The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Embryonic stem cells provide a potential promising therapeutic approach for tissue regeneration. With the advent of microfluidic technology we can more closely recapitulate features of the native tissue environment. Here we use a contemporary compartmentalized device to culture mouse embryonic stem cells (mESCs) and differentiate them with a defined neuronal medium into process-extending “neurons”...
Due to the rapid development times, device complexity, etc. of the semiconductor industry it is challenging for universities to teach modern Integrated Circuit (IC) design. In particular, universities lack access to the necessary semiconductor technology data required to implement educational projects, as this information is normally proprietary. Additionally, access to state-of-the-art designs is...
Currently, the amount of data is huge. Not only is the quantity of data growing in size, it is also becoming much more diverse and complex, significantly complicating the issues around its creation. It is increasingly important to improve and maintain infrastructure services for a long time. Therefore, this study uses an automated approach in which digital policies and strategies are represented as...
Digital policy management forms the backbone of policy based management paradigm. This paradigm is useful for cognitive systems that address situation awareness, common operating picture, smart networks, and cost effective and efficient operations. Our research in this emerging area has provided a detailed view of what the internal structure of a digital policy looks like, and what functions the digital...
It is widely recognized that OLTP and OLAP queries have different data access patterns, processing needs and requirements. Hence, the OLTP queries and OLAP queries are typically handled by two different systems, and the data are periodically extracted from the OLTP system, transformed and loaded into the OLAP system for data analysis. With the awareness of the ability of big data in providing enterprises...
Networking community is largely depending on simulation to evaluate the performance and behavior of protocols for networks. A network simulator is a program which models the behavior of a network without an actual network being present. Different network simulation tools have been developed during the past years in the field of communication. In this article, present a comparison and simulation study...
A multiplier is one of the key hardware blocks in most digital and high performance systems such as FIR filters, micro processors and digital signal processors etc. A system's performance is generally determined by the performance of the multiplier because the multiplier is generally the slowest element in the whole system and also it is occupying more area consuming. The Carry Select Adder (CSLA)...
"Movement of Enhancing Opportunities and Improving Technology", abbreviated as Faith, is among the most important educational projects in Turkey, in which students and teachers can use their tablet PCs to obtain educational data (text, images, media, etc.) stored in cloud servers. However, given the large number of users along with vast amount of educational data to be accessed, traffic...
In this paper we present a model to control the instruments and experiments in a remote laboratory using a low cost control architecture. This model is based on a LAN network and a control methodology through reusable drivers. The objective is to obtain a software control architecture independent of the hardware of the laboratory, so each institution can deploy its own solution according to the available...
Component-based Development (CBD) is a buzzword in Software Industry. Almost every software development Organization is using this concept for faster, quality oriented and less costly development. There are several technologies available in industry to support component-based software development. Present work studies two most popular component technologies J2EE from Sun Microsystems and .NET from...
Medical image fusion is the process of combining two different modality images into single image. This resultant image is helpful in medical field for efficient disease diagnoses, retrieval of images, undergo surgery treatment, tumor identification etc. This single image features cannot be obtained from the single modality medical images and it can be resolved by image fusion. This paper has proposed...
The Clouds provide more services to the users. In the past era the software users have to purchase the software with licence. But now a days clouds provide these softwares on pay and use basis to use it. This pay and use service brought more comfort to the users. Through this paper, we propose ‘A Novel Cloud based and Cyclic Approach for Supervised Learning’, in the area of Data Mining. Because the...
With the advent of the Web of Linked Data, new challenges to federated query processing are emerging. Different from traditional federated database systems which do static data integration, this Web of Data is open and ever-changing. In this paper, we present a agent-based architecture providing a flexible and decoupled solution for the federated queries over Linked Data. Based on the presented architecture,...
Software Clones are identical or similar pieces of code, models or designs. In IWSC2014, we will discuss issues in software clone detection, analysis and management, as well as applications to software engineering contexts that can benefit from knowledge of clones. These are important emerging topics in software engineering research and practice. We will also discuss broader topics on software clones,...
Fault handling is an important metric for many operating environments. The traditional technique for improving reliability of system is by replicating the system component. This paper explains about the Adaptive group testing technique for isolating the faults which is present in the memory of the system. The memory element contains many cell and these cells are grouped into number of blocks. These...
In this paper, a high speed and low power 16×16 Vedic Multiplier is designed by using low power and high speed modified carry select adder. Modified Carry Select Adder employs a newly incremented circuit in the intermediate stages of the Carry Select Adder (CSA) which is known to be the fastest adder among the conventional adder structures. A Novel technique for digit multiplication namely Vedic multiplication...
FIR digital Alters are used in Digital Signal Processing (DSP) by the virtue of its, linear phase, fewer finite precision error, stability and efficient implementation. This paper presents an architectural approach to the design of High speed reconfigurable finite impulse response (FTR) filter. In this paper new reconfigurable low power FIR filter architecture using Multiplier Control Decision Window(MCSD)...
A bit serial architecture is used which reduces the interconnect complexity in fully parallel low density parity check (LDPC) decoder. This can achieve better error correcting performance when the code length is moderate. By using a new approximation to the check update function in the Minsum decoding algorithm, the implementation is simplified. This new check update rule finds only the absolute minimum...
Modern real-time embedded system must support multiple concurrently running applications. Double Data Rate Synchronous DRAM (DDR SDRAM) became mainstream choice in designing memories due to its burst access, speed and pipeline features. Synchronous dynamic access memory is designed to support DDR transferring. To achieve the correctness of different applications and system work as to be intended,...
Ellipti curve Cryptosystem used in cryptograhy chips undergoes side channel threats, where the attackers deciphered the secret key from the scan path through finding the memory element position by applying reverse enginering process in montgomery algorithm used in Elliptic device. Hence we propose the modified scan path architecture through the addition of extra electronic componet inorder to protect...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.