• Title/Summary/Keyword: Failure Threshold

Search Result 165, Processing Time 0.031 seconds

Threshold Crossing Rate, Phase Distribution and Group Properties of Nonlinear Random Waves of finite Bandwidth (유한한 Bandwidth를 갖는 비선형 불규칙 파열에서의 Threshold Crossing Rate, 위상분포와 파군특성)

  • Jo, Yong-Jun
    • Journal of Korea Water Resources Association
    • /
    • v.30 no.3
    • /
    • pp.225-233
    • /
    • 1997
  • The nonlinear effects on the statistical properties of wave groups in terms of the average nomber of waves in a group and the mean number of waves in a high run is studied in this paper utilizing the complex envelope and total phase function, random variable transformation technique and perturbation method. It tures out that the phase distribution is modified significantly by nonlinearities and it show systematic excess of values near the mean phase and the corresponding symmetrical deficiency on both sides away from the mean. for the case of threshold crossing rate, it turns out that threshold crossing rate reaches its maxima just below the mean water level rather than zero and considerable amount of probability mass is shifted toward the larger values of water surface elevation as nonlinearity is getting profound. Furthermore, the mean waves in a high run associated with nonlinear wave are shown to have larger values than the linear counterpart. Similar trend can also be found in the average number of waves in a group.

  • PDF

Vulnerability Analysis of Network Communication Device by Intentional Electromagnetic Interference Radiation (IEMI 복사에 의한 네트워크 통신 장비의 취약성 분석)

  • Seo, Chang-Su;Huh, Chang-Su;Lee, Sung-Woo;Jin, In-Young
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.31 no.1
    • /
    • pp.44-49
    • /
    • 2018
  • This study analyzed the Vulnerability of Network Communication devices when IEMI is coupled with the Network System. An Ultra Wide Band Generator (180 kV, 700 MHz) was used as the IEMI source. The EUTs are the Switch Hub and Workstation, which are used to configure the network system. The network system was monitored through the LAN system configuration, to confirm a malfunction of the network device. The results of the experiment indicate that a malfunction of the network occurs as the electric field increases. The data loss rate increases proportionally with increasing radiating time. In the case of the Switch Hub, the threshold electric field value was 10 kV/m for all conditions used in this experiment. The threshold point causing malfunction was influenced only by the electric field value. The correlation between the threshold point and pulse repetition rate was not found. However, in case of the Workstation, it was found that as the pulse repetition rate increases, the equipment responds weakly and the threshold value decreases. To verify the electrical coupling of the EUT by IEMI, current sensors were used to measure the PCB line inside the EUT and network line coupling current. As a result of the measurement, it can be inferred that when the coupling current due to IEMI exceeds the threshold value, it flows through the internal equipment line, causing a malfunction and subsequent failure. The results of this study can be applied to basic data for equipment protection, and effect analysis of intentional electromagnetic interference.

Sensor Fault Detection, Localization, and System Reconfiguration with a Sliding Mode Observer and Adaptive Threshold of PMSM

  • Abderrezak, Aibeche;Madjid, Kidouche
    • Journal of Power Electronics
    • /
    • v.16 no.3
    • /
    • pp.1012-1024
    • /
    • 2016
  • This study deals with an on-line software fault detection, localization, and system reconfiguration method for electrical system drives composed of three-phase AC/DC/AC converters and three-phase permanent magnet synchronous machine (PMSM) drives. Current sensor failure (outage), speed/position sensor loss (disconnection), and damaged DC-link voltage sensor are considered faults. The occurrence of these faults in PMSM drive systems degrades system performance and affects the safety, maintenance, and service continuity of the electrical system drives. The proposed method is based on the monitoring signals of "abc" currents, DC-link voltage, and rotor speed/position using a measurement chain. The listed signals are analyzed and evaluated with the generated residuals and threshold values obtained from a Sliding Mode Current-Speed-DC-link Voltage Observer (SMCSVO) to acquire an on-line fault decision. The novelty of the method is the faults diagnosis algorithm that combines the use of SMCSVO and adaptive thresholds; thus, the number of false alarms is reduced, and the reliability and robustness of the fault detection system are guaranteed. Furthermore, the proposed algorithm's performance is experimentally analyzed and tested in real time using a dSPACE DS 1104 digital signal processor board.

NDynamic Framework for Secure VM Migration over Cloud Computing

  • Rathod, Suresh B.;Reddy, V. Krishna
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.476-490
    • /
    • 2017
  • In the centralized cloud controlled environment, the decision-making and monitoring play crucial role where in the host controller (HC) manages the resources across hosts in data center (DC). HC does virtual machine (VM) and physical hosts management. The VM management includes VM creation, monitoring, and migration. If HC down, the services hosted by various hosts in DC can't be accessed outside the DC. Decentralized VM management avoids centralized failure by considering one of the hosts from DC as HC that helps in maintaining DC in running state. Each host in DC has many VM's with the threshold limit beyond which it can't provide service. To maintain threshold, the host's in DC does VM migration across various hosts. The data in migration is in the form of plaintext, the intruder can analyze packet movement and can control hosts traffic. The incorporation of security mechanism on hosts in DC helps protecting data in migration. This paper discusses an approach for dynamic HC selection, VM selection and secure VM migration over cloud environment.

A Periodic Replacement Model with Random Repair Costs and Threshold Levels (확률적 수리비용과 임계수준을 고려한 주기적 교체 모형에 관한 연구)

  • Gang Yeong-Gil;Gang Seong-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.18 no.2
    • /
    • pp.114-125
    • /
    • 1992
  • A policy of periodic replacement with minimal repair at failure is considered for a complex system. Under such a policy the system is replaced at periodic times. iT(i=1,2, $\ldots$), while minimal repair is performed at any intervening system failures. The cost of the j-th minimal repair to the component which fails at age t is g(C(t). $c_j$ (t)), where C(t) is the age-dependent random part, $c_j$(t) is the deterministic part which depends on the age and the number of the minimal repair to the component, and g is a positive nondecreasing continuous function. The cost of replacement is expensive when the number of failures occurring in (0. T) is greater than a threshold level. The problem of determining the optimal replacement period, $T^{\ast}$, which minimizes the total expected cost per unit time over an infinite time horizon is considered. Various special cases are considered.

  • PDF

Securing Mobile Ad Hoc Networks Using Enhanced Identity-Based Cryptography

  • Mehr, Kamal Adli;Niya, Javad Musevi
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.512-522
    • /
    • 2015
  • Recent developments in identity-based cryptography (IBC) have provided new solutions to problems related to the security of mobile ad hoc networks (MANETs). Although many proposals to solve problems related to the security of MANETs are suggested by the research community, there is no one solution that fits all. The interdependency cycle between secure routing and security services makes the use of IBC in MANETs very challenging. In this paper, two novel methods are proposed to eliminate the need for this cycle. One of these methods utilizes a key pool to secure routes for the distribution of cryptographic materials, while the other adopts a pairing-based key agreement method. Furthermore, our proposed methods utilize threshold cryptography for shared secret and private key generation to eliminate the "single point of failure" and distribute cryptographic services among network nodes. These characteristics guarantee high levels of availability and scalability for the proposed methods. To illustrate the effectiveness and capabilities of the proposed methods, they are simulated and compared against the performance of existing methods.

Static fatigue failure of the rotating optical disc (회전 중 원심력에 의한 광디스크의 피로 파손)

  • Hwang, Hyo-Kune;Kim, Nam-Woong;Dan, Byung-Ju;Kim, Jong-Man;Kim, Wae-Yeul;Lee, Jin-Woo
    • Proceedings of the KSME Conference
    • /
    • 2004.04a
    • /
    • pp.150-155
    • /
    • 2004
  • The base material of optical disc is the amorphous polymer, polycarbonate. So crack growth on the rotating optical disc could happen by the static centrifugal force. This phenomenon is called static fatigue. Today's CD-R disc drive is being operated over 10,000 RPM. This is increasing the possibility of the disc fracture when operating. In this reason, new method to measure the static fatigue threshold quality and the way to calculate the threshold J-integral value and the safe crack length of the optical disc are studied. Finally the environmental effect to optical disc is also studied in this paper.

  • PDF

Optimal Maintenance Cycle Plan of Aerial Weapon System Radar Considering Maintenance Cost (운영유지 비용을 고려한 항공무기체계 레이다의 최적정비주기 설정 방안)

  • Tak, Jung Ho;Jung, Won
    • Journal of Applied Reliability
    • /
    • v.18 no.2
    • /
    • pp.184-191
    • /
    • 2018
  • Purpose: The purpose of this study is to propose a method to calculate the optimal preventive maintenance cycle of radar used in the aviation weapon system of ROKAF. Methods: A hybrid model is used to estimate the optimal preventive maintenance cycle in a system that can perform condition based predictive maintenance (CBPM) through continuous diagnosis. The failure data of the radars operating in the military were used to calculate the reliability. Results: According to the research results, the reliability threshold of the radar began to decrease after 5 flights, and decreased rapidly after 12 flights. Since the second check, costs have continued to decline. Conclusion: A method is proposed to determine the cycle of optimal preventive maintenance of radar within operational budget through modeling results between reliability limit and cost for radar. The results can be used to determine the optimal preventive maintenance cycle and frequency of various avionics equipment.

ANALYSIS OF M/M/c RETRIAL QUEUE WITH THRESHOLDS, PH DISTRIBUTION OF RETRIAL TIMES AND UNRELIABLE SERVERS

  • CHAKRAVARTHY, SRINIVAS R.;OZKAR, SERIFE;SHRUTI, SHRUTI
    • Journal of applied mathematics & informatics
    • /
    • v.39 no.1_2
    • /
    • pp.173-196
    • /
    • 2021
  • This paper treats a retrial queue with phase type retrial times and a threshold type-policy, where each server is subject to breakdowns and repairs. Upon a server failure, the customer whose service gets interrupted will be handed over to another available server, if any; otherwise, the customer may opt to join the retrial orbit or depart from the system according to a Bernoulli trial. We analyze such a multi-server retrial queue using the recently introduced threshold-based retrial times for orbiting customers. Applying the matrix-analytic method, we carry out the steady-state analysis and report a few illustrative numerical examples.

Probabilistic Failure-time Analysis of Soil Slope under Rainfall Infiltration by Numerical Analysis (수치해석에 의한 강우 침투 시 사면 파괴시간의 확률론적 해석)

  • Cho, Sung-Eun
    • Journal of the Korean Geotechnical Society
    • /
    • v.35 no.12
    • /
    • pp.45-58
    • /
    • 2019
  • In this study, a stochastic analysis procedure based on numerical analysis was proposed to evaluate a kind of intensity-duration rainfall threshold for the initiation of slope failure due to rainfall infiltration. Fragility curves were generated as a function of rainfall intensity-duration from the results of probabilistic slope stability analysis by MCS considering the uncertainty of the soil shear strength, reflecting the results of infiltration analysis of rainfall over time. In the probabilistic analysis, slope stability analyses combined with the infiltration analysis of rainfall were performed to calculate the limit state function. Using the derived fragility curves, a chart showing the relationship between rainfall intensity and slope failure-time was developed. It is based on a probabilistic analysis considering the uncertainty of the soil properties. The proposed probabilistic failure distribution analysis could be beneficial for analyzing the time-dependent failure process of soil slopes due to rainfall infiltration, and for predicting when the slope failure should occur.