The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
According to the operation of the automaton transient impact, nonlinear, non-stationary signal, a method which is based on the time-frequency characteristics and PCA-SVM automaton fault diagnosis is proposed. Firstly, this paper uses statistical analysis and overall empirical mode decomposition method to construct high dimensional mixed domain initial feature vector from the characteristics of different...
Detecting forgeries in images especially those involved in Copy-Move forgery could become a challenging prospect in the acreage of image forensics. The significance of detecting such forgeries comes to light, given the rise of such malpractices. Now we will see a approach using ASIFT which is planned to expose regions which have been copied and then pasted in another region to either duplicate information...
Parallel matrix processing is a typical operation in many systems, and in particular matrix-vector multiplication is one of the most common operations in modern digital signal processing and digital communication systems. This paper proposes a fault tolerant design for parallel matrix-vector multiplications. The scheme combines ideas from Error Correction Codes with the self-checking capability of...
Evaluating the robustness of circuits with respect to soft errors has become of utmost importance in many application areas. This evaluation must in most cases be refined taking into account the application characteristics in order to avoid too pessimistic results. The main approach used today at design time is based on fault injection campaigns. Emulation can be used to speed up the evaluations,...
The severity of timing delay in the communication channels of Network on Chip (NoC) depends on the transition patterns appearing on the wires. An analytical model can estimate the timing delay in NoC channels in the presence of crosstalk faults. However, recently proposed analytical model does not have enough accuracy and is based on 3-wire delay model. In this paper, an Accurate Crosstalk Model (ACM)...
Soft errors induced by space radiation environments seriously influence the reliability of spacecrafts in space and satellite communications, especially with ever shrinking geometries, higher-density circuits, and power saving techniques. Most of the existing soft error mitigation methods depend on triple modular redundancy (TMR) or dual-modular redundancy (DMR) to the original design target directly,...
Confronted to more and more demanding standards in terms of safety and reliability, aerospace companies are investigating new methodologies to evaluate the robustness of their FPGA designs against energetic particles. In this paper, this evaluation is realized early in the design flow to avoid costly design re-spins. It permits to have a first evaluation of the RTL design robustness and of the design...
A hardware True Random Number Generator (TRNG) yields random numbers from a physical process. Traditionally, such devices are based on statistically random signals such as thermal noise or other quantum phenomena. In this paper we propose an innovative TRNG design using a Spin Transfer Torque Magnetic Tunnel Junction (STT-MTJ) device. We exploit the stochastic nature of the MTJ device switching, and...
Modern systems for ubiquitous computing domains such as Internet-of-things (IoT), wearable computing etc. are characterized by low duty cycle, low operating and stand by power consumption requirements. The design of such systems is further constrained by increasing leakages due to technology scaling and/or increased data retention requirements. These conflicting requirements make leakage reduction...
Quasi-Cyclic Low-Density Parity-Check Codes (QC-LDPC) have been recently adopted by the Consultative Committee for Space Data Systems (CCSDS) as recommended standard for channel coding in near-earth (C2) and deep-space (AR4JA) communications. Existing QC-LDPC encoder architectures proposed in the literature so far, are optimized for other standards (e.g. DVB-S2, IEEE 802.11e), but they are not suitable...
Roadside vegetation classification has recently attracted increasing attention, due to its significance in applications such as vegetation growth management and fire hazard identification. Existing studies primarily focus on learning visible feature based classifiers or invisible feature based thresholds, which often suffer from a generalization problem to new data. This paper proposes an approach...
Hardware Trojan (HT), Integrated Circuit (IC) piracy, and overproduction are three important threats which may happen in untrusted foundries. Design changes against HTs, so-called Design-For-Hardware-Trust (DFHT), are used in order to facilitate the HT detection. In addition, logic masking has been proposed against IC piracy and overproduction. In this work, we propose a DFHT method reusing the circuitry...
High compression ratio is crucial to cope with the large amounts of data produced by telemetry sensors and the limited transmission bandwidth typical of space applications. A new generation of telemetry units is under development, based on Commercial Off-The-Shelf (COTS) components that may be subject to misbehaviors due to radiation-induced soft errors. The purpose of this paper is to study the impact...
Today, block algorithms represent one of the most used tools to provide security in IT systems. As defined by Shannon in [5], one of the fundamental principles of algorithms block security is confusion. This principle is about creating very complex relationships between the key and the encrypted text. A mechanism for elementary confusion is the S-box, generally the only nonlinear part of the algorithm...
Signal spectral analysis is a dominating way of characterizing the dynamic performance of analog signals. To perform accurate spectral testing, the IEEE Standard 1241, 1658 and 1057 suggest coherent sampling. Obtaining coherent sampling, especially when signals have large distortion to noise ratios, has been a challenge for many years. With the growing need for Built-In-Self-Test (BIST) circuits for...
OFDM technique is the most adopted multiplexing technique offering many advantages such as high spectral efficiency, noise, inter-symbol interference and multipath robustness. These have made OFDM a first-choice technique in the majority of today's wireless and wired communication systems. In this work, physical layer of the generic transceiver, based on OFDM, is implemented. Focus is kept on the...
We present a design methodology for embedded tests of entropy sources. These tests are necessary to detect attacks and failures of true random number generators. The central idea of this work is to use an empirical design methodology consisting of two phases: collecting the data under attack and finding a useful statistical feature. In this work we focus on statistical features that are implementable...
Spectral testing is widely used in characterizing the dynamic performance of analog signals. Achieving accurate test results is an expensive and challenging task. This paper focuses on eliminating the challenging requirement of non-coherent sampling in the presence of an impure signal with large distortion to noise ratios. A new method was proposed that iteratively estimated noncoherent fundamental...
Accurately characterizing linearity performance of high resolution Analog-to-Digital Converters (ADCs) has been a challenging task for many years, as providing input signals whose purity is beyond ADC under test becomes harder and harder as the ADC performance becomes better. This paper proposes a novel method that uses impure test signals to accurately test linearity performance of ADC. Two nonlinear...
We present a novel hand localization technique for 3D user interfaces. Our method is designed to overcome the difficulty of fitting anatomical models which fail to converge or converge with large errors in complex scenes or suboptimal imagery. We learn a discriminative model of the hand from depth images by using fast to compute features and a Random Forest classifier. The learned model is then combined...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.