Safety-critical and autonomous systems
Choose four courses to complete your minor studies.
Courses included in the programme:
Apply before Dec 16, 2018
- The course gives an overview of issues in the developing software for safety-critical systems. The topics covered in the course include:
Programming control systems at an application level Simulation of the behavior of controlled processes.
- Simulating behavior of faulty hardware.
- Techniques for safety analysis: FMEA, FTA, FFA, HAZOP Deriving software requirements from safety analysis Modelling requirements using use
cases, state diagrams Allocating safety requirements.
- Architecting safety critical systems, system partitioning Safety kernel Layered approach to architecting Verification: overview of static and dynamic testing Safety-critical systems development life-cycle Safety integrity levels.
- Brief introduction to formal methods
Apply before Dec 16, 2018
After the completion of the course the student is able to select suitable and adequate information security solutions to suit the security needs of a particular application. The student knows and is able to administer different ways and methods for protecting and managing different kind of digital material and rights (DRM). After the completion the student is able to specify a system for electronic identification (biometrics) taking into account both the identification accuracy and the proper and secure management and transportation of the identification data (biometric). The student is also able to recognize information security risks caused by subsystems and is able to prevent their occurrences by means of careful information security design of the system.
Apply before Feb 15, 2019
More information coming soon!
Within this course we will explore the fundamentals of sensing techniques, including digital image processing, light detection and ranging (LIDAR), in the context of emerging technologies such as autonomous navigation. We will also:
- Analyze the performance of active remote sensing techniques such as those using lidar and radar.
- Analyze the performance of passive remote sensing techniques such as those using digital image processing.
- Apply engineering knowledge and techniques to the design, assembly, and evaluation of multidimensional sensing instrumentation.
To gain basic knowledge in computer aided modeling and control of discrete event systems: Automata, formal languages, blocking, controllability,
observability, modularisation and algorithms.
Modeling of simple discrete events using automata, and analysis and design of supervisory systems for these.
After a completed course the student has acquired the skills needed to analyse the real-time and resource constraints of a real-time system design to ascertain the consistency and schedulability of the system. The student has acquired the skills needed to suggest changes to the specification or implementation strategy to ensure that the real-time constraints are satisfied. The student has acquired skills needed to design systems such that they satisfy real-time requirements.
The course gives an overview of modern techniques to specifying behaviour of complex software-intensive systems. The topics covered include:
- From requirements engineering to system specification
- Overview of rigorous modelling methods, correct behaviour, and specification languages
- How to create a system specification Automatic software for system specifications
After the course the student should be able to:
- List basic abstractions that are used in system specifications Analyse system requirements
- Create a system specification
- Evaluate specification methods
- General skills: Logic, set theory, abstract modelling, techniques for formal
Distributed computing systems have emerged to play a serious role in industry and society. Therefore, reliability of distributed systems has become an important issue. This course aims at giving an overview of reliable distributed systems and their components with a focus on cloud computing. We will look at possible failures in distributed systems and how to avoid them. Examples of applications of reliability techniques will be given.