77 research outputs found

    Design of High-Speed and Low-Power Comparator in Flash ADC

    Get PDF
    AbstractIn this paper, a high-speed low-power comparator, which is used in a 2 Gsps, 8 bit Flash ADC, is designed and simulated. Based on 0.18 um TSMC CMOS process model, the comparator circuit is simulated with a 1.8V power supply in Cadence environment. The result shows that it can work at a 2GHZ clock frequency, and the dynamic power consumption is only 1.2mW, with 123.5ps transmission delay. In addition, the average offset voltage of this comparator is only 676.3uV, which can meet the requirements of an 8-bit Flash ADC

    Multi-target design strategies for the improved treatment of Alzheimer's disease

    Get PDF
    Alzheimer's disease (AD) is a multifactorial syndrome resulting in profound misery and poses a substantial burden on human health, economy, and society throughout the world. Based on the numerous AD-related targets in the disease network, multi-target design strategy is a crucial direction to seek for enhanced therapy, and multi-target drugs have the ability to regulate more targets than single-target drugs, affecting the disease network with more potency. Herein, we highlight nine major targets associated with AD, which are acetylcholine esterase (AChE), beta-site amyloid precursor protein cleaving enzyme 1 (β-secretase, BACE-1), glycogen synthase kinase 3 beta (GSK-3β), monoamine oxidases (MAOs), metal ions in the brain, N-methyl-D-aspartate (NMDA) receptor, 5-hydroxytryptamine (5-HT) receptors, the third subtype of histamine receptor (H3 receptor), and phosphodiesterases (PDEs), and their respective relationship to the disease network. Furthermore, eleven multi-target design strategies classified by the involvement of AChE and related promising compounds for improved therapy of AD in recent years are described based on the nine major targets

    Successful Diagnosis of Pulmonary Artery Sarcoma by Contrast-Enhanced Computed Tomography

    Get PDF
    AbstractPulmonary artery sarcoma is a rare tumor of the cardiovascular system. We reported a case of primary pulmonary artery sarcoma. In this case, the patient was misdiagnosed with tuberculosis for nearly 1 year and diagnosed by contrast-enhanced computed tomography and histopathologic examination at last

    Encrypting Wireless Communications on the Fly Using One-Time Pad and Key Generation

    Get PDF

    Towards RegOps : A DevOps Pipeline for Medical Device Software

    Get PDF
    The manufacture of medical devices is a strictly regulated domain in the European Union. Traditionally, medical software compliance activities have been considered manual, document-centric, and burdensome. At the same time, over the last decade, software companies have maintained competitiveness and improved by relying on essential practices of DevOps, such as process automation and delivery pipelines. However, applying the same principles in medical software can be challenging due to regulatory requirements. In this paper, we utilize a systematic approach to align the essential medical device software regulatory requirements from the standards IEC 62304 and IEC 82304-1 and integrate them into the software delivery pipeline, which is the main contribution of our work. The outcome supports practitioners to establish more efficient software delivery models while maintaining compliance with the medical device standards.acceptedVersionPeer reviewe

    A False Trail to Follow: Differential Effects of the Facial Feedback Signals From the Upper and Lower Face on the Recognition of Micro-Expressions

    Get PDF
    Micro-expressions, as fleeting facial expressions, are very important for judging people’s true emotions, thus can provide an essential behavioral clue for lie and dangerous demeanor detection. From embodied accounts of cognition, we derived a novel hypothesis that facial feedback from upper and lower facial regions has differential effects on micro-expression recognition. This hypothesis was tested and supported across three studies. Specifically, the results of Study 1 showed that people became better judges of intense micro-expressions with a duration of 450 ms when the facial feedback from upper face was enhanced via a restricting gel. Additional results of Study 2 showed that the recognition accuracy of subtle micro-expressions was significantly impaired under all duration conditions (50, 150, 333, and 450 ms) when facial feedback from lower face was enhanced. In addition, the results of Study 3 also revealed that blocking the facial feedback of lower face, significantly boosted the recognition accuracy of subtle and intense micro-expressions under all duration conditions (150 and 450 ms). Together, these results highlight the role of facial feedback in judging the subtle movements of micro-expressions

    The anatomy of a vulnerability database: A systematic mapping study

    Get PDF
    Software vulnerabilities play a major role, as there are multiple risks associated, including loss and manipulation of private data. The software engineering research community has been contributing to the body of knowledge by proposing several empirical studies on vulnerabilities and automated techniques to detect and remove them from source code. The reliability and generalizability of the findings heavily depend on the quality of the information mineable from publicly available datasets of vulnerabilities as well as on the availability and suitability of those databases. In this paper, we seek to understand the anatomy of the currently available vulnerability databases through a systematic mapping study where we analyze (1) what are the popular vulnerability databases adopted; (2) what are the goals for adoption; (3) what are the other sources of information adopted; (4) what are the methods and techniques; (5) which tools are proposed. An improved understanding of these aspects might not only allow researchers to take informed decisions on the databases to consider when doing research but also practitioners to establish reliable sources of information to inform their security policies and standards.publishedVersionPeer reviewe
    • …
    corecore