{"title":"Availability and Cost Analysis of a Fault-Tolerant Software System with Rejuvenation","authors":"Long Zhao, Qinbao Song","doi":"10.1109/ICACTE.2008.115","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.115","url":null,"abstract":"In recent years, remarkable attention has been paid to software aging phenomena, in which the performance of software systems degrades with time. Software aging may eventually leads to transient crash/hang failures. The well-known technique of software rejuvenation can be regarded as the most effective procedure to counteract the aging phenomena. In this paper, the concept of common software-aging-related faults in fault-tolerant systems is proposed. Then the common faults defined are integrated into a behavior model of a double-version fault-tolerant software system. The dependability measures, such as availability, cost, and the availability to cost ratio, are evaluated as bivariate functions using continuous time Markov chain (CTMC). Finally, the effects of common software-aging-related faults are investigated based on several numerical examples.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116843658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of an Instrument in Transformer Winding Distortion Measurement Based on Artificial Neural Network and S3C2410","authors":"Liu Jun, Zhao Xueliang, Feng Jianhua, Wang Lei","doi":"10.1109/ICACTE.2008.91","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.91","url":null,"abstract":"Taking an instrument in transformer winding distortion measurement as an example, a solution is proposed based on Samsung's S3C2410 processor and embedded Linux operating system Hardware design is introduced, and software design also is described. The application of the artificial neural network technique to the frequency response analysis method (FRA) which is used to detect transformer winding deformation is presented. The system has wide application prospect with the advantages of small volume, low cost, high reliability, etc.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117016403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Permission Approach to Comprehend Lock-Based Synchronization Policy","authors":"Yang Zhao, Ligong Yu, Jia Bei","doi":"10.1109/ICACTE.2008.51","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.51","url":null,"abstract":"Lock-based synchronization is widely used to avoid data races in multithreaded programs. However, it is usually painful to verify the safety and correctness of lock usage because there may be some unpredictable interferences among different threads in parallel. In order to assure the usage of mutual-exclusion locks, we propose to interpret the synchronization policy as permission representations. A permission is a value associated with some piece of state in a program and it is designed to permit certain operations. Permission includes a characteristic property: \"nesting,\" such that one permission may be designed to be nested into the other, with which we are able to simulate lock protection annotations and hence detect whether high level annotations match with underlying program code.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128331215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Tahir, A. S. Prabuwono, M. Burhanuddin, Habibullah Akbar
{"title":"Maintenance Decision Support Fuzzy System in Small and Medium Industries Using Decision Making Grid","authors":"Z. Tahir, A. S. Prabuwono, M. Burhanuddin, Habibullah Akbar","doi":"10.1109/ICACTE.2008.37","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.37","url":null,"abstract":"This paper describes maintenance decision support fuzzy system for computerized maintenance management system (CMMS) data analysis in small and medium industries (SMIs). The problems are based on two factors that influence effect of machines maintenance, the downtime and the frequency of machine failures. The objective is to implement both factors into decision making grid (DMG) and then embedded it into maintenance decision support fuzzy system. Next, SMIs can implement this system to support their maintenance decision process.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128278256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on GEP Algorithm and Its Applications in Foodstuff Yield Prediction from Shaanxi Province","authors":"Yin Li, Xin Chen, Dongjian He, L. Tang","doi":"10.1109/ICACTE.2008.78","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.78","url":null,"abstract":"In order to synthetically solve economic and risk issues for food production, researching optimization algorithm of food production¿s forecast based on the gene expression program. Taking Shaanxi province¿s food production as an example to solve some key issues in food production which are the uncertainty information processing, reliability criteria analysis, mathematical model of food production and the model's solving algorithm. The emphases was starting from the food production research which based on the GEP algorithm, validating the availability of building food production model which based on GEP through the uncertainty information processing. This study based on GEP algorithm established a mathematical model of food production and realized the application by using the optimization methods of solving general multi-objects and non-linear issues. The study had important theory and application values in research on facilitation of food production algorithm and promotion of economical efficiency and reliability in food production.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124715343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research of Electric Load Control System Based on Multi-agent","authors":"T. Zhao, Zibin Man, Guiquan Bi","doi":"10.1109/ICACTE.2008.181","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.181","url":null,"abstract":"The load control of power system is a measure for alleviate electric imbalance between supply and demand of load and guarantee effectively that the electric wire netting is operated safely and steadily, so it is very necessary to set up a set of electric load control system incorporating the real-time control, load predict, intellectual warning, long-range remote control into an organic whole. This paper combines Multi-Agent technology and electric load control together, has fully considered that the function that electric load control realized and its characteristic, has set up a kind of electric load control system based on Multi-Agent, this system fully utilizes intelligent of Agent and good communication harmony within Multi-Agent system, make such new electric load control system can give full play the functions such as real-time control, load predict, intellectual warning, long-range remote control ,etc.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129838913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Active Set Fuzzy Support Vector ϵ-Insensitive Regression Approach","authors":"Rampal Singha, S. Balasundaramb","doi":"10.1109/ICACTE.2008.153","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.153","url":null,"abstract":"In this paper a new fuzzy linear support vector machine formulation for regression problems is proposed and solved by the active set computational strategy. In this model, to each input data a fuzzy membership value is associated so that the input data can contribute proportionally to the learning of the decision surface. The proposed method has the advantage that its solution is obtained by solving a system of linear equations at a finite number of times rather than solving a quadratic optimization problem. Numerical experiments have been performed and the results obtained are in close agreement with the exact solution of the problems considered which clearly shows the effectiveness of the method.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114627052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solution for Search Result Clustering by Using Singular Value Decomposition","authors":"V. Snás̃el, H. Abdulla","doi":"10.1109/ICACTE.2008.143","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.143","url":null,"abstract":"There are many search engines in the Web, but they return a long list of search results, ranked by the irrelevancies to the given query. Web users have to go through the list and examine the titles and (short)snippets sequentially to identify their required results.In this paper we present how usage of Singular Value Decomposition (SVD) as a very good solution for search results clustering.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124427876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on a Web Security Service System Structure Model","authors":"Ke Ma, Changxin Song","doi":"10.1109/ICACTE.2008.171","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.171","url":null,"abstract":"The security problem of the Web service is becoming the key problem for the Web service development and application. In this paper, it does a deep research on the security communication strategy of SOAP information, at the same time, describes identity validation and access control in detail. After that, it discusses a Web service security frame structure based on WS-Security technology. According to this, a Web service security model is designed, and all the modules and flows in this model are introduced in detail.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"360 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124536130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Building an Enhancement Approach for Improving the Performance of Shared Repository Pattern","authors":"A. I. A. Rabea, I. M. E. Emary, Mutasam Okasheh","doi":"10.1109/ICACTE.2008.116","DOIUrl":"https://doi.org/10.1109/ICACTE.2008.116","url":null,"abstract":"Repository model is an organization model used as a storage medium of a huge database. Also, it is used in interactions between the subsystems of the system in architectural design showing the exchange of data between the subsystems in the system as a whole. The purpose of this paper is to enhance the performance of shared database pattern in the repository model. So, the work presented in this paper aims to increase the level of performance of the shared repository pattern when large amounts of data are to be shared by reducing the number of times that is required to access the central database and also to save the cost rather than increasing the speed of response for the subsystems requests to access their desired data. Accordingly the idea of improvement was based on the establishment of (buffer). The proposed model was simulated, and the results of running this simulator show its capability of reducing the access time of data, increasing the speed of accessing the data, increasing the system performance, and also increasing the efficiency of the system work. Also, the proposed model was compared with the approach of shared repository pattern and the results showed that the proposed approach outperforms better through making enhancement in reducing the access time and increasing the speed of access the data. Finally, this paper provides a new approach to access the data efficiently by improving the time, cost and speed to share the data between those subsystems and also to guarantee that the data will be stored temporarily in the buffer until a new request on data occurs on the buffers.","PeriodicalId":364568,"journal":{"name":"2008 International Conference on Advanced Computer Theory and Engineering","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127714206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}