A non-intrusive method to make safe existing PLC Program
نویسندگان
چکیده
منابع مشابه
Intrusive and non-intrusive watermarking
“Can we watermark without perturbing an image?” We present the salient results of the investigation carried out to find an answer to this question.
متن کاملA Non-Intrusive Method for Monitoring the Degradation of MOSFETs
Highly reliable embedded systems have been widely applied in the fields of aerospace, nuclear power, high-speed rail, etc., which are related to security and economic development. The reliability of the power supply directly influences the security of the embedded system, and has been the research focus of numerous electronic information and energy studies. The degradation of power modules occu...
متن کاملA Non-Intrusive Approach to Gaze Estimation
Human eye tracking and gaze estimation is a new technology which acts as an interface between the user and the computer. Its main goal is to determine where a user is looking on the computer screen. Numerous methods have been developed to accomplish this task. However, they need expensive and proprietary hardware, or require the user to wear a device on his/her head, or place limitations on the...
متن کاملA Non-intrusive Method for Copy-Move Forgery Detection
The issue of verifying the authenticity and integrity of digital images is becoming increasingly important. Copy-move forgery is one type of image tempering that is commonly used for manipulating digital content; in this case, some part of an image is copied and pasted on another region of the image. Using a non-intrusive approach to solve this problem is becoming attractive because it does not...
متن کاملHardware extensions to make lazy subscription safe
Transactional Lock Elision (TLE) uses Hardware Transactional Memory (HTM) to execute unmodified critical sections concurrently, even if they are protected by the same lock. To ensure correctness, the transactions used to execute these critical sections “subscribe” to the lock by reading it and checking that it is available. A recent paper proposed using the tempting “lazy subscription” optimiza...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IFAC-PapersOnLine
سال: 2015
ISSN: 2405-8963
DOI: 10.1016/j.ifacol.2015.09.547