FMEA-based control mechanism for embedded control software

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Current software FMEA analysis depends on the static model of the embedded real-time system which cannot fully assess the dynamics of control loops and changes in timing. Control block diagram is not only the static model but also the dynamic model of the system. Though the simulation of the control blocks diagram, the dynamics of control lops and changes in timing can result in the injection of the failure mode. For illustration, a small embedded control system is utilized. Empirical results show that more detailed information such as the dynamics of control loops and changes in timing will provide the comprehensive effect analysis for software FMEA. Tough FMEA and control mechanism analysis techniques which assess operation under normal conditions and simulation of dynamic timing and failure conditions, a complete validation of the safety characteristics of embedded real-time control systems can result.

Original languageEnglish
Title of host publicationProceedings - 2011 International Conference of Information Technology, Computer Engineering and Management Sciences, ICM 2011
Pages110-112
Number of pages3
DOIs
StatePublished - 2011
Event2011 International Conference on Information Technology, Computer Engineering and Management Sciences, ICM 2011 - Nanjing, Jiangsu, China
Duration: 24 Sep 201125 Sep 2011

Publication series

NameProceedings - 2011 International Conference of Information Technology, Computer Engineering and Management Sciences, ICM 2011
Volume1

Conference

Conference2011 International Conference on Information Technology, Computer Engineering and Management Sciences, ICM 2011
Country/TerritoryChina
CityNanjing, Jiangsu
Period24/09/1125/09/11

Keywords

  • Control mechanism
  • Software FMEA
  • Software safety

Fingerprint

Dive into the research topics of 'FMEA-based control mechanism for embedded control software'. Together they form a unique fingerprint.

Cite this