software faults
Recently Published Documents


TOTAL DOCUMENTS

193
(FIVE YEARS 44)

H-INDEX

18
(FIVE YEARS 2)

Author(s):  
Amro Al-Said Ahmad ◽  
Peter Andras

AbstractThis paper presents an investigation into the effect of faults on the scalability resilience of cloud-based software services. The study introduces an experimental framework using the Application-Level Fault Injection (ALFI) to investigate how the faults at the application level affect the scalability resilience and behaviour of cloud-based software services. Previous studies on scalability analysis of cloud-based software services provide a baseline of the scalability behaviour of such services, allowing to conduct in-depth scalability investigation of these services. Experimental analysis on the EC2 cloud using a real-world cloud-based software service is used to demonstrate the framework, considering delay latency of software faults with two varied settings and two demand scenarios. The experimental approach is explained in detail. Here we simulate delay latency injection with two different times, 800 and 1600 ms, and compare the results with the baseline data. The results show that the proposed approach allows a fair assessment of the fault scenario’s impact on the cloud software service’s scalability resilience. We explain the use of the methodology to determine the impact of injected faults on the scalability behaviour and resilience of cloud-based software services.


Author(s):  
Hussein Hamadi ◽  
Benjamin Lussier ◽  
Isabelle Fantoni ◽  
Clovis Francis

Author(s):  
Daniel Maas ◽  
Renan Sebem ◽  
André Bittencourt Leal

This work presents a multilayer architecture for fault diagnosis in embedded systems based on formal modeling of Discrete Event Systems (DES). Most works on diagnosis of DES focus in faults of actuators, which are the devices subject to intensive wear in industry. However, embedded systems are commonly subject to cost reduction, which may increase the probability of faults in the electronic hardware. Further, software faults are hard to track and fix, and the common solution is to replace the whole electronic board. We propose a modeling approach which includes the isolation of the source of the fault in the model, regarding three layers of embedded systems: software, hardware, and sensors & actuators. The proposed method is applied to a home appliance refrigerator and after exhaustive practical tests with forced fault occurrences, all faults were diagnosed, precisely identifying the layer and the faulty component. The solution was then incorporated into the product manufactured in industrial scale.


2021 ◽  
Vol 27 (1) ◽  
Author(s):  
Henrique Marques ◽  
Nuno Laranjeiro ◽  
Jorge Bernardino
Keyword(s):  

Today’s age is Machine Learning (ML) and Data-Mining (DM) Techniques, as both techniques play a significant role in measuring vulnerability prediction accuracy. In the field of computer security, vulnerability is a fault that might be exploited as a risk artist that performs unlawful activities inside computer security. The attackers have several different fitting tools and they are taking advantage to operate software illegally and are using it for getting self-profit. Additionally, that helps to expose and identify the violence external. Weakness management remains a repeating exercise to identify, remediating, and justifying weaknesses. These exercises normally send software faults in computing security. The meaning of using weakness with the same risk might go to misperception. It is possible to have a major effect because of possible stability and the window of weakness presented a risk hole in the software and required to fruitfully finish and smoothly operate. A security room has to be set up (zero-day invaders). Software Security Faults stand serious among unavoidable complications in the realm of computer risk. In this study, we have provided a comprehensive review of three book chapters, more than a hundred research articles papers, and several associated papers of different work that have been studied within the capacity of SVA and discovery applying ML and data-mining techniques. The earlier work has been thoroughly read and an adequately comprehensive summary has been provided in table-1. ML techniques that can professionally handle these attacks and we expect the net result of this survey article to help indesigning the new detection model for identifying the above-mentioned attacks


2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Mansi Gupta ◽  
Kumar Rajnish ◽  
Vandana Bhattacharjee

Deep neural network models built by the appropriate design decisions are crucial to obtain the desired classifier performance. This is especially desired when predicting fault proneness of software modules. When correctly identified, this could help in reducing the testing cost by directing the efforts more towards the modules identified to be fault prone. To be able to build an efficient deep neural network model, it is important that the parameters such as number of hidden layers, number of nodes in each layer, and training details such as learning rate and regularization methods be investigated in detail. The objective of this paper is to show the importance of hyperparameter tuning in developing efficient deep neural network models for predicting fault proneness of software modules and to compare the results with other machine learning algorithms. It is shown that the proposed model outperforms the other algorithms in most cases.


2021 ◽  
Author(s):  
Zhichao Sun ◽  
Ce Zhang ◽  
YuFei Yuan ◽  
Wenqian Jiang ◽  
Miaomiao Fan ◽  
...  
Keyword(s):  

Author(s):  
Shruthi P ◽  
Nagaraj G Cholli

<span>Service availability is one of the major requirements for user satisfaction. Several researches were conducted in recent years to find suitable infrastructure to enhance the availability. Even though both hardware and software are to be in good condition, in recent years, software faults are the major concern for service availability. Software aging is a type of software fault. Software aging occurs as a result of errors accumulation in the internal environment of the system leading to performance degradation. To manage software aging, technique used is software rejuvenation. There exist two kinds of approaches for studying software aging and deriving optimal software rejuvenation schedules. The two approaches are measurement based and model based. In model based approach, analytic models are built for capturing system degradation and rejuvenation process. In measurement based approach, attributes are periodically monitored and that may indicate signs of software aging. In this work, a prototype of measurement based model has been developed. The model captures the aging indicator metrics from cloud environment and rejuvenates once the system reaches aged status. The proposed model uses platform independent, non-intrusive technique for capturing metrics. The rejuvenation carried out after analysing the captured metrics, increases the availability of the service.</span>


Sign in / Sign up

Export Citation Format

Share Document