The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article describes a calculation procedure of a permissible leakage flow for sealed products. It is shown how a leak detector sensitivity can be improved by changing a pressure drop and a test gas. Optimal leak rate ranges for a mass spectrometric leak detector, a portable helium leak detector and a pressure decay leak detector are suggested in order to achieve high accuracy, repeatability and...
Recognition between true and false ballistic warheads is an important problem in missile defense. In this paper, a multiple-input multiple-output (MIMO) radar with distributed antennas is employed to observe the scene from distinct directions to gain multi-dimensional information of the warheads. A state space model (SSM) is developed to describe the motion behavior of the warheads (state equation)...
In recent years, flow-based anomaly detection has been used as a scalable method for high-speed networks. The application of supervised learning in flow-based anomaly detection has been considered in a number of studies. However, supervised methods are not very useful as they are only trained with labelled data. Therefore, in this study, we use a semi-supervised method to address the problem of the...
This paper studies online detection of hidden information in digital images. By online, it is meant that we inspect a flow of images that are transmitted sequentially. This has crucial consequences on the detection of hidden data. By contrast to the usual detection settings, the delay before detection has to be considered in the definition of the correct detection probability, or power function. Similarly,...
Tests are increasingly specified as programs. Expressing tests as code is advantageous in that developers are comfortable writing and running code, and tests can be automated and reused as the software evolves. Tests expressed as code, however, can also contain faults. Some test faults are similar to those found in application code, while others are more subtle, caused by incorrect implementation...
In this paper, we study an implementation of the Benjamini-Hochberg's procedure for cooperative multiband spectrum sensing in cognitive radio. We propose to use equal gain combining on forwarded p-values from cooperative cognitive radio (CR) users as the test statistic at the fusion center. By doing so, the distribution of the test statistic under the null hypothesis at the fusion center does not...
Defects in TSVs due to fabrication steps decrease the yield and reliability of 3D stacked ICs, hence these defects need to be screened early in the manufacturing flow. We propose a non-invasive method for pre-bond TSV test and diagnosis that does not require TSV probing. We use open TSVs as capacitive loads of their driving gates and measure the propagation delay by means of ring oscillators. Defects...
Recently, we can find news about toxic and combustible gas accident. So, we have to develop gas detector that can measure gas safely at dangerous area and be possible to monitor gas detection at remote area. In this paper, we analyze and estimate gas sensor modules and combustible gas detectors that is already developed, by using standard gas sample manufactured Korea Gas Safety. We apply result analyzed...
Neutron multiplicity counters are used in safeguards to provide rapid assay of samples which contain an unknown amount of plutonium in a potentially unknown configuration. A project at PNNL is using regular and nickel-quenched 6LiF/ZnS neutron-scintillator sheets and wavelength shifting plastic for light pipes in place of 3He. A combination of laboratory and modeling work predicts a LiF/ZnS-based...
In this paper a method is presented to address the automatic testing of analog ICs. Based on Design-for-Testability building blocks offering extra controllability and extra observability, a test infrastructure is generated for a targeted circuit. The selection of the extra blocks and their insertion into the circuit is done automaticaly by a proposed optimization algorithm. Adopting a defect-oriented...
The detailed overview of the Roscosmos new high energy (20-60 AMeV) ion beam line based on U400M cyclotron and the features of diagnostic set-up used for ion beam parameters evaluation and control during SEE tests are presented.
This paper will present an RMS based ripple sensor for testing of fully integrated voltage regulators. A DC signal which is proportional to the input ripple amplitude is generated. Final digital pass/fail signal is obtained with a clocked comparator. The sensor can detect a peak-to-peak ripple voltage of up to 50 millivolts on the 1.2 volts supply rail and has 220 MHz bandwidth. The sensor is designed...
In this paper, we study the implementations of multiple testing procedure (MTP) for multiband spectrum sensing in cognitive radio, more precisely using Holm's sequentially rejective algorithm and Benjamini-Hochberg's algorithm. MTP is appropriate for multiband spectrum sensing when we want to provide control on the decision errors at the system level, not per subband. This approach is motivated when...
Recently, some statistically optimal steganalyzers are proposed based on hypothesis testing theory, in which the cover pixels are supposed to be independent. However, the independent assumption is of limited interest since redundancy exists in natural images. In this paper, using a more appropriate image model considering pixel correlation, a new steganaly-sis method for the least significant bit...
The micro-motion characteristics of warheads have been utilized to discriminate false warheads from true ones. To obtain accurate dimensional measurements, a multiple-input multiple-output (MIMO) radar is adopted to observe the kinetic information of the warhead. A distributed state space model (SSM) is built and the differences between the true and false warheads are characterized as different system...
In de-mining or UXO work, classification of subsurface targets into bins such as “mine” vs. “clutter” is critical. So is statistical evaluation of classification accuracy. For radar systems with automated target recognition involving some threshold parameter, one can plot an ROC curve showing the detection rate versus the false alarm rate across a range of threshold values. However, for visual interpretation...
In this paper, some important parameters for a Circular Variable Filter (CVF) based spertroradiometer are tested. A standard blackbody radition source, which is calibrated and traceable to National Institute of Standards and Technology (NIST), is adopted to accomplish the test. Interesting properties are accuracy, nonlinearity, stability and Noise Equivalent Temperature (NET). The testing results...
The paper presents a highly efficient system for automated wafer testing implemented on a single software platform. Building fully functional device requires often expensive and time consuming, manufacturing steps. Thus, the ASICs on the wafer ought to be tested in advance to ensure that only the chips with no manufacturing defects will be used in the further process. The presented testing system...
The distributed binary hypothesis testing problem with communication and security constraints is investigated. A legitimate statistician (referred to as Bob) is interested in detecting the joint probability distribution of two remotely located sources. To this end, Bob has access to analog and coded data where the later is observed at another node (referred to as Alice) and communicated over a public...
Composite hypothesis testing problems admit a class of solutions that are as optimal as possible, absent a cost function. These indomitable detectors comprise a superset of all optimal solutions. However, evaluating them with finite precision arithmetic can generate unstable answers. Here we devise a general method for deriving indomitables, using an extended fusion technique. Then we show how to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.