A non-intrusive method to make safe existing PLC Program

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusive and non-intrusive watermarking

“Can we watermark without perturbing an image?” We present the salient results of the investigation carried out to find an answer to this question.

متن کامل

A Non-Intrusive Method for Monitoring the Degradation of MOSFETs

Highly reliable embedded systems have been widely applied in the fields of aerospace, nuclear power, high-speed rail, etc., which are related to security and economic development. The reliability of the power supply directly influences the security of the embedded system, and has been the research focus of numerous electronic information and energy studies. The degradation of power modules occu...

متن کامل

A Non-Intrusive Approach to Gaze Estimation

Human eye tracking and gaze estimation is a new technology which acts as an interface between the user and the computer. Its main goal is to determine where a user is looking on the computer screen. Numerous methods have been developed to accomplish this task. However, they need expensive and proprietary hardware, or require the user to wear a device on his/her head, or place limitations on the...

متن کامل

A Non-intrusive Method for Copy-Move Forgery Detection

The issue of verifying the authenticity and integrity of digital images is becoming increasingly important. Copy-move forgery is one type of image tempering that is commonly used for manipulating digital content; in this case, some part of an image is copied and pasted on another region of the image. Using a non-intrusive approach to solve this problem is becoming attractive because it does not...

متن کامل

Hardware extensions to make lazy subscription safe

Transactional Lock Elision (TLE) uses Hardware Transactional Memory (HTM) to execute unmodified critical sections concurrently, even if they are protected by the same lock. To ensure correctness, the transactions used to execute these critical sections “subscribe” to the lock by reading it and checking that it is available. A recent paper proposed using the tempting “lazy subscription” optimiza...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IFAC-PapersOnLine

سال: 2015

ISSN: 2405-8963

DOI: 10.1016/j.ifacol.2015.09.547