The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes two non-uniform quantization schemes and also introduces an implementation system based on Software Defined Radio (SDR) consisting of GNU Radio and Universal Software defined Radio Peripheral (USRP) to sense a spectrum. In cognitive radio (CR) systems, detection and error probability are representative indicators of system performance. These performance indicators are influenced...
A problem of calculating the probability of a fault of software to provide the reliability of control systems is considered. Changing the computational paradigm is proposed from the universal Turing machine to quantum program. Types of errors in a quantum program and their influencing the fault probability are considered, formulae to evaluate the fault probability under constraints on the degree of...
In the world practice of designing highly reliable systems and ensuring the reliability of their operation in the process of operation is achieved through the use of specialized software complexes to determine the reliability of complex technical systems that perform the calculation of the aggregate reliability characteristics, and as a particular, simplest case, quantitative. For educational purposes,...
The paper deals with utilizing the theory of graphs methods for modelling emergency procedures onboard orbital space station. The approach at hand was implemented in software developed in Java programming system. Some results are presented below.
We proposed a new approach for target value sequencing problem using weighted evidence theory. Target value evaluation index system is constructed located at artillery battlefield, the uncertain target information are fused based on the evidence theory, the index weight is decided based on analytic network process. The case proves the reliability of the results and the validity of this method. This...
This paper presents eight casing failure modes and the corresponding limit state equations for casing in high-pressure gas well. The manufacture imperfections are considered by introducing the new calculation formulas of casing strength. According to the distribution regularities of casing performance properties, the casing reliability can be calculated with the known distribution of casing strength...
Fault Tree Analysis (FTA) is a hotspot both in academic field and in modern industry. The FTA method is a means that evaluates the system reliability and safeties, using to predict and examine the faults, analyzing the weak link of system, guiding to circulate and maintain, and the optimization design of system. Along with the technical exaltation of the computer science, the computer aided technology...
Littlewood introduced the idea that software may be possibly perfect and that we can contemplate its probability of (im)perfection. We review this idea and show how it provides a bridge between correctness, which is the goal of software verification (and especially formal verification), and the probabilistic properties such as reliability that are the targets for system-level assurance. We enumerate...
In this paper we propose an approach to the design optimization of fault-tolerant hard real-time embedded systems, which combines hardware and software fault tolerance techniques. We trade-off between selective hardening in hardware and process re-execution in software to provide the required levels of fault tolerance against transient faults with the lowest-possible system costs. We propose a system...
With the increasing complexity in software and electronics in safety-critical systems new challenges to lower the costs and decrease time-to-market, while preserving high assurance have emerged. During the safety assessment process, the goal is to minimize the risk and particular, the impact of probable faults on system level safety. Every potential fault must be identified and analysed in order to...
Soft errors are emerging as a new challenge in computer applications. Current studies about soft errors mainly focus on the circuit and architecture level. Few works discuss the impact of soft errors on programs. This paper presents a novel approach named PRASE, which can analyze the reliability of a program with the effect of soft errors. Based on the simple probability theory and the corresponding...
Software reliability represents a major requirement for safety critical applications. Several fault tolerance methods have been proposed to improve software reliability. These methods are based on either fault masking such as N-version programming or on fault detection such as in the recovery block method. The success of the recovery block method depends on a high quality of the effective acceptance...
Telecommunications systems achieve high levels of reliability by implementing detection and recovery mechanisms with high coverage. With the trend towards the use of more COTS components in these systems the choices available for the systems detection and recovery mechanisms are more limited. An escalating recovery model with varying coverage factors and recovery durations is developed to provide...
The reliability of the software of coal mine supervision system will affect the reliability of the whole system. According to Bayes theory, the purpose of the paper is to build a model which is used in assessment of the software reliability. We can use this model to analysis the reliability of software of coal mine supervision system. We can use the data of s, f, test care, and the subjective understanding...
Along with the development of object-oriented technology, component development is gradually extended to commercial off-the-shelf (COTS) components and component-based software development (CBSD) has gradually become the dominant orientation of the field of software engineering. The claims of high reliability need further investigation based on reliability analysis techniques that are applicable to...
In this paper a BISR architecture for embedded memories is presented. The proposed scheme utilises a multiple bank cache-like memory for repairs. Statistical analysis is used for minimisation of the total resources required to achieve a very high fault coverage. Simulation results show that the proposed BISR scheme is characterised by high efficiency and low area overhead, even for high defect densities...
Model-based testing is used as a cost-effective development approach especially for embedded systems in the automotive sector. In this work, we focus on two kinds of test case generation and compare two methods. Each method has different criteria for generating test cases: One is based on the theory of Markov chains and the other one is a combination of functions to get test cases for unexpected failure...
The current technical condition of an equipment is best evaluated beginning with the analysis of its components. Some of the methods used for this type of diagnose are the mathematical methods implemented in the NOVA Predict software application. This paper briefly describes the main issues which led to the designing of the NOVA Predict software application, the architecture, the function, the features...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.