332 research outputs found

    Pulse Coded Neural Network Implementation In VLSI

    Get PDF
    A neural network that encodes signals in terms of pulses has been designed and fabricated. The neural network components are described in detail. As a test case, a two-layer network is implemented. A preliminary test result shows some promise and some limitations of the desig

    "Pharmaceutical Industry under the rules and regulations of WTO"

    Get PDF
    The topic of the research paper is viz. the systematic study of the pharmaceutical industry of India which is threatened, due to the new controls brought by rules and regulations of the WTO region, especially regarding tariff policies, TRIPS (Trade Related Intellectual Property Rights), opening of Indian domestic market to foreign multinationals by adopting liberalization, maintenance of professional standards of business ethics, obtaining the world class quality approvals and accreditions for Indian pharmaceutical exports, adoption of 'product patents' in addition to 'process patents and restrictions on  unauthorised imitations etc. Till 1995 Indian Pharmaceutical industry was governed by IPL (Indian Patent Laws) and laws controlling the production and distribution practices. After getting the membership of the World Trade Organization, which has become the apex international permanent body for reorganising and smoothening the World Trade and for bringing ideal International order in the global trade ethics by making the necessary controls mandatory on the part of the member countries, Indian Pharma industry is facing new difficulties and challenge

    Compliance of hand written transfusion requisition form and improvement after online request - A clinical audit

    Get PDF
    Objective: To assess the compliance of healthcare personnel with regard to sending completely filled transfusion requisition forms.Methods: The audit was conducted at Aga Khan University Hospital, Karachi, and comprised requisition slips received at the hospital blood bank from September 2014 to February 2015. The British Committee for Standards in Haematology guidelines was used as the standard. Percentage of each variable on the proforma was analsyed. Rating \u3c50% for each form was defined as needs improvement , 51-99% as good compliance and 100% as excellent compliance . After implementing strategies to increase awareness and the launching of an online transfusion requisition form, a re-audit of physician compliance was done from February to April 2016 and the results were compared with the initial audit.. Data was analysed using SPSS 21.Results: The audit and the re-audit both comprised 1000 transfusion requisition forms each. In the audit, The sum of total scores of all the transfusion requisition forms was 4911, indicating a compliance rate of 46.9%, while the corresponding numbers in the re-audit were 10000 and 100%.Conclusions: The implementation of online blood transfusion requisition system had a positive impact on compliance rate

    An unusual case of left ventricular aneurysm in duchenne muscular dystrophy

    Get PDF
    Duchenne muscular dystrophy (DMD) leads to structural heart disease, including dilated cardiomyopathy, in 90% of patients >18 years of age. Despite the ubiquity of cardiomyopathy associated with DMD, ventricular aneurysms in these patients have rarely been reported. We present a case of a basal inferoposterior aneurysm of the left ventricle in a 23-year-old male patient with DMD

    Stochastic Computing Correlation Utilization in Convolutional Neural Network Basic Functions

    Get PDF
    In recent years, many applications have been implemented in embedded systems and mobile Internet of Things (IoT) devices that typically have constrained resources, smaller power budget, and exhibit "smartness" or intelligence. To implement computation-intensive and resource-hungry Convolutional Neural Network (CNN) in this class of devices, many research groups have developed specialized parallel accelerators using Graphical Processing Units (GPU), Field-Programmable Gate Arrays (FPGA), or Application-Specific Integrated Circuits (ASIC). An alternative computing paradigm called Stochastic Computing (SC) can implement CNN with low hardware footprint and power consumption. To enable building more efficient SC CNN, this work incorporates the CNN basic functions in SC that exploit correlation, share Random Number Generators (RNG), and is more robust to rounding error. Experimental results show our proposed solution provides significant savings in hardware footprint and increased accuracy for the SC CNN basic functions circuits compared to previous work

    FPGA-based real-time moving target detection system for unmanned aerial vehicle application

    Get PDF
    Moving target detection is the most common task for Unmanned Aerial Vehicle (UAV) to find and track object of interest from a bird's eye view in mobile aerial surveillance for civilian applications such as search and rescue operation. The complex detection algorithm can be implemented in a real-time embedded system using Field Programmable Gate Array (FPGA). This paper presents the development of real-time moving target detection System-on-Chip (SoC) using FPGA for deployment on a UAV. The detection algorithm utilizes area-based image registration technique which includes motion estimation and object segmentation processes. The moving target detection system has been prototyped on a low-cost Terasic DE2-115 board mounted with TRDB-D5M camera. The system consists of Nios II processor and stream-oriented dedicated hardware accelerators running at 100 MHz clock rate, achieving 30-frame per second processing speed for 640 × 480 pixels' resolution greyscale videos

    Therapeutic Targets and Signaling Pathways for Diagnosis of Myeloma

    Get PDF
    Multiple myeloma (MM) is a malignancy of plasma cells that not only shows different clinical behavior but also depicts heterogeneous groups at molecular level. The prognosis of the disease has been dramatically changed with the arrival of new drugs in the past few years. In this context of better therapeutic agents, there are important challenges for accurate evaluation of patients by better prognostic and predictive tools. Transcriptomic studies have largely added to decipher MM heterogeneity, dividing MM patients into different subgroups according to prognosis. Micro-arrays and more recently RNA sequencing have helped in evaluating coding and non-coding genes, mutations, unique transcriptome convertors and different splicing events giving new information concerning biology, outcome and treatment options. Initial data from gene expression profiling studies have also pointed out genes that predict prognosis, i.e., CSK1-B, and can deliver pharmacogenomics and biologic vision into the pathophysiology, targeted treatment, and future direction. Importantly, we suggest that all prospective studies and clinical trials now accept genetic testing and risk stratification of MM patients. In this review, we discuss the part and effect of gene expression profiling in myeloma

    IoT Threat Detection Testbed Using Generative Adversarial Networks

    Full text link
    The Internet of Things(IoT) paradigm provides persistent sensing and data collection capabilities and is becoming increasingly prevalent across many market sectors. However, most IoT devices emphasize usability and function over security, making them very vulnerable to malicious exploits. This concern is evidenced by the increased use of compromised IoT devices in large scale bot networks (botnets) to launch distributed denial of service(DDoS) attacks against high value targets. Unsecured IoT systems can also provide entry points to private networks, allowing adversaries relatively easy access to valuable resources and services. Indeed, these evolving IoT threat vectors (ranging from brute force attacks to remote code execution exploits) are posing key challenges. Moreover, many traditional security mechanisms are not amenable for deployment on smaller resource-constrained IoT platforms. As a result, researchers have been developing a range of methods for IoT security, with many strategies using advanced machine learning(ML) techniques. Along these lines, this paper presents a novel generative adversarial network(GAN) solution to detect threats from malicious IoT devices both inside and outside a network. This model is trained using both benign IoT traffic and global darknet data and further evaluated in a testbed with real IoT devices and malware threats.Comment: 8 pages, 5 figure

    Successful Treatment of Ibrutinib-Associated Central Nervous System Hemorrhage with Platelet Transfusion Support

    Get PDF
    Ibrutinib is a novel targeted therapy for B-cell malignancies. Hemorrhagic events were reported in the original trials, however the mechanism of bleeding is just being elucidated. Recent studies have demonstrated platelet dysfunction as a mechanism of bleeding. Currently we report two patients who developed life-threatening central nervous system hemorrhage while receiving ibrutinib for chronic lymphoid leukemia (CLL) and mantle cell lymphoma, respectively. Both patients improved rapidly after platelet transfusions even though their platelet counts were normal or only mildly reduced at the time of hemorrhage. We suggest that platelet transfusions can ameliorate the platelet dysfunction defect of ibrutinib and can support the patient through the critical period until new platelet production occurs
    corecore