The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The aim of the study is to develop a European gas transmission system probabilistic model to analyse in a single computer model, the reliability and capacity constraints of a gas transmission network. We describe our approach to modelling the reliability and capacity constraints of networks elements, for example gas storages and compressor stations by a multi-state system. The paper presents our experience...
In this work we explore the class of heavy-tailed distributions and discuss their signicance in reliability engineering. At the same time we discuss measures of divergence which are extensively used in statistics in various elds. In this paper we rely on such measures to evaluate the residual and past lifetimes of events which are associated with the tail part of the distribution. More specifically,...
In this paper a multi-state deterioration system which experiences several states of performance degradation until it fails is studied extensively and condition-based preventive maintenance policies are examined. The optimal maintenance policy aims at maximizing system's asymptotic availability and at minimizing its total operational cost, with respect to the two different inspection intervals. For...
The volume of personal information and data most Internet users find themselves amassing is ever increasing, and the fast pace of the modern world results in most people requiring instant access to their files. Millions of these users turn to cloudbased file synchronisation services, such as Dropbox, Microsoft SkyDrive, Apple iCloud and Google Drive, to enable "alwayson" access to their...
Mobile Money Transfer (MMT) services provided by mobile network operators enable funds transfers made on mobile devices of end-users, using digital equivalent of cash (electronic money) without any bank accounts involved. MMT simplifies banking relationships and facilitates financial inclusion, and, therefore, is rapidly expanding all around the world, especially in developing countries. MMT systems...
The part of the management system of an organization dealing with information security is called Information Security Management System (ISMS). The most adopted ISMS standard is ISO 27001:2005. The 2005 version of the standard has been updated in 2013 to provide more clarity and more freedom in implementation, based on practical experiences. This paper compares ISO 27001:2005 and the updated 2013...
In this paper we propose the use of formal methods to model malicious code behavior. The paradigm shift in malware detection from conventional, signature-based static methods to evaluating dynamic system behavior is motivated by the rising number and ever-increasing sophistication of malware currently in the wild. Because of advanced polymorphic and metamorphic techniques, a purely signature-based...
XACML (extensible Access Control Mark-up Language) is a declarative access control policy language that has unique language constructs for factoring out access control logic. These constructs make the specification of access control requirements more compact than decision trees, which can be considered the most natural way to specify access control logic. However, many publications report that performance...
Although many electronic voting protocols have been proposed, their practical application faces various challenges. One of these challenges is, that these protocols require election authorities to perform complex tasks like generating keys in a distributed manner and decrypting votes in a distributed and verifiable manner. Although corresponding key generation and decryption protocols exist, they...
Proliferation of mobile devices equipped with position sensors has made Location-based Service (LBS) increasingly popular. These mobile devices send user's actual location information to the third party location servers, which compile and, in some cases, share with other service providers. As a result, users aware of the privacy implications feel continuously tracked. Effective and, even more important,...
A lot of effort has been made recently to build academic federations. However some issues are still open. The first is off-line authentication. Today's model of federation requires systems to work on-line and synchronously, what limits its use for some applications. Second, the data federated institutions make available is only for computer systems and not for people. This makes it difficult for humans...
Industrial control system networks are responsible for the operation of critically important functions of modern societies. In this paper we describe a highly distributable technique with low hardware requirements for mapping the typical network behavior of such stable networks. We propose that this technique is able to detect multiple wide ranging attack scenarios threatening these networks. We then...
Markov processes are widely used in reliability engineering. In this work we focus on multi state systems (MSS) and apply the Semi-Markov methodology for parameter estimation. For this purpose the sojourn times are assumed to be independent not identically distributed (inid) random variables that follow a general class of distributions that includes several popular reliability distributions like the...
Zero-inflated probability models are recommended when there is an excessive number of zeros in count data. In the context of statistical process control, such cases arise in high-yield processes where the fraction of non-conforming units produced is very low. Other applications can be also found in the monitoring of health-related process, where it is of interest the monitoring of rare health-events...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.