critical systems
Recently Published Documents


TOTAL DOCUMENTS

2121
(FIVE YEARS 488)

H-INDEX

48
(FIVE YEARS 8)

Author(s):  
Laiali Almazaydeh ◽  
Moath Alsafasfeh ◽  
Reyad Alsalameen ◽  
Shoroq Alsharari

The study of software engineering professional practices includes the use of the formal methodology in a software development. Identifying the appropriate methodology will not only reduce the failure of software but will also help to deliver the software in accordance with the predetermined budget and schedule. In literature, few works have been developed a tool for prediction of the most appropriate methodology for the specific software project. In this paper, a method for selecting an appropriate software development life cycle (SDLC) model based on a ranking manner from the highest to the lowest scoring is presented. The selection and ranking of appropriate SDLC elaborate the related SDLC’s critical factors, these factors are given different weights according to the SDLC, then these weights are used by the proposed mathematical method. The proposed approach has been extensively experimented on a dataset by software practitioners who are working in the software industry. Experimental results show that, the proposed method represents an applicable tool in predicting and ranking suitable SDLC models on various types of projects, such as: life-critical systems, commercial uses systems, and entertainment applications.


2022 ◽  
Vol 18 (1) ◽  
pp. 1-18
Author(s):  
Carson Labrado ◽  
Himanshu Thapliyal ◽  
Saraju P. Mohanty

Within vehicles, the Controller Area Network (CAN) allows efficient communication between the electronic control units (ECUs) responsible for controlling the various subsystems. The CAN protocol was not designed to include much support for secure communication. The fact that so many critical systems can be accessed through an insecure communication network presents a major security concern. Adding security features to CAN is difficult due to the limited resources available to the individual ECUs and the costs that would be associated with adding the necessary hardware to support any additional security operations without overly degrading the performance of standard communication. Replacing the protocol is another option, but it is subject to many of the same problems. The lack of security becomes even more concerning as vehicles continue to adopt smart features. Smart vehicles have a multitude of communication interfaces an attacker could exploit to gain access to the networks. In this work, we propose a security framework that is based on physically unclonable functions (PUFs) and lightweight cryptography (LWC). The framework does not require any modification to the standard CAN protocol while also minimizing the amount of additional message overhead required for its operation. The improvements in our proposed framework result in major reduction in the number of CAN frames that must be sent during operation. For a system with 20 ECUs, for example, our proposed framework only requires 6.5% of the number of CAN frames that is required by the existing approach to successfully authenticate every ECU.


Author(s):  
Jose Luis de la Vara ◽  
Arturo S. García ◽  
Jorge Valero ◽  
Clara Ayora

Author(s):  
Feipeng Wang ◽  
Diana Filipa Araújo ◽  
Yan-Fu Li

The recent social trends and accelerated technological progress culminated in the development of autonomous vehicles (AVs). Reliability assessment for AV systems is in high demand before its market launch. In safety-critical systems (SCSs) such as AV systems, the reliability concept should be broadened to consider more safety-related issues. In this paper, reliability is defined as the probability that the system performs satisfactorily for a given period of time under stated conditions. This paper proposes a reliability assessment framework of AV, consisting of three main stages: (i) modeling the safety control structure through the Systems-Theoretic Accident Model and Processes (STAMP); (ii) mapping the control structure and functional relationships to a directed acyclic graph (DAG); and (iii) construct a Bayesian network (BN) on DAG to assess the system reliability. The fully automated (level 5) vehicle system is shown as a numeric example to illustrate how this suggested framework works. A brief discussion on involving human factors in systems to analyze lower levels of automated vehicles is also included, demonstrating the need for further research on real case studies.


2022 ◽  
pp. 026101832110650
Author(s):  
Erica Wirrmann Gadsby ◽  
Gerald Wistow ◽  
Jenny Billings

Discharge to Assess (D2A) models of care have been developed to expedite the process of discharging hospital patients as soon as they are medically fit to leave, thereby improving the efficiency and effectiveness of the healthcare system. This article focuses on the implementation of a D2A model in Kent, England, which formed a case study for a European research programme of improvements in integrated care for older people. It uses the Critical Systems Heuristics framework to examine the implementation process and focuses in particular on why this improvement project proved to be so difficult to implement and why the anticipated outcomes were so elusive. The analysis highlights the value in using critical systems thinking to better evaluate integrated care initiatives, in particular by identifying more explicitly different stakeholder perspectives and power relationships within the system and its decision environment.


2022 ◽  
Vol 22 (1) ◽  
Author(s):  
Victory O. Olutuase ◽  
Chinwe J. Iwu-Jaja ◽  
Cynthia P. Akuoko ◽  
Emmanuel O. Adewuyi ◽  
Vishnu Khanal

Abstract Background Medicines and vaccines supply chains represent critical systems for realising one of the major targets of the United Nations’ third Sustainable Development Goals (SDGs)—access to safe, effective, quality, and affordable essential medicines and vaccines, for all. However, evidence suggests the system is confronted with several challenges in many low-medium income countries, including Nigeria. This scoping review aims to summarize the available evidence on the challenges of medicines and vaccines supply chain system in Nigeria. Results We searched relevant databases including Scopus and Web of Science for studies published between January 2005 and August 2020 on the challenges associated with medicines and vaccines supply chain systems in Nigeria. Our findings implicate several factors including difficulty with medicines or vaccines selection, procurement, distribution, and inventory management. Others included poor storage infrastructure, financial constraints, insecurity, transportation challenges, inadequate human resources, weak, or poorly implemented policies. These challenges mostly resulted in stock-outs of essential medicines which notably got worsened during the current COVID-19 pandemic. Conclusion Our study is a wake-up call on the need to prioritise the critical sector of the supply chain systems for medicines and vaccines in Nigeria. Effective implementation of existing policies, improved security, strengthening of the health system through adequate budgetary allocations, and provision of infrastructure including regular availability of electricity are keys to surmounting the challenges and improving access to medicines or vaccines in Nigeria.


2022 ◽  
Vol 3 (33) ◽  
pp. 59-85
Author(s):  
Jassir Adel Altheyabi ◽  

In network security, various protocols exist, but these cannot be said to be secure. Moreover, is not easy to train the end-users, and this process is time-consuming as well. It can be said this way, that it takes much time for an individual to become a good cybersecurity professional. Many hackers and illegal agents try to take advantage of the vulnerabilities through various incremental penetrations that can compromise the critical systems. The conventional tools available for this purpose are not enough to handle things as desired. Risks are always present, and with dynamically evolving networks, they are very likely to lead to serious incidents. This research work has proposed a model to visualize and predict cyber-attacks in complex, multilayered networks. The calculation will correspond to the cyber software vulnerabilities in the networks within the specific domain. All the available network security conditions and the possible places where an attacker can exploit the system are summarized.


Author(s):  
Somayeh Sadeghi-Kohan ◽  
Sybille Hellebrand ◽  
Hans-Joachim Wunderlich

AbstractSafety-critical systems have to follow extremely high dependability requirements as specified in the standards for automotive, air, and space applications. The required high fault coverage at runtime is usually obtained by a combination of concurrent error detection or correction and periodic tests within rather short time intervals. The concurrent scheme ensures the integrity of computed results while the periodic test has to identify potential aging problems and to prevent any fault accumulation which may invalidate the concurrent error detection mechanism. Such periodic built-in self-test (BIST) schemes are already commercialized for memories and for random logic. The paper at hand extends this approach to interconnect structures. A BIST scheme is presented which targets interconnect defects before they will actually affect the system functionality at nominal speed. A BIST schedule is developed which significantly reduces aging caused by electromigration during the lifetime application of the periodic test.


Sign in / Sign up

Export Citation Format

Share Document