scholarly journals Performance and Cost Benefit Analysis of a Hardware-Software System Considering Hardware based Software Interaction Failures and Different Types of Recovery

2012 ◽  
Vol 53 (17) ◽  
pp. 25-32 ◽  
Author(s):  
Rajeev Kumar ◽  
Monu Kumar
2020 ◽  
Vol 1 ◽  
pp. 977-986
Author(s):  
F. Laufer ◽  
D. Roth ◽  
H. Binz

AbstractLightweight potential is a powerful indicator – but not as powerful as it could be. Current methods for analyzing a product's potential to be reduced in mass only deal with a few of the most important criteria for lightweight design. This paper presents an approach transferring cost-benefit analysis to the holistic derivation of lightweight potential. The approach is able to deal with different types of criteria supporting the designer in indentifying the most promising components for mass reduction. An evaluation example is given showcasing a tooling machine.


2021 ◽  
Vol 8 (2) ◽  
Author(s):  
Levi Perigo, Rahil Gandotra, Dewang Gedia, Moiz Hussain, Praniti Gupta, Shirin Bano, Vineet Kulkarni

Voice over IP (VoIP) has become the standard technology for telephony and has replaced the old Public Switched Telephone Network (PSTN). This research focuses on the security aspect of VoIP systems. Unsecured VoIP systems are vulnerable to malicious attacks. However, the overhead of the security techniques hampers the performance of VoIP systems. This research analyzes how a VoIP system performs with different security techniques. The performance of the VoIP system is analyzed on different types of data networks such as IPv4, IPv6, and IPv4/IPv6 mixed networks, and in scenarios such as with and without network traffic. Additionally, the research includes a cost-benefit analysis of the security techniques, to determine their cost effectiveness. Based on the performance analysis and cost-benefit analysis, this research proposes three security techniques that can be applied to VoIP systems deployed on IPv4, IPv6, and IPv4/IPv6 networks.


2021 ◽  
Author(s):  
Cynthia Xinran Guo ◽  
Philippe Rochat

We examined 4- to 11-year-old children’s evaluation of six types of lies arranged along a cost-benefit assessment model factoring both the lie-teller and the lie recipient. Children were from three distinct cultural environments: rural Samoa (n = 99), urban China (n = 49), and urban U.S. (n = 109). Following the simple script of six different stories involving a lie-teller and a lie recipient, children were asked to evaluate the character who lied and whether it deserved reward or punishment using a child-friendly Likert scale. From the time children produce both anti- and prosocial lies, our results show that their evaluation of lies rests on a cost-benefit analysis of both the lie-teller and the lie recipient. Such analysis varies depending on age, type of lie, and the child’s cultural environment. In general, Samoan children tended to rate lies more negatively, and they were less differential in their evaluation of the different types of lies compared to both Chinese and U.S. children. We interpret these results as reflecting the differences across cultures in explicit moral teaching and children’s relative experience in resource allocation.


2012 ◽  
Vol 8 (4) ◽  
pp. 16-44 ◽  
Author(s):  
Wang-Kun Chen ◽  
Yih-Ruey Juang ◽  
Sheng-Hua Chang ◽  
Ping Wang

Since there is about seventy percent of population in Taiwan acquiring knowledge of energy conservation through informal education, the non-school based energy education is growing more important. In this paper a brief survey of informal education of energy conservation in Taiwan is conducted. First of all, a variety of instructional scenarios available for informal education are reviewed, including museums, communities, and many others. Secondly, the strategies to promote informal education, such as TV ads, print media advertising, network communication, speaking tour, leaflet distribution, workshop, demonstrations, eco-tour, community colleges, and prize events, are discussed based on cost-benefit analysis. Furthermore, the influence of each strategy on the population’s knowledge of energy conservation is estimated statistically. The effectiveness of different types of informal education is compared based on their economic cost, learning outcome, and acceptance rate. As a conclusion, a suggestion to improve the energy education policy is proposed. This study has been devoted to finding the curriculum theories and strategies applicable in designing curriculum for informal education, and to providing a theoretical basis on which environmental protection education curriculum can be developed.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Zuopeng (Justin) Zhang ◽  
Wu He ◽  
Wenzhuo Li ◽  
M'Hammed Abdous

PurposeEmployees must receive proper cybersecurity training so that they can recognize the threats to their organizations and take the appropriate actions to reduce cyber risks. However, many cybersecurity awareness training (CSAT) programs fall short due to their misaligned training focuses.Design/methodology/approachTo help organizations develop effective CSAT programs, we have developed a theoretical framework for conducting a cost–benefit analysis of those CSAT programs. We differentiate them into three types of CSAT programs (constant, complementary and compensatory) by their costs and into four types of CSAT programs (negligible, consistent, increasing and diminishing) by their benefits. Also, we investigate the impact of CSAT programs with different costs and the benefits on a company's optimal degree of security.FindingsOur findings indicate that the benefit of a CSAT program with different types of cost plays a disparate role in keeping, upgrading or lowering a company's existing security level. Ideally, a CSAT program should spend more of its expenses on training employees to deal with the security threats at a lower security level and to reduce more losses at a higher security level.Originality/valueOur model serves as a benchmark that will help organizations allocate resources toward the development of successful CSAT programs.


Sign in / Sign up

Export Citation Format

Share Document