The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Every nation dreams for highly efficient and economical type of energy production units. The scenario of power sector is inversely proportional as far as the generation and demand of power is concern. In India, normally the power plants run on the availability of fuel and consumers. Majority of the power generation units are fuel based in Indian power sector. There are so many types of fuel but coal...
ITER will explore a plasma parameter envelope currently not available in tokamaks. This will require a set of diagnostics that can follow this envelope. To implement these diagnostics in a reliable and robust way requires development of current techniques in many areas to make them applicable to ITER: they need to be operable in the ITER environment and satisfy the physics and engineering requirements...
Multiprocessor system on chip (MPSoC) architecture is rapidly gaining momentum for modern embedded devices. The vulnerabilities in software on MPSoCs are often exploited to cause software attacks, which are the most common type of attacks on embedded systems. Therefore, we propose an MPSoC architectural framework, CUFFS, for an application specific instruction set processor (ASIP) design that has...
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Previous attempts to detect code injection in MPSoCs have been burdened with significant performance overheads. In this work, we present a hardware/software methodology "SHIELD" to detect code injection attacks in MPSoCs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.