57 research outputs found

    Editorial: Sign here! Do we know the law on informed consent?

    Get PDF
    No Abstrac

    Gestión de jerarquías de memoria híbridas a nivel de sistema

    Get PDF
    Tesis inédita de la Universidad Complutense de Madrid, Facultad de Informática, Departamento de Arquitectura de Computadoras y Automática y de Ku Leuven, Arenberg Doctoral School, Faculty of Engineering Science, leída el 11/05/2017.In electronics and computer science, the term ‘memory’ generally refers to devices that are used to store information that we use in various appliances ranging from our PCs to all hand-held devices, smart appliances etc. Primary/main memory is used for storage systems that function at a high speed (i.e. RAM). The primary memory is often associated with addressable semiconductor memory, i.e. integrated circuits consisting of silicon-based transistors, used for example as primary memory but also other purposes in computers and other digital electronic devices. The secondary/auxiliary memory, in comparison provides program and data storage that is slower to access but offers larger capacity. Examples include external hard drives, portable flash drives, CDs, and DVDs. These devices and media must be either plugged in or inserted into a computer in order to be accessed by the system. Since secondary storage technology is not always connected to the computer, it is commonly used for backing up data. The term storage is often used to describe secondary memory. Secondary memory stores a large amount of data at lesser cost per byte than primary memory; this makes secondary storage about two orders of magnitude less expensive than primary storage. There are two main types of semiconductor memory: volatile and nonvolatile. Examples of non-volatile memory are ‘Flash’ memory (sometimes used as secondary, sometimes primary computer memory) and ROM/PROM/EPROM/EEPROM memory (used for firmware such as boot programs). Examples of volatile memory are primary memory (typically dynamic RAM, DRAM), and fast CPU cache memory (typically static RAM, SRAM, which is fast but energy-consuming and offer lower memory capacity per are a unit than DRAM). Non-volatile memory technologies in Si-based electronics date back to the 1990s. Flash memory is widely used in consumer electronic products such as cellphones and music players and NAND Flash-based solid-state disks (SSDs) are increasingly displacing hard disk drives as the primary storage device in laptops, desktops, and even data centers. The integration limit of Flash memories is approaching, and many new types of memory to replace conventional Flash memories have been proposed. The rapid increase of leakage currents in Silicon CMOS transistors with scaling poses a big challenge for the integration of SRAM memories. There is also the case of susceptibility to read/write failure with low power schemes. As a result of this, over the past decade, there has been an extensive pooling of time, resources and effort towards developing emerging memory technologies like Resistive RAM (ReRAM/RRAM), STT-MRAM, Domain Wall Memory and Phase Change Memory(PRAM). Emerging non-volatile memory technologies promise new memories to store more data at less cost than the expensive-to build silicon chips used by popular consumer gadgets including digital cameras, cell phones and portable music players. These new memory technologies combine the speed of static random-access memory (SRAM), the density of dynamic random-access memory (DRAM), and the non-volatility of Flash memory and so become very attractive as another possibility for future memory hierarchies. The research and information on these Non-Volatile Memory (NVM) technologies has matured over the last decade. These NVMs are now being explored thoroughly nowadays as viable replacements for conventional SRAM based memories even for the higher levels of the memory hierarchy. Many other new classes of emerging memory technologies such as transparent and plastic, three-dimensional(3-D), and quantum dot memory technologies have also gained tremendous popularity in recent years...En el campo de la informática, el término ‘memoria’ se refiere generalmente a dispositivos que son usados para almacenar información que posteriormente será usada en diversos dispositivos, desde computadoras personales (PC), móviles, dispositivos inteligentes, etc. La memoria principal del sistema se utiliza para almacenar los datos e instrucciones de los procesos que se encuentre en ejecución, por lo que se requiere que funcionen a alta velocidad (por ejemplo, DRAM). La memoria principal está implementada habitualmente mediante memorias semiconductoras direccionables, siendo DRAM y SRAM los principales exponentes. Por otro lado, la memoria auxiliar o secundaria proporciona almacenaje(para ficheros, por ejemplo); es más lenta pero ofrece una mayor capacidad. Ejemplos típicos de memoria secundaria son discos duros, memorias flash portables, CDs y DVDs. Debido a que estos dispositivos no necesitan estar conectados a la computadora de forma permanente, son muy utilizados para almacenar copias de seguridad. La memoria secundaria almacena una gran cantidad de datos aun coste menor por bit que la memoria principal, siendo habitualmente dos órdenes de magnitud más barata que la memoria primaria. Existen dos tipos de memorias de tipo semiconductor: volátiles y no volátiles. Ejemplos de memorias no volátiles son las memorias Flash (algunas veces usadas como memoria secundaria y otras veces como memoria principal) y memorias ROM/PROM/EPROM/EEPROM (usadas para firmware como programas de arranque). Ejemplos de memoria volátil son las memorias DRAM (RAM dinámica), actualmente la opción predominante a la hora de implementar la memoria principal, y las memorias SRAM (RAM estática) más rápida y costosa, utilizada para los diferentes niveles de cache. Las tecnologías de memorias no volátiles basadas en electrónica de silicio se remontan a la década de1990. Una variante de memoria de almacenaje por carga denominada como memoria Flash es mundialmente usada en productos electrónicos de consumo como telefonía móvil y reproductores de música mientras NAND Flash solid state disks(SSDs) están progresivamente desplazando a los dispositivos de disco duro como principal unidad de almacenamiento en computadoras portátiles, de escritorio e incluso en centros de datos. En la actualidad, hay varios factores que amenazan la actual predominancia de memorias semiconductoras basadas en cargas (capacitivas). Por un lado, se está alcanzando el límite de integración de las memorias Flash, lo que compromete su escalado en el medio plazo. Por otra parte, el fuerte incremento de las corrientes de fuga de los transistores de silicio CMOS actuales, supone un enorme desafío para la integración de memorias SRAM. Asimismo, estas memorias son cada vez más susceptibles a fallos de lectura/escritura en diseños de bajo consumo. Como resultado de estos problemas, que se agravan con cada nueva generación tecnológica, en los últimos años se han intensificado los esfuerzos para desarrollar nuevas tecnologías que reemplacen o al menos complementen a las actuales. Los transistores de efecto campo eléctrico ferroso (FeFET en sus siglas en inglés) se consideran una de las alternativas más prometedores para sustituir tanto a Flash (por su mayor densidad) como a DRAM (por su mayor velocidad), pero aún está en una fase muy inicial de su desarrollo. Hay otras tecnologías algo más maduras, en el ámbito de las memorias RAM resistivas, entre las que cabe destacar ReRAM (o RRAM), STT-RAM, Domain Wall Memory y Phase Change Memory (PRAM)...Depto. de Arquitectura de Computadores y AutomáticaFac. de InformáticaTRUEunpu

    A meta-analysis of the efficacy of preoperative surgical safety checklists to improve perioperative outcomes

    Get PDF
    Background. Meta-analyses of the implementation of a surgical safety checklist (SSC) in observational studies have shown a significant decrease in mortality and surgical complications.Objective. To determine the efficacy of the SSC using data from randomised controlled trials (RCTs).Methods. This meta-analysis followed the Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines and was registered with PROSPERO (CRD42015017546). A comprehensive search of six databases was conducted using the OvidSP search engine.Results. Four hundred and sixty-four citations revealed three eligible trials conducted in tertiary hospitals and a community hospital, with a total of 6 060 patients. All trials had allocation concealment bias and a lack of blinding of participants and personnel. A single trial that contributed 5 295 of the 6 060 patients to the meta-analysis had no detection, attrition or reporting biases. The SSC was associated with significantly decreased mortality (risk ratio (RR) 0.59, 95% confidence interval (CI) 0.42 - 0.85; p=0.0004; I2=0%) and surgical complications (RR 0.64, 95% CI 0.57 - 0.71; p<0.00001; I2=0%). The efficacy of the SSC on specific surgical complications was as follows: respiratory complications RR 0.59, 95% CI 0.21 - 1.70; p=0.33, cardiac complications RR 0.74, 95% CI 0.28 - 1.95; p=0.54, infectious complications RR 0.61, 95% CI 0.29 - 1.27; p=0.18, and perioperative bleeding RR 0.36, 95% CI 0.23 - 0.56; p<0.00001.Conclusions. There is sufficient RCT evidence to suggest that SSCs decrease hospital mortality and surgical outcomes in tertiary and community hospitals. However, randomised evidence of the efficacy of the SSC at rural hospital level is absent

    Development of a clinical prediction model for in-hospital mortality from the South African cohort of the African surgical outcomes study

    Get PDF
    BACKGROUND : Data on the factors that influence mortality after surgery in South Africa are scarce, and neither these data nor data on risk-adjusted in-hospital mortality after surgery are routinely collected. Predictors related to the context or setting of surgical care delivery may also provide insight into variation in practice. Variation must be addressed when planning for improvement of risk-adjusted outcomes. Our objective was to identify the factors predicting in-hospital mortality after surgery in South Africa from available data. METHODS : A multivariable logistic regression model was developed to identify predictors of 30-day in-hospital mortality in surgical patients in South Africa. Data from the South African contribution to the African Surgical Outcomes Study were used and included 3800 cases from 51 hospitals. A forward stepwise regression technique was then employed to select for possible predictors prior to model specification. Model performance was evaluated by assessing calibration and discrimination. The South African Surgical Outcomes Study cohort was used to validate the model. RESULTS : Variables found to predict 30-day in-hospital mortality were age, American Society of Anesthesiologists Physical Status category, urgent or emergent surgery, major surgery, and gastrointestinal-, head and neck-, thoracic- and neurosurgery. The area under the receiver operating curve or c-statistic was 0.859 (95% confidence interval: 0.827–0.892) for the full model. Calibration, as assessed using a calibration plot, was acceptable. Performance was similar in the validation cohort as compared to the derivation cohort. CONCLUSION : The prediction model did not include factors that can explain how the context of care influences post-operative mortality in South Africa. It does, however, provide a basis for reporting risk-adjusted perioperative mortality rate in the future, and identifies the types of surgery to be prioritised in quality improvement projects at a local or national level.http://link.springer.com/journal/268hj2022AnaesthesiologyMaxillo-Facial and Oral SurgerySurger

    Benchmarking Study of Vulnerabilities

    No full text
    In the recent years Information Technology has been under various different threats most of the threats accounting from various vulnerabilities in software and web applications. Symantec reported over 4700 vulnerabilities for the year 2006 and 66 % percent of the reported vulnerabilities affected the web applications. The problems that these attacks bring is unauthorized system access which compromises the system security and causes denial of service, spoofing, hijacking, manipulation of data and many more. In order to avoid these attacks it is necessary to analyse the vulnerabilities in the web applications and this thesis tries to analyse the various vulnerabilities in the web browsers, which is one of the widely used web application. The aim of this thesis is to develop an understanding of the vulnerabilities in the web browsers and to benchmark the study of vulnerabilities in web browsers and to come up with vulnerability management strategies that could be used to protect the systems from external and internal attacks. After analysing the various vulnerability databases and web browsers the following contributions for vulnerability strategy were proposed, which include that the vulnerabilities need to be managed by the order of their significance by patching the vulnerability which is considered to be a more serious threat and the level of threat that they can cause the network.School of Computing, Communications and Electronic

    A Survey of the degree of burnout in state hospitals among Durban and Pietermaritzburg anaesthetists in KwaZulu Natal, South Africa.

    No full text
    Background: The most widely accepted model that defines the syndrome of burnout is Maslach Multidimensional Theory of Burnout. According to the theory burnout has three dimensions: emotional exhaustion (EE), depersonalisation (DP), and reduced personal accomplishment (PA). The primary aim of this study is to describe the degree of burnout experienced by anaesthetists working in the eThekwini Hospital Complex and Pietermaritzburg Metropolitan state hospitals in KwaZulu Natal in South Africa. Methods: The Maslach Burnout Inventory a well‐tested instrument with high reliability and validity was used as a measure of burnout with three subscales of emotional exhaustion, depersonalisation, and personal accomplishment. Results: Of the 160 anaesthetic care givers available, 139 completed the questionnaires giving a response rate of 86.8%. Burnout occurred in all participants that is medical officers (general medical doctors with a diploma in anaesthetics), registrars (general medical doctors with a diploma in anaesthetics or residents training and specializing in anaesthesiology) and consultants (specialists anaesthesiologists with a diploma and a fellowship in anaesthesiology). The prevalence of burnout was 17.9%. Of the total number of participants, greater proportion of anaesthetic care givers were female aged 31 to 40 years and that a substantial percentage had 4 to 8 years’ experience in anaesthesiology. The dimensional scores when considered individually showed that 42% of anaesthetists experienced high levels of emotional exhaustion, 38% reported high levels of depersonalisation and the lack of personal achievements was observed in more than 50% of the practising anaesthetists. Conclusion:. High levels of burnout were noted among anaesthetists in Kwazulu Natal. An association was noted between quality of sleep and emotional exhaustion and depersonalization. This information could be of value to the department of anaesthesiology as they are in position to implement interventions that promote participants well-being. Anaesthesiology practices should evaluate the balance between the demands they place on anaesthetic care providers and the resources provided to sustain an engaged, productive, and satisfied anaesthetic workforce. If the multiple stressors that lead to burnout are not addressed the department of anaesthesiology will be plagued by burnout. &nbsp

    System level exploration of a STT-MRAM based level 1 data-cache

    No full text
    Since Non-Volatile Memory (NVM) technologies are being explored extensively nowadays as viable replacements for SRAM based memories in LLCs and even L2 caches, we try to take stock of their potential as level 1 (L1) data caches. These NVMs like Spin Torque Transfer RAM(STT-MRAM), Resistive-RAM(ReRAM) and Phase Change RAM (PRAM) are not subject to leakage problems with technology scaling. They also show significant area gains and lower dynamic power consumption. A direct drop-in replacement of SRAM by NVMs is, however, still not feasible due to a number of shortcomings with latency (write or read) and/or endurance/reliability among them being the major issues. STT-MRAM is increasingly becoming the NVM of choice for high performance and general purpose embedded platforms due to characteristics like low access latency, low power and long lifetime. With advancements in cell technology, and taking into account the stringent reliability and performance requirements for advanced technology nodes, the major bottleneck to the use of STT-MRAM in high level caches has become read latency (instead of write latency as previously believed). The main focus of this paper is the exploration of read penalty issues in a NVM based L1 data cache (D-cache) for an ARM like single core general purpose system. We propose a design method for the STT-MRAM based D-cache in such a platform. This design addresses the adverse effects due to the STT-MRAM read penalty issues by means of micro-architectural modifications along with code transformations. According to our simulations, the appropriate tuning of selective architecture parameters in our proposal and suitable optimizations can reduce the performance penalty introduced by the NVM (initially ~54%) to extremely tolerable levels (~8%).Ministerio de Ciencia e Innovación de EspañaIMECDepto. de Arquitectura de Computadores y AutomáticaFac. de InformáticaTRUEpu

    Dynamic mechanical analysis of binary and ternary polymer blends based on nylon copolymer/EPDM rubber and EPM grafted maleic anhydride compatibilizer

    No full text
    The dynamic mechanical properties such as storage modulus, loss modulus and damping properties of blends of nylon copolymer (PA6,66) with ethylene propylene diene (EPDM) rubber was investigated with special reference to the effect of blend ratio and compatibilisation over a temperature range –100°C to 150°C at different frequencies. The effect of change in the composition of the polymer blends on tanδ was studied to understand the extent of polymer miscibility and damping characteristics. The loss tangent curve of the blends exhibited two transition peaks, corresponding to the glass transition temperature (Tg) of individual components indicating incompatibility of the blend systems. The morphology of the blends has been examined by using scanning electron microscopy. The Arrhenius relationship was used to calculate the activation energy for the glass transition of the blends. Finally, attempts have been made to compare the experimental data with theoretical models.Cochin University of Science and Technology,S.N.M College, NIT Calicut,Central Power Research Institute,M.G Universit

    Fusion-fission studies on

    No full text
    Fission process is strongly influenced by entrance channel dynamical variables. Among these, the nuclear charge product, mass asymmetry and deformation play important role in fission dynamics. Reaction characteristics are distinguished by investigating the properties of fission mass and angular distributions. Experiments using actinide targets are challenging due to many conflicting results making unambiguous identification of quasi-fission difficult. At IUAC accelerator facility many experiments have been performed to make a systematic study of fission mechanism and role of entrance channel parameters and deformation. Fragment mass distribution, angular distribution and neutron multiplicity measurements are performed to study reactions using spherical and deformed targets
    corecore