Essays about: "Verification and Validation"

Showing result 6 - 10 of 145 essays containing the words Verification and Validation.

  1. 6. Ranking Software Reliability Measures using Best Worst Multicriteria DecisionMaking Method

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Venkat Puneeth Reddy Mereddy; [2023]
    Keywords : Ranking Software measures; Software reliability; Multi-criteria Decision making; Best Worst Method. ii;

    Abstract : Background: The production of high-quality software products has been a long-standing challenge for the software industry. The advent of agile software development methodologies has resulted in a significant acceleration in the development pace. READ MORE

  2. 7. Start of a new design method for a competitive Small Modular Reactor (SMR) adaptable to future uses

    University essay from KTH/Skolan för teknikvetenskap (SCI)

    Author : Baptiste Mazurié; [2023]
    Keywords : Requirement modelling; Cyber-physical systems; Small Modular Reactor SMR ; Systems Engineering; CRML;

    Abstract : As cyber-physical systems become increasingly complex, the management and verification of requirements during design is essential. A new language called CRML (Common Requirement Modelling Language) has been created during the European EMBrACE project to formalize realistic dynamical requirements, but a method for representing these requirements and a framework for using them as a design aid must be defined to ease appropriation by engineers. READ MORE

  3. 8. Using Simulation-Based Testing to Evaluate the Safety Impact of Network Disturbances for Remote Driving

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Shrishti Trivedi; [2023]
    Keywords : Remote Driving; Fault Injection; CARLA Driving Simulator; Network Faults; NETEM; Fjärrkörning; Felinjicering; CARLA Körsimulator; Nätverksfel; NETEM;

    Abstract : The transportation industry has been transforming because of rapid digitalization and autonomy. Because of this the demand for more connected and autonomous vehicles is increasing for both private individuals and businesses. Reducing human interaction emphasizes the need for higher road safety. READ MORE

  4. 9. Static Analysis Of Client-Side JavaScript Code To Detect Server-Side Business Logic Vulnerabilities

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Frederick van der Windt; [2023]
    Keywords : JavaScript; Static Analysis; Business Logic Vulnerabilities; Client-side; Fuzzing; Black-box; JavaScript; statisk analys; sårbarheter i affärslogiken; klientsidan; Fuzzing; Black-box;

    Abstract : In the real world, web applications are crucial in various domains, from e-commerce to finance and healthcare. However, these applications are not immune to vulnerabilities, particularly in business logic. Detecting such vulnerabilities can be challenging due to the complexity and diversity of application functionality. READ MORE

  5. 10. Practical Analysis of the Giskard Consensus Protoco

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Leon Sandner; [2023]
    Keywords : Distributed Ledger; Blockchain; Consensus Protocol; Giskard; Hyperledger Sawtooth; Distribuerade Huvudbok; Blockchain; Konsensus; Giskard; Hyperledger Sawtooth;

    Abstract : Consensus protocols are the core of modern blockchain systems, such as the Bitcoin, Ethereum, and Algorand networks. Thanks to these protocols, participants in a blockchain network can reach consensus on which blocks to add to a blockchain, to have a consistent chain of blocks in the whole network. READ MORE