• Title/Summary/Keyword: Fail-Over

Search Result 167, Processing Time 0.024 seconds

Experimental investigation of long-term characteristics of greenschist

  • Zhang, Qing-Zhao;Shen, Ming-Rong;Ding, Wen-Qi;Jang, Hyun-Sic;Jang, Bo-An
    • Geomechanics and Engineering
    • /
    • v.11 no.4
    • /
    • pp.531-552
    • /
    • 2016
  • The greenschist in the Jinping II Hydropower Station in southwest China exhibits continuous creep behaviour because of the geological conditions in the region. This phenomenon illustrates the time-dependent deformation and progressive damage that occurs after excavation. In this study, the responses of greenschist to stress over time were determined in a series of laboratory tests on samples collected from the access tunnel walls at the construction site. The results showed that the greenschist presented time-dependent behaviour under long-term loading. The samples generally experienced two stages: transient creep and steady creep, but no accelerating creep. The periods of transient creep and steady creep increased with increasing stress levels. The long-term strength of the greenschist was identified based on the variation of creep strain and creep rate. The ratio of long-term strength to conventional strength was around 80% and did not vary much with confining pressures. A quantitative method for predicting the failure period of greenschist, based on analysis of the stress-strain curve, is presented and implemented. At a confining pressure of 40 MPa, greenschist was predicted to fail in 5000 days under a stress of 290 MPa and to fail in 85 days under the stress of 320 MPa, indicating that the long-term strength identified by the creep rate and creep strain is a reliable estimate.

Robust Backup Path Selection in Overlay Routing with Bloom Filters

  • Zhou, Xiaolei;Guo, Deke;Chen, Tao;Luo, Xueshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.1890-1910
    • /
    • 2013
  • Routing overlay offers an ideal methodology to improve the end-to-end communication performance by deriving a backup path for any node pair. This paper focuses on a challenging issue of selecting a proper backup path to bypass the failures on the default path with high probability for any node pair. For existing backup path selection approaches, our trace-driven evaluation results demonstrate that the backup and default paths for any node pair overlap with high probability and hence usually fail simultaneously. Consequently, such approaches fail to derive a robust backup path that can take over in the presence of failure on the default path. In this paper, we propose a three-phase RBPS approach to identify a proper and robust backup path. It utilizes the traceroute probing approach to obtain the fine-grained topology information, and systematically employs the grid quorum system and the Bloom filter to reduce the resulting communication overhead. Two criteria, delay and fault-tolerant ability on average, of the backup path are proposed to evaluate the performance of our RBPS approach. Extensive trace-driven evaluations show that the fault-tolerant ability of the backup path can be improved by about 60%, while the delay gain ratio concentrated at 14% after replacing existing approaches with ours. Consequently, our approach can derive a more robust and available backup path for any node pair than existing approaches. This is more important than finding a backup path with the lowest delay compared to the default path for any node pair.

Improving the Job Success Rate through Analysis of User Logs in HPC (HPC 환경에서 사용자 로그 분석을 통한 작업 성공률 개선)

  • Yoon, JunWeon;Hong, TaeYoung;Kong, Ki-Sik;Park, ChanYeol
    • Journal of Digital Contents Society
    • /
    • v.16 no.5
    • /
    • pp.691-697
    • /
    • 2015
  • Supercomputers are used for many different areas including new product design of industries as well as state-of-the-art science and technology for large amount of computational needs. Tachyon is a 4th supercomputer built at KISTI that is a high-performance parallel computing system with 3,200 computing nodes and infrastructures. This system is currently about 10,000 users and over 170 organizations are used, the number of jobs they are performing work in batch type form through a scheduler. Also, this system logs lots of job scripts, execution environment, library, job status from the job submit to end. In this paper, we analyzed batch jobs information from Sun Grid Engine, that use as a scheduler in Tachyon system, and job executed information in Tachyon System. In particular, we distinguished the fail jobs from the all tasks that users perform and we analyzed the cause of failure. Among them, we can extracted some of jobs that can be regarded as normal jobs through the improvement in those works logged as all of fail jobs.

Study on the Calculation of Appropriate Scale of Each Area When Planning Fitness Center (휘트니스센터 계획시 시설별 규모산정에 관한 연구)

  • Cho, Young-Youn
    • Korean Institute of Interior Design Journal
    • /
    • v.15 no.5 s.58
    • /
    • pp.281-288
    • /
    • 2006
  • Fitness center which was first introduced through hotel fitness has been disseminated into country over the years and these days it becomes a public sports facility that is available even in a small city. Fitness center usually requires a space more than 500 pyeong and even in a small fitness facility at least 200-300 pyung is in need. Also, complex structure including a space for preparing exercise and other subsidiary facility is necessary as well as various service areas to perform various exercise programs. In case of domestic fitness centers, however, proper standard and data required to compute the scale of each service area is not available due to the short of piling data. Therefore computing each space totally depends on an instinct decision of a designer or client, which may cause the fail of effective use of space. This paper aims to calculate appropriate use of space, that is, the over all space, equipment size, and movement line of each area as well as preference and frequence of use among areas is estimated in order to apply those data when computing appropriate estimation of scale.

Readability of the Product Labelling Information of Over-The-Counter Pharmaceuticals in Convenience Store (약국 외에서 판매되는 안전상비의약품 설명서의 난이도 평가)

  • Kim, Lak Young;Lee, Iyn-Hyang
    • Korean Journal of Clinical Pharmacy
    • /
    • v.25 no.1
    • /
    • pp.27-33
    • /
    • 2015
  • Background: Since November 2012, some of over-the-counter (OTC) medications have been sold in convenience store without pharmacist' s supervision. We purposed to examine if the product labels of OTCs provide sufficient information that is appropriate for consumers who may have low health literacy. Methods: We compared the difficulty of words that are utilized in pharmaceutical product labels of interest (intervention) with those in the $6^{th}$ grade textbook (control). Pharmaceutical products of interest were comprised of 13 OTCs which have been sold currently in convenience stores. We grouped words into the 4 levels of difficulty based on the Korean Vocabulary Classification for Education, and statistically tested words frequency in each level between OTCs and control. Results: The 13 OTC labels included lay language (easier or equal to language used in primary school) about 10% less; professional language about 10% more (p < 0.001 in all). Labels for analgesics had the longest and most difficult information, followed by common cold preparations, muscle pain relievers as plaster or cataplasma and digestives. Conclusion: The 13 OTC labels might fail to provide appropriate information for safety use by consumers in terms of the difficulty level of words. The improvement of labels of OTC medications and consumer education strategies are called for safety use of OTC medications sold in convenience stores.

Development of a Longitudinal Control Algorithm based on V2V Communication for Ensuring Takeover Time of Autonomous Vehicle (자율주행 자동차의 제어권 전환 시간 확보를 위한 차간 통신 기반 종방향 제어 알고리즘 개발)

  • Lee, Hyewon;Song, Taejun;Yoon, Youngmin;Oh, Kwangseok;Yi, Kyongsu
    • Journal of Auto-vehicle Safety Association
    • /
    • v.12 no.1
    • /
    • pp.15-25
    • /
    • 2020
  • This paper presents a longitudinal control algorithm for ensuring takeover time of autonomous vehicle using V2V communication. In the autonomous driving of more than level 3, autonomous systems should control the vehicles by itself partially. However if the driver's intervention is required for functional safety, the driver should take over the control reasonably. Autonomous driving system has to be designed so that drivers can take over the control from autonomous vehicle reasonably for driving safety. In this study, control algorithm considering takeover time has been developed based on computation method of takeover time. Takeover time is analysed by conditions of longitudinal velocity of preceding vehicle in time-velocity plane. In addition, desired clearance is derived based on takeover time. The performance evaluation of the proposed algorithm in this study was conducted using 3D vehicle model with actual driving data in Matlab/Simulink environment. The results of the performance evaluation show that the longitudinal control algorithm can control while securing takeover time reasonably.

The Job Seekers Model: Comparison of the General Search Model and the Unified Approach Model

  • LEE, Dong-Hae;LEE, Sang-Ki
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.1
    • /
    • pp.7-13
    • /
    • 2021
  • Purpose: Unemployment in its general form is a result stemming from the decisions of workers to search for a new and better paying job. In this study, the view that unemployed workers were not simply desiring any job, but one that would maximize their expected future outcome, was examined. Research design, data, and methodology: In order for collection of data and analysis, the panel dates of individual applications for job openings on job search websites were utilized to examine search effort and period for individuals. Results: It was found that the number of applications sent by a job seeker declined over their period of job searching, and that job seekers over a long duration of time tend to send relatively more applications per week throughout their entire search period. The latter finding contradicts the implications of the standard labor search effort models. Conclusions: It can be observed that these job search models fail to capture several key elements in search efforts, and that the search time for an offer is not entirely predetermined by the labor market conditions and socio-economic (individual) characteristics of the searcher. It can be shortened as he or she intensifies their job search efforts.

Hybrid Error Concealment Algorithm for MPEG-4 Video Decoding

  • Song, Hak-Sop;Okada, Hiroyuki;Fujita, Gen;Onoye, Takao;Shirakawa, Isao
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.611-614
    • /
    • 2002
  • In this paper, a novel error concealment, algorithm is proposed for the MPEG-4 video decoding. Apart from existing algorithms which fail to exhibit stable performance over various video sequences and error patterns, the proposed algorithm adopts a new hybrid scheme, which can achieve a consistent performance with reduced computational complexity. This algorithm is implemented on the basis of the MPEG-4 decoder, and the experimental results demonstrate that the new approach provides acceptable performance both subjectively and objectively at various bit error rates and video sequences.

  • PDF

Permutation Predictor Tests in Linear Regression

  • Ryu, Hye Min;Woo, Min Ah;Lee, Kyungjin;Yoo, Jae Keun
    • Communications for Statistical Applications and Methods
    • /
    • v.20 no.2
    • /
    • pp.147-155
    • /
    • 2013
  • To determine whether each coefficient is equal to zero or not, usual $t$-tests are a popular choice (among others) in linear regression to practitioners because all statistical packages provide the statistics and their corresponding $p$-values. Under smaller samples (especially with non-normal errors) the tests often fail to correctly detect statistical significance. We propose a permutation approach by adopting a sufficient dimension reduction methodology to overcome this deficit. Numerical studies confirm that the proposed method has potential advantages over the t-tests. In addition, data analysis is also presented.

Building capacity for ecological assessment using diatoms in UK rivers

  • Kelly, Martyn
    • Journal of Ecology and Environment
    • /
    • v.36 no.1
    • /
    • pp.89-94
    • /
    • 2013
  • Diatoms have become an integral part of the UK's freshwater monitoring strategy over the past two decades, mostly in response to increasingly stringent European Union (EU) legislation. The use of diatoms is based on strong correlations between diatom assemblages and environmental variables, and from knowledge of the "expected" (= "reference") state of each river. The nationwide overview of the ecological health of rivers this gives allows those stretches of rivers which fail to meet EU criteria to be identified. This, in turn, allows appropriate remediation measures to be planned. Because diatom assemblages vary in space and time, even within a single water body, effective use of diatoms requires a consistent approach in order to minimise uncertainty. This includes the use of methods which comply with European Standards, a training and accreditation scheme for analysts, and a suite of quality assurance methods. Those aspects of uncertainty that cannot be readily controlled have been quantified and all estimates of ecological status are accompanied by the appropriate "confidence of class" and "risk of misclassification". This, in turn, helps planners prioritise those locations which are most likely to benefit from remediation.