69 research outputs found

    FAME, a microprocessor based front-end analysis and modeling environment

    Get PDF
    Higher order software (HOS) is a methodology for the specification and verification of large scale, complex, real time systems. The HOS methodology was implemented as FAME (front end analysis and modeling environment), a microprocessor based system for interactively developing, analyzing, and displaying system models in a low cost user-friendly environment. The nature of the model is such that when completed it can be the basis for projection to a variety of forms such as structured design diagrams, Petri-nets, data flow diagrams, and PSL/PSA source code. The user's interface with the analyzer is easily recognized by any current user of a structured modeling approach; therefore extensive training is unnecessary. Furthermore, when all the system capabilities are used one can check on proper usage of data types, functions, and control structures thereby adding a new dimension to the design process that will lead to better and more easily verified software designs

    Synthesis and Optimization of Reversible Circuits - A Survey

    Full text link
    Reversible logic circuits have been historically motivated by theoretical research in low-power electronics as well as practical improvement of bit-manipulation transforms in cryptography and computer graphics. Recently, reversible circuits have attracted interest as components of quantum algorithms, as well as in photonic and nano-computing technologies where some switching devices offer no signal gain. Research in generating reversible logic distinguishes between circuit synthesis, post-synthesis optimization, and technology mapping. In this survey, we review algorithmic paradigms --- search-based, cycle-based, transformation-based, and BDD-based --- as well as specific algorithms for reversible synthesis, both exact and heuristic. We conclude the survey by outlining key open challenges in synthesis of reversible and quantum logic, as well as most common misconceptions.Comment: 34 pages, 15 figures, 2 table

    Unilateral cross bite treated by corticotomy-assisted expansion: two case reports

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>True unilateral posterior crossbite in adults is a challenging malocclusion to treat. Conventional expansion methods are expected to have some shortcomings. The aim of this paper is to introduce a new technique for treating unilateral posterior crossbite in adults, namely, corticotomy-assisted expansion (CAE) applied on two adult patients: one with a true unilateral crossbite and the other with an asymmetrical bilateral crossbite, both treated via modified corticotomy techniques and fixed orthodontic appliances.</p> <p>Methods</p> <p>Two cases with asymmetric maxillary constriction were treated using CAE.</p> <p>Results</p> <p>In both cases, effective asymmetrical expansion was achieved using CAE, and functional occlusion was established as well.</p> <p>Conclusions</p> <p>Unilateral CAE presents an effective and reliable technique to treat true unilateral crossbite.</p

    CURRENT PRINCIPLES FOR CRANIOPHARYNGIOMA TREATMENT

    Get PDF
    The paper describes the classification and treatment options of craniopharyngiomas, benign epithelial tumors arising from the cell remains of the Rathke’s pouch. It presents a few types of surgical accesses during surgical treatment for this disease and gives examples of how to place an Ommaya reservoir

    Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations

    Get PDF
    In the \emph{conditional disclosure of secrets} problem (Gertner et al., J. Comput. Syst. Sci., 2000) Alice and Bob, who hold inputs xx and yy respectively, wish to release a common secret ss to Carol (who knows both xx and yy) if only if the input (x,y)(x,y) satisfies some predefined predicate ff. Alice and Bob are allowed to send a single message to Carol which may depend on their inputs and some joint randomness and the goal is to minimize the communication complexity while providing information-theoretic security. Following Gay, Kerenidis, and Wee (Crypto 2015), we study the communication complexity of CDS protocols and derive the following positive and negative results. 1. *Closure* A CDS for ff can be turned into a CDS for its complement fˉ\bar{f} with only a minor blow-up in complexity. More generally, for a (possibly non-monotone) predicate hh, we obtain a CDS for h(f1,,fm)h(f_1,\ldots,f_m) whose cost is essentially linear in the formula size of hh and polynomial in the CDS complexity of fif_i. 2. *Amplification* It is possible to reduce the privacy and correctness error of a CDS from constant to 2k2^{-k} with a multiplicative overhead of O(k)O(k). Moreover, this overhead can be amortized over kk-bit secrets. 3. *Amortization* Every predicate ff over nn-bit inputs admits a CDS for multi-bit secrets whose amortized communication complexity per secret bit grows linearly with the input length nn for sufficiently long secrets. In contrast, the best known upper-bound for single-bit secrets is exponential in nn. 4. *Lower-bounds* There exists a (non-explicit) predicate ff over nn-bit inputs for which any perfect (single-bit) CDS requires communication of at least Ω(n)\Omega(n). This is an exponential improvement over the previously known Ω(logn)\Omega(\log n) lower-bound. 5. *Separations* There exists an (explicit) predicate whose CDS complexity is exponentially smaller than its randomized communication complexity. This matches a lower-bound of Gay et. al., and, combined with another result of theirs, yields an exponential separation between the communication complexity of linear CDS and non-linear CDS. This is the first provable gap between the communication complexity of linear CDS (which captures most known protocols) and non-linear CDS

    Onchocerciasis transmission in Ghana: Persistence under different control strategies and the role of the simuliid vectors

    Get PDF
    Background: The World Health Organization (WHO) aims at eliminating onchocerciasis by 2020 in selected African countries. Current control focuses on community-directed treatment with ivermectin (CDTI). In Ghana, persistent transmission has been reported despite long-term control. We present spatial and temporal patterns of onchocerciasis transmission in relation to ivermectin treatment history. Methodology/Principal Findings: Host-seeking and ovipositing blackflies were collected from seven villages in four regions of Ghana with 3–24 years of CDTI at the time of sampling. A total of 16,443 flies was analysed for infection; 5,812 (35.3%) were dissected for parity (26.9% parous). Heads and thoraces of 12,196 flies were dissected for Onchocerca spp. and DNA from 11,122 abdomens was amplified using Onchocerca primers. A total of 463 larvae (0.03 larvae/fly) from 97 (0.6%) infected and 62 (0.4%) infective flies was recorded; 258 abdomens (2.3%) were positive for Onchocerca DNA. Infections (all were O. volvulus) were more likely to be detected in ovipositing flies. Transmission occurred, mostly in the wet season, at Gyankobaa and Bosomase, with transmission potentials of, respectively, 86 and 422 L3/person/month after 3 and 6 years of CDTI. The numbers of L3/1,000 parous flies at these villages were over 100times the WHO threshold of one L3/1,000 for transmission control. Vector species influenced transmission parameters. At Asubende, the number of L3/1,000 ovipositing flies (1.4, 95% CI = 0–4) also just exceeded the threshold despite extensive vector control and 24 years of ivermectin distribution, but there were no infective larvae in host-seeking flies. Conclusions/Significance: Despite repeated ivermectin treatment, evidence of O. volvulus transmission was documented in all seven villages and above the WHO threshold in two. Vector species influences transmission through biting and parous rates and vector competence, and should be included in transmission models. Oviposition traps could augment vector collector methods for monitoring and surveillance

    Морфологические аспекты кровоизлияний в опухоли гипофиза

    Get PDF
    Morphological features of pituitary adenomas, into which stroma haemorrhages take place, have been established by authors of the article. Tinctorial, macro- and microscopic characteristics have been researched. By an immunohistochemical research a level of expression of VEGF, EGFR, cyclin D1, protein p53 had been determine, that allowed to suppose an immediate reason and pathogenesis of haemorrhages into pituitary adenomas.Авторами статьи установлены морфологические особенности аденом гипофиза, в строму которых происходят кровоизлияния. Исследованы тинкториальные свойства, макро- и микроскопические характеристики. С помощью иммуногистохимического исследования определён уровень экспрессии VEGF, EGFR, циклина D1, белка p53, что позволило предположить непосредственную причину и патогенез питуитарных кровоизлияний
    corecore