Dual fluorometric/colorimetric detection system for an automated random-access instrument utilizing standard polystyrene test tubes as precision cuvettes.

1987 ◽  
Vol 33 (9) ◽  
pp. 1554-1557 ◽  
Author(s):  
M E Astill ◽  
L R Johnson ◽  
G H Thorne ◽  
G H Krauth ◽  
R E Smith ◽  
...  

Abstract To attain the optical precision necessary to precisely quantify fluorescent or colorimetric signals, analytical systems have typically included quality-controlled cuvettes, flow cells, or dual-beam reference systems. We describe a system where a fluorescence or transmittance signal is quantified in single, standard, 12-mm-diameter polystyrene test tubes. Tube-to-tube variation is minimized by referencing the primary signal to a second reference signal. The tube is carefully oriented within a positioner that allows for the precise placement of the tube within a light path 7.6 mm in diameter. The detection system allows for use of either four pairs of fluorescence excitation/emission wavelengths or eight transmittance wavelengths, which are selected by using specific interference filters. The impact of temperature, tube imperfections, surface flaws, and distortions is minimized by using a reference ratio. Fluorescence is measured with an orthogonal photomultiplier tube, and transmittance with a photodiode; both are illuminated with an ordinary long-life tungsten-halogen lamp. This system is used with the Becton Dickinson AFFINITY system, an automated random-access analyzer with analyte-specific unit-package reagents. The polystyrene tube of the reagent package, which has an antibody-absorbed surface, serves as both the cuvette and the separation medium. Use of the reference ratio method reduces intertube imprecision of fluorometric or transmittance signals, for more precise quantification of various analytes.

Author(s):  
Steven B. Herschbein ◽  
Hyoung H. Kang ◽  
Scott L. Jansen ◽  
Andrew S. Dalton

Abstract Test engineers and failure analyst familiar with random access memory arrays have probably encountered the frustration of dealing with address descrambling. The resulting nonsequential internal bit cell counting scheme often means that the location of the failing cell under investigation is nowhere near where it is expected to be. A logical to physical algorithm for decoding the standard library block might have been provided with the design, but is it still correct now that the array has been halved and inverted to fit the available space in a new processor chip? Off-line labs have traditionally been tasked with array layout verification. In the past, hard and soft failures could be induced on the frontside of finished product, then bitmapped to see if the sites were in agreement. As density tightened, flip-chip FIB techniques to induce a pattern of hard fails on packaged devices came into practice. While the backside FIB edit method is effective, it is complex and expensive. The installation of an in-line Dual Beam FIB created new opportunities to move FA tasks out of the lab and into the FAB. Using a new edit procedure, selected wafers have an extensive pattern of defects 'written' directly into the memory array at an early process level. Bitmapping of the RAM blocks upon wafer completion is then used to verify correlation between the physical damaged cells and the logical sites called out in the test results. This early feedback in-line methodology has worked so well that it has almost entirely displaced the complex laboratory procedure of backside FIB memory array descramble verification.


Electronics ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 1454
Author(s):  
Yoshihiro Sugiura ◽  
Toru Tanzawa

This paper describes how one can reduce the memory access time with pre-emphasis (PE) pulses even in non-volatile random-access memory. Optimum PE pulse widths and resultant minimum word-line (WL) delay times are investigated as a function of column address. The impact of the process variation in the time constant of WL, the cell current, and the resistance of deciding path on optimum PE pulses are discussed. Optimum PE pulse widths and resultant minimum WL delay times are modeled with fitting curves as a function of column address of the accessed memory cell, which provides designers with the ability to set the optimum timing for WL and BL (bit-line) operations, reducing average memory access time.


2020 ◽  
Vol 5 (19) ◽  
pp. 32-35
Author(s):  
Anand Vijay ◽  
Kailash Patidar ◽  
Manoj Yadav ◽  
Rishi Kushwah

In this paper an analytical survey on the role of machine learning algorithms in case of intrusion detection has been presented and discussed. This paper shows the analytical aspects in the development of efficient intrusion detection system (IDS). The related study for the development of this system has been presented in terms of computational methods. The discussed methods are data mining, artificial intelligence and machine learning. It has been discussed along with the attack parameters and attack types. This paper also elaborates the impact of different attack and handling mechanism based on the previous papers.


INOVA-TIF ◽  
2020 ◽  
Vol 2 (1) ◽  
pp. 51
Author(s):  
Muhammad Ardi

<em>Flood disasters still occur regularly and continuously in Indonesia. Flooding can occur due to the volume of water in the river beyond the river body. Many impacts caused by flooding, not only material losses, flooding can also cause loss of life. The impact of flooding can be reduced if people are better prepared to face the flood. One way is to quickly disseminate information on river water levels to the community. It is necessary to make a solution on how to design an automatic sluice using Arduino UNO R3 and how to monitor the water situation during floods. The working principle of this tool uses an ultrasonic sensor as a water level detector, Arduino as a data processor, servo motor as opening and closing the door bar automatically and the modem as an SMS notification. Because design based detection system is needed In this study there are two formulations of the problem (i) How to design flood altitude detection devices using Arduino uno r3 which can open and close automatically. (ii) How to test the flood altitude detection system using a wavecome modem. The research objective is divided into two parts (i) Creating a series of flood elevation devices using Arduino r3 so that it can open and close automatically (ii) Gets the results of flood elevation system testing with an sms gateway</em>


2013 ◽  
Vol 4 (3) ◽  
pp. 38-52
Author(s):  
Sai Manoj Marepalli ◽  
Razia Sultana ◽  
Andreas Christ

Cloud computing is the emerging technology providing IT as a utility through internet. The benefits of cloud computing are but not limited to service based, scalable, elastic, shared pool of resources, metered by use. Due to mentioned benefits the concept of cloud computing fits very well with the concept of m-learning which differs from other forms of e-learning, covers a wide range of possibilities opened up by the convergence of new mobile technologies, wireless communication structure and distance learning development. The concept of cloud computing like any other concept has not only benefits but also introduces myriad of security issues, such as transparency between cloud user and provider, lack of standards, security concerns related to identity, Service Level Agreements (SLA) inadequacy etc. Providing secure, transparent, and reliable services in cloud computing environment is an important issue. This paper introduces a secured three layered architecture with an advance Intrusion Detection System (advIDS), which overcomes different vulnerabilities on cloud deployed applications. This proposed architecture can reduce the impact of different attacks by providing timely alerts, rejecting the unauthorized access over services, and recording the new threat profiles for future verification. The goal of this research is to provide more control over data and applications to the cloud user, which are now mainly controlled by Cloud Service Provider (CSP).


2018 ◽  
Vol 47 (8) ◽  
pp. 847003
Author(s):  
费腾 FEI Teng ◽  
潘从元 PAN Cong-yuan ◽  
曾强 ZENG Qiang ◽  
杜学维 DU Xue-wei ◽  
王秋平 WANG Qiu-ping

2020 ◽  
Vol 15 (16) ◽  
pp. 1595-1605
Author(s):  
Elio Cenci ◽  
Riccardo Paggi ◽  
Giuseppe V De Socio ◽  
Silvia Bozza ◽  
Barbara Camilloni ◽  
...  

Accelerate Pheno™ (ACC) is a fully automated system providing rapid identification of a panel of bacteria and yeasts, and antimicrobial susceptibility testing of common bacterial pathogens responsible for bloodstream infections and sepsis. Diagnostic accuracy for identification ranges from 87.9 to 100%, and antimicrobial susceptibility testing categorical agreement is higher than 91%. The present review includes peer-reviewed studies on ACC published to date. Both interventional and hypothetical studies evidenced the potential positive clinical role of ACC in the management and therapy of patients with bloodstream infections and sepsis, due to the important reduction in time to report, suggesting a crucial impact on the therapeutic management of these patients, provided the presence of a hospital antimicrobial stewardship program, a 24/7 laboratory operating time and a strict collaboration between clinical microbiologist and clinician. Further prospective multicenter studies are necessary to explore the impact of this system on mortality, length of stay and spread of multidrug-resistant organisms.


2018 ◽  
Vol 12 (1) ◽  
pp. 53-62 ◽  
Author(s):  
Gulshan Kumar ◽  
Rahul Saha ◽  
Mandeep Singh ◽  
Mritunjay Kumar Rai

Wireless LAN networks are considered to be widely used and efficient infrastructure used in different domains of communication. In this paper, we worked on Network Intrusion Detection System (NIDS) to prevent intruder's activities by using snooping agents and honeypot on the network. The idea behind using snooping agents and honeypot is to provide network management in term of monitoring. Honey pot is placed just after the Firewall and intrusion system have strongly coupled synchronize with snooping agents Monitoring is considered at packet level and pattern level of the traffic. Simulation filtered and monitor traffic for highlight the intrusion in the network. Further attack sequence has been created and have shown the effects of attack sequence on scenario which have both honey pot and snoop agent with different network performance parameters like throughput, network load, queuing delay, retransmission attempt and packet. The simulation scenario shows the impact of attack on the network performance.


Cartilage ◽  
2019 ◽  
pp. 194760351988879 ◽  
Author(s):  
Stefan Nehrer ◽  
Richard Ljuhar ◽  
Peter Steindl ◽  
Rene Simon ◽  
Dietmar Maurer ◽  
...  

Objective. To assess the impact of a computerized system on physicians’ accuracy and agreement rate, as compared with unaided diagnosis. Methods. A set of 124 unilateral knee radiographs from the Osteoarthritis Initiative (OAI) study were analyzed by a computerized method with regard to Kellgren-Lawrence (KL) grade, as well as joint space narrowing, osteophytes, and sclerosis Osteoarthritis Research Society International (OARSI) grades. Physicians scored all images, with regard to osteophytes, sclerosis, joint space narrowing OARSI grades and KL grade, in 2 modalities: through a plain radiograph ( unaided) and a radiograph presented together with the report from the computer assisted detection system ( aided). Intraclass correlation between the physicians was calculated for both modalities. Furthermore, physicians’ performance was compared with the grading of the OAI study, and accuracy, sensitivity, and specificity were calculated in both modalities for each of the scored features. Results. Agreement rates for KL grade, sclerosis, and osteophyte OARSI grades, were statistically increased in the aided versus the unaided modality. Readings for joint space narrowing OARSI grade did not show a statistically difference between the 2 modalities. Readers’ accuracy and specificity for KL grade >0, KL >1, sclerosis OARSI grade >0, and osteophyte OARSI grade >0 was significantly increased in the aided modality. Reader sensitivity was high in both modalities. Conclusions. These results show that the use of an automated knee OA software increases consistency between physicians when grading radiographic features of OA. The use of the software also increased accuracy measures as compared with the OAI study, mostly through increases in specificity.


Talanta ◽  
2018 ◽  
Vol 185 ◽  
pp. 160-165 ◽  
Author(s):  
Kajorngai Thajee ◽  
Pathinan Paengnakorn ◽  
Wasin Wongwilai ◽  
Kate Grudpan

Sign in / Sign up

Export Citation Format

Share Document