• Title/Summary/Keyword: reliable

Search Result 13,763, Processing Time 0.045 seconds

Optimization of Redundancy based on the required reliability for a reliable Systems

  • Ryoo, Dong-Wan;Lee, Hyung-Jik;Lee, Jeun-Woo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.69.3-69
    • /
    • 2002
  • The reliability of system is to become a important concern in developed industry. The controller based on the reliability is so important position. A reliable system is for system protection and human life by fault detection and control action against the transient condition of system. The aerospace system , nuclear reactor and chemical reactor are representative of a reliable system. This paper presents analysis of reliable system reliability, formal problem statement of optimal redundancy based on the reliability for a reliable system. And the problem is optimized by genetic algorithm. The genetic algorithms is useful algorithm in case of...

  • PDF

End-to-end Reliable Message Transmission Considering Load Balancing in Wireless Networks

  • Tran, Anh Tai;Kim, Myung Kyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3094-3109
    • /
    • 2014
  • This paper proposes a load balanced reliable routing protocol called LBR (Load Balanced Reliable routing) in wireless networks. The LBR protocol transmits messages through a reliable path considering the balancing of the traffic load. Recently, the authors have proposed a multipath-based reliable routing protocol called MRFR, which is an appealing protocol for fault tolerant reliable data transmission. However, However, MRFR has no concern with the problem of load balancing, which results in increasing congestion and consuming high energy at some network nodes. As a result, the problem affects negatively the performance of the network. Taking account of load balancing as a route selection criteria can avoid routing through the congested nodes and allows to find better routes. In this paper, we extend MRFR by considering load balancing in the route discovery process of reliable communication. The simulation results showed that the proposed protocol outperforms AODV in terms of end-to-end delay, packet delivery radio, and average jitter. Compared to MRFR, the LBR protocol has the same packet delivery ratio, and obtains a better efficiency of load balancing.

Metaheuristics for reliable server assignment problems

  • Jang, Kil-Woong;Kim, Jae-Hwan
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.38 no.10
    • /
    • pp.1340-1346
    • /
    • 2014
  • Previous studies of reliable server assignment considered only to assign the same cost of server, that is, homogeneous servers. In this paper, we generally deal with reliable server assignment with different server costs, i.e., heterogeneous servers. We formulate this problem as a nonlinear integer programming mathematically. Our problem is defined as determining a deployment of heterogeneous servers to maximize a measure of service availability. We propose two metaheuristic algorithms (tabu search and particle swarm optimization) for solving the problem of reliable server assignment. From the computational results, we notice that our tabu search outstandingly outperforms particle swarm optimization for all test problems. In terms of solution quality and computing time, the proposed method is recommended as a promising metaheuristic for a kind of reliability optimization problems including reliable sever assignment and e-Navigation system.

Communication Effects of Print Ad Having Pictorial Typography (픽토리얼 타이포그래피가 사용된 인쇄 광고의 커뮤니케이션 효과 연구)

  • Lee, Kwang-Sook;Kwak, Bo-Sun
    • Journal of the Korean Graphic Arts Communication Society
    • /
    • v.30 no.2
    • /
    • pp.13-22
    • /
    • 2012
  • This research attempts to analyze communication effects of print ad having pictorial typography. 150 Questionnaires were distributed to respondents staying Daejeun City and 148 copies were retreated for five days from April 22nd to 26th, 2012. Frequency analysis, factor analysis, Cronbach's alpha for reliability analysis were utilized for data analysis with SPSS 12.0. For testing hypothesis, regression analysis was used. As result of testing hypothesis, 'informative, beneficial, creative, reliable' were partially significant to attitude towards print ad having pictorial typography. That means 'creative' and 'reliable' were insignificant, while 'informative' and 'beneficial' are significant. Variable of the most influencing on attitude towards advertising is 'informative.' 'Informative, beneficial, creative, and reliable' were partially significant to brand attitude, too. That means 'beneficial' and 'creative' were insignificant, while 'informative' and 'reliable' were significant. Variable of the most influencing on brand attitude was 'reliable.' Therefore, to enhance communication effect of print ad having pictorial typography, 'informative' and 'reliable' are most significant variables.

Design of a Voting Mechanism considering Safety for Reliable System Using EPLD and Reliability Analysis

  • Ryoo, Dong-Wan;Lee, Hyung-Jik;Lee, Jeun-Woo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.40.2-40
    • /
    • 2001
  • The protection system of the system communication, nuclear reactor and chemical reactor are representative of reliable system. This reliable system must be designed based on reliability as well as concept of safety, which is a failed system go a way of safe. Reliable system is composed of part of data acquisition, calculator, communication with redundancy, and a voter is important factor of reliability. Because it is serially connected. This paper presents a Design and Analysis of a Voting Mechanism considering Safety for reliable system Using EPLD. In the case of digital implementation a coincidence logic (voter) of reliable system, it needs CPU and memory, so increase a number of units. Therefore the failure rate and cost are increased on contrary when it is designed EPLD or FPGA.

  • PDF

RMA: Reliable Multicast Architecture for Scalable and Reliable Multicast (RMA: 확장성과 신뢰성을 지원하는 신뢰적인 멀티캐스트 구조)

  • Kang, Pil-Yong;Shin, Yong-Tae
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.578-585
    • /
    • 2001
  • IP Multicast that provides best-efforts service does not guarantee reliable delivery of multicast packets. In recent years, there are many approaches to support reliable multicast, but those are insufficient for implementing scalable and reliable multicast over Internet. We propose a Reliable Multicast Architecture(RMA) for scalable and reliable multicast. The RMA model guarantees reliability using a receiver initiated retransmission mechanism, and scalability using a feedback suppression mechanism by Multicast Router(MR). Furthermore, it utilizes underlying multicast routing information to minimize the cost of protocol modification and overheads. Our performance analyses show that RMA is much superior to previous works in the point of scalability and compatibility.

  • PDF

An efficient method for reliable optimum design of trusses

  • Dizangian, Babak;Ghasemi, Mohammad Reza
    • Steel and Composite Structures
    • /
    • v.21 no.5
    • /
    • pp.1069-1084
    • /
    • 2016
  • This paper introduces a new and effective design amplification factor-based approach for reliable optimum design of trusses. This paper may be categorized as in the family of decoupled methods that aiming for a reliable optimum design based on a Design Amplification Factor (DAF). To reduce the computational expenses of reliability analysis, an improved version of Response Surface Method (RSM) was used. Having applied this approach to two planar and one spatial truss problems, it exhibited a satisfactory performance.

Reliable $H_\infty$ control for descriptor systems with actuator failures (구동기 고장을 가지는 특이시스템의 신뢰 $H_\infty$ 제어)

  • Kim, Jong-Hae
    • Proceedings of the KIEE Conference
    • /
    • 2003.11b
    • /
    • pp.135-138
    • /
    • 2003
  • In this paper, we provide a reliable few controller design method for descriptor systems satisfying asymptotic stability with $H_\infty$ norm bound and all actuator failures occurred within the pre-specified subset. The proper condition for the existence of a reliable $H_\infty$ controller and the controller design method are proposed by linear matrix inequality(LMI), Schur complements, and singular value decomposition. All solutions can be obtained simultaneously because the presented sufficient condition can be expressed as an LMI form.

  • PDF

UDP with Flow Control for Myrinet (Myrinet을 위한 흐름 제어 기능을 갖는 UDP)

  • Kim, Jin-Ug;Jin, Hyun-Wook;Yoo, Hyuck
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.5
    • /
    • pp.649-655
    • /
    • 2003
  • Network-based computing such as cluster computing requires a reliable high-speed transport protocol. TCP is a representative reliable transport protocol on the Internet, which implements many mechanisms, such as flow control, congestion control, and retransmission, for reliable packet delivery. This paper, however, finds out that Myrinet does not incur any packet losses caused by network congestion. In addition, we ascertain that Myrinet supports reliable and ordered packet delivery. Consequently, most of reliable routines implemented in TCP produce unnecessarily additional overheads on Myrinet. In this paper, we show that we can attain the reliability only by flow control on Myrinet and propose a new reliable protocol based on UDP named RUM (Reliable UDP on Myrinet) that performs a flow control. As a result, RUM achieves a higher throughput by 45% than TCP and shows a similar one-way latency to UDP.

Tighter Throughput Lower Bounds of Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs (IEEE 802.11 무선랜에서 연결정보 기반의 신뢰성 있는 멀티캐스트 MAC 프로토콜을 위한 쓰루풋의 하한 유도)

  • Choi, Woo-Yong
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.38 no.4
    • /
    • pp.285-288
    • /
    • 2012
  • The connectivity-based reliable multicast MAC protocol was proposed for IEEE 802.11 wireless LANs and the formulae for the lower bounds of the multicast downlink throughput and the uplink throughput of the connectivity-based reliable multicast MAC protocol were derived in our previous study. We provide the tighter throughput lower bounds of the connectivity-based reliable multicast MAC protocol than the lower bounds presented in our previous study.