Configuring systems verification, validation and testing plan under various constraints and unpredicted events

Jacob Shabi, Yoram Reich*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Verification, Validation and Testing (VVT), are important system engineering activities that need to be exercised continuously during the life cycle of any product. As in reality, the program manager may need to address the VVT strategy during the following two phases: the planning phase, in which different VVT plans are explored to choose an optimal strategy; and the execution phase, in which uncertainty unfolds and the program manager has to deal and also manage unforeseen events. A cost-effective approach to the VVT strategy would emphasise the ability to make tradeoffs and configure a VVT plan by estimating project budget, duration, risk and resources. We present a generalised model for configuring system design and tailor it to generate the optimal VVT methods in the VVT process. We focus both on the sensitivity analysis of the analytical model to the variability of model inputs and also address the uncertainty aspects of the model to demonstrate the robustness of our model. We also discuss the generalised model flexibility to adapt and address other engineering issues; for example, tailoring the model to minimise resources as opposed to maximising quality in the VVT process, or even identifying and managing overspecification in projects.

Original languageEnglish
Pages (from-to)369-393
Number of pages25
JournalInternational Journal of Product Development
Volume25
Issue number4
DOIs
StatePublished - 2021

Keywords

  • Cost-to-complete
  • Model flexibility
  • Quality management
  • Reliability
  • Risk
  • Safety
  • Sensitivity analysis
  • System testing
  • Time-to-complete
  • Uncertainty analysis method robustness
  • Validation
  • Verification

Fingerprint

Dive into the research topics of 'Configuring systems verification, validation and testing plan under various constraints and unpredicted events'. Together they form a unique fingerprint.

Cite this