10,398 research outputs found

    A Survey of Prediction and Classification Techniques in Multicore Processor Systems

    Get PDF
    In multicore processor systems, being able to accurately predict the future provides new optimization opportunities, which otherwise could not be exploited. For example, an oracle able to predict a certain application\u27s behavior running on a smart phone could direct the power manager to switch to appropriate dynamic voltage and frequency scaling modes that would guarantee minimum levels of desired performance while saving energy consumption and thereby prolonging battery life. Using predictions enables systems to become proactive rather than continue to operate in a reactive manner. This prediction-based proactive approach has become increasingly popular in the design and optimization of integrated circuits and of multicore processor systems. Prediction transforms from simple forecasting to sophisticated machine learning based prediction and classification that learns from existing data, employs data mining, and predicts future behavior. This can be exploited by novel optimization techniques that can span across all layers of the computing stack. In this survey paper, we present a discussion of the most popular techniques on prediction and classification in the general context of computing systems with emphasis on multicore processors. The paper is far from comprehensive, but, it will help the reader interested in employing prediction in optimization of multicore processor systems

    The crowd as a cameraman : on-stage display of crowdsourced mobile video at large-scale events

    Get PDF
    Recording videos with smartphones at large-scale events such as concerts and festivals is very common nowadays. These videos register the atmosphere of the event as it is experienced by the crowd and offer a perspective that is hard to capture by the professional cameras installed throughout the venue. In this article, we present a framework to collect videos from smartphones in the public and blend these into a mosaic that can be readily mixed with professional camera footage and shown on displays during the event. The video upload is prioritized by matching requests of the event director with video metadata, while taking into account the available wireless network capacity. The proposed framework's main novelty is its scalability, supporting the real-time transmission, processing and display of videos recorded by hundreds of simultaneous users in ultra-dense Wi-Fi environments, as well as its proven integration in commercial production environments. The framework has been extensively validated in a controlled lab setting with up to 1 000 clients as well as in a field trial where 1 183 videos were collected from 135 participants recruited from an audience of 8 050 people. 90 % of those videos were uploaded within 6.8 minutes

    The Rise of Mobile and the Diffusion of Technology-Facilitated Trafficking

    Get PDF
    In this report, researchers at the USC Annenberg Center on Communication Leadership & Policy (CCLP) reveal how those involved in human trafficking have been quick to adapt to the 21st-century global landscape. While the rapid diffusion of digital technologies such as mobile phones, social networking sites, and the Internet has provided significant benefits to society, new channels and opportunities for exploitation have also emerged. Increasingly, the business of human trafficking is taking place online and over mobile phones. But the same technologies that are being used for trafficking can become a powerful tool to combat trafficking. The precise role that digital technologies play in human trafficking still remains unclear, however, and a closer examination of the phenomenon is vital to identify and respond to new threats and opportunities.This investigation indicates that mobile devices and networks have risen in prominence and are now of central importance to the sex trafficking of minors in the United States. While online platforms such as online classifieds and social networking sites remain a potential venue for exploitation, this research suggests that technology facilitated trafficking is more diffuse and adaptive than initially thought. This report presents a review of current literature, trends, and policies; primary research based on mobile phone data collected from online classified sites; a series of firsthand interviews with law enforcement; and key recommendations to policymakers and stakeholders moving forward

    "My SocioWorld" : an optimized application for mobile social networking

    Get PDF
    Being connected with old social contacts and making new social contacts on social networking sites is becoming more essential these days. Mobile social networking is adding value towards socializing world by being connected any day, anywhere, anytime and on the go. Applications providing good user experience and taking full advantage of increasing capabilities of mobile phones are still challenging. The common challenges faced by user while using different social networking sites on mobile phone are; increased level of concentration, limited mobile display and rising cost of mobile communication. Ultimately all these affect users’ engagement in mobile social networking. In this thesis, the focus is to propose an optimize application for mobile social networking by adopting user centred design methodology. It involves integration of users’ favourite social networking sites that would facilitate them in socializing with different social networking services from one common user-interface. Further the involvement of users with proposed application is supported by the changing trends of mobile phones by becoming full-featured mobile computers. Several iterative user-interface designs are represented graphically and interaction with those designs is displayed. The proposed application focuses on different ways user could remain active on this application and be able to create new content easily with the help of integrated mobile tools available within smart phone mobile device. Additionally, a usability test is performed with the potential users to validate proposed application. Based on feedbacks and suggestions from the users who performed usability test, further enhancements are made to improve the end-user experience. Thus, by considering the needs and requirements of the end-users the proposed application has been developed to provide enhanced user usability and satisfaction for today’s mobile social networking

    Inferences from Interactions with Smart Devices: Security Leaks and Defenses

    Get PDF
    We unlock our smart devices such as smartphone several times every day using a pin, password, or graphical pattern if the device is secured by one. The scope and usage of smart devices\u27 are expanding day by day in our everyday life and hence the need to make them more secure. In the near future, we may need to authenticate ourselves on emerging smart devices such as electronic doors, exercise equipment, power tools, medical devices, and smart TV remote control. While recent research focuses on developing new behavior-based methods to authenticate these smart devices, pin and password still remain primary methods to authenticate a user on a device. Although the recent research exposes the observation-based vulnerabilities, the popular belief is that the direct observation attacks can be thwarted by simple methods that obscure the attacker\u27s view of the input console (or screen). In this dissertation, we study the users\u27 hand movement pattern while they type on their smart devices. The study concentrates on the following two factors; (1) finding security leaks from the observed hand movement patterns (we showcase that the user\u27s hand movement on its own reveals the user\u27s sensitive information) and (2) developing methods to build lightweight, easy to use, and more secure authentication system. The users\u27 hand movement patterns were captured through video camcorder and inbuilt motion sensors such as gyroscope and accelerometer in the user\u27s device

    Development of Platform Independent Remote Experiments

    Get PDF
    Remote laboratory or online laboratory is the use of the Internet to conduct real experiments remotely when the client is geographically away from the real experiments. Current remote laboratories such as the remote laboratory in Mechanical Engineering at University of Houston require the client to install plug-ins before conducting remote experiments. This thesis presents an advanced technology using JavaScript and Socket.IO to develop plug-in free remote experiments without firewall issue. A scalable plug-in free remote laboratory integrated with two remote experiments has been set up in the Mechanical Engineering Department at the Texas A&M University at Qatar (TAMUQ) in Qatar under the collaboration from the University of Houston and the Texas Southern University in Houston, Texas. The plug-free remote laboratory has been successfully tested in Windows PC, Mac OS, iPhone and iPad (iOS).Mechanical Engineering, Department o

    Fun Learning Tools to Enhance Students Interest in Science via e-Book

    Get PDF
    The paper discusses on the impact of e-Book technology on the books market, status of e-Book usage in basic education and where to improve e-book technology in order to help teachers to expand beyond linear, text-based learning, to engage students who learn best in other ways and to enhance students‟ interest in learning. Its role in schools has evolved from a contained “computer class” into a versatile learning tool that could change how we demonstrate concepts, assign projects and assess progress. There are two types of data collection being done in this research; qualitative and quantitative survey. From the result of the survey done on Terengganu‟s students which were already familiar with e-Book, 82% agreed that e-Book allow them to have fun while learning in class. In future, it is being hope that the e-Book technology can be widely used in education, not just for an additional tools in class
    • 

    corecore