A 10-bit 100-MS/s asynchronous successive approximation register (SAR) analog-to-digital converter (ADC) is presented by using the digital place-and-route (DPR) tools. The floorplan and blockage constraint for the boo...
A 10-bit 100-MS/s asynchronous successive approximation register (SAR) analog-to-digital converter (ADC) is presented by using the digital place-and-route (DPR) tools. The floorplan and blockage constraint for the bootstrapped switch and the comparator are presented to improve the parasitic capacitances caused by the DPR tools, respectively. The redundancy in the capacitive digital-to-analog converter (CDAC) and the on-chip reference buffer are presented to relieve the CDAC settling error. This calibration-free SAR ADC is fabricated in 40-nm CMOS technology and its active area is 0.0072 mm 2 . To compare with the full-custom method, the DPR flow has speeded up by a factor of 76 to complete the interconnection wires. Its power dissipation is $418-\mu\mathrm{W}$ at 100-MS/s and the calculated Walden FoM is 10.9-fJ/c. step at Nyquist frequency.
Simultaneous multislice (SMS) imaging is a one of the acceleration technique of magnetic resonance imaging. SMS requires accurate sensitivity distributions in the slice plane for each receiving coil. This requirement ...
详细信息
In this paper, we performed a simulation for a physical resistive random-access device (RRAM) to propose an improved model representing its electrical characteristics. Voltage ThrEshold Adaptive Memristor (VTEAM) mode...
详细信息
Cutter wear and breakages in CNC machines lead to financial losses ranging from 5% to 10% of annual revenue for companies. Especially in the production of automotive and defense industry products, there are high expec...
详细信息
A dual-frequency band high-gain split-ring antenna is proposed for 5G mm-wave applications. The antenna consists of three split ring resonators (SRRs), one is the main SRR which radiates at the first resonant frequenc...
详细信息
In this study, we proposed and demonstrated a brand new type of monolithic photonic devices which realizes the three-dimensional (3D) all-optical switching for inter-layer signal transmission. This device is composed ...
详细信息
In this study, we investigate a directional electromagnetic resonance antenna (EMRA) for application to wearable antennas. We designed an EMRA in free space and confirmed its unidirectional pattern through simulations...
详细信息
The recent advances in smartphone technology have led to the emergence of simple, low-cost and portable platforms that aim reliable qualitative and quantitative analysis of colored solutions. In this paper, we present...
详细信息
In modern society, the early detection of damage to train line equipment and regular inspections were essential for ensuring the safe operation of trains. Traditionally, inspections of train line equipment were conduc...
详细信息
ISBN:
(数字)9798331510732
ISBN:
(纸本)9798331510749
In modern society, the early detection of damage to train line equipment and regular inspections were essential for ensuring the safe operation of trains. Traditionally, inspections of train line equipment were conducted manually at night. However, this method posed issues such as the need for significant labor and limited mobility. To address these problems, efforts were made to improve mobility by installing cameras on the roofs of test vehicles. However, the analysis of the images captured by these cameras was still conducted manually. In recent years, the use of drones, high-resolution cameras, and AI for inspections had been explored. This paper reported on a preliminary study concerning damage detection of train line equipment using deep learning and its application to autonomous drones. In this study, two models were used for object detection of train line equipment. The target equipment in this study included three components: hanger, connector, and insulator. The dataset contained a total of 2,400 images, with 800 images each for the hanger, connector, and insulator. To evaluate the training progress of the models, the mean Average Precision (mAP) was used for both the training and test datasets. The training was conducted on a Windows PC with CUDA support. The object detection models used were the Single Shot multibox Detector (SSD) and You Only Look Once (YOLOv7). After simulations, the following results were obtained. For the training data, the SSD model achieved an mAP of 73.51%, while the YOLOv7 model achieved an mAP of 97.5%. For the test data, the SSD model achieved an mAP of 53.74%, while the YOLOv7 model achieved an mAP of 76.30%.
The connectivity requirements brought by Industry 4.0 pose new challenges for cyber-physical systems (CPS), such as the strengthening of their resilience against cyberattacks. In this paper, we use the discrete event ...
详细信息
The connectivity requirements brought by Industry 4.0 pose new challenges for cyber-physical systems (CPS), such as the strengthening of their resilience against cyberattacks. In this paper, we use the discrete event systems (DES) formalism to develop an approach that aims to protect CPS from covert actuator attacks using event permutation maps. In this approach, properly selected controllable events are permuted on the plant's site so that attacks on actuators do not have the impact on the plant as expected by the intruder and unsafe states are avoided. Furthermore, a property termed AE-protectability is presented to characterize the necessary and sufficient conditions for the system to be protected against such attacks through event permutations. The proposed approach is applied to a case study where the Identification of the attack is done without causing damage while maintaining the integrity of the system.
暂无评论