56 research outputs found

    Analysis and characterisation of design for testability methodologies for bipolar current mode logics

    Get PDF
    Emitter coupled logic -- Bipolar CML gates -- VersArray technology -- The importance of testing -- Design for testability -- Significance of developing DFT methods for bipolar CML -- Faults and defects -- Fault modelling & defect modelling for bipolar CML -- Types of test -- Studied DFT techniques -- Bias alteration stress technique -- Test bench setup for characterising BAS technique -- Simulation results -- Observations -- Methods attempted to increase the usable range of bias voltages -- Simulations taking process variations into account -- Summary and conclusions on BAS testing -- Imbalance testing technique & stress accumulation -- Functionality of and gates -- Imbalance test technique -- Imbalance types and limits -- Analysis of stuck at behaviour observed in defect-free and gates -- Characterisation of ITT on one gate -- Overcoming stress accumulation -- Sensitivity analysis -- Overview of the proposed testing technique -- Deriving the sensitivity of V out to various parameters -- Environmental factors -- The testing of the test chip -- Device Array block -- Test control block -- Test pattern generation flow and the testing process -- Test pattern generation and the testing of the test chip

    A Survey on Cloud Computing Security Threats and Vulnerabilities

    No full text
    Abstract: Cloud computing is using internet the connected computers share the resources, software information and other devices on-demand, from the resource pool of the cloud providers. The main thing that grabs the organizations to adapt the cloud technology is cost reduction through optimized and efficient computing. Though the cloud computing has its advantages many IT companies have expresses concern about critical security issues which threatens them such as data security, unauthorized access of network and use of infected application. The aim of this paper is to make a survey of the major security threats and vulnerabilities affecting Cloud Systems and the possible solutions available to such threats

    Self-Waterproofing Performance of Repair Mortars With Inorganic Healing Agents

    No full text
    In Europe, about 55% of concrete bridges are about 50 years old and require non-structural rapid repair strategies to reinstate the aesthetic and durability performances. Existing strategies focus primarily on superficial restoration that continues to demonstrate premature deterioration due to inevitable micro-crack formations that further propagate to macro-cracks leading to the ingress of moisture along with harmful ions. In this study, the benefits of self-healing technology to control moisture ingress at the microscale were investigated. For this, tailored microcapsule with inorganic healing agent, specifically, commercially available water-repellent agent (SIKAGARD 705L) was added to mortar with two types of commonly used binders namely CEMI 52.5N and CEMI 52.5R. The compatibility assessment in terms of capsule integration, fresh and hardened properties was done. The baseline healing efficiency of the mortars without any healing additions was obtained to understand the autogenous healing capacity of the reference mortars. Subsequently, the reference mortar mixes were compared with mixes containing varying fractions of microcapsules (3, 5, and 10%) for autonomous healing efficiency with capillary absorption as the main durability function. The healing efficiency was further investigated for two different crack mouth widths (350 μm); representative of non-structural residual crack widths. In mortars with microcapsules, a maximum reduction of sorptivity coefficients up to 82% and 78% with CEMI 52.5N and CEMI 52.5R mortars, respectively, for specimens cracked after 7 days of curing was observed. Subsequently, a synergetic effect of autogenous healing action and autonomous water-repellent action for durability recovery was identified and proved useful for repair mortar applications. The healing agent investigated, capsule content, and healing environment considered in the current study lay a foundation for further optimisation to improve the performance and to suit different applications

    Recruitment Algorithm in Edge-Cloud Servers based on Mobile Crowd-Sensing in Smart Cities

    No full text
    As more and more mobile devices rely on cloud services since the introduction of cloud computing, data privacy has emerged as one of the most pressing security concerns. Users typically encrypt their important data before uploading it to cloud servers to safeguard data privacy, which makes data usage challenging. On the other side, this also increases the possibility of brand-new issues in cities. A clever, effective and efficient urban monitoring system is required to address possible challenges that may arise in urban settings. In the smart city concept, which makes use of sensors, one strategy that might be used in IoT and cloud computing is to monitor and gather data on problems that develop in cities in real-time. However, it will take a while and be rather expensive to install IoT and sensors throughout the city. The Mobile Crowd-Sensing (MCS) method is proposed to be used in this study to retrieve and gather data on issues that arise in metropolitan areas from citizen reports made using mobile devices. And we suggest a budget-constrained, reputation-based collaborative user recruitment (RCUR) procedure for a MCS system. To construct an edge-assisted MCS system in urban situations, we first integrate edge computing into MCS. We also examine how user reputation affects user recruitment. Finally, we create a collaborative sensing approach using the edge nodes’ sensing capabilities

    The Functionally Conserved Nucleoporins Nup124p from Fission Yeast and the Human Nup153 Mediate Nuclear Import and Activity of the Tf1 Retrotransposon and HIV-1 Vpr

    No full text
    We report that the fission yeast nucleoporin Nup124p is required for the nuclear import of both, retrotransposon Tf1-Gag as well as the retroviral HIV-1 Vpr. Failure to import Tf1-Gag into the nucleus in a nup124 null mutant resulted in complete loss of Tf1 transposition. Similarly, nuclear import of HIV-1 Vpr was impaired in nup124 null mutant strains and cells became resistant to Vpr's cell-killing activity. On the basis of protein domain similarity, the human nucleoporin Nup153 was identified as a putative homolog of Nup124p. We demonstrate that in vitro–translated Nup124p and Nup153 coimmunoprecipitate Tf1-Gag or HIV-1 Vpr. Though full-length Nup153 was unable to complement the Tf1 transposition defect in a nup124 null mutant, we provide evidence that both nucleoporins share a unique N-terminal domain, Nup124p(AA264–454) and Nup153(AA448–634) that is absolutely essential for Tf1 transposition. Epigenetic overexpression of this domain in a wild-type (nup124(+)) background blocked Tf1 activity implying that sequences from Nup124p and the human Nup153 challenged the same pathway affecting Tf1 transposition. Our results establish a unique relationship between two analogous nucleoporins Nup124p and Nup153 wherein the function of a common domain in retrotransposition is conserved
    • …
    corecore