The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Reliability and safety property of any hardware is an important parameter. To achieve this and to improve the performance bounds of the designed system it is important to enhance the efficiency by proper verification techniques. To overcome the problems arising due to the software crisis, formal methods are used. The use of formal methods in aerospace domain is the latest research that is being carried...
The software reliability represents one of the most crucial aspects of functional safety. Software is used in almost any electronic systems. When a safety-critical system is considered, it has to be ensured that the software is able to fulfil the minimum safety requirements. If this is not the case, the software will have to be improved until the minimum requirements are fulfilled. Reliability growth...
In the nuclear power engineering, methods of detection and diagnostics of failures, as well as methods of information support of human operators in order to improve the efficiency and reliability of the operation, play increasing role. A task that is solved within the information support is the task of calculating technical and economical indexes, which the paper is devoted to.
Cyber-Physical Systems (CPS) provide many smart features for enhancing physical processes. These systems are designed with a set of distributed hardware, software, and network components that are embedded in physical systems and environments or attached to humans. Together they function seamlessly to offer specific functionalities or features that help enhance human lives, operations or environments...
Choosing the Event-B formal method to model and develop distributed railway interlocking systems can give us a great advantage over the general purpose programming languages, especially in case of the safety analysis of these systems. Despite its many benefits, Event-B suffers from an efficient reuse mechanism, which is highly disadvantageous in the development of large interlocking systems. In this...
This paper provides an overview of methods to achieve safety relevant aspects within a radar system. It also covers the challenges imposed on the radar processing.
In medical device software domain, risk management is a crucial process. With complex systems, medical device software safety becomes more complicated to achieve. Traditional Failure Mode Effect and Analysis (FMEA) have been used for medical device software development for a while. However, there are many studies reveal that traditional approach is inadequate for assessing different risks. This study...
Demand for scalable hardware verification is ever-increasing. We propose an unbounded safety verification framework for hardware, at the heart of which is a software verifier. To this end, we synthesize Verilog at register transfer level into a software-netlist, represented as a word-level ANSI-C program. The proposed tool flow allows us to leverage the precision and scalability of state-of-the-art...
The increasing number of complex embedded systems used in safety relevant tasks produces major challenges in the field of safety analysis. This paper presents a simulation-based safety analysis that will overcome these challenges. The presented approach consists of two parts: an Error Effect Simulation (EES) and a graph-based specification. The EES is composed of a system simulation with fault injection...
In this paper we describe a novel strategy to reveal and handle complex dependencies in an incremental and distributed design processes even under the ubiquitous presence of uncertainties concerning model and design. We demonstrate in a case study how to handle epistemic design uncertainty in an iterative process and present how it is possible to selectively exclude dependency paths under certain...
Modern vehicles are running complex and safety critical applications distributed over several Electronic Control Units (ECUs). Some ECUs are equipped with communication interfaces providing access to other devices, networks or remote services. Since the number of attack vectors is increasing, an early investigation of the impact of attacks becomes steadily more important. This paper gives an example...
A new methodology and algorithm is presented for testing on-chip memories concurrently with the normal operation of a processor, which has little or no effect on its performance. The test algorithm uses a series of short burst of memory access and does not destroy the memory contents. This paper describes the implementation of the memory built-in self-test (MBIST) methodology in the ARM® Cortex®-M7...
Quay mooring status of a ship has been studied by using the mooring analysis software AQWA. The anti-typhoon mooring computation under the combined wind wave and current loads was analyzed with a time domain computation method. The influence of the mooring line material and mooring layout has also been studied on mooring system tensions. According to the research, the mooring layout plan that complies...
This paper presents a cooperation technology perspective on cooperative artifacts within cooperative work environments in the maritime domain. The issue of cooperation technology can be seen in the design of artifacts, as much cooperation technology has been disrupted rather than supported by engineering design, an example of which is maritime technology. Maritime operation systems narrowly focus...
The component-based software architecture of a cyber-physical system (CPS) is often subject to structural reconfigurations in response to changing environmental conditions. When introducing reconfigurations to CPS, it is mandatory to ensure that the execution of a reconfiguration does not compromise the safety of the system, e.g., by causing a violation of hard real-time constraints. Existing approaches...
Nowadays, software development innovations are heavily found in electronic control units for the automotive sector. Software in this sector has grown considerably, though, the number of vehicle recalls because of software defects has grown accordingly. Because of this situation, different proposals arise in the various phases of the software development life cycle which aim to prevent these defects...
OCRA provides a language and tool support to model and analyze acomponent-based architecture enriched with contracts. Assumptions andguarantees of components are specified in different variants oflinear-time temporal logics, supporting variables with infinitedomains and continuous dynamics. The tool provides different analysistechniques including contracts refinement checking, contract-basedcompositional...
A variety of scientific models and computational tools have been developed to improve human safety and comfort in built environments. In this work we discuss the use of crowd simulation to reproduce and to evaluate egress performance in specific scenarios. We present CrowdSim, a crowd simulation tool designed to automatically reproduce crowd behaviors during building egress. Associated with this kind...
Computer network in work and life bring convenience for people at the same time, also inevitable has brought some safe hidden trouble. To bring the positive role of efficient use of computer network, you need to effectively safeguard the security of computer network information. This article mainly analyzes the present situation of computer network security problems, analyzes the main source of computer...
In recent years, acts of assault and violence against women are rising at a menacing rate. With escalation of female employees in industries and other sectors of the commercial market, it is now becoming a necessity for females to travel at late hours and visit distant and isolated locations as a part of their work regime. However, the exponential increase in assault, violence and attacks against...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.