The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile Crowd Sensing Networks (MCSN) treat the ordinary users with their mobile devices as the basic sensing units, and leverage them to distribute complex social sensing tasks and collect sensing data with each other by the mobile networks. To improve the efficiency and the feasibility of data sensing, collection and transmission in MCSN, we propose an opportunistic data transmission mechanism based...
Phased-mission system (PMS) can have a number of mission phases with different system configurations of components. In engineering practice, there exist PMSs that have phases with time redundancy, meaning that the system is required to work in operational state for only a given duration of time within such phase, instead of all the phase duration like traditional PMS. For such complex PMS, it is not...
As bearing vibration signal is of nonlinear and nonstationary characteristics, and the condition-indicating information distribution in the vibration signal is complex, a new rolling bearing vibration signal analysis approach based on dual-entropy, holder coefficient and gray relation theory was proposed in this paper. Firstly, a dual-entropy and holder coefficient algorithm was proposed to extract...
This paper presented a method of evaluating the health of lithium battery based on the continuous hidden Markov model (CHMM). This paper focuses on how to use CHMM to build the evaluation model. The capacity of battery is chosen as the observation variable. The evaluation process is divided into two phases: leaning phase and evaluation phase. First, learning data is used to estimate the elements of...
Trust is one of the major factors that a system needs to achieve the secure interaction. Trust can represent the social and reliability perspective of the security. This characteristic makes trust the soft security factor. There are some attempts to evaluate trust, however, they do not consider the characteristics of self-adaptive systems such as self-* properties, openness, and uncertainty. In this...
In contrast to applications relying on specialized and expensive highly-available infrastructure, the basic approach of microservice architectures to achieve fault tolerance – and finally high availability – is to modularize the software system into small, self-contained services that are connected via implementation-independent interfaces. Microservices and all dependencies are deployed into self-contained...
The Failure mode, Effects and Criticality Analysis (FMECA) is one of most widely used reliability analysis method in modern engineering. The target of FMECA is to find the most hazard part of the system in order to reduce the hazard and improve the reliability. While carrying out FMECA, conventional CA methods lead to objectivity, ambiguity and human bias to the result. In order to handle these problems,...
Residual life time estimation is significant for complex systems. In this paper, a method is proposed to estimate the residual life of products on satellite platform by fusing real time updating few failure lifetime and degradation data. The linear Wiener process is adopted to model the degradation data where the drift and diffusion parameters are both assumed to be random variables. Besides, the...
Nowadays, more and more systems are coordinated and controlled to compose globally-distributed, highly-complex systems of systems (SoS). Existing testing methods focus on single devices and on performance characteristics from the network architecture upwards, but ignore the innate complexity caused by the spatial and temporal separation of these systems over vastly differing scales. As a result, quality...
A large number of studies has shown that there are significant relationships among personality, interpersonal knowledge interaction and team performance. But in exiting researches the perspective is generally static and the framework is not comprehensive enough. On the basis of summarizing and generalizing related works, a new thought is put forward to bridge the gaps of present studies. From the...
U.S. Department of Defense regulations intended to improve cybersecurity within the Defense Industrial Base may cause degradation of critical defense infrastructure. Four impediments to 'clean' compliance, environmental and internal, are detailed. Inability to functionally comply, or to correctly insure, will impact the DIB's cybersecurity decision-making at the enterprise level. Economic impact to...
An experiment was conducted to investigate network jamming attacks on an Industrial Control Systems. The Secure Water Treatment (SWaT) system was chosen to perform the experiments. Jamming attacks were launched on SWaT using software defined radio. Attacks were designed to meet attacker objectives selected from a Cyber Physical Systems specific attacker model. Attacks exposed vulnerabilities associated...
Workflow management system (WfMS) should be capable of self-autonomous non-function attributes to experience its resilience to the change of runtime environment in Business Process Management (BPM) domain. With the motivation mentioned above, we propose the resilience mechanism for WfMS, associating with the corresponding methods proposed in our early research work, engaging to achieve our final aim,...
Adaptive random testing, which is an enhanced random testing technique, has been studied for over 10 years. This paper aims to research the influence of the distance problems on the performance of adaptive random testing, where we focus on its efficiency of fault detecting. Experimental results suggest that, the fault detecting ability of adaptive random testing is influenced by the distance calculation...
Automated Modulation Classification (AMC) shows great significance for any receiver that has little knowledge of the modulation scheme of the received signal. A useful digital signal modulation recognition scheme inspired by the deep auto-encoder network is proposed in this investigation. In our proposed method, there are two deep auto-encoder networks. The system extracts the original features of...
Based on actual requirements and safety reliability requirements, this paper presents a design scheme of safety portable voice information recording equipment. There are two main parts in the whole system, one is the voice recording board and the other one is the portable military laptop. The voice recording board uses advanced RISC machines chip as the main chip equipped with real-time operating...
In Recent years, sparse representation has been significantly applied in many image processing problems, such as image restoration, face recognition and image super-resolution, and shown promising results. The key issue of sparse representation is how to find a reasonable representation dictionary, through which the image can be presented more sparsely. In this paper, we addressed the biological image...
The microblog platform treats the 'concern' as the relationship between the accounts, by which the social network of the accounts is built. In this paper, we use the PageRank algorithm to identify zombie microblog accounts. For the microblogs, the directions of the hyperlinks between the pages and the attentions of the social relations can be seen as the directed links in social network. If an account...
This position paper proposes CsPI (Cybersecurity Performance Index) as a new way to evaluate the cyber security investment decisions and measure the progresses and effects of the investments and projects. In a conventional way, cyber security budgets are usually evaluated by the return on investment (ROI), which has some undesirable side effects. Since we don't ask for return on investment for other...
This paper introduces a framework for studying resilience of networked systems in the presence of strong network externalities. The framework used in this paper explicitly incorporates costs of connection and the benefits that are received by direct and indirect access to resources. We show that this simple framework is capable of capturing the three key parameters of resilience: Magnitude of Performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.