The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Manufacturers of road vehicles have to comply with the functional standard ISO 26262. This standard requires the creation of a safety case, which compiles all the work products of the life-cycle in a traceable manner. The creation of a safety case is extremely time-consuming. Its creation is needed for the purpose of self-assessment in order to manage the liability risk. To speed up such creation,...
Assuring functional correctness of smart mobility platforms is a critical task for enhancing reliability and safety. Hierarchical State Transition Matrix (HSTM) is a popular software design language, which can also be used for designing fundamental software of smart mobility platforms. For HSTM designs with complex hierarchical structure, it is often helpful if paths, which lead from the first-time...
Additional specific requirements to supplement the criteria and requirements of IEEE Std 603(TM) are specified for programmable digital devices. Within the context of this standard, the term programmable digital device is any device that relies on software instructions or programmable logic to accomplish a function. Examples include a computer, a programmable hardware device, or a device with firmware...
Unmanned Aerial Vehicles (UAVs) are increasingly demanded in civil, military and research purposes. However, they also possess serious threats to the society because faults in UAVs can lead to physical damage or even loss of life. While increasing their intelligence, for example, adding vision-based sense-and-avoid capability, has a potential to reduce the safety threats, increased software complexity...
Open source electrophysiology (ephys) recording systems have several advantages over commercial systems such as customization and affordability enabling more researchers to conduct ephys experiments. Notable open source ephys systems include Open-Ephys, NeuroRighter and more recently Willow, all of which have high channel count (64+), scalability, and advanced software to develop on top of. However,...
With expanding weight on the need to lessen CO2 emanations and fuel utilization, engine producers and vehicle integrators are searching for more radical approaches to build engine proficiency. One strategy is to draw vitality from various waste warmth sources. A turbocharger is a minimal and effective method for accomplishing this end and Cummins Turbo Technologies is working with various clients...
We perform systematic mapping study in the field of security requirements engineering covering the time period of 2010-2015. Our aim is to find problems that the literature has addressed during the five year period. Our primary studies comprised of 251 studies. We identified 15 clusters regarding problems faced in security requirements engineering and identified their solutions. Our future work includes...
With number of ships increasing, the scale of ships being increasingly larger and anchorage ground being increasingly crowd, the accidents of dragging anchor occur more frequently in recent years. In order to improve the security of mooring ship and realize the intelligent monitoring of mooring ship, this paper reviewed the application of all kinds of navigation instruments used in the field of mooring...
We propose Powernet as an end-to-end open source technology for economically efficient, scalable and secure coordination of grid resources. It offers integrated hardware and software solutions that are judiciously divided between local embedded sensing, computing and control, which are networked with cloud-based high-level coordination for real-time optimal operations of not only centralized but also...
Obtaining Worst-Case Execution Time (WCET) estimates is a required step in real-time embedded systems during software verification. Measurement-Based Probabilistic Timing Analysis (MBPTA) aims at obtaining WCET estimates for industrial-size software running upon hardware platforms comprising high-performance features. MBPTA relies on the randomization of timing behavior (functional behavior is left...
New applications like highly automated driving, Car-2-X, software updates over the air, or vehicles as part of the internet of things raise completely new requirements to a software platform for the next generation of ECUs. AUTOSAR as the worldwide leading standardization organization for in-vehicle software bears this challenge and paves the way making vehicles intelligent and adaptive. Based on...
This paper demonstrates targeted cyber-physical attacks on teleoperated surgical robots. These attacks exploit vulnerabilities in the robot's control system to infer a critical time during surgery to drive injection of malicious control commands to the robot. We show that these attacks can evade the safety checks of the robot, lead to catastrophic consequences in the physical system (e.g., sudden...
The software was developed to realize the braking calculation of self-designed low-floor trams throughadjusting parameters, such as the bogie number, the bogie type, vehicle parameters, electro-hydraulic braking parameters, foundation braking parameters and so on. In this software, the calculation of braking force, the brake cylinder pressure, the braking distance, braking time can be achieved. Thedistribution...
Process of development complex electronic control units (ECUs) is usually complex and requires several iterations (releases). After each iteration, it is necessary to perform detailed testing and verification of all components in a testing environment that is as similar as possible to the real system. For this kind of testing it is recommended to use the automated testing environment that generates...
The paper considers the possibilities of designing and implementing works' on port safety system for the needs of the developing Port of Bar in Montenegro which functions for decades in the transitional environment. On the basis of the secondary literature resources review - an RFID (radio frequency identification) safety model which includes PPE (personal protective equipment) garments equipped with...
A logger in the cloud capable of keeping a secure, time-synchronized and tamper-evident log of medical device and patient information allows efficient forensic analysis in cases of adverse events or attacks on interoperable medical devices. A secure logger as such must meet requirements of confidentiality and integrity of message logs and provide tamper-detection and tamper-evidence. In this paper,...
In a context where software is more and more pervasive in all systems, and where it is sometimes advocated that software complexity and size seem to provide some relevance to a probabilistic view of software behaviour, several initiatives suggest to change the way to address software in the global system safety assessment. The authors argue that whereas there are many links between safety assessment...
Given the proliferation of Unmanned Aerial Systems (UASs) for military and commercial purposes, there is a fast-approaching need for comprehensive and robust systems which secure the UAS for public safety and assurance of military goals. This paper puts forth a comprehensive system of protecting UASs against hardware and software attacks, at the lowest and highest semantic levels. This approach monitors...
Safety and reliability are key if unmanned aerial systems (UAS) are to move from research and become an everyday part of our lives. How can safety and reliability be maintained when cost and timeliness are such pressing factors in small UAS development? In this paper, it is shown that with open-source flight control software (provided by the authors), sophisticated testing practices (hardware-in-the-loop)...
When a huge event occurs it is necessary the alignment between at least two command centers, one connected to the civil protection and the other focused on safety. The communication and coordination between both command centers it is crucial, because it improves the coordination and therefore the decision making process. This paper presents the design and implementation of a technological framework...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.