Dissertations / Theses on the topic 'Critical control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Critical control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Misner, Scottie, and Carol Curtis. "HACCP - Hazard Analysis Critical Control Points." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2008. http://hdl.handle.net/10150/146434.
Full textHACCP, pronounced has-up, is a food safety self-inspection system that combines up-to-date technical information with step-by-step procedures to evaluate and monitor the flow of food throughout a food establishment from receiving to service. This publication introduces this system to readers and outlines 6 simple HACCP principles to reduce the occurrence of food-borne illness at home.
Åkerberg, Johan. "On Security in Safety-Critical Process Control." Licentiate thesis, Mälardalen University, School of Innovation, Design and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.
Full textThis Licentiate thesis is about security in automation networks with emphasis on fieldbus communication. In the process industry, network and system security have become even more important since the introduction of Ethernet-based fieldbus protocols. As an example, a successful attack on a power plant, supporting large cities with energy, could result in a temporal but total power loss. Such attacks could be devastating for the society. The security threats are real, and motivations for attacking industrial communication systems may be political or economical.
The visions of autonomous systems, which can be supervised, diagnosed and maintained from remote is not far from reality, but stress the need for security and safety measures. Wired fieldbus protocols are mature when it comes to safety and there are existing standards for safe communication. In a setup like an autonomous system security measures over safe communication has to be taken into account.
The state-of-the-art in automation security is to use firewalls to restrict incoming and outgoing traffic to the networks. Firewalls can be deployed between different automation networks, i.e. server, control, and fieldbus networks, and even protect a single automation cell with a dedicated firewall. If an adversary can penetrate the perimeter defenses, no other security countermeasures exist in process automation to protect the safety-critical communication from sabotage.
In this thesis we initially explore the possibilities of security attacks on the automation protocols PROFINET IO and PROFIsafe. We show that it is possible to attack safety-related communication to take control of safety-critical fieldbus nodes. We propose the concept of Security Modules in combination with PROFINET IO and PROFIsafe to achieve safe and secure real-time fieldbus communication.
Ifill, Wilson. "B annotations in critical control systems development." Thesis, University of Surrey, 2008. http://epubs.surrey.ac.uk/842966/.
Full textBinnie, Iona B. "Critical dimension control : influencing factors and measurement." Thesis, University of Edinburgh, 1991. http://hdl.handle.net/1842/10815.
Full textÅkerberg, Johan. "On security in safety-critical process control /." Västerås : School of Innovation, Design and Engineering, Mälardalen University, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.
Full textVenugopalan, Vigneshwaran. "Supervisory wireless control for critical industrial applications." Thesis, University of Sheffield, 2014. http://etheses.whiterose.ac.uk/8501/.
Full textDawson, Robert Edward. "Secure communications for critical infrastructure control systems." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/20710/1/Robert_Dawson_Thesis.pdf.
Full textDawson, Robert Edward. "Secure communications for critical infrastructure control systems." Queensland University of Technology, 2008. http://eprints.qut.edu.au/20710/.
Full textSchwager, Mac. "Towards verifiable adaptive control for safety critical applications." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/32344.
Full textIncludes bibliographical references (p. 97-101).
To be implementable in safety critical applications, adaptive controllers must be shown to behave strictly according to predetermined specifications. This thesis presents two tools for verifying specifications relevant to practical direct-adaptive control systems. The first tool is derived from an asymptotic analysis of the error dynamics of a direct adaptive controller and uncertain linear plant. The analysis yields a so called Reduced Linear Asymptotic System, which can be used for designing adaptive systems to meet transient specifications. The tool is demonstrated in two design examples from flight mechanics, and verified in numerical simulation. The second tool developed is an algorithm for direct-adaptive control of plants with magnitude saturation constraints on multiple inputs. The algorithm is a non-trivial extension of an existing technique for single input systems with saturation. Boundeness of all signals is proved for initial conditions in a compact region. In addition, the notion of a class of multi-dimensional saturation functions is introduced. The saturation compensation technique is demonstrated in numerical simulation. Finally, these tools are applied to design a direct-adaptive controller for a realistic multi-input aircraft model to accomplish control reconfiguration in the case of unforeseen failure, damage, or disturbances. A novel control design for incorporating control allocation and reconfiguration is introduced. The adaptive system is shown in numerical simulation to have favorable transient qualities and to give a stable response with input saturation constraints.
by Mac Schwager.
S.M.
Lundahl, Kristoffer. "Modeling and Optimization for Critical Vehicle Maneuvers." Licentiate thesis, Linköpings universitet, Fordonssystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-94010.
Full textMathew, Bijoy. "Implementing a hazard analysis critical control points plan (HACCP)." Menomonie, WI : University of Wisconsin--Stout, 2007. http://www.uwstout.edu/lib/thesis/2007/2007mathewb.pdf.
Full textCao, Fang. "Control of doctors in the NHS : a critical appraisal." Thesis, University of Liverpool, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.539473.
Full textDoran, Carmen. "Modelling and control of hyperglycemia in critical care patients." Thesis, University of Canterbury. Mechanical Engineering, 2004. http://hdl.handle.net/10092/6478.
Full textHaylock, James Alexander. "Fault tolerant drives for safety critical applications." Thesis, University of Newcastle Upon Tyne, 1998. http://hdl.handle.net/10443/352.
Full textWu, Guofan. "Safety-critical Geometric Control Design with Application to Aerial Transportation." Research Showcase @ CMU, 2017. http://repository.cmu.edu/dissertations/1108.
Full textNicholson, Mark. "Selecting a topology for safety-critical real-time control systems." Thesis, University of York, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.263664.
Full textKarlsson, Christoffer. "Control of critical data flows : Automated monitoring of insurance data." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-187733.
Full textFörsäkringsbolag i EU arbetar med införandet av Solvens II-direktivet som kräver att företag har ett större fokus på datakvalitet och informationskontroller. I detta examensarbete har en fältstudie utförts på AMF som är ett svenskt pensionsbolag. Arbetet har gått ut på att identifiera och undersöka kritiska dataflöden i företaget samt kontroller som utförs i dessa flöden. Ett syfte med arbetet var att hjälpa AMF att kunna påvisa att man uppfyller krav från finansinspektionen på datakvalitet och spårbarhet. Projektet utfördes under perioden september till december hösten 2015, vilket inkluderade arbetsuppgifter såsom intervjuer, Enterprise Architecture-modellering, implementering av prototyp, produktutvärdering samt kalkylering av ett business case. En gap-analys har utförts för att analysera behovet av förändringar på de nuvarande informationskontrollerna som finns på AMF, där olika lägen har dokumenterats och analyserats. Nuläget motsvarar hur situationen ser ut på företaget i dagsläget och fokuserar på de attribut som man vill förbättra, medan önskat läge beskriver de mål som företaget vill uppnå. Ett gap mellan nuläge och önskat läge identifieras tillsammans med de faktorer som utgör skillnaden mellan dessa lägen presenteras. Till sist presenteras tänkbara åtgärder för att uppnå önskat läge. Som en del av detta examensarbete har en prototyp av ett automatiserat kontrollverktyg från ett företag som heter Infogix implementerats och utvärderas med avseende på användbarhet, styrning och kostnad. En nyttovärdering har utförts på kontrollverktyget för att undersöka huruvida en investering skulle vara gynnsam för AMF. Nyttovärderingen gjordes med hjälp av PENG, en svensk nyttovärderingsmodell utvecklad av tre ekonomer/IT-konsulter, som har anpassat speciellt för att bedöma IT-investeringar. Värderingen visade på att en sådan investering skulle komma att bli gynnsam under andra året efter att investeringen gjordes.
Shuja, Sana. "Formal Verification Techniques for Safety Critical Medical Device Software Control." Diss., North Dakota State University, 2016. http://hdl.handle.net/10365/25736.
Full textChakravarthy, Rasika Mudumbai. "Long-lived authentication protocols for critical infrastructure process control systems." Pullman, Wash. : Washington State University, 2009. http://www.dissertations.wsu.edu/Thesis/Spring2009/r_mudumbai_chakravarthy_041509.pdf.
Full textTitle from PDF title page (viewed on March 29, 2010). "School of Electrical Engineering and Computer Science." Includes bibliographical references (p. 112-115).
Blakemore, Amy. "Insulin sensitivity tools for critical care." Thesis, University of Canterbury. Mechanical Engineering, 2009. http://hdl.handle.net/10092/2606.
Full textSebusang, Sebusang E. M. "Minimal control synthesis algorithm : safety-critical and a priori design issues." Thesis, University of Bristol, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.389031.
Full textOh, Sang-soo. "STUDY ON MICROSTRUCTURE CONTROL AND CRITICAL CURRENT DENSITY OF SUPERCONDUCTING MATERIALS." Kyoto University, 1992. http://hdl.handle.net/2433/168753.
Full textKyoto University (京都大学)
0048
新制・課程博士
博士(工学)
甲第5100号
工博第1221号
新制||工||866(附属図書館)
UT51-92-J147
京都大学大学院工学研究科冶金学専攻
(主査)教授 長村 光造, 教授 志賀 正幸, 教授 山口 正治
学位規則第4条第1項該当
Wagude, Bethsheba Emily Akinyi. "Hazard analysis critical control point (HACCP) in a red meat abattoir." Diss., University of Pretoria, 1999. http://hdl.handle.net/2263/28615.
Full textCoxford, Sheilah. "A critical analysis of firearm control in post-apartheid South Africa." Master's thesis, University of Cape Town, 2001. http://hdl.handle.net/11427/3793.
Full textBibliography: leaves 87-92.
This dissertation evaluates the hypothesis that the implementation of stringent firearm control in South Africa will significantly decrease levels of violent crime. First, the specific dynamics of violent crime in this country are examined, in order to establish whether firearm control constitutes a fitting response to the problem. Second, some of the important theoretical underpinnings of the firearms control debate are considered.
Abdelaty, Maged Fathy Youssef. "Robust Anomaly Detection in Critical Infrastructure." Doctoral thesis, Università degli studi di Trento, 2022. http://hdl.handle.net/11572/352463.
Full textYachouh, Marwan. "Re-authentication of Critical Operations." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1174.
Full textThis is a study on the development of a re-authentication prototype. Re- authentication serves as a receipt for e.g. system administrators that authorise them to carry out a critical operation in a system that already is protected by a security architecture. A critical operation is a kind of operation that can cause serious damage to a network node or a set of network nodes, if it is done without one giving it a second thought. The purpose is to prevent mistakes and secure the users’ audit trail.
The main task is to propose and implement a re-authentication prototype, that is to enable the incorporation of the re-authentication prototype to an already complete security architecture and yet preserve the security and performance level of the architecture.
This thesis deals with this problem by using digitally signed certificates to provide the necessary security issues. The certificates used are called re- authentication certificates and follows the X.509 attribute certificate standard. The re-authentication certificate is optimised so that it only holds authorisation information regarding one critical operation. An access control decision function is used to decide if the re-authentication certificate and its owner are authentic. On basis of that decision the user can get the authority to execute critical operations.
The finished prototype confirms that a re-authentication can be incorporated with the security architecture. The report also shows that the security status of the architecture is preserved. The performance of the prototype is rather difficult to prove since the prototype implementation only initialises the objects that are required to prove the security issues. A performance test can therefore never prove how the prototype will perform in an authentic environment. The performance is assumed to be adequate since it uses the same authentication function that is used by the security architecture.
Cooper, Trudi. "Quality management in Australian higher education : A critical review." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2004. https://ro.ecu.edu.au/theses/842.
Full textBroomfield, Eamon J. "The integration of hazard evaluation procedures and requirements engineering for safety-critical embedded systems." Thesis, Loughborough University, 1997. https://dspace.lboro.ac.uk/2134/32816.
Full textGaadingwe, Tshepo Gaadingwe. "A critical review of the IFIP TC11 Security Conference Series." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/507.
Full textGharat, Asmita. "Bluetooth based dynamic critical route volume estimation on signalized arterials." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/76871.
Full textMaster of Science
Green, Melinda E. Voigt Robert C. "Critical assessment of current metalcasting green sand system control and monitoring processes." [University Park, Pa.] : Pennsylvania State University, 2009. http://etda.libraries.psu.edu/theses/approved/WorldWideIndex/ETD-4793/index.html.
Full textLemmer, Hermann Richard. "The tuberculosis control programme in the industry in Swaziland : a critical evaluation." Diss., Access to E-Thesis, 2002. http://upetd.up.ac.za/thesis/available/etd-10032005-092729/.
Full textAshraf, Muhammad Junaid. "Management control changes in a public sector firm : A critical realist analysis." Thesis, University of Essex, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.531563.
Full textOtto, Gustav. "Critical comparison of control techniques for a flight dynamics controller / Gustav Otto." Thesis, North-West University, 2011. http://hdl.handle.net/10394/8068.
Full textThesis (MIng (Computer and Electronical Engineering))--North-West University, Potchefstroom Campus, 2012.
Blow, James Raymond. "Use of formal methods in the development of safety critical control software." Thesis, University of York, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.288811.
Full textDiao, El Hadji Sidath. "Fault Tolerant Control for Critical machine-inverter systems used in automotive industry." Thesis, Paris 11, 2014. http://www.theses.fr/2014PA112311/document.
Full textDuring the last decade, Fault Tolerant Control (FTC) has become an increasingly interesting topic in automotive industry. The operation of electrical drives is highly dependent on feedback sensors availability. With the aim of reaching the required level of availability in transportation applications, the drive is equipped with a DC voltage sensor, three current sensors (due to safety requirements in electric vehicle standards) and a position sensor. This PhD is a contribution to the study of an electrical drive fault tolerant control. The objective is to have a system, which can adaptively reorganizes itself at a sensor failure occurrence. Consequently, strategies are defined from the early preliminary design steps, so as to facilitate fault detection, fault isolation and control reconfiguration. To this purpose, our work goes from theoretical studies toward experimental validations through the model simulation using control theory.In this thesis, FTC algorithms are developed for the rotor position, the phase currents and DC link voltage sensors. The experimentally validation is perform with an electrical drive composed of a Permanent Magnet Synchronous Machine and a 3H bridge inverter. Thus, the developed methods are evaluated experimentally through real time fault injection, with an emphasis on the detection time
Smedley, Peter John. "Development of computer based aids to hazard analysis critical control point (HACCP)." Thesis, London South Bank University, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.245126.
Full textReedman, Adam Victor Creyke. "The design and control of a manipulator for safety-critical deployment applications." Thesis, Loughborough University, 2002. https://dspace.lboro.ac.uk/2134/33736.
Full textПросвірін, Дмитро Андрійович. "DEVELOPING AND DEPLOYING HMIS ON CRITICAL EMBEDDED GRAPHICS PLATFORMS FOR AFCS CONTROL." Thesis, Національний авіаційний університет, 2015. http://er.nau.edu.ua/handle/NAU/17207.
Full textУсенко, А. А. "Порядок впровадження системи hazard analysis and critical control points (HACCP) в Україні." Thesis, Молодіжний науковий юридичний форум: [Матеріали міжн. наук.-практ. конф. До дня науки, м. Киїів, НАУ, 18 травня 2018р.] Том 1.- Тернопіль: Вектор, 2018. С. 149-151, 2018. http://er.nau.edu.ua/handle/NAU/34742.
Full textRezvani, Arany Roushan. "Gaussian Process Model Predictive Control for Autonomous Driving in Safety-Critical Scenarios." Thesis, Linköpings universitet, Reglerteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161430.
Full textRahman, Anisur. "Rare sequential pattern mining of critical infrastructure control logs for anomaly detection." Thesis, Queensland University of Technology, 2019. https://eprints.qut.edu.au/132077/1/__qut.edu.au_Documents_StaffHome_staffgroupW%24_wu75_Documents_ePrints_Anisur_Rahman_Thesis_Redacted.pdf.
Full textAbdul, Razak Normy Norfiza. "Robust Modelling of the Glucose-Insulin System for Tight Glycaemic Control of Less Critical Care Patients." Thesis, University of Canterbury. Department of Mechanical Engineering, 2012. http://hdl.handle.net/10092/7039.
Full textUnderwood, B. Alan. "A framework for the certification of critical application systems." Thesis, Queensland University of Technology, 1994.
Find full textWang, Timothy. "Credible autocoding of control software." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53954.
Full textCAIROLI, FRANCESCA. "Deep Learning for Abstraction, Control and Monitoring of Complex Cyber-Physical Systems." Doctoral thesis, Università degli Studi di Trieste, 2022. http://hdl.handle.net/11368/3031103.
Full textCyber-Physical Systems (CPS) consist of digital devices that interact with some physical components. Their popularity and complexity are growing exponentially, giving birth to new, previously unexplored, safety-critical application domains. As CPS permeate our daily lives, it becomes imperative to reason about their reliability. Formal methods provide rigorous techniques for verification, control and synthesis of safe and reliable CPS. However, these methods do not scale with the complexity of the system, thus their applicability to real-world problems is limited. A promising strategy is to leverage deep learning techniques to tackle the scalability issue of formal methods, transforming unfeasible problems into approximately solvable ones. The approximate models are trained over observations which are solutions of the formal problem. In this thesis, we focus on the following tasks, which are computationally challenging: the modeling and the simulation of a complex stochastic model, the design of a safe and robust control policy for a system acting in a highly uncertain environment and the runtime verification problem under full or partial observability. Our approaches, based on deep learning, are indeed applicable to real-world complex and safety-critical systems acting under strict real-time constraints and in presence of a significant amount of uncertainty.
Santini, Norman Gabriele Antonio. "Quality Control procedure management for critical drawing parts of a two-seater helicopter." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019.
Find full textMagnini, Matteo. "An information theory analysis of critical Boolean networks as control software for robots." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/23062/.
Full textMartin, Steven George. "The critical period of weed control in canola (Brassica napus L.) in Manitoba." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape2/PQDD_0024/MQ51762.pdf.
Full textAmici, Federica. "Inhibitory control and other cognitive abilities critical to fission-fusion dynamics in primates." Thesis, Liverpool John Moores University, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.497008.
Full text