Burçin Çakir

Learn More
Malicious tampering of the internal circuits of ICs can lead to detrimental results. Insertion of Trojan circuits may change system behavior, cause chip failure or send information to a third party. This paper presents an information-theoretic approach for Trojan detection. It estimates the statistical correlation between the signals in a design, and(More)
In manufacturing systems the detection of tool wear during cutting process is one of the most important considerations. In order to perform online tool condition monitoring (TCM) for different cutting conditions, a sensor-integration strategy with machining parameters is proposed. TCM systems are most frequently based on the research which attempts to(More)
  • 1