scholarly journals A Field Analysis of System-level Effects of Soft Errors Occurring in Microprocessors used in Information Systems

Author(s):  
S.Z. Shazli ◽  
M. Abdul-Aziz ◽  
M.B. Tahoori ◽  
D.R. Kaeli
2011 ◽  
pp. 254-261
Author(s):  
Andrew S. Targowski

This chapter reviews Information Systems (IS) modeling techniques, including relational algebra, structured design, architectural design, and Unified Modeling Language. A new technique “info-mathics” (i.e.,mathematical description of the hierarchical systems architecture) is defined to secure the system reliability and quality. The classification of IS categories and its attributes such as components, structure, relationships, system level, system product, system deepness, system width, system list, system end, and other are presented. Examples of the mathematical notations are provided and their meaning for the practical implications of info-mathics in system analysis and design are indicated.


2016 ◽  
Vol 26 (4) ◽  
pp. 383-394 ◽  
Author(s):  
A. Lora ◽  
A. Lesage ◽  
S. Pathare ◽  
I. Levav

Aims.Information is crucial in mental healthcare, yet it remains undervalued by stakeholders. Its absence undermines rationality in planning, makes it difficult to monitor service quality improvement, impedes accountability and human rights monitoring. For international organizations (e.g., WHO, OECD), information is indispensable for achieving better outcomes in mental health policies, services and programs. This article reviews the importance of developing system level information with reference to inputs, processes and outputs, analyzes available tools for collecting and summarizing information, highlights the various goals of information gathering, discusses implementation issues and charts the way forward.Methods.Relevant publications and research were consulted, including WHO studies that purport to promote the use of information systems to upgrade mental health care in high- and low-middle income countries.Results.Studies have shown that once information has been collected by relevant systems and analyzed through indicator schemes, it can be put to many uses. Monitoring mental health services, represents a first step in using information. In addition, studies have noted that information is a prime resource in many other areas such as evaluation of quality of care against evidence based standards of care. Services data may support health services research where it is possible to link mental health data with other health and non-health databases. Information systems are required to carefully monitor involuntary admissions, restrain and seclusion, to reduce human rights violations in care facilities. Information has been also found useful for policy makers, to monitor the implementation of policies, to evaluate their impact, to rationally allocate funding and to create new financing models.Conclusions.Despite its manifold applications, Information systems currently face many problems such as incomplete recording, poor data quality, lack of timely reporting and feedback, and limited application of information. Corrective action is needed to upgrade data collection in outpatient facilities, to improve data quality, to establish clear rules and norms, to access adequate information technology equipment and to train health care personnel in data collection. Moreover, it is necessary to shift from mere administrative data collection to analysis, dissemination and use by relevant stakeholders and to develop a “culture of information” to dismantle the culture of intuition and mere tradition. Clinical directors, mental health managers, patient and family representatives, as well as politicians should be educated to operate with information and not just intuition.


Electronics ◽  
2021 ◽  
Vol 10 (18) ◽  
pp. 2286
Author(s):  
Yohan Ko

From early design phases to final release, the reliability of modern embedded systems against soft errors should be carefully considered. Several schemes have been proposed to protect embedded systems against soft errors, but they are neither always functional nor robust, even with expensive overhead in terms of hardware area, performance, and power consumption. Thus, system designers need to estimate reliability quantitatively to apply appropriate protection techniques for resource-constrained embedded systems. Vulnerability modeling based on lifetime analysis is one of the most efficient ways to quantify system reliability against soft errors. However, lifetime analysis can be inaccurate, mainly because it fails to comprehensively capture several system-level masking effects. This study analyzes and characterizes microarchitecture-level and software-level masking effects by developing an automated framework with exhaustive fault injections (i.e., soft errors) based on a cycle-accurate gem5 simulator. We injected faults into a register file because errors in the register file can easily be propagated to other components in a processor. We found that only 5% of injected faults can cause system failures on an average over benchmarks, mainly from the MiBench suite. Further analyses showed that 71% of soft errors are overwritten by write operations before being used, and the CPU does not use 20% of soft errors at all after fault injections. The remainder are also masked by several software-level masking effects, such as dynamically dead instructions, compare and logical instructions that do not change the result, and incorrect control flows that do not affect program outputs.


2014 ◽  
Vol 2014 ◽  
pp. 1-8 ◽  
Author(s):  
Seyyed Amir Asghari ◽  
Okyay Kaynak ◽  
Hassan Taheri

Electronic equipment operating in harsh environments such as space is subjected to a range of threats. The most important of these is radiation that gives rise to permanent and transient errors on microelectronic components. The occurrence rate of transient errors is significantly more than permanent errors. The transient errors, or soft errors, emerge in two formats: control flow errors (CFEs) and data errors. Valuable research results have already appeared in literature at hardware and software levels for their alleviation. However, there is the basic assumption behind these works that the operating system is reliable and the focus is on other system levels. In this paper, we investigate the effects of soft errors on the operating system components and compare their vulnerability with that of application level components. Results show that soft errors in operating system components affect both operating system and application level components. Therefore, by providing endurance to operating system level components against soft errors, both operating system and application level components gain tolerance.


2020 ◽  
Author(s):  
Deepak Saxena ◽  
Joe McDonagh

Enterprise Information Systems (EIS) are often used by organisations to automate and integrate their business processes to create value and efficiency. However, the majority of EIS research is centred on the implementation phase with relatively little work on the pre‑implementation phase. Another gap in the existing literature is that it usually ignores the wider institutional context when determining the generalisability of research findings. This study focuses on the procurement process and analyses three instances of EIS procurement in a public service organisation. The data collection is conducted using a socio‑technical systems framework embedded within a case study methodology. Narrative analysis with a processual lens is used as an analytical tool in this study. In contrast to the existing conception of the procurement process as a completely rational and linear decision‑making process, our findings explain it as a multi‑level process where factors from the work‑system and the macrosocial level play a crucial role in influencing the decisions at the organisational level. Technological imperative (work‑system level) and business case (organisational level) are found to be critical factors in EIS procurement, in line with previous findings. However, the findings suggest a greater role of the macrosocial factors – EIS market, EIS vendor, and the institutional context. This study also notes the demonstrative nature of certain elements of the EIS procurement process in public service organisations. Thus, this study brings out the complexity and contextual nature of EIS procurement in public service organisations by demonstrating the interplay of factors operating at the work‑system, organisational, and macrosocial levels.


2020 ◽  
Author(s):  
Rajiv Banker ◽  
Yi Liang ◽  
Narayan Ramasubbu

Technical debt refers to the design, development, and implementation shortcuts taken by firms when deploying accounting information systems. Prior system-level studies have shown that such shortcuts decrease the reliability of systems and increase the long-term system maintenance obligations. On the one hand, technical debt may cause system disruptions that impair firm-level performance. On the other hand, incurring technical debt may aid firms to expedite their systems deployment and to implement idiosyncratic functionalities that may enhance performance. In this firm-level study, we examine the economic implications of technical debt accumulated by 26 firms in their customer relationship management (CRM) systems over an 11-year period. We find that firms operating in industries with higher “clockspeed” and higher competitive threats tend to accumulate more technical debt. After controlling for industry- and firm-level factors, our analysis reveals that technical debt embedded in the CRM systems negatively impacts firms’ performances, measured as gross profit scaled by beginning-of-year total assets (GROA). We estimate that a 10% increase in technical debt reduces GROA by 16% on average. The negative impact of technical debt on GROA increases over the lifecycle of the systems, which significantly reduces the long-term business value of those systems. Highly experienced information technology teams and the presence of a chief information officer in a firm’s top management team, however, serve to mitigate, at least partially, the negative impact of technical debt. We discuss the implications of these findings for research on the business value and governance of accounting information systems and performance evaluation. This paper was accepted by Shiva Rajgopal, accounting.


Author(s):  
H. Shih ◽  
C. Li

Ensuring security for its information systems, including computers and networks, is a fundamental prerequisite for a digital government to function to the expectation of its people. The security problem can be “visualized” by projecting it onto a three-level hierarchy: management level, system level, and application and data level. The key elements of information security include integrity, confidentiality, availability, authentication and non-repudiation, which have to be taken into account at different levels within the hierarchy. Since there are specific articles in this encyclopedia to address the security issues at the lowest two levels, this article will focus on the management level at the top level of the hierarchy. At the management level, the main emphases are to prevent security breaches from happening and to minimize the impact when security events happen. The decision of security investment and deployment requires clear identification of risks posed to the information systems and feasible cost analyses. In addition, to ensure that the investment and deployment are worthwhile, information security policies and procedures have to be thoughtfully devised and effectively enforced. Therefore, at the management level, risk assessment, cost analysis, policymaking, procedure definition, and policy and procedure enforcement have to be looked into.


Author(s):  
Pieter Joubert ◽  
Jan H Kroeze ◽  
Carina De Villiers

There are many situations during information system development (ISD) where there is a need to do modelling on a business level before more detailed and robust modelling are done on the technical system level. Most business level modelling uses some form of natural language constructs which are, on the one hand, easy to use by untrained users, but which are too vague and ambiguous to be used in subsequent systems level modelling by systems analysts, on the other hand. The goal of this article is to suggest a subset of morphology, syntax and semantics concepts that may be used to analyse texts containing business rules during Information Systems analysis and design. The contribution of this research is to provide a better understanding of the fundamental entities in business and ISD modelling and their relationships in order to improve informal, mostly textual, business modelling.Keywords: business rules, modelling, grammar, morphology, syntax, semanticsDisciplines: Information Systems, Information Systems Development, Information Systems Analysis and Design, Linguistics


2008 ◽  
Vol 52 (3) ◽  
pp. 293-306 ◽  
Author(s):  
J. A. Rivers ◽  
P. Bose ◽  
P. Kudva ◽  
J.-D. Wellman ◽  
P. N. Sanda ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document