935 resultados para Streaming,lwIP,Linux,ZedBoard,OpenCV,pthread,UDP,TCP,Petalinux
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Smartphones get increasingly popular where more and more smartphone platforms emerge. Special attention was gained by the open source platform Android which was presented by the Open Handset Alliance (OHA) hosting members like Google, Motorola, and HTC. Android uses a Linux kernel and a stripped-down userland with a custom Java VM set on top. The resulting system joins the advantages of both environments, while third-parties are intended to develop only Java applications at the moment. In this work, we present the benefit of using native applications in Android. Android includes a fully functional Linux, and using it for heavy computational tasks when developing applications can bring in substantional performance increase. We present how to develop native applications and software components, as well as how to let Linux applications and components communicate with Java programs. Additionally, we present performance measurements of native and Java applications executing identical tasks. The results show that native C applications can be up to 30 times as fast as an identical algorithm running in Dalvik VM. Java applications can become a speed-up of up to 10 times if utilizing JNI.
Resumo:
Deploying wireless networks in networked control systems (NCSs) has become more and more popular during the last few years. As a typical type of real-time control systems, an NCS is sensitive to long and nondeterministic time delay and packet losses. However, the nature of the wireless channel has the potential to degrade the performance of NCS networks in many aspects, particularly in time delay and packet losses. Transport layer protocols could play an important role in providing both reliable and fast transmission service to fulfill NCS’s real-time transmission requirements. Unfortunately, none of the existing transport protocols, including the Transport Control Protocol (TCP) and the User Datagram Protocol (UDP), was designed for real-time control applications. Moreover, periodic data and sporadic data are two types of real-time data traffic with different priorities in an NCS. Due to the lack of support for prioritized transmission service, the real-time performance for periodic and sporadic data in an NCS network is often degraded significantly, particularly under congested network conditions. To address these problems, a new transport layer protocol called Reliable Real-Time Transport Protocol (RRTTP) is proposed in this thesis. As a UDP-based protocol, RRTTP inherits UDP’s simplicity and fast transmission features. To improve the reliability, a retransmission and an acknowledgement mechanism are designed in RRTTP to compensate for packet losses. They are able to avoid unnecessary retransmission of the out-of-date packets in NCSs, and collisions are unlikely to happen, and small transmission delay can be achieved. Moreover, a prioritized transmission mechanism is also designed in RRTTP to improve the real-time performance of NCS networks under congested traffic conditions. Furthermore, the proposed RRTTP is implemented in the Network Simulator 2 for comprehensive simulations. The simulation results demonstrate that RRTTP outperforms TCP and UDP in terms of real-time transmissions in an NCS over wireless networks.
Resumo:
This paper explores the potential for online video as a mechanism to transform the ways students learn, as measured by research, user experience and usage following surveys and trials of patron-driven acquisition collaboratively undertaken by Queensland University of Technology, La Trobe University and Kanopy.
Resumo:
Streaming services like Spotify and Pandora pay many millions of dollars each year for the rights to the music they play. But how much of this ends up back with artists and songwriters? The answer: not an awful lot.
Resumo:
The repair of bone defects that result from periodontal diseases remains a clinical challenge for periodontal therapy. β-tricalcium phosphate (β-TCP) ceramics are biodegradable inorganic bone substitutes with inorganic components that are similar to those of bone. Demineralized bone matrix (DBM) is an acid-extracted organic matrix derived from bone sources that consists of the collagen and matrix proteins of bone. A few studies have documented the effects of DBM on the proliferation and osteogenic differentiation of human periodontal ligament cells (hPDLCs). The aim of the present study was to investigate the effects of inorganic and organic elements of bone on the proliferation and osteogenic differentiation of hPDLCs using three-dimensional porous β-TCP ceramics and DBM with or without osteogenic inducers. Primary hPDLCs were isolated from human periodontal ligaments. The proliferation of the hPDLCs on the scaffolds in the growth culture medium was examined using a Cell‑Counting kit‑8 (CCK-8) and scanning electron microscopy (SEM). Alkaline phosphatase (ALP) activity and the osteogenic differentiation of the hPDLCs cultured on the β-TCP ceramics and DBM were examined in both the growth culture medium and osteogenic culture medium. Specific osteogenic differentiation markers were examined using reverse transcription-quantitative polymerase chain reaction (RT-qPCR). SEM images revealed that the cells on the β-TCP were spindle-shaped and much more spread out compared with the cells on the DBM surfaces. There were no significant differences observed in cell proliferation between the β-TCP ceramics and the DBM scaffolds. Compared with the cells that were cultured on β-TCP ceramics, the ALP activity, as well as the Runx2 and osteocalcin (OCN) mRNA levels in the hPDLCs cultured on DBM were significantly enhanced both in the growth culture medium and the osteogenic culture medium. The organic elements of bone may exhibit greater osteogenic differentiation effects on hPDLCs than the inorganic elements.
Resumo:
Energy efficient embedded computing enables new application scenarios in mobile devices like software-defined radio and video processing. The hierarchical multiprocessor considered in this work may contain dozens or hundreds of resource efficient VLIW CPUs. Programming this number of CPU cores is a complex task requiring compiler support. The stream programming paradigm provides beneficial properties that help to support automatic partitioning. This work describes a compiler for streaming applications targeting the self-build hierarchical CoreVA-MPSoC multiprocessor platform. The compiler is supported by a programming model that is tailored to fit the streaming programming paradigm. We present a novel simulated-annealing (SA) based partitioning algorithm, called Smart SA. The overall speedup of Smart SA is 12.84 for an MPSoC with 16 CPU cores compared to a single CPU implementation. Comparison with a state of the art partitioning algorithm shows an average performance improvement of 34.07%.
Resumo:
The proliferation of the web presents an unsolved problem of automatically analyzing billions of pages of natural language. We introduce a scalable algorithm that clusters hundreds of millions of web pages into hundreds of thousands of clusters. It does this on a single mid-range machine using efficient algorithms and compressed document representations. It is applied to two web-scale crawls covering tens of terabytes. ClueWeb09 and ClueWeb12 contain 500 and 733 million web pages and were clustered into 500,000 to 700,000 clusters. To the best of our knowledge, such fine grained clustering has not been previously demonstrated. Previous approaches clustered a sample that limits the maximum number of discoverable clusters. The proposed EM-tree algorithm uses the entire collection in clustering and produces several orders of magnitude more clusters than the existing algorithms. Fine grained clustering is necessary for meaningful clustering in massive collections where the number of distinct topics grows linearly with collection size. These fine-grained clusters show an improved cluster quality when assessed with two novel evaluations using ad hoc search relevance judgments and spam classifications for external validation. These evaluations solve the problem of assessing the quality of clusters where categorical labeling is unavailable and unfeasible.
Resumo:
As patterns of media use become more integrated with mobile technologies and multiple screens, a new mode of viewer engagement has emerged in the form of connected viewing, which allows for an array of new relationships between audiences and media texts in the digital space. This exciting new collection brings together twelve original essays that critically engage with the socially-networked, multi-platform, and cloud-based world of today, examining the connected viewing phenomenon across television, film, video games, and social media. The result is a wide-ranging analysis of shifting business models, policy matters, technological infrastructure, new forms of user engagement, and other key trends affecting screen media in the digital era. Connected Viewing contextualizes the dramatic transformations taking place across both media industries and national contexts, and offers students and scholars alike a diverse set of methods and perspectives for studying this critical moment in media culture.
Resumo:
In November 2010, tension between Internet infrastructure companies boiled over in a dispute between content distribution network (CDN) Level 3 and Internet service provider (ISP) Comcast. Level 3, a distribution partner of Netflix, accused Comcast of violating the principles of net neutrality when the ISP increased distribution fees for carrying high bandwidth services. Comcast justified its actions by stating that the price increase was standard practice and argued Level 3 was trying to avoid paying its fair share. The dispute exemplifies the growing concern over the rising costs of streaming media services. The companies facing these inflated infrastructure costs are CDNs (Level 3, Equinix, Limelight, Akamai, and Voxel), companies that host streaming media content on server farms and distribute the content to a variety of carriers, and ISPs (Comcast, Time Warner, Cox, and AT&T), the cable and phone companies that provide “last mile” service to paying customers. Both CDNs and ISPs are lobbying government regulators to keep their costs at a minimum. The outcome of these disputes will influence the cost, quality, and legal status of streaming media.
Resumo:
The UDP-glucuronosyltransferases (UGTs) are enzymes of the phase II metabolic system. These enzymes catalyze the transfer of α-D-glucuronic acid from UDP-glucuronic acid to aglycones bearing nucleophilic groups affording exclusively their corresponding β-D-glucuronides to render lipophilic endobiotics and xenobiotics more water soluble. This detoxification pathway aids in the urinary and biliary excretion of lipophilic compounds thus preventing their accumulation to harmful levels. The aim of this study was to investigate the effect of stereochemical and steric features of substrates on the glucuronidation catalyzed by UGTs 2B7 and 2B17. Furthermore, this study relates to the design and synthesis of novel, selective inhibitors that display high affinity for the key enzyme involved in drug glucuronidation, UGT2B7. The starting point for the development of inhibitors was to assess the influence of the stereochemistry of substrates on the UGT-catalyzed glucuronidation reaction. A set of 28 enantiomerically pure alcohols was subjected to glucuronidation assays employing the human UGT isoforms 2B7 and 2B17. Both UGT enzymes displayed high stereoselectivity, favoring the glucuronidation of the (R)-enantiomers over their respective mirror-image compounds. The spatial arrangement of the hydroxy group of the substrate determined the rate of the UGT-catalyzed reaction. However, the affinity of the enantiomeric substrates to the enzymes was not significantly influenced by the spatial orientation of the nucleophilic hydroxy group. Based on these results, a rational approach for the design of inhibitors was developed by addressing the stereochemical features of substrate molecules. Further studies showed that the rate of the enzymatic glucuronidation of substrates was also highly dependent on the steric demand in vicinity of the nucleophilic hydroxy group. These findings provided a rational approach to turn high-affinity substrates into true UGT inhibitors by addressing stereochemical and steric features of substrate molecules. The tricyclic sesquiterpenols longifolol and isolongifolol were identified as high-affinity substrates which displayed high selectivity for the UGT isoform 2B7. These compounds served therefore as lead structures for the design of potent and selective inhibitors for UGT2B7. Selective and potent inhibitors were prepared by synthetically modifying the lead compounds longifolol and isolongifolol taking stereochemical and steric features into account. The best inhibitor of UGT2B7, β-phenyllongifolol, displayed an inhibition constant of 0.91 nM.
Resumo:
The network scenario is that of an infrastructure IEEE 802.11 WLAN with a single AP with which several stations (STAs) are associated. The AP has a finite size buffer for storing packets. In this scenario, we consider TCP controlled upload and download file transfers between the STAs and a server on the wireline LAN (e.g., 100 Mbps Ethernet) to which the AP is connected. In such a situation, it is known (see, for example, (3), [9]) that because of packet loss due to finite buffers at the Ap, upload file transfers obtain larger throughputs than download transfers. We provide an analytical model for estimating the upload and download throughputs as a function of the buffer size at the AP. We provide models for the undelayed and delayed ACK cases for a TCP that performs loss recovery only by timeout, and also for TCP Reno.
Resumo:
The increasing rate of pregnancies in teenagers and the high incident of the infections of sexual transmission (HIV/ AIDS, for example), these are health related issues (and especially the sexual and reproductive health), which have received great attention on the part of investigators and of the public opinion in general. Recently, there has been evidenced that teenagers carry out very easily risk sexual behaviors, and those who have not presented the above mentioned behaviors also show high levels of intention to carry out them. There is the hypothesis that besides cognitive variables such as attitudes, subjective norms, perceived behavioral control and intention, the personality of the young persons is an aspect that plays an important paper in their sexual and reproductive health. Significant correlations were found between the variales of the TPB and the personality traits; the results suggest that the direction of these correlations is associated with the specific type of behavior or situation that is assessed. Keywords: personality, theory of planned behavior, adolescents, reproductive sexuality.
Resumo:
The ever expanding growth of the wireless access to the Internet in recent years has led to the proliferation of wireless and mobile devices to connect to the Internet. This has created the possibility of mobile devices equipped with multiple radio interfaces to connect to the Internet using any of several wireless access network technologies such as GPRS, WLAN and WiMAX in order to get the connectivity best suited for the application. These access networks are highly heterogeneous and they vary widely in their characteristics such as bandwidth, propagation delay and geographical coverage. The mechanism by which a mobile device switches between these access networks during an ongoing connection is referred to as vertical handoff and it often results in an abrupt and significant change in the access link characteristics. The most common Internet applications such as Web browsing and e-mail make use of the Transmission Control Protocol (TCP) as their transport protocol and the behaviour of TCP depends on the end-to-end path characteristics such as bandwidth and round-trip time (RTT). As the wireless access link is most likely the bottleneck of a TCP end-to-end path, the abrupt changes in the link characteristics due to a vertical handoff may affect TCP behaviour adversely degrading the performance of the application. The focus of this thesis is to study the effect of a vertical handoff on TCP behaviour and to propose algorithms that improve the handoff behaviour of TCP using cross-layer information about the changes in the access link characteristics. We begin this study by identifying the various problems of TCP due to a vertical handoff based on extensive simulation experiments. We use this study as a basis to develop cross-layer assisted TCP algorithms in handoff scenarios involving GPRS and WLAN access networks. We then extend the scope of the study by developing cross-layer assisted TCP algorithms in a broader context applicable to a wide range of bandwidth and delay changes during a handoff. And finally, the algorithms developed here are shown to be easily extendable to the multiple-TCP flow scenario. We evaluate the proposed algorithms by comparison with standard TCP (TCP SACK) and show that the proposed algorithms are effective in improving TCP behavior in vertical handoff involving a wide range of bandwidth and delay of the access networks. Our algorithms are easy to implement in real systems and they involve modifications to the TCP sender algorithm only. The proposed algorithms are conservative in nature and they do not adversely affect the performance of TCP in the absence of cross-layer information.