Essays about: "verification"
Showing result 6 - 10 of 1088 essays containing the word verification.
-
6. SeqLTL and ωLTL
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Linear Temporal Logic (LTL) is worthwhile for its applications in, among others, model checking, runtime verification and reactive synthesis. However, many useful properties are not expressible in LTL, or not in a natural way. READ MORE
-
7. Digital Twins for Verification and Validation of CPS
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : This paper proposes standardizing the usage and practices of Digital Twins (DTs) for the seamless digital-tophysical transition of Cyber-Physical Systems (CPS) to assure their safety. It recommends adopting Artificial Intelligence (AI) methods and following Requirements Engineering principles (RE) for strong Verification and Validation (V&V) processes. READ MORE
-
8. Does it pay to be transparent? - An empirical study on the relationship between yield and transparency for EU corporate green bonds
University essay from Göteborgs universitet/Graduate SchoolAbstract : This thesis uses OLS methodology to investigate the relationship between yields and transparency on green bonds. Transparency is divided into three categories: Self-labeled green bonds following the voluntary GBP framework, CBI aligned green bonds following CBI taxonomy with external verification and CBI certified green bonds following the CBI framework with mandatory external verification by the independent body Climate Bonds Standards Board. READ MORE
-
9. Optimizing Cyber Security Gap Analysis for Legacy Railway Control Systems : A Proposed New Gap Analysis Process using CIS Benchmarks™
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The global concern over cyber security threats to railway control systems is growing due to the factual and potential threats that could lead to severe consequences, including disruption, derailment, and collision. Legacy railway control systems, which were not originally designed with cyber security in mind, are particularly vulnerable to common cyber attacks. READ MORE
-
10. Detection and Analysis of Anomalies in Tactical Sensor Systems through Structured Hypothesis Testing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The project explores the domain of tactical sensor systems, focusing on SAAB Gripen’s sensor technologies such as radar, RWR (Radar Warning Receiver), and IRST (InfraRed Search and Track). The study employs structured hypothesis testing and model based diagnostics to examine the effectiveness of identifying and isolating deviations within these systems. READ MORE