Comparing Software Measures with Fault Counts Derived from Unit-Testing of Safety-Critical Software

Author(s):  
Wolfgang Herzner ◽  
Stephan Ramberger ◽  
Thomas Länger ◽  
Christian Reumann ◽  
Thomas Gruber ◽  
...  
1993 ◽  
Vol 8 (1) ◽  
pp. 5 ◽  
Author(s):  
Richard E. Courtney ◽  
David A. Gustafson
Keyword(s):  

1995 ◽  
Vol 10 (6) ◽  
pp. 245 ◽  
Author(s):  
Gang Luo ◽  
Robert L. Probert ◽  
Hasan Ural
Keyword(s):  

1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


2019 ◽  
Vol 2 (3) ◽  
pp. 164-169
Author(s):  
Mohammed Faza ◽  
Maulahikmah Galinium ◽  
Matthias Guenther

An energy supply system consists of a system of power plants and transmission anddistribution systems that supply electrical energy. The present project is limited to the modellingof the generation system. Its objective is the design and implementation of a web-basedapplication for simulating energy supply systems using the Laravel framework. The projectfocuses on six modules representing geothermal energy, solar energy, biopower, hydropower,storage, and fossil-based energy that are allocated to satisfy a given power demand. It isexecuted as a time series modelling for an exemplary year with hourly resolution. Thedevelopment of the software is divided into four steps, which are the definition of the userrequirements, the system design (activity, use case, system architecture, and ERD), the softwaredevelopment, and the software testing (unit testing, functionality testing, validity testing, anduser acceptance testing). The software is successfully implemented. All the features of thesoftware work as intended. Also, the software goes through validity testing using three differentinput data, to make sure the software is accurate. The result of the testing is 100% accuracy withrespect to the underlying model that was implemented in an excel calculation.


2011 ◽  
Vol 31 (1) ◽  
pp. 281-285
Author(s):  
Huan HE ◽  
Zhong-wei XU ◽  
Gang YU ◽  
Shi-yu YANG

1995 ◽  
Author(s):  
Clark Archer ◽  
Michael Stinson

Sign in / Sign up

Export Citation Format

Share Document