Detectors
1,685 Followers
Recent papers in Detectors
We investigate the performance of an automatic frequency control loop operating in a receiver for linearly modulated digital signals. The loop uses a balanced quadricorrelator as a frequency detector, and we address the design of such a... more
This paper discusses the design and implementation of frequency offset estimation algorithms for DOCSIS upstream channels. A cost-effective estimator which approaches the Cramer-Rao bound for high SNRs is derived. The effect of ISI... more
We report an ultracompact label-free biosensor that uses a vertical-cavity surface-emitting laser (VCSEL)-based measurement system for the characterization of biomolecular interactions. It consists of a VCSEL, a plastic guided-mode... more
A novel feature region selection method for robust digital image watermarking is proposed in this paper. This method aims to select a nonoverlapping feature region set, which has the greatest robustness against various attacks and can... more
In this work, we present a method for approximating constrained maximum entropy (ME) reconstructions of SPECT data with modifications to a block-iterative maximum a posteriori (MAP) algorithm. Maximum likelihood (ML)-based reconstruction... more
This paper presents a new Design for Testability (DFT) technique for Current-Mode Logic (CML) circuits. This new technique, with little overhead, using built-in detectors, monitors all gate output swings and flags all abnormal voltage... more
A new capacitance sensor system was developed with a microcontroller, commercial humidity and temperature sensors, a capacitance-to-digital converter, and a custom-built capacitance sensor. The performance of the system was evaluated by... more
Intravenous (IV) therapy has been included as an integral part of nurse's professional practice. Although it is an effective curing technique, it has some complications. Air embolism is one of such complications which may cause death of... more
Amphibious vehicles have long been recognized as important logistic tools for the armed forces. The ability to provide a single vehicle supply line over land and water make them the most direct, adaptable, and cost effective method for... more
hannel coding is an error-control technique used for providing robust data transmission through imperfect channels by adding redundancy to the data. There are two important classes of such coding methods: block and convolutional. For this... more
A new technique of color detection based on time-resolved charge collection during transient response measurement using a hydrogenated amorphous silicon detector has been proposed and experimentally demonstrated. The method based on the... more
In this paper, we present a low-complexity, near maximum-likelihood (ML) performance achieving detector for large MIMO systems having tens of transmit and receive antennas. Such large MIMO systems are of interest because of the high... more
We demonstrate the measurement of optical frequency differences between Q-switched laser pulses by using photo-electromotive-force (photo-EMF) optical frequency sensors. The presence of high-peak-power laser pulses affords the photo-EMF... more
Geant4 is a very large, highly accurate toolkit for Monte Carlo simulation of particle-matter interaction. It has been applied to high-energy physics, cosmic ray modeling, radiation shields, radiation therapy, mine detection, and other... more
Corner detection is widely used in image processing and machine vision. Hence, different corner detectors are proposed. But the performance of such corner detectors is sensitive to round effect and curve shape of the edges. In this paper... more
This paper presents time-of-occurrence (phase) distributions of individual pulsating partial discharges (PDs) which occur in a pointdielectric gap in air for ac voltage conditions. It is determined that the pulse phase distribution is... more
Image representation using bag of visual words approach is commonly used in image classification. Features are extracted from images and clustered into a visual vocabulary. Images can then be represented as a normalized histogram of... more
This letter proposes a modification to the Least-Significant-Bit (LSB) matching, a steganographic method for embedding message bits into a still image. In the LSB matching the choice of whether to add or subtract one from the cover image... more
Several commercial GaAlAs and InGaAsP injection lasers have been investigated with respect to their photodetection properties. The responsivity of the laser diode detectors is in the 0.15-0.25 AIW range and the dark current ranges from 5... more
Face to face communication is a real-time process operating at a a time scale in the order of 40 milliseconds. The level of uncertainty at this time scale is considerable, making it necessary for humans and machines to rely on sensory... more
A continual challenge in the field of chemical detection is the development of approaches to designing microsensors and microsensor-based detectors with high selectivity.
1. Introduction to observational methods, 2. Coding schemes and observational measurement, 3. Recording observational data, 4. Representing observational data, 5. Observer agreement and Cohen's kappa, 6. Kappas for point-by-point... more
Since Robotics is the field concerned with the connection of perception to action, Artificial Intelligence must have a central role in Robotics if the connection is to be intelligent. Artificial Intelligence addresses the crucial... more
The aim of this paper is to present an acquisition system and experimental measurements of a new micromachined Thermal Conductivity Detector (µTCD), applied downstream of a gas-chromatography (GC) system. We describe simple and innovative... more
The development of energy selective, photon counting X-ray detectors allows for a wide range of new possibilities in the area of computed tomographic image formation. Under the assumption of perfect energy resolution, here we propose a... more
Information flow in a telecommunication network is accomplished through the interaction of mechanisms at various design layers with the end goal of supporting the information exchange needs of the applications. In wireless networks in... more
In this paper a fractal analysis study of VoIP traffic is presented. The characteristics of measured VoIP traffic on both call and packet level have been investigated. The results support the popular Poisson process for VoIP call arrival... more
Özetçe -Bu bildiride, Zemax 13 yazılımı aracılıgı ile görünür ışık haberleşmesi (visible light communication, VLC) kanalları karakterize edilecektir. Yaklaşımımızda, ölçülerini tanımlayacagımız iç mekân ortamı üçboyutlu olarak Zemax 'da... more
This paper describes a face detection framework that is capable of processing images extremely rapidly while achieving high detection rates. There are three key contributions. The first is the introduction of a new image representation... more
This paper presents a methodology for automating the processingof highway pavement video images using an integration of artificial neural network models with conventional image-processing techniques. The methodology developed is able to... more
In this paper, a quasi-peak detector mode for a time-domain electromagnetic interference (TDEMI) measurement system is described. Measurements were performed in the 30-1000-MHz range. The digital signal processing of EMI measurements can... more
The goal of the Laser Interferometric Gravitational-Wave Observatory (LIGO) is to detect and study gravitational waves of astrophysical origin. Direct detection of gravitational waves holds the promise of testing general relativity in the... more
Students use mobile-phones to store lecture-materials, e-books, tutorials, videos, communicate with their classmates and browse the internet for exceedingly-different-intentions. These projected-advantages, however, would have... more
Previously, researchers were trying to replace the copper wires with the optical technology. They used photons instead of electrons to carry out the data within machines. The future of IC industry depends upon the speed and bandwidth... more
Current intrusion detection systems (IDS) generate a large number of specific alerts, but do not provide actionable information. Many times, these alerts must be analyzed by a network defender, a time consuming and tedious task which can... more
Due to the growing changes in the electrical network related to the new distributed generation scheme and the integration of renewable energy sources, new requirements for grid-connected power converters are being defined in the new grid... more
Humanitarian demining aims for a total clearance of all types of landmines from infected areas and infrastructures as efficiently and as safely and as rapidly as possible while keeping cost to minimum. It requires that each individual... more
Plagiarism is one form of academic dishonesty, which is often done by students in programming classes. In a large class, detecting plagiarism manually is both difficult and time-consuming、especially due to the numerous modifications of... more
The Canny edge detector is a very popular and effective edge feature detector that is used as a pre-processing step in many computer vision algorithms. It is a multi-step detector which performs smoothing and filtering, non-maxima... more
Due to the growing changes in the electrical network related to the new distributed generation scheme and the integration of renewable energy sources, new requirements for grid-connected power converters are being defined in the new grid... more
Free space optical (FSO) communication is an upgraded supplement to existing wireless technologies. FSO technology leads vast modulation bandwidth, unlicensed spectrum, cost effective deployment, quick redeploy and much more. FSO systems... more