Auswahl der wissenschaftlichen Literatur zum Thema „Computer safety“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Computer safety" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Computer safety"

1

MUKAIDONO, Masao. „Computer Safety and Functional Safety“. IEICE ESS FUNDAMENTALS REVIEW 4, Nr. 2 (2010): 129–35. http://dx.doi.org/10.1587/essfr.4.129.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Gorodetskii, V. I., I. V. Kotenko und R. M. Yusupov. „Computer networks safety“. Herald of the Russian Academy of Sciences 76, Nr. 4 (Juli 2006): 396–98. http://dx.doi.org/10.1134/s1019331606040137.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Nestler, Simon. „Safety-critical human computer interaction“. it - Information Technology 61, Nr. 1 (25.02.2019): 67–70. http://dx.doi.org/10.1515/itit-2018-0037.

Der volle Inhalt der Quelle
Annotation:
Abstract Dealing with usability issues of safety-critical interactive systems is essential for an efficient, effective and joyful use of these systems. This paper describes a prototypical safety-critical environment and discusses the HCI (human computer interaction) challenges of different interactive systems for safety-critical environments. We designed, developed and evaluated various interactive systems which solve different challenges in so-called mass casualty incidents (MCIs). In summary, we made contributions to three different areas of application: Mobile computing in safety-critical environments, simulation of safety-critical environments and social media in safety-critical environments. Finally, this paper gives further insights how all these research results can to be brought together in the future in order to be able to build usable interactive systems for safety-critical environments.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Walczak, Andrzej, und Karol Antczak. „Patient Safety versus Computer Diagnosis“. MATEC Web of Conferences 76 (2016): 04006. http://dx.doi.org/10.1051/matecconf/20167604006.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Zalewski, Janusz. „Safety of Computer Control System“. IFAC Proceedings Volumes 34, Nr. 22 (November 2001): 53. http://dx.doi.org/10.1016/s1474-6670(17)32911-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Zalewski, Janusz. „Safety aspects of computer control“. Control Engineering Practice 3, Nr. 3 (März 1995): 439–40. http://dx.doi.org/10.1016/0967-0661(95)90073-x.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Cao, Yuan, Hongkang Lu und Tao Wen. „A Safety Computer System Based on Multi-Sensor Data Processing“. Sensors 19, Nr. 4 (17.02.2019): 818. http://dx.doi.org/10.3390/s19040818.

Der volle Inhalt der Quelle
Annotation:
The safety computer in the train control system is designed to be the double two-vote-two architecture. If safety-critical multi-input data are inconsistent, this may cause non-strict multi-sensor data problems in the output. These kinds of problems may directly affect the decision making of the safety computer and even pose a serious threat to the safe operation of the train. In this paper, non-strict multi-sensor data problems that exist in traditional safety computers are analyzed. The input data are classified based on data features and safety computer features. Then, the input data that cause non-strict multi-sensor data problems are modeled. Fuzzy theory is used in the safety computer to process multi-sensor data and to avoid the non-strict multi-sensor problems. The fuzzy processing model is added into the onboard double two-vote-two architecture safety computer platform. The fuzzy processing model can be divided into two parts: improved fuzzy decision tree and improved fuzzy weighted fusion. Finally, the model is verified based on two kinds of data. Verification results indicate that the fuzzy processing model can effectively reduce the non-strict identical problems and improve the system efficiency on the premise of ensuring the data reliability.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Chen, Li-Shan, Yen-Ming Tseng und Xiao-Na Lin. „Artificial intelligence in safety system“. MATEC Web of Conferences 185 (2018): 00009. http://dx.doi.org/10.1051/matecconf/201818500009.

Der volle Inhalt der Quelle
Annotation:
This research aims to study learning environment, and let the learning environment become smart. Swarm intelligence, cloud computing, and active Ultra-High Frequency RFID were used on it. We built friendly human-computer-interface software for users to use as pad phone. The Extensible Markup Language (XML) and C sharp language were used in this research. If the users begin to search, the kernel safety learning system automatically communicates with other RFID readers by agents, and the agents can search the closer camera for users. This study’s result has successfully implemented to Chin-Huo educational organization, and it would be helpful for the paterfamilias to hold all situations about their children at Chin-Huo educational organization. Paterfamilias can understand their children’s learning, going to Chin-Huo and leaving Chin-Huo through personal computers, or notebooks simultaneously or asynchronously by the computer-mediated communication. That will be great help in the grip of whole after-school remedial education, teaching and learning situation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Singh, Lalit Kumar, und Hitesh Rajput. „Ensuring safety in design of safety critical computer based systems“. Annals of Nuclear Energy 92 (Juni 2016): 289–94. http://dx.doi.org/10.1016/j.anucene.2016.02.002.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Zhang, Yuzhuo, Chunhua Hong, Yuan Cao, Lianchuan Ma und Yinghong Wen. „Safety Mechanism Design and Verification of Safety Computer Parallel Program“. Chinese Journal of Electronics 27, Nr. 6 (01.11.2018): 1163–69. http://dx.doi.org/10.1049/cje.2018.02.016.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Computer safety"

1

Simpson, Andrew C. „Safety through security“. Thesis, University of Oxford, 1996. http://ora.ox.ac.uk/objects/uuid:4a690347-46af-42a4-91fe-170e492a9dd1.

Der volle Inhalt der Quelle
Annotation:
In this thesis, we investigate the applicability of the process algebraic formal method Communicating Sequential Processes (CSP) [Hoa85] to the development and analysis of safetycritical systems. We also investigate how these tasks might be aided by mechanical verification, which is provided in the form of the proof tool Failures-Divergences Refinement (FDR) [Ros94]. Initially, we build upon the work of [RWW94, Ros95], in which CSP treatments of the security property of non-interference are described. We use one such formulation to define a property called protection, which unifies our views of safety and security. As well as applying protection to the analysis of safety-critical systems, we develop a proof system for this property, which in conjunction with the opportunity for automated analysis provided by FDR, enables us to apply the approach to problems of a sizable complexity. We then describe how FDR can be applied to the analysis of mutual exclusion, which is a specific form of non-interference. We investigate a number of well-known solutions to the problem, and illustrate how such mutual exclusion algorithms can be interpreted as CSP processes and verified with FDR. Furthermore, we develop a means of verifying the faulttolerance of such algorithms in terms of protection. In turn, mutual exclusion is used to describe safety properties of geographic data associated with Solid State Interlocking (SSI) railway signalling systems. We show how FDR can be used to describe these properties and model interlocking databases. The CSP approach to compositionality allows us to decompose such models, thus reducing the complexity of analysing safety invariants of SSI geographic data. As such, we describe how the mechanical verification of Solid State Interlocking geographic data, which was previously considered to be an intractable problem for the current generation of mechanical verification tools, is computationally feasible using FDR. Thus, the goals of this thesis are twofold. The first goal is to establish a formal encapsulation of a theory of safety-critical systems based upon the relationship which exists between safety and security. The second goal is to establish that CSP, together with FDR, can be applied to the modelling of Solid State Interlocking geographic databases. Furthermore, we shall attempt to demonstrate that such modelling can scale up to large-scale systems.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Conmy, Philippa Mary. „Safety analysis of computer resource management software“. Thesis, University of York, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.428494.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

An, Hong. „Computer-aided applications in process plant safety“. Thesis, Loughborough University, 2010. https://dspace.lboro.ac.uk/2134/6418.

Der volle Inhalt der Quelle
Annotation:
Process plants that produce chemical products through pre-designed processes are fundamental in the Chemical Engineering industry. The safety of hazardous processing plants is of paramount importance as an accident could cause major damage to property and/or injury to people. HAZID is a computer system that helps designers and operators of process plants to identify potential design and operation problems given a process plant design. However, there are issues that need to be addressed before such a system will be accepted for common use. This research project considers how to improve the usability and acceptability of such a system by developing tools to test the developed models in order for the users to gain confidence in HAZID s output as HAZID is a model based system with a library of equipment models. The research also investigates the development of computer-aided safety applications and how they can be integrated together to extend HAZID to support different kinds of safety-related reasoning tasks. Three computer-aided tools and one reasoning system have been developed from this project. The first is called Model Test Bed, which is to test the correctness of models that have been built. The second is called Safe Isolation Tool, which is to define isolation boundary and identify potential hazards for isolation work. The third is an Instrument Checker, which lists all the instruments and their connections with process items in a process plant for the engineers to consider whether the instrument and its loop provide safeguards to the equipment during the hazard identification procedure. The fourth is a cause-effect analysis system that can automatically generate cause-effect tables for the control engineers to consider the safety design of the control of a plant as the table shows process events and corresponding process responses designed by the control engineer. The thesis provides a full description of the above four tools and how they are integrated into the HAZID system to perform control safety analysis and hazard identification in process plants.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Wang, Yuan-Fang. „Computer Vision Analysis for Vehicular Safety Applications“. International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596451.

Der volle Inhalt der Quelle
Annotation:
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV
In this paper, we present our research on using computer-vision analysis for vehicular safety applications. Our research has potential applications for both autonomous vehicles and connected vehicles. In particular, for connected vehicles, we propose three image analysis algorithms that enhance the quality of a vehicle's on-board video before inter-vehicular information exchange takes place. For autonomous vehicles, we are investigating a visual analysis scheme for collision avoidance during back up and an algorithm for automated 3D map building. These algorithms are relevant to the telemetering domain as they involve determining the relative pose between a vehicle and other vehicles on the road, or between a vehicle and its 3D driving environment, or between a vehicle and obstacles surrounding the vehicle.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Reyad, Passant. „Application of computer vision techniques in safety diagnosis and evaluation of safety treatments“. Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/59701.

Der volle Inhalt der Quelle
Annotation:
Traditional road safety analysis is usually conducted using historical collision records. This reactive approach to road safety has been shown to have several shortcomings. Recently, there has been significant interest in using surrogate measures such as traffic conflicts to analyze safety. This interest has been strengthened by the availability of tools to automate the traffic conflict analysis from video data. Using automated computer vision techniques, road users can be tracked, classified, and their interactions determined accurately and reliably. This thesis demonstrates two applications of automated road safety analysis techniques using traffic conflicts. The first application is related to the diagnosis of road safety issues. A case study of safety at a school zone in Edmonton, Alberta is used. 240 video-hours of traffic data were recorded in two different seasons. The data was analyzed to evaluate the current safety performance of the school zone to identify factors that may be contributing to safety concerns and to propose potential safety improvements. The analysis included the automated analysis of traffic conflicts, violations, and traffic speed. Several recommendations were presented that would potentially improve the safety for all road users without affecting the mobility along the intersections. The second application included an evaluation of the safety effectiveness of improving the signal head visibility at two signalized intersections located in the City of Edmonton, Alberta, by conducting an automated before-and-after safety analysis using traffic conflicts. The use of automated conflict analysis in before/after safety evaluation can significantly reduce the time needed to reach conclusions about the effectiveness of safety countermeasures. More than 300 video-hours of traffic data were recorded at the two treated intersections before and after applying the treatment. In addition, traffic data was collected at two other intersections with similar characteristics to be used as comparison sites. A before/after road safety evaluation was performed using the Empirical Bayes method that accounts for the effects of the regression to the mean confounding factor. The methodology employs the use of a calibrated conflict-based safety performance function (SPF). The results showed a statistically-significant reduction (24.5%) in the average hourly conflict due to the improved signal heads.
Applied Science, Faculty of
Graduate
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Pumfrey, David John. „The principled design of computer system safety analyses“. Thesis, University of York, 1999. http://etheses.whiterose.ac.uk/9797/.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Akritidis, Periklis. „Practical memory safety for C“. Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609600.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Faulkner, Alastair. „Data integrity : an often-ignored aspect of safety systems : executive summary“. Thesis, University of Warwick, 2004. http://wrap.warwick.ac.uk/1212/.

Der volle Inhalt der Quelle
Annotation:
Data is all-pervasive and is found in all aspects of modern computer systems, and yet many engineers seem reluctant to recognise the importance of data integrity. The conventional view of data, as simply an aspect of software, underestimates the role played by data errors in the behaviour of the system and their potential effect on the integrity of the overall system. In many cases hazard analysis is not applied to data in the same way that it is applied to other system components. Without data integrity requirements, data development and data provision may not attract the degree of rigour that would be required of other system components of a similar integrity. This omission also has implications for safety assessment where the data is often ignored or neglected. This position becomes self reenforcing, as without integrity requirements the importance of data integrity remains hidden. This research provides a wide-ranging overview of the use (and abuse) of data within safety systems, and proposes a range of strategies and techniques to improve the safety of such systems. A literature review and a survey of industrial practice confirmed the conventional view of data, and showed that there is little consistency in the methods used for data development. To tackle these problems this work proposes a novel paradigm, in which data is considered as a separate and distinct system component. This approach not only ensures that data is given the importance that it deserves, but also simplifies the task of providing guidance that is specific to data. Having developed this conceptual framework for data, the work then goes on to develop lifecycle models to assist with data development, and to propose a range of techniques appropriate for the various lifecycle phases. An important aspect of the development of any safety-related system is the production of a safety argument, and this research looks in some detail at the treatment of data, and data development, within this justification. The industrial survey reveals that in data-intensive systems data is often developed quite separately from other elements of the system. It also reveals that data is often produced by an extended data supply chain that may involve a number of disparate organisations. These characteristics of data distinguish it from other system components and greatly complicate the achievement and demonstration of safety. This research proposes methods of modelling complex data supply chains and proposes techniques for tackling the difficult task of safety justification for such systems.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Dheedan, Amer Abdaladeem. „Distributed on-line safety monitor based on safety assessment model and multi-agent system“. Thesis, University of Hull, 2012. http://hydra.hull.ac.uk/resources/hull:6065.

Der volle Inhalt der Quelle
Annotation:
On-line safety monitoring, i.e. the tasks of fault detection and diagnosis, alarm annunciation, and fault controlling, is essential in the operational phase of critical systems. Over the last 30 years, considerable work in this area has resulted in approaches that exploit models of the normal operational behaviour and failure of a system. Typically, these models incorporate on-line knowledge of the monitored system and enable qualitative and quantitative reasoning about the symptoms, causes and possible effects of faults. Recently, monitors that exploit knowledge derived from the application of off-line safety assessment techniques have been proposed. The motivation for that work has been the observation that, in current practice, vast amounts of knowledge derived from off-line safety assessments cease to be useful following the certification and deployment of a system. The concept is potentially very useful. However, the monitors that have been proposed so far are limited in their potential because they are monolithic and centralised, and therefore, have limited applicability in systems that have a distributed nature and incorporate large numbers of components that interact collaboratively in dynamic cooperative structures. On the other hand, recent work on multi-agent systems shows that the distributed reasoning paradigm could cope with the nature of such systems. This thesis proposes a distributed on-line safety monitor which combines the benefits of using knowledge derived from off-line safety assessments with the benefits of the distributed reasoning of the multi-agent system. The monitor consists of a multi-agent system incorporating a number of Belief-Desire-Intention (BDI) agents which operate on a distributed monitoring model that contains reference knowledge derived from off-line safety assessments. Guided by the monitoring model, agents are hierarchically deployed to observe the operational conditions across various levels of the hierarchy of the monitored system and work collaboratively to integrate and deliver safety monitoring tasks. These tasks include detection of parameter deviations, diagnosis of underlying causes, alarm annunciation and application of fault corrective measures. In order to avoid alarm avalanches and latent misleading alarms, the monitor optimises alarm annunciation by suppressing unimportant and false alarms, filtering spurious sensory measurements and incorporating helpful alarm information that is announced at the correct time. The thesis discusses the relevant literature, describes the structure and algorithms of the proposed monitor, and through experiments, it shows the benefits of the monitor which range from increasing the composability, extensibility and flexibility of on-line safety monitoring to ultimately developing an effective and cost-effective monitor. The approach is evaluated in two case studies and in the light of the results the thesis discusses and concludes both limitations and relative merits compared to earlier safety monitoring concepts.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Graydon, Iain R. „Comprehension of 500 safety words : a computer-based methodology“. Thesis, Aston University, 1986. http://publications.aston.ac.uk/12307/.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Computer safety"

1

Understanding computer safety. Chicago, Illinois: Capstone Heinemann Library, 2015.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Safety-critical computer systems. Harlow, England: Addison-Wesley, 1996.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Boulanger, Jean-Louis. Safety of computer architectures. London, UK: ISTE, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Safety of computer architectures. London, UK: ISTE, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Habli, Ibrahim, Mark Sujan und Friedemann Bitsch, Hrsg. Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-83903-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Trapp, Mario, Francesca Saglietti, Marc Spisländer und Friedemann Bitsch, Hrsg. Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-14835-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Pasquini, Alberto. Computer Safety, Reliability and Security. Herausgegeben von Massimo Felici und Karama Kanoun. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48249-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Schoitsch, Erwin, Hrsg. Computer Safety, Reliability, and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15651-9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Koornneef, Floor, und Meine van der Meulen, Hrsg. Computer Safety, Reliability and Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-40891-6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Tonetta, Stefano, Erwin Schoitsch und Friedemann Bitsch, Hrsg. Computer Safety, Reliability, and Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66266-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Computer safety"

1

Cook, Byron, Andreas Podelski und Andrey Rybalchenko. „Terminator: Beyond Safety“. In Computer Aided Verification, 415–18. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11817963_37.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Rusu, Vlad, Hervé Marchand, Valéry Tschaen, Thierry Jéron und Bertrand Jeannet. „From Safety Verification to Safety Testing“. In Lecture Notes in Computer Science, 160–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24704-3_11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Weik, Martin H. „safety message“. In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16561.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Weik, Martin H. „safety ring“. In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16563.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Weik, Martin H. „safety signal“. In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16564.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Weik, Martin H. „safety traffic“. In Computer Science and Communications Dictionary, 1511. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_16565.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Jaffar, Joxan, Andrew E. Santosa und Răzvan Voicu. „Relative Safety“. In Lecture Notes in Computer Science, 282–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11609773_19.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Lal, Ratan, Aaron McKinnis, Dustin Hauptman, Shawn Keshmiri und Pavithra Prabhakar. „Formally Verified Switching Logic for Recoverability of Aircraft Controller“. In Computer Aided Verification, 566–79. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81685-8_27.

Der volle Inhalt der Quelle
Annotation:
AbstractIn this paper, we investigate the design of a safe hybrid controller for an aircraft that switches between a classical linear quadratic regulator (LQR) controller and a more intelligent artificial neural network (ANN) controller. Our objective is to switch safely between the controllers, such that the aircraft is always recoverable within a fixed amount of time while allowing the maximum time of operation for the ANN controller. There is a priori known safety zone for the LQR controller operation in which the aircraft never stalls, over accelerates, or exceeds maximum structural loading, and hence, by switching to the LQR controller just before exiting this zone, one can guarantee safety. However, this priori known safety zone is conservative, and therefore, limits the time of operation for the ANN controller. We apply reachability analysis to expand the known safety zone, such that the LQR controller will always be able to drive the aircraft back to the safe zone from the expanded zone (“recoverable zone") within a fixed duration. The “recoverable zone" extends the time of operation of the ANN controller. We perform simulations using the hybrid controller corresponding to the recoverable zone and observe that the design is indeed safe.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Baro, Sylvain. „A High-Availability Safety Computer“. In Security of Computer Architectures, 425–46. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118600696.ch11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Van de Velde, Rudi. „Computer Safety in Healthcare Systems“. In Hospital Information Systems — The Next Generation, 82–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 1992. http://dx.doi.org/10.1007/978-3-642-77617-5_9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Computer safety"

1

Hill, Janice, und Rhoda Baggs. „Software safety risk in legacy safety-critical computer systems“. In Proceedings 2007 IEEE SoutheastCon. IEEE, 2007. http://dx.doi.org/10.1109/secon.2007.342891.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Tangming Yuan und Tianhua Xu. „Computer System Safety Argument Schemes“. In 2010 Second World Congress on Software Engineering (WCSE 2010). IEEE, 2010. http://dx.doi.org/10.1109/wcse.2010.37.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Wisniewski, Pamela J., Heng Xu, Mary Beth Rosson und John M. Carroll. „Adolescent online safety“. In CSCW'14: Computer Supported Cooperative Work. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2531602.2531696.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Ozarin, Nathaniel. „Developing Rules for Failure Modes and Effects Analysis of Computer Software“. In Advances in Aviation Safety. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2003. http://dx.doi.org/10.4271/2003-01-2987.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Hu, Dong, Dong Zhou und Ping Li. „Research on Hardware Built-in Computer Safety“. In 2006 International Conference on Communications, Circuits and Systems. IEEE, 2006. http://dx.doi.org/10.1109/icccas.2006.284976.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

NEUMANN, PETER. „Safety of computer systems in aerospace applications“. In 7th Computers in Aerospace Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1989. http://dx.doi.org/10.2514/6.1989-3121.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

White, D. B., M. Weishaupt und D. J. Kent. „A Computer Monitoring System Improves Rig Safety“. In SPE Health, Safety and Environment in Oil and Gas Exploration and Production Conference. Society of Petroleum Engineers, 1991. http://dx.doi.org/10.2118/23249-ms.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Ramaiah, P. Seetha, M. Ben Swarup und K. Raja Kumar. „Conceptual Modeling for Safety Critical Computer Systems“. In 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. IEEE, 2008. http://dx.doi.org/10.1109/snpd.2008.96.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Schwamm, Friedrich. „FADEC Computer Systems for Safety Critical Application“. In ASME 1998 International Gas Turbine and Aeroengine Congress and Exhibition. American Society of Mechanical Engineers, 1998. http://dx.doi.org/10.1115/98-gt-170.

Der volle Inhalt der Quelle
Annotation:
One of the main requirements for modern FADEC systems is to implement great computing power with many interfaces and to keep the FADEC hardware effort to a minimum. On the other side the criticality potential of computer failures is considered as ‘hazardous’. The trend in FADEC development is to implement even more complex functions into the control software which consequently increases the authority and therefore the criticality potential of computer failures. In the mid 80’s a double computer system was used to performed a parallel execution of the control software with identical input parameters to output identical results. A difference in any one of these computer results causes the comparator hardware to output a failure indication. This was considered to have a 100% coverage of computer failures. The problem with this system was certainly the relatively large hardware overhead and the limited intelligence of the comparator logic. Some other FADEC systems have implemented only a Watch Dog Timer and Bus Access Supervisory hardware to detect computer malfunctions. With this method the proof for the achievements of the safety requirements have become almost impossible since adequate fault models of the computer components are difficult to establish due to their increasing functional complexity. This paper describes how to develop the safety features for the Computer Design from the Engine Control System Safety Requirements to achieve a full coverage of the potentially critical failure effects with fault tolerant failure recovery functions and a minimum of hardware overhead.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Leveson, Nancy G. „System Safety in Computer-Controlled Automotive Systems“. In SAE 2000 World Congress. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2000. http://dx.doi.org/10.4271/2000-01-1048.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Computer safety"

1

Espinosa, D. L., W. F. Fields, D. E. Gittins und M. L. Roberts. B190 computer controlled radiation monitoring and safety interlock system. Office of Scientific and Technical Information (OSTI), August 1998. http://dx.doi.org/10.2172/3643.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Dr. Bradley J Schrader. Radiological Safety Analysis Computer (RSAC) Program Version 7.2 Users? Manual. Office of Scientific and Technical Information (OSTI), Oktober 2010. http://dx.doi.org/10.2172/1004248.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Gorski, Janusz. The 12th International Conference on Computer Safety, Reliability and Security. Fort Belvoir, VA: Defense Technical Information Center, Oktober 1993. http://dx.doi.org/10.21236/ada278165.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Dr. Bradley J Schrader. Radiological Safety Analysis Computer (RSAC) Program Version 7.0 Users? Manual. Office of Scientific and Technical Information (OSTI), März 2009. http://dx.doi.org/10.2172/950986.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Gill, Janet A. Flight Control Computer Development Through Application of Software Safety Technology,. Fort Belvoir, VA: Defense Technical Information Center, Oktober 1995. http://dx.doi.org/10.21236/ada305293.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Caldwell, John A., Jones Jr., Carter Heber D., Caldwell David J. und J. L. The Relationship Between Computer Scoring and Safety-Pilot Grading of Flight Performance. Fort Belvoir, VA: Defense Technical Information Center, Juli 1992. http://dx.doi.org/10.21236/ada256245.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Falkov, A. A., V. S. Kuul und O. B. Samoilov. Experimental assessment of computer codes used for safety analysis of integral reactors. Office of Scientific and Technical Information (OSTI), September 1995. http://dx.doi.org/10.2172/115099.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Smith, O., J. Renier, F. Difilippo, N. Clapp, A. Sozer, R. Booth, W. Craddick und D. Morris. PWR hybrid computer model for assessing the safety implications of control systems. Office of Scientific and Technical Information (OSTI), März 1986. http://dx.doi.org/10.2172/5832266.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Wenzel, D. R. The Radiological Safety Analysis Computer Program (RSAC-5) user`s manual. Revision 1. Office of Scientific and Technical Information (OSTI), Februar 1994. http://dx.doi.org/10.2172/10157789.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Pevnitsky, A. V., V. A. Tarasov und V. P. Solovyev. Comparison between VNIIEF computer programs used to study NPP safety and similar western codes. Office of Scientific and Technical Information (OSTI), Dezember 1995. http://dx.doi.org/10.2172/219462.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie