The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Quantum memory-driven computing on the classical computers for design and test of black-box functionality is considered. A method for synthesis and minimization test for the black-box functionality, based on a qubit derivative matrix and sequencer for searching a quasi-optimum coverage, is proposed. Examples of quantum memory-driven design and test minimization of the Schneider logic circuit are presented...
The authors propose a method for continuous monitoring of railway switch point blades based on radio frequency identification technology (RFID). Unlike the known monitoring methods, the method proposed allows to significantly expand the set of fixed diagnostic situations, as well as to control the mechanical parameters of moving elements of the switch. This paper describes the architecture of the...
This work reports an effective test design for memory. It realizes March algorithm employing a periodic boundary cellular automata (PBCA) structure. The irreversible single length cycle attractor cellular automata (CA), selected for the design, returns correct decision on the fault in memory even if the test logic is defective. It avoids the bit by bit comparison of memory words, practiced in the...
The paper presents the mathematical modeling of fragments by applying the polynomial regression to experimental data of arbitrary dimension. This approach aims to find out the minimal complexity polynomial structure defining the coefficients, which are optimized by the least squares criterion, enabling the error control when describing fragments. This mathematical formulation to approximate experimental...
In fields like embedded vision, where algorithms are computationally expensive, hardware accelerators play a major role in high throughput applications. These accelerators could be implemented as hardwired IP cores or Application Specific Instruction-set Processors (ASIPs). While hardwired solutions often provide the best possible performance, they are less flexible then ASIP implementation. In this...
The aim of the work is to develop a procedure for constructing models of testable control finite state machine (FSM), which are described using hardware description languages, and to estimate hardware costs for different methods of hardware redundancy introduction to the HDL model of FSMs. The task of computer-aided design of testable control FSM on the basis of the application of state machines'...
Future applications will require processors with many cores communicating through a regular interconnection network. As the semiconductor industry advances to the deep sub-micron and nano technology points, the on-chip components are more prone to the defects during manufacturing and faults during system life time. In order to ensure the reliability of network-on-chip (NoC) under the faulty circumstance,...
Some environments (e.g. space, aerospace or medical systems) require electronic systems to withstand an increased, occurrence of faults. Moreover, the failure of these electronic systems can cause high economical losses or endanger human health. Fault tolerance is one of the techniques, the goal of which is to avoid such situations. This paper presents an approach to evaluate the degree of importance...
In this paper the possibilities of passive magnetophotonic nanostructures application in low-temperature conditions of Arctic and Antarctic regions, near cosmic space and physics of high energies conditions are considered. Carried out examinations have shown that, in dependence on used magnetic materials, their crystallo-graphic structure, topology of arrangement (1D or 2D), technology of using, concentration...
On the basis of an integrated network-on-chip (NoC) topologies optimality criterion, as well as applying the adjacency matrix to describe NoC topologies, exhaustive search method and its modification by using branch and bound and Monte-Carlo methods are extended to the synthesis of NoC quasi-optimal topologies. Designed ScaNoC suboptimal topology synthesis algorithm is implemented on a high-level...
Pedestrian detection is a vital function of the emerging autonomous vehicle industry. HOG is widely used as the feature extractor for pedestrian detection thanks to its high accuracy despite the fact that it is computationally expensive. Hardware accelerators using GPUs or FPGAs are used in several proposals to address its real-time execution. There is always a trade-off between real-time processing,...
Authors offer the way of formation of self-checking concurrent error detection systems of combinational circuits based on Boolean complement method with “1-out-of-5”-code. This code's checker needs five code words for full test and has low technical realization complexity. This allows organization of concurrent error detection system with reduced structural redundancy compared with duplication method...
This paper introduces a newly developed Object-Oriented Open Software Architecture designed for supporting security applications, while leveraging on the capabilities offered by dedicated Open Hardware devices. Specifically, we target the SEcube™ platform, an Open Hardware security platform based on a 3D SiP (System on Package) designed and produced by Blu5 Group. The platform integrates three components...
The given paper presents a method for constructing a QC-LDPC code of shorter length by length adaption from a given QC-LDPC code of maximal length. The proposed method can be considered as a generalization of floor lifting. Making some offline calculation it is possible to construct a sequence of QC-LDPC codes with different circulant sizes generated from a single exponent matrix of QC-LDPC code which...
An innovative cyber culture and computing of social governance of citizens is proposed, aimed at the moral metric cloud service of social groups through the leverage of digital monitoring and expert evaluation of social processes and phenomena. Cyber culture is defined as the development level of social, technological, moral and material relations between society, the physical world and cyberspace...
This article is devoted to the research of diagnostics and monitoring of power supply devices of railway automation and remote control. The analysis of failure statistics of power supply devices in recent years has been carried out and the most vulnerable elements of power supply systems have been identified on its basis. Objects are described, the state of which must be diagnosed in the input devices,...
This paper presents a hybrid history-based test generation mechanism that intermittently applies partial-test vectors to reduce test application time. Test generation is done by looking into the results of the circuit under test that are used later as a part of partial-test vectors. Therefore, these test vectors convey a history of previously applied tests. A probability based analysis is also proposed...
Fault simulation is very important task for testing and fault diagnostics based on the concept of simulation before test. Catastrophic and parametric faults as well as component tolerances can make strong or weak influence on a correct circuit behavior. Therefore it is necessary to estimate such influence during design stage in order to provide high quality testing and diagnosis for the circuit under...
The cloud-driven traffic control and road service metric for searching the optimal route on the road infrastructure between two coordinates, which are identified with the point of departure and arrival, is considered. Possible restrictions are related to road collisions, accidents and road repairs, which is taken into account when choosing the best route. The method is implemented in the online cloud...
We discuss a method of signal analysis — empirical mode decomposition, and also its modification — complementary ensemble empirical mode decomposition. Both methods are used to research the reconstruction of a speech signal by the means of intrinsic mode functions that were received during the decomposition. Researches were performed using two English databases of speech signals which contain speech...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.