نتایج جستجو برای: internal fault

تعداد نتایج: 294865  

2012
K. C. Joshi

Fault tolerance is the ability of a system to perform its function correctly even in the presence of internal faults. We should accept that, relying on software techniques for obtaining dependability means accepting some overhead in terms of increased size of code and reduced performance (or slower execution). N-version programming achieves redundancy through the use of multiple versions. Failu...

1997
Priya Narasimhan Louise E. Moser P. M. Melliar-Smith

The Eternal system is a CORBA 2.0-compliant system that enhances the CORBA standard with replication and thus fault tolerance. The novel interception approach implemented in the Eternal system involves capturing IIOPspecific system calls made by the ORB, and subsequently mapping these calls onto a reliable multicast group communication system. The motivation for the use of this approach is that...

2008
D. R. Faulkner T. M. Mitchell E. H. Rutter J. Cembrano D. R. FAULKNER T. M. MITCHELL E. H. RUTTER

Elucidation of the internal structure of fault zones is paramount for understanding their mechanical, seismological and hydraulic properties. In order to observe representative brittle fault zone structures, it is preferable that the fault be passively exhumed from seismogenic depths and the exposure must be in arid or semi-arid environments where the fragile rocks are not subject to extensive ...

2016
Brage Rugstad Knudsen

Model predictive control (MPC) is an attractive control scheme for embedding fault tolerance since, by being an optimal-control scheme solved online, it enables directly updating of the system model and constraints. Yet, there are several processes and systems where fault accommodation simply by updating the internal MPC model is infeasible. Of particular such interest is process plants with ex...

2016
Christoph Dobraunig Maria Eichlseder Thomas Korak Victor Lomné Florian Mendel

Since the first demonstration of fault attacks by Boneh et al. on RSA, a multitude of fault attack techniques on various cryptosystems have been proposed. Most of these techniques, like Differential Fault Analysis, Safe Error Attack, and Collision Fault Analysis have the requirement to process two inputs that are either identical or related, in order to generate pairs of correct/faulty cipherte...

Journal: :Geological Society, London, Special Publications 2008

Journal: :International Journal of Advances in Scientific Research and Engineering 2020

2001
MLADEN KEZUNOVIC BOGDAN KASZTENNY

The more sophisticated a protection algorithm, the more information on both steady-state and transient behavior of a protected element required for proper designing, setting and testing of a given relay. In the case of a power transformer, the most important phenomena to be modeled from the standpoint of protective relaying are: magnetizing inrush including initial, recovery and sympathetic inr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید