Advanced search
Showing result 1 - 5 of 53 essays matching the above criteria.
-
1. Comparing Static and Dynamic Synchronization of GUI-based tests: An Industrial study
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background. Speed is getting more and more critical in modern Software Engineering to be able to respond to users’ expectations of product development. One practice that takes a significant amount of time in the process of releasing software to the customers is testing. READ MORE
-
2. On the use of routing engines for dynamic travel time calculation within emergency vehicle transport simulation
University essay from Malmö universitet/Institutionen för datavetenskap och medieteknik (DVMT)Abstract : Traditional methods for constructing simulation models can involve severalsteps that require manual pre-processing of large data sets. This process maybe time-consuming and prone to human errors, while also leading to modelsthat are inconvenient to customize for varying simulation scenarios. READ MORE
-
3. Modeling, Simulation, and Injection of Camera Images/Video to Automotive Embedded ECU : Image Injection Solution for Hardware-in-the-Loop Testing
University essay from Uppsala universitet/Signaler och systemAbstract : Testing, verification and validation of sensors, components and systems is vital in the early-stage development of new cars with computer-in-the-car architecture. This can be done with the help of the existing technique, hardware-in-the-loop (HIL) testing which, in the close loop testing case, consists of four main parts: Real-Time Simulation Platform, Sensor Simulation PC, Interface Unit (IU), and unit under test which is, for instance, a Vehicle Computing Unit (VCU). READ MORE
-
4. Secure Application Development
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Security testing is a widely applied measure to evaluate and improve software security by identifying vulnerabilities and ensuring security requirements related to properties like confidentiality, integrity, and availability. A confidentiality policy guarantees that attackers will not be able to expose secret information. READ MORE
-
5. Generating lightning bolt videos perceived as real in images using machine learning
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Weather and weather effects are important features when trying to immerse the viewer into a virtual world. Lightning and thunder is one of those effects when attempting to create rough weather, realistic lightning however requires heavy computations, using physics, weather systems, and knowledge of the 3d world. Objectives. READ MORE