The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Research on education has indicated that students have different abilities and needs. In other words, they tend to learn in different ways, these ways were called a learning style. Although the learning style in many developed countries has seen a significant amount of research [1, 2], unfortunately, in Arabic region this work is still in its infancy [3–5]. The literature review revealed that there...
Typing is a well known concept to prepare services for data processing for instance by choosing the correct service to a mime type for processing. But a lot more metadata elements, like availability and access conditions, provenance, processing preconditions or integrity parameters, are useful to be known in advance for preprocessing data services. In order to expose such metadata independently from...
Cyber-physical systems are slowly emerging to dominate our world. Cyber-physical systems (CPS) are systems that tightly integrates users, devices and software. Whereas many of these systems are obviously safety-critical systems, some of them become so under special circumstances. This is the case with our focus CPS, i.e. building management systems (BMS), which are not always safety critical per se,...
Hardware errors are no longer exceptions in modern cloud data centers. Although virtualization provides software failure isolation among different virtual machines (VM), the virtualization infrastructure including the hypervisor and privileged VMs remains vulnerable to hardware errors. What makes matters worse is that such errors are unlikely bounded by the virtualization boundary and may lead to...
In SDP-based H∞ control, we often encounter numerical difficulties when solving SDPs by various pieces of software. It is empirically known that such numerical difficulty occurs if an SDP at hand or its dual has no interior point feasible solutions, and this is indeed the case of some SDPs in H∞ control. To conceive a way for getting around such numerical difficulties in a concrete problem setting,...
Software effort estimation influences almost all the process of software development such as: bidding, planning, and budgeting. Hence, delivering an accurate estimation in early stages of the software life cycle may be the key of success of any project. To this aim, many solo techniques have been proposed to predict the effort required to develop a software system. Nevertheless, none of them proved...
The electrical grid uses intelligent electronic devices, communication technologies, distributed energy resources, energy storage, and smart appliances in order to make smart grid which provides reliability and power quality. In smart grid, Advanced Metering Infrastructure (AMI) provides a two-way communication system between utilities and smart meters, as well as the ability to modify consumer demand...
Reliance to electrical energy in all sectors of life have raised concerns about supply demand mismatch leading to frequent grid outages for centralized systems. Microgrids are localized power generation units which can be a combination of mostly renewable sources, loads and storage devices. Variable nature of renewable sources, demand for long term and short term storage, depending on the user scenario...
Communication becomes core and one of the most important roles in many business practices, indeed audit as a service product is no exception to communication needs. This research is conducted to examine whether auditor's ability and willingness to communicate with client and professionalism in work as variable independent have significant impact on client responses in collaborating and supporting...
We investigate navigation algorithms, and specifically path planning, a fundamental function of autonomous robots. We formally address the issue of enhancing reliability of the widely-used A∗ path planning algorithm. In our step-wise refinement process, we capture successively more concrete specifications by transforming a high-level specification into an equivalent executable program. To elaborate...
In our age, integrated technical systems as road vehicle brake systems and their reliabilities have become important in engineering. The paper presents an application of LFTSM proposed by Pokoradi to sensitivity of risk estimation of embedded software of a new generation automotive brake system.
One of the consequence of the scaling down of latest technologies, is that digital circuits are more prone to be affected by faults caused by physical manufacturing defects, environmental perturbations (e.g., radiations, electromagnetic interference), or aging-related phenomena. Understanding the behavior of the whole system in the presence of faults affecting digital circuits is crucial for designing...
Accurate measurement of the quality of systems is crucial to building trustworthy systems. Such a measurement indicates whether a system is working properly and meeting its requirements. Although security and dependability metrics are regarded as key metrics for measuring the quality of systems, they are not sufficient for measuring the quality of systems that are placed in a multi-domain environment...
To assist the vulnerability identification process, researchers proposed prediction models that highlight (for inspection) the most likely to be vulnerable parts of a system. In this paper we aim at making a reliable replication and comparison of the main vulnerability prediction models. Thus, we seek for determining their effectiveness, i.e., their ability to distinguish between vulnerable and non-vulnerable...
A distributed system is considered that carries out computational tasks according to the master-worker paradigm. A master has a set of computational tasks to resolve. She assigns each task to a set of workers over the Internet, instead of computing the task locally. For each task each worker reply to the master with the task result. Since the task was not computed locally, the master can not trust...
There are several standardized protocols based on SpaceWire which provide data exchange between several nodes. SpaceWire is also suitable for interprocess communication (IPC), by the help of higher level protocols. However, currently there is no standardized protocol which is targeting IPC on SpaceWire networks. This paper proposes a protocol, which uses the capabilities of SpaceWire to build up networks...
The problem of software fault-tolerance is described. The fault-tolerance problem is considered as hardware faults and software errors. The software errors classification is proposed. Authors describe the computational process as treelike directed graph. Errors are bringing in the realisation of the algorithm at the stage of programming. It is cause forming “real” algorithm instead of its “theoretical”...
This paper presents a design of unique wireless remote controller, which utilizes WiFi wireless communication technology, providing a hand-held remote controller for an implantable stimulator. Based on MCU STC89C52RC, the controller is realized as a control terminal which issues instructions through WiFi module and receives the returned information, so that the controller realizes the control of the...
Human's computation power can be harnessed using the so-called Cyber-Physical-Social System (CPSS), which contains a mix of human-based and machine-based compute units. The inherent problem of human-based computation is its exposure to inevitable human errors; hence, it is not trivial to obtain a reliable CPSS. In contrast, many works for obtaining reliable machine-based system have been carried out...
The feasibility, scalability and performance of Internet-oriented Software Defined Network (SDN) are confronted with severe challenge, so it needs multiple controllers that influence every aspect of SDN performance. An effective placement algorithm of these controllers is especially important. In this paper, we formulate the Multiobjective Optimization Controller Placement (MOCP) problem and focus...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.