This paper presents an integrated offline testing of Single-Fault detection technique for themicro-
fluidic based biochips and also diagnosis single defects in order to achieve higherthroughput
and less time complexity of the execution process. In the field operation, this is to be used to
increase chip dependability and reusability of the biochips. In this paper, a pipelined technique
is presented to traverse all the edges in much more less time in comparison with some previous
techniques.
QUATERNARY LOGIC AND APPLICATIONS USING MULTIPLE QUANTUM WELL BASED SWSFETSVLSICS Design
This paper presents Spatial Wavefunction-Switched Field-Effect Transistors (SWSFET) to implement efficient quaternary logic and arithmetic functions. Various quaternary logic gates and digital building blocks are presented using SWSFETs. In addition, arithmetic operation with full adder using novel logic algebra is also presented. The SWSFET based implementation of digital logic, cache and arithmetic block results in up to 75% reduction in transistor count and up to 50% reduction in data interconnect densities. Simulations of quaternary logic gates using the BSIM equivalent models for SWSFET channels are also described.
TWO DIMENSIONAL MODELING OF NONUNIFORMLY DOPED MESFET UNDER ILLUMINATIONVLSICS Design
A two dimensional numerical model of an optically gated GaAs MESFET with non uniform channel doping has been developed. This is done to characterize the device as a photo detector. First photo induced voltage (Vop) at the Schottky gate is calculated for estimating the channel profile. Then Poisson’s equation for the device is solved numerically under dark and illumination condition. The paper aims at developing the MESFET 2-D model under illumination using Monte Carlo Finite Difference method. The results discuss about the optical potential developed in the device, variation of channel potential under different biasing and illumination and also about electric fields along X and Y directions. The Cgs under different illumination is also calculated. It has been observed from the results that the characteristics of the device are strongly influenced by the incident optical illumination.
QUATERNARY LOGIC AND APPLICATIONS USING MULTIPLE QUANTUM WELL BASED SWSFETSVLSICS Design
This paper presents Spatial Wavefunction-Switched Field-Effect Transistors (SWSFET) to implement efficient quaternary logic and arithmetic functions. Various quaternary logic gates and digital building blocks are presented using SWSFETs. In addition, arithmetic operation with full adder using novel logic algebra is also presented. The SWSFET based implementation of digital logic, cache and arithmetic block results in up to 75% reduction in transistor count and up to 50% reduction in data interconnect densities. Simulations of quaternary logic gates using the BSIM equivalent models for SWSFET channels are also described.
TWO DIMENSIONAL MODELING OF NONUNIFORMLY DOPED MESFET UNDER ILLUMINATIONVLSICS Design
A two dimensional numerical model of an optically gated GaAs MESFET with non uniform channel doping has been developed. This is done to characterize the device as a photo detector. First photo induced voltage (Vop) at the Schottky gate is calculated for estimating the channel profile. Then Poisson’s equation for the device is solved numerically under dark and illumination condition. The paper aims at developing the MESFET 2-D model under illumination using Monte Carlo Finite Difference method. The results discuss about the optical potential developed in the device, variation of channel potential under different biasing and illumination and also about electric fields along X and Y directions. The Cgs under different illumination is also calculated. It has been observed from the results that the characteristics of the device are strongly influenced by the incident optical illumination.
Parental Low Self-Control, Family Environments, and Juvenile DelinquencyGeorge Connolly
Abstract Research consistently finds that low self-control is significantly correlated with delinquency. Only recently, however, have researchers started to examine associations between parental low self-control, family environments, and child antisocial behavior. Adding to this emerging area of research, the current study examines associations between parental low self-control, aspects of the family environment, and officially recoded juvenile delinquency among a sample (N = 101) of juveniles processed through a juvenile justice assessment facility located in the Southeastern United States.Furthermore, it considers whether aspects of family environments, particularly family cohesion, family conflict, and parental efficacy, mediate the influence of parental low self-control on delinquency. The results of a series of analyses indicate that parental low self-control is correlated with various aspects of family environments and juvenile delinquency, and that the association between parental low self-control and juvenile delinquency is mediated by family environments. Supplementary analyses also suggestthat the association between parental low self-control and the family environmentmay be reciprocal.
An estimate of costs, revenues, and resources over a specified period, reflecting a reading of future financial conditions and goals.
One of the most important administrative tools, a budget serves also as a (1) plan of action for achieving quantified objectives, (2) standard for measuring performance, and (3) device for coping with foreseeable adverse situations.
Estudio sobre el software libre en los hogares españoles. 2011CENATIC
El objetivo fundamental de estudio, realizado a partir de los datos de una encuesta en la que han participado más de 3.000 internautas, ha sido conocer conocer el nivel de uso y la valoración del software libre por parte de los internautas españoles.
El “Estudio sobre software libre en los hogares españoles” ha sido elaborado con el apoyo técnico del Instituto Nacional de Tecnologías de la Comunicación (INTECO) a través del Observatorio de la Seguridad de la Información.
Finite Element Simulation of Microfluidic Biochip for High Throughput Hydrody...TELKOMNIKA JOURNAL
In this paper, a microfluidic device capable of trapping a single cell in a high throughput manner
and at high trapping efficiency is designed simply through a concept of hydrodynamic manipulation. The
microfluidic device is designed with a series of trap and bypass microchannel structures for trapping
individual cells without the need for microwell, robotic equipment, external electric force or surface
modification. In order to investigate the single cell trapping efficiency, a finite element model of the
proposed design has been developed using ABAQUS-FEA software. Based on the simulation, the
geometrical parameters and fluid velocity which affect the single cell trapping are extensively optimized.
After optimization of the trap and bypass microchannel structures via simulations, a single cell can be
trapped at a desired location efficiently.
Parental Low Self-Control, Family Environments, and Juvenile DelinquencyGeorge Connolly
Abstract Research consistently finds that low self-control is significantly correlated with delinquency. Only recently, however, have researchers started to examine associations between parental low self-control, family environments, and child antisocial behavior. Adding to this emerging area of research, the current study examines associations between parental low self-control, aspects of the family environment, and officially recoded juvenile delinquency among a sample (N = 101) of juveniles processed through a juvenile justice assessment facility located in the Southeastern United States.Furthermore, it considers whether aspects of family environments, particularly family cohesion, family conflict, and parental efficacy, mediate the influence of parental low self-control on delinquency. The results of a series of analyses indicate that parental low self-control is correlated with various aspects of family environments and juvenile delinquency, and that the association between parental low self-control and juvenile delinquency is mediated by family environments. Supplementary analyses also suggestthat the association between parental low self-control and the family environmentmay be reciprocal.
An estimate of costs, revenues, and resources over a specified period, reflecting a reading of future financial conditions and goals.
One of the most important administrative tools, a budget serves also as a (1) plan of action for achieving quantified objectives, (2) standard for measuring performance, and (3) device for coping with foreseeable adverse situations.
Estudio sobre el software libre en los hogares españoles. 2011CENATIC
El objetivo fundamental de estudio, realizado a partir de los datos de una encuesta en la que han participado más de 3.000 internautas, ha sido conocer conocer el nivel de uso y la valoración del software libre por parte de los internautas españoles.
El “Estudio sobre software libre en los hogares españoles” ha sido elaborado con el apoyo técnico del Instituto Nacional de Tecnologías de la Comunicación (INTECO) a través del Observatorio de la Seguridad de la Información.
Finite Element Simulation of Microfluidic Biochip for High Throughput Hydrody...TELKOMNIKA JOURNAL
In this paper, a microfluidic device capable of trapping a single cell in a high throughput manner
and at high trapping efficiency is designed simply through a concept of hydrodynamic manipulation. The
microfluidic device is designed with a series of trap and bypass microchannel structures for trapping
individual cells without the need for microwell, robotic equipment, external electric force or surface
modification. In order to investigate the single cell trapping efficiency, a finite element model of the
proposed design has been developed using ABAQUS-FEA software. Based on the simulation, the
geometrical parameters and fluid velocity which affect the single cell trapping are extensively optimized.
After optimization of the trap and bypass microchannel structures via simulations, a single cell can be
trapped at a desired location efficiently.
ANALYSIS OF ELEMENTARY CELLULAR AUTOMATA BOUNDARY CONDITIONSijcsit
We present the findings of analysis of elementary cellular automata (ECA) boundary conditions. Fixed and variable boundaries are attempted. The outputs of linear feedback shift registers (LFSRs) act as continuous inputs to the two boundaries of a one-dimensional (1-D) Elementary Cellular Automata (ECA) are analyzed and compared. The results show superior randomness features and the output string has passed the Diehard statistical battery of tests. The design has strong correlation immunity and it is inherently amenable for VLSI implementation. Therefore it can be considered to be a good and viable candidate for parallel pseudo random number generation
A robust blind and secure watermarking scheme using positive semi definite ma...ijcsit
In the last decade the need for new and robust watermarking schemes has been increased because of the
large illegal possession by not respecting the intellectual property rights in the multimedia in the internet.
In this paper we introduce a novel blind robust watermarking scheme which exploits the positive circulant
matrices in frequency domain which is the SVD, Different applications such as copyright protection,
control and illicit distributions have been given. Simulation results indicate that the proposed method is
robust against attacks as common digital processing: compression, blurring, dithering, printing and
scanning, etc. and subterfuge attacks (collusion and forgery) also geometric distortions and
transformations. Furthermore, good results of NC (normalized correlation) and PSNR (Peak signal-tonoise
ratio) have been achieved while comparing with recent state of the art watermarking algorithms.
Development of Seakeeping Test and Data Processing Systemijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...ijwmn
In this paper, we propose a new method of channel estimation for asynchronous additive white Gaussian noise channels in satellite communications. This method is based on signals correlation and multiuser interference cancellation which adopts a successive structure. Propagation delays and signals amplitudes are jointly estimated in order to be used for data detection at the receiver. As, a multiuser detector, a single stage successive interference cancellation (SIC) architecture is analyzed and integrated to the channel estimation technique and the whole system is evaluated. The satellite access method adopted is the direct sequence code division multiple access (DS CDMA) one. To evaluate the channel estimation and the detection technique, we have simulated a satellite uplink with an asynchronous multiuser access.
IMPLEMENTATION OF THE DEVELOPMENT OF A FILTERING ALGORITHM TO IMPROVE THE SYS...cscpconf
In this paper, we present the implemented denoising section in the coding strategy of cochlear implants, the technique used is the technique of wavelet bionic BWT (Bionic Wavelet
Transform). We have implemented the algorithm for denoising Raise the speech signal by the hybrid method BWT in the FPGA (Field Programmable Gate Array), Xilinx (Virtex5
XC5VLX110T). In our study, we considered the following: at the beginning, we present how to demonstrate features of this technique. We present an algorithm implementation we proposed, we present simulation results and the performance of this technique in terms of improvement of the SNR (Signal to Noise Ratio). The proposed implementations are realized in VHDL (Very high speed integrated circu its Hardware Description Language). Different algorithms for speech processing, including CIS (Continuous Interleaved Sampling) have been implemented the strategy in this processor and tested successfully.
In this study the kinematic wave equation has been solved numerically using the modified Lax
explicit finite difference scheme (MLEFDS) and used for flood routing in a wide prismatic channel and a nonprismatic
channel. Two flood waves, one sinusoidal wave and one exponential wave, have been imposed at the
upstream boundary of the channel in which the flow is initially uniform. Six different schemes have been
introduced and used to compute the routing parameter, the wave celerity c. Two of these schemes are based on
constant depth and use constant celerity throughout the computation process. The rest of the schemes are based
on local depths and give celerity dependent on time and space. The effects of the routing parameter c on the
travel time of flood wave, the subsidence of the flood peak and the conservation flood flow volume have been
studied. The results seem to indicate that there is a minimal loss/gain of flow volume whatever the scheme is.
While it is confirmed that neither of the schemes is 100% volume conservative, it is found that the scheme
Kinematic Wave Model-2 (KWM-II) gives the most accurate result giving only 0.1% error in perspective of
volume conservation. The results obtained in this study are in good qualitative agreement with those obtained in
other similar studies.
Similar to SINGLE FAULT DETECTION AND DIAGNOSIS TECHNIQUE FOR DIGITAL MICRO-FLUIDIC BASED BIOCHIPS (20)
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
2. 30 Computer Science & Information Technology (CS & IT)
This paper introduces the disclosure of an efficient technique for diagnosis a single fault in a Mi-
cro-Fluidic Biochip having an optimum time complexity.
2. PRELIMINARIES
2.1. Component of a micro-fluidic array
In digital micro-fluidic biochips, the liquids are divided into discrete and distinctly controllable
manipulated microliter-nanolitre (the volume of the droplets) droplets, traverse on a two dimen-
sional array, based on the principle of electro wetting-on-dielectric (EWOD) [1, 3, 9].
The fundamental unit cell of a EWOD based digital micro-fluidic biochip composed of two pa-
rallel glass plates, as shown in Figure. 1 [9]. The top plate is implicated with a continuous ground
electrode and the bottom plate holds a patterned array of electrodes. They are formed by Indium
Tin Oxide and are regulated individually. A dielectric layer coated with hydrophobic film of Tef-
lon AF is added to the plates to extenuate the wet ability of the surface and to enhance the capa-
citance between the droplets and the electrode [3].
Afiller medium like silicone oil is used in between the plates, where the droplets move. When an
electric control voltage is applied to the electrode adjacent to the droplet, the electrode under the
droplet is deactivated and moves the droplet to the active electrode because of the EWOD effect
[13].
Figure 1.Structure of digital micro-fluidic biochip (Basic unit cell used in an EWOD-based digital
micro-fluidic biochip)
2.2. Defect Characterization
There are mainly two types of faults in digital micro-fluidic systems, catastrophic andparametric,
as described in [7]. Catastrophic fault causes complete breakdown of the system, whereas para-
metric fault degrades system performance.
To detect a fault, we need to pass a droplet through the micro-fluidic array, so that it can traverse
each and every cell and reach towards the sink. If there is any kind of fault within the microarray,
the droplet will get stuck over there.
2.3. Graph Theoretic Formulation
Let us represent the entire micro-fluidic array as an mxn matrix where Ci,j denotes the cell at the
(i, j) position where i =1 to m and j = 1 to n. The source and the sink, i.e., the positions outside the
array from where the droplet enters the array and exits the array respectively, are designated by
the cells adjacent to them.
Example 1.Figure. 2 shows a 3x4 micro-fluidic array with the source at (1, 1) and sink at the (3,
4) position.
3. Computer Science & Information Technology (CS & IT)
Figure 2.A 3x4 mi
The source and sink are actually outside the array. The cell (1,1) indicates the cell from which the
droplet starts from the source. Similarly, cell
ray to the sink.
1.
Let <S1, T1>, <S2, T2>……<Sk, T
such that together they cover the entire array (i.e. all cells and internal boundaries) where
notes a segment (cell) through which the droplet traverse at time T
traversal by a droplet from <S1, T
by a droplet to complete a pass is T
reach the sink even after its time period, we conclude that the droplet has stuck in the array, and
the biochip is faulty. Thus the fault detection problem
all cells and all internal boundaries of the micro
once, and the total is minimized. To diagnos
predefined look-up table having for which faulty node which droplet
Definition 1.Graph Dual: Let X
graph G = (V, E) where each node v
ing the nodes vi and vj represent the bound
vj respectively, as described in [18].
Example 2.Figure 3. (a), (b) show a 4x3 micro
dual, G4x3 respectively. The dotted lines represent the boundaries between the cells. T
the edges of the Figure 3 (b). Each cell in Figure
Figure 3.A 4x3 micro
The nodes of a graph dual are denoted as v
timal fault detection problem for an mxn micro
graph dual as a Source to Sink Array Traversal Problem
Given the graph dual Gmxn of a rectangular micro
source (i, j) and sink (k, l), to find a sequence of movements <S
where Si denotes a segment (cell) through which the droplet traverse at
that all the droplets visit each node and edge at least once altogether and the total time is min
mized.
Computer Science & Information Technology (CS & IT)
icro-fluidic array with source at (1, 1), sink at (3, 4)
The source and sink are actually outside the array. The cell (1,1) indicates the cell from which the
droplet starts from the source. Similarly, cell (3,4) is the last cell before the droplet leaves the a
, Tk> be a sequence of droplet movements from source to sink,
such that together they cover the entire array (i.e. all cells and internal boundaries) where
notes a segment (cell) through which the droplet traverse at time Ti towards sink. The complete
, T1> to <Sk, Tk> is referred to as a pass. Therefore, total time taken
by a droplet to complete a pass is T1 + T2 + …… + Tk. If during its pass, the droplet does not
reach the sink even after its time period, we conclude that the droplet has stuck in the array, and
the biochip is faulty. Thus the fault detection problem is finding a sequence of passes, such that
all internal boundaries of the micro-fluidic array are traversed by the droplets at least
once, and the total is minimized. To diagnose the exact faulty point, now we need to check out the
up table having for which faulty node which droplets cannot reach the sink.
Graph Dual: Let Xm,n be an mxn micro-fluidic array. Then the dual of Xm,n is a
graph G = (V, E) where each node v∈V corresponds to a cell in the array and an edge e
represent the boundary between the cells corresponding to the nodes
respectively, as described in [18].
(a), (b) show a 4x3 micro-fluidic array, X4x3 and its corresponding graph
respectively. The dotted lines represent the boundaries between the cells. T
the edges of the Figure 3 (b). Each cell in Figure 3 (a). denotes a vertex in Figure 3 (b).
Figure 3.A 4x3 micro-fluidic array (left) and its graph dual (right)
The nodes of a graph dual are denoted as vij, where vij corresponds to the cell (i, j). Now, the o
timal fault detection problem for an mxn micro-fluidic biochip can be restated in terms of its
Source to Sink Array Traversal Problem.
of a rectangular micro-fluidic biochip Xmxn and the positions of the
source (i, j) and sink (k, l), to find a sequence of movements <S1, T1>, <S2, T2>, …., <S
denotes a segment (cell) through which the droplet traverse at time Ti towards sink such
that all the droplets visit each node and edge at least once altogether and the total time is min
31
The source and sink are actually outside the array. The cell (1,1) indicates the cell from which the
(3,4) is the last cell before the droplet leaves the ar-
> be a sequence of droplet movements from source to sink,
such that together they cover the entire array (i.e. all cells and internal boundaries) where Si de-
towards sink. The complete
> is referred to as a pass. Therefore, total time taken
. If during its pass, the droplet does not
reach the sink even after its time period, we conclude that the droplet has stuck in the array, and
finding a sequence of passes, such that
fluidic array are traversed by the droplets at least
the exact faulty point, now we need to check out the
s cannot reach the sink.
fluidic array. Then the dual of Xm,n is a
V corresponds to a cell in the array and an edge ei,j connect-
ary between the cells corresponding to the nodes vi and
and its corresponding graph
respectively. The dotted lines represent the boundaries between the cells. They map to
3 (b).
corresponds to the cell (i, j). Now, the op-
fluidic biochip can be restated in terms of its
and the positions of the
>, …., <Sk, Tk>
towards sink such
that all the droplets visit each node and edge at least once altogether and the total time is mini-
4. 32 Computer Science & Information Technology (CS & IT)
3. PROPOSED TECHNIQUE
The proposed technique takes a greedy approach to solve the
Problem. It covers all the edges, as well as all the vertices, and in very less time slots. The cove
age of the nodes and edges during a pass is achieved through certain movements.
From the concept of the set theory, we know that any set can be divided into its subs
plying this technique, the single defect simulation can be solved in a very short time. The tec
nique is being illustrated as follows:
3.1. Movement Patterns
Each traversal from the source to the sink node is mainly based on the
(DLDR) movement. Let Vij be the current node during a traversal. Then the DLDR movement
pattern is defined as follows:
a) Down-Left-Down-Right (DLDR)
Figure 4.Down
3.2. Strategy
Let us locate four fixed nodes as the ‘base’ nodes from where the journey with the prescribed
movement pattern begins. For the graph dual G
= Vm,1 , and B4 = Vm,n. These four nodes are shown in Fig
scribed below for Gmxn, where, m,n>=2.
Figure 5. The four base nodes of a graph dual G
3.3. The Complete Process
In order to traverse all the edges of graph dual G
m is the total number of rows and n is the total number of columns. All these passes will be fo
lowed by (m+n–2) droplets in consecutive time quantum, e.g., Pass #1 should be done in Ti
slot #1, and, in Time-slot #2, thesecond pass should start its function, and in Time
#3 should commence traversing and so on. So, the droplets are in sequence and will traverse in
parallel. The traversal path is described in Figure 6.
Computer Science & Information Technology (CS & IT)
B1 B2
B3
B4
The proposed technique takes a greedy approach to solve the Source to Sink Array Traversal
covers all the edges, as well as all the vertices, and in very less time slots. The cove
age of the nodes and edges during a pass is achieved through certain movements.
From the concept of the set theory, we know that any set can be divided into its subs
plying this technique, the single defect simulation can be solved in a very short time. The tec
nique is being illustrated as follows:
Each traversal from the source to the sink node is mainly based on the Down-Left-Down
be the current node during a traversal. Then the DLDR movement
Right (DLDR)
Figure 4.Down-Left-Down-Right movement pattern
us locate four fixed nodes as the ‘base’ nodes from where the journey with the prescribed
movement pattern begins. For the graph dual Gmxn, these base nodes are B1 = V1,1 , B
. These four nodes are shown in Figure 5. for Gmxn. The procedure is d
, where, m,n>=2.
The four base nodes of a graph dual Gmxn
edges of graph dual Gmxn, we will have all total (m+n–2) passes, where
m is the total number of rows and n is the total number of columns. All these passes will be fo
2) droplets in consecutive time quantum, e.g., Pass #1 should be done in Ti
second pass should start its function, and in Time-slot #3, Pass
#3 should commence traversing and so on. So, the droplets are in sequence and will traverse in
rsal path is described in Figure 6. (a)-(e).
Source to Sink Array Traversal
covers all the edges, as well as all the vertices, and in very less time slots. The cover-
From the concept of the set theory, we know that any set can be divided into its subsets and ap-
plying this technique, the single defect simulation can be solved in a very short time. The tech-
Down-Right
be the current node during a traversal. Then the DLDR movement
us locate four fixed nodes as the ‘base’ nodes from where the journey with the prescribed
, B2 = V1,n , B3
. The procedure is de-
2) passes, where
m is the total number of rows and n is the total number of columns. All these passes will be fol-
2) droplets in consecutive time quantum, e.g., Pass #1 should be done in Time-
slot #3, Pass
#3 should commence traversing and so on. So, the droplets are in sequence and will traverse in
5. Computer Science & Information Technology (CS & IT) 33
The Array-Traversal technique from a particular node, stated below:
ProcedureArray-Traversal-Movement
Step 1: Perform DLDR movement pattern from the current node until last row is reached.
Step 2: If it is Sink node, stop there, otherwise from Current node arrive at the sink node,
along the boundary considering the shortest path.
End Procedure
Example 3: Let us consider a graph dual G4x3. Without loss of generality, let us suppose that B1 it-
self is the source. Figure 6. (a)-(e) show the path explored in pass #1, Pass #2, … , Pass #(m+n–
2), where m=4 and n=3.
From the above example, it is clear that, total number of droplets, as well as passes will be (m-1)
+ (n-1) = (m+n–2), whereas the existing algorithm [12], uses (m+n) droplets.
3.4. Analysis
Table I shows the entire traversal procedure with respect to time and segment for a graph dual
G4x3 (Figure 6). Let us consider each node of this graph dual as s1, s2. s3, … , s12 respectively in
row major order. In this table, each row represents each consecutive pass and it is clear from this
table that no collision is occurred during the traversal of the droplets through the pipeline. It takes
11 unit times to complete the entire diagnosis procedure for a 4x3 micro-fluidic array.
TABLE I
TIMING AND COLLISION ANALYSIS
T0 T1 T2 T3 T4 T5 T6 T7 T8 T9 T10 T11
S1 S4 S7 S10 S11 S12
S1 S4 S7 S8 S9 S12
S1 S4 S5 S6 S9 S12
S1 S2 S3 S6 S5 S8 S9 S12
S1 S2 S5 S4 S7 S8 S11 S12
Therefore, the total time required to complete the entire diagnosis process for an mxn matrix is as
follows:
For even value of m:
(m+n–3) + 2(m–1) + (n–2)= 3m + 2n – 7
For odd value of m:
(m+n–3) + 2(m–1) + (n–1) = 3m + 2n – 6
For the simplicity, let us think, m = n. Therefore, the proposed algorithm will take (5n–C) unit
time (C is a constant having value 6 or 7 as described before) which is less than the time, 8N
yields by [12]. Therefore, T(m,n) = O(m).
ProcedureSingle-Fault-Detection-and-Diagnosis-in-Gmxn
Perform (m+n–2) passes, i.e., Pass #1, Pass #2 ,….., Pass #(m–1), Pass #m, Pass #(m+1), ….. ,
Pass#(m+n–2) in parallel, such that they start from the source node at (m+n–2)consecutive time
slots.
6. 34 Computer Science & Information Technology (CS & IT)
PassBegin
Pass #1:
Step 1: Locate the nearest base node Bi, for the given source.
Find the shortest path from the source to Bi along the boundary of the graph dual Gmxn.
Step 2: Go down up to mth
row from Base Bi, then go right up to last column (nth
col-
umn).
If it is Sink node, stop there, otherwise from Current node arrive at the Sink node,
along the boundary considering the shortest path.
Pass #2:
Step1: Delay for one time slot.
Start from Source. Go to nearest Base Bi, found in previous pass.
Step2: Go down up to (m–1)th
row from Base Bi, then go right up to the last column.
If it is Sink node, stop there, otherwise from Current node arrive at the Sink node,
along the boundary considering the shortest path.
.
.
Pass #(m–1):
Step1: Delay for (m–2) time slot.
Start from Source. Go to nearest Base Bi, found in previous pass.
Step2: Go down up to 2nd
row from Base Bi, then go right up to the last column.
If it is Sink node, stop there, otherwise from Current node arrive at the Sink node,
along the boundary considering the shortest path.
Pass #m:
Step1: Delay for (m–1) time slot.
Start from Source. Go to nearest Base Bi, found in previous pass.
Step2: Go right up to the nth
column from base Bi.
Start Array-Traversal-Movement procedure.
Pass #(m+1):
Step1: Delay for m time slot.
Start from Source. Go to nearest Base Bi, found in previous pass.
Step2: Go right up to the (n–1)th
column from base Bi.
Start Array-Traversal-Movement procedure.
.
.
Pass #(m+n–2):
Step1: Delay for (m+n–1) time slot.
Start from Source. Go to nearest Base Bi, found in previous pass.
Step2: Go right up to the 2nd
column from base Bi.
Start Array-Traversal-Movement procedure.
PassEnd
Sense each and every droplet at the Sink at their expected instants. Have all of them reached the
Sink at predefined time? If yes, then the chip is fault free. Otherwise the chip is faulty. Now using
the concept of set theory, identify the faulty node.
7. Computer Science & Information Technology (CS & IT) 35
End procedure
Figure 6.Traversal Procedure of Single-Fault-Diagnosis in G4x3
4. EXPERIMENTAL RESULTS
Extensive experimentation was done with a large number of arrays varying from 4x4 to 40x40
electrodes. Table II, III and IV report three of the test cases. Table V reports the performance of
the proposed technique with respect to the existing technique [12]. It is found that in all cases the
proposed method yields better results in terms of lesser test time slices (no. of edges traversed) for
the corresponding micro-fluidic biochip. Column 5 of table V shows the % improvement in each
case. This is defined as:
% improvement =
௫௦௧_௧ ି௦ௗ_௧
௫௦௧_௧
x 100
TABLE II
FAULTY NODE DIAGNOSIS
Defected
Node
Only Droplets
Which Will Not
Reach Sink
(1,2) Droplet 3,4
(1,3) Droplet 3
(2,1) Droplet 1,2,4
(2,2) Droplet 2,3,4
(2,3) Droplet 2,3
(3,1) Droplet 1,4
(3,2) Droplet 1,3,4
For a 3x3 micro-fluidic array
8. 36 Computer Science & Information Technology (CS & IT)
0
50
100
150
Existing
Proposed
TABLE III
FAULTY NODE DIAGNOSIS
Defected
Node
Only Droplets
Which Will Not
Reach Sink
(1,2) Droplet 4,5
(1,3) Droplet 4
(2,1) Droplet 1,2,3,5
(2,2) Droplet 3,4,5
(2,3) Droplet 3,4
(3,1) Droplet 1,2,5
(3,2) Droplet 2,4,5
(3,3) Droplet 2,3,4
(4,1) Droplet 1
(4,2) Droplet 1,5
For a 4x3 micro-fluidic array
TABLE IV
FAULTY NODE DIAGNOSIS
Figure 7. X Axis: Array Size and Y Axis: Unit Time
Defected
Node
Only Droplets
Which Will Not
Reach Sink
(1,2) Droplet 4,5,6
(1,3) Droplet 4,5
(1,4) Droplet 4
(2,1) Droplet 1,2,3,6
(2,2) Droplet 3,5,6
(2,3) Droplet 3,4,5
(2,4) Droplet 3,4
(3,1) Droplet 1,2,6
(3,2) Droplet 2,5,6
(3,3) Droplet 2,4,5
(3,4) Droplet 2,3,4
(4,1) Droplet 1
(4,2) Droplet 1,6
(4,3) Droplet 1,5,6
9. Computer Science & Information Technology (CS & IT) 37
TABLE V
PERFORMANCE OF THE PROPOSED TECHNIQUE
Sl.
No
Size
Existing
Technique
[12]
Proposed
Technique
%
Improvement
1 3x3 24 9 62.50
2 4x4 32 13 59.38
3 5x5 40 19 52.50
4 6x6 48 23 52.09
5 7x7 56 29 48.22
6 8x8 64 33 48.44
7 9x9 72 39 45.84
8 10x10 80 43 46.25
9 11x11 88 49 44.32
10 12x12 96 53 44.80
11 13x13 104 59 43.27
12 14x14 112 63 43.75
5. CONCLUSION
An efficient single fault detection and diagnosis technique for digital micro-fluidic based Biochip
has been proposed in this paper. Diagnosis technique in a digital micro-fluidic biochip is an es-
sential key, because the subsequent performance of the biochip. Since the Dependability, Fault-
lessness are the important attribute of micro-fluidic based biochip, therefore the efficient diagno-
sis technique is extremely important factor. In this paper, the efficient defect-oriented testing,
diagnosis methodology and significant experimental results have pointed out that the improve-
ment of the test time over the existing proposed technique. Figure 7. shows the difference in the
performance graph clearly. This is an offline proposed technique, so it is not possible to show any
practical experimental result.
REFERENCE
[1] M. Pollack, et. al., “Electrowetting-based Actuation of Droplets for Integrated Microfluidics”, Lab
Chip, vol 2, pp. 96-101,2002.
[2] V. Srinivasan et al., “An Integrated Digital Microfluidic Lab-on-a-chip for Clinical diagnostics on
Human Physiological Fluids”, Lab Chip, pp.310-315, 2004.
[3] F. Su et. al.., “Architectural-level synthesis of Digital Microfluidics based Biochips”, Proc. IEEE Int.
Conf. on CAD,pp.223-228,2004.
[4] R. B. Fair et al., “Electrowetting-based on-chip sample processing for integrated microfluidics,” in
Proc. IEDM, 2003, pp. 32.5.1–32.5.4.
[5] E. Verpoorte and N. F. De Rooij, “Microfluidics meets MEMS,” Proc. IEEE, vol. 91, no. 6, pp. 930–
953, Jun. 2003.
[6] J. Zeng and T.Korsmeyer, “Principles of droplet electrohydrodynamicsfor lab-on-a-chip,” Lab on a
Chip, vol. 4, pp. 265–277, 2004.
[7] F. Su ,S.Ozev and K. Chakrabarty, “ Testing of Droplet-based Microfluidic Systems”, Proc. IEEE Int.
Test Conf.,pp.1192-1200,2003.
[8] F.Su, S. Ozev and K.Chakrabarty,”Test Planning and Test Resource Optimization for Droplet-Based
Microfluidic Systems”, Proc. IEEE Eur. Test Sym., pp. 72-77,2004.
[9] Fei Su, et. al.,“Testing and Diagnosis of Realistic Defects in Digital Microfluidic Biochip”, proc.
2007 Springer Science + Business Media.
[10] V. Srinivasan, et. al, “A Digital Microfluidic Biosensor for Multi analyteDetection”, Proc. IEEE
MEMS Conference, pp. 327-33-, 2003.,
10. 38 Computer Science & Information Technology (CS & IT)
[11] S. K. Cho et al., “Creating, transporting, cutting, and merging liquid droplets by electrowetting-based
actuation for digital microfluidic circuits,” J. Microelectromech. Syst., vol. 12, pp. 70–80, 2003.
[12] Tao Xu and KrishnenduChakrabarty, “ Parallal Scan-Like Test and Multiple-Defect Diagnosis for
Digital Microfluidic Biochips”, IEEE TRANSACTIONS ON BIOMEDICAL CIRCUITS AND
SYSTEMS, VOL. 1, NO. 2, JUNE 2007.
[13] R. B. M. Schasfoort et al., “Field-effect flow control for microfabricated fluidic networks,” Science,
vol. 286, pp. 942–945, 1999.
[14] “Two-dimensional digital microfluidic system by multi-layer printed circuit board,” in Proc. IEEE
MEMS, 2005, pp. 726–729.
[15] T. H. Schulte et al., “Microfluidic technologies in clinical diagnostics,” ClinicaChim. Acta, vol. 321,
pp. 1–10, 2002.
[16] Feisu, K. Chakrobarty, “Defect Tolerance Based on Graceful Degradation and Dynamic Reconfigura-
tion for Digital Microfluidics-Based Biochips”, IEEE TCAD V.25, No. 12, 2006.
[17] Tao Xu and K. Chakrabarty, “Functional Testing of Digital Microfluidic Biochip”, ITC 2007.
[18] S. Saha, et. al. “An Efficient Single Fault Detection Technique for Micro-Fluidic Biochips”, in Proc.
IEEE Int. Conf on ACE, pp. 10-14, 2010.
AUTHORS
Sagarika Chowdhury received the M.Tech. degree in Computer Science and Application
from University of Calcutta and stood 1st Class Third. She is currently an Assistant Pro-
fessor of Computer Science & Engineering Department at Narula Institute of Technology,
Kolkata, India. Her current research projects include Fault Detection and Diagnosis Tech-
niques for Micro-Fluidic Based Biochips.
Sumitava Royis pursuing the B.Tech. degree in Computer Science and Engineering from
Narula Institute of Technology (presently in his final year). His research interests include
Fault Detection and Diagnosis Techniques for Micro-Fluidic Based Biochips.
Sourav Sahais pursuing the B.Tech. degree in Computer Science and Engineering from
Narula Institute of Technology (presently in his final year). His research interests include
Fault Detection and Diagnosis Techniques for Micro-Fluidic Based Biochips.
Arijit Sahais pursuing the B.Tech. degree in Computer Science and Engineering from Na-
rula Institute of Technology (presently in his final year). His research interests include
Fault Detection and Diagnosis Techniques for Micro-Fluidic Based Biochips.