• Title/Summary/Keyword: Operational fault

Search Result 216, Processing Time 0.033 seconds

Fault-Tolerant Design of Array Systems Using Multichip Modules (다중칩을 이용한 어레이시스템의 결함허용 설계)

  • Kim, Sung-Soo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3662-3674
    • /
    • 1999
  • This paper addresses some design issues for establishing the optimal number of spare units in array systems manufactured using fault-tolerant multichip modules(MCM's) for massively parallel computing(MPC). We propose a new quantitative approach to an optimal cost-effective MCM system design under yield and reliability constraints. In the proposed approach, we analyze the effect of residual redundancy on operational reliability of fault-tolerant MCM's. In particular, the issues of imperfect support circuitry, chip assembly yield and array topology are investigated. Extensive parametric results for the analysis are provided to show that our scheme can be applied to design ways using MCM's for MPC applications more efficiently, subject to yield and reliability constraints.

  • PDF

Operational Concept Design and Verification for Airborne SAR System (항공탑재 SAR 시스템 운용개념 설계 및 검증)

  • Lee, Hyon-Ik;Kim, Se-Young;Jeon, Byeong-Tae;Sung, Jin-Bong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.41 no.7
    • /
    • pp.588-595
    • /
    • 2013
  • Airborne SAR system is the imaging Radar system that is loaded on a manned or unmanned aircraft, which is in charge of high quality image acquisition and moving target detection. This paper describes the operational requirements for the Airborne SAR system and suggests the operational concept to satisfy the requirements. To be specific, it describes the interface with airborne system, state definition and transition, operation mode based on mission definition file, fault management, and data storing and transmission concept. Finally, it gives the ground test results to verify the SAR system operational concept.

Testing of CMOS Operational Amplifier Using Offset Voltage (오프셋 전압을 이용한 CMOS 연산증폭기의 테스팅)

  • Song, Geun-Ho;Kim, Gang-Cheol;Han, Seok-Bung
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.1
    • /
    • pp.44-54
    • /
    • 2001
  • In this paper, a novel test method is proposed to detect the hard and soft fault in analog circuits. The proposed test method makes use of the offset voltage, which is one of the op-amps characteristics. During the test mode, CUT is modified to unit gain op-amps with feedback loop. When the input of the op-amp is grounded, a good circuit has a small offset voltage, but a faulty circuit has a large offset voltage. Faults in the op-amp which cause the offset voltage exceeding predefined range of tolerance can be detected. In the proposed method, no test vector is required to be applied. Therefore the test vector generation problem is eliminated and the test time and cost is reduced. In this note, the validity of the proposed test method has been verified through the example of the dual slope A/D converter. The HSPICE simulations results affirm that the presented method assures a high fault coverage.

  • PDF

An Improved Round Reduction Attack on Triple DES Using Fault Injection in Loop Statement (반복문 오류 주입을 이용한 개선된 Triple DES 라운드 축소 공격)

  • Choi, Doo-Sik;Oh, Doo-Hwan;Park, Jeong-Soo;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.709-717
    • /
    • 2012
  • The round reduction on block cipher is a fault injection attack in which an attacker inserts temporary errors in cryptographic devices and extracts a secret key by reducing the number of operational round. In this paper, we proposed an improved round reduction method to retrieve master keys by injecting a fault during operation of loop statement in the Triple DES. Using laser fault injection experiment, we also verified that the proposed attack could be applied to a pure microprocessor ATmega 128 chip in which the Triple DES algorithm was implemented. Compared with previous attack method which is required 9 faulty-correct cipher text pairs and some exhaustive searches, the proposed one could extract three 56-bit secret keys with just 5 faulty cipher texts.

The application of open system architecture in power SCADA system (전력감시제어설비(SCADA)의 open system architecture 적용)

  • 이용해;문국연;박장범
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.992-995
    • /
    • 1996
  • The major roles of Power SCADA System are continuous monitoring of electrical equipments state, real-time data processing and dispatching. Especially, SCADA system demands fast response time in heavy load condition, high reliability, fault tolerance, expansion capacity for the future. According to developing computer system technology, SCADA system is changing system configuration from centralized processing system to distributed processing system. This paper describes operational benefits, problems and improvement (which is studying in theory) in the application of Open System Architecture SCADA which has been installed since 1994, Seoul regional control center in KEPCO.

  • PDF

A Study on the Operational Characteristic of Distance Relay According to Power System Condition (계통조건에 의한 거리계전기의 응동특성에 관한 연구)

  • Jung, Chang-Ho;Kim, Jin-O
    • Proceedings of the KIEE Conference
    • /
    • 2001.05a
    • /
    • pp.290-293
    • /
    • 2001
  • This paper presents the reach accuracy of a distance relay for protection of transmission line according to power system conditions. The apparent impedance of distance relay is considerably affected by source impedance, load current, power factor, fault point and resistance etc. For protective coordination on the variables power system parameters, trip characteristics of distance relay at sending and receiving terminal are discussed.

  • PDF

Graphical Presentation on Operation Principle of Protective Relay According to Winding Type and Vector Group in Transformer (전력용 변압기에서 권선방식과 벡터그룹에 따른 보호계전기 동작원리의 그래픽 표현)

  • Lee, Jong-Beom
    • Proceedings of the KIEE Conference
    • /
    • 1999.07c
    • /
    • pp.1410-1412
    • /
    • 1999
  • Protective relay for transformer operates in general by comparing with the differential current and the restraint current. These kinds of currents are changed on magnitude and phasor during the fault according to winding type and vector group. This paper presents the differential and restraint currents and operational principle of differential protective relay for two-winding and three-winding transformer with graphical model. It is developed using MATLAB for an educational purpose on engineer related in power system and protection in university and power utility including large factory.

  • PDF

Petri Net Modeling of Database System Reliability (데이터베이스 시스템 신뢰도를 위한 페트리 네트 모델링)

  • Ro Cheul-Woo;Kim Kyung-Min;Kim Ti-Na
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.315-319
    • /
    • 2005
  • In this paper, we present a Petri Net (PN) model for reliability analysis of fault-tolerant database system models that consists of components one shared memory, bus, processors and database (disk). Each component can be failed and repaired individually. The system is operational as long as database and one of component is operational. We develop Stochastic Reward Net (SRN) Model for reliability analysis of database system. SRN is potential to define various reward functions. and can be easily used to obtain performance measures. The modeling techniques using variable cardinality, enabling function, timed transition priority in SRN are shown.

  • PDF

Availability Analysis of Multiplex Systems using Software Rejuvenation Method (소프트웨어 재활 기법을 적용한 다중계 시스템의 가용도 분석)

  • Park, Kie-Jin;Kim, Sung-Soo;Kim, Jai-Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.8
    • /
    • pp.730-740
    • /
    • 2000
  • The software rejuvenation method for highly available multiplex systems uses a pro-active fault-tolerant approach to handle system failures. The software rejuvenation prevents failures from occurring, while the previous methods recover from failures after happening. Especially, since the software aging proceeds fast in the software used for the multimedia mobile computing due to the loss of communications or data, the preventive method from failures using software rejuvenation can be used for the multimedia mobile computing. In this paper, according to the operational parameters such as rejuvenation period, rejuvenation time, failure rate and repair rate of the servers, number of running servers, duration of running time, and type of running modes, we calculate steady-state probabilities, downtime, availability, and cost of the multiplex systems using software rejuvenation method. We validate the closed-form solutions of the mathematical model by experiments based on various operational parameters and find that the software rejuvenation method can be adopted as preventive fault-tolerant technique. The failure rate and unstable rate of the servers are essential factors for the decision making of the rejuvenation policies.

  • PDF

Improved Fault Detection Based on One-Class Classification and Feature Selection (단일 클래스 분류와 특징 선택에 기반한 향상된 이상 감지)

  • Cho, Hyun-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.8
    • /
    • pp.216-223
    • /
    • 2019
  • Fault detection during production processes is one of the required operational tasks to run production processes both safely and consistently. Unexpected operational events or undetected process faults can have a serious impact on the production systems and subsequently on the final products' quality. In addition, such situations may lead to malfunctions or breakdowns of production processes. To reliably detect such abnormalities, a new one-class classification-based detection scheme has recently been developed The proposed method consists of four steps:1) noise filtering, 2) feature selection, 3) nonlinear representation and 4) outlier detection. The performance of the proposed scheme was demonstrated using the multivariate data obtained from a simulation process. The results have shown that the proposed method produced reliable monitoring results and outperforms any existing methods with an average improvement of 25.4%. The use of proper feature selection in the proposed framework yielded better detection performance.