Academic literature on the topic 'Fault-tolerant computing. electronic data processing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Fault-tolerant computing. electronic data processing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Fault-tolerant computing. electronic data processing"

1

Wu, Hao, Qinggeng Jin, Chenghua Zhang, and He Guo. "A Selective Mirrored Task Based Fault Tolerance Mechanism for Big Data Application Using Cloud." Wireless Communications and Mobile Computing 2019 (February 26, 2019): 1–12. http://dx.doi.org/10.1155/2019/4807502.

Full text
Abstract:
With the wide deployment of cloud computing in big data processing and the growing scale of big data application, managing reliability of resources becomes a critical issue. Unfortunately, due to the highly intricate directed-acyclic-graph (DAG) based application and the flexible usage of processors (virtual machines) in cloud platform, the existing fault tolerant approaches are inefficient to strike a balance between the parallelism and the topology of the DAG-based application while using the processors, which causes a longer makespan for an application and consumes more processor time (computation cost). To address these issues, this paper presents a novel fault tolerant framework named Fault Tolerance Algorithm using Selective Mirrored Tasks Method (FAUSIT) for the fault tolerance of running a big data application on cloud. First, we provide comprehensive theoretical analyses on how to improve the performance of fault tolerance for running a single task on a processor. Second, considering the balance between the parallelism and the topology of an application, we present a selective mirrored task method. Finally, by employing the selective mirrored task method, the FAUSIT is designed to improve the fault tolerance for DAG based application and incorporates two important objects: minimizing the makespan and the computation cost. Our solution approach is evaluated through rigorous performance evaluation study using real-word workflows, and the results show that the proposed FAUSIT approach outperforms existing algorithms in terms of makespan and computation cost.
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Qiannan, and Haibing Mu. "Privacy-Preserving and Lightweight Selective Aggregation with Fault-Tolerance for Edge Computing-Enhanced IoT." Sensors 21, no. 16 (August 9, 2021): 5369. http://dx.doi.org/10.3390/s21165369.

Full text
Abstract:
Edge computing has been introduced to the Internet of Things (IoT) to meet the requirements of IoT applications. At the same time, data aggregation is widely used in data processing to reduce the communication overhead and energy consumption in IoT. Most existing schemes aggregate the overall data without filtering. In addition, aggregation schemes also face huge challenges, such as the privacy of the individual IoT device’s data or the fault-tolerant and lightweight requirements of the schemes. In this paper, we present a privacy-preserving and lightweight selective aggregation scheme with fault tolerance (PLSA-FT) for edge computing-enhanced IoT. In PLSA-FT, selective aggregation can be achieved by constructing Boolean responses and numerical responses according to specific query conditions of the cloud center. Furthermore, we modified the basic Paillier homomorphic encryption to guarantee data privacy and support fault tolerance of IoT devices’ malfunctions. An online/offline signature mechanism is utilized to reduce computation costs. The system characteristic analyses prove that the PLSA-FT scheme achieves confidentiality, privacy preservation, source authentication, integrity verification, fault tolerance, and dynamic membership management. Moreover, performance evaluation results show that PLSA-FT is lightweight with low computation costs and communication overheads.
APA, Harvard, Vancouver, ISO, and other styles
3

Prakash, Amit, Dilip K. Yadav, and Arvind Choubey. "A Survey of Multistage Interconnection Networks." Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering) 13, no. 2 (April 27, 2020): 165–83. http://dx.doi.org/10.2174/1872212113666190215145815.

Full text
Abstract:
Background: Multistage interconnection networks are being used in computer and communications. Multiprocessor architectures for parallel computing exercise these interconnection networks for connecting various processing elements and transfer data between sub-systems of a digital system. The vast diversity of the field poses an obstacle to realize different kinds of interconnection networks and their relationship. Methods: This paper consists of an extensive survey of multistage interconnection networks. Results: A broad classification of multistage interconnection networks based on network functionality, reliability and fault tolerance is presented in order to emphasize the important principles which differentiate the network architectures. For each class of network, significant results are given and the basic design principles are explained. Conclusion: The various multistage interconnection networks design provide high performance, availability, throughput, lower latency, less power consumption along with improved fault-tolerance and reliability. However, there is a rising demand for new fault-tolerant and reliable multistage interconnection networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Yinghui, Jiangfan Zhao, Dong Zheng, Kaixin Deng, Fangyuan Ren, Xiaokun Zheng, and Jiangang Shu. "Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing." Sensors 18, no. 8 (August 13, 2018): 2659. http://dx.doi.org/10.3390/s18082659.

Full text
Abstract:
As an extension of cloud computing, fog computing has received more attention in recent years. It can solve problems such as high latency, lack of support for mobility and location awareness in cloud computing. In the Internet of Things (IoT), a series of IoT devices can be connected to the fog nodes that assist a cloud service center to store and process a part of data in advance. Not only can it reduce the pressure of processing data, but also improve the real-time and service quality. However, data processing at fog nodes suffers from many challenging issues, such as false data injection attacks, data modification attacks, and IoT devices’ privacy violation. In this paper, based on the Paillier homomorphic encryption scheme, we use blinding factors to design a privacy-preserving data aggregation scheme in fog computing. No matter whether the fog node and the cloud control center are honest or not, the proposed scheme ensures that the injection data is from legal IoT devices and is not modified and leaked. The proposed scheme also has fault tolerance, which means that the collection of data from other devices will not be affected even if certain fog devices fail to work. In addition, security analysis and performance evaluation indicate the proposed scheme is secure and efficient.
APA, Harvard, Vancouver, ISO, and other styles
5

Shi, Peng, and Li Li. "Design of Network Analysis System Based on Stream Computing." Journal of Computational and Theoretical Nanoscience 14, no. 1 (January 1, 2017): 64–68. http://dx.doi.org/10.1166/jctn.2017.6125.

Full text
Abstract:
The functions of the network analysis system include detection and analysis of network data stream. According to the results of the network analysis, we monitor the network accident and avoid the security risks. This can improve the network performance and increase the network availability. As the data flow in the network is constantly produced, the biggest characteristic of network analysis system is that it is a real-time system. Because of the high requirements of the network data analysis and network fault processing, the system requires very high processing efficiency of the real time data of network. Stream computing is a technique specifically for processing real-time data streams. Its idea is that the value of the data is reduced with the lapse of time, so as long as the data appearing, it must be processed as soon as possible. So we use the technology of stream computing to design network analysis system to meet the needs of real-time capability. Moreover, the stream computing framework has been widely welcomed in the field because of its good expansibility, ease of use and flexibility. In this paper, firstly, we introduce the characteristics of the data processing based on stream computing and the traditional data processing separately. We point out their difference and introduce the technique of stream computing. Then, we introduce the architecture of network analysis system designed base on the technique of stream computing. The architecture includes two main components that are logic processing layer and communication layer. We describe the characteristics of each component and functional characteristics in detail, and we introduce the system load balancing algorithm. Finally, by experiments, we verify the effectiveness of the system’s characteristics of dynamic expansion and load balancing.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Yunru, Debiao He, and Kim-Kwang Raymond Choo. "BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT." Wireless Communications and Mobile Computing 2018 (November 4, 2018): 1–9. http://dx.doi.org/10.1155/2018/2783658.

Full text
Abstract:
Internet of Things (IoT) and cloud computing are increasingly integrated, in the sense that data collected from IoT devices (generally with limited computational and storage resources) are being sent to the cloud for processing, etc., in order to inform decision making and facilitate other operational and business activities. However, the cloud may not be a fully trusted entity, like leaking user data or compromising user privacy. Thus, we propose a privacy-preserving and user-controlled data sharing architecture with fine-grained access control, based on the blockchain model and attribute-based cryptosystem. Also, the consensus algorithm in our system is the Byzantine fault tolerance mechanism, rather than Proof of Work.
APA, Harvard, Vancouver, ISO, and other styles
7

Subathra, G., and A. Antonidoss. "Reputation Based Fault Tolerance in Blockchain Networks." Journal of Computational and Theoretical Nanoscience 17, no. 5 (May 1, 2020): 2402–4. http://dx.doi.org/10.1166/jctn.2020.8903.

Full text
Abstract:
The Blockchain technology brings a rapid growth in the industry, It emphasizes the service to lead the complexity of software and malicious attack in the network. This technology is used to monitor the highly vulnerable services and it is used to increase the complexity of the warehouse data. It assures the security and consistency of data, The warehouse data has been replicated the availability and the enhancement of security in the services. This technology originated from internet sector as a decentralized, distributed ledger for data transaction. Nowadays, it is visualised as a backbone or frame work for decentralized data processing in open source network. Blockchain uses variety of consensus protocol which is reliable for nodes and communication resources that is used for data consistency. Byzantine fault tolerance algorithm has been proposed for computational cost and security also for consensus efficiency. This paper deals by proposing practical byzantine fault tolerance on edge computing networks paves away for reducing storage overhead also security purpose on edge devices. The proposed model is simulated in the constrain environment and the results are discussed. It shows that the proposed method has increase the availability and security of the stored data.
APA, Harvard, Vancouver, ISO, and other styles
8

Alexandre dit Sandretto, Julien, Olivier Mullier, and Alexandre Chapoutot. "Preface." Acta Cybernetica 25, no. 1 (May 31, 2021): 3. http://dx.doi.org/10.14232/actacyb.293250.

Full text
Abstract:
The Summer Workshop on Interval Methods (SWIM) is an annual meeting initiated in 2008 by the French MEA working group on Set Computation and Interval Techniques of the French research group on Automatic Control. A special focus of the MEA group is on promoting interval analysis techniques and applications to a broader community of researchers, facilitated by such multidisciplinary workshops. Since 2008, SWIM has become a keystone event for researchers dealing with various aspects of interval and set-based methods. In 2019, the 12th edition in this workshop series was held at ENSTA Paris, France, with a total of 25 talks. Traditionally, workshops in the series of SWIM provide a platform for both theoretical and applied researchers who work on the development, implementation, and application of interval methods, verified numerics, and other related (set-membership) techniques.For this edition, given talks were in the fields of the verified solution of initial value problems for ordinary differential equations, differential-algebraic system models, and partial differential equations, scientific computing with guaranteed error bounds, the design of robust and fault-tolerant control systems, the implementation of corresponding software libraries, and the usage of the mentioned approaches for a large variety of system models in areas such as control engineering, data analysis, signal and image processing. Seven papers were selected for submission to this Acta Cybernetica special issue. After a two turn peer-review process, six high-quality articles were selected for publication in this special issue. Three papers propose a contribution regarding differential equations, two papers focus on robust control, and one paper considers fault detection.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhu, Yong, Chao Huang, Zhihui Hu, Abdullah Al-Dhelaan, and Mohammed Al-Dhelaan. "Blockchain-Enabled Access Management System for Edge Computing." Electronics 10, no. 9 (April 22, 2021): 1000. http://dx.doi.org/10.3390/electronics10091000.

Full text
Abstract:
In the post-cloud era, edge computing is a new computing paradigm with data processed at the edge of the network, which can process the data close to the end-user in real time and offload the cloud task intelligently. Meanwhile, the decentralization, tamper-proof and anonymity of blockchain technology can provide a new trusted computing environment for edge computing. However, it does raise considerable concerns of security, privacy, fault-tolerance and so on. For example, identity authentication and access control rely on third parties, heterogeneous devices and different vendors in IoT, leading to security and privacy risks, etc. How to combine the advantages of the two has become the highlight of academic research, especially the issue of secure resource management. Comprehensive security and privacy involve all aspects of platform, data, application and access control. In. this paper, the architecture and behavior of an Access Management System (AMS) in a proof of concept (PoC) prototype are proposed with a Color Petri Net (CPN) model. The two domains of blockchain and edge computing are organically connected by interfaces and interactions. The simulation of operation, activity and role association proves the feasibility and effectiveness of the AMS. The instances of platform business access control, data access control, database services, IOT hub service are run on Advantech WISE-PaaS through User Account and Authentication (UAA). Finally, fine-grained and distributed access control can be realized with the help of a blockchain attribute. Namely, smart contracts are used to register, broadcast, and revoke access authorization, as well as to create specific transactions to define access control policies.
APA, Harvard, Vancouver, ISO, and other styles
10

Park, Hyoeun, Jeong Eun Choi, Dohyun Kim, and Sang Jeen Hong. "Artificial Immune System for Fault Detection and Classification of Semiconductor Equipment." Electronics 10, no. 8 (April 15, 2021): 944. http://dx.doi.org/10.3390/electronics10080944.

Full text
Abstract:
Semiconductor manufacturing comprises hundreds of consecutive unit processes. A single misprocess could jeopardize the whole manufacturing process. In current manufacturing environments, data monitoring of equipment condition, wafer metrology, and inspection, etc., are used to probe any anomaly during the manufacturing process that could affect the final chip performance and quality. The purpose of investigation is fault detection and classification (FDC). Various methods, such as statistical or data mining methods with machine learning algorithms, have been employed for FDC. In this paper, we propose an artificial immune system (AIS), which is a biologically inspired computing algorithm, for FDC regarding semiconductor equipment. Process shifts caused by parts and modules aging over time are main processes of failure cause. We employ state variable identification (SVID) data, which contain current equipment operating condition, and optical emission spectroscopy (OES) data, which represent plasma process information obtained from faulty process scenario with intentional modification of the gas flow rate in a semiconductor fabrication process. We achieved a modeling prediction accuracy of modeling of 94.69% with selected SVID and OES and an accuracy of 93.68% with OES data alone. To conclude, the possibility of using an AIS in the field of semiconductor process decision making is proposed.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Fault-tolerant computing. electronic data processing"

1

Subramaniyan, Rajagopal. "Gossip-based failure detection and consensus for terascale computing." [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0000799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Damani, Om Prakash. "Optimistic protocols for fault-tolerance in distributed systems /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yi, Byungho. "Faults and fault-tolerance in distributed computing systems : the election problem." Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/8312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Luke. "Localizing the effects of failure in distributed systems." Diss., Georgia Institute of Technology, 1990. http://hdl.handle.net/1853/8207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wilkes, Charles Thomas. "Programming methodologies for resilience and availability." Diss., Georgia Institute of Technology, 1987. http://hdl.handle.net/1853/8308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tarafdar, Ashis. "Software fault tolerance in distributed systems using controlled re-execution /." Digital version accessible at:, 2000. http://wwwlib.umi.com/cr/utexas/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bazzi, Rida Adnan. "Automatically increasing fault tolerance in distributed systems." Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/8133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Soria-Rodriguez, Pedro. "Multicast-Based Interactive-Group Object-Replication For Fault Tolerance." Digital WPI, 1999. https://digitalcommons.wpi.edu/etd-theses/1069.

Full text
Abstract:
"Distributed systems are clusters of computers working together on one task. The sharing of information across different architectures, and the timely and efficient use of the network resources for communication among computers are some of the problems involved in the implementation of a distributed system. In the case of a low latency system, the network utilization and the responsiveness of the communication mechanism are even more critical. This thesis introduces a new approach for the distribution of messages to computers in the system, in which, the Common Object Request Broker Architecture (CORBA) is used in conjunction with IP multicast to implement a fault-tolerant, low latency distributed system. Fault tolerance is achieved by replication of the current state of the system across several hosts. An update of the current state is initiated by a client application that contacts one of the state object replicas. The new information needs to be distributed to all the members of the distributed system (the object replicas). This state update is accomplished by using a two-phase commit protocol, which is implemented using a binary tree structure along with IP multicast to reduce the amount of network utilization, distribute the computation load associated with state propagation, and to achieve faster communication among the members of the distributed system. The use of IP multicast enhances the speed of message distribution, while the two-phase commit protocol encapsulates IP multicast to produce a reliable multicast service that is suitable for fault tolerant, distributed low latency applications. The binary tree structure, finally, is essential for the load sharing of the state commit response collection processing. "
APA, Harvard, Vancouver, ISO, and other styles
9

岑蘭 and Lan Sham. "Performance study of a new disk shadowing scheme." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B31214599.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sham, Lan. "Performance study of a new disk shadowing scheme /." Hong Kong : University of Hong Kong, 1997. http://sunzi.lib.hku.hk/hkuto/record.jsp?B18735502.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Fault-tolerant computing. electronic data processing"

1

Knight, J. C. Software fault tolerance using data diversity: An annual progress report, April 1, 1990 - March 31, 1991. Charlottesville, Va: Dept. of Computer Sciencew [sic], School of Engineering and Applied Science, University of Virginia, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shin, Kang G. Modeling and measurement of fault-tolerant multiprocessors. [Washington, D.C.?]: National Aeronautics and Space Administration, Scientific and Technical Information Branch, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jalote, P. Fault tolerance in distributed systems. Englewood Cliffs, N.J: PTR Prentice Hall, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1955-, Shvartsman Alex Allister, ed. Fault-tolerant parallel computation. Boston: Kluwer Academic, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

IEEE Workshop on Fault-Tolerant Parallel and Distributed Systems (1992 Amherst, Mass.). Fault-tolerant parallel and distributed systems: Digest of papers July 6-7, 1992 Amherst, Massachsetts. Los Alamitos, Calif: IEEE Computer Society Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

G, Khoroshevskiĭ V., ed. Samodiagnostika modulʹnykh vychislitelʹnykh sistem. Novosibirsk: VO "Nauka", 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

IEEE Workshop on Fault-Tolerant Parallel and Distributed Systems (1992 Amherst, Mass.). Dige st of papers: The 1992 IEEE Workshop on Fault-Tolerant Parallel and Distributed Systems, July 6-7, 1992, Amherst, Massachusetts. Los Alamitos, Calif: IEEE Computer Society Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wright, Hawkes Lois, ed. Microprocessor-based parallel architecture: For reliable digital signal processing systems. Boca Raton, Fla: CRC Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hülsemann, Jürgen. Funktioneller Test der Auflösung von Zugriffskonflikten in Mehrrechnersystemen. Berlin: Springer, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Symposium on Reliable Distributed Systems (16th 1997 Durham, N.C.). Proceedings, the Sixteenth Symposium on Reliable Distributed Systems, Regal University Hotel, Durham, North Carolina, October 22-24, 1997; sponsors, IEEE Computer Society Technical Committees on Distributed Processing, Fault -Tolerant Computing, and Operating Systems in collaboration with Center for Advanced Computing and Communications. Los Alamitos, Calif: IEEE Computer Society, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Fault-tolerant computing. electronic data processing"

1

Jaiswal, Chetan, and Vijay Kumar. "Highly Available Fault-Tolerant Cloud Database Services." In Advances in Systems Analysis, Software Engineering, and High Performance Computing, 119–42. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0153-4.ch005.

Full text
Abstract:
Legacy database systems manage transactions under a concurrency control and a recovery protocol. The underlying operating system creates transaction execution platform and the database executes transactions concurrently. When the database system fails then the recovery manager applies “Undo” and/or “Redo” operations (depending upon the recovery protocol) to achieve the consistent state of the database. The recovery manager performs these set of operations as required by transaction execution platform. The availability of “Virtual” machines on cloud has given us an architecture that makes it possible to eliminate the effect of system or transaction failure by always taking the database to the next consistent state. We present a novel scheme of eliminating the effect of such failure by applying transaction “roll-forward” which resumes its execution from the point of failure. We refer to our system as AAP (Always Ahead Processing). Our work enables cloud providers to offer transactional HA-DBMS as an option that too with multiple data sources not necessarily relational.
APA, Harvard, Vancouver, ISO, and other styles
2

Sahoo, Sampa, Bibhudatta Sahoo, Ashok Kumar Turuk, and Sambit Kumar Mishra. "Real Time Task Execution in Cloud Using MapReduce Framework." In Advances in Systems Analysis, Software Engineering, and High Performance Computing, 190–209. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1721-4.ch008.

Full text
Abstract:
Cloud Computing era comes with the advancement of technologies in the fields of processing, storage, bandwidth network access, security of internet etc. The development of automatic applications, smart devices and applications, sensor based applications need huge data storage and computing resources and need output within a particular time limit. Now users are becoming more sensitive towards, delay in applications they are using. So, a scalable platform like Cloud Computing is required that can provide huge computing resource, and data storage required for processing such applications. MapReduce framework is used to process huge amounts of data. Data processing on a cloud based on MapReduce would provide added benefits such as fault tolerant, heterogeneous, ease of use, free and open, efficient. This chapter discusses about cloud system model, real-time MapReduce framework, Cloud based MapReduce framework examples, quality attributes of MapReduce scheduling and various MapReduce scheduling algorithm based on quality attributes.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Fault-tolerant computing. electronic data processing"

1

Theodor Vierhaus, Heinrich. "Migrating Electronic Systems from Fault Tolerant Computing to Error Resilience." In 2018 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA). IEEE, 2018. http://dx.doi.org/10.23919/spa.2018.8563408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xu, Xirong, Huifeng Zhang, and Pir Dino Soomro. "Fault-Tolerant Edge-Pancyclicity of Möbius Cube MQ_n." In 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom). IEEE, 2018. http://dx.doi.org/10.1109/bdcloud.2018.00046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fan, Weibei, Yang Wang, Jing Sun, Zhijie Han, Peng Li, and Ruchuan Wang. "Fault-Tolerant Cycle Embedding into 3-Ary n-Cubes with Structure Faults." In 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom). IEEE, 2019. http://dx.doi.org/10.1109/ispa-bdcloud-sustaincom-socialcom48970.2019.00071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sivaraman, E., and R. Manickachezian. "High Performance and Fault Tolerant Distributed File System for Big Data Storage and Processing Using Hadoop." In 2014 International Conference on Intelligent Computing Applications (ICICA). IEEE, 2014. http://dx.doi.org/10.1109/icica.2014.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Iturbe, Xabier, Didier Keymeulen, Patrick Yiu, Dan Berisford, Kevin Hand, Robert Carlson, and Emre Ozer. "A Highly-Efficient, Adaptive and Fault-Tolerant SoC Implementation of a Fourier Transform Spectrometer Data Processing." In 2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM). IEEE, 2015. http://dx.doi.org/10.1109/fccm.2015.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jun, QIN, SONG Yanyan, and ZONG Ping. "Research on Task Scheduling Strategy based on the Trustworthiness of MapReduce." In International Conference on AI, Machine Learning and Applications (AIMLA 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111304.

Full text
Abstract:
With the rapid development and popularization of information technology, cloud computing technology provides a good environment for solving massive data processing. Hadoop is an open-source implementation of MapReduce and has the ability to process large amounts of data. Aiming at the shortcomings of the fault-tolerant technology in the MapReduce programming model, this paper proposes a reliability task scheduling strategy that introduces a failure recovery mechanism, evaluates the trustworthiness of resource nodes in the cloud environment, establishes a trustworthiness model, and avoids task allocation to low reliability node, causing the task to be re-executed, wasting time and resources. Finally, the simulation platform CloudSim verifies the validity and stability of the task scheduling algorithm and scheduling model proposed in this paper.
APA, Harvard, Vancouver, ISO, and other styles
7

Ferrara, Davide, Giovanni Jacazio, Andrea Mornacchi, and Massimo Sorli. "Robust Mechatronic Actuation System for UAV Primary Flight Controls." In ASME 2012 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/imece2012-85339.

Full text
Abstract:
The paper describes the initial results of a research activity aimed at developing a high integrity mechatronic system for UAVs primary flight controls able to ensure the necessary flight safety and to enhance the system availability by implementing appropriate prognostic functions. In this system a flight control surface is driven by two parallel rollerscrews, on their turn driven by brushless motors equipped with gearhead and clutch; the motors electric drives are controlled by dual redundant electronic units performing closed loop position control as a function of the commands received from the flight control computer. Provisions are taken in the motor drives to provide damping in the event of simultaneous failure of both actuators. The electronic units perform control, diagnosis and prognosis of the actuation system and mutually exchange data via a cross channel data link. System prognosis is made by dedicated algorithms processing the control and feedback signals obtained in flight and during preflight checks. As a whole, a smart mechatronic system is obtained providing high integrity control of an aerodynamic surface with dual mechanical link, dual power source and quadruplex control, similarly to a fly-by-wire hydraulic flight control. The paper first addresses the critical design issues associated with the electromechanical actuation of flight control surfaces, briefly reviews alternative solutions proposed for jam-tolerant electromechanical actuators, then outlines configuration, characteristics and performance of the mechatronic actuation system, and presents a summary of its behaviour under normal, degraded, fault developing and failure conditions.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography