-
Metaverse Perspectives from Japan: A Participatory Speculative Design Case Study
Authors:
Michel Hohendanner,
Chiara Ullstein,
Doh** Miyamoto,
Emma Fukuwatari Huffman,
Gudrun Socher,
Jens Grossklags,
Hirotaka Osawa
Abstract:
Currently, the development of the metaverse lies in the hands of industry. Citizens have little influence on this process. Instead, to do justice to the pluralism of (digital) societies, we should strive for an open discourse including many different perspectives on the metaverse and its core technologies such as AI. We utilize a participatory speculative design (PSD) approach to explore Japanese…
▽ More
Currently, the development of the metaverse lies in the hands of industry. Citizens have little influence on this process. Instead, to do justice to the pluralism of (digital) societies, we should strive for an open discourse including many different perspectives on the metaverse and its core technologies such as AI. We utilize a participatory speculative design (PSD) approach to explore Japanese citizens' perspectives on future metaverse societies, as well as social and ethical implications. Our contributions are twofold. Firstly, we demonstrate the effectiveness of PSD in engaging citizens in critical discourse on emerging technologies like the metaverse, offering our workshop framework as a methodological contribution. Secondly, we identify key themes from participants' perspectives, providing insights for culturally sensitive design and development of virtual environments. Our analysis shows that participants imagine the metaverse to have the potential to solve a variety of societal issues; for example, breaking down barriers of physical environments for communication, social interaction, crisis preparation, and political participation, or tackling identity-related issues. Regarding future metaverse societies, participants' imaginations raise critical questions about human-AI relations, technical solutionism, politics and technology, globalization and local cultures, and immersive technologies. We discuss implications and contribute to expanding conversations on metaverse developments.
△ Less
Submitted 30 January, 2024;
originally announced January 2024.
-
Lie groupoids determined by their orbit spaces
Authors:
David Miyamoto
Abstract:
Given a Lie groupoid, we can form its orbit space, which carries a natural diffeology. More generally, we have a quotient functor from the Hilsum-Skandalis category of Lie groupoids to the category of diffeological spaces. We introduce the notion of a lift-complete Lie groupoid, and show that the quotient functor restricts to an equivalence of the categories: of lift-complete Lie groupoids with is…
▽ More
Given a Lie groupoid, we can form its orbit space, which carries a natural diffeology. More generally, we have a quotient functor from the Hilsum-Skandalis category of Lie groupoids to the category of diffeological spaces. We introduce the notion of a lift-complete Lie groupoid, and show that the quotient functor restricts to an equivalence of the categories: of lift-complete Lie groupoids with isomorphism classes of surjective submersive bibundles as arrows, and of quasi-étale diffeological spaces with surjective local subductions as arrows. In particular, the Morita equivalence class of a lift-complete Lie groupoid, alternatively a lift-complete differentiable stack, is determined by its diffeological orbit space. Examples of lift-complete Lie groupoids include quasifold groupoids and étale holonomy groupoids of Riemannian foliations.
△ Less
Submitted 22 March, 2024; v1 submitted 18 October, 2023;
originally announced October 2023.
-
Riemannian foliations and quasifolds
Authors:
Yi Lin,
David Miyamoto
Abstract:
It is well known that, by the Reeb stability theorem, the leaf space of a Riemannian foliation with compact leaves is an orbifold. We prove that, under mild completeness conditions, the leaf space of a Killing Riemannian foliation is a diffeological quasifold: as a diffeological space, it is locally modelled by quotients of Cartesian space by countable groups acting affinely. Furthermore, we prove…
▽ More
It is well known that, by the Reeb stability theorem, the leaf space of a Riemannian foliation with compact leaves is an orbifold. We prove that, under mild completeness conditions, the leaf space of a Killing Riemannian foliation is a diffeological quasifold: as a diffeological space, it is locally modelled by quotients of Cartesian space by countable groups acting affinely. Furthermore, we prove that the holonomy groupoid of the foliation is, locally, Morita equivalent to the action groupoid of a countable group acting affinely on Cartesian space.
△ Less
Submitted 26 September, 2023;
originally announced September 2023.
-
Singular foliations through diffeology
Authors:
David Miyamoto
Abstract:
A singular foliation is a partition of a manifold into leaves of perhaps varying dimension. Stefan and Sussmann carried out fundamental work on singular foliations in the 1970s. We survey their contributions, show how diffeological objects and ideas arise naturally in this setting, and highlight some consequences within diffeology. We then introduce a definition of transverse equivalence of singul…
▽ More
A singular foliation is a partition of a manifold into leaves of perhaps varying dimension. Stefan and Sussmann carried out fundamental work on singular foliations in the 1970s. We survey their contributions, show how diffeological objects and ideas arise naturally in this setting, and highlight some consequences within diffeology. We then introduce a definition of transverse equivalence of singular foliations, following Molino's definition for regular foliations. We show that, whereas transverse equivalent singular foliations always have diffeologically diffeomorphic leaf spaces, the converse holds only for certain classes of singular foliations. We finish by showing that the basic cohomology of a singular foliation is invariant under transverse equivalence.
△ Less
Submitted 13 March, 2023;
originally announced March 2023.
-
Quasifold groupoids and diffeological quasifolds
Authors:
Yael Karshon,
David Miyamoto
Abstract:
Quasifolds are spaces that are locally modelled by quotients of $\mathbb{R}^n$ by countable affine group actions. These spaces first appeared in Elisa Prato's generalization of the Delzant construction, and special cases include leaf spaces of irrational linear flows on the torus, and orbifolds. We consider the category of diffeological quasifolds, which embeds in the category of diffeological spa…
▽ More
Quasifolds are spaces that are locally modelled by quotients of $\mathbb{R}^n$ by countable affine group actions. These spaces first appeared in Elisa Prato's generalization of the Delzant construction, and special cases include leaf spaces of irrational linear flows on the torus, and orbifolds. We consider the category of diffeological quasifolds, which embeds in the category of diffeological spaces, and the bicategory of quasifold groupoids, which embeds in the bicategory of Lie groupoids, bibundles, and bibundle morphisms. We prove that, restricting to those morphisms that are locally invertible, and to quasifold groupoids that are effective, the functor taking a quasifold groupoid to its diffeological orbit space is an equivalence of the underlying categories. These results complete and extend earlier work with Masrour Zoghi.
△ Less
Submitted 29 June, 2022;
originally announced June 2022.
-
Diffeological submanifolds and their friends
Authors:
Yael Karshon,
David Miyamoto,
Jordan Watts
Abstract:
A smooth manifold hosts different types of submanifolds, including embedded, weakly-embedded, and immersed submanifolds. The notion of an immersed submanifold requires additional structure (namely, the choice of a topology); when this additional structure is unique, we call the subset a uniquely immersed submanifold. Diffeology provides yet another intrinsic notion of submanifold: a diffeological…
▽ More
A smooth manifold hosts different types of submanifolds, including embedded, weakly-embedded, and immersed submanifolds. The notion of an immersed submanifold requires additional structure (namely, the choice of a topology); when this additional structure is unique, we call the subset a uniquely immersed submanifold. Diffeology provides yet another intrinsic notion of submanifold: a diffeological submanifold.
We show that from a categorical perspective diffeology rises above the others: viewing manifolds as a concrete category over the category of sets, the initial morphisms are exactly the (diffeological) inductions, which are the diffeomorphisms with diffeological submanifolds. Moreover, if we view manifolds as a concrete category over the category of topological spaces, we recover Joris and Preissmann's notion of pseudo-immersions.
We show that these notions are all different. In particular, a theorem of Joris from 1982 yields a diffeological submanifold whose inclusion is not an immersion, answering a question that was posed by Iglesias-Zemmour. We also characterize local inductions as those pseudo-immersions that are locally injective.
In appendices, we review a proof of Joris' theorem, pointing at a flaw in one of the several other proofs that occur in the literature, and we illustrate how submanifolds inherit paracompactness from their ambient manifold.
△ Less
Submitted 21 April, 2022;
originally announced April 2022.
-
mdx: A Cloud Platform for Supporting Data Science and Cross-Disciplinary Research Collaborations
Authors:
Toyotaro Suzumura,
Akiyoshi Sugiki,
Hiroyuki Takizawa,
Akira Imakura,
Hiroshi Nakamura,
Kenjiro Taura,
Tomohiro Kudoh,
Toshihiro Hanawa,
Yuji Sekiya,
Hiroki Kobayashi,
Shin Matsushima,
Yohei Kuga,
Ryo Nakamura,
Renhe Jiang,
Junya Kawase,
Masatoshi Hanai,
Hiroshi Miyazaki,
Tsutomu Ishizaki,
Daisuke Shimotoku,
Daisuke Miyamoto,
Kento Aida,
Atsuko Takefusa,
Takashi Kurimoto,
Koji Sasayama,
Naoya Kitagawa
, et al. (8 additional authors not shown)
Abstract:
The growing amount of data and advances in data science have created a need for a new kind of cloud platform that provides users with flexibility, strong security, and the ability to couple with supercomputers and edge devices through high-performance networks. We have built such a nation-wide cloud platform, called "mdx" to meet this need. The mdx platform's virtualization service, jointly operat…
▽ More
The growing amount of data and advances in data science have created a need for a new kind of cloud platform that provides users with flexibility, strong security, and the ability to couple with supercomputers and edge devices through high-performance networks. We have built such a nation-wide cloud platform, called "mdx" to meet this need. The mdx platform's virtualization service, jointly operated by 9 national universities and 2 national research institutes in Japan, launched in 2021, and more features are in development. Currently mdx is used by researchers in a wide variety of domains, including materials informatics, geo-spatial information science, life science, astronomical science, economics, social science, and computer science. This paper provides an the overview of the mdx platform, details the motivation for its development, reports its current status, and outlines its future plans.
△ Less
Submitted 26 March, 2022;
originally announced March 2022.
-
Classification of URL bitstreams using Bag of Bytes
Authors:
Keiichi Shima,
Daisuke Miyamoto,
Hiroshi Abe,
Tomohiro Ishihara,
Kazuya Okada,
Yuji Sekiya,
Hirochika Asai,
Yusuke Doi
Abstract:
Protecting users from accessing malicious web sites is one of the important management tasks for network operators. There are many open-source and commercial products to control web sites users can access. The most traditional approach is blacklist-based filtering. This mechanism is simple but not scalable, though there are some enhanced approaches utilizing fuzzy matching technologies. Other appr…
▽ More
Protecting users from accessing malicious web sites is one of the important management tasks for network operators. There are many open-source and commercial products to control web sites users can access. The most traditional approach is blacklist-based filtering. This mechanism is simple but not scalable, though there are some enhanced approaches utilizing fuzzy matching technologies. Other approaches try to use machine learning (ML) techniques by extracting features from URL strings. This approach can cover a wider area of Internet web sites, but finding good features requires deep knowledge of trends of web site design. Recently, another approach using deep learning (DL) has appeared. The DL approach will help to extract features automatically by investigating a lot of existing sample data. Using this technique, we can build a flexible filtering decision module by keep teaching the neural network module about recent trends, without any specific expert knowledge of the URL domain. In this paper, we apply a mechanical approach to generate feature vectors from URL strings. We implemented our approach and tested with realistic URL access history data taken from a research organization and data from the famous archive site of phishing site information, PhishTank.com. Our approach achieved 2~3% better accuracy compared to the existing DL-based approach.
△ Less
Submitted 11 November, 2021;
originally announced November 2021.
-
Classifying DNS Servers based on Response Message Matrix using Machine Learning
Authors:
Keiichi Shima,
Ryo Nakamura,
Kazuya Okada,
Tomohiro Ishihara,
Daisuke Miyamoto,
Yuji Sekiya
Abstract:
Improperly configured domain name system (DNS) servers are sometimes used as packet reflectors as part of a DoS or DDoS attack. Detecting packets created as a result of this activity is logically possible by monitoring the DNS request and response traffic. Any response that does not have a corresponding request can be considered a reflected message; checking and tracking every DNS packet, however,…
▽ More
Improperly configured domain name system (DNS) servers are sometimes used as packet reflectors as part of a DoS or DDoS attack. Detecting packets created as a result of this activity is logically possible by monitoring the DNS request and response traffic. Any response that does not have a corresponding request can be considered a reflected message; checking and tracking every DNS packet, however, is a non-trivial operation. In this paper, we propose a detection mechanism for DNS servers used as reflectors by using a DNS server feature matrix built from a small number of packets and a machine learning algorithm. The F1 score of bad DNS server detection was more than 0.9 when the test and training data are generated within the same day, and more than 0.7 for the data not used for the training and testing phase of the same day.
△ Less
Submitted 9 November, 2021;
originally announced November 2021.
-
The Basic de Rham Complex of a Singular Foliation
Authors:
David Miyamoto
Abstract:
A singular foliation $\mathcal F$ gives a partition of a manifold $M$ into leaves whose dimension may vary. Associated to a singular foliation are two complexes, that of the diffeological differential forms on the leaf space $M / \mathcal F$, and that of the basic differential forms on $M$. We prove the pullback by the quotient map provides an isomorphism of these complexes in the following cases:…
▽ More
A singular foliation $\mathcal F$ gives a partition of a manifold $M$ into leaves whose dimension may vary. Associated to a singular foliation are two complexes, that of the diffeological differential forms on the leaf space $M / \mathcal F$, and that of the basic differential forms on $M$. We prove the pullback by the quotient map provides an isomorphism of these complexes in the following cases: when $\mathcal F$ is a regular foliation, when points in the leaves of the same dimension assemble into an embedded (more generally, diffeological) submanifold of $M$, and, as a special case of the latter, when $\mathcal F$ is induced by a linearizable Lie groupoid.
△ Less
Submitted 10 June, 2021; v1 submitted 19 February, 2021;
originally announced February 2021.
-
Attributes affecting user decision to adopt a Virtual Private Network (VPN) app
Authors:
Nissy Sombatruang,
Tan Omiya,
Daisuke Miyamoto,
M. Angela Sasse,
Youki Kadobayashi,
Michelle Baddeley
Abstract:
A Virtual Private Network (VPN) helps to mitigate security and privacy risks of data transmitting on unsecured network such as public Wi-Fi. However, despite awareness of public Wi-Fi risks becoming increasingly common, the use of VPN when using public Wi-Fi is low. To increase adoption, understanding factors driving user decision to adopt a VPN app is an important first step. This study is the fi…
▽ More
A Virtual Private Network (VPN) helps to mitigate security and privacy risks of data transmitting on unsecured network such as public Wi-Fi. However, despite awareness of public Wi-Fi risks becoming increasingly common, the use of VPN when using public Wi-Fi is low. To increase adoption, understanding factors driving user decision to adopt a VPN app is an important first step. This study is the first to achieve this objective using discrete choice experiments (DCEs) to elicit individual preferences of specific attributes of a VPN app. The experiments were run in the United Kingdom (UK) and Japan (JP). We first interviewed participants (15 UK, 17 JP) to identify common attributes of a VPN app which they considered important. The results were used to design and run a DCE in each country. Participants (149 UK, 94 JP) were shown a series of two hypothetical VPN apps, varying in features, and were asked to choose one which they preferred. Customer review rating, followed by price of a VPN app, significantly affected the decision to choose which VPN app to download and install. A change from a rating of 3 to 4-5 stars increased the probability of choosing an app by 33% in the UK and 14% in Japan. Unsurprisingly, price was a deterrent. Recommendations by friends, source of product reviews, and the presence of in-app ads also played a role but to a lesser extent. To actually use a VPN app, participants considered Internet speed, connection stability, battery level on mobile devices, and the presence of in-app ads as key drivers. Participants in the UK and in Japan prioritized these attributes differently, suggesting possible influences from cultural differences.
△ Less
Submitted 15 August, 2020;
originally announced August 2020.
-
Application of a Self-Organizing State Space Model to the Leonid Meteor Storm in 2001
Authors:
Tsutomu T. Takeuchi,
Shigetomo Shiki,
Daisuke Miyamoto,
Hideaki Fujiwara,
Jun Kitazume,
Yousuke Utsumi
Abstract:
The Leonids show meteor storms in a period of 33 years, and known as one of the most active meteor showers. It has recently shown a meteor stream consisting of several narrow dust trails made by meteoroids ejected from a parent comet. Hence, an analysis of the temporal behavior of the meteor flux is important to study the structure of the trails. However, statistical inference for the count data i…
▽ More
The Leonids show meteor storms in a period of 33 years, and known as one of the most active meteor showers. It has recently shown a meteor stream consisting of several narrow dust trails made by meteoroids ejected from a parent comet. Hence, an analysis of the temporal behavior of the meteor flux is important to study the structure of the trails. However, statistical inference for the count data is not an easy task, because of its Poisson characteristics. We carried out a wide-field video observation of the Leonid meteor storm in 2001. We formulated a state-of-the-art statistical analysis, which is called a self-organizing state space model, to infer the true behavior of the dust density of the trails properly from the meteor count data. {}From this analysis, we found that the trails have a fairly smooth spatial structure, with small and dense clumps that cause a temporal burst of meteor flux. We also proved that the time behavior (trend) of the fluxes of bright meteors and that of faint meteors are significantly different. In addition we comment on some other application of the self-organizing state-space model in fields related to astronomy and astrophysics.
△ Less
Submitted 21 October, 2012;
originally announced October 2012.