Essays about: "thesis on model based testing"

Showing result 1 - 5 of 425 essays containing the words thesis on model based testing.

  1. 1. Predicting inflow and infiltration to wastewater networks based on temperature measurements

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Martin Åsell; [2024]
    Keywords : Inflow and Infiltration; I I; CNN; Linear regression;

    Abstract : Sewer pipelines are deteriorating due to aging and sub optimal material selections, leading to the infiltration of clean ground and rainfall water into the pipes. It is estimated that a significant portion (up to 40-50%) of the water entering wastewater treatment plants is actually clean infiltrated water. READ MORE

  2. 2. Human-Multi-Drone Interaction in Search and Rescue Systems under High Cognitive Workload

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Johanna Ahlskog; [2024]
    Keywords : Unmanned aerial vehicle; human-drone interaction; cognitive workload; trust; search and rescue; drone swarm; situational awareness; multi-drone systems;

    Abstract : Unmanned Aerial Vehicles (UAV), often referred to as drones, have seen increased use in search and rescue (SAR) missions. Traditionally, these missions involve manual control of each drone for aerial surveillance. READ MORE

  3. 3. An Empirical Survey of Bandits in an Industrial Recommender System Setting

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Tobias Schwarz; Johan Brandby; [2023-09-21]
    Keywords : computer science; industrial application; machine learning; reinforcement learning; multi-armed bandits; MAB; contextual multi-armed bandits; survey; batch learning;

    Abstract : In this thesis, the effects of incorporating unstructured data—images in the wild—in contextual multi-armed bandits are investigated, when used within a recommender system setting, which focuses on picture-based content suggestion. The idea is to employ image features, extracted by a pre-trained convolutional neural network, and study the resulting bandit behaviors when including respective excluding this information in the typical context creation, which normally relies on structured data sources—such as metadata. READ MORE

  4. 4. Context-aware security testing of Android applications : Detecting exploitable vulnerabilities through Android model-based security testing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ivan Baheux; [2023]
    Keywords : Android Application Security; Vulnerability Detection; Context-Awareness; Model-Based Security Testing; Domain Specific Language; Sécurité des Applications Android; Détection de Vulnérabilités; Sensibilité au Contexte; Tests de Sécurité Basés sur les Modèles; Langage Dédiés; Android-applikationssäkerhet; Upptäckt av sårbarheter; Kontextmedvetenhet; Modellbaserad säkerhetstestning; Domänspecifikt språk;

    Abstract : This master’s thesis explores ways to uncover and exploit vulnerabilities in Android applications by introducing a novel approach to security testing. The research question focuses on discovering an effective method for detecting vulnerabilities related to the context of an application. READ MORE

  5. 5. The State of Stateful Serverless Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ashmitha Ambastha; [2023]
    Keywords : Stateful Serverless Systems; Azure Durable Functions; Apache Flink StateFun; Kalix; Cloudburst; Function-as-a-Service; Serverlösa system utan tillstånd; Azure Durable Functions; Apache Flink StateFun; Kalix; Cloudburst; funktion som tjänst;

    Abstract : Serverless computing and Function-as-a-service are popular paradigms that simplify application development by abstracting the development layer from the underlying infrastructure components. These systems work in a pay-as-you-go model and provide an efficient environment for developers to focus entirely on developing their business logic. READ MORE