This work makes a case for the integration of the increasingly popular and largely separate topics of Industry 4.0 and the circular economy (CE). The paper extends the state-of-the-art literature by ...proposing a pioneering roadmap to enhance the application of CE principles in organisations by means of Industry 4.0 approaches. Advanced and digital manufacturing technologies are able to unlock the circularity of resources within supply chains; however, the connection between CE and Industry 4.0 has not so far been explored. This article therefore contributes to the literature by unveiling how different Industry 4.0 technologies could underpin CE strategies, and to organisations by addressing those technologies as a basis for sustainable operations management decision-making. The main results of this work are: (a) a discussion on the mutually beneficial relationship between Industry 4.0 and the CE; (b) an in-depth understanding of the potential contributions of smart production technologies to the ReSOLVE model of CE business models; (c) a research agenda for future studies on the integration between Industry 4.0 and CE principles based on the most relevant management theories.
Guarantee fiduciary this is basically for make it easy Public in get help credit, howeve iin implementation still arise various problem. Among them is in Thing execution guarantee fiduciary, where is ...the action arbitrary moment billing still bloom happen. Problem execution guarantee fiduciary return Becomes attention public post decision Court Constitution Number 2/PUU-XIX/2021 on August 31, 2021. There is an assumption that Decision Court Constitution the give convenience to company financing for execute guarantee fiduciary. Destination study this is (1) for analyze execution guarantee fiduciary in agreement financing vehicle motorized post Decision Court Constitution Number 2/PUU-XIX/2021, and (2) for analyze enforcement law to violations committed by debt collectors ( debt collectors ). Study this use method study law normative, with approach law. Fiduciary guarantee is basically conseptualized in order to deliver acess for public to gain credit. However in its implementation, it still arises various problem. Ome of the problem is its execuition. This problem become public attention after the decision made trough court contitutionale Number 21 PUU-X/X/X/2021 on August 2021. There is an assumtion that the decision of constitutional court to company financing for fiduciary guarantee. The purpose of this study is: first analyzing execution in fiduciary guarantee in agreement financing motorized vericle after the constitutional court decision Number 21 PUU-X/X/X/2021 was made. Second, this study also interded to analyze law enforcement to violations commited by debt collectors. This study use normative legal method consisting of legal approach.
A Survey on Software Fault Localization Wong, W. Eric; Ruizhi Gao; Yihao Li ...
IEEE transactions on software engineering,
2016-Aug.-1, 2016-8-1, 20160801, Volume:
42, Issue:
8
Journal Article
Peer reviewed
Open access
Software fault localization, the act of identifying the locations of faults in a program, is widely recognized to be one of the most tedious, time consuming, and expensive - yet equally critical - ...activities in program debugging. Due to the increasing scale and complexity of software today, manually locating faults when failures occur is rapidly becoming infeasible, and consequently, there is a strong demand for techniques that can guide software developers to the locations of faults in a program with minimal human intervention. This demand in turn has fueled the proposal and development of a broad spectrum of fault localization techniques, each of which aims to streamline the fault localization process and make it more effective by attacking the problem in a unique way. In this article, we catalog and provide a comprehensive overview of such techniques and discuss key issues and concerns that are pertinent to software fault localization as a whole.
We present a technique to automatically generate search heuristics for dynamic symbolic execution. A key challenge in dynamic symbolic execution is how to effectively explore the program's execution ...paths to achieve high code coverage in a limited time budget. Dynamic symbolic execution employs a search heuristic to address this challenge, which favors exploring particular types of paths that are most likely to maximize the final coverage. However, manually designing a good search heuristic is nontrivial and typically ends up with suboptimal and unstable outcomes. The goal of this paper is to overcome this shortcoming of dynamic symbolic execution by automatically learning search heuristics. We define a class of search heuristics, namely a parametric search heuristic, and present an algorithm that efficiently finds an optimal heuristic for each subject program. Experimental results with industrial-strength symbolic execution tools (e.g., KLEE) show that our technique can successfully generate search heuristics that significantly outperform existing manually-crafted heuristics in terms of branch coverage and bug-finding.
Abstract
The rapid development of the high frequency power conversion techniques makes great demands on the methods that can reduce the execution time of the program effectively. This paper is aiming ...at reducing the execution time of the program in several aspects such as sampling, complex expressions, and so on. As one of the most widely applied methods, reducing the execution time of the program at the cost of the memory space is adopted in this paper. Furthermore, in order to confirm the feasibility and superiority of programs that are proposed in this paper, they are compared with other programs that can realize the same function in terms of the execution time.
Coverage-based Greybox Fuzzing (CGF) is a random testing approach that requires no program analysis. A new test is generated by slightly mutating a seed input. If the test exercises a new and ...interesting path, it is added to the set of seeds; otherwise, it is discarded. We observe that most tests exercise the same few "high-frequency" paths and develop strategies to explore significantly more paths with the same number of tests by gravitating towards low-frequency paths. We explain the challenges and opportunities of CGF using a Markov chain model which specifies the probability that fuzzing the seed that exercises path i generates an input that exercises path j. Each state (i.e., seed) has an energy that specifies the number of inputs to be generated from that seed. We show that CGF is considerably more efficient if energy is inversely proportional to the density of the stationary distribution and increases monotonically every time that seed is chosen. Energy is controlled with a power schedule. We implemented several schedules by extending AFL. In 24 hours, AFLFast exposes 3 previously unreported CVEs that are not exposed by AFL and exposes 6 previously unreported CVEs 7x faster than AFL. AFLFast produces at least an order of magnitude more unique crashes than AFL. We compared AFLFast to the symbolic executor Klee. In terms of vulnerability detection, AFLFast is significantly more effective than Klee on the same subject programs that were discussed in the original Klee paper. In terms of code coverage, AFLFast only slightly outperforms Klee while a combination of both tools achieves best results by mitigating the individual weaknesses.
Enforcement law reforms have not bypassed the enforcement of monetary claims against tangible property. The security right of an execution order acquired by an attachment levy (ger. ...Pfändungspfandrecht), since the previous Law on Enforcement and Security, is now acquired only by registration, at the request of the executive creditor. The paper tries to give dogmatic contours to this new concept. Starting from the already completed theories in German and Austrian doctrine, it turns out that for the current Serbian concept the most appropriate is so-called mixed theory. At the same time, however, its deficits and erroneous evaluations of the legislator are shown.
TrustZone technology is used to implement Trusted Execution Environment (TEE) in mobile devices. TEE is responsible for isolating and protecting the Trusted Computing Base (TCB) of the device. There ...are several TrustZone-based TEE solutions utilized in devices, among which Qualcomm Secure Execution Environment (QSEE) is the most well-known TEE utilized in many Android devices. Since the underlying QSEE is entailed to ensure the security of sensitive data on the user device, it is essential to analyze its vulnerability state; however, most of the prior work on QSEE targets older devices or firmware versions. In this work, we carry out a comprehensive review of QSEE vulnerabilities and validate the current security state of the target TEE on a physical device. Our approach has been based on mining of CVEs targeting QSEE or its components spanning about seven years, so as to derive the security trend for QSEE as well as a heat-map to narrow down the more targeted areas of the TEE. As the heat-map indicated a major problem area to be vulnerabilities in Trusted Apps (TAs), we validated the integrity issues of TAs on a physical Android device. Our review highlights that while QSEE has considerably improved its security over the years; yet, still vulnerabilities may arise due to variations in vendor-level configurations on physical devices.
A critical feature of the human brain that gives rise to complex cognition is its ability to reconfigure its network structure dynamically and adaptively in response to the environment. Existing ...research probing task-related reconfiguration of brain network structure has concluded that, although there are many similarities in network structure during an intrinsic, resting state and during the performance of a variety of cognitive tasks, there are meaningful differences as well. In this study, we related intrinsic, resting state network organization to reconfigured network organization during the performance of two tasks: a sequence tapping task, which is thought to probe motor execution and likely engages a single brain network, and an n-back task, which is thought to probe working memory and likely requires coordination across multiple networks. We implemented graph theoretical analyses using functional connectivity data from fMRI scans to calculate whole-brain measures of network organization in healthy young adults. We focused on quantifying measures of network segregation (modularity, system segregation, local efficiency, number of provincial hub nodes) and measures of network integration (global efficiency, number of connector hub nodes). Using these measures, we found converging evidence that local, within-network communication is critical for motor execution, whereas integrative, between-network communication is critical for working memory. These results confirm that the human brain has the remarkable ability to reconfigure its large-scale organization dynamically in response to current cognitive demands and that interpreting reconfiguration in terms of network segregation and integration may shed light on the optimal network structures underlying successful cognition.
The dynamic nature of the human brain gives rise to the wide range of behaviors and cognition of which humans are capable. We collected fMRI data from healthy young adults and measured large-scale functional connectivity patterns between regions distributed across the entire brain. We implemented graph theoretical analyses to quantify network organization during two tasks hypothesized to require different combinations of brain networks. During motor execution, segregation of distinct networks increased. Conversely, during working memory, integration across networks increased. These changes in network organization were related to better behavioral performance. These results underscore the human brain's ability to reconfigure network organization selectively and adaptively when confronted with changing cognitive demands to achieve an optimal balance between segregation and integration.