• Title/Summary/Keyword: Automatic Recovery

Search Result 121, Processing Time 0.024 seconds

Feature Based Tool Path Planning and Modification for STEP-NC (STEP-NC의 피쳐 기반 공구경로 생성 및 갱신)

  • 조정훈;서석환
    • Korean Journal of Computational Design and Engineering
    • /
    • v.4 no.4
    • /
    • pp.295-311
    • /
    • 1999
  • An increasing attention is paid to STEP-NC, the next generation CNC controller interfacing STEP-compatible data. In this paper, we first propose an Architecture for the STEP-NC (called FBCC: Feature Baled CNC Controller) accepting feature code compatible with STEP-data, and executing NC motion feature by feature while monitoring the execution status. The main thrust of the paper has been to develop an automatic on-line tool path generation and modification scheme for milling operation. The tool path it generated iota each feature by decomposing into a finite number of primitive features. The key function in the new scheme is haw to accommodate unexpected execution results. In our scheme, the too1 path plinker is designed to have a tracing capability iota the tool path execution so that a new path can be generated from the point where the operation is stopped. An illustrative example is included to show the capability of the developed algorithm.

  • PDF

Delay Performance Analysis of the NAK-based SR-ARQ Protocol with the Reverse Acknowledgment (RA) Scheme

  • Han, Je-Chan;Lee, Jai-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.11B
    • /
    • pp.989-997
    • /
    • 2008
  • The reverse acknowledgment (RA) scheme supports a fast loss recovery for negative acknowledgment (NAK)-based selective repeat automatic repeat request (SR-ARQ) by detecting a retransmission failure quickly before a retransmission timer expires. In this paper, we evaluate the performance of a NAK-based SR-ARQ protocol with the RA scheme and compare it with the conventional NAK-based SR-ARQ protocol. Particularly, we propose a simple analysis model for the transport delay of the NAK-based SR-ARQ protocol considering the traffic condition, the retransmission persistence, the timer-based retransmissions and the RA scheme's behavior. Both NAK-based SR-ARQ protocols with and without the RA scheme are implemented by using the OPNET simulator. We verified the analysis model's accuracy through the simulation results. Also, we evaluate the performance of the NAK-based SR-ARQ protocol with the RA scheme based on analysis and simulation results.

Coupling shape-memory alloy and embedded informatics toward a metallic self-healing material

  • Faravelli, Lucia;Marzi, Alessandro
    • Smart Structures and Systems
    • /
    • v.6 no.9
    • /
    • pp.1041-1056
    • /
    • 2010
  • This paper investigates the possibility of a strategy for an automatic full recover of a structural component undergoing loading-unloading (fatigue) cycles: full recover means here that no replacement is required at the end of the mission. The goal is to obtain a material capable of self healing earlier before the damage becomes irreversible. Attention is focused on metallic materials, and in particular on shape memory alloys, for which the recovering policy just relies on thermal treatments. The results of several fatigue tests are first reported to acquire a deep understanding of the physical process. Then, for cycles of constant amplitude, the self-healing objective is achieved by mounting, on the structural component of interest, a suitable microcontroller. Its input, from suitable sensors, covers the current stress and strain in the alloy. The microcontroller elaborates from the input the value of a decisional parameter and activates the thermal process when a threshold is overcome.

An Implementation Methodology of the Cluster Aware Application Program (클러스터 인식 응용 프로그램의 구현 기법)

  • 김영수;조익성;임재홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.252-259
    • /
    • 1999
  • This paper describes the development of cluster-aware application that provides advanced services such as automatic failover, faster error recovery, easy administration and scalability in clustering environment. For These, total system architecture and algorithm are proposed. For the verification this paper, socket application and cluster resource DLL, administration DLL for the application are implemented and tested. Using the microsoft cluster server, The individual failed services was relocated from one server to another. The result shows that allows applications on the original server to continue running, unaffected tv the failed service.

  • PDF

L1-norm Minimization based Sparse Approximation Method of EEG for Epileptic Seizure Detection

  • Shin, Younghak;Seong, Jin-Taek
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.5
    • /
    • pp.521-528
    • /
    • 2019
  • Epilepsy is one of the most prevalent neurological diseases. Electroencephalogram (EEG) signals are widely used for monitoring and diagnosis tool for epileptic seizure. Typically, a huge amount of EEG signals is needed, where they are visually examined by experienced clinicians. In this study, we propose a simple automatic seizure detection framework using intracranial EEG signals. We suggest a sparse approximation based classification (SAC) scheme by solving overdetermined system. L1-norm minimization algorithms are utilized for efficient sparse signal recovery. For evaluation of the proposed scheme, the public EEG dataset obtained by five healthy subjects and five epileptic patients is utilized. The results show that the proposed fast L1-norm minimization based SAC methods achieve the 99.5% classification accuracy which is 1% improved result than the conventional L2 norm based method with negligibly increased execution time (42msec).

Implementation of automatic recovery function for computiong node with failure of cluster system (클러스터 시스템의 장애 발생 계산노드 자동 복구 기능 구현)

  • Min-Woo Kwon;Do-Sik An;TaeYoung Hong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.2-4
    • /
    • 2024
  • 한국과학기술정보연구원(이하 KISTI)의 국가슈퍼컴퓨팅센터에서는 슈퍼컴퓨터 5호기인 Nurion과 Neuron 시스템을 구축하여 국내 연구자들에게 서비스하고 있다. 이 중에서 Neuron 시스템은 GPU 클러스터 시스템으로 SLURM Batch Scheduler를 이용하여 공동활용서비스를 제공하고 있다. 본 논문에서는 Neuron에서 사용 중인 SLURM Batch Scheduler와 리눅스의 crontab 기능을 이용하여 소프트웨어 장애가 발생한 계산노드를 자동으로 복구시키는 기능을 구현하여 장애처리 대기시간을 단축시키는 기법에 대해서 소개한다.

Quantitative and qualitative analysis of the flow field development through T99 draft tube caused by optimized inlet velocity profiles

  • Galvan, Sergio;Reggio, Marcelo;Guibault, Francois;Solorio, Gildardo
    • International Journal of Fluid Machinery and Systems
    • /
    • v.8 no.4
    • /
    • pp.283-293
    • /
    • 2015
  • The effect of the inlet swirling flow in a hydraulic turbine draft tube is a very complex phenomenon, which has been extensively investigated both theoretically and experimentally. In fact, the finding of the optimal flow distribution at the draft tube inlet in order to get the best performance has remained a challenge. Thus, attempting to answer this question, it was assumed that through an automatic optimization process a Genetic Algorithm would be able to manage a parameterized inlet velocity profile in order to achieve the best flow field for a particular draft tube. As a result of the optimization process, it was possible to obtain different draft-tube flow structures generated by the automatic manipulation of parameterized inlet velocity profiles. Thus, this work develops a qualitative and quantitative analysis of these new draft tube flow field structures provoked by the redesigned inlet velocity profiles. The comparisons among the different flow fields obtained clearly illustrate the importance of the flow uniformity at the end of the conduit. Another important aspect has been the elimination of the re-circulating flow area which used to promote an adverse pressure gradient in the cone, deteriorating the pressure recovery effect. Thanks to the evolutionary optimization strategy, it has been possible to demonstrate that the optimized inlet velocity profile can suppress or mitigate, at least numerically, the undesirable draft tube flow characteristics. Finally, since there is only a single swirl number for which the objective function has been minimized, the energy loss factor might be slightly affected by the flow rate if the same relation of the axial-tangential velocity components is maintained, which makes it possible to scale the inlet velocity field to different operating points.

Adaptive Redundancy Scheme Using Channel State Estimation in Wireless LANs (무선 랜에서 채널 상태를 고려한 적응적 전송 방법)

  • 김선명;조영종
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.7
    • /
    • pp.9-19
    • /
    • 2004
  • WLAN (Wireless Local Area Networks) needs error recovery and flow control schemes to support reliable multicast protocol. Limited wireless bandwidth, as well as queuing losses caused by the asymmetric wired/wireless interactions, demands more effective approaches for reducing packet losses. Moreover, since the wireless channel is a shared broadcast medium, if sender receives feedback information simultaneously from several receivers, the feedback delays data frame transmission of forward direction by introducing channel congestion and burden at the sender. Therefore, it is important to minimize the amount of feedback information from receivers. In this paper, we propose an ARS(Adaptive Redundancy Scheme) that combines FEC(Forward Error Correction) using channel state estimation and ARQ(Automatic Repeat Request) both to reduce the amount of feedback information and the number of retransmissions and to guarantee high data reliability in a WLAN multicast environment. Performance of the proposed scheme is evaluated by means of analysis and simulations in AWGN and Rayleigh fading channels. The results show that the proposed scheme reduces the amount of feedback information and the number of retransmissions and guarantees high data reliability, while keeping throughput efficiency similarly with the conventional FEC and ARQ scheme.

Searching for Impossible Differential Characteristics of ARX-Based Block Cipher Using MILP (MILP를 이용한 ARX 기반 블록 암호의 불능 차분 특성 탐색)

  • Lee, HoChang;Kang, HyungChul;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.427-437
    • /
    • 2017
  • Impossible differential characteristics distinguish the corresponding block cipher from random substitution and can also be used for key recovery attack. Recently Cui et al. proposed an automatic method for searching impossible differential characteristics of several ARX - based block ciphers using Mixed Integer Linear Programming(MILP). By optimizing the method proposed by Cui et al., It was possible to find new impossible differential characteristics which could not be founded by the method by using less linear constraint expression than the existing method. It was applied to the SPECK family and LEA using the modified method. We found 7-rounds for SPECK32, SPECK48, SPECK64, SPECK96 and 8-rounds impossible differential characteristics of SPECK128. These impossible differential characteristics are all newly found. We also found existing 10-rounds of impossible differential characteristic and new 10-rounds of impossible differential characteristics of LEA.

A Revised Dynamic ROI Coding Method Based On The Automatic ROI Extraction For Low Depth-of-Field JPEG2000 Images (낮은 피사계 심도 JPEG2000 이미지를 위한 자동 관심영역 추출기반의 개선된 동적 관심영역 코딩 방법)

  • Park, Jae-Heung;Kim, Hyun-Joo;Shim, Jong-Chae;Yoo, Chang-Yeul;Seo, Yeong-Geon;Kang, Ki-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.63-71
    • /
    • 2009
  • In this study, we propose a revised dynamic ROI (Region-of-Interest) coding method in which the focused ROI is automatically extracted without help from users during the recovery process of low DOF (Depth-of-Field) JPEG2000 image. The proposed method creates edge mask information using high frequency sub-band data on a specific level in DWT (Discrete Wavelet Transform), and then identifies the edge code block for a high-speed ROI extraction. The algorithm scans the edge mask data in four directions by the unit of code block and identifies the edge code block simply and fastly using a edge threshold. As the results of experimentation applying for Implicit method, the proposed method showed the superiority in the side of speed and quality comparing to the existing methods.