Pub Date : 2025-04-22DOI: 10.1109/JPROC.2025.3559609
{"title":"IEEE Connects You to a Universe of Information","authors":"","doi":"10.1109/JPROC.2025.3559609","DOIUrl":"https://doi.org/10.1109/JPROC.2025.3559609","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 12","pages":"1852-1852"},"PeriodicalIF":23.2,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10972344","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143860867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-04-22DOI: 10.1109/JPROC.2025.3549207
{"title":"Future Special Issues/Special Sections of the Proceedings","authors":"","doi":"10.1109/JPROC.2025.3549207","DOIUrl":"https://doi.org/10.1109/JPROC.2025.3549207","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 12","pages":"1851-1851"},"PeriodicalIF":23.2,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10972366","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143860866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-04-22DOI: 10.1109/JPROC.2025.3541563
Adam L. Friedman;Aubrey T. Hanbicki
{"title":"Prolegomena to Any Future Device Physics [Point of View]","authors":"Adam L. Friedman;Aubrey T. Hanbicki","doi":"10.1109/JPROC.2025.3541563","DOIUrl":"https://doi.org/10.1109/JPROC.2025.3541563","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 12","pages":"1763-1772"},"PeriodicalIF":23.2,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10972343","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143860801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-04-22DOI: 10.1109/JPROC.2025.3548938
Stefan M. Goetz;Ricardo Lizana F.;Sebastian Rivera
Magnetic windings, in general, and small drives, in particular, are typically associated with thin round copper wires. This group of small drives includes electrical machines for automotive applications, ranging from ancillary units to traction machines for both hybrid electric vehicle (HEV) and battery electric vehicle (BEV) [1], [2]. Wire-wound machines can refer to well-established techniques for widely automatic manufacturing except for traction machines with distributed windings, which still contain manual steps in most assembly lines, particularly after the insertion process [3]. Machines typically wind the loops of continuous wires on a bobbin with a linear or flyer-winding technique outside the stator and pull them from one side of the stator to the other into the slots. The overhang on both ends of the stator, the so-called end turns, forms automatically from the continuous loops.
{"title":"Hairpin Windings: Twists and Bends of a Technological Breakthrough [Scanning our Past]","authors":"Stefan M. Goetz;Ricardo Lizana F.;Sebastian Rivera","doi":"10.1109/JPROC.2025.3548938","DOIUrl":"https://doi.org/10.1109/JPROC.2025.3548938","url":null,"abstract":"Magnetic windings, in general, and small drives, in particular, are typically associated with thin round copper wires. This group of small drives includes electrical machines for automotive applications, ranging from ancillary units to traction machines for both hybrid electric vehicle (HEV) and battery electric vehicle (BEV) <xref>[1]</xref>, <xref>[2]</xref>. Wire-wound machines can refer to well-established techniques for widely automatic manufacturing except for traction machines with distributed windings, which still contain manual steps in most assembly lines, particularly after the insertion process <xref>[3]</xref>. Machines typically wind the loops of continuous wires on a bobbin with a linear or flyer-winding technique outside the stator and pull them from one side of the stator to the other into the slots. The overhang on both ends of the stator, the so-called end turns, forms automatically from the continuous loops.","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 12","pages":"1831-1849"},"PeriodicalIF":23.2,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10972339","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143860800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-04-22DOI: 10.1109/JPROC.2025.3549199
{"title":"Proceedings of the IEEE Publication Information","authors":"","doi":"10.1109/JPROC.2025.3549199","DOIUrl":"https://doi.org/10.1109/JPROC.2025.3549199","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 12","pages":"C2-C2"},"PeriodicalIF":23.2,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10972338","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143860865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-04-22DOI: 10.1109/JPROC.2025.3549203
{"title":"IEEE Membership","authors":"","doi":"10.1109/JPROC.2025.3549203","DOIUrl":"https://doi.org/10.1109/JPROC.2025.3549203","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 12","pages":"C3-C3"},"PeriodicalIF":23.2,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10972349","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143860799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Presents corrections to the paper, (Corrections to “Brain-Inspired Computing: A Systematic Survey and Future Trends”).
提出对论文的更正,(对“大脑启发计算:系统调查和未来趋势”的更正)。
{"title":"Corrections to “Brain-Inspired Computing: A Systematic Survey and Future Trends”","authors":"Guoqi Li;Lei Deng;Huajin Tang;Gang Pan;Yonghong Tian;Kaushik Roy;Wolfgang Maass","doi":"10.1109/JPROC.2025.3539916","DOIUrl":"https://doi.org/10.1109/JPROC.2025.3539916","url":null,"abstract":"Presents corrections to the paper, (Corrections to “Brain-Inspired Computing: A Systematic Survey and Future Trends”).","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 12","pages":"1850-1850"},"PeriodicalIF":23.2,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10972352","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143860797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-04-22DOI: 10.1109/JPROC.2025.3556592
Summary form only: Abstracts of articles presented in this issue of the publication.
仅为摘要形式:本期刊物发表的文章摘要。
{"title":"Scanning the Issue","authors":"","doi":"10.1109/JPROC.2025.3556592","DOIUrl":"https://doi.org/10.1109/JPROC.2025.3556592","url":null,"abstract":"Summary form only: Abstracts of articles presented in this issue of the publication.","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 12","pages":"1761-1762"},"PeriodicalIF":23.2,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10972341","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143860798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-04-22DOI: 10.1109/JPROC.2025.3549205
{"title":"Proceedings of the IEEE: Stay Informed. Become Inspired.","authors":"","doi":"10.1109/JPROC.2025.3549205","DOIUrl":"https://doi.org/10.1109/JPROC.2025.3549205","url":null,"abstract":"","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"112 12","pages":"C4-C4"},"PeriodicalIF":23.2,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10972365","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143860938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Information technology (IT) security has been, and largely is, based on compartmentalization. To implement compartmentalization, system access privileges are granted depending on the topological location of systems, grouped into perimeters, with network mechanisms (firewalls, VLANs, ...) enforcing isolation between perimeters, thus implicitly trusting systems based on their location. However, history has shown that such trust is misplaced. This has led to the emergence of an alternative paradigm, called zero trust. After contextualizing the history of IT and the emergence of zero trust for securing networks, this article presents a taxonomy of zero trust models and architectures, summarizing the goals and core principles of zero trust. Furthermore, an in-depth description of state-of-the-art technologies and methods, for transforming perimeter-based architectures to mature zero-trust architectures, is provided. This article presents a formalization of zero trust and of optimal zero-trust architectures, to which traditional architectures migrate, as well as a method for positioning migrating architectures relative to this ideal of zero trust, with as purpose of enabling a clearer understanding of the benefits and risks induced by a migration to zero trust. Finally, this article analyses the benefits, and drawbacks, of zero trust, focusing on the security properties granted by zero trust, as well as the vulnerabilities introduced.
{"title":"Is Trust Misplaced? A Zero-Trust Survey","authors":"Alexandre Poirrier;Laurent Cailleux;Thomas Heide Clausen","doi":"10.1109/JPROC.2025.3555131","DOIUrl":"10.1109/JPROC.2025.3555131","url":null,"abstract":"Information technology (IT) security has been, and largely is, based on compartmentalization. To implement compartmentalization, system access privileges are granted depending on the topological location of systems, grouped into perimeters, with network mechanisms (firewalls, VLANs, ...) enforcing isolation between perimeters, thus implicitly trusting systems based on their location. However, history has shown that such trust is misplaced. This has led to the emergence of an alternative paradigm, called zero trust. After contextualizing the history of IT and the emergence of zero trust for securing networks, this article presents a taxonomy of zero trust models and architectures, summarizing the goals and core principles of zero trust. Furthermore, an in-depth description of state-of-the-art technologies and methods, for transforming perimeter-based architectures to mature zero-trust architectures, is provided. This article presents a formalization of zero trust and of optimal zero-trust architectures, to which traditional architectures migrate, as well as a method for positioning migrating architectures relative to this ideal of zero trust, with as purpose of enabling a clearer understanding of the benefits and risks induced by a migration to zero trust. Finally, this article analyses the benefits, and drawbacks, of zero trust, focusing on the security properties granted by zero trust, as well as the vulnerabilities introduced.","PeriodicalId":20556,"journal":{"name":"Proceedings of the IEEE","volume":"113 1","pages":"5-39"},"PeriodicalIF":23.2,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143857628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}