Description
System Assurances: Modeling and Management updates on system assurance and performance methods using advanced analytics and understanding of software reliability growth modeling from today's debugging team's point-of-view, along with information on preventive and predictive maintenance and the efficient use of testing resources. The book presents the rapidly growing application areas of systems and software modeling, including intelligent synthetic characters, human-machine interface, menu generators, user acceptance analysis, picture archiving and software systems. Students, research scholars, academicians, scientists and industry practitioners will benefit from the book as it provides better insights into modern related global trends, issues and practices.- Provides software reliability modeling, simulation and optimization- Offers methodologies, tools and practical applications of reliability modeling and resources allocation- Presents cost modeling and optimization associated with complex systems
Table of Contents
1. Statistical analysis approach for the quality assessment of open-source softwareYoshinobu Tamura and Shigeru Yamada2. Analytical modeling and performance evaluation of SIP signaling protocol: Analytical modeling of SIPNikesh Choudhary, Vandana Khaitan (nee Gupta), and Vaneeta Goel3. An empirical validation for predicting bugs and the release time of open source software using entropy measures—Software reliability growth modelsAnjali Munde4. Risk assessment of starting air system of marine diesel engine using fuzzy failure mode and effects analysisRajesh S. Prabhu Gaonkar and Sunay P. Pai5. Test scenario generator learning for model-based testing of mobile robotsGert Kanter and Marti Ingmar Liibert6. Testing effort-dependent software reliability growth model using time lag functions under distributed environmentSudeept Singh Yadav, Avneesh Kumar, Prashant Johri, and J.N. Singh7. Design and performance analysis of MIMO PID controllers for a paper machine subsystemNiharika Varshney, Parvesh Saini, and Ashutosh Dixit8. Network and security leveraging IoT and image processing: A quantum leap forwardAjay Sudhir Bale, S. Saravana Kumar, S. Varun Yogi, Swetha Vura, R. Baby Chithra, N. Vinay, and P. Pravesh9. Modeling software patching process inculcating the impact of vulnerabilities discovered and disclosedDeepti Aggrawal, Jasmine Kaur, and Adarsh Anand10. Extension of software reliability growth models by several testing-time functionsYuka Minamino, Shinji Inoue, and Shigeru Yamada11. A semi-Markov model of a system working under uncertaintyR.K. Bhardwaj, Purnima Sonker, and Ravinder Singh12. Design and evaluation of parallel-series IRM systemSridhar Akiri, P. Sasikala, Pavan Kumar Subbara, and VSS Yadavalli13. Modeling and availability assessment of smart building automation systems with multigoal maintenanceYuriy Ponochovniy, Vyacheslav Kharchenko, and Olga Morozova14. A study of bitcoin and Ethereum blockchains in the context of client types, transactions, and underlying network architectureRohaila Naaz and Ashendra Kumar Saxena15. High assurance software architecture and designMuhammad Ehsan Rana and Omar S. Saleh16. Online condition monitoring and maintenance of photovoltaic systemNeeraj Khera17. Fault diagnosis and fault toleranceAfaq Ahmad and Sayyid Samir Al Busaidi18. True power loss diminution by Improved Grasshopper Optimization AlgorithmLenin Kanagasabai19. Security analyticsVani Rajasekar, J Premalatha, and Rajesh Kumar Dhanaraj20. Stochastic modeling of the mean time between software failures: A reviewGabriel Pena, Veronica Moreno, and Nestor Barraza21. Inliers prone distributions: Perspectives and future scopesK. Muralidharan and Pratima Bavagosai22. Integration of TPM, RCM, and CBM: A practical approach applied in Shipbuilding industryRupesh Kumtekar, Swapnil Kamble, and Suraj Rane23. Revolutionizing the internet of things with swarm intelligenceAbhishek Kumar, Jyotir Moy Chatterjee, Manju Payal, and Pramod Singh Rathore24. Security and challenges in IoT-enabled systemsS. Kala and S. Nalesh25. Provably correct aspect-oriented modeling with UPPAAL timed automataJuri Vain, Leonidas Tsiopoulos, and Gert Kanter26. Relevance of data mining techniques in real lifePalwinder Kaur Mangat and Kamaljit Singh Saini27. D-PPSOK clustering algorithm with data sampling for clustering big data analysisC. Suresh Gnana Dhas, N. Yuvaraj, N.V. Kousik, and Tadele Degefa Geleto28. A review on optimal placement of phasor measurement unit (PMU)Ashutosh Dixit, Arindam Chowdhury, and Parvesh Saini29. Effective motivational factors and comprehensive study of information security and policy challengesM. Arvindhan30. Integration of wireless communication technologies in internet of vehicles for handover decision and network selectionShaik Mazhar Hussain, Kamaludin Mohamad Yusof, Afaq Ahmad, and Shaik Ashfaq Hussain31. Modeling HIV-TB coinfection with illegal immigrants and its stability analysisRajinder Sharma
-
- 和書
- 春の飛行 文春文庫



