The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article discusses the development of methodology of countering attacks based on the use of Bayes' theorem and normal distribution, where the workload, node residual energy, as well as an analysis of successful and unsuccessful network events used to compute the trust level. Estimation of the workload and the residual energy allows detecting attacks such as "Denial of Service", "Sybil"...
This research realizes the needs for organizations to increase its readiness towards the implementation of knowledge management. This study specifically analyzes factors related to knowledge management tools utilization within the organization as antecedents towards knowledge management implementation readiness. Data were gathered from 57 respondents whom were employees of a leading software development...
Difficult-to-machine materials is widely used in aerospace. Titanium alloy (Ti-6Al-4V) by using computer numerical control (CNC) machining is studied in order to improve the processing efficiency of Ti-6Al-4V. The wear amount of cutting tool as a key part of CNC is one of the most important representation for the machining efficiency and the stability for cutting difficult-to machine materials. An...
Proposed is procedure of evaluating reliability of pipelines containing crack-like defects, in stochastic setting and under consideration of the loading parameters spatial-temporal variation as well as the structure material crack resistance specifications scatter. Its basis is formed by the interpolation polynomials and Monte-Carlo methods designed for solving the statistical dynamics tasks. The...
This paper presents a summary and analysis deployment of a secure Intelligent Electronic Device (IED) management system at two different utilities in North America. Each of these utilities began their investigation into technologies and methodologies for securing their system for North America Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standards. This report is intended...
The purpose of this study was to incorporate a new format of C-Test, the S-Test, as part of the Computer-Based Test of English Competence (CB TEC). The subjects for the main study were 209 voluntary graduate students at the National Institution of Development Administration, Bangkok, Thailand. Two forms of CB TEC (Form A and Form B), with the only difference in Section II, were used with 105 participants...
Software Projects are developed with the prior requirements and should be capable to complete on time under a fixed budget but it gets late to delivered, gets over-budget and even not able to meet user expectations. In agile approach, the estimation of software depends on expert opinion or on any historical data which is used as the input to previous methods like planning poker. The accuracy in estimation...
The process of testing any software system is an atrocious task which indeed consumes a ton of effort, and expensive also. Required effort and time to do adequate as well as effective testing get bigger, as the software gets more complexed that can lead to swarm over the project budget or some test cases left uncovered or delay in completion. A suitably generated test suite does not only locate errors...
Software development is an essential field today. The advancement in software systems leads to risk of them being exposed to defects. It is important to predict the defects well in advance in order to help the researchers and developers to build cost effective and reliable software. Defect prediction models extract information about the software from its past releases and predict the occurrence of...
Security and reliability are crucial requirements of modern information systems. Therefore, appropriate error detection mechanisms are necessary, in particular in systems processing confidential or private information, i.e. modern encryptors. This paper discusses error detection in software and hardware encryption. Cryptography basics, error detection algorithms and concurrent error detection methods...
In 2015, NetFlix made the headlines with nearly 37% of Internet traffic being caused by their streaming applications1. The trend towards similar applications is further accelerated by increasing number of mobile devices used to consume high resolution video and interact with low latency. Hence, new challenges arise that can no longer be solved by solely altering the network's edge. Software-Defined...
This work develops a new basis for evaluating the reliability benefits of diverse software, based on fault injection testing. In particular, the work investigates new forms of argumentation that could in principle be used to justify diversity as a basis for the construction of safety claims. Failure distributions of two versions of diverse software under various fault conditions are revealed separately...
Underwater Acoustic Networks (UANs) are widely used in various applications such as climate change monitoring, pollution control and tracking, tactical surveillance and offshore exploration. However, limited consideration is given to the security of such networks, despite the fact that the unique characteristics of UANs make these networks vulnerable to various malicious attacks. In this paper, we...
The industrial, scientific and medical band is widely used by different wireless systems. The identification of other wireless technologies in the common environment is one of the keys for correct system coexistence. In this work, a sensing platform for the detection of IEEE 802.11g and IEEE 802.15.4 primary signals in the 2.4 GHz band is proposed. The sensing platform makes use of a combined scheme...
Unmanned Aerial Vehicles (UAVs) are increasingly demanded in civil, military and research purposes. However, they also possess serious threats to the society because faults in UAVs can lead to physical damage or even loss of life. While increasing their intelligence, for example, adding vision-based sense-and-avoid capability, has a potential to reduce the safety threats, increased software complexity...
As the demand expanding for high electrical performance, high pin count and low cost, the copper pillar bump packaging has been extensively used in recent years. However, the drawback is that copper pillar bump can introduce high stress, especially on low-k chip. In this paper, finite element method was adopted to optimize the structure of copper pillar bump, aiming at relieving the stress of low-k...
The emergence of online labor markets has concentrated a lot of attention on the prospect of using crowdsourcing for software development, with a potential to reduce costs, improve time-to-market, and access high-quality skills on demand. However, crowdsourcing of software development is still not widely adopted. A key barrier to adoption is a lack of confidence that a task will be completed on time...
Design by Contract (DbC) is a software engineering paradigm that aims to reduce the amount of source code in a computer program by avoiding redundant parameter checking. It is based on strict interface specifications, including the specification of responsibilities for checking. Although DbC potentially leads to better quality programs, it has to be supported by the programming language/environment...
The information and control system of smart building is considered as a set of subsystems including a building automation system (BAS). BAS security and availability during its life cycle are assessed using the Attack Tree Analysis (ATA) and Markov models. The ATA is applied to investigate any intrusions into the BAS by analyzing system probability of a fault/vulnerability to occur during period of...
Aimed at the needs of positioning management for important equipments at the police department, we design and implement a positioning management system based on Radio Frequency Identification, micro-controller, satellite navigation module and the network module. We present the design of the hardware circuit, the software flow chart and software interface. We also verify the accuracy and reliability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.