-
Safe and Secure Smart Home using Cisco Packet Tracer
Authors:
Shivansh Walia,
Tejas Iyer,
Shubham Tripathi,
Akshith Vanaparthy
Abstract:
This project presents an implementation and designing of safe, secure and smart home with enhanced levels of security features which uses IoT-based technology. We got our motivation for this project after learning about movement of west towards smart homes and designs. This galvanized us to engage in this work as we wanted for homeowners to have a greater control over their in-house environment wh…
▽ More
This project presents an implementation and designing of safe, secure and smart home with enhanced levels of security features which uses IoT-based technology. We got our motivation for this project after learning about movement of west towards smart homes and designs. This galvanized us to engage in this work as we wanted for homeowners to have a greater control over their in-house environment while also promising more safety and security features for the denizen. This contrivance of smart-home archetype has been intended to assimilate many kinds of sensors, boards along with advanced IoT devices and programming languages all of which in conjunction validate control and monitoring prowess over discrete electronic items present in home.
△ Less
Submitted 24 April, 2023;
originally announced April 2023.
-
Comparing the Perceived Legitimacy of Content Moderation Processes: Contractors, Algorithms, Expert Panels, and Digital Juries
Authors:
Christina A. Pan,
Sahil Yakhmi,
Tara P. Iyer,
Evan Strasnick,
Amy X. Zhang,
Michael S. Bernstein
Abstract:
While research continues to investigate and improve the accuracy, fairness, and normative appropriateness of content moderation processes on large social media platforms, even the best process cannot be effective if users reject its authority as illegitimate. We present a survey experiment comparing the perceived institutional legitimacy of four popular content moderation processes. We conducted a…
▽ More
While research continues to investigate and improve the accuracy, fairness, and normative appropriateness of content moderation processes on large social media platforms, even the best process cannot be effective if users reject its authority as illegitimate. We present a survey experiment comparing the perceived institutional legitimacy of four popular content moderation processes. We conducted a within-subjects experiment in which we showed US Facebook users moderation decisions and randomized the description of whether those decisions were made by paid contractors, algorithms, expert panels, or juries of users. Prior work suggests that juries will have the highest perceived legitimacy due to the benefits of judicial independence and democratic representation. However, expert panels had greater perceived legitimacy than algorithms or juries. Moreover, outcome alignment - agreement with the decision - played a larger role than process in determining perceived legitimacy. These results suggest benefits to incorporating expert oversight in content moderation and underscore that any process will face legitimacy challenges derived from disagreement about outcomes.
△ Less
Submitted 6 October, 2022; v1 submitted 13 February, 2022;
originally announced February 2022.
-
Mobile P2P Trusted On-Demand Video Streaming
Authors:
Thava Iyer,
Robert Hsieh,
Nikzad Babaii Rizvandi,
Benoy Varghese,
Roksana Boreli
Abstract:
We propose to demonstrate a mobile server assisted P2P system for on-demand video streaming. Our proposed solution uses a combination of 3G and ad-hoc Wi-Fi connections, to enable mobile devices to download content from a centralised server in a way that minimises the 3G bandwidth use and cost. On the customised GUI, we show the corresponding reduction in 3G bandwidth achieved by increasing the nu…
▽ More
We propose to demonstrate a mobile server assisted P2P system for on-demand video streaming. Our proposed solution uses a combination of 3G and ad-hoc Wi-Fi connections, to enable mobile devices to download content from a centralised server in a way that minimises the 3G bandwidth use and cost. On the customised GUI, we show the corresponding reduction in 3G bandwidth achieved by increasing the number of participating mobile devices in the combined P2P and ad-hoc Wi- Fi network, while demonstrating the good video playout quality on each of the mobiles. We also demonstrate the implemented trust mechanism which enables mobiles to only use trusted adhoc connections. The system has been implemented on Android based smartphones.
△ Less
Submitted 31 March, 2012;
originally announced April 2012.