871 resultados para Network on chip


Relevância:

90.00% 90.00%

Publicador:

Relevância:

90.00% 90.00%

Publicador:

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Background: The availability of large-scale high-throughput data possesses considerable challenges toward their functional analysis. For this reason gene network inference methods gained considerable interest. However, our current knowledge, especially about the influence of the structure of a gene network on its inference, is limited.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The epidermis of the predatory terrestrial flatworm. Artioposthia triangulata has been examined by transmission electron microscopy for the presence of rhabdiform secretions. Two types of secretion are present: epidermal rhabdoids, produced by a special type of epidermal cell and true adenal rhabdites produced by gland cells beneath the epidermis. The epidermal rhabdoids are formed from Golgi-derived vesicles, which Fuse together to form the developing rhabdoid. Within the latter is a filamentous network on which granular material is deposited and coalesces to form a rod-shaped inclusion. The rhabdoids accumulate in the apical region of the cell and release their contents from the apical surface. The adenal rhabdites are formed by Golgi-derived vesicles. which become more elongated and their contents more electron-dense as they mature. The vesicles Fuse together to form the primordial rhabdite, which continues to lengthen with the addition of further vesicles. The neck of the rhabdite-forming cell passes between the muscle layers and through the basement membrane to open into the base of the epidermal cell. The rhabdites move from the cell body through the neck into the cytoplasm of the epidermal cell and make their way to the apical surface where they are released to the exterior.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Context: The effects of assessment practice on students’ learning are unclear, particularly regarding professional development. Corralling in objective structured clinical examinations (OSCEs) is designed to reduce illicit passing of examination information. Candidates completing an examination are kept secluded until the next cohort of examinees has begun. We used the introduction of corralling as a context in which to explore social influences on examination misconduct, with the aims of improving understanding of the hidden effects of assessment, and evaluating the acceptability of corralling from the student perspective.

Methods: A questionnaire was administered to students corralled post-OSCE for the first time. Eleven semi-structured interviews were subsequently conducted. Questionnaire data were analysed for descriptive statistics and thematic analysis of interview transcripts was carried out.

Results: The questionnaire response rate was 95.4% (251/263). Before corralling, 80.9% (203/251) of students were aware of the sharing of information among peers and 78.5% (197/251) agreed that such misconduct was unprofessional. The majority were in favour of corralling (90.8%, 228/251). Four themes emerged from the semi-structured interviews: the student network versus the individual; assessment-driven culture; the deferring of professionalism, and the ‘level playing field’. Students saw interaction within the student network, on a background of assessment-driven culture, as the key driver in examination misconduct. Conforming to the rules of the social network was prioritised over individual agency, although the mismatch between the rules of the network and the dominant professional discourse caused some conflict for individuals. Deferred professionalism (described as the practice of taking on the norms of professional behaviour only when qualified) was a rationalisation used to minimise this conflict. Corralling provided a ‘level playing field’ in which the influences of the network were minimised.

Conclusions: Examination misconduct is thus a complex social construction with implications for individual learners in terms of professional development. Corralling is one mechanism for addressing misconduct that is acceptable to students, but assessment processes have important hidden effects which educators should acknowledge.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Caches hide the growing latency of accesses to the main memory from the processor by storing the most recently used data on-chip. To limit the search time through the caches, they are organized in a direct mapped or set-associative way. Such an organization introduces many conflict misses that hamper performance. This paper studies randomizing set index functions, a technique to place the data in the cache in such a way that conflict misses are avoided. The performance of such a randomized cache strongly depends on the randomization function. This paper discusses a methodology to generate randomization functions that perform well over a broad range of benchmarks. The methodology uses profiling information to predict the conflict miss rate of randomization functions. Then, using this information, a search algorithm finds the best randomization function. Due to implementation issues, it is preferable to use a randomization function that is extremely simple and can be evaluated in little time. For these reasons, we use randomization functions where each randomized address bit is computed as the XOR of a subset of the original address bits. These functions are chosen such that they operate on as few address bits as possible and have few inputs to each XOR. This paper shows that to index a 2(m)-set cache, it suffices to randomize m+2 or m+3 address bits and to limit the number of inputs to each XOR to 2 bits to obtain the full potential of randomization. Furthermore, it is shown that the randomization function that we generate for one set of benchmarks also works well for an entirely different set of benchmarks. Using the described methodology, it is possible to reduce the implementation cost of randomization functions with only an insignificant loss in conflict reduction.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The United Nations Convention on the Rights of the Child (UNCRC) acknowledges that young people without parental care are entitled to special support and assistance from the State. In detailing their expectations, the UN Committee have issued Guidelines for the Alternative Care of Children which recognise that State parties have a number of responsibilities towards care leavers. The paper explores how the UNCRC reporting process, and guidelines from the Committee outlining how States should promote the rights of young people making the transition from care to adulthood, can be used as an instrument to track global patterns of change in policy and practice. Content analysis of State Party Reports and Concluding Observations from 15 countries reveals that to date there has been limited engagement with understanding and promoting the needs of this group in the reporting process; although where a government is committed to developing legislation and practice then this does find its way into their national reports. Data supplied by affiliates of the International Research Network on Transitions to Adulthood from Care (INTRAC) reveals that national concerns, political ideology, public awareness, attitudes and knowledge of the vulnerability of care leavers influence service responses to protect and promote the rights of this group and the attention afforded to such issues in reports to the Committee. Findings also suggest that global governance is not simply a matter of top down influence. Future work on both promoting and monitoring of the impact of the UNCRC needs to recognise that what is in play is the management of a complex global/national dynamic with all its uneven development, levels of influence and with a range of institutional actors involved.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

A novel cost-effective and low-latency wormhole router for packet-switched NoC designs, tailored for FPGA, is presented. This has been designed to be scalable at system level to fully exploit the characteristics and constraints of FPGA based systems, rather than custom ASIC technology. A key feature is that it achieves a low packet propagation latency of only two cycles per hop including both router pipeline delay and link traversal delay - a significant enhancement over existing FPGA designs - whilst being very competitive in terms of performance and hardware complexity. It can also be configured in various network topologies including 1-D, 2-D, and 3-D. Detailed design-space exploration has been carried for a range of scaling parameters, with the results of various design trade-offs being presented and discussed. By taking advantage of abundant buildin reconfigurable logic and routing resources, we have been able to create a new scalable on-chip FPGA based router that exhibits high dimensionality and connectivity. The architecture proposed can be easily migrated across many FPGA families to provide flexible, robust and cost-effective NoC solutions suitable for the implementation of high-performance FPGA computing systems. © 2011 IEEE.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Reagent pre-storage in a microfluidic chip can enhance operator convenience, simplify the system design, reduce the cost of storage and shipment, and avoid the risk of cross-contamination. Although dry reagents have long been used in lateral flow immunoassays, they have rarely been used for nucleic acid-based point-of-care (POC) assays due to the lack of reliable techniques to dehydrate and store fragile molecules involved in the reaction. In this study, we describe a simple and efficient method for prolonged on-chip storage of PCR reagents. The method is based on gelification of all reagents required for PCR as a ready-to-use product. The approach was successfully implemented in a lab-on-a-foil system, and the gelification process was automated for mass production. Integration of reagents on-chip by gelification greatly facilitated the development of easy-to-use lab-on-a-chip (LOC) devices for fast and cost-effective POC analysis.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

NanoStreams is a consortium project funded by the European Commission under its FP7 programme and is a major effort to address the challenges of processing vast amounts of data in real-time, with a markedly lower carbon footprint than the state of the art. The project addresses both the energy challenge and the high-performance required by emerging applications in real-time streaming data analytics. NanoStreams achieves this goal by designing and building disruptive micro-server solutions incorporating real-silicon prototype micro-servers based on System-on-Chip and reconfigurable hardware technologies.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper presents a hardware solution for network flow processing at full line rate. Advanced memory architecture using DDR3 SDRAMs is proposed to cope with the flow match limitations in packet throughput, number of supported flows and number of packet header fields (or tuples) supported for flow identifications. The described architecture has been prototyped for accommodating 8 million flows, and tested on an FPGA platform achieving a minimum of 70 million lookups per second. This is sufficient to process internet traffic flows at 40 Gigabit Ethernet.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Cognitive radio has emerged as an essential recipe for future high-capacity high-coverage multi-tier hierarchical networks. Securing data transmission in these networks is of utmost importance. In this paper, we consider the cognitive wiretap channel and propose multiple antennas to secure the transmission at the physical layer, where the eavesdropper overhears the transmission from the secondary transmitter to the secondary receiver. The secondary receiver and the eavesdropper are equipped with multiple antennas, and passive eavesdropping is considered where the channel state information of the eavesdropper’s channel is not available at the secondary transmitter. We present new closedform expressions for the exact and asymptotic secrecy outage probability. Our results reveal the impact of the primary network on the secondary network in the presence of a multi-antenna wiretap channel.