46 research outputs found

    Security in automotive microcontrollers of next generation

    Get PDF
    Information technology – we define broadly as being systems based on digital hardware and software – has gained central importance for many new automotive applications and services.On the production side we observe that the cost for electronics and IT is approaching the 50% threshold of all manufacturing costs.One aspect of modern IT systems has hardly been addressed in the context of automotive applications: IT security. Security is concerned with protection against the manipulation of IT systems by humans. After a brief review of the evolution in the last five years of the IT security in the automotive environment, we will see the state of art of the security features of the automotive microcontrollers.laslty it will be presented an hardware module that ensure the privacy aspect, of the IT security, in a bus communication in an automotive environment

    Additive Manufacturing and Topology Optimization Applied to Impeller to Enhance Mechanical Performance

    Get PDF
    LectureThe paper describes the link between additive manufacturing techniques and topological optimization design process. An overview of Inconel718 printed material characteristics and as printed quality is given Finally expander and compressor topological optimization results are shown highlighting the improvement in stress level and dynamic behavior

    Additive Manufacturing and Topology Optimization Applied to Impeller to Enhance Mechanical Performance

    Get PDF
    LectureThe paper describes the link between additive manufacturing techniques and topological optimization design process. An overview of Inconel718 printed material characteristics and as printed quality is given Finally expander and compressor topological optimization results are shown highlighting the improvement in stress level and dynamic behavior

    Convertible preferred stock in venture capital financing

    No full text
    We develop a model in which cash-constrained entrepreneurs seek a venture capitalist (VC) to finance a new firm. Costly monitoring is employed by VCs to reduce entrepreneurial moral hazard. When monitoring reveals poor performance, VCs want to punish the entrepreneur with liquidation. However, when assets are specific and liquidation would lead to a loss, VCs choose to renegotiate the terms of financing, rather than to liquidate. Renegotiation undermines the threat of liquidation. By giving VCs incentives to monitor and liquidate underperforming projects, the hybrid nature of convertible preferred stock helps reduce this problem. As potential equity holders, VCs are willing to absorb the costs of monitoring because this promotes managerial efficiency and increases expected profits. At the same time, as debt holders, VCs are sheltered from loss in a liquidation because they enjoy seniority with respect to common stock holders

    A new hardware implementation of the advanced encryption standard algorithm for automotive applications

    No full text
    Modern cars are no longer mere mechanical devices and they are dominated by a large number of IT systems that guide a wide number of embedded systems called Electronic Control Unit (ECU). While this transformation has driven major advancements in efficiency and safety, it has also introduced a range of new potential risks. After a brief introduction of the security in automotive environment we investigate how the automotive community approached this problem. In order to ensure some security aspects in automotive environment, it is needed a hardware implementation of the Advanced Encryption Standard (AES) algorithm with higher speed throughput than existing solutions. For this purpose, a new hardware implementation of this cryptographic algorithm is presented. The implementation results are compared with previous works

    Cavitand-Based Coordination Cages: Achievements and Current Challenges

    No full text
    The research results obtained in the self-assembly of cavitand-based coordination cages are presented. Cavitands are ideal multidentate ligands for the creation of coordination cages due to their structural rigidity, concave structure, and great versatility in terms of synthetic modularity. The introduction of the ligand moieties on the resorcinarene building block proceeds at the upper rim of the cavity, to take full advantage of the structural rigidity of the cavitand scaffold. Two different synthetic strategies are employed for the formation of multidentate cavitand ligands: (a) functionalization at the apical positions and (b) introduction of the ligands as bridging units. The key features to control the cage self-assembly process emerging from this overview are the preorganization, for the cavitands, and kinetic versus thermodynamic stability of the resulting complexes, for the connecting metal. The versatility of this class of coordination cages is demonstrated by the formation of their heterotopic and heteronuclear versions, as well as their self-assembly on gold and silicon surfaces. Desymmetrization of the cages is appealing because of the resulting differentiation of the inner cavities in terms of shape and interactivity, while surface self-assembly represents an important opportunity to expand the application range of these objects
    corecore