The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the Data mining process the dispensation of in sequence can be done with dissimilar ideas. An optimization is the dilemma of penetrating out the paramount announcement from all the practical solutions. Artificial Bee Colony (ABC) is proposed which is based on intelligent advancement and is defined to get the powerful and reliable solution. Process scheduling algorithm is presented under distributed...
Programming question and answer (Q&A) websites, such as Stack Overflow, gathered knowledge and expertise of developers from all over the world, this knowledge reflects some insight into the development activities. To comprehend the actual thoughts and needs of the developers, we analyzed the non-functional requirements (NFRs) on Stack Overflow. In this paper, we acquired the textual content...
Ever since the dawn of the modern avionics era features like economy of weight, power and space; improved reliability; safeguards against the lurking danger of obsolescence; efficient use of available resources such as processing power, interfaces, and memory; and change containment owing to the insertion of advanced systems; have always been imperative. Aircraft avionics architectures can be divided...
Grid computing is an emerging computing paradigm that will have significant impact on the next generation information infrastructure. Due to the largeness and complexity of grid system, its quality of service, performance and reliability are difficult to model, analyze and evaluate. In real time evaluation, various noises will influence the model and which in turn accounts for increase in packet loss...
The reliability of individual team members has a substantial and complex influence on the success of multirobot missions. When one robot fails, other robots must be retasked to complete the tasks that were assigned to the failed robot. This in turn increases the likelihood of these other robots failing, since they have more work to do. Existing multirobot task allocation systems consider robot failures...
This empirical research about the impact of capital providers and customers on the corporate strategy making process indicates: firstly,capital product context can not affect definition and impetus process directly, but has a significant positive influence on realized strategy. Secondly, the significant positive impact of product market context on definition and impetus demonstrates the project or...
We propose an efficient method to re-allocate resources available on Mobile Ad-hoc Networks in the event of a network attack or a node failure. By utilizing a structure we call a resource fitness cache, we identify a way to reduce the number of messages required to find a suitable replacement resource among remaining nodes on the network, assuming that redundancy is present in among the resources...
Survival is a key concern of many complex systems. A standard approach to maximizing the likelihood of survival is to attempt to produce a system that is as free of errors as possible. We instead propose a methodology that changes the semantics of the underlying development and execution environments to cleanly and simply obtain survival guarantees that are difficult if not impossible to obtain with...
Reliability allocation is an important step of system design. The design scheme for the system is directly under the influence of allocation results. AGREE is one major method for reliability allocation. In this paper, the deficiency of AGREE method was discussed, such as the depiction of importance and its applicability. Fault damage degree and fault influence degree were introduced. Through improvement...
Focused on the shortcomings of dealing with the evidences conflict in Dempster-Shafter combination rule and other improved algorithms, a new learnable geometric method on weighted data fusion is presented. In this method, a linear space is spanned by basic probability assignment vector over discernment frame, and the historical evidence data of each sensor in a period of time are mapped into the space...
This paper studies the Hamiltonian cycle protection method in survivable WDM mesh networks and propose a new heuristic algorithm called differentiated Hamiltonian cycle protection (DHCP). Compared to conventional algorithm, DHCP obtains significant improvement in resource utilization ratio and blocking probability.
In large-scale clusters and computational grids, component failures become norms instead of exceptions. Failure occurrence as well as its impact on system performance and operation costs have become an increasingly important concern to system designers and administrators. In this paper, we study how to efficiently utilize system resources for high-availability clusters with the support of the virtual...
The human resource is one of the determining factors which the enterprises realize production operation goal, and the important force which the society realizes the economic development and humanity's progressive. The science reasonable achievements appraisal system is the important basis which the enterprise formulates the human resources strategy and effectively implement human resources management...
This paper presents a logic diagnosis approach performed in two phases, (i) a fault localization phase searching in to the dictionary a set of suspected lines able to explain the observed errors, and (ii) a fault model allocation phase associating a set of fault models on each suspect identified in the first phase. The main advantages of this approach are that the fault localization phase is fault...
This paper presents a logic diagnosis approach targeting bridging faults. The proposed approach is performed in two phases, (i) a fault localization phase based on the single-location-at-a-time (SLAT) paradigm determining a set of suspects, and (ii) a fault model allocation phase associating a set of fault models to each suspect identified during the first phase. The main advantages of this approach...
Based on the analysis of the common method of the maintainability allocation, and for the sake of overcome the limitation of the common method--"maintainability allocation method which is pro rata for the failure rate and characteristic of design" when the design character is feckly, the method of "maintainability allocation method which is pro rata for the failure rate and characteristic...
The allocation of components to systems remains a challenge due to the components success and failure rate which is unpredictable to design engineers. Optimal algorithms often assume a restricted class for the allocation and yet still require a high-degree polynomial time complexity. Heuristic methods may be time-efficient but they do not guarantee optimality of the allocation. This paper introduces...
In order to improve the reliability, maneuverability and survivability, modern advanced aircrafts generally configure with redundant actuators. To use the potential of redundant configuration and distribute the control power into proper control surfaces, constrained control allocation is introduced to satisfy the desired objectives while avoiding saturation. This paper considers the problem of redesigning...
The p-cycles have been proved to be very effective technique of span protection due to its capacity efficiency and restoration speed. However, in most of the restored paths which are provided after the event of failure, many nodes and links are repeated. This repetition results in loop backs in the restored paths. These loop backs are totally undesirable and do not serve any purpose. In this paper...
In this paper a BISR architecture for embedded memories is presented. The proposed scheme utilises a multiple bank cache-like memory for repairs. Statistical analysis is used for minimisation of the total resources required to achieve a very high fault coverage. Simulation results show that the proposed BISR scheme is characterised by high efficiency and low area overhead, even for high defect densities...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.