Modeling the Reliability of Information Management Systems based on Mission Specific Tools Set Software
Journal Title: Journal of Applied Quantitative Methods - Year 2010, Vol 5, Issue 1
Abstract
The operational environments in which information management systems operate determine the existence of complex situations. Consequently, the command and control flow can take different paths, which involve different “sets” of activities. Each of those activities is associated with a specific software application set, known as Application Software Tools (ASTs). An operational profile represents a sequence of specific processing of distinct activities (from a functional point of view), based on specific Application Software Tools and with a certain time limit interval. Each operational profile has associated a probability of occurrence. Each activity is performed during a specified period of time, with specific sets of ASTs. Totality resulting AST specification due to operational profiles crowd formed a mission specific software application system, also known as a Mission Specific Tools Set (MSTS). Each MSTS’s element fulfill functions that meet the corresponding command and control activities, found in the form of lists of features of the system operational profile. The aim of this paper is to present an original MSTS reliability model, which combines the modelling approach based on operational profiles with Rome Research Laboratory software reliability modeling methodology. In this way, it was realized a dual representation of application set’s reliability that quantifies its level of reliability and also the associated weights of each application. The final goal was to offer an adequate basis for the process of reliability growth. This paper is also going to provide a calculus example of MSTS system reliability using a representative U.S. Navy C4ISR system’s combat action (Time Critical Targeting). The case study demonstrates the validity and the usefulness of the model in order to increase the system’s reliability.
Authors and Affiliations
Cezar VASILESCU
SECURITY EVALUATION IN COLLABORATIVE M-LEARNING SYSTEMS
The paper analyses the security issues related to m-learning applications. The collaborative systems are classified, emphasizing on collaborative systems from the mobile learning field. The security of informatics applic...
C# Entities Quality Analysis
In this paper we will present the requirements for C# batch program development. Also there is constituted a quality analysis system of indicators for C# programs. The software structure used to analyze the C# program b...
Bootstrap and Jackknife Resampling Algorithms for Estimation of Regression Parameters
In this paper, the hierarchical ways for building a regression model by using bootstrap and jackknife resampling methods were presented. Bootstrap approaches based on the observations and errors resampling, and jackknife...
ON FUZZY REGRESSION ADAPTING PARTIAL LEAST SQUARES
Partial Least Squared (PLS) regression is a model linking a dependent variable y to a set of X (numerical or categorical) explanatory variables. It can be obtained as a series of simple and multiple regressions of simple...
TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION
The objective of this paper is to present the results gathered in research, regarding the testing and the security assurance as key components of distributed econometric applications reengineering. Consequently, the test...