17,970 results on '"REVERSE engineering"'
Search Results
2. Linear Time Reconstruction of Parameterized Strings from Parameterized Suffix and LCP Arrays for Constant-Sized Alphabets
- Author
-
Amir, Amihood, Kondratovsky, Eitan, Marcus, Shoshana, Sokol, Dina, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Lipták, Zsuzsanna, editor, Moura, Edleno, editor, Figueroa, Karina, editor, and Baeza-Yates, Ricardo, editor
- Published
- 2025
- Full Text
- View/download PDF
3. Preoperative definition and new concept design of 3D printed buttress model to seal skull base after endoscopic endonasal surgery
- Author
-
Papallo, Ida, Solari, Domenico, Onofrio, Ilaria, Ugga, Lorenzo, Cuocolo, Renato, Martorelli, Massimo, Russo, Teresa, Bove, Ilaria, Cavallo, Luigi Maria, and Gloria, Antonio
- Published
- 2024
- Full Text
- View/download PDF
4. The 3D photogrammetry approach of tiny model using the rotative scanning
- Author
-
Fawzy, Hossam El-Din, Badawy, Maher, and Farhan, Magda
- Published
- 2024
- Full Text
- View/download PDF
5. Systems engineering barriers to legacy system evolution: Legacy system assessment.
- Author
-
Terry, Sian and Chandrasekar, V.
- Abstract
This study evaluates the effectiveness of common engineering processes in conducting system assessments, with a focus on legacy system assessments, which are currently a barrier to legacy system evolution. These processes include reverse systems engineering (RSE), which remains in its infancy, and more established processes such as software and hardware reverse engineering. The study assesses these methods to better understand their ability to define systems of interest and meet the criteria set by the four horsemen of traditional systems engineering, as defined by Rebovich and White, and the International Council of Systems Engineering. Additionally, RE techniques are reviewed to ensure that a formal, systems‐level process—with detailed steps and diagrams—is documented and accessible to systems or reverse engineers. Lastly, this investigation elucidates the ability of each reverse engineering process to discover, recover, or reproduce information pertaining to the systems of interest that is missing, incomplete, or outdated in documentation relevant to the development or operations of that system. This information can be used to better understand the areas of RSE that still need to be developed and aid in the maturation of a repeatable process that is applicable to legacy systems. The results of this study are expected to contribute to the further development of the Enterprise Lifecycle Model proposed by Terry and Chandrasekar. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Darwinian Evolution of Self-Replicating DNA in a Synthetic Protocell.
- Author
-
Abil, Zhanar, Restrepo Sierra, Ana María, Stan, Andreea R., Châne, Amélie, del Prado, Alicia, de Vega, Miguel, Rondelez, Yannick, and Danelon, Christophe
- Subjects
BIOLOGICAL evolution ,DNA replication ,ARTIFICIAL chromosomes ,PROTEIN synthesis ,REVERSE engineering - Abstract
Replication, heredity, and evolution are characteristic of Life. We and others have postulated that the reconstruction of a synthetic living system in the laboratory will be contingent on the development of a genetic self-replicator capable of undergoing Darwinian evolution. Although DNA-based life dominates, the in vitro reconstitution of an evolving DNA self-replicator has remained challenging. We hereby emulate in liposome compartments the principles according to which life propagates information and evolves. Using two different experimental configurations supporting intermittent or semi-continuous evolution (i.e., with or without DNA extraction, PCR, and re-encapsulation), we demonstrate sustainable replication of a linear DNA template – encoding the DNA polymerase and terminal protein from the Phi29 bacteriophage – expressed in the 'protein synthesis using recombinant elements' (PURE) system. The self-replicator can survive across multiple rounds of replication-coupled transcription-translation reactions in liposomes and, within only ten evolution rounds, accumulates mutations conferring a selection advantage. Combined data from next-generation sequencing with reverse engineering of some of the enriched mutations reveal nontrivial and context-dependent effects of the introduced mutations. The present results are foundational to build up genetic complexity in an evolving synthetic cell, as well as to study evolutionary processes in a minimal cell-free system. The construction of a synthetic cell will be contingent on the development of an evolvable genetic replicator. Here, authors create a Darwinian protocell that supports protein synthesis, DNA self-replication, and adaptive evolution. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Supercomputer framework for reverse engineering firing patterns of neuron populations to identify their synaptic inputs.
- Author
-
Chardon, Matthieu K., Wang, Y. Curtis, Garcia, Marta, Besler, Emre, Beauchamp, J. Andrew, D'Mello, Michael, Powers, Randall K., and Heckman, Charles J.
- Subjects
- *
REVERSE engineering , *FIRE protection engineering , *SUPERCOMPUTERS , *NEUROMODULATION , *NEURONS - Abstract
In this study, we develop new reverse engineering (RE) techniques to identify the organization of the synaptic inputs generating firing patterns of populations of neurons. We tested these techniques in silico to allow rigorous evaluation of their effectiveness, using remarkably extensive parameter searches enabled by massively-parallel computation on supercomputers. We chose spinal motoneurons as our target neural system, since motoneurons process all motor commands and have well-established input-output properties. One set of simulated motoneurons was driven by 300,000+ simulated combinations of excitatory, inhibitory, and neuromodulatory inputs. Our goal was to determine if these firing patterns had sufficient information to allow RE identification of the input combinations. Like other neural systems, the motoneuron input-output system is likely non-unique. This non-uniqueness could potentially limit this RE approach, as many input combinations can produce similar outputs. However, our simulations revealed that firing patterns contained sufficient information to sharply restrict the solution space. Thus, our RE approach successfully generated estimates of the actual simulated patterns of excitation, inhibition, and neuromodulation, with variances accounted for ranging from 75-90%. It was striking that nonlinearities induced in firing patterns by the neuromodulation inputs did not impede RE, but instead generated distinctive features in firing patterns that aided RE. These simulations demonstrate the potential of this form of RE analysis. It is likely that the ever-increasing capacity of supercomputers will allow increasingly accurate RE of neuron inputs from their firing patterns from many neural systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Recent regulatory developments in EU Medical Device Regulation and their impact on biomaterials translation.
- Author
-
Jurczak, Klaudia M., Boon, Torben A. B., Devia‐Rodriguez, Raul, Schuurmann, Richte C. L., Sjollema, Jelmer, Huizen, Lidia, De Vries, Jean‐Paul P. M., and Rijn, Patrick
- Subjects
- *
INTERNATIONAL unification of law , *MEDICAL laws , *GENETIC translation , *REVERSE engineering , *MEDICAL research personnel , *MEDICAL equipment - Abstract
We envision this work to assist researchers and medical device developers (beside other stakeholders) to better understand biomaterial‐based medical device development and its approval process proposed by the new MDR and IVDR in the European Union, as more complex biomaterials emerge, with the MDR reflecting the progress in biomaterial discoveries. Additionally, insufficient international harmonization in regulatory laws and poor‐quality data reporting contribute to the problem. This review describes the possible reasons for a slowing biomaterials translational trend observed over the past decades, focusing on the European Market, and suggests a feasible approach for biomaterials‐based medical device translation into the clinic. Suitable solutions to upgrade biomaterial translation to the clinic have not yet been provided by the field: no additional hurdles should be imposed for researchers, clinicians, the medical device industry, and insurance companies, which all should collaborate on bringing innovative solutions to patients. The new MDR and IVDR represent a substantial advancement in ensuring patient safety and reflect a major step forward in healthcare. However, they should not constrain innovation in biomaterials‐based medical device development. Incorporating reverse engineering from patient safety and a ‘safe by design’ (SbD) strategy early into medical device development might lead to a smoother and successful approval process. A solid R&D phase, with an emphasis on device safety and performance assessment, is fundamental to ensure an effective transition into the clinic. We offer an overview of the recently implemented regulations on medical devices and in vitro diagnostics across the EU, describing a shifting paradigm in the field of biomaterials discovery. As more complex biomaterials emerge, suitable regulations will be necessary to keep bringing safe and well‐performing medical solutions to patients. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Optical dromions for <italic>M</italic>-fractional Kuralay equation via complete discrimination system approach along with sensitivity analysis and quasi-periodic behavior.
- Author
-
Abbas, Syed Oan, Shabbir, Sana, Rizvi, Syed T. R., and Seadawy, Aly R.
- Subjects
- *
REVERSE engineering , *OPTICAL fibers , *NONLINEAR optics , *FERROMAGNETIC materials , *TRIGONOMETRIC functions - Abstract
This paper investigates new analytical wave solutions for the fractional Kuralay-IIB equations (FK-IIBE), including a new definition of the fractional derivative. This model works in disciplines such as ferromagnetic materials, optical fibers, wave mixing, and nonlinear optics. The integrable motion of space curves can be determined by our governing model. This research holds great importance in the area of optical fibers, exact and analytical solitons solution. The polynomial method’s complete discrimination system (CDSPM) is used to identify a variety of exact and analytical soliton solutions such as periodic, hyperbolic, rational, Jacobian elliptic (JE), and trigonometric functions. Additionally, we also convert the JE function into a solitary wave (SW) solution. To provide a comprehensive understanding of the dynamic aspects of the system, we also address bifurcation points, quasi-periodic behavior, sensitivity analysis, Poincarè maps, time series profile, and critical solution conditions. The research offers straightforward, efficient algorithms that can consistently and effectively address FK-IIBE. Machine learning technologies are also utilized to satisfy the criteria defined by dynamic analysis. Python regression learner tools are used for reverse engineering to analyze the mathematical model’s equilibrium based on parameter intervals and thresholds determined by dynamical analysis. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Reverse-engineered models reveal differential membrane properties of autonomic and cutaneous unmyelinated fibers.
- Author
-
Thio, Brandon J., Titus, Nathan D., Pelot, Nicole A., and Grill, Warren M.
- Subjects
- *
ACTION potentials , *PARTICLE swarm optimization , *PERIPHERAL nervous system , *ION channels , *REVERSE engineering , *BIOELECTRONICS - Abstract
Unmyelinated C-fibers constitute the vast majority of axons in peripheral nerves and play key roles in homeostasis and signaling pain. However, little is known about their ion channel expression, which controls their firing properties. Also, because of their small diameters (~ 1 μm), it has not been possible to characterize their membrane properties using voltage clamp. We developed a novel library of isoform-specific ion channel models to serve as the basis functions of our C-fiber models. We then developed a particle swarm optimization (PSO) framework that used the isoform-specific ion channel models to reverse engineer C-fiber membrane properties from measured autonomic and cutaneous C-fiber conduction responses. Our C-fiber models reproduced experimental conduction velocity, chronaxie, action potential duration, intracellular threshold, and paired pulse recovery cycle. The models also matched experimental activity-dependent slowing, a property not included in model optimization. We found that simple conduction responses, characterizing the action potential, were controlled by similar membrane properties in both the autonomic and cutaneous C-fiber models, but complicated conduction response, characterizing the afterpotenials, were controlled by differential membrane properties. The unmyelinated C-fiber models constitute important tools to study autonomic signaling, assess the mechanisms of pain, and design bioelectronic devices. Additionally, the novel reverse engineering approach can be applied to generate models of other neurons where voltage clamp data are not available. Author summary: Computational models of axons play an important role in studying neural signaling and developing therapeutic electrical stimulation devices. While robust models of large myelinated axons exist, models of unmyelinated C-fibers do not adequately reproduce experimental conduction responses. C-fibers constitute the vast majority of axons in peripheral nerves and play key roles in homeostasis and signaling pain, but because of their small diameters (~ 1 μm), it has not been possible to characterize their membrane properties using voltage clamp. We used particle swarm optimization and a novel library of isoform-specific ion channel models to reverse engineer C-fiber membrane properties from measured autonomic and cutaneous C-fiber conduction responses. Our C-fiber models reproduced experimental conduction velocity, chronaxie, action potential duration, intracellular threshold, paired pulse recovery cycle, and activity dependent slowing. The models constitute important tools to study autonomic signaling, assess the mechanisms of pain, and design bioelectronic devices. Additionally, the novel reverse engineering approach can be applied to generate models of other neurons where voltage clamp data are not available. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. The Effect of Image Count on Accuracy in Digital Measurements in Dentistry.
- Author
-
Güntekin, Neslihan, Çiftçi, Aslı, Gözen, Mehmet, and İleri, Sema Ateşalp
- Subjects
- *
REVERSE engineering , *ONE-way analysis of variance , *PLASTER , *MAXILLA , *SCANNING systems - Abstract
Objective: This study investigated how the number of images collected for digital measurements in dentistry affects accuracy compared with traditional methods. Methods: A Frasaco maxillary model was scanned using a SHINING 3D AutoScan-DS-MIX dental 3D scanner to create an STL file. The maxilla was molded 10 times using polyvinyl siloxane (Zhermack Elite HD+) to produce plaster models, which were scanned with the same reference scanner to generate 10 STL files. The Frasaco model was scanned 10 times, capturing images in intervals of 800–1000, 1000–1200, and 1200–1500 using a 3Shape TRIOS 3 intraoral scanner, creating additional STL files. These were analyzed with reverse engineering software. Results: The most accurate measurements were obtained using 1200–1500 images. Conventional impression techniques performed significantly worse. There was a significant difference between the groups Digital 1200–1500 and Plaster (p < 0.001) and between Digital 800–1000 and Plaster (p = 0.007). No significant difference was found when the digital groups were compared among themselves. There was also no significant difference between the Plaster and Digital 1000–1200 groups. To compare precision values that were normally distributed across three or more methods, a one-way ANOVA was used. Trueness values that were not normally distributed with three or more methods were compared employing the Kruskal–Wallis test. Conclusions: Different image counts affect digital measurement accuracy. The most accurate measurements were obtained when collecting 1200–1500 images. Conventional impression techniques were shown to perform significantly worse than digital impression. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Modeling of the Fourth-Generation Toyota Prius Traction Machine as the Reference for Future Designs.
- Author
-
Gierczynski, Michal, Jakubowski, Rafal, Kupiec, Emil, Seredynski, Miroslaw, Jaworski, Maciej, and Grzesiak, Lech M.
- Subjects
- *
REVERSE engineering , *PERMANENT magnet motors , *FINITE element method , *AUTOMOBILE industry , *TORQUE measurements - Abstract
The automotive market is very competitive and demands consistently improving the technologies used and reducing the product cost and dimensions with each product model iteration. Hence, it is important to have access to well-defined reference designs of high-quality products to evaluate new ideas and technologies. This paper provides readers with a numerical model of such a high-quality product, i.e., the IPMSM-type traction motor from the fourth generation of the Toyota Prius hybrid transaxle. The presented results also serve for a discussion regarding the design decisions of the Toyota engineers and the applicability of the linearized machine model for the approximated torque calculations. In the introductory section, a brief history of the Prius model and references to the reverse engineering reports are given. Afterward, the machine dimensions, material properties, and winding configuration are described. Then, the model is validated with the torque measurements at constant speed. The simulation results are presented in the next chapters, and the numerical source data are supplied to the reader. Finally, the design philosophy of the Toyota drive is briefly discussed in comparison with the BMWi3 drive and the results are concluded in the last section. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Lock-in Thermography for the Localization of Security Hard Blocks on SoC Devices.
- Author
-
Kögel, Michael, Brand, Sebastian, Große, Christian, Altmann, Frank, Selmke, Bodo, Zinnecker, Kilian, Hesselbarth, Robert, and Jacob Kabakci, Nisha
- Subjects
- *
REVERSE engineering , *INFRARED cameras , *NONDESTRUCTIVE testing , *INTEGRATED circuits , *ENGINEERING mathematics - Abstract
Localizing security-relevant hard blocks on modern System-on-Chips for physical attacks, such as side-channel analysis and fault attacks, has become increasingly time-consuming due to ever-increasing chip-area and -complexity. While this development increases the effort and reverse engineering cost, it is not sufficient to withstand resolute attackers. This paper explores the application of camera-based lock-in thermography, a nondestructive testing method, for identifying and localizing security hard blocks on integrated circuits. We use a synchronous signal to periodically activate security-related functions in the firmware, which causes periodic temperature changes in the activated die areas that we detect and localize via an infrared camera. Using this method, we demonstrate the precise detection and localization of security-related hard blocks at the die level on a modern SoC. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. 一种基于设计意图识别的风力机叶片逆向建模方法.
- Author
-
蔡家铱, 成思源, 何金瀚, and 杨雪荣
- Subjects
FEATURE extraction ,GEOMETRIC modeling ,REVERSE engineering ,WIND turbine blades ,AEROFOILS - Abstract
Copyright of Machine Tool & Hydraulics is the property of Guangzhou Mechanical Engineering Research Institute (GMERI) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
15. Growth Mediated Disassembly of Cucurbit[8]uril Cross‐linked Static Cubic Self‐assembly of Silver Nanoparticles.
- Author
-
Dalal, Sancharika and Sadhu, Kalyan K.
- Subjects
SILVER nanoparticles ,REVERSE engineering ,METALLIC surfaces ,NANOPARTICLES ,ENERGY dissipation - Abstract
Static self‐assembly resides in thermodynamically stable global minima of the energy landscape, whereas dynamic self‐assembly occupies local minima of the energy profile and remains in the ordered state for a limited time via dissipation of energy to surroundings. This makes the spatiotemporal control over the assembly and disassembly mechanism easily controllable in the case of dynamic self‐assembly. However, due to the higher thermal stability of static self‐assembly, it is very challenging to perform reverse engineering on these types of systems. Herein we report growth reaction‐based reversal of static silver cubes obtained via cucurbit[8]uril (CB[8]) crosslinked self‐assembly of silver nanoparticles (AgNP). The AgNP building units with variable CB[8] surface coverage have been used as seeds onto which deposition of gold via growth reaction has been performed. The disassembly of supracube structure has been controlled by the formation of [AuCl4]−–CB[8] complex and successive reduction of [AuCl4]− to Au0 on the surface of the seed. The resulting monodispersed isotropic nanoparticles, formed from the CB[8] based cubic self‐assembly after growth, exhibit Au−Ag bimetallic nature. Quenching of the fluorogenic response from the hydrophobic dye coumarin‐7, added after growth, suggests direct interaction with the metallic nanoparticle surface after disassembly and thereby confirms successful growth reaction mediated reversal of self‐assembly. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Neck orthosis design for 3D printing with user enhanced comfort features.
- Author
-
Ambu, Rita, Oliveri, Salvatore Massimo, and Calì, Michele
- Abstract
An area of interest in orthopaedics is the development of efficient customized neck orthoses, considered that pathologies which affect the neck area are widespread. Advanced acquisition and modelling approaches combined with Additive Manufacturing (AM) can potentially provide customized orthoses with improved performance and complexity. However, in the design of these devices, besides functional and structural requirements, benefit and comfort of the patient should be a main concern, in particular, at the early stage of design during the acquisition of the body's part, and while using the printed orthosis. In this paper, a scanning system with three sensors was developed which allows a fast, about 5 s, and accurate acquisition of the neck area with minimum discomfort for the patient. A neck orthosis with a ventilation pattern obtained by Topology Optimization (TO), lightened by about 35%, was also established. In fact, a main role for comfort is played by the ventilation pattern which contributes both to lightness and breathability. Its structural and comfort performance was evaluated in comparison with an orthosis with a ventilation pattern configured by Voronoi cells. Structural assessment was carried out by means of finite element analysis under main loading conditions. An evaluation of neck temperatures in relation to wearing 3D printed prototypes, manufactured with Hemp Bio-Plastic® filament, was finally conducted by means of a thermal imaging camera. TO orthosis prototype showed a better performance regarding thermal comfort, with a maximum increase of neck temperature less than 1 °C, which makes the proposed configuration very promising for user's comfort. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. The Neurostimulationist will see you now: prescribing direct electrical stimulation therapies for the human brain in epilepsy and beyond.
- Author
-
Hadar, Peter N., Zelmann, Rina, Salami, Pariya, Cash, Sydney S., and Paulk, Angelique C.
- Subjects
ELECTRIC stimulation ,PARKINSON'S disease ,OBSESSIVE-compulsive disorder ,REVERSE engineering ,NEURAL stimulation ,DEEP brain stimulation ,BRAIN stimulation - Abstract
As the pace of research in implantable neurotechnology increases, it is important to take a step back and see if the promise lives up to our intentions. While direct electrical stimulation applied intracranially has been used for the treatment of various neurological disorders, such as Parkinson's, epilepsy, clinical depression, and Obsessive-compulsive disorder, the effectiveness can be highly variable. One perspective is that the inability to consistently treat these neurological disorders in a standardized way is due to multiple, interlaced factors, including stimulation parameters, location, and differences in underlying network connectivity, leading to a trial-and-error stimulation approach in the clinic. An alternate view, based on a growing knowledge from neural data, is that variability in this input (stimulation) and output (brain response) relationship may be more predictable and amenable to standardization, personalization, and, ultimately, therapeutic implementation. In this review, we assert that the future of human brain neurostimulation, via direct electrical stimulation, rests on deploying standardized, constrained models for easier clinical implementation and informed by intracranial data sets, such that diverse, individualized therapeutic parameters can efficiently produce similar, robust, positive outcomes for many patients closer to a prescriptive model. We address the pathway needed to arrive at this future by addressing three questions, namely: (1) why aren't we already at this prescriptive future?; (2) how do we get there?; (3) how far are we from this Neurostimulationist prescriptive future? We first posit that there are limited and predictable ways, constrained by underlying networks, for direct electrical stimulation to induce changes in the brain based on past literature. We then address how identifying underlying individual structural and functional brain connectivity which shape these standard responses enable targeted and personalized neuromodulation, bolstered through large-scale efforts, including machine learning techniques, to map and reverse engineer these input-output relationships to produce a good outcome and better identify underlying mechanisms. This understanding will not only be a major advance in enabling intelligent and informed design of neuromodulatory therapeutic tools for a wide variety of neurological diseases, but a shift in how we can predictably, and therapeutically, prescribe stimulation treatments the human brain. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. Holes position prediction and inverse design on complex surface in deep-drawing process with sand dies based on NURBS and deformation mathematical zoning.
- Author
-
Li, Yuanyuan, Wang, Hongyu, Liu, Menghan, Yang, Dehui, Sun, Jie, Zhang, Shunhu, and Ma, Xiangkun
- Subjects
- *
REVERSE engineering , *ENGINEERING models , *METHODS engineering , *DIES (Metalworking) , *ERROR rates - Abstract
Machining the holes on the widely used deep-drawing products requires significant time or equipment costs. Therefore, it is a feasible way to design the initial sheets by a reverse engineering method to guide the forming of the final products. However, since the combinations of both the highly precise fitting of the complex surfaces and the zoning supported by mold geometric parameters are difficult, the existing reverse engineering models are not available. So a novel reverse engineering method with NURBS considering mathematical zoning for deep-drawing with sand die is provided in this paper. Also based on the lower sand die, upper sand die, and only metal dies, three different groups with complex surfaces are named as LS, US, and R, respectively. To study the influences of complexities of both surfaces and hole shapes on the forming results of the deep-drawing products, the position prediction model established by the method is forward validated by five holes with different symmetries on three complex surfaces. The inverse model is used to design holes for three complex surfaces, and the error rates of the Group LS, the Group R, and the Group US are 1.07%, 1.38%, and 1.68%, respectively, which demonstrate the feasibility of the position prediction model. This method can provide prospective exploration for application of more complex initial sheets with holes in more widespread forming process. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. Engineering Escherichia coli for utilization of PET degraded ethylene glycol as sole feedstock.
- Author
-
Chi, Junxi, Wang, Pengju, Ma, Yidan, Zhu, Xingmiao, Zhu, Leilei, Chen, Ming, Bi, Changhao, and Zhang, Xueli
- Subjects
- *
ETHYLENE glycol , *ESCHERICHIA coli , *BIOLOGICAL evolution , *REVERSE engineering , *POLYETHYLENE terephthalate - Abstract
From both economic and environmental perspectives, ethylene glycol, the principal constituent in the degradation of PET, emerges as an optimal feedstock for microbial cell factories. Traditional methods for constructing Escherichia coli chassis cells capable of utilizing ethylene glycol as a non-sugar feedstock typically involve overexpressing the genes fucO and aldA. However, these approaches have not succeeded in enabling the exclusive use of ethylene glycol as the sole source of carbon and energy for growth. Through ultraviolet radiation-induced mutagenesis and subsequent laboratory adaptive evolution, an EG02 strain emerged from E. coli MG1655 capable of utilizing ethylene glycol as its sole carbon and energy source, demonstrating an uptake rate of 8.1 ± 1.3 mmol/gDW h. Comparative transcriptome analysis guided reverse metabolic engineering, successfully enabling four wild-type E. coli strains to metabolize ethylene glycol exclusively. This was achieved through overexpression of the gcl, hyi, glxR, and glxK genes. Notably, the engineered E. coli chassis cells efficiently metabolized the 87 mM ethylene glycol found in PET enzymatic degradation products following 72 h of fermentation. This work presents a practical solution for recycling ethylene glycol from PET waste degradation products, demonstrating that simply adding M9 salts can effectively convert them into viable raw materials for E. coli cell factories. Our findings also emphasize the significant roles of genes associated with the glycolate and glyoxylate degradation I pathway in the metabolic utilization of ethylene glycol, an aspect frequently overlooked in previous research. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Brain-consistent architecture for imagination.
- Author
-
Hiroshi Yamakawa, Ayako Fukawa, Ikuko Eguchi Yairi, and Yutaka Matsuo
- Subjects
ARTIFICIAL intelligence ,REVERSE engineering ,BASAL ganglia ,PARTITION functions ,ENGINEERING design - Abstract
Background: Imagination represents a pivotal capability of human intelligence. To develop human-like artificial intelligence, uncovering the computational architecture pertinent to imaginative capabilities through reverse engineering the brain's computational functions is essential. The existing Structure-Constrained Interface Decomposition (SCID) method, leverages the anatomical structure of the brain to extract computational architecture. However, its efficacy is limited to narrow brain regions, making it unsuitable for realizing the function of imagination, which involves diverse brain areas such as the neocortex, basal ganglia, thalamus, and hippocampus. Objective: In this study, we proposed the Function-Oriented SCID method, an advancement over the existing SCIDmethod, comprising four steps designed for reverse engineering broader brain areas. This method was applied to the brain's imaginative capabilities to design a hypothetical computational architecture. The implementation began with defining the human imaginative ability that we aspire to simulate. Subsequently, six critical requirements necessary for actualizing the defined imagination were identified. Constraints were established considering the unique representational capacity and the singularity of the neocortex's modes, a distributed memory structure responsible for executing imaginative functions. In line with these constraints, we developed five distinct functions to fulfill the requirements. We allocated specific components for each function, followed by an architectural proposal aligning each component with a corresponding brain organ. Results: In the proposed architecture, the distributed memory component, associated with the neocortex, realizes the representation and execution function; the imaginary zone maker component, associated with the claustrum, accomplishes the dynamic-zone partitioning function; the routing conductor component, linked with the complex of thalamus and basal ganglia, performs the manipulation function; the mode memory component, related to the specific agranular neocortical area executes the mode maintenance function; and the recorder component, affiliated with the hippocampal formation, handles the history management function. Thus, we have provided a fundamental cognitive architecture of the brain that comprehensively covers the brain's imaginative capacities. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs.
- Author
-
Dofe, Jaya, Danesh, Wafi, More, Vaishnavi, and Chaudhari, Aaditya
- Subjects
- *
NATURAL language processing , *HARDWARE Trojans (Computers) , *RECURRENT neural networks , *REVERSE engineering , *CIRCUIT complexity - Abstract
Field-programmable gate arrays (FPGAs) offer the inherent ability to reconfigure at runtime, making them ideal for applications such as data centers, cloud computing, and edge computing. This reconfiguration, often achieved through remote access, enables efficient resource utilization but also introduces critical security vulnerabilities. An adversary could exploit this access to insert a dormant hardware trojan (HT) into the configuration bitstream, bypassing conventional security and verification measures. To address this security threat, we propose a supervised learning approach using deep recurrent neural networks (RNNs) for HT detection within FPGA configuration bitstreams. We explore two RNN architectures: basic RNN and long short-term memory (LSTM) networks. Our proposed method analyzes bitstream patterns, to identify anomalies indicative of malicious modifications. We evaluated the effectiveness on ISCAS 85 benchmark circuits of varying sizes and topologies, implemented on a Xilinx Artix-7 FPGA. The experimental results revealed that the basic RNN model showed lower accuracy in identifying HT-compromised bitstreams for most circuits. In contrast, the LSTM model achieved a significantly higher average accuracy of 93.5%. These results demonstrate that the LSTM model is more successful for HT detection in FPGA bitstreams. This research paves the way for using RNN architectures for HT detection in FPGAs, eliminating the need for time-consuming and resource-intensive reverse engineering or performance-degrading bitstream conversions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. Hydraulic Fracture Closure Detection Techniques: A Comprehensive Review.
- Author
-
Gabry, Mohamed Adel, Eltaleb, Ibrahim, Ramadan, Amr, Rezaei, Ali, and Soliman, Mohamed Y.
- Subjects
- *
NEWTON-Raphson method , *FLUID flow , *HYDRAULIC fracturing , *REVERSE engineering , *WAVELET transforms - Abstract
This study reviews methods for detecting fracture closure pressure in both unconventional and conventional reservoirs using mathematical models and fluid flow equations. It evaluates techniques such as the Nolte method, tangent method, and compliance method. The investigation relies on observing changes in fluid flow regimes from preclosure to postclosure using fluid flow equations to examine the postclosure flow regime effect on the G function. Reverse calculations model pressure decline across synthesized flow regimes, facilitating a detailed investigation of the closure process. The analysis reveals that the tangent method is sensitive to postclosure fluid flow, while the compliance method is less effective in reservoirs with significant tortuosity or natural fractures. This paper recommends assessing natural fractures' characteristics and permeability to identify the source of leak-off before selecting a technique. It proposes integrating various methods to comprehensively understand subsurface formations, combining their strengths for accurate fracture closure identification and a better understanding of subsurface formations. The new proposed workflow employs the continuous wavelet transform (CWT) technique for fracture closure detection, avoiding physical model preassumptions or simplifications to confirm the results. This approach offers guidance on selecting appropriate methods by integrating different techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Simulation-based data reduction and data processing for sheet metal forming in the hybrid twin framework.
- Author
-
Maier, Lorenz, Ünver, Bogac, Volk, Wolfram, and Hartmann, Christoph
- Subjects
- *
REVERSE engineering , *METALWORK , *SENSOR placement , *SHEET metal , *DIGITAL twins - Abstract
In sheet metal forming, the interaction between virtual models and the real world remains challenging. Process simulations can exhibit significant errors, and reliable measurements are often scarce during early production stages. This study presents a hybrid twin framework that systematically unifies computer-aided design, simulation, and measurement data in an adaptive manner. Central to this framework is a reverse engineering algorithm that reconstructs and transforms the geometry of deep-drawn components from optical scan data into B-spline surfaces. The algorithm demonstrated high precision, indicating its suitability for process control and geometric analysis. The hybrid twin framework integrates virtual data from simulations and real-world data, as evidenced by a sensor concept for inline surface measurement. The framework ensures robust and redundant measurement concepts by estimating complete geometries from a few systematically preselected measuring points. This adaptive approach permits continuous updates and extensions to the database, accommodating both sparse inline signals and offline inspection data. This framework provides a conceptual model for integrating direct feedback interactions between virtual and physical environments, thereby enhancing the precision of analytical and predictive models in sheet metal forming processes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. 基于逆向工程的航空发动机叶片 三维重建模型构建.
- Author
-
孙同明, 任俊, 张峰, and 廖春云
- Abstract
Copyright of Computer Measurement & Control is the property of Magazine Agency of Computer Measurement & Control and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
25. Comparative Vulnerability Analysis of Thai and Non-Thai Mobile Banking Applications.
- Author
-
Titiakarawongse, Chatphat, Taksin, Sasiyaporn, Ruangsawat, Jidapa, Deeduangpan, Kunthida, and Boonkrong, Sirapat
- Subjects
MOBILE banking industry ,MOBILE apps ,REVERSE engineering ,CRYPTOGRAPHY ,STATISTICS - Abstract
The rapid adoption of mobile banking applications has raised significant concerns about their security vulnerabilities. This study presents a comparative vulnerability analysis of mobile banking applications from Thai and non-Thai banks, utilising the OWASP Mobile Top 10 framework. Nine mobile banking applications (five Thai and four non-Thai) were assessed using three vulnerability detection tools: AndroBugs, MobSF, and QARK. The results showed that both Thai and non-Thai mobile banking applications had vulnerabilities across multiple OWASP Mobile Top 10 categories, with reverse engineering, code tampering, and insufficient cryptography being the most common. Statistical analysis revealed that Thai banking applications exhibited significantly more vulnerabilities compared to non-Thai banking applications. In the context of vulnerability detection tools, AndroBugs and QARK proved more effective in detecting vulnerabilities compared to MobSF. Additionally, the study highlights critical security challenges in mobile banking applications, particularly for Thai banks, and emphasises the need for enhanced security measures. The findings also show the importance of using multiple assessment tools for comprehensive security evaluation and suggest potential areas for improvement in mobile banking applications. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. China's Arms Transfer to Iran: More Noise, Less Substance.
- Author
-
Kumar, Atul
- Subjects
ARMS transfers ,INTERNATIONAL relations ,CRUISE missiles - Abstract
China sees Iran as a crucial power with significant influence over the security landscape of the Middle East. Despite being sensitive to regional and global dynamics surrounding Iran, China cannot ignore Tehran's strategic significance. Yet, their bilateral relations are significantly influenced by the regional security environment. China has consistently prioritized its ties with the United States over Iran and has generally adhered to UN regulations concerning Iran. China's sensitivity to Arab and regional interests in the Middle East significantly impacts the China–Iran arms relationship. These concerns significantly restricted the flow of Chinese arms to Iran since 2005, with UN sanctions ultimately sealing the cessation of arms flow. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Estimating the Cowper–Symonds Parameters for High-Strength Steel Using DIC Combined with Integral Measures of Deviation.
- Author
-
Škrlec, Andrej, Panić, Branislav, Nagode, Marko, and Klemenc, Jernej
- Subjects
COST functions ,DIGITAL image correlation ,REVERSE engineering ,TENSILE tests ,PARAMETER estimation - Abstract
Cowper–Symonds parameters were estimated for the complex-phase high-strength steel with a commercial name of SZBS800. The parameter estimation was based on a series of conventional tensile tests and unconventional high-strain rate experiments. The parameters were estimated using a reverse engineering approach. LS-Dyna was used for numerical simulations, and the material's response was modelled using a piece-wise linear plasticity model with a visco-plastic formulation of the Cowper–Symonds material model. A multi-criteria cost function was defined and applied to obtain a response function for the parameters p and C. The cost function was modelled with a response surface, and the optimal parameters were estimated using a real-valued genetic algorithm. The main novelty and innovation of this article is the definition of a cost function that measures a deviation between the deformed geometry of the flat plate-like specimens and the results of the numerical simulations. The results are compared to the relevant literature. A critical evaluation of our results and references is another novelty of this article. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. 基于GAI的逆向工程教学思维在人机协作中的 应用研究 ————以编程教育为例.
- Author
-
翟雪松, 张丽洁, 夏亮亮, 徐 鑫, and 朱 强
- Abstract
Copyright of e-Education Research is the property of Northwest Normal University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
29. Finite Element Analysis of Relative Slip Between Tight Tops and the Human Body.
- Author
-
Bai, Yunfeng, Zhao, Jiahao, Ding, Hao, Li, Qiao, and Zhu, Shigen
- Subjects
CLOTHING & dress ,HUMAN body ,STRETCH (Physiology) ,REVERSE engineering ,FINITE element method - Abstract
To investigate the fabric performance of tight tops and the influence of clothing pressure on the relative slip between clothing and the human body, a simulation model based on finite element analysis is proposed. This model simulates the relative slip distance under dynamic conditions. Initially, a three-dimensional model for numerical simulation was established through reverse engineering. Subsequently, material properties and boundary conditions were defined. Finally, the model was analyzed using ANSYS Workbench, and the obtained results were compared with the stretch ratio of the skin on the human back. The results indicate that, under constant conditions, the Young's modulus of the fabric has a greater influence on the slip and shows a significant positive correlation, with correlation coefficients (R) all exceeding 0.99. The impact of clothing pressure on sliding is relatively small, and the sliding distance decreases with an increase in clothing pressure. In addition, it has been demonstrated that there is a significant correlation (p < 0.05) between the relative sliding distance of clothing and the stretch ratio of the skin. The study could provide a helpful guideline for the design of smart clothing, and it can provide valuable insights for various applications, such as sportswear and medical apparel. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Twin support vector regression for characterizing uncertainty in surface reconstruction.
- Author
-
Yu, ShiCheng, Miao, JiaQing, and Qin, FeiLong
- Subjects
- *
SURFACE reconstruction , *PETROLEUM prospecting , *REVERSE engineering , *NATURAL gas prospecting , *QUADRATIC programming , *GIBBERELLINS , *QUANTILE regression - Abstract
Surface reconstruction plays a pivotal role in various fields, including reverse engineering, and oil and gas exploration. However, errors in available data and insufficient surface morphology information often introduce uncertainty into the reconstruction. It is crucial to accurately characterize and visualize the uncertainty in surface reconstruction for risk analysis and planning further data collection. To this end, this paper proposes an uncertainty characterization method based on twin support vector regression. First, various modeling data are effectively integrated and the information contained in the high-confidence sample is efficiently utilized through the uncertainty interval generated by quantiles and upper/lower bound constraints. Second, well-path points are incorporated by imposing inequality constraints on the corresponding prediction points. Finally, in order to reduce computation time, the problem of uncertainty characterization is formulated as two smaller-scale quadratic programming. The results obtained from a real fault dataset and a synthetic dataset validate the effectiveness of the proposed method. When well data are available, the generated uncertainty envelopes are constrained by well data, which can partially mitigate reconstruction uncertainties. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. Assessing the Health and Functionality of Linear Bearings: A Comparative Study Between Original and Replicated Models Using Time-Domain Statistical Techniques.
- Author
-
Kumar, Punyapu Sai, Mishra, Paresh Kumar, and Chandravanshi, M. L.
- Subjects
- *
ROOT-mean-squares , *REVERSE engineering , *FAST Fourier transforms , *AUTOMATION , *CURRENT distribution - Abstract
The investigation involves a comparative analysis of linear bearings fabricated by two different manufacturers. One manufacturer is known for producing original, high-quality bearings that come with a higher price tag, while the other provides more affordable alternatives through reverse engineering of the original bearings. The primary aim is to understand the practical behavior of these replicated bearings compared to the original ones and determine whether the cost-effective replicated bearings can be chosen over the more expensive originals for specific applications. This requires assessing their performance under various operational conditions (speeds of 6000, 8000, and 10,000 mm/min, and loads of 500 and 1050 g) and evaluating the impact on functionality in real-world scenarios. Time-domain statistical techniques are incorporated to quantify the differences between these bearings. Statistical scalar indicators, such as root-mean-square value, crest factor, peak, skewness, and kurtosis, are used to characterize the health status of the bearings, with the monitored parameter being the vibration signal. It has been observed that these indicators are consistently higher for the replicated bearings compared to the original ones, the defects are introduced may be during the manufacturing process or utilization low-quality materials for production of replicated bearings. The analysis, therefore, highlights notable deviations and potential issues with the replicated bearings, reinforcing the superior performance and stability of the original bearings despite their higher cost. Thus, original bearings are better suited for applications. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. Software-Defined Radio Implementation of a LoRa Transceiver.
- Author
-
de Omena Simas, João Pedro, Riviello, Daniel Gaetano, and Garello, Roberto
- Subjects
- *
SOFTWARE radio , *INTERNET radio , *ACCESS control , *REVERSE engineering , *INTERNET of things - Abstract
The number of applications of low-power wide-area networks (LPWANs) has been growing quite considerably in the past few years and so has the number of protocol stacks. Despite this fact, there is still no fully open LPWAN protocol stack available to the public, which limits the flexibility and ease of integration of the existing ones. The closest to being fully open is LoRa; however, only its medium access control (MAC) layer, known as LoRaWAN, is open and its physical and logical link control layers, also known as LoRa PHY, are still only partially understood. In this paper, the essential missing aspects of LoRa PHY are not only reverse engineered, but also, a new design of the transceiver and its sub-components are proposed and implemented in a modular and flexible way using GNU Radio. Finally, some examples of applications of both the transceiver and its components, which are made to be run in a simple setup by using cheap and widely available off-the-shelf hardware, are given to show how the library can be used and extended. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Reverse Engineering Orthognathic Surgery and Orthodontics in Individuals with Cleft Lip and/or Palate: A Case Report.
- Author
-
Ko, Jaemin, Urata, Mark M., Hammoudeh, Jeffrey A., Yamashita, Dennis-Duke, and Yen, Stephen L.-K.
- Subjects
- *
ORTHOGNATHIC surgery , *CLEFT lip , *ORTHODONTICS , *REVERSE engineering , *CORRECTIVE orthodontics , *FACIAL bones , *MENTAL foramen - Abstract
This case report presents a virtual treatment simulation of the orthodontic treatment and surgery-first orthognathic surgery employed to treat a patient with a repaired unilateral cleft lip and alveolus with Class III malocclusion and lower third facial asymmetry. The patient exhibited a negative overjet of 9 mm, a missing lower right second premolar, and a 5 mm gap between the upper right central and lateral incisors with midline discrepancy. The three-dimensional virtual planning began with virtual pre-surgical orthodontics, followed by the positioning of the facial bones and teeth in their ideal aesthetic and functional positions. The sequence of steps needed to achieve this outcome was then reverse-engineered and recorded using multiplatform Nemostudio software (Nemotec, Madrid, Spain), which facilitated both surgical and orthodontic planning. The treatment included a two-piece segmental maxillary osteotomy for dental space closure, a LeFort I maxillary advancement, and a mandibular setback with bilateral sagittal split osteotomy to correct the skeletal underbite and asymmetry. A novel approach was employed by pre-treating the patient for orthognathic surgeries at age 11, seven years prior to the surgery. This early phase of orthodontic treatment aligned the patient's teeth and established the dental arch form. The positions of the teeth were maintained with retainers, eliminating the need for pre-surgical orthodontics later. This early phase of treatment significantly reduced the treatment time. The use of software to predict all the necessary steps for surgery and post-surgical orthodontic tooth movements made this approach possible. Multi-step virtual planning can be a powerful tool for analyzing complex craniofacial problems that require multidisciplinary care, such as cleft lip and/or palate. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. How Algorithms Promote Self-Radicalization: Audit of TikTok's Algorithm Using a Reverse Engineering Method.
- Author
-
Shin, Donghee and Jitkajornwanich, Kulsawasd
- Subjects
- *
REVERSE engineering , *ARTIFICIAL intelligence , *METHODS engineering , *RADICALISM , *CRITICAL analysis , *SOCIAL media - Abstract
Algorithmic radicalization is the idea that algorithms used by social media platforms push people down digital "rabbit holes" by framing personal online activity. Algorithms control what people see and when they see it and learn from their past activities. As such, people gradually and subconsciously adopt the ideas presented to them by the rabbit hole down which they have been pushed. In this study, TikTok's role in fostering radicalized ideology is examined to offer a critical analysis of the state of radicalism and extremism on platforms. This study conducted an algorithm audit of the role of radicalizing information in social media by examining how TikTok's algorithms are being used to radicalize, polarize, and spread extremism and societal instability. The results revealed that the pathways through which users access far-right content are manifold and that a large portion of the content can be ascribed to platform recommendations through radicalization pipelines. Algorithms are not simple tools that offer personalized services but rather contributors to radicalism, societal violence, and polarization. Such personalization processes have been instrumental in how artificial intelligence (AI) has been deployed, designed, and used to the detrimental outcomes that it has generated. Thus, the generation and adoption of extreme content on TikTok are, by and large, not only a reflection of user inputs and interactions with the platform but also the platform's ability to slot users into specific categories and reinforce their ideas. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Experimental Fitting of Efficiency Hill Chart for Kaplan Hydraulic Turbine.
- Author
-
Capata, Roberto, Calabria, Alfonso, Baralis, Gian Marco, and Piras, Giuseppe
- Subjects
REVERSE engineering ,HYDRAULIC turbines ,FLOW coefficient ,METHODS engineering ,MACHINERY testing ,IMPELLERS - Abstract
The development of hydroelectric technology and much of the "knowledge" on hydraulic phenomena derive from scale modeling and "bench" tests to improve machinery efficiency. The result of these experimental tests is mapping the so-called "hill chart", representing the "DNA" of a turbine model. Identifying the efficiency values as a function of the specific parameters of the flow and energy coefficient (which both identify the operating point) allows us to represent the complete behavior of a turbine in hydraulic similarity with the original model developed in the laboratory. The present work carries out a "reverse engineering" operation that leads to the definition of "an innovative research model" that is relatively simple to use in every field. Thus, from the experimental survey of the degree of efficiency of several prototypes of machines deriving from the same starting model, the hill chart of the hydraulic profile used is reconstructed. The "mapping" of all the characteristic quantities of the machine, together with the physical parameters of the regulating organs of a four-blade Kaplan turbine model, also made it possible to complete the process, allowing to identify not only the iso-efficiency regions but also the curves relating to the trend of the angle of the impeller blades, the specific opening of the distributor, and the identification of critical areas of cavitation. The development of the hill chart was made possible by investigating the behavior of 33 actual prototypes and 46 characteristic curves derived from the same reference model based on practical experiments for finding the optimal blade distributor "setup curve". To complete this, theoretical characteristic curves of "not physically realized" prototypes were also mapped, allowing us to complete the regions comprising the diagram. The study of the unified hill charts found in previous documentation of the most famous manufacturers was of great help. Finally, the validation of the "proposed procedure" was obtained through the experimental survey of the actual efficiency of the new prototype based on the theoretical values defined in the design phase on the chart obtained with the method described. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning.
- Author
-
Ou, Weihan, Ding, Steven, Zulkernine, Mohammad, Li, Li Tao, and Labrosse, Sarah
- Subjects
CYBERTERRORISM ,ATTRIBUTION of authorship ,CYBER intelligence (Computer security) ,EVIDENCE gaps ,REVERSE engineering - Abstract
Malware attacks are posing a significant threat to national security, cooperate network, and public endpoint security. Identifying the Advanced Persistent Threat (APT) groups behind the attacks and grouping their activities into attack campaigns help security investigators trace their activities thus providing better security protections against future attacks. Existing Cyber Threat Intelligent (CTI) components mainly focus on malware family identification and behavior characterization, which cannot solve the APT tracking problem: while APT tracking needs one to link malware binaries of multiple families to a single threat actor, these behavior or function-based techniques are tightened up to a specific attack technique and would fail on connecting different families. Binary Authorship Attribution (AA) solutions could discriminate against threat actors based on their stylometric traits. However, AA solutions assume that the author of a binary is within a fixed candidate author set. However, real-world malware binaries may be created by a new unknown threat actor. To address this research gap, we propose VeriBin for the Binary Authorship Verification (BAV) problem. VeriBin is a novel adversarial neural network that extracts functionality-agnostic style representations from assembly code for the AV task. The extracted style representations can be visualized and are explainable with VeriBin's multi-head attention mechanism. We benchmark VeriBin with state-of-the-art coding style representations on a standard dataset and a recent malware-APT dataset. Given two anonymous binaries of out-of-sample authors, VeriBin can accurately determine whether they belong to the same author or not. VeriBin is resilient to compiler optimizations and robust against malware family variants. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. Fabrication of transfemoral prosthesis utilizing additive manufacturing and reverse engineering: a scoping review.
- Author
-
Tyagi, Bobby, Raj, Abhishek, Chandrakar, Anand Swarup, Sharma, Gaurang Swarup, Raj, Tapish, Jain, Akash, Bhardwaj, Lakshya, Sahai, Ankit, and Sharma, Rahul Swarup
- Abstract
Prosthetic rehabilitation refers to the process of restoring or improving a patient's physical function, appearance, and quality of life through the use of prosthetic devices. Providing cost-effective prosthetic rehabilitation for transfemoral amputees remains a challenging task. Traditional prosthetic fabrication methods, such as casting and lamination, are expensive and prone to fitting errors. Moreover, these methods are time-consuming, labor-intensive, and lack data-driven precision, heavily relying on artisanal expertise for socket fitting. However, recent advancements in rapid prototyping technologies, in conjunction with Reverse Engineering through 3D scanners, offer a promising alternative. This scoping review explores the current state of knowledge in transfemoral prosthesis fabrication, with a focus on additive manufacturing (AM), RE, and computer-aided manufacturing (CAM) methods. A systematic database search on PubMed and LENS.ORG was conducted, followed by a thorough analysis of selected articles. The review highlights major research areas, including pressure/stress/strain distribution analysis at the socket-stump interface, gait cycle assessment, and developments in 3D printing of knee and ankle joints. Critical appraisals of each article provide valuable insights for future research and advancements in affordable prosthetic rehabilitation. In conclusion, the utilization of AM, RE, and CAM methods for TFP fabrication is in its infancy but holds immense potential for improving cost-effective solutions in this domain. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords.
- Author
-
Saadi, Zena Mohammad, Sadiq, Ahmed T., Akif, Omar Z., and Farhan, Alaa K.
- Subjects
SOCIAL engineering (Fraud) ,LITERATURE reviews ,COMPUTER vision ,CYBERTERRORISM ,REVERSE engineering ,COMPUTER passwords - Abstract
As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily exploit the graphical password scheme, which is one of the most widely used. To counter these security threats, several measures have been suggested, but none of the security attacks can be completely overcome. Each of the proposed measures has its pros and cons. This study begins by elucidating some of the graphical password schemes studied between 2012 and 2023, delving into potential threats and defense mechanisms associated with these schemes. Following a thorough identification and selection process, five of the reviewed papers explain the threat of shoulder surfing and spyware attacks on graphical password schemes, while two explain the threat of brute force attacks. One paper focuses on dictionary attacks, while four other papers address social engineering, SQL injection attacks, and guessing attacks as potential threats to graphical password schemes. In addition, the papers recognize other forms of attacks, such as video recording attacks, filtering attacks, reverse engineering attacks, multiple observation attacks, key/mouse logger attacks, insider attacks, computer vision attacks, image gallery attacks, sonar attacks, reply attacks, data interception attacks, and histogram manipulation attacks. These attacks are examined in three, three, eight, one, four, one, one, one, one, one, one, and one papers, respectively. Moreover, out of all such countermeasures, most of them are based on three categories—randomization, obfuscation, and password space complexity—which are the most commonly employed strategies for improving graphical password schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. Reverse Engineering in Production and the Repair Complex Profile and Large-Sized Products.
- Author
-
Vityaz, P. A., Kheifetz, M. L., Gretsky, N. L., and Khilko, D. N.
- Abstract
Methods have been developed for monitoring and diagnosing the degree of wear and loss of the geometric shape of surfaces. A selection of technological routes was carried out for the complex restoration of working surfaces of large-sized products using electrophysical energy sources during surfacing of powders and wires. It has been shown that the cost of major repairs when restoring a screw shaft is, on average, two times lower than manufacturing a new one. It is important to monitor regularly the degree of wear of shaft turns and their local restoration using surfacing materials and technologies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. FEM Structural Analysis for Ship's Beam Modification: A Case Study.
- Author
-
Popa, Adrian, Manea, Mihaela-Greti, and Ristea-Komornicki, Marian-Valentin
- Subjects
SHIPBUILDING ,FINITE element method ,STRUCTURAL panels ,REVERSE engineering ,METHODS engineering ,SHIPYARDS - Abstract
Classification is mandatory for all seagoing ships engaged in international trade worldwide, with regulations that require the strength of the hull construction to be confirmed. Upon completion of the ship's construction or during the execution of repair works in shipyards (reconversion works, modification of panels, replacement of equipment, etc.), the strength structure of the ship may be affected and the classification society must certify that it meets the requirements. Replacing old equipment sometimes implies some variations in overall dimensions, which may impose some changes (adjustments) on the layout of structural panel elements. This study applied the Finite Element Method (FEM) considering the von Mises theory in a case study of a beam modification with the support of the ANSYS software. This study used the reverse engineering method to investigate an already implemented solution. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. Evaluation Strength of Materials of the Compressor Wheel and Engine Power in the Turbocharger.
- Author
-
Tran Huu Danh, Le Hong Ky, Pham Hoang Anh, Dang Thanh Tam, and Nguyen Hoang Hiep
- Subjects
COMPRESSOR blades ,REVERSE engineering ,STRENGTH of materials ,NUMERICAL control of machine tools ,ALUMINUM alloys ,TURBOCHARGERS - Abstract
This paper presents the research results on the strength of materials and power of the Toyota 3C engine when changing the structure and number of blades of the compressor wheel in the turbocharger. 3D models of different compressor wheels were created using reverse engineering and then simulated in the ANSYS environment with turbine shaft rotation speeds of 10,000, 15,000, and 20,000 rpm, respectively, to examine the strength of the compression wheel materials. To evaluate engine power, compressor wheels were machined on a 5-axis CNC milling machine. The MP 100S specialized test bed was used to perform experiments and compare engine power when using the original and alternative compressor wheels of the CT9 turbocharger. The compressor wheels were made of aluminum alloy, with a structure and number of blades selected to ensure durability when working. The CT9 turbocharger has a four-pair blade compressor wheel that consistently delivers higher engine power than in other cases. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
42. An Enhanced Framework to Mitigate Post Installation Cyber Attacks on Android Apps.
- Author
-
Koka, Vijay and Muppavaram, Kireet
- Subjects
CYBERTERRORISM ,REVERSE engineering ,MOBILE apps ,MALWARE ,SMARTPHONES - Abstract
The widespread use of smartphones worldwide has led to a corresponding rise in the number of mobile applications available for Android devices. These apps offer users convenient ways to perform various daily tasks, but their proliferation has also created an environment in which attackers can steal sensitive information. Insecure options employed by many app developers create vulnerabilities that can be exploited by attackers to gain access to most smartphones. While existing methods can detect malware during app installation, they do not sufficiently address post-installation attacks, such as those resulting from fake apps or Man-in-the-Disk (MitD) attacks. To address this issue, the current study conducted research on post-installation attacks, including data leakage, malware injection, repackaging, reverse engineering, privilege escalation, and UI spoofing. MitD attacks are particularly challenging to counter, so, to mitigate this risk, the Post-Installation App Detection Method is proposed to monitor and regulate sensitive information flow and prevent MitD attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
43. Reverse engineering in medical application: literature review, proof of concept and future perspectives
- Author
-
Yosef Wakjira, Navaneethan S. Kurukkal, and Hirpa G. Lemu
- Subjects
Reverse engineering ,3D scanning ,Imaging techniques ,Healthcare ,Reconstruction ,Medicine ,Science - Abstract
Abstract Reverse engineering, a process of extracting information or knowledge from existing objects or systems, has gained significant attention in various fields, including medicine. This article presents a comprehensive literature review and a proof of concept on the application of reverse engineering in the medical field. The review particularly focuses on the reverse engineering process, available technologies, and their specific relevance to the medical domain. Various imaging techniques, such as computed tomography and magnetic resonance imaging, are discussed in respect of their integration with reverse engineering methodologies. Furthermore, the article explores the wide range of medical applications facilitated by reverse engineering, including prosthetics, implants, tissue engineering, and surgical planning. The potential of reverse engineering to enhance personalized medicine and patient-specific treatments is highlighted. A detailed proof of concept focusing on femur reconstruction is a significant component of the article. The proof of concept showcases the practical implementation of reverse engineering techniques to assist in designing and manufacturing precise custom-made implants and bone reconstruction. It emphasizes the integration of patient-specific anatomical data obtained through imaging technologies and the subsequent utilization of reverse engineering processes for anatomical reconstruction (solid modeling). Overall, this article provides an extensive overview of reverse engineering in medical applications, incorporating a literature review and a case study. The findings highlight reverse engineering’s potential to advance medical practices, improve patient outcomes, and foster personalized treatments. The review emphasizes the reverse engineering process, available technologies, and their specific relevance to the medical field, as well as their potential and effectiveness in advancing medical practices.
- Published
- 2024
- Full Text
- View/download PDF
44. Design and manufacturing of an automated system for surface reconstruction of cylindrical object by cloud compare.
- Author
-
Hussein, Elaf A. and Hamdan, Wisam K.
- Subjects
- *
REVERSE engineering , *SURFACE reconstruction , *DEFORMATION of surfaces , *MANUFACTURING processes , *ALGORITHMS - Abstract
Reverse engineering (RE) is a sophisticated science that involves building numerous tools to assist with various jobs. Modern technologies, the most significant of which is the scanner, have contributed to introducing another notion in this field of study. We must decide whether the object is related to engineering, medicine, or archaeology, as well as whether it has surface deformations or is disposable. This research will demonstrate how to utilize software programs, and Arduino UNO approaches to display digital data produced by a device intended to measure product dimensions on a computer without using sophisticated algorithms. The improvement in the dimensions of the data processed by CloudCompare and MATLAB programs reached 96.07%. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. Reverse engineering of steam turbines for national manufacturing industry independence.
- Author
-
Febriansyah, D., Harmadi, R., Herbandono, K., Faisal, Faisal, and Nandar, C. S. A.
- Subjects
- *
STEAM-turbines , *STEAM engineering , *REVERSE engineering , *MANUFACTURING industries , *NEW product development , *STEAM flow - Abstract
Indonesia uses a lot of steam turbines, so there is a lot of demand for this equipment. Indonesia's current need for steam turbines is still met by imports. It is anticipated that less reliance on imports will result from the development of a domestic steam turbine. The Indonesian government is conducting reverse engineering in accordance with the degree of the local manufacturing industry's competence to expedite the construction of national steam turbines. Reverse engineering process comprises the phases of digitization, reconstruction, and production. The purpose of the study is to provide details on the successes and challenges faced by BRIN in the development of the national steam turbine. Several small-scale (450 HP back pressure, 3 MW direct condensing, 3 MW geothermal direct condensing, and 4 MW back pressure) steam turbine prototypes of various types and powers are the product of the development efforts. Reverse engineering is the best method for transferring steam turbine technology in Indonesia In order to strengthen regional industries and decrease steam turbine imports. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. Design and manufacturing of 3D scanner for surface reconstruction of an object using meshlab.
- Author
-
Hussein, Elaf A. and Hamdan, Wisam K.
- Subjects
- *
SURFACE reconstruction , *REVERSE engineering , *SCANNING systems , *OPTICAL scanners , *DEFORMATION of surfaces , *ALGORITHMS - Abstract
Reverse engineering (RE) is an advanced science that entails the creation of many devices that help perform various tasks. Another concept of this science was introduced by modern technologies, the most important of which is the scanner. However, we are faced with several issues, including whether the piece has surface deformations or is expendable and whether it is related to engineering, medicine, or archaeology. This study will show how to use digital data generated by a device designed to measure product dimensions and display it on a computer using Arduino UNO techniques and several software programs without using complex algorithms. It was found that the data efficiency results through processing by MeshLab and MATLAB programs reached 89.15%. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. Reverse engineering methodology applied for the design of a light aircraft composite wheel cover. Numerical simulations for aerodynamic and structural analysis.
- Author
-
Fournier, Axel, Guenni, Malek, Morell-Moratal, Carles, Raiu, Nicolae-Emmanuel, Andrei, Irina-Carmen, Ştefan, Adriana, Pelin, Cristina, Stoica, Gina Florica, Crişan, Nicoleta, Prisecaru, Delia, Stoica, Cristian, Greculescu, Anca, Boşcoianu, Corina-Elena, and Costea, Emil
- Subjects
- *
REVERSE engineering , *COMPUTER simulation , *AEROSPACE industry research , *LIGHT aircraft , *THREE-dimensional printing , *RESEARCH institutes , *COMPOSITE construction - Abstract
This paper presents the results of the research stage focused on applications of composite materials in aviation, carried on by an international team of European Project Semester students at the National Institute for Aerospace Research "Elie Carafoli" – INCAS, as Research Partner of the University POLTEHNICA of Bucharest, as Organizer and EUROPEAN PROJECT SEMESTER Provider. The study case is a light aircraft wheel cover. The objectives are set to the determination of the body geometry by reverse engineering techniques, modeling and numerical simulations for aerodynamics and structural analysis. A scale reduced demonstrator was obtained through 3D printing. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. Analysing shrinkage compensation in additive manufacturing: a comparative study of reverse engineering and gauge-based methods.
- Author
-
Zanini, Alessio, Marconi, Marco, and Rubino, Gianluca
- Subjects
THREE-dimensional printing ,REVERSE engineering ,GAGES ,MANUFACTURING industries ,WAGES - Abstract
Additive Manufacturing has transformed modern manufacturing with its well-known advantages. However, shrinkage remains a critical challenge, causing dimensional inaccuracies that should be properly compensated to assure geometric fidelity. This study aims to assess the reliability of a Reverse Engineering (RE) technique for dimensional compensation. A gauge-based measurement approach has been used to validate the RE method. Results confirm that the RE method is promising, while highlighting the intrinsic errors of the RE technique, and suggesting ways to evaluate and prevent them. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. An approach for reverse engineering and redesign of additive manufactured spare parts.
- Author
-
Rešetar, Marija, Valjak, Filip, Grabar Branilović, Marina, Šercer, Mario, and Bojčetić, Nenad
- Subjects
REVERSE engineering ,THREE-dimensional printing ,FUNCTIONAL analysis ,SPARE parts ,MAINTENANCE equipment - Abstract
The spare parts play a vital role in sustaining the operation and longevity of products and systems, but their unavailability can lead to prolonged downtime or expensive replacements. The integration of 3D scanning and Additive Manufacturing (AM) presents a promising path for spare part production. However, to utilise the full potential of AM, sometimes, redesign of the original part is needed. This paper investigates and proposes a new approach that integrates reverse engineering and redesign of an original part based on functional analysis to support the manufacturing of AM spare parts. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. New methodology for the characterization of 3D model reconstructions to meet conditions of input data and requirements of downstream application.
- Author
-
Joost, Robert, Mönchinger, Stephan, and Lindow, Kai
- Subjects
COMPUTER-aided design ,DECISION making ,METHODOLOGY ,REVERSE engineering ,EVALUATION - Abstract
In the field of 3D model reconstruction, manifold methods have been developed that derive CAD models from 3D scan data. Opposed to classical CAD modelling, where surface and solid modelling exist, a further diversification of modelling techniques is observed, caused by different methods to build up the geometry. This research introduces a new classification, the so-called Level of Complexities. It can be applied to the complete Reverse Engineering process chain and lays the foundation for further research on how to match requirements arising from all process steps and downstream applications. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.