Essays about: "säkerhetskrav"

Showing result 21 - 25 of 36 essays containing the word säkerhetskrav.

  1. 21. Reclined seating positions for level 4 HAD vehicles : A comfort and safety approach

    University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik och samhälle

    Author : Andreas Hagberg; Sandra Jodlovsky; [2017]
    Keywords : Submarining; HAD; Level 4; Reclined seat back; Restraint system; Clinic; Automation.; Underglidning; HAD; Nivå 4; Bakåtlutat ryggstöd; Fastspänningsanordning; Klinik; Automation.;

    Abstract : Occupants have already in today’s cars the opportunity to choose various reclined seatingpositions. As highly automated driving (HAD) vehicles are introduced on the market, thepossibility to sit in reclined positions will increase. The car manufacturers will most likely beresponsible for ensuring crash safety for new seating positions. READ MORE

  2. 22. Two-phase WCET analysis for cache-based symmetric multiprocessor systems

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Rodothea Myrsini Tsoupidi; [2017]
    Keywords : Worst-Case Execution Time Analysis; Abstract Domain; Real-Time Systems; Low-level Analysis; Pipeline Analysis; Cache-based Analysis; Multiprocessor Analysis; Längsta Exekveringstid Analys; WCET; Abstrakt Domän; Realtidsystem; Låg-nivå Analys; Pipeline Analys; Cachebaserad Analys;

    Abstract : The estimation of the worst-case execution time (WCET) of a task is a problem that concerns the field of embedded systems and, especially, real-time systems. Estimating a safe WCET for single-core architectures without speculative mechanisms is a challenging task and an active research topic. READ MORE

  3. 23. Effectiveness of fuzz testing high-security applications

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Balthazar West; Marcus Wengelin; [2017]
    Keywords : ;

    Abstract : Fuzzing is a testing methodology that is receiving increased attention in the field of software security. The methodology is interesting because almost anyone can download a fuzzer and search for bugs in large and well-tested programs or libraries. READ MORE

  4. 24. Formal Verification of Hardware Peripheral with Security Property

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Jonathan Yao Håkansson; Niklas Rosencrantz; [2017]
    Keywords : Formal Verification NuSMV JavaPathFinder Spin Promela CTL LTL DMA UART Model Checking Theorem Proving;

    Abstract : One problem with computers is that the operating system automatically trusts any externallyconnected peripheral. This can result in abuse when a peripheral technically can violate the security model because the peripheral is trusted. Because of that the security is an important issue to look at. READ MORE

  5. 25. Behavioral Analysis of Volvo Cars Instrument Panel During Airbag Deployment

    University essay from Linköpings universitet/Mekanik och hållfasthetslära

    Author : Amir Nazari; Behrouz Nourozi; [2016]
    Keywords : airbag automotive crash safety CPM ALE XC90 corpuscular particle method uniform pressure CV FEM DOE LS-DYNA ANSA CAE explicit Volvo; krockkudde säkerhet krock Volvo XC90 explicita analyser;

    Abstract : Airbags are a passive safety technology, required to function with zero failure rate. Advances in Computer Aided Engineering have allowed vehicle manufacturers to predict material and system behavior in the event of a crash. READ MORE