122 research outputs found
Assessing the Use of Machine Learning to Find the Worst-Case Execution Time of Avionics Software
FA8702-15-D-0002Many parts in aircraft today rely on software that interacts with its physical environment. Typically, this interaction involves taking sensor readings, sending actuation commands, reading commands from humans, and presenting information to humans. These interactions require that the software deliver results at the right time,\uf020as argued in the guidance document DO-178C and in previous FAA reports. Correct timing, in turn, depends on the execution time of individual programs. Hence, the problem of finding an upper bound on the execution time of a program,\uf020called Worst-Case Execution Time (WCET) analysis,\uf020is an important step in avionics certification. Unfortunately, WCET analysis is difficult for several reasons. A program can typically execute a large number of different paths. During the execution of one path, the program uses resources in a complex way and this resource use is difficult to analyze. Finally, during the execution of one path, the speed of execution depends on temperature, which, in turn, depends on earlier execution. This report presents research on WCET analysis using Machine Learning (ML) and Artificial Intelligence (AI) aiming to make WCET analysis less dependent on detailed knowledge of the program that is analyzed and the hardware used
Repeat Task Sending Model and Performance Analysis of Conversational Mode Multiple Computer System
For more approoriate analysis of a conversational mode multiple computer system performance influenced by stochastic arrival, typing and demanding properties of users, a repeat task sending model is presented. In the model, a remain probability R characterizing the repeat task sending property of a user is introduced as probability that the user remains at terminal after he receiued his served tasp. The equations to the probabilities for queue sizes are derived for the analysis, and the probabilities satisfying the equations are obtained in simple multiplication form. Various perfomrance measures based on the probabilities, including average response time and average holding time of terminal, are given. Finally properties of several performance measures are numerically computed and shown in figures
Simplified compression and reconstruction techniques of digital images by means of discrete wavelet transforms
The main aim of wavelet transform is to provide an intuitive and visual representation of digital signals or image data from the viewpoint of time-frequency or space-scale relation, respectively. Many aspects of digital images : the effect of resolution level, visual appearance of compressed and reconstructed images, and image fidelity between two different images are discussed in connection with different filter coefficients such as D2, D4, and D8 which are used in scaling equations. A fidelity degree of reconstructed images may be visually evaluated using a display result of the difference image between an original image and its reconstructed image, although the commonly used error criterion is a quantitative measure of the root-mean-squared error or PSNR
A Blur of Reconstructed Images Caused by Orthogonal Transforms : DCT & DWT and an Evaluation of Image Fidelity
The simplified representation techniques in quasi-color are proposed in order to intuitively estimate the visual appearances and differences between similar images, i. e., the blur of reconstructed images caused by orthogonal trans-forms : DCT and DWT. One of the available role of diffemence images is discussed together with the statistical measures : RMSE and/or PSNR for the evaluation of image fidelity
A notation to measure and improve efficiency with regards to Integration, Validation and Verification of systems Integration Verification Validation Assessment Notation (IV2AN)
International audienceIntegration, Verification & Validation processes are key activities regarding the Quality, Cost and Delivery time, and thus has a huge impact on the projects profitability. IVV processes are complex and have to take into account in a coherent way various elements such as skills, organizations, means, process and risk management. Therefore, a maturity model is well adapted to describe how to evaluate and improve an industrial context. In order to help managers to assess their IVV process and reach a performance level corresponding to their goal, an assessment notation has been carried out (IV²AN). As the main idea is to improve step by step and not to jump directly to the higher level, the assessment notation proposes some ideas for a smooth deployment to improve and gain in development performance. This paper describes this approach, based on criteria which seem important to the INCOSE's French Chapter (AFIS) IVVQ Working Group and shared by several industrial companies
Unintentional Insider Threats: Social Engineering
<p>The research documented in this report seeks to advance the understanding of the unintentional insider threat (UIT) that derives from social engineering. The goals of this research are to collect data on additional UIT social engineering incidents to build a set of cases for the Management and Education of the Risk of Insider Threat (MERIT) database and to analyze such cases to identify possible behavioral and technical patterns and precursors. The authors hope that this research will inform future research and development of UIT mitigation strategies.</p
- …
