A Framework for Validation of Synthesized MicroElectrode Dot Array Actuations for Digital Microfluidic Biochips

2021 ◽  
Vol 26 (6) ◽  
pp. 1-36
Author(s):  
Pushpita Roy ◽  
Ansuman Banerjee

Digital Microfluidics is an emerging technology for automating laboratory procedures in biochemistry. With more and more complex biochemical protocols getting mapped to biochip devices and microfluidics receiving a wide adoption, it is becoming indispensable to develop automated tools and synthesis platforms that can enable a smooth transformation from complex cumbersome benchtop laboratory procedures to biochip execution. Given an informal/semi-formal assay description and a target microfluidic grid architecture on which the assay has to be implemented, a synthesis tool typically translates the high-level assay operations to low-level actuation sequences that can drive the assay realization on the grid. With more and more complex biochemical assay protocols being taken up for synthesis and biochips supporting a wider variety of operations (e.g., MicroElectrode Dot Arrays (MEDAs)), the task of assay synthesis is getting intricately complex. Errors in the synthesized assay descriptions may have undesirable consequences in assay operations, leading to unacceptable outcomes after execution on the biochips. In this work, we focus on the challenge of examining the correctness of synthesized protocol descriptions, before they are taken up for realization on a microfluidic biochip. In particular, we take up a protocol description synthesized for a MEDA biochip and adopt a formal analysis method to derive correctness proofs or a violation thereof, pointing to the exact operation in the erroneous translation. We present experimental results on a few bioassay protocols and show the utility of our framework for verifiable protocol synthesis.

2019 ◽  
Vol 1 (2) ◽  
pp. 141
Author(s):  
Iis Yeni Sugiarti

Abstrak. Desa Trusmi merupakan sentra batik sekaligus kuliner di Kabupaten Cirebon. Banyaknya pemegang usaha di bidang produksi batik mengakibatkan persaingan dagang diwilayah tersebut. Penelitian ini bertujuan untuk menganalisis SWOT (Strength, Weakness, Opportunities, Threats)  di salah satu usaha batik milik H. Edi Baredi atau sering dikenal dengan EB Batik Tradisional melalui inkuri terbimbing. Analisis meliputi profil usaha, aspek produksi, aspek tenaga kerja, aspek pemasaran dan aspek keuangan. Jenis penelitian ini menggunakan pendekatan kualitatif dengan metode deskripstif analisis. Berdasarkan analisis internal dan eksternal analisis SWOT, strategi yang  dilakukan oleh EB Batik Tradisional yaitu menghindari kehilangan penjualan dan profit yang disebabkan banyaknya persaingan dagang di kawasan sentra batik Trusmi dengan munculnya inovasi baru. Penguatan karakter pada produksi batiknya dapat mengatasi pesaingan dagang dan menambah daya tarik pembeli. Kata Kunci: SWOT, Inkuiri Terbimbing, dan Kegiatan Ekonomi Abstract. Trusmi village is a center of batik as well as culinary in Cirebon Regency. A large number of business holders in the field of batik production has resulted in trade competition in the region. This study aims to analyze SWOT (Strength, Weakness, Opportunities, Threats) in one of the batik business owned by H. Edi Baredi or often known as EB Traditional Batik through guided injury. The analysis includes the business profile, production aspects, labor aspects, marketing aspects, and financial aspects. This type of research uses a qualitative approach with descriptive analysis method. Based on internal and external analysis of the SWOT analysis, the strategy carried out by EB Traditional Batik is to avoid losing sales and profits due to the high level of trade competition in the Trusmi batik center area with the emergence of innovations. Strengthening the character of batik production can overcome trade competition and increase the attractiveness of buyers. Keywords: SWOT, Guided Inquiry, and Economic Activities


2021 ◽  
Vol 11 (9) ◽  
pp. 4251
Author(s):  
Jinsong Zhang ◽  
Shuai Zhang ◽  
Jianhua Zhang ◽  
Zhiliang Wang

In the digital microfluidic experiments, the droplet characteristics and flow patterns are generally identified and predicted by the empirical methods, which are difficult to process a large amount of data mining. In addition, due to the existence of inevitable human invention, the inconsistent judgment standards make the comparison between different experiments cumbersome and almost impossible. In this paper, we tried to use machine learning to build algorithms that could automatically identify, judge, and predict flow patterns and droplet characteristics, so that the empirical judgment was transferred to be an intelligent process. The difference on the usual machine learning algorithms, a generalized variable system was introduced to describe the different geometry configurations of the digital microfluidics. Specifically, Buckingham’s theorem had been adopted to obtain multiple groups of dimensionless numbers as the input variables of machine learning algorithms. Through the verification of the algorithms, the SVM and BPNN algorithms had classified and predicted the different flow patterns and droplet characteristics (the length and frequency) successfully. By comparing with the primitive parameters system, the dimensionless numbers system was superior in the predictive capability. The traditional dimensionless numbers selected for the machine learning algorithms should have physical meanings strongly rather than mathematical meanings. The machine learning algorithms applying the dimensionless numbers had declined the dimensionality of the system and the amount of computation and not lose the information of primitive parameters.


2020 ◽  
Vol 66 (1) ◽  
Author(s):  
Qiongyao Wu ◽  
Shuang Niu ◽  
Enchun Zhu

Abstract Duration of load (DOL) is a key factor in design of wood structures, which makes the reliability analysis of wood structures more complicated. The importance of DOL is widely recognized, yet the methods and models through which it is incorporated into design codes vary substantially by country/region. Few investigations of the effect of different model assumptions of DOL and other random variables on the results of reliability analysis of wood structures can be found. In this paper, comparisons are made on the reliability analysis methods that underlie the China and the Canada standards for design of wood structures. Main characteristics of these two methods, especially the way how DOL is treated are investigated. Reliability analysis was carried out with the two methods employing the same set of material properties and load parameters. The resulted relationships between reliability index β and resistance partial factor γR* (the β–γR* curves) for four load combinations are compared to study the safety level indicated by the two methods. The comparison shows that the damage accumulation model (Foschi–Yao model) in the Canada analysis method is highly dependent on the type and duration of load, resulting in more conservative design than the China analysis method in loading cases dominated by dead load, but less conservative design in cases of high level of live loads. The characteristics of the load effect term of the performance function are also found to make considerable difference in reliability levels between the two methods. This study aims to provide references for researchers and standard developers in the field of wood structures.


The selection of hospital sites is one of the most important choice a decision maker has to take so as to resist the pandemic. The decision may considerably affect the outbreak transmission in terms of efficiency , budget, etc. The main targeted objective of this study is to find the ideal location where to set up a hospital in the willaya of Oran Alg. For this reason, we have used a geographic information system coupled to the multi-criteria analysis method AHP in order to evaluate diverse criteria of physiological positioning , environmental and economical. Another objective of this study is to evaluate the advanced techniques of the automatic learning . the method of the random forest (RF) for the patterning of the hospital site selection in the willaya of Oran. The result of our study may be useful to decision makers to know the suitability of the sites as it provides a high level of confidence and consequently accelerate the power to control the COVID19 pandemic.


Lab on a Chip ◽  
2018 ◽  
Vol 18 (21) ◽  
pp. 3293-3302 ◽  
Author(s):  
Md Enayet Razu ◽  
Jungkyu Kim

A low-voltage and differentially polarized digital microfluidic platform is developed by enhancing the electromechanical force for droplet translation.


2021 ◽  
Vol 14 (3) ◽  
pp. 1-25
Author(s):  
Arif Sasongko ◽  
I. M. Narendra Kumara ◽  
Arief Wicaksana ◽  
Frédéric Rousseau ◽  
Olivier Muller

The confidentiality and integrity of a stream has become one of the biggest issues in telecommunication. The best available algorithm handling the confidentiality of a data stream is the symmetric key block cipher combined with a chaining mode of operation such as cipher block chaining (CBC) or counter mode (CTR). This scheme is difficult to accelerate using hardware when multiple streams coexist. This is caused by the computation time requirement and mainly by management of the streams. In most accelerators, computation is treated at the block-level rather than as a stream, making the management of multiple streams complex. This article presents a solution combining CBC and CTR modes of operation with a hardware context switching. The hardware context switching allows the accelerator to treat the data as a stream. Each stream can have different parameters: key, initialization value, state of counter. Stream switching was managed by the hardware context switching mechanism. A high-level synthesis tool was used to generate the context switching circuit. The scheme was tested on three cryptographic algorithms: AES, DES, and BC3. The hardware context switching allowed the software to manage multiple streams easily, efficiently, and rapidly. The software was freed of the task of managing the stream state. Compared to the original algorithm, about 18%–38% additional logic elements were required to implement the CBC or CTR mode and the additional circuits to support context switching. Using this method, the performance overhead when treating multiple streams was low, and the performance was comparable to that of existing hardware accelerators not supporting multiple streams.


Author(s):  
Natarajan Meghanathan ◽  
Alexander Roy Geoghegan

The high-level contribution of this book chapter is to illustrate how to conduct static code analysis of a software program and mitigate the vulnerabilities associated with the program. The automated tools used to test for software security are the Source Code Analyzer and Audit Workbench, developed by Fortify, Inc. The first two sections of the chapter are comprised of (i) An introduction to Static Code Analysis and its usefulness in testing for Software Security and (ii) An introduction to the Source Code Analyzer and the Audit Workbench tools and how to use them to conduct static code analysis. The authors then present a detailed case study of static code analysis conducted on a File Reader program (developed in Java) using these automated tools. The specific software vulnerabilities that are discovered, analyzed, and mitigated include: (i) Denial of Service, (ii) System Information Leak, (iii) Unreleased Resource (in the context of Streams), and (iv) Path Manipulation. The authors discuss the potential risk in having each of these vulnerabilities in a software program and provide the solutions (and the Java code) to mitigate these vulnerabilities. The proposed solutions for each of these four vulnerabilities are more generic and could be used to correct such vulnerabilities in software developed in any other programming language.


Sign in / Sign up

Export Citation Format

Share Document