Model-Based Approaches in Safety-Critical Embedded System Design Article Swipe
This article explores the development of safety-critical embedded systems through model-based approaches, focusing on the integration of model-driven engineering and formal verification methods. Beginning with an examination of the foundational principles of model-driven engineering in safety-critical contexts, the article progresses through the essential elements of modeling languages, tool ecosystems, and real-time aspects critical to embedded systems. It then delves into formal methods, including specification languages, model checking techniques, and theorem proving approaches that provide mathematical guarantees of system correctness. The synergy between model-driven engineering and formal methods is highlighted through transformation techniques and case studies across avionics, medical devices, and autonomous vehicles. Despite significant progress, challenges persist in verification scalability, model fidelity, certification compliance, and emerging technological paradigms such as cyber-physical systems and machine learning components in safety-critical applications.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.37745/ejcsit.2013/vol13n203041
- https://eajournals.org/ejcsit/wp-content/uploads/sites/21/2025/05/Model-Based-Approaches.pdf
- OA Status
- hybrid
- References
- 11
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4410464798
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4410464798Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.37745/ejcsit.2013/vol13n203041Digital Object Identifier
- Title
-
Model-Based Approaches in Safety-Critical Embedded System DesignWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-04-15Full publication date if available
- Authors
-
Raj CibinList of authors in order
- Landing page
-
https://doi.org/10.37745/ejcsit.2013/vol13n203041Publisher landing page
- PDF URL
-
https://eajournals.org/ejcsit/wp-content/uploads/sites/21/2025/05/Model-Based-Approaches.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://eajournals.org/ejcsit/wp-content/uploads/sites/21/2025/05/Model-Based-Approaches.pdfDirect OA link when available
- Concepts
-
Computer science, Reliability engineering, Risk analysis (engineering), Systems engineering, Engineering, BusinessTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
11Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4410464798 |
|---|---|
| doi | https://doi.org/10.37745/ejcsit.2013/vol13n203041 |
| ids.doi | https://doi.org/10.37745/ejcsit.2013/vol13n203041 |
| ids.openalex | https://openalex.org/W4410464798 |
| fwci | 0.0 |
| type | article |
| title | Model-Based Approaches in Safety-Critical Embedded System Design |
| biblio.issue | 20 |
| biblio.volume | 13 |
| biblio.last_page | 41 |
| biblio.first_page | 30 |
| topics[0].id | https://openalex.org/T13295 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 0.9993000030517578 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2213 |
| topics[0].subfield.display_name | Safety, Risk, Reliability and Quality |
| topics[0].display_name | Safety Systems Engineering in Autonomy |
| topics[1].id | https://openalex.org/T12810 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.998199999332428 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2207 |
| topics[1].subfield.display_name | Control and Systems Engineering |
| topics[1].display_name | Real-time simulation and control systems |
| topics[2].id | https://openalex.org/T10142 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9977999925613403 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1703 |
| topics[2].subfield.display_name | Computational Theory and Mathematics |
| topics[2].display_name | Formal Methods in Verification |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.47054558992385864 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C200601418 |
| concepts[1].level | 1 |
| concepts[1].score | 0.376556396484375 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q2193887 |
| concepts[1].display_name | Reliability engineering |
| concepts[2].id | https://openalex.org/C112930515 |
| concepts[2].level | 1 |
| concepts[2].score | 0.3592236638069153 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q4389547 |
| concepts[2].display_name | Risk analysis (engineering) |
| concepts[3].id | https://openalex.org/C201995342 |
| concepts[3].level | 1 |
| concepts[3].score | 0.34785357117652893 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q682496 |
| concepts[3].display_name | Systems engineering |
| concepts[4].id | https://openalex.org/C127413603 |
| concepts[4].level | 0 |
| concepts[4].score | 0.2891325056552887 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[4].display_name | Engineering |
| concepts[5].id | https://openalex.org/C144133560 |
| concepts[5].level | 0 |
| concepts[5].score | 0.26123541593551636 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q4830453 |
| concepts[5].display_name | Business |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.47054558992385864 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/reliability-engineering |
| keywords[1].score | 0.376556396484375 |
| keywords[1].display_name | Reliability engineering |
| keywords[2].id | https://openalex.org/keywords/risk-analysis |
| keywords[2].score | 0.3592236638069153 |
| keywords[2].display_name | Risk analysis (engineering) |
| keywords[3].id | https://openalex.org/keywords/systems-engineering |
| keywords[3].score | 0.34785357117652893 |
| keywords[3].display_name | Systems engineering |
| keywords[4].id | https://openalex.org/keywords/engineering |
| keywords[4].score | 0.2891325056552887 |
| keywords[4].display_name | Engineering |
| keywords[5].id | https://openalex.org/keywords/business |
| keywords[5].score | 0.26123541593551636 |
| keywords[5].display_name | Business |
| language | en |
| locations[0].id | doi:10.37745/ejcsit.2013/vol13n203041 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210168180 |
| locations[0].source.issn | 2054-0957, 2054-0965 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2054-0957 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | European Journal of Computer Science and Information Technology |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://eajournals.org/ejcsit/wp-content/uploads/sites/21/2025/05/Model-Based-Approaches.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | European Journal of Computer Science and Information Technology |
| locations[0].landing_page_url | https://doi.org/10.37745/ejcsit.2013/vol13n203041 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5023554723 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-5374-8504 |
| authorships[0].author.display_name | Raj Cibin |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Charles Antony Raj |
| authorships[0].is_corresponding | True |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://eajournals.org/ejcsit/wp-content/uploads/sites/21/2025/05/Model-Based-Approaches.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Model-Based Approaches in Safety-Critical Embedded System Design |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T13295 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 0.9993000030517578 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2213 |
| primary_topic.subfield.display_name | Safety, Risk, Reliability and Quality |
| primary_topic.display_name | Safety Systems Engineering in Autonomy |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W2390279801, https://openalex.org/W4391913857, https://openalex.org/W2358668433, https://openalex.org/W4396701345, https://openalex.org/W2376932109, https://openalex.org/W2001405890, https://openalex.org/W4396696052 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.37745/ejcsit.2013/vol13n203041 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210168180 |
| best_oa_location.source.issn | 2054-0957, 2054-0965 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2054-0957 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | European Journal of Computer Science and Information Technology |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://eajournals.org/ejcsit/wp-content/uploads/sites/21/2025/05/Model-Based-Approaches.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | European Journal of Computer Science and Information Technology |
| best_oa_location.landing_page_url | https://doi.org/10.37745/ejcsit.2013/vol13n203041 |
| primary_location.id | doi:10.37745/ejcsit.2013/vol13n203041 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210168180 |
| primary_location.source.issn | 2054-0957, 2054-0965 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2054-0957 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | European Journal of Computer Science and Information Technology |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://eajournals.org/ejcsit/wp-content/uploads/sites/21/2025/05/Model-Based-Approaches.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | European Journal of Computer Science and Information Technology |
| primary_location.landing_page_url | https://doi.org/10.37745/ejcsit.2013/vol13n203041 |
| publication_date | 2025-04-15 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W4281557333, https://openalex.org/W4281557948, https://openalex.org/W4214599689, https://openalex.org/W2804324442, https://openalex.org/W2995787802, https://openalex.org/W2007489624, https://openalex.org/W4384202063, https://openalex.org/W2076799891, https://openalex.org/W4384521502, https://openalex.org/W3122722131, https://openalex.org/W4200280474 |
| referenced_works_count | 11 |
| abstract_inverted_index.It | 56 |
| abstract_inverted_index.an | 25 |
| abstract_inverted_index.as | 119 |
| abstract_inverted_index.in | 34, 107, 126 |
| abstract_inverted_index.is | 87 |
| abstract_inverted_index.of | 5, 16, 27, 31, 44, 76 |
| abstract_inverted_index.on | 13 |
| abstract_inverted_index.to | 53 |
| abstract_inverted_index.The | 79 |
| abstract_inverted_index.and | 19, 49, 68, 84, 92, 99, 114, 122 |
| abstract_inverted_index.the | 3, 14, 28, 37, 41 |
| abstract_inverted_index.This | 0 |
| abstract_inverted_index.case | 93 |
| abstract_inverted_index.into | 59 |
| abstract_inverted_index.such | 118 |
| abstract_inverted_index.that | 72 |
| abstract_inverted_index.then | 57 |
| abstract_inverted_index.tool | 47 |
| abstract_inverted_index.with | 24 |
| abstract_inverted_index.model | 65, 110 |
| abstract_inverted_index.across | 95 |
| abstract_inverted_index.delves | 58 |
| abstract_inverted_index.formal | 20, 60, 85 |
| abstract_inverted_index.system | 77 |
| abstract_inverted_index.Despite | 102 |
| abstract_inverted_index.article | 1, 38 |
| abstract_inverted_index.aspects | 51 |
| abstract_inverted_index.between | 81 |
| abstract_inverted_index.machine | 123 |
| abstract_inverted_index.medical | 97 |
| abstract_inverted_index.methods | 86 |
| abstract_inverted_index.persist | 106 |
| abstract_inverted_index.provide | 73 |
| abstract_inverted_index.proving | 70 |
| abstract_inverted_index.studies | 94 |
| abstract_inverted_index.synergy | 80 |
| abstract_inverted_index.systems | 8, 121 |
| abstract_inverted_index.theorem | 69 |
| abstract_inverted_index.through | 9, 40, 89 |
| abstract_inverted_index.checking | 66 |
| abstract_inverted_index.critical | 52 |
| abstract_inverted_index.devices, | 98 |
| abstract_inverted_index.elements | 43 |
| abstract_inverted_index.embedded | 7, 54 |
| abstract_inverted_index.emerging | 115 |
| abstract_inverted_index.explores | 2 |
| abstract_inverted_index.focusing | 12 |
| abstract_inverted_index.learning | 124 |
| abstract_inverted_index.methods, | 61 |
| abstract_inverted_index.methods. | 22 |
| abstract_inverted_index.modeling | 45 |
| abstract_inverted_index.systems. | 55 |
| abstract_inverted_index.Beginning | 23 |
| abstract_inverted_index.avionics, | 96 |
| abstract_inverted_index.contexts, | 36 |
| abstract_inverted_index.essential | 42 |
| abstract_inverted_index.fidelity, | 111 |
| abstract_inverted_index.including | 62 |
| abstract_inverted_index.paradigms | 117 |
| abstract_inverted_index.progress, | 104 |
| abstract_inverted_index.real-time | 50 |
| abstract_inverted_index.vehicles. | 101 |
| abstract_inverted_index.approaches | 71 |
| abstract_inverted_index.autonomous | 100 |
| abstract_inverted_index.challenges | 105 |
| abstract_inverted_index.components | 125 |
| abstract_inverted_index.guarantees | 75 |
| abstract_inverted_index.languages, | 46, 64 |
| abstract_inverted_index.principles | 30 |
| abstract_inverted_index.progresses | 39 |
| abstract_inverted_index.techniques | 91 |
| abstract_inverted_index.approaches, | 11 |
| abstract_inverted_index.compliance, | 113 |
| abstract_inverted_index.development | 4 |
| abstract_inverted_index.ecosystems, | 48 |
| abstract_inverted_index.engineering | 18, 33, 83 |
| abstract_inverted_index.examination | 26 |
| abstract_inverted_index.highlighted | 88 |
| abstract_inverted_index.integration | 15 |
| abstract_inverted_index.model-based | 10 |
| abstract_inverted_index.significant | 103 |
| abstract_inverted_index.techniques, | 67 |
| abstract_inverted_index.correctness. | 78 |
| abstract_inverted_index.foundational | 29 |
| abstract_inverted_index.mathematical | 74 |
| abstract_inverted_index.model-driven | 17, 32, 82 |
| abstract_inverted_index.scalability, | 109 |
| abstract_inverted_index.verification | 21, 108 |
| abstract_inverted_index.applications. | 128 |
| abstract_inverted_index.certification | 112 |
| abstract_inverted_index.specification | 63 |
| abstract_inverted_index.technological | 116 |
| abstract_inverted_index.cyber-physical | 120 |
| abstract_inverted_index.transformation | 90 |
| abstract_inverted_index.safety-critical | 6, 35, 127 |
| cited_by_percentile_year | |
| corresponding_author_ids | https://openalex.org/A5023554723 |
| countries_distinct_count | 0 |
| institutions_distinct_count | 1 |
| citation_normalized_percentile.value | 0.21523028 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |