Abstract:
A programmable device with an improved system for loading configuration data compresses configuration data by composing configuration data out of pairs of control words and data words. The configuration data is divided into configuration words. Each configuration word is further divided into a number of configuration blocks. In a control word/data word pair, the control word determines which configuration blocks in the configuration word will be loaded with the data word. Each configuration block designated by the control word will be simultaneously loaded with the data word. By taking advantage of the symmetry within the control word, typically only a small number of control word/data word pairs will be required to load a complete control word. If a given control word does not have sufficient symmetry, the programmable device can instead use an alternate system for loading the configuration word.
Abstract:
A bridging fault detection system allows for a high amount of test coverage using a low number of test configurations. The bridging fault detection system automatically creates optimal test configurations and test vectors without the need for precise layout information, and is adaptable to complex programmable device architectures. Testers can specify a precise level of testing coverage to optimize the testing processing. A programmable device with interconnect bias circuitry decreases the number of test configurations and thus the time needed to test for bridging faults. The interconnect bias circuit provides explicit test control over the unused lines in a configuration, driving them both high and low for complete test coverage between each line and all of its possible neighbors. The bridging fault detection system balances the available number of control test points against the number of interconnect segments stitched together by programmable connection to maximize the lines under test per configuration.
Abstract:
A rule-based verification testing methodology automates the process and allows for field deployment of verification testing instrumentation. A rule-based chemical monitoring methodology automates the verification of a chemical being monitored, as well as the instrument and a sample path, increasing the confidence in the verification process. In both methods, at least Raman spectra of a sample are captured, and compared to a model that is based on reference data. Predetermined, flexible, parameterized rules control the comparison. Additional physical properties, such as color and size, may also be compared (also controlled by predetermined rules).
Abstract:
A downhole actuator apparatus that selectively maintains a pressure differential between two pressure regions in a well. The apparatus includes a body defining first and second chambers. A piston is slidably disposed in the body and is selectively moveable between first and second positions. A barrier is disposed in the body to selectively separate the first and second chambers. A fluid is disposed in the first chamber between the barrier and the piston. A control system that is at least partially disposed within the body is operable to generate an output signal responsive to receipt of a predetermined input signal. The output signal is operable to create a failure of the barrier such that at least a portion of the fluid flows from the first chamber to the second chamber and the piston moves from the first position to the second position.
Abstract:
Techniques are provided for isolating failed routing resources on a programmable circuit. Failing test patterns and the test logs are fed to a Statistical Failure Isolation (SFI) tool. The SFI tool extracts failing paths from the test patterns. A statistical analysis is performed on interconnect resources related to failing paths. The resources on the paths are then tallied to create a histogram of resources. These resources are then be fed into an Adaptive Failure Isolation (AFI) tool to auto-generate verification patterns. A tester uses the verification patterns to isolate failed interconnect resources.
Abstract:
An optical fiber management system for a remotely operated vehicle (ROV) includes a spool containing a length of optical cable, a motor coupled to the spool, a motor controller, a speed sensor and a feed mechanism. The motor controller can detect the speed of the ROV through water and control the rotational speed of the motor so that the optical cable is removed from the spool at a speed that is equal to or greater than the speed of the ROV. A feed mechanism is used to apply a tension to the optical cable so that it is removed from the spool and emitted from the ROV without becoming tangled.
Abstract:
Programmable circuits have a programmable interconnect structure that connects programmable circuit elements. Tests patterns can be automatically generated for the programmable circuit elements and interconnections on a programmable circuit. A connectivity graph represents programmable interconnections and functions as nodes. Tests routes are generated that connect the nodes in the connectivity graph between control points and observation points on the programmable circuit. The routes are grouped into configuration patterns that can be tested in one test cycle. Test vectors are then applied to the routes to determine if the interconnects and circuit functions are operable. Systems and methods of the present invention automatically create test patterns for a programmable circuit to reduce engineer time. The present invention also reduces test time and resources by increasing the number of interconnections and circuit elements tested in each configuration pattern.
Abstract:
Systems and methods are provided for marking integrated circuit defects on wafers to facilitate failure analysis. A wafer containing integrated circuits can be tested using a tester. Test data from the tester can be analyzed using integrated circuit design files to identify suspected faults. A fault location program can be used to identify the physical location of the faults. The fault location program uses information on the faults identified and CAD file information on the physical layout of the integrated circuit to map identified faults to actual physical positions. The fault location program may also generate laser control files. The laser control files can be used to control a laser system so that the laser system creates laser marks on the wafer surrounding each of the faults. The marked faults can be polished and examined under an electron microscope or analyzed using other failure analysis tools.
Abstract:
A cable containing an optical fiber is used to transmit data between an underwater remotely operated vehicle (ROV) and a support vessel floating on the surface of the water. The ROV stores the cable on a spool and releases the cable into the water as the ROV dives away from the support vessel. The ROV detects the tension in the cable and the rate that the cable is released from the ROV is proportional to the detected tension in the cable. After the ROV has completed the dive and retrieved by the support vessel, the cable can be retrieved from the water and rewound onto the spool in the ROV.
Abstract:
The probability of a computer file being malware is inferred by iteratively propagating domain knowledge among computer files, related clients, and/or related source domains. A graph is generated to include machine nodes representing clients, file nodes representing files residing on the clients, and optionally domain nodes representing source domains hosting the files. The graph also includes edges connecting the machine nodes with the related file nodes, and optionally edges connecting the domain nodes with the related file nodes. Priors and edge potentials are set for the nodes and the edges based on related domain knowledge. The domain knowledge is iteratively propagated and aggregated among the connected nodes through exchanging messages among the connected nodes. The iteration process ends when a stopping criterion is met. The classification and associated marginal probability for each file node are calculated based on the priors, the received messages, and the edge potentials associated with the edges through which the messages were received.