-
Feasibility studies and evaluations
- /en/research-topics/surveillance-protection/biometric-contactless-fingerprint-technologies/feasibility-studies-and-evaluations
Feasibility studies and evaluations Feasibility studies and evaluations AIT offers system design in hardware and software for capturing contactless biometrics. In this example, a feasibility study was
-
3D camera for various detection applications
- /en/research-topics/surveillance-protection/design-and-development-of-embedded-vision-systems/3d-camera-for-various-detection-applications
3D camera for various detection applications 3D camera for various detection applications This EMC certified stereo camera head consists of three embedded image sensors with an integrated Ethernet hub
-
Prototype of a convenient access control solution
- /en/research-topics/surveillance-protection/biometric-contactless-fingerprint-technologies/prototype-of-a-convenient-access-control-solution
Prototype of a convenient access control solution Prototype of a convenient access control solution By miniaturising and embedding the technology into an automated (turnstile) access control door manu
-
Multi-channel (24) video encoder PCI boards
- /en/research-topics/surveillance-protection/design-and-development-of-embedded-vision-systems/multi-channel-24-video-encoder-pci-boards
Multi-channel (24) video encoder PCI boards Multi-channel (24) video encoder PCI boards AIT offers design capabilities for embedded (PCI) boards. As an example, this board includes multiple digital si
-
Vein scanner capture unit
- /en/research-topics/surveillance-protection/design-and-development-of-embedded-vision-systems/vein-scanner-capture-unit
Vein scanner capture unit Vein scanner capture unit AIT offers system design in hard and software for capturing contactless biometrics. In this example, a feasibility study was conducted for vascular
-
SECREDAS
- /en/research-topics/dependable-systems-engineering/projects/secredas
SECREDAS The high-level goal of the EU-project SECREDAS developed and validated multi-domain architecting methodologies, reference architectures and components for autonomous systems, combining high s
-
CySiVuS
- /en/research-topics/dependable-systems-engineering/projects/cysivus
CySiVuS Cyber security for transport infrastructure and road operators (CySiVuS) From the point of view of road traffic infrastructure, cyber attacks pose an eminent threat to autonomously driving and
-
BESTE-AB
- /en/research-topics/dependable-systems-engineering/projects/beste-ab
BESTE-AB BESTE-AB stands for "Needs-based control of autonomous rail infrastructure" and is dedicated to the further development of an existing industrial substation for the management of autonomous t
-
AUTODRIVE
- /en/research-topics/dependable-systems-engineering/projects/autodrive
AUTODRIVE The goal of the European ECSEL-project AUTODRIVE was to advance fail-aware, fail-safe, and fail-operational electronic components, systems, and architectures for highly and fully automated d
-
Productive4.0
- /en/research-topics/dependable-systems-engineering/projects/productive40
Productive4.0 The EU/ECSEL-project Productive4.0 developed a European platform approach for Factory automation and required IoT components Seamless integration of design Order driven manufacturing Sma
-
TRUSTED2
- /en/research-topics/dependable-systems-engineering/projects/trusted2
TRUSTED2 With the increasing integration of information technologies into vehicles, security is becoming a major concern in the automotive industry. The Austrian (FFG-)project TRUSTED contributed to s
-
Comp4Drones
- /en/research-topics/dependable-systems-engineering/projects/comp4drones
Comp4Drones The project provided a key technologies enabler framework for safe integration of certified drones into the airspace. Adoption and use of civilian drones is very challenging due to the com
-
Dedicated ten-print contactless fingerprint sensors
- /en/research-topics/surveillance-protection/biometric-contactless-fingerprint-technologies/dedicated-ten-print-contactless-fingerprint-sensors
Dedicated ten-print contactless fingerprint sensors Dedicated ten-print contactless fingerprint sensors Touchless fingerprint recognition systems offer several advantages: they do not require contact
-
Software for biometric contactless ten-print fingerprint acquisition on smartphones
- /en/research-topics/surveillance-protection/biometric-contactless-fingerprint-technologies/software-for-biometric-contactless-ten-print-fingerprint-acquisition-on-smartphones
Software for biometric contactless ten-print fingerprint acquisition on smartphones Software for biometric contactless ten-print fingerprint acquisition on smartphones AIT has developed a module for c
-
AQUAS2
- /en/research-topics/dependable-systems-engineering/projects/aquas2
AQUAS2 For safety-critical systems in domains such as transportation, aerospace, or industrial control, this project focused on: Safety/Security/Performance to be considered together, during the overa
-
Reference projects
- /en/research-topics/dependable-systems-engineering/reference-projects
Reference projects Reference projects Our research portfolio covers the full spectrum of direct contract research with industry through to collaborative research projects in national and international
-
Machine Code Analysis
- /en/research-topics/dependable-systems-engineering/verification-validation/machine-code-analysis
Machine Code Analysis Machine Code Analysis Running any third-party software requires you to have trust in the software supplier not to have added any hidden functionality that could endanger your bus
-
Automated Test Case Generation
- /en/research-topics/dependable-systems-engineering/verification-validation/automated-test-case-generation
Automated Test Case Generation Automated Test Case Generation Model-based test case generation (MBTCG) is about automatically generating test cases from a computer readable specification. Its advantag
-
Verification & Validation
- /en/research-topics/dependable-systems-engineering/verification-validation
Verification & Validation Verification & Validation Modern Systems are too complex for manual verification. How do you efficiently and thoroughly verify that the system you are building is behaving “c
-
Safety & Security
- /en/research-topics/dependable-systems-engineering/safety-security
Safety & Security Safety & Security Safety and Security of Systems cannot be an afterthought. Traditionally, safety and security were treated as separate issues. However, this view does not hold anymo
- «
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- »