50 research outputs found

    Security in automotive microcontrollers of next generation

    Get PDF
    Information technology – we define broadly as being systems based on digital hardware and software – has gained central importance for many new automotive applications and services.On the production side we observe that the cost for electronics and IT is approaching the 50% threshold of all manufacturing costs.One aspect of modern IT systems has hardly been addressed in the context of automotive applications: IT security. Security is concerned with protection against the manipulation of IT systems by humans. After a brief review of the evolution in the last five years of the IT security in the automotive environment, we will see the state of art of the security features of the automotive microcontrollers.laslty it will be presented an hardware module that ensure the privacy aspect, of the IT security, in a bus communication in an automotive environment

    Additive Manufacturing and Topology Optimization Applied to Impeller to Enhance Mechanical Performance

    Get PDF
    LectureThe paper describes the link between additive manufacturing techniques and topological optimization design process. An overview of Inconel718 printed material characteristics and as printed quality is given Finally expander and compressor topological optimization results are shown highlighting the improvement in stress level and dynamic behavior

    Additive Manufacturing and Topology Optimization Applied to Impeller to Enhance Mechanical Performance

    Get PDF
    LectureThe paper describes the link between additive manufacturing techniques and topological optimization design process. An overview of Inconel718 printed material characteristics and as printed quality is given Finally expander and compressor topological optimization results are shown highlighting the improvement in stress level and dynamic behavior

    Convertible preferred stock in venture capital financing

    No full text
    We develop a model in which cash-constrained entrepreneurs seek a venture capitalist (VC) to finance a new firm. Costly monitoring is employed by VCs to reduce entrepreneurial moral hazard. When monitoring reveals poor performance, VCs want to punish the entrepreneur with liquidation. However, when assets are specific and liquidation would lead to a loss, VCs choose to renegotiate the terms of financing, rather than to liquidate. Renegotiation undermines the threat of liquidation. By giving VCs incentives to monitor and liquidate underperforming projects, the hybrid nature of convertible preferred stock helps reduce this problem. As potential equity holders, VCs are willing to absorb the costs of monitoring because this promotes managerial efficiency and increases expected profits. At the same time, as debt holders, VCs are sheltered from loss in a liquidation because they enjoy seniority with respect to common stock holders
    corecore