The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper studies the detection of anomalies, or defects, on wheels' surface. The wheel surface is inspected using an imaging system, placed over the conveyor belt. Due to the nature of the wheels, the different elements are analyzed separately. Because many different types of wheels can be manufactured, it is proposed to detect any anomaly using a general and original adaptive linear parametric...
Aiming at evaluating the SEE performance of complex electronic system, the multi-signal flow graph (MSFG) method is adopted. Based on the theory of the MSFG, the SEE soft error propagation model is proposed, and an analysis methodology is stated. For complex electronic system which consists of VLSIs devices, such as SRAM-based FPGA, the MSFG model has been established and simulated in TEAMS software...
Partial discharge (PD) diagnosis in power apparatus is needed to minimize the insulation failure. It consist of PD detection, PD measurement, PD signal processing, and PD judgment systems. Time-frequency domain transformation and signal filterring are basic components in PD signal processing. PD signal transformation from the time domain to the frequency domain or vice versa may be conducted by several...
The brain reconfigures itself continuously in response to different external stimuli. Advances in noninvasive brain activity recording has made it possible to gain insight into the functional brain activity over time. The functional connectivity has been mostly characterized as a static network through linear and nonlinear measures of statistical dependency. However, recent work indicates that functional...
Steganography and steganalysis are two important branches of the information hiding field of research. Steganography methods consist in hiding information in such a way that the secret message is undetectable for the uninitiated. Steganalyzis encompasses all the techniques that attempt to detect the presence of such hidden information. This latter is usually designed by making classifiers able to...
Non-destructive testing (NDT) based on eddy currents (EC) is commonly used to detect defects in conductive materials. Usually the system includes an emitter coil, and one receiver coil or one Magnetoresistive (MR) sensor. In this work we added an interface ASIC that pre-amplifies and filters the signal from an array of MR sensors. This demo will present a new version based on the work presented at...
The Minimum Description Length (MDL) principle led to various expressions of the stochastic complexity (SC), and the most recent one is given by the negative logarithm of the Normalized Maximum Likelihood (NML). For better understanding the properties of the newest SC-formula, we relate it to the well-known Generalized Likelihood Ratio Test (GLRT). Additionally, we compare the SC with the Bayesian...
We present a fast machine-learning approach to static code analysis and fingerprinting for weaknesses related to security, software engineering, and others using the open-source MARF framework and its MARFCAT application. We used the NIST’s SATE IV static analysis tool exposition workshop’s data sets that included popular open-source projects and large synthetic sets as test cases. To aid detection...
Current breed of low to mid end speakers and earphones are unable to recreate the bass frequency range satisfactorily. Bass enhancement using the psychoacoustic principle of missing fundamental is particularly suitable for such scenarios. Traditionally there are two techniques employed for this such as Non Linear Devices (NLD) and Phase Vocoders (PV). However each one comes with its own set of cons...
Dataflow modeling offers a myriad of tools in designing and optimizing signal processing systems. A designer is able to take advantage of dataflow properties to effectively tune the system in connection with functionality and different performance metrics. However, a disparity in the specification of dataflow properties and the final implementation can lead to incorrect behavior that is difficult...
Botnets are widely used for acquiring economic profits, by launching attacks such as distributed denial-of-service (DDoS), identification theft, ad-ware installation, mass spamming, and click frauds. Many approaches have been proposed to detect botnet, which rely on end-host installations or operate on network traffic with deep packet inspection. They have limitations for detecting botnets which use...
The pulsed eddy current nondestructive testing signal for ferromagnetic plate thickness testing is sensitive to the plate's thickness and probe lift-off effect simultaneously. This feature leads to the difficulty of eigen-value extraction in thickness quantification. To remove the probe lift-off effect, a method based on calculating the time-varied relative magnetic flux changing rate is presented...
This paper presents the system performance and flight testing of an advanced technology demonstrator for a low-cost and small size near-field obstacle warning sensor for civil and military helicopters. Based on the previously developed sensor modules, the complete sensor system was successfully tested during flight tests and the results of the visualization of various obstacles detected like antennas,...
An online health monitoring system (OHMS) was tailor-made and implemented for structural health monitoring (SHM) of train structures. A sensor network made up of miniature piezoelectric wafers was configured on the bogie frames of China's latest high-speed train model. Ultrasonic guided waves were generated through the sensor network, and a variety of signal features were retrieved and fused by the...
In satellite-based systems, such as global navigation satellite systems (GNSS), the use of antenna arrays is becoming increasingly common, as it allows various applications, such as jammer/spoofer suppression or improving the positioning accuracy in multipath-environments. Testing such equipment under realistic and reproducible conditions is often not feasible, for example in the case of a not fully...
We propose a minimax robust hypothesis testing scheme that involves a composite uncertainty class based on two different distances. The first distance models the misassumptions on the nominal distributions and the second distance models the outliers. We prove that the least favorable distributions, with a desired minimax property, exist for the composite uncertainty class. It is shown that such a...
This paper deals with coherent multi-polarization SAR change detection assuming the availability of reference and test images collected from N multiple polarimetric channels. At the design stage, the change detection problem is formulated as a binary hypothesis testing problem and the principle of invariance is used to come up with decision rules sharing the Constant False Alarm Rate (CFAR) property...
In software development, the most time consuming phase is maintenance. Regression testing, which is a part of maintenance, deals with test case prioritization that aims to increase rate of fault detection with less number of tests. In our study, we used 100 tests and 1000 faults; however, faults are detected by tests using genetic algorithm and improved genetic algorithm. After test case prioritization,...
A comparative study of various fall detection algorithms based upon measurements of a wearable tri-axial accelerometer unit is presented in this paper. Least squares support vector machine, neural network and rule-based classifiers are evaluated in the scope of this paper. Training and testing data sets, which are necessary for design and testing of the classifiers, respectively, are collected from...
In this study, we provide a methodology to localize the brain regions that contribute to semantic category classification. For this purpose we first cluster the data using spectral clustering. Then we extract local features within each cluster by using mesh-arc descriptors. Finally, we test the classification accuracy of each cluster against a hypothesis testing measure we provide here. We have found...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.