBASAL) y durante el transquirúrgico en la aplicación de estímulos nociceptivos: colocación de las pinzas de campo backhouse (TPINZ), incisión de piel y abordaje quirúrgico primario (TINC), ligadura y extracción de pedículo ovárico izquierdo (TOVI) y derecho (TOVD), ligadura y transfixión del cuello uterino (TLIGUT), sección quirúrgica del cuello uterino (TCUT), reconstrucción de peritoneo y planos anatómicos musculares (TMUSC) y sutura de piel (TSUT). Durante el postoperatorio, el índice PTA fue valorado a las 1, 2, 4, 6, 8, 12, 16, 20, 24, 36 y 48 horas, en los mismos tiempos en que fueron evaluadas las escalas de reconocimiento de dolor DIVAS y UMPS. Los resultados obtenidos en la medición del índice PTA basal para GACET fue 65 ± 8, para GCARP 65 ± 7 y para GMELOX 62 ± 5. Durante los diferentes tiempos transquirúrgicos, los valores promedio de índice PTA indican que GACET (76 ± 14) y GMELOX (72 ± 18) muestran tendencia a manifestar mayores niveles en comparación con GCARP (62 ± 13) desde el inicio del procedimiento quirúrgico sin que esto pudiera comprobarse estadísticamente, ya que no hubo diferencias significativas entre grupos de tratamiento ni entre los tiempos quirúrgicos evaluados (P>0.05). En el postoperatorio, el índice PTA fue de 65 ± 9 en el GACET, 63 ± 8 en el GCARP y 65 ± 8 en el GMELOX. Los resultados tampoco mostraron diferencias estadísticamente significativas con los valores basales o entre los tratamientos (P>0.05). El índice PTA postoperatorio mostró una sensibilidad del 40%, especificidad del 98.46% y valor predictivo negativo del 99.07% con respecto a la escala validada de UMPS. En conclusión, el acetaminofén puede considerarse una herramienta para el tratamiento efectivo del dolor perioperatorio agudo en perros, ya que mostró la misma eficacia clínica que el meloxicam y el carprofeno para la analgesia postquirúrgica en perras sometidas a ovariohisterectomía electiva. Además, la evidencia del uso de este medicamento no condujo a reacciones adversas o cambios en los parámetros evaluados, lo que indica su seguridad clínica. Finalmente, destacar que el índice PTA representa una medición objetiva del comfort y analgesia postoperatoria, por lo que es una herramienta que podría ayudar a predecir las respuestas hemodinámicas asociadas con el dolor
    corecore