-
elements like Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs) to secure hardware components. Embedded Trust Protocols: Design protocols that establish and maintain trust within
-
predictive accuracy and prohibitively long computational times, making them unsuitable for real-time process control. Artificial intelligence (AI) models present a promising alternative by addressing
-
Verification Tools: Develop AI algorithms that automate the verification process, ensuring systems meet required safety and performance standards. Health Monitoring Algorithms: Implement AI-based monitoring
-
apparatus equipped with thermocouples and thermal imaging to simulate realistic runaway events. Top-performing coatings will be validated in situ on live EV cells under controlled runaway conditions. Dr
-
, embedded intelligence, and adaptive cyber-physical systems that operate safely under uncertainty and dynamic conditions. This PhD at Cranfield University explores the development of resilient, AI-enabled