软件分析代写 ISEN 1000代写 软件工程代写 软件系统代写
801ISEN 1000 Trimester 2, 2022 软件分析代写 1. Overall Exercise Description In this assessment you will do a complete software requirement analysis and will submit detailed planning as 1. Overa...
View detailsSearch the whole station
软件工程作业代写 In this exercise we will use different analysis to come up with the reliability and safety requirements. The automatic train allow door to open
In this exercise we will use different analysis to come up with the reliability and safety requirements. The automatic train allow door to open for passenger to exit it will open and close automatic safely.
Failure mode effect analysis (FMEA) is conducted as part of the reliability analysis. Severity, probability and detectability are a number from 1-10. Severity is given 10 for the highest severity, high probability of failure occurrence is also given high number and a high detection rank reflects low detection capability of the failure. The risk priority number (RPN) is the product of all three measure. It is important to reduce the RPN especially high RPN by adding mitigations.
Item | Failure | modes | Causes | Effects | Severity | Probability | Detectability | RPN | Mitigation |
Write the reliability requirement associated with each mitigation and appropriate tests case to verify these requirements (3pts).
List application that requires the following attributes and appropriate metric:
High reliability
High reliability on demand
High availability
Create a preliminary analysis for the automatic door on a locomotive, use the risk matrix provided in the class note (chapter 12)
Hazard | Causes | Consequence | Severity | Probability | Risk | Mitigation |
e-(0.9 pt) Choose one hazard, create a fault tree analysis (FTA) and drill down to a detailed failure causes that contribute to the hazard.
• (0.4 pt) Create a miss use case for a stock market application
• (0.9 pt) Create a design risk assessment for this application, think of all level of security infrastructure, application and operational for the vulnerability, also think about the different types of thread (interception, interruption, modification and fabrication) and fill the table below.
Asset | Causal/ Vulnerability | Threat | Exposure / Consequence | Security measure |
• (0.3 pt) Come up with the security requirements needed for this application (3 req)
ISEN 1000 Trimester 2, 2022 软件分析代写 1. Overall Exercise Description In this assessment you will do a complete software requirement analysis and will submit detailed planning as 1. Overa...
View detailsCOEN 174 Software Engineering Midterm1 (50 pts) 软件工程代写 For each of the systems described in a) and b), select the most appropriate software process model from the list...
View detailsI218 Computer ArchitectureReport 3 计算机体系结构cs代写 (1) In the textbook and lecture slides, detailed information in the pipeline registers (IF/ID, ID/EX, EX/MEM, MEM/WB) is not provided. ...
View detailsI218 Computer ArchitectureReport 2 cs计算机体系结构作业代做 (1)How is the instruction “sub $t9, $s4, $s7” translated to a machine instruction code? Answer the rs, rt, and rd fields in binary n...
View details