Essays about: "code validation"
Showing result 6 - 10 of 128 essays containing the words code validation.
-
6. Uncertainty Analysis : Severe Accident Scenario at a Nordic Nuclear Power Plant
University essay from Högskolan Dalarna/Institutionen för information och teknikAbstract : Nuclear Power Plants (NPP) undergo fault and sensitivity analysis with scenario modelling to predict catastrophic events, specifically releases of Cesium 137 (Cs-137). The purpose of this thesis is to find which of 108 input-features from Modular Accident Analysis Program (MAAP)simulation code are important, when there is large release of Cs-137 emissions. READ MORE
-
7. Validation of a moderate Reynolds number channel in Neko
University essay from KTH/Skolan för teknikvetenskap (SCI)Abstract : Neko is a portable framework for high-order spectral element flow simulations[1]. Originally from Nek5000, Neko not only inherited its numerical stability and well-performance, but also added the benefits of dynamic memory and support for many current accelerator backends. READ MORE
-
8. Design and Implementation of Domain Modelling Language with Class Mapping and Class Dependency
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Modelling languages like all languages grow and evolve over time. This thesis assists in the evolution of DAVE modelling language, a modelling language used by Jeppesen, a Boeing company to express business-specific data models. READ MORE
-
9. Practical Analysis of the Giskard Consensus Protoco
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Consensus protocols are the core of modern blockchain systems, such as the Bitcoin, Ethereum, and Algorand networks. Thanks to these protocols, participants in a blockchain network can reach consensus on which blocks to add to a blockchain, to have a consistent chain of blocks in the whole network. READ MORE
-
10. Decentralized Validation of Reproducible Builds : A protocol for collaborative and decentralized validation of package reproducibility
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As the threat of supply-chain attacks grows, the need for techniques to protect software integrity likewise increases. The concept of reproducible builds is one such protection. READ MORE