The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One major problem in service design is the limited availability of information gathered during the development process. In particular, information on end-user requirements is difficult for designers, developers, and maintainers to access. Here, we provide a mechanism that supports the gathering and modeling of various types of information throughout the service and software development life cycle...
Soft errors, caused by radiation, have become a major challenge in today's computer systems and networking equipment, making it imperative that systems be designed to be resilient to errors. Error injection is a powerful approach to evaluate system resilience, and current practice is to inject errors in architectural registers of processors, program variables of applications, or storage elements in...
In order to implement message processing flexibility, easy scalability and fault tolerance, it created a general model that dynamically parsed the transaction message. Firstly, it offered a general definition for message (as definition 2), message field (as definition 1), and the relation between them (as definition 3 and 4), secondly, it described the key objects of model and the relational model...
Model verification and validation are defined, and why model verification and validation are important is discussed. The three approaches to deciding model validity are described. A graphical paradigm that shows how verification and validation are related to the model development process and a flowchart that shows how verification and validation is part of the model development process are presented...
There is a growing interest to understand the fundamental principles of how epidemic, ideas or information spread over large networks (e.g., the Internet or online social networks). Conventional approach is to use SIS models (or its derivatives). However, these models usually are over-simplified and may not be applicable in realistic situations. In this paper, we propose a generalization of the SIS...
In this paper, a method of fault estimation based on unknown input observer is presented for a class of neutral time-delay system. First, an unknown input observer is described to achieve fault estimation for neutral time-delay system with a constant delay. An observability condition is generated to guarantee observer use. Then, the observer is used to generate an algebraic method of actuator fault...
In this paper, a new microrobot design and its analytical analysis have been proposed, investigated and expected to improve the performance, robustness and fabrication process for microrobot-based applications. The analytical model has been developed to predict and compare the performance of the proposed design and conventional one, where the comparison of microrobot architectures shows that the proposed...
Distributed systems can be characterized by processes that communicate with each other by message passing, through communication channels, and may be located at several computers spread over a communication network. These processes and communication channels are usually characterized by synchronous or asynchronous timeliness behavior, according to the characteristics of underlying system (operating...
Data mining is the process of analyzing data from different viewpoints and summarizing it into useful information. Clustering is the process of grouping of similar objects together. The group of the objects is called the cluster which contains similar objects compared to objects of the other cluster. Different clustering algorithm can be used according to the behavior of data. Farthest first algorithm...
Knowledge sharing is an important component of knowledge management systems. Security knowledge sharing substantially reduces risk and investment in information security. Despite the importance of information security, little research based on knowledge sharing has focused on the security profession. Therefore, this study analyses key factors, containing attitude, self-efficacy, personal outcome expectation,...
With the prevalence of geo-position devices GPS and smart phones, textual information, long or short, associated with GPS tags usually denoted by a coordinate with latitude and longitude is widely encountered on the Web. For example, in Twitter, smart phones record the location of every tweet after it is authorized. The spatial objects on Google map are also presented with some textual descriptions...
This paper describes a statistical method for test completeness verification. The method is based on analyzing programs and mathematical models of discrete devices with introduced defects. It is proposed in the paper that the method allows largely reducing the time it takes to evaluate the tests by introducing multiple defects on the one hand, and, by using the results of the analysis of tests performed...
Method of computer diagnosing is proposed by using the cluster analysis that allowed formalizing the complex processes of the identification and preventing the emergency conditions of quasi-stationary control objects. The method creates a possibility of the real time diagnosis and differentiation of diagnosed conditions as well as accounting the sliding correlation characteristics.
It is very important to study computer network intrusion effect evaluation on studying security of computer network information system and harmfulness of computer network intrusion behavior. This is a concise overview paper about main research results and development foreground of computer network intrusion effect evaluation. In this paper we focus on the research results of the follow aspects: formal...
Caches are widely used in computers. This paper proposes an algorithm to increase the number of cache ways in w-way set associative cache to maximum of 2w ways. The addresses resulting in conflict miss to a set are placed in other_set. The other set is chosen as the set with maximum vacant cache ways. The least recently used cache way is replaced in case of no vacant cache ways in the other_set. An...
Simulation remains one of the most popular and sometimes the only method of investigation of the complex dynamical systems nowadays. The problems become more and more complicate and so simulation models become complicate and large scale too. So the modelers have to reduce the time of simulation run and overall time of the simulation model design, it's verification, validation and simulation experiment...
A novel analysis method for systems engineering based on wargaming technology is proposed. First, the essential factors and procedures of wargaming are introduced. Then, the systems engineering method based on wargaming is analyzed. At last, the systems modeling, simulating, and analyzing procedure is described in details by illustrating a living example. The characteristics and advantages of this...
This paper presents the first computer aided software analysis tool based on HOOMT (High Order Object-oriented Modeling Technique), which provides facilities for structured object-oriented analysis by integrating structured analysis and object-oriented analysis. It contains a graphical user interface for HOOMT-based modeling, supports modeling information management, and provides functionalities for...
Network-of-networks (NoN) is a graph-theoretic model of interdependent networks that have distinct dynamics at each network (layer). By adding special edges to represent relationships between nodes in different layers, NoN provides a unified mechanism to study interdependent systems intertwined in a complex relationship. While NoN based models have been proposed for cyber-physical systems, in this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.