The document discusses two proprietary technologies from TIMMES, Inc. called ODEN and MAGNUS that improve data transmission efficiency over networks. ODEN utilizes compression and TCP acceleration to improve bandwidth efficiency. MAGNUS is an evolution of ODEN that requires software on only one side and uses TCP acceleration to reduce latency effects. Third party tests showed the technologies increased throughput by 200-2000% over FTP and HTTP for various file types including video and imagery files.
In this presentation, we will discuss the L3 Redundancy Requirement which primarily comes from customers who want to handle the complete Data Center Failure during natural disasters or other catastrophic events. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Layer-3-Redundancy-for-Mobility-Master-ArubaOS/td-p/382029
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
This document provides an overview and analysis of key performance indicators (KPIs) for 3G network drive testing. It includes:
1) An overview of the types of 3G KPIs including field measurement, radio access network (RAN), core network, and end-to-end KPIs.
2) Factors that can affect network performance such as equipment quality, network planning, implementation, operation and maintenance.
3) Examples of field measurement KPIs including coverage, accessibility, retainability, service quality, and mobility KPIs as well as the formulas used to calculate them.
Basics of performance measurement in umtsEkwere Udoh
This document discusses performance measurement in UMTS networks. It provides definitions for key performance indicators (KPIs) and explains how KPIs can be calculated from raw performance data collected from network elements. Specifically, it notes that proper KPI definitions require considering factors like protocol message types, network topology, and how measurements are aggregated. The document also outlines the basic approach for performance measurement equipment to capture and filter relevant data from UTRAN interfaces in order to compute meaningful KPIs.
NetBrain is network automation software that allows users to:
- Create network diagrams and maps automatically in seconds to visualize network topology and troubleshoot issues
- Continuously monitor networks and automatically detect changes across devices
- Automate complex network changes with a single click and automatically document changes
- Perform in-depth historical analysis and use automated diagnostics apps to identify root causes of issues quickly
This document is Fatma HAMDI's end of studies project from 2005/2006 on developing a GSM/GPRS evaluation and optimization tool. The project was conducted at Tunisie Telecom's Mobile Network Direction.
The project involved designing and implementing software to allow live observation of a GSM/GPRS network's performance in order to help train operators. It describes the principles of GSM and GPRS networks, especially regarding radio interfaces. It also specifies the architecture and functionality of the evaluation tool. Additionally, it includes a case study to demonstrate how the tool can be used for optimization.
The tool is designed as a post-processing tool to analyze drive test data and key performance indicators in a
Open Innovation via Java-enabled Network DevicesTal Lavian Ph.D.
Open Innovationvia Java-enabled Network Devices:
Collaboration with Business Applications
Server Collaboration
Active Network Management
Diagnostic Mobile Agents
Active Intrusion Detection
ORE - Oplet Run-time Environment
Java-enabled Device Architecture
Separation of Control and Forwarding Planes
Dynamic Configuration of Forwarding Rules
Real-time forwarding Stats and Monitors
Radio network optimization flow 20090429-a-4.0Mashaal322
This document provides an overview of Huawei's radio network optimization work flow. It begins by outlining the objectives of the course as helping readers understand the workflow, master its key points, and standardize radio network planning. It then describes the four phases of the network lifecycle and how radio network planning and optimization services fit within each phase. The remainder of the document details the specific procedures and key considerations for initial tuning, network performance improvement, interference analysis, neighbor cell optimization, RF parameter optimization, VIP guarantee, network performance monitoring, and customer acceptance.
The document discusses two proprietary technologies from TIMMES, Inc. called ODEN and MAGNUS that improve data transmission efficiency over networks. ODEN utilizes compression and TCP acceleration to improve bandwidth efficiency. MAGNUS is an evolution of ODEN that requires software on only one side and uses TCP acceleration to reduce latency effects. Third party tests showed the technologies increased throughput by 200-2000% over FTP and HTTP for various file types including video and imagery files.
In this presentation, we will discuss the L3 Redundancy Requirement which primarily comes from customers who want to handle the complete Data Center Failure during natural disasters or other catastrophic events. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Layer-3-Redundancy-for-Mobility-Master-ArubaOS/td-p/382029
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
This document provides an overview and analysis of key performance indicators (KPIs) for 3G network drive testing. It includes:
1) An overview of the types of 3G KPIs including field measurement, radio access network (RAN), core network, and end-to-end KPIs.
2) Factors that can affect network performance such as equipment quality, network planning, implementation, operation and maintenance.
3) Examples of field measurement KPIs including coverage, accessibility, retainability, service quality, and mobility KPIs as well as the formulas used to calculate them.
Basics of performance measurement in umtsEkwere Udoh
This document discusses performance measurement in UMTS networks. It provides definitions for key performance indicators (KPIs) and explains how KPIs can be calculated from raw performance data collected from network elements. Specifically, it notes that proper KPI definitions require considering factors like protocol message types, network topology, and how measurements are aggregated. The document also outlines the basic approach for performance measurement equipment to capture and filter relevant data from UTRAN interfaces in order to compute meaningful KPIs.
NetBrain is network automation software that allows users to:
- Create network diagrams and maps automatically in seconds to visualize network topology and troubleshoot issues
- Continuously monitor networks and automatically detect changes across devices
- Automate complex network changes with a single click and automatically document changes
- Perform in-depth historical analysis and use automated diagnostics apps to identify root causes of issues quickly
This document is Fatma HAMDI's end of studies project from 2005/2006 on developing a GSM/GPRS evaluation and optimization tool. The project was conducted at Tunisie Telecom's Mobile Network Direction.
The project involved designing and implementing software to allow live observation of a GSM/GPRS network's performance in order to help train operators. It describes the principles of GSM and GPRS networks, especially regarding radio interfaces. It also specifies the architecture and functionality of the evaluation tool. Additionally, it includes a case study to demonstrate how the tool can be used for optimization.
The tool is designed as a post-processing tool to analyze drive test data and key performance indicators in a
Open Innovation via Java-enabled Network DevicesTal Lavian Ph.D.
Open Innovationvia Java-enabled Network Devices:
Collaboration with Business Applications
Server Collaboration
Active Network Management
Diagnostic Mobile Agents
Active Intrusion Detection
ORE - Oplet Run-time Environment
Java-enabled Device Architecture
Separation of Control and Forwarding Planes
Dynamic Configuration of Forwarding Rules
Real-time forwarding Stats and Monitors
Radio network optimization flow 20090429-a-4.0Mashaal322
This document provides an overview of Huawei's radio network optimization work flow. It begins by outlining the objectives of the course as helping readers understand the workflow, master its key points, and standardize radio network planning. It then describes the four phases of the network lifecycle and how radio network planning and optimization services fit within each phase. The remainder of the document details the specific procedures and key considerations for initial tuning, network performance improvement, interference analysis, neighbor cell optimization, RF parameter optimization, VIP guarantee, network performance monitoring, and customer acceptance.
1) The document describes key performance indicators (KPIs) for measuring the performance of an LTE radio network. It discusses KPIs related to accessibility, retainability, mobility, and latency.
2) Accessibility KPIs measure aspects like call setup success rate, RRC setup success rate, and E-RAB setup success rate. Retainability KPIs measure call drop rate and call setup completion rate. Mobility KPIs measure handover success rates within LTE and between LTE and other technologies.
3) For each KPI, the document provides a definition, calculation formula, and description of which network events and counters are needed to measure the KPI. Baseline
A 12 page paper describing the challenges of diagramming enterprise networks and the benefits of Dynamic Mapping. The paper draws analogies between Dynamic Maps and Google Maps.
This document provides guidance on measuring LTE KPIs through drive tests and point tests. It outlines the tools, software, and test procedures needed to measure metrics like coverage probability, throughput, latency, and jitter. Drive tests should measure KPIs along roads to test coverage, while point tests evaluate specific metrics like edge throughput and sector throughput at selected locations. The results are used to evaluate whether KPI targets are met.
NetBrain Consultant Edition (CE) is designed to make a Consultant’s job easier by providing instant network discovery, document automation, and visual troubleshooting. NetBrain enables consultants to:
1. Carry out deep discovery of the customer network
2. Automate documentation for network assessments
3. Analyze network design visually
4. Automatically troubleshoot and collect data without custom scripts
In short, NetBrain’s visual workbench allows consultants to complete network assessment tasks much faster and with much more accuracy.
Dynamic diagrams are created on-demand, instantly. Because they are data-driven from the live network, they are always up-to-date. Through this approach, there’s no need to create and maintain a database of drawings.
The document discusses key performance indicators (KPIs) for 3G radio networks. It provides an overview of important KPIs such as call setup success rate, call drop rate, and data throughput. It describes methods for measuring KPIs including drive testing, stationary testing, and statistical analysis. The document also discusses how to optimize radio networks by adjusting parameters and resolving issues to improve KPIs like accessibility, retainability, and service integrity. Case studies demonstrate analyzing and troubleshooting KPI issues.
This document discusses software defined networking (SDN) and its opportunities and use cases for unified communications (UC). SDN allows the separation of the control plane from the forwarding plane, enabling centralized control of network elements. This centralized control allows UC applications to explicitly identify traffic, request quality of service treatments, and prevent network overload through admission control. Specific UC SDN use cases discussed are automated quality of experience (QoE) through dynamic QoS marking, admission control, and dynamic traffic engineering to optimize media paths and class of service bandwidth.
The document provides a guide for optimizing WCDMA radio networks. It outlines the workflow which includes project preparation, single site verification, RF optimization, service optimization, and output reporting. Each step of the workflow is described in detail, covering objectives, preparation, drive testing, data analysis, parameter adjustment recommendations, and benchmarks. Optimization techniques involve adjusting engineering parameters, radio parameters like neighbor lists, and addressing issues related to coverage, interference, call drops, and service quality.
Clustering is a new feature introduced in AOS 8.0 that enables seamless roaming of clients between APs, hitless client failover and load balancing of users across Mobility Controllers in the cluster. This solution provides the configuration required to create a cluster of Mobility Controllers that are managed by the same Mobility Master.
Check out the webinar recording where this presentation was used:
https://community.arubanetworks.com/t5/Wired-Intelligent-Edge-Campus/Airheads-Tech-Talks-Advanced-Clustering-in-AOS-8-x/td-p/506441
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...Jean de la Sagesse
The document discusses key performance indicators (KPIs) for 2G and 3G networks and how top telecom vendors like Ericsson, Huawei, and NSN optimize parameters to improve these KPIs. It outlines techniques for reducing TCH blocking, SD blocking, TCH drop, HOSR, TASR, SD drop, and improving paging success rate through actions like changing configuration parameters, enabling features, addressing hardware issues, and optimizing cells physically. The optimization of these parameters can help maintain balance between network throughput, capacity and radio quality while ensuring a seamless transition between 2G and 3G.
In this presentation, we will be sharing a collection of several vital configuration tips and tricks which are widely implemented across mid-size to large enterprise WLAN. Our primary focus would be on Security as well as Performance characteristics of Aruba WLAN networks. Check out the webinar recording where this presentation was used: https://community.arubanetworks.com/t5/Wireless-Access/Airheads-Technical-Webinar-Recording-Slides-Aruba-OS/m-p/277294
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
In This Presentation, Following Topics for PCRF advanced, with details of E// SAPC, are clarified and presented.
Connectivity to the SAPC
O&M Process
Bundle Configuration
Redirection
Threshold Configuration
LDAP
Database etc
The document discusses key performance indicators (KPIs) for LTE networks. It describes KPIs related to accessibility, retainability, integrity, and mobility. Accessibility KPIs measure how successfully users can access the network, including session setup success rate, RRC connection success rate, and ERAB establishment success rate. Retainability KPIs evaluate how well services are retained once connected, such as call drop rate and ERAB drop rate. Integrity KPIs relate to throughput, including downlink and uplink throughput. Mobility KPIs cover handover success rates for different types of handovers between nodes. Formulas are provided for calculating many of the KPIs.
"In a mobile-first environment, breadth and depth of visibility into users, clients, applications, RF and non-RF elements
that impact user experience are a must. Learn how AirWave delivers powerful network health assurance with advanced monitoring capabilities to eliminate
problems before they occur, and the intelligence to troubleshoot rapidly and get users back to business faster."
This presentation will show you how to right size customer networks, take advantage of ARM, Band steering and Client Match. Check out the webinar recording where this presentation was used. https://attendee.gotowebinar.com/recording/4688596131469180162
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
The document discusses self-organizing networks (SON). It defines SON as an automation technology to simplify network management. SON has three main areas: self-configuration, self-optimization, and self-healing. Self-configuration allows for automatic configuration of new base stations. Self-optimization continually adjusts network parameters to optimize coverage, capacity, and interference. Self-healing enables automatic detection and resolution of faults to temporarily work around problems until permanent solutions are implemented. The benefits of SON include reduced costs, improved network performance and user experience, and more optimized use of resources.
Overcoming challenges of_verifying complex mixed signal designsPankaj Singh
Efficient and Innovative Digital Mixed-Signal (DMS) verification methodology is required to enable effective verification of RX path of SERDES. This presentation describes the usage of Real value models and Capture -Verify approach to verify complex high speed mixed signal design.
Real value models are the backbone of DMS methodology. Real value models are created for all critical modules in Receive path like Equalizer and Sampler and its associated peripheral modules. It is critical to make sure created models are functionally equivalent to respective designs. This is achieved by verifying each created model with respective designs for all functional modes. While the Real Value models are effective in meeting overcoming the simulation performance bottleneck by achieving 10x faster simulation time; the Nonlinearity factors of the front-end design are not represented accurately in discrete domain real value models for next generation of SerDes Design at very high data rate.
To overcome this problem, a novel approach called ‘capture and verify’ is used for verifying the jitter tolerance and eye parameters. In this approach, waveforms from spice level verification of Equalizer for different functional modes are captured and stored. These stored waveforms are used to generate run time table-based models to accurately represent the analog modules. These run time models are used in top-level simulations along with real value models thereby achieving required goal of simulation performance without compromising on accuracy of results.
The complete Design Verification (DV) environment is developed using UVM-e Methodology. Verification environment contains model for transmitter with all de-emphasis settings along with protocol compliant channels with multiple attenuations. DV infrastructure has hooks to plug-in required channel models to verify SERDES. This verification environment is also capable of verifying the clock data recovery (CDR) path of the design using protocol compliant jitter and Spread-Spectrum Clocking (SSC) stimulus.
The real value modelling bridges the gap between the performance requirements of the simulation and accuracy limitations of design. A significant speed-up in simulation performance is achieved (almost 10X in this case) by replacing with functionally equivalent real value models for mixed signal designs. Usage of Capture and Verify methodology with spice simulation waveforms for critical blocks ensures non-linearity of the next generation high speed SerDes design is well captured in simulations provide complete comprehensive solution for high speed mixed signal designs.
This document provides guidance on optimizing 3G radio network performance. It begins by discussing network planning best practices and the importance of proper site placement. The document then describes various checks that should be performed to evaluate network health, including alarms, software/parameters, neighbors, cell load, and KPIs. Potential issues that could impact performance are also outlined. The document concludes by listing the top 10 optimization activities that can improve call performance for common issues as well as voice, video, PS, and ISHO-specific problems. Guidance is provided on tools that can be used for optimization, including field measurement tools for drive testing.
Bandit framework for systematic learning in wireless video based face recogni...ieeepondy
This document proposes a bandit-based learning framework to optimize video-based face recognition over wireless networks and cloud computing. It introduces two multi-armed bandit algorithms that use contextual information to adapt transmission parameters and maximize recognition rates. The algorithms are shown to outperform reinforcement learning methods, reducing video frames processed by 17-44% and network traffic by 12-37%.
We develop custom Image Recognition systems for Aerospace and defence applications. Using algorithms like Deep Convolutional Neural Networks and Regional Convolutional Neural Networks.
Our algorithms for Target Recognition and Tracking are designed from the beginning to be run on embedded systems. We target both GPU and FPGA devices.
To Train and Validate our algorithms we developed a process to generate photorealistic 3D environments.
Those 3D Environments are used to produce realistic video streams of the targets in different environmental conditions (lighting, adverse meteorological conditions, camouflage, point-of-view).
The same technology can be used to Train and Test Automotive Vision Systems.
1) The document describes key performance indicators (KPIs) for measuring the performance of an LTE radio network. It discusses KPIs related to accessibility, retainability, mobility, and latency.
2) Accessibility KPIs measure aspects like call setup success rate, RRC setup success rate, and E-RAB setup success rate. Retainability KPIs measure call drop rate and call setup completion rate. Mobility KPIs measure handover success rates within LTE and between LTE and other technologies.
3) For each KPI, the document provides a definition, calculation formula, and description of which network events and counters are needed to measure the KPI. Baseline
A 12 page paper describing the challenges of diagramming enterprise networks and the benefits of Dynamic Mapping. The paper draws analogies between Dynamic Maps and Google Maps.
This document provides guidance on measuring LTE KPIs through drive tests and point tests. It outlines the tools, software, and test procedures needed to measure metrics like coverage probability, throughput, latency, and jitter. Drive tests should measure KPIs along roads to test coverage, while point tests evaluate specific metrics like edge throughput and sector throughput at selected locations. The results are used to evaluate whether KPI targets are met.
NetBrain Consultant Edition (CE) is designed to make a Consultant’s job easier by providing instant network discovery, document automation, and visual troubleshooting. NetBrain enables consultants to:
1. Carry out deep discovery of the customer network
2. Automate documentation for network assessments
3. Analyze network design visually
4. Automatically troubleshoot and collect data without custom scripts
In short, NetBrain’s visual workbench allows consultants to complete network assessment tasks much faster and with much more accuracy.
Dynamic diagrams are created on-demand, instantly. Because they are data-driven from the live network, they are always up-to-date. Through this approach, there’s no need to create and maintain a database of drawings.
The document discusses key performance indicators (KPIs) for 3G radio networks. It provides an overview of important KPIs such as call setup success rate, call drop rate, and data throughput. It describes methods for measuring KPIs including drive testing, stationary testing, and statistical analysis. The document also discusses how to optimize radio networks by adjusting parameters and resolving issues to improve KPIs like accessibility, retainability, and service integrity. Case studies demonstrate analyzing and troubleshooting KPI issues.
This document discusses software defined networking (SDN) and its opportunities and use cases for unified communications (UC). SDN allows the separation of the control plane from the forwarding plane, enabling centralized control of network elements. This centralized control allows UC applications to explicitly identify traffic, request quality of service treatments, and prevent network overload through admission control. Specific UC SDN use cases discussed are automated quality of experience (QoE) through dynamic QoS marking, admission control, and dynamic traffic engineering to optimize media paths and class of service bandwidth.
The document provides a guide for optimizing WCDMA radio networks. It outlines the workflow which includes project preparation, single site verification, RF optimization, service optimization, and output reporting. Each step of the workflow is described in detail, covering objectives, preparation, drive testing, data analysis, parameter adjustment recommendations, and benchmarks. Optimization techniques involve adjusting engineering parameters, radio parameters like neighbor lists, and addressing issues related to coverage, interference, call drops, and service quality.
Clustering is a new feature introduced in AOS 8.0 that enables seamless roaming of clients between APs, hitless client failover and load balancing of users across Mobility Controllers in the cluster. This solution provides the configuration required to create a cluster of Mobility Controllers that are managed by the same Mobility Master.
Check out the webinar recording where this presentation was used:
https://community.arubanetworks.com/t5/Wired-Intelligent-Edge-Campus/Airheads-Tech-Talks-Advanced-Clustering-in-AOS-8-x/td-p/506441
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...Jean de la Sagesse
The document discusses key performance indicators (KPIs) for 2G and 3G networks and how top telecom vendors like Ericsson, Huawei, and NSN optimize parameters to improve these KPIs. It outlines techniques for reducing TCH blocking, SD blocking, TCH drop, HOSR, TASR, SD drop, and improving paging success rate through actions like changing configuration parameters, enabling features, addressing hardware issues, and optimizing cells physically. The optimization of these parameters can help maintain balance between network throughput, capacity and radio quality while ensuring a seamless transition between 2G and 3G.
In this presentation, we will be sharing a collection of several vital configuration tips and tricks which are widely implemented across mid-size to large enterprise WLAN. Our primary focus would be on Security as well as Performance characteristics of Aruba WLAN networks. Check out the webinar recording where this presentation was used: https://community.arubanetworks.com/t5/Wireless-Access/Airheads-Technical-Webinar-Recording-Slides-Aruba-OS/m-p/277294
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
In This Presentation, Following Topics for PCRF advanced, with details of E// SAPC, are clarified and presented.
Connectivity to the SAPC
O&M Process
Bundle Configuration
Redirection
Threshold Configuration
LDAP
Database etc
The document discusses key performance indicators (KPIs) for LTE networks. It describes KPIs related to accessibility, retainability, integrity, and mobility. Accessibility KPIs measure how successfully users can access the network, including session setup success rate, RRC connection success rate, and ERAB establishment success rate. Retainability KPIs evaluate how well services are retained once connected, such as call drop rate and ERAB drop rate. Integrity KPIs relate to throughput, including downlink and uplink throughput. Mobility KPIs cover handover success rates for different types of handovers between nodes. Formulas are provided for calculating many of the KPIs.
"In a mobile-first environment, breadth and depth of visibility into users, clients, applications, RF and non-RF elements
that impact user experience are a must. Learn how AirWave delivers powerful network health assurance with advanced monitoring capabilities to eliminate
problems before they occur, and the intelligence to troubleshoot rapidly and get users back to business faster."
This presentation will show you how to right size customer networks, take advantage of ARM, Band steering and Client Match. Check out the webinar recording where this presentation was used. https://attendee.gotowebinar.com/recording/4688596131469180162
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
The document discusses self-organizing networks (SON). It defines SON as an automation technology to simplify network management. SON has three main areas: self-configuration, self-optimization, and self-healing. Self-configuration allows for automatic configuration of new base stations. Self-optimization continually adjusts network parameters to optimize coverage, capacity, and interference. Self-healing enables automatic detection and resolution of faults to temporarily work around problems until permanent solutions are implemented. The benefits of SON include reduced costs, improved network performance and user experience, and more optimized use of resources.
Overcoming challenges of_verifying complex mixed signal designsPankaj Singh
Efficient and Innovative Digital Mixed-Signal (DMS) verification methodology is required to enable effective verification of RX path of SERDES. This presentation describes the usage of Real value models and Capture -Verify approach to verify complex high speed mixed signal design.
Real value models are the backbone of DMS methodology. Real value models are created for all critical modules in Receive path like Equalizer and Sampler and its associated peripheral modules. It is critical to make sure created models are functionally equivalent to respective designs. This is achieved by verifying each created model with respective designs for all functional modes. While the Real Value models are effective in meeting overcoming the simulation performance bottleneck by achieving 10x faster simulation time; the Nonlinearity factors of the front-end design are not represented accurately in discrete domain real value models for next generation of SerDes Design at very high data rate.
To overcome this problem, a novel approach called ‘capture and verify’ is used for verifying the jitter tolerance and eye parameters. In this approach, waveforms from spice level verification of Equalizer for different functional modes are captured and stored. These stored waveforms are used to generate run time table-based models to accurately represent the analog modules. These run time models are used in top-level simulations along with real value models thereby achieving required goal of simulation performance without compromising on accuracy of results.
The complete Design Verification (DV) environment is developed using UVM-e Methodology. Verification environment contains model for transmitter with all de-emphasis settings along with protocol compliant channels with multiple attenuations. DV infrastructure has hooks to plug-in required channel models to verify SERDES. This verification environment is also capable of verifying the clock data recovery (CDR) path of the design using protocol compliant jitter and Spread-Spectrum Clocking (SSC) stimulus.
The real value modelling bridges the gap between the performance requirements of the simulation and accuracy limitations of design. A significant speed-up in simulation performance is achieved (almost 10X in this case) by replacing with functionally equivalent real value models for mixed signal designs. Usage of Capture and Verify methodology with spice simulation waveforms for critical blocks ensures non-linearity of the next generation high speed SerDes design is well captured in simulations provide complete comprehensive solution for high speed mixed signal designs.
This document provides guidance on optimizing 3G radio network performance. It begins by discussing network planning best practices and the importance of proper site placement. The document then describes various checks that should be performed to evaluate network health, including alarms, software/parameters, neighbors, cell load, and KPIs. Potential issues that could impact performance are also outlined. The document concludes by listing the top 10 optimization activities that can improve call performance for common issues as well as voice, video, PS, and ISHO-specific problems. Guidance is provided on tools that can be used for optimization, including field measurement tools for drive testing.
Bandit framework for systematic learning in wireless video based face recogni...ieeepondy
This document proposes a bandit-based learning framework to optimize video-based face recognition over wireless networks and cloud computing. It introduces two multi-armed bandit algorithms that use contextual information to adapt transmission parameters and maximize recognition rates. The algorithms are shown to outperform reinforcement learning methods, reducing video frames processed by 17-44% and network traffic by 12-37%.
We develop custom Image Recognition systems for Aerospace and defence applications. Using algorithms like Deep Convolutional Neural Networks and Regional Convolutional Neural Networks.
Our algorithms for Target Recognition and Tracking are designed from the beginning to be run on embedded systems. We target both GPU and FPGA devices.
To Train and Validate our algorithms we developed a process to generate photorealistic 3D environments.
Those 3D Environments are used to produce realistic video streams of the targets in different environmental conditions (lighting, adverse meteorological conditions, camouflage, point-of-view).
The same technology can be used to Train and Test Automotive Vision Systems.
This presentation discusses developing custom image recognition systems for automotive and defense applications using deep learning techniques. It describes generating 3D environments to realistically simulate environmental and system conditions for training and validating vision algorithms. These virtual environments can be used to test automotive vision systems. The presentation also covers algorithm development targeting GPU and FPGA hardware, including a proposed integrated development environment for designing convolutional neural networks on FPGAs.
Enabling SDN for Service Providers by Khay Kid ChowMyNOG
1. The document discusses how programmable networks and network functions virtualization (NFV) enable new use cases and business models for service providers by making networks software-defined and services elastic.
2. Key aspects covered include centralizing network control, virtualizing network functions, and using orchestration to dynamically provision and monitor virtualized services across compute and network infrastructure on demand.
3. The benefits highlighted are automating network operations, enabling new self-service capabilities, and decreasing time to revenue through agile service creation.
Probabilistic Approach to Provisioning of ITV - Amos K.Amos Kohn
This white paper discusses a probabilistic approach to provisioning network and computing resources for delivering interactive TV. It develops a proprietary spreadsheet model to estimate the costs and benefits of deploying an interactive TV streaming processor. The model is based on analyzing user behavior, data packaging into MPEG streams, required bit rates, transport of data over the forward and return paths, necessary processing power, and financial projections to calculate return on investment.
Probabilistic Approach to Provisioning of ITV - By Amos_KohnAmos Kohn
This white paper discusses a probabilistic approach to provisioning network and computing resources for delivering interactive TV. It develops a proprietary spreadsheet model to estimate the costs and benefits of deploying an interactive TV streaming processor. The model is based on analyzing user behavior, data packaging into MPEG streams, required bit rates, forward and return network paths, processing needs, and financial projections to calculate return on investment.
- Marky Hung has experience developing firmware and software for GPS, WiFi, image sensor, and virtual reality applications. He has worked at companies such as Himax, HTC, Transystem, and Altek where he served as a senior engineer or advanced engineer. His skills include C/C++, Python, embedded systems, wireless protocols, image processing, and algorithm development.
Iaetsd arm based remote surveillance and motion detectionIaetsd Iaetsd
This document describes an arm-based remote surveillance and motion detection system using MJPEG compression. The system uses an ARM9 processor and Linux operating system to capture video from a camera. The video is compressed using MJPEG and transmitted over the internet. Users can view the live video stream and detect motions using a web browser. The system is designed for applications like security, transportation and home monitoring due to its low cost, stability and security compared to traditional DSP-based solutions.
Real-time image processing (RTIP) involves capturing video input with low latency and processing it in real-time for applications like video conferencing and augmented reality. RTIP systems require high-performance hardware and optimized software. A traffic monitoring application uses RTIP to detect vehicle queues in real-time through motion detection and vehicle detection algorithms, helping manage traffic flow. RTIP will continue powering new applications by enabling real-time computer vision tasks.
Server-based and Network-assisted Solutions for Adaptive Video StreamingEswar Publications
This document discusses server-based and network-assisted solutions for adaptive video streaming. It begins with an abstract that outlines server-based adaptive streaming is gaining popularity as clients and network devices are not powerful enough to run advanced adaptation algorithms. The document then provides a taxonomy that categorizes adaptive video streaming solutions and focuses on server-based and network-assisted solutions. It discusses various classical computing approaches relevant to server-based solutions such as traffic shaping, video pacing, and rate limiting. The document also proposes a taxonomy of server-based approaches and discusses state-of-the-art solutions for traffic management and protocol/parameter-centric categories. Finally, it discusses network-assisted solutions and recent approaches that show the advantages of using network-
This document describes a network monitoring system. It discusses network monitoring tools, Simple Network Management Protocol (SNMP), and WinPcap. Network monitoring tools examine local area network usage and provide statistical data on network traffic. SNMP uses an agent/manager model to monitor and manage network devices. WinPcap is used for direct network access and packet capturing under Windows. The document outlines the system design, architecture, implementation using Visual C++, and testing of the network monitoring system. It can be enhanced with additional features such as fault management, alerts, security monitoring, and traffic management.
This document describes a network monitoring system. It begins with basic terminology related to network monitoring tools and protocols like SNMP and WinPcap. It then discusses why network monitoring is needed and current research progress. The document outlines the system design, including UML diagrams, and tools and protocols used. It provides details on implementation modules like the network browser and traffic monitoring. Finally, it discusses testing and future enhancements.
Over the past several years, networking drives has evolved through several phases:
Phase 1 involved connecting an intelligent device like a PLC to the drive via contacts. Phase 2 added one-way network communication for control only. Phase 3 enabled two-way communication for monitoring and programming. Web-enabled Ethernet simplifies this by making drive data and control transparent via a web browser from anywhere on the intranet without special software. This improves usability, access, and enables more advanced functions like real-time tuning displays.
FIWARE Global Summit - Real-time Media Stream Processing Using KurentoFIWARE
Kurento is an open source software that simplifies the creation of real-time communication applications involving audio and video streams. It provides a server that abstracts compatibility issues between senders and receivers and allows for manipulation or redistribution of streams. The server includes endpoints for stream input/output and filters for processing or transforming media as it flows through the pipeline. Example applications demonstrated by Kurento include an RTP receiver that redirects streams to a browser and a magic mirror that applies computer vision to detect and overlay images on a face in real-time video.
This document discusses mobile internet optimization as an effective tool for mobile operators. It outlines how mobile internet traffic, especially video, is growing enormously which challenges operators to optimize network expenditure and ensure quality of experience. It describes how mobile internet optimization works through dynamic data reduction, transport protocol optimization, and application protocol optimization to reduce traffic amounts and load times, providing capacity savings and quality gains. Global usage of these solutions among operators and providers is also discussed.
Effective and Secure Scheme for Video Multicasting using Real Time Transport ...IRJET Journal
This document summarizes a research paper that proposes an effective and secure scheme for video multicasting using the Real-Time Transport Protocol (RTP). The system allows users to stream video over a local area network in real-time. It uses RTP to transport video data and the Advanced Encryption Standard (AES) to encrypt the data for security. The system was tested on a local network with a server transmitting video to multiple client systems. Testing showed the system could efficiently multicast high-quality video streams over long distances using LAN cables while maintaining bandwidth efficiency and quality of service compared to unicast transmission.
YUVsoft Corp is a private company located in Moscow that develops video processing and compression technologies. Formed 4 years ago with a core team of 8 years, they have 20 employees specializing in areas like video preprocessing, processing, compression, and quality assessment. Their expertise comes from their background in compression algorithms and computer vision methods from Moscow State University. They license their technologies and provide consulting services and research to companies like Intel, Samsung, and RealNetworks.
HARDWARE SOFTWARE CO-SIMULATION OF MOTION ESTIMATION IN H.264 ENCODERcscpconf
This paper proposes about motion estimation in H.264/AVC encoder. Compared with standards
such as MPEG-2 and MPEG-4 Visual, H.264 can deliver better image quality at the same
compressed bit rate or at a lower bit rate. The increase in compression efficiency comes at the
expense of increase in complexity, which is a fact that must be overcome. An efficient Co-design
methodology is required, where the encoder software application is highly optimized and
structured in a very modular and efficient manner, so as to allow its most complex and time
consuming operations to be offloaded to dedicated hardware accelerators. The Motion
Estimation algorithm is the most computationally intensive part of the encoder which is simulated using MATLAB. The hardware/software co-simulation is done using system generator tool and implemented using Xilinx FPGA Spartan 3E for different scanning methods.
This document contains summaries of 14 software projects developed by LV Tailoring Software for the semiconductor and medical industries. The software projects include modifications to robotic arm cleaning systems, advanced matching for CDSEM metrology, remote CDSEM control centers, log file analyzers for various tools, and systems for fast creation of new product classes for metrology tools.
Video Streaming Compression for Wireless Multimedia Sensor NetworksIOSR Journals
This document discusses video streaming compression for wireless multimedia sensor networks. It proposes a cross-layer system that jointly controls the video encoding rate, transmission rate, and uses an adaptive parity scheme. At the application layer, video is compressed and divided into packets. These packets are encoded at the transport layer and forwarded through the network layer. An active buffer management scheme and adaptive parity check are used to maximize received video quality over lossy wireless links. Simulation results show the proposed techniques can achieve higher throughput by resequencing dropped packets. The goal is to design an efficient system for wireless transmission of compressed video that optimizes video quality.
Similar to Real time data streaming and motion control over the internet (20)
EPID is a digital signature scheme that allows for anonymity and privacy. It uses a single public key that corresponds to multiple private keys, so the private key used to generate a signature cannot be identified. EPID signatures can be verified using the group public key. EPID provides granular revocation mechanisms and has been shipping since 2008 in Intel processors. It is used for technologies like Intel Insider, Intel TXT, Intel IPT and Intel SGX.
This document is a presentation from Intel about their Internet of Things (IoT) developer platform and tools. It introduces Intel's IoT reference architecture and developer kit, which includes hardware boards, middleware libraries, cloud connectors, and integrated development environments. It provides examples of code samples and reference applications that developers can use to prototype and develop IoT solutions using Intel technologies.
Cisco Paris DevNet Hackathon slideshow - IntroBeMyApp
This document outlines an agenda for a 48-hour hackathon in Paris to invent the city of the future. It will include presentations from Cisco and various technology partners on topics like smart cities, Internet of Things, and cloud platforms. Participants will then pitch project ideas before forming teams and beginning development. Over the weekend, teams will work on their projects, receive mentoring, and do practice pitches. On the final day, projects will be presented to a jury for cash prizes. The goal is to generate innovative ideas for connecting people, data, and devices to improve city services.
Tumeurs Neuroendocrines : une vue d'ensembleBeMyApp
Le Dr Olivier Dubreuil donne une vue d'ensemble des Tumeurs Neuroendocrines via une présentation donnée au cour de la soirée Idéation du hackathon NET Patient Accelerator qui a eu lieu le 30 avril 2016 à la Zalthabar.
Building your first game in Unity 3d by Sarah SextonBeMyApp
Learn to create a 3D isometric survival shooter called Nightmares using Unity 5 in this hands-on workshop. Although this workshop is beginner-friendly, you need to understand mathematical 3D concepts.
Using intel's real sense to create games with natural user interfaces justi...BeMyApp
As technology advances, more sophisticated ways of interfacing with it are emerging. Even though new tech strives to make our apps more intuitive and easy to use, designing interfaces for those apps is not quite as straight forward. We’ve learned a few rules and “gotchas” when working with gesture cameras that can help to make apps that use them easy and fun to use.
In this talk Justin described:
1. Different data types you can get from Intel® RealSense™ and how to get them
2. Designing an interface for a gesture camera
3. Using your hands, face, and voice as an interface
Introduction to using the R200 camera & Realsense SDK in Unity3d - Jon CollinsBeMyApp
We used the Intel RealSense SDK In conjunction with the R200 Camera to bring about the fun, interactive and tactile gameplay featured at GDC16. Using Intel® RealSense™ we were able to create a unique gameplay experience with every play through, as the players themselves sculpted the terrain the game used out of sand which was monitored by the camera and our code effectively translated the profile of the sand into a terrain. In this talk we’ll use one of the realsense samples to step through and gain an insight into how that depth data is translated into a usable game object in Unity3d.
In this talk, Jon described:
1. Features we used in the Magic and Magnums Tower Defense game
2. Using the Blob Sensing and tracking actions provided in the Unity Toolkit for Realsense
3. Using the Realsense Depth feed to manipulate meshes
Unity 5 introduces a new Audio Mixer system to take your game’s music and sound effects to the next level! Andy will give a hands-on, in-editor demo of all the new Audio Features introduced in the latest version of the Unity game engine; covering in-game sound mixing, groups, applying effects, audio ducking, fading and more!
This talk is welcome to all but at least some Unity knowledge will be useful.
Shaders - Claudia Doppioslash - Unity With the BestBeMyApp
Shader programming is one of the things that most influences how good your game will look, yet it's perceived as a black art, hidden away and feared.
In this talk, Claudia described:
1. How shader programming works
2. How Unity lets you take almost full control of the shader subsystem
3. What you can achieve with that control
4. How to implement a custom Physically Based Lighting system and the logic behind every choice
[HACKATHON CISCO PARIS] Slideshow du workshop Smart CityBeMyApp
Slideshow du workshop Smart City organisé le mercredi 23 mars au NUMA. Ce workshop est organise dans le cadre du hackathon Smart City les 1-3 avril prochain.
Before Spécial 1ère Année proposé par BeMyApp le 8 mars 2016 à l'École 42. Tous les bons conseils, astuces, liens pour des Softwares | Applications pour bien réussir un Hackathon.
[Workshop e résidents] présentation intent, craft ai, dalkia et incubateurBeMyApp
Slideshow de présentation diffusé lors du workshop idéation / soirée pitch à l'Usine io le lundi 1er février. Cet événement a été organisé dans le cadre du Programme E-résidents.
http://hackathon.dalkia.fr/
[Webinar E-résidents #1] Présentation des différents métiers du bâtiment conn...BeMyApp
Dans le cadre du hackathon E-résidents, nous organisons deux webinars de 30 minutes chacun les mardi 19 et 26 janvier à 18h.
Pour cette première immersion au sein du bâtiment connecté, ce sont les deux supers mentors Jean-Yves Lépine et Patrick Quach respectivement Directeur des Relations Clients chez Dalkia et Product Manager chez Intent Technologies, qui expliqueront en détail les différents métiers (gestionnaire de patrimoine, exploitant, fournisseurs de services, occupants, etc...). Ils aborderont les problématiques de chaque acteur ainsi que des idées d'applications à développer et/ou existantes. Une session de questions/réponses suivra.
18h - Introduction par Alex de BeMyApp
18h05 - Présentation des métiers du bâtiment connecté
18h25 - Idées & inspirations pour le hackathon
18h30 - Q&A
Pour rappel, le hackathon E-résidents aura lieu les 5-7 février prochain à l'Usine io. Le workshop Idéation est complémentaire de ce webinar, il prévu le mardi 2 février toujours à l'Usine io.
[IoT World Forum Webinar] Review of CMX Cisco technologyBeMyApp
Cisco's CMX provides location detection, visibility, and engagement capabilities through Wi-Fi, BLE, and video technologies. It uses the MSE for location calculation and WLC/APs to collect client RSSI data. The CMX Mobile App Server hosts applications and Notification Receivers subscribe to location events. CMX's REST API allows extracting real-time location data for various use cases like improving customer experience in retail, banking, hospitality, and healthcare industries.
This document provides an overview of user experience (UX) design. It discusses what UX is, how to deliver good UX by understanding users' needs and goals, envisioning key use cases, creating feature lists, prototyping solutions, testing prototypes with users, and following usability heuristics like ensuring visibility of system status and matching systems to the real world. The document aims to provide both high-level and practical tips for designing more usable solutions that solve problems and meet user needs.
HP Helion Webinar #5 - Security Beyond FirewallsBeMyApp
Giuseppe Paternò is an IT security expert who has worked with many large companies. He discussed security issues with OpenStack and cloud applications. Neutron provides software-defined networking and security groups for network segmentation. Keystone handles identity management. APIs must be secured to protect resources and authentication tokens. Continuous security practices like automated testing and monitoring help harden the cloud platform.
HP Helion Webinar #4 - Open stack the magic pillBeMyApp
We will go through a quick overview about the 5 years of OpenStack cloud computing platform. This webinar explains the short history of this fast growing open-source initiative, and try to answer the common questions about the place of infrastructure and platform services in the IT hierarchy.
The technology is ready, but are we ready for the cloud adoption? Does it really solve our business problems? Learn the basic terminology, get an insight about the IT operation and development transition steps required to win the efficiency race.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Real time data streaming and motion control over the internet
1. Motivation
Our Results
Summary
Real-time data streaming and motion control over the Internet
Implement real-time QoS-aware data streaming for Internet-connected things.
Andrey Nechypurenko
andreynech@gmail.com
Maksym Parkachov
mparkachov@me.com
Ultracode-Munich, April 2014
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet
2. Motivation
Our Results
Summary
Stream data between connected things
Problem statement
Let’s build the vehicle and control it over the Internet
As a hobby project, we start developing small vehicle equipped with on-board
computer connected to WLan adapter and web-camera. The idea was to control the
car over Internet.
Main challenges
Find or build mechanical platform
Build electronic which can:
Compress live video stream to h264 format in real-time
Support W-WLan connectivity
Have enough IO channels to control motors
Develop software which can:
Deliver video stream and sensor data to the remote driver
Receive user input such as steering and acceleration
Deliver control commands from the driver to the vehicle software and drive actuators
Support client and server NAT and firewall traversal
Provide high quality video under variable network conditions
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet
3. Motivation
Our Results
Summary
Stream data between connected things
Problem statement
High level system overview
The whole system software has two main tasks:
Deliver video stream and sensor data from the vehicle to the remote driver and
Deliver control commands from the driver to the vehicle software and drive vehicle
actuators.
Communication happens over the Internet where it is typical to have two firewalls
(and/or NATs) on the client and server side.
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet
4. Motivation
Our Results
Summary
Stream data between connected things
Problem statement
Mechanic and electronic
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet
5. Motivation
Our Results
Summary
Stream data between connected things
Problem statement
Need for adaptive video streaming
It is important to provide constant frame rate with predictable latency to precisely
control the vehicle. Otherwise, the wall may suddenly appears ahead of the car :-) .
Negative effect of the changing network conditions leads to:
1 Delays in video stream (picture freezes).
2 Corrupted frames (because of dropped frames, etc.).
3 “Fast forward” effect when the next chunk of data arrives.
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet
6. Motivation
Our Results
Summary
Implementation Strategy
Adaptation
Solution - QoS aware streaming
The adaptive Quality of Service (QoS) aware streaming implementation is required to
let the driver precisely control remote vehicle.
To solve the problems mentioned above:
We constantly observe network conditions.
If sensor data could not be send fast enough, adapt to satisfy main goal.
For example, reduce video frame-rate or increase compression rate (e.g. reduce
video quality).
The core adaptation logic resides in the vehicle on-board application.
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet
7. Motivation
Our Results
Summary
Implementation Strategy
Adaptation
Main software modules
To provide this functionality two main modules are required:
Driver application which will be further reffered as cockpit.
Vehicle on-board application which will be reffered as vehicle.
In addition, to perform firewall traversal in the secure and efficient way, additional
application is required on the server side. In this project, ZeroC Ice open-source
middleware is used for all communication needs.
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet
8. Motivation
Our Results
Summary
Implementation Strategy
Adaptation
Cockpit application.
Cockpit application
Cockpit application is responsible for receiving video stream, decoding, and
visualizing it.
In addition cockpit application receives control signals from input hardware and
transmit commands to the vehicle.
Implementation is heavily multithreaded and uses graphics hardware acceleration.
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet
9. Motivation
Our Results
Summary
Implementation Strategy
Adaptation
Cockpit application
An OpenGL-based application to remotely control the robot manually. Sensor data
(including video from cameras) are rendered in real-time and control commands are
sent back to the vehicle.
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet
10. Motivation
Our Results
Summary
Implementation Strategy
Adaptation
On-board software
The vehicle on-board application has the following responsibilities:
Receive commands (such as steering and acceleration) and control actuators.
Capture video, compress it in real-time and send to the cockpit application.
Collect statistic about network bandwidth to perform adaptation in case of
changed network conditions.
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet
11. Motivation
Our Results
Summary
Implementation Strategy
Adaptation
QoS aware streaming
Use TCP instead of UDP to get better feedback about packet delivery status.
Permanently monitor the size of output queue with compressed frames to deduce
the current QoS conditions.
Define the set of states characterized by maximum and minimum queue size to
transition to the better or worth state. In addition, the time-based weight is
introduced which is calculated based on the overall time spent in certain state. It
prevents the system from permanently jumping from one state to another.
React on the state changes by dynamically adjusting frame size and codec target
bitrate (if it is supported by codec).
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet
12. Motivation
Our Results
Summary
Implementation Strategy
Adaptation
Alternatives for streaming implementations
Two implementation options were
considered:
Using GStreamer RTSP server.
Custom transport protocol for RTP
payload using Ice middleware.
To make final decision, both variants were
implemented and compared.
Reasons why Ice was considered as communication solution:
Reduce complexity when implementing complex bidirectional communication.
Transparently handles cross-platform issues such as endianess.
There are two versions of Ice. IceE which has reduced footprint and easier to
cross-compile. The complete version provides the full set of functionality.
Very easy to change the communication protocol. Changing between UDP,
TCP or SSL is the matter of change endpoint description in the configuration file.
There is service application Glacier which solves firewall/NAT related problems.
Asynchronous Method Invocation (AMI) which makes possible to collect more
information about bufferization and transmission performance.
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet
13. Motivation
Our Results
Summary
Implementation Strategy
Adaptation
Test setup
Stream video using two alternative implementations. Use
Linux kernel trafic shaping capabilities to simulate variable
network bandwidth.
Use prerecorded video
For test purposes, we feed the prerecorded video instead of live capturing. Original file
is scaled down on the fly to make the test comparable with live streaming from
web-camera.
Decoding pipeline for cockpit application was not changed.
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet
14. Motivation
Our Results
Summary
Implementation Strategy
Adaptation
Test setup
Linux kernel network traffic shaping capabilities are used to restrict the available
bandwidth and see how both streaming implementations would react on it.
1 MPlayer video output window.
2 Terminal window where traffic shaping
commands are issued.
3 MPlayer console output.
4 KNemo network monitor window.
1 Cockpit application window.
2 Terminal window where traffic shaping
commands are issued.
3 Vehicle application console output.
4 KNemo network monitor window.
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet
15. Motivation
Our Results
Summary
Implementation Strategy
Adaptation
Important observations for RTSP server
When available bandwidth decreased
below the level required to transmit the
video with current encoding parameters
(resolution, frame rate, quality, etc.):
Communication channel is saturated.
Displayed frame rate is significantly
reduced.
No adaptation is occurred.
“Old” frames might be also dropped
which leads to lowered framerate
compared to the original video.
Concluion:
Such behavior is unacceptable for real-time streaming required to control remote
vehicle.
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet
16. Motivation
Our Results
Summary
Implementation Strategy
Adaptation
Important observations for VETER infrastructure
When available bandwidth decreased:
Vehicle application detects changed
networking condition.
Reacts by reducing frame size (current
implementation divides the original
size by the power of two for each
state).
Keeps the same frame rate as original
video.
As a result, used bandwidth is below
current limit and is not saturated.
Conclusion:
Quality of the video is reduced but frame rate remains the same, which is
important for real-time remote control.
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet
17. Motivation
Our Results
Summary
Implementation Strategy
Adaptation
Important observations for VETER infrastructure
After preconfigured amount of time,
attempts to return to the original video
quality (frame size).
If required bandwidth available,
continues to increase frame size.
Conclusion:
Improved bandwidth usage and as a result best possible quality with constant
frame rate is presented to the drivers.
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet
18. Motivation
Our Results
Summary
Summary
Conclusions:
Currently there is no out of the box solution for adaptive real-time video streaming
suited for IoT embedded systems.
Using GStreamer and Ice it is possible to build such solution.
To react on network QoS changes, frame size could be changed on the fly using
videoscale or appropriate hardware accelerated elements like for example
TIVidScale.
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet
19. Appendix For Further Reading
Source code and information availability I
Web site:
http://veterobot.org
Main Veter-project web site.
Blog:
http://veter-project.blogspot.com
Veter-project blog with regular updates about the project.
GitHub:
http://www.github.org/veter-team
Complete source code and documentation repostiroy.
veterobot.org, Andrey Nechypurenko, Maksym Parkachov Real-time data streaming and motion control over the Internet