The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
By taking both CMF (Common Mode Failure) and middle states into account, numerical analysis of availability of cluster system is analyzed. Firstly, a CTMC (Continuous Time Markov Chain) model of cluster system containing three cluster nodes is constructed with failure rate (λ), repair rate (μ), CMF rate (7), reconfiguration rate (β) and reset rate (á) etc. Then the steady state solution of the CMTC...
By taking common mode failure (CMF) into account, the availability of multiple cluster systems is investigated. Firstly, a Markov model of system with three cluster nodes is constructed with failure rate (λ), repair rate (µ) and CMF rate (γ). Then, the availability of system is formulated with related parameters by solving related equations. Furthermore, derivative analysis of the formula's property...
A novel approach to design capacity-approaching variable-length constrained sequence codes has recently been developed. A critical step in this design process is the construction of minimal sets based on a finite state machine description of the encoders. In this paper we propose three generalized criteria to select the state that will result in construction of the minimal set with the best achievable...
This research is an attempt to identify the impact of effectiveness of the maritime simulator training program on different factors of needs and interest of the program. Model is developed to understand the impact. Data was collected from the course participants attending various simulator based training programmes from three training centers. Confirmatory factor analysis was employed to examine the...
The purpose of this study is to investigate the intention to use the cloud sphygmomanometer in Taiwan. This study also aims at providing suggestions on the popularization of cloud medical services. This study was established in a way that the model constructs in Technology Acceptance Model (TAM) were adapted to the context of cloud sphygmomanometer application in health management. Scale items on...
The early theoretical studies that presented conceptual definitions for the mapping of Quality of Experience (QoE) through Quality of Service (QoS), in an approach focused on Distributed Databases (DDBs), showed the directions to be threshed in a way to accomplish a hybrid DDBs' QoE-QoS set of evaluation criteria. That evaluation set being classified explicitly as partial, since QoE is a known multidimensional...
A new model and solution methods are introduced to find the optimal time of preventive replacement of a working object. Most models consider only the replacement costs and the distribution of the time to failure. Very few models take the random termination time of ongoing projects into account, when project interruption results in additional cost. Traditionally, the object is replaced upon failure...
Spectrum sensing is the key enabling technology for cognitive radio networks. The main objective of spectrum sensing is to provide more spectrum access opportunities to cognitive radio users without interfering with the operations of the licensed network. Spectrum sensing decisions can lead to erroneous sensing due to fading, shadowing and other interferences caused by either terrain inconsistency...
In this paper we compare two different implementation of an SEC-DED HSIAO code. This comparison is made to select which is the best method to achieve better memory, from reliability point of view. In this paper HSIAO code is used, because is efficient for single errors correction and double error detection that appear in cache memory hierarchy. Also, we have implemented the HSIAO code with FPGA Xilinx...
Over the past few years, the relationship between attitudes and behavior has been of a major interest to educators. Previous studies have found varying degree of associations between attitudes, behavioral intention and perceptions and corroborate the fact that attitudes influence patterns of behavior. As computer technology is becoming pervasive in the society, researchers have attempted to explore...
In this article the situation of teaching in engineering courses using specialized software support is evaluated and analysed. The statistics courses in engineering often come off as element of formal exposure to statistical analysis and research methods. The software support during classes intends to facilitate and reinforce learning with computational resolution of statistical specific problems...
High Performance Computing (HPC) system utilization can be maximized and sustained if one understands the failure behavior. In general, Time to Failure (TTF) of HPC systems has been long studied and showed that the Wei bull distribution gives the best fit. In addition, in many cases, TTF of such systems exhibit correlations. In our previous study, we developed a reliability model of an HPC system...
According to the structure of thermal power plant unit, and combining the dynamic relationship between the various parameters, a parameter estimation technique in vacuum state for mathematical model of the boiler-turbine units is proposed, which based on the modern control theory and previous research results. At the same time we try to give an analysis method of the mathematical model with equilibrium...
There have been many studies for knowledge sharing within the organizational communities, yet very few research has been done on the factor of internet self-efficacy affecting the individuals' knowledge sharing behavior. Drawing from the theory of planned behavior (TPB), this paper examines the relationships between the internet self-efficacy, attitude towards knowledge sharing, subjective norm, perceived...
The study extends the original technology acceptance model (TAM) by applying it to the purchase intention of home security and remote control equipments, and introducing two external variables, ??task-technology fit?? and ??reliability and interaction.?? The paper addresses the original cognitive TAM variables, and then revises them by adding emotional antecedents which fit into consumer context....
Reconstruction is of critical importance for computer forensics: reliability depends on our ability to do so with a quantifiable degree of certainty. In this paper, we propose a new model for computer forensic reconstruction by creating a mathematical model of a computer system that reliably shows how computation progressed. Since the new model is Turing machine-based, the reliability of other forensic...
The reliability for measure and control system of a space environment simulator is analyzed in the paper to build the models. The paper systematically summarizes the state of measure and control system. The system structure and principles are introduced. According to requirement of environmental test, working procedures of the system are divided into the particular assignments. On the basis of reliability...
The reliability of service is related to the kind and the number of service resources in grid. The kind and the number of service resources often change, so the service reliability is variable. In this paper, we propose a reliability measurement model for service in grid, which is based on the dynamic characteristic of service resource. In this model, the dynamic state of service is divided into a...
The problem of detection of control flow errors in software has been studied extensively in literature and many detection techniques have been proposed. These techniques typically have high memory and performance overheads and hence are unusable for real-time embedded systems which have tight memory and performance budgets. This paper presents two algorithms by which the overheads associated with...
Networks on chips (NoCs) provide a mechanism for handling complex communications in the next generation of integrated circuits. At the same time, lower yield in nano-technology, makes self repair communication channels a necessity in design of digital systems. This paper proposes a reliable NoC architecture based on specific application mapped onto an NoC. This architecture is capable of recovering...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.