1,008 research outputs found

    BitTorrent Experiments on Testbeds: A Study of the Impact of Network Latencies

    Get PDF
    In this paper, we study the impact of network latency on the time required to download a file distributed using BitTorrent. This study is essential to understand if testbeds can be used for experimental evaluation of BitTorrent. We observe that the network latency has a marginal impact on the time required to download a file; hence, BitTorrent experiments can performed on testbeds

    A Survey of Non-conventional Techniques for Low-voltage Low-power Analog Circuit Design

    Get PDF
    Designing integrated circuits able to work under low-voltage (LV) low-power (LP) condition is currently undergoing a very considerable boom. Reducing voltage supply and power consumption of integrated circuits is crucial factor since in general it ensures the device reliability, prevents overheating of the circuits and in particular prolongs the operation period for battery powered devices. Recently, non-conventional techniques i.e. bulk-driven (BD), floating-gate (FG) and quasi-floating-gate (QFG) techniques have been proposed as powerful ways to reduce the design complexity and push the voltage supply towards threshold voltage of the MOS transistors (MOST). Therefore, this paper presents the operation principle, the advantages and disadvantages of each of these techniques, enabling circuit designers to choose the proper design technique based on application requirements. As an example of application three operational transconductance amplifiers (OTA) base on these non-conventional techniques are presented, the voltage supply is only ±0.4 V and the power consumption is 23.5 ”W. PSpice simulation results using the 0.18 ”m CMOS technology from TSMC are included to verify the design functionality and correspondence with theory

    A Study of Sprinkler Uniformity Evaluation Methods

    Get PDF
    The use of water in homes, on farms, by factories, and for recreational purposes has been increasing rapidly. Water use has doubled in the last three decades. By 1980, water use is expected to be double the current use. In arid and semi-arid regions, the practice of successful profit-yielding agriculture often depends on irrigation. Irrigation is, in turn, dependent upon a water supply which is limited. The highest pos sible efficiency should be maintained if maximum utilization of the available water resources for irrigation is desired. Sprinkler irrigation allows, among other things, high water application efficiencies with good distribution uniformities

    Neuromorphic Computing Systems for Tactile Sensing Perception

    Get PDF
    Touch sensing plays an important role in humans daily life. Tasks like exploring, grasping and manipulating objects deeply rely on it. As such, Robots and hand prosthesis endowed with the sense of touch can better and more easily manipulate objects, and physically collaborate with other agents. Towards this goal, information about touched objects and surfaces has to be inferred from raw data coming from the sensors. The orientation of edges, which is employed as a pre-processing stage in both artificial vision and touch, is a key indication for object discrimination. Inspired on the encoding of edges in human first-order tactile afferents, we developed a biologically inspired, spiking models architecture that mimics human tactile perception with computational primitives that are implementable on low-power subthreshold neuromorphic hardware. The network architecture uses three layers of Leaky Integrate and Fire neurons to distinguish different edge orientations of a bar pressed on the artificial skin of the iCub robot. We demonstrated that the network architecture can learn the appropriate connectivity through unsupervised spike-based learning, and that the number and spatial distribution of sensitive areas within receptive fields are important in edge orientation discrimination. The unconstrained and random structure of the connectivity among layers can produce unbalanced activity in the output neurons, which are driven by a variable amount of synaptic inputs. We explored two different mechanisms of synaptic normalization (weights normalization and homeostasis), defining how this can be useful during the learning phase and inference phase. The network is successfully able to discriminate between 35 orientations of 36 (0 degree to 180 degree with 5 degree step increments) with homeostasis and weights normalization mechanism. Besides edge orientation discrimination, we modified the network architecture to be able to classify six different touch modalities (e.g. poke, press, grab, squeeze, push, and rolling a wheel). We demonstrated the ability of the network to learn appropriate connectivity patterns for the classification, achieving a total accuracy of 88.3 %. Furthermore, another application scenario on the tactile object shapes recognition has been considered because of its importance in robotic manipulation. We illustrated that the network architecture with 2 layers of spiking neurons was able to discriminate the tactile object shapes with accuracy 100 %, after integrating to it an array of 160 piezoresistive tactile sensors where the object shapes are applied

    Pushing BitTorrent Locality to the Limit

    Get PDF
    Peer-to-peer (P2P) locality has recently raised a lot of interest in the community. Indeed, whereas P2P content distribution enables financial savings for the content providers, it dramatically increases the traffic on inter-ISP links. To solve this issue, the idea to keep a fraction of the P2P traffic local to each ISP was introduced a few years ago. Since then, P2P solutions exploiting locality have been introduced. However, several fundamental issues on locality still need to be explored. In particular, how far can we push locality, and what is, at the scale of the Internet, the reduction of traffic that can be achieved with locality? In this paper, we perform extensive experiments on a controlled environment with up to 10 000 BitTorrent clients to evaluate the impact of high locality on inter-ISP links traffic and peers download completion time. We introduce two simple mechanisms that make high locality possible in challenging scenarios and we show that we save up to several orders of magnitude inter-ISP traffic compared to traditional locality without adversely impacting peers download completion time. In addition, we crawled 214 443 torrents representing 6 113 224 unique peers spread among 9 605 ASes. We show that whereas the torrents we crawled generated 11.6 petabytes of inter-ISP traffic, our locality policy implemented for all torrents would have reduced the global inter-ISP traffic by 40%

    Double Jeopardy: The Rights of Refugees in Marginalized Communities in the Middle East (abstract)

    Get PDF
    The plight of Syrian, Iraqi, and Palestinian refugees in Lebanon was been well documented in recent years. Less attention has been paid to the impact these large refugee populations have had on the already marginalized regions in the northern (Akkar), eastern (Bakaa), and southern (Tyre & Nabatiye) parts of the country. Basic human rights such as education, health care, childhood development, family, employment, and equal protection before the law are being undermined through the ‘double burden’ of a largely unregulated and under-serviced refugee population, which is now threatening to exceed 2 million by the end of 2015. This paper will deal with the nexus of refugee rights and the rights of impoverished populations in the marginalized regions of Lebanon. It will focus on the possibility of conceptualizing a comprehensive strategy, which takes the emergency needs of the newly arrived Syrians, as well as the already partially integrated Iraqi and Palestinian refugees into consideration, while simultaneously promoting the medium and long term economic and infrastructural development of the above mentioned peripheral parts of the country. This paper will focus on the Akkar region in the far north of Lebanon. From a theoretical perspective, it will argue that the developmental agenda inherent in Catholic Social Teaching offers Lebanon a rational for a revitalization of the country, based on the experience of modernization in the 1950s and 1960s, often referred to as Chehabism (after the Maronite president at the time), and exemplified in the reform proposals developed by Louis-Joseph Lebret and the 1964 IRFED project report for Lebanon. The original research to be presented in this paper will be drawn from projects carried out by this author, together with the staff at the Lebanese Emigration Research Center and in the Faculty of Law and Political Sciences, both at Notre Dame University, during the past four years

    I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy

    Get PDF
    In this paper, we show how to exploit real-time communication applications to determine the IP address of a targeted user. We focus our study on Skype, although other real-time communication applications may have similar privacy issues. We first design a scheme that calls an identified targeted user inconspicuously to find his IP address, which can be done even if he is behind a NAT. By calling the user periodically, we can then observe the mobility of the user. We show how to scale the scheme to observe the mobility patterns of tens of thousands of users. We also consider the linkability threat, in which the identified user is linked to his Internet usage. We illustrate this threat by combining Skype and BitTorrent to show that it is possible to determine the file-sharing usage of identified users. We devise a scheme based on the identification field of the IP datagrams to verify with high accuracy whether the identified user is participating in specific torrents. We conclude that any Internet user can leverage Skype, and potentially other real-time communication systems, to observe the mobility and file-sharing usage of tens of millions of identified users.Comment: This is the authors' version of the ACM/USENIX Internet Measurement Conference (IMC) 2011 pape

    Blessed be the critics of newspapers : journalistic criticism of journalism 1865-1930

    Get PDF
    This study examined journalistic press criticism between 1865 and 1930. It sought to understand how the first modern journalists conceived of their profession in a period of great transitions. As the study revealed, journalists writing about journalism between 1865 and 1930 discussed recurring themes such as commercialization, sensationalism, advertising, and ethics. They expressed ambivalence toward the rise of big business in their field and the consequences it could have on the quality of the work. In the process, journalists also defined journalism as a profession providing a public service or as a business aiming solely for circulation and profit. Definitions shifted depending on the period during which the journalists wrote. Criticism during the period under study often reflected the social and cultural trends journalists witnessed. During the postbellum era, it mirrored the belief in the American Dream of wealth, well-being, and democracy. In the 1890s, criticism focused on the downsides of commercialism, expressing the fears people felt toward the new corporate giants. During the progressive period, the writings of press critics revealed the pride they felt in the civic services journalism provided. But World War I brought an end to progressivism. During the 1920s, disillusioned journalists criticized “mediocre” journalism. Their frustration echoed that of the old generation of progressives. Underlying the journalists’ criticism was also the perception they had of news. Excited about the democratic promise of this new concept, postbellum critics praised journalism more than they criticized it. During the 1890s, and despite the downsides of commercialism, journalists never lost hope because, for them, news democratized information. The progressive period seemed to confirm the democratic potentials of news, promoting pride among critics. But the propaganda campaigns of World War I broke the spell, as critics realized that news was potentially susceptible to propaganda. The establishment of public relations as a profession based on the spinning of news during the 1920s further aggravated the problem. Journalists, who had kept their optimism throughout the previous fifty years, became concerned, in the 1920s, that many newspapers did not live up to the democratic promise of the press

    An Analysis of the Historical Application of Jihad and Implications on the Clash of Civilizations

    Get PDF
    This paper is a part-review analysis into the modern conception of both the word and Jihād and the violent nature of Islam. In order to develop an overarching modern theory of Jihād, current opinions and general argumtations in the literature are examined. Two theories have emerged in defining Islam and the role of Jihād in Islam. The first is that of the so-called Muslim apologists; scholars who define Jihād as mainly a personal struggle, and whose physical application (warfare) is only in self-defence of the Islamic community. The second sponsors the concept of ‘offensive’ Jihād: that Islam is imperialistic and has a vision of global domination. The stark contrast in the divisions that the scholarship have are indicative of two opposing parties, likely each basing their respective policy positions on beliefs on the nature of Islam as a violent of peaceful ‘religion’
    • 

    corecore