2017 03-10 - vu amsterdam - testing safety critical systemsJaap van Ekris
Presentation about the steps required for Verifying and Validating safety critical systems, as well as the test approach used. It goes beyond the simple processes, and also talks about the required safety culture and people required. The presentation contains examples of real-life IEC 61508 SIL 4 systems used on stormsurge barriers.
2017 03-10 - vu amsterdam - testing safety critical systemsJaap van Ekris
Presentation about the steps required for Verifying and Validating safety critical systems, as well as the test approach used. It goes beyond the simple processes, and also talks about the required safety culture and people required. The presentation contains examples of real-life IEC 61508 SIL 4 systems used on stormsurge barriers.
Begins during the communication activity and continues into the modeling activity
Builds a bridge from the system requirements into software design and construction
Performance Evaluation of a Network Using Simulation Tools or Packet TracerIOSRjournaljce
Today, the importance of information and accessing information is increasing rapidly. With the advancement of technology, one of the greatest means of achieving knowledge are, computers have entered in many areas of our lives. But the most important of them are the communication fields. This study will be a practical guide for understanding how to assemble and analyze various parameters in network performance evaluation and when designing a network what is necessary to looking for to remove the consequences of degrading performance. Therefore, what can you do in a network performance evaluation using simulation tools such as Network Simulation or Packet tracer and how various parameters can be brought together successfully? CCNA, CCNP, HCNA and HCNP educational level has been used and important setting has been simulated one by one. At the result this is a good guide for a local or wide area network. Finally, the performance issues precautions described. Considering the necessary parameters, imaginary networks were designed and evaluated both in CISCO Packet Tracer and Huawei's eNSP simulation program. But it should not be left unsaid that the networks have been designed and evaluated in free virtual environments, not in a real laboratory. Therefore, it is impossible to make actual performance appraisal and output as there is no actual data available.
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...SERENEWorkshop
SERENE 2014 School on Engineering Resilient Cyber Physical Systems
Talk: Resilience in Cyber-Physical Systems: Challenges and Opportunities, by Gabor Karsai
Begins during the communication activity and continues into the modeling activity
Builds a bridge from the system requirements into software design and construction
Performance Evaluation of a Network Using Simulation Tools or Packet TracerIOSRjournaljce
Today, the importance of information and accessing information is increasing rapidly. With the advancement of technology, one of the greatest means of achieving knowledge are, computers have entered in many areas of our lives. But the most important of them are the communication fields. This study will be a practical guide for understanding how to assemble and analyze various parameters in network performance evaluation and when designing a network what is necessary to looking for to remove the consequences of degrading performance. Therefore, what can you do in a network performance evaluation using simulation tools such as Network Simulation or Packet tracer and how various parameters can be brought together successfully? CCNA, CCNP, HCNA and HCNP educational level has been used and important setting has been simulated one by one. At the result this is a good guide for a local or wide area network. Finally, the performance issues precautions described. Considering the necessary parameters, imaginary networks were designed and evaluated both in CISCO Packet Tracer and Huawei's eNSP simulation program. But it should not be left unsaid that the networks have been designed and evaluated in free virtual environments, not in a real laboratory. Therefore, it is impossible to make actual performance appraisal and output as there is no actual data available.
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...SERENEWorkshop
SERENE 2014 School on Engineering Resilient Cyber Physical Systems
Talk: Resilience in Cyber-Physical Systems: Challenges and Opportunities, by Gabor Karsai
Overview of Performance Evaluation
Intro & Objective
The Art of Performance Evaluation
Professional Organizations, Journals, and conferences.
Performance Projects
Common Mistakes and How to Avoid Them
Selection of Techniques and Metrics
object oriented analysis and design.
requirement analysis.
what is requirement?
types of requirement.
functional requirements.
nonfunctional requirements.
The one that started it all! My presentation at SWRAP 2003 on my Telnetable Commodore BBS, which is still running today (2013) and has spawned many successors.
Check out http://cbbsoutpost.servebbs.com/ for the current list!
The Dancer From The Dance: Mapping Motion With Sound Via Radio TransmissionLeif Bloomquist
We present our work on the development of a device by which a dancer may wirelessly transmit bodily motion to a MIDI-capable device or computer in order to produce or alter sound, creating music that is immediately integrated with and inseparable from the dance.
To begin we briefly consider the history of movement mapping and dance notation. Moving into more recent history, we then present the technology employed (Arduino).
An accelerometer measures the motion. The x/y/z components are scaled and inserted into a MIDI message, which is then transmitted to a receiver and can be interpreted by any MIDI device. The motions can be mapped to parameters such as filters, pitch, etc., allowing the dancer to affect any sound that can be created electronically.
Several short vignettes will be used to demonstrate the device, followed by a three-minute piece showing the techniques working together as a whole.
Modified Commodore VIC-20: Built-in uIEC with Compact Flash, JiffyDOS, 64C Keyboard, Blue LED, and Reset Button. But still runs at 1 MHz and has 3.5K RAM!
The Ultimate Commodore 64 with Stereo sound, four joystick ports, joystick/mouse switcher, four selectable Kernals, reset switch, IDE, Compact Flash, 20GB hard drive, CD-ROM, USB, Ethernet, and uses a Commodore 128 power supply. But still runs at 1 MHz and has 64K RAM!
http://www.youtube.com/watch?v=VRmkvi4hoic&list=UUENtvIcXeW0GERUrR2j8Lqw
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Software Requirements and Design Process in the Aerospace Industry
1. University of Waterloo, SYDE 161 Guest Lecture
October 5, 2011
Leif Bloomquist P.Eng (SYDE ‘97)
Senior Software Systems Engineer, Space Missions
2. Presentation Overview
Example projects: Canadarm, Canadarm 2, Phoenix Mars
Lander, neuroArm
The Software Process
Overview
Requirements
Documentation
Other important considerations
A couple of cool videos!
2
3. September 14, 2013 3
Early Steps: Canadarm
Credit: NASA
Launched in November, 1981 on STS-2
4. Power Usage
Max 1,000 watts plus 1,050
watts of heater power
Typically less than 300
watts, or 5 light bulbs.
Construction
Aluminum, stainless
steel, carbon composite.
Thermal
Thermostat controlled
electric heaters and thermal
blankets
Payload handling
266,000 kg (a fully loaded
Shuttle vehicle)
4September 14, 2013
Hubble = 11,100kg
5. September 14, 2013 5
Translational Hand Controller
(THC):
Right, up, down, forward, and
backward movements of the arm
Rotational Hand
Controller (RHC)
Controls the
pitch, roll, and yaw of
the arm
6. Canadarm2 Arrives (2001)
17.6m long
7 joints
Mass: 1,800kg
Handling Capacity: 100,000kg
2 latching end effectors (“hands”)
Force-moment sensing capability
Relocatable – can travel end-over-end
Electrically redundant
On-orbit or Ground-based control
PP: 2kW | Prms: 1360W
6September 14, 2013
Credit: NASA
Canadarm 2
8. Dextre
3.5 m (12 ft) long
Two manipulator arms, each
with 7 joints
One body roll joint
Each arm fitted with an
Orbit Replacement
Unit/Tool Change-out
Mechanism (OTCM)
Force-Moment sensing
capability
600 kg (1300 lbs) payload
handling capacity
One Latching End Effector
Four special tools, carried in
Tool Holder 8September 14, 2013Credit: NASA
9. Phoenix MET
9
• Launched in August 2007
• Lands on Mars on May 25, 2008
• Meteorological station to assess the interaction of
surface ice with the atmosphere
– Zenith-pointing LiDAR to characterize Martian climate
and atmosphere (cloud, fog and dust properties)
– Temperature and pressure sensors
Phoenix Mars Lander
10. Snow on Mars
"You cannot study a surface and an ice layer without knowing the atmosphere above it, and we have a huge volume of data
that describes weather for the entire time we conducted surface operations," Smith said. "This is one of the major
accomplishments of the mission." At the end of the surface mission, Phoenix saw, for the first time, water as snow falling to
the surface Mars and frost on the ground. Falling snow was a real surprise – Peter Smith, Phoenix PI
But the really amazing data came from the LIDAR instrument… In short, they
watched it snow. (Timmer, Ars Technica July 2009)
11. neuroArm
Image guided robot operates inside of 1.5T
MRI for Intra-operative imaging and guidance
Successful procedures performed on patients
at Calgary Foothills Hospital
Performance Goals achieved:
• 15 Hz closed loop bandwidth for immersive
control – no delay or overshoot
• 50 micron tip position control
• Haptic feedback – 2g force sensing
• 1mm tool to image registration accuracy
13. The Software Process
The aerospace industry generally follows MIL-STD-498 as a guideline for its
software process and documentation.
United States military standard whose purpose was to "establish uniform
requirements for software development and documentation." It was
released Nov. 8, 1994
Each company has its own customizations.
The process is tailored per project, with customer approval.
Superceded by IEEE 12207.0 "Standard for Information Technology –
Software Life Cycle Processes “ in 1998, but many organizations have kept
with the older format.
14. The Software Process
1. Develop an operations concept
High level, what does the system need to do and how will it work?
High-level use cases
2. Develop System requirements
What will the System be expected to do?
3. Derive and allocate subsystem requirements
Begin to establish detail, what parts will cover each function?
Requires an initial system architecture concept
15. The Software Process
4. Derive detailed requirements for each discipline
(software, mechanical, electrical)
More detailed use cases
These are actually implementable and testable
5. Design a system that meets these requirements
For software: Unified Modeling Language
Prototyping and documentation
Interfaces
6. Implement – Write your code (manufacture the part, etc…)
If the previous steps were done satisfactorily – this can be the shortest
phase.
16. The Software Process
7. Validate and Verify (“Test”)
Test to the requirements – not the design
Start at lowest level and work your way up (next slide)
Verification vs. validation
8. Release and Maintain
See upcoming section on documentation
9. Iterate as necessary
See upcoming section on development methodologies
Customer reviews and milestones at each step
18. Software Development Methodologies
Waterfall
Fully complete each stage of the process before moving on
Once each stage is complete, never go back
Suited for high-risk projects with multiple stakeholders (space stations, nuclear
reactors)
Nearly impossible in practice
Iterative
Reflects reality – iterations are always required
Process for feeding findings from later stages back into the earlier stages
(Engineering Change Notices, etc.)
Regression Tests
Agile
A huge topic, currently “in vogue” in the software industry
Takes Iterative to its extreme, each part of the system is developed rapidly
Apply to safety-critical systems with caution
19. Definitions
What are requirements?
IEEE (1) A condition or capability needed by a user to solve
a problem or achieve an objective
IEEE (2) A condition or capability that must be met or
processed by a system or system component to satisfy a
contract, standard, specification or other formally imposed
document
20. Purpose of Requirements Engineering
To achieve agreement on what is to be produced
To decrease ambiguity and increase consistency and completeness
To do this, understand the customer need
If you do not understand what the customer wants you will fail
Seek first to understand and then to be understood
To document the agreed set of requirements
It is not enough just to understand what the customer wants, it is also necessary to
record the understanding
Shared vision
To identify key issues: requirements with strong influence on
cost, schedule, functionality, risk or performance
To provide a basis for system design
To provide a reference point for system validation
What if there are problems in the customer provided system specification?
Communication
21. Benefits of Good Requirements
Agreement among engineers, customers and users on the job
to be done and the acceptance criteria of the delivered system
A sound basis for resource estimation
Improved system effectiveness factors
What if the customer does not specify these?
The achievement of goals with minimum resources (less
rework, fewer omissions and misunderstandings)
Reduced “expectation gap”
22. Problems with Bad Requirements
Creeping user requirements
Unplanned requirement changes degrades quality
Ambiguous requirements lead to ill-spent time
Increases expectation gap
Customer and engineer have different opinions
Needs of user are overlooked
Fuzzy requirements make planning difficult
The product may not be fit for use
Can (will) lead to cost and schedule overruns
23. Why is it hard to write good requirements?
Lack of knowledge that good system requirements are essential to the
development of a good system
They are difficult to write: sophisticated problem solving is required to
produce a good statement of requirements
Engineers lack training in requirements engineering
It is next to impossible to capture user needs completely
Desire to truncate the activity and “progress” to the next activity: schedule
pressure
Customer failure to cooperate in effectively verifying that the requirements
are correct
Assumptions are made which are not documented or discussed
“How” instead of “What” is written
We don’t pay attention to lessons learned
24. Requirement Attributes
Good requirements have the following attributes:
Necessary
Unambiguous
Complete
Verifiable/Testable
Consistent
Maintainable
Correct
Implementation-free
Concise
Feasible
Understandable
Traceable
Let’s try an example
25. Traceability
Traceability is key to ensure the system “hangs together”.
Upward traceability (low-level requirements to system requirements)
Answers “Why are we implementing this particular requirement? Where is it
derived from?”
Downward traceability (system requirements to lower level requirements)
Ensures that none of the system-level requirements get missed
There are tools to help you manage traceability:
IBM’s ReqPro
Artego’s Artisan Studio - Also traces to UML design (Free version Uno)
Many others
Modern complex systems can have thousands of requirements
26. Verbiage
“Shall” indicates a mandatory requirement
“Should” indicates a preferred but not mandatory alternative
“May” indicates an option
“Will” indicates a statement of intention or fact
These are often contractual
27. Common Problems
Making bad assumptions
Writing implementation (HOW) instead of requirements (WHAT)
Describing operations instead of writing requirements
Using incorrect terms
Using incorrect sentence structure or bad grammar
Missing requirements
Over-specifying
28. Key Documents
Operations Concept Document
System Requirements Specification
Software Requirements Specification (for each unit)
Software Design Document (for each unit)
Version Description Document (for each unit)
Verification Plans and Procedures (per unit, interface and
system-level)
And the most important…
29. Interface Control Document
Details of the interface between two entities
(subsystems, computers, devices, organizations…)
Roles and responsibilities of all parties
Can be data, mechanical, electrical, organizational…
Entity A Entity BInterface