536 research outputs found

    Functional Specification of the RAVENS Neuroprocessor

    Full text link
    RAVENS is a neuroprocessor that has been developed by the TENNLab research group at the University of Tennessee. Its main focus has been as a vehicle for chip design with memristive elements; however it has also been the vehicle for all-digital CMOS development, plus it has implementations on FPGA's, microcontrollers and software simulation. The software simulation is supported by the TENNLab neuromorphic software framework so that researchers may develop RAVENS solutions for a variety of neuromorphic computing applications. This document provides a functional specification of RAVENS that should apply to all implementations of the RAVENS neuroprocessor.Comment: 17 pages, 11 figure

    Disclosure of a Neuromorphic Starter Kit

    Full text link
    This paper presents a Neuromorphic Starter Kit, which has been designed to help a variety of research groups perform research, exploration and real-world demonstrations of brain-based, neuromorphic processors and hardware environments. A prototype kit has been built and tested. We explain the motivation behind the kit, its design and composition, and a prototype physical demonstration.Comment: 4 pages, 3 figure

    Optimizations for a Current-Controlled Memristor-based Neuromorphic Synapse Design

    Full text link
    The synapse is a key element of neuromorphic computing in terms of efficiency and accuracy. In this paper, an optimized current-controlled memristive synapse circuit is proposed. Our proposed synapse demonstrates reliability in the face of process variation and the inherent stochastic behavior of memristors. Up to an 82% energy optimization can be seen during the SET operation over prior work. In addition, the READ process shows up to 54% energy savings. Our current-controlled approach also provides more reliable programming over traditional programming methods. This design is demonstrated with a 4-bit memory precision configuration. Using a spiking neural network (SNN), a neuromorphic application analysis was performed with this precision configuration. Our optimized design showed up to 82% improvement in control applications and a 2.7x improvement in classification applications compared with other design cases

    Modeling Emerging Semiconductor Devices for Circuit Simulation

    Get PDF
    Circuit simulation is an indispensable part of modern IC design. The significant cost of fabrication has driven researchers to verify the chip functionality through simulation before submitting the design for final fabrication. With the impending end of Moore’s Law, researchers all over the world are looking for new devices with enhanced functionality. A plethora of promising emerging devices has been proposed in recent years. In order to leverage the full potential of such devices, circuit designers need fast, reliable models for SPICE simulation to explore different applications. Most of these new devices have complex underlying physical mechanism rendering the model development an extremely challenging task. For the models to be of practical use, they have to enable fast and accurate simulation that rules out the possibility of numerically solving a system of partial differential equations to arrive at a solution. In this chapter, we show how different modeling approaches can be used to simulate three emerging semiconductor devices namely, silicon- on- insulator four gate transistor(G4FET), perimeter gated single photon avalanche diode (PG-SPAD) and insulator-metal transistor (IMT) device with volatile memristance. All the models have been verified against experimental /TCAD data and implemented in commercial circuit simulator

    Nanoelectronic Solutions for Hardware Security

    Get PDF
    Information security has emerged as an important system and application metric. Classical security solutions use algorithmic mechanisms that address a small subset of emerging security requirements, often at high energy and performance overhead. Further, emerging side channel and physical attacks can compromise classical security solutions. Hardware-based security solutions overcome many of the limitations of classical security while consuming less energy and improving performance. Nanoelectronics-based hardware security preserves all of these advantages while enabling conceptually new security mechanisms and security applications. This paper highlights nanoelectronics based security capabilities and challenges. The paper describes nanoelectronics-based hardware security primitives for device identification, digital forensics, and tamper detection. These primitives can be developed using the unique characteristics of emerging nanoelectronic devices such as complex device and system models, bidirectional operation, and temporal drift of state variables. We also identify important desiderata and outstanding challenges in nanoelectronics-based security

    Coherent diffraction of single Rice Dwarf virus particles using hard X-rays at the Linac Coherent Light Source

    Get PDF
    Single particle diffractive imaging data from Rice Dwarf Virus (RDV) were recorded using the Coherent X-ray Imaging (CXI) instrument at the Linac Coherent Light Source (LCLS). RDV was chosen as it is a wellcharacterized model system, useful for proof-of-principle experiments, system optimization and algorithm development. RDV, an icosahedral virus of about 70 nm in diameter, was aerosolized and injected into the approximately 0.1 mu m diameter focused hard X-ray beam at the CXI instrument of LCLS. Diffraction patterns from RDV with signal to 5.9 angstrom ngstrom were recorded. The diffraction data are available through the Coherent X-ray Imaging Data Bank (CXIDB) as a resource for algorithm development, the contents of which are described here.11Ysciescopu

    Trials and tribulations of recruiting 2,000 older women onto a clinical trial investigating falls and fractures : vital D study

    Get PDF
    Background Randomised, placebo-controlled trials are needed to provide evidence demonstrating safe, effective interventions that reduce falls and fractures in the elderly. The quality of a clinical trial is dependent on successful recruitment of the target participant group. This paper documents the successes and failures of recruiting over 2,000 women aged at least 70 years and at higher risk of falls or fractures onto a placebo-controlled trial of six years duration. The characteristics of study participants at baseline are also described for this study.Methods The Vital D Study recruited older women identified at high risk of fracture through the use of an eligibility algorithm, adapted from identified risk factors for hip fracture. Participants were randomised to orally receive either 500,000 IU vitamin D3 (cholecalciferol) or placebo every autumn for five consecutive years. A variety of recruitment strategies were employed to attract potential participants.Results Of the 2,317 participants randomised onto the study, 74% (n = 1716/2317) were consented onto the study in the last five months of recruiting. This was largely due to the success of a targeted mail-out. Prior to this only 541 women were consented in the 18 months of recruiting. A total of 70% of all participants were recruited as a result of targeted mail-out. The response rate from the letters increased from 2 to 7% following revision of the material by a public relations company. Participant demographic or risk factor profile did not differ between those recruited by targeted mail-outs compared with other methods.Conclusion The most successful recruitment strategy was the targeted mail-out and the response rate was no higher in the local region where the study had extensive exposure through other recruiting strategies. The strategies that were labour-intensive and did not result in successful recruitment include the activities directed towards the GP medical centres. Comprehensive recruitment programs employ overlapping strategies simultaneously with ongoing assessment of recruitment rates. In our experience, and others direct mail-outs work best although rights to privacy must be respected. <br /

    Entry of Yersinia pestis into the Viable but Nonculturable State in a Low-Temperature Tap Water Microcosm

    Get PDF
    Yersinia pestis, the causative agent of plague, has caused several pandemics throughout history and remains endemic in the rodent populations of the western United States. More recently, Y. pestis is one of several bacterial pathogens considered to be a potential agent of bioterrorism. Thus, elucidating potential mechanisms of survival and persistence in the environment would be important in the event of an intentional release of the organism. One such mechanism is entry into the viable but non-culturable (VBNC) state, as has been demonstrated for several other bacterial pathogens. In this study, we showed that Y. pestis became nonculturable by normal laboratory methods after 21 days in a low-temperature tap water microcosm. We further show evidence that, after the loss of culturability, the cells remained viable by using a variety of criteria, including cellular membrane integrity, uptake and incorporation of radiolabeled amino acids, and protection of genomic DNA from DNase I digestion. Additionally, we identified morphological and ultrastructural characteristics of Y. pestis VBNC cells, such as cell rounding and large periplasmic spaces, by electron microscopy, which are consistent with entry into the VBNC state in other bacteria. Finally, we demonstrated resuscitation of a small number of the non-culturable cells. This study provides compelling evidence that Y. pestis persists in a low-temperature tap water microcosm in a viable state yet is unable to be cultured under normal laboratory conditions, which may prove useful in risk assessment and remediation efforts, particularly in the event of an intentional release of this organism

    Case report: mechanisms of HIV elite control in two African women

    Get PDF
    Background The majority of people living with HIV require antiretroviral therapy (ART) for controlling viral replication, however there are rare HIV controllers who spontaneously and durably control HIV in the absence of treatment. Understanding what mediates viral control in these individuals has provided us with insights into the immune mechanisms that may be important to induce for a vaccine or functional cure for HIV. To date, few African elite controllers from high incidence settings have been described. We identified virological controllers from the CAPRISA 002 cohort of HIV-1 subtype C infected women in KwaZulu Natal, South Africa, two (1%) of whom were elite controllers. We examined the genetic, clinical, immunological and virological characteristics of these two elite HIV controllers in detail, to determine whether they exhibit features of putative viral control similar to those described for elite controllers reported in the literature. Case presentation In this case report, we present clinical features, CD4+ T cell and viral load trajectories for two African women over 7 years of HIV infection. Viral load became undetectable 10 months after HIV infection in Elite Controller 1 (EC1), and after 6 weeks in Elite Controller 2 (EC2), and remained undetectable for the duration of follow-up, in the absence of ART. Both elite controllers expressed multiple HLA Class I and II haplotypes previously associated with slower disease progression (HLA-A*74:01, HLA-B*44:03, HLA-B*81:01, HLA-B*57:03, HLA-DRB1*13). Fitness assays revealed that both women were infected with replication competent viruses, and both expressed higher mRNA levels of p21, a host restriction factor associated with viral control. HIV-specific T cell responses were examined using flow cytometry. EC1 mounted high frequency HIV-specific CD8+ T cell responses, including a B*81:01-restricted Gag TL9 response. Unusually, EC2 had evidence of pre-infection HIV-specific CD4+ T cell responses. Conclusion We identified some features typical of elite controllers, including high magnitude HIV-specific responses and beneficial HLA. In addition, we made the atypical finding of pre-infection HIV-specific immunity in one elite controller, that may have contributed to very early viral control. This report highlights the importance of studying HIV controllers in high incidence settings
    corecore