Abstract:
A method of determining a treatment plan for intensity modulated radiation treatment (IMRT) divides a three-dimensional volume of a patient into a grid of dose voxels. At least a portion of the dose voxels are designated to belong to at least one target or to at least one critical structure. An ionizing radiation dose as delivered by a plurality of beamlets each having a beamlet intensity is modeled. A non-linear convex voxel-based penalty function model is provided for optimizing a fluence map. The fluence map defines the beamlet intensities for each of the plurality of beamlets. The model is then solved based on defined clinical criteria for the target and the critical structure using an interior point algorithm with dense column handling to obtain a globally optimal fluence map.
Abstract:
A messaging system is provided whereby a message indicative of an invitation to collaboratively execute an application can be sent from one of the computing object to an intermediary system whereby the message is multicast to the other ones of the plurality of computing objects. The invitation message can be accepted by the other computing objects to cause the first object to launch the corresponding application. The other computing objects also launch versions of the application and exchange addressing information with the first application so that a multiparty application execution can be established.
Abstract:
A system comprising a communications link between processors configured to transmit packets between transmitting and receiving processors. The communications link comprises a conduction path for each bit in the packet and the paths are grouped into separate bundles and routed along different paths. A forwarded clock signal is sent with each bundle. The processors operate with a clock frequency that is roughly three times as fast as the clock frequency of the forwarded clock signal. Data is transmitted on both rising and falling edges of the clock. The receiving processor comprises a recovery circuit to which it pulls the asynchronous data into the processor clock domain. The recovery circuit comprises a delay locked loop circuit configured to create a delayed copy of the clock signal with clock edges that are aligned with the center of the data window for the transmitted data.
Abstract:
In a DRAM memory circuit, a current sensing amplifier is provided that exploits the low impedance of a reference transistor biased in the sub-threshold regime to enable transfer of a small voltage swing on the bitline to result in a large voltage signal on a low capacitance sense node. Compared to conventional voltage sensing, reduced bitline-bitline coupling noise results because of the small bitline swing, potentially allowing more cells to be served by a sense amplifier because of weak dependence of sense amplifier on bit-line capacitance. Compared to previous current-sensing schemes, this invention allows no idling current. The current-sensing amplifier additionally may be used in conjunction with a hierarchical bitline scheme to further increase the number of cells served by each sense amplifier.
Abstract:
Disclosed is a method of fluorescent detection of a nucleic acid. The method comprises contacting to the nucleic acid a bis-dicationic aryl furan compound, such as 2,5-bis�4-(4,5,6,7-tetrahydro-1H-1,3-diazepin-2-yl) phenyl! furan; 2,5-bis{�4-(N-isopropyl) amidino! phenyl}furan; and physiologically acceptable salts thereof, and exposing the nucleic acid to light at a frequency to induce fluorescence of the compound. A method for fluorescent detection of cytoskeleton elements, and novel bis-dicationic aryl furan compounds are also disclosed.
Abstract:
The present invention provides methods for treating Pneumocystis carinii pneumonia in a subject in need of such treatment. The methods comprise administering to a subject in need thereof, a pyrimidine of Formula I. ##STR1## wherein the variables are as defined in the specification.
Abstract:
Shallow trench isolation structures are provided for use with UTBB (ultra-thin body and buried oxide) semiconductor substrates, which prevent defect mechanisms from occurring, such as the formation of electrical shorts between exposed portions of silicon layers on the sidewalls of shallow trench of a UTBB substrate, in instances when trench fill material of the shallow trench is subsequently etched away and recessed below an upper surface of the UTBB substrate.
Abstract:
In some embodiments, a processor-based system may include a processor, the processor having a processor identification, one or more electronic components coupled to the processor, at least one of the electronic components having a component identification, and a hardware security component coupled to the processor and the electronic component. The hardware security component may include a secure non-volatile memory and a controller. The controller may be configured to receive the processor identification from the processor, receive the at least one component identification from the one or more electronic components, and determine if a boot of the processor-based system is a provisioning boot of the processor-based system. If the boot is determined to be the provisioning boot, the controller may be configured to store a security code in the secure non-volatile memory, wherein the security code is based on the processor identification and the at least one component identification. Other embodiments are disclosed and claimed.
Abstract:
A method and system for cascading power consumption is described herein. The method may include providing power to a first sensor and a second sensor, wherein the first sensor consumes more power than the second sensor. The method may also include detecting the first sensor does not capture a sample of data. In addition, the method may include stopping the flow of power to the first sensor. Furthermore, the method may include monitoring an operating environment with the second sensor. The method may also include providing power to the first sensor in response to the second sensor detecting a sample of data.
Abstract:
In one embodiment, a processor includes a microcode storage including processor instructions to create and execute a hidden resource manager (HRM) to execute in a hidden environment that is not visible to system software. The processor may further include an extend register to store security information including a measurement of at least one kernel code module of the hidden environment and a status of a verification of the at least one kernel code module. Other embodiments are described and claimed.