• Title/Summary/Keyword: Software availability

Search Result 256, Processing Time 0.031 seconds

A Study on Component Software Service Oriented Maintenance Process Based on MaRMI-RE and ITIL (마르미-RE와 ITIL에 기반한 컴포넌트 소프트웨어의 서비스 지향 유지보수 프로세스 연구)

  • Choi, Won-Suh;Rhew, Sung-Yul
    • Journal of Information Technology Services
    • /
    • v.8 no.1
    • /
    • pp.99-111
    • /
    • 2009
  • Rapid growth of Management Information System (MIS) and evolution of software system enlarge maintenance necessity and it needs a process to implement information system service in business. This paper proposes service-oriented maintenance process of component software based on service design and implementation provided by existing processes for maintenance, MaRMI-RE and ITIL. The proposed process derives activities and tasks of the process by identifying services according to service guidelines. Service-oriented maintenance process is produced by analyzing correlation between the derived activities and tasks and MaRMI-RE's and adding the tasks to MaRMI-RE. To verify availability of the proposed service-oriented maintenance process, correlation between artifacts is proved.

Overview of Modeling Process using Giant Magellan Telescope Software Development Kit

  • Han, Jimin;Kim, Changgon;Pi, Marti;Filgueira, Josema;Cox, Marianne;Peng, Chien;Roman, Alfonso;Molgo, Jordi;Schoenell, William;Swett, Hector;Thanasekaran, Divya;Kurkdjian, Pierre;plubell, Charles;Ji, Tae-Geun;Lee, Hye-In;Pak, Soojong
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.44 no.2
    • /
    • pp.46.2-46.2
    • /
    • 2019
  • The software group in Giant Magellan Telescope Organization (GMTO) is developing the GMT Software Development Kit (SDK) for the device control and the telescope operations. The SDK is dived into the modeling and the operation defining. In the modeling process, Domain Specific Language (DSL) can validate the availability of a model and generate a skeleton code automatically. After the modeling, the developer can simply define the device operation. All devices are connected via EtherCAT, and the SDK simplifies the network connection. This presentation will give an overview of the modeling process and development examples using the GMT SDK.

  • PDF

Enhancing Service Availability in Multi-Access Edge Computing with Deep Q-Learning

  • Lusungu Josh Mwasinga;Syed Muhammad Raza;Duc-Tai Le ;Moonseong Kim ;Hyunseung Choo
    • Journal of Internet Computing and Services
    • /
    • v.24 no.2
    • /
    • pp.1-10
    • /
    • 2023
  • The Multi-access Edge Computing (MEC) paradigm equips network edge telecommunication infrastructure with cloud computing resources. It seeks to transform the edge into an IT services platform for hosting resource-intensive and delay-stringent services for mobile users, thereby significantly enhancing perceived service quality of experience. However, erratic user mobility impedes seamless service continuity as well as satisfying delay-stringent service requirements, especially as users roam farther away from the serving MEC resource, which deteriorates quality of experience. This work proposes a deep reinforcement learning based service mobility management approach for ensuring seamless migration of service instances along user mobility. The proposed approach focuses on the problem of selecting the optimal MEC resource to host services for high mobility users, thereby reducing service migration rejection rate and enhancing service availability. Efficacy of the proposed approach is confirmed through simulation experiments, where results show that on average, the proposed scheme reduces service delay by 8%, task computing time by 36%, and migration rejection rate by more than 90%, when comparing to a baseline scheme.

A Development Technique for Application Software Based on Intrusion Tolerant Requirements (침입감내 요구사항을 수용한 응용 소프트웨어 개발)

  • Kim Chul Jin;Lee Sook Hee;Cho Eun Sook
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.2
    • /
    • pp.233-248
    • /
    • 2005
  • An intrusion tolerant technology has been introduced as a solution to prevent intrusion accident for unknown fragility or attack. However, a systematic modeling technique is not applied into a system design and development based on intrusion tolerant technology. Especially, elements such as availability, integrity, reliability, confidentiality, and so on are important requirements in intrusion tolerant system. Nevertheless, current most of UML-based modeling techniques pass over or don't provide design techniques reflecting those requirements. Therefore, we know these weaknesses and propose both profile and design technique reflecting and applying intrusion tolerant requirements systematically in the development of application software based on intrusion tolerance. We expect that proposed technique can extend not only current UML's limitations but also can improve the quality of application software based on intrusion tolerance.

  • PDF

The Comparative Study for ENHPP Software Reliability Growth Model based on Modified Coverage Function (변형 커버리지 함수를 고려한 ENHPP 소프트웨어 신뢰성장 모형에 관한 비교 연구)

  • Kim, Hee-Cheul;Kim, Pyong-Koo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.89-96
    • /
    • 2007
  • Finite failure NHPP models presented in the literature exhibit either constant. monotonic increasing or monotonic decreasing failure occurrence rates per fault. Accurate predictions of software release times. and estimation of the reliability and availability of a software product require quality of a critical element of the software testing process : test coverage. This model called Enhanced non-homogeneous Poission process(ENHPP). In this paper, exponential coverage and S-type model was reviewed, proposes modified(the superosition and mixture) model, which make out efficiency application for software reliability. Algorithm to estimate the parameters used to maximum likelihood estimator and bisection method. model selection based on SSE statistics for the sake of efficient model, was employed.

  • PDF

The Study for ENHPP Software Reliability Growth Model based on Superposition Coverage Function (중첩커버리지 함수를 고려한 ENHPP 소프트웨어 신뢰성장 모형에 관한 연구)

  • Kim, Hee-Cheul;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.7-13
    • /
    • 2007
  • Finite failure NHPP models presented in the literature exhibit either constant, monotonic increasing or monotonic decreasing failure occurrence rates per fault. Accurate predictions of software release times, and estimation of the reliability and availability of a software product require quantification of a critical element of the software testing process : test coverage. This model called Enhanced non-homogeneous poission process (ENHPP). In this paper, exponential coverage and S-shaped model was reviewed, proposes the superposition model, which maked out efficiency application for software reliability. Algorithm to estimate the parameters used to maximum likelihood estimator and bisection method, model selection based on SSE statistics for the sake of efficient model, was employed.

  • PDF

Priority-based Differentiated Service in Spectrum Mobility Game

  • Lu, Bingxian;Qin, Zhenquan;Wang, Lei;Sun, Liang;Zhu, Ming;Shu, Lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1324-1343
    • /
    • 2014
  • In recent years, the problem of spectrum mobility in Cognitive Radio (CR) Networks has been widely investigated. In order to utilize spectrum resources completely, many spectrum handoff techniques based on game theory have been proposed, but most studies only concern that users how to achieve better payoffs, without much attention to the diverse needs of users. In this paper, we propose a new channel-switching model based on game theory, using a prioritized approach to meet the diverse needs of users in two different modes (CQ and PS). At the same time, this paper proposes some acceleration techniques to reach the Nash equilibrium more efficiently. We evaluate the performance of the proposed schemes depending on priority using real channel availability measurements, and conclude that the channel quality function (CQ) mode provide better service for priority user but the plan-sorting (PS) mode can be more suitable in multiple priority users exist scene.

The Study for NHPP Software Reliability Growth Model of Percentile Change-point (백분위수 변화점을 고려한 NHPP 소프트웨어 신뢰성장모형에 관한 연구)

  • Kim, Hee-Cheul;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.115-120
    • /
    • 2008
  • Accurate predictions of software release times, and estimation of the reliability and availability of a software product require quantification of a critical element of the software testing process: Change-point problem. In this paper, exponential (Goel-Okumoto) model was reviewed, proposes the percentile change-point problem, which maked out efficiency application for software reliability. Algorithm to estimate the parameters used to maximum likelihood estimator and bisection method, model selection based on SSE statistics, for the sake of efficient model, was employed. Using NTDS data, The numerical example of percentilechange-point problemi s presented.

  • PDF

Component Retrieval using Extended Software Component Descriptor (확장된 소프트웨어 컴포넌트 서술자에 기초한 컴포넌트 저장소의 검색)

  • Geum, Yeong-Uk;Park, Byeong-Seop
    • The KIPS Transactions:PartD
    • /
    • v.9D no.3
    • /
    • pp.417-426
    • /
    • 2002
  • Components are stored in a component repository for later reuse. Effective search and retrieval of desired components in a component repository is a very important issue. It usually takes a lot of time and efforts to gather information about a component, and its availability is essential to implement a repository. Software Component Descriptor proposed in CORBA 3 contains information about a component using an XML vocabulary. In this paper we extend Software Component Descriptor to be useful for the search of a component repository. We use a facet scheme as a search method of a component repository. And our new retrieval method supports queries connected with logical operators such as AND, OR, NOT, which were not supported with existing facet retrieval methods. Also we reduce the search complexity considerably.

Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing

  • Elhabob, Rashad;Zhao, Yanan;Sella, Iva;Xiong, Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4742-4770
    • /
    • 2019
  • Cloud computing provides a broad range of services like operating systems, hardware, software and resources. Availability of these services encourages data owners to outsource their intensive computations and massive data to the cloud. However, considering the untrusted nature of cloud server, it is essential to encrypt the data before outsourcing it to the cloud. Unfortunately, this leads to a challenge when it comes to providing search functionality for encrypted data located in the cloud. To address this challenge, this paper presents a public key encryption with equality test for heterogeneous systems (PKE-ET-HS). The PKE-ET-HS scheme simulates certificateless public encryption with equality test (CLE-ET) with the identity-based encryption with equality test (IBE-ET). This scheme provides the authorized cloud server the right to actuate the equivalence of two messages having their encryptions performed under heterogeneous systems. Basing on the random oracle model, we construct the security of our proposed scheme under the bilinear Diffie-Hellman (BDH) assumption. Eventually, we evaluate the size of storage, computation complexities, and properties with other related works and illustrations indicate good performance from our scheme.