The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Dependability of cyber-physical systems rests crucially on the fidelity of formal models to their real-world physical subject matter; yet little explicitly focused research has been devoted to this concern. This talk sketches the concern and commends it as a focus for future research in the RE community.
With ever-increasing productivity targets in mining operations, there is a growing interest in mining automation. In future mines, remote controlled and autonomous haulers will operate underground guided by LiDAR (Light Detection And Ranging) sensors. We envision reusing LiDAR measurements to maintain accurate mine maps that would contribute to both safety and productivity. Extrapolating from a pilot...
Just-in-time (JIT) approaches have been suggested for managing non-functional requirements in agile projects. However, many non-functional requirements cannot be raised and met on the spot. In this position paper, we argue that effective JIT engineering of quality requirements depends on a solid foundation of long-term knowledge about all relevant quality requirements. We present two examples from...
Providing a correct, complete, and unambiguous requirements specification is still one of the biggest challenges in software engineering. In the case of safety-critical systems, this challenge is even greater, since misinterpretations can lead to catastrophic damages to humans and to the environment. Agile development proposes minimizing the challenges in requirements specifications through short...
The model-driven development of systems involves multiple models, metamodels and transformations, and relationships between them. A bidirectional transformation (bx) is usually defined as a means of maintaining consistency between "two (or more)" models. This includes cases where one model may be generated from one or more others, as well as more complex ("symmetric") cases where...
This paper discusses the role of safety, availability, dependability of Internet of Things (IoT) data services dedicated to the monitoring and control of objects in the physical world. These services are designed to be available to devices and users on request at any time and at any location. The Internet of Things differs from today's global Internet in a number of ways. For instance, the networks...
Distributing software effectively to multi core, many core, and distributed systems has been studied for decades but still advances successively driven by domain specific constraints. Programming vehicle ECUs is one of the most constrained domains that recently approached the need for concurrency due to advanced driver assistant systems or autonomous driving approaches. In this paper, software distribution...
The purpose of this paper is to develop a framework to use Assurance Case methodology for Industrial IoT systems (IIoT). To achieve a general goal we discuss the three following issues. Firstly, a brief analysis of state-of-the-art researches and resources in area of Assurance Case is done. Secondly, we discuss specific components for IIoT Assurance Case with focus on Security Assurance. Thirdly,...
Certification compliance check for airborne software is very critical as it aids in the certification of the software. Since this compliance check is performed manually which is time-consuming and erroneous, an in-house developed Certification Compliance Tool (CCT) helps in checking the compliance as per RTCA DO-178B/C and generate artifacts depicting the magnitude of compliance. In order to generate...
System Analysis Modeling Language (SAML) is a formal language which helps in expressing and analyzing the qualitative and quantitative aspects of the software as well as hardware models. This can be used in model-based safety analysis (MBSA) which provides the means of identifying, localizing and analyzing hazards in these real-time Safety-Critical Systems. This paper describes the work carried out...
With the current trend of introducing networking capabilities into traditional industries, Cyber-Physical Production Systems (CPPS) are increasingly targeted by cyber-attacks. Especially with the progression of introducing the industry 4.0 paradigm to sectors that until now worked with strictly sealed environments, new attack surfaces are brought to the attention of cyber-criminals that already possess...
This paper deals with the method of a fault detection and diagnostic system for the domain control units and the garnish systems, a vehicle equipped with advanced vehicle E/E systems. The fault detection is a technique for improving the diagnostic coverage of vehicle E/E systems by introducing harsh environments to fault injection in hardware paths and error handling code in software paths. This results...
In 2016, the licensee found that load sequence logics for the emergency diesel generator (EDG) of some Nuclear Power Plants (NPPs) in Korea were errors that can operate two component cooling water pumps (CCWP) in a train. The rated power of the EDG is designed with consideration for one CCWP. An increase of the load due to operation of two CCWPs can exceed the rated power of the EDG and cause a serious...
As shrinking the overseas nuclear power plant construction market, the number of producers and suppliers has been increased abandoning nuclear quality assurance programs because of decreasing the demand for safety grade items. It is difficult to supply equipment for installation and replacement of safety class electrical equipment of Nuclear Power Plants (NPPs) in Korea. Commercial Grade Items (CGIs)...
In real-time and safety-critical systems, the move towards multicores is becoming unavoidable in order to keep pace with the increasing required processing power and to meet the high integration trend while maintaining a reasonable power consumption. However, the benefit expected from multicore platforms may not step up to the mark, and real-time constraints can be easily violated. Indeed, an efficient...
Embedded systems in safety-critical environments are continuously required to deliver more performance and functionality, while expected to provide verified safety guarantees. Nonetheless, platform-wide software verification (required for safety) is often expensive. Therefore, design methods that enable utilization of components such as real-time operating systems (RTOS), without requiring their correctness...
School Bus Routing (SBR) is a typical instance of Vehicle Routing Problem (VRP). Meanwhile SBR has unique and important objectives, such as safety of the students and total amount of time the students stay on the bus that other VRPs usually do not need to consider. When all these factors are considered, the school bus routing problem becomes a complex combinatorial optimization issue which the traditional...
This paper considers the up-to-date railway RAMS (Reliability, Availability, Maintainability, and Safety) standards, i.e. EN 5012X series and FprEN 50657, and provides an overview of different definitions and requirements upon non-safety-related software in the context of those standards.
IoT devices are software-rich and Java is sometimes chosen as the developing programming language. Although Java is highly productive in constructing large advanced programs, application or user-defined Java classes must be responsible for safety and security issues. In particular, two fundamental methods hashCode and equals play key roles in safety and security assurance. Some existing studies for...
Modern cyber-physical systems, like automotive systems and aerial vehicles, are not built with cyber security in mind. Several techniques have been developed recently to overcome cyber-attacks on cyber-physical systems both at the software and the control levels. Adding such cyber security techniques to protect a system against malicious attacks, however, can incur runtime overheads that, in the case...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.