软件工程之软件验证计划Software Verification Plan

news2025/3/28 7:37:09

个人主页:云纳星辰怀自在

座右铭:“所谓坚持,就是觉得还有希望!


本文为基于ISO26262软件验证计划模板,仅供参考。

软件验证计划,包括:
1. 软件需求验证计划
2. 软件架构设计验证计划
3. 软件单元设计验证计划
4. 软件单元验证计划


1. General

This document is linked to the Project plan (safety plan) of <PrjName>. The verification is carried out in the following different forms:

In the design phases, verification implies the evaluation of the work products of each phase to ensure that they comply with the requirement set out in the previous phase for correctness, completeness and consistency.

In the test phases, verification implies the evaluation of work products of a particular phase within a test environment to ensure that they comply with the requirements set out at that particular phase.

1.1 Purpose

This document outlines the verification activities and the processes used to demonstrate that <PrjName> fulfils ISO26262.

The Software verification plan aims to:

  1. Verify that the defined software requirements are fulfilled.
  2. Clarify the test strategy and test planning for software test.

1.2 Scope

The scope of this document is limited to specification of software verification activities for <PrjName>.

The specification considers the software test objectives, how to make software test plan considering test strategy to carry out software test performance and finally document within test report.

The specification considers the software test strategy and test method.

1.3 Audience

This document is only for used by the staffs and managed within XX. Anyone shall be forbidden to distribute it outside without the written permission from XX.

Copyright © XXX Co., Ltd. 2021.


1.4 Reference Document

Table 1 Associated Regulations

ID

Associated Regulations

1

2

3

4

5

Table 2 Associated Standards

ID

Associated Standards

1

2

3

4

5

Table 3 Associated Documentations

ID

Document ID

Ver.

Author

1

<XX-SUP-P1T001_XXX-Quality Assurance Plan>

2

<XX-SW-R0T001-SOR_Basic Software Requirement>

3

<XXX-SW-R1T002_Naming Convention for Matlab>

4

<XXX-SW-R1T001_Naming Convention for C-coding>

5

<XXX-SW-G1T001_Guideline for Modelling with Matlab>

6

<XXX-SW-E1T001_XXX Software Requirement Analysis Strategy>

7

<XXX-SW-E2T002_XXX-Software Architecture Design Specification>

8

<XXX-SW-E2T003_XXX-SW Safety Analysis Report>

9

<XXX-SW-E2T001_XXX-Software Architecture Design Strategy>

10

<XXX-SW-E3T001_XXX-SwUnit Detailed Design and Implementation Strategy>

11

<XXX-SW-E3T002_XXX-SwUnit Detailed Design and Implementation Specification>

12

<XXX-SW-E4T001_XXX-SW Unit Verification Strategy>

13

<XXX-MAN-M3T011_Review Report-XXX-Software Architectural Design>

14

<XXX-MAN-M3T011_Review Report-XXX-Software Unit Design and Implementation >

15

<XXX-MAN-M3T011_Review Report-XXX-Software Unit Verification>

16

<XXX-MAN-M3T010_Checklist-XXX Software Requirements Analysis>

17

<XXX-MAN-M3T010_Checklist-XXX Software Architectural Design>

18

<XXX-MAN-M3T010_Checklist-XXX Software Unit Design and Implementation>

19

<XXX-MAN-M3T010_Checklist-XXX Software Unit Verification>

1.5 Definitions, Acronyms and Abbreviations

All terms, acronyms and abbreviations which are required to correctly interpret this document are listed in Table 4 Definitions, Table 5 Acronyms and Table 6 Abbreviations respectively.

Table 4 Definitions

ID

Definition

Explanation

1

2

Table 5 Acronyms

ID

Acronym

Explanation

1

BMS

Battery Management System

2

MIL

Model in the loop

3

SIL

Software in the loop

4

HIL

Hardware in the loop

5

SFMEA

Software Failure Mode and Effect Analysis

6

TSR

Technical Software Requirement

7

SSR

Software Safety Requirement

Table 6 Abbreviations

ID

Abbreviation

Explanation

1

2

2. Management of Software Verification Activities

This section describes the team organization, schedule, resources, responsibilities, tools, and methodologies to be applied in order to perform the software verification activities for <<PrjName>>.

2.1 Organization

The team organization and individual responsibilities are as defined in Project Plan (Safety Plan).

Table 7 Authorized User

ID

Name

Department

Title

Read

Write

Copy

1

Engineer 1

2

Engineer 2

3

Engineer 3

4

Engineer 4

5

...

6

...

2.2 Schedule

The project schedule is as defined in Project Plan (Safety Plan).

2.3 Tools and Methodology

This project will adopt the method of developing Software fusing ASPICE, the following is the list of the software tools adopted for successful completion of the project based on model-based development.

Table 8 Software unit test environment

No.

Tool

Comment

Version

QTY

1

MATLAB

...

2

Source Insight

IDE

3

Eclipse

IDE

4

ParaSoft

Do static test and unit dynamic test for hand-coding codes

5

MTest

Do unit dynamic test for Simulink models

6

WindRiver

...

7

Lauterbach

...

8

9

10

2.4 Evaluation Method

The <<PrjName>> software shall be subjected to different evaluation methods, in accordance with the verification review guidelines. The methods are (example):

  1. Inspection
  2. Review
  3. Walk through
  4. Static code analysis
  5. Dynamic code analysis
  6. SFMEA

3 Software Verification

This section of software verification plan for <<PrjName>> provides the detailed plan for the verification activities throughout the project lifecycle.

3.1 Verification of Software Requirement Phase 

3.1.1 Objective

The objective of this phase is to plan for verification of software requirements derived from the system requirements specification.

3.1.2 Inputs

The following documentations shall be provided to execute the verification of Software Requirement:

  1. SRS, incl. SSR(Function Safety)
  2. <XXX-SW-E1T001_XXX Software Requirement Analysis Strategy>
  3. <XXX-MAN-M3T010_Checklist-XXX Software Requirements Analysis>

3.1.3 Responsible person

The following person will be in charge of this phase.

ID

Name

Department

Title

1

3.1.4 Work Products

The following are the deliverables from this sub-phase.

Table 9 Verification Work products of Software (Safety) Requirement Phase

No.

Work Product

1

<XXX-MAN-M3T011_Review Report-XXX-Software Requirement Specification>

2

3

3.1.5 Verification Review Methods

The software requirements shall be verified to ensure that:

  1. The software requirements are traceable and consistent with the system requirements
  2. The software requirements are unambiguous, atomic, internally and externally consistent.

The verification review shall be performed using:

  1. <XXX-SW-E1T001_XXX Software Requirement Analysis Strategy>
  2. <XXX-MAN-M3T010_Checklist-XXX Software Requirements Analysis>

The following evaluation methods shall be applied for the verification.

Table 10 Methods for the verification of safety requirements

Methods

ASIL

A

B

C

D

1a

Verification by walk-through

++

+

o

o

1b

Verification by inspection

+

++

++

++

1c

Semi-formal verificationa

+

+

++

++

1d

Formal verificationa

o

+

+

+

a         Verification can be supported by executable models.

3.1.6 Environment

All work products of this phase should pass the verification review, all the tools used in verification as below:

Table 11 SSR Verification Environment

No.

Tool

Comment

Version

QTY

1

OFFICE

2

Doors

3

4

5

3.1.7 Entry/Exit Criteria

All deviations observed in verification should be addressed based on checkpoint questions provided in the checklist. All work products of this phase must be complete and approved.

3.1.7.1 Entry Criteria

Following are entry criteria for software (safety) requirements:

  1. System Requirements Specification (Incl. Technical Safety Requirements) has been baselined in System Requirements Process.
  2. Configuration Data Specification and Calibration Data Specification have been baselined in System Requirements Process.
  3. System Design Specification (Incl. Technical Safety Concept) has been baselined in System Design Process.
  4. Hardware Software Interface Specification has been baselined in System Design Process.
  5. Software Requirements Specification Verification Review Checklist should be available.

3.1.7.2 Exit Criteria

Following are exit criteria for software (safety) requirements:

  1. Software Requirements Specification has been approved and baselined.
  2. Software Requirements Specification Verification Review Report has been approved.
  3. Address all issues reported during verification.

3.2 Verification of Software Architecture Design

3.2.1 Objective

The objective of this phase is to plan for verification of software architectural design which is derived from software requirements specification。

3.2.2 Inputs

The following documentations shall be provided to carry out the verification of Software Architectural Design:

  1. SRS, incl. SSR(Function Safety)
  2. <XXX-MAN-M3T010_Checklist-XXX Software Architectural Design Checklist>

3.2.3 Responsible person

The following person will be in charge of this phase.

ID

Name

Department

Title

1

3.2.4 Work Products

The following are the deliverables from this sub-phase.

Table 12 Verification Work products of Software Architecture Design phase

No.

Work Product

1

<XXX-SW-E2T003_XXX-SW Safety Analysis Report>

2

<XXX-MAN-M3T011_Review Report-XXX-Software Architectural Design>

3

<XXX-SW-E2T002_XXX-Software Architecture Design Specification>

3.2.5 Verification Review Methods

The software architectural design verification shall ensure that:

  1. The software architectural design shall comply with the software requirements
  2. The software architectural design shall be developed as a guideline for software unit detailed design.

The verification review shall be performed using:

  1. <XXX-SW-E1T001_XXX Software Requirement Analysis Strategy>
  2. <XXX-MAN-M3T010_Checklist-XXX Software Requirements Analysis>

The following evaluation methods shall be applied for the verification.

Table 13 Methods for the verification of safety architectural design

Methods

ASIL

A

B

C

D

1a

Walk-through of the designa

++

+

o

o

1b

Inspection of the designa

+

++

++

++

1c

Simulation of dynamic behaviour of the design

+

+

+

++

1d

Prototype generation

o

o

+

++

1e

Formal verification

o

o

+

+

1f

Control flow analysisb

+

+

++

++

1g

Data flow analysisb

+

+

++

++

1h

Scheduling analysis

+

+

++

++

a         In the case of model-based development, these methods can also be applied to the model.
b        Control and data flow analysis can be limited to safety-related components and their interfaces.

3.2.6 Environment

All work products of this phase should pass the verification review, all the tools used in verification as below:

Table 14 Software Architectural Design Verification Environment

No.

Tool

Comment

Version

QTY

1

OFFICE

2

Doors

3

4

5

3.2.7 Entry/Exit Criteria

All deviations observed in verification should be addressed based on checkpoint questions provided in the checklist. All work products of this phase must be complete and approved.

3.2.7.1 Entry Criteria

Following are entry criteria for software (safety) requirements:

  1. Software Requirements Specification (Incl. Software Safety Requirements) has been baselined in Software Requirements Process.
  2. Configuration Data Specification and Calibration Data Specification have been baselined in Software Requirements Process.
  3. Hardware Software Interface Specification has been baselined in System Design Process.
  4. Software Architectural Design Specification Verification Review Checklist should be available.

3.2.7.2 Exit Criteria

Following are exit criteria for software architecture design:

  1. Software Architectural Design Specification has been approved and baselined.
  2. Software Architectural Design Specification Verification Review Report has been approved.
  3. Address all issues reported during verification.

3.3 Verification of Software Unit Design and Implementation

3.3.1 Objective

The objective of this phase is to plan for verification of software unit design and implementation which is derived from software architectural design.

3.3.2 Inputs

The following documentations shall be provided to carry out the verification of Software Unit Design:

  1. SRS, incl. SSR(Function Safety)
  2. <XXX-SW-E2T002_XXX-Software Architecture Design Specification>
  3. <XXX-SW-G1T001_Guideline for Modelling with Matlab>
  4. <XXX-SW-R1T001_Naming Convention for C-coding>
  5. <XXX-SW-R1T002_Naming Convention for Matlab>
  6. <XXX-SW-E3T002_XXX-SwUnit Detailed Design and Implementation Specification>
  7. <XXX-SW-E3T001_XXX-SwUnit Detailed Design and Implementation Strategy>
  8. <XXX-MAN-M3T010_Checklist-XXX Software Unit Design and Implementation>

3.3.3 Responsible person

The following person will be in charge of this phase.

ID

Name

Department

Title

1

3.3.4 Work Products

The following are the deliverables from this sub-phase.

Table 15 Verification Work products of Software Unit Design and Implementation

No.

Work Product

1

<XXX-MAN-M3T011_Review Report-XXX-Software Unit Design and Implementation >

2

3

3.3.5 Verification Review Methods

The verification shall comply with the following:

  1. The software requirements shall be traceable to the allocated software units.
  2. The compliance of implemented model and the source code with the software unit design specification.
  3. The Software Unit Design Specification is developed per <XXX-SW-E3T001_XXX-SwUnit Detailed Design and Implementation Strategy>.
  4. The implemented model and source code comply with <XXX-SW-G1T001_Guideline for Modelling with Matlab>.
  5. Static code analysis and semantic analysis is executed on the auto generated source code.

The following evaluation methods shall be applied for the verification review. The verification review shall be performed using Software Design Guidelines and Software Unit Design Specification Checklist.

Table 16 Methods for the Verification of Software Design and Implementation

Methods

ASIL

A

B

C

D

1a

Walk-through of the design

++

+

o

o

1b

Inspection of the design

+

++

++

++

1c

Semi-formal verification

+

+

+

++

1e

Formal verification

o

+

+

+

3.3.6 Environment

All work products of this phase should pass the verification review, all the tools used in verification as below:

Table 17 Software Unit Design Verification Environment

No.

Tool

Comment

Version

QTY

1

IDE

Source Insight, Eclipse, etc.

2

MATLAB

3

4

5

3.3.7 Entry/Exit Criteria

All deviations observed in verification should be addressed based on checkpoint questions provided in the checklist. All work products of this phase must be complete and approved.

3.3.7.1 Entry Criteria

Following are entry criteria for software (safety) requirements:

  1. Configuration Data Specification and Calibration Data Specification have been baselined in System Requirements Process
  2. Software Requirements Specification (Incl. Software Safety Requirements) has been baselined in Software Requirements Process.
  3. Software Architectural Design Specification has been baselined in Software Architectural Design Process

3.3.7.2 Exit Criteria

Following are exit criteria for Software Unit Design and Implementation:

  1. Software Unit Design Specification has been approved and baselined.
  2. Software Unit Design Specification Verification Review Report has been approved.
  3. Address all issues reported during verification.

3.4 Verification of Software Unit Verification

3.4.1 Objective

The objective of this phase is to plan for software unit verification in order to demonstrate that the software units fulfill the software unit requirements and do not contain undesired functionality.

3.4.2 Test Strategy

Software unit verification strategy is in order to reduce software development risks, time, and cost. In this phase, interfaces tested for proper information flow and all error handling paths should be tested. Software unit tests are expected to against state machines in the software unit design.

3.4.3 Regression Test Strategy

Software unit verification phase shall be executed for the impacted units based on the updated Software Unit Test Specification. Check for defects propagated to other modules by changes made to existing program. Additional test cases focus on software functions likely to be affected by the change. Regression Tests cases focus on the changed software units.

3.4.4 Inputs

The following documentations shall be provided to carry out the verification of Software Unit Verification:

  1. <XXX-SW-E4T001_XXX-SW Unit Verification Strategy>
  2. <XXX-MAN-M3T010_Checklist-XXX Software Unit Verification>
  3. Software Unit Test Case
  4. Software Unit Test Report

3.4.5 Responsible person

The following person will be in charge of this phase.

ID

Name

Department

Title

1

3.4.6 Work Products

The following are the deliverables from this sub-phase.

Table 18 Verification Work products of Software Unit Verification

No.

Work Product

1

<XXX-MAN-M3T011_Review Report-XXX-Software Unit Verification>

<XXX-MAN-M3T011_Review Report-XXX-Software Unit Design and Implementation >

2

Software Unit Test Report

3

3.4.7 Verification Review Methods

The verification review shall be performed to ensure that

  1. There exists at least one test case for each software unit deign requirement.
  2. The tests are traceable to the software unit design requirements.
  3. The tests have been performed in accordance with the methods identified in Project Plan (Safety Plan).
  4. The tests produce the same results and the coverage as reported.
  5. In case of acceptable test failures or incomplete coverage, there exists valid justification recorded.

The following evaluation methods shall be applied for the verification review. The verification review shall be performed using Software Design Guidelines and Software Unit Design Specification Checklist.

Table 19 Methods for the Verification of Software Unit Verification

No.

Inputs for Verification Review

Walk-through

Inspection

1

Software Unit Test Case

No

Yes

2

3

3.4.8 Test Methods

The methods specified in the following table shall be applied for verification. The verification shall be performed using Software Unit Test Guideline and Software Unit Test Specification Checklist. The detailed requirements refer to <XXX-SW-E4T001_XXX-SW Unit Verification Strategy>.

Table 20 Methods for Software Unit Verification

Method

ASIL

A

B

C

D

1a

Walk-through

++

+

o

o

1b

Pair-programming

+

+

+

+

1c

Inspection

+

++

++

++

1d

Semi-formal verification

+

+

++

++

1e

Formal verification

o

o

+

+

1f

Control flow analysis

+

+

++

++

1g

Data flow analysis

+

+

++

++

1h

Static code analysis

++

++

++

++

1i

Static analyses based on abstract interpretation

+

+

+

+

1j

Requirements-based test

++

++

++

++

1k

Interface test

++

++

++

++

1l

Fault injection test

+

+

+

++

1m

Resource usage evaluation

+

+

+

++

1n

Back-to-back comparison test between model and code, if applicable

+

+

++

++

Table 21 Methods for deriving test cases for software unit testing

Method

ASIL

A

B

C

D

1a

Analysis of requirements

++

++

++

++

1b

Generation and analysis of equivalence classes

+

++

++

++

1c

Analysis of boundary values

+

++

++

++

1d

Error guessing based on knowledge or experience

+

+

+

+

Table 22 Structural coverage metrZD at the software unit level

Method

ASIL

A

B

C

D

1a

Statement coverage

++

++

+

+

1b

Branch coverage

+

++

++

++

1c

MC/DC (Modified Condition/Decision Coverage)

+

+

+

++

3.4.9 Environment

All work products of this phase should pass the verification review, all the tools used in verification as below:

Table 23 Software Unit Verification Environment

No.

Tool

Comment

Version

QTY

1

2

3

4

5

3.4.10 Entry/Exit Criteria

All deviations observed in verification should be addressed based on checkpoint questions provided in the checklist. All work products of this phase must be complete and approved.

3.4.10.1 Entry Criteria

Following are entry criteria for software (safety) requirements:

  1. Configuration Data Specification and Calibration Data Specification have been baselined in System Requirements Process
  2. Software Requirements Specification (Incl. Software Safety Requirements) has been baselined in Software Requirements Process.
  3. Software Architectural Design Specification has been baselined in Software Architectural Design Process

3.4.10.2 Exit Criteria

Following are exit criteria for Software Unit Design and Implementation:

  1. Software Unit Design Specification has been approved and baselined.
  2. Software Unit Design Specification Verification Review Report has been approved.
  3. Address all issues reported during verification.

3.4.11 Software Unit Verification Method

XXX will demand to do the software unit test according to the software unit verification strategy.

The methods for SwUnit verification could be seen as below. XXX will adopt these methods marked with orange.

Table 24 Methods for Software Unit Verification

No.

Methods

Comment

Select

A

B

C

D

1a

Walk-through

++

+

O

O

R

1b

Pair-programming

+

+

+

+

R

1c

Inspection

+

++

++

++

R

1d

Semi-formal verification

+

+

++

++

£

1e

Formal verification

O

O

+

+

£

1f

Control flow analysis

+

+

++

++

£

1g

Data flow analysis

+

+

++

++

£

1h

Static code analysis

++

++

++

++

R

1i

Static analyses based on abstract interpretation

+

+

+

+

R

1j

Requirements-based test

++

++

++

++

R

1k

Interface test

++

++

++

++

R

1l

Fault injection test

+

+

+

++

R

1m

Resource usage evaluation

+

+

+

++

£

1n

Back-to-back comparison test between model and code, if applicable

+

+

++

++

£

Refer to ISO 26262-6 § 9.4.2 Table 7, the “check symbol” means will adopt this method.


未完待续。。。


参考文章

LINK

资源下载:TBD

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.coloradmin.cn/o/2318954.html

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈,一经查实,立即删除!

相关文章

Spring Cloud之负载均衡之LoadBalance

目录 负载均衡 问题 步骤 现象 什么是负载均衡&#xff1f; 负载均衡的一些实现 服务端负载均衡 客户端负载均衡 使用Spring Cloud LoadBalance实现负载均衡 负载均衡策略 ​编辑 ​编辑LoadBalancer原理 服务部署 准备环境和数据 服务构建打包 启动服务 上传J…

分布式任务调度

今天我们讲讲分布式定时任务调度—ElasticJob。 一、概述 1、什么是分布式任务调度 我们可以思考⼀下下⾯业务场景的解决⽅案: 某电商平台需要每天上午10点&#xff0c;下午3点&#xff0c;晚上8点发放⼀批优惠券 某银⾏系统需要在信⽤卡到期还款⽇的前三天进⾏短信提醒 某…

架构设计的灵魂交响曲:系统设计各维度的深度解析与实战指南

引言: 系统设计的背景与重要性 在快速变化的技术环境中&#xff0c;数字化转型成为企业生存与发展的核心驱动力。系统设计能力不仅是技术团队的核心竞争力&#xff0c;也是推动业务创新和提升整体效率的关键因素。根据Gartner的研究&#xff0c;超过70%的数字化转型项目未能实…

[贪心算法]买卖股票的最佳时机 买卖股票的最佳时机Ⅱ K次取反后最大化的数组和 按身高排序 优势洗牌(田忌赛马)

1.买卖股票的最佳时机 暴力解法就是两层循环&#xff0c;找出两个差值最大的即可。 优化&#xff1a;在找最小的时候不用每次都循环一遍&#xff0c;只要在i向后走的时候&#xff0c;每次记录一下最小的值即可 class Solution { public:int maxProfit(vector<int>& p…

【 <二> 丹方改良:Spring 时代的 JavaWeb】之 Spring MVC 的核心组件:DispatcherServlet 的工作原理

<前文回顾> 点击此处查看 合集 https://blog.csdn.net/foyodesigner/category_12907601.html?fromshareblogcolumn&sharetypeblogcolumn&sharerId12907601&sharereferPC&sharesourceFoyoDesigner&sharefromfrom_link <今日更新> 一、Dispat…

第J3周:DenseNet121算法实现01(Pytorch版)

&#x1f368; 本文为&#x1f517;365天深度学习训练营 中的学习记录博客&#x1f356; 原作者&#xff1a;K同学啊 目标 具体实现 &#xff08;一&#xff09;环境 语言环境&#xff1a;Python 3.10 编 译 器: PyCharm 框 架: Pytorch &#xff08;二&#xff09;具体步骤…

webrtc3A算法

使用ubuntu18.04 选择webrtc_audio_processing v0.3 下载地址 https://gitlab.freedesktop.org/pulseaudio/webrtc-audio-processing/-/tree/master git clone 完 编译 # Initialise into the build/ directory, for a prefixed install into the # install/ directory meson …

让“树和二叉树”埋在记忆土壤中--性质和概念

Nice to meet your! 目录 树的介绍&#xff1a; 树的创建&#xff1a; 二叉树的概念和结构&#xff1a; 二叉树的存储结构&#xff1a; 树的介绍&#xff1a; 概念和结构&#xff1a; 不知你们是否在现实中看见过分为两个叉的枯树&#xff0c;大概长这样&#xff1a; 那…

Spring Boot整合SSE实现消息推送:跨域问题解决与前后端联调实战

摘要 本文记录了一次完整的Spring Boot整合Server-Sent Events&#xff08;SSE&#xff09;实现实时消息推送的开发过程&#xff0c;重点分析前后端联调时遇到的跨域问题及解决方案。通过CrossOrigin注解的实际应用案例&#xff0c;帮助开发者快速定位和解决类似问题。 一、项…

【工具分享】vscode+deepseek的接入与使用

目录 第一章 前言 第二章 获取Deepseek APIKEY 2.1 登录与充值 2.2 创建API key 第三章 vscode接入deepseek并使用 3.1 vscode接入deepseek 3.2 vscode使用deepseek 第一章 前言 deepseek刚出来时有一段时间余额无法充值&#xff0c;导致小编没法给大家发完整的流程&…

康谋方案 | AVM合成数据仿真验证方案

随着自动驾驶技术的快速发展&#xff0c;仿真软件在开发过程中扮演着越来越重要的角色。仿真传感器与环境不仅能够加速算法验证&#xff0c;还能在安全可控的条件下进行复杂场景的重复测试。 本文将分享如何利用自动驾驶仿真软件配置仿真传感器与搭建仿真环境&#xff0c;并对…

Linux内核IPv4路由选择子系统

一、基本知识 1.具体案例&#xff1a;直连路由 结构fib_nh表示下一跳&#xff0c;包含输出网络设备、外出接口索引等信息。 有两个以太网局域网 LAN1 和 LAN2&#xff0c;其中 LAN1 包含子网 192.168.1.0/24&#xff0c;而 LAN2 包含子网 192.168.2.0/24。在这两个 LAN 之…

NWAFU 生物统计实验二 R语言版

#1 setwd(修改为你的工作路径或桌面路径) feed_types <- c("A", "B", "C") weight_gain_means <- c(36.8, 34.9, 21.3) weight_gain_sds <- c(2.4, 2.7, 6.6) weight_gain <- rnorm(3, mean weight_gain_means, sd weight_gain_sd…

Thinkphp指纹识别

识别ThinkPHP框架(指纹) 1.ioc判断 /favicon.ico 2.报错 /1 然后使用工具梭哈

【AVRCP】蓝牙AVRCP协议中的L2CAP互操作性要求深度解析

目录 一、L2CAP互操作性要求&#xff08;针对AVRCP&#xff09; 1.1 核心概念 1.2 AVRCP对L2CAP的增强需求 1.3 关键机制解析 1.4 浏览通道优化配置 1.5 实际应用场景与解决方案 二、通道类型与配置 2.1. 通道类型限制 2.2 PSM字段规范 2.3. 实现意义 3.4. 实际应用…

剑指 Offer II 111. 计算除法

comments: true edit_url: https://github.com/doocs/leetcode/edit/main/lcof2/%E5%89%91%E6%8C%87%20Offer%20II%20111.%20%E8%AE%A1%E7%AE%97%E9%99%A4%E6%B3%95/README.md 剑指 Offer II 111. 计算除法 题目描述 给定一个变量对数组 equations 和一个实数值数组 values 作…

掌握 WRF/Chem 模式:突破大气环境研究技术瓶颈的关键

技术点目录 第一部分、WRF-Chem模式应用案例和理论基础第二部分、Linux环境配置及WRF-CHEM第三部分、WRF-Chem模式编译&#xff0c;排放源制作第四部分、WRF-Chem数据准备&#xff08;气象、排放、初边界条件等&#xff09;&#xff0c;案例实践第五部分、模拟结果提取、数据可…

linux性能监控的分布式集群 prometheus + grafana 监控体系搭建

prometheusgrafana分布式集群资源监控体系搭建 前言一、安装 prometheus二、在要监控的服务器上安装监听器三、prometheus服务器配置四、grafana配置大屏五、创建Linux监控看板五、监控windows服务器注意事项 前言 Prometheus 是一个开源的 ​分布式监控系统 和 ​时间序列数据…

数字化转型 2.0:AI、低代码与智能分析如何重塑企业竞争力?

引言&#xff1a;数字化转型进入2.0时代 在过去的十几年里&#xff0c;企业的数字化转型&#xff08;1.0&#xff09;主要围绕信息化和自动化展开&#xff0c;例如引入ERP、CRM等系统&#xff0c;提高办公效率&#xff0c;减少人为失误。然而&#xff0c;随着市场竞争加剧&…

基于SpringBoot的“校园招聘网站”的设计与实现(源码+数据库+文档+PPT)

基于SpringBoot的“校园招聘网站”的设计与实现&#xff08;源码数据库文档PPT) 开发语言&#xff1a;Java 数据库&#xff1a;MySQL 技术&#xff1a;SpringBoot 工具&#xff1a;IDEA/Ecilpse、Navicat、Maven 系统展示 系统整体功能图 局部E-R图 系统首页界面 系统注册…