軟件工程之軟件驗證計劃Software Verification Plan

個人主頁:云納星辰懷自在

座右銘:“所謂堅持,就是覺得還有希望!


本文為基于ISO26262軟件驗證計劃模板,僅供參考。

軟件驗證計劃,包括:
1. 軟件需求驗證計劃
2. 軟件架構設計驗證計劃
3. 軟件單元設計驗證計劃
4. 軟件單元驗證計劃


1. General

This document is linked to the Project plan (safety plan) of <PrjName>. The verification is carried out in the following different forms:

In the design phases, verification implies the evaluation of the work products of each phase to ensure that they comply with the requirement set out in the previous phase for correctness, completeness and consistency.

In the test phases, verification implies the evaluation of work products of a particular phase within a test environment to ensure that they comply with the requirements set out at that particular phase.

1.1 Purpose

This document outlines the verification activities and the processes used to demonstrate that <PrjName> fulfils ISO26262.

The Software verification plan aims to:

  1. Verify that the defined software requirements are fulfilled.
  2. Clarify the test strategy and test planning for software test.

1.2 Scope

The scope of this document is limited to specification of software verification activities for <PrjName>.

The specification considers the software test objectives, how to make software test plan considering test strategy to carry out software test performance and finally document within test report.

The specification considers the software test strategy and test method.

1.3 Audience

This document is only for used by the staffs and managed within XX. Anyone shall be forbidden to distribute it outside without the written permission from XX.

Copyright ? XXX Co., Ltd. 2021.


1.4 Reference Document

Table 1 Associated Regulations

ID

Associated Regulations

1

2

3

4

5

Table 2 Associated Standards

ID

Associated Standards

1

2

3

4

5

Table 3 Associated Documentations

ID

Document ID

Ver.

Author

1

<XX-SUP-P1T001_XXX-Quality Assurance Plan>

2

<XX-SW-R0T001-SOR_Basic Software Requirement>

3

<XXX-SW-R1T002_Naming Convention for Matlab>

4

<XXX-SW-R1T001_Naming Convention for C-coding>

5

<XXX-SW-G1T001_Guideline for Modelling with Matlab>

6

<XXX-SW-E1T001_XXX Software Requirement Analysis Strategy>

7

<XXX-SW-E2T002_XXX-Software Architecture Design Specification>

8

<XXX-SW-E2T003_XXX-SW Safety Analysis Report>

9

<XXX-SW-E2T001_XXX-Software Architecture Design Strategy>

10

<XXX-SW-E3T001_XXX-SwUnit Detailed Design and Implementation Strategy>

11

<XXX-SW-E3T002_XXX-SwUnit Detailed Design and Implementation Specification>

12

<XXX-SW-E4T001_XXX-SW Unit Verification Strategy>

13

<XXX-MAN-M3T011_Review Report-XXX-Software Architectural Design>

14

<XXX-MAN-M3T011_Review Report-XXX-Software Unit Design and Implementation >

15

<XXX-MAN-M3T011_Review Report-XXX-Software Unit Verification>

16

<XXX-MAN-M3T010_Checklist-XXX Software Requirements Analysis>

17

<XXX-MAN-M3T010_Checklist-XXX Software Architectural Design>

18

<XXX-MAN-M3T010_Checklist-XXX Software Unit Design and Implementation>

19

<XXX-MAN-M3T010_Checklist-XXX Software Unit Verification>

1.5 Definitions, Acronyms and Abbreviations

All terms, acronyms and abbreviations which are required to correctly interpret this document are listed in Table 4 Definitions, Table 5 Acronyms and Table 6 Abbreviations respectively.

Table 4 Definitions

ID

Definition

Explanation

1

2

Table 5 Acronyms

ID

Acronym

Explanation

1

BMS

Battery Management System

2

MIL

Model in the loop

3

SIL

Software in the loop

4

HIL

Hardware in the loop

5

SFMEA

Software Failure Mode and Effect Analysis

6

TSR

Technical Software Requirement

7

SSR

Software Safety Requirement

Table 6 Abbreviations

ID

Abbreviation

Explanation

1

2

2. Management of Software Verification Activities

This section describes the team organization, schedule, resources, responsibilities, tools, and methodologies to be applied in order to perform the software verification activities for <<PrjName>>.

2.1 Organization

The team organization and individual responsibilities are as defined in Project Plan (Safety Plan).

Table 7 Authorized User

ID

Name

Department

Title

Read

Write

Copy

1

Engineer 1

?

?

?

2

Engineer 2

?

?

?

3

Engineer 3

?

?

?

4

Engineer 4

?

?

?

5

...

?

?

?

6

...

?

?

?

2.2 Schedule

The project schedule is as defined in Project Plan (Safety Plan).

2.3 Tools and Methodology

This project will adopt the method of developing Software fusing ASPICE, the following is the list of the software tools adopted for successful completion of the project based on model-based development.

Table 8 Software unit test environment

No.

Tool

Comment

Version

QTY

1

MATLAB

...

2

Source Insight

IDE

3

Eclipse

IDE

4

ParaSoft

Do static test and unit dynamic test for hand-coding codes

5

MTest

Do unit dynamic test for Simulink models

6

WindRiver

...

7

Lauterbach

...

8

9

10

2.4 Evaluation Method

The <<PrjName>> software shall be subjected to different evaluation methods, in accordance with the verification review guidelines. The methods are (example):

  1. Inspection
  2. Review
  3. Walk through
  4. Static code analysis
  5. Dynamic code analysis
  6. SFMEA

3 Software Verification

This section of software verification plan for <<PrjName>> provides the detailed plan for the verification activities throughout the project lifecycle.

3.1 Verification of Software Requirement Phase?

3.1.1 Objective

The objective of this phase is to plan for verification of software requirements derived from the system requirements specification.

3.1.2 Inputs

The following documentations shall be provided to execute the verification of Software Requirement:

  1. SRS, incl. SSR(Function Safety)
  2. <XXX-SW-E1T001_XXX Software Requirement Analysis Strategy>
  3. <XXX-MAN-M3T010_Checklist-XXX Software Requirements Analysis>

3.1.3 Responsible person

The following person will be in charge of this phase.

ID

Name

Department

Title

1

3.1.4 Work Products

The following are the deliverables from this sub-phase.

Table 9 Verification Work products of Software (Safety) Requirement Phase

No.

Work Product

1

<XXX-MAN-M3T011_Review Report-XXX-Software Requirement Specification>

2

3

3.1.5 Verification Review Methods

The software requirements shall be verified to ensure that:

  1. The software requirements are traceable and consistent with the system requirements
  2. The software requirements are unambiguous, atomic, internally and externally consistent.

The verification review shall be performed using:

  1. <XXX-SW-E1T001_XXX Software Requirement Analysis Strategy>
  2. <XXX-MAN-M3T010_Checklist-XXX Software Requirements Analysis>

The following evaluation methods shall be applied for the verification.

Table 10 Methods for the verification of safety requirements

Methods

ASIL

A

B

C

D

1a

Verification by walk-through

++

+

o

o

1b

Verification by inspection

+

++

++

++

1c

Semi-formal verificationa

+

+

++

++

1d

Formal verificationa

o

+

+

+

a???????? Verification can be supported by executable models.

3.1.6 Environment

All work products of this phase should pass the verification review, all the tools used in verification as below:

Table 11 SSR Verification Environment

No.

Tool

Comment

Version

QTY

1

OFFICE

2

Doors

3

4

5

3.1.7 Entry/Exit Criteria

All deviations observed in verification should be addressed based on checkpoint questions provided in the checklist. All work products of this phase must be complete and approved.

3.1.7.1 Entry Criteria

Following are entry criteria for software (safety) requirements:

  1. System Requirements Specification (Incl. Technical Safety Requirements) has been baselined in System Requirements Process.
  2. Configuration Data Specification and Calibration Data Specification have been baselined in System Requirements Process.
  3. System Design Specification (Incl. Technical Safety Concept) has been baselined in System Design Process.
  4. Hardware Software Interface Specification has been baselined in System Design Process.
  5. Software Requirements Specification Verification Review Checklist should be available.

3.1.7.2 Exit Criteria

Following are exit criteria for software (safety) requirements:

  1. Software Requirements Specification has been approved and baselined.
  2. Software Requirements Specification Verification Review Report has been approved.
  3. Address all issues reported during verification.

3.2 Verification of Software Architecture Design

3.2.1 Objective

The objective of this phase is to plan for verification of software architectural design which is derived from software requirements specification。

3.2.2 Inputs

The following documentations shall be provided to carry out the verification of Software Architectural Design:

  1. SRS, incl. SSR(Function Safety)
  2. <XXX-MAN-M3T010_Checklist-XXX Software Architectural Design Checklist>

3.2.3 Responsible person

The following person will be in charge of this phase.

ID

Name

Department

Title

1

3.2.4 Work Products

The following are the deliverables from this sub-phase.

Table 12 Verification Work products of Software Architecture Design phase

No.

Work Product

1

<XXX-SW-E2T003_XXX-SW Safety Analysis Report>

2

<XXX-MAN-M3T011_Review Report-XXX-Software Architectural Design>

3

<XXX-SW-E2T002_XXX-Software Architecture Design Specification>

3.2.5 Verification Review Methods

The software architectural design verification shall ensure that:

  1. The software architectural design shall comply with the software requirements
  2. The software architectural design shall be developed as a guideline for software unit detailed design.

The verification review shall be performed using:

  1. <XXX-SW-E1T001_XXX Software Requirement Analysis Strategy>
  2. <XXX-MAN-M3T010_Checklist-XXX Software Requirements Analysis>

The following evaluation methods shall be applied for the verification.

Table 13 Methods for the verification of safety architectural design

Methods

ASIL

A

B

C

D

1a

Walk-through of the designa

++

+

o

o

1b

Inspection of the designa

+

++

++

++

1c

Simulation of dynamic behaviour of the design

+

+

+

++

1d

Prototype generation

o

o

+

++

1e

Formal verification

o

o

+

+

1f

Control flow analysisb

+

+

++

++

1g

Data flow analysisb

+

+

++

++

1h

Scheduling analysis

+

+

++

++

a???????? In the case of model-based development, these methods can also be applied to the model.
b??????? Control and data flow analysis can be limited to safety-related components and their interfaces.

3.2.6 Environment

All work products of this phase should pass the verification review, all the tools used in verification as below:

Table 14 Software Architectural Design Verification Environment

No.

Tool

Comment

Version

QTY

1

OFFICE

2

Doors

3

4

5

3.2.7 Entry/Exit Criteria

All deviations observed in verification should be addressed based on checkpoint questions provided in the checklist. All work products of this phase must be complete and approved.

3.2.7.1 Entry Criteria

Following are entry criteria for software (safety) requirements:

  1. Software Requirements Specification (Incl. Software Safety Requirements) has been baselined in Software Requirements Process.
  2. Configuration Data Specification and Calibration Data Specification have been baselined in Software Requirements Process.
  3. Hardware Software Interface Specification has been baselined in System Design Process.
  4. Software Architectural Design Specification Verification Review Checklist should be available.

3.2.7.2 Exit Criteria

Following are exit criteria for software architecture design:

  1. Software Architectural Design Specification has been approved and baselined.
  2. Software Architectural Design Specification Verification Review Report has been approved.
  3. Address all issues reported during verification.

3.3 Verification of Software Unit Design and Implementation

3.3.1 Objective

The objective of this phase is to plan for verification of software unit design and implementation which is derived from software architectural design.

3.3.2 Inputs

The following documentations shall be provided to carry out the verification of Software Unit Design:

  1. SRS, incl. SSR(Function Safety)
  2. <XXX-SW-E2T002_XXX-Software Architecture Design Specification>
  3. <XXX-SW-G1T001_Guideline for Modelling with Matlab>
  4. <XXX-SW-R1T001_Naming Convention for C-coding>
  5. <XXX-SW-R1T002_Naming Convention for Matlab>
  6. <XXX-SW-E3T002_XXX-SwUnit Detailed Design and Implementation Specification>
  7. <XXX-SW-E3T001_XXX-SwUnit Detailed Design and Implementation Strategy>
  8. <XXX-MAN-M3T010_Checklist-XXX Software Unit Design and Implementation>

3.3.3 Responsible person

The following person will be in charge of this phase.

ID

Name

Department

Title

1

3.3.4 Work Products

The following are the deliverables from this sub-phase.

Table 15 Verification Work products of Software Unit Design and Implementation

No.

Work Product

1

<XXX-MAN-M3T011_Review Report-XXX-Software Unit Design and Implementation >

2

3

3.3.5 Verification Review Methods

The verification shall comply with the following:

  1. The software requirements shall be traceable to the allocated software units.
  2. The compliance of implemented model and the source code with the software unit design specification.
  3. The Software Unit Design Specification is developed per <XXX-SW-E3T001_XXX-SwUnit Detailed Design and Implementation Strategy>.
  4. The implemented model and source code comply with <XXX-SW-G1T001_Guideline for Modelling with Matlab>.
  5. Static code analysis and semantic analysis is executed on the auto generated source code.

The following evaluation methods shall be applied for the verification review. The verification review shall be performed using Software Design Guidelines and Software Unit Design Specification Checklist.

Table 16 Methods for the Verification of Software Design and Implementation

Methods

ASIL

A

B

C

D

1a

Walk-through of the design

++

+

o

o

1b

Inspection of the design

+

++

++

++

1c

Semi-formal verification

+

+

+

++

1e

Formal verification

o

+

+

+

3.3.6 Environment

All work products of this phase should pass the verification review, all the tools used in verification as below:

Table 17 Software Unit Design Verification Environment

No.

Tool

Comment

Version

QTY

1

IDE

Source Insight, Eclipse, etc.

2

MATLAB

3

4

5

3.3.7 Entry/Exit Criteria

All deviations observed in verification should be addressed based on checkpoint questions provided in the checklist. All work products of this phase must be complete and approved.

3.3.7.1 Entry Criteria

Following are entry criteria for software (safety) requirements:

  1. Configuration Data Specification and Calibration Data Specification have been baselined in System Requirements Process
  2. Software Requirements Specification (Incl. Software Safety Requirements) has been baselined in Software Requirements Process.
  3. Software Architectural Design Specification has been baselined in Software Architectural Design Process

3.3.7.2 Exit Criteria

Following are exit criteria for Software Unit Design and Implementation:

  1. Software Unit Design Specification has been approved and baselined.
  2. Software Unit Design Specification Verification Review Report has been approved.
  3. Address all issues reported during verification.

3.4 Verification of Software Unit Verification

3.4.1 Objective

The objective of this phase is to plan for software unit verification in order to demonstrate that the software units fulfill the software unit requirements and do not contain undesired functionality.

3.4.2 Test Strategy

Software unit verification strategy is in order to reduce software development risks, time, and cost. In this phase, interfaces tested for proper information flow and all error handling paths should be tested. Software unit tests are expected to against state machines in the software unit design.

3.4.3 Regression Test Strategy

Software unit verification phase shall be executed for the impacted units based on the updated Software Unit Test Specification. Check for defects propagated to other modules by changes made to existing program. Additional test cases focus on software functions likely to be affected by the change. Regression Tests cases focus on the changed software units.

3.4.4 Inputs

The following documentations shall be provided to carry out the verification of Software Unit Verification:

  1. <XXX-SW-E4T001_XXX-SW Unit Verification Strategy>
  2. <XXX-MAN-M3T010_Checklist-XXX Software Unit Verification>
  3. Software Unit Test Case
  4. Software Unit Test Report

3.4.5 Responsible person

The following person will be in charge of this phase.

ID

Name

Department

Title

1

3.4.6 Work Products

The following are the deliverables from this sub-phase.

Table 18 Verification Work products of Software Unit Verification

No.

Work Product

1

<XXX-MAN-M3T011_Review Report-XXX-Software Unit Verification>

<XXX-MAN-M3T011_Review Report-XXX-Software Unit Design and Implementation >

2

Software Unit Test Report

3

3.4.7 Verification Review Methods

The verification review shall be performed to ensure that

  1. There exists at least one test case for each software unit deign requirement.
  2. The tests are traceable to the software unit design requirements.
  3. The tests have been performed in accordance with the methods identified in Project Plan (Safety Plan).
  4. The tests produce the same results and the coverage as reported.
  5. In case of acceptable test failures or incomplete coverage, there exists valid justification recorded.

The following evaluation methods shall be applied for the verification review. The verification review shall be performed using Software Design Guidelines and Software Unit Design Specification Checklist.

Table 19 Methods for the Verification of Software Unit Verification

No.

Inputs for Verification Review

Walk-through

Inspection

1

Software Unit Test Case

No

Yes

2

3

3.4.8 Test Methods

The methods specified in the following table shall be applied for verification. The verification shall be performed using Software Unit Test Guideline and Software Unit Test Specification Checklist. The detailed requirements refer to <XXX-SW-E4T001_XXX-SW Unit Verification Strategy>.

Table 20 Methods for Software Unit Verification

Method

ASIL

A

B

C

D

1a

Walk-through

++

+

o

o

1b

Pair-programming

+

+

+

+

1c

Inspection

+

++

++

++

1d

Semi-formal verification

+

+

++

++

1e

Formal verification

o

o

+

+

1f

Control flow analysis

+

+

++

++

1g

Data flow analysis

+

+

++

++

1h

Static code analysis

++

++

++

++

1i

Static analyses based on abstract interpretation

+

+

+

+

1j

Requirements-based test

++

++

++

++

1k

Interface test

++

++

++

++

1l

Fault injection test

+

+

+

++

1m

Resource usage evaluation

+

+

+

++

1n

Back-to-back comparison test between model and code, if applicable

+

+

++

++

Table 21 Methods for deriving test cases for software unit testing

Method

ASIL

A

B

C

D

1a

Analysis of requirements

++

++

++

++

1b

Generation and analysis of equivalence classes

+

++

++

++

1c

Analysis of boundary values

+

++

++

++

1d

Error guessing based on knowledge or experience

+

+

+

+

Table 22 Structural coverage metrZD at the software unit level

Method

ASIL

A

B

C

D

1a

Statement coverage

++

++

+

+

1b

Branch coverage

+

++

++

++

1c

MC/DC (Modified Condition/Decision Coverage)

+

+

+

++

3.4.9 Environment

All work products of this phase should pass the verification review, all the tools used in verification as below:

Table 23 Software Unit Verification Environment

No.

Tool

Comment

Version

QTY

1

2

3

4

5

3.4.10 Entry/Exit Criteria

All deviations observed in verification should be addressed based on checkpoint questions provided in the checklist. All work products of this phase must be complete and approved.

3.4.10.1 Entry Criteria

Following are entry criteria for software (safety) requirements:

  1. Configuration Data Specification and Calibration Data Specification have been baselined in System Requirements Process
  2. Software Requirements Specification (Incl. Software Safety Requirements) has been baselined in Software Requirements Process.
  3. Software Architectural Design Specification has been baselined in Software Architectural Design Process

3.4.10.2 Exit Criteria

Following are exit criteria for Software Unit Design and Implementation:

  1. Software Unit Design Specification has been approved and baselined.
  2. Software Unit Design Specification Verification Review Report has been approved.
  3. Address all issues reported during verification.

3.4.11 Software Unit Verification Method

XXX will demand to do the software unit test according to the software unit verification strategy.

The methods for SwUnit verification could be seen as below. XXX will adopt these methods marked with orange.

Table 24 Methods for Software Unit Verification

No.

Methods

Comment

Select

A

B

C

D

1a

Walk-through

++

+

O

O

R

1b

Pair-programming

+

+

+

+

R

1c

Inspection

+

++

++

++

R

1d

Semi-formal verification

+

+

++

++

1e

Formal verification

O

O

+

+

1f

Control flow analysis

+

+

++

++

1g

Data flow analysis

+

+

++

++

1h

Static code analysis

++

++

++

++

R

1i

Static analyses based on abstract interpretation

+

+

+

+

R

1j

Requirements-based test

++

++

++

++

R

1k

Interface test

++

++

++

++

R

1l

Fault injection test

+

+

+

++

R

1m

Resource usage evaluation

+

+

+

++

1n

Back-to-back comparison test between model and code, if applicable

+

+

++

++

Refer to ISO 26262-6 § 9.4.2 Table 7, the “check symbol” means will adopt this method.


未完待續。。。


參考文章

LINK

資源下載:TBD

本文來自互聯網用戶投稿,該文觀點僅代表作者本人,不代表本站立場。本站僅提供信息存儲空間服務,不擁有所有權,不承擔相關法律責任。
如若轉載,請注明出處:http://www.pswp.cn/news/898634.shtml
繁體地址,請注明出處:http://hk.pswp.cn/news/898634.shtml
英文地址,請注明出處:http://en.pswp.cn/news/898634.shtml

如若內容造成侵權/違法違規/事實不符,請聯系多彩編程網進行投訴反饋email:809451989@qq.com,一經查實,立即刪除!

相關文章

SpringBoot之如何集成SpringDoc最詳細文檔

文章目錄 一、概念解釋1、OpenAPI2、Swagger3、Springfox4、Springdoc5. 關系與區別 二、SpringDoc基本使用1、導包2、正常編寫代碼&#xff0c;不需要任何注解3、運行后訪問下面的鏈接即可 三、SpringDoc進階使用1、配置文檔信息2、配置文檔分組3、springdoc的配置參數**1. 基…

SpringBoot3+Vue3開發學生成績管理系統

系統介紹 此系統功能包含&#xff1a;首頁、課程管理、成績查詢、成績詳情、班級管理、專業管理、用戶管理等功能。用戶管理又細分為賬號管理、學生管理、教師管理、管理員管理。 基礎功能包含&#xff1a;登錄、退出、修改登錄人信息、修改登錄人密碼。 分為4種角色&#x…

康謀方案 | AVM合成數據仿真驗證方案

隨著自動駕駛技術的快速發展&#xff0c;仿真軟件在開發過程中扮演著越來越重要的角色。仿真傳感器與環境不僅能夠加速算法驗證&#xff0c;還能在安全可控的條件下進行復雜場景的重復測試。 本文將分享如何利用自動駕駛仿真軟件配置仿真傳感器與搭建仿真環境&#xff0c;并對…

深入解析 Java Stream API:從 List 到 Map 的優雅轉換!!!

&#x1f680; 深入解析 Java Stream API&#xff1a;從 List 到 Map 的優雅轉換 &#x1f527; 大家好&#xff01;&#x1f44b; 今天我們來聊聊 Java 8 中一個非常常見的操作&#xff1a;使用 Stream API 將 List 轉換為 Map。&#x1f389; 具體來說&#xff0c;我們將深入…

配置銀河麒麟V10高級服務器操作系統安裝vmware tools。在您的計算機上尚未找到用于此虛擬機的 VMwareTools。安裝將無法繼續。

配置銀河麒麟V10高級服務器操作系統安裝vmware tools 下載VMwareTools安裝包 通過網盤分享的文件&#xff1a;VMwareTools-10.3.25-20206839.tar.gz 鏈接: https://pan.baidu.com/s/1EgMcqbIEur4iyHu2l0v_gQ?pwdrc8m 提取碼: rc8m 通過工具上傳到指定目錄&#xff0c;然后切換…

突破 HTML 學習瓶頸:表格、列表與表單的學習進度(一)

HTML 學習之困&#xff0c;如何破局&#xff1f; 作為一名熱衷于網頁開發的博主&#xff0c;在 HTML 的學習道路上&#xff0c;我可謂是 “過關斬將”&#xff0c;但也遇到過不少 “硬茬”。起初&#xff0c;當我滿心歡喜地以為掌握了基本的 HTML 標簽&#xff0c;就能輕松搭建…

理一理Mysql日期

在 MySQL 數據庫中&#xff0c;關于日期和時間的類型主要有以下幾種&#xff1a; 1. **DATE**: 僅存儲日期部分&#xff0c;格式為 YYYY-MM-DD&#xff0c;例如 2023-10-31。 2. **TIME**: 僅存儲時間部分&#xff0c;格式為 HH:MM:SS&#xff0c;例如 14:30:00。 3. **DATE…

CEF 多進程模式時,注入函數,獲得交互信息

CEF 控制臺添加一函數,枚舉 注冊的供前端使用的CPP交互函數有哪些-CSDN博客 上篇文章,是在模擬環境,單進程中設置的,這篇文章,將其改到正常多進程環境中設置。 對應于工程中的 CEF_RENDER項目 一、多進程模式中,改寫 修改步驟 1、注入函數 client_app_render.cpp 在…

C++ 介紹STL底層一些數據結構

c 標準模板庫中&#xff0c;set和map的底層實現通常基于紅黑樹&#xff0c;然們都是平衡二叉搜索樹(Balanceed Binary Serach Tree&#xff09;的一種,這種結構保證了 插入&#xff0c;刪除&#xff0c;查找的時間復雜度為O(log n)比普通二叉搜索樹更高效。 set set<T>…

在 Kubernetes(k8s)部署過程中常見的問題

在 Kubernetes(k8s)部署過程中,常見的問題主要包括以下幾類,以下是具體示例及簡要說明: 1. 資源配額不足(Resource Quota) 現象:Pod 處于 Pending 狀態,事件日志顯示 Insufficient CPU/Memory。 原因: 節點(Node)資源不足,無法滿足 Pod 的 requests 或 limits。 命…

Android Window浮窗UI組件使用JetPack

目前接手的一個業務&#xff0c;應用不是用Activity/Fragment作為界面組件&#xff0c;而是用Window浮窗的形式顯示&#xff0c;并且浮窗有很多種類型&#xff0c;每一種類型對應一類業務。那么怎么使用Jatpack的相關特性來設計架構并提高開發效率呢&#xff1f;分下面幾個模塊…

基于WebRtc,GB28181,Rtsp/Rtmp,SIP,JT1078,H265/WEB融合視頻會議接入方案

智能融合視頻會議系統方案—多協議、多場景、全兼容的一站式視頻協作平臺 OvMeet,LiveMeet針對用戶?核心痛點實現功能與用戶價值 &#xff0c;Web平臺實現MCU多協議&#xff0c;H265/H264等不同編碼監控&#xff0c;直播&#xff0c;會議&#xff0c;調度資源統一融合在一套界…

深入淺出理解LLM PPO:基于verl框架的實現解析之一

1. 寫在前面 強化學習(Reinforcement Learning,RL)在大型語言模型(Large Language Model,LLM)的訓練中扮演著越來越重要的角色。特別是近端策略優化(Proximal Policy Optimization,PPO)算法,已成為對齊LLM與人類偏好的主流方法之一。本文將基于verl框架(很多復刻De…

卷積神經網絡 - 匯聚層

卷積神經網絡一般由卷積層、匯聚層和全連接層構成&#xff0c;本文我們來學習匯聚層。 匯聚層(Pooling Layer)也叫子采樣層(Subsampling Layer)&#xff0c;其作用是進 行特征選擇&#xff0c;降低特征數量&#xff0c;從而減少參數數量。 卷積層雖然可以顯著減少網絡中連接的…

vue使用element-ui自定義樣式思路分享【實操】

前言 在使用第三方組件時&#xff0c;有時候組件提供的默認樣式不滿足我們的實際需求&#xff0c;需要對默認樣式進行調整&#xff0c;這就需要用到樣式穿透。本篇文章以vue3使用element-ui的Tabs組件&#xff0c;對Tabs組件的添加按鈕樣式進行客制化為例。 確定需要修改的組…

【工具分享】vscode+deepseek的接入與使用

目錄 第一章 前言 第二章 獲取Deepseek APIKEY 2.1 登錄與充值 2.2 創建API key 第三章 vscode接入deepseek并使用 3.1 vscode接入deepseek 3.2 vscode使用deepseek 第一章 前言 deepseek剛出來時有一段時間余額無法充值&#xff0c;導致小編沒法給大家發完整的流程&…

【藍橋杯速成】| 9.回溯升級

題目一&#xff1a;組合綜合 問題描述 39. 組合總和 - 力扣&#xff08;LeetCode&#xff09; 給你一個 無重復元素 的整數數組 candidates 和一個目標整數 target &#xff0c;找出 candidates 中可以使數字和為目標數 target 的 所有 不同組合 &#xff0c;并以列表形式返…

【C++進階】深入探索類型轉換

目錄 一、C語言中的類型轉換 1.1 隱式類型轉換 1.2. 顯式類型轉換 1.3.C語言類型轉換的局限性 二、C 類型轉換四劍客 2.1 static_cast&#xff1a;靜態類型轉換&#xff08;編譯期檢查&#xff09; 2.2 dynamic_cast&#xff1a;動態類型轉換&#xff08;運行時檢查&…

代碼隨想錄_動態規劃

代碼隨想錄 動態規劃 509.斐波那契數 509. 斐波那契數 斐波那契數 &#xff08;通常用 F(n) 表示&#xff09;形成的序列稱為 斐波那契數列 。該數列由 0 和 1 開始&#xff0c;后面的每一項數字都是前面兩項數字的和。也就是&#xff1a; F(0) 0&#xff0c;F(1) 1 F(n…

計算機基礎:編碼03,根據十進制數,求其原碼

專欄導航 本節文章分別屬于《Win32 學習筆記》和《MFC 學習筆記》兩個專欄&#xff0c;故劃分為兩個專欄導航。讀者可以自行選擇前往哪個專欄。 &#xff08;一&#xff09;WIn32 專欄導航 上一篇&#xff1a;計算機基礎&#xff1a;編碼02&#xff0c;有符號數編碼&#xf…