1,704 research outputs found

    Mapping device with wireless communication

    Get PDF
    Wireless communication is one of the most powerful communication methods that people use nowadays. The key advantage of wireless communications is that it can cover large distances without having to run any cables from one end to the other. Based on this advantage, wireless communication has many important applications, such as remote controls, cell phones, and global positioning system (GPS). This senior design project is developed to use wireless communication technology to map the geographic characteristics of an unknown place. It contains two wireless communication modules with Atmega1281 microprocessor, two robots with the 8051 microcontroller, six pairs of infrared transmitters and receivers, and a base transceiver connected to a computer. The robots are used to go through a maze and detect an unknown path with infrared sensors. The information will be sent and received through the wireless modules. Finally, this information would be sent to the base. Then the computer will display this unknown place

    PowerSearch: Augmenting mobile phone search through personalization

    Get PDF
    Cell phone has become a fundamental element of people\u27s life. People use it to call each other, browse websites, send text messages, etc. Among all the functionalities, the most important and frequently used is the search functionality. Based on ComScore, in July 2008, Google was estimated to host 235 millions searches per day. However, unlike the search on desktop, the search on cell phone has one critical constrain: battery. Cell phone performing a normal Google search, the battery drains very fast. The reason is that when sending a query to and fetching the results from Google, cell phone keeps communicating to the website through networks such as WiFi and 3G. Yet, due to the limited bandwidth of the network and the large amount of the results, the time of communication will be very long. As a result, the battery dies very quickly. In order to prevent this fast drain of battery, a new program is proposed to personalize the search criteria and fetch the most precise and personalized results, instead of all the results, from the web. Because only a few results are fetched, cell phone will not be communicating with the Internet. Hence, the battery will not die very fast. The program can increase the energy-efficiency of the battery and, thus, lengthen the running time of the cell phone

    Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU

    Full text link
    In this paper, we present that security threats coming with existing GPU memory management strategy are overlooked, which opens a back door for adversaries to freely break the memory isolation: they enable adversaries without any privilege in a computer to recover the raw memory data left by previous processes directly. More importantly, such attacks can work on not only normal multi-user operating systems, but also cloud computing platforms. To demonstrate the seriousness of such attacks, we recovered original data directly from GPU memory residues left by exited commodity applications, including Google Chrome, Adobe Reader, GIMP, Matlab. The results show that, because of the vulnerable memory management strategy, commodity applications in our experiments are all affected
    corecore