{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T20:22:21Z","timestamp":1769458941068,"version":"3.49.0"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10836-025-06159-5","type":"journal-article","created":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T12:22:15Z","timestamp":1739449335000},"page":"63-74","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Design and Simulation of a Dependable Architecture Using Triple Modular Redundancy for Embedded Cyber-Physical Systems"],"prefix":"10.1007","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6143-330X","authenticated-orcid":false,"given":"Hamed A.","family":"Mahmood","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8142-8815","authenticated-orcid":false,"given":"Shawkat S.","family":"Khairullah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,13]]},"reference":[{"issue":"4","key":"6159_CR1","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1007\/s10836-024-06126-6","volume":"40","author":"SS Khairullah","year":"2024","unstructured":"Khairullah SS (2024) Formal Verification of a dependable state machine-based Hardware Architecture for Safety-critical Cyber-physical systems: analysis, design, and implementation. J Electron Test 40(4):509-523. https:\/\/doi.org\/10.1007\/s10836-024-06126-6","journal-title":"J Electron Test"},{"key":"6159_CR2","doi-asserted-by":"crossref","unstructured":"Che Ismail MM, Shairah Abdul Halim I, Mohd Hassan SL et al (2021) Fault Tolerant Design Comparison Study of TMR and 5MR. In: Proc. 2021 IEEE Symposium on Industrial Electronics & Applications (ISIEA). pp 1\u20136","DOI":"10.1109\/ISIEA51897.2021.9509996"},{"key":"6159_CR3","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.ress.2018.09.004","volume":"182","author":"V Bolbot","year":"2019","unstructured":"Bolbot V, Theotokatos G, Bujorianu LM et al (2019) Vulnerabilities and safety assurance methods in Cyber-physical systems: a comprehensive review. Reliab Eng Syst Saf 182:179\u2013193. https:\/\/doi.org\/10.1016\/j.ress.2018.09.004","journal-title":"Reliab Eng Syst Saf"},{"key":"6159_CR4","doi-asserted-by":"crossref","unstructured":"Gautham S, Jayakumar AV, Rajagopala A, Elks C (2021) Realization of a Model-Based DevOps Process for Industrial Safety Critical Cyber Physical Systems. In: Proc. 2021 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS). pp 597\u2013604","DOI":"10.1109\/ICPS49255.2021.9468213"},{"key":"6159_CR5","doi-asserted-by":"publisher","first-page":"407","DOI":"10.47709\/cnahpc.v6i1.3518","volume":"6","author":"DCP Sinaga","year":"2024","unstructured":"Sinaga DCP, Tampubolon GJ, Ndruru I (2024) Implementation of a Smart Home Based on Internet of Things Using Cisco Packet Tracer. J Comput Netw Archit High Perform Comput 6:407\u2013418. https:\/\/doi.org\/10.47709\/cnahpc.v6i1.3518","journal-title":"J Comput Netw Archit High Perform Comput"},{"issue":"2","key":"6159_CR6","doi-asserted-by":"publisher","first-page":"345","DOI":"10.18576\/amis\/120209","volume":"12","author":"LM Fawzi","year":"2018","unstructured":"Fawzi LM, Sideeq Y, Ameen SM, Alqaraawi, Shefa AD (March 1, 2018) Embedded real-time video Surveillance System based on Multi-sensor and Visual Tracking. Appl Math Inform Sci 12(2):345\u2013359. https:\/\/doi.org\/10.18576\/amis\/120209","journal-title":"Appl Math Inform Sci"},{"key":"6159_CR7","doi-asserted-by":"publisher","first-page":"413","DOI":"10.11591\/eei.v13i1.5713","volume":"13","author":"SS Khairullah","year":"2024","unstructured":"Khairullah SS, Qassabbashi FN, Kareem JA (2024) Design and analysis of fault-tolerant sequential logic circuits for safety-critical applications. Bull Electr Eng Inf 13:413\u2013421. https:\/\/doi.org\/10.11591\/eei.v13i1.5713","journal-title":"Bull Electr Eng Inf"},{"key":"6159_CR8","doi-asserted-by":"publisher","first-page":"49","DOI":"10.33130\/AJCT.2021v07i01.011","volume":"7","author":"A Agrawal","year":"2021","unstructured":"Agrawal A, Toshniwal D (2021) Fault Tolerance in IoT: techniques and comparative study. ASIAN J Converg Technol 7:49\u201352. https:\/\/doi.org\/10.33130\/AJCT.2021v07i01.011","journal-title":"ASIAN J Converg Technol"},{"key":"6159_CR9","volume-title":"Fault-tolerance techniques for SRAM-based FPGAs","author":"FL Kastensmidt","year":"2006","unstructured":"Kastensmidt FL (2006) Fault-tolerance techniques for SRAM-based FPGAs. Springer, Dordrecht"},{"key":"6159_CR10","doi-asserted-by":"publisher","first-page":"164","DOI":"10.33899\/rengj.2020.127782.1051","volume":"25","author":"A Alobaidy","year":"2020","unstructured":"Alobaidy A, Abdul-Jabbar MA, Al-khayyt DJM SZ (2020) Faults diagnosis in Robot systems: a review. Al-Rafidain Eng J AREJ 25:164\u2013175. https:\/\/doi.org\/10.33899\/rengj.2020.127782.1051","journal-title":"Al-Rafidain Eng J AREJ"},{"key":"6159_CR11","volume-title":"Fundamentals of dependable computing for software engineers","author":"J Knight","year":"2012","unstructured":"Knight J (2012) Fundamentals of dependable computing for software engineers. CRC, Boca Raton"},{"key":"6159_CR12","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1049\/iet-cps.2019.0022","volume":"5","author":"SS Khairullah","year":"2020","unstructured":"Khairullah SS, Elks CR (2020) Self-repairing hardware architecture for safety-critical cyber-physical-systems. IET Cyber-Phys Syst Theory Appl 5:92\u201399. https:\/\/doi.org\/10.1049\/iet-cps.2019.0022","journal-title":"IET Cyber-Phys Syst Theory Appl"},{"key":"6159_CR13","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1080\/00295450.2018.1450014","volume":"202","author":"SS Khairullah","year":"2018","unstructured":"Khairullah SS, Elks CR (2018) A Bio-inspired, Self-Healing, resilient Architecture for Digital Instrumentation and Control Systems and embedded devices. Nucl Technol 202:141\u2013152. https:\/\/doi.org\/10.1080\/00295450.2018.1450014","journal-title":"Nucl Technol"},{"key":"6159_CR14","unstructured":"Khairullah SS, Bakker T, Elks CR (2017) Toward biologically inspired self-healing digital embedded devices: bio-SymPLe. In Proc. 10th International Topical Meeting on Nuclear Plant Instrumentation, Control, and Human Machine Interface Technologies, San Francisco"},{"key":"6159_CR15","doi-asserted-by":"publisher","first-page":"614","DOI":"10.18196\/jrc.v3i5.15972","volume":"3","author":"SS Khairullah","year":"2022","unstructured":"Khairullah SS, Sharkawy A-N (2022) Design and implementation of a Reliable and Secure Controller for Smart Home Applications based on PLC. J Robot Control JRC 3:614\u2013621. https:\/\/doi.org\/10.18196\/jrc.v3i5.15972","journal-title":"J Robot Control JRC"},{"key":"6159_CR16","doi-asserted-by":"publisher","first-page":"8106467","DOI":"10.1155\/2021\/8106467","volume":"2021","author":"M Uppal","year":"2021","unstructured":"Uppal M, Gupta D, Juneja S et al (2021) Cloud-based Fault Prediction using IoT in Office Automation for Improvisation of Health of Employees. J Healthc Eng 2021:8106467. https:\/\/doi.org\/10.1155\/2021\/8106467","journal-title":"J Healthc Eng"},{"key":"6159_CR17","doi-asserted-by":"publisher","first-page":"1799","DOI":"10.32604\/cmc.2022.025330","volume":"72","author":"M Uppal","year":"2022","unstructured":"Uppal M, Gupta D, Anand D et al (2022) Fault Pattern diagnosis and classification in Sensor Nodes using fall curve. Comput Mater Contin 72:1799\u20131814. https:\/\/doi.org\/10.32604\/cmc.2022.025330","journal-title":"Comput Mater Contin"},{"key":"6159_CR18","doi-asserted-by":"publisher","unstructured":"Grobelna I (2024) Model Checking of Concurrency in Cyber-Physical Systems Specified with Interpreted Petri Nets*. In Proc. 23rd International Symposium INFOTEH-JAHORINA (INFOTEH), 1\u20134. https:\/\/doi.org\/10.1109\/INFOTEH60418.2024.10495966","DOI":"10.1109\/INFOTEH60418.2024.10495966"},{"key":"6159_CR19","doi-asserted-by":"publisher","unstructured":"Chen G, Jiang Z (2024) Iterative Model Checking for Safety-Critical Problems in Cyber-Physical Systems. In Proc. ACM\/IEEE 15th International Conference on Cyber-Physical Systems (ICCPS), 273\u201374. https:\/\/doi.org\/10.1109\/ICCPS61052.2024.00032","DOI":"10.1109\/ICCPS61052.2024.00032"},{"key":"6159_CR20","doi-asserted-by":"crossref","unstructured":"Santhiya M, Saranya S, Vijayachitra S et al (2021) Application of Voter Insertion Algorithm for Fault Management using Triple Modular Redundancy (TMR) Technique. In: Proc. 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV). pp 578\u2013583","DOI":"10.1109\/ICICV50876.2021.9388450"},{"key":"6159_CR21","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1049\/stg2.12091","volume":"6","author":"MM Islam","year":"2023","unstructured":"Islam MM, Usman MU, Newaz A, Faruque MO (2023) Ensemble voting-based fault classification and location identification for a distribution system with microgrids using smart meter measurements. IET Smart Grid 6:219\u2013232. https:\/\/doi.org\/10.1049\/stg2.12091","journal-title":"IET Smart Grid"},{"key":"6159_CR22","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis A, Laprie JC, Randell B, Landwehr C (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secure Comput 1:11\u201333. https:\/\/doi.org\/10.1109\/TDSC.2004.2","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"6159_CR23","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9657.001.0001","volume-title":"Finite state machines in hardware: theory and design (with VHDL and SystemVerilog)","author":"VA Pedroni","year":"2013","unstructured":"Pedroni VA (2013) Finite state machines in hardware: theory and design (with VHDL and SystemVerilog). The MIT Press, Cambridge, Massachusetts"},{"key":"6159_CR24","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s10836-020-05898-x","volume":"36","author":"S Cai","year":"2020","unstructured":"Cai S, He B, Wang W et al (2020) Soft Error Reliability Evaluation of Nanoscale Logic Circuits in the Presence of multiple transient faults. J Electron Test 36:469\u2013483. https:\/\/doi.org\/10.1007\/s10836-020-05898-x","journal-title":"J Electron Test"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-025-06159-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-025-06159-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-025-06159-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T07:28:32Z","timestamp":1746689312000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-025-06159-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["6159"],"URL":"https:\/\/doi.org\/10.1007\/s10836-025-06159-5","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"value":"0923-8174","type":"print"},{"value":"1573-0727","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2]]},"assertion":[{"value":"20 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"\u00a0Authors declare that they neither has competing interests nor relevant financial or non-financial conflict interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest\/Competing Interests"}}]}}