A High-Level Parameter Selection Framework for Irregular LTE-Based Mission Critical Networks

Author(s):  
Ayman Sabbah ◽  
Abdallah Jarwan ◽  
Larry Bonin ◽  
Mohamed Ibnkahla
2019 ◽  
pp. 408-421
Author(s):  
Evelin Halling ◽  
Jüri Vain ◽  
Artem Boyarchuk ◽  
Oleg Illiashenko

In mission critical systems a single failure might cause catastrophic consequences. This sets high expectations to timely detection of design faults and runtime failures. By traditional software testing methods the detection of deeply nested faults that occur sporadically is almost impossible. The discovery of such bugs can be facilitated by generating well-targeted test cases where the test scenario is explicitly specified. On the other hand, the excess of implementation details in manually crafted test scripts makes it hard to understand and to interpret the test results. This paper defines high-level test scenario specification language TDLTP for specifying complex test scenarios that are relevant for model-based testing of mission critical systems. The syntax and semantics of TDLTP operators are defined and the transformation rules that map its declarative expressions to executable Uppaal Timed Automata test models are specified. The scalability of the method is demonstrated on the TUT100 satellite software integration testing case study.


Cloud computing is constantly evolving with innovations. So, the cloud service providers are investing big in finding solutions for the challenges confronted by the business organizations in the ever-changing technological world. However, still, there is a little reluctance among the organizations to ultimately adopt the public cloud because the mission-critical applications and the mission-critical data require high-level security and availability which are questionable in the equally growing hacking technology. The hacker's comfort zone is Internet, and the Internet is the primary medium for communication between enterprises and cloud service providers. So, the cloud service providers come up with a solution called Direct-Cloud which bypasses the internet and establishes a private connection between the enterprise and cloud service provider. The primary objective of this paper is to familiarize the terminology direct-cloud as it makes a massive move in Cloud Computing. So, this paper presents a study that describes direct-cloud, its architecture, benefits, the comparison between different direct-cloud solutions and the guidelines to choose a suitable direct-cloud solution. Also, the terminologies Multi-Cloud and ConnectedCloud are gaining attention among the enterprises to meet the growing needs of the business. Hence the paper further explores the direct-cloud deployment in the multi-cloud and connected-cloud environment


Author(s):  
Clive Roberts ◽  
Joe Silmon

This chapter provides an overview of advanced techniques for monitoring the condition of mission-critical railway assets. The safe operation of railways depends on a large number of geographically distributed components, each of which has a low cost when compared to the highly complex arrangements of assets found in other industries, such as rolling mills and chemical plants. Failure of any one of these components usually results in a degradation of service in order to maintain safety, and is thus very costly to modern railway operators, who are required to compensate their customers when delays occur. In this chapter, techniques for industrial condition monitoring are reviewed, highlighting the main approaches and their applicability, advantages, and disadvantages. The chapter first makes some basic definitions of faults, failures, and machine conditions. The analysis of faults through methods such as Fault Tree Analysis and Failure Modes Effects Analysis are examined. The field of fault diagnosis is then reviewed, partitioning into the three main areas: numeric/analytical models, qualitative models, and data/history-based methods. Some of the key approaches within each of these areas will be explained at a high level, compared, and contrasted.


Author(s):  
Richard Onchaga Moses

Following concerted efforts in service chaining and increased maturity of requisite technologies, the potential of geospatial web services in mission-critical applications and business processes is increasingly becoming apparent. Use of geospatial web services in mission-critical applications and business processes nonetheless raises important quality concerns for which guarantees should be provided. As a contribution to the subject of quality of geospatial web services, this chapter identifies and elaborates quality concerns pertinent to geospatial web services and their use in mission critical applications and business processes. The chapter defines a quality model for geospatial web services comprising data quality and quality of service. Quality propagation is outlined and the influence of quality of input data and that of component geospatial web services in a service chain on the quality deliverable end-to-end illustrated. Further, an ontology framework for quality of geospatial web services is presented. The framework comprises an upper ontology, two domain ontologies and potentially many application ontologies. Collectively, the ontologies provide a consistent set of concepts that can be used to unambiguously define and reason about quality of geospatial web services. The chapter also proposes a domain middleware to facilitate efficient and cost-effective quality-aware chaining of geospatial web services. The service design and high-level architecture for the middleware are presented.


2017 ◽  
Vol 9 (9) ◽  
pp. 1497 ◽  
Author(s):  
Eleni Iacovidou ◽  
Jonathan Busch ◽  
John Hahladakis ◽  
Helen Baxter ◽  
Kok Ng ◽  
...  

2016 ◽  
Vol 67 (3) ◽  
pp. 150-159 ◽  
Author(s):  
Kyriakos M. Deliparaschos ◽  
Konstantinos Michail ◽  
Argyrios C. Zolotas ◽  
Spyros G. Tzafestas

Abstract This work presents a field programmable gate array (FPGA)-based embedded software platform coupled with a software-based plant, forming a hardware-in-the-loop (HIL) that is used to validate a systematic sensor selection framework. The systematic sensor selection framework combines multi-objective optimization, linear-quadratic-Gaussian (LQG)-type control, and the nonlinear model of a maglev suspension. A robustness analysis of the closed-loop is followed (prior to implementation) supporting the appropriateness of the solution under parametric variation. The analysis also shows that quantization is robust under different controller gains. While the LQG controller is implemented on an FPGA, the physical process is realized in a high-level system modeling environment. FPGA technology enables rapid evaluation of the algorithms and test designs under realistic scenarios avoiding heavy time penalty associated with hardware description language (HDL) simulators. The HIL technique facilitates significant speed-up in the required execution time when compared to its software-based counterpart model.


2020 ◽  
Vol 17 (5) ◽  
pp. 894-898
Author(s):  
Ruyi Liu ◽  
Qiguang Miao ◽  
Yi Zhang ◽  
Maoguo Gong ◽  
Pengfei Xu

2021 ◽  
Vol 13 (2) ◽  
pp. 39
Author(s):  
Joachim Bjørge Ulven ◽  
Gaute Wangen

The demands for information security in higher education will continue to increase. Serious data breaches have occurred already and are likely to happen again without proper risk management. This paper applies the Comprehensive Literature Review (CLR) Model to synthesize research within cybersecurity risk by reviewing existing literature of known assets, threat events, threat actors, and vulnerabilities in higher education. The review included published studies from the last twelve years and aims to expand our understanding of cybersecurity’s critical risk areas. The primary finding was that empirical research on cybersecurity risks in higher education is scarce, and there are large gaps in the literature. Despite this issue, our analysis found a high level of agreement regarding cybersecurity issues among the reviewed sources. This paper synthesizes an overview of mission-critical assets, everyday threat events, proposes a generic threat model, and summarizes common cybersecurity vulnerabilities. This report concludes nine strategic cyber risks with descriptions of frequencies from the compiled dataset and consequence descriptions. The results will serve as input for security practitioners in higher education, and the research contains multiple paths for future work. It will serve as a starting point for security researchers in the sector.


2008 ◽  
Vol 105 (40) ◽  
pp. 15458-15463 ◽  
Author(s):  
François Guilhaumon ◽  
Olivier Gimenez ◽  
Kevin J. Gaston ◽  
David Mouillot

Species-area relationships (SARs) are fundamental to the study of key and high-profile issues in conservation biology and are particularly widely used in establishing the broad patterns of biodiversity that underpin approaches to determining priority areas for biological conservation. Classically, the SAR has been argued in general to conform to a power-law relationship, and this form has been widely assumed in most applications in the field of conservation biology. Here, using nonlinear regressions within an information theoretical model selection framework, we included uncertainty regarding both model selection and parameter estimation in SAR modeling and conducted a global-scale analysis of the form of SARs for vascular plants and major vertebrate groups across 792 terrestrial ecoregions representing almost 97% of Earth's inhabited land. The results revealed a high level of uncertainty in model selection across biomes and taxa, and that the power-law model is clearly the most appropriate in only a minority of cases. Incorporating this uncertainty into a hotspots analysis using multimodel SARs led to the identification of a dramatically different set of global richness hotspots than when the power-law SAR was assumed. Our findings suggest that the results of analyses that assume a power-law model may be at severe odds with real ecological patterns, raising significant concerns for conservation priority-setting schemes and biogeographical studies.


Sign in / Sign up

Export Citation Format

Share Document