• Title/Summary/Keyword: Network analysis software

Search Result 796, Processing Time 0.025 seconds

Preliminary Hazard Analysis for Communication Software in Train Communication Network (열차 차상 통신용 소프트웨어의 사전 위험원 분석 연구)

  • Yim, Hyun-Jae;Cha, Gi-Ho;Song, Gyu-Youn
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.9
    • /
    • pp.1379-1384
    • /
    • 2017
  • To guarantee safety and reliability, RAMS(Reliability Availability Maintainability and Safety) activity for a communication software in train communication network is studied. In this paper, preliminary hazard analysis in RAMS activities is studied for the communication software. Preliminary hazard analysis is done through library for communication software that the specification is defined by IEC 61375. The hazards are defined, then causes and consequence for each hazard are defined. The total 36 preliminary hazards are classified. For high severity hazards are changed to acceptable level by upgrading of system requirement specification.

Cross Layer Optimal Design with Guaranteed Reliability under Rayleigh block fading channels

  • Chen, Xue;Hu, Yanling;Liu, Anfeng;Chen, Zhigang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3071-3095
    • /
    • 2013
  • Configuring optimization of wireless sensor networks, which can improve the network performance such as utilization efficiency and network lifetime with minimal energy, has received considerable attention in recent years. In this paper, a cross layer optimal approach is proposed for multi-source linear network and grid network under Rayleigh block-fading channels, which not only achieves an optimal utility but also guarantees the end-to-end reliability. Specifically, in this paper, we first strictly present the optimization method for optimal nodal number $N^*$, nodal placement $d^*$ and nodal transmission structure $p^*$ under constraints of minimum total energy consumption and minimum unit data transmitting energy consumption. Then, based on the facts that nodal energy consumption is higher for those nodes near the sink and those nodes far from the sink may have remaining energy, a cross layer optimal design is proposed to achieve balanced network energy consumption. The design adopts lower reliability requirement and shorter transmission distance for nodes near the sink, and adopts higher reliability requirement and farther transmission distance for nodes far from the sink, the solvability conditions is given as well. In the end, both the theoretical analysis and experimental results for performance evaluation show that the optimal design indeed can improve the network lifetime by 20-50%, network utility by 20% and guarantee desire level of reliability.

New Trend Proposal in Optimization Techniques Application for Mobile Network, Analysis and Signal Processing

  • HAMROUNI, Chafaa
    • Journal of Multimedia Information System
    • /
    • v.7 no.3
    • /
    • pp.221-230
    • /
    • 2020
  • Used optimization techniques as solution for mobile network have been implemented as a reference systems for various applications against fading and signals perturbation, in addition each transition to 5th generation telecommunication standards require a deep studies in order to park an applied instantaneous process. The paper describes a preliminary planning and a careful preparation to update both subscriber radio access network as well as data transmission network this approach conducts to make network resource updates invisible for customers and with minimal costs for mobile operators basically in terms of delay. In addition, network operators transit to mobile networks, multimedia services efficient delivery are considered the challenging application and the most promising for mobile network operators today, this work conduct to optimize video consumption of mobile users which are exponentially increasing. The interference is a complex phenomenon in mobile radio telecommunication system, and a mobile phone can be a source of interference to another one. Actual advances in technology necessitate the need for the complicated software solution that can take several unexpected phenomena in consideration to rise to a level higher than ever. The capability needs today require the use of Drive test which is used to take the performance of network in the field by using a special software called TEMS investigation, it have been implemented as standalone systems for various applications. The paper focuses on considering as the best technical for optimization of mobile networks, analysis and processing of signal, a Drive Test is the method used to take the performance of network in the field by using a special software called TEMS investigation. Most used in the world, this software is reputed to detect and analyze many problems of mobile network between the mobile phone and the transmitter: BTS in case of GSM and Node B for UMTS. An example of that is interference in radio communication. It exists permanently and it degrades considerably the quality of received signal when it exceeds certain levels.

Accuracy Analysis of Unified Control Point Coordinate Using GAMIT/GLOBK Software (GAMIT/GLOBK를 활용한 통합기준점 성과 정확도 분석)

  • Jae Myoung, Cho;Hong Sik, Yun;Dong Ha, Lee
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.33 no.2
    • /
    • pp.103-110
    • /
    • 2015
  • This paper planned for the adjustment of unified control points by compared adjusted software for integrated network and the national integrated network. There may be some errors in the survey date and interpretation of data processing due to applying different software each year. To minimize errors, we performed a precision network adjustment by consolidating control points per observation session over years. Prior to perform the integrated network adjustment with the GPS analysis program (GLOBK) for the final integrated network adjustment, the Quasi-Observation Combination Analysis(QOCA), the Global Kalman filter VLBI and the GLOBK were compared and analyzed to perform an integrated network adjustment. The integrated network adjustment result indicates that the RMSE was rather big with ±0.03m along the vertical axis, but ±0.006m along the horizontal, that is not much different from the existing result.

Efficiency of Graph for the Remodularization of Multi-Level Software Architectures

  • Lala Madiha HAKIK
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.33-39
    • /
    • 2024
  • In a previous study we proceeded to the remodularization architecture based on classes and packages using the Formal Concept Analysis (FCA)[13] [14] [30]. we then got two possible remodularized architectures and we explored the issue of redistributing classes of a package to other packages, we used an approach based on Oriented Graph to determine the packages that receive the redistributed classes and we evaluated the quality of a remodularized software architecture by metrics [31] [28] [29]. In this paper, we will address the issue of the efficiency of the Oriented Graph in the remodularization of software architectures compared to the Formal Concept Analysis FCA method. The formal method of FCA concept is not popularized among scientists as opposed to the use of the labeled directed graph. It is for this reason that our directed graph approach is more effective in its simplicity and popularity.

Software Maintenance Cost Estimation using RBF Network (RBF망을 이용한 소프트웨어 유지보수 비용 추정)

  • 박주석;정기원
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.5
    • /
    • pp.555-562
    • /
    • 2004
  • Software industry has put more emphasis on maintenance and enhancement work than on the new development. The existing effort estimation models can still be applied to maintenance projects, though modifications are needed. This paper suggests a way to estimate the size of a maintenance project from the regression analysis of ISBSG's benchmarking data. First of all, among the 3 elements(addition, modification and deletion of the program) which influences the software cost, we selected and classified 4 groups from a total of 8 which shows actual maintenance cost from ISBSG's data. Moreover, we developed statistical model and a model which uses RBF(Radial Basis Function) Network and after evaluating each functions we concluded that the RBF Network is superior to the statistical model.

Analysis of Object-Oriented Metrics to Predict Software Reliability (소프트웨어 신뢰성 예측을 위한 객체지향 척도 분석)

  • Lee, Yangkyu
    • Journal of Applied Reliability
    • /
    • v.16 no.1
    • /
    • pp.48-55
    • /
    • 2016
  • Purpose: The purpose of this study is to identify the object-oriented metrics which have strong impact on the reliability and fault-proneness of software products. The reliability and fault-proneness of software product is closely related to the design properties of class diagrams such as coupling between objects and depth of inheritance tree. Methods: This study has empirically validated the object-oriented metrics to determine which metrics are the best to predict fault-proneness. We have tested the metrics using logistic regressions and artificial neural networks. The results are then compared and validated by ROC curves. Results: The artificial neural network models show better results in sensitivity, specificity and correctness than logistic regression models. Among object-oriented metrics, several metrics can estimate the fault-proneness better. The metrics are CBO (coupling between objects), DIT (depth of inheritance), LCOM (lack of cohesive methods), RFC (response for class). In addition to the object-oriented metrics, LOC (lines of code) metric has also proven to be a good factor for determining fault-proneness of software products. Conclusion: In order to develop fault-free and reliable software products on time and within budget, assuring quality of initial phases of software development processes is crucial. Since object-oriented metrics can be measured in the early phases, it is important to make sure the key metrics of software design as good as possible.

Pragmatic Strategies of Self (Other) Presentation in Literary Texts: A Computational Approach

  • Khafaga, Ayman Farid
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.223-231
    • /
    • 2022
  • The application of computer software into the linguistic analysis of texts proves useful to arrive at concise and authentic results from large data texts. Based on this assumption, this paper employs a Computer-Aided Text Analysis (CATA) and a Critical Discourse Analysis (CDA) to explore the manipulative strategies of positive/negative presentation in Orwell's Animal Farm. More specifically, the paper attempts to explore the extent to which CATA software represented by the three variables of Frequency Distribution Analysis (FDA), Content Analysis (CA), and Key Word in Context (KWIC) incorporate with CDA decipher the manipulative purposes beyond positive presentation of selfness and negative presentation of otherness in the selected corpus. The analysis covers some CDA strategies, including justification, false statistics, and competency, for positive self-presentation; and accusation, criticism, and the use of ambiguous words for negative other-presentation. With the application of CATA, some words will be analyzed by showing their frequency distribution analysis as well as their contextual environment in the selected text to expose the extent to which they are employed as strategies of positive/negative presentation in the text under investigation. Findings show that CATA software contributes significantly to the linguistic analysis of large data texts. The paper recommends the use and application of the different CATA software in the stylistic and corpus linguistics studies.

Systems Analysis of the Internet E-Mail Security Using IDEFO Modeling (IDEFO 모델링을 이용한 인터넷 전자우편 보안시스템 분석)

  • Kim, Joong-In;Kim, Seok-Woo
    • IE interfaces
    • /
    • v.9 no.3
    • /
    • pp.249-256
    • /
    • 1996
  • The Internet e-mail security software and standards, such as PGP (Pretty Good Privacy) and PEM (Privacy Enhanced Mail), have several limitations that should be overcome for their further applications to the Internet and network environments. In order to improve and reengineer those software, details of the As-Is software processing should be analyzed. One of the possible techniques for software analysis is IDEFO function modeling. Although IDEFO has been mainly used for BPR as one of the industrial engineering techniques, it has been rarely applied to the analysis of software processing and reengineering in computer and software engineering fields. Additionally, no sufficient details of PGP and PEM processing are analyzed in the literature. The objective of this paper is to demonstrate the application of the IDEFO to the systems analysis of the Internet e-mail security software as well as to provide software developers with the basis for software improvements.

  • PDF