A novel technique for data transmission that uses vibration motors in all cell phones as transmitters and accelerometers as receivers. By carefully regulating the vibrations at the transmitter and sensing them through vibration sensors, two mobile devices can communicate.
This is useful for security-sensitive applications such as mobile payments because vibrations are inherently more secure than RF broadcast in NFC or Bluetooth. The ubiquity of vibration motors in every cell phone, even in developing regions, presents an immediate market for vibratory communication
Dr. Caccamo and his team from the University of IL have developed an operating system to solve the issue of temporal unpredictability when using multi-core platforms in hard real-time systems. This is especially useful in automotive applications.
Assuming certain hardware configurations, this software can be used to achieve temporal predictability in commercial off the shelf hardware platforms.
Publications – A Real-Time Scratchpad-Centric OS for Multi-Core Embedded Systems
Dr. Nam Sung Kim has developed a protocol to vastly improve energy savings in low to medium load server environments.
The protocol works entirely on the Network Interface Card and is easy to implement. For low and medium load environments, the protocol can save approximately 50% of the energy used by the management of "sleep" and "wake" stages. It can be applied to servers both of small and large scale.
Professor Yih-Chun Hu from the University of Illinois has developed software that can protect networks against Internet attacks. In particular, it greatly reduces DDos attacks, which plague the Internet. This new software could be used for personalized Internet security. MiddlePolice combines high protection of capability systems with the facile development of cloud-based services.
Drs. Choudhury and Hassanieh, and Mr. Roy from the Electrical and Computer Engineering Department at the University of Illinois at Urbana-Champaign have developed a system enabling microphones to record inaudible sounds called BackDoor. This system can be used for data communication, communication security and privacy, and acoustic watermarking. BackDoor operates at frequencies of 40 kHz and higher, and is not limited with the 20-24 kHz bandwidth as other ultrasound devices. Reported results achieve data rates of 4 kbps at a distance of 1 m, and 2 kbps at 1.5 m, as well as room-level (3.5 m radius) privacy protection against electronic eavesdropping.
This technology reduces latency bottlenecks in data center network communication by shifting aggregation processes to programmable switches. iSwitch is particularly relevant to AI applications such as reinforcement learning (RL)-based training, where frequent gradient aggregation typically requires a large number of network hops. In demonstrations, the technology achieved a system-level speedup of more than 3.5x for both synchronous and asynchronous RL distributed training and also improved scalability.
iSwitch results in a system-level speedup of more than 3.5x for both synchronous and asynchronous RL distributed training and also improves scalability.