The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a new maintenance modeling for evaluating Mean Time To Repair (MTTR) of complex systems based on Goal Orient (GO) method. First, the GO operation formulas of MTTR for the frequently-used GO operators are proposed. Then, the system MTTR evaluation process of this paper' method is formulated. Finally, this paper's method is used to evaluate the MTTR of a hydraulic oil supply system...
The world is witnessing exploding interests in big data and its analytics, which makes data a critical and relevant asset more than ever for today's organizations. However, without a proper understanding to security and privacy requirements, data might hardly be used to its full power. Data owners and users can be in risk in terms of information security and privacy when sharing their data and running...
As government agencies and enterprises become increasingly interested in including the climate factors into their decision making and management processes, there is growing demand for easy-to-use cost-effective climate characterization tools. Among the various kinds of climate characterization tools, climate models are most commonly accepted as an effective tool for summarizing known climate information...
This paper argues about a new conceptual modeling language for the White-Box (WB) security analysis. In the WB security domain, an attacker may have access to the inner structure of an application or even the entire binary code. It becomes pretty easy for attackers to inspect, reverse engineer, and tamper the application with the information they steal. The basis of this paper is the 14 patterns developed...
Today's service systems are growing more complex and dynamic due to the coupling of functionalities required under different contexts, which asks for extra effort from both service users and services developers. An ideal service system shall provide just right functionalities and just enough qualities to its user under a given usage context. Moreover, the service shall adapt itself when requirements...
Aiming at the disadvantage of existing equipment maintainability comprehensive evaluation method, this paper studies the equipment maintainability parameter system, and the feasibility of Grey Theory applied in equipment maintainability parameter evaluation. The model of multi-hierarchal gray correlation degree is studied, and at last is verified by an example. It provides a basis on maintainability...
Software reuse aims to eliminate repetitive system development efforts, and improve the quality of software by using proven solutions to business analysis, system design and implementation. This paper proposes the combined use of multiple modelling languages to support the reuse of engineering artifacts at different abstraction levels. In particular, an agent-oriented requirement modelling language,...
Various governmental or academic institutes survey current security trends, and report vulnerabilities, security breaches, and their costs. However, it is unclear whether (and how) practitioners analyze these vulnerabilities and attacks to arrive at security requirements and decide on security solutions. What modeling methods are used for eliciting, analyzing, and documenting security requirements...
We investigate the a-Si:H tandem solar cell by modeling band-tail parameters, and demonstrate a generic simulation platform for tandem, and surface-roughened amorphous silicon solar cell based on our understanding on the band-tail theory.
The dual-material gate and asymmetrical halo structure is used in surrounding gate MOSFET to improve the performance. By treating the device as three surrounding-gate MOSFETs connecting in series and maintaining current continuity, a comprehensive drain current model is developed for it. It is concluded that the device also exhibits increased current drivability and improved hot carrier reliability...
Modeling high-level enterprise strategies helps clarify the intentional dependencies between the organizational actors. Business process models, on the other hand, give more elaborated descriptions to the enterprise daily operations. In this paper, we aim to synthesize these two modeling perspectives by synthesizing the i* model and the UML activity diagram.
Through analyzing the simulation process of the brake test-bed, using a single-loop and a double-loop control model, this paper proposes that regarding the drive current as the control point, and on this basis, establishing a non-linear control model based on single neuron self-adaptivity. Then, this paper analysis these models using computer simulation. At last, the results shows that under the self-adaptive...
The paper points out the supply chain with one manufacturer and two markets. The strategies of adding price and discriminate price are adopted for manufacturer in order to make the profit maximize. Compared to the normal price strategy, the maximum profit is obtained for manufacturer which the two price strategies are adopted for the two markets at the same time. Finally, a numerical example is given...
Risk management and assessment of software project is highly relevant to the social and culture context of the development activities. This paper proposes a risk analysis approach which represents the organizational settings of a project as a social dependency network, and identifies risks originated from broken role dependency relations, unsatisfied goals, unfinished tasks, and unavailable resources...
As people start to realize how poorly documented and managed requirements can affect the success of a software project, requirements engineering education start to attract growing attention in software institutes and companies in China. This paper reports our considerations regarding course materials selection, course projects design and evaluation to better balance the needs of training future requirements...
This paper reports our experiences in analyzing service models based on the Service Requirements Modelling Ontology (SRMO) with an agent-oriented reasoning procedure. The service model in this paper adopts concepts from the strategic actor based early requirements modelling framework i* and extended with service manipulation rules. By mapping a static conceptual service model into a runtime situation,...
At the present time, requirements knowledge is mainly in the possession of requirements experts and senior experienced practitioners, which is often implicit and pragmatic to share with novices. Requirements patterns aim to help derive complete, consistent, and implementable requirements specifications from rough sketches of the problem context. In this paper, we propose to use semi-formal approaches...
The paper discusses the cooperation method among multiple agents in 3D space based on intention recognition. It is assumed that an observer observes multiple moving objects that are its company and the enemy. The purpose of our work is to help the observer to make cooperation decision efficiently. Due to the distortions the perspective brings, cooperating in 3D space is difficult. To contact agents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.