Modeling and Simulation of Reliability of Networked and Distributed Systems: A Case Data Reliability Model
International Journal of Recent Engineering Science (IJRES) | |
|
© 2023 by IJRES Journal | ||
Volume-10 Issue-4 |
||
Year of Publication : 2023 | ||
Authors : Paul K.M. Masenya, Seleman Ismail |
||
DOI : 10.14445/23497157/IJRES-V10I4P103 |
How to Cite?
Paul K.M. Masenya, Seleman Ismail, "Modeling and Simulation of Reliability of Networked and Distributed Systems: A Case Data Reliability Model," International Journal of Recent Engineering Science, vol. 10, no. 4, pp. 14-18, 2023. Crossref, https://doi.org/10.14445/23497157/IJRES-V10I4P103
Abstract
Data are the raw facts, the material for obtaining information. Information is an increment in knowledge: it contributes to the general framework of concepts and facts we know. The information relies on the context and the recipient's general knowledge for its significance, i.e., output after data has been processed. Information systems (including networked and distributed systems) use data stored in computer databases to provide needed information. A database is an organized collection of interrelated data reflecting a major aspect of a firm's activities. Quality information (data) needs to possess several attributes such as Timely, Complete, Concise, Relevant, Precise, and Form (The level of detail, tabular versus graphic display, quantitative versus qualitative form, and relies upon either Internal or External situations). Failure to meet those attributes can result in a catastrophic impact. That is why we propose a formulation of the mathematical model to measure and predict the data reliabilities in networked and distributed systems. The proposed model discussed depends on general control, application control, and user control, whether internal or external, as well as techniques employed to ensure that data are accurate, complete, relevant, and valid.
Keywords
Data model, Data reliability model, Mathematical modeling of Data reliability.
Reference
[1] M. Van Steen, and A.S. Tanenbaum, CSE223B_textbook1_Distributed Systems, vol. 28, no. 11. 1985.
[2] Mona Shah, and Hiren Joshi, “Role of Distributed Systems in Data Mining,” International Journal of Computer Science and Information Technologies, vol. 6, no. 3, pp. 3010–3013, 2015.
[Publisher Link]
[3] T. Fletcher, and W.J. Howe, A Framework for Address DQ in Distributed Compu.pdf, 2000.
[4] Sarah Shi Hui Wong, and Stephen Wee Hun Lim, “The Derring Effect: Deliberate Errors Enhance Learning,” Journal of Experimental Psychology: General, vol. 151, no. 1, pp. 25–40, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Nathaniel Ayewah, and William Pugh, “Null Dereference Analysis in Practice,” ACM SIGPLAN/SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, pp. 65-72, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[6] J. Taylor, “Sources of Inaccurate Data in Data Entry Process” 2022.
[7] Brian Richmond, “Introduction to Data Analysis Handbook,” Academy for Educational Development, 2006.
[Google Scholar] [Publisher Link]
[8] Paulo Oliveira, Fatima Rodrigues, and Pedro Henriques, “A Formal Definition of Data Quality Problems,” Proceedings of the 2005 International Conference on Information Quality, 2005.
[Google Scholar] [Publisher Link]
[9] Siyavula. [Online]. Available: https://www.siyavula.com/read/cat/grade-11-cat/err
[10] Marvin Rausand, and Arnljot Hoyland, System Reliability Theory Models, Statistical Methods, and Applications, Wiley Interscience, 2004.
[Google Scholar] [Publisher Link]
[11] Muhammad Raza, System Reliability & Availability Calculations, 2019, [Online]. Available: https://www.bmc.com/blogs/systemreliability-availability-calculations/
[12] M. Al-Kuwaiti, N. Kyriakopoulos, and S. Hussein, “A Comparative Analysis of Network Dependability, Fault-Tolerance, Reliability, Security, and Survivability,” IEEE Communications Surveys and Tutorials, vol. 11, no. 2, pp. 106–124, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[13] T. Ravichandran, and Arun Rai, “Total Quality Management in Information Systems Development: Key Constructs and Relationships,” Journal of Management Information Systems, vol. 16, no. 3. pp. 119–155, 1999.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Min Chen et al., “AIWAC: Affective Interaction through Wearable Computing and Cloud Technology,” IEEE Wireless Communication, vol. 22, no. 1, pp. 20–27, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[15] M. Emerson, and J. Kofner, “Technical Product Standards and Regulations in the EU and EAEU – Comparisons and Scope for Convergence,” International Institute for Applied Systems Analysis, 2018.
[Google Scholar] [Publisher Link]
[16] Jinyong Wang et al., “An Optimized Method for Software Reliability Model Based on Nonhomogeneous Poisson Process,” Applied Mathematical Modelling, vol. 40, no. 13–14, pp. 6324–6339, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Antoniou, “What is a Data Model?,” European Journal for Philosophy of Science, vol. 11, 2021.
[CrossRef] [Publisher Link]
[18] International Atomic Energy Agency, Reliability Data Analysis - Use of Generic and/or Plant-Specific Data. [Online]. Available: http://www-ns.iaea.org/downloads/ni/training/specific_expert_knowledge/psa-level1/III3_1%20Reliability%20data%20analysis_use%20of%20generic%20plant%20specif.pdf
[19] Peter J. van de Waerdt, “Information Asymmetries: Recognizing the Limits of the GDPR on the Data-driven Market,” Computer Law and Security Review, vol. 38, p. 105436, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[20] S. Tripathi, D. Muhr, M. Brunner, H. Jodlbauer, M. Dehmer, and F. Emmert-Streib, “Ensuring the Robustness and Reliability of Data-Driven Knowledge Discovery Models in Production and Manufacturing,” Frontiers in Artificial Intelligence, vol. 4. 2021, doi: 10.3389/frai.2021.576892.
[21] Sourabh Kumar Jain et al., “Radiation Tolerant PLL for Onboard FPGAs,” SSRG International Journal of Electronics and Communication Engineering, vol. 10, no. 4, pp. 51-62, 2023.
[CrossRef] [Publisher Link]
[22] Ali Alzahrani et al., “Hybrid Approach for Improving the Performance of Data Reliability in Cloud Storage Management,” Sensors, vol. 22, no. 16, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Tuan Anh Nguyen et al., “Reliability and Availability Evaluation for Cloud Data Center Networks using Hierarchical Models,” IEEE Access, vol. 7, pp. 9273–9313, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[24] R. L. Sarfin, “5 Characteristics of Data Quality” 2021.
[25] K. Thiruthanigesan, and N. Thiruchchelvan, “Data Verification and Validation Process in the Management System Development,” Middle-East Journal of Scientific Research, vol. 25, no. 5, pp. 902–911, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Christine Bellino, and Jefferson Wells, Auditing Application Controls, The Institute of Internal Auditors, 2007.
[Google Scholar] [Publisher Link]
[27] GAO-20-283G, Assessing Data Reliability, Applied Research and Methods, 2019. [Online]. Available: https://www.gao.gov/assets/710/703275.pdf
[28] Data Insider, Data Protection 101, Digital Guardian. [Online]. Available: https://digitalguardian.com/blog/what-cyber-security
[29] Janis Bicevskis, Zane Bicevska, and Girts Karnitis, “Executable Data Quality Models,” Procedia Computer Science, vol. 104, pp. 138– 145, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[30] TechWeb, Understanding Authentication, Authorization, and Encryption.
[Google Scholar] [Publisher Link]
[31] Eric Lachaud, “What GDPR tells about Certification,” Computer Law and Security Review, vol. 38, p. 105457, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Mark P.J. Van Der Loo, and Edwin De Jonge, “Data Validation,” Wiley StatsRef: Statistics Reference Online, 2020.
[Google Scholar] [Publisher Link]
[33] Nilesh A. Lal, Salendra Prasad, and Mohammed Farik, “A Review of Authentication Methods,” International Journal of Scientific & Technology Research, vol. 5, no. 11, pp. 246–249, 2016.
[Google Scholar] [Publisher Link]
[34] D. Dinesh Kumar et al., “A Study on Different Types of Authentication Techniques in Data Security,” International Journal of Civil Engineering and Technology, vol. 8, no. 12, pp. 194–201, 2017.
[Google Scholar] [Publisher Link]
[35] Javad Shahreki, and Hiroshi Nakanishi, “Journal of Soft Computing and Decision Support Systems the Relationship between Task Technology Fit and Individual Performance : Case Study in Hotel Industry in Malaysia,” Journal of Soft Computing and Decision Support Systems, vol. 3, no. 6, pp. 1–15, 2016.
[Google Scholar] [Publisher Link]
[36] P.K.M. Masenya, “Modeling and Simulation of Reliability of Networked and Distributed Systems : A Case User Reliability Component,” International Journal of Academic Engineering Research, vol. 6, no. 12, pp. 7–13, 2022.