Brokerage2006 independent living systemsimec.archive
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
This document teaches phonics by presenting pictures of objects starting with different letters and asking the reader to identify the beginning letter of each picture, focusing on S, T, and B. Pictures are shown of objects starting with T, B, and S and the reader is asked to identify the beginning letter of each, with positive feedback given for correct guesses.
I Minds2009 Secure And Distributed Software Prof Wouter Joosen (Ibbt Distri...imec.archive
This document discusses secure and distributed software. It summarizes the security research expertise at IBBT-DistriNet, including secure programming languages, security middleware, cryptography, privacy technologies, and more. It highlights several research projects in security, such as PecMan which introduced a security service bus, Turbine on digital identity solutions, and HATS to develop advanced software validation tools. The document emphasizes the relevance of this security research given trends towards more distributed systems and growing privacy needs. It outlines IBBT-DistriNet's vision to be a leader in security research and its collaborations within Europe and Flanders.
The document discusses EU grid research activities and priorities for FP7. It summarizes grid research conducted in FP6, including over 130 million euros in funding that supported projects focused on grid technologies, applications, and infrastructure deployments. Major projects are highlighted, such as EGEE, DEISA and GÉANT2, which built pan-European grid infrastructures for e-science applications. The priorities for continued research in FP7 are outlined, with a focus on further developing grid technologies, applications, and deploying high performance grids.
This document discusses videoconferencing tools and provides an overview of their advantages and technologies. It shares the IBBT community's experience with videoconferencing meetings based on an online survey. Tips are provided for both web-based videoconferencing using IM/VoIP software and dedicated systems like WebEx. Best practices for videoconferencing meetings are outlined from literature. Finally, future developments like the ICON iCoCoon system are briefly mentioned.
Brokerage2006 independent living systemsimec.archive
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
This document teaches phonics by presenting pictures of objects starting with different letters and asking the reader to identify the beginning letter of each picture, focusing on S, T, and B. Pictures are shown of objects starting with T, B, and S and the reader is asked to identify the beginning letter of each, with positive feedback given for correct guesses.
I Minds2009 Secure And Distributed Software Prof Wouter Joosen (Ibbt Distri...imec.archive
This document discusses secure and distributed software. It summarizes the security research expertise at IBBT-DistriNet, including secure programming languages, security middleware, cryptography, privacy technologies, and more. It highlights several research projects in security, such as PecMan which introduced a security service bus, Turbine on digital identity solutions, and HATS to develop advanced software validation tools. The document emphasizes the relevance of this security research given trends towards more distributed systems and growing privacy needs. It outlines IBBT-DistriNet's vision to be a leader in security research and its collaborations within Europe and Flanders.
The document discusses EU grid research activities and priorities for FP7. It summarizes grid research conducted in FP6, including over 130 million euros in funding that supported projects focused on grid technologies, applications, and infrastructure deployments. Major projects are highlighted, such as EGEE, DEISA and GÉANT2, which built pan-European grid infrastructures for e-science applications. The priorities for continued research in FP7 are outlined, with a focus on further developing grid technologies, applications, and deploying high performance grids.
This document discusses videoconferencing tools and provides an overview of their advantages and technologies. It shares the IBBT community's experience with videoconferencing meetings based on an online survey. Tips are provided for both web-based videoconferencing using IM/VoIP software and dedicated systems like WebEx. Best practices for videoconferencing meetings are outlined from literature. Finally, future developments like the ICON iCoCoon system are briefly mentioned.
The document discusses Sweden's approach to releasing spectrum in the digital dividend for mobile broadband use. Sweden transitioned digital terrestrial television which freed up the 800 MHz band (790-862 MHz). The Swedish government then decided to vacate this spectrum and award it through an open, service-neutral licensing process between 2009-2010. Harmonizing the use of the 800 MHz band across Europe was seen as important for enabling economies of scale in both equipment and services.
This document provides an overview of various psychological disorders including: anxiety disorders like generalized anxiety disorder, panic disorder, and obsessive compulsive disorder; somatoform disorders like hypochondriasis and conversion disorder; dissociative disorders like amnesia and dissociative identity disorder; mood disorders like depression; schizophrenic disorders; and personality disorders like borderline personality disorder. For each disorder, key symptoms and findings from related studies are described. The document also discusses models of abnormality, diagnosis of disorders, and comorbidity between disorders.
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value imec.archive
1) Living labs provide meeting places for research, development, and innovation where companies, researchers, specialists, teachers, students, and product users collaborate.
2) Demola is an innovation platform that combines student ideas with needs and support from project partners and customers, turning ideas into product and service demos.
3) Benefits of Demola include real market potential for projects, valuable experience for students, opportunity for students to start their own businesses, and license agreements or partnerships between students and project partners.
The European Network of Living Labs (ENoLL) is a non-profit international association representing over 300 certified Living Labs across Europe. Living Labs are real-life test environments where users and producers co-create innovations. ENoLL was launched in 2006 and supports various EU initiatives related to aging well, smart cities, and future internet technologies by facilitating partnerships between its member Living Labs. ENoLL is committed to the EU Active and Assisted Living Program and plans workshops and projects to promote interoperability and gather evidence on independent living solutions.
31032010 we bbt workshop project managementimec.archive
This document outlines do's and don'ts for project management presented by Steven Deneir. It discusses continuously justifying the business case, learning from experience, defining roles and responsibilities, managing by exception, focusing on products, tailoring methods, involving stakeholders, avoiding becoming a fire-fighter through risk management, and maintaining work-life balance. The presentation provides examples and templates for various project management tasks.
This short document appears to be notes about a family trip mentioning Mrs. and Mr. Arvind near Mussorie, a stop at the Golden Temple, and notes about the author's father, daughter, sister, and brother-in-law.
This document discusses research topics in multimedia content creation and transfer. The topics covered include mobile multimedia applications, advanced multimedia applications, metadata technology, and standardization. Examples of projects include a 3D networked virtual environment to help chronically ill children attend virtual classrooms, free viewpoint visual communication technology using virtual cameras, and using graphics processing units to accelerate video decoding and processing.
Qo E E2 E2 Project Overview Antoine Dejongheimec.archive
The document summarizes an event on quality of experience for seamless connectivity. It discusses the increasing number of users, devices, and applications on networks. Ensuring quality of experience for end users across heterogeneous networks and devices is a challenge. The project aims to take a cross-disciplinary approach to define quality of experience, understand how technology impacts user experience, and ensure quality of experience through demonstrations of multimedia delivery, next-generation networks and terminals, and pervasive security techniques. The agenda includes demonstrations and presentations on related topics.
This document discusses adoption potential analysis and its importance in technology product development and introduction strategies. It provides three key reasons for conducting adoption potential analysis: 1) To understand the true market potential for an innovation, especially among slower technology adopters; 2) To determine the ideal product configuration to maximize potential; and 3) To identify the best introduction strategy to appeal to early adopters and unlock the larger market potential. The document advocates for adoption potential analysis to be a complementary tool that informs business modeling, user research, and new product development processes to create more user-driven and successful innovations.
Workshopvin1 2018 Technology In Labour For Rebirth Of Hal 9000 Seriesimec.archive
The document discusses research at ETRO on technology for ambient intelligence systems, including the HAL-9000 from 2001: A Space Odyssey and its successor the AMI-9000. Current research areas include speech recognition and synthesis, emotion recognition from speech, facial analysis and synthesis, and using these techniques to create embodied conversational agents. The goal is for systems like the AMI-9000 to monitor surroundings, understand speech and emotions, and provide assistance tailored to each user.
The Deus platform aims to handle data from wireless sensor networks in a distributed manner. It uses ontologies and semantic web technologies to classify sensor data and deal with issues like missing or faulty readings. A key challenge is the quality of unpredictable sensor data. The Deus architecture includes distributed reasoning, a service registry, and a policy framework to label data quality and determine appropriate actions. It was implemented and tested on a realistic sensor network, showing it can draw more accurate conclusions than without the quality control measures.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
The document discusses Sweden's approach to releasing spectrum in the digital dividend for mobile broadband use. Sweden transitioned digital terrestrial television which freed up the 800 MHz band (790-862 MHz). The Swedish government then decided to vacate this spectrum and award it through an open, service-neutral licensing process between 2009-2010. Harmonizing the use of the 800 MHz band across Europe was seen as important for enabling economies of scale in both equipment and services.
This document provides an overview of various psychological disorders including: anxiety disorders like generalized anxiety disorder, panic disorder, and obsessive compulsive disorder; somatoform disorders like hypochondriasis and conversion disorder; dissociative disorders like amnesia and dissociative identity disorder; mood disorders like depression; schizophrenic disorders; and personality disorders like borderline personality disorder. For each disorder, key symptoms and findings from related studies are described. The document also discusses models of abnormality, diagnosis of disorders, and comorbidity between disorders.
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value imec.archive
1) Living labs provide meeting places for research, development, and innovation where companies, researchers, specialists, teachers, students, and product users collaborate.
2) Demola is an innovation platform that combines student ideas with needs and support from project partners and customers, turning ideas into product and service demos.
3) Benefits of Demola include real market potential for projects, valuable experience for students, opportunity for students to start their own businesses, and license agreements or partnerships between students and project partners.
The European Network of Living Labs (ENoLL) is a non-profit international association representing over 300 certified Living Labs across Europe. Living Labs are real-life test environments where users and producers co-create innovations. ENoLL was launched in 2006 and supports various EU initiatives related to aging well, smart cities, and future internet technologies by facilitating partnerships between its member Living Labs. ENoLL is committed to the EU Active and Assisted Living Program and plans workshops and projects to promote interoperability and gather evidence on independent living solutions.
31032010 we bbt workshop project managementimec.archive
This document outlines do's and don'ts for project management presented by Steven Deneir. It discusses continuously justifying the business case, learning from experience, defining roles and responsibilities, managing by exception, focusing on products, tailoring methods, involving stakeholders, avoiding becoming a fire-fighter through risk management, and maintaining work-life balance. The presentation provides examples and templates for various project management tasks.
This short document appears to be notes about a family trip mentioning Mrs. and Mr. Arvind near Mussorie, a stop at the Golden Temple, and notes about the author's father, daughter, sister, and brother-in-law.
This document discusses research topics in multimedia content creation and transfer. The topics covered include mobile multimedia applications, advanced multimedia applications, metadata technology, and standardization. Examples of projects include a 3D networked virtual environment to help chronically ill children attend virtual classrooms, free viewpoint visual communication technology using virtual cameras, and using graphics processing units to accelerate video decoding and processing.
Qo E E2 E2 Project Overview Antoine Dejongheimec.archive
The document summarizes an event on quality of experience for seamless connectivity. It discusses the increasing number of users, devices, and applications on networks. Ensuring quality of experience for end users across heterogeneous networks and devices is a challenge. The project aims to take a cross-disciplinary approach to define quality of experience, understand how technology impacts user experience, and ensure quality of experience through demonstrations of multimedia delivery, next-generation networks and terminals, and pervasive security techniques. The agenda includes demonstrations and presentations on related topics.
This document discusses adoption potential analysis and its importance in technology product development and introduction strategies. It provides three key reasons for conducting adoption potential analysis: 1) To understand the true market potential for an innovation, especially among slower technology adopters; 2) To determine the ideal product configuration to maximize potential; and 3) To identify the best introduction strategy to appeal to early adopters and unlock the larger market potential. The document advocates for adoption potential analysis to be a complementary tool that informs business modeling, user research, and new product development processes to create more user-driven and successful innovations.
Workshopvin1 2018 Technology In Labour For Rebirth Of Hal 9000 Seriesimec.archive
The document discusses research at ETRO on technology for ambient intelligence systems, including the HAL-9000 from 2001: A Space Odyssey and its successor the AMI-9000. Current research areas include speech recognition and synthesis, emotion recognition from speech, facial analysis and synthesis, and using these techniques to create embodied conversational agents. The goal is for systems like the AMI-9000 to monitor surroundings, understand speech and emotions, and provide assistance tailored to each user.
The Deus platform aims to handle data from wireless sensor networks in a distributed manner. It uses ontologies and semantic web technologies to classify sensor data and deal with issues like missing or faulty readings. A key challenge is the quality of unpredictable sensor data. The Deus architecture includes distributed reasoning, a service registry, and a policy framework to label data quality and determine appropriate actions. It was implemented and tested on a realistic sensor network, showing it can draw more accurate conclusions than without the quality control measures.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
2. Johan Cloetens
@belgianwaves
• background interest since start
• huge android fan since oct. 2008
• free applications on Android Market:
SipAgent, ShootMe/PicMe, OnAir, ...
• professional android consultant since feb.
2009
• Escaux, Philips, Cherry, ...
Wednesday 7 April 2010
3. VoIP
why should i care?
• isn’t this boring?
• break free / save costs
• market trends
• bringing voice in the network allows
enriched experiences
• Android is the ideal platform
Wednesday 7 April 2010
7. Android (audio)
APPLICATIONS Audio Apps
APP FRAMEWORK AudioTrack / MediaPlayer /
AudioRecord Recorder Class
RUNTIME -> NATIVE JNI
NATIVE LIBRARIES
Media
Library
IPC binding
MediaPlayer Audio Flinger
Service (Native) (Native)
PV OpenCore Player/
Author Engine IPC binding
HAL of Audio
PV Audio Enc/ PV Media
Dec Node In/Out Node
PV MIO
I/F
Alsa user Lib
Android Audio
I/O Wrapper
LINUX KERNEL
Alsa Driver
Wednesday 7 April 2010
8. AudioTrack
AudioTrack t = new AudioTrack(AudioManager.STREAM_VOICE_CALL,
8000,
AudioFormat.CHANNEL_CONFIGURATION_MONO,
AudioFormat.ENCODING_PCM_16BIT,
bufferSizeOut(),
AudioTrack.MODE_STREAM);
t.play();
byte buffer[] = new byte[BUFFER_SIZE];
while (!stopped()) {
int read = fetchIn(buffer);
if (read > 0) {
t.write(buffer, 0, read);
}
}
t.stop();
Wednesday 7 April 2010
9. AudioRecord
AudioRecord r = new AudioRecord(MediaRecorder.AudioSource.MIC,
8000,
AudioFormat.CHANNEL_CONFIGURATION_MONO,
AudioFormat.ENCODING_PCM_16BIT,
bufferSizeIn());
r.startRecording();
byte buffer[] = new byte[BUFFER_SIZE];
while(!stopped()) {
int read = r.read(buffer, 0, BUFFER_SIZE);
if (read > 0) {
pushOut(buffer, read);
}
}
r.stop();
Wednesday 7 April 2010
10. It’s easy ;-)
choices left
• compliancy to protocols (sip & iax)
• codecs (ulaw, alaw, gsm, g729, ...)
• java versus native
• to silo or not to silo...
• gotcha’s
Wednesday 7 April 2010
11. Gotchas
• fragmentation
• room for interpretation api’s
• hardware dependency / buffer hints
• latency
• bugs
• floating point support
Wednesday 7 April 2010
13. To silo or not to silo
that is the question...
• basic functionality easier to integrate
• enriched experience asks for silo
• how to blend experience / look & feel?
• ( what has Google in the pipe? )
Wednesday 7 April 2010
14. Conclusion
• VoIP on Android is a reality
• could be easier
• will improve
• enriched communication experience only
limited by your imagination
• Android is platform of choice, plenty of
options
Wednesday 7 April 2010
15. Feedback
belgianwaves@gmail.com
Wednesday 7 April 2010