216 research outputs found

    Floorplan-guided placement for large-scale mixed-size designs

    Get PDF
    In the nanometer scale era, placement has become an extremely challenging stage in modern Very-Large-Scale Integration (VLSI) designs. Millions of objects need to be placed legally within a chip region, while both the interconnection and object distribution have to be optimized simultaneously. Due to the extensive use of Intellectual Property (IP) and embedded memory blocks, a design usually contains tens or even hundreds of big macros. A design with big movable macros and numerous standard cells is known as mixed-size design. Due to the big size difference between big macros and standard cells, the placement of mixed-size designs is much more difficult than the standard-cell placement. This work presents an efficient and high-quality placement tool to handle modern large-scale mixed-size designs. This tool is developed based on a new placement algorithm flow. The main idea is to use the fixed-outline floorplanning algorithm to guide the state-of-the-art analytical placer. This new flow consists of four steps: 1) The objects in the original netlist are clustered into blocks; 2) Floorplanning is performed on the blocks; 3) The blocks are shifted within the chip region to further optimize the wirelength; 4) With big macro locations fixed, incremental placement is applied to place the remaining objects. Several key techniques are proposed to be used in the first two steps. These techniques are mainly focused on the following two aspects: 1) Hypergraph clustering algorithm that can cut down the original problem size without loss of placement Quality of Results (QoR); 2) Fixed-outline floorplanning algorithm that can provide a good guidance to the analytical placer at the global level. The effectiveness of each key technique is demonstrated by promising experimental results compared with the state-of-the-art algorithms. Moreover, using the industrial mixed-size designs, the new placement tool shows better performance than other existing approaches

    Modified ground calcium carbonate mineral powder using in asphalt concrete: modification mechanism characterization at macro and micro levels

    Get PDF
    The study investigated the modification mechanism of modified ground calcium carbonate (GCC) mineral powder using in asphalt concrete. Two types of Titanate coupling agents, namely, K38S (TCA-K38S) and 201 (TCA-201), as well as sodium stearate coupling agent, were adopted to prepare modified GCC. The optimized preparation process was obtained through the orthogonal test. Two kinds of modified GCC were preferably selected to prepare asphalt concrete according to modification mechanism characterization, their performance was analyzed and evaluated at macro and micro levels. The study results show that, the optimal scheme of sodium stearate modified GCC is modification temperature of 80°C, modification time of 50 min, modifying agent dosage of 2.0%. The crystal structure of GCC remains unchanged after modification, with the original lattice structure being maintained. TCA-201 and sodium stearate exhibit better coating properties than that of TCA-K38S. The contact angles of TCA-201 and sodium stearate modified GCC are larger than that of TCA-K38S modified GCC. The in-service performance of AC-13C asphalt concrete modified with sodium stearate is found to be superior to that of TCA-201 modified AC-13C asphalt concrete. Compared with the unmodified AC-13C asphalt concrete, the Marshall modulus, residual stability, freeze-thaw splitting strength ratio, and maximum flexural tensile strain of sodium stearate modified AC-13C asphalt concrete are increased by 54.55%, 2.73%, 10.47%, and 26.41% respectively. This paper provides theoretical guidance for the application of GCC mineral powder in asphalt concrete

    Long-tail Cross Modal Hashing

    Full text link
    Existing Cross Modal Hashing (CMH) methods are mainly designed for balanced data, while imbalanced data with long-tail distribution is more general in real-world. Several long-tail hashing methods have been proposed but they can not adapt for multi-modal data, due to the complex interplay between labels and individuality and commonality information of multi-modal data. Furthermore, CMH methods mostly mine the commonality of multi-modal data to learn hash codes, which may override tail labels encoded by the individuality of respective modalities. In this paper, we propose LtCMH (Long-tail CMH) to handle imbalanced multi-modal data. LtCMH firstly adopts auto-encoders to mine the individuality and commonality of different modalities by minimizing the dependency between the individuality of respective modalities and by enhancing the commonality of these modalities. Then it dynamically combines the individuality and commonality with direct features extracted from respective modalities to create meta features that enrich the representation of tail labels, and binaries meta features to generate hash codes. LtCMH significantly outperforms state-of-the-art baselines on long-tail datasets and holds a better (or comparable) performance on datasets with balanced labels.Comment: Accepted by the Thirty-Seventh AAAI Conference on Artificial Intelligence(AAAI2023

    Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance

    Full text link
    Provenance graphs are structured audit logs that describe the history of a system's execution. Recent studies have explored a variety of techniques to analyze provenance graphs for automated host intrusion detection, focusing particularly on advanced persistent threats. Sifting through their design documents, we identify four common dimensions that drive the development of provenance-based intrusion detection systems (PIDSes): scope (can PIDSes detect modern attacks that infiltrate across application boundaries?), attack agnosticity (can PIDSes detect novel attacks without a priori knowledge of attack characteristics?), timeliness (can PIDSes efficiently monitor host systems as they run?), and attack reconstruction (can PIDSes distill attack activity from large provenance graphs so that sysadmins can easily understand and quickly respond to system intrusion?). We present KAIROS, the first PIDS that simultaneously satisfies the desiderata in all four dimensions, whereas existing approaches sacrifice at least one and struggle to achieve comparable detection performance. Kairos leverages a novel graph neural network-based encoder-decoder architecture that learns the temporal evolution of a provenance graph's structural changes to quantify the degree of anomalousness for each system event. Then, based on this fine-grained information, Kairos reconstructs attack footprints, generating compact summary graphs that accurately describe malicious activity over a stream of system audit logs. Using state-of-the-art benchmark datasets, we demonstrate that Kairos outperforms previous approaches.Comment: 23 pages, 16 figures, to appear in the 45th IEEE Symposium on Security and Privacy (S&P'24

    MODIFIED BUCHER DIAGRAMS FOR HEAT FLOWS AND WORKS IN TWO CLASSES OF CYCLES

    Get PDF

    A model local interpretation routine for deep learning based radio galaxy classification

    Full text link
    Radio galaxy morphological classification is one of the critical steps when producing source catalogues for large-scale radio continuum surveys. While many recent studies attempted to classify source radio morphology from survey image data using deep learning algorithms (i.e., Convolutional Neural Networks), they concentrated on model robustness most time. It is unclear whether a model similarly makes predictions as radio astronomers did. In this work, we used Local Interpretable Model-agnostic Explanation (LIME), an state-of-the-art eXplainable Artificial Intelligence (XAI) technique to explain model prediction behaviour and thus examine the hypothesis in a proof-of-concept manner. In what follows, we describe how \textbf{LIME} generally works and early results about how it helped explain predictions of a radio galaxy classification model using this technique.Comment: 4 pages, 1 figure, accepted summary paper for URSI GASS 2023 J0

    Research on the Evaluation System of Scientific Research Ethics Based on AHP-Fuzzy Comprehensive Evaluation

    Get PDF
    Scientific research ethics is the value concept and code of conduct to be followed in scientific research, technological development and other scientific and technological activities. However, in recent years, some researchers have ignored ethical constraints in scientific research activities, resulting in more prominent ethical issues in scientific research. This study takes China Southern Power Grid Corporation as an example, based on ISO9000 standards, uses AHP-fuzzy comprehensive evaluation theory to establish a scientific research ethics evaluation system, aiming at improving the timeliness and targeting of scientific research ethics management

    Genetic Regulation of N6-Methyladenosine-RNA in Mammalian Gametogenesis and Embryonic Development

    Get PDF
    Emerging evidence shows that m(6)A is the most abundant modification in eukaryotic RNA molecules. It has only recently been found that this epigenetic modification plays an important role in many physiological and pathological processes, such as cell fate commitment, immune response, obesity, tumorigenesis, and relevant for the present review, gametogenesis. Notably the RNA metabolism process mediated by m(6)A is controlled and regulated by a series of proteins termed writers, readers and erasers that are highly expressed in germ cells and somatic cells of gonads. Here, we review and discuss the expression and the functional emerging roles of m(6)A in gametogenesis and early embryogenesis of mammals. Besides updated references about such new topics, readers might find in the present work inspiration and clues to elucidate epigenetic molecular mechanisms of reproductive dysfunction and perspectives for future research
    corecore