Essays about: "Verification and Validation"
Showing result 6 - 10 of 145 essays containing the words Verification and Validation.
-
6. Ranking Software Reliability Measures using Best Worst Multicriteria DecisionMaking Method
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background: The production of high-quality software products has been a long-standing challenge for the software industry. The advent of agile software development methodologies has resulted in a significant acceleration in the development pace. READ MORE
-
7. Start of a new design method for a competitive Small Modular Reactor (SMR) adaptable to future uses
University essay from KTH/Skolan för teknikvetenskap (SCI)Abstract : As cyber-physical systems become increasingly complex, the management and verification of requirements during design is essential. A new language called CRML (Common Requirement Modelling Language) has been created during the European EMBrACE project to formalize realistic dynamical requirements, but a method for representing these requirements and a framework for using them as a design aid must be defined to ease appropriation by engineers. READ MORE
-
8. Using Simulation-Based Testing to Evaluate the Safety Impact of Network Disturbances for Remote Driving
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The transportation industry has been transforming because of rapid digitalization and autonomy. Because of this the demand for more connected and autonomous vehicles is increasing for both private individuals and businesses. Reducing human interaction emphasizes the need for higher road safety. READ MORE
-
9. Static Analysis Of Client-Side JavaScript Code To Detect Server-Side Business Logic Vulnerabilities
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the real world, web applications are crucial in various domains, from e-commerce to finance and healthcare. However, these applications are not immune to vulnerabilities, particularly in business logic. Detecting such vulnerabilities can be challenging due to the complexity and diversity of application functionality. READ MORE
-
10. Practical Analysis of the Giskard Consensus Protoco
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Consensus protocols are the core of modern blockchain systems, such as the Bitcoin, Ethereum, and Algorand networks. Thanks to these protocols, participants in a blockchain network can reach consensus on which blocks to add to a blockchain, to have a consistent chain of blocks in the whole network. READ MORE