The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The dragonfly adult has been extensively studied as a model insect for the design of robots and more recently MAV (micro-aerial vehicle). In particular, its flight and vision-guided navigation mechanisms have been widely adopted in the design of MAV and robots. The wings of dragonfly have been investigated to develop new generation of nanocomposite MEMS materials. In this article, we are interested...
This paper has three objectives. The discussion of reliability and Chaos in the general context of reliability theory, including the reliability of Wireless Sensors Network (WSN, e.g., a prognostics sensors network in a PHM system), constitutes the first objective of this paper. The second objective discusses the WSN reliability and survivability inspired by the analogical similarity between insect...
We envision a wireless sensor network (WSN) as an entity analogous to a biological population with individual nodes mapping to individual organisms and the network architecture mapping to the biological population. In particular, a mobile wireless sensor network consisting of hundreds or more of microchip- driven nodes is analogous to a flying insect population in several important aspects. The notions...
In this article, we review one of the two major models in multivariate survival analysis, the multi- state model (the other is the shared frailty model). Just like the whole multivariate survival analysis (MSA) subject, this category of models has been advanced mainly in biomedical research and is still in the development stage. Since similar models based on Markov chains have been widely used in...
Both phylogenetic and coalescent trees are the recordings of evolution over time. In other words, each distinguishable node on the tree, either interior or exterior, represents an evolutionary event. Ignoring the complexity involved in evolution, these events are time-to-events, which means that they can be described with a special type of positive random variables -time-to-event random variables...
The latest advances in survival analysis have been centered on multivariate systems. Multivariate survival analysis has two major categories of models: one is multi-state modeling; the other is shared frailty modeling. Multi-state models, although formulated differently in both fields, have been extensively studied in reliability analysis in the context of Markov chain analysis. In contrast, shared...
The directed diffusion sensor networking was proposed by Intanagonwiwat et al. (2003) as an alternative to the IP-based end-to-end and the hop-by-hop ad-hoc routing architectures. This paradigm was apparently inspired by Alan Turing's (1952) seminar paper on the morphogenesis and pattern formation theory. Among numerous follow-up studies to the directed diffusion architecture, Malik and Shakshuki...
Competing risks analysis is a field of applied statistics with research dating back to the eighteenth century. Starting in the 1980s, the interaction with survival analysis has lead to significant advances in competing risks analysis, especially in dealing with the dependency and identifiability issues, both of which are often intermingled with each other and have been the focus of the controversy...
Biological structures and organizations in nature, from gene, molecular, immune systems, and biological populations, to ecological communities, are built to stand against perturbations and biological robustness is therefore ubiquitous. Furthermore, it is intuitively obvious that the counterpart of bio-robustness in engineered systems is fault tolerance. With the objective to stimulate inspiration...
A new approach to modeling wireless networks is presented that allows for the determination of network reliability using diverse fault assumptions. It is shown that one can exploit network topologies by taking advantage of the broadcast paradigm of wireless communication to detect and possibly correct benign and malicious act. Specifically, a general wireless network model is presented that maps subsets...
Many problems found in standard security and survivability applications can be transformed into graph and scheduling problems, thereby opening up the problems to a wealth of potential solutions or knowledge of limitations, infeasibility, scalability or intractability. This paper introduces a model to aid in the design, analysis, or operations of applications with security and survivability concerns...
In this paper a new checkpoint/recovery protocol called theft-induced checkpointing is defined for dataflow computations in large heterogeneous environments. The protocol is especially useful in massively parallel multi-threaded computations as found in cluster or grid computing and utilizes the principle of work-stealing to distribute work. By basing the state of executions on a macro dataflow graph,...
This research addresses certification of large distributed applications executing in hostile environments, where tasks or the results they produce may have been corrupted due to benign or malicious act. We extend recent results addressing applications with task dependencies and introduce new probabilistic certification algorithms that establish whether the computations have been massively attacked...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.