265 research outputs found

    A service-oriented architecture for robust e-voting

    Get PDF

    MICROGRID RESILIENCE ANALYSIS SOFTWARE DEVELOPMENT

    Get PDF
    Military installation microgrids need to be resilient to a variety of potential disruptions (storms, attacks, et cetera). Various metrics for assessing microgrid resilience have been described in literature, and multiple tools for simulating microgrid performance have been constructed; however, it is often left to system owners and maintainers to bring these efforts together to identify and realize effective, efficient improvement strategies. Military microgrid stakeholders have expressed a desire for an integrated, unified platform that provides these multiple capabilities in a coordinated fashion. In support of these endeavors, analysis methods developed by NPS and NAVFAC Expeditionary Warfare Center researchers for measuring microgrid resilience have been integrated into an existing web-based microgrid power flow simulation and distributed energy resource rightsizing software tool. This was achieved by the development of additional functions and methods within the existing software platform code base, and expansion of the application programming interface (API). These API additions enabled access to the new calculation and analysis capabilities, as well as increased control over power flow simulation parameters. These analytical and functional contributions were validated through a design of experiments, including comparison to independently generated data, and factorial analysis.Outstanding ThesisCivilian, Department of the NavyCivilian, Department of the NavyCivilian, Department of the NavyCivilian, Department of the NavyCivilian, Department of the NavyApproved for public release. Distribution is unlimited

    Dependability of E-Information Sources

    Get PDF

    Value-Driven Enterprise Architecture Evaluation for the Joint Force Protection Advanced Security System

    Get PDF
    The U.S. military has placed a strong focus on the importance of operating in a joint environment, where capabilities and missions are shared between service components. Protecting U.S. forces is a major consideration in the joint environment. The Joint Force Protection Advanced Security System (JFPASS) architecture has been created to fill a critical gap in Joint Force Protection guidance for systems acquisition. The systems engineering (SE) field has made wide use of system architectures to represent complex systems. As fundamental SE principles become more widespread, analysis tools provide an objective method for the evaluation of the resulting architectural products. This study used decision analysis to develop a standardized, yet adaptable and repeatable model to evaluate the capabilities of the JFPASS for any installation or facility belonging to the United States Department of Defense (DoD). Using the Value-Focused Thinking (VFT) methods, a value hierarchy was created by consulting with subject matter experts. The resulting model, named Value-Driven Enterprise Architecture (VDEA) score, provides an analysis tool, which enables DoD decision-makers to use JFPASS architecture products to quickly and easily evaluate the value provided by the system; VDEA provides insight into the overall quality and capability of the system. Through the scoring and sensitivity analysis functions, capability gaps and potential improvements can be identified. Future studies in this area will provide a vehicle for rating not only operational level systems, but also individual functional projects against other alternatives

    On Modelling and Analyzing Composite Resources’ Consumption Cycles using Time Petri-Nets

    Get PDF
    ICT community cornerstones (IoT in particular) gain competitive advantage from using physical resources. This paper adopts Time Petri-Nets (TPNs) to model and analyze the consumption cycles of composite resources. These resources consist of primitive, and even other composite, resources that are associated with consumption properties and could be subject to disruptions. These properties are specialized into unlimited, shareable, limited, limited-but-renewable, and non-shareable, and could impact the availability of resources. This impact becomes a concern when disruptions suspend ongoing consumption cycles to make room for the unplanned consumptions. Resuming the suspended consumption cycles depends on the resources’ consumption properties. To ensure correct modeling and analysis of consumption cycles, whether disrupted or not, TPNs are adopted to verify that composite resources are reachable, bound, fair, and live

    A Taxonomy of Quality Metrics for Cloud Services

    Full text link
    [EN] A large number of metrics with which to assess the quality of cloud services have been proposed over the last years. However, this knowledge is still dispersed, and stakeholders have little or no guidance when choosing metrics that will be suitable to evaluate their cloud services. The objective of this paper is, therefore, to systematically identify, taxonomically classify, and compare existing quality of service (QoS) metrics in the cloud computing domain. We conducted a systematic literature review of 84 studies selected from a set of 4333 studies that were published from 2006 to November 2018. We specifically identified 470 metric operationalizations that were then classified using a taxonomy, which is also introduced in this paper. The data extracted from the metrics were subsequently analyzed using thematic analysis. The findings indicated that most metrics evaluate quality attributes related to performance efficiency (64%) and that there is a need for metrics that evaluate other characteristics, such as security and compatibility. The majority of the metrics are used during the Operation phase of the cloud services and are applied to the running service. Our results also revealed that metrics for cloud services are still in the early stages of maturity only 10% of the metrics had been empirically validated. The proposed taxonomy can be used by practitioners as a guideline when specifying service level objectives or deciding which metric is best suited to the evaluation of their cloud services, and by researchers as a comprehensive quality framework in which to evaluate their approaches.This work was supported by the Spanish Ministry of Science, Innovation and Universities through the Adapt@Cloud Project under Grant TIN2017-84550-R. The work of Ximena Guerron was supported in part by the Universidad Central del Ecuador (UCE), and in part by the Banco Central del Ecuador.Guerron, X.; Abrahao Gonzales, SM.; Insfran, E.; Fernández-Diego, M.; González-Ladrón-De-Guevara, F. (2020). A Taxonomy of Quality Metrics for Cloud Services. IEEE Access. 8:131461-131498. https://doi.org/10.1109/ACCESS.2020.3009079S131461131498

    Digital ecosystems : a distributed service oriented approach for business transactions

    Get PDF
    EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Smurf : A reliable method for contextualising social media artefacts

    Get PDF
    © Cranfield University 2020. All rights reserved. No part of this publication may be reproduced without the written permission of the copyright ownerThis research aims to evaluate whether artefacts other than the content of user com munication on social media can be used to attribute actions or relationships to a user. Social Media has enhanced the way users communicate on the Internet; providing the means for users to share content in real-time, and to establish connections and social relationships with like-minded individuals. However, as with all technology, social media can be leveraged for disagreeable and/or unlawful activities such as cyber bullying, trolling, grooming, or luring. There are reported cases where evidence from social media was used to secure convictions; for example, the tragic cases of Ashleigh Hall in 2009 and Kayleigh Haywood in 2015. The social media evidence e.g. the messages sent to the victim to arrange a meet up was used to link the suspect to the victim, and attribute actions to the suspect; in addition to other physical evidence presented as part of the case. Investigations with elements of social media is growing within digital forensics. This reinforces the need for a technique that can be used to make inferences about user actions and relationships, especially during a live triage investigation where the information needs to be obtained as quickly as possible. This research evaluates the use of live triage in the investigation of social media interactions, in order to determine the reliability of such a technique as a means of contextualising user activity, and attributing relationships or actions to a user. This research also evaluates the reliability of artefacts other than the actual content exchanged on social media; in the event that the content of communication is not immediately accessible/available to the investigator. To achieve this, it was important to break down the events that occur before, during and after user activity on social media; followed by the determination of what constitutes communication content in the context of this research. This research makes the following contributions: establishes a method for the cat egorisation of social media artefacts based on perceived user activity; communication content was characterised, thus highlighting evidential data of interest from user social media activity; the criteria for assessing the reliability of social media artefacts in a live triage investigation was proposed; a novel framework for social media investigation was developed with a Proof of Concept (PoC) to test its viability. The PoC demonstrates that it is possible to attribute actions or relationships to a user, using artefacts other than the actual content exchanged on social media.Ph

    Intelligent business processes composition based on mas, semantic and cloud integration (IPCASCI)

    Get PDF
    [EN]Component reuse is one of the techniques that most clearly contributes to the evolution of the software industry by providing efficient mechanisms to create quality software. Reuse increases both software reliability, due to the fact that it uses previously tested software components, and development productivity, and leads to a clear reduction in cost. Web services have become are an standard for application development on cloud computing environments and are essential in business process development. These services facilitate a software construction that is relatively fast and efficient, two aspects which can be improved by defining suitable models of reuse. This research work is intended to define a model which contains the construction requirements of new services from service composition. To this end, the composition is based on tested Web services and artificial intelligent tools at our disposal. It is believed that a multi-agent architecture based on virtual organizations is a suitable tool to facilitate the construction of cloud computing environments for business processes from other existing environments, and with help from ontological models as well as tools providing the standard BPEL (Business Process Execution Language). In the context of this proposal, we must generate a new business process from the available services in the platform, starting with the requirement specifications that the process should meet. These specifications will be composed of a semi-free description of requirements to describe the new service. The virtual organizations based on a multi-agent system will manage the tasks requiring intelligent behaviour. This system will analyse the input (textual description of the proposal) in order to deconstruct it into computable functionalities, which will be subsequently treated. Web services (or business processes) stored to be reused have been created from the perspective of SOA architectures and associated with an ontological component, which allows the multi-agent system (based on virtual organizations) to identify the services to complete the reuse process. The proposed model develops a service composition by applying a standard BPEL once the services that will compose the solution business process have been identified. This standard allows us to compose Web services in an easy way and provides the advantage of a direct mapping from Business Process Management Notation diagrams
    corecore