SlideShare a Scribd company logo
Ph.D.	Dissertation	
Defense	
A	System-Theoretic	Safety	Engineering	
Approach	for	Software-Intensive	Systems
Asim	Abdulkhaleq
Stuttgart,	February	6th 2017
University	of	Stuttgart	
@AbdulkhaleqAsim
06-02-2017
Ph.D.	Defense	Committee:
Prof.	Dr.	Stefan	Wagner	
Prof.	Dr.	Nancy	Leveson
Prof.	Dr.	Dr.	h.	c.	Frank	Leymann
Prof.	Dr.	Ulrich	Hertrampf
Prof.	Dr.	Ralf	Küsters
www.XSTAMPP.de 1/30
Software	Safety	
Software	
Safety?
v Today’s	safety-critical	systems	are	increasingly	reliant	on	software	
v E.g.	Autonomous	vehicles	will	replace	the	driver	tasks	by	software	
functions	to	make	traffic	more	comfortable.		
Software
Control	Actions? Feedback?
>	100	million	
lines	of	code	
>	70	Electronic	
Control	Units	
(ECUS)
>	50	software	
functions
Autonomous	vehicle	
Motivation
2/30
Agenda
v Motivation
v Introduction	
Ø Problem	Statement	
Ø Research	Objectives	
Ø Contributions	
v Background		
Ø Safety	Analysis	Techniques	
Ø Software	Verification
v Proposed	Approach	
v Illustrative	Example:	Adaptive	Cruise	Control	System	with	Stop-and-Go	function
v Conclusion	&	Future	Work
Agenda	
3/30
System	
4/30
Software	by	Itself	is	Not	Hazardous	
Software
Control	Actions? Feedback?
Not	all	software	failures	
can	contribute	(lead)	to	
an	accident
We	can’t	test	all	
the	paths	through	
the	software	
The primary safety problem in software-intensive systems is not software “failure”
but the lack of appropriate constraints on software behavior [Prof. Leveson].
It	can	lead	to	
inadequate	control	
in	absence	of	
software	failure
Even	correctly	
implemented	software	
is	still	unsafe
Has	no	random	
failures
Safety	is	a	
system	
property	
Software safety is defined as a systematic approach to identify, analyze,
track, and control software hazards and hazardous functions (data and
commands) to ensure safe operation within a system [NASA 2004].
Software	Safety
System	
Software
Control	Actions? Feedback?
Software	safety	must	be	considered	in	the	context	of	the	system	safety	
Problem	Statement	
Verify	software	against	
its	safety	requirements	
Software	Verification	Approaches:
Model	checkers,
Testing	approaches		
Software	Verification	
Identify	appropriate	
software	safety	
requirements	
Safety	Analysis	Techniques:
System-Theoretic	Process	Analysis	(STPA)
Safety	Analysis	
However,	the	current	software	verification	methods	do	not	explicitly	integrate	the	
information	from	the	safety	analysis.		
Problem	
Statement
5/30
Research Objectives
📌 To develop a safety engineering approach based on STPA which offers
seamless safety analysis and software verification activities to help
software and safety engineers in:
Ø deriving the appropriate software safety requirements
Ø formally verifying them, and
Ø generating safety-based test cases to recognize the associated software risks.
📌 To develop an open-source tool to support the proposed approach
Research	
Objectives	
6/30
Developing	a	safety	
engineering	
approach	based	on	
STPA
Providing	formal	
definitions	and	
algorithms
Developing	an	
open-source	tool	
called	XSTAMPP	
Evaluating	the	proposed	
approach:
•Developing	a	safe	
software	simulator	of	ACC.
•Evaluating	the	BMW	
Active	Cruise	Control	
system.
•Evaluating	the	Continental	
autonomous	vehicle.	
Contributions	
1 2 3 4
Contributions
7/30
Why	STPA	(System-Theoretic	Process	Analysis)?
v Limitations:
❌ They assume that accidents are caused by component failures (Reliability Theory).
❌ They are not adequate to address new accidents caused by component
interactions, software and human errors [Leveson 2011].
❌ Some of them do not provide any kind of system model.
1940
1950 1960 1970 1980 1990
FMEA FTA
HAZOP
ETA
[Leveson 2016]	
v There	are	over	100	different	hazard	analysis	approaches.	
Traditional	
Techniques	
8/30
STPA	Safety	Analysis	Approach
v STPA	(System-Theoretic	Process	Analysis)
Ø Developed	by	Prof.	Leveson at		MIT,	USA,	2004
Ø Built	on	STAMP (System-Theoretic	Accident	Model	and	Processes)		model		based	on	system	
and	control	theory	rather	than	reliability.
Ø Treats	safety	as	dynamic	control	problem	rather	than	component	failure	problem	
Human/Automated	
Controller
Actuators Sensors
Controlled	Process
Control	Actions
Measured
Variables
Process	OutputsProcess	Inputs
Disturbances
Feedback
Variables
Controlled
Variables
A	generic	control	loop	(Leveson 2011)		
Monitored
Variables
Process	
Model
Automated	Controller
Control	
Algorithm
Feedback	
Variables	Starting	
Point	
STPA/STAMP
9/30
STPA	Approach	Process	
Safety Analysis
Report
Causal	Scenarios	
System specification
and design models
Input
Start
Develop Control
Structure
Diagram
Hierarchical Control
Structure Diagram
STPA Step 1:
Identify unsafe
control actions
STPA Step 2:
Identify how each
unsafe control
action could occur
Hierarchical Control Structure
with process model
System-Level Accidents,
related hazards, design
and safety constraints
Unsafe Control
Actions
Corresponding Safety
Constraints
Fundamentals
New/Refined Safety Constraints
ResultsSTPA Process
(Causal	Factors)
STPA
Define Analysis
Scope
STPA	Process
10/30
STPA	in	Software	Verification
How	to	verify	software	against	STPA	results?	
Software	
Verification	
(formal	verification	&	testing)STPA	Results
Software
Control	Actions?
Feedback?
STPA	has	not	been	
placed	in	software	
engineering	process	
Safety	constraints	
are	written	in	
natural	language	
satisfied	
not	satisfied	
STPA	Results	
Safety	constraints/
unsafe	scenarios
It	is	difficult	to	transform	
safety	constraints	manually	
into	formal	specification	
It	requires	a	model	to	
visualize	information	
derived	during	an	STPA	
safety	analysis	
Software	
Verification
11/30
Proposed	Approach	
12/30
build
A	System-Theoretic	Safety	Engineering	Approach
The	proposed	approach	can	be	applied	during	the	development	of	a	
new	safe	software	or	on	an	existing	software	in	safety-critical	system	
Apply to software
at the system level
Safety Control
Structure Diagram
STPA Safety Analysis
Unsafe Software
Scenarios
Software Safety
Requirements
System Requirement
Specifications
System Design
Models
Software Implementation
(code)
Build Safe Software
Behavioral Model
Formal Verification
(model checker)
Testing Approach
State flow model
(Simulink)
Safety-based Test
Case Generation
Generate and
Execute Test-scripts
generate
generate test suites
formalize
generate
TraceabilityExecute
*Extract the verification
model directly from the
software code
STPA results
Software Safety Verification
1
23
4
Safety Verification
Report
Formal
Specifications
Abdulkhaleq, A., Wagner, S., Leveson, N. (2015) A Comprehensive Safety
Engineering Approach for Software-Intensive Systems Based on STPA, Procedia
Engineering, Volume 128, 2015, Pages 2-11, ISSN 1877-7058.
Proposed	
Approach	
13/30
u System-Level Hazards:
H-1: ACC software does not maintain safe
distance from front vehicle [AC-1].
u System-Level Accidents:
AC-1: ACC vehicle collides with target
vehicle.
ACC	Software	Simulator	
We	develop	a	software	simulator	of	ACC	
How to derive the safety requirements of ACC
software controller at the system level and
generate the safety-based test cases?
Adaptive Cruise Control System (ACC): is a well-known automotive system which has
strong safety requirements. ACC adapts the vehicle’s speed to traffic environment based
on a long range forward-radar sensor which is attached to the front of a vehicle.
ACC	Vehicle	 Target	Vehicle	
14/30
Illustrative	
Example
Safety	Control	Structure	Diagram
High-level	control	structure	of	a	particular	system	
What	are	the	potential	unsafe	control	actions?
Operator	
Actuators
Speed	Sensor
Controlled	Process
Accelerate
Decelerate
FullyStop
currentspeed
Process	OutputsProcess	Inputs
Disturbances
frontdistance
Motor	forces
Ultrasonic
Sensor
speed
Motor	1 Motor	2
Sensor
Controller	
Actuator
Controlled	Process
Legends:
ACC	Stop-and-Go	Function	
Software	Controller	
desiredspeed
safedistance
On/Off
Control	
Structure	
Diagram	
15/30
Unsafe	Control	Actions
Providing or not	Providing a	control action causes a	hazard
Control	
Actions
Not Providing	causes	
hazards
Providing	causes hazards Wrong	timing or	order	
causes	hazards
Stopped	too	
soon or	applied	
too	long
Accelerate The ACC	software	does	
not	accelerate	the	
speed	when	the	robot	
vehicle	ahead	is	so	far	in	
the	lane.
[Not	hazardous]
UCA1.1: The ACC software
accelerates the speed of the
robotic vehicle when the
robotic vehicle ahead is too
close [H-1] [H-2]
UCA1.2. The	ACC	
software	accelerates	
the	speed	before	the	
robot	vehicle	ahead	
starts	to	move	again	
[H-1]	[H-2].
N/A
Corresponding	safety	constraints:	
SC1.1:	The	ACC	software	must	not	provide	the	acceleration	signal	when	the	
robotic	vehicle	ahead	is	too	close.
Translate	each	hazardous	item
ACC	Stop-and-Go	Function	
Software	Controller	
Accelerate
Decelerate
FullyStop
Motor	1 Motor	2
Actuators
Unsafe	Control	
Actions	Table
16/30
Process	Model	&	Variables
A model required to determine the environmental & system variables that
affect the safety of the control actions.
Operator	
Actuators
Speed	sensor
Accelerate
Decelerate
FullyStop
currentspeed
frontdistance
desiredspeed
Ultrasonic	
sensor
speed
Motor	1 Motor	2
Controlled	Process
Process	OutputsProcess	Inputs
Motor	forces
ACC	Stop-and-Go	Function	Software	Controller	
safedistanceOn/Off
Disturbances
currentspeed
=	0
>	minSpeed
==	desiredspeed
>	desiredspeed
<	desiredspeed
Process	Model
ACCMode
Standby
Resume
Cruise
Follow
Stop
timeGap
=	0
<=	(deltaX	+safetyTimeGap)
>	(deltaX	+	safetyTimeGap)
>	safetyTimeGap
<	safetyTimeGap
frontdistance
<=	0
>	0
Power	
ACCOff
ACCOn
17/30
Process	Model
UCA 1.1: The ACC software accelerates the speed of the robotic
vehicle when the robotic vehicle ahead is too close [H-1] [H-2]
Generating	the	Unsafe	Control	Actions	(UCA)
Extended Approach to STPA: Identify unsafe control actions in the STPA Step 1
based on the combination of process model variables (Dr. John Thomas, MIT).
Control	Actions Process	Model	Variables	 Hazardous?
(any time,	too	
early,	too	late)Accelerate currentspeed timeGap ACCMode
>mindspeed <△ TimeGap	+		safeTimeGap follow No
<=desiredspeed TimeGap=0	 follow Yes	(H1, H2)
Refined UCA 1.1 : The ACC software controller provided an acceleration signal when
the current speed is less or equal to the desired speed, time gap is equal to 0 and the
ACC system in follow mode.
Refined Safety Constraint RSC1.1 : The ACC software controller must not provide an
acceleration signal when the current speed is less or equal to the desired speed, time
gap is equal to 0 and the ACC system in follow mode.
Automatically	generate	corresponding	safety	constraints	
Automatically	generate	unsafe	control	actions
Context	Table
18/30
Causal	Factors	&	Scenarios	
How each unsafe control action could occurs in the system
UCA 1.1: The ACC software accelerates the speed of the robotic
vehicle when the robotic vehicle ahead is too close [H-1] [H-2]
Actuators
Speed	sensor
Accelerate
Decelerate
FullyStop
currentspeed
frontdistance
desiredspeed
Ultrasonic	
sensor
speed
Motor	1 Motor	2
Controlled	Process
Process	OutputsProcess	Inputs
Motor	forces
ACC	Stop-and-Go	Function	Software	Controller	
safedistanceOn/Off
Disturbances
currentspeed
=	0
>	minSpeed
==	desiredspeed
>	desiredspeed
<	desiredspeed
Process	Model
ACCMode
Standby
Resume
Cruise
Follow
Stop
timeGap
=	0
<=	(deltaX	+safetyTimeGap)
>	(deltaX	+	safetyTimeGap)
>	safetyTimeGap
<	safetyTimeGap
frontdistance
<=	0
>	0
Power	
ACCOff
ACCOn
1.	Unsafe	Inputs	
from	Higher	Levels
2.	Unsafe	Algorithm	
3.	Incorrect	Process	
Implementation		
4.	Incorrect	-
Process	Models	
5.	Feedback	
Wrong	or	Missing	
STPA	Step	2
19/30
Fundamentals	
Analysis
Accident:	AC-1 :	ACC	vehicle	collides	with	front	vehicle	while	ACC	status	is	active.
Hazards: H-1:	ACC	software	does	not	maintain	safe	distance	from	front	vehicle.
H-2:	An	unintended	acceleration	when	the	vehicle	in	front	is	too	close.
STPA	Step	1 Unsafe Control	Action	UCA	1.1:	The	ACC	software	accelerates	the	speed	of	the	
robotic	vehicle	when	the	robotic vehicle	ahead	is	too	close [H-1,	H-2]
Refined Unsafe Control Action RUCA 1.1: The ACC software provided an
acceleration signal when the current speed is less or equal to the desired speed,
time gap is equal to 0 and the ACC system in follow mode.
STPA Step	2
(wrong feedback	
/input)
Causal Scenarios	 Safety	Constraints
S.1. The speed sensor provides a false
value to ACC software while the
vehicle ahead is too close.
SC1.1. The	ACC	software shall	be	able	to	
recognize	the	false	values	which	are	
received	from	the	speed	sensor.	
S.2. The radar sensor provides an
incorrect (out of range) front distance
value to the ACC software that allows
the vehicle to get too close to the
vehicle ahead.
SC1.2. The	ACC	software shall	be	able	to	
recognize	the	out	of	range	values	of	the	
front	distance.
Causal	Factors	&	Scenarios	Table	
How each unsafe control action could occurs in the system?
Causal	Factors	
Table
20/30
Formalisation of	STPA	Results	
21/30
Formalisation of	STPA	Results
Linear Temporal Logic (LTL) is a popular formalism for the
specification and verification of concurrent and reactive systems.
Ø Rule 1: When CS occur in the execution path, the software must not (!) provide CA.
Then, LTL formula can be expressed as: LTL = G ( CS → ! CA).
Providing or not providing a control action (CA) is based on the occurrence of the set of
values of process model variables and higher inputs (CS).
Abdulkhaleq,	A.,	Wagner,	S.	(2015)	Integrated	Safety	Analysis	Using	Systems-Theoretic	Process	Analysis	and	Software	Model	Checking.	In	
Computer	Safety,	Reliability,	and	Security	(Safecomp conference),	Lecture	Notes	in	Computer	Science,	2015	
E.g. The ACC software must not provide an acceleration signal when
the current speed is less or equal to the desired speed, time gap is
equal to 0 and the ACC system in follow mode.
LTL=	G	(((currentspeed <=	desiredspeed)	&	(timeGap=0)	&	(ACCMode=follow))	→	
!	(CA=Accelerate))
Informal		
Formal
LTL	Formulae	
22/30
Generating	Safety-based	Test	
Cases	from	STPA	Results		
23/30
build
Generating	Safety-based	Test	Cases	
Apply to software
at the system level
Safety Control
Structure Diagram
STPA Safety Analysis
Unsafe Software
Scenarios
Software Safety
Requirements
System Requirement
Specifications
System Design
Models
Software Implementation
(code)
Build Safe Software
Behavioral Model
Formal Verification
(model checker)
Testing Approach
State flow model
(Simulink)
Safety-based Test
Case Generation
Generate and
Execute Test-scripts
generate
generate test suites
formalize
generate
TraceabilityExecute
*Extract the verification
model directly from the
software code
STPA results
Software Safety Verification
1
23
4
Safety Verification
Report
Formal
Specifications
Abdulkhaleq, A., Wagner, S., Leveson, N. (2015) A Comprehensive Safety
Engineering Approach for Software-Intensive Systems Based on STPA, Procedia
Engineering, Volume 128, 2015, Pages 2-11, ISSN 1877-7058.
Proposed	
Approach
24/30
Safety-based	Test	Case	Generation	Algorithm	
We develop an algorithm on how to generate test cases from the STPA results:
Algorithm:
Abdulkhaleq, A., Wagner, S. (2016) A Systematic and Semi-Automatic Safety-based Test Case Generation Approach Based
on Systems-Theoretic Process Analysis. Submitted to ACM Transactions on Software Engineering and Methodology Journal.
Safe Behavioral
Model
Verify
?
Safety-based Test
Cases
traverse
not	satisfied
satisfied	
modify
export
LTL	formulae	 STPA
Results
Traceability
matrix	
transform
check
SMV Model
Safe Test Model
model
Generating	Safety-based	Test	Cases
1 Modelling	STPA	Results
2 Transforming	into	a	Formal	Model	
3 Checking	Correctness	with	Model	Checker			
4 Generating	Runnable	Safe	Test	Model
5
Test	case	sheet
transform
Safety-based	
Test	Cases
25/30
SC1.2: The ACC software must provide an acceleration signal when the
current speed is less than the desired speed, front distance is greater
than safe distance and the ACC system in resume mode.
Safety-based	Test	Cases
Apply	search-based	test	case	generation	algorithm	to	generate	safety-
based	test	cases	from	the	safe	test	model
Test	Suite	ID 2
Test	Case	ID 2
Related	STPA	SCs SC1.1,	SC1.2
Preconditions desiredspeed=45.0
frontdistance=120.32
currentspeed=44.0
timeGap=1.65
ACCMode=Resume
Control	Action Accelerate
Post	conditions
(Expected	Results)	
currentspeed=45.0
ACCMode=Cruise
Safety-based	
Test	Cases
26/30
SC1.2: The ACC software must provide an acceleration signal when the
current speed is less than the desired speed, front distance is greater
than safe distance and the ACC system in resume mode.
Safety-based	Test	Cases
Apply	search-based	test	case	generation	algorithm	to	generate	safety-
based	test	cases	from	the	safe	test	model
Safety-based	
Test	Cases
26/30
Conclusion	&	Future	work
27/30
Conclusion
A	safety	engineering	
approach	based	on	STPA	
for	software	systems
STPA	artefacts	fit	well	to	
the	software	verification	
activities
A	concept	on	how	to	place	
STPA	in	the	software	
development	process	
Transforming		the	informal	
safety	constraints	into	
formal	specifications	in	LTL
Deriving	safety-based	test	
cases	from	STPA	results
Evaluating	the	proposed	
approach	within	three	
case	studies
Developing	an	open	source	
tool	called	XSTAMPP
Conclusion
28/30
e-mail
phone	 +49	(0)	711	685-
fax	 +49	(0)	711	685-
Universität	Stuttgart
Thank	you!
Asim	Abdulkhaleq,	M.Sc.
88	458
88	389
Institute	of Software	Technology
Asim.Abdulkhaleq@informatik.uni-stuttgart.de
www.xstampp.de
Acknowledgments	
Prof.	Dr.	Stefan	Wagner,
Prof.	Dr.	Nancy	Leveson,
Prof.	Dr.	Dr.	h.	c.	Frank	Leymann,
Prof.	Dr.	Ulrich	Hertrampf,
Prof.	Dr.	Ralf	Küsters,	
my	colleagues,	friends,	and	family
30/30

More Related Content

What's hot

Testing Autonomous Cars for Feature Interaction Failures using Many-Objective...
Testing Autonomous Cars for Feature Interaction Failures using Many-Objective...Testing Autonomous Cars for Feature Interaction Failures using Many-Objective...
Testing Autonomous Cars for Feature Interaction Failures using Many-Objective...
Lionel Briand
 
Software reliability
Software reliabilitySoftware reliability
Software reliability
Baptiste Wicht
 
Unit v
Unit vUnit v
Unit v
Suvithak
 
Analysis of the Behavior of Event Processing Applications
Analysis of the Behavior of Event Processing ApplicationsAnalysis of the Behavior of Event Processing Applications
Analysis of the Behavior of Event Processing Applications
Ella Rabinovich
 
AI in SE: A 25-year Journey
AI in SE: A 25-year JourneyAI in SE: A 25-year Journey
AI in SE: A 25-year Journey
Lionel Briand
 
Starting Test Automation In Your Project - Webinar by 99X Technology
Starting Test Automation In Your Project - Webinar by 99X TechnologyStarting Test Automation In Your Project - Webinar by 99X Technology
Starting Test Automation In Your Project - Webinar by 99X Technology
99X Technology
 
Evaluating SRGMs for Automotive Software Project
Evaluating SRGMs for Automotive Software ProjectEvaluating SRGMs for Automotive Software Project
Evaluating SRGMs for Automotive Software Project
RAKESH RANA
 
Beyond Static Analysis: Integrating .NET Static Analysis with Unit Testing a...
Beyond Static Analysis: Integrating .NET  Static Analysis with Unit Testing a...Beyond Static Analysis: Integrating .NET  Static Analysis with Unit Testing a...
Beyond Static Analysis: Integrating .NET Static Analysis with Unit Testing a...
Erika Barron
 
Machine Learning & Artificial Intelligence - Machine Controlled Data Dispensa...
Machine Learning & Artificial Intelligence - Machine Controlled Data Dispensa...Machine Learning & Artificial Intelligence - Machine Controlled Data Dispensa...
Machine Learning & Artificial Intelligence - Machine Controlled Data Dispensa...
STePINForum
 
Errors and exception
Errors and exceptionErrors and exception
Errors and exception
Rishav Upreti
 
Testival meetup 60_leveraging_the_power_of_your_testing_with_xray_20210112_v2
Testival meetup 60_leveraging_the_power_of_your_testing_with_xray_20210112_v2Testival meetup 60_leveraging_the_power_of_your_testing_with_xray_20210112_v2
Testival meetup 60_leveraging_the_power_of_your_testing_with_xray_20210112_v2
Sergio Freire
 
Requirements Based Testing
Requirements Based TestingRequirements Based Testing
Requirements Based Testing
SSA KPI
 
Enabling Automated Software Testing with Artificial Intelligence
Enabling Automated Software Testing with Artificial IntelligenceEnabling Automated Software Testing with Artificial Intelligence
Enabling Automated Software Testing with Artificial Intelligence
Lionel Briand
 
What is automation testing | David Tzemach
What is automation testing | David TzemachWhat is automation testing | David Tzemach
What is automation testing | David Tzemach
David Tzemach
 
Formal Method for Avionics Software Verification
 Formal Method for Avionics Software Verification Formal Method for Avionics Software Verification
Formal Method for Avionics Software Verification
AdaCore
 
System Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed AutomataSystem Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed Automata
Lionel Briand
 
Analyzing Natural-Language Requirements: The Not-too-sexy and Yet Curiously D...
Analyzing Natural-Language Requirements: The Not-too-sexy and Yet Curiously D...Analyzing Natural-Language Requirements: The Not-too-sexy and Yet Curiously D...
Analyzing Natural-Language Requirements: The Not-too-sexy and Yet Curiously D...
Lionel Briand
 
Odin2018_Minh_ML_Risk_Prediction
Odin2018_Minh_ML_Risk_PredictionOdin2018_Minh_ML_Risk_Prediction
Odin2018_Minh_ML_Risk_Prediction
Minh Nguyen
 
Top 5 pitfalls of software test automatiion
Top 5 pitfalls of software test automatiionTop 5 pitfalls of software test automatiion
Top 5 pitfalls of software test automatiion
ekatechserv
 
What activates a bug? A refinement of the Laprie terminology model.
What activates a bug? A refinement of the Laprie terminology model.What activates a bug? A refinement of the Laprie terminology model.
What activates a bug? A refinement of the Laprie terminology model.
Peter Tröger
 

What's hot (20)

Testing Autonomous Cars for Feature Interaction Failures using Many-Objective...
Testing Autonomous Cars for Feature Interaction Failures using Many-Objective...Testing Autonomous Cars for Feature Interaction Failures using Many-Objective...
Testing Autonomous Cars for Feature Interaction Failures using Many-Objective...
 
Software reliability
Software reliabilitySoftware reliability
Software reliability
 
Unit v
Unit vUnit v
Unit v
 
Analysis of the Behavior of Event Processing Applications
Analysis of the Behavior of Event Processing ApplicationsAnalysis of the Behavior of Event Processing Applications
Analysis of the Behavior of Event Processing Applications
 
AI in SE: A 25-year Journey
AI in SE: A 25-year JourneyAI in SE: A 25-year Journey
AI in SE: A 25-year Journey
 
Starting Test Automation In Your Project - Webinar by 99X Technology
Starting Test Automation In Your Project - Webinar by 99X TechnologyStarting Test Automation In Your Project - Webinar by 99X Technology
Starting Test Automation In Your Project - Webinar by 99X Technology
 
Evaluating SRGMs for Automotive Software Project
Evaluating SRGMs for Automotive Software ProjectEvaluating SRGMs for Automotive Software Project
Evaluating SRGMs for Automotive Software Project
 
Beyond Static Analysis: Integrating .NET Static Analysis with Unit Testing a...
Beyond Static Analysis: Integrating .NET  Static Analysis with Unit Testing a...Beyond Static Analysis: Integrating .NET  Static Analysis with Unit Testing a...
Beyond Static Analysis: Integrating .NET Static Analysis with Unit Testing a...
 
Machine Learning & Artificial Intelligence - Machine Controlled Data Dispensa...
Machine Learning & Artificial Intelligence - Machine Controlled Data Dispensa...Machine Learning & Artificial Intelligence - Machine Controlled Data Dispensa...
Machine Learning & Artificial Intelligence - Machine Controlled Data Dispensa...
 
Errors and exception
Errors and exceptionErrors and exception
Errors and exception
 
Testival meetup 60_leveraging_the_power_of_your_testing_with_xray_20210112_v2
Testival meetup 60_leveraging_the_power_of_your_testing_with_xray_20210112_v2Testival meetup 60_leveraging_the_power_of_your_testing_with_xray_20210112_v2
Testival meetup 60_leveraging_the_power_of_your_testing_with_xray_20210112_v2
 
Requirements Based Testing
Requirements Based TestingRequirements Based Testing
Requirements Based Testing
 
Enabling Automated Software Testing with Artificial Intelligence
Enabling Automated Software Testing with Artificial IntelligenceEnabling Automated Software Testing with Artificial Intelligence
Enabling Automated Software Testing with Artificial Intelligence
 
What is automation testing | David Tzemach
What is automation testing | David TzemachWhat is automation testing | David Tzemach
What is automation testing | David Tzemach
 
Formal Method for Avionics Software Verification
 Formal Method for Avionics Software Verification Formal Method for Avionics Software Verification
Formal Method for Avionics Software Verification
 
System Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed AutomataSystem Testing of Timing Requirements based on Use Cases and Timed Automata
System Testing of Timing Requirements based on Use Cases and Timed Automata
 
Analyzing Natural-Language Requirements: The Not-too-sexy and Yet Curiously D...
Analyzing Natural-Language Requirements: The Not-too-sexy and Yet Curiously D...Analyzing Natural-Language Requirements: The Not-too-sexy and Yet Curiously D...
Analyzing Natural-Language Requirements: The Not-too-sexy and Yet Curiously D...
 
Odin2018_Minh_ML_Risk_Prediction
Odin2018_Minh_ML_Risk_PredictionOdin2018_Minh_ML_Risk_Prediction
Odin2018_Minh_ML_Risk_Prediction
 
Top 5 pitfalls of software test automatiion
Top 5 pitfalls of software test automatiionTop 5 pitfalls of software test automatiion
Top 5 pitfalls of software test automatiion
 
What activates a bug? A refinement of the Laprie terminology model.
What activates a bug? A refinement of the Laprie terminology model.What activates a bug? A refinement of the Laprie terminology model.
What activates a bug? A refinement of the Laprie terminology model.
 

Viewers also liked

Tutorial1: How to install and configure XSTAMPP
Tutorial1: How to install and configure XSTAMPPTutorial1: How to install and configure XSTAMPP
Tutorial1: How to install and configure XSTAMPP
Asim Abdulkhaleq, Dr.rer.nat
 
Tutorial 4 how to edit the unsafe control actions of stpa project in xstampp
Tutorial 4 how to edit the unsafe control actions of stpa project in xstamppTutorial 4 how to edit the unsafe control actions of stpa project in xstampp
Tutorial 4 how to edit the unsafe control actions of stpa project in xstampp
Asim Abdulkhaleq, Dr.rer.nat
 
Tutorial 2 creating stpa safety analysis project in xstampp
Tutorial 2  creating stpa safety analysis project in xstamppTutorial 2  creating stpa safety analysis project in xstampp
Tutorial 2 creating stpa safety analysis project in xstampp
Asim Abdulkhaleq, Dr.rer.nat
 
Tutorial 3 how to draw control structure diagram of the STPA safety analysis ...
Tutorial 3 how to draw control structure diagram of the STPA safety analysis ...Tutorial 3 how to draw control structure diagram of the STPA safety analysis ...
Tutorial 3 how to draw control structure diagram of the STPA safety analysis ...
Asim Abdulkhaleq, Dr.rer.nat
 
Dissertation oral defense presentation
Dissertation   oral defense presentationDissertation   oral defense presentation
Dissertation oral defense presentation
Dr. Naomi Mangatu
 
Thesis Powerpoint
Thesis PowerpointThesis Powerpoint
Thesis Powerpoint
neha47
 
Defend your dissertation like a pro
Defend your dissertation like a pro Defend your dissertation like a pro
Defend your dissertation like a pro
Transweb Global Inc
 
Deploma
DeplomaDeploma
Kato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule
 
Diss defense
Diss defenseDiss defense
Diss defense
therob762
 
A PhD: A Career in Nursing Research
A PhD: A Career in Nursing ResearchA PhD: A Career in Nursing Research
A PhD: A Career in Nursing Research
Kelly Brittain
 
Messina Proposal and Oral Defense
Messina Proposal and Oral Defense Messina Proposal and Oral Defense
Messina Proposal and Oral Defense
alexmessina
 
WIUGC 2010 - Pegmatite and Leucogranite-Hosted U-Th Mineralization In norther...
WIUGC 2010 - Pegmatite and Leucogranite-Hosted U-Th Mineralization In norther...WIUGC 2010 - Pegmatite and Leucogranite-Hosted U-Th Mineralization In norther...
WIUGC 2010 - Pegmatite and Leucogranite-Hosted U-Th Mineralization In norther...
Christine McKechnie
 
Thesis presentation_ Final Defence
Thesis presentation_ Final DefenceThesis presentation_ Final Defence
Thesis presentation_ Final Defence
Sharmin Ahmed
 
Thesis defence
Thesis defence Thesis defence
Thesis defence
Mr.akkaluk Moppijit
 
Different Tools to Detect and Monitor Oil Spills Aerial Observation Tech.
Different Tools to Detect and Monitor Oil Spills Aerial Observation Tech.Different Tools to Detect and Monitor Oil Spills Aerial Observation Tech.
Different Tools to Detect and Monitor Oil Spills Aerial Observation Tech.
A.Tuğsan İşiaçık Çolak
 
Konsep Bisnis
Konsep BisnisKonsep Bisnis
Konsep Bisnis
Pynatih3
 
konstruksi jaring jaringan tegangan menengah PLN Distribusi Jawa Timur
konstruksi jaring jaringan tegangan menengah PLN Distribusi Jawa Timurkonstruksi jaring jaringan tegangan menengah PLN Distribusi Jawa Timur
konstruksi jaring jaringan tegangan menengah PLN Distribusi Jawa Timur
DANA KHOIRIL HUDA
 
Compound Structure Detection
Compound Structure DetectionCompound Structure Detection
Compound Structure Detection
Huseyin Gokhan Akcay
 
Theory audience pro-forma (1)
Theory  audience pro-forma (1)Theory  audience pro-forma (1)
Theory audience pro-forma (1)
Tahmid Ahmed
 

Viewers also liked (20)

Tutorial1: How to install and configure XSTAMPP
Tutorial1: How to install and configure XSTAMPPTutorial1: How to install and configure XSTAMPP
Tutorial1: How to install and configure XSTAMPP
 
Tutorial 4 how to edit the unsafe control actions of stpa project in xstampp
Tutorial 4 how to edit the unsafe control actions of stpa project in xstamppTutorial 4 how to edit the unsafe control actions of stpa project in xstampp
Tutorial 4 how to edit the unsafe control actions of stpa project in xstampp
 
Tutorial 2 creating stpa safety analysis project in xstampp
Tutorial 2  creating stpa safety analysis project in xstamppTutorial 2  creating stpa safety analysis project in xstampp
Tutorial 2 creating stpa safety analysis project in xstampp
 
Tutorial 3 how to draw control structure diagram of the STPA safety analysis ...
Tutorial 3 how to draw control structure diagram of the STPA safety analysis ...Tutorial 3 how to draw control structure diagram of the STPA safety analysis ...
Tutorial 3 how to draw control structure diagram of the STPA safety analysis ...
 
Dissertation oral defense presentation
Dissertation   oral defense presentationDissertation   oral defense presentation
Dissertation oral defense presentation
 
Thesis Powerpoint
Thesis PowerpointThesis Powerpoint
Thesis Powerpoint
 
Defend your dissertation like a pro
Defend your dissertation like a pro Defend your dissertation like a pro
Defend your dissertation like a pro
 
Deploma
DeplomaDeploma
Deploma
 
Kato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy Engineering
 
Diss defense
Diss defenseDiss defense
Diss defense
 
A PhD: A Career in Nursing Research
A PhD: A Career in Nursing ResearchA PhD: A Career in Nursing Research
A PhD: A Career in Nursing Research
 
Messina Proposal and Oral Defense
Messina Proposal and Oral Defense Messina Proposal and Oral Defense
Messina Proposal and Oral Defense
 
WIUGC 2010 - Pegmatite and Leucogranite-Hosted U-Th Mineralization In norther...
WIUGC 2010 - Pegmatite and Leucogranite-Hosted U-Th Mineralization In norther...WIUGC 2010 - Pegmatite and Leucogranite-Hosted U-Th Mineralization In norther...
WIUGC 2010 - Pegmatite and Leucogranite-Hosted U-Th Mineralization In norther...
 
Thesis presentation_ Final Defence
Thesis presentation_ Final DefenceThesis presentation_ Final Defence
Thesis presentation_ Final Defence
 
Thesis defence
Thesis defence Thesis defence
Thesis defence
 
Different Tools to Detect and Monitor Oil Spills Aerial Observation Tech.
Different Tools to Detect and Monitor Oil Spills Aerial Observation Tech.Different Tools to Detect and Monitor Oil Spills Aerial Observation Tech.
Different Tools to Detect and Monitor Oil Spills Aerial Observation Tech.
 
Konsep Bisnis
Konsep BisnisKonsep Bisnis
Konsep Bisnis
 
konstruksi jaring jaringan tegangan menengah PLN Distribusi Jawa Timur
konstruksi jaring jaringan tegangan menengah PLN Distribusi Jawa Timurkonstruksi jaring jaringan tegangan menengah PLN Distribusi Jawa Timur
konstruksi jaring jaringan tegangan menengah PLN Distribusi Jawa Timur
 
Compound Structure Detection
Compound Structure DetectionCompound Structure Detection
Compound Structure Detection
 
Theory audience pro-forma (1)
Theory  audience pro-forma (1)Theory  audience pro-forma (1)
Theory audience pro-forma (1)
 

Similar to Asim abdulkhaleq final phd dissertation defense

Automating safety engineering with model based techniques
Automating safety engineering with model based techniquesAutomating safety engineering with model based techniques
Automating safety engineering with model based techniques
Juha-Pekka Tolvanen
 
20140121 cisec-safety criticalsoftwaredevelopment
20140121 cisec-safety criticalsoftwaredevelopment20140121 cisec-safety criticalsoftwaredevelopment
20140121 cisec-safety criticalsoftwaredevelopment
CISEC
 
Risk Based Design &amp; SCE
Risk Based Design &amp; SCERisk Based Design &amp; SCE
Risk Based Design &amp; SCE
adepp
 
ADEPP Monitor & Risk Based Design
ADEPP Monitor & Risk Based DesignADEPP Monitor & Risk Based Design
ADEPP Monitor & Risk Based Design
Fabienne Salimi
 
Software safety in embedded systems &amp; software safety why, what, and how
Software safety in embedded systems &amp; software safety   why, what, and how Software safety in embedded systems &amp; software safety   why, what, and how
Software safety in embedded systems &amp; software safety why, what, and how
bdemchak
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Sigma Software
 
Case Study - AMR Test Automation
Case Study - AMR Test AutomationCase Study - AMR Test Automation
Case Study - AMR Test Automation
iFocusSystec
 
An Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security EducationAn Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security Education
Xiao Qin
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
Marco Morana
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
Dr. Anish Cheriyan (PhD)
 
Security Checkpoints in Agile SDLC
Security Checkpoints in Agile SDLCSecurity Checkpoints in Agile SDLC
Security Checkpoints in Agile SDLC
Rahul Raghavan
 
Integration into the Secure SDLC Process.ppt
Integration into the Secure SDLC Process.pptIntegration into the Secure SDLC Process.ppt
Integration into the Secure SDLC Process.ppt
Imam Halim Mursyidin
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
Raja Ram
 
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
IJERDJOURNAL
 
Audit and security application
Audit and security applicationAudit and security application
Audit and security application
Rihab Chebbah
 
A Case Study Injecting Safety-Critical Thinking Into Graduate Software Engin...
A Case Study  Injecting Safety-Critical Thinking Into Graduate Software Engin...A Case Study  Injecting Safety-Critical Thinking Into Graduate Software Engin...
A Case Study Injecting Safety-Critical Thinking Into Graduate Software Engin...
Arlene Smith
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
Ben Rothke
 
Systems architecture with the functional safety/security emphasis
Systems architecture with the functional safety/security emphasisSystems architecture with the functional safety/security emphasis
Systems architecture with the functional safety/security emphasis
Alan Tatourian
 
Information hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted ImagesInformation hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted Images
IRJET Journal
 
Hp2513711375
Hp2513711375Hp2513711375
Hp2513711375
IJERA Editor
 

Similar to Asim abdulkhaleq final phd dissertation defense (20)

Automating safety engineering with model based techniques
Automating safety engineering with model based techniquesAutomating safety engineering with model based techniques
Automating safety engineering with model based techniques
 
20140121 cisec-safety criticalsoftwaredevelopment
20140121 cisec-safety criticalsoftwaredevelopment20140121 cisec-safety criticalsoftwaredevelopment
20140121 cisec-safety criticalsoftwaredevelopment
 
Risk Based Design &amp; SCE
Risk Based Design &amp; SCERisk Based Design &amp; SCE
Risk Based Design &amp; SCE
 
ADEPP Monitor & Risk Based Design
ADEPP Monitor & Risk Based DesignADEPP Monitor & Risk Based Design
ADEPP Monitor & Risk Based Design
 
Software safety in embedded systems &amp; software safety why, what, and how
Software safety in embedded systems &amp; software safety   why, what, and how Software safety in embedded systems &amp; software safety   why, what, and how
Software safety in embedded systems &amp; software safety why, what, and how
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"
 
Case Study - AMR Test Automation
Case Study - AMR Test AutomationCase Study - AMR Test Automation
Case Study - AMR Test Automation
 
An Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security EducationAn Application-Oriented Approach for Computer Security Education
An Application-Oriented Approach for Computer Security Education
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
 
Security Checkpoints in Agile SDLC
Security Checkpoints in Agile SDLCSecurity Checkpoints in Agile SDLC
Security Checkpoints in Agile SDLC
 
Integration into the Secure SDLC Process.ppt
Integration into the Secure SDLC Process.pptIntegration into the Secure SDLC Process.ppt
Integration into the Secure SDLC Process.ppt
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
 
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...
 
Audit and security application
Audit and security applicationAudit and security application
Audit and security application
 
A Case Study Injecting Safety-Critical Thinking Into Graduate Software Engin...
A Case Study  Injecting Safety-Critical Thinking Into Graduate Software Engin...A Case Study  Injecting Safety-Critical Thinking Into Graduate Software Engin...
A Case Study Injecting Safety-Critical Thinking Into Graduate Software Engin...
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Systems architecture with the functional safety/security emphasis
Systems architecture with the functional safety/security emphasisSystems architecture with the functional safety/security emphasis
Systems architecture with the functional safety/security emphasis
 
Information hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted ImagesInformation hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted Images
 
Hp2513711375
Hp2513711375Hp2513711375
Hp2513711375
 

Recently uploaded

Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussionArtificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
kekzed
 
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussionPro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdfBRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
Robin Haunschild
 
The remarkable life of Sir Mokshagundam Visvesvaraya.pptx
The remarkable life of Sir Mokshagundam Visvesvaraya.pptxThe remarkable life of Sir Mokshagundam Visvesvaraya.pptx
The remarkable life of Sir Mokshagundam Visvesvaraya.pptx
JiteshKumarChoudhary2
 
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
OECD Directorate for Financial and Enterprise Affairs
 
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
OECD Directorate for Financial and Enterprise Affairs
 
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
gpww3sf4
 
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
OECD Directorate for Financial and Enterprise Affairs
 
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
OECD Directorate for Financial and Enterprise Affairs
 
Using-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptxUsing-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptx
kainatfatyma9
 
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussionArtificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Disaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other usesDisaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other uses
RIDHIMAGARG21
 
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
samililja
 
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
OECD Directorate for Financial and Enterprise Affairs
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
artemacademy2
 
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfWhy Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Ben Linders
 
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussionPro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
ASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdfASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdf
ToshihiroIto4
 

Recently uploaded (20)

Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussionArtificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – OECD – June 2024 OECD discussion
 
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
怎么办理(lincoln学位证书)英国林肯大学毕业证文凭学位证书原版一模一样
 
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussionPro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
 
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdfBRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
BRIC_2024_2024-06-06-11:30-haunschild_archival_version.pdf
 
The remarkable life of Sir Mokshagundam Visvesvaraya.pptx
The remarkable life of Sir Mokshagundam Visvesvaraya.pptxThe remarkable life of Sir Mokshagundam Visvesvaraya.pptx
The remarkable life of Sir Mokshagundam Visvesvaraya.pptx
 
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
The Intersection between Competition and Data Privacy – COLANGELO – June 2024...
 
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
 
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
 
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
The Intersection between Competition and Data Privacy – OECD – June 2024 OECD...
 
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
 
Using-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptxUsing-Presentation-Software-to-the-Fullf.pptx
Using-Presentation-Software-to-the-Fullf.pptx
 
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussionArtificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
Artificial Intelligence, Data and Competition – LIM – June 2024 OECD discussion
 
Disaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other usesDisaster Management project for holidays homework and other uses
Disaster Management project for holidays homework and other uses
 
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
 
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
 
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfWhy Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdf
 
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussionPro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
 
ASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdfASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdf
 

Asim abdulkhaleq final phd dissertation defense