Volume3 Issue4(2)

Total Page:16

File Type:pdf, Size:1020Kb

Volume3 Issue4(2) Volume 3, Issue 4(2), April 2014 International Journal of Multidisciplinary Educational Research Published by Sucharitha Publications Visakhapatnam – 530 017 Andhra Pradesh – India Email: [email protected] website : www.ijmer.in Editorial Board Editor-in-Chief Dr. Victor Babu Koppula Faculty Department of Philosophy Andhra University – Visakhapatnam -530 003 Andhra Pradesh – India EDITORIAL BOARD MEMBERS Prof. S.Mahendra Dev Prof. Josef HÖCHTL Vice Chancellor Department of Political Economy Indira Gandhi Institute of Development University of Vienna, Vienna & Research Ex. Member of the Austrian Parliament, Mumbai Austria Prof.Y.C. Simhadri Prof. Alexander Chumakov Director Chair of Philosophy Department Institute of Constitutional and Parlimentary Russian Philosophical Society Studies, New Delhi & Formerly Vice Moscow, Russia Chancellor of Benaras Hindu University, Andhra University Prof. Fidel Gutierrez Vivanco Nagarjuna University, Patna University Founder and President Escuela Virtual de Asesoría Filosófica Prof. (Dr.) Sohan Raj Tater Lima Peru Former Vice Chancellor Singhania University , Rajasthan Prof. Igor Kondrashin The Member of The Russian Philosophical Prof.K.Sreerama Murty Society Department of Economics The Russian Humanist Society and Expert of Andhra University - Visakhapatnam the UNESCO, Moscow, Russia Prof. K.R.Rajani Dr. Zoran Vujisiæ Department of Philosophy Rector Andhra University – Visakhapatnam St. Gregory Nazianzen Orthodox Institute Universidad Rural de Guatemala, GT,U.S.A Prof. A.B.S.V.Rangarao Department of Social Work Swami Maheshwarananda Andhra University – Visakhapatnam Founder and President Shree Vishwa Deep Gurukul Prof.S.Prasanna Sree Swami Maheshwarananda Ashram Education Department of English & Research Center Andhra University – Visakhapatnam Rajasthan, India Prof. P.Sivunnaidu Dr. Momin Mohamed Naser Department of History Department of Geography Andhra University – Visakhapatnam Institute of Arab Research and Studies Cairo University, Egypt Prof. P.D.Satya Paul Department of Anthropology Andhra University – Visakhapatnam I Ketut Donder Dr.K.Chaitanya Depasar State Institute of Hindu Dharma Postdoctoral Research Fellow Indonesia Department of Chemistry Nanjing University of Science and Prof. Roger Wiemers Technology Professor of Education People’s Republic of China Lipscomb University, Nashville, USA Dr.Merina Islam Prof. G.Veerraju Department of Philosophy Department of Philosophy Cachar College, Assam Andhra University Visakhapatnam Dr R Dhanuja PSG College of Arts & Science Prof.G.Subhakar Coimbatore Department of Education Andhra University, Visakhapatnam Dr. Bipasha Sinha S. S. Jalan Girls’ College Dr.B.S.N.Murthy University of Calcutta Department of Mechanical Engineering Calcutta GITAM University –Visakhapatnam Dr. K. John Babu N.Suryanarayana (Dhanam) Department of Journalism & Mass Comm Department of Philosophy Central University of Kashmir, Kashmir Andhra University, Visakhapatnam Dr. H.N. Vidya Governement Arts College Dr.Ch.Prema Kumar Hassan, Karnataka Department of Philosophy Andhra University, Dr.Ton Quang Cuong Visakhapatnam Dean of Faculty of Teacher Education University of Education, VNU, Hanoi Dr. E.Ashok Kumar Dr.E. Ashok Kumar Department of Education Prof. Chanakya Kumar North- Eastern Hill University, Shillong University of Pune PUNE © Editor-in-Chief, IJMER Typeset and Printed in India www.ijmer.in IJMER, Journal of Multidisciplinary Educational Research, concentrates on critical and creative research in multidisciplinary traditions. This journal seeks to promote original research and cultivate a fruitful dialogue between old and new thought. Volume 3 Issue 4(2) April 2014 Page S.No No 1. 3D Touchless Finger print Recognition with Identical 1 Twin Fingerprint Chetan G. Puri, Dipak S. Kapadane and S.M. Rokade 2. Applying QoS Base Data Replication Attributes In 12 Clouds A.J.Musmade and S.M. Rokade 3. Cloud compiler for C, C# and Java 26 Sagorika Datta, Aradhana, Anjali Dewani and PriyaBankar 4. GSM Networked DTMF Based Smart Password Entry 38 System Charushila B. Bachhav, Poonam S. Bagul and Pradnya S. Sanap 5. Auditing Protocols: A New Approch for Security of 46 Cloud Data Sonali Pardeshi, Ankita Rathi, Shalini Shejwal and Pooja Kuyate 6. An Extraction Technique for Universal Distance Cache 61 Chotia Amit N, Joshi Abhishek A, Gosavi Darpan V and Wagh Ganesh V 7. Safety Management of Construction Workers 74 Vivek K. Kulkarni and R. V. Devalkar 8. Improving Startup Time and Providing Security to 80 Snapshots on Linux Platform Sheetal R. Tambe, Monika Shinde, Rohini Hire, Shanku Mandal and Rokade S. M 9. Efficiently Securing Privacy of User Information in 92 Cloud Based Health Monitoring System Dhoot Suyog S, Naoghare M. M and Shinde Girish. R 10. Cloud Based Mobile Service Delivery 106 Using QoS Mechanism PrachiB.Gaikwad and S.M. Rokade 11. Fault Diagnosis in Induction Motor 117 K.R.Gosavi and A.A.Bhole 12. A review on intrusion detection system for web based 127 application R S Jagale and M M Naoghare 13. Implementation of Enhanced security on vehicular 141 cloud computing Rajbhoj Supriya K and Pankaj R. Chandre 14. Document Clustering for Forensic Analysis & 149 Investigation Dhokane R.M and Rokade S.M 15. Bluetooth file Transfer with Breakpoint 175 Priyanka V. Godse, Snehal P.Katore, Poonam A.Modani and Poonam B.Sonawane 16. Optimal Multiserver Configuration for Profit 184 Maximization in Cloud Computing Pravin Pokale, Vishal Agrawal and Rahul Wakchaure 17. Facilitating Effective User Navigation through Website 196 Structure Improvement Jyoti B. Kshirsagar and S .D. Jondhale 18. VeinSecured: A Detection and Prevention of DDoS 204 Attacks Sucheta Daware, Saurabh Chatterjee and Shrutika Jadhav 19. An Apotheosis Extraction Approach by Genetic 218 Programming Swati Shahi, Priyanka Tidke, Shital Vanis and Jayshree Sangale 20. Constriction Based Particle Filter to Denoise Video and 234 Trace Multiple Moving Objects A. R. Potdar and V. K. Shrivastava 21. Android Application on Latest Auditions Online Portal 247 Patil Kalpesh R,Sangale Swapnil V, Baviskar Sachin M and Mahajan Vilas U 22. A Survey On User Identity Verification via Keyboard 254 and Mouse Dynamics Ashwini Subhash Sonawane, Uzma Anis Shaikh, Vaishali Sitaram Kadu and Shedge Kishne N 23. Intelligent Transportation System 261 Deepti Patil, Sheetal Sharma, Kiran Madihalli and Gunjan Deore 24. Green Cloud Energy Efficient A New Methodology for 267 Creating Autonomous Software Deployment Packages Rohan Nagar, Sagar Karad and Rakesh Vaishnav Editorial …….. Provoking fresh thinking is certainly becoming the prime purpose of International Journal of Multidisciplinary Educational Research (IJMER). The new world era we have entered with enormous contradictions is demanding a unique understanding to face challenges. IJMER’s contents are overwhelmingly contributor, distinctive and are creating the right balance for its readers with its varied knowledge. We are happy to inform you that IJMER got the high Impact Factor 2.735, Index Copernicus Value 5.16 and IJMER is listed and indexed in 34 popular indexed organizations in the world. This academic achievement of IJMER is only author’s contribution in the past issues. I hope this journey of IJMER more benefit to future academic world. In the present issue, we have taken up details of multidisciplinary issues discussed in academic circles. There are well written articles covering a wide range of issues that are thought provoking as well as significant in the contemporary research world. My thanks to the Members of the Editorial Board, to the readers, and in particular I sincerely recognize the efforts of the subscribers of articles. The journal thus receives its recognition from the rich contribution of assorted research papers presented by the experienced scholars and the implied commitment is generating the vision envisaged and that is spreading knowledge. I am happy to note that the readers are benefited. My personal thanks to one and all. (Dr.Victor Babu Koppula) IJMER; ISSN: 2277-7881; IF-2.735; IC V:5.16; Vol 3, Issue 4(2), April 2014 3D TOUCHLESS FINGERPRINT RECOGNITION WITH IDENTICAL TWIN FINGERPRINTS Chetan G. Puri1, Dipak S. Kapadane2, Prof.Sharad M. Rokade3 3Associate Professor and Head,Computer Engg. Dept. 1, 2, 3Sir Visvesvaraya Institute Of Technology, Nashik [email protected], [email protected] [email protected] Abstract verification system can Fingerprint recognition with distinguish identical twins identical twins is a challenging without drastic degradation in task due to the closest genetics- performance. (b) The chance that based relationship existing in the the fingerprints have the same identical twins. Several pioneers type from identical twins is have analyzed the similarity 0.7440, comparing to 0.3215 from between twins’ fingerprints. In non-identical twins. (c) For the this work we continue to corresponding fingers of identical investigate the topic of the twins which have same similarity of identical twin fingerprint type, the probability fingerprints. (1) Two state-of-the- distribution of five major art fingerprint identification fingerprint types is similar to the methods: P071 and VeriFinger probability distribution for all 6.1 were used, rather than one the fingers’ fingerprint type. (d) fingerprint identification method For each of four fingers of in previous studies.. (2) A novel identical twins, the probability of statistical analysis, which aims at having same fingerprint type is showing the probability similar.
Recommended publications
  • Shorten Device Boot Time for Automotive IVI and Navigation Systems
    Shorten Device Boot Time for Automotive IVI and Navigation Systems Jim Huang ( 黃敬群 ) <[email protected]> Dr. Shi-wu Lo <[email protected]> May 28, 2013 / Automotive Linux Summit (Spring) Rights to copy © Copyright 2013 0xlab http://0xlab.org/ [email protected] Attribution – ShareAlike 3.0 Corrections, suggestions, contributions and translations You are free are welcome! to copy, distribute, display, and perform the work to make derivative works Latest update: May 28, 2013 to make commercial use of the work Under the following conditions Attribution. You must give the original author credit. Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical to this one. For any reuse or distribution, you must make clear to others the license terms of this work. Any of these conditions can be waived if you get permission from the copyright holder. Your fair use and other rights are in no way affected by the above. License text: http://creativecommons.org/licenses/by-sa/3.0/legalcode Goal of This Presentation • Propose a practical approach of the mixture of ARM hibernation (suspend to disk) and Linux user-space checkpointing – to shorten device boot time • An intrusive technique for Android/Linux – minimal init script and root file system changes are required • Boot time is one of the key factors for Automotive IVI – mentioned by “Linux Powered Clusters” and “Silver Bullet of Virtualization (Pitfalls, Challenges and Concerns) Continued” at ALS 2013 – highlighted by “Boot Time Optimizations” at ALS 2012 About this presentation • joint development efforts of the following entities – 0xlab team - http://0xlab.org/ – OSLab, National Chung Cheng University of Taiwan, led by Dr.
    [Show full text]
  • Linux on the Road
    Linux on the Road Linux with Laptops, Notebooks, PDAs, Mobile Phones and Other Portable Devices Werner Heuser <wehe[AT]tuxmobil.org> Linux Mobile Edition Edition Version 3.22 TuxMobil Berlin Copyright © 2000-2011 Werner Heuser 2011-12-12 Revision History Revision 3.22 2011-12-12 Revised by: wh The address of the opensuse-mobile mailing list has been added, a section power management for graphics cards has been added, a short description of Intel's LinuxPowerTop project has been added, all references to Suspend2 have been changed to TuxOnIce, links to OpenSync and Funambol syncronization packages have been added, some notes about SSDs have been added, many URLs have been checked and some minor improvements have been made. Revision 3.21 2005-11-14 Revised by: wh Some more typos have been fixed. Revision 3.20 2005-11-14 Revised by: wh Some typos have been fixed. Revision 3.19 2005-11-14 Revised by: wh A link to keytouch has been added, minor changes have been made. Revision 3.18 2005-10-10 Revised by: wh Some URLs have been updated, spelling has been corrected, minor changes have been made. Revision 3.17.1 2005-09-28 Revised by: sh A technical and a language review have been performed by Sebastian Henschel. Numerous bugs have been fixed and many URLs have been updated. Revision 3.17 2005-08-28 Revised by: wh Some more tools added to external monitor/projector section, link to Zaurus Development with Damn Small Linux added to cross-compile section, some additions about acoustic management for hard disks added, references to X.org added to X11 sections, link to laptop-mode-tools added, some URLs updated, spelling cleaned, minor changes.
    [Show full text]
  • The Best of Both Worlds with On-Demand Virtualization
    The Best of Both Worlds with On-Demand Virtualization Thawan Kooburat, Michael Swift University of Wisconsin-Madison [email protected], [email protected] Abstract Virtualization offers many benefits such as live migration, resource consolidation, and checkpointing. However, there are many cases where the overhead of virtualization is too high to justify for its merits. Most desktop and laptop PCs and many large web properties run natively because the benefits of virtualization are too small compared to the overhead. We propose a new middle ground: on-demand virtualization, in which systems run natively when they need native performance or features but can be converted on-the-fly to run virtually when necessary. This enables the user or system administrator to leverage the most useful features of virtualization, such as or checkpointing or consolidating workloads, during off-peak hours without paying the overhead during peak usage. We have developed a prototype of on-demand virtualization in Linux using the hibernate feature to transfer state between native execution and virtual execution, and find even networking applications can survive being virtualized. OS can return to native execution on its original hardware. 1. Introduction We call this approach on-demand virtualization, and it System virtualization offers many benefits in both data- gives operating systems an ability to be virtualized center and desktop environments, such as live migration, without service disruption. multi-tenancy, checkpointing, and the ability to run dif- Reaping the benefits of virtualization without its costs ferent operating systems at once. These features enable has been proposed previously in other forms. Microvisors hardware maintenance with little downtime, load ba- [14] provided the first step in the direction toward lancing for better throughput or power efficiency, and on-demand virtualization.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Cold Boot Attacks on Encryption Keys
    Lest We Remember: Cold Boot Attacks on Encryption Keys † ‡ J. Alex Halderman∗, Seth D. Schoen , Nadia Heninger∗, William Clarkson∗, William Paul , Joseph A. Calandrino∗, Ariel J. Feldman∗, Jacob Appelbaum, and Edward W. Felten∗ † ‡ ∗ Princeton University Electronic Frontier Foundation Wind River Systems jhalderm, nadiah, wclarkso, jcalandr, ajfeldma, felten @cs.princeton.edu { } [email protected], [email protected], [email protected] Abstract memory. They pose a particular threat to laptop users who rely on disk encryption products, since an adversary who Contrary to popular assumption, DRAMs used in most steals a laptop while an encrypted disk is mounted could modern computers retain their contents for several sec- employ our attacks to access the contents, even if the com- onds after power is lost, even at room temperature and puter is screen-locked or suspended. We demonstrate this even if removed from a motherboard. Although DRAMs risk by defeating several popular disk encryption systems, become less reliable when they are not refreshed, they including BitLocker, TrueCrypt, and FileVault, and we are not immediately erased, and their contents persist expect many similar products are also vulnerable. sufficiently for malicious (or forensic) acquisition of us- able full-system memory images. We show that this phe- While our principal focus is disk encryption, any sen- nomenon limits the ability of an operating system to pro- sitive data present in memory when an attacker gains tect cryptographic key material from an attacker with physical access to the system could be subject to attack. physical access. We use cold reboots to mount successful Many other security systems are probably vulnerable.
    [Show full text]
  • Optimization Techniques for Memory Virtualization-Based Resource Management
    SSStttooonnnyyy BBBrrrooooookkk UUUnnniiivvveeerrrsssiiitttyyy The official electronic file of this thesis or dissertation is maintained by the University Libraries on behalf of The Graduate School at Stony Brook University. ©©© AAAllllll RRRiiiggghhhtttsss RRReeessseeerrrvvveeeddd bbbyyy AAAuuuttthhhooorrr... Optimization Techniques for Memory Virtualization-based Resource Management A Dissertation Presented by Jui-Hao Chiang to The Graduate School in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Computer Science Stony Brook University December 2012 Stony Brook University The Graduate School Jui-Hao Chiang We, the dissertation committee for the above candidate for the Doctor of Philosophy degree, hereby recommend acceptance of this dissertation. Tzi-cker Chiueh { Dissertation Advisor Professor, Department of Computer Science Jie Gao { Chairperson of Defense Associate Professor, Department of Computer Science Rob Johnson Assistant Professor, Department of Computer Science Ted Teng Professor, Department of Technology and Society This dissertation is accepted by the Graduate School. Charles Taber Interim Dean of the Graduate School ii Abstract of the Dissertation Optimization Techniques for Memory Virtualization-based Resource Management by Jui-Hao Chiang Doctor of Philosophy in Computer Science Stony Brook University 2012 Memory virtualization abstracts the physical memory resources in a virtualized server in such a way that offers many resource man- agement advantages, such as consolidation, sharing,
    [Show full text]
  • Upgrade Issues
    Upgrade issues Graph of new conflicts libsiloh5-0 libhdf5-lam-1.8.4 (x 3) xul-ext-dispmua (x 2) liboss4-salsa-asound2 (x 2) why sysklogd console-cyrillic (x 9) libxqilla-dev libxerces-c2-dev iceape xul-ext-adblock-plus gnat-4.4 pcscada-dbg Explanations of conflicts pcscada-dbg libpcscada2-dev gnat-4.6 gnat-4.4 Similar to gnat-4.4: libpolyorb1-dev libapq-postgresql1-dev adacontrol libxmlada3.2-dev libapq1-dev libaws-bin libtexttools2-dev libpolyorb-dbg libnarval1-dev libgnat-4.4-dbg libapq-dbg libncursesada1-dev libtemplates-parser11.5-dev asis-programs libgnadeodbc1-dev libalog-base-dbg liblog4ada1-dev libgnomeada2.14.2-dbg libgnomeada2.14.2-dev adabrowse libgnadecommon1-dev libgnatvsn4.4-dbg libgnatvsn4.4-dev libflorist2009-dev libopentoken2-dev libgnadesqlite3-1-dev libnarval-dbg libalog1-full-dev adacgi0 libalog0.3-base libasis2008-dbg libxmlezout1-dev libasis2008-dev libgnatvsn-dev libalog0.3-full libaws2.7-dev libgmpada2-dev libgtkada2.14.2-dbg libgtkada2.14.2-dev libasis2008 ghdl libgnatprj-dev gnat libgnatprj4.4-dbg libgnatprj4.4-dev libaunit1-dev libadasockets3-dev libalog1-base-dev libapq-postgresql-dbg libalog-full-dbg Weight: 5 Problematic packages: pcscada-dbg hostapd initscripts sysklogd Weight: 993 Problematic packages: hostapd | initscripts initscripts sysklogd Similar to initscripts: conglomerate libnet-akamai-perl erlang-base screenlets xlbiff plasma-widget-yawp-dbg fso-config- general gforge-mta-courier libnet-jifty-perl bind9 libplack-middleware-session-perl libmail-listdetector-perl masqmail libcomedi0 taxbird ukopp
    [Show full text]
  • Power Management on DICE Desktops Chris Cooke [email protected] What I’Ll Talk About
    Power Management on DICE desktops Chris Cooke [email protected] What I’ll talk about Power management What the project will deliver Main areas to look at Money Power management Basically - making computers use less electricity. Or, better - making them use it more efficiently. on PCs Formerly - APM Now - ACPI APM It was fairly simple. It worked (eventually). APM Control: APM was done at the BIOS level - the OS had little or no control. Hardware: the BIOS reckoned it knew exactly what hardware the machine had. APM worked ... ... but it wasn’t very flexible. ACPI The OS is in charge The ACPI spec defines multiple “states” - sleep states, CPU power states, etc. The OS asks the BIOS to do things ACPI Very flexible Lots more interaction between OS and BIOS Lots of chances for BIOS bugs to mess things up BIOS bugs According to Avery Pennarun: “BIOS programmers are crackheaded morons who can't implement an API correctly to save their lives.” http://www.advogato.org/person/apenwarr/ diary.html?start=167 ACPI It’s far more flexible than APM. It’s far more complicated than APM. It sometimes works ... ... sort of. ACPI on Linux It’s Open Source, so... Projects compete Projects fork and rename pm-utils, Powersave, swsusp, uswsusp, suspend, suspend2, TuxOnIce, gnome-power- manager, acpid, ... The project Just a report. Just looking at DICE desktops. Main Areas Could we make our DICE desktops... “sleep” at night? operate more efficiently when running? Sleeping at night What normally happens at night? Could it happen at other times? Or could we automatically wake up at night, perform maintenance (e.g.
    [Show full text]
  • Reducing the Boot Time of Embedded Linux Systems
    FACULTY OF INFORMATION TECHNOLOGY AND ELECTRICAL ENGINEERING Tomi Kyöstilä REDUCING THE BOOT TIME OF EMBEDDED LINUX SYSTEMS Master’s Thesis Degree Programme in Computer Science and Engineering September 2018 Kyöstilä T. (2018) Reducing the boot time of embedded Linux systems. University of Oulu, Degree Programme in Computer Science and Engineering. Master’s thesis, 51 p. ABSTRACT The increase of the functionality of consumer electronics has complicated the soft- ware embedded in them. The functionality previously implemented in hardware has been steadily shifting into software, which also increases its complexity. To- gether, these developments have led to reduced performance and longer start-up delays. Consumer electronics need to have a positive user experience, which is also affected by the boot time. The methods for reducing the start-up time of an embedded Linux system can be categorized by the boot phases they can target: bootloaders, kernel initial- ization, or user space initialization. Compression can be applied in various sit- uations, while prefetching to the page cache (readahead) is relevant only to user space initialization. Hibernation can be used to entirely avoid user space initial- ization, which is usually the most time-consuming boot phase in Android systems. Developers need to know what impact their solutions and hardware choices have on the boot time. For this purpose, a measurement system was developed, which can automatically reboot the target system and collect a large sample of start-up time measurements. A large sample size is important because of the variance of the boot time even in a fixed target configuration. The measurement system was validated by using it when optimizing the start- up time of an Android system for use in an embedded consumer electronics device.
    [Show full text]
  • What´S up in Kernel-Land?
    What´s up in Kernel-Land? 09/24/10 Thorsten Leemhuis aka thl aka @kernellogauthor Kernel-Log live – LK2010 – http://bit.ly/lk2010-kernellog 1 Target audience? Users of these! ...and many more Linux-Distributions for Laptops, Desktops and Servers 09/24/10 Thorsten Leemhuis aka thl aka @kernellogauthor Kernel-Log live – LK2010 – http://bit.ly/lk2010-kernellog 2 whoami @ work Kernel-Log 09/24/10 Thorsten Leemhuis aka thl aka @kernellogauthor Kernel-Log live – LK2010 – http://bit.ly/lk2010-kernellog 3 whoami @ home 09/24/10 Thorsten Leemhuis aka thl aka @kernellogauthor Kernel-Log live – LK2010 – http://bit.ly/lk2010-kernellog 4 Micro-Blogging ● @thleemhuis private/personal stuff German ● @knurd666 Fedora related things English ● @kernellogauthor Kernel-Log topics English ● @kernellog announces new Kernel Logs on heise.de German ● @kernellog2 announces new Kernel Logs on h-online.com English 09/24/10 Thorsten Leemhuis aka thl aka @kernellogauthor Kernel-Log live – LK2010 – http://bit.ly/lk2010-kernellog 5 The next 35 minutes ● quick overview: Linux development model, stable series ● main part: the different areas of the kernel – what got improved recently – what people are working on ● how to help ● summing up + questions ● there are a lot of more topics I can talk about if you want – but I doubt there will be much free time remaining, as the main part is packed with details already 09/24/10 Thorsten Leemhuis aka thl aka @kernellogauthor Kernel-Log live – LK2010 – http://bit.ly/lk2010-kernellog 6 "Use bullet points rarely" ● you ● won't ●
    [Show full text]
  • Interview with Stefan Savage: on the Spam Payment Trail Rik Farrow
    Interview with Stefan Savage: On the Spam Payment Trail RIK FArrOW LISA ’11: Theme—“DevOps: New Challenges, Proven Values” THOMAS A. LIMONCELLI AND DOUG HUGHES Do Users Verify SSH Keys? PETER GUTMANN AUGUST 2011 VOL. 36, NO. 4 Conference Reports from HotOS XIII THE ADVANCED COMPUTING SYSTEMS ASSOCIATION THE ADVANCED COMPUTING SYSTEMS ASSOCIATION usenix_login_aug11_covers.indd 1 7.6.11 2:27 PM UPCOMING EVENTS 20th USENIX Security Symposium 23rd ACM Symposium on Operating Systems (USENIX Security ’11) Principles (SOSP 2011) August 8–12, 2011, San Francisco, CA, USA SPONSORED BY ACM SIGOPS IN COOPERATION WITH USENIX http://www.usenix.org/sec11 October 23–26, 2011, Cascais, Portugal http://sosp2011.gsd.inesc-id.pt Workshops co-located with USENIX Security ’11 include: ACM Symposium on Computer Human 2011 Electronic Voting Technology Workshop/ Interaction for Management of Information Workshop on Trustworthy Elections Technology (CHIMIT 2011) (EVT/WOTE ’11) SPONSORED BY ACM IN ASSOCIATION WITH USENIX SPONSORED BY USENIX, ACCURATE, AND IAVOSS December 4–5, 2011, Boston, MA August 8–9, 2011 http://chimit.acm.org/ http://www.usenix.org/evtwote11 25th Large Installation System Administration 4th Workshop on Cyber Security Conference (LISA ’11) Experimentation and Test (CSET ’11) SPONSORED BY USENIX IN COOPERATION WITH LOPSA AND SNIA August 8, 2011 December 4–9, 2011, Boston, MA, USA http://www.usenix.org/cset11 http://www.usenix.org/lisa11 USENIX Workshop on Free and Open Communications on the Internet (FOCI ’11) ACM/IFIP/USENIX 12th International
    [Show full text]
  • Extending the Swsusp Hibernation Framework to ARM
    Extending the swsusp Hibernation Framework to ARM Russell Dill 1 Introduction • Russ Dill of Texas Instruments • swsusp/hibernation on ARM – Overview – Challenges – Implementation – Remaining work – Debugging • swsusp restore from U-Boot • Code at: – https://github.com/russdill/linux/commits/arm-hibernation-am33xx – https://github.com/russdill/commits/hibernation ● eLinux.org page: http://elinux.org/ARM_Hibernation 2 Motivation • Hibernation provides zero power consumption sleep • Allows for snapshot boot • Shares requirements with self-refresh only sleep modes – RTC-Only+DDR self-refresh swsusp • Mainline hibernation implementation since 2.6.0 – TuxOnIce (Suspend2) • Uses swap device to store image • Requires 1/2 of system RAM to be free • Can be used with uswsusp to support additional features – Encryption – Limitless storage options – Graphical progress swsusp swsusp OMAP PM • Clocks – Clock gating – Clock domains – Clock scaling • Power – Power domains ● Logic ● Retention – Voltage scaling • PRCM Controls these features AM33xx PM Overview • MPU, PER, and GFX power domains can be turned off during suspend • Current OMAP PM core assumes WKUP domain will always have power WKUP Context • Used for: – Power, reset, and clock management (PRCM) – Pin mux configuration – modules that wake up the processor from suspend ● Such as UART0, GPIO0 – modules that should continue running when processor is in suspend ● Such as DMTIMER0 • After hibernation, we need to restore this state – Many critical portions of kernel code depend on devices within
    [Show full text]