{"id":"https://openalex.org/W2088344789","doi":"https://doi.org/10.1109/isic.2008.4635929","title":"Fault Detection, Isolation, and Localization in Embedded Control Software","display_name":"Fault Detection, Isolation, and Localization in Embedded Control Software","publication_year":2008,"publication_date":"2008-09-01","ids":{"openalex":"https://openalex.org/W2088344789","doi":"https://doi.org/10.1109/isic.2008.4635929","mag":"2088344789"},"language":"en","primary_location":{"id":"doi:10.1109/isic.2008.4635929","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isic.2008.4635929","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 IEEE International Symposium on Intelligent Control","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044031773","display_name":"Ratnesh Kumar","orcid":"https://orcid.org/0000-0003-3974-5790"},"institutions":[{"id":"https://openalex.org/I173911158","display_name":"Iowa State University","ror":"https://ror.org/04rswrd78","country_code":"US","type":"education","lineage":["https://openalex.org/I173911158"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ratnesh Kumar","raw_affiliation_strings":["Iowa State University","Iowa State University, Ames, IA"],"affiliations":[{"raw_affiliation_string":"Iowa State University","institution_ids":["https://openalex.org/I173911158"]},{"raw_affiliation_string":"Iowa State University, Ames, IA","institution_ids":["https://openalex.org/I173911158"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5044031773"],"corresponding_institution_ids":["https://openalex.org/I173911158"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08408269,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"25","last_page":"25"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9689000248908997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10904","display_name":"Embedded Systems Design Techniques","score":0.9430000185966492,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-fault-tolerance","display_name":"Software fault tolerance","score":0.7386106848716736},{"id":"https://openalex.org/keywords/fault-detection-and-isolation","display_name":"Fault detection and isolation","score":0.7293014526367188},{"id":"https://openalex.org/keywords/fault-coverage","display_name":"Fault coverage","score":0.6064556837081909},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5701427459716797},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5193923115730286},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4966445565223694},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.48789164423942566},{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation (microbiology)","score":0.4739779829978943},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.46158722043037415},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.4317685663700104},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4082101881504059},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.24071913957595825},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.23297205567359924},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12141364812850952},{"id":"https://openalex.org/keywords/actuator","display_name":"Actuator","score":0.06330433487892151}],"concepts":[{"id":"https://openalex.org/C50712370","wikidata":"https://www.wikidata.org/wiki/Q4269346","display_name":"Software fault tolerance","level":3,"score":0.7386106848716736},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.7293014526367188},{"id":"https://openalex.org/C126953365","wikidata":"https://www.wikidata.org/wiki/Q5438152","display_name":"Fault coverage","level":3,"score":0.6064556837081909},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5701427459716797},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5193923115730286},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4966445565223694},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.48789164423942566},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.4739779829978943},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.46158722043037415},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.4317685663700104},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4082101881504059},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.24071913957595825},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.23297205567359924},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12141364812850952},{"id":"https://openalex.org/C172707124","wikidata":"https://www.wikidata.org/wiki/Q423488","display_name":"Actuator","level":2,"score":0.06330433487892151},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.0},{"id":"https://openalex.org/C89423630","wikidata":"https://www.wikidata.org/wiki/Q7193","display_name":"Microbiology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isic.2008.4635929","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isic.2008.4635929","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 IEEE International Symposium on Intelligent Control","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2971479921","https://openalex.org/W3145923041","https://openalex.org/W2946906624","https://openalex.org/W841176518","https://openalex.org/W2101077206","https://openalex.org/W2157727563","https://openalex.org/W2470343202","https://openalex.org/W1488443159","https://openalex.org/W2343719514","https://openalex.org/W1504391205"],"abstract_inverted_index":{"Embedded":[0],"control":[1,66,157],"software":[2,26,81,115,138],"reacts":[3],"to":[4,11,37,55,75,123,135],"plant":[5],"and":[6,16,31,41,50,68,94,100],"environment":[7],"conditions":[8],"in":[9],"order":[10],"enforce":[12],"a":[13,114,133,137,155],"desired":[14],"functionality,":[15],"exhibit":[17],"hybrid":[18],"dynamics:":[19],"control-loops":[20],"together":[21],"with":[22],"switching":[23],"logic.":[24],"Control":[25],"can":[27],"contain":[28,146],"errors":[29],"(faults),":[30],"fault-tolerance":[32],"methods":[33,122],"must":[34],"be":[35,152],"developed":[36],"enhance":[38],"system":[39,88,109],"safety":[40],"reliability.":[42],"We":[43,130],"present":[44],"an":[45,111],"approach":[46,59,97],"for":[47],"fault":[48,104,116,139],"detection":[49],"isolation":[51,112],"that":[52,145],"is":[53,60,73,91,98,105,117],"key":[54],"achieving":[56],"fault-tolerance.":[57],"Detection":[58],"hierarchical":[61],"involving":[62],"monitoring":[63],"both":[64],"the":[65,69,87,96,108,147],"software,":[67],"controlled-system.":[70],"The":[71,149],"latter":[72],"necessary":[74],"safeguard":[76],"against":[77],"any":[78,126],"incompleteness":[79],"of":[80,86,113,143],"level":[82],"properties.":[83],"A":[84],"model":[85],"being":[89],"monitored":[90],"not":[92],"required,":[93],"further":[95],"modular":[99],"hence":[101],"scalable.":[102],"When":[103],"detected":[106],"at":[107],"level,":[110],"achieved":[118],"by":[119],"using":[120],"residue":[121],"rule":[124],"out":[125],"hardware":[127],"(plant)":[128],"fault.":[129],"also":[131],"proposed":[132],"method":[134],"localize":[136],"(to":[140],"those":[141],"lines":[142],"code":[144],"fault).":[148],"talk":[150],"will":[151],"illustrated":[153],"through":[154],"servo":[156],"application.":[158]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
