The use of complex electronic systems in medical technology applications is constantly increasing. These systems are becoming increasingly important, particularly in the area of analyzing the progress of treatment, as...
详细信息
The use of complex electronic systems in medical technology applications is constantly increasing. These systems are becoming increasingly important, particularly in the area of analyzing the progress of treatment, as...
详细信息
ISBN:
(数字)9798331529604
ISBN:
(纸本)9798331529611
The use of complex electronic systems in medical technology applications is constantly increasing. These systems are becoming increasingly important, particularly in the area of analyzing the progress of treatment, as they can be used to identify any deficits that may still exist. Although systems are now available from a number of manufacturers, they are not always applicable to all mobile problems, so approaches with adapted system technology must be used.
Several standards and guidelines give advice on the development of qualitative and quantitative criteria to evaluate safety related systems, in order to apply these in safety critical applications. These standards don...
详细信息
ISBN:
(纸本)9784883254194
Several standards and guidelines give advice on the development of qualitative and quantitative criteria to evaluate safety related systems, in order to apply these in safety critical applications. These standards don't take into account the possibility of an external attack on the safety related system. In this paper, we will describe the current situation and explore methods and models for security and safety related systems with the help of Markov-models.
This paper presents the recent design and development aspects considered within a current project running at the department of computerarchitecture and systemprogramming. The project "Safety WLAN architectures ...
详细信息
ISBN:
(纸本)9784883254194
This paper presents the recent design and development aspects considered within a current project running at the department of computerarchitecture and systemprogramming. The project "Safety WLAN architectures for safety critical applications related to diagnostic and predictive maintenance possibilities" includes the aspects of diagnostic and predictive maintenance strategies as well as safety related hardware, reliable software design and reliable wireless communication. This paper considers design strategies for the development of reliable, safe sensor systems for process control.
This paper presents an automated code generation and validation, verification approach to convert model based developments into IEC 61131-3 conform function blocks. IEC 61131-3 programming languages are supported by P...
详细信息
This paper investigates the possibilities to monitor the degree of disturbances of a wireless communication and to use this information to calculate online the necessary safety parameters in order to estimate the prob...
详细信息
Data flow processing is a common task of embedded systems which is usually modeled as a pipeline. Errors in a block of this pipeline can be propagated through it thus leading to unexpected and erroneous behaviors. For...
详细信息
Optical speed sensors based on the spatial frequency filter method are a proven technology that offer high measurement accuracy over a wide speed range. Newly developed variants also enable measurements at very low sp...
详细信息
This paper presents an automated code generation and validation, verification approach to convert model based developments into IEC 61131-3 conform function blocks. IEC 61131-3 programming languages are supported by P...
This paper presents an automated code generation and validation, verification approach to convert model based developments into IEC 61131-3 conform function blocks. IEC 61131-3 programming languages are supported by PLC manufacturers and software environment developers and provide the possibility that novel and intelligent algorithms can be directly operated on industrial accepted systems. Railway and transportation also receive drastic changes from purely hardware based systems to microcontroller + software driven systems. However, the conversion has to follow certain steps to ensure that the adaptation is done correctly and functionality is not alternated, added or deleted. Concepts suggested by different international standards such as the IEC 61508 can help to derive a tool chain to verify the generated code.
Phishing is a type of cyber-attack aiming to steal people's confidential information using a bait. Smishing is a form of phishing that is carried out via SMS messages sent to mobile phones. Attackers intend to ste...
详细信息
暂无评论