دانلود و نمایش مقالات مرتبط با Reliability::صفحه 25
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Reliability

تعداد مقالات یافته شده: 421
ردیف عنوان نوع
241 Design optimization for security- and safety-critical distributed real-time applications
طراحی برنامه های کاربردی با بهینه سازی در زمان واقعی با امنیت و ایمنی بحرانی توزیع شده -2017
In this paper, we are interested in the design of real-time applications with security, safety, timing, and energy requirements. The applications are scheduled with cyclic scheduling, and are mapped on dis tributed heterogeneous architectures. Cryptographic services are deployed to satisfy security requirements on confidentiality of messages, task replication is used to enhance system reliability, and dynamic voltage and frequency scaling is used for energy efficiency of tasks. It is challenging to address these factors si multaneously, e.g., better security protections need more computing resources and consume more energy, while lower voltages and frequencies may impair schedulability and security, and also lead to reliability degradation. We introduce a vulnerability based method to quantify the security performance of com munications on distributed systems. We then focus on determining the appropriate security measures for messages, the voltage and frequency levels for tasks, and the schedule tables such that the security and reliability requirements are satisfied, the application is schedulable, and the energy consumption is minimized. We propose a Tabu Search based metaheuristic to solve this problem. Extensive experiments and a real-life application are conducted to evaluate the proposed techniques.
Keywords: Embedded system | Security | Safety | Energy | Design optimization
مقاله انگلیسی
242 An assessment of supply chain disruption mitigation strategies
ارزیابی استراتژی های کاهش تلفات زنجیره تامین-2017
We assess the effectiveness of incorporating three types of redundancy practices (pre-positioning inventory, backup suppliers, and protected suppliers) into a firm’s supply chain that is exposed to ttwo types of risk: supply risk and environmental risk. Supply risk disrupts an individual supplier, while environmental risk makes a number of suppliers in a given region unavailable. An additional factor is supplier interdependence, where a disruption in one supplier may also disrupt other active suppliers. Utilizing the concept of a decision tree to capture different disruption scenarios, we develop a two-stage mixed-integer programming (two-stage MIP) model as a General Model to address the problem of supplier selection and order allocation under supplier dependencies and risk of disruptions. In the General Model, multi-sourcing is the only supplier strategy that the firm implements. Then we develop three separate extensions of the General Model, one for each of the three redundancy practices, and evaluate the expected supply chain cost of each extended model. We quantitatively show how adding redundancy to the supply chain in different forms, along with contingency plans, can help firms mitigate the impact of supply chain disruptions. The findings suggest that all three strategies reduce costs and risks compared to the General Model. An analysis of reliability, risks, dependence, and costs is conducted on each strategy to provide insights into supplier selection, demand allocation, and capability development in a supply chain under supply chain risks. Finally, we show that regionalizing a supply chain is an effective way to mitigate the negative impacts of environmental disruptions on the supply chain.
Keywords: Supply risk | Environmental risk | Pre-positioning inventory | Backup supplier | Protected supplier | Redundancy |Two-stage mixed integer |programming
مقاله انگلیسی
243 روشی برای مدیریت اعتماد در شبکه های حسگر بی سیم: چالش ها و مشکلات موجود در ارتباطات قابل اعتماد: یک مرور
سال انتشار: 2017 - تعداد صفحات فایل pdf انگلیسی: 14 - تعداد صفحات فایل doc فارسی: 35
یک شبکه حسگر بی سیم یک توده ای از گره های حسگر توزیع شده خود – هدایت شده جهت نظارت مشارکتی در شرایط فیزیکی و محیط پیرامون آن می باشد. اعتماد برای گره های حسگر خودمختار مستقر در محیط خصمانه و نظامی، روز به روز مهمتر می شود. در این ارزیابی، ما به تشریح یک مرور کلی روی روشهای فعلی مدیریت اعتماد برای شبکه های حسگر بی سیم می پردازیم و مهمتر اینکه چالش ها و مشکلات ارتباطات قابل اعتماد را بیان می کنیم. ما همچنین به برخی ویژگی ها و پارامترهای اعتماد اشاره می کنیم تا به توسعه سیستم ارزشمند اعتماد در شبکه های حسگر بی سیم کمک کنیم.
کلیدواژه ها: شبکه حسگر بی سیم | اعتماد | امنیت | قابلیت اعتماد
مقاله ترجمه شده
244 Trust Traversal: A trust link detection scheme in social network
پیمایش اعتماد : یک طرح تشخیص پیوند اعتماد در شبکه اجتماعی-2017
The nature of free communication results in increased challenges with respect to the reliability of user interaction in online social network. It is difficult to ensure that the users in a large-scale network are familiar with one another and that they interact without risk. Users’ behaviors might therefore be vulner able to attacks or frauds. Trust relationship detection scheme is a feasible solution. This study proposes an original trust link detection scheme, named Trust Traversal, which includes three aspects, i.e., trust scheme, trust link category, and traversal scheme, which are used to build up strong or weak trust links among users. Firstly, we address overview of Trust Traversal scheme and its related formal definitions. Then, trust scheme model is proposed for managing calculation methods of subjective trust, reputation, and indirect link. Subjective trust is calculated based on past interaction data, while reputation is defined as collective objective trust with three factors: effective accumulation, time attenuation, and intensity fac tor. Additionally, trust of indirect link in trust scheme is computed with three rules: trust transitivity rule, reputation weight rule, and level attenuation rule. To describe the relationship with both reliability and closeness, we present a trust link category, which comprise three kinds of trust links: strong trust link, weak trust link, and untrusted link, and meanwhile, gives the classifying method based on two factors: mutual trust factor and interaction active factor. Moreover, Trust Traversal scheme for both single and multiple target users is proposed to detect strong or weak trust links, which implies trustable and close relationships among users. In Trust Traversal scheme, each step is determined by trust based probability, and thus the user with the strongest trust link would have the highest probability of being the traversal user in the trust link. And also, terminal mechanism of Trust Traversal scheme is discussed. Finally, we provide an examination to determine further the performance of our proposed scheme.
Keywords: Social network | Trust Traversal | Trust | Reputation | Trust link
مقاله انگلیسی
245 Psychology between science and common sense: William James and the problems of psychological language in the Principles
روان شناسی بین علم و عقل سلیم : ویلیام جیمز و مشکلات زبان روان شناسی در اصول -2017
The suspicion that language can become an obstacle to human knowledge is not new in the Western intellectual tradition. Following the empiricist legacy, many authors have suggested the perils and pitfalls of common sense language for science. Applied to psychology, this leads to the issue of the reliability of psychological language for scientific psychology. William James, in his Principles of Psychology, was one of the first psychologists to address this problem explicitly. The goal of this paper is to situate his position and contrast it with contemporary debates over the status of folk psychology. The results indicate that James conceived of common sense psychology in a very complex manner, and pointed to a kind of illusion that remains ignored in the current literature, with negative consequences for psychology. I conclude by suggesting the relevance of James for contemporary debates in theoretical and philosophical psychology.
مقاله انگلیسی
246 Hesitant distance set on hesitant fuzzy sets and its application in urban road traffic state identification
فاصله فشرده بر روی مجموعه های فازی تنگ و کاربرد آن در شناسایی وضعیت ترافیک جاده های شهری-2017
Since fuzziness lacks the distinction between a set and its complement, it is difficult to measure the distance between different hesitant fuzzy sets (HFSs) by a single value. In this study, a new concept “hesitant distance set (HDS)” is proposed, where the distance between different HFSs can be characterized by a series of different values. This study has three primary contributions. Firstly, most of the existing distance measures on HFSs are based on vector operation, while the novel proposed HDSs are based on set operation. Secondly, a statistical method is proposed to compare different HDSs, and some important properties of the comparison method are introduced. Thirdly, the characteristics of the novel HDSs and the classical hesitant distances are studied comparatively. Finally, the practicality and validity of the HDSs on HFSs are illustrated through an urban road traffic state identification example.
Keywords: Hesitant fuzzy sets | Hesitant distance | Reliability degree | Statistical method | Pattern recognition | Algebra space | Traffic state identification
مقاله انگلیسی
247 Green supply chain management related performance indicators in agro industry: A review
شاخص های عملکرد زنجیره تامین مدیریت سبز در صنایع کشاورزی: بررسی-2017
Environmental protection and sustainability issues in food sector have attracted global concerns in the past two decades. Companies and government in many countries have started realizing the importance of greening their supply chains. Green supply chain management has gained special attention of public and many companies are now interested in adopting it as their strategy to advance their brand image, capturing more market share and to win the trust of the customer. The purpose of this paper is to explore the diverse performance indicators and sub-indicators responsible for green supply chain management implementation and to check its reliability and to rank them using analytic hierarchy process analysis. After extensive literature review and consulting Industrial experts, the study has suggested 13 perfor mance indicators and 79 sub-indicators. The quantitative phase was conducted through a survey using standard questionnaire with various agro based companies followed by a qualitative phase, where the duly filled questionnaires were received, edited and further analyzed. It has been concluded that internal environmental management, environmental design and regulatory pressure are ranked as the top three performance indicators. The sensitivity analysis has also been performed to see the effect of weightage on the final ranking of performance indicators. This is one of the first studies that suggest the perfor mance indicators for implementation of green supply chain management in agro industry. The study will certainly aid the related organizations to implement green supply chain management.
Keywords:Analytic hierarchy process | Environmental management system | Green supply chain management Green purchasing network India |Performance indicators | International organization for | standardization
مقاله انگلیسی
248 Development of Battery Monitoring System in Smart Microgrid Based on Internet of Things (IoT)
توسعه سیستم مانیتورینگ باتری در ریز شبکه های هوشمند مبتنی بر اینترنت از اشیاء-2017
In this paper, battery monitoring system based on internet of things (IoT) has been developed to monitor the operational and performance of batteries in a smart microgrid system. This smart microgrid includes a battery pack, PV system, Intelligent Electronic Device (IED) hybrid inverter, grid connection and electricity load. The IoT developed in this work consists of a communication channel from and to IED, data acquisition algorithm, cloud system and Human Machine Interface (HMI). Data acquisition was scheduled to execute every minute as mentioned in IEC61724. The battery monitoring system information as part of battery management system (BMS) is displayed on a Human Machine Interface (HMI) using ExtJS / HTML5 framework which can be accessed using desktop or mobile devices. From analytical results, the average execution time for overall BMS-IoT based data acquisition to the cloud server is 19.54 ± 18.00 seconds. The result of availability monitored data in the cloud database server is 92.92 ± 6.00 percent, which shows satisfactory result for the reliability of BMS-IoT system data acquisition.
Keywords: battery monitoring system | smart microgrid | communication protocol | battery system | internet of things
مقاله انگلیسی
249 Assessing and augmenting SCADA cyber security: A survey of techniques
ارزیابی و تقویت امنیت سایبری SCADA: بررسی تکنیک ها-2017
SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manu facturing facilities. The pervasiveness, miniaturisations and declining costs of Internet connectivity have transformed these systems from strictly isolated to highly intercon nected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly con nected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and secu rity ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the se lected approaches is provided along with their applicability.
Keywords: Cyber defence | Anomaly detection | Attack tools | Vulnerability | Simulation | Modelling | SCADA
مقاله انگلیسی
250 Special versus general protection and attack of parallel and series components
حفاظت ویژه در مقابل حفاظت عمومی و حمله به اجزای موازی و سری-2017
Special and general protection and attack of two components in parallel or series are analyzed in a simultaneous move game. The analysis differs from earlier research which assumes multiple protection levels. Each player chooses either two special efforts, one general effort, or one special effort and one general effort. This combines to 16 solutions expressed analytically and illustrated with examples. The defender prefers the parallel system. The attacker prefers the series system. We quantify how higher contest intensities typically cause higher efforts, how players prefer low unit effort costs, and how players fight for valuable assets. One insight is to clarify how a player is situated in one of these 16 solutions when striking a balance between special and general efforts, or eliminating one or two efforts, while facing an adversary also striking such a balance. In a rapidly changing world, realizing how strategies can be adjusted towards specialization versus generalization becomes increasingly important.
Keywords: Special effort | General effort | Protection | Defense | Attack | Reliability | Vulnerability | Series system | Parallel system | Safety | Security | Terrorism
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 10702 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 10702 :::::::: افراد آنلاین: 62