Schemes for Fault Identi cation inCommunication

نویسنده

  • Irene Katzela
چکیده

| A single fault in a large communication network may result in a large number of fault indications (alarms) which makes the isolation of the primary source of failure a diicult task. The problem becomes worse in cases of multiple faults. In this paper we present an approach for modelling the problem of fault diagnosis. We propose a graph based network model which takes into account the dependencies between the diierent objects in the telecom-munication environment and a novel approach to estimate the domain of an alarm. Based on that model we design an algorithm for fault diagnosis and analyze its performance with respect to the accuracy of the fault hypotheses it provides. We also propose and analyze a fault diagnosis algorithm which is suitable for systems for which an independent failure assumption is valid. Finally, we examine the importance of the information of dependency between objects for the fault diagnosis process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fault Identi cation in Computer Networks: A Review and a New Approach

As computer networks increase in size, heterogeneity, complexity and pervasiveness, e ective management of such networks simultaneously becomes more important and more di cult. This paper explores in detail one aspect of network management, fault identi cation. Fault identi cation is the process whereby the existence and nature of network faults are ascertained. Characteristics of the fault ide...

متن کامل

SECURING INTERPRETABILITY OF FUZZY MODELS FOR MODELING NONLINEAR MIMO SYSTEMS USING A HYBRID OF EVOLUTIONARY ALGORITHMS

In this study, a Multi-Objective Genetic Algorithm (MOGA) is utilized to extract interpretable and compact fuzzy rule bases for modeling nonlinear Multi-input Multi-output (MIMO) systems. In the process of non- linear system identi cation, structure selection, parameter estimation, model performance and model validation are important objectives. Furthermore, se- curing low-level and high-level ...

متن کامل

Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification

In this paper, we propose new uses of visual secret sharing schemes. That is, we use visual secret sharing schemes to limit the space from which one can see the decoded image. (We call this scheme limiting the visible space visual secret sharing schemes (LVSVSS).) We investigate the visibility of the decoded image when the viewpoint is changed, and categorize the space where the viewpoint belon...

متن کامل

Symbolic Functional Vector Generation for VHDL Speci cations

Veri cation of the functional correctness of VHDL speci cations is one of the primary and most time consuming task of design. However, it must necessarily be an incomplete task since it is impossible to completely exercise the speci cation by exhaustively applying all input patterns. The paper aims at presenting a two-step strategy based on symbolic analysis of the VHDL speci cation, using a be...

متن کامل

EscApe: Diagonal Fault Analysis of APE

This work presents an adaptation of the classical diagonal fault attack on APE which is a member of the PRIMATEs family of authenticated encryption (AE) schemes. APE is the rst nonce misuseresistant permutation based AE scheme and is one of the submissions to the CAESAR competition. In this work we showcase how nonce reuse can be misused in the context of di erential fault analysis of on-line a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995