Republic of Slovenia Ministry for economic relations and development Metrology Institute of the Republic of Slovenia Laboratory for Information Technology.

Slides:



Advertisements
Similar presentations
Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Advertisements

SECAM Systems Product Presentation SECAM Systems © 2010.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Chapter 7 Other Requirements Good Fast Cheap Pick any two. 1CS John Cole.
Effective Design of Trusted Information Systems Luděk Novák,
Virginia Tech Policy for Mobile Communication Devices Business Practices Seminar April 9, 2015 Joe Belcher and Meghan Seifert.
Auditing Computer Systems
Chapter 19: Network Management Business Data Communications, 4e.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Group Members JimyLeah Castro - Data Analysis Jeremy Chan - Hardware Architecture Eric Lee - Software Development Sae Yoon - Signal Analysis.
ECE 415 Senior Design Project Fall 2010 Justin Ayvazian Ben Johnson Eric Putney Michael Ruth Advisor: Professor Sandip Kundu Friend-Foe Identification.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer 2003.
IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2004.
WBS & AO Controls Jason Chin, Don Gavel, Erik Johansson, Mark Reinig Design Meeting (Team meeting #10) Sept 17 th, 2007.
Performed by: Gadi Marcu & Tomer Alon Instructor: Erez Zilber המעבדה למערכות ספרתיות מהירות High speed digital systems laboratory הטכניון - מכון טכנולוגי.
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Manfred Kochsiek Wilfried Schulz Physikalisch-Technische Bundesanstalt Braunschweig und Berlin Modernisation of Legal Metrology in Germany.
Viking Pump Flow Manager - Phase 2 Senior Design May
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Chapter 5CSA 217 Design in Construction Chapter 5 1.
1 / 38 Introduction Compatibility Modular Concept WELMEC 2.4 Buenos Aires INIT Oliver Mack; Sascha Mäuselein The Modular Concept For Load Cells Conclusion.
Software Quality Assurance Lecture 4. Lecture Outline ISO ISO 9000 Series of Standards ISO 9001: 2000 Overview ISO 9001: 2008 ISO 9003: 2004 Overview.
INFORMATION SYSTEMS Overview
Group 8 Dennis Pimentel Dale Tikasingh Emilio Fernandez Florida International University 20 April 2006 TDL POWER TDL.
Internet Information Services 7.0 Infrastructure Planning and Design Series.
Course Presentation EEL5881, Fall, 2003 Project: Network Reliability Tests Project: Network Reliability Tests Team: Gladiator Team: Gladiator Shuxin Li.
PUBLIC SECTOR FINANCIAL CONTROL OF THE REPUBLIC OF LITHUANIA By Ms Daina Vaivadienė Chief Specialist of the Internal Audit and Financial Control Methodology.
Product Development Chapter 6. Definitions needed: Verification: The process of evaluating compliance to regulations, standards, or specifications.
Inquiry Results and Revision Plan Draft Title: Vehicle speed measurement systems.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Product Documentation Chapter 5. Required Medical Device Documentation  Business proposal  Product specification  Design specification  Software.
Evaluation Criteria. What is Evaluation? Happens at Last phase of PSM This is NOT testing NOT finding faults to fix! DOESN’T improve the system, but facilitate.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Environmental Management System Definitions
Automated Flight Following A Technical Look….Past and Future Mike Russo – Technical Analyst Ministry of Forests and Range, Protection Branch Victoria BC,
Eliza de Guzman HTM 520 Health Information Exchange.
Control Systems Design Part: FS Slovak University of Technology Faculty of Material Science and Technology in Trnava 2007.
ISO 9001 – an overview Tor Stålhane IDI / NTNU. ISO 9001 and software development ISO 9001 is a general standard – equally applicable to software development.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Introduction to Software Development. Systems Life Cycle Analysis  Collect and examine data  Analyze current system and data flow Design  Plan your.
FAFSA Completion Application Webinar Technical Demonstration January 13, 2015.
Group Name: oneM2M WG1 Requirements Source: Phil Hawkes, Rapporteur “Benefits of oneM2M technology” TR,
SMS Planning.  Safety management addresses all of the operational activities of the entire organization.  The four (4) components of an SMS are: 1)
Chapter 2 Securing Network Server and User Workstations.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Designing a Voice Activated Compartmentalized Safe with Speech Processing using Matlab Final Presentation Amy Anderson Ernest Bryant Mike Joyner Collins.
Network management system
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Smart Card And GSM Based Advanced Security System
Group Name: oneM2M WG1 Requirements Source: Phil Hawkes, Rapporteur “Benefits of oneM2M technology” TR,
Digital Rights Management for Mobiles Jani Suomalainen Research Seminar on Telecommunications Business II Telecommunications Software and Multimedia Laboratory.
XFEL The European X-Ray Laser Project X-Ray Free-Electron Laser Wojciech Jalmuzna, Technical University of Lodz, Department of Microelectronics and Computer.
Multipurpose Keychain ECE 445 Senior Design Junting Lou Yaming Tang Lida Zhu TA: Rajarshi Roy Project No. 11 Fall 2012.
ARM and GPS Based Transformer monitoring system with area Identification Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Computer Technology: Your Need to Know Chapter 1 Slide 1.
Macedonia-Skopje, 13. May 2011 Security of data and data protection in relation to visa issuance Tanja Slak.
Software Quality Control and Quality Assurance: Introduction
Security Management: Successes and Failures
Protect Your Hardware from Hacking and Theft
Security and Encryption
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Technologies and type examination
Network management system
Protect Your Hardware from Hacking and Theft
PUBLIC SECTOR FINANCIAL CONTROL OF THE REPUBLIC OF LITHUANIA
Importance of Law and Policies in the Environmental Management System
OIML Certification System (OIML-CS)
Software Interoperability.... Same game, same rules?
Presentation transcript:

Republic of Slovenia Ministry for economic relations and development Metrology Institute of the Republic of Slovenia Laboratory for Information Technology in Metrology Software requirements for OIML R91 Roman Flegar Metrology Institute of the Republic of Slovenia

Agenda Overview of development Basic rule for software requirements Goals Speed meter building blocks Software role Overview of requirements

Overview of development 2013 Novembar - Kickstart document 2014 January- Rewritten requirements 2014 April- Document completed Members: -Roman Flegar -Ambler Thompson -Ben van de Pavert -Yin Bai

Basic rule regarding software requirements Same functionality or requirement can be implemented or fulfilled on different technological bases.

Goals Simple and understandable requirements Requirements as guide for both sides: manufacturer and regulator Support future development of technology “Black box testing”: functional testing and documentation overview

Speed meter – building blocks Sensor unit Evidence unit Display unit Decision unit Remote access unit Storage unit foto km/h Offence record Offence record km/h foto

Role of the software General roles: – operating the sensor, where value of measurement is acquired, – calculating the final measurement result, based on the acquired values from sensors – displaying the result, – documenting the result with evidences, – storing of results, – transmitting of results and – securing the results against unintentional or intentional changes, ….

INTRODUCTION TO REQUIREMENTS

List of requirements Five basic software requirements groups: 1.Software identification [OIML D 31: 5.1.1] 2.Correctness of algorithms and functions [OIML D 31: 5.1.2] 3.Software protection [OIML D 31: 5.1.3] 4.Support of hardware features [OIML D 31: 5.1.4] 5.Requirements specific for configuration [OIML D 31: 5.2]

More details … 3. Software protection [OIML D 31: 5.1.3] – Prevention of misuse [OIML D 31: ] – Fraud protection [OIML D 31: ] 4.Support of hardware features [OIML D 31: 5.1.4] – Support of fault detection [OIML D 31: ] – Support of durability protection [OIML D 31: ]

More details … 4.Support of hardware features [OIML D 31: 5.1.4] – Support of fault detection [OIML D 31: ] – Support of durability protection [OIML D 31: ]

Even more details … 5. Requirements specific for configuration [OIML D 31: 5.2] – Specifying and separating relevant parts specifying interface of parts [OIML D 31: 5.2.1] – Shared indications [OIML D 31: 5.2.2] – Storage of data, transmission via communication systems [OIML D 31: 5.2.3] – Compatibility of operating system and hardware, portability [OIML D 31: 5.2.5] – Conformity of manufactured devices to the approved type [OIML D 31: 5.2.5] – Maintenance and re-configuration [OIML D 31: 5.2.6]

LETS GO THROUGH REQUIREMENTS…