{"id":1652,"date":"2025-07-22T20:34:52","date_gmt":"2025-07-22T16:34:52","guid":{"rendered":"https:\/\/cyberforensics.az\/?page_id=1652"},"modified":"2025-07-22T20:35:48","modified_gmt":"2025-07-22T16:35:48","slug":"iso-iec-tr-29119-112020","status":"publish","type":"page","link":"https:\/\/cyberforensics.az\/ru\/iso-iec-tr-29119-112020\/","title":{"rendered":"\u0418\u0421\u041e\/\u041c\u042d\u041a \u0422\u0420 29119-11:2020"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1652\" class=\"elementor elementor-1652\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3583b42f e-flex e-con-boxed e-con e-parent\" data-id=\"3583b42f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a4d8a4 e-flex e-con-boxed e-con e-parent\" data-id=\"5a4d8a4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3083eaab elementor-widget elementor-widget-spacer\" data-id=\"3083eaab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ad84d1a e-flex e-con-boxed e-con e-parent\" data-id=\"6ad84d1a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-41f1b5a5 e-flex e-con-boxed e-con e-parent\" data-id=\"41f1b5a5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1bf11287 elementor-widget elementor-widget-text-editor\" data-id=\"1bf11287\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"stdTitle\"><span class=\"h4 fw-normal d-block mb-2\">\u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0430\u044f \u0438\u043d\u0436\u0435\u043d\u0435\u0440\u0438\u044f \u2014 \u0422\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f<\/span><span class=\"h4 fw-semibold d-block\">\u0427\u0430\u0441\u0442\u044c 11: \u0420\u0443\u043a\u043e\u0432\u043e\u0434\u0441\u0442\u0432\u043e \u043f\u043e \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044e \u0441\u0438\u0441\u0442\u0435\u043c \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 \u0418\u0418<\/span><\/p><div class=\"d-flex justify-content-between align-items-center\"><h2>Abstract<\/h2><\/div><div><p>\u00a0<\/p><p>This document provides an introduction to AI-based systems. These systems are typically complex (e.g. deep neural nets), are sometimes based on big data, can be poorly specified and can be non-deterministic, which creates new challenges and opportunities for testing them.<\/p><p>This document explains those characteristics which are specific to AI-based systems and explains the corresponding difficulties of specifying the acceptance criteria for such systems.<\/p><p>This document presents the challenges of testing AI-based systems, the main challenge being the test oracle problem, whereby testers find it difficult to determine expected results for testing and therefore whether tests have passed or failed. It covers testing of these systems across the life cycle and gives guidelines on how AI-based systems in general can be tested using black-box approaches and introduces white-box testing specifically for neural networks. It describes options for the test environments and test scenarios used for testing AI-based systems.<\/p><p>In this document an AI-based system is a system that includes at least one AI component.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-51a87fb5 e-flex e-con-boxed e-con e-parent\" data-id=\"51a87fb5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b6a386 elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation\" data-id=\"1b6a386\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-navigation.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation\" role=\"navigation\" aria-label=\"Post Navigation\">\r\n\t\t\t<div class=\"elementor-post-navigation__prev elementor-post-navigation__link\">\r\n\t\t\t\t<a href=\"https:\/\/cyberforensics.az\/ru\/iso-iec-ts-18013-72025\/\" rel=\"prev\"><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-prev\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-left\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L127.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L201.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34z\"><\/path><\/svg><span class=\"elementor-screen-only\">Prev<\/span><\/span><span class=\"elementor-post-navigation__link__prev\"><span class=\"post-navigation__prev--label\">\u041f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0439<\/span><span class=\"post-navigation__prev--title\">\u0418\u0421\u041e\/\u041c\u042d\u041a \u0422\u0421 18013-7:2025<\/span><\/span><\/a>\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation__separator-wrapper\">\r\n\t\t\t\t\t<div class=\"elementor-post-navigation__separator\"><\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"elementor-post-navigation__next elementor-post-navigation__link\">\r\n\t\t\t\t<a href=\"https:\/\/cyberforensics.az\/ru\/iso-iec-27701\/\" rel=\"next\"><span class=\"elementor-post-navigation__link__next\"><span class=\"post-navigation__next--label\">\u0421\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439<\/span><span class=\"post-navigation__next--title\">ISO\/IEC 27701:<\/span><\/span><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-next\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewbox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><span class=\"elementor-screen-only\">\u0421\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439<\/span><\/span><\/a>\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>ISO\/IEC TR 29119-11:2020 Software and systems engineering \u2014 Software testingPart 11: Guidelines on the testing of AI-based systems Abstract \u00a0 This document provides an introduction to AI-based systems. These systems are typically complex (e.g. deep neural nets), are sometimes based on big data, can be poorly specified and can be non-deterministic, which creates new challenges [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1652","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/pages\/1652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/comments?post=1652"}],"version-history":[{"count":0,"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/pages\/1652\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyberforensics.az\/ru\/wp-json\/wp\/v2\/media?parent=1652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}