• Title/Summary/Keyword: Fault-tolerant

Search Result 715, Processing Time 0.028 seconds

Position and Attitude Control System Design of Magnetic Suspension and Balance System for Wind Tunnel Test using Iterative Feedback Tuning and L1 Adaptive Control Scheme (IFT와 L1 적응제어기법을 이용한 풍동실험용 자기부상 비접촉식 밸런스의 제어시스템 설계)

  • Lee, Dong-Kyu
    • Journal of Aerospace System Engineering
    • /
    • v.11 no.5
    • /
    • pp.28-35
    • /
    • 2017
  • Magnetic Suspension and Balance System (MSBS) demonstrates the capacity to levitate an experimental model absent any mechanical contact using magnetic forces and moments. It allows precise control of position and attitude of the model, and measures external forces and moments acting on the model. For the purpose of acquisition of reliable experimental results under stable and safe conditions, the performance and robustness of the position and attitude control system of MSBS needs to be improved. To this end, Iterative Feedback Tuning (IFT) and L1 adaptive output feedback algorithm were employed to automatically increase command following performance and to ensure robust operation of MSBS with failure of electric power supply. The applicability was validated using computational simulation.

Development of Process Control Graphic System for Power Plant Using Multiple Microcomputers (다중 마이크로 컴퓨터를 이용한 발전소 공정제어 그래픽 시스템의 개발)

  • ;;;Zeungnam Bien
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.38 no.3
    • /
    • pp.217-227
    • /
    • 1989
  • A process control graphic system is proposed as an efficient tool for monitoring the operation of power plant. It uses the multi-processor structure with 60 Kbyte shared memory as an implemental type of the distributed computer system, so that it is flexible, functionally extensible, and applicable to real-time process. The shared memory is used as a real-time database handling the process values and operator's commands. The database files, generated by the user-interactive graphic editor developed for the system or text editor, have the characteristics of simplicity and user-friendliness. The process control graphic system, that can monitor the operation of boiler and function as a backup controller in case of failure in boiler controller, is applied to Ulsan power plant. As a result, it displays the operating data of the boiler process without error by 14 pages of color graphic image according to the operation menu, and additionally functions well as a fault-tolerant control system.

A Study of Concurrency Control Scheme for Scalability of Blockchain Technology (블록체인 기법의 확장가능성을 위한 병행 수행 제어 기법에 대한 연구)

  • Kang, Yong-Hyeog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.569-570
    • /
    • 2017
  • Bitcoin-based blockchain technology provides an infrastructure that enables anonymous smart contracts, low-cost remittances, and online payments. However, the block-chain technology that implements the bitcoin has scalability constraints in tradeoffs between throughput and latency. To solve these problems, the Byzantine fault tolerant block-chain technique has been proposed. This technique improves throughput without increasing latency by selecting a leader and constructing many microblocks that do not contain proofs of work within the existing block by the leader. However, this technique may be less secure than existing techniques in selecting the reader. In this paper, we propose a technique for scalability of the blockchain technology by using microblock technology and parallel execution technique. Within one microblock there is information about several transactions. In the proposed scheme, the throughput of the microblocks can be increased by performing concurrently.

  • PDF

Availability Analysis of Cluster Web Server System using Software Rejuvenation Method (소프트웨어 재활 기법을 사용한 클러스터 웹서버 시스템의 가용도 분석)

  • 강창훈
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.1
    • /
    • pp.77-84
    • /
    • 2002
  • An cluster system used consist of large number of running servers, one has the problem that does the low availability occured by the high chance of the server failures and it is difficult to provide occuring software aging. In this paper, running cluster web servers consists of n primary servers and k backup servers, based on the operational parameters such as number of running primary servers, number of backup severs, rejuvenation period, rejuvenation time, failure rate of sewers, repair rate of servers, unstable rate of servers. We calculate to evaluate the rejuvenation policy such steady-state probabilities, downtime, availability, and downtime cost. We validate the solutions of mathematical model by experiments based on various operation parameters and find that the software rejuvenation method can be adopted as prventive fault tolerant technique for stability of system. The failure rate and unstable rate of the servers are essential factors for decision making of the rejuvenation policies.

  • PDF

An Improvement of Fault Tolerant for Routing using Secondary Header in CBRP (CBRP에서 보조헤더를 이용한 라우팅 고장 극복 개선)

  • 허태성;이균하
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.7
    • /
    • pp.983-996
    • /
    • 2001
  • Mobile Ad Hoc Network (MANET) is a network architecture which has no backborn network and is deployed temporarily and rapidly in emergency or war without fixed mobile infrastructures. All communications between network entities are carried in ad-hoc networks over the wireless medium. Due to the radio communications being extremely vulnerable to propagation impairments, connectivity between network nodes is not guaranteed. Therefore, previously developed routing algorithms in wired networks cannot be used. And many new algorithms have been undergone. This study proposes the Secondary Header approach to the cluster based routing protocol (CBRP). In case, the main header becomes abnormal status so that the main header can not participate the communications between network entities, the secondary header immediately replaces the primary header without selecting process of the new primary header. The performances of proposed algorithm CBRP-SH(Cluster Based Routing Protocol using Secondary Header) are compared with CBRP and results are presented in order to show the effectiveness of the algorithm.

  • PDF

Analysis of the problems in(SMRT) L-CTC and derivation of measures (서울도시철도(SMRT) L-CTC의 문제점 분석 및 해결 방안 도출)

  • Park, Geum-Heui;Lee, Jong-Woo
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.1204-1212
    • /
    • 2008
  • This study enables to troubleshoot the problems of the existing dual system with the help of the implementation of totally dualized fault-tolerant system to L-CTC computer and HADAX, and equipments are simplified and systems are modernized with the addition of the control function, as a upgraded LCP control system, to L-CTC computer on the basis of WINDOWS based O/S switched from DOS environment. An error on Microlok, which is aninterlocking apparatus, forwarded to L-CTC computer ensures to handle the false data during the operation of the system. This paper discusses a sure way to prevent the deterioration of (SMRT) L-CYC system and to bolster its stability with formation of the dual system. Additionally, WINDOW based O/S consisting of L-CTC computer leads to simplification and modernization of facilities and enhances maintenance functions offering centralization for branch offices and machine rooms as well.

  • PDF

WiCoin : Wireless LAN Sharing Using Block Chain Technology (와이코인 : 블록체인 기술을 이용한 무선랜 공유)

  • Kim, Woo-Seong;Ryu, Kyoung-Ho;Park, Yang-Jae
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.195-201
    • /
    • 2019
  • This paper proposes a blockchain system to share Wireless Local Area Network (WLAN) that recently suffers from mutual interference among increasing devices using unlicensed bands. Blockchain technology can induce cooperation from users by incentivizing them with cryptocurrency like shown in Bitcoin example. In this paper, we describe Blockchain based access mechanism in WLAN instead of conventional authentication based access. Here, users can access any WLAN access point by paying through smart contract while they also receive payment from others. In order to support real-time transaction, we apply proof-of-authority that is realized by Byzantine fault tolerant protocol instead of well-known proof-of-work that requires huge computing power and delay.

Design of Fault-tolerant MA Migration Scheme based on Encrypted Checkpoints (암호화된 체크포인트를 이용한 결함 허용성을 가지는 이동 에이전트의 이주 기법 설계)

  • 김구수;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.77-84
    • /
    • 2003
  • A mobile agent is a program which represents a user in a network and is capable of migrating from one node to another node, performing computations on behalf of the user. In this paper, we suggest a scheme that can safely recover mobile agent using the checkpoint that is saved at the platform that it visited previously and restart its execution from the abnormal termination point of the mobile agent. For security, mobile agent uses its public key to encrypt the checkpoint and the home platform uses the private key of the mobile agent to decrypt the encrypted checkpoints at the recovery stage. When home platform receives the checkpoint of the mobile agent, home platform verifies the checkpoint using message digest. Home platform verifies the correctness of the checkpoint by comparing the message digest generated at checkpoint mention time with the message digest generated at mobile agent recovery time.

Abnormal System Operation Detection by Comparing QR Code-Encoded Power Consumption Patterns in Software Execution Control Flow (QR 코드로 인코딩된 소프트웨어 실행 제어 흐름 전력 소비 패턴 기반 시스템 이상 동작 감지)

  • Kang, Myeong-jin;Park, Daejin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1581-1587
    • /
    • 2021
  • As embedded system are used widely and variously, multi-edge system, which multiple edges gather and perform complex operations together, is actively operating. In a multi-edge system, it often occurs that an abnormal operation at one edge is transferred to another edge or the entire system goes down. It is necessary to determine and control edge anomalies in order to prevent system down, but this can be a heavy burden on the resource-limited edge. As a solution to this, we use power consumption data to check the state of the edge device and transmit it based on a QRcode to check and control errors at the server. The architecture proposed in this paper is implemented using 'chip-whisperer' to measure the power consumption of the edge and 'Raspberry Pi 3' to implement the server. As a result, the proposed architecture server showed successful data transmission and error determination without additional load appearing at the edge.

The Architecture of an Intelligent Digital Twin for a Cyber-Physical Route-Finding System in Smart Cities

  • Habibnezhad, Mahmoud;Shayesteh, Shayan;Liu, Yizhi;Fardhosseini, Mohammad Sadra;Jebelli, Houtan
    • International conference on construction engineering and project management
    • /
    • 2020.12a
    • /
    • pp.510-519
    • /
    • 2020
  • Within an intelligent automated cyber-physical system, the realization of the autonomous mechanism for data collection, data integration, and data analysis plays a critical role in the design, development, operation, and maintenance of such a system. This construct is particularly vital for fault-tolerant route-finding systems that rely on the imprecise GPS location of the vehicles to properly operate, timely plan, and continuously produce informative feedback to the user. More essentially, the integration of digital twins with cyber-physical route-finding systems has been overlooked in intelligent transportation services with the capacity to construct the network routes solely from the locations of the operating vehicles. To address this limitation, the present study proposes a conceptual architecture that employs digital twin to autonomously maintain, update, and manage intelligent transportation systems. This virtual management simulation can improve the accuracy of time-of-arrival prediction based on auto-generated routes on which the vehicle's real-time location is mapped. To that end, first, an intelligent transportation system was developed based on two primary mechanisms: 1) an automated route finding process in which predictive data-driven models (i.e., regularized least-squares regression) can elicit the geometry and direction of the routes of the transportation network from the cloud of geotagged data points of the operating vehicles and 2) an intelligent mapping process capable of accurately locating the vehicles on the map whereby their arrival times to any point on the route can be estimated. Afterward, the digital representations of the physical entities (i.e., vehicles and routes) were simulated based on the auto-generated routes and the vehicles' locations in near-real-time. Finally, the feasibility and usability of the presented conceptual framework were evaluated through the comparison between the primary characteristics of the physical entities with their digital representations. The proposed architecture can be used by the vehicle-tracking applications dependent on geotagged data for digital mapping and location tracking of vehicles under a systematic comparison and simulation cyber-physical system.

  • PDF