3,267 research outputs found
PROFET: modeling system performance and energy without simulating the CPU
The approaching end of DRAM scaling and expansion of emerging memory technologies is motivating a lot of research in future memory systems. Novel memory systems are typically explored by hardware simulators that are slow and often have a simplified or obsolete abstraction of the CPU. This study presents PROFET, an analytical model that predicts how an application's performance and energy consumption changes when it is executed on different memory systems. The model is based on instrumentation of an application execution on actual hardware, so it already takes into account CPU microarchitectural details such as the data prefetcher and out-of-order engine. PROFET is evaluated on two real platforms: Sandy Bridge-EP E5-2670 and Knights Landing Xeon Phi platforms with various memory configurations. The evaluation results show that PROFET's predictions are accurate, typically with only 2% difference from the values measured on actual hardware. We release the PROFET source code and all input data required for memory system and application profiling. The released package can be seamlessly installed and used on high-end Intel platforms.Peer ReviewedPostprint (author's final draft
Do You See It Clearly? The Effect of Packaging and Label Format on Google Ads
The nature of e-commerce prevents the perception of the intrinsic and sensory attributes of wine. In the virtual environment, visual cues allow consumers to perceive the product, determine their attitude and form a preference. Users will choose one product or another based on the visual appeal of the advertisements they have seen. Wine marketers must consider the importance of the advertisement elements and attract the consumer's attention. Optimizing the elements included in these messages can help capture consumers' attention and achieve a higher click-through rate on the ads. The main objective of this work is to analyse the awareness that different advertisements achieve. Specifically, we use a 2 x 2 x 2 experimental design where we manipulate the packaging format (single bottle vs. pack), labelling (bottle without label vs. labelled bottle) for wine ads (white and red). To analyse attention, we used an eye-tracking methodology. The main results suggest that attention is captured more quickly with an individual bottle without a label than with a particular bottle with a label in Google ads. However, ads showing packs of bottles with labels get more attention than ads using packs of bottles without labels.The University of Cadiz funded this Research, grant number PR2017-039 of Plan Propio Project and was supported by the Institute of Research and Development Social and Sustainability (INDESS)
Modeling of transient heat pipe operation
The overall goal is to gain a better understanding of the transient behavior of heat pipes operating under both normal and adverse conditions. Normal operation refers to cases where the capillary structure remains fully wetted. Adverse operation occurs when drying, re-wetting, choking, noncontinuum flow, freezing, thawing etc., occur within the heat pipe. The work was redirected towards developing the capability to predict operational behavior of liquid metal heat pipes used for cooling aerodynamic structures. Of particular interest is the startup of such heat pipes from an initially frozen state such as might occur during re-entry of a space vehicle into the Earth's atmosphere or during flight of hypersonic aircraft
Recommended from our members
A case study of cognitive style in a collaboratively structured management class.
The use of collaborative methods in the college classroom is increasing in popularity due to an interest in more active forms of learning, increased recognition of the value of the experience of adult students, and the demand by organizations for workers who can work productively in a group. The purpose of this case study was to look at collaborative learning from the perspective of one aspect of student differences--cognitive style as defined by Witkin\u27s field-independence and field-dependence. This research involved the analysis of data obtained from interviews, classroom observations, student evaluations, and questionnaires from 28 management students from Quinsigamond Community College. Analysis of the data, through qualitative and quantitative methods, revealed that in this study cognitive style did not make a difference in student perceptions of the effectiveness of the instructor or of a group based learning methodology. Field-independent students described their behavior more in terms of task roles, while field-dependent students reported themselves more in terms of maintenance roles. While field-dependent students in this study seemed to place a value on the sharing of tangible resources and the social aspects of the collaborative experience, the field-independent students were more apt to lead the discussion by asking questions that stimulated the collaborative conversations. There was no statistical difference between five prior years of non-collaborative student evaluations of this teacher and those of the collaborative class, nor did cognitive style seem to make a difference in the way that the students evaluated the instructor. The data on cognitive style and the students\u27 satisfaction with the method of reaching consensus were inconclusive due to a lack of agreement on the construct of consensus within collaborative learning and limitations in the methodology. Field-dependent, field-independent and mixed cognitive style students all rated the field-dependent students as the most helpful to their own learning. Replication on a larger scale or with an emphasis on other aspects of individual student differences such as race, gender, age, grade point average etc., was recommended
Definition study for photovoltaic residential prototype system
A site evaluation was performed to assess the relative merits of different regions of the country in terms of the suitability for experimental photovoltaic powered residences. Eight sites were selected based on evaluation criteria which included population, photovoltaic systems performance and the cost of electrical energy. A parametric sensitivity analysis was performed for four selected site locations. Analytical models were developed for four different power system implementation approaches. Using the model which represents a direct (or float) charge system implementation the performance sensitivity to the following parameter variations is reported: (1) solar roof slope angle; (2) ratio of the number of series cells in the solar array to the number of series cells in the lead-acid battery; and (3) battery size. For a Cleveland site location, a system with no on site energy storage and with a maximum power tracking inverter which feeds back excess power to the utility was shown to have 19 percent greater net system output than the second place system. The experiment test plan is described. The load control and data acquisition system and the data display panel for the residence are discussed
An Efficient Key Management Scheme For In-Vehicle Network
Vehicle technology has developed rapidly these years, however, the security
measures for in-vehicle network does not keep up with the trend. Controller
area network(CAN) is the most used protocol in the in-vehicle network. With the
characteristic of CAN, there exists many vulnerabilities including lacks of
integrity and confidentiality, and hence CAN is vulnerable to various attacks
such as impersonation attack, replay attack, etc. In order to implement the
authentication and encryption, secret key derivation is necessary. In this
work, we proposed an efficient key management scheme for in-vehicle network. In
particular, the scheme has five phases. In the first and second phase, we
utilize elliptic curve cryptography-based key encapsulation mechanism(KEM) to
derive a pairwise secret between each ECU and a central secure ECU in the same
group. Then in the third phase, we design secure communication to derive group
shared secret among all ECU in a group. In the last two phases, SECU is not
needed, regular ECU can derive session key on their own. We presented a
possible attack analysis(chosen-ciphertext attack as the main threat) and a
security property analysis for our scheme. Our scheme is evaluated based on a
hardware-based experiment of three different microcontrollers and a
software-based simulation of IVNS. We argue that based on our estimation and
the experiment result, our scheme performs better in communication and
computation overhead than similar works
How do Securities Laws Influence Affect, Happiness, & Trust?
This Article advocates that securities regulators promulgate rules based upon taking into consideration their impacts upon investors\u27 and others\u27 affect, happiness, and trust. Examples of these impacts are consumer optimism, financial stress, anxiety over how thoroughly securities regulators deliberate over proposed rules, investor confidence in securities disclosures, market exuberance, social moods, and subjective well-being. These variables affect and are affected by traditional financial variables, such as consumer debt, expenditures, and wealth; corporate investment; initial public offerings; and securities market demand, liquidity, prices, supply, and volume. This Article proposes that securities regulators can and should evaluate rules based upon measures of affect, happiness, and trust in addition to standard observable financial variables. This Article concludes that the organic statutes of the United States Securities and Exchange Commission are indeterminate despite mandating that federal securities laws consider efficiency among other goals. This Article illustrates analysis of affective impacts of these financial regulatory policies: mandatory securities disclosures; gun-jumping rules for publicly registered offerings; financial education or literacy campaigns; statutory or judicial default rules and menus; and continual reassessment and revision of rules. These regulatory policies impact and are impacted by investors\u27 and other people\u27s affect, happiness, and trust. Thus, securities regulators can and should evaluate such affective impacts to design effective legal policy
- …