SlideShare a Scribd company logo
1 of 10
Download to read offline
Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
Vol. 2, No. 2, June 2014, pp. 101~110
ISSN: 2089-3272  101
Received February 24, 2014; Revised April 29, 2014; Accepted May 16, 2014
Dynamic Value Engineering Method Optimizing the
Risk on Real Time Operating System
Dr Prashant Kumar Patra1
, Padma Lochan Pradhan2
1
Dept. of CSE, College of Engineering & Technology, BPUT, Bhubaneswar-751003, Orissa, India.
2
Dept. of CSE, Central Institute of Technology, Raipur, CG, India.
e-mail: citrprcs@rediffmail.com.
Abstract
The value engineering is the umbrella of the many more sub-system like quality assurance,
quality control, quality function design and development for manufacturability. The system engineering &
value engineering is two part of the coin. The value engineering is the high level of technology
management for every aspect of engineering fields. The value engineering is the high utilization of System
Product (i.e. Processor, Memory & Encryption key), Services, Business and Resources at minimal cost.
The high end operating system providing highest services at optimal cost & time. The value engineering
provides the maximum performance, accountability, reliability, integrity and availability of processor,
memory, encryption key and other inter dependency sub-components. The value engineering is the ratio of
the maximum functionality of individual components to the optimal cost. The VE is directly proportional to
performance of individual components and inversely proportional to the minimal cost. The VE is directly
proportional to the risk assessment. The VE maximize the business throughput & decision process mean
while minimize the risk and down time. We have to develop the dynamic value engineering method for risk
optimization over a complex real time operating system.
Keywords: Value Engineering, Product Specification, Business Specification, Encryption, Processor,
Memory, Value Method, High Availability
1. Introduction
In the present age, the technology management can be defined as the integrated
planning, designing, organizing, operation and control of product & services at minimal cost.
The technology management improves the value engineering in a systematic & continuous
manner. The high performance of individual components at minimum cost will be high utilize at
lowest cost, then improve the productivity of services and satisfy to the risk mgmt system. It is a
systematic & continuous process require for high productivity with low cost. [1], [6-7]
Product (P, M, E, C, A)
Business Resources
Figure 1. PBR Optimize the PME
The value engineering (VE) is a systematic approach to improve the value of goods or
products and services by using real time experimental method. The value can therefore be
increased by either improving the functionality and reducing the cost or both simultaneously.
The value engineering is specifically establishing and maintaining cost-effective value
 ISSN: 2089-3272
IJEEI Vol. 2, No. 2, June 2014 : 101 – 110
102
engineering procedures and process in a systematic way. The value engineering is based on
system engineering. The value engineering concept can be develop by combining system
engineering (SE), reliability engineering (RE) and security engineering (SC). [3], [12].
The value methodology (VM) is a dynamic, systematic and structured approach,
improves projects, products and processes. The VM is used to analyze manufacturing products
and processes define, design, develop the projects, business and administrative processes. The
VM helps to achieve balance among required functions, performance, quality, reliability,
scalability, high availability, safety and scope with the cost and other resources necessary to
accomplish those requirements. The proper balance results in the maximum value for the
project. [3], [12].
1.1 Value Engineering: Value = Function/Cost
 Value is the reliable performance of functions to meet customer needs (Requirement
Analysis) at the lowest overall cost.
 Function is the natural or characteristic action and reaction (behaviors and characteristics of
components) performed by a product or service.
 Cost is the expenditure necessary to produce a project, goods, service, process and
structure.
When the system engineering & value engineering both meet each other, the risk
assessment definite would be optimize at lowest cost. The risk assessment is the first process
of the risk management methodology. Organizations use risk management to determine the
extent of the potential threat and the risk associated with an IT system and sub system
throughout its life cycle as the steps follow. The output of this process helps to identify
appropriate controls (Preventive control, detective control, & corrective control) for reducing or
eliminating risk during the risk mitigation process, as discussed in proposed VE method. Risk is
a function of the likelihood of a given threat-source’s exercising a particular potential
vulnerability, and the resulting impact of that adverse event on the organization. To determine
the likelihood of a future adverse event, threats to an IT system must be analyzed in conjunction
with the potential vulnerabilities and the controls in place for the IT system. Impact refers to the
magnitude of harm that could be caused by a threat’s exercise of vulnerability. The level of
impact is governed by the potential mission impacts and in turn produces a relative value for the
IT assets and resources affected (e.g., the criticality and sensitivity of the IT system
components, devices and data [13], [18].
1.2 Operating System
The operating system is a collection of hardware, software & application that manages
system resources and provides common services for resources, program, application & users.
The operating system is an essential component of the system software (processor, memory,
encryption, shell, file & kernel) in computer system. The high level language (application
programs) usually require an operating system to function. The Real time operating system is a
multitasking, time sharing & distributed operating system that aims at executing real-time
applications. The real-time operating systems often use specialized scheduling algorithms so
that they can achieve a deterministic nature of behavior. The main objective of real-time
operating systems is their quick and predictable response to events. They have an event-driven
or time-sharing design and often aspects of both. An event-driven system switches between
tasks based on their priorities or external (resources) events while time-sharing operating
systems switch tasks based on clock interrupts. [9-10], [15-16].
Operating system control is a step by step process of securely configuring a system to
protect it against unauthorized access, while also taking steps to make the system more reliable
and available. Generally anything that is done in the name of system. Preventive control
ensures the system is secure, reliable and high available for high IT culture.
VE role in regards to Risk Mgmt:
 Communicate risk to top management by help of mobile message (mobichart).
 Organize & understand variables affecting risk (High, Medium & Low).
 Traditional cascading risk charts, risk matrix, risk register (Physical /Logical).
 Implement quantitative risk analysis, design & implement.
 Assess current design state & existing method and approach. (/var/adm/message) VE
IJEEI ISSN: 2089-3272 
Dynamic Value Engineering Method Optimizing the Risk on Real Time … (Prashant KP)
103
products provides decision making system.
 Removes or disable emotion element and objects from the system.
 Enables fact-based decisions making & acquisition to top mgmt by help of mobile
computing.
 Decision Analysis-builds consensus, defines alternatives, assigns priority and in a
systematic manner.
 Define, design, develop and deployment and decide (D^4) in a systematic manner.
2. Literature Survey [2], [9-10], [15-16]
The technical literature survey in IS Security area is very, risk, critical & tedious work to
collect the actual data and analysis, investigation & evidence in the real life system. It is one of
the ongoing processes in a continuous manner. It is a very time consuming to investigate &
judge the information.
There are many text book & reference books help to us to find out the real issue. The
reference books like: Applied Cryptography by Bruce Schneier & Cryptography & Network
Security by William Stalling is very much help full to expand our idea. The proposed model &
method is very helpful to application of cryptographic key management issue. The Sun Micro-
system UNIX sun Solaris system administration guide: Vol 1 & Vol 2. & O’ Reilly, Essential of
System Administration is very helpful to collect the basic data [17], [18].
In our past experience, we observed on operating system as well as network server,
there are many system parameters are defaults lacking behind over a larger application &
multiple resources and business on heterogeneous platform. There are many more issue arising
like, memory, performance, bandwidth, network & packets are slow down. This issue is
highlighted in our problem statement, action plan & proposed method.
We have to find out some method to make the more efficient, secure, high available &
robust high end operating system. No where develop the detail methods in Graphically as well
as Mathematically about the risk management of the OS. There are many issues are not
develop till now like: Risk Identification, Risk Analysis, Risk Mitigation & risk results in the
operating system level. We have to develop Risk Identification, Risk Analysis, Risk Mitigation in
both analytical & graphical way. There many documents are available in general sense of risk
identifications, risk analysis, risk mitigation, but operating system level the classification &
categorization of risk is not available on today itself. We have to focus on the system specific
like OS & system software on VE, RM & decision process. We can develop some optimization
model, method and mechanism for risk mitigation based on technology survey. We have to
consider the functionality of indivusal components of operating system, Product, Business &
Resources.
2.1 Data Collection Based on Existing System Engineering: (Basic Data)
There are number of system engineering preventive control methods developed as per
requirement of the secure computing to achieve the highest level of business objective. UNIX
file system have to be develop as per business requirement [2], [9-10], [15-16].
 ISSN: 2089-3272
IJEEI Vol. 2, No. 2, June 2014 : 101 – 110
104
Table 1. Basic Data
S
N
SYSTEM FILES INPUT
(Owner)
ACTION PLAN REMARKS OUPUT
1 /etc/system [PS] Product Implement the kernel & n-bit processer Can be improve the system
performance
2 /etc/hosts Develop the scripts:allow/disallow as per policy,
chmod000= /etc/hostnnmmxmdisallow
Preventative control
Access control mechanism
3 /etc/services [BS]
Services
Disable the third parties services. Remove the ftp, http,
telnet, port no, printer, IP services. Those services are not
required.
Preventative control
4 /use/bin/rsh, etc/ pam.conf Disable all remote services: chmod 000 /usr/bin/rsh,
rksh,rcp, ruser,rlogin, uptime.
Preventative control
5 /var/adm/message Date & time stamp (events mgmt) Internal audit purpose Detective
control
6 /etc/rc.conf script Run level script
Run level script have to develop as per requirement.
/etc/init.conf,rc2.d example:httpd_flags="NO"
Preventative control
7 /etc/init.d OS services, run level Preventative control
8 etc/ssh/sshd_config
[PS]
Automated control
Cryptography enable through ssh implementation AES: 256
bits chipper.
chiper blowfish-CBC,aes256-CBC, aes256-chr.ssh-keygen
-b 1024 -f /etc/ssh_host_key -n '' chmod - - -
/etc/ssh/ssh_config
Preventative control n=1024,
2048, 4096 chmod r w x (i. e. 4
2 1 ) – blank is nothing
3. Existing Risk Assessment Method
There are many preventive control has to design, developed and available in past &
present for risk assessment on Information System. The existing preventive controls are
available for secure & betterment of IT standard. There are six major area of the value
engineering method as follows.
3.1. Existing System
The systematic and structural approach comes from the VM job plan. The VM job plan
consists of six phases: [3], [9], [12].
1. Information Phase: Gather information to better understand the project definition. (Initial
Stage)
2. Function Analysis Phase: Analyze the project to understand and clarify the required
functions (RA).
3. Creative Phase: Generate ideas on all the possible ways to accomplish the required
functions. (New product)
4. Evaluation Phase: Synthesize and analysis the ideas and concepts to select the feasible
ideas for development into specific value improvement.
5. Development Phase: Select and prepare the best suggestions & method alternative(s) for
improving value of goods & services.
6. Presentation Phase: Present the value recommendation to the project stakeholders/vendor,
customer (services level).
The VM process produces the best results when applied by a multi-disciplined team with
experience and expertise relative to the type of project to be studies in system engineering,
reliable engineering & security engineering.
3.2. Existing Problem on Value Engineering (Technology, Engineering, Business)
 The system engineering is a process which is not easy to accept under the normal
conditions; the problem is commutative when it running several multiple jobs and
applications simultaneously under complex IT infrastructure which using millions of user
accessing the same piece of data and information in around the clock (24 x 7 x 52).
When too many packets are present in the subnet, performances degrade and in this
situation data/packet congestion is happening. In this way transmission error is happening on
network (LAN-WAN). At the high end traffic, performance collapses completely and almost no
packets are delivered. If there is insufficient memory to hold all of them, packet will be lost. If
slow the processor can also cause the congestion. Similarly, the low bandwidth can also cause
congestion. Therefore, the OS became hungering & highly utilizing of CPU Times, system
IJEEI ISSN: 2089-3272 
Dynamic Value Engineering Method Optimizing the Risk on Real Time … (Prashant KP)
105
throughput became slow down, also slow down the network resources & loss of communication
system.
 There is no automatic protection, detection & correction on the system components. There
is no balance ratio among the Kernel, Processor, Memory, File System [Encryption Key] &
Time slot of the high end OS. The high level decision process is required to implement
resources like kernel, processor and instruction level parallelism (SISD, SIMD, MISD,
MIMD) & high memory & encryption key sizes for high end business. The high end
technology would be match with high quality of business and decision.
3.2 Research Questions
Now a day increasing the third parties multiple users, applications of business,
computer and communications system by IT industries has increased the risk of theft of
proprietary data & services. The operating system control & audit is a primary method of
protecting, detecting, correcting, operation and services of complex system resources.
 Increasing the millions of multiple as well as multipurpose users.
 Decreasing the performance, throughput, operation & services over a complex
infrastructure.
 Increasing the multiple layering & distributed object oriented technology (SOA) to resolve
the multiple requirements of Customers & Clients, but mean while increasing the hacker,
risk, uncertainty, theft & unsecure.
 Increasing the hardware & software capabilities (n-th bits processor & no of CPU, Memory).
 Increase the business & technology, but technology & business fully depends on political &
economic condition in around the globe.
4. Methodology
Proposed Risk Assessment Method:
There are many preventive method have to define, design, developed and deployment on a
complex heterogeneous platform. The proposed preventive value engineering methods are
available for secure, reliable & high available for betterment of IT standard. There are seven
points are mentioned on the development section as follows:
4.1. Proposed SE Verification and Validation to Achieve our Objective to Gain the Value
Engineering, which can be Optimize the Risk, Cost, Time and Maximize Throughput:
The development of dynamic control algorithms, microprocessor (hardware) design
system, and analysis of environmental systems also come within the purview of systems &
value engineering. The systems engineering encourages the use of tools and methods to better
comprehend and manage the complexity in systems. Some examples of these tools can be
define here as follow as: system model, system definition, behavior, architecture, optimization,
reliability & decision analysis.
In philosophically, thinking the concept of distributed object oriented system with the
multi-disciplinary approach and method to system engineering is inherently complex since the
characteristics & behaviors of interaction among system components ( objects) is not always
immediately clear, defined and understand. The SE method is defining, designing & developing
the behavior & characteristics such systems, subsystems (objects), resources and the
interactions among them is one of the goals of systems engineering. In this way, the gap that
exists among informal requirements from clients & customer, users, operators, business
requirements, resources (objects) requirements and technical specifications is successfully a
long bridged.
We have to maintain the risk free environments in the hardware, software & application
level on the basis of the following data. We can update the SE parameters dynamically as per
business & technology requirement any where & any time. That’s why we are calling dynamic
value engineering method.
4.2. Define
We have to define, design, develop and deployment the various method, model,
mechanism, services and fix up majors automated system configuration to maintain residual
risk. Meanwhile, we have to maintain the system control by applying automated method, model,
 ISSN: 2089-3272
IJEEI Vol. 2, No. 2, June 2014 : 101 – 110
106
mechanism (M^3) & tools on operating system level to optimize the risk and maximize the
decision management to achieve the highest business objective. We have to define and
initialize the Product, Business & Resources to measure security domain for risk optimization
and assessment.
SE: DECISION FACTOR OF THE PRODUCT SPECIFICATION:
(INITIAL STAGE: PREVENTION MATRIX)
Table 2. Proposed PME Data
( DYNAMIC & DERIVED DATA ): ENCRYPTION
E 128 256 512 A=2^n AES HA
S 512 1024 2048 4096 8192 S=2^n SSH HA
P 32 64 128 256 512 P=2^n Processor HA
M 16 32 64 128 256 M=2^n Memory(GB) HA
C H H M M L K=2^n Control HA
(L- LOW RISK, M-Medium RISK, H-HIGH RISK) (PC+DC+CC=C) [AES =k.1/R] FUZZ’S LAW
FRAME WORK:
PRODUCT SPECIFICATION (INPUT) OF OPERATING SYSTEM:
The hardware designers have to decide the product specification to mitigate the risk
(i.e. target specification)
Let us consider;
PS= Product Specification, TS=Target Specification, BS=Business Specification, RS=Resource
Specification
4.3. Algorithm: [Dynamic Product Development]
a. Decide the product specification (PS) as per business requirement(BS).(INPUT)
b. Analysis the Business & Resource Specification
c. Select the metric elements should be dependable ( variables P, M & E)
d. Select metric elements should be practicable ( variables P, M & E).
e. Refine the product specification as per target specification(TS) (i.e. RM)
f. Establishing target specification(TS) (i.e. RM) as per business requirement.(OUTPUT)
g. Reflect on results and process.
BLACK BOX BLOCK DIAGRAM:
The Encryption key(E) should be define at the time of initial design stage for better
system engineering as per top management decision. In this way, we can improve the value
engineering.
INPUT PS(P,M,E) PROCESSING OUPUT(TS=RM)
[(BS, RS)]
PRODUCER UNIT PROCESSING UNIT CONSUMERS UNIT
Figure 2. Black Box Diagram
4.4. Design Stage
We have to design the high reliable, scalable, security and highly available architecture
to run the complex business on complex heterogeneous IT infrastructure to meet over the multi
Relation, Function, Operation & Service Level. [6-7]
We can planning, analysis and design of the following these two directed graph based
on the (PS)
IJEEI ISSN: 2089-3272 
Dynamic Value Engineering Method Optimizing the Risk on Real Time … (Prashant KP)
107
PRODUCT
BUSINESS RESOURCES
Figure 3 (a)
Associative Low: (P U B) U R = P U (B U R), (P ∩ B) ∩ R = P ∩ (B ∩ R)
Distributive Low: P U (B ∩ R) = (P U B) ∩ (P U R), P ∩ (B U R) = (P ∩ B) U (P ∩ R)
ENCRYPTION
PROCESSOR MEMORY
Fig:3 (b)
Associative Low: (E U P) U M = E U (P U M), (E ∩ P) ∩ M = M ∩ (P ∩ M)
Distributive Low: E U (P ∩ M) = (E U P) ∩ (E U P), E ∩ (PD U M) = (E ∩ P) U (E ∩ M)
4.4. Development
We have to go forward to finding alternate optimization process on specification,
process, engineering & services for risk optimization based on operating system components
(P, M & E). This scalable complex composion model definitely will be resolve our risk and
security issue on complex real time system for multiple client application, business and
resources available for multi location, vendor, customer on any time around the clock.
PROPOSED METHOD OF OPTIMIZATION ON OPERATING SYSTEM RISK(GREEDY
METHOD )
Our abstract is fully satisfied as theoretically, practically, analytically and graphically and
assumption based data & attributes defined in this method. The value engineering is the ratio of
functionalities of individual components (objects) to the optimal cost. Mathematical Deduction as
follows:
 ISSN: 2089-3272
IJEEI Vol. 2, No. 2, June 2014 : 101 – 110
108
Table 3. Proposed Data
SN Equations Descriptions Remarks
01 VE = F( P, M, E, C, A)/
Optimal Cost
Equation is satisfying to the operating
system. It is indicating characteristics
& behavior of the system.
PRIMARY DECISION
System Engineering: Improving the
performance of individual elements
Processor, Memory, Encryption key and
Availability (P, M, E, C, A) with respect to
optimal cost.
PRIMARY RISK ASSESSMENT
02 VE= F( PS, BS, RS)/ Minimal
cost.
As per Algorithm.
Where: PS: Product Specification, BS:
Business Specification, Resource
Specification & TS: Target
Specification.
PRIMARY DECISION
It will be help to define, design,
development & implementation stage.
Encryption key should be added into design
phase, then cost & time will be optimize.
Dynamic product development satisfying
the automated control.
PRIMARY RISK ASSESSMENT
03 VE = F ( P, S, O, M )/ Optimal
Cost
Where: P: Product, S: Services, O:
Operation, M: Maintenance
SECONDARY DECISION
Improving the product, services, operation
& maintenance at minimum cost.
SECONDARY RISK ASSESSMENT
04 R=k. 1/C, C = k .S R-Risk, S- Standard, C-Control, k-prop
constant
SECONDARY DECISION
Improve the quality, value & reliability and
std. of system engineering.
SECONDARY RISK ASSESSMENT
05 C=P+D+C
VE=F(P,D,C)/Minimal cost
VE=F(TC)/MC
P-Prevention, D-detection, C-
Correction. TC: Total Control, MC: Min
Cost. SECONDARY DECISION
Maximize the prevention, detection &
correction at law cost.
SECONDARY RISK ASSESSMENT
06 VE=k. RA Risk Assessment, k:Prop. Constant. Optimize the risk
SECONDARY DECISION SECONDARY RISK ASSESSMENT
07 ∑RM=∑(VE+SE+RE+SE), (VE
U SE U RE U SC)= ∑ RM
Composion of all four.
TOTAL DECISION
Union of All. Satisfying to SC, RE, SE &
VE. TOTAL RISK ASSESSMENT.
4.5 Dynamic Composition Model Maximize Value Engineerng and Minimize the Risk
MODEL & MECHANISM
TECHNICAL MODEL OF Specification (INPUT) BUSINESS MODEL OF Specification
COMPOSITION LAW A ((PROCESS) COMPOSITION LAW B
x P M E C RM x PS BS RS HA RM
P P M E RM PS PS BS RS HA RM
M M P E RM BS PS RS RM
E E C M RM RS BS HA S BS RM
C C P M P RM HA HA RS BS RM
RM RM RM RM RM RM RM RM RM RM RM RM
Both diagonal objects are not meeting our Objective Both diagonal objects are not meeting our Purpose.
Where C:- Control, HA :- High Availability
ENGINEERING MODEL OF Specification. SERVICE MODEL OF Specification(OUTPUT)
(PROCESS) COMPOSITION LAW C COMPOSITION LAW D
x VE SE RE SC RM x P S O M RM
VE SE RE RM P P S O M RM
SE VE RE RM S S M O RM
RE RE SC SE RM O M S RM
SC SC RE SE VE RM M M O S RM
RM RM RM RM RM RM RM RM RM RM RM RM
Both diagonal objects are not meeting our Engineering Both diagonal objects are not giving any Output ( TS)
IJEEI ISSN: 2089-3272 
Dynamic Value Engineering Method Optimizing the Risk on Real Time … (Prashant KP)
109
The Raw and Column total are meeting our Target Specificication, Output, Objective & Purpose
on multiple Product, Business, Resources & Applications over a heterogeneous complex
platform.
5. Results & Discussion (Services)
We have to gain the maximum objective as per mix culture of the theoretical as well as
practical services over a complex real time operating system.
 Maximize the protection, detection, correction, operation & services at optimal cost and
time.
 Maximize the (functionalities) performance, integration, availability, reliability at optimal cost.
 Maximum utilization of product, business, resources at minimal cost at right time in right
way.
The symmetrical object are not meeting the risk mitigation, but the anti-symmetrical
objects only resolving our purpose.
In this ways, we can improve the business and optimize the resource & technology cost,
mean while improve the performance of product & services, Therefore, the value engineering
ultimately & automatically optimize the risk mgmt system and help to the decision making to the
top mgmt. It is not only value engineering but also satisfying to the reliability engineering as well
as security engineering.
6. Conclusion
In the final value analysis of the product, value engineering is not only beneficial, but
also essential because of:
 The functionality of the project (PM) is often improved as well as producing tremendous
savings, both initial and Life-Cycle Cost. (Block Diagram)
 A second look at the design produced by the (designer & reengineering (Table 3) architect
and engineers gives the assurance that all reasonable alternatives have been explored.
[PS(P, M, E)]
 The cost estimates, reduction and scope statements are checked thoroughly assuring that
nothing has been omitted or underestimated. (Cost optimization)
 Assures that the best value will be obtained over the life of the building. (Define, design,
development, deployment & decision (TS).
An automated system engineering used to be develop on the decision criteria when it is
important to secure as much as possible of what is wanted from each components (objects) or
unit of the resource used. The resource may be money, space, time, man, machine, material,
energy, market, method and so on. The system is unique in that it effectively uses both
knowledge, creativity and provides step-by-step techniques for maximizing the benefits from
each component. It promotes development of alternatives suitable for the future as well as the
present. This is accomplished by identifying and studying each function that is wanted by the
customers and clients or user, then applying knowledge and creativity to achieve the desired
functions. Resources are converted into costs to achieve direct, meaningful comparisons. By
using this methods of value engineering, we can achieve the 30% to 40% reduction in the
required resources often results.
The dynamic value engineering methodology helps to the any organization the more
effectively in local, national and international markets at any time and any place around the
clock follows:
 Minimizing costs & risk.
 Maximize profits, ROI & TCO.
 Improving functionality, quality & decision (TQM).
 Maximizing Production, Sales, Market, Share & generate the Capital.
 Optimizing time & Maximize the utilization of Man, Machine, Material, Market, Money &
Method (M^5).
 Solving multiple problems at right time with optimal cost.
 Utilizing overall resources more effectively at right time and right place.
 ISSN: 2089-3272
IJEEI Vol. 2, No. 2, June 2014 : 101 – 110
110
VE is a Better to Butter:
 The changes are executed at the initial stages only (PS). We are already defined in BLOCK
DIAGRAM.
 It requires specific technical knowledge. [SE] Table: 2 & 3
The value engineering provides accountability for individual’s functionality of each
components of the real time operating system over a application, system software, server and
network. This accountability is accomplished through optimization model and mechanisms that
require, accountability, availability, reliability & integrity of the automated optimization control
functions which is call Security Engineering, Reliability Engineering & System Engineering.
That’s why this value engineering is practically and theoretically working as process of risk
optimization and decision making criteria on technology management system in around the
globe.
Recommendations
Future Advancement of this Work:
 We have to keep balance & managing work load ratio among the Product, Business,
Resources over a multiple application, network and infrastructure by applying value
engineering model, method & mechanism.
 We have to develop the distributed object oriented value engineering methods for multiple
business, product & resources over a multiple applications & heterogeneous platform as per
customer requirements.
References
[1] Bernard, Kolman. Discrete Mathematical Structures. New Delhi, India: Person Education India. (PHI).
2007.
[2] Bruce, Schneier. Applied Cryptography, New Delhi, India: Wiley Publishing Inc. 1996.
[3] B Mohadevan. Operation Management, New Delhi India: Person Education India. PHI 2008.
[4] CISA Review Mannual. ISACA, USA. 2003.
[5] Coriolis. CISSP Exam Cram, Coriolis Group Books, New Delhi, India: Dreamatech. 2002.
[6] Edgar G. Discrete Mathematics with Graph Theory. New Delhi, India: Person India. (PHI). 2007.
[7] Joe L Matt. Discrete Mathematics for Scientist and Mathematician. New Delhi, India: Person
Education India. (PHI). 2008.
[8] John B Kramer. The CISA Prep Guide, New Delhi, India: Wiley Publishing Inc. 2003.
[9] Hwang, Kai. Advance Computer Architecture. New Delhi, India: Tata McGraw Hill. 2008.
[10] O’ Reilly. Essential of System Administration. O’ Reilly Media: USA. 1995.
[11] Pressman, Software Engineering. New Delhi, India: Tata McGraw Hill. 2001.
[12] Richard B Chase, Robert, Nicholas, Nitin. Operations Management. New Delhi, India: Tata McGraw
Hill. 2006.
[13] Shon, Harrish. CISSP Exam study guide, New Delhi, India: Dreamtech. 2002.
[14] Shon, Harrish. Security Mgmt Practices. New Delhi, India: Wiley Publishing Inc. 2002.
[15] Sumitabh, Das. UNIX System V UNIX Concept & Application. Delhi, India: Tata McGraw Hill. 2009.
[16] Sun-Microsystem. UNIX Sun Solaris system administration. USA. 2002.
[17] William, Stalling. Cryptography and Network Security. New Delhi, India: Person India. 2006.
[18] Weber, Ron. Information System Control & Audit. New Delhi, India: Person Education India. (PHI).
2002.

More Related Content

What's hot

System Analysis & Design - I
System Analysis & Design - ISystem Analysis & Design - I
System Analysis & Design - IGagan Deep
 
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...idescitation
 
Elements of systems design
Elements of systems designElements of systems design
Elements of systems designChandan Arora
 
System engineering analysis and design
System engineering analysis and designSystem engineering analysis and design
System engineering analysis and designDr. Vardhan choubey
 
SAD Reviewer
SAD ReviewerSAD Reviewer
SAD Reviewerermell61
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and DesignAkshaya Parida
 
Lesson 1 System Analysis and Design
Lesson 1 System Analysis and DesignLesson 1 System Analysis and Design
Lesson 1 System Analysis and Designperly pantojan
 
Management Information System (MIS) unit-1
Management Information System (MIS) unit-1Management Information System (MIS) unit-1
Management Information System (MIS) unit-1Manoj Kumar
 
System analysis and_design
System analysis and_designSystem analysis and_design
System analysis and_designTushar Rajput
 
Seminarie Computernetwerken 2012-2013: Lecture I, 26-02-2013
Seminarie Computernetwerken 2012-2013: Lecture I, 26-02-2013Seminarie Computernetwerken 2012-2013: Lecture I, 26-02-2013
Seminarie Computernetwerken 2012-2013: Lecture I, 26-02-2013Vincenzo De Florio
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and designLOKESH KUMAR
 

What's hot (19)

01 intro to mis
01 intro to mis01 intro to mis
01 intro to mis
 
System Analysis & Design - I
System Analysis & Design - ISystem Analysis & Design - I
System Analysis & Design - I
 
Mis unit ii
Mis unit ii Mis unit ii
Mis unit ii
 
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
 
Elements of systems design
Elements of systems designElements of systems design
Elements of systems design
 
System engineering analysis and design
System engineering analysis and designSystem engineering analysis and design
System engineering analysis and design
 
SAD Reviewer
SAD ReviewerSAD Reviewer
SAD Reviewer
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
System analysis and design Class 2
System analysis and design Class 2System analysis and design Class 2
System analysis and design Class 2
 
Gg
GgGg
Gg
 
Multimedia systems
Multimedia systemsMultimedia systems
Multimedia systems
 
SAD Chapter1
SAD  Chapter1SAD  Chapter1
SAD Chapter1
 
Lesson 1 System Analysis and Design
Lesson 1 System Analysis and DesignLesson 1 System Analysis and Design
Lesson 1 System Analysis and Design
 
Management Information System (MIS) unit-1
Management Information System (MIS) unit-1Management Information System (MIS) unit-1
Management Information System (MIS) unit-1
 
System analysis and_design
System analysis and_designSystem analysis and_design
System analysis and_design
 
software engineering
software engineeringsoftware engineering
software engineering
 
icssp-web
icssp-webicssp-web
icssp-web
 
Seminarie Computernetwerken 2012-2013: Lecture I, 26-02-2013
Seminarie Computernetwerken 2012-2013: Lecture I, 26-02-2013Seminarie Computernetwerken 2012-2013: Lecture I, 26-02-2013
Seminarie Computernetwerken 2012-2013: Lecture I, 26-02-2013
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 

Similar to Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating System

Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File SystemDynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File SystemRadita Apriana
 
EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF...
EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF...EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF...
EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF...ijpla
 
Security Introspection for Software Reuse
Security Introspection for Software ReuseSecurity Introspection for Software Reuse
Security Introspection for Software ReuseIRJET Journal
 
Software project management - Chapter 2
Software project management - Chapter 2Software project management - Chapter 2
Software project management - Chapter 2Munazza-Mah-Jabeen
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxjaggernaoma
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecurityYogeshIJTSRD
 
Class quality evaluation using class quality scorecards
Class quality evaluation using class quality scorecardsClass quality evaluation using class quality scorecards
Class quality evaluation using class quality scorecardsIAEME Publication
 
Class quality evaluation using class quality
Class quality evaluation using class qualityClass quality evaluation using class quality
Class quality evaluation using class qualityIAEME Publication
 
Enterprise Risk Management-Paper
Enterprise Risk Management-PaperEnterprise Risk Management-Paper
Enterprise Risk Management-PaperPierre Samson
 
user centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centeruser centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centerVenkat Projects
 
IRJET- Analyzing, Designing and Implementing a Consulting Company for Managem...
IRJET- Analyzing, Designing and Implementing a Consulting Company for Managem...IRJET- Analyzing, Designing and Implementing a Consulting Company for Managem...
IRJET- Analyzing, Designing and Implementing a Consulting Company for Managem...IRJET Journal
 
G03503036044
G03503036044G03503036044
G03503036044theijes
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...IRJET Journal
 
Chapter_01.ppt
Chapter_01.pptChapter_01.ppt
Chapter_01.pptMSahibKhan
 
Software engineering
Software engineeringSoftware engineering
Software engineeringAnanthiP8
 
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORKPROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORKIJCSEA Journal
 

Similar to Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating System (20)

Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File SystemDynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
 
using LPP
using LPPusing LPP
using LPP
 
EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF...
EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF...EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF...
EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF...
 
Security Introspection for Software Reuse
Security Introspection for Software ReuseSecurity Introspection for Software Reuse
Security Introspection for Software Reuse
 
Software project management - Chapter 2
Software project management - Chapter 2Software project management - Chapter 2
Software project management - Chapter 2
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docx
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
50320140502003
5032014050200350320140502003
50320140502003
 
Class quality evaluation using class quality scorecards
Class quality evaluation using class quality scorecardsClass quality evaluation using class quality scorecards
Class quality evaluation using class quality scorecards
 
Class quality evaluation using class quality
Class quality evaluation using class qualityClass quality evaluation using class quality
Class quality evaluation using class quality
 
Enterprise Risk Management-Paper
Enterprise Risk Management-PaperEnterprise Risk Management-Paper
Enterprise Risk Management-Paper
 
user centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations centeruser centric machine learning framework for cyber security operations center
user centric machine learning framework for cyber security operations center
 
IRJET- Analyzing, Designing and Implementing a Consulting Company for Managem...
IRJET- Analyzing, Designing and Implementing a Consulting Company for Managem...IRJET- Analyzing, Designing and Implementing a Consulting Company for Managem...
IRJET- Analyzing, Designing and Implementing a Consulting Company for Managem...
 
G03503036044
G03503036044G03503036044
G03503036044
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
 
Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...
 
Chapter_01.ppt
Chapter_01.pptChapter_01.ppt
Chapter_01.ppt
 
E1804012536
E1804012536E1804012536
E1804012536
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORKPROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
PROPOSING SECURITY REQUIREMENT PRIORITIZATION FRAMEWORK
 

More from ijeei-iaes

An Heterogeneous Population-Based Genetic Algorithm for Data Clustering
An Heterogeneous Population-Based Genetic Algorithm for Data ClusteringAn Heterogeneous Population-Based Genetic Algorithm for Data Clustering
An Heterogeneous Population-Based Genetic Algorithm for Data Clusteringijeei-iaes
 
Development of a Wireless Sensors Network for Greenhouse Monitoring and Control
Development of a Wireless Sensors Network for Greenhouse Monitoring and ControlDevelopment of a Wireless Sensors Network for Greenhouse Monitoring and Control
Development of a Wireless Sensors Network for Greenhouse Monitoring and Controlijeei-iaes
 
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
Analysis of Genetic Algorithm for Effective power Delivery and with Best UpsurgeAnalysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurgeijeei-iaes
 
Design for Postplacement Mousing based on GSM in Long-Distance
Design for Postplacement Mousing based on GSM in Long-DistanceDesign for Postplacement Mousing based on GSM in Long-Distance
Design for Postplacement Mousing based on GSM in Long-Distanceijeei-iaes
 
Investigation of TTMC-SVPWM Strategies for Diode Clamped and Cascaded H-bridg...
Investigation of TTMC-SVPWM Strategies for Diode Clamped and Cascaded H-bridg...Investigation of TTMC-SVPWM Strategies for Diode Clamped and Cascaded H-bridg...
Investigation of TTMC-SVPWM Strategies for Diode Clamped and Cascaded H-bridg...ijeei-iaes
 
Optimal Power Flow with Reactive Power Compensation for Cost And Loss Minimiz...
Optimal Power Flow with Reactive Power Compensation for Cost And Loss Minimiz...Optimal Power Flow with Reactive Power Compensation for Cost And Loss Minimiz...
Optimal Power Flow with Reactive Power Compensation for Cost And Loss Minimiz...ijeei-iaes
 
Mitigation of Power Quality Problems Using Custom Power Devices: A Review
Mitigation of Power Quality Problems Using Custom Power Devices: A ReviewMitigation of Power Quality Problems Using Custom Power Devices: A Review
Mitigation of Power Quality Problems Using Custom Power Devices: A Reviewijeei-iaes
 
Comparison of Dynamic Stability Response of A SMIB with PI and Fuzzy Controll...
Comparison of Dynamic Stability Response of A SMIB with PI and Fuzzy Controll...Comparison of Dynamic Stability Response of A SMIB with PI and Fuzzy Controll...
Comparison of Dynamic Stability Response of A SMIB with PI and Fuzzy Controll...ijeei-iaes
 
Embellished Particle Swarm Optimization Algorithm for Solving Reactive Power ...
Embellished Particle Swarm Optimization Algorithm for Solving Reactive Power ...Embellished Particle Swarm Optimization Algorithm for Solving Reactive Power ...
Embellished Particle Swarm Optimization Algorithm for Solving Reactive Power ...ijeei-iaes
 
Intelligent Management on the Home Consumers with Zero Energy Consumption
Intelligent Management on the Home Consumers with Zero Energy ConsumptionIntelligent Management on the Home Consumers with Zero Energy Consumption
Intelligent Management on the Home Consumers with Zero Energy Consumptionijeei-iaes
 
Analysing Transportation Data with Open Source Big Data Analytic Tools
Analysing Transportation Data with Open Source Big Data Analytic ToolsAnalysing Transportation Data with Open Source Big Data Analytic Tools
Analysing Transportation Data with Open Source Big Data Analytic Toolsijeei-iaes
 
A Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur ClassificationA Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur Classificationijeei-iaes
 
Computing Some Degree-Based Topological Indices of Graphene
Computing Some Degree-Based Topological Indices of GrapheneComputing Some Degree-Based Topological Indices of Graphene
Computing Some Degree-Based Topological Indices of Grapheneijeei-iaes
 
A Lyapunov Based Approach to Enchance Wind Turbine Stability
A Lyapunov Based Approach to Enchance Wind Turbine StabilityA Lyapunov Based Approach to Enchance Wind Turbine Stability
A Lyapunov Based Approach to Enchance Wind Turbine Stabilityijeei-iaes
 
Fuzzy Control of a Large Crane Structure
Fuzzy Control of a Large Crane StructureFuzzy Control of a Large Crane Structure
Fuzzy Control of a Large Crane Structureijeei-iaes
 
Site Diversity Technique Application on Rain Attenuation for Lagos
Site Diversity Technique Application on Rain Attenuation for LagosSite Diversity Technique Application on Rain Attenuation for Lagos
Site Diversity Technique Application on Rain Attenuation for Lagosijeei-iaes
 
Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...
Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...
Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...ijeei-iaes
 
Music Recommendation System with User-based and Item-based Collaborative Filt...
Music Recommendation System with User-based and Item-based Collaborative Filt...Music Recommendation System with User-based and Item-based Collaborative Filt...
Music Recommendation System with User-based and Item-based Collaborative Filt...ijeei-iaes
 
A Real-Time Implementation of Moving Object Action Recognition System Based o...
A Real-Time Implementation of Moving Object Action Recognition System Based o...A Real-Time Implementation of Moving Object Action Recognition System Based o...
A Real-Time Implementation of Moving Object Action Recognition System Based o...ijeei-iaes
 
Wireless Sensor Network for Radiation Detection
Wireless Sensor Network for Radiation DetectionWireless Sensor Network for Radiation Detection
Wireless Sensor Network for Radiation Detectionijeei-iaes
 

More from ijeei-iaes (20)

An Heterogeneous Population-Based Genetic Algorithm for Data Clustering
An Heterogeneous Population-Based Genetic Algorithm for Data ClusteringAn Heterogeneous Population-Based Genetic Algorithm for Data Clustering
An Heterogeneous Population-Based Genetic Algorithm for Data Clustering
 
Development of a Wireless Sensors Network for Greenhouse Monitoring and Control
Development of a Wireless Sensors Network for Greenhouse Monitoring and ControlDevelopment of a Wireless Sensors Network for Greenhouse Monitoring and Control
Development of a Wireless Sensors Network for Greenhouse Monitoring and Control
 
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
Analysis of Genetic Algorithm for Effective power Delivery and with Best UpsurgeAnalysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
 
Design for Postplacement Mousing based on GSM in Long-Distance
Design for Postplacement Mousing based on GSM in Long-DistanceDesign for Postplacement Mousing based on GSM in Long-Distance
Design for Postplacement Mousing based on GSM in Long-Distance
 
Investigation of TTMC-SVPWM Strategies for Diode Clamped and Cascaded H-bridg...
Investigation of TTMC-SVPWM Strategies for Diode Clamped and Cascaded H-bridg...Investigation of TTMC-SVPWM Strategies for Diode Clamped and Cascaded H-bridg...
Investigation of TTMC-SVPWM Strategies for Diode Clamped and Cascaded H-bridg...
 
Optimal Power Flow with Reactive Power Compensation for Cost And Loss Minimiz...
Optimal Power Flow with Reactive Power Compensation for Cost And Loss Minimiz...Optimal Power Flow with Reactive Power Compensation for Cost And Loss Minimiz...
Optimal Power Flow with Reactive Power Compensation for Cost And Loss Minimiz...
 
Mitigation of Power Quality Problems Using Custom Power Devices: A Review
Mitigation of Power Quality Problems Using Custom Power Devices: A ReviewMitigation of Power Quality Problems Using Custom Power Devices: A Review
Mitigation of Power Quality Problems Using Custom Power Devices: A Review
 
Comparison of Dynamic Stability Response of A SMIB with PI and Fuzzy Controll...
Comparison of Dynamic Stability Response of A SMIB with PI and Fuzzy Controll...Comparison of Dynamic Stability Response of A SMIB with PI and Fuzzy Controll...
Comparison of Dynamic Stability Response of A SMIB with PI and Fuzzy Controll...
 
Embellished Particle Swarm Optimization Algorithm for Solving Reactive Power ...
Embellished Particle Swarm Optimization Algorithm for Solving Reactive Power ...Embellished Particle Swarm Optimization Algorithm for Solving Reactive Power ...
Embellished Particle Swarm Optimization Algorithm for Solving Reactive Power ...
 
Intelligent Management on the Home Consumers with Zero Energy Consumption
Intelligent Management on the Home Consumers with Zero Energy ConsumptionIntelligent Management on the Home Consumers with Zero Energy Consumption
Intelligent Management on the Home Consumers with Zero Energy Consumption
 
Analysing Transportation Data with Open Source Big Data Analytic Tools
Analysing Transportation Data with Open Source Big Data Analytic ToolsAnalysing Transportation Data with Open Source Big Data Analytic Tools
Analysing Transportation Data with Open Source Big Data Analytic Tools
 
A Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur ClassificationA Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur Classification
 
Computing Some Degree-Based Topological Indices of Graphene
Computing Some Degree-Based Topological Indices of GrapheneComputing Some Degree-Based Topological Indices of Graphene
Computing Some Degree-Based Topological Indices of Graphene
 
A Lyapunov Based Approach to Enchance Wind Turbine Stability
A Lyapunov Based Approach to Enchance Wind Turbine StabilityA Lyapunov Based Approach to Enchance Wind Turbine Stability
A Lyapunov Based Approach to Enchance Wind Turbine Stability
 
Fuzzy Control of a Large Crane Structure
Fuzzy Control of a Large Crane StructureFuzzy Control of a Large Crane Structure
Fuzzy Control of a Large Crane Structure
 
Site Diversity Technique Application on Rain Attenuation for Lagos
Site Diversity Technique Application on Rain Attenuation for LagosSite Diversity Technique Application on Rain Attenuation for Lagos
Site Diversity Technique Application on Rain Attenuation for Lagos
 
Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...
Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...
Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...
 
Music Recommendation System with User-based and Item-based Collaborative Filt...
Music Recommendation System with User-based and Item-based Collaborative Filt...Music Recommendation System with User-based and Item-based Collaborative Filt...
Music Recommendation System with User-based and Item-based Collaborative Filt...
 
A Real-Time Implementation of Moving Object Action Recognition System Based o...
A Real-Time Implementation of Moving Object Action Recognition System Based o...A Real-Time Implementation of Moving Object Action Recognition System Based o...
A Real-Time Implementation of Moving Object Action Recognition System Based o...
 
Wireless Sensor Network for Radiation Detection
Wireless Sensor Network for Radiation DetectionWireless Sensor Network for Radiation Detection
Wireless Sensor Network for Radiation Detection
 

Recently uploaded

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257subhasishdas79
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxhublikarsn
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)ChandrakantDivate1
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessorAshwiniTodkar4
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsmeharikiros2
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelDrAjayKumarYadav4
 

Recently uploaded (20)

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 

Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating System

  • 1. Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol. 2, No. 2, June 2014, pp. 101~110 ISSN: 2089-3272  101 Received February 24, 2014; Revised April 29, 2014; Accepted May 16, 2014 Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating System Dr Prashant Kumar Patra1 , Padma Lochan Pradhan2 1 Dept. of CSE, College of Engineering & Technology, BPUT, Bhubaneswar-751003, Orissa, India. 2 Dept. of CSE, Central Institute of Technology, Raipur, CG, India. e-mail: citrprcs@rediffmail.com. Abstract The value engineering is the umbrella of the many more sub-system like quality assurance, quality control, quality function design and development for manufacturability. The system engineering & value engineering is two part of the coin. The value engineering is the high level of technology management for every aspect of engineering fields. The value engineering is the high utilization of System Product (i.e. Processor, Memory & Encryption key), Services, Business and Resources at minimal cost. The high end operating system providing highest services at optimal cost & time. The value engineering provides the maximum performance, accountability, reliability, integrity and availability of processor, memory, encryption key and other inter dependency sub-components. The value engineering is the ratio of the maximum functionality of individual components to the optimal cost. The VE is directly proportional to performance of individual components and inversely proportional to the minimal cost. The VE is directly proportional to the risk assessment. The VE maximize the business throughput & decision process mean while minimize the risk and down time. We have to develop the dynamic value engineering method for risk optimization over a complex real time operating system. Keywords: Value Engineering, Product Specification, Business Specification, Encryption, Processor, Memory, Value Method, High Availability 1. Introduction In the present age, the technology management can be defined as the integrated planning, designing, organizing, operation and control of product & services at minimal cost. The technology management improves the value engineering in a systematic & continuous manner. The high performance of individual components at minimum cost will be high utilize at lowest cost, then improve the productivity of services and satisfy to the risk mgmt system. It is a systematic & continuous process require for high productivity with low cost. [1], [6-7] Product (P, M, E, C, A) Business Resources Figure 1. PBR Optimize the PME The value engineering (VE) is a systematic approach to improve the value of goods or products and services by using real time experimental method. The value can therefore be increased by either improving the functionality and reducing the cost or both simultaneously. The value engineering is specifically establishing and maintaining cost-effective value
  • 2.  ISSN: 2089-3272 IJEEI Vol. 2, No. 2, June 2014 : 101 – 110 102 engineering procedures and process in a systematic way. The value engineering is based on system engineering. The value engineering concept can be develop by combining system engineering (SE), reliability engineering (RE) and security engineering (SC). [3], [12]. The value methodology (VM) is a dynamic, systematic and structured approach, improves projects, products and processes. The VM is used to analyze manufacturing products and processes define, design, develop the projects, business and administrative processes. The VM helps to achieve balance among required functions, performance, quality, reliability, scalability, high availability, safety and scope with the cost and other resources necessary to accomplish those requirements. The proper balance results in the maximum value for the project. [3], [12]. 1.1 Value Engineering: Value = Function/Cost  Value is the reliable performance of functions to meet customer needs (Requirement Analysis) at the lowest overall cost.  Function is the natural or characteristic action and reaction (behaviors and characteristics of components) performed by a product or service.  Cost is the expenditure necessary to produce a project, goods, service, process and structure. When the system engineering & value engineering both meet each other, the risk assessment definite would be optimize at lowest cost. The risk assessment is the first process of the risk management methodology. Organizations use risk management to determine the extent of the potential threat and the risk associated with an IT system and sub system throughout its life cycle as the steps follow. The output of this process helps to identify appropriate controls (Preventive control, detective control, & corrective control) for reducing or eliminating risk during the risk mitigation process, as discussed in proposed VE method. Risk is a function of the likelihood of a given threat-source’s exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization. To determine the likelihood of a future adverse event, threats to an IT system must be analyzed in conjunction with the potential vulnerabilities and the controls in place for the IT system. Impact refers to the magnitude of harm that could be caused by a threat’s exercise of vulnerability. The level of impact is governed by the potential mission impacts and in turn produces a relative value for the IT assets and resources affected (e.g., the criticality and sensitivity of the IT system components, devices and data [13], [18]. 1.2 Operating System The operating system is a collection of hardware, software & application that manages system resources and provides common services for resources, program, application & users. The operating system is an essential component of the system software (processor, memory, encryption, shell, file & kernel) in computer system. The high level language (application programs) usually require an operating system to function. The Real time operating system is a multitasking, time sharing & distributed operating system that aims at executing real-time applications. The real-time operating systems often use specialized scheduling algorithms so that they can achieve a deterministic nature of behavior. The main objective of real-time operating systems is their quick and predictable response to events. They have an event-driven or time-sharing design and often aspects of both. An event-driven system switches between tasks based on their priorities or external (resources) events while time-sharing operating systems switch tasks based on clock interrupts. [9-10], [15-16]. Operating system control is a step by step process of securely configuring a system to protect it against unauthorized access, while also taking steps to make the system more reliable and available. Generally anything that is done in the name of system. Preventive control ensures the system is secure, reliable and high available for high IT culture. VE role in regards to Risk Mgmt:  Communicate risk to top management by help of mobile message (mobichart).  Organize & understand variables affecting risk (High, Medium & Low).  Traditional cascading risk charts, risk matrix, risk register (Physical /Logical).  Implement quantitative risk analysis, design & implement.  Assess current design state & existing method and approach. (/var/adm/message) VE
  • 3. IJEEI ISSN: 2089-3272  Dynamic Value Engineering Method Optimizing the Risk on Real Time … (Prashant KP) 103 products provides decision making system.  Removes or disable emotion element and objects from the system.  Enables fact-based decisions making & acquisition to top mgmt by help of mobile computing.  Decision Analysis-builds consensus, defines alternatives, assigns priority and in a systematic manner.  Define, design, develop and deployment and decide (D^4) in a systematic manner. 2. Literature Survey [2], [9-10], [15-16] The technical literature survey in IS Security area is very, risk, critical & tedious work to collect the actual data and analysis, investigation & evidence in the real life system. It is one of the ongoing processes in a continuous manner. It is a very time consuming to investigate & judge the information. There are many text book & reference books help to us to find out the real issue. The reference books like: Applied Cryptography by Bruce Schneier & Cryptography & Network Security by William Stalling is very much help full to expand our idea. The proposed model & method is very helpful to application of cryptographic key management issue. The Sun Micro- system UNIX sun Solaris system administration guide: Vol 1 & Vol 2. & O’ Reilly, Essential of System Administration is very helpful to collect the basic data [17], [18]. In our past experience, we observed on operating system as well as network server, there are many system parameters are defaults lacking behind over a larger application & multiple resources and business on heterogeneous platform. There are many more issue arising like, memory, performance, bandwidth, network & packets are slow down. This issue is highlighted in our problem statement, action plan & proposed method. We have to find out some method to make the more efficient, secure, high available & robust high end operating system. No where develop the detail methods in Graphically as well as Mathematically about the risk management of the OS. There are many issues are not develop till now like: Risk Identification, Risk Analysis, Risk Mitigation & risk results in the operating system level. We have to develop Risk Identification, Risk Analysis, Risk Mitigation in both analytical & graphical way. There many documents are available in general sense of risk identifications, risk analysis, risk mitigation, but operating system level the classification & categorization of risk is not available on today itself. We have to focus on the system specific like OS & system software on VE, RM & decision process. We can develop some optimization model, method and mechanism for risk mitigation based on technology survey. We have to consider the functionality of indivusal components of operating system, Product, Business & Resources. 2.1 Data Collection Based on Existing System Engineering: (Basic Data) There are number of system engineering preventive control methods developed as per requirement of the secure computing to achieve the highest level of business objective. UNIX file system have to be develop as per business requirement [2], [9-10], [15-16].
  • 4.  ISSN: 2089-3272 IJEEI Vol. 2, No. 2, June 2014 : 101 – 110 104 Table 1. Basic Data S N SYSTEM FILES INPUT (Owner) ACTION PLAN REMARKS OUPUT 1 /etc/system [PS] Product Implement the kernel & n-bit processer Can be improve the system performance 2 /etc/hosts Develop the scripts:allow/disallow as per policy, chmod000= /etc/hostnnmmxmdisallow Preventative control Access control mechanism 3 /etc/services [BS] Services Disable the third parties services. Remove the ftp, http, telnet, port no, printer, IP services. Those services are not required. Preventative control 4 /use/bin/rsh, etc/ pam.conf Disable all remote services: chmod 000 /usr/bin/rsh, rksh,rcp, ruser,rlogin, uptime. Preventative control 5 /var/adm/message Date & time stamp (events mgmt) Internal audit purpose Detective control 6 /etc/rc.conf script Run level script Run level script have to develop as per requirement. /etc/init.conf,rc2.d example:httpd_flags="NO" Preventative control 7 /etc/init.d OS services, run level Preventative control 8 etc/ssh/sshd_config [PS] Automated control Cryptography enable through ssh implementation AES: 256 bits chipper. chiper blowfish-CBC,aes256-CBC, aes256-chr.ssh-keygen -b 1024 -f /etc/ssh_host_key -n '' chmod - - - /etc/ssh/ssh_config Preventative control n=1024, 2048, 4096 chmod r w x (i. e. 4 2 1 ) – blank is nothing 3. Existing Risk Assessment Method There are many preventive control has to design, developed and available in past & present for risk assessment on Information System. The existing preventive controls are available for secure & betterment of IT standard. There are six major area of the value engineering method as follows. 3.1. Existing System The systematic and structural approach comes from the VM job plan. The VM job plan consists of six phases: [3], [9], [12]. 1. Information Phase: Gather information to better understand the project definition. (Initial Stage) 2. Function Analysis Phase: Analyze the project to understand and clarify the required functions (RA). 3. Creative Phase: Generate ideas on all the possible ways to accomplish the required functions. (New product) 4. Evaluation Phase: Synthesize and analysis the ideas and concepts to select the feasible ideas for development into specific value improvement. 5. Development Phase: Select and prepare the best suggestions & method alternative(s) for improving value of goods & services. 6. Presentation Phase: Present the value recommendation to the project stakeholders/vendor, customer (services level). The VM process produces the best results when applied by a multi-disciplined team with experience and expertise relative to the type of project to be studies in system engineering, reliable engineering & security engineering. 3.2. Existing Problem on Value Engineering (Technology, Engineering, Business)  The system engineering is a process which is not easy to accept under the normal conditions; the problem is commutative when it running several multiple jobs and applications simultaneously under complex IT infrastructure which using millions of user accessing the same piece of data and information in around the clock (24 x 7 x 52). When too many packets are present in the subnet, performances degrade and in this situation data/packet congestion is happening. In this way transmission error is happening on network (LAN-WAN). At the high end traffic, performance collapses completely and almost no packets are delivered. If there is insufficient memory to hold all of them, packet will be lost. If slow the processor can also cause the congestion. Similarly, the low bandwidth can also cause congestion. Therefore, the OS became hungering & highly utilizing of CPU Times, system
  • 5. IJEEI ISSN: 2089-3272  Dynamic Value Engineering Method Optimizing the Risk on Real Time … (Prashant KP) 105 throughput became slow down, also slow down the network resources & loss of communication system.  There is no automatic protection, detection & correction on the system components. There is no balance ratio among the Kernel, Processor, Memory, File System [Encryption Key] & Time slot of the high end OS. The high level decision process is required to implement resources like kernel, processor and instruction level parallelism (SISD, SIMD, MISD, MIMD) & high memory & encryption key sizes for high end business. The high end technology would be match with high quality of business and decision. 3.2 Research Questions Now a day increasing the third parties multiple users, applications of business, computer and communications system by IT industries has increased the risk of theft of proprietary data & services. The operating system control & audit is a primary method of protecting, detecting, correcting, operation and services of complex system resources.  Increasing the millions of multiple as well as multipurpose users.  Decreasing the performance, throughput, operation & services over a complex infrastructure.  Increasing the multiple layering & distributed object oriented technology (SOA) to resolve the multiple requirements of Customers & Clients, but mean while increasing the hacker, risk, uncertainty, theft & unsecure.  Increasing the hardware & software capabilities (n-th bits processor & no of CPU, Memory).  Increase the business & technology, but technology & business fully depends on political & economic condition in around the globe. 4. Methodology Proposed Risk Assessment Method: There are many preventive method have to define, design, developed and deployment on a complex heterogeneous platform. The proposed preventive value engineering methods are available for secure, reliable & high available for betterment of IT standard. There are seven points are mentioned on the development section as follows: 4.1. Proposed SE Verification and Validation to Achieve our Objective to Gain the Value Engineering, which can be Optimize the Risk, Cost, Time and Maximize Throughput: The development of dynamic control algorithms, microprocessor (hardware) design system, and analysis of environmental systems also come within the purview of systems & value engineering. The systems engineering encourages the use of tools and methods to better comprehend and manage the complexity in systems. Some examples of these tools can be define here as follow as: system model, system definition, behavior, architecture, optimization, reliability & decision analysis. In philosophically, thinking the concept of distributed object oriented system with the multi-disciplinary approach and method to system engineering is inherently complex since the characteristics & behaviors of interaction among system components ( objects) is not always immediately clear, defined and understand. The SE method is defining, designing & developing the behavior & characteristics such systems, subsystems (objects), resources and the interactions among them is one of the goals of systems engineering. In this way, the gap that exists among informal requirements from clients & customer, users, operators, business requirements, resources (objects) requirements and technical specifications is successfully a long bridged. We have to maintain the risk free environments in the hardware, software & application level on the basis of the following data. We can update the SE parameters dynamically as per business & technology requirement any where & any time. That’s why we are calling dynamic value engineering method. 4.2. Define We have to define, design, develop and deployment the various method, model, mechanism, services and fix up majors automated system configuration to maintain residual risk. Meanwhile, we have to maintain the system control by applying automated method, model,
  • 6.  ISSN: 2089-3272 IJEEI Vol. 2, No. 2, June 2014 : 101 – 110 106 mechanism (M^3) & tools on operating system level to optimize the risk and maximize the decision management to achieve the highest business objective. We have to define and initialize the Product, Business & Resources to measure security domain for risk optimization and assessment. SE: DECISION FACTOR OF THE PRODUCT SPECIFICATION: (INITIAL STAGE: PREVENTION MATRIX) Table 2. Proposed PME Data ( DYNAMIC & DERIVED DATA ): ENCRYPTION E 128 256 512 A=2^n AES HA S 512 1024 2048 4096 8192 S=2^n SSH HA P 32 64 128 256 512 P=2^n Processor HA M 16 32 64 128 256 M=2^n Memory(GB) HA C H H M M L K=2^n Control HA (L- LOW RISK, M-Medium RISK, H-HIGH RISK) (PC+DC+CC=C) [AES =k.1/R] FUZZ’S LAW FRAME WORK: PRODUCT SPECIFICATION (INPUT) OF OPERATING SYSTEM: The hardware designers have to decide the product specification to mitigate the risk (i.e. target specification) Let us consider; PS= Product Specification, TS=Target Specification, BS=Business Specification, RS=Resource Specification 4.3. Algorithm: [Dynamic Product Development] a. Decide the product specification (PS) as per business requirement(BS).(INPUT) b. Analysis the Business & Resource Specification c. Select the metric elements should be dependable ( variables P, M & E) d. Select metric elements should be practicable ( variables P, M & E). e. Refine the product specification as per target specification(TS) (i.e. RM) f. Establishing target specification(TS) (i.e. RM) as per business requirement.(OUTPUT) g. Reflect on results and process. BLACK BOX BLOCK DIAGRAM: The Encryption key(E) should be define at the time of initial design stage for better system engineering as per top management decision. In this way, we can improve the value engineering. INPUT PS(P,M,E) PROCESSING OUPUT(TS=RM) [(BS, RS)] PRODUCER UNIT PROCESSING UNIT CONSUMERS UNIT Figure 2. Black Box Diagram 4.4. Design Stage We have to design the high reliable, scalable, security and highly available architecture to run the complex business on complex heterogeneous IT infrastructure to meet over the multi Relation, Function, Operation & Service Level. [6-7] We can planning, analysis and design of the following these two directed graph based on the (PS)
  • 7. IJEEI ISSN: 2089-3272  Dynamic Value Engineering Method Optimizing the Risk on Real Time … (Prashant KP) 107 PRODUCT BUSINESS RESOURCES Figure 3 (a) Associative Low: (P U B) U R = P U (B U R), (P ∩ B) ∩ R = P ∩ (B ∩ R) Distributive Low: P U (B ∩ R) = (P U B) ∩ (P U R), P ∩ (B U R) = (P ∩ B) U (P ∩ R) ENCRYPTION PROCESSOR MEMORY Fig:3 (b) Associative Low: (E U P) U M = E U (P U M), (E ∩ P) ∩ M = M ∩ (P ∩ M) Distributive Low: E U (P ∩ M) = (E U P) ∩ (E U P), E ∩ (PD U M) = (E ∩ P) U (E ∩ M) 4.4. Development We have to go forward to finding alternate optimization process on specification, process, engineering & services for risk optimization based on operating system components (P, M & E). This scalable complex composion model definitely will be resolve our risk and security issue on complex real time system for multiple client application, business and resources available for multi location, vendor, customer on any time around the clock. PROPOSED METHOD OF OPTIMIZATION ON OPERATING SYSTEM RISK(GREEDY METHOD ) Our abstract is fully satisfied as theoretically, practically, analytically and graphically and assumption based data & attributes defined in this method. The value engineering is the ratio of functionalities of individual components (objects) to the optimal cost. Mathematical Deduction as follows:
  • 8.  ISSN: 2089-3272 IJEEI Vol. 2, No. 2, June 2014 : 101 – 110 108 Table 3. Proposed Data SN Equations Descriptions Remarks 01 VE = F( P, M, E, C, A)/ Optimal Cost Equation is satisfying to the operating system. It is indicating characteristics & behavior of the system. PRIMARY DECISION System Engineering: Improving the performance of individual elements Processor, Memory, Encryption key and Availability (P, M, E, C, A) with respect to optimal cost. PRIMARY RISK ASSESSMENT 02 VE= F( PS, BS, RS)/ Minimal cost. As per Algorithm. Where: PS: Product Specification, BS: Business Specification, Resource Specification & TS: Target Specification. PRIMARY DECISION It will be help to define, design, development & implementation stage. Encryption key should be added into design phase, then cost & time will be optimize. Dynamic product development satisfying the automated control. PRIMARY RISK ASSESSMENT 03 VE = F ( P, S, O, M )/ Optimal Cost Where: P: Product, S: Services, O: Operation, M: Maintenance SECONDARY DECISION Improving the product, services, operation & maintenance at minimum cost. SECONDARY RISK ASSESSMENT 04 R=k. 1/C, C = k .S R-Risk, S- Standard, C-Control, k-prop constant SECONDARY DECISION Improve the quality, value & reliability and std. of system engineering. SECONDARY RISK ASSESSMENT 05 C=P+D+C VE=F(P,D,C)/Minimal cost VE=F(TC)/MC P-Prevention, D-detection, C- Correction. TC: Total Control, MC: Min Cost. SECONDARY DECISION Maximize the prevention, detection & correction at law cost. SECONDARY RISK ASSESSMENT 06 VE=k. RA Risk Assessment, k:Prop. Constant. Optimize the risk SECONDARY DECISION SECONDARY RISK ASSESSMENT 07 ∑RM=∑(VE+SE+RE+SE), (VE U SE U RE U SC)= ∑ RM Composion of all four. TOTAL DECISION Union of All. Satisfying to SC, RE, SE & VE. TOTAL RISK ASSESSMENT. 4.5 Dynamic Composition Model Maximize Value Engineerng and Minimize the Risk MODEL & MECHANISM TECHNICAL MODEL OF Specification (INPUT) BUSINESS MODEL OF Specification COMPOSITION LAW A ((PROCESS) COMPOSITION LAW B x P M E C RM x PS BS RS HA RM P P M E RM PS PS BS RS HA RM M M P E RM BS PS RS RM E E C M RM RS BS HA S BS RM C C P M P RM HA HA RS BS RM RM RM RM RM RM RM RM RM RM RM RM RM Both diagonal objects are not meeting our Objective Both diagonal objects are not meeting our Purpose. Where C:- Control, HA :- High Availability ENGINEERING MODEL OF Specification. SERVICE MODEL OF Specification(OUTPUT) (PROCESS) COMPOSITION LAW C COMPOSITION LAW D x VE SE RE SC RM x P S O M RM VE SE RE RM P P S O M RM SE VE RE RM S S M O RM RE RE SC SE RM O M S RM SC SC RE SE VE RM M M O S RM RM RM RM RM RM RM RM RM RM RM RM RM Both diagonal objects are not meeting our Engineering Both diagonal objects are not giving any Output ( TS)
  • 9. IJEEI ISSN: 2089-3272  Dynamic Value Engineering Method Optimizing the Risk on Real Time … (Prashant KP) 109 The Raw and Column total are meeting our Target Specificication, Output, Objective & Purpose on multiple Product, Business, Resources & Applications over a heterogeneous complex platform. 5. Results & Discussion (Services) We have to gain the maximum objective as per mix culture of the theoretical as well as practical services over a complex real time operating system.  Maximize the protection, detection, correction, operation & services at optimal cost and time.  Maximize the (functionalities) performance, integration, availability, reliability at optimal cost.  Maximum utilization of product, business, resources at minimal cost at right time in right way. The symmetrical object are not meeting the risk mitigation, but the anti-symmetrical objects only resolving our purpose. In this ways, we can improve the business and optimize the resource & technology cost, mean while improve the performance of product & services, Therefore, the value engineering ultimately & automatically optimize the risk mgmt system and help to the decision making to the top mgmt. It is not only value engineering but also satisfying to the reliability engineering as well as security engineering. 6. Conclusion In the final value analysis of the product, value engineering is not only beneficial, but also essential because of:  The functionality of the project (PM) is often improved as well as producing tremendous savings, both initial and Life-Cycle Cost. (Block Diagram)  A second look at the design produced by the (designer & reengineering (Table 3) architect and engineers gives the assurance that all reasonable alternatives have been explored. [PS(P, M, E)]  The cost estimates, reduction and scope statements are checked thoroughly assuring that nothing has been omitted or underestimated. (Cost optimization)  Assures that the best value will be obtained over the life of the building. (Define, design, development, deployment & decision (TS). An automated system engineering used to be develop on the decision criteria when it is important to secure as much as possible of what is wanted from each components (objects) or unit of the resource used. The resource may be money, space, time, man, machine, material, energy, market, method and so on. The system is unique in that it effectively uses both knowledge, creativity and provides step-by-step techniques for maximizing the benefits from each component. It promotes development of alternatives suitable for the future as well as the present. This is accomplished by identifying and studying each function that is wanted by the customers and clients or user, then applying knowledge and creativity to achieve the desired functions. Resources are converted into costs to achieve direct, meaningful comparisons. By using this methods of value engineering, we can achieve the 30% to 40% reduction in the required resources often results. The dynamic value engineering methodology helps to the any organization the more effectively in local, national and international markets at any time and any place around the clock follows:  Minimizing costs & risk.  Maximize profits, ROI & TCO.  Improving functionality, quality & decision (TQM).  Maximizing Production, Sales, Market, Share & generate the Capital.  Optimizing time & Maximize the utilization of Man, Machine, Material, Market, Money & Method (M^5).  Solving multiple problems at right time with optimal cost.  Utilizing overall resources more effectively at right time and right place.
  • 10.  ISSN: 2089-3272 IJEEI Vol. 2, No. 2, June 2014 : 101 – 110 110 VE is a Better to Butter:  The changes are executed at the initial stages only (PS). We are already defined in BLOCK DIAGRAM.  It requires specific technical knowledge. [SE] Table: 2 & 3 The value engineering provides accountability for individual’s functionality of each components of the real time operating system over a application, system software, server and network. This accountability is accomplished through optimization model and mechanisms that require, accountability, availability, reliability & integrity of the automated optimization control functions which is call Security Engineering, Reliability Engineering & System Engineering. That’s why this value engineering is practically and theoretically working as process of risk optimization and decision making criteria on technology management system in around the globe. Recommendations Future Advancement of this Work:  We have to keep balance & managing work load ratio among the Product, Business, Resources over a multiple application, network and infrastructure by applying value engineering model, method & mechanism.  We have to develop the distributed object oriented value engineering methods for multiple business, product & resources over a multiple applications & heterogeneous platform as per customer requirements. References [1] Bernard, Kolman. Discrete Mathematical Structures. New Delhi, India: Person Education India. (PHI). 2007. [2] Bruce, Schneier. Applied Cryptography, New Delhi, India: Wiley Publishing Inc. 1996. [3] B Mohadevan. Operation Management, New Delhi India: Person Education India. PHI 2008. [4] CISA Review Mannual. ISACA, USA. 2003. [5] Coriolis. CISSP Exam Cram, Coriolis Group Books, New Delhi, India: Dreamatech. 2002. [6] Edgar G. Discrete Mathematics with Graph Theory. New Delhi, India: Person India. (PHI). 2007. [7] Joe L Matt. Discrete Mathematics for Scientist and Mathematician. New Delhi, India: Person Education India. (PHI). 2008. [8] John B Kramer. The CISA Prep Guide, New Delhi, India: Wiley Publishing Inc. 2003. [9] Hwang, Kai. Advance Computer Architecture. New Delhi, India: Tata McGraw Hill. 2008. [10] O’ Reilly. Essential of System Administration. O’ Reilly Media: USA. 1995. [11] Pressman, Software Engineering. New Delhi, India: Tata McGraw Hill. 2001. [12] Richard B Chase, Robert, Nicholas, Nitin. Operations Management. New Delhi, India: Tata McGraw Hill. 2006. [13] Shon, Harrish. CISSP Exam study guide, New Delhi, India: Dreamtech. 2002. [14] Shon, Harrish. Security Mgmt Practices. New Delhi, India: Wiley Publishing Inc. 2002. [15] Sumitabh, Das. UNIX System V UNIX Concept & Application. Delhi, India: Tata McGraw Hill. 2009. [16] Sun-Microsystem. UNIX Sun Solaris system administration. USA. 2002. [17] William, Stalling. Cryptography and Network Security. New Delhi, India: Person India. 2006. [18] Weber, Ron. Information System Control & Audit. New Delhi, India: Person Education India. (PHI). 2002.