3,267 research outputs found

    PROFET: modeling system performance and energy without simulating the CPU

    Get PDF
    The approaching end of DRAM scaling and expansion of emerging memory technologies is motivating a lot of research in future memory systems. Novel memory systems are typically explored by hardware simulators that are slow and often have a simplified or obsolete abstraction of the CPU. This study presents PROFET, an analytical model that predicts how an application's performance and energy consumption changes when it is executed on different memory systems. The model is based on instrumentation of an application execution on actual hardware, so it already takes into account CPU microarchitectural details such as the data prefetcher and out-of-order engine. PROFET is evaluated on two real platforms: Sandy Bridge-EP E5-2670 and Knights Landing Xeon Phi platforms with various memory configurations. The evaluation results show that PROFET's predictions are accurate, typically with only 2% difference from the values measured on actual hardware. We release the PROFET source code and all input data required for memory system and application profiling. The released package can be seamlessly installed and used on high-end Intel platforms.Peer ReviewedPostprint (author's final draft

    Do You See It Clearly? The Effect of Packaging and Label Format on Google Ads

    Get PDF
    The nature of e-commerce prevents the perception of the intrinsic and sensory attributes of wine. In the virtual environment, visual cues allow consumers to perceive the product, determine their attitude and form a preference. Users will choose one product or another based on the visual appeal of the advertisements they have seen. Wine marketers must consider the importance of the advertisement elements and attract the consumer's attention. Optimizing the elements included in these messages can help capture consumers' attention and achieve a higher click-through rate on the ads. The main objective of this work is to analyse the awareness that different advertisements achieve. Specifically, we use a 2 x 2 x 2 experimental design where we manipulate the packaging format (single bottle vs. pack), labelling (bottle without label vs. labelled bottle) for wine ads (white and red). To analyse attention, we used an eye-tracking methodology. The main results suggest that attention is captured more quickly with an individual bottle without a label than with a particular bottle with a label in Google ads. However, ads showing packs of bottles with labels get more attention than ads using packs of bottles without labels.The University of Cadiz funded this Research, grant number PR2017-039 of Plan Propio Project and was supported by the Institute of Research and Development Social and Sustainability (INDESS)

    Modeling of transient heat pipe operation

    Get PDF
    The overall goal is to gain a better understanding of the transient behavior of heat pipes operating under both normal and adverse conditions. Normal operation refers to cases where the capillary structure remains fully wetted. Adverse operation occurs when drying, re-wetting, choking, noncontinuum flow, freezing, thawing etc., occur within the heat pipe. The work was redirected towards developing the capability to predict operational behavior of liquid metal heat pipes used for cooling aerodynamic structures. Of particular interest is the startup of such heat pipes from an initially frozen state such as might occur during re-entry of a space vehicle into the Earth's atmosphere or during flight of hypersonic aircraft

    Definition study for photovoltaic residential prototype system

    Get PDF
    A site evaluation was performed to assess the relative merits of different regions of the country in terms of the suitability for experimental photovoltaic powered residences. Eight sites were selected based on evaluation criteria which included population, photovoltaic systems performance and the cost of electrical energy. A parametric sensitivity analysis was performed for four selected site locations. Analytical models were developed for four different power system implementation approaches. Using the model which represents a direct (or float) charge system implementation the performance sensitivity to the following parameter variations is reported: (1) solar roof slope angle; (2) ratio of the number of series cells in the solar array to the number of series cells in the lead-acid battery; and (3) battery size. For a Cleveland site location, a system with no on site energy storage and with a maximum power tracking inverter which feeds back excess power to the utility was shown to have 19 percent greater net system output than the second place system. The experiment test plan is described. The load control and data acquisition system and the data display panel for the residence are discussed

    An Efficient Key Management Scheme For In-Vehicle Network

    Full text link
    Vehicle technology has developed rapidly these years, however, the security measures for in-vehicle network does not keep up with the trend. Controller area network(CAN) is the most used protocol in the in-vehicle network. With the characteristic of CAN, there exists many vulnerabilities including lacks of integrity and confidentiality, and hence CAN is vulnerable to various attacks such as impersonation attack, replay attack, etc. In order to implement the authentication and encryption, secret key derivation is necessary. In this work, we proposed an efficient key management scheme for in-vehicle network. In particular, the scheme has five phases. In the first and second phase, we utilize elliptic curve cryptography-based key encapsulation mechanism(KEM) to derive a pairwise secret between each ECU and a central secure ECU in the same group. Then in the third phase, we design secure communication to derive group shared secret among all ECU in a group. In the last two phases, SECU is not needed, regular ECU can derive session key on their own. We presented a possible attack analysis(chosen-ciphertext attack as the main threat) and a security property analysis for our scheme. Our scheme is evaluated based on a hardware-based experiment of three different microcontrollers and a software-based simulation of IVNS. We argue that based on our estimation and the experiment result, our scheme performs better in communication and computation overhead than similar works

    How do Securities Laws Influence Affect, Happiness, & Trust?

    Get PDF
    This Article advocates that securities regulators promulgate rules based upon taking into consideration their impacts upon investors\u27 and others\u27 affect, happiness, and trust. Examples of these impacts are consumer optimism, financial stress, anxiety over how thoroughly securities regulators deliberate over proposed rules, investor confidence in securities disclosures, market exuberance, social moods, and subjective well-being. These variables affect and are affected by traditional financial variables, such as consumer debt, expenditures, and wealth; corporate investment; initial public offerings; and securities market demand, liquidity, prices, supply, and volume. This Article proposes that securities regulators can and should evaluate rules based upon measures of affect, happiness, and trust in addition to standard observable financial variables. This Article concludes that the organic statutes of the United States Securities and Exchange Commission are indeterminate despite mandating that federal securities laws consider efficiency among other goals. This Article illustrates analysis of affective impacts of these financial regulatory policies: mandatory securities disclosures; gun-jumping rules for publicly registered offerings; financial education or literacy campaigns; statutory or judicial default rules and menus; and continual reassessment and revision of rules. These regulatory policies impact and are impacted by investors\u27 and other people\u27s affect, happiness, and trust. Thus, securities regulators can and should evaluate such affective impacts to design effective legal policy
    corecore