Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Digital Circuits (2)
- Computational Engineering (1)
- Computer Sciences (1)
- Computer and Systems Architecture (1)
- Digital Communications and Networking (1)
-
- Electrical and Computer Engineering (1)
- Hardware Systems (1)
- Health and Medical Administration (1)
- Medicine and Health Sciences (1)
- Other Computer Engineering (1)
- Physical Sciences and Mathematics (1)
- Quality Improvement (1)
- Theory and Algorithms (1)
- VLSI and Circuits, Embedded and Hardware Systems (1)
- Keyword
-
- Coverage Analysis (1)
- Cyber attack (1)
- Data Science (1)
- Delay Tolerant Networks (1)
- Device to Device Communication (1)
-
- Energy Balancing (1)
- Fault Injection (1)
- Fault detection (1)
- Formal Verification (1)
- HECAD (1)
- IEC 61508 (1)
- Machine Learning (1)
- Mobile AdHoc Networks (1)
- Mobile Social Networks (1)
- Model Based Design Assurance (1)
- Model Based Fault Injection (1)
- Model Checking (1)
- Natural Language Processing (1)
- Network Lifetime (1)
- Nuclear Instrumentation and Control (1)
- Peer-to-Peer Energy Sharing (1)
- Radiation Oncology (1)
- Radiation Oncology - Incident Learning System (1)
- Radiotherapy Structure Names (1)
- SPI (1)
- Saboteur (1)
- Safety Critical Systems (1)
- Unmanned Aerial Systems (1)
- Wireless Networks (1)
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
Implementation Of A Hierarchical, Embedded, Cyber Attack Detection System For Spi Devices On Unmanned Aerial Systems, Jeremy J. Price
Implementation Of A Hierarchical, Embedded, Cyber Attack Detection System For Spi Devices On Unmanned Aerial Systems, Jeremy J. Price
Theses and Dissertations
Unmanned Aerial Systems (UAS) create security concerns as their roles expand in commercial, military, and consumer spaces. The need to secure these systems is recognized in the architecture for a Hierarchical, Embedded, Cyber Attack Detection (HECAD) system. HECAD passively monitors the communication between a flight controller and all its peripherals like sensors and actuators. It ensures the functionality of a UAS is within the set of defined behavior and reports all potential problems, whether the errors were caused by cyber attacks or other physical faults. A portion of the design for Serial Peripheral Interface (SPI) devices on board a flight …
Data Science Methods For Standardization, Safety, And Quality Assurance In Radiation Oncology, Khajamoinuddin Syed
Data Science Methods For Standardization, Safety, And Quality Assurance In Radiation Oncology, Khajamoinuddin Syed
Theses and Dissertations
Radiation oncology is the field of medicine that deals with treating cancer patients through ionizing radiation. The clinical modality or technique used to treat the cancer patients in the radiation oncology domain is referred to as radiation therapy. Radiation therapy aims to deliver precisely measured dose irradiation to a defined tumor volume (target) with as minimal damage as possible to surrounding healthy tissue (organs-at-risk), resulting in eradication of the tumor, high quality of life, and prolongation of survival. A typical radiotherapy process requires the use of different clinical systems at various stages of the workflow. The data generated in these …
Leveraging Peer-To-Peer Energy Sharing For Resource Optimization In Mobile Social Networks, Aashish Dhungana
Leveraging Peer-To-Peer Energy Sharing For Resource Optimization In Mobile Social Networks, Aashish Dhungana
Theses and Dissertations
Mobile Opportunistic Networks (MSNs) enable the interaction of mobile users in the vicinity through various short-range wireless communication technologies (e.g., Bluetooth, WiFi) and let them discover and exchange information directly or in ad hoc manner. Despite their promise to enable many exciting applications, limited battery capacity of mobile devices has become the biggest impediment to these appli- cations. The recent breakthroughs in the areas of wireless power transfer (WPT) and rechargeable lithium batteries promise the use of peer-to-peer (P2P) energy sharing (i.e., the transfer of energy from the battery of one member of the mobile network to the battery of …
Systematic Model-Based Design Assurance And Property-Based Fault Injection For Safety Critical Digital Systems, Athira Varma Jayakumar
Systematic Model-Based Design Assurance And Property-Based Fault Injection For Safety Critical Digital Systems, Athira Varma Jayakumar
Theses and Dissertations
With advances in sensing, wireless communications, computing, control, and automation technologies, we are witnessing the rapid uptake of Cyber-Physical Systems across many applications including connected vehicles, healthcare, energy, manufacturing, smart homes etc. Many of these applications are safety-critical in nature and they depend on the correct and safe execution of software and hardware that are intrinsically subject to faults. These faults can be design faults (Software Faults, Specification faults, etc.) or physically occurring faults (hardware failures, Single-event-upsets, etc.). Both types of faults must be addressed during the design and development of these critical systems. Several safety-critical industries have widely adopted …