7 resultados para digital delay-line interpolation
em DRUM (Digital Repository at the University of Maryland)
Resumo:
Elevated delay discounting, in which delayed rewards quickly lose value as a function of time, is associated with substance use and abuse. Currently, the direction of causation is unclear: while some research indicates that elevated delay discounting leads to future substance use, it is also possible that chronic substance use and specifically the rate of reinforcement associated with drug use, leads to elevated delay discounting. This project aims to examine the latter possibility. 47 participants completed ten 30-minute daily sessions of a visual attention task, and were reinforced at a rate intended to model drug use (fixed ratio 1) or drug abstinence (fixed ratio 10). Baseline and post-training rates of delay discounting were assessed for hypothetical $50 and $1000. Area under the curve of the indifference points as a function of delay was calculated. A greater area under the curve suggests more self-control, whereas a lower value represents more impulsiveness. Results at the monetary value of both $50 and $1000 showed increased impulsivity in relation to the control for both the FR1 and FR10 groups indicating that the two schedules may both model drug use.
Resumo:
Contemporary integrated circuits are designed and manufactured in a globalized environment leading to concerns of piracy, overproduction and counterfeiting. One class of techniques to combat these threats is circuit obfuscation which seeks to modify the gate-level (or structural) description of a circuit without affecting its functionality in order to increase the complexity and cost of reverse engineering. Most of the existing circuit obfuscation methods are based on the insertion of additional logic (called “key gates”) or camouflaging existing gates in order to make it difficult for a malicious user to get the complete layout information without extensive computations to determine key-gate values. However, when the netlist or the circuit layout, although camouflaged, is available to the attacker, he/she can use advanced logic analysis and circuit simulation tools and Boolean SAT solvers to reveal the unknown gate-level information without exhaustively trying all the input vectors, thus bringing down the complexity of reverse engineering. To counter this problem, some ‘provably secure’ logic encryption algorithms that emphasize methodical selection of camouflaged gates have been proposed previously in literature [1,2,3]. The contribution of this paper is the creation and simulation of a new layout obfuscation method that uses don't care conditions. We also present proof-of-concept of a new functional or logic obfuscation technique that not only conceals, but modifies the circuit functionality in addition to the gate-level description, and can be implemented automatically during the design process. Our layout obfuscation technique utilizes don’t care conditions (namely, Observability and Satisfiability Don’t Cares) inherent in the circuit to camouflage selected gates and modify sub-circuit functionality while meeting the overall circuit specification. Here, camouflaging or obfuscating a gate means replacing the candidate gate by a 4X1 Multiplexer which can be configured to perform all possible 2-input/ 1-output functions as proposed by Bao et al. [4]. It is important to emphasize that our approach not only obfuscates but alters sub-circuit level functionality in an attempt to make IP piracy difficult. The choice of gates to obfuscate determines the effort required to reverse engineer or brute force the design. As such, we propose a method of camouflaged gate selection based on the intersection of output logic cones. By choosing these candidate gates methodically, the complexity of reverse engineering can be made exponential, thus making it computationally very expensive to determine the true circuit functionality. We propose several heuristic algorithms to maximize the RE complexity based on don’t care based obfuscation and methodical gate selection. Thus, the goal of protecting the design IP from malicious end-users is achieved. It also makes it significantly harder for rogue elements in the supply chain to use, copy or replicate the same design with a different logic. We analyze the reverse engineering complexity by applying our obfuscation algorithm on ISCAS-85 benchmarks. Our experimental results indicate that significant reverse engineering complexity can be achieved at minimal design overhead (average area overhead for the proposed layout obfuscation methods is 5.51% and average delay overhead is about 7.732%). We discuss the strengths and limitations of our approach and suggest directions that may lead to improved logic encryption algorithms in the future. References: [1] R. Chakraborty and S. Bhunia, “HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 28, no. 10, pp. 1493–1502, 2009. [2] J. A. Roy, F. Koushanfar, and I. L. Markov, “EPIC: Ending Piracy of Integrated Circuits,” in 2008 Design, Automation and Test in Europe, 2008, pp. 1069–1074. [3] J. Rajendran, M. Sam, O. Sinanoglu, and R. Karri, “Security Analysis of Integrated Circuit Camouflaging,” ACM Conference on Computer Communications and Security, 2013. [4] Bao Liu, Wang, B., "Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks,"Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014 , vol., no., pp.1,6, 24-28 March 2014.
Resumo:
An experimental and numerical study of turbulent fire suppression is presented. For this work, a novel and canonical facility has been developed, featuring a buoyant, turbulent, methane or propane-fueled diffusion flame suppressed via either nitrogen dilution of the oxidizer or application of a fine water mist. Flames are stabilized on a slot burner surrounded by a co-flowing oxidizer, which allows controlled delivery of either suppressant to achieve a range of conditions from complete combustion through partial and total flame quenching. A minimal supply of pure oxygen is optionally applied along the burner to provide a strengthened flame base that resists liftoff extinction and permits the study of substantially weakened turbulent flames. The carefully designed facility features well-characterized inlet and boundary conditions that are especially amenable to numerical simulation. Non-intrusive diagnostics provide detailed measurements of suppression behavior, yielding insight into the governing suppression processes, and aiding the development and validation of advanced suppression models. Diagnostics include oxidizer composition analysis to determine suppression potential, flame imaging to quantify visible flame structure, luminous and radiative emissions measurements to assess sooting propensity and heat losses, and species-based calorimetry to evaluate global heat release and combustion efficiency. The studied flames experience notable suppression effects, including transition in color from bright yellow to dim blue, expansion in flame height and structural intermittency, and reduction in radiative heat emissions. Still, measurements indicate that the combustion efficiency remains close to unity, and only near the extinction limit do the flames experience an abrupt transition from nearly complete combustion to total extinguishment. Measurements are compared with large eddy simulation results obtained using the Fire Dynamics Simulator, an open-source computational fluid dynamics software package. Comparisons of experimental and simulated results are used to evaluate the performance of available models in predicting fire suppression. Simulations in the present configuration highlight the issue of spurious reignition that is permitted by the classical eddy-dissipation concept for modeling turbulent combustion. To address this issue, simple treatments to prevent spurious reignition are developed and implemented. Simulations incorporating these treatments are shown to produce excellent agreement with the experimentally measured data, including the global combustion efficiency.
Resumo:
A systematic study was conducted to elucidate the effects of acoustic perturbations on laminar diffusion line-flames and the conditions required to cause acoustically-driven extinction. Flames were produced from the fuels n-pentane, n-hexane, n-heptane, n-octane, and JP-8, using fuel-laden wicks. The wicks were housed inside of a burner whose geometry produced flames that approximated a two dimensional flame sheet. The acoustics utilized ranged in frequency between 30-50 Hz and acoustic pressures between 5-50 Pa. The unperturbed mass loss rate and flame height of the alkanes were studied, and they were found to scale in a linear manner consistent with Burke-Schumann. The mass loss rate of hexane-fueled flames experiencing acoustic perturbations was then studied. It was found that the strongest influence on the mass loss rate was the magnitude of oscillatory air movement experienced by the flame. Finally, acoustic perturbations were imposed on flames using all fuels to determine acoustic extinction criterion. Using the data collected, a model was developed which characterized the acoustic conditions required to cause flame extinction. The model was based on the ratio of an acoustic Nusselt Number to the Spalding B Number of the fuel, and it was found that at the minimum speaker power required to cause extinction this ratio was a constant. Furthermore, it was found that at conditions where the ratio was below this constant, a flame could still exist; at conditions where the ratio was greater than or equal to this constant, flame extinction always occurred.
Resumo:
Bodies On the Line: Violence, Disposable Subjects, and the Border Industrial Complex explores the construction of identity and notions of belonging within an increasingly privatized and militarized Border Industrial Complex. Specifically, the project interrogates how discourses of Mexican migrants as racialized, gendered, and hypersexualized “deviants” normalize violence against border crossers. Starting at Juárez/El Paso border, I follow the expanding border, interrogating the ways that Mexican migrants, regardless of sexual orientation, have been constructed and disciplined according to racialized notions of “sexual deviance." I engage a queer of color critique to argue that sexual deviance becomes a justification for targeting and containing migrant subjects. By focusing on the economic and racially motivated violence that the Border Industrial Complex does to Mexican migrant communities, I expand the critiques that feminists of color have long leveraged against systemic violence done to communities of color through the prison industrial system. Importantly, this project contributes to transnational feminist scholarship by contextualizing border violence within the global circuits of labor, capital, and ideology that shape perceptions of border insecurity. The project contributes an interdisciplinary perspective that uses a multi-method approach to understand how border violence is exercised against Mexicans at the Mexico-US border. I use archival methods to ask how historical records housed at the National Border Patrol Museum and Memorial Library serve as political instruments that reinforce the contemporary use of violence against Mexican migrants. I also use semi-structured interviews with nine frequent border crossers to consider the various ways crossers defined and aligned themselves at the border. Finally, I analyze the master narratives that come to surround specific cases of border violence. To that end, I consider the mainstream media’s coverage, legal proceedings, and policy to better understand the racialized, gendered, and sexualized logics of the violence.
Resumo:
Black women cultural entrepreneurs are a group of entrepreneurs that merit further inquiry. Using qualitative interview and participant observation data, this dissertation investigates the ways in which black women cultural entrepreneurs define success. My findings reveal that black women cultural entrepreneurs are a particular interpretive community with values, perspectives and experiences, which are not wholly idiosyncratic, but shaped by collective experiences and larger social forces. Black women are not a monolith, but they are neither disconnected individuals completely devoid of group identity. The meaning they give to their businesses, professional experiences and understandings of success are influenced by their shared social position and identity as black women. For black women cultural entrepreneurs, the New Bottom Line goes beyond financial gain. This group, while not uniform in their understandings of success, largely understand the most meaningful accomplishments they can realize as social impact in the form of cultural intervention, black community uplift and professional/creative agency. These particular considerations represent a new paramount concern, and alternative understanding of what is typically understood as the bottom line. The structural, social and personal challenges that black women cultural entrepreneurs encounter have shaped their particular perspectives on success. I also explore the ways research participants articulated an oppositional consciousness to create an alternative means of defining and achieving success. I argue that this consciousness empowers them with resources, connections and meaning not readily conferred in traditional entrepreneurial settings. In this sense, the personal, social and structural challenges have been foundational to the formation of an alternative economy, which I refer to as The Connected Economy. Leading and participating in The Connected Economy, black women cultural entrepreneurs represent a black feminist and womanist critique of dominant understandings of success.
Resumo:
Rainflow counting methods convert a complex load time history into a set of load reversals for use in fatigue damage modeling. Rainflow counting methods were originally developed to assess fatigue damage associated with mechanical cycling where creep of the material under load was not considered to be a significant contributor to failure. However, creep is a significant factor in some cyclic loading cases such as solder interconnects under temperature cycling. In this case, fatigue life models require the dwell time to account for stress relaxation and creep. This study develops a new version of the multi-parameter rainflow counting algorithm that provides a range-based dwell time estimation for use with time-dependent fatigue damage models. To show the applicability, the method is used to calculate the life of solder joints under a complex thermal cycling regime and is verified by experimental testing. An additional algorithm is developed in this study to provide data reduction in the results of the rainflow counting. This algorithm uses a damage model and a statistical test to determine which of the resultant cycles are statistically insignificant to a given confidence level. This makes the resulting data file to be smaller, and for a simplified load history to be reconstructed.