Essays about: "Conformance"

Showing result 1 - 5 of 49 essays containing the word Conformance.

  1. 1. Method and Tooling for Automated Conformance Checking between Architecture - design and Implementation

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Vibha Satyam; [2023-10-25]
    Keywords : Architecture Model; UML diagram; implementation; coding; conformance checking; mapping schema; parsing tool;

    Abstract : Many software and/or automotive companies use UML models to write the requirements and later they are implemented by coding. Involving multiple engineers from different teams makes the whole process complex and cumbersome. READ MORE

  2. 2. A comparative study on anapproach to print Industrial Toolsvia Additive Manufacturing for Volume Production from Technical, Economic, and Environmental aspects

    University essay from KTH/Produktionsutveckling

    Author : Purav Mukesh Thaker; [2023]
    Keywords : ;

    Abstract : The thesis explores a path to use Additive Manufacturing as an approach for volume production of Industrial Technique Business Area Tools, addressing the challenges of manufacturing complexity, low volume demand, and quality control for both Atlas Copco Industrial Technique industrial tools (Tool 1 & Tool 2). This study is done in cooperation with Atlas Copco Industrial Technique, comparing the technological, economic, and environmental performance of AM versus the current manufacturing approach from a round bar. READ MORE

  3. 3. Using Requirement-Driven Symbolic Execution to Test Implementations of the CoAP and EDHOC Network Protocols

    University essay from Uppsala universitet/Datalogi

    Author : Sabor Amini; [2023]
    Keywords : Requirement-driven; Symbolic execution; Network protocols; CoAP; EDHOC; Kravbaserad; Symbolisk Exekvering; Nätverksprotokoll;

    Abstract : As the number of Internet of Things devices is increasing rapidly, it is of utmost significance that the implementations of protocols for constrained devices are bug-free. In general implementations of network protocols are error-prone due to their complex nature and ambiguities in the protocol specification. READ MORE

  4. 4. IMPERATIVE MODELS TO DECLARATIVE CONSTRAINTS : Generating Control-Flow Constraints from Business Process Models

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Arvid Bergman Thörn; [2023]
    Keywords : Business Process Management; Imperative modelling; Declarative constraints; Conformance checking; Process querying; Process Mining;

    Abstract : In complex information systems, it is often crucial to evaluate whether a sequence of activities obtained from a system log complies with behavioural rules. This process of evaluation is called conformance checking, and the most classical approach to specifying the behavioural rules is in the form of flow chartlike process diagrams, e.g. READ MORE

  5. 5. Detection of performance anomalies through Process Mining

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Carmine Marra; [2022]
    Keywords : Process mining; Conformance Checking; performance anomalies; ERTMS ETCS; Railway system; complex computer systems.;

    Abstract : Anomaly detection in computer systems operating within complex environments,such as cyber-physical systems (CPS), has become increasingly popularduring these last years due to useful insights this process can provide aboutcomputer systems’ health conditions against known reference nominal states.As performance anomalies lead degraded service delivery, and, eventually,system-wide failures, promptly detecting such anomalies may trigger timelyrecovery responses. READ MORE