Mostrando recursos 141 - 160 de 172,258

  1. Lighting up left-handed Z-DNA: photoluminescent carbon dots induce DNA B to Z transition and perform DNA logic operations


    Left-handed Z-DNA has been identified as a transient structure occurred during transcription. DNA B-Z transition has attracted much attention because of not only Z-DNA biological importance but also their relation to disease and DNA nanotechnology. Recently, photoluminescent carbon dots, especially highly luminescent nitrogen-doped carbon dots, have attracted much attention on their applications to bioimaging and gene/drug delivery because of carbon dots with low toxicity, highly stable photoluminescence and controllable surface function. However, it is still unknown whether carbon dots can influence DNA conformation or structural transition, such as B-Z transition. Herein, based on our previous series work on DNA inter-actions...

  2. Models of memristors for spice simulations

    Shahar Kvatinsky; Keren Talisveyberg; Dmitry Fliter; Avinoam Kolodny; Uri C. Weiser; Eby G. Friedman
    Abstract — Memristors are novel devices, which can be used in applications such as memory, logic, analog circuits and neuromorphic systems. Several memristor technologies have been developed such as ReRAM (Resistive RAM), MRAM (Magnetoresistance RAM), and PCM (Phase Change Memory). To design circuits with memristors, the behavior of the memristor needs to be described by a mathematical model. While the model for memristors should be sufficiently accurate comparing to the behavior of physical devices, it must also be computationally efficient. Several models for memristors have been proposed – the linear ion drift model, the nonlinear ion drift model, the Simmons...

  3. System Architecture for Developing Mobile Cinema

    David Crow; Pengkai Pan; Glorianna Davenport
    Mobile Cinema is embodied in temporally and spatially discontinuous narrative segments that can be delivered on wireless PDAs as users navigate physical locations and interact with the environment. Mobile Cinema takes as its starting point the truism that "every story is a journey " and bends this idea into a new form in which the narrative is augmented by physical surroundings, social engagement, and contextual awareness. To better handle participatory, context-aware, and evolving mobile story experiences, Mobile Cinema requires methodologies and flexible technology for allowing story makers to create coherent, immersive, and appealing content. The system architecture for developing Mobile...

  4. Changes in Gene Expression During the Formation of Bioengineered Heart

    Luda Khait; Ravi K. Birla
    Abstract: A three-dimensional bioengineered heart muscle (BEHM) construct model had been previously developed, exhibiting contractile forces up to 800 mN. The interest of this study was to determine gene expression levels of bio-logic markers involved in calcium-handling between BEHM, cell monolayer, and neonatal heart. Cardiac cells were isolated from one litter of F344 rats and organized into groups (n = 5): 4-, 7-, 10-day BEHM and cell monolayer; BEHM was evaluated for cell viability and contractility. Groups were then analyzed for mRNA expression of calcium-handling proteins: myosin heavy chain (MHC) a and b, Sarcoplasmic reticulum Ca++ ATPase (SERCA) 2, phospholamban...

  5. Vet Pathol 31:103-105 (1994) BRIEF COMMUNICATIONS and CASE REPORTS The y6 T Cell Population in Sheep Experimentally Infected with Bovine Leukemia Virus

    K. Murakami; K. Okada; H. Amanuma; Y. Aida
    Bovine leukemia virus (BLV) is an exogenous retrovirus and associated with enzootic bovine leukosis (EBL)4 which often includes persistent lymphocytosis and development of B-cell lymphosarcoma/leukemia after a long latent period. Natural cases of malignant lymphomas are rare in sheep. Under experimental conditions, however, sheep are easily infected with BLV7 and develop B-cell lymphosarcoma/leu-kemia at a higher frequency and within a shorter period (1 to 3 years) than cattle. Sheep also show serologic and patho-logic responses to BLV similar to those in The lymphoid systems of sheep and cattle contain a large number of the CD4- CD8- “double-negative ” T lymphocyte...

  6. Improve the 5s Performance in an Assembly Plant Using Fuzzy Logic Based Modeling

    Smt Shobha R; Ms. Arpitha Muthanna; Ms. Asha Lakshmi R; Ms. Neha; Deepak Gudi; Ms. Sneha Priya M; Msrit Bangalore Karnataka
    Abstract — Nowadays in this dynamic and technological world, the secret of surviving for any kind of organization is to be competitive and pioneer in its products or services. One of the main ways to succeed is continuous improvement and increasing the quality of product or service. However, there is lack of knowledge in some improving methods and tools like 5S and the challenge is much greater. This 5S system which is a component of lean manufacturing helps organize a workplace efficiently. A 5S audit was designed which enabled each zone head to identify the potential level of quality improvement...

  7. The Accountability Movement What’s Wrong With This Theory of Change?

    Joanne G. Carman
    In the field of program evaluation, one of the first things evaluators often do to evaluate a program is to identify the “theory of change ” behind the program and create a “logic model ” to articulate why the program is expected to work. This allows evaluators to make an assessment about the expectations and feasibility of the program, as well as assess program implementation. In this article, the author uses the theory of change approach to evaluation and creates a logic model for the “accountability movement ” or the tendency for funders to require nonprofit organizations to conduct evaluations...

  8. A Novel Approach for Combat Vehicle Mobility Definition and Assessment

    Macam S Dattathreya; Harpreet Singh
    Mobility assessment for combat vehicles is often a great challenge for the military due to various subjective attributes. The attributes' characteristics vary significantly depending on the vehicle type and its operating environments such as terrain, weather, and human factors. A clear definition and relationship between multiple attributes including human factors is necessary to assess mobility. To the best of authors ‘ knowledge, many existing mobility assessment techniques use complex analytical methods and focus on individual attributes. In this paper, for the first time, the authors propose a novel approach to define vehicle mobility and its influencing attributes using qualitative linguistic...

  9. Exploring a Circuit Design Approach based on One-hot Multi-valued Domino Logic

    Dibakar Gope; Pey-chang Kent; Lin Sunil; P Khatri
    Abstract — In this paper, we report on initial experiments on the feasibility of a circuit design approach that is based on one-hot multi-valued decomposi-tion of a logic netlist. A binary-valued logic netlist would first be decomposed into multi-valued logic nodes (with multi-valued inputs as well as outputs). For an arbitrary multi-valued logic node, this paper presents a circuit and layout design approach. We first synthesize the multi-valued logic node, using multi-valued decision diagrams (MDDs) to represent each output value of the multi-valued logic node. Each such MDD represents a binary valued output function, on one-hot multi-valued inputs. Assuming that...

  10. Design and Implementation of Random Noise Radar with Spectral-Domain Correlation for Moving Target Detection

    Jeong Phill Kim; Chi Hyun Jeong; Cheol Hoo Kim
    A correlation processing algorithm in the spectral domain is proposed for detecting moving targets with random noise radar. AD converted reference and Rx signals are passed through FFT block, and they are multiplied after the reference signal is complex conjugated. Now inverse FFT yields the sub-correlation results, and range and velocity information can be accurately extracted by an additional FFT processing. In this design procedure, specific considerations have to be made for correlation length, averaging number, and number of sub-correlation data for Doppler processing. The proposed algorithm was verified by Simulink (Mathworks) simulation, and its logic was implemented with Xilinx...

  11. Can Parties Police Themselves? Electoral Governance and Democratization

    Fabrice E. Lehoucq
    ABSTRACT. This article outlines the logic and consequences of the classical theory of electoral governance. By empowering the executive with the administration of elections and the legislature with the certification of the vote tally, the theory expected elected officials to generate widely acceptable election results. This article argues that the classical theory breaks down when the same party controls the executive and the legislature. Developments in several presidential systems offer tentative support for its central hypothesis. Only when parties delegated election governance to an autonomous court system did election conflicts stop promoting political instability. Comparisons between US and Latin American...

  12. Power-Gated Differential Logic Style Based on Double-Gate Controllable-Polarity Transistors

    Luca Amarú; Student Member; Pierre-emmanuel Gaillardon; Jian Zhang; Student Member; Giovanni De Micheli
    Abstract—This brief presents a novel power-gating technique for differential cascade voltage switch logic (DCVSL) based on double-gate (DG) controllable-polarity field-effect transistors (FETs). DG controllable-polarity FETs, commonly referred to as ambipolar transistors, are devices whose polarity is online recon-figurable by changing the second gate bias. In this brief, we exploit the online control of ambipolar device polarity to achieve intrinsi-cally power-gated DCVSL circuits bypassing the use of series sleep transistors. We perform circuit-level simulations and comparisons at 22-nm technology node, considering silicon nanowire-based DG controllable-polarity FETs. Experimental results show that ambipolar DCVSL circuits power gated by the proposed technique have on...

  13. Available online:http://internationaljournalofresearch.org / P a g e | 944 FPGA Power Reduction by Mux based Clock Gating Considering a Logic Architecture Student: Naresh Kumar R (12841D5703) Guide: Mr.: K SatishBabu (M.Tech) Associate Professor


    Guarded evaluation is a power reduction technique that involves identifying subcircuits (within a larger circuit) whose inputs can be held constant (guarded) at specific times during circuit operation, thereby reducing switching activity and lowering dynamic power. The concept is rooted in the property that under certain conditions, some signals within digital designs are not “observable ” at design outputs, making the circuitry that generates such signals a candidate for guarding. Guarded evaluation has been demonstrated successfully for applicationspecific integrated circuits (ASICs); in this paper, we apply the technique to field-programmable gate arrays (FPGAs). In ASICs, guarded evaluation entails adding additional...

  14. Continuum fusion: a new methodology for creating hyperspectral detection algorithms

    A. Schaum
    A new formalism has been developed for producing detection algorithms in model-based problems, in which one or more parameter values is unknown. Continuum fusion can be used to generate different flavors of algorithm for any composite hypothesis testing problem. The method is defined by a fusion logic that can be translated into a set of partial differential relations. However, some important hyperspectral models can be solved with purely geometrical means, one of which is described. The new methodology affords a new interpretation of the orthodox solution, the generalized likelihood ratio test, which is revealed as but one point in a...

  15. Trace-Based Network Proof Systems: Ua c A Expressiveness and Completeness * Justieation

    Jennifer Widom; David Gries; Fred B. Schneider; Jennifer Widom; David Gries By. Distribution
    on reverse of necessary and identify by block number) FIELD GROUP SUB-GROUP verification, concurrent programs, programming logics 19 ABSTRACT (Continue on reverse if necessary and identify by block number) We consider incomplete trace-based network proof systems for safety properties identifying extensions that are necessary and sufficient to achieve relative completeness. We then consider the expressiveness required of any trace logic that encodes these

  16. New Method for Reducing Across Chip Poly-CD Variation with Statistical OPC/Gauge Capability Analysis

    Hidetoshi Ohnuma; Koji Kikuchi; Hiroichi Kawahira
    For a lithography process with a design rule of 0.18 um and beyond, the most critical issue is the gate critical dimension (CD) control because it affects the circuit performance especially for high-end logic devices directly. The gate CD variation is generally categorized into two folds. The first one is CD variation affected by optical and process proximity effects, which is pattern layout dependent errors and can be treated by automatic optical proximity effect correction (OPC). The second one is across chip line width variation (ACLV) caused by aberration of stepper/scanner exposure tools and mask writing error. Although both two...

  17. Service ModelS

    Liang-jie Zhang; Jia Zhang
    To effectively align business and IT using a service-oriented architecture (SOA), a proposed integrated service model divides service construction into loosely coupled perspectives according to a service’s business logic, interface, and implementation. A lthough the service-oriented architec-ture (SOA) has become a prominent strategic model in the modern busi-ness world, SOA solution design and development is often still ad hoc, rather than part of a systematic implementation.1 Companies lack a business-aligned service model to guide and facilitate the design, development, and manage-ment life cycle of highly reusable services and service components. Existing approaches, such as the SOA triangular model2 and various...

  18. Monolithically stackable hybrid FPGA

    Dmitri Strukov; Alan Mishchenko
    Abstract — The paper introduces novel field programmable gate array (FPGA) circuits based on hybrid CMOS/resistive switching device (memristor) technology and explores several logic architectures. The novel FPGA structure is based on the combination of CMOL (Cmos + MOLecular scale devices) FPGA circuits and recent improvements and generalization of the CMOL concept to allow multilayer crossbar integration, compatibility with state-of-the-art foundries, and a wide range of available memristive crosspoint devices. Preliminary results indicate that with no optimization and only conventional CMOS technology, the proposed circuits can be at least ten times denser (and potentially faster) than CMOS FPGAs with the...

  19. Why confessions trump innocence

    Saul M. Kassin
    As illustrated by the story of Amanda Knox and many others wrongfully convicted, false confessions often trump factual innocence. Focusing on consequences, recent re-search suggests that confessions are powerfully persuasive as a matter of logic and common sense; that many false confessions contain richly detailed narratives and accurate crime facts that appear to betray guilty knowledge; and that confessions in general can corrupt other evidence from lay witnesses and forensic experts—producing an illusion of false support. This latter phenomenon, termed “corrob-oration inflation, ” suggests that pretrial corroboration re-quirements as well as the concept of “harmless error ” on appeal are...

  20. Instrumentation Analysis: An Automated Method for Producing Numeric Abstractions of Heap-Manipulating Programs

    Stephen Magill; Stephen Magill; Stephen Brookes; John Reynolds
    This Dissertation is brought to you for free and open access by the Theses and Dissertations at Research Showcase @ CMU. It has been accepted for inclusion in Dissertations by an authorized administrator of Research Showcase @ CMU. For more information, please contact research-

Aviso de cookies: Usamos cookies propias y de terceros para mejorar nuestros servicios, para análisis estadístico y para mostrarle publicidad. Si continua navegando consideramos que acepta su uso en los términos establecidos en la Política de cookies.