Search results for "Functional verification"

showing 4 items of 4 documents

An integrated identity verification system for mobile terminals

2005

PurposeTo report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and user‐friendliness.Design/methodology/approachThe reported research corresponds to the building process in the design science research paradigm. The requirements to an identity verification system are defined and used in the selection of architecture components. Furthermore, various issues affecting the suitability of component distribution between a terminal and a remote server are considered.FindingsIn order to meet the stated requirements, in the proposed architecture static and dynamic identity verification is combine…

High-level verificationFunctional verificationComputer sciencebusiness.industryRuntime verificationLibrary and Information SciencesManagement Science and Operations ResearchManagement Information SystemsIntelligent verificationEmbedded systemSystems architectureIdentity (object-oriented programming)VerificationBusiness and International ManagementbusinessSoftware verificationInformation Management & Computer Security
researchProduct

Radiation Hardness Assurance Through System-Level Testing: Risk Acceptance, Facility Requirements, Test Methodology, and Data Exploitation

2021

International audience; Functional verification schemes at a level different from component-level testing are emerging as a cost-effective tool for those space systems for which the risk associated with a lower level of assurance can be accepted. Despite the promising potential, system-level radiation testing can be applied to the functional verification of systems under restricted intrinsic boundaries. Most of them are related to the use of hadrons as opposed to heavy ions. Hadrons are preferred for the irradiation of any bulky system, in general, because of their deeper penetration capabilities. General guidelines about the test preparation and procedure for a high-level radiation test ar…

Small satelllitessmall satellitesComputer scienceRadiation effects02 engineering and technologytest methodology01 natural sciencesSpace missionsSpace explorationsystem-level testing0202 electrical engineering electronic engineering information engineeringRadiation hardeningTechnik [600]Reliability (statistics)avaruustekniikka[PHYS]Physics [physics]protonselektroniikkalaitteetrisk acceptance[PHYS.PHYS.PHYS-SPACE-PH]Physics [physics]/Physics [physics]/Space Physics [physics.space-ph]Commercial off-the-shelf (COTS)Test (assessment)facilitiesPerformance evaluationTotal ionizing doseSystem verificationtestmethodologyNuclear and High Energy Physicstotal ionizing dose (TID)0103 physical scienceselektroniikkaRadiation hardening (electronics)Electrical and Electronic Engineeringsingle-event effect (SEE)Functional verification010308 nuclear & particles physics600: Technikneutrons020206 networking & telecommunicationsTest methodSystem level testingReliability engineering[SPI.TRON]Engineering Sciences [physics]/ElectronicsNuclear Energy and EngineeringtestausmenetelmätsäteilyfysiikkaOrbit (dynamics)radiation hardness assurancejärjestelmätddc:600
researchProduct

Asynchronous Runtime Verification of Business Processes

2015

The authors propose a runtime verification mechanism for business processes. This mechanism allows verifying the correctness of business process execution and it runs in parallel with the base processes affecting them insignificantly. The authors have identified the case where the use of business process runtime verification is helpful and applicable. The verification mechanism monitors the business process execution and verifies compliance with the base process description. The verification mechanism prototype was developed and tested in real business processes, as well as limits of runtime verification overhead were evaluated.

Business Process Model and NotationHigh-level verificationFunctional verificationbusiness.industryComputer scienceDistributed computingRuntime verificationVerificationBusiness process modelingSoftware engineeringbusinessSoftware verificationIntelligent verification2015 7th International Conference on Computational Intelligence, Communication Systems and Networks
researchProduct

Architectural Implementation of a Reconfigurable NoC Design for Multi-Applications

2021

With the increasing number of applications running on a Network-on-Chip (NoC) based System-on-Chip (SoC), there is a need for designing a reconfigurable NoC platform to achieve acceptable performance for all the applications. This paper proposes a novel architecture for implementing a reconfiguration logic to the NoC platform executing multiple applications. The proposed architecture reconfigures SoC modules to the routers in the NoC with the help of tri-state buffers based on the applications running. The overhead in implementing the reconfiguration circuitry is significantly less, approximately 0.9% of the area and 1% of the total power consumed by the router network. The architectures pr…

RouterFunctional verificationComputer sciencebusiness.industryOverhead (engineering)Control reconfigurationHardware_PERFORMANCEANDRELIABILITYNetwork topologyMultiplexerNetwork on a chipEmbedded systemHardware_INTEGRATEDCIRCUITSVerilogbusinesscomputercomputer.programming_language2021 24th Euromicro Conference on Digital System Design (DSD)
researchProduct