The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to dig the reliability characteristics of agricultural transport vehicles, reveal its use reliability, using the operating fault data of 129 agricultural transport vehicles, which are divided into two different models, it is confirmed that the failure distributions are Weibull distribution. The result is obtained by strict parameter estimation and hypothesis. With reliability theory and statistical...
For a graph G with perfectly reliable edges and unreliable vertices, we consider the reliability of G for which vertices fail independently of each other with a constant probability p. The reliability of graph G, denoted by Pn(G,p), is defined to be the probability that the induced subgraphs of surviving vertices connected. Denote by Ω(n,m) the family of connected graphs with n vertices and m edges...
To analyze the reliability of large projects, an OBDD(ordered binary decision diagram)-based method is proposed in this paper. After describing the construction system of project with a directed network, this method turns the network states into an OBDD structure and computes the reliability. For the convenient storage of OBDD in computer, it can be easily implemented and efficiently calculate the...
The study extends the original technology acceptance model (TAM) by applying it to the purchase intention of home security and remote control equipments, and introducing two external variables, ??task-technology fit?? and ??reliability and interaction.?? The paper addresses the original cognitive TAM variables, and then revises them by adding emotional antecedents which fit into consumer context....
The article discusses the problem of zero-failure data with Weibull distribution. Using the convex and concave property of the distribution functions. We give the relation about failure-probability Pi (i = 1, 2,...,m) in time ti. Basing on the relationship. We obtain Bayesian estimation about Pi in time ti and estimate the distribution's parameter. At last, we compute for actual data and analyze it.
This paper describes the critical (feared) scenarios derivation tool ESA_PetriNet (Extraction Scenarios Algorithm from Petri Net) available from : http://www.laas.fr/ESA. ESA_PetriNet allows to derive scenarios leading to critical (feared) situation in embedded systems. The system model is given by a Petri net. To derive critical scenarios and to avoid the state space explosion, the solution is to...
In order to conform to the real world systems such as distribution systems and supply chain management system, we assume the capacity of each arc in the quickest path problem is stochastic (multi-state). In this study, we propose a simple algorithm to evaluate the probability that d units of data can be sent from the source node to the sink node through the multi-state quickest path flow network within...
The sensitivity assessment method has been invented to increase he accuracy and easiness in reliability allocation based on the military standards and extant experiences. In usual allocation method complexity, technology, environmental conditions and life time are defined as influential parameters for a system reliability calculating. So, with the assessment of these factors for each product, quantity...
The reliability for measure and control system of a space environment simulator is analyzed in the paper to build the models. The paper systematically summarizes the state of measure and control system. The system structure and principles are introduced. According to requirement of environmental test, working procedures of the system are divided into the particular assignments. On the basis of reliability...
To evaluate the quality of denoised SAR images, this paper discusses some performance parameters, and proposes a grey-theory-based method. The main idea of the method is to extract some comparative sequences and a reference sequence, respectively standing for quality of the denoised SAR images and the noise-free image, after all the denoised images involved are concerned. And then, an overall performance...
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, authentication information needs flexible manipulation to facilitate federation across trust domains. To achieve identity federation for federated...
New definitions are proposed for the security of Transient-Key Cryptography (a variant on Public-Key Cryptography) that account for the possibility of super-polynomial-time, Monte Carlo cryptanalytic attacks. The basic question we address is: how can one relate the amount of time a cryptanalyst is willing to spend decoding cryptograms to his likelihood of success? This question and others are partially...
It seems very difficult to give a formal definition of computational security for Public Key Cryptography. We define a slightly different notion, called Transient-Key Cryptography, for which a natural definition of security against chosen-plaintext-attacks can be given. The main result presented here is the existence of a relativized model of computation under which there exists a provably secure...
This paper summarizes some rather extensive research on the problem of constructing logic nets out of elements whose timing causes trouble either in their slowness or in their lack of precision. The problem is made precise by setting up a theory of logic nets that is abstract but realistic. Its abstractness consists in its lack of similarity to any particular hardware, and in its strictly mathematical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.