SlideShare a Scribd company logo
1 of 19
Download to read offline
SIGNAL PROCESSING
IN ADAS SYSTEMS
Ahmed Mahrous
AGENDA
Introduction
Safety Targets & Hazards
Safety Measures
Wrap up
Questions
2023 SIGNAL PROCESSING IN ADAS SYSTEMS 2
IF YOU THINK SAFETY IS EXPENSIVE,
TRY AN ACCIDENT.​
Trevor Kletz – Safety Expert
2023 SIGNAL PROCESSING IN ADAS SYSTEMS 3
INTRODUCTION
• Safety is the heart of ADAS Systems and the key difference
to the “normal” software development.
• It is the reason why many high-tech companies are held
back on automotive development.
• All ADAS Systems are mainly doing lots of signal exchange,
where many safety hazards can take place.
2023 SIGNAL PROCESSING IN ADAS SYSTEMS 4
SAFETY TARGETS
2023 SIGNAL PROCESSING IN ADAS SYSTEMS 5
AVALABILITY
The source of the
information is alive
and able to
provide data.
SAFETY TARGETS
2023 SIGNAL PROCESSING IN ADAS SYSTEMS 6
AVALABILITY
The source of the
information is alive
and able to
provide data.
TIMING
The signal is
received in time
SAFETY TARGETS
2023 SIGNAL PROCESSING IN ADAS SYSTEMS 7
AVALABILITY
The source of the
information is alive
and able to
provide data.
TIMING
The signal is
received in time
INTEGRITY
The signal sent is
correctly received
without unintended
manipulation
SAFETY TARGETS
2023 SIGNAL PROCESSING IN ADAS SYSTEMS 8
AVALABILITY
The source of the
information is alive
and able to
provide data.
TIMING
The signal is
received in time
INTEGRITY
The signal sent is
correctly received
without unintended
manipulation
CORRECTNESS
The signal includes
sane data
SAFETY TARGETS
2023 SIGNAL PROCESSING IN ADAS SYSTEMS 9
AVALABILITY
The source of the
information is alive
and able to
provide data.
TIMING
The signal is
received in time
INTEGRITY
The signal sent is
correctly received
without unintended
manipulation
SECURITY
The signal sent is
correctly received
without intended
manipulation
CORRECTNESS
The signal includes
sane data
SAFETY HAZARDS
2023 SIGNAL PROCESSING IN ADAS SYSTEMS 10
AVALABILITY
- Hardware
failures
- Environmental
factors
TIMING
- Network
congestion
- Processing
performance
- Out of Sync
Data
INTEGRITY
- Unintended
Interference (noise)
- Weak signal
transmission
- Faulty Hardware
(memory)
SECURITY
- Manipulation of
data
- Spoofing
- Jamming
CORRECTNESS
- Faulty
Calculations
- Technical
insufficiencies
(sensor / actuator
limitation)
SAFETY MEASURES
HOMOGENOUS REDUNDANCY
Run the same software on two
different ECUs
HARDWARE MAINTAINCE
Grounding, shielding, and isolation
2023 SIGNAL PROCESSING IN ADAS SYSTEMS 12
DIVERSE REDUNDANCY
Send the ego velocity from two different
ECUs
DIAGNOSTICS
Detect mud/snow/blockage
Detect short/open circuit/timeout
AVALABILITY
SAFETY MEASURES
SYNCHRONIZATION
All senders sync to a global clock
PTP/NTP Protocols are implemented
REAL-TIME MONITORING
Watch-dog mechanisms to abort
processing after specific time
2023 SIGNAL PROCESSING IN ADAS SYSTEMS 13
REDUNDANCY
If one communication channel is
jammed, another one can be used
PRIORITIZATION
Important signals shall be processed
first and sent with priority.
TIMING
SAFETY MEASURES
VALIDITY CHECKS
Infinity or NAN values are usually
unintended
E2E CHECKS
Checksum / Parity bit / CRC / Sequence
Counter / Acknowledgment Message.
2023 SIGNAL PROCESSING IN ADAS SYSTEMS 14
HOMOGENOUS REDUNDANCY
Execution on two identical hardware
pieces and comparing their output
SIGNAL CONDITIONING
Filtering/ Amplifying /Transforming
signal to ensure no loss of data.
INTEGRITY
SAFETY MEASURES
DIVERSE REDUNDANCY
Confirm or correct data based on
similar calculations on different sources
DATA FUSION
Reduce risk by having complementary
information from different modalities
2023 SIGNAL PROCESSING IN ADAS SYSTEMS 15
PLAUSIBILITY CHECKS
A pedesrian of a speed 200 kilometers
per hour is definetly unintended.
VALIDATION
Over a large dataset and covering all
cases. (unknown unsafe → known)
CORRECTNESS
SAFETY MEASURES
ENCRYPTION
Agreed approach to understand
(convert) the sent message
AUTHENTICATION
Request rights to read the data using a
predefined identification code.
2023 SIGNAL PROCESSING IN ADAS SYSTEMS 16
REDUNDANCY
If a channel gets jammed, the data
can be delivered on another.
MONITORING
Watch-dog for flow control between
different components.
SECURITY
SAFETY MEASURES
2023 SIGNAL PROCESSING IN ADAS SYSTEMS 17
AVALABILITY
- Back up systems
- Maintenance
- Diagnostics
TIMING
- Synchronization
- Prioritization
- Monitoring
INTEGRITY
- E2E checks
- Redundancy
- Validity Checks
SECURITY
- Encryption
- Authentication
- Access Control
CORRECTNESS
- Sanity Checks
- Input diversity
- Validation
SUMMARY
- Signal processing in Advanced Driver Assistance Systems
(ADAS) is crucial to ensure the safety of passengers and
pedestrians.
- Generally, the goal is to have available, punctual, reliable,
secure and integral data
- Hazards have to be identified as a first step to implement
counter measures. Once identified, faults shall be either
prevented or tolerated.
2023 SIGNAL PROCESSING IN ADAS SYSTEMS 18
The signal sent is
correctly received
without intended
manipulation
The signal includes
sane data
The signal sent is
correctly received
without unintended
manipulation
The signal is
received in time
The source of the
information is alive
and able to
provide data.
2023 SIGNAL PROCESSING IN ADAS SYSTEMS 19
AVALABILITY TIMING INTEGRITY SECURITY
CORRECTNESS
- Back up systems
- Maintenance
- Diagnostics
- Synchronization
- Prioritization
- Monitoring
- E2E checks
- Redundancy
- Validity Checks
- Encryption
- Authentication
- Access Control
- Sanity Checks
- Input diversity
- Validation
- Hardware
failures
- Environmental
factors.
- Network
congestion
- Processing
performance
- Out of Sync data
- Unintended
Interference (noise)
- Faulty Hardware
- Manipulation of
data
- Spoofing
- Jamming
- Faulty / Buggy
Calculations
- Technical
insufficiencies
THANK YOU
Ahmed Mahrous
ahmedsabek@live.com
linkedin.com/in/ahmedsabek
2023 SIGNAL PROCESSING IN ADAS SYSTEMS 20

More Related Content

What's hot

Embedded systems in automobiles
Embedded systems in automobilesEmbedded systems in automobiles
Embedded systems in automobilesTilak Marupilla
 
JLR E Learning Completed Courses
JLR E Learning Completed  CoursesJLR E Learning Completed  Courses
JLR E Learning Completed CoursesKiran Bobade
 
Airbags and it’s role in safety
Airbags and it’s role in safetyAirbags and it’s role in safety
Airbags and it’s role in safetyHemanth G
 
Embedded system in automobile
Embedded system in automobileEmbedded system in automobile
Embedded system in automobileAali Aalim
 
A Document on Artificial Passenger
A Document on Artificial PassengerA Document on Artificial Passenger
A Document on Artificial PassengerMohammed Iqbal
 
Embedded Systems in Automobile
Embedded Systems in AutomobileEmbedded Systems in Automobile
Embedded Systems in AutomobileAbhishek Sutrave
 
Car crash protection
Car crash protection  Car crash protection
Car crash protection Suyash Rewale
 
Artificial Passenger Sulbha
Artificial Passenger   SulbhaArtificial Passenger   Sulbha
Artificial Passenger SulbhaSulbha Bakshi
 
Manual aeronave Cessna 152 - Aeroclube de Jundiaí
Manual aeronave Cessna 152 - Aeroclube de JundiaíManual aeronave Cessna 152 - Aeroclube de Jundiaí
Manual aeronave Cessna 152 - Aeroclube de JundiaíLucas Carramenha
 

What's hot (18)

Embedded systems in automobiles
Embedded systems in automobilesEmbedded systems in automobiles
Embedded systems in automobiles
 
Avionics
AvionicsAvionics
Avionics
 
Artificial passenger
Artificial passengerArtificial passenger
Artificial passenger
 
JLR E Learning Completed Courses
JLR E Learning Completed  CoursesJLR E Learning Completed  Courses
JLR E Learning Completed Courses
 
Airbags
AirbagsAirbags
Airbags
 
Airbags and it’s role in safety
Airbags and it’s role in safetyAirbags and it’s role in safety
Airbags and it’s role in safety
 
EMBEDDED IN AUTOMOBILES
EMBEDDED IN AUTOMOBILESEMBEDDED IN AUTOMOBILES
EMBEDDED IN AUTOMOBILES
 
Embedded system in automobile
Embedded system in automobileEmbedded system in automobile
Embedded system in automobile
 
Automated train
Automated trainAutomated train
Automated train
 
Cinto de Segurança
Cinto de SegurançaCinto de Segurança
Cinto de Segurança
 
A Document on Artificial Passenger
A Document on Artificial PassengerA Document on Artificial Passenger
A Document on Artificial Passenger
 
Embedded Systems in Automobile
Embedded Systems in AutomobileEmbedded Systems in Automobile
Embedded Systems in Automobile
 
Car crash protection
Car crash protection  Car crash protection
Car crash protection
 
The Whipping Boy
The Whipping BoyThe Whipping Boy
The Whipping Boy
 
Artificial passenger
Artificial passengerArtificial passenger
Artificial passenger
 
Artificial Passenger Sulbha
Artificial Passenger   SulbhaArtificial Passenger   Sulbha
Artificial Passenger Sulbha
 
Iot car parking system
Iot car parking systemIot car parking system
Iot car parking system
 
Manual aeronave Cessna 152 - Aeroclube de Jundiaí
Manual aeronave Cessna 152 - Aeroclube de JundiaíManual aeronave Cessna 152 - Aeroclube de Jundiaí
Manual aeronave Cessna 152 - Aeroclube de Jundiaí
 

Similar to SIGNAL PROCESSING IN ADAS SYSTEMS.pdf

Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?EMC
 
Deploying Network Taps for Improved Security
Deploying Network Taps for Improved SecurityDeploying Network Taps for Improved Security
Deploying Network Taps for Improved SecurityDatacomsystemsinc
 
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADARITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADAcsandit
 
fieldcloud corporate overview and hardware product portfolio 2014
fieldcloud corporate overview and hardware product portfolio 2014fieldcloud corporate overview and hardware product portfolio 2014
fieldcloud corporate overview and hardware product portfolio 2014fieldcloud SAS
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksGeorge Wainblat
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
Top Cited Paper - The International Journal of Network Security & Its Applica...
Top Cited Paper - The International Journal of Network Security & Its Applica...Top Cited Paper - The International Journal of Network Security & Its Applica...
Top Cited Paper - The International Journal of Network Security & Its Applica...IJNSA Journal
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...IJNSA Journal
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingChuck Speicher
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingCharles "Chuck" Speicher Jr.
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioAVEVA
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
infraxstructure: Piotr Wojciechowski "Secure Data Center"
infraxstructure: Piotr Wojciechowski  "Secure Data Center"infraxstructure: Piotr Wojciechowski  "Secure Data Center"
infraxstructure: Piotr Wojciechowski "Secure Data Center"PROIDEA
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayDotha Keller
 

Similar to SIGNAL PROCESSING IN ADAS SYSTEMS.pdf (20)

Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?
 
Deploying Network Taps for Improved Security
Deploying Network Taps for Improved SecurityDeploying Network Taps for Improved Security
Deploying Network Taps for Improved Security
 
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADARITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
 
fieldcloud corporate overview and hardware product portfolio 2014
fieldcloud corporate overview and hardware product portfolio 2014fieldcloud corporate overview and hardware product portfolio 2014
fieldcloud corporate overview and hardware product portfolio 2014
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Security for Connected Vehicle: Successes and Challenges
Security for Connected Vehicle: Successes and ChallengesSecurity for Connected Vehicle: Successes and Challenges
Security for Connected Vehicle: Successes and Challenges
 
Top Cited Paper - The International Journal of Network Security & Its Applica...
Top Cited Paper - The International Journal of Network Security & Its Applica...Top Cited Paper - The International Journal of Network Security & Its Applica...
Top Cited Paper - The International Journal of Network Security & Its Applica...
 
CloudSecurity
CloudSecurityCloudSecurity
CloudSecurity
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
 
Securing SCADA
Securing SCADASecuring SCADA
Securing SCADA
 
50120140501013
5012014050101350120140501013
50120140501013
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web Studio
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
infraxstructure: Piotr Wojciechowski "Secure Data Center"
infraxstructure: Piotr Wojciechowski  "Secure Data Center"infraxstructure: Piotr Wojciechowski  "Secure Data Center"
infraxstructure: Piotr Wojciechowski "Secure Data Center"
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
 

More from Ahmed Sabek

Here for a reason
Here for a reason Here for a reason
Here for a reason Ahmed Sabek
 
Train The Trainer : PRO Presentation tips
Train The Trainer : PRO Presentation tipsTrain The Trainer : PRO Presentation tips
Train The Trainer : PRO Presentation tipsAhmed Sabek
 
Getting to Yes - Negotiation Skills
Getting to Yes - Negotiation SkillsGetting to Yes - Negotiation Skills
Getting to Yes - Negotiation SkillsAhmed Sabek
 
MSTC Interviews Training
MSTC Interviews TrainingMSTC Interviews Training
MSTC Interviews TrainingAhmed Sabek
 
Team Work in 30 minuites
Team Work in 30 minuitesTeam Work in 30 minuites
Team Work in 30 minuitesAhmed Sabek
 
Active listening
Active listeningActive listening
Active listeningAhmed Sabek
 
You're not yet dead
You're not yet deadYou're not yet dead
You're not yet deadAhmed Sabek
 
Your style at powerpoint is dead
Your style at powerpoint is deadYour style at powerpoint is dead
Your style at powerpoint is deadAhmed Sabek
 
Noodles Vending Machine - Bachelor Thesis
Noodles Vending Machine - Bachelor ThesisNoodles Vending Machine - Bachelor Thesis
Noodles Vending Machine - Bachelor ThesisAhmed Sabek
 
Interviewing Skills
Interviewing SkillsInterviewing Skills
Interviewing SkillsAhmed Sabek
 
Personality Analysis
Personality  AnalysisPersonality  Analysis
Personality AnalysisAhmed Sabek
 
Personal Branding
Personal BrandingPersonal Branding
Personal BrandingAhmed Sabek
 
Team work and Leadership
Team work and LeadershipTeam work and Leadership
Team work and LeadershipAhmed Sabek
 
Communication skills
Communication skillsCommunication skills
Communication skillsAhmed Sabek
 
Presentation skills
Presentation skillsPresentation skills
Presentation skillsAhmed Sabek
 
You are an sccian
You are an sccianYou are an sccian
You are an sccianAhmed Sabek
 
Scci’12 hierarchy
Scci’12 hierarchyScci’12 hierarchy
Scci’12 hierarchyAhmed Sabek
 

More from Ahmed Sabek (19)

Here for a reason
Here for a reason Here for a reason
Here for a reason
 
Train The Trainer : PRO Presentation tips
Train The Trainer : PRO Presentation tipsTrain The Trainer : PRO Presentation tips
Train The Trainer : PRO Presentation tips
 
Getting to Yes - Negotiation Skills
Getting to Yes - Negotiation SkillsGetting to Yes - Negotiation Skills
Getting to Yes - Negotiation Skills
 
MSTC Interviews Training
MSTC Interviews TrainingMSTC Interviews Training
MSTC Interviews Training
 
Team Work in 30 minuites
Team Work in 30 minuitesTeam Work in 30 minuites
Team Work in 30 minuites
 
Active listening
Active listeningActive listening
Active listening
 
You're not yet dead
You're not yet deadYou're not yet dead
You're not yet dead
 
Your style at powerpoint is dead
Your style at powerpoint is deadYour style at powerpoint is dead
Your style at powerpoint is dead
 
Noodles Vending Machine - Bachelor Thesis
Noodles Vending Machine - Bachelor ThesisNoodles Vending Machine - Bachelor Thesis
Noodles Vending Machine - Bachelor Thesis
 
Interviewing Skills
Interviewing SkillsInterviewing Skills
Interviewing Skills
 
Personality Analysis
Personality  AnalysisPersonality  Analysis
Personality Analysis
 
Personal Branding
Personal BrandingPersonal Branding
Personal Branding
 
Team work and Leadership
Team work and LeadershipTeam work and Leadership
Team work and Leadership
 
Body Language
Body LanguageBody Language
Body Language
 
Communication skills
Communication skillsCommunication skills
Communication skills
 
Presentation skills
Presentation skillsPresentation skills
Presentation skills
 
You are an sccian
You are an sccianYou are an sccian
You are an sccian
 
Prejudice
PrejudicePrejudice
Prejudice
 
Scci’12 hierarchy
Scci’12 hierarchyScci’12 hierarchy
Scci’12 hierarchy
 

Recently uploaded

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 

Recently uploaded (20)

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 

SIGNAL PROCESSING IN ADAS SYSTEMS.pdf

  • 1. SIGNAL PROCESSING IN ADAS SYSTEMS Ahmed Mahrous
  • 2. AGENDA Introduction Safety Targets & Hazards Safety Measures Wrap up Questions 2023 SIGNAL PROCESSING IN ADAS SYSTEMS 2
  • 3. IF YOU THINK SAFETY IS EXPENSIVE, TRY AN ACCIDENT.​ Trevor Kletz – Safety Expert 2023 SIGNAL PROCESSING IN ADAS SYSTEMS 3
  • 4. INTRODUCTION • Safety is the heart of ADAS Systems and the key difference to the “normal” software development. • It is the reason why many high-tech companies are held back on automotive development. • All ADAS Systems are mainly doing lots of signal exchange, where many safety hazards can take place. 2023 SIGNAL PROCESSING IN ADAS SYSTEMS 4
  • 5. SAFETY TARGETS 2023 SIGNAL PROCESSING IN ADAS SYSTEMS 5 AVALABILITY The source of the information is alive and able to provide data.
  • 6. SAFETY TARGETS 2023 SIGNAL PROCESSING IN ADAS SYSTEMS 6 AVALABILITY The source of the information is alive and able to provide data. TIMING The signal is received in time
  • 7. SAFETY TARGETS 2023 SIGNAL PROCESSING IN ADAS SYSTEMS 7 AVALABILITY The source of the information is alive and able to provide data. TIMING The signal is received in time INTEGRITY The signal sent is correctly received without unintended manipulation
  • 8. SAFETY TARGETS 2023 SIGNAL PROCESSING IN ADAS SYSTEMS 8 AVALABILITY The source of the information is alive and able to provide data. TIMING The signal is received in time INTEGRITY The signal sent is correctly received without unintended manipulation CORRECTNESS The signal includes sane data
  • 9. SAFETY TARGETS 2023 SIGNAL PROCESSING IN ADAS SYSTEMS 9 AVALABILITY The source of the information is alive and able to provide data. TIMING The signal is received in time INTEGRITY The signal sent is correctly received without unintended manipulation SECURITY The signal sent is correctly received without intended manipulation CORRECTNESS The signal includes sane data
  • 10. SAFETY HAZARDS 2023 SIGNAL PROCESSING IN ADAS SYSTEMS 10 AVALABILITY - Hardware failures - Environmental factors TIMING - Network congestion - Processing performance - Out of Sync Data INTEGRITY - Unintended Interference (noise) - Weak signal transmission - Faulty Hardware (memory) SECURITY - Manipulation of data - Spoofing - Jamming CORRECTNESS - Faulty Calculations - Technical insufficiencies (sensor / actuator limitation)
  • 11. SAFETY MEASURES HOMOGENOUS REDUNDANCY Run the same software on two different ECUs HARDWARE MAINTAINCE Grounding, shielding, and isolation 2023 SIGNAL PROCESSING IN ADAS SYSTEMS 12 DIVERSE REDUNDANCY Send the ego velocity from two different ECUs DIAGNOSTICS Detect mud/snow/blockage Detect short/open circuit/timeout AVALABILITY
  • 12. SAFETY MEASURES SYNCHRONIZATION All senders sync to a global clock PTP/NTP Protocols are implemented REAL-TIME MONITORING Watch-dog mechanisms to abort processing after specific time 2023 SIGNAL PROCESSING IN ADAS SYSTEMS 13 REDUNDANCY If one communication channel is jammed, another one can be used PRIORITIZATION Important signals shall be processed first and sent with priority. TIMING
  • 13. SAFETY MEASURES VALIDITY CHECKS Infinity or NAN values are usually unintended E2E CHECKS Checksum / Parity bit / CRC / Sequence Counter / Acknowledgment Message. 2023 SIGNAL PROCESSING IN ADAS SYSTEMS 14 HOMOGENOUS REDUNDANCY Execution on two identical hardware pieces and comparing their output SIGNAL CONDITIONING Filtering/ Amplifying /Transforming signal to ensure no loss of data. INTEGRITY
  • 14. SAFETY MEASURES DIVERSE REDUNDANCY Confirm or correct data based on similar calculations on different sources DATA FUSION Reduce risk by having complementary information from different modalities 2023 SIGNAL PROCESSING IN ADAS SYSTEMS 15 PLAUSIBILITY CHECKS A pedesrian of a speed 200 kilometers per hour is definetly unintended. VALIDATION Over a large dataset and covering all cases. (unknown unsafe → known) CORRECTNESS
  • 15. SAFETY MEASURES ENCRYPTION Agreed approach to understand (convert) the sent message AUTHENTICATION Request rights to read the data using a predefined identification code. 2023 SIGNAL PROCESSING IN ADAS SYSTEMS 16 REDUNDANCY If a channel gets jammed, the data can be delivered on another. MONITORING Watch-dog for flow control between different components. SECURITY
  • 16. SAFETY MEASURES 2023 SIGNAL PROCESSING IN ADAS SYSTEMS 17 AVALABILITY - Back up systems - Maintenance - Diagnostics TIMING - Synchronization - Prioritization - Monitoring INTEGRITY - E2E checks - Redundancy - Validity Checks SECURITY - Encryption - Authentication - Access Control CORRECTNESS - Sanity Checks - Input diversity - Validation
  • 17. SUMMARY - Signal processing in Advanced Driver Assistance Systems (ADAS) is crucial to ensure the safety of passengers and pedestrians. - Generally, the goal is to have available, punctual, reliable, secure and integral data - Hazards have to be identified as a first step to implement counter measures. Once identified, faults shall be either prevented or tolerated. 2023 SIGNAL PROCESSING IN ADAS SYSTEMS 18
  • 18. The signal sent is correctly received without intended manipulation The signal includes sane data The signal sent is correctly received without unintended manipulation The signal is received in time The source of the information is alive and able to provide data. 2023 SIGNAL PROCESSING IN ADAS SYSTEMS 19 AVALABILITY TIMING INTEGRITY SECURITY CORRECTNESS - Back up systems - Maintenance - Diagnostics - Synchronization - Prioritization - Monitoring - E2E checks - Redundancy - Validity Checks - Encryption - Authentication - Access Control - Sanity Checks - Input diversity - Validation - Hardware failures - Environmental factors. - Network congestion - Processing performance - Out of Sync data - Unintended Interference (noise) - Faulty Hardware - Manipulation of data - Spoofing - Jamming - Faulty / Buggy Calculations - Technical insufficiencies