preview

Two Different Types Of Verification

Good Essays

may not be able to decide whether the overflow has occurred or not because of the uncertainty associated with the reading. Hence, these two situations will be emulated with two branches. For each branch, further branches may need to be considered. When all the branches have been simulated, the probability of the fault propagating from the physical sensor to the software program can be calculated as the ratio of the number of branches that lead to data buffer overflow to the total number of branches. (2) Component Criticality. Component criticality measures the contribution of faults in one component to system failure. It can be represented by P_(c_i→system failure) in Equation (2). All the components can be ranked based on their component …show more content…

However, the original design process can be emulated by gradually specifying the components. For example, generic valves for a water level system can be initially used to create the component model and perform the fault analysis to mimic the early design stage. Then, a portion of these components can be specified into a more detailed version, such as a particular type of hydraulic valves. Finally, the existing version of the system design will be used. The simulation results can be verified by comparing the outcomes of the framework to the data sampled from either real systems or full-scope (i.e. highly detailed and representative) simulators. Metrics will be defined to measure the consistency between the results predicted by the analytical framework and the results obtained from the implemented system. The procedure of method verification is detailed in the following. a) Construct qualitative models based on the requirement and design documents. At this stage, functional models and component models with structural and qualitative behavioral information are created. Detailed numerical models will be totally or partially ignored. We will try to keep the analytical models qualitative to verify the correctness of the qualitative analysis. b) Collect necessary background knowledge. In this step, the proposed ontologies will be used to guide information extraction. The databases listed in Table 3 may be used as data sources to elicit the faults of

Get Access