The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the demand of power converter for higher power density is increasing, bonding wire failure of IGBT module becomes more severe. Accordingly, it is of great significance to investigate the reliability of bonding wire under operating condition for improving the reliability of IGBT module. In this paper, the finite element model of IGBT module was established, and a two-step indirect coupling electro-thermal-mechanical...
Accounting software development has become a high-growth industry. User satisfaction is the most widely measure used to assess information system success in Delone-McLean model. This research aims to analyze any factors measuring on the success on utilization of accounting information system by using Delone & McLean information system success model on Zahir Accounting accounting information system...
The aspect of users' behavior (user acceptance) is one of the main factors that determine the successful application of information technology. Student Center Activity and Learning of Harapan Bangsa (Scalsa SHB) brings about transformation in the method of learning from the manual system to the electronic one, which results in the attitude and behavior of the users to accept and use it. This research...
The paper introduces the problem of building diagnostic models according to knowledge engineering conceptualization and methodology, where the model is a formal and computable symbolic representation of the specific domain knowledge. Diagnostic process is conceptualized as computable inferential reasoning from observable symptoms to unobservable causes. Uncertainty inherent in such reasoning is represented...
A phased-mission system (PMS) is usually consisting of a number of non-overlapping phases, and the phases should be completed sequentially to achieve a successful mission. In practice, imperfect fault coverage (IPC) plays an important effect on the system reliability. In this paper, stochastic multi-value (SMV) models are proposed to predict the system reliability of a multi-stated PMS consisting...
In 2008, Lotfi Zadeh concluded that to make significant progress toward achievement of human level machine intelligence a paradigm shift is needed. In previous papers we introduced the computational information conservation theory (CICT) approach to get more effective and reliable cognitive, biophysical, and biomedical engineering simulation solutions. CICT new computational information conservation...
Hyperspectral sensors provides informative data in many fields related to Earth observation. On the coastal zone, the inversion of radiative transfer models of the light has shown the ability to estimate parameters characterizing the water column. Particularly the water column depth, its concentration in non-algal particles, in phytoplankton, the bottom reflectance can be retrieved. Nevertheless the...
Autonomic computing requires reliable coordination between different systems. The unexpected behavior of any component may endanger the performance of the overall system. For this reason, it is necessary to prevent and detect this type of situations and to develop methods to react accordingly and to mitigate the possible consequences. In this work, we present an analysis of the vulnerability of a...
For complex systems with many components, it is a heavy burden to accurately record all the failure times of each component. To ease the information storage, practitioners in industry may only record the number of failures during an operation interval instead. Such a type of data compresses the detailed failure information and may be called time-censored aggregate data. Because only limited information...
This paper discusses the reliability evaluation of the two-phase model with the inverse Gaussian (IG) process. In the two phases, the degradation paths are supposed to follow the IG process with different parameters. To represent the subject-to-subject heterogeneity, the change points and the model parameters of different devices are set to be different. For each device, the change point is detected...
Vehicle recognition has become a hotpot in the researches on intelligent traffic management system. In the vehicle identification, the collision information is fused using the combination rule of Dempster-Shafer evidence, and the irregular results will be occurred. It is discussed that a new calculation method of weight coefficient in this thesis. In this method, the evidence principal elements for...
Main objective of this paper is research and development of the previously developed original methodology so that to be used for unavailability calculation of a complex maintained system with maintained (both preventively and correctively) and ageing input components with optional distributions of the time to failure. Original computing methodology results from the stochastic alternating renewal process...
Bilinear convolutional neural networks (BCNN) model, the state-of-the-art in fine-grained image recognition, fails in distinguishing the categories with subtle visual differences. We design a novel BCNN model guided by user click data (C-BCNN) to improve the performance via capturing both the visual and semantical content in images. Specially, to deal with the heavy noise in large-scale click data,...
Security and privacy challenges are the most important obstacles for the advancement of IT-based on-demand services and cloud computing as an emerging technology. To ensure data confidentiality and fine-grained access control in cloud-based environments, stored data and resources needs to be re-encrypted periodically or based on special mechanisms such as revoked user-based or manual re-encryption...
Phased-mission system (PMS) can have a number of mission phases with different system configurations of components. In engineering practice, there exist PMSs that have phases with time redundancy, meaning that the system is required to work in operational state for only a given duration of time within such phase, instead of all the phase duration like traditional PMS. For such complex PMS, it is not...
With the arrival of big data era, data mining techniques have been widely used to build models for cyber security applications such as spam filtering, malware or virus detection, and intrusion detection. This project proposes a novel approach that uses randomness to improve robustness of data mining models used in cyber security applications against attacks that try to evade detection by adapting...
Due to the limitation in speed and throughput of the traditional Von Neumann architecture, the interest in braininspired neuromorphic systems has been the focus of recent research activities. RRAM device has been extensively used as synapses in neuromorphic systems due to its many advantages including small size and compatibility with CMOS fabrication process. However, the RRAM device suffers from...
With the growing popularity of Internet of Things (IoT) services being applied in several aspects of real-life applications, performance has become an important requirement. Meanwhile, the techniques for reliability enhancement such as virtual machine migration and recovery also have significant impact on end-to-end performance. This paper proposes a predictive approach of reliability-aware performance...
In service oriented architecture, workflow discovery and web service composition (WSC) are two major challenges and many works have been carried out in the recent years. In this work, we address the problem of WSC in a multi-cloud environment. All existing methods assume that a feasible solution exists and solves the WSC problem, however when user constraints are hard, a feasible solution might not...
Rain attenuation prediction models for link analysis are essential for satellite communications. The diurnal variations of the rain attenuation statistics are valuable for the effective system designs. In this work, a simple prediction model for diurnal rain attenuation statistics with its conversion scale is proposed. The method of calculating an approximated optimal constant conversion scale was...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.