Everything from needs to luxuries has been impacted by the COVID-19 pandemic in the manufacturing sector, and that includes the automotive industry. Thus, there is an immediate need for research into the automotive su...
详细信息
Using electrical energy in lighting systems in public and private facilities is extensive. Given that the available energy supply is minimal, it is necessary to save energy;one way to reduce the energy used is to util...
详细信息
Dynamic systems with evolving graph topologies arise in applications such as power grids and sensor networks. Conventional graph signal estimation methods often assume fixed topologies, limiting their applicability in...
详细信息
To address the challenge posed by the presence of a transformer, this particular paper introduces a novel auxiliary cell based quadratic DC-DC converter designed to maximize power extraction from solar PV systems and ...
详细信息
In this article, we propose a novel protocol that employs different technologies together, such as software Defined Network (SDN) for the purpose of offering scalability, programmability, and global network informatio...
详细信息
software defect prediction is the methodical process of identifying code segments that are likely to have problems. This is done by analyzing software metrics and using categorization algorithms. This work introduces ...
详细信息
We introduce a novel copy-protection method for industrial control software. With our method, a program executes correctly only on its target hardware and behaves differently on other machines. The hardware-software b...
详细信息
ISBN:
(纸本)9783031396885;9783031396892
We introduce a novel copy-protection method for industrial control software. With our method, a program executes correctly only on its target hardware and behaves differently on other machines. The hardware-software binding is based on Physically Unclonable Functions (PUFs). We use symbolic execution to guarantee the preservation of safety properties if the software is executed on a different machine, or if there is a problem with the PUF response. Moreover, we show that the protection method is also secure against reverse engineering.
Insider threats, one of the most challenging cyber threats, often result in significant organizational losses. This study explores the correlation between suspicious users and job roles vulnerable to insider threats. ...
详细信息
Theoretical and finite element analysis of four coupled inductor structures based on the common cores suitable for Boost Extender topology is presented. The impact of each setup on the boost extender topology is evalu...
详细信息
Independent code generation models produced by generative AI provide a new way to software development. These models automatically generate code using machine learning based on input samples. This study examines the f...
详细信息
暂无评论