The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Maintenance is a very important part of an organization management. It significantly helps to reduce the costs and fault times of the equipment. We developed an app for mobile devices on Android platform, which efficiently enables to apply a methodology of maintenance management classification in industrial practice (maintenance performance audit). Its aim is to assist with the maintenance management...
In the railway domain, an interlocking is the system ensuring safe train traffic inside a station by controlling its active elements such as the signals or points. Modern interlockings are configured using particular data, called application data, reflecting the track layout and defining the actions that the interlocking can take. The safety of the train traffic relies thereby on application data...
This paper demonstrates attack induced common-mode failures on an industrial-grade (Tricon) Triple-Modular-Redundant PLC (programmable logic controller) and its impact in a Nuclear Power Plant settings. The attack exploits the fact that during the configuration phase the same control logic is downloaded to all three redundant modules. We describe how an attacker can exploit this vulnerability to embed...
The proper alignment of requirements engineering and testing (RET) can be key to software's success. Three practices can provide effective RET alignment: using test cases as requirements, harvesting trace links, and reducing distances between requirements engineers and testers. The Web extra https://youtu.be/M65ZKxfxqME is an audio podcast of author Elizabeth Bjarnason reading the the Requirements...
This paper aims to bring out the interrupt driven approach, taken for the design of checkout software in a completely automated environment. The Checkout Software is used for the complete automation of spacecraft checkout operations during Integrated Spacecraft Testing (IST). The checkout operations carried out for spacecraft testing include acquisition of multiple chains of telemetry in real time,...
Cyber-physical systems are slowly emerging to dominate our world. Cyber-physical systems (CPS) are systems that tightly integrates users, devices and software. Whereas many of these systems are obviously safety-critical systems, some of them become so under special circumstances. This is the case with our focus CPS, i.e. building management systems (BMS), which are not always safety critical per se,...
Spatial errors (e.g., buffer overflows) continue to be one of the dominant threats to software reliability and security in C/C++ programs. Presently, the software industry typically enforces spatial memory safety by instrumentation. Due to high overheads incurred in bounds checking at runtime, many program inputs cannot be exercised, causing some input-specific spatial errors to go undetected in today's...
This article introduces AgileSafe, a new method of incorporating agile practices into critical software development while still maintaining compliance with the software assurance requirements imposed by the application domain. We present the description of the method covering the process of its application and the input and output artefacts.
Property directed reachability (PDR) has been introduced as a very efficient verification method for synchronous hardware circuits that is based on induction rather than fixpoint iteration. However, hardware circuits are usually synthesized from more abstract high-level languages like synchronous languages (or synchronous subsets of hardware description languages). In this paper, we show that it is...
Autonomous guided agricultural self-propelled machines are becoming more common in modern agriculture as well as the increased use of electronic solutions. In order to guarantee the effectiveness of Functional Safety functions software validation is also becoming more complex and critical during the product development. Hardware-In-the-Loop (HIL) systems not only improve software validation coverage,...
The train control center is an indispensable component for the safe operation of high speed railways. This paper analyzes the software function and performance for the train control center subsystem in Chinese Train Control System level 3. It focuses on the editing of active balise telegram, based on the theory of timed automata and hierarchical modeling. First, we analysis the process and form a...
Safety is becoming more and more important with the ever increasing level of safety related E/E Systems built into the cars. Increasing functionality of vehicle systems through electrification of power train and autonomous driving leads to complexity in designing system, software and safety architecture. ISO 26262 aims to reduce the complexity and to approve the traceability of the different safety...
In our age, integrated technical systems as road vehicle brake systems and their reliabilities have become important in engineering. The paper presents an application of LFTSM proposed by Pokoradi to sensitivity of risk estimation of embedded software of a new generation automotive brake system.
All Electric Ships (AESs) are becoming a standard for what it concerns large ships with large power requirements (for both propulsion and onboard loads). At present, the design of shipboard complex power system (namely the IPS — Integrated Power System) is done through a well-proven process, relying on historical data and trial-and-error procedures developed in nearly 30 years of design experience...
Safety and security in software coding is becoming increasingly important in mission-critical systems due to various emerging threats and to avoid potential disastrous consequences. These issues can be significantly reduced by software designs and implementations that adequately protect systems. This abstract describes coding methodologies in the Ada 95/2005 programming language for complex embedded...
Communication faults can lead to irreparable damages. Faulty messages increase the risk of accidents in distributed industrial environments. When the risk is high, safety standards force communication over safety protocols. For each new controller, input and output device, a new implementation of a safety protocol is required. Its validation must strictly follow safety standards, which imposes fault...
This paper explores domain arguments—arguments about why techniques, processes, and designs possess properties as believed by their domain experts. An elicitation technique for their recovery from domain documents is presented. This is followed by demonstrated application of the technique to several domain artifacts from aviation engineering. The elicited arguments are presented and analyzed for their...
Robots are being increasingly used in safety-critical contexts, such as transportation and health. The need for flexible behavior in these contexts, due to human interaction factors or unstructured operating environments, led to a transition from hardware- to software-based safety mechanisms in robotic systems, whose reliability and quality is imperative to guarantee. Source code static analysis is...
Systems of Systems are defined as a collection of component systems that produce results not achievable by the individual systems alone. SoS serves to distinguish true multi-domain and multi-discipline systems from others who have taken up the systems mantle, most noticeably software and IT spaces. But SoS is more than just a higher level focus on configuration management (CM), requirements management...
Static analysis tools are widely used in practice to improve the quality and reliability of software through early detection of defects. However, the number of alarms generated is a major concern because of the cost incurred in their manual inspection required to partition them into true errors and false positives. In this paper, we propose a static analysis to identify the causes of alarms generated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.