Pub Date : 2022-03-28DOI: 10.46300/9106.2022.16.113
S. H. Kachapi
In this work, vibration control of multi walled piezoelectric nanosensor (MWPENS) using nonclassical theories of nonlocal (NLT), nonlocal strain gradient (NSGT) and Gurtin–Murdoch surface/interface (GMSIT) approaches are presented. The nanosensor is embedded in direct nonlinear electrostatic voltage DC, harmonic excitation, structural damping, two piezoelectric layers and nonlinear van der Waals (vdW) force. Hamilton’s principle and Galerkin technique respectively are used to obtain the governing equations and boundary conditions and to solve the equation of motion. For this work, effects of surface/interface energy, size and, material length scale parameters on pull-in voltage VDC and dimensionless natural frequency (DNF) are consided and nonclassical theories compared with classical theory. It is concluded that ignoring nonclassical effects lead to inaccurate results in vibrational response of the MWPENS. In all boundary condition, S/I effects lead to increasing of MWPENS stiffness leads to more DC voltage to reach the pull-in instability and other nonclassical effects lead to decreasing of MWPENS stiffness and as a result decreasing of DNF. Also, with ignoring the surface/interface density ρ^I,S and Lame’s constants μ^I,S, respectively the system will have a maximum and minimum DNF than the other parameters and MWPENS respectively will later and sooner than other parameters reach the pull-in voltage.
{"title":"Vibration Control of Multi Walled Nanosensor by Piezoelectric and Electrostatic Actuator Using Nonlocal and Surface/interface Parameters","authors":"S. H. Kachapi","doi":"10.46300/9106.2022.16.113","DOIUrl":"https://doi.org/10.46300/9106.2022.16.113","url":null,"abstract":"In this work, vibration control of multi walled piezoelectric nanosensor (MWPENS) using nonclassical theories of\u0000nonlocal (NLT), nonlocal strain gradient (NSGT) and Gurtin–Murdoch surface/interface (GMSIT) approaches are presented. The nanosensor is embedded in direct nonlinear electrostatic voltage DC, harmonic excitation, structural damping, two piezoelectric layers and nonlinear van der Waals (vdW) force. Hamilton’s principle and Galerkin technique respectively are used to obtain the governing equations and boundary conditions and to solve the equation of motion. For this work, effects of surface/interface energy, size and, material length scale parameters on pull-in voltage VDC\u0000and dimensionless natural frequency (DNF) are consided and nonclassical theories compared with classical theory. It is concluded that ignoring nonclassical effects lead to inaccurate results in vibrational response of the MWPENS.\u0000In all boundary condition, S/I effects lead to increasing of MWPENS stiffness leads to more DC voltage to reach the pull-in instability and other nonclassical effects lead to decreasing of MWPENS stiffness and as a result decreasing of DNF. Also, with ignoring the surface/interface density ρ^I,S and Lame’s constants μ^I,S,\u0000respectively the system will have a maximum and minimum DNF than the other parameters and MWPENS respectively will later and sooner than other parameters reach the pull-in voltage.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84644631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-11DOI: 10.46300/9106.2022.16.104
A. Staines
Concurrency is a fundamental problem and a solution applicable to different areas of computing. Given the complexities and distribution of computer systems and services, concurrency is a modern area requiring proper attention. Petri nets are formalisms based on process representation both from a mathematical view and from a graphical or drawing like view. Petri nets are used to model concurrent processes. This work deals with understanding and representing low level concurrency in Petri nets, when this is not always visible and properly noted from the graphical structure. In this study an algebraic notation has been devised and is used to represent the Petri net structures. This algebraic notation is used as an alternative and simplified way of representation. The notation is explained and several simple examples are given. The notation presented can be used in conjunction with other Petri net analysis and verification methods. Some results and findings are discussed.
{"title":"Concurrency and Petri Net Models","authors":"A. Staines","doi":"10.46300/9106.2022.16.104","DOIUrl":"https://doi.org/10.46300/9106.2022.16.104","url":null,"abstract":"Concurrency is a fundamental problem and a solution applicable to different areas of computing. Given the complexities and distribution of computer systems and services, concurrency is a modern area requiring proper attention. Petri nets are formalisms based on process representation both from a mathematical view and from a graphical or drawing like view. Petri nets are used to model concurrent processes. This work deals with understanding and representing low level concurrency in Petri nets, when this is not always visible and properly noted from the graphical structure. In this study an algebraic notation has been devised and is used to represent the Petri net structures. This algebraic notation is used as an alternative and simplified way of representation. The notation is explained and several simple examples are given. The notation presented can be used in conjunction with other Petri net analysis and verification methods. Some results and findings are discussed.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87906557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-11DOI: 10.46300/9106.2022.16.103
Peng Yuan, Liming Lou, Yu Shi, Pengle Cheng, Lei Yan, L. Pang
The detection of veneer surface defects is of great significance to wood veneer material evaluation, quality control, and product classification in the wood processing. When the high-speed moving veneer image is collected on the conveyor belt, the image appears blurred, making it difficult to accurately identify the defect type and estimate the defect area. To solve this problem, this study compared three image restoration methods including unnatural L0 sparse representation (L0), multi-scale convolutional neural network (MSCNN), and scale-recurrent convolutional neural network (SRCNN). To perform the comparison analysis, a wood veneer image acquisition system was developed and it provided a wood veneer image dataset with 2,080 groups of blur-clear veneer image pairs. Analysis results showed that the SRCNN method performed better than the other two methods. At four different wood moving speeds, the peak signal to noise ratio (PSNR) of the SRCNN was 4.64%, 14.63%, 18.48%, and 25.79%, higher than the other two methods and structural similarity (SSIM) was less than 2%. The average time for this algorithm to restore a blurred wood veneer image was 13.4 s. The findings of this study can lay the foundation for the industrialized detection of wood veneer defects.
{"title":"Motion-blurry Image Restoration Method for Detecting Surface Defects of Wood Veneer","authors":"Peng Yuan, Liming Lou, Yu Shi, Pengle Cheng, Lei Yan, L. Pang","doi":"10.46300/9106.2022.16.103","DOIUrl":"https://doi.org/10.46300/9106.2022.16.103","url":null,"abstract":"The detection of veneer surface defects is of great significance to wood veneer material evaluation, quality control, and product classification in the wood processing. When the high-speed moving veneer image is collected on the conveyor belt, the image appears blurred, making it difficult to accurately identify the defect type and estimate the defect area. To solve this problem, this study compared three image restoration methods including unnatural L0 sparse representation (L0), multi-scale convolutional neural network (MSCNN), and scale-recurrent convolutional neural network (SRCNN). To perform the comparison analysis, a wood veneer image acquisition system was developed and it provided a wood veneer image dataset with 2,080 groups of blur-clear veneer image pairs. Analysis results showed that the SRCNN method performed better than the other two methods. At four different wood moving speeds, the peak signal to noise ratio (PSNR) of the SRCNN was 4.64%, 14.63%, 18.48%, and 25.79%, higher than the other two methods and structural similarity (SSIM) was less than 2%. The average time for this algorithm to restore a blurred wood veneer image was 13.4 s. The findings of this study can lay the foundation for the industrialized detection of wood veneer defects.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77960360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-11DOI: 10.46300/9106.2022.16.102
Z. Zubi, Abdul Wahab Mohamed Ibrahim
Recently, the main critical part of all organizational data systems is the security since it is threatened by several network attacks which in turn influences on the world financial system. Thus, the most used system in dealing with networks problems is the Intrusion Detection System (IDS). It is used to monitor the system performance and send alerts when there is anomalous activity existence in which the administrator of the system should respond to these alerts rapidly. In this paper, we proposed a statistical Naïve Bayesian method which will be used in the Intrusion Detection Systems ( IDS) systems in different scenarios such as analyzing the HTTP service based traffic and identify the HTTP normal connections and attacks. On the other hand, a comparative study between them based on the performance parameters will be analyzed in order to determine the most effective and efficient statistical method in detecting various types of attacks.
{"title":"Use of Naive Bayesian Filtering in the Intrusion Detection System (IDS)","authors":"Z. Zubi, Abdul Wahab Mohamed Ibrahim","doi":"10.46300/9106.2022.16.102","DOIUrl":"https://doi.org/10.46300/9106.2022.16.102","url":null,"abstract":"Recently, the main critical part of all organizational data systems is the security since it is threatened by several network attacks which in turn influences on the world financial system. Thus, the most used system in dealing with networks problems is the Intrusion Detection System (IDS). It is used to monitor the system performance and send alerts when there is anomalous activity existence in which the administrator of the system should respond to these alerts rapidly. In this paper, we proposed a statistical Naïve Bayesian method which will be used in the Intrusion Detection Systems ( IDS) systems in different scenarios such as analyzing the HTTP service based traffic and identify the HTTP normal connections and attacks. On the other hand, a comparative study between them based on the performance parameters will be analyzed in order to determine the most effective and efficient statistical method in detecting various types of attacks.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73638157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-11DOI: 10.46300/9106.2022.16.101
C. Kalita, Nupur Choudhury, Aradhana Misra, K. K. Sarma
The primary goal of Vehicular Ad-hoc Network (VANET) technology’s development is to increase road safety and enable Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication in order to share crucial information and prevent road accidents. VANET establishes a mobile network between moving cars by considering each vehicle as a separate entity. Safety applications in VANET are currently receiving a lot of attention from researchers as well as automobile manufacturers. This paper concentrate on simulation-based safety-critical techniques in vehicle networks employing radar and video sensors in various road styles. This paper discusses about how to create a simulation-based driving scenario environment and calculates the fluctuations in sensor detection rates depending on different driving conditions. And also created a basic Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication network. An integrated approach is also proposed to Forward Collision Warning System (FCWS) in different cases.
{"title":"Design of a Basic Vehicular Communication Network using Radar and Camera Sensor with Enhanced Safety Features","authors":"C. Kalita, Nupur Choudhury, Aradhana Misra, K. K. Sarma","doi":"10.46300/9106.2022.16.101","DOIUrl":"https://doi.org/10.46300/9106.2022.16.101","url":null,"abstract":"The primary goal of Vehicular Ad-hoc Network (VANET) technology’s development is to increase road safety and enable Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication in order to share crucial information and prevent road accidents. VANET establishes a mobile network between moving cars by considering each vehicle as a separate entity. Safety applications in VANET are currently receiving a lot of attention from researchers as well as automobile manufacturers. This paper concentrate on simulation-based safety-critical techniques in vehicle networks employing radar and video sensors in various road styles. This paper discusses about how to create a simulation-based driving scenario environment and calculates the fluctuations in sensor detection rates depending on different driving conditions. And also created a basic Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication network. An integrated approach is also proposed to Forward Collision Warning System (FCWS) in different cases.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79060688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-11DOI: 10.46300/9106.2022.16.100
M. García-Planas, L. Um
Steganography, as it is known, is a technique to hide a secret message within a message or collection of data that is not secret, and a problem in mathematics is to decipher the secret included in the message, to solve this problem a good tool It is the theory of codes. Unlike the existing works that use block codes to hide information using the steganographic process, in this work, we propose the use of convolutional coding theory in steganography to encrypt and decrypt messages methods to decrypt messages. Here, we suggest a steganographic protocol based on convolutional codes in which they are defined as discrete linear dynamical systems with which the properties on controllability and observability characteristic of linear systems theory can be applied, in particular the properties of output observability character which can be easily described using matrix language. The proposed decoding algorithm used for dissimulation is a linear decoding method, which has decreased both the time and space complexity, compared to the Viterbi decoding algorithm, sometimes used in other cases; indeed, we go from 2h.n to 2h=2.n, in memory space (with h: constraint height, and n: length of cover object). Moreover, the time complexity is better, while we can also denote that with the convolutional approach, we intend to take advantage of the time-depending transaction.
{"title":"Convolutional Code Theory based Steganography Technique","authors":"M. García-Planas, L. Um","doi":"10.46300/9106.2022.16.100","DOIUrl":"https://doi.org/10.46300/9106.2022.16.100","url":null,"abstract":"Steganography, as it is known, is a technique to hide a secret message within a message or collection of data that is not secret, and a problem in mathematics is to decipher the secret included in the message, to solve this problem a good tool It is the theory of codes. Unlike the existing works that use block codes to hide information using the steganographic process, in this work, we propose the use of convolutional coding theory in steganography to encrypt and decrypt messages methods to decrypt messages. Here, we suggest a steganographic protocol based on convolutional codes in which they are defined as discrete linear dynamical systems with which the properties on controllability and observability characteristic of linear systems theory can be applied, in particular the properties of output observability character which can be easily described using matrix language. The proposed decoding algorithm used for dissimulation is a linear decoding method, which has decreased both the time and space complexity, compared to the Viterbi decoding algorithm, sometimes used in other cases; indeed, we go from 2h.n to 2h=2.n, in memory space (with h: constraint height, and n: length of cover object). Moreover, the time complexity is better, while we can also denote that with the convolutional approach, we intend to take advantage of the time-depending transaction.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":"96 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85376992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-11DOI: 10.46300/9106.2022.16.99
Haixin Wang, Shengsong Wei, Xin Chen, Meijin Zhu, Zuhe Wang
This paper attempts to substitute Resource Leveling Problem (RLP) into multi-project environment and construct Resource Leveling Problem of Multi-project (RLPMP) model with the goal of minimizing the sum of weighted mean square deviations of multi-resource requirements. A two-stage hybrid differential evolution particle swarm optimization algorithm is used to solve the model. In the first stage, differential evolution algorithm is used to produce new individuals, and in the second stage, particle swarm optimization algorithm uses a new speed update formula. In the first stage, in order to ensure that the optimal individual will not be destroyed by crossover and mutation, and to maintain the convergence of differential evolution algorithm, we try to introduce Elitist reservation (ER) strategy into differential evolution algorithm. In the second stage, we use a kind of Particle Swarm Optimization (PSO) algorithm with dynamic inertia weight. Through the dynamic change of inertia weight, the global search and local search ability of the algorithm can be adjusted flexibly. The case verification shows that the hybrid differential evolution particle swarm optimization algorithm can effectively solve the RLPMP model, and then effectively improve the balance of multi-project resources.
{"title":"Hybrid Differential Evolution Particle Swarm Optimization Algorithm for Solving Resource Leveling Problem of Multi-project with Fixed Duration","authors":"Haixin Wang, Shengsong Wei, Xin Chen, Meijin Zhu, Zuhe Wang","doi":"10.46300/9106.2022.16.99","DOIUrl":"https://doi.org/10.46300/9106.2022.16.99","url":null,"abstract":"This paper attempts to substitute Resource Leveling Problem (RLP) into multi-project environment and construct Resource Leveling Problem of Multi-project (RLPMP) model with the goal of minimizing the sum of weighted mean square deviations of multi-resource requirements. A two-stage hybrid differential evolution particle swarm optimization algorithm is used to solve the model. In the first stage, differential evolution algorithm is used to produce new individuals, and in the second stage, particle swarm optimization algorithm uses a new speed update formula. In the first stage, in order to ensure that the optimal individual will not be destroyed by crossover and mutation, and to maintain the convergence of differential evolution algorithm, we try to introduce Elitist reservation (ER) strategy into differential evolution algorithm. In the second stage, we use a kind of Particle Swarm Optimization (PSO) algorithm with dynamic inertia weight. Through the dynamic change of inertia weight, the global search and local search ability of the algorithm can be adjusted flexibly. The case verification shows that the hybrid differential evolution particle swarm optimization algorithm can effectively solve the RLPMP model, and then effectively improve the balance of multi-project resources.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76861550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-10DOI: 10.46300/9106.2022.16.96
N. Papadakis, Dimitris Paraschos
Sonars have been in practical use since the turn of the 20th century. They are considered to be among the most sophisticated engineering systems concerning detection and tracking. Unmanned underwater vehicles have recently evolved to a higher degree of sophistication with enough processing power to run more demanding artificial intelligence (AI) algorithms. This work is focused on the development of a robust signal processing algorithm on board an Autonomous Underwater Vehicle (AUV), named Synoris, enhanced with target identification capabilities. Synoris is able to perform feature extraction, classification and identification using only on board hardware.
{"title":"Synoris: an Unmanned Underwater Platform Based on Hydrophone Arrays for Detection and Tracking From Sound Signatures","authors":"N. Papadakis, Dimitris Paraschos","doi":"10.46300/9106.2022.16.96","DOIUrl":"https://doi.org/10.46300/9106.2022.16.96","url":null,"abstract":"Sonars have been in practical use since the turn of the 20th century. They are considered to be among the most sophisticated engineering systems concerning detection and tracking. Unmanned underwater vehicles have recently evolved to a higher degree of sophistication with enough processing power to run more demanding artificial intelligence (AI) algorithms. This work is focused on the development of a robust signal processing algorithm on board an Autonomous Underwater Vehicle (AUV), named Synoris, enhanced with target identification capabilities. Synoris is able to perform feature extraction, classification and identification using only on board hardware.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":"93 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80443642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-10DOI: 10.46300/9106.2022.16.98
Yadongyang Zhu, Wen-peng Wei
Borehole-surface monitoring can effectively improve the accuracy of the microseismic event location. It is necessary to strictly synchronize the acquisition time of borehole and surface monitoring nodes. However, the synchronization signal transmission through the logging cable will cause a delay. In this paper, a calibration method designed to compensate for the deviation of time synchronization due to long-distance transmission on the logging cable. First, the transmission delay of the pulse per second (PPS) is measured in the delay measurement stage. The delay from the global positioning system (GPS) module to all monitoring nodes can get in sequence. Second, In the delay compensation stage, each monitoring node is delayed for a particular time to ensure that all nodes start working simultaneously. Finally, a high-precision clock source is designed to drive the analog-to-digital converter (ADC) to avoid the crystal oscillator’s accumulated error. To verify the accuracy of the calibration method, the modules were tested separately. The length of the logging cable used is 3000 meters. Through experimental verification, the method in this paper can be used to accurately control the time synchronization of different monitoring nodes in the borehole and on the surface within 1us.
{"title":"Design and Implementation of a High Precision Time Synchronization Method for Borehole-surface Microseismic Monitoring","authors":"Yadongyang Zhu, Wen-peng Wei","doi":"10.46300/9106.2022.16.98","DOIUrl":"https://doi.org/10.46300/9106.2022.16.98","url":null,"abstract":"Borehole-surface monitoring can effectively improve the accuracy of the microseismic event location. It is necessary to strictly synchronize the acquisition time of borehole and surface monitoring nodes. However, the synchronization signal transmission through the logging cable will cause a delay. In this paper, a calibration method designed to compensate for the deviation of time synchronization due to long-distance transmission on the logging cable. First, the transmission delay of the pulse per second (PPS) is measured in the delay measurement stage. The delay from the global positioning system (GPS) module to all monitoring nodes can get in sequence. Second, In the delay compensation stage, each monitoring node is delayed for a particular time to ensure that all nodes start working simultaneously. Finally, a high-precision clock source is designed to drive the analog-to-digital converter (ADC) to avoid the crystal oscillator’s accumulated error. To verify the accuracy of the calibration method, the modules were tested separately. The length of the logging cable used is 3000 meters. Through experimental verification, the method in this paper can be used to accurately control the time synchronization of different monitoring nodes in the borehole and on the surface within 1us.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":"76 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83118372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-10DOI: 10.46300/9106.2022.16.97
A. Stoynova, B. Bonev
This paper discusses the applicability of pulsed and lock-in thermography using Fourier transform processing to diagnose specific types of defects in Multilayer FR-4 Substrates. Digital thermal models of test specimens with different types of defects have been created. Based on the obtained results, the methods are compared in terms of applicability and reliability in defect detection. The results show that by these methods can be detected and characterized in terms of geometric dimensions and type of certain types of specific defects arising in the production of FR-4 multilayer substrates. The presented results show that there is no obstacle to the detection of defects in different layers of the multilayer substrate within the same measurement, as well as the possibility of detecting many types of defects.
{"title":"Active Thermography Diagnostics of Hidden Defects in Multilayer FR-4 Substrates","authors":"A. Stoynova, B. Bonev","doi":"10.46300/9106.2022.16.97","DOIUrl":"https://doi.org/10.46300/9106.2022.16.97","url":null,"abstract":"This paper discusses the applicability of pulsed and lock-in thermography using Fourier transform processing to diagnose specific types of defects in Multilayer FR-4 Substrates. Digital thermal models of test specimens with different types of defects have been created. Based on the obtained results, the methods are compared in terms of applicability and reliability in defect detection. The results show that by these methods can be detected and characterized in terms of geometric dimensions and type of certain types of specific defects arising in the production of FR-4 multilayer substrates. The presented results show that there is no obstacle to the detection of defects in different layers of the multilayer substrate within the same measurement, as well as the possibility of detecting many types of defects.","PeriodicalId":13929,"journal":{"name":"International Journal of Circuits, Systems and Signal Processing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81141246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}