233,339 research outputs found
Chapter Energy Efficiency for 5G Multi-Tier Cellular Networks
This chapter provides an introduction to quantifying the energy consumed by software. It is written for computer scientists, software engineers, embedded system developers and programmers who want to understand how to measure the energy consumed by the code they write in order to optimize for energy efficiency. We start with an overview of the electrical foundations of energy measurement and show how these are applied by reviewing the most commonly found energy sensing techniques. This is followed by a brief discussion of the signal processing required to obtain energy consumption data from sensing. We then present two energy measurement systems that are based on sensing techniques. Both can be used to directly measure the energy consumed by software running on embedded systems without the need to modify the hardware. As an alternative, regression-based techniques can be used to infer energy consumption based on monitoring events during program execution using counters monitors offered by the hardware. We introduce the foundations of regression analysis and illustrate how an energy model for an ARM processor can be built using linear regression. In the conclusion, we offer a wider discussion on what should be considered when selecting an energy measurement technique
Measuring Energy
This chapter provides an introduction to quantifying the energy consumed by software. It is written for computer scientists, software engineers, embedded system developers and programmers who want to understand how to measure the energy consumed by the code they write in order to optimize for energy efficiency. We start with an overview of the electrical foundations of energy measurement and show how these are applied by reviewing the most commonly found energy sensing techniques. This is followed by a brief discussion of the signal processing required to obtain energy consumption data from sensing. We then present two energy measurement systems that are based on sensing techniques. Both can be used to directly measure the energy consumed by software running on embedded systems without the need to modify the hardware. As an alternative, regression-based techniques can be used to infer energy consumption based on monitoring events during program execution using counters monitors offered by the hardware. We introduce the foundations of regression analysis and illustrate how an energy model for an ARM processor can be built using linear regression. In the conclusion, we offer a wider discussion on what should be considered when selecting an energy measurement technique
Traction force microscopy on soft elastic substrates: a guide to recent computational advances
The measurement of cellular traction forces on soft elastic substrates has
become a standard tool for many labs working on mechanobiology. Here we review
the basic principles and different variants of this approach. In general, the
extraction of the substrate displacement field from image data and the
reconstruction procedure for the forces are closely linked to each other and
limited by the presence of experimental noise. We discuss different strategies
to reconstruct cellular forces as they follow from the foundations of
elasticity theory, including two- versus three-dimensional, inverse versus
direct and linear versus non-linear approaches. We also discuss how biophysical
models can improve force reconstruction and comment on practical issues like
substrate preparation, image processing and the availability of software for
traction force microscopy.Comment: Revtex, 29 pages, 3 PDF figures, 2 tables. BBA - Molecular Cell
Research, online since 27 May 2015, special issue on mechanobiolog
HSPM 8233: Quantitative Research and Evaluation Methods
This course introduces students to the fundamentals and practical application of quantitative methodologies for answering policy and policy-relevant health services research questions. It discusses foundational concepts related to study conceptualization, study design, data analysis and interpretation, and reporting. Topics covered in this course include foundations of health services and policy research, research design, sampling, measurement, univariate and bivariate analysis, regression, multilevel analysis, panel data analysis, exploratory factor analysis, confirmatory factor analysis and structural equation modeling. Hands-on application of research methods is integrated throughout the course through the use of a statistical software application and real-world data
Factor analysis and discriminant validity:a brief review of some practical issues
Growth in availability and ability of modern statistical software has resulted in greater numbers of research techniques being applied across the marketing discipline. However, with such advances come concerns that techniques may be misinterpreted by researchers. This issue is critical since misinterpretation could cause erroneous findings. This paper investigates some assumptions regarding: 1) the assessment of discriminant validity; and 2) what confirmatory factor analysis accomplishes. Examples that address these points are presented, and some procedural remedies are suggested based upon the literature. This paper is, therefore, primarily concerned with the development of measurement theory and practice. If advances in theory development are not based upon sound methodological practice, we as researchers could be basing our work upon shaky foundations
Seeking Anonymity in an Internet Panopticon
Obtaining and maintaining anonymity on the Internet is challenging. The state
of the art in deployed tools, such as Tor, uses onion routing (OR) to relay
encrypted connections on a detour passing through randomly chosen relays
scattered around the Internet. Unfortunately, OR is known to be vulnerable at
least in principle to several classes of attacks for which no solution is known
or believed to be forthcoming soon. Current approaches to anonymity also appear
unable to offer accurate, principled measurement of the level or quality of
anonymity a user might obtain.
Toward this end, we offer a high-level view of the Dissent project, the first
systematic effort to build a practical anonymity system based purely on
foundations that offer measurable and formally provable anonymity properties.
Dissent builds on two key pre-existing primitives - verifiable shuffles and
dining cryptographers - but for the first time shows how to scale such
techniques to offer measurable anonymity guarantees to thousands of
participants. Further, Dissent represents the first anonymity system designed
from the ground up to incorporate some systematic countermeasure for each of
the major classes of known vulnerabilities in existing approaches, including
global traffic analysis, active attacks, and intersection attacks. Finally,
because no anonymity protocol alone can address risks such as software exploits
or accidental self-identification, we introduce WiNon, an experimental
operating system architecture to harden the uses of anonymity tools such as Tor
and Dissent against such attacks.Comment: 8 pages, 10 figure
Measures of implicit cognition for marketing research
Automatic, unconscious processes largely influence human decision-making. However, quantitative market research focuses on eliciting conscious responses. This foregoes the opportunity to investigate - and steer - preceding cognitive processes of decision-making. Three implicit cognitions are of special relevance along consumers' journey: Implicit attention introduces the first perception of a stimulus. Implicit associations can cause attitude and preference formation. Finally, approach tendencies can induce impulse buying. This paper provides a broad methodological overview of these implicit cognition measures to guide future researchers' marketing applications. It presents the methods' theoretical foundations, outlines how they can overcome explicit measures' limitations, and sketches their potential for marketing applications. In addition, the authors describe important research paradigms, alternative experimental setups, and data analyses steps to enable researchers to use implicit measurement tools. The measurement instruments are implemented in a non-profit software (AskYourBrain) and tested in an illustrative study. Key findings are summarized and marketing application suggestions made
Photogrammetric restitution of a presumed ancient Asclepius temple in Titani, Peloponnesos, Greece
Close range photogrammetry is a useful tool for the documentation and registration of archaeological sites. In this case, photogrammetric restitution is applied to a presumed Esclepion Classical temple site in Titani, Peloponnesos, Greece. The archaeological remains that are recorded and processed in this stage are small fragments of walls, made out of irregular shaped stones. The fragmentary remains and the need to record both the facades of the stones as well as the upper surfaces, complicate the photogrammetric recording and processing workflow.
The use of 3D documentation is important for the documentation, conservation and possible further excavation of the site. Stereographic pictures in combination with terrestrial topographic measurements are processed in the photogrammetric software VirtuoZoTM. The stereo photographs were taken by a non-metric high resolution digital single lens reflex camera with a minimum overlap of 65 percent. Targets placed on the remains of the walls were measured by total station to obtain ground control points for the orientation of each 3D stereo model in an absolute coordinate system (HGRS87). The photogrammetric processing of the stereo models results in very accurate digital elevation models and orthophotos of the walls. Further combining of these final products and merging these products in a CAD software leads to a 3D presentation of the archaeological excavation, which can be further used to evolve this archaeological site
- …