The postulate of this paper is that current smartphones' power saving modes can be improved towards
saving more power and/or gain more user satisfaction only if they start following “preventive” and/or user
customized power saving plans. We develop a number of preventive power saving modes that save the
battery power without the need of using the power of the same battery for detecting abusage. It will be
supporting the user with a preventive plan that could give him/her an idea about what to run or don’t run.
Another issue of current power saving modes is the “One Size Fits All” philosophy which does not take
into consideration the factors that could distinguish different smartphone users, for example, the nature of
the workspace of the user (Indoor/Outdoor), the age, the gender and/or the user’s applications categories
of interests. The paper develops a strategy to match a smartphone power saving mode with its perfect
smartphone user by classifying smartphones users into classes depending on a set of different factors and
having the user to identify himself/herself to the smartphone before the first use.
Star-rating evaluation model for rating the energy-efficiency level of androi...IJECEIAES
The tremendous increase in smartphone usage is accompanied by an increase in the need for more energy. This preoperational relationship between modern technology and energy generates energy-greedy apps, and therefore power-hungry end users. With many apps falling under the same category in an app store, these apps usually share similar functionality. Because developers follow different design and development schools, each app has its energy-consumption habits. Since apps share similar features, an end-user with limited access to recharging resources would prefer an energy-friendly app rather than a popular energy-greedy app. However, app stores do not indicate the energy behavior of the apps they offer, which causes users to randomly choose apps without understanding their energy-consumption behavior. A review of the relevant literature was provided covering various energy-saving techniques. The results gave an initial impression about the popularity of the usage of two power-saving modes where the average usage of these modes did not exceed 31% among the total 443 Android users. To address this issue, we propose a star-rating evaluation model (SREM), an approach that generates a tentative energy rating label for each app. The model was tested on 7 open-source apps to act as a primary evaluation sample. To that end, SREM adapts current energy-aware refactoring tools to demonstrate the level of energy consumption of an app and presents it in a star-rating schema similar to the Ecolabels used on electrical home appliances. As per our results, SREM helped in saving 35% of smartphone energy.
This document summarizes past research on energy management in mobile devices. It discusses how energy management is important for mobile devices due to limited battery size and longevity concerns. It also discusses the need for operating systems to provide energy isolation, delegation, and subdivision to allow applications to better manage energy usage. The document reviews several models for energy management in mobile devices and compares past research that has measured energy consumption of different components like wireless interfaces in smartphones. It identifies a need for further research to develop more accurate energy management techniques.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Leveraging the Power of Smartphones: Real Time Monitoring of Water PointsIJERA Editor
In recent years, the world has become more sophisticated. Different aspects of today’s life has been digitized, this include; business, education, health, communication and numerous community services. With the existing extended coverage of cellular networks, most services are constantly deployed to be accessed via mobile phones, as they are also the most pervasive pocket carried devices. Though, both regular and smartphone can be used to convey the basics of mobile based services such as mobile banking, calling and text messaging, smartphone goes extra mile. While regular phones are still the better choice for some, smartphones are tremendously taking over the cellphone market. Smartphones are powered by the vast amount of mobile apps available today which offer unprecedented features and functionalities and as well more advanced internet connectivity. To ensure reliable, sufficient and safe water supply to public, the installed water points need to be well monitored. Quality and quantity parameters of water produced from the water points are constantly tracked to determine if they are within the acceptable range. In case of acute condition, the identified parameters need to be instantly communicated to the District Water Engineer (DWE) for prompt intervention. In this paper we explore the popularity and advantages of smartphones and present a proposed prototype that exploit the power of smartphones in real time monitoring of water points.
This document summarizes techniques for improving the energy efficiency of mobile devices in cloud environments. It discusses hardware approaches like improving processors and batteries as well as software approaches including energy-aware operating systems, applications that reduce resource requirements, and resource-aware computing. It also describes approaches that involve offloading computation and data storage to cloud resources to conserve local resources on mobile devices. In conclusion, it emphasizes that improving battery life is important for mobile devices and discusses how mobile cloud computing can help minimize battery consumption through the use of cloud services.
IRJET- A Review on Budget Estimator Android ApplicationIRJET Journal
The document discusses a proposed budget estimator mobile application that would allow users to easily track expenses on a daily and monthly basis. It would integrate with Google Places to provide store location and offer information based on a user's location. The application would take a user's income and divide it into a daily expense allowance. It would cut from income and adjust the allowance if daily expenses were exceeded, or add to savings if expenses were lower than the allowance. At the end of the month, it would generate expense reports in graphs. The proposed application aims to reduce manual calculations and record keeping for users to better track their budgets and spending habits.
iPhone, Android and Tablets - Getting Clinical Value from Mobile DevicesCientis Technologies
The rapid adoption of mobile devices by clinicians and integration of apps into the clinical workflow has created significant opportunities for these devices to become primary tools in the diagnosis and management of disease. This presentation provides an overview of the drivers behind adoption, what clinicians are using and how one can drive more value from these tools. This data was presented at the Technology in Clinical Practice Cruise Conference - April 2013.
Reviewing Power-Saving Approaches Used During the Actual End-User Usage of an...Luis Borges Gouveia
This presentation discuss the energy consumption of Android power saving applications and its approaches. The analysis has been done by evaluating past research papers and surveys that has been done to assess the perception of the users regarding the phone power from their battery. In addition, the study highlights an issue that the notifications regarding the power saving shown on the screen seems to exploit a lot of battery. Therefore, the study has been done to reflect the ways that could help the users to save the phone battery without using any power from the same battery in an efficient manner.
Abdullah AlmasriPrince Sultan UniversitySaudi Arabia
Luis Borges GouveiaUniversity Fernando PessoaPortugal
Star-rating evaluation model for rating the energy-efficiency level of androi...IJECEIAES
The tremendous increase in smartphone usage is accompanied by an increase in the need for more energy. This preoperational relationship between modern technology and energy generates energy-greedy apps, and therefore power-hungry end users. With many apps falling under the same category in an app store, these apps usually share similar functionality. Because developers follow different design and development schools, each app has its energy-consumption habits. Since apps share similar features, an end-user with limited access to recharging resources would prefer an energy-friendly app rather than a popular energy-greedy app. However, app stores do not indicate the energy behavior of the apps they offer, which causes users to randomly choose apps without understanding their energy-consumption behavior. A review of the relevant literature was provided covering various energy-saving techniques. The results gave an initial impression about the popularity of the usage of two power-saving modes where the average usage of these modes did not exceed 31% among the total 443 Android users. To address this issue, we propose a star-rating evaluation model (SREM), an approach that generates a tentative energy rating label for each app. The model was tested on 7 open-source apps to act as a primary evaluation sample. To that end, SREM adapts current energy-aware refactoring tools to demonstrate the level of energy consumption of an app and presents it in a star-rating schema similar to the Ecolabels used on electrical home appliances. As per our results, SREM helped in saving 35% of smartphone energy.
This document summarizes past research on energy management in mobile devices. It discusses how energy management is important for mobile devices due to limited battery size and longevity concerns. It also discusses the need for operating systems to provide energy isolation, delegation, and subdivision to allow applications to better manage energy usage. The document reviews several models for energy management in mobile devices and compares past research that has measured energy consumption of different components like wireless interfaces in smartphones. It identifies a need for further research to develop more accurate energy management techniques.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Leveraging the Power of Smartphones: Real Time Monitoring of Water PointsIJERA Editor
In recent years, the world has become more sophisticated. Different aspects of today’s life has been digitized, this include; business, education, health, communication and numerous community services. With the existing extended coverage of cellular networks, most services are constantly deployed to be accessed via mobile phones, as they are also the most pervasive pocket carried devices. Though, both regular and smartphone can be used to convey the basics of mobile based services such as mobile banking, calling and text messaging, smartphone goes extra mile. While regular phones are still the better choice for some, smartphones are tremendously taking over the cellphone market. Smartphones are powered by the vast amount of mobile apps available today which offer unprecedented features and functionalities and as well more advanced internet connectivity. To ensure reliable, sufficient and safe water supply to public, the installed water points need to be well monitored. Quality and quantity parameters of water produced from the water points are constantly tracked to determine if they are within the acceptable range. In case of acute condition, the identified parameters need to be instantly communicated to the District Water Engineer (DWE) for prompt intervention. In this paper we explore the popularity and advantages of smartphones and present a proposed prototype that exploit the power of smartphones in real time monitoring of water points.
This document summarizes techniques for improving the energy efficiency of mobile devices in cloud environments. It discusses hardware approaches like improving processors and batteries as well as software approaches including energy-aware operating systems, applications that reduce resource requirements, and resource-aware computing. It also describes approaches that involve offloading computation and data storage to cloud resources to conserve local resources on mobile devices. In conclusion, it emphasizes that improving battery life is important for mobile devices and discusses how mobile cloud computing can help minimize battery consumption through the use of cloud services.
IRJET- A Review on Budget Estimator Android ApplicationIRJET Journal
The document discusses a proposed budget estimator mobile application that would allow users to easily track expenses on a daily and monthly basis. It would integrate with Google Places to provide store location and offer information based on a user's location. The application would take a user's income and divide it into a daily expense allowance. It would cut from income and adjust the allowance if daily expenses were exceeded, or add to savings if expenses were lower than the allowance. At the end of the month, it would generate expense reports in graphs. The proposed application aims to reduce manual calculations and record keeping for users to better track their budgets and spending habits.
iPhone, Android and Tablets - Getting Clinical Value from Mobile DevicesCientis Technologies
The rapid adoption of mobile devices by clinicians and integration of apps into the clinical workflow has created significant opportunities for these devices to become primary tools in the diagnosis and management of disease. This presentation provides an overview of the drivers behind adoption, what clinicians are using and how one can drive more value from these tools. This data was presented at the Technology in Clinical Practice Cruise Conference - April 2013.
Reviewing Power-Saving Approaches Used During the Actual End-User Usage of an...Luis Borges Gouveia
This presentation discuss the energy consumption of Android power saving applications and its approaches. The analysis has been done by evaluating past research papers and surveys that has been done to assess the perception of the users regarding the phone power from their battery. In addition, the study highlights an issue that the notifications regarding the power saving shown on the screen seems to exploit a lot of battery. Therefore, the study has been done to reflect the ways that could help the users to save the phone battery without using any power from the same battery in an efficient manner.
Abdullah AlmasriPrince Sultan UniversitySaudi Arabia
Luis Borges GouveiaUniversity Fernando PessoaPortugal
This document summarizes past research on energy management in mobile devices. It discusses how energy management is important for mobile devices due to limited battery size and longevity concerns. It also discusses the need for operating systems to provide energy isolation, delegation, and subdivision to allow applications to better manage energy usage. The document reviews several models for energy management in mobile devices and compares past research that has measured energy consumption of different components like wireless interfaces in smartphones. It identifies a need for further research to develop more accurate energy management techniques.
The evolution of energy requirements of smartphones based on user behaviour a...IJECEIAES
Smartphones have evolved to become frequent companions to humans. The common problem shared by Android users of smartphones was, and continues to be, about saving their batteries and preventing the need to use any recharging tools. A significant number of studies have been performed in the general field of "saving energy in smartphones". During a state of global lockdown, the use of smartphone devices has skyrocketed, and many governments have implemented location-tracking applications for their citizens as means of ensuring that the imposed governmental restrictions are being adhered to. Since smartphones are battery-powered, the opportunity to conserve electricity and ensure that the handset does not have to be charged so much or that it does not die and impede location-tracking during this period of crisis is of vital significance, impacting not only the reliability of tracking, but also the usability of the mobile itself. While there are methods to reduce the battery’s drain from mobile app use, they are not fully utilized by users. Simultaneously, the following the manuscript demonstrates the growing prevalence of mobile applications in daily lives, as well as the disproportionally increasing phone functionality, which results in the creation of a dependency towards smartphone use and the need of energy to recharge and operate theses smartphones.
IRJET - Notification Blockerbased on LocationIRJET Journal
This document describes a proposed Android application that uses location and keywords to block distracting notifications. The application would allow users to define different "zones" where certain app notifications would be blocked based on the user's preferences and current location. The goal is to reduce notification interruptions for students while studying or in class. The application would have modules for viewing recent, scheduled, starred, and customizing blocked notifications. It would use the device's location services and notification listener to determine which notifications to block based on the user's defined zones and preferences.
Smart systems aimed at detecting the fall of a person have increased significantly due to recent technological
advances and availability of modular electronics. This work presents the use of em-bedded accelerometer and gyroscope in mobile
phones to accurately detect and classify the type of fall a person is experiencing before suffering an impact. Early classification of
fall type helps in optimizing the algorithm of the fall detection. User acceptance, feasibility and the limitations in the accuracy of
the existing devices have also been considered in this study. High efficiency and low power approaches were emphasized with
wireless capability that enhanced the system per-formance for variety of applications. There is a need of reducing the time for
analyzing the smart algorithms designed. It is also emphasized that this application will be a good platform that can be used to test
various algorithms and multiple sensors at a time with ease and obtain data analysis in a short period
Improving energy efficiency of location sensing on smartphonesZhenyun Zhuang
The document proposes an adaptive location-sensing framework to improve energy efficiency on smartphones running location-based applications. The framework uses four design principles: substitution replaces GPS with less power-intensive location services when possible; suppression avoids unnecessary GPS use through sensors like accelerometers; piggybacking synchronizes location requests from multiple apps; and adaptation adjusts location sensing based on battery level. An implementation on Android phones reduces GPS use by up to 98% and improves battery life by up to 75%.
COSMOS: A CONTEXT SENSITIVE MODEL FOR DYNAMIC CONFIGURATION OF SMARTPHONES US...Zac Darcy
The document presents COSMOS, a context-sensitive model for dynamically configuring smartphone settings using multi-factor analysis. COSMOS uses factors like location, schedule, call history, and battery level to determine optimal settings like Bluetooth, WiFi, GPS, brightness, volume, and vibration mode without interrupting the user. It was implemented on Android and tested, achieving a 90.95% relevancy rating for configured settings.
A methodology for model driven multiplatform mobile application developmentIAEME Publication
This document describes a methodology for developing mobile applications across multiple platforms using model-driven development. The methodology utilizes domain-specific modeling languages to define application logic, data structures, communication, and user interfaces in a platform-independent way. Model processors then generate executable code for different mobile platforms from these models. The generated code leverages platform-specific libraries and frameworks to optimize for energy efficiency on mobile devices. Some computation tasks are also offloaded to the cloud to further improve efficiency. The goal is to develop high-quality, energy-efficient mobile applications that can be maintained consistently across multiple platforms.
A methodology for model driven multiplatform mobile application developmentIAEME Publication
This document describes a methodology for developing mobile applications across multiple platforms using model-driven development. The methodology utilizes domain-specific modeling languages to define application logic, data structures, communication, and user interfaces in a platform-independent way. Model processors then generate executable code for different mobile platforms from these models. The generated code leverages platform-specific libraries and frameworks to optimize for energy efficiency on mobile devices. Some computation tasks are also offloaded to the cloud to further improve efficiency. The goal is to develop high-quality, energy-efficient mobile applications that can be maintained consistently across multiple platforms.
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESijaia
The goal of this research project is to design and implement a mobile application and machine learning techniques to solve problems related to the security of mobile devices. We introduce in this paper a behavior-based approach that can be applied in a mobile environment to capture and learn the behavior of
mobile users. The proposed system was tested using Android OS and the initial experimental results show that the proposed technique is promising, and it can be used effectively to solve the problem of anomaly detection in mobile devices.
User Activity Analysis Using Accelerometer and Cloud ComputingMarwan Issa
This dissertation focuses on analyzing the accelerometer data collected from built-in sensors in smartphones using the advanced technology of cloud computing for processing and analyzing.
This document proposes an Android app to improve security for women, elderly people, and those with disabilities. The app has three main features: 1) A message reader that converts text messages to voice for visually impaired users. 2) An emergency request system that sends alerts with the user's location if they press a phone button repeatedly. 3) A medication reminder that notifies users when it is time to take pills through alarms and notifications. The app is designed to give vulnerable groups more independence by helping them communicate and request help when needed. It could improve safety for women and quality of life for elderly and disabled individuals.
Gopal Kumar presented on software quality assurance and testing done during an industrial training. The presentation covered:
1) An overview of the organization SpiceRetail Ltd and their mobile phone offerings.
2) Different types and levels of testing including manual, automation, black box, white box and functional/non-functional testing.
3) Challenges in mobile device testing like supporting different targets and operating systems.
4) A proposed interruption matrix approach to help select meaningful test cases accounting for device interruptions and states.
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...IRJET Journal
The document presents a framework called Spice for socially-driven learning based mobile media prefetching. Spice aims to reduce access delay and improve quality of experience for mobile users consuming media content on online social networks. It does this through a machine learning approach that considers a user's social connections and preferences to predict and prefetch relevant media tweets. The framework clusters users based on social relationships and trains a latent bias model to estimate the probability a user will click on different media tweets. It also includes an energy-efficient mobile scheduling scheme that offloads machine learning tasks to a cloud server. Experimental results suggest Spice achieves high performance with low data usage and energy consumption.
A Survey of Cyber foraging systems: Open Issues, Research ChallengesEswar Publications
This document provides a survey of cyber foraging systems and discusses open issues and research challenges. It summarizes key cyber foraging applications like LOCUSTS, Slingshot, and Puppeteer that allow resource-deficient mobile devices to offload tasks to stronger surrogate machines. The document outlines the general process of cyber foraging including surrogate discovery, task distribution, migration, and remote execution control. It also discusses design challenges like efficient task distribution, migration, and security concerns. Finally, it provides more detail on the LOCUSTS framework, describing its architecture, approach to task distribution, and ability to migrate tasks between surrogates.
This document provides a synopsis of a final year project that monitors energy consumption in university hostels. The project uses an Android application and Raspberry Pi to measure energy parameters like voltage and current. This allows users to view consumption data and remotely trip the hostel's energy if irregularities are detected. It aims to efficiently manage energy usage in the hostels through automated monitoring and control of appliances.
This document summarizes a research paper on a user-aware power management system for mobile devices. The proposed system consists of four main components: a user-space client, a sleep time manager, a sleep level controller, and a battery timer. It aims to extend battery life by controlling when devices suspend, shut off, or reboot based on the determined sleep patterns of users. Evaluation of the system showed that it could save 18-34% more power compared to existing systems.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
consumers use a smartphone device to display the media contents for work and entertainment purposes, as well as watching online video. Online video streaming is the main cause that consume smartphone’s energy quickly. To overcome this problem, smartphone’s energy management is crucial. Thus, a hybrid energy-aware profiler is proposed. Basically, a profiler will monitor and manage the energy consumption in the smartphone devices. The hybrid energy-aware profiler will set up a protocol preference of both the user and the device. Then, it will estimates the energy consumption in smartphone. However, saving energy alone can contribute to the Quality of Experience (QoE) neglection, thus the proposed solution takes into account the client QoE. Even though there are several existing energy-aware profilers that have been developed to manage energy use in smartphones however, most energy-aware profilers does not consider QoE at the same time. The proposed solution consider both, the performance of the hybrid energy-aware profiler is compared with the baseline energy models against a variation of content adaptation according to the pre-defined variables. Three types of variables were determined; resolution, frame rate and energy consumption in smartphone devices. In this area, QoE subjective methods based on MOS (Mean Opinion Score) are the most commonly used approaches for defining and quantifying real video quality. Nevertheless, although these approaches have been established to consistently quantify users’ amounts of approval, they do not adequately realize which the criteria of video attribute that important are. In this paper, we conducted an experiment with a certain devices to measures user’s QoE and energy usage of video attribute in smartphone devices. Our results demonstrate that the list of possible solution is a relevant and useful video attribute that satify the users.
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of user's approach to providing feedback for smart home devices. We will conduct an online survey for a sample of three to five students selected by simple random sampling to study the user's motto for giving feedback on smart home devices and their expectations. We have observed that most users are ready to actively share their input on smart home devices to improve the product's service and quality to fulfill the user’s needs and make their lives easier.
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more
straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame
works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of
user's approach to providing feedback for smart home devices. We will conduct an online survey for a
sample of three to five students selected by simple random sampling to study the user's motto for giving
feedback on smart home devices and their expectations. We have observed that most users are ready to
actively share their input on smart home devices to improve the product's service and quality to fulfill the
user’s needs and make their lives easier.
More Related Content
Similar to SMARTPHONE PREVENTIVE CUSTOMIZED POWER SAVING MODES
This document summarizes past research on energy management in mobile devices. It discusses how energy management is important for mobile devices due to limited battery size and longevity concerns. It also discusses the need for operating systems to provide energy isolation, delegation, and subdivision to allow applications to better manage energy usage. The document reviews several models for energy management in mobile devices and compares past research that has measured energy consumption of different components like wireless interfaces in smartphones. It identifies a need for further research to develop more accurate energy management techniques.
The evolution of energy requirements of smartphones based on user behaviour a...IJECEIAES
Smartphones have evolved to become frequent companions to humans. The common problem shared by Android users of smartphones was, and continues to be, about saving their batteries and preventing the need to use any recharging tools. A significant number of studies have been performed in the general field of "saving energy in smartphones". During a state of global lockdown, the use of smartphone devices has skyrocketed, and many governments have implemented location-tracking applications for their citizens as means of ensuring that the imposed governmental restrictions are being adhered to. Since smartphones are battery-powered, the opportunity to conserve electricity and ensure that the handset does not have to be charged so much or that it does not die and impede location-tracking during this period of crisis is of vital significance, impacting not only the reliability of tracking, but also the usability of the mobile itself. While there are methods to reduce the battery’s drain from mobile app use, they are not fully utilized by users. Simultaneously, the following the manuscript demonstrates the growing prevalence of mobile applications in daily lives, as well as the disproportionally increasing phone functionality, which results in the creation of a dependency towards smartphone use and the need of energy to recharge and operate theses smartphones.
IRJET - Notification Blockerbased on LocationIRJET Journal
This document describes a proposed Android application that uses location and keywords to block distracting notifications. The application would allow users to define different "zones" where certain app notifications would be blocked based on the user's preferences and current location. The goal is to reduce notification interruptions for students while studying or in class. The application would have modules for viewing recent, scheduled, starred, and customizing blocked notifications. It would use the device's location services and notification listener to determine which notifications to block based on the user's defined zones and preferences.
Smart systems aimed at detecting the fall of a person have increased significantly due to recent technological
advances and availability of modular electronics. This work presents the use of em-bedded accelerometer and gyroscope in mobile
phones to accurately detect and classify the type of fall a person is experiencing before suffering an impact. Early classification of
fall type helps in optimizing the algorithm of the fall detection. User acceptance, feasibility and the limitations in the accuracy of
the existing devices have also been considered in this study. High efficiency and low power approaches were emphasized with
wireless capability that enhanced the system per-formance for variety of applications. There is a need of reducing the time for
analyzing the smart algorithms designed. It is also emphasized that this application will be a good platform that can be used to test
various algorithms and multiple sensors at a time with ease and obtain data analysis in a short period
Improving energy efficiency of location sensing on smartphonesZhenyun Zhuang
The document proposes an adaptive location-sensing framework to improve energy efficiency on smartphones running location-based applications. The framework uses four design principles: substitution replaces GPS with less power-intensive location services when possible; suppression avoids unnecessary GPS use through sensors like accelerometers; piggybacking synchronizes location requests from multiple apps; and adaptation adjusts location sensing based on battery level. An implementation on Android phones reduces GPS use by up to 98% and improves battery life by up to 75%.
COSMOS: A CONTEXT SENSITIVE MODEL FOR DYNAMIC CONFIGURATION OF SMARTPHONES US...Zac Darcy
The document presents COSMOS, a context-sensitive model for dynamically configuring smartphone settings using multi-factor analysis. COSMOS uses factors like location, schedule, call history, and battery level to determine optimal settings like Bluetooth, WiFi, GPS, brightness, volume, and vibration mode without interrupting the user. It was implemented on Android and tested, achieving a 90.95% relevancy rating for configured settings.
A methodology for model driven multiplatform mobile application developmentIAEME Publication
This document describes a methodology for developing mobile applications across multiple platforms using model-driven development. The methodology utilizes domain-specific modeling languages to define application logic, data structures, communication, and user interfaces in a platform-independent way. Model processors then generate executable code for different mobile platforms from these models. The generated code leverages platform-specific libraries and frameworks to optimize for energy efficiency on mobile devices. Some computation tasks are also offloaded to the cloud to further improve efficiency. The goal is to develop high-quality, energy-efficient mobile applications that can be maintained consistently across multiple platforms.
A methodology for model driven multiplatform mobile application developmentIAEME Publication
This document describes a methodology for developing mobile applications across multiple platforms using model-driven development. The methodology utilizes domain-specific modeling languages to define application logic, data structures, communication, and user interfaces in a platform-independent way. Model processors then generate executable code for different mobile platforms from these models. The generated code leverages platform-specific libraries and frameworks to optimize for energy efficiency on mobile devices. Some computation tasks are also offloaded to the cloud to further improve efficiency. The goal is to develop high-quality, energy-efficient mobile applications that can be maintained consistently across multiple platforms.
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESijaia
The goal of this research project is to design and implement a mobile application and machine learning techniques to solve problems related to the security of mobile devices. We introduce in this paper a behavior-based approach that can be applied in a mobile environment to capture and learn the behavior of
mobile users. The proposed system was tested using Android OS and the initial experimental results show that the proposed technique is promising, and it can be used effectively to solve the problem of anomaly detection in mobile devices.
User Activity Analysis Using Accelerometer and Cloud ComputingMarwan Issa
This dissertation focuses on analyzing the accelerometer data collected from built-in sensors in smartphones using the advanced technology of cloud computing for processing and analyzing.
This document proposes an Android app to improve security for women, elderly people, and those with disabilities. The app has three main features: 1) A message reader that converts text messages to voice for visually impaired users. 2) An emergency request system that sends alerts with the user's location if they press a phone button repeatedly. 3) A medication reminder that notifies users when it is time to take pills through alarms and notifications. The app is designed to give vulnerable groups more independence by helping them communicate and request help when needed. It could improve safety for women and quality of life for elderly and disabled individuals.
Gopal Kumar presented on software quality assurance and testing done during an industrial training. The presentation covered:
1) An overview of the organization SpiceRetail Ltd and their mobile phone offerings.
2) Different types and levels of testing including manual, automation, black box, white box and functional/non-functional testing.
3) Challenges in mobile device testing like supporting different targets and operating systems.
4) A proposed interruption matrix approach to help select meaningful test cases accounting for device interruptions and states.
IRJET- Data Mining and Cluster based Machine Learning in Mobile Online Social...IRJET Journal
The document presents a framework called Spice for socially-driven learning based mobile media prefetching. Spice aims to reduce access delay and improve quality of experience for mobile users consuming media content on online social networks. It does this through a machine learning approach that considers a user's social connections and preferences to predict and prefetch relevant media tweets. The framework clusters users based on social relationships and trains a latent bias model to estimate the probability a user will click on different media tweets. It also includes an energy-efficient mobile scheduling scheme that offloads machine learning tasks to a cloud server. Experimental results suggest Spice achieves high performance with low data usage and energy consumption.
A Survey of Cyber foraging systems: Open Issues, Research ChallengesEswar Publications
This document provides a survey of cyber foraging systems and discusses open issues and research challenges. It summarizes key cyber foraging applications like LOCUSTS, Slingshot, and Puppeteer that allow resource-deficient mobile devices to offload tasks to stronger surrogate machines. The document outlines the general process of cyber foraging including surrogate discovery, task distribution, migration, and remote execution control. It also discusses design challenges like efficient task distribution, migration, and security concerns. Finally, it provides more detail on the LOCUSTS framework, describing its architecture, approach to task distribution, and ability to migrate tasks between surrogates.
This document provides a synopsis of a final year project that monitors energy consumption in university hostels. The project uses an Android application and Raspberry Pi to measure energy parameters like voltage and current. This allows users to view consumption data and remotely trip the hostel's energy if irregularities are detected. It aims to efficiently manage energy usage in the hostels through automated monitoring and control of appliances.
This document summarizes a research paper on a user-aware power management system for mobile devices. The proposed system consists of four main components: a user-space client, a sleep time manager, a sleep level controller, and a battery timer. It aims to extend battery life by controlling when devices suspend, shut off, or reboot based on the determined sleep patterns of users. Evaluation of the system showed that it could save 18-34% more power compared to existing systems.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
consumers use a smartphone device to display the media contents for work and entertainment purposes, as well as watching online video. Online video streaming is the main cause that consume smartphone’s energy quickly. To overcome this problem, smartphone’s energy management is crucial. Thus, a hybrid energy-aware profiler is proposed. Basically, a profiler will monitor and manage the energy consumption in the smartphone devices. The hybrid energy-aware profiler will set up a protocol preference of both the user and the device. Then, it will estimates the energy consumption in smartphone. However, saving energy alone can contribute to the Quality of Experience (QoE) neglection, thus the proposed solution takes into account the client QoE. Even though there are several existing energy-aware profilers that have been developed to manage energy use in smartphones however, most energy-aware profilers does not consider QoE at the same time. The proposed solution consider both, the performance of the hybrid energy-aware profiler is compared with the baseline energy models against a variation of content adaptation according to the pre-defined variables. Three types of variables were determined; resolution, frame rate and energy consumption in smartphone devices. In this area, QoE subjective methods based on MOS (Mean Opinion Score) are the most commonly used approaches for defining and quantifying real video quality. Nevertheless, although these approaches have been established to consistently quantify users’ amounts of approval, they do not adequately realize which the criteria of video attribute that important are. In this paper, we conducted an experiment with a certain devices to measures user’s QoE and energy usage of video attribute in smartphone devices. Our results demonstrate that the list of possible solution is a relevant and useful video attribute that satify the users.
Similar to SMARTPHONE PREVENTIVE CUSTOMIZED POWER SAVING MODES (20)
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of user's approach to providing feedback for smart home devices. We will conduct an online survey for a sample of three to five students selected by simple random sampling to study the user's motto for giving feedback on smart home devices and their expectations. We have observed that most users are ready to actively share their input on smart home devices to improve the product's service and quality to fulfill the user’s needs and make their lives easier.
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more
straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame
works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of
user's approach to providing feedback for smart home devices. We will conduct an online survey for a
sample of three to five students selected by simple random sampling to study the user's motto for giving
feedback on smart home devices and their expectations. We have observed that most users are ready to
actively share their input on smart home devices to improve the product's service and quality to fulfill the
user’s needs and make their lives easier.
October 2023-Top Cited Articles in IJU.pdfijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSijujournal
This document discusses methods for efficiently generating large prime numbers for use in RSA cryptography. It presents experimental results measuring the time taken to generate prime numbers when trial dividing the starting number by different numbers of initial primes before applying the Miller-Rabin primality test. The optimal number of trial divisions can be estimated as B=E/D, where E is the time for Miller-Rabin test and D is the maximum usefulness of trial division. Experimental results on different sized numbers support dividing by around 20 initial primes as optimal.
A novel integrated approach for handling anomalies in RFID dataijujournal
Radio Frequency Identification (RFID) is a convenient technology employed in various applications. The
success of these RFID applications depends heavily on the quality of the data stream generated by RFID
readers. Due to various anomalies found predominantly in RFID data it limits the widespread adoption of
this technology. Our work is to eliminate the anomalies present in RFID data in an effective manner so that
it can be applied for high end applications. Our approach is a hybrid approach of middleware and
deferred because it is not always possible to remove all anomalies and redundancies in middleware. The
processing of other anomalies is deferred until the query time and cleaned by business rules. Experimental
results show that the proposed approach performs the cleaning in an effective manner compared to the
existing approaches.
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
Ubiquitous healthcare has become one of the prominent areas of research inorder to address the
challenges encountered in healthcare environment. In contribution to this area, this study developed a
system prototype that recommends diagonostic services based on physiological data collected in real time
from a distant patient. The prototype uses WBAN body sensors to be worn by the individual and an android
smart phone as a personal server. Physiological data is collected and uploaded to a Medical Health
Server (MHS) via GPRS/internet to be analysed. Our implemented prototype monitors the activity, location
and physiological data such as SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The
uploaded information can be accessed in real time by medical practitioners through a web application.
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESijujournal
The population of elderly folks is ballooning worldwide as people live longer. But getting older often
means declining health and trouble living solo. Smart home tech could keep an eye on old folks and get
help quickly when needed so they can stay independent. This paper looks at a system combining wireless
sensors, video watches, automation, resident monitoring, emergency detection, and remote access. Sensors
track health signs, activities, appliance use. Video analytics spot odd stuff like falls. Sensor fusion and
machine learning find normal patterns so wonks can see unhealthy changes and send alerts. Multi-channel
alerts reach caregivers and emergency folks. A LabVIEW can integrate devices and enables local and
remote oversight and can control and handle emergency responses. Benefits seem to be early illness clues,
quick help, less burden on caregivers, and optimized home settings. But will old folks use all this tech? Can
we prove it really helps folks live longer and better? More research on maximizing reliability and
evaluating real-world impacts is needed. But designed thoughtfully, smart homes could may profoundly
improve the aging experience.
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEijujournal
In today’s Internet world, log file analysis is becoming a necessary task for analyzing the customer’s
behavior in order to improve advertising and sales as well as for datasets like environment, medical,
banking system it is important to analyze the log data to get required knowledge from it. Web mining is the
process of discovering the knowledge from the web data. Log files are getting generated very fast at the
rate of 1-10 Mb/s per machine, a single data center can generate tens of terabytes of log data in a day.
These datasets are huge. In order to analyze such large datasets we need parallel processing system and
reliable data storage mechanism. Virtual database system is an effective solution for integrating the data
but it becomes inefficient for large datasets. The Hadoop framework provides reliable data storage by
Hadoop Distributed File System and MapReduce programming model which is a parallel processing
system for large datasets. Hadoop distributed file system breaks up input data and sends fractions of the
original data to several machines in hadoop cluster to hold blocks of data. This mechanism helps to
process log data in parallel using all the machines in the hadoop cluster and computes result efficiently.
The dominant approach provided by hadoop to “Store first query later”, loads the data to the Hadoop
Distributed File System and then executes queries written in Pig Latin. This approach reduces the response
time as well as the load on to the end system. This paper proposes a log analysis system using Hadoop
MapReduce which will provide accurate results in minimum response time.
SERVICE DISCOVERY – A SURVEY AND COMPARISONijujournal
The document summarizes and compares several major service discovery approaches. It provides an overview of service discovery objectives and techniques, then surveys prominent protocols including SLP, Jini, and UPnP. Each approach is analyzed based on features like service description, discovery architecture, announcement/query mechanisms, and how they handle service usage and dynamic network changes. The comparison aims to identify strengths and limitations to guide future research in improving service discovery.
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSijujournal
Opportunistic Networks are able to exploit social behavior to create connectivity opportunities. This
paradigm uses pair-wise contacts for routing messages between nodes. In this context we investigated if the
“six degrees of separation” conjecture of small-world networks can be used as a basis to route messages in
Opportunistic Networks. We propose a simple approach for routing that outperforms some popular
protocols in simulations that are carried out with real world traces using ONE simulator. We conclude that
static graph models are not suitable for underlay routing approaches in highly dynamic networks like
Opportunistic Networks without taking account of temporal factors such as time, duration and frequency of
previous encounters.
International Journal of Ubiquitous Computing (IJU)ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...ijujournal
The aging population and the consequent increase in the incidence of dementias is causing many
challenges to health systems, mainly related to infrastructure, low services quality and high costs. One
solution is to provide the care at house of the patient, through of home care services. However, it is not a
trivial task, since a patient with dementia requires constant care and monitoring from a caregiver, who
suffers physical and emotional overload. In this context, this work presents an modelling for development of
pervasive systems aimed at helping the care of these patients in order to lessen the burden of the caregiver
while the patient continue to receive the necessary care.
A proposed Novel Approach for Sentiment Analysis and Opinion Miningijujournal
as the people are being dependent on internet the requirement of user view analysis is increasing
exponentially. Customer posts their experience and opinion about the product policy and services. But,
because of the massive volume of reviews, customers can’t read all reviews. In order to solve this problem,
a lot of research is being carried out in Opinion Mining. In order to solve this problem, a lot of research is
being carried out in Opinion Mining. Through the Opinion Mining, we can know about contents of whole
product reviews, Blogs are websites that allow one or more individuals to write about things they want to
share with other The valuable data contained in posts from a large number of users across geographic,
demographic and cultural boundaries provide a rich data source not only for commercial exploitation but
also for psychological & sociopolitical research. This paper tries to demonstrate the plausibility of the idea
through our clustering and classifying opinion mining experiment on analysis of blog posts on recent
product policy and services reviews. We are proposing a Nobel approach for analyzing the Review for the
customer opinion
International Journal of Ubiquitous Computing (IJU)ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...ijujournal
Usability engineering and usability testing are concepts that continue to evolve. Interesting research studies
and new ideas come up every now and then. This paper tests the hypothesis of using an EDA-based
physiological measurements as a usability testing tool by considering three measures; which are observers‟
opinions, self-reported data and EDA-based physiological sensor data. These data were analyzed
comparatively and statistically. It concludes by discussing the findings that has been obtained from those
subjective and objective measures, which partially supports the hypothesis.
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSijujournal
Ubiquitous Computing uses mobile phones or tiny devices for application development with sensors
embedded in mobile phones. The information generated by these devices is a big task in collection and
storage. For further, the data transmission to the intended destination is delay tolerant. In this paper, we
made an attempt to propose a new security algorithm for providing security to Pervasive Computing
Environment (PCE) system using Public-key Encryption (PKE) algorithm, Biometric Security (BS)
algorithm and Visual Cryptography Scheme (VCS) algorithm. In the proposed PCE monitoring system it
automates various home appliances using VCS and also provides security against intrusion using Zigbee
IEEE 802.15.4 based Sensor Network, GSM and Wi-Fi networks are embedded through a standard Home
gateway.
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have
elaborated several routing protocols that possess different performance levels. In this paper we give a
performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing
protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their
performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to
End Delay, Normalised Routing Load and Average Throughput.
The document compares the performance of various optical character recognition (OCR) tools. It analyzes eight OCR tools - Online OCR, Free Online OCR, OCR Convert, Convert image to text.net, Free OCR, i2OCR, Free OCR to Word Convert, and Google Docs. The document provides sample outputs of each tool processing the same input image. It then evaluates the tools based on character accuracy, character error rate, special symbol accuracy, and special symbol error rate to determine which tools most accurately convert images to editable text.
Optical Character Recognition (OCR) is a technique, used to convert scanned image into editable text
format. Many different types of Optical Character Recognition (OCR) tools are commercially available
today; it is a useful and popular method for different types of applications. OCR can predict the accurate
result depends on text pre-processing and segmentation algorithms. Image quality is one of the most
important factors that improve quality of recognition in performing OCR tools. Images can be processed
independently (.png, .jpg, and .gif files) or in multi-page PDF documents (.pdf). The primary objective of
this work is to provide the overview of various Optical Character Recognition (OCR) tools and analyses of
their performance by applying the two factors of OCR tool performance i.e. accuracy and error rate.
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to
different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high
throughput for the network and increase the chance for multi path routing. This is because the multiple
channel availability for transmission decreases the probability of the most elegant problem called as
interference problem which is either of interflow and intraflow type. For avoiding the problem like
interference and maintaining the constant network performance or increasing the performance the WMN
need to consider the packet aggregation and packet forwarding. Packet aggregation is process of collecting
several packets ready for transmission and sending them to the intended recipient through the channel,
while the packet forwarding holds the hop-by-hop routing. But choosing the correct path among different
available multiple paths is most the important factor in the both case for a routing algorithm. Hence the
most challenging factor is to determine a forwarding strategy which will provide the schedule for each
node for transmission within the channel. In this research work we have tried to implement two forwarding
strategies for the multi path multi radio WMN as the approximate solution for the above said problem. We
have implemented Global State Routing (GSR) which will consider the packet forwarding concept and
Aggregation Aware Layer 2 Routing (AAL2R) which considers the both concept i.e. both packet forwarding
and packet aggregation. After the successful implementation the network performance has been measured
by means of simulation study.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Securing your Kubernetes cluster_ a step-by-step guide to success !
SMARTPHONE PREVENTIVE CUSTOMIZED POWER SAVING MODES
1. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
DOI:10.5121/iju.2017.8101 1
SMARTPHONE PREVENTIVE CUSTOMIZED POWER
SAVING MODES
Ahmed Sameh and Abdulla Al-Masri
Prince Sultan University, P.O.Box 66833Riyadh, KSA
ABSTRACT
The postulate of this paper is that current smartphones' power saving modes can be improved towards
saving more power and/or gain more user satisfaction only if they start following “preventive” and/or user
customized power saving plans. We develop a number of preventive power saving modes that save the
battery power without the need of using the power of the same battery for detecting abusage. It will be
supporting the user with a preventive plan that could give him/her an idea about what to run or don’t run.
Another issue of current power saving modes is the “One Size Fits All” philosophy which does not take
into consideration the factors that could distinguish different smartphone users, for example, the nature of
the workspace of the user (Indoor/Outdoor), the age, the gender and/or the user’s applications categories
of interests. The paper develops a strategy to match a smartphone power saving mode with its perfect
smartphone user by classifying smartphones users into classes depending on a set of different factors and
having the user to identify himself/herself to the smartphone before the first use.
KEYWORDS
Power saving, Preventive, Detective, User Profile
1. INTRODUCTION
A shared limitation among most current smartphones strategies of power saving is there being
“detective” rather than being “preventive”. The current ways of using third-party applications
and/or built in firmware’s that monitors the usage of the smartphone battery for the sake of
saving the power of the same battery, conflicts with the main concept of saving power. The
monitoring and detecting requires processing which basically requires power. In addition to the
above limitations, the average amount of power consumption of an application can be easily
measured using one of the current detective techniques only after having the application installed
and run. For a naive smartphone user it is impossible to predict which of the applications offered
on an app store can be classified as a “Power-Hungry” application so that he/she could avoid
installing while using a smartphone in an area with either no or limited recharging capabilities.
This keeps the user under the same problem of using detective techniques rather than supporting
the user with a preventive plan that could give him/her an idea about what to run or don’t run.
Another issue of current power saving strategies is the “One Size Fits All” philosophy which
does not take into consideration the factors that could distinguish different smartphone users [1].
For example the nature of the workspace of the user (Indoor/Outdoor), the age, the gender, the
user’s applications categories of interests… etc. A very well-known example of a current “One
Size Fits All” technique is “Samsung Ultra Power Saving Mode” which forces the user to end up
using a black and white screen smartphone even if the user was a 60 years old book reader or a
17 years old heavy online gamer for the sake of 14 days battery life. A key disadvantage about
current power saving strategies is the layer by layer power saving management process which is
being used on current smartphones with lack of coordination between these layers, This also can
2. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
2
be improved tremendously if there was a cross-layer middleware that helps the layer to share data
regarding power management on a smartphone [2].
This paper's objectives are: 1. To develop new preventive (non-background running) strategies
that improves power saving in smartphones, than that of the current detective (background
running) strategies that requires power to save the energy on a smartphone. So a user can start
using a smartphone under a tailored preventive power saving plan, avoiding any real-time and/or
detective monitoring techniques during the usage. 2. To take the maximum advantage of the
valuable information related to the different categories of smartphones users by classifying these
users into classes based on several proposed standards, such as gender, age group, job nature and
interests, and use these categories in the process of modeling the newly proposed preventive
power saving strategies. 3. To resolve the issue of current preventive power saving
methodologies, which is the “One Size Fits All” philosophy that forces the user to scarify many
of the smartphones features in order to save power e.g. using a black and white screen. These
current preventive power saving methodologies does not take into consideration the factors that
could distinguish different smartphone users for example the nature of the workspace of the user
(Indoor/Outdoor), the age, the gender, the user’s applications categories of interest.
2. SIMILAR WORK
Researchers have been developing various techniques for smartphone power saving. In this
section we survey some of the most recent power saving modes:
2.1 USER INTERFACE IN A SLEEP MODE
In [1] the authors proposed a new power saving mode for smartphones. O-Sleep is a
smartphone's output-oriented power saving mode. Instead of entering processor sleep mode when
there is no user input, a new O-sleep mode puts a smartphone's user interface into sleep mode.
This happens when there is no meaningful output from the phone to the screen. Whenever the
smartphone is processing a user's request, output may require processing time. The phone's user
interfaces are put into sleep mode while other subsystems are left in active state. Authors have
applied this technique onto various smartphone applications with varying operation environment.
From their experiments, they have found that they can save 37% of power consumption during
up to 58% of its active usage with their test scenarios.
2.2 SEVERAL DIFFERENT POWER SAVING MODES
Authors in [2] have developed an energy management system based on Android operating
system, called "PhoneJoule". The proposed management system switches between GPRS and
Wi-Fi wireless networks. It monitors and manages the energy consumption of smartphone. An
many as six different new power-saving modes were presented for users to manage their power
consumption. The status of the smartphone, such as battery information and usage of CPU and
memory, are all displayed in a dashboard format on the screen.
2.3 EXTRA SUSPEND MODE WITH BROADCAST FILTER FOR WI-FI NETWORKS
In [3] Smartphones save energy by adding a lower power extra suspend mode (120mW). As a
result, power consumption increases dramatically. In order to improve energy efficiency, some
phones employ hardware filter in the Wi-Fi software driver. All UDP broadcasted packets other
than Multicast DNS packets are blocked by the filter, thus none is received by upper layer
application. So, the problem of handling Wi-Fi broadcast traffic during smartphone extra suspend
mode is either receive all of frames suffering high power consumption, or receive none of them
3. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
3
sacrificing functionalities of the smartphone. In [3], they proposed Software Broadcast Filter
(SBF) to address the problem. The filter is smarter than the hardware broadcast filter as it only
filters out useless broadcast frames and does not block frames that impair functionalities of
applications. SBF is energy efficient more than the “receive all” method. Their trace driven
evaluation showed that SBF can save up to 52% energy consumption than the “receive all”
method.
2.4 REDUCING BACKGROUND SIGNALS
Of the different types of wireless network smartphone traffic, there is major increase in the
background type of data because of the popularity of applications like Facebook, Skype, Email
clients etc. which continuously exchange data with corresponding servers, even when the user is
not actively using the smartphone. In order to save energy consumption and for better allocation
of resources in network by lower possible signaling traffic, 3GPP LTE specifications have
identified mechanisms like connected mode DRX (Discontinuous Reception) that offers two
stage of sleep in form of long & short DRX. Since diverse types of applications are running in
smartphone, authors in [7] investigate traffic characteristics of popular applications in Android
based smartphone, and how such applications, keep consuming precious bandwidth and battery
even when not in active usage. Main emphasis is focused in studying the characteristic of these
applications when they are running without user intervention.
2.5 CONSTANT DEACTIVATION OF THE WI-FI INTERFACE AND AVOIDANCE OF AP
SEARCH DISTANT FROM THE SMARTPHONE
Smartphones with Dual-mode cellular are recently attracting much attention from both users and
telecom operators. In order to avoid traffic concentration generated by these devices on 3G and
4G networks, it is useful to advise users to connect with fixed networks via available WLANs.
However, keeping both 3G and WLAN interfaces on consumes lots of power, which
considerably shortens the standby time. To score longer battery life, authors in [8] proposed a
power-saving standby method (PSSM) whose has the following features: (1) frequent
deactivation of the WLAN interface except for when necessary required; (2) no additional
functions in a mobile operator’s network are provided; and (3) avoidance of a WLAN AP search
distant from a cellular phone (certain threshold). Results using the prototype system showed that
PSSM achieves about 73%-134% longer battery life than a conventional dual-mode cellular
smartphones, while PSSM kept the application transaction delay short by reducing unproductive
WLAN AP scans.
2.6 PREDICTION FUTURE TRAFFIC FOR MACRO SMOOTHING
In [9] a smoothing technique is introduced to forecast traffic in a given area considering daily and
weekly profiles. The availability of a reliable profile prediction of the future traffic values allows
the adaptation of what is called macro base station transmission power. It also allows the
introduction of a sleep mode for micro base stations. This permits to guarantee the requested
network capacity (QoS) while saving energy consumption. Results of this approach showed the
effectiveness of traffic forecast technique for capacity prediction and the great usefulness of the
proposed algorithms for energy efficiency maximization.
2.7 IDENTIFYING LOW PRIORITY PACKETS
Power saving mode mechanism described in IEEE 802.11 protocol is designed for reducing
power consumption by switching Wi-Fi interface of smartphone between active-state and sleep-
state alternately. Since the power consumption in active-state is much higher than that in sleep-
4. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
4
state, the switching between both states should be done carefully and less frequent. For example,
low priority packets such as delay tolerant packet should not trigger switching to active-state for
increasing power saving. Delay tolerant traffic, however, also affects behaviors of the mechanism
since the mechanism is operated within the MAC layer of the smartphone. To overcome this,
authors in [11] proposed "Scrooge" which separates delay tolerant traffic from delay sensitive
traffic to prevent delay tolerant traffic from negatively affecting the behavior of the smartphone.
Thus, delay tolerant packets never affect the behavior of power saving mode mechanism at all.
The prototype implementation showed improved power saving performance by up to 95%
without significant transmission delay under common applications’ traffic patterns such as
Facebook and Twitter.
2.8 AN ADAPTIVE LTE/WI-FI NETWORK INTERFACE
Authors in [12] proposed an adaptive LTE/Wi-Fi network interface activation algorithm called
"E$PA" with supporting system design and multi-attribute cost optimization function for
smartphones file transfer services (e.g., downloading a file). E$PA’s optimization function
incorporates battery life (energy), data usage quota ($), and expected file transfer completion
time (performance-P) simultaneously. Each time the individual attributes are calculated and
updated, E$PA selects one of three modes that minimizes the overall cost optimization: (i)
activation of both LTE and Wi-Fi interfaces for simultaneous data transfer; (ii) LTE interface
activation only; or (iii) Wi-Fi interface activation only. The main benefit of the E$PA is that it
enables the smartphone to always operate in the “best” mode without the need for user's manual
control: (1) the energy saving mode if the remaining battery energy is becoming nearly depleted;
(2) the cost saving mode if the remaining data quota is almost running out; or, (3) the maximum
throughput mode if remaining data quota and battery life are both sufficient. The multi-attribute
optimization cost model also takes into account the overheads (delays and energy consumption)
associated with network interface turn-on/off and switching. These indeed impact the estimations
of both performance (transfer time) and energy (battery life) attributes. Simulation results showed
that "E$PA" always selects the “best” operational mode by maintaining dynamic balance among
transfer time, energy consumption, and service montery charge.
2.9 WI-FI IDLE ENERGY SAVING MODE
Modern Smartphones are equipped with several network interfaces. The Wi-Fi is to be the
preferred choice when it can be associated with an Access Point. Empirical study in [13] using
real traces and experiments with 802.11 protocol uncovered long idle times, while Wi-Fi is
scanning and searching for networks and is listening for specially incoming traffic. During idle
time, Wi-Fi consumes a large amount of energy, which is exacerbated with the 802.11n/ac high
speed features (MIMO, and channel-bonding). Modern power saving solutions, including the
IEEE 802.11 PSM and SMPS features are certainly user-agnostic, infrastructure-driven and
oblivious to the power hungry 802.11n/ac features. As a result they may not save energy in
practical settings at all. To this end, [13] presented Wi-Fi idle energy save (Wi-Fi-ies). Wi-Fi-ies
leverages and make use of user context and behavior information to identify idle times where
energy can be saved. They verified Wi-Fi-ies energy savings using trace-driven simulations.
2.10 INTELLIGENTLY DEALING WITH DELAY-SENSITIVE SIGNALS
Regarding non-real time data such as Web , text, or e-mail, the 802.11 PSM scheme is a useful
mechanism for reducing power consumption. However, there are some issues when PSM is used
for voice communication , for example, in which the main traffic is composed of delay-sensitive
data like voice or calling signals. In [14], in order to overcome these issues, they presented a new
power saving scheme which can minimize power consumption while guaranteeing the delay
5. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
5
constraint during call signaling and Voice data time. Furthermore the terminal systems are
implemented and evaluated by measuring both the average call connection delay and power
consumption. The experimental results showed that their approach can minimize traffic delay and
power consumption together.
2.11 OPTIMIZING MULTIMEDIA STREAMING IN ENERGY SAVING MODES
Indeed Multimedia streaming to smartphones is challenging for two reasons. First, the way
content is usually delivered to a client must ensure two important things: the user does not
experience a long initial playback delay or a distorted playback in the middle of a streaming
session. Second, it is a fact that multimedia streaming applications are among the most energy
hungry applications in smartphones. The energy consumption mostly depends on the multimedia
delivery techniques and on the power management techniques of wireless access technologies
(Wi-Fi, 3G, and 4G) or all of them. In order to provide idea on what kind of streaming techniques
exist, how they work on different mobile platforms, their efforts in providing smooth quality of
experience, and their impact on energy consumption of mobile phones, authors in [11] did a
useful large set of active measurements with several smartphones having both Wi-Fi and cellular
network access. The analysis revealed different techniques to deliver the multimedia content to
the video players. The selection of a technique depends on the mobile platform, device, player,
quality, and service. The results from the traffic and power measurements allowed to conclude
that none of the identified techniques is global optimal because they take none of the following
facts into account: access technology used, user behavior, and user preferences concerning data
waste. Authors in [11] pointed out the technique with the best playback buffer configuration,
which provided the most attractive trade-offs in particular situations.
2.12 PREDICTING POWER CONSUMPTION WITH USER MOVEMENTS (FOR CELL
NETWORK)
Power management in smartphones is a critical issue in handling the diversity of smartphone
usage. In particular, usage prediction (profiling) is important for the efficient use of remaining
battery capacity. In [9], the authors proposed a prediction model that predicts the amount of
battery usage required in the future. The key point is that a high degree of correlation exists
between battery usage and a user’s movements (profile). They designed an everyday location
monitoring system that only uses cell-tower connections, without additional energy consumption
overhead. The technical challenge is eliminating the well-known ping-pong effect in a series of
cell-tower transitions to determine the mobility status. They constructed a graph from the
sequence of recorded cell towers and recognize the points of interest using a partial clique graph
algorithm. They then used a Markov predictor to estimate the required battery level depending on
the user’s movements profile. They demonstrated the accuracy of battery usage prediction using
real traces of participants collected over a period of time.. The result showed that their proposed
prediction correctly predicted the battery usage of smartphones, with an 8.1 ± 7.5% margin of
error.
2.13 PREDICTING APPLICATIONS' ENERGY CONSUMPTION BY THE USE OF
"POWERTUTOR" AND "HOIKI 3334"
Unfortunately, it’s hard to obtain the application energy consumption for the end user based on
professional measurement devices. We need to model the energy consumption of applications to
easily understand the application power behavior for end users without the use of external tools.
In [1], a time energy model (TEM) is proposed, which is a prediction regression model to
estimate the application energy consumption on smartphones. Compared with the component
energy model (CEM), TEM uses a time variable to characterize and contain a variety of
6. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
6
smartphone's properties, such as power consumption and performance, to estimate the mobile
devices’ energy consumption during application execution. Based on TEM, the execution time of
an application can be measured and obtained as well. To demonstrate the effectiveness and
usefulness of TEM, the energy consumptions of several applications were measured by suggested
energy monitor, PowerTutor and a HOIKI 3334 power meter, respectively. The experiment
results showed that, on average, TEM could achieve a 1.30% error rate compared to CEM, a
2.88% error rate compared to PowerTutor and a 8.98% error rate compared to HOIKI 3334.
2.14 ENHANCING STANDARD IEEE 802.11 POWER SAVING MODE (PSM)
Future Internet of Things (IoT) will connect billions of battery-powered radio-enabled devices.
Some of them may need to occasionally communicate with each other and with Internet gateways
(border routers) over multi-hop links. While most IoT scenarios assume that for devices use
energy-efficient IEEE 802.15.4 radios, there are use cases where IEEE 802.11 is preferred
despite its potentially higher energy consumption behavior. The work in [2] extended the IEEE
802.11 power saving mode (PSM) with a traffic announcement scheme that facilitates multi-hop
communication setup. The scheme propagates traffic announcements along multi-hop paths to
ensure that all intermediate nodes remain awake to receive and forward the pending data frames
with minimum latency time. Simulation results showed that the proposed Multi-Hop PSM (MH-
PSM) improved end-to-end delay and doze time compared to the standard PSM. It may optimize
WLAN to meet the networking requirements of IoT devices. MH-PSM is practical and software-
implementable since it does not require changes to the parts of the IEEE 802.11 medium access
control implemented on-chip.
2.15 CLOUD-BASED OFFLOADING OF SMARTPHONE ON-PLATFORM COMPUTATIONS
Several security problems in smartphones are approached from an anomaly detection perspective
in which the main goal reduces to identifying anomalous activity patterns quickly. Since data
mining algorithms are generally used to build such detectors, one major challenge is adapting
these techniques to battery-powered devices. Many works simply assume that on-platform
detection is prohibitive and suggest using offloaded (i.e., cloud-based) engines. Such idea seeks
to save battery life by exchanging computation and communication costs, but it still remains
unclear whether this is optimal or not in all circumstances. In [2], the authors evaluated different
strategies for offloading certain functional tasks in data mining based detection systems. The
experimental results confirmed the intuition that outsourced computation is clearly the best
option in terms of power consumption, outweighing on-platform strategies in, essentially, all
practical scenarios.
3. RECENT COMMERCIAL SMARTPHONE POWER SAVING MODES
After Sony lunched its new Xperia™ smartphones series [1], users discovered that the company
equipped its new smartphones with some new additional features related to power management.
These features were recognized by many smartphones users as awesome addition to the current
power saving technologies offered by other famous smartphones manufacturers. Smartphones
developers kept on offering power saving modes following the idea of “one size fits all power
saving modes”. For example the power saving mode offered by Samsung under the name “Ultra
Power Saving Mode” and by HTC as “Extreme Power Saving Mode” and many other power
saving modes that either come only with an on/off switch in order to activate or deactivate the
power saving feature or comes with a low level of flexibility allowing the user to exclude few
number of his/her smartphones features from being affected by the power saving mode. On the
other hand comes the new power management features that Sony offers giving the user more
flexibility to navigate between three different power saving modes and under each power saving
7. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
7
mode comes a verity of features and the good news is that it gives an estimated battery time
under each option as shown in the following figure 1:
Figure 1: The Power Management Feature That Comes With Sony Xperia™ Series
3.1 SONY XPERIA Z2 – LOW BATTERY MODE
The power management feature that comes with Sony Xperia™ series offers three different
power saving modes those are: STAMINA low power mode, Low battery mode and Location-
based strict Wi-Fi. Each mode has its own use and provides different sets of features to the user.
The following shows the performance of the Low Battery Mode compared to two other power
saving modes:
Figure 2: Sample Merformance of the Low Battery Mode Compared to Two Other Power Saving
Modes
This mode can be moreover programmed to be activated once the battery gets to a specific low
level. Users can select the features that are affected but the default settings (which includes
turning off mobile web browsing) are as follows [7]:
• mobile data = off
• reduced screen brightness
• faster screen timeout
• auto sync= off
• Bluetooth & wi-fi =off
• GPS =off
• vibrate on touch =off
8. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
8
3.2 HTC ONE– EXTREME POWER SAVING MODE
This mode puts the device into a basic menu mode and can moreover be programmed to be
activated once the battery levels gets to a preset level. The mode does the following [8]:
• reduces CPU usage to low
• reduces screen brightness to low
• turns off vibration feedback = off
• turns off the data connection when the screen is inactive = off
• allows only essential apps to run
• turns off the pedometer= off
3.3 SAMSUNG GLAXY - ULTRA POWER SAVING MODE
When using the ultra-power saving mode, the Glaxy’s display turns to black and grey and the
functions listed below are either turned off or or run at a reduced rate [9]:
• turns off background data when screen = off
• turns off Wi-Fi and Bluetooth =off
• turns off GPS= off
• turns off vibration feedback=off
• restricts usage to essential applications and those selected by you
Samsung has also created a new Ultra Power Saving Mode (UPSM). This mode leverages tightly
integrated hardware and software to extend standby time many times over normal, apparently
allowing the phone to squeeze 24 hours of standby time out of just 10% battery life on the
average. Ultra Power Saving Mode-UPSM is not simply a fancy way to restrict background data
and dim the screen like most other OEMs do ; this mode drastically reduces power drain by
pulling back (reduce) on almost everything the phone does. The most obvious change when
activating UPSM is the switch to a gray scale display. By changing to a black and white UI, the
Galaxy needs to light fewer pixels, thus reducing power usage substantially on almost all
activities.
Other changes happen on the inside of the Galaxy when UPSM is engaged too. The device comes
with a Snapdragon 801, which has four Krait 400 CPU cores clocked to 2.5GHz. Ultra Power
Saver Mode takes advantage of Qualcomm’s custom ARM cores — two cores turn off
completely, and the remaining two are down clocked and capped at 1.5GHz low. To compensate
for the reduction in processing power, Samsung drops the display refresh from 60Hz to 30Hz.
Samsung has designed the new TouchWiz software to be extremely ruthless when UPSM is
turned on — all running processes and services are ended, and nothing is allowed to run in the
background except for the bare essentials needed for calling and messaging.
3.4 HTC EXTREME POWER SAVING MODE
The mode allows users to get more time out of their battery and customize the way the phone is
supposed to react when a certain battery level threshold is reached (bit reduced functionality). It
also charges up faster. With the Extreme Power Saving mode active, a fully charged phone will
deliver 14 days worth of battery power, although it will be able to do so by restricting the phone’s
functions to a handful of apps on a special screen (including calls, texts and emails,) turning off
background data completly, and dimming the screen’s brightness to low. The mode can be
activated manually or automatically, with the battery can be set to deliver 15 hours of life with
9. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
9
5% power left. Users will be able to set/reset their own threshold for automatically switching to
battery saving mode.
3.5 SONY XPERIA – STAMINA MODE
With Sony’s power management STAMINA Mode, users can extend the standby time by more
than four times. With STAMINA Mode turned on, the background activities of most applications
are reduced when users turn off the screen. With the new STAMINA Mode enabled, apps are not
allowed to synchronize and check for notifications and incoming messages when the screen is
off, something that normally consumes quite a lot of power. Starting one minute after the screen
has been turned off, data traffic is automatically blocked and background activities are prevented
from waking up the system. And then when users turn on the screen, the activities will resume
again instantly. When STAMINA Mode is on, one will still receive phone calls, SMS text
messages and MMS notifications at all times. The preinstalled Calendar app and Alarm
notifications will also work as normal, while the LED will only illuminate to indicate low battery
level. When STAMINA Mode is running, users will also get power management tips from the
phone to help one save even more energy, and keep the phone going even longer.
3.6 CUSTOMIZE BATTERY STAMINA MODE
Another useful functionality is that users can choose to white list of the most important apps,
allowing them to run in the background even when STAMINA Mode is turned on. Users get
notifications even when their phone is ideal. This is handy if one still wants to be able to receive
instant messages or IP calls at any time.
3.7 COMMERCIAL POWER SAVING MODES
After reviewing recent power saving modes developed by most popular smartphones
manufacturers, it may be possible to emphasize on the intention of these manufacturers to go
further with developing user customized power saving modes. The idea of having a “One Size Fit
All” power saving plans is gradually receding. Also it may be possible to support our intention to
develop user customized preventive power saving strategies and push it forward into enhancing
currently used strategies. The following section is about designing a “preventive” customized
power saving modes that will improve the user satisfaction and/or save more energy.
4. PREVENTIVE CUSTOMIZED POWER SAVING MODES
One can simply describe the current situation of smartphone batteries by the following statement:
“One Size Fits All”. It is quite rare to hear from any of the top famous smartphones
manufacturers about the intention of producing different categories or smartphones for different
classes of users based on the amount of power consumption for each class of users. Different
versions and classifications for mobile phones were seen before the era of smartphones when
companies were dealing with different versions of phones operating systems like Symbian and
Java. Nokia used to produce different types of phones for businessmen, gamers, sailors ..etc. For
example communicator, N-Gage, the same goes with LG, and Ericson. But after the boom of
MAC and Android the world noticed the huge raise towards having a unified shapes and features
of what is lately known as smartphones. At the same time of having this idea to unify all
smartphones, the smartphones industry were and still facing a true challenge regarding increasing
the capacity, usage time and decreasing the discharge time and the physical size and/or weight of
the smartphones batteries.
10. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
10
During the last ten years any mobile phone user can make a clear compassion between the
discharge time of the mobile phone used before ten years and the discharge time of today’s
smartphones. Phones were charged once every four days by average; on the other hand today’s
smartphones needs to be charges twice every 24 hours. Smartphones manufacturers started
investing more into the technologies related to batteries capacity and power storage technologies
to tackle with the two factors that are directly proportional in any technology related battery
which are capacity and physical size. Added to this the struggle with the parallel increase of
developers and programmers intention to enjoy taking advantage of the more power offered by
new technologies. All of the above caused the smartphones industry to fall into a situation that
can be demonstrated by one statement: “More Technologies Offered by a Smartphone, Less
Battery Life of the Same Smartphone”. This situation caused all the smartphones manufactures to
run in closed loops against increasing the technologies related to saving power and increasing
technologies offered by smartphones. As a result, smartphones manufacturers started finding
policies to save power based on detective techniques to measure and manage the internal
transactions on different major components of smartphones. This caused these manufactures to
uses “Preventive” power saving techniques as it will be demonstrated in the next parts of the
study.
4.1 PREVENTIVE VERSUS DETECTIVE POWER SAVING STRATEGIES
Preventive power saving strategies were actually used lately in the form of a feature that is
included in the phones operating system. What happens when a user activates this feature is that
simply he activates a number of fixed commands that takes over some main components of a
smartphone. These components which were classified by previous studies as the most power
drainage resources, e.g. Screen, Wi-Fi, 3G..etc. Whenever a user activates this power saving
mode, most of these components are to be provided with almost half of the power amount they
used to be provided without activating the power saving mode. This will cause these components
to either work with its half efficiency or totally stop working as active components and goes into
a standby mode, e.g. Screen brightness down to 50%, Wi-Fi on standby, 3G Off.. etc. The full
idea behind this strategy is to prevent these components from consuming more energy based on
their previously studied reputation against other phone components and regardless of the way and
amount of use for these components. By the time those techniques started giving positive
feedback regarding saving more energy, on the other hand what is known as detective power
saving strategies were all in the form of an add-on feature or application that the user installs or
adds to the phone and then give this newly added feature the authority to work as a radar in order
to detect and monitor the power consumption among different components and features of the
smartphone. This way of monitoring the categories includes managing the phone applications and
background commands and all the communications and transaction between all phone
components. The same techniques perform also the job of taking over handling the overall power
consumption including skipping the built-in smart power saving polices that are provided by the
operating system of the smartphone and keeps managing application by enabling and disabling
running and/or unused applications of the smartphone for the intention of saving the battery as
much as possible. One huge disadvantage of this way of power saving that it contradicts with the
main concept of power saving and this can be simply demonstrated. By recalling the previous
results of this study in paper three, Google Play classifies power saving applications under
“Productivity” category which is classified under our analysis results as 6th
power consuming
category, which kept the user more relaxed with the Preventive power saving techniques, but also
not purely satisfied of being controlled with some restrictions that prevents him from using some
of the important features which caused him in the first place to take the decision of buying a
smartphone. One of the recent Preventive solutions is the “Ultra Power Saving Mode” by
Samsung, this power saving mode does provide two weeks of standby mode. But on the expense
of using extreme limit on the features of the phone as it will be demonstrated on the following
papers of the paper. The following table shows the star rating of an application that follows the
11. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
11
detective power saving technique after exposing it to our previously proposed scale of rating
applications:
Table 1: Star Rating of an Application that Follows the Detective Power Saving Technique After Exposing
it Stars Rating Scale:
Samsung as one of the leading smartphone manufacturers went extreme with this power saving
technique as it launched its “Ultra Power Saving Mode”. As a powerful solution to take into
consideration the time as the main satisfaction factor to the smartphone user, the Ultra Power
saving mode as Samsung claims can run a smartphone up to two weeks without the need to
recharge. This is on the expense of major changes that the user should be able to deal with. The
main concept of the ultra-power saving mode is to put the phone on a standby mode till the user
wakes it up by starting one of only six allowed applications. During these applications no colors
are allowed, no Wi-Fi, no Cellular data packets and many things are not allowed, which actually
draws a valid point of a user that may ask: “I’m not paying X hundreds of dollars to have a
smartphone that will turn to black and white screen”. At the same time another user may ask
“why I can’t keep the colors only and disable all other stuff”. Another may ask “I need the push
notification, what’s the use of a smartphone without a push notification service?”. All these
questions and much more were the main motivation to our research of having a customized
preventive power saving mode based on the results of the above two studies and to have a middle
solution between enjoying long battery usage time by forcing users to coexist with extreme
restrictions imposed by current Ultra Power Saving Mode and between sufferings from short
battery usage time by giving the user the full freedom to use all phone features.
In order to start with our proposed solution it is essential to show the situation when using the
Ultra Power Saving Mode. The following list shows the applications allowed under “Samsung
Power Saving Mode”. The features and/or components that are either disabled and/or decreased
their functionality under Ultra Power Saving mode, and the phone settings that can be accessed
under Ultra Power Saving Mode: Applications and/or features that are allowed to be used by the
user under Samsung Ultra Power Saving mode:
12. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
12
• Phone
• Messages
• Internet
• Calculator
• ChatOn
• Clock
• Google+
• Memo
• Voice Recorder
Features and/or components that are either disabled and/or decreased their functionality under
Ultra Power Saving mode:
• Screen Colors (Screen Turns to Black and White)
• Screen Brightness (Screen Brightness is decreased to 25%)
• Sounds levels (Sound levels are decreased to 25%)
• All Connections (Wi-Fi, Bluetooth, 2G, 3G and 4G are all forced to go into standby
mode.
Settings that can be accessed under Ultra Power Saving Mode:
• Wi-Fi (ON/OFF)
• Bluetooth (ON/OFF)
• Airplane Mode (ON/OFF)
• Mobile Networks (Search/Select)
• Location (ON/OFF)
• Sound (Levels Control)
• Brightness (Levels Control)
4.2 USER TAILORED POWER SAVING MODES
The proposed solution goes more into an early “preventive” power saving plus educating the user
about power consuming habits and/or applications or categories before taking any step towards
any kind of interaction with his smartphone. It mainly starts from the step when the user
purchases his/her smartphone, and during the process of configuring the smartphone, the
operating system is going to tailor a power saving plan and shows the user a number of samples
until he/she accepts the deal. Then the user can start the actual use of the smartphone under what
is named as the “tailored power saving plan”. During the actual use of the smartphone there
won’t be any real-time or detective monitoring application to monitor the power usage. But
whenever the user tries to install, add or change one of the pre-agreed on factors and habits of
usage, he will be warned with an informative message about the impact of his planned step plus a
recommendation towards resolving it with an appropriate settlement or even to change the
tailored saving plan and tailor another one. Tailoring the power saving plan is done as per to a
number of factors, the user will be asked to give information regarding his fields of interest,
his/her age, the nature of his/her work, mostly using the smartphone “indoor” or “outdoor”, then
under each field of interest the user will be given short direct information about the common
reputation of each category of his/her interest in terms of power consumption by using our
previously proposed techniques and ways of rating each application category. Also how could the
usage of each category under different usage behaviors (indoor/outdoor) affects his power saving
plan. For example in case he/she were an open field workers who have limited access to
recharging resources. The user will be given several options to choose from which suite his/her
13. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
13
needs and at the same time avoid the use of unified size power saving modes. The main reason
behind avoiding the use of unified power saving modes is to give a much wider space of freedom
to the user from staying under unified restrictions that will cause him to struggle with a
smartphone that turn into a “standby smartphone” for the sake of increasing his battery usage
time. At the same time it will put a side many unneeded features or applications that would have
consumed a lot of energy without any benefit to the user.
If the users started having enough knowledge to define their main and common use(s) of their
smartphones, and also give the smartphone a much clear idea about the nature of their everyday
activities or their job nature, then it will be much easier to achieve the main goal of saving power
and at the same time, enjoy the main intention of buying a smartphone. This of course will lead
to easily control the kind of application that is to be installed on the smartphone plus it will be
much easier to wisely divide the amount of energy among the different components of the
smartphone.
4.3 REAL-LIFE EXAMPLE OF THE PROPOSED SOLUTION
For example if a user who just purchased his smartphone was on the stage of configuring his
Smartphone. The Smartphone then is supposed to ask him a number of questions about himself
including a clear message demonstrating the intention of having the answers to these questions,
as of the following:
“Kindly give as much accurate answers as possible to the following questions,
this will help the phone to choose the best power saving plan(s) that suites
your needs
Age:
Profession:
Total Number of Daily Working Hours:
Nature of Workplace: (Indoor/Outdoor):
Fields of Interests: (Multimedia, Social, Communication, Books, .etc.)
Wi-Fi availability: (Home, Workplace)
Preferred Place to Use your Smartphone: (Indoor/Outdoor)
Do you plan to use Push-Notifications?
Let’s assume that the user gave the following answers:
Age: 64
Profession: Retired
Total Number of Daily Working Hours: 0
Nature of Workplace: (Indoor/Outdoor): Indoor
Fields of Interests: Book, Healthcare, Weather
Wi-Fi availability: Home
Preferred Place to Use your Smartphone: Indoor
Do you plan to use Push-Notifications: Yes
By implementing simple analysis on the above answers it is also possible to recall the categories
of interest of the above user which were “Books & References” & “Medical”. Added to this, the
common location that he uses his smartphone mainly in is “Indoor” by the help of his Wi-Fi
connection. So the previous results of this study from paper three the two categories can be
brought back in order to find the average amount of power consumption of each category if they
both were used “indoor”. Then find the overall average amount of his power consumption. The
14. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
14
result will be used to find the approximate time of battery use. This will then be used to apply
further estimations. Finding the average amount of power consumption of this user is as follows:
Table 2: Finding the average amount of power consumption of a user based on categories of
application that are installed on his/her smartphone.
The Smartphone now will give a first deal to the user that will include the approximate amount of
battery usage time plus the list of things he has to give up in order to achieve the estimated
amount, as follows
Your Phone can run up to xxxx number of hours without recharge, but
please note that the following will be implemented on your phone:
Your smartphone cellular data connection will be switched off
Your smartphone screen will be dimmed
Your smartphone vibration feature will be switched off
Your smartphone screen waiting time will be decreased
Your smartphone Wi-Fi connection will go to standby mode
Your smartphone GPS will be switched off
5. CONCLUSION
From the above empirical experimental work, the study was able to emphasis on the importance
of educating the user about his own power consuming habits and/or applications or categories
power consumption habits before taking him into the actual use of the smartphone. This can
provide tremendous help to the field of developing “preventive” power saving strategies and also
can improve the user satisfaction.
REFERENCES
[1] A. Almasri, Preventive Customized Strategies for Saving Energy on Smartphones, M.Sc. Thesis,
Prince Sultan University, 2015
[2] W. Yuan and K. Nahrstedt, ‘Energy-Efficient Soft Real-Time CPU Scheduling for Mobile
Multimedia Systems’, in Proceedings of the Nineteenth ACM Symposium on Operating Systems
Principles, SOSP ’03, New York, 2003
[3] S.K. Datta, C. Bonnet and N. Nikaein, ‘Power Monitor v2: Novel Power Saving Android
Application’, in 2013 IEEE 17th International Symposium on Consumer Electronics (ISCE), 2013
[4] S. Chakraborty and D.K.Y. Yau, ‘Predicting Energy Consumption of MPEG Video Playback on
Handhelds’, in 2002 IEEE International Conference on Multimedia and Expo, 2002. ICME ’02.
Proceedings, 2002
[5] R. Perez-Torres and C. Torres-Huitzil, ‘A Power-Aware Middleware for Location Amp; Context
Aware Mobile Apps with Cloud Computing Interaction’, in 2012 World Congress on Information
and Communication Technologies (WICT), 2012
15. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
15
[6] J. Flinn, ‘Reducing the Energy Usage of Office Applications’, in Middleware 2001, ed. by Rachid
Guerraoui, Lecture Notes in Computer Science, 2218 (2001)
[7] Yuan and Nahrstedt, ‘Energy-Efficient Soft Real-Time CPU Scheduling for Mobile Multimedia
Systems’, Lecture Notes in Computer Science, 2218 (2001)
[8] https://support.google.com/googleplay/answer/6014972?hl=en
[9] Abogharaf and Naik, ‘Client-Centric Data Streaming on Smartphones’, Mobile and Wireless
Networking (MoWNeT), International Conference on Selected Topics, 2013
[10] W. Yuan and others, ‘Design and Evaluation of a Cross-Layer Adaptation Framework for Mobile
Multimedia Systems’, 2003, Electronic Imaging 2003
[11] H. Zeng ‘ECOSystem: Managing Energy As a First Class Operating System Resource’, in
Proceedings of the 10th International Conference on Architectural Support for Programming
Languages and Operating Systems, New York, 2002
[12] http://ziyang.eecs.umich.edu/projects/powertutor/
[13] Bonino and Corno, ‘DogOnt - Ontology Modeling for Intelligent Domotic Environments’ 2008
[14] Yuan, ‘Design and Evaluation of a Cross-Layer Adaptation Framework for Mobile Multimedia
Systems’ SPIE/ACM Multimedia Computing and Networking Conference (MMCN), 2003