Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 20 )

2018 ( 64 )

2017 ( 46 )

2016 ( 69 )

Custom range...

Search Results: 1 - 10 of 3159 matches for " verification and validation "
All listed articles are free for downloading (OA Articles)
Page 1 /3159
Display every page Item
Studying the Feasibility and Importance of Software Testing: An Analysis
Dr.S.S.Riaz Ahamed
International Journal of Engineering Science and Technology , 2009,
Abstract: Software testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding. Software testing is the process of testing the functionality and correctness of software by running it. Software testing is usually performed for one of two reasons: defect detection, andreliability estimation. The problem of applying software testing to defect detection is that software can only suggest the presence of flaws, not their absence (unless the testing is exhaustive). The problem of applying software testing to reliability estimation is that the input distribution used for selecting test cases may be flawed. The key to software testing is trying to find the modes of failure - something that requires exhaustively testing the code on all possible inputs. Software Testing, depending on the testing method employed, can be implemented at any time in the development process.
Verifying Monoid and Group Morphisms over Strongly Connected Algebraic Automata  [PDF]
Nazir Ahmad Zafar, Ajmal Hussain, Amir Ali
Journal of Software Engineering and Applications (JSEA) , 2010, DOI: 10.4236/jsea.2010.38093
Abstract: Automata theory has played an important role in theoretical computer science since last couple of decades. The alge-braic automaton has emerged with several modern applications, for example, optimization of programs, design of model checkers, development of theorem provers because of having certain interesting properties and structures from algebraic theory of mathematics. Design of a complex system requires functionality and also needs to model its control behavior. Z notation has proved to be an effective tool for describing state space of a system and then defining operations over it. Consequently, an integration of algebraic automata and Z will be a useful computer tool which can be used for modeling of complex systems. In this paper, we have linked algebraic automata and Z defining a relationship between fundamentals of these approaches which is refinement of our previous work. At first, we have described strongly connected algebraic automata. Then homomorphism and its variants over strongly connected automata are specified. Next, monoid endomorphisms and group automorphisms are formalized. Finally, equivalence of endomorphisms and automorphisms under certain assumptions are described. The specification is analyzed and validated using Z/Eves toolset.
State Based Static and Dynamic Formal Analysis of UML State Diagrams  [PDF]
Fahad Alhumaidan
Journal of Software Engineering and Applications (JSEA) , 2012, DOI: 10.4236/jsea.2012.57056
Abstract: Design and specification is a serious issue in software engineering because of the semantics involved in transforming the real world problems to computer software systems. Unified Modeling Language (UML) has been accepted as a de facto standard for design and specification of object oriented systems. Unfortunately, UML structures lack defining semantics of a system. Formal methods are proved powerful, particularly, at requirement specification and design level. For a moment, formal methods are not welcomed because of much use of mathematics in formal languages. Therefore, a linkage between UML and formal methods is required to overcome the above deficiencies. In this paper, a new approach is developed by integrating UML and Z specification focusing on state diagram considering both the syntax and semantics. It is believed that this new approach will be effective and useful both at academics and industrial level. The resultant formal models of the approach are analyzed and validated using Z/Eves tool.
Formal Verification and Visualization of Security Policies
Luay A. Wahsheh,Daniel Conte de Leon,Jim Alves-Foss
Journal of Computers , 2008, DOI: 10.4304/jcp.3.6.22-31
Abstract: Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes in the development, deployment, and maintenance of such systems. In this paper, we introduce an expert system that helps with the design and implementation of security policies. We show how Prolog is used to verify system correctness with respect to policies using a theorem prover. Managing and visualizing information in high assurance computer systems are challenging tasks. To simplify these tasks, we show how a graph-based visualization tool is used to validate policies and provide system security managers with a process that enables policy reviews and visualizes interactions between the system’s entities. The tool provides not only a representation of the formal model, but also its execution. The introduced executable model is a formal specification and knowledge representation method.
Model Analysis of Equivalence Classes in UML Events Relations  [PDF]
Nazir Ahmad Zafar
Journal of Software Engineering and Applications (JSEA) , 2013, DOI: 10.4236/jsea.2013.612078

Unified Modeling Language (UML) has become a de facto standard for design, specification and modeling of object oriented software systems. UML structures being graphical in nature lack defining semantics of the systems and are prone to causing errors. Formal methods are proved to be a powerful tool for requirement analysis, design and specification of software systems. Hence, linking UML with formal approaches will enhance modeling power of software systems. In this paper, an approach is developed by integrating UML and Z notation focusing on equivalence relation of the state diagrams. The Z is used because it is based on the first order predicate logic having rigorous computer tool support. The reflexivity, symmetry and transitivity properties, being important at design level, are identified and described. It is believed that this approach will be effective and useful at both academics and industrial level. The need, reasoning and benefits of the integrated approach are discussed. The resultant formal models are analyzed and validated using Z/Eves tool.

Issues Associated with SAMG in the Implement Phase and Relative Advices

杨志义, 张佳佳, 冯进军, 李春, 种毅敏
Nuclear Science and Technology (NST) , 2014, DOI: 10.12677/NST.2014.23005

福岛核事故后,核工业界及核安全监管当局对严重事故更加重视,严重事故管理指南(Severe Accident Manage Guideline, SAMG)的制定已经成为国内核安全监管要求,目前国内大部分核电厂已编制完成电厂特定的SAMG并面临实施过程。本文总结了SAMG在核电厂现场实施中可能遇到的问题,调研了国际上SAMG的实施过程和福岛事故后SAMG实施的进展,结合国内一些核电厂SAMG现场实施的情况,对SAMG实施阶段的一些问题进行了总结和讨论,并提出了相关建议,为加强国内核电厂SAMG实施的有效性提供参考。
After Fukushima Dai-ichi nuclear accident, the severe accident gains more and more attention in the nuclear industry and the regulatory body. The Severe Accident Management Guideline (SAMG) is required according to the policy of the regulatory body in China. Now many SAMGs are in the implement phase in China NPPs. In this paper, a number of the issues associated with implementing a specific SAMG were identified, and some international experience of SAMG implement was introduced. Some advices were given to improve the effectiveness of SAMG implement.

Pedestrian Flow Simulation Validation and Verification Techniques  [PDF]
Mohamed H. Dridi
Current Urban Studies (CUS) , 2015, DOI: 10.4236/cus.2015.32011
Abstract: For the verification and validation of microscopic simulation models of pedestrian flow, we have performed experiments for different kind of facilities and sites where most conflicts and congestion happens e.g. corridors, narrow passages, and crosswalks. The validity of the model should compare the experimental conditions and simulation results with video recording carried out in the same condition like in real life e.g. pedestrian flux and density distributions. The strategy in this technique is to achieve a certain amount of accuracy required in the simulation model. This method is good at detecting the critical points in the pedestrians walking areas. For the calibration of suitable models we use the results obtained from analysing the video recordings in Hajj 2009 and these results can be used to check the design sections of pedestrian facilities and exits. As practical examples, we present the simulation of pilgrim streams on the Jamarat bridge (see Figure 5). The objectives of this study are twofold: first, to show through verification and validation that simulation tools can be used to reproduce realistic scenarios, and second, gather data for accurate predictions for designers and decision makers.
Conducting Verification and Validation of Multi- Agent Systems
A. Al-Neaimi,Nedhal Al Saiyd,S. Qatawneh
International Journal of Software Engineering & Applications , 2012,
Abstract: Verification and Validation (V&V) is a series of activities ,technical and managerial ,which performed bysystem tester not the system developer in order to improve the system quality ,system reliability andassure that product satisfies the users operational needs. Verification is the assurance that the products ofa particular development phase are consistent with the requirements of that phase and preceding phase(s),while validation is the assurance that the final product meets system requirements. an outside agency canbe used to performed V&V, which is indicate by Independent V&V, or IV&V, or by a group within theorganization but not the developer, referred to as Internal V&V. Use of V&V often accompanies testing,can improve quality assurance, and can reduce risk. This paper putting guidelines for performing V&V ofMulti-Agent Systems (MAS).
Report on the 1st International Workshop on Validation, Verification and Integrity Issues of Expert and Database Systems
T. Bench-Capon
Information Research: an international electronic journal , 1999,
Abstract: In August 1998 an international workshop on validation, verification and integrity issues of expert and database systems was held in Vienna in conjunction with the Ninth Conference on Database and Expert Systems Applications (DEXA'98). This paper reports on the results of this workshop and summarises the issues identified for future research in this area. Details of the presented papers and some additional information can be found at the workshop WWW site
Verification and Validation Methodology for Safety Critical Embedded Systems
P. Swaminathan
Journal of Artificial Intelligence , 2012,
Abstract: Embedded Systems used for control of the process plants can be classified as safety critical embedded systems. To achieve the specified probability failure on demand, it is essential to customize the relevant IEEE standards. Since the requirement specifications will be well specified for process control applications, it is appropriate to follow the waterfall product development cycle. Enough thoughts are not given for Verification and Validation of embedded systems. Verification and Validation process for safety critical embedded system and the challenges for Verification and Validation team are detailed in this study.
Page 1 /3159
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.