Showing 201 - 220 results of 235 for search '"fault tolerance"', query time: 0.08s Refine Results
  1. 201

    Fault Detection, Isolation, and Accommodation for LTI Systems Based on GIMC Structure by D. U. Campos-Delgado, E. Palacios, D. R. Espinoza-Trejo

    Published 2008-01-01
    “…In this contribution, an active fault-tolerant scheme that achieves fault detection, isolation, and accommodation is developed for LTI systems. …”
    Get full text
    Article
  2. 202

    SIGNAL FILTERING FOR SUDDEN SENSOR FAILURES BASED ON RECURRENT LEAST SQUARES METHOD by V. M. Artemiev, A. O. Naumov, L. L. Kokhan

    Published 2017-10-01
    “…Synthesis technique for fault-tolerant filters with redundant sensors based on recurrent least squares method (deterministic approach) is proposed. …”
    Get full text
    Article
  3. 203

    Redundancy Design and Workspace Analysis of 3-PRS Parallel Mechanism by Junjie Huang, Pengfei Wang, Bowen Zhang, Junwei Zhao

    Published 2022-05-01
    “…The redundancy feature of the parallel mechanism can increase the effective workspace,realize the fault-tolerant motion,which improves the performance of the parallel mechanism. …”
    Get full text
    Article
  4. 204

    Color code decoder with improved scaling for correcting circuit-level noise by Seok-Hyung Lee, Andrew Li, Stephen D. Bartlett

    Published 2025-01-01
    “…Two-dimensional color codes are a promising candidate for fault-tolerant quantum computing, as they have high encoding rates, transversal implementation of logical Clifford gates, and resource-efficient magic state preparation schemes. …”
    Get full text
    Article
  5. 205

    Approach of information security assessment for ATM system based on improved BP model of artificial neural network by WU Zhi-jun, WANG Lu, SHI Rong

    Published 2011-01-01
    “…ATM system was divided into 3 layers for the purpose of evaluating its information security.An evaluation model was proposed by using a 3-layer artificial neural network(ANN) based on improved BP model.The major information security indicators of ATM system were used as the training samples,which were adapted to find the intrinsic links between the input and output by learning and training process.An experiment was conducted by using the well-trained ANN network to evaluate the security of ATM system.The experimental results show that the proposed ANN evaluation model can indicate the practical running status of ATM system precisely.It is highly adaptive and fault-tolerant.…”
    Get full text
    Article
  6. 206

    Establishing scheme and algorithm for dynamic key-path of pair wise key for sensor networks by HU Yu-zhou1, WANG Lei2, CHEN Zhi-ping2, GU Xue-dao3

    Published 2008-01-01
    “…Establishing scheme and algorithm for dynamic key-path in pair wise key for wireless sensor networks were presented based on the encoding peculiarity and high fault-tolerant ability of named H(k,u,m,v,n) (hierarchical hypercube) of cluster distributed sensor networks. …”
    Get full text
    Article
  7. 207

    Mining Conditional Functional Dependency Rules on Big Data by Mingda Li, Hongzhi Wang, Jianzhong Li

    Published 2020-03-01
    “…To handle the volume issue of big data, we develop the sampling algorithms to obtain a small representative training set. We design the fault-tolerant rule discovery and conflict-resolution algorithms to address the low-quality issue of big data. …”
    Get full text
    Article
  8. 208

    Integrity Design for Networked Control Systems with Actuator Failures and Data Packet Dropouts by Xiaomei Qi, Jason Gu

    Published 2013-01-01
    “…The integrity design problem of fault tolerant control for networked control system (NCS) with actuator failures and data packet dropouts is investigated. …”
    Get full text
    Article
  9. 209

    Design of knowledge transaction protection mechanism in the open innovation community based on blockchain technology by Dongshan Yang, Ling Zhao, Feng Leng, Zujun Shi

    Published 2025-03-01
    “…In this study, the participants in an OIC and three types of infringement problems were analyzed. The Byzantine Fault Tolerant (BFT) algorithm was applied to design the logic of smart contracts and the coupling between idea platforms and the blockchain. …”
    Get full text
    Article
  10. 210

    Five-Phase Modular External Rotor PM Machines with Different Rotor Poles: A Comparative Simulation Study by A. S. Abdel-Khalik

    Published 2012-01-01
    “…The performance of fault-tolerant modular permanent magnet machines depends on the proper selection of the pole and slot numbers which result in negligible coupling between phases. …”
    Get full text
    Article
  11. 211

    Hadoop-Based Distributed Sensor Node Management System by In-Yong Jung, Ki-Hyun Kim, Byong-John Han, Chang-Sung Jeong

    Published 2014-03-01
    “…Also, it achieves a transparent and fault-tolerant architecture by exploiting various crucial features of Hadoop. …”
    Get full text
    Article
  12. 212

    Modeling and analysis of a simple manufacturing-oriented multi-agent system by P. Levi, M. Schanz, V. Avrutin

    Published 2000-01-01
    “…Due to the autonomy of individual agents and the use of the concept of distributed planning, multi-agent systems (MAS) represent a promising approach to achieve fault-tolerant self-organizing manufacturing systems. …”
    Get full text
    Article
  13. 213

    Research on computing offloading method for maritime observation monitoring sensor network by Xin SU, Haoyang XUE, Yiqing ZHOU, Jinxiu ZHU

    Published 2021-05-01
    “…Considering the differences in computing capacity and communication resources of the maritime network nodes, a maritime network connectivity probability based method was proposed for selecting edge computing service nodes.Because of the different node densities in the near-shore and far-shore scenarios, two offloading models were established accordingly.In the near-shore scenario, a multi-node cooperative offloading method was proposed by using the genetic algorithm based on maritime multi-node cooperative offloading.In the far-shore scenario, a fault-tolerant offloading method was proposed based on the particle swarm algorithm with grouping cross learning.Simulation results show that compared with conventional methods, the proposed methods save over 30% network delay and reduces about 20% network costs, which can greatly enhance the maritime user experiences.…”
    Get full text
    Article
  14. 214

    A Reconfigurable and Biologically Inspired Paradigm for Computation Using Network-On-Chip and Spiking Neural Networks by Jim Harkin, Fearghal Morgan, Liam McDaid, Steve Hall, Brian McGinley, Seamus Cawley

    Published 2009-01-01
    “…The paper also discusses the adaptability of the EMBRACE architecture in supporting fault tolerant computing.…”
    Get full text
    Article
  15. 215

    Refining resource estimation for the quantum computation of vibrational molecular spectra through Trotter error analysis by Dimitar Trenev, Pauline J Ollitrault, Stuart M. Harwood, Tanvi P. Gujarati, Sumathy Raman, Antonio Mezzacapo, Sarah Mostame

    Published 2025-02-01
    “…Our approach is based on quantum phase estimation and focuses on fault-tolerant quantum devices. In addition to asymptotic estimates for generic chemical compounds, we present a more detailed analysis of the quantum resources needed for the simulation of the Hamiltonian arising in the vibrational structure calculation of acetylene-like polyynes of interest. …”
    Get full text
    Article
  16. 216

    Identification of Industrial Furnace Temperature for Sintering Process in Nuclear Fuel Fabrication Using NARX Neural Networks by Dede Sutarya, Benyamin Kusumoputro

    Published 2014-01-01
    “…Nonlinear system identification is becoming an important tool which can be used to improve control performance and achieve robust fault-tolerant behavior. Among the different nonlinear identification techniques, methods based on neural network model are gradually becoming established not only in the academia, but also in industrial application. …”
    Get full text
    Article
  17. 217

    Elliptic curve ElGamal encryption based location privacy-preserving scheme by Huibin LAI, Li XU, Yali ZENG, Rui ZHU

    Published 2020-06-01
    “…An elliptic curve ElGamal encryption based location privacy-preserving scheme was proposed to address the location privacy problem of secondary users in collaborative spectrum sensing.Firstly,secondary users encrypted the original sensing reports using the ElGamal public key techniques on the elliptic curve and sent them to the trusted property authority.Secondly,the trusted property authority partially decrypted and randomized sensing reports and then sent the randomized sensing reports to the fusion center.Thirdly,the fusion center finally decrypted and got the original sensing reports.Finally,security of the scheme was analyzed.According to the scheme,the encryption method of sensing reports was based on public key cryptography on elliptic curve.And the trusted property authority randomized encrypted sensing reports.Thus the location privacy of secondary users can be protected.Meanwhile,this scheme effectively reduces communication and storage cost,compared with other schemes.In addition,this scheme also has fault tolerant and dynamic mechanism,which increases the practicability and feasibility.…”
    Get full text
    Article
  18. 218

    Dissipative Protection of a GKP Qubit in a High-Impedance Superconducting Circuit Driven by a Microwave Frequency Comb by L.-A. Sellem, A. Sarlette, Z. Leghtas, M. Mirrahimi, P. Rouchon, P. Campagne-Ibarcq

    Published 2025-01-01
    “…Qubit initialization, readout, and control via Clifford gates can be performed while maintaining the code stabilization, paving the way toward the assembly of GKP qubits in a fault-tolerant quantum computing architecture.…”
    Get full text
    Article
  19. 219

    Utility-Oriented Placement of Actuator Nodes with a Collaborative Serving Scheme for Facilitated Business and Working Environments by Chi-Un Lei, Woon Kian Chong, Ka Lok Man

    Published 2014-01-01
    “…Service fading, 3D placements, multiscenario placements, and fault-tolerant placements have been modeled in the framework. …”
    Get full text
    Article
  20. 220

    Generalized Cycle Benchmarking Algorithm for Characterizing Midcircuit Measurements by Zhihan Zhang, Senrui Chen, Yunchao Liu, Liang Jiang

    Published 2025-01-01
    “…Midcircuit measurements (MCMs) are crucial ingredients in the development of fault-tolerant quantum computation. While there have been rapid experimental progresses in realizing MCMs, a systematic method for characterizing noisy MCMs is still under exploration. …”
    Get full text
    Article