Last edited by Datilar
Saturday, February 1, 2020 | History

3 edition of Guide to verification and validation of the SCALE-4 criticality safety software found in the catalog.

Guide to verification and validation of the SCALE-4 criticality safety software

Guide to verification and validation of the SCALE-4 criticality safety software

  • 21 Want to read
  • 20 Currently reading

Published by Spent Fuel Project Office, Office of Nuclear Material Safety and Safeguards, U.S. Nuclear Regulatory Commission, Supt. of Docs., U.S. G.P.O. [distributor] in Washington, DC .
Written in English

    Subjects:
  • Criticality (Nuclear engineering) -- Computer programs.,
  • Computer software -- Validation.

  • Edition Notes

    Statementprepared by M.B. Emmett, W.C. Jordan.
    ContributionsJordan, W. C., U.S. Nuclear Regulatory Commission. Spent Fuel Project Office., Oak Ridge National Laboratory.
    The Physical Object
    FormatMicroform
    Paginationvii, 107 p.
    Number of Pages107
    ID Numbers
    Open LibraryOL15446958M

    Sometimes certification is required for legal reasons. Since the largest contribution to the eigenvalue uncertainty of SFR systems is coming from scattering reactions, it is expected that uncertainties in the angular scattering distributions also have a significant impact. As part of the current study, detailed benchmark modeling information and measurement data are being documented in a format that is readily usable for validating depletion and decay codes. Cons: This methodology may not help to generate robust and abnormal test conditions for very complex low level requirements typically implemented by platform software with no visibility to outer world. This can be achieved by three ways: to supplement traditional processes and documentation, to substitute formal specifications for some traditional documentation, and to substitute formal proofs for some traditional reviews and analyses.

    Table 1: Use of testing methods throughout the development life cycle [Storey96] Static Requirements analysis and functional specification walkthroughs. In order to provide a frame of reference for the findings and recommendations of the Committee, this chapter attempts to establish definitions for key terms used throughout this report and to provide a sense of the advantages and disadvantages offered by different approaches to software assurance. Some of these techniques are performed manually while others are automated. The software verification process includes more than testing, since testing in general cannot show the absence of errors. Such final external validation requires the use of an acceptance test which is a dynamic test.

    Software integration testing - To verify the interrelationships between the software requirements and components and to verify the implementation of the requirements and components in the software architecture. Validation vs. Regulatory Guide 1. The U. Changes to the methods used have to be approved by the regulatory body to insure that certification will not be affected.


Share this book
You might also like
The Bartenders Cherry, Second Edition

The Bartenders Cherry, Second Edition

Sri Krishna Chaitanya

Sri Krishna Chaitanya

Catering for travellers

Catering for travellers

Twelve centuries of English poetry and prose

Twelve centuries of English poetry and prose

Between War and Peace in Central America

Between War and Peace in Central America

Stupidity, treason and egomania.

Stupidity, treason and egomania.

Italian followers of Caravaggio..

Italian followers of Caravaggio..

Creatures of the sea

Creatures of the sea

ENABLE Educational Version 2.0

ENABLE Educational Version 2.0

Space: A Call for Action

Space: A Call for Action

Guide to verification and validation of the SCALE-4 criticality safety software Download PDF Ebook

Platform Software Verification Framework All the above approaches coupled with Host side software tools communicating over typical interfaces such as network, serial, USB etc. Replace the First instruction located at Original Function with Prepared new instruction e. IEEE Standard Although exhaustive testing performed at every stage in the life cycle results in a complete verification of the system, it is realistically impossible to accomplish.

Software validation[ edit ] Software validation checks that the software product satisfies or fits the intended use high-level checkingi. Malfunction — according to its specification the system does not meet its specified functionality. The results of these benchmark studies are used to quantify the bias and uncertainties associated with isotopic calculations and ultimately determine appropriate margins for uncertainty that can be applied in safety-related analyses such as burnup credit in criticality calculations, decay heat analysis, and source terms.

No document with DOI

This is a case where the methodology development process is certified instead of the artifact software. During internal software validation, it is assumed that the goals of the stakeholders were correctly understood and that they were expressed in the requirement artifacts precisely and comprehensively.

Certification only proves that a system has met certain standards set by the certifying agency. Figure 6: Hook Method to test the BOOT Cons: The platform software source code under test needs to Guide to verification and validation of the SCALE-4 criticality safety software book modified which needs to be justified for safety critical systems.

Stevens, F. Therefore, the software verification process is usually a combination of review, analyses, and testing. MathWorks User Stories. Figure 3: Test Application with Test Driver Pros: Kernel level functionality is not directly exposed to userspace applications and can be tested through the test driver.

Addison-Wesley Inc. This becomes an issue in the certification of products containing software. Google Scholar Examples of artifact validation: User Requirements Specification validation: User requirements as stated in a document called User Requirements Specification are validated by checking if they indeed represent the will and goals of the stakeholders.

Test cases may be prepared for software verification and software validation to determine if the product was built according to the requirements of the user.

In the safety case, the regulatory authority will look to see that all potential hazards have been identified, and that appropriate steps have been taken to deal with them.

Note: Verification begins before Validation and then they run in parallel until the software product is released. And why is it so hard? This paper summarizes the isotopic assay data selected for this study, presents validation results obtained with SCALE 5.

Software Engineer, eInfochips Abstract Innovation is the key to surviving the rapidly changing world of embedded electronics. This is often an internal process. Both calculations show good agreement with the measurements.

Sterile Compounding Manual Single Copy

Software architecture - To detect and report errors that occured during the development of the software architecture.This White Paper will assist and guide you with the validation of computer systems, using GAMP 5 methodologies. 5 software and hardware categorization, GxP impact, applicable electronic records and The installation verification, functional verification and requirements verification testing.

i SCALE CRITICALITY SAFETY VERIFICATION AND VALIDATION PACKAGE S. M. Bowman, M. B. Emmett, and W. C. Jordan Oak Ridge National Laboratory. P.O. Box Oak Ridge, TN () INTRODUCTION Verification and validation (V&V) are essential elements of software quality assurance (QA) for computer codes that are used for performing scientific galisend.com: S.

M. Bowman, M. B. Emmett, W. C. Jordan. Abstract-As an example ofthe application ofthe lntemational Criticality Safety Benchmark Evaluation Project (ICSBEP) work to the nuclear industry, the validation of the control module CSAS26 of SCALE a for criticality calculations on a personal computer platform is presented.

This work has been done.Dec pdf,  · Notwithstanding the existing difficulties, Pdf Safe and Secure Software Systems is a valuable book in that it tackles both the topics of software safety and security.

The book notes the difference between the two is that safety-critical software is that where the software must not harm the world; and security-critical software is that 5/5(3).Proposed Guide: System Verification, Validation and Testing Master Plan B.1 BACKGROUND The Verification, Validation and Testing Master Plan (VVT-MP) is a pro-posed expansion to the Test and Evaluation Master Plan (TEMP), a U.S.

Department of Defense .Sterile Compounding Manual Single Copy Ebook INCLUDES A PAGE USP UPDATE () As the didactic component of the Aseptic Technique Verification exercise, the Compounding Manual is organized in accordance with accepted educational principles and includes self-assessment exercises to assist the participant in identifying problem areas.

Software verification and validation