73,077 research outputs found
Recommended from our members
Development of generic testing strategies for mixed-signal integrated circuits
Describes work at the Polytechnic of Huddersfield SERC/DTI research project IED 2/1/2121 conducted in collaboration with GEC-Plessey Semiconductors, Wolfson Microelectronics, and UMIST. The aim of the work is to develop generic testing strategies for mixed-signal (mixed analogue and digital) integrated circuits. The paper proposes a test structure for mixed-signal ICs, and details the development of a test technique and fault model for the analogue circuit cells encountered in these devices. Results obtained during the evaluation of this technique in simulation are presented, and the ECAD facilities that have contributed to this and other such projects are described
The integration of on-line monitoring and reconfiguration functions using IEEE1149.4 into a safety critical automotive electronic control unit.
This paper presents an innovative application of IEEE 1149.4 and the integrated diagnostic reconfiguration (IDR) as tools for the implementation of an embedded test solution for an automotive electronic control unit, implemented as a fully integrated mixed signal system. The paper describes how the test architecture can be used for fault avoidance with results from a hardware prototype presented. The paper concludes that fault avoidance can be integrated into mixed signal electronic systems to handle key failure modes
Laser Ultrasound Inspection Based on Wavelet Transform and Data Clustering for Defect Estimation in Metallic Samples
Laser-generated ultrasound is a modern non-destructive testing technique. It has been investigated over recent years as an alternative to classical ultrasonic methods, mainly in industrial maintenance and quality control procedures. In this study, the detection and reconstruction of internal defects in a metallic sample is performed by means of a time-frequency analysis of ultrasonic waves generated by a laser-induced thermal mechanism. In the proposed methodology, we used wavelet transform due to its multi-resolution time frequency characteristics. In order to isolate and estimate the corresponding time of flight of eventual ultrasonic echoes related to internal defects, a density-based spatial clustering was applied to the resulting time frequency maps. Using the laser scan beamâs position, the ultrasonic transducerâs location and the echoesâ arrival times were determined, the estimation of the defectâs position was carried out afterwards. Finally, clustering algorithms were applied to the resulting geometric solutions from the set of the laser scan points which was proposed to obtain a two-dimensional projection of the defect outline over the scan plane. The study demonstrates that the proposed method of wavelet transform ultrasonic imaging can be effectively applied to detect and size internal defects without any reference information, which represents a valuable outcome for various applications in the industry. View Full-TextPeer ReviewedPostprint (published version
iPhone forensics methodology and tools
iPhone mobile devices are rapidly overtaking the new generation of mobile phones market, especially among the young generation. It is also gaining a lot of popularity among security specialists and fancy gadgets for collectors. The device is considered as a âspecialâ mobile phone due to its ability to perform multi-operations if not multitasking. It can therefore be used as a entertainment media device, a camera, a GPS, Internet surfing via Wi-Fi technology, Internet Mobile Edge Services, personal organizer, and finally performing as a cell phone with all the usual services including sms, and so forth. However, the difference between the iPhone and the other conventional phones vendors is its ability to store and process huge volume of data which is supported by decent computing capabilities of the iPhone processor. As part of every technology, such a device can be used for legal and illegal activities. Therefore the potential risks from such âspecialâ technology are not limited to the possibility of containing illegal materials, such as audios and visuals, including explicit materials, images, documents and the possibility of propagating malicious activities rapidly. Such modification can breach or tamper with the telecommunications network authorities and regulations. The goal of this paper is to focus on both the logical and the physical extraction of the iPhone generation one through the extraction of the iPhone flash drive NAND memory chip and also the logical extraction of data onto the second generation of iPhone using various techniques and methods at our disposal
Design and Test Space Exploration of Transport-Triggered Architectures
This paper describes a new approach in the high level design and test of transport-triggered architectures (TTA), a special type of application specific instruction processors (ASIP). The proposed method introduces the test as an additional constraint, besides throughput and circuit area. The method, that calculates the testability of the system, helps the designer to assess the obtained architectures with respect to test, area and throughput in the early phase of the design and selects the most suitable one. In order to create the templated TTA, the ÂżMOVEÂż framework has been addressed. The approach is validated with respect to the ÂżCryptÂż Unix applicatio
- âŠ