Downloads: 119 | Views: 255
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 1, January 2013 | Popularity: 6.2 / 10
Performance and Reliability of Computer System
D.S Kushwaha, Jyotsna Sinha
Abstract: The system needs to be auditable, reliable, and manageable from a security point of view and must provide records to the security control supervisor, so that system performance, security safeguards, and user activities can be monitored. The computer system reliability is the main criteria to choose any configuration to solve the problems. The Poisson distribution suffers from the same problems as the Exponential Distribution in that the design must be stable and random failures such as when assessing component failures on an established system. After the test, failure rates can be estimated statistically using well-proven techniques. The above indicates the reasons provided according to the source of the information, so it is necessary to define failure more precisely. To avoid confusion with the other types of failure, it is better to define those seen by the user as incidents or, where the whole computer stops, as system interruptions or system failures. With all these various types of failure, the term mean time between failures becomes ambiguous and needs clarifying.
Keywords: reliability, bathtub curve, burn in, bedding in, wear out
Edition: Volume 2 Issue 1, January 2013
Pages: 120 - 127
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera