867 resultados para Fine-grained microstructure
Resumo:
The design of a high-performance IIR (infinite impulse response) digital filter is described. The chip architecture operates on 11-b parallel, two's complement input data with a 12-b parallel two's complement coefficient to produce a 14-b two's complement output. The chip is implemented in 1.5-µm, double-layer-metal CMOS technology, consumes 0.5 W, and can operate up to 15 Msample/s. The main component of the system is a fine-grained systolic array that internally is based on a signed binary number representation (SBNR). Issues addressed include testing, clock distribution, and circuitry for conversion between two's complement and SBNR.
Resumo:
Uniform submicron La2NiO4+δ (sm-LNO) powders have been synthesized by a facile polyvinylpyrrolidone (PVP)-assisted hydrothermal route. In the presence of PVP, sm-LNO of pure phase has been obtained by calcination at the relatively low temperature of 900 °C for 8 h. Compared micron-sized LNO (m-LNO) particles obtained at 1,000 °C by hydrothermal synthesis route without PVP assisted, the sm-LNO-PVP displays regularly shaped and well-distributed particles in the range of 0.3–0.5 μm. The scanning electron microscopy (SEM) results showed that the sm-LNO sample is submicronic and that the m-LNO sample shows agglomerates with a broad size distribution. The electrochemical performance of m-LNO and sm-LNO-PVP has been investigated by electrochemical impedance spectroscopy. The polarization resistance of the sm-LNO-PVP cathode reaches a value of 0.40 Ω cm2 at 750 °C, which is lower than that of m-LNO (0.62 Ω cm2). This result indicates that a fine electrode microstructure with submicron particles can help to increase the active sites, accelerate oxygen diffusion, and reduce polarization resistance. An anode-supported single cell with sm-LNO cathode has been fabricated and tested over a temperature range from 650 to 800 °C. The maximum power density of the cell has achieved 834 mW cm−2 at 750 °C. These results therefore show that this PVP-assisted hydrothermal method is an effective approach to construct submicron-structured cathode and enhance the performance of intermediate temperature solid oxide fuel cell.
Resumo:
Samples of fine-grained channel bed sediment and overbank floodplain deposits were collected along the main channels of the Rivers Aire (and its main tributary, the River Calder) and Swale, in Yorkshire, UK, in order to investigate downstream changes in the storage and deposition of heavy metals (Cr, Cu, Pb, Zn), total P and the sum of selected PCB congeners, and to estimate the total storage of these contaminants within the main channels and floodplains of these river systems. Downstream trends in the contaminant content of the <63 μm fraction of channel bed and floodplain sediment in the study rivers are controlled mainly by the location of the main sources of the contaminants, which varies between rivers. In the Rivers Aire and Calder, the contaminant content of the <63 μm fraction of channel bed and floodplain sediment generally increases in a downstream direction, reflecting the location of the main urban and industrialized areas in the middle and lower parts of the basin. In the River Swale, the concentrations of most of the contaminants examined are approximately constant along the length of the river, due to the relatively unpolluted nature of this river. However, the Pb and Zn content of fine channel bed sediment decreases downstream, due to the location of historic metal mines in the headwaters of this river, and the effect of downstream dilution with uncontaminated sediment. The magnitude and spatial variation of contaminant storage and deposition on channel beds and floodplains are also controlled by the amount of <63 μm sediment stored on the channel bed and deposited on the floodplain during overbank events. Consequently, contaminant deposition and storage are strongly influenced by the surface area of the floodplain and channel bed. Contaminant storage on the channel beds of the study rivers is, therefore, generally greatest in the middle and lower reaches of the rivers, since channel width increases downstream. Comparisons of the estimates of total storage of specific contaminants on the channel beds of the main channel systems of the study rivers with the annual contaminant flux at the catchment outlets indicate that channel storage represents <3% of the outlet flux and is, therefore, of limited importance in regulating that flux. Similar comparisons between the annual deposition flux of specific contaminants to the floodplains of the study rivers and the annual contaminant flux at the catchment outlet, emphasise the potential importance of floodplain deposition as a conveyance loss. In the case of the River Aire the floodplain deposition flux is equivalent to between ca. 2% (PCBs) and 36% (Pb) of the outlet flux. With the exception of PCBs, for which the value is ≅0, the equivalent values for the River Swale range between 18% (P) and 95% (Pb). The study emphasises that knowledge of the fine-grained sediment delivery system operating in a river basin is an essential prerequisite for understanding the transport and storage of sediment-associated contaminants in river systems and that conveyance losses associated with floodplain deposition exert an important control on downstream contaminant fluxes and the fate of such contaminants. © 2003 Elsevier Science Ltd. All rights reserved.
Resumo:
Field programmable gate array devices boast abundant resources with which custom accelerator components for signal, image and data processing may be realised; however, realising high performance, low cost accelerators currently demands manual register transfer level design. Software-programmable ’soft’ processors have been proposed as a way to reduce this design burden but they are unable to support performance and cost comparable to custom circuits. This paper proposes a new soft processing approach for FPGA which promises to overcome this barrier. A high performance, fine-grained streaming processor, known as a Streaming Accelerator Element, is proposed which realises accelerators as large scale custom multicore networks. By adopting a streaming execution approach with advanced program control and memory addressing capabilities, typical program inefficiencies can be almost completely eliminated to enable performance and cost which are unprecedented amongst software-programmable solutions. When used to realise accelerators for fast fourier transform, motion estimation, matrix multiplication and sobel edge detection it is shown how the proposed architecture enables real-time performance and with performance and cost comparable with hand-crafted custom circuit accelerators and up to two orders of magnitude beyond existing soft processors.
Resumo:
Software-programmable `soft' processors have shown tremendous potential for efficient realisation of high performance signal processing operations on Field Programmable Gate Array (FPGA), whilst lowering the design burden by avoiding the need to design fine-grained custom circuit archi-tectures. However, the complex data access patterns, high memory bandwidth and computational requirements of sliding window applications, such as Motion Estimation (ME) and Matrix Multiplication (MM), lead to low performance, inefficient soft processor realisations. This paper resolves this issue, showing how by adding support for block data addressing and accelerators for high performance loop execution, performance and resource efficiency over four times better than current best-in-class metrics can be achieved. In addition, it demonstrates the first recorded real-time soft ME estimation realisation for H.263 systems.
Resumo:
We study the computational complexity of finding maximum a posteriori configurations in Bayesian networks whose probabilities are specified by logical formulas. This approach leads to a fine grained study in which local information such as context-sensitive independence and determinism can be considered. It also allows us to characterize more precisely the jump from tractability to NP-hardness and beyond, and to consider the complexity introduced by evidence alone.
Resumo:
The bacterial community composition and biomass abundance from a depositional mud belt in the western Irish Sea and regional sands were investigated by phospholipid ester-linked fatty acid profiling, denaturing gradient gel electrophoresis and barcoded pyrosequencing of 16S rRNA genes. The study area varied by water depth (12-111 m), organic carbon content (0.09-1.57% TOC), grain size, hydrographic regime (well-mixed vs. stratified), and water column phytodetrital input (represented by algal polyunsaturated PLFA). The relative abundance of bacterial-derived PLFA (sum of methyl-branched, cyclopropyl and odd-carbon number PLFA) was positively correlated with fine-grained sediment, and was highest in the depositional mud belt. A strong association between bacterial biomass and eukaryote primary production was suggested based on observed positive correlations with total nitrogen and algal polyunsaturated fatty acids. In addition, 16S rRNA genes affiliated to the classes Clostridia and Flavobacteria represented a major proportion of total 16S rRNA gene sequences. This suggests that benthic bacterial communities are also important degraders of phytodetrital organic matter and closely coupled to water column productivity in the western Irish Sea.
Resumo:
This book explores what it is like to be involved in contemporary open adoption, characterised by varying forms of contact with birth relatives, from an adoptive parent point of view.
The author’s fine-grained interpretative phenomenological analysis of adopters’ accounts reveals the complexity of kinship for those whose most significant relationships are made, unmade and permanently altered through adoption. MacDonald distinctively connects adoption to wider sociological theories of relatedness and personal life, and focuses on domestic non-kin adoption of children from state care, including compulsory adoption. The book also addresses current child welfare concerns, and suggestions are made for adoption practice. The book will be of interest to scholars and students with an interest in adoption, social work, child welfare, foster care, family and sociology.
Resumo:
At QUB we have constructed a system that allows students to self-assess their capability on the fine grained learning outcomes for a module and to update their record as the term progresses. In the system each of the learning outcomes are linked to the relevant teaching session (lectures and labs) and to [online] resources that students can access at any time. Students can structure their own learning experience to their needs to attain the learning outcomes. The system keeps a history of the student’s record, allowing the lecturer to observe how the students’ abilities progress over the term and to compare it to assessment results. The system also keeps of any of the resource links that student has clicked on.
Resumo:
O principal objectivo deste estudo foi o desenvolvimento de vitrocerâmicos à base de dissilicato de lítio no sistema Li2O-K2O-Al2O3-SiO2 contendo uma razão molar SiO2/Li2O muito afastada da do dissilicato de lítio (Li2Si2O5) usando composições simples e a técnica tradicional de fusão-vazamento de vidro de forma a obter materiais com propriedades mecânicas, térmicas, químicas e eléctricas superiores que permitam a utilização destes materiais em diversas aplicações funcionais. Investigou-se o fenómeno de separação de fases, a cristalização e as relações estrutura-propriedades de vidros nos sistemas Li2O-SiO2, Li2O-Al2O3-SiO2 e Li2O-K2O-Al2O3-SiO2. Os vidros nos sistemas Li2O-SiO2 e Li2O-Al2O3-SiO2 apresentaram fraca densificação e resultaram em materiais frágeis, contrastando com a boa sinterização dos vidros no sistema Li2O-K2O-Al2O3-SiO2. Pequenas adições de Al2O3 e K2O ao sistema Li2O-SiO2 permitiram controlar a separação de fases devido à formação de espécies de Al(IV) que confirmaram o papel de Al2O3 como formador de rede. Os compactos de pó de vidro das composições contendo Al2O3 e K2O tratados termicamente resultaram em vitrocerâmicos bem densificados, apresentando dissilicato de lítio como a principal fase cristalina, e valores de resistência mecânica à flexão, resistência química e condutividade eléctrica (173-224 MPa, 25-50 mg/cm2 e ~2´10-18 S/cm, respectivamente) que possibilitam a utilização destes materiais em diversas aplicações funcionais. A adição de P2O5, TiO2 e ZrO2 ao sistema Li2O-K2O-Al2O3-SiO2 como agentes nucleantes revelou que os vidros contendo apresentaram cristalização em volume, com a formação de metassilicato de lítio a temperaturas mais baixas e dissilicato de lítio para as temperaturas mais elevadas, enquanto a adição de zircónia reduz o grau de segregação, aumenta a polimerização da matriz vítrea e desloca o valor de Tg para temperaturas superiores, inibindo a cristalização.
Resumo:
Access control is a software engineering challenge in database applications. Currently, there is no satisfactory solution to dynamically implement evolving fine-grained access control mechanisms (FGACM) on business tiers of relational database applications. To tackle this access control gap, we propose an architecture, herein referred to as Dynamic Access Control Architecture (DACA). DACA allows FGACM to be dynamically built and updated at runtime in accordance with the established fine-grained access control policies (FGACP). DACA explores and makes use of Call Level Interfaces (CLI) features to implement FGACM on business tiers. Among the features, we emphasize their performance and their multiple access modes to data residing on relational databases. The different access modes of CLI are wrapped by typed objects driven by FGACM, which are built and updated at runtime. Programmers prescind of traditional access modes of CLI and start using the ones dynamically implemented and updated. DACA comprises three main components: Policy Server (repository of metadata for FGACM), Dynamic Access Control Component (DACC) (business tier component responsible for implementing FGACM) and Policy Manager (broker between DACC and Policy Server). Unlike current approaches, DACA is not dependent on any particular access control model or on any access control policy, this way promoting its applicability to a wide range of different situations. In order to validate DACA, a solution based on Java, Java Database Connectivity (JDBC) and SQL Server was devised and implemented. Two evaluations were carried out. The first one evaluates DACA capability to implement and update FGACM dynamically, at runtime, and, the second one assesses DACA performance against a standard use of JDBC without any FGACM. The collected results show that DACA is an effective approach for implementing evolving FGACM on business tiers based on Call Level Interfaces, in this case JDBC.
Resumo:
Dependence clusters are (maximal) collections of mutually dependent source code entities according to some dependence relation. Their presence in software complicates many maintenance activities including testing, refactoring, and feature extraction. Despite several studies finding them common in production code, their formation, identification, and overall structure are not well understood, partly because of challenges in approximating true dependences between program entities. Previous research has considered two approximate dependence relations: a fine-grained statement-level relation using control and data dependences from a program’s System Dependence Graph and a coarser relation based on function-level controlflow reachability. In principal, the first is more expensive and more precise than the second. Using a collection of twenty programs, we present an empirical investigation of the clusters identified by these two approaches. In support of the analysis, we consider hybrid cluster types that works at the coarser function-level but is based on the higher-precision statement-level dependences. The three types of clusters are compared based on their slice sets using two clustering metrics. We also perform extensive analysis of the programs to identify linchpin functions – functions primarily responsible for holding a cluster together. Results include evidence that the less expensive, coarser approaches can often be used as e�ective proxies for the more expensive, finer-grained approaches. Finally, the linchpin analysis shows that linchpin functions can be e�ectively and automatically identified.
Resumo:
Tese de doutoramento, Ciências Biomédicas (Neurociências), Universidade de Lisboa, Faculdade de Medicina, 2014
Resumo:
O desenvolvimento incessante em áreas urbanas ameaça a qualidade e quantidade das águas subterrâneas. O Porto é uma cidade densamente urbanizada, dominada por granitos, os quais constituem um meio fraturado anisotrópico e heterogéneo. O principal objetivo desta dissertação foi realçar a importância da cartografia hidrogeológica, bem como a relevância de realizar inventários hidrogeológicos e de potenciais focos de contaminação para compreender a vulnerabilidade dos sistemas aquíferos na cidade do Porto. Para tal, foram selecionadas as bacias hidrográficas da Asprela e de Massarelos. Assim, foram levados a cabo dois inventários, um hidrogeológico e outro das potenciais atividades de contaminação. O estudo foi apoiado pelos Sistemas de Informação Geográfica (SIG), os quais foram fundamentais para um melhor conhecimento e integração nas áreas de estudo. Previamente à implementação dos inventários foi feita uma caracterização das duas bacias, em termos geográficos, hidroclimatológicos, de ocupação do solo, geomorfológicos e hidrogeológicos. As duas bacias desenvolvem‐se, principalmente, na unidade hidrogeológica do granito de grão médio a fino, por vezes com saprólito. O inventário hidrogeológico contemplou principalmente fontanários e nascentes, tendo incluído, respetivamente, 8 e 21 pontos de água nas bacias da Asprela e de Massarelos. As águas subterrâneas são límpidas, sem turvação ou cheiro, ácidas, com mineralizações baixas a médias, temperaturas baixas e caudais muito pequenos. Quanto aos potenciais focos de contaminação, na bacia da Asprela foram reconhecidos 61, enquanto que na bacia de Massarelos foram identificados 78. A maioria destas atividades é pontual correspondendo, nomeadamente, a estabelecimentos de ensino e estações de serviço/oficinas de automóveis. Contudo, os focos lineares apresentam uma difusão significativa nas duas bacias hidrográficas. Apesar de a vulnerabilidade intrínseca à contaminação das águas subterrâneas nestas áreas ser baixa a moderada, a localização dos potenciais focos de contaminação poderá ser responsável pelo aumento da vulnerabilidade nas duas bacias estudadas. Esta metodologia demonstrou ser extremamente importante para um melhor conhecimento dos sistemas de água subterrânea do Porto e, ainda, da hidrogeologia de áreas urbanas.
Resumo:
Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.