The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a distributed clustering algorithm, called DCEV, which constructs multi-hop clusters. DCEV places vehicles into non-overlapping clusters which have adaptive size based on their relative mobility. The cluster formation is based on a D-hop clustering scheme where each node selects its cluster head in at most D-hop distance. To create clusters, DCEV uses a new metric to let vehicles...
We analyze the availability of virtual optical networks mapped over a physical substrate and propose VON mapping algorithms with selective dedicated protection to minimize cost while meeting availability requirements.
This study introduces the concept of uncertainty analysis of Neutrosophic Theory in the sphere of Maintenance Operating System (MOS). The aim of this study is to underline the importance of uncertainties solving in Maintenance Operating System. In maintenance process appear ambiguous states that can't be assimilated neither true, nor false, meaning that the threshold state is a neutral one, being...
Code clones have both negative and positive impacts on softwares. Researchers have proposed lots of detection tools to find clones from softwares. However, the information in detection results is not enough to help developers understand and maintain clones. Therefore, we design and implement a clone analysis tool, named CloneAyz, to aid developers to analyze and understand clones. CloneAyz can parse...
This paper addresses the problem of efficientlyrestoring sufficient resources in a communications network tosupport the demand of mission critical services after a large scaledisruption. We give a formulation of the problem as an MILPand show that it is NP-hard. We propose a polynomial timeheuristic, called Iterative Split and Prune (ISP) that decomposesthe original problem recursively into smaller...
We describe ongoing work to increase trust in resilient software systems. Automated software repair techniques promise to increase system resiliency, allowing missions to continue in the face of software defects. While anumber of program repair approaches have been proposed, the most scalableand applicable of those techniques can be the most difficult to trust. Using approximate solutions to the oracle...
A hybrid model is used for quantification of three resilience metrics: robustness, rapidity and resilience loss. The approach is demonstrated in a case study on a municipal electricity distribution system. An overall conclusion from the case study is that the suggested method provides an overview of the resilience metrics of the electricity distribution system and that it allows the network operator...
The identification of metrics or ranges of parameters for the detection of partial discharges by the acoustic emission method for the diagnosis and/or classification of power transformers according to their state is essential to support decisions about equipment stoppages at the proper time, i.e., before a failure occurs. This paper discusses these parameters based on the analyses of several field...
Software changes are inevitable during maintenance, Object-oriented software (OOS) in particular. For change not to be performed in the “dark”, software change impact analysis (SCIA) is used. However, due to the exponential growth in the size and complexity of OOS, classes are not without faults and the existing SCIA techniques only predict change impact set. This means that a change implemented on...
The evolution of the harmonized set of ISO/IEC/IEEE 15288-12207 related standards and technical reports that are discussed in this International Standardprovides detailed requirements and guidance on the application of system life cycle processes. This International Standard unifies technical and managementrequirements and guidance from several of these sources to specify the requirements for the...
In network virtualization, when a disaster hits a physical network infrastructure, it is likely to break multiple virtual network connections. So, after a disaster occurs, the network operator has to schedule multiple teams of repairmen to fix the failed components, by considering that these elements may be geographically dispersed. An effective schedule is very important as different schedules may...
This paper describes a case study of using developer activity logs as indicators of a program comprehension effort by analyzing temporal sequences of developer actions (e.g., navigation and edit actions). We analyze developer activity data spanning 109,065 events and 69 hours of work on a medium-sized industrial application. We examine potential correlations between different measures of developer...
Maintenance is a very expensive activity in the software systems' lifecycle. The ISO 25010 standard considers it as one of its main eight characteristics. In this paper, we propose an approach to assess the maintainability characteristic by its own subcharacteristics as defined by ISO 25010, using several object oriented metrics. A set of rules is defined to capture the influence of the metrics values...
With technological progress, humans tend to create engineering systems with constantly increasing complexity and higher operational requirements. Many complex systems require the use of a Health Management (HM) solution to ensure safety and enable lifecycle properties management of the system. HM solutions such as Integrated Vehicle Health Management (IVHM) hinge mainly on data obtained from sensors...
Nowadays Wireless Sensor Networks have attractedworldwide research and industrial interest, because theycan be applied in various areas. Geographic routingprotocols are very suitable to wireless sensor networksbecause they use location information when they need toroute packets. Obviously, location information ismaintained by Location-Based Services provided bynetwork nodes in a distributed way. The...
Dynamic and diverse disruptions are continuously challenging the functionality of Electrical Grid. Climate change and integration of modern communication technologies in the grid raises new challenges, and past few year events highlight the need to address these challenges especially for the electrical power distribution system. Quick recovery of the grid after an outage is vital in order to minimize...
Service technology, such as Web service, has been part of the mainstream of software development for some time due to its promising characteristics such as interface-implementation decoupling, reusability, and composability. Like other software, a service has to undergo maintenance during its lifetime to cope with changes in requirements and environment or to handle errors. Unfortunately certain changes...
Providing relevant information at the right time in the right place is the major challenge in augmented reality, especially when it is applied in industry related applications. Indeed, by superimposing virtual elements on images which capture the real scene, augmented reality has proved its potential and maturity for facilitating maintenance activities, especially in training, repairing or inspections...
A modular design for portable automatic test equipment used for on-platform diagnostics is described. The hardware and software architecture of the design are described in detail. The design comprises a core module that houses a processor and the primary instrumentation, measurement, and stimulus hardware of the test equipment. The design also includes an application module that provides platform-specific...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.