DETECTION METHOD OF THE PROBABLE INTEGRITY VIOLATION AREAS IN FPGA-BASED SAFETY-CRITICAL SYSTEMS
نویسندگان
چکیده
منابع مشابه
Design for Constraint Violation Detection in Safety-Critical Systems
In safety-critical systems, certain safety constraints must be satisfied before an operation can be performed. Such constraints typically depend on the state of the system at the instant of invocation of the operation. Further, for a specific version in a family of related systems, its intended application and the individual user profiles may play a role in determining the constraints. To promo...
متن کاملthe effect of using critical discourse analytical tools on the improvement of the learners level of critical thinking in reading comprehension
?it is of utmost priority for an experienced teacher to train the mind of the students, and enable them to think critically and correctly. the most important question here is that how to develop such a crucial ability? this study examines a new way to the development of critical thinking utilizing critical discourse analytical tools. to attain this goal, two classes of senior english la...
Analysing Information Integrity Requirements in Safety Critical Systems
Organizations’ assets are subject to different threats; which are addressed, usually, by different security solutions. Nonetheless i* modeling language was not developed with security in mind, which motivated the development of other languages (e.g., SI*) that focused on capturing the security requirements (e.g., privacy) of the system-to-be, but far less attention has been paid for capturing i...
متن کاملModeling and Analyzing Information Integrity in Safety Critical Systems
In safety critical systems one important aspect of information quality is ensuring information integrity. Typically, information integrity is a problem handled at technical level through solutions such as checksumming, integrity constraints, and integrity correction techniques. However, information integrity cannot be considered only as a technical problem, but it has to be analyzed and studied...
متن کاملinvestigation of single-user and multi-user detection methods in mc-cdma systems and comparison of their performances
در این پایان نامه به بررسی روش های آشکارسازی در سیستم های mc-cdma می پردازیم. با توجه به ماهیت آشکارسازی در این سیستم ها، تکنیک های آشکارسازی را می توان به دو دسته ی اصلی تقسیم نمود: آشکارسازی سیگنال ارسالی یک کاربر مطلوب بدون در نظر گرفتن اطلاعاتی در مورد سایر کاربران تداخل کننده که از آن ها به عنوان آشکارساز های تک کاربره یاد می شود و همچنین آشکارسازی سیگنال ارسالی همه ی کاربران فعال موجود در...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computing
سال: 2020
ISSN: 2312-5381,1727-6209
DOI: 10.47839/ijc.19.2.1772