• Title/Summary/Keyword: fault-enhanced algorithm

Search Result 28, Processing Time 0.029 seconds

Fault Detection and Diagnosis of Dynamic Systems with Sequentially Correlated Measurement Noise

  • Kim, B.S.;Y, J. Lee;Kim, K.Y.;Lee, I.S.;Lee, D.Y.;Lee, J.W.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.157.4-157
    • /
    • 2001
  • An effective approach to detect and diagnose multiple failures in a dynamic system is proposed for the case where the measurement noise is correlated sequentially in time. It is based on the modified interacting multiple-model (MIMM) estimation algorithm in which a generalized decorrelation process is developed by employing the autoregressive (AR) model for the correlated measurement noise. Numerical example for the nuclear steam generator is provided to illustrate the enhanced performance of the proposed algorithm.

  • PDF

The Development of FlexRay Driver for Vehicle Network System (자동차 네트워크 시스템을 위한 FlexRay 드라이버 개발)

  • Koo, Yong-Je;Kim, Jong-Chul;Shin, Choong-Yup;Park, Sang-Jong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.6
    • /
    • pp.546-552
    • /
    • 2010
  • As the demands for the safety and convenience applications of the vehicles increase, the data load for the In-vehicle Network has increased significantly. As a result, a deterministic and fault-tolerant communication system is required to implement the safety critical applications such as X-by-wire systems. FlexRay communication system is a new standard of network communication system which provides the high speed serial communication, time triggered bus and fault tolerant communication between electronic devices. In addition to time-triggered communication, as providing of the event-triggered communication such as CAN, FlexRay protocol is able to manage the restricted communication resource more effectively. This paper presents the development of FlexRay driver which will be applied to the future ECU's communication system. To develop the FlexRay driver, the FlexRay requirement specification and FlexRay specification is analyzed. The developed FlexRay driver is implemented by using MPC5567 microprocessor of the Freescale semiconductor. To verify the developed FlexRay driver, the waveform of the FlexRay driver was measured and compared with the CAN communication system. As a result, the bus load is reduced about 13% compared with the CAN communication system.

A Study on ENHPP Software Reliability Growth Model based on Exponentiated Exponential Coverage Function (지수화 지수 커버리지 함수를 고려한 ENHPP 소프트웨어 신뢰성장 모형에 관한 연구)

  • Kim, Hee-Cheul
    • The Journal of Information Technology
    • /
    • v.10 no.2
    • /
    • pp.47-64
    • /
    • 2007
  • Finite failure NHPP models presented in the literature exhibit either constant, monotonic increasing or monotonic decreasing failure occurrence rates per fault. Accurate predictions of software release times, and estimation of the reliability and availability of a software product require quantification of a critical element of the software testing process : test coverage. This model called enhanced non-homogeneous poission process(ENHPP). In this paper, exponential coverage and S-coverage model was reviewed, proposes the exponentiated exponential coverage reliability model, which maked out efficiency substituted for gamma and Weibull model(2 parameter shape illustrated by Gupta and Kundu(2001). In this analysis of software failure data, algorithm to estimate the parameters used to maximum likelihood estimator and bisection method, model selection based on SSE statistics for the sake of efficient model, was employed.

  • PDF

Device Alive Check Algorithm using TCP Session under CCTV Network based on NAT (TCP 세션을 활용한 사설망 구간 CCTV 단말의 생사판별 알고리즘)

  • Shin, HaeJoon;Chung, YounKy
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.5
    • /
    • pp.631-640
    • /
    • 2015
  • Recently CCTV system is installed widely purpose to enhanced physical security, gathering criminal evidence and management of facilities. In spite of supporting strong management function, CCTV system has weak security function. Therefore high security management function is required. Generally it's not easy to control the devices under NAT using a NMS(Network Management System). So we design and implement alive check algorithm of CCTV devices under NAT using DVRNS address resolution and TCP session check. We evaluated and analyzed of developed system on real environment which includes about 100 DVRs under NAT. As a result of test, it showed that device alive check and DVRNS address resolution were well performed without any error.

Near-Five-Vector SVPWM Algorithm for Five-Phase Six-Leg Inverters under Unbalanced Load Conditions

  • Zheng, Ping;Wang, Pengfei;Sui, Yi;Tong, Chengde;Wu, Fan;Li, Tiecai
    • Journal of Power Electronics
    • /
    • v.14 no.1
    • /
    • pp.61-73
    • /
    • 2014
  • Multiphase machines are characterized by high power density, enhanced fault-tolerant capacity, and low torque pulsation. For a voltage source inverter supplied multiphase machine, the probability of load imbalances becomes greater and unwanted low-order stator voltage harmonics occur. This paper deals with the PWM control of multiphase inverters under unbalanced load conditions and it proposes a novel near-five-vector SVPWM algorithm based on the five-phase six-leg inverter. The proposed algorithm can output symmetrical phase voltages under unbalanced load conditions, which is not possible for the conventional SVPWM algorithms based on the five-phase five-leg inverters. The cause of extra harmonics in the phase voltages is analyzed, and an xy coordinate system orthogonal to the ${\alpha}{\beta}z$ coordinate system is introduced to eliminate low-order harmonics in the output phase voltages. Moreover, the digital implementation of the near-five-vector SVPWM algorithm is discussed, and the optimal approach with reduced complexity and low execution time is elaborated. A comparison of the proposed algorithm and other existing PWM algorithms is provided, and the pros and cons of the proposed algorithm are concluded. Simulation and experimental results are also given. It is shown that the proposed algorithm works well under unbalanced load conditions. However, its maximum modulation index is reduced by 5.15% in the linear modulation region, and its algorithm complexity and memory requirement increase. The basic principle in this paper can be easily extended to other inverters with different phase numbers.

Fault Detection of Ceramic Imaging using ART2 Algorithm (ART2 알고리즘을 이용한 세라믹 영상에서의 결함 검출)

  • Kim, Kwang Baek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2486-2491
    • /
    • 2013
  • There are invisible defects by naked eyes in ceramic material images such as internal stomata, cracks and foreign substances. In this paper we propose a method to detect and extract such defects from ceramic pipe weld zone by applying ART2 learning. In pre-processing, we apply Ends-in Search Stretching to enhance the intensity and then perform fuzzy binarization with triangle type membership function followed by enhanced ART2 that interacts with random input patterns to extract such invisible defects. The experiment verifies that this proposed method is sufficiently effective.

Fault Detection of Ceramic Imaging using Enhanced ART2 Algorithm (개선된 ART2 알고리즘을 이용한 세라믹 영상에서의 결함 검출)

  • Lee, Jin-Moo;Lee, Sun-mi;Park, Ji-hyun;Woo, Young-Woon;Song, Doo Heon;Kim, Kwang-Beak
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.87-89
    • /
    • 2013
  • 본 논문에서는 Ends-In Search Stretching 기법을 적용하여 명암 대비를 강조하고, 명암 대비가 강조된 영상에서 삼각형 타입의 소속 함수를 이용한 퍼지 이진화 기법을 적용한 후, 그 다음 임의의 패턴 입력에 대해서도 효과적으로 특징을 분류하는 개선된 ART2 알고리즘을 이용하여 결함 영역을 검출한다. 제안된 방법을 세라믹 소재 영상을 대상으로 실험한 결과, 기존의 방법보다 효율적으로 결함이 검출되는 것을 확인하였다.

  • PDF

MS Load Balancing Algorithm in Cloud Computing

  • Ankita Gupta;Ranu Lal Chouhan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.157-161
    • /
    • 2024
  • Cloud computing becomes an important technology for distributed computing and parallel computing. Cloud computing provides various facility like to share resources, software packages, information, storage and many different applications depending on user demand at any time and at any place. It provides an extensive measure for computing and storage. A service provided by it to user follows pay-as-you-go model. Although it provides many facilities still there is some problem which are resource discovery, fault tolerance, load balancing, and security. Out of these Load balancing is the main challenges. There are many techniques which used to distribute wor9kload or task equally across the servers. This paper includes cloud computing, cloud computing architecture, virtualization and MS load balancing technique which provide enhanced load balancing.

Study of Surfactant Enhanced Remediation Methods for Organic Pollutant(NAPL) Distributed over the Heterogeneous Medium (계면활성제를 이용한 불균질 매질에서 유기오염물(NAPL)의 정화효율에 관한 실험)

  • 서형기;이민희;정상용
    • Journal of Soil and Groundwater Environment
    • /
    • v.6 no.4
    • /
    • pp.51-59
    • /
    • 2001
  • Column and box tests were performed to investigate the removal efficiency of NAPL using the surfactant enhanced flushing In heterogeneous medium. Homogeneous Ottawa sand and heterogeneous soil were used to verify the increase of remediation efficiency for the surfactant enhanced flushing in column test. Box tests with two different heterogeneous sub-structure were performed to quantify the capability of the surfactant enhanced flushing as a remediation method to remove NAPL from the heterogeneous medium. Two different grain size sand layers were repeated in the box to simulate the heterogeneous layer formation and the modified fault structure was built to simulate the fault system in the box. O-xylene as a LNAPL and PCE as a DNAPL were used and oleamide as a non-ionic surfactant. The maximum NAPL effluent concentration with 1% oleamide flushing in the homogeneous column test increased about 460 times compared to that with only water flushing and about 250 times increased in the real soil column test. In heterogeneous medium, the maximum effluent concentration increased about 150 times in 1% oleamide flushing and most of NAPL were removed from the box within 8 pore volume flushing, suggesting that the removal efficiency increased very much compared to in only water flushing. Results investigated the capability of the surfactant enhanced remediation method to remove NAPL even in heterogeneous medium.

  • PDF

HyperCerts : Privacy-Enhanced OTP-Based Educational Certificate Blockchian System (HyperCerts : 개인정보를 고려한 OTP 기반 디지털 졸업장 블록체인 시스템)

  • Jung, Seung Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.987-997
    • /
    • 2018
  • Blockchain has tamper-free, so many applications are developing to leverage tamper-free features of blockchain. MIT Media Labs proposed BlockCerts, educational certificate blockchain System, to solve problems of legacy certificate verifications. Existing educational certificate blockchain Systems are based on public blockchain such as bitcoin, Ethereum, so any entity can participate educational institute in principal. Moreover, the exisitng educational certricate blockchain system utilizes the integrity of blockchain, but the confidentiality of the educational certificate is not provided. This paper propose a digital certificate system based on private blockchain, name HyperCerts. Therefore, only trusted entity can participate in the private blockchain network, Hyperledger, as the issuer of digital certificate. Furthermore, the practical byzantine fault tolerance is used as consensus algorithm, HyperCerts reduce dramatically the latency of issuing digital certificate and required computing power. HyperCerts stores the hash value of digital certificate into the ledger, so breach of personal information by malicious entity in the private blockchain is protected.