403 results on '"recovery procedure"'
Search Results
2. Development and implementation of disaster recovery plan in stock exchange industry in Indonesia
- Author
-
Gaol Ford Lumban, Andry, and Matsuo Tokuro
- Subjects
disaster recovery plan ,business impact analysis ,risk analysis ,recovery procedure ,documentation ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
The purpose of this work is to develop and implement a disaster recovery plan (DRP) in stock exchange industry in Indonesia, in order to perform a system recovery in the event of a disaster. To develop a DRP, there are several steps that must be performed as a risk analysis to determine how much risk the company would receive when a disaster occurs, business impact analysis to identify critical business units and necessary resources for the recovery process to run smoothly, to identify recovery strategies to be used as a backup method and recovery site, the recovery procedure that needs to be done in order to make the recovery process run properly, testing and review, and documentation of the DRP. Based on the results of tests that have been done, the development of DRPs can be implemented at stock Exchange industry in Indonesia. With the DRP, the company is expected to have a plan to prepare for and recover resources and information systems in order to be able to walk back in the event of a disaster in order to minimize losses to the company.
- Published
- 2022
- Full Text
- View/download PDF
3. Secure Recovery Procedure for Manufacturing Systems Using Synchronizing Automata and Supervisory Control Theory.
- Author
-
Alves, Lucas V. R. and Pena, Patricia N.
- Subjects
- *
MANUFACTURING processes , *DISCRETE systems , *INDUSTRIAL safety , *SUPERVISORY control systems , *PROGRAMMABLE controllers - Abstract
Manufacturing systems may be subject to external attacks and failures, so it is important to deal with the recovery of the system after these situations. This article deals with the problem of recovering a manufacturing system, modeled as a discrete event system (DES) using the supervisory control theory (SCT), when the control structure, called supervisor, desynchronizes from the physical plant. The desynchronization may be seen as plant and supervisor being in uncorresponding states. The recovery of the system may be attained if there is a word, the synchronizing word, that regardless the state of each one of them, brings the system and supervisor back to a known state. The concepts of synchronizing automata are used to do so. In this article, we show under what conditions a set of synchronizing plants and specifications leads to a synchronizing supervisor obtained by the SCT. The problem is extended to cope with multiple supervisors, proposing a local recovery when possible. We also present a simple way to model problems, composed of machines and buffers, as synchronizing automata such that it is always possible do restore synchronization between the control (supervisor) and the plant. Note to Practitioners—Given the unpredictability of faults and malicious attacks occurring in industrial systems, recovery strategies are crucial for a harmonic operation of the plant. The possibility of leading the system to a known state, recovering control, is of extreme importance to the safety of industrial processes. The method proposed in this article uses well-known concepts of supervisory control theory (SCT) of discrete event systems (DESs), introducing the recovery process (using recovery events) in the modeling phase such that it is possible to isolate and fix only the part of the control system subject to the fault. The result of the proposed approach allows the implementation of such control system with the recovery procedure directly in the programmable logic controllers (PLCs). [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
4. Equivalent layer-wise theory for the hygro-thermo-magneto-electro-elastic analysis of laminated curved shells.
- Author
-
Tornabene, Francesco, Viscoti, Matteo, and Dimitri, Rossana
- Subjects
- *
DIFFERENTIAL equations , *THERMODYNAMIC equilibrium , *SMART structures , *TRANSMISSION of sound , *THREE-dimensional modeling , *ELASTICITY , *LAMINATED composite beams , *ANALYTICAL solutions - Abstract
• Multifield analysis of doubly-curved shell structures • Coupling between the mechanical elasticity and the thermo-hygrometric problem. • Coupling between the mechanical elasticity and the magneto-electricity problem. • Generalized formulation based on the Equivalent Layer Wise approach. • Recovery of primary and secondary variables from the 3D multifield balance equations. The paper presents a multifield formulation involving five different physical problems under the equilibrium thermodynamic conditions for laminated doubly-curved shell structures. More specifically, the study focuses on the coupling between the mechanical elasticity and the thermo-hygrometric problem, while also considering the magneto-electricity of the solid. The configuration variables are described with a generalized formulation based on the Equivalent Layer Wise (ELW) approach, taking into account higher order polynomial interpolations along the thickness direction. The fundamental relations are derived from the Master Balance principle and solved using the Navier's method. Furthermore, the three-dimensional response of the doubly-curved shell solid in terms of primary and secondary variables is recovered from the two-dimensional solution with a methodology based on the three-dimensional multifield balance equations and the Generalized Differential Quadrature (GDQ) numerical technique. Some examples are then presented in which panels of different curvatures and lamination schemes are investigated. The results are compared with success to those coming from three-dimensional numerical models developed with a commercial software. It is shown that the present analytical solution is a valid tool for modelling multifield problems for the evaluation of the response of doubly-curved shells under generalized external actions and pre-determined values of the configuration variables. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. An enhanced XFEM for the discontinuous Poisson problem
- Author
-
Paweł Stąpór
- Subjects
discontinuity ,xfem ,recovery procedure ,poisson equation ,Mechanics of engineering. Applied mechanics ,TA349-359 - Abstract
In the paper, the extended finite element method (XFEM) is combined with a recovery procedure in the analysis of the discontinuous Poisson problem. The model considers the weak as well as the strong discontinuity. Computationally efficient low-order finite elements provided good convergence are used. The combination of the XFEM with a recovery procedure allows for optimal convergence rates in the gradient i.e. as the same order as the primary solution. The discontinuity is modelled independently of the finite element mesh using a step-enrichment and level set approach. The results show improved gradient prediction locally for the interface element and globally for the entire domain.
- Published
- 2019
- Full Text
- View/download PDF
6. Experimental analysis of performance degradation of 3-cell PEMFC stack under dynamic load cycle.
- Author
-
Han, Jaesu, Han, Jaeyoung, and Yu, Sangseok
- Subjects
- *
DYNAMIC loads , *PROTON exchange membrane fuel cells , *FUEL cells , *HUMIDITY , *LOW temperatures - Abstract
A vehicular fuel cell is dynamically operated at the demand of the driver, so that the durability of the fuel cell quickly deteriorates. This study analyzes the durability of a 3-cell short stack under normal vehicle operation. An acceleration test is scheduled with operation temperatures of 55 °C and 70 °C at 50% relative humidity for 300 h. The dynamic load cycle (DLC) conditions are a repetition of the New European Driving Cycle (NEDC), which can allow a short stack to run on the vehicle operating load. At 100-hour intervals, recovery procedures are conducted to understand the order of performance retrieval. Significant stack degradation is observed at 75 °C operation for 300 h. Results show that the recovery protocol can return the performance of the fuel cell at a low and a middle current density regime, but it is hard to recover the performance at a very high current density regime. Performance recovery is very effective for lower temperature operation (55 °C), but the recovery procedures only returned about 4% of the performance at 300 h and 75 °C. • The 3-cells short stack is used to analyze the durability of a fuel cell stack. • An acceleration test was scheduled at 50% relative humidity for 300 h. • The dynamic load cycle were applied to run on the vehicle operating load. • Significant performance degradation is observed for 300 h of operation. • Results showed that the performance recovery was very effective at lower temperature. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
7. Improved operating strategies for the optimization of PEMFC system performance.
- Author
-
Soubeyran, G., Micoud, F., Morin, B., Reytier, M., and Poirot-Crouvezier, J.
- Abstract
The formation of platinum oxides at PEMFC working cathode potential is one of the main sources of reversible performance loss during operation as this mechanism passivates active surface. Therefore, promoting the electrochemical reduction of these oxides during operation is a solution to increase performance and mitigate reversible losses related to this phenomenon. Thus, a feasible solution to achieve this result in a PEMFC stack and system is to apply frequent and short operating phases with reduced air supply at the cathode. This procedure, called "air starvation" enables the decrease of cathode potential from nominal potential to approximately 0 V vs. RHE, promoting the electrochemical reduction of platinum oxides. This study focuses on the optimization of recovery parameters, first at small single cell scale and then at short-stack scale with air starvation procedure. • Platinum oxidation during nominal operation leads to reversible performance loss. • Short and periodic recovery phases enable higher cell voltage in operation. • Both direct air starvation and air dilution improves performances in a stack. • This study optimizes the application of recovery procedures for PEMFC operation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Robust Recoverable Path Using Backup Nodes
- Author
-
van den Akker, Marjan, Bodlaender, Hans L., van Dijk, Thomas C., Hoogeveen, Han, van Ommeren, Erik, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Freivalds, Rūsiņš Mārtiņš, editor, Engels, Gregor, editor, and Catania, Barbara, editor
- Published
- 2016
- Full Text
- View/download PDF
9. Cyber-Attack Response and Recovery Planning
- Author
-
Ayala, Luis and Ayala, Luis
- Published
- 2016
- Full Text
- View/download PDF
10. Threats and Attack Detection
- Author
-
Ayala, Luis and Ayala, Luis
- Published
- 2016
- Full Text
- View/download PDF
11. Cyber-Physical Attack Recovery Procedures
- Author
-
Ayala, Luis and Ayala, Luis
- Published
- 2016
- Full Text
- View/download PDF
12. Optimization of the aromatic precursor recovery procedure in column (C-63) of RA1K-skikda using Aspen HYSYS
- Author
-
Najran Malfi, O-Madjeda Mecelti, Sulaiman Mogalli, Issam Bougdah, and Chafia Sobhi
- Subjects
Chromatography ,Chemistry ,Recovery procedure ,Column (database) - Published
- 2022
- Full Text
- View/download PDF
13. On Deterministic Sketching and Streaming for Sparse Recovery and Norm Estimation
- Author
-
Nelson, Jelani, Nguyễn, Huy L., Woodruff, David P., Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Gupta, Anupam, editor, Jansen, Klaus, editor, Rolim, José, editor, and Servedio, Rocco, editor
- Published
- 2012
- Full Text
- View/download PDF
14. A Hybrid Approach for Database Replication: Finding the Optimal Configuration between Update Everywhere and Primary Copy Paradigms
- Author
-
Liroz-Gistau, M., Juárez-Rodríguez, J. R., Armendáriz-Íñigo, J. E., González de Mendívil, J. R., Muñoz-Escoí, F. D., Cordeiro, José, editor, Ranchordas, AlpeshKumar, editor, and Shishkov, Boris, editor
- Published
- 2011
- Full Text
- View/download PDF
15. Anisotropic Adaptation via a Zienkiewicz–Zhu Error Estimator for 2D Elliptic Problems
- Author
-
Micheletti, S., Perotto, S., Kreiss, Gunilla, editor, Lötstedt, Per, editor, Målqvist, Axel, editor, and Neytcheva, Maya, editor
- Published
- 2010
- Full Text
- View/download PDF
16. An enhanced XFEM for the discontinuous Poisson problem.
- Author
-
Stąpór, Paweł
- Subjects
- *
FINITE element method , *DISCONTINUITY (Philosophy) , *STOCHASTIC convergence , *STIFFNESS (Mechanics) , *VECTORS (Calculus) - Abstract
In the paper, the extended finite element method (XFEM) is combined with a recovery procedure in the analysis of the discontinuous Poisson problem. The model considers the weak as well as the strong discontinuity. Computationally efficient low-order finite elements provided good convergence are used. The combination of the XFEM with a recovery procedure allows for optimal convergence rates in the gradient i.e. as the same order as the primary solution. The discontinuity is modelled independently of the finite element mesh using a step-enrichment and level set approach. The results show improved gradient prediction locally for the interface element and globally for the entire domain. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
17. Proactive Byzantine Quorum Systems
- Author
-
Alchieri, Eduardo A. P., Bessani, Alysson Neves, Pereira, Fernando Carlos, da Silva Fraga, Joni, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Meersman, Robert, editor, Dillon, Tharam, editor, and Herrero, Pilar, editor
- Published
- 2009
- Full Text
- View/download PDF
18. FTRepMI: Fault-Tolerant, Sequentially-Consistent Object Replication for Grid Applications
- Author
-
Oprescu, Ana-Maria, Kielmann, Thilo, Fokkink, Wan, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Garg, Vijay, editor, Wattenhofer, Roger, editor, and Kothapalli, Kishore, editor
- Published
- 2009
- Full Text
- View/download PDF
19. An Extendible Hashing Based Recovery Method in a Shared-Nothing Spatial Database Cluster
- Author
-
Jang, Yong-Il, Kim, Ho-Seok, Park, Soon-Young, Lee, Jae-Dong, Bae, Hae-Young, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Gavrilova, Marina L., editor, Gervasi, Osvaldo, editor, Kumar, Vipin, editor, Tan, C. J. Kenneth, editor, Taniar, David, editor, Laganá, Antonio, editor, Mun, Youngsong, editor, and Choo, Hyunseung, editor
- Published
- 2006
- Full Text
- View/download PDF
20. Self-refined Fault Tolerance in HPC Using Dynamic Dependent Process Groups
- Author
-
Gopalan, N. P., Nagarajan, K., Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Pal, Ajit, editor, Kshemkalyani, Ajay D., editor, Kumar, Rajeev, editor, and Gupta, Arobinda, editor
- Published
- 2005
- Full Text
- View/download PDF
21. On the Security of a Certified E-Mail Scheme with Temporal Authentication
- Author
-
Shao, Min-Hua, Zhou, Jianying, Wang, Guilin, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Gervasi, Osvaldo, editor, Gavrilova, Marina L., editor, Kumar, Vipin, editor, Laganà, Antonio, editor, Lee, Heow Pueh, editor, Mun, Youngsong, editor, Taniar, David, editor, and Tan, Chih Jeng Kenneth, editor
- Published
- 2005
- Full Text
- View/download PDF
22. Failure Recovery in Grid Database Systems
- Author
-
Goel, Sushant, Sharda, Hema, Taniar, David, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Sen, Arunabha, editor, Das, Nabanita, editor, Das, Sajal K., editor, and Sinha, Bhabani P., editor
- Published
- 2005
- Full Text
- View/download PDF
23. Certified E-Mail with Temporal Authentication: An Improved Optimistic Protocol
- Author
-
Galdi, Clemente, Giordano, Raffaella, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Katsikas, Sokratis, editor, Lopez, Javier, editor, and Pernul, Günther, editor
- Published
- 2004
- Full Text
- View/download PDF
24. Learning Hadamard-Product-Propagation for Image Dehazing and Beyond
- Author
-
Zhongxuan Luo, Long Ma, Risheng Liu, Xin Fan, Shiqi Li, and Jinyuan Liu
- Subjects
Process (engineering) ,Property (programming) ,Computer science ,business.industry ,Deep learning ,02 engineering and technology ,Machine learning ,computer.software_genre ,Field (computer science) ,Image (mathematics) ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Recovery procedure ,020201 artificial intelligence & image processing ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,computer ,Image restoration ,Energy (signal processing) - Abstract
Image dehazing has evolved into an attractive research field in the computer vision community in the past few decades. Previous traditional approaches attempt to design energy-based objective functions. However, they cannot accurately express the intrinsic characteristics of the images, posing weak adaptation ability for real-world complex scenarios. More recently, deep learning techniques for image dehazing have matured and become more reliable, showing outstanding performance. Nevertheless, these methods heavily depend on training data, restricting their application ranges. More importantly, both traditional and deep learning approaches all ignore a common issue, noises/artifacts always appear in the recovery process. To this end, a new Hadamard-Product (HP) model is proposed, which consists of a series of data-driven priors. Based on this model, we derive a Learnable Hadamard-Product-Propagation (LHPP) by cascading a series of principle-inspired guidance and recovery modules. In which, the principle-inspired guidance related to transmission is endowed the smoothness property, the other recovery module satisfies the distribution of natural images. The Hadamard-product-based propagations is generated in our developed learnable framework for the task of image dehazing. In this way, we can eliminate noises/artifacts in the recovery procedure to obtain the ideal outputs. Subsequently, since the generality of our HP model, we successfully extend our LHPP to settle low-light image enhancement and underwater image enhancement problems. A series of analytical experiments are performed to verify our effectiveness. Plenty of performance evaluations on three complex tasks fully reveal our superiority against multiple state-of-the-art methods.
- Published
- 2021
- Full Text
- View/download PDF
25. Procedural Security
- Author
-
Hunter, John M. D., Sammes, A. J., editor, and Hunter, John M. D.
- Published
- 2001
- Full Text
- View/download PDF
26. Implications of recovery procedures on structural and rheological properties of schizophyllan produced from date syrup.
- Author
-
Jamshidian, Hajar, Shojaosadati, Seyed Abbas, Mohammad Mousavi, Seyed, Reza Soudi, Mohammad, and Vilaplana, Francisco
- Subjects
- *
SCHIZOPHYLLAN , *POLYSACCHARIDE synthesis , *MOLECULAR structure , *MOLECULAR weights , *RHEOLOGY - Abstract
This study investigates the effects of different recovery procedures on high molar mass schizophyllan produced by Schizophyllum commune using low value agricultural residues. Recovered extracellular polysaccharides (EPSs) were compared in terms of purity, sugar composition, degree of branching, molecular weight, and rheological properties. Performing different recovery methods, such as re-dissolving in water and re-precipitation with ethanol on produced EPS, provided schizophyllan with purity similar to the commercial grade. Besides, Freeze-thawing cycles allowed the fractionation of schizophyllan based on branching degree and solubility. The EPSs with higher purity and lower degree of branching (less conformational flexibility) showed higher viscosity. This study evidences the possibility of producing EPSs with excellent rheological properties using low value agricultural side products. Furthermore, our results demonstrate the importance of recovery methods for tailoring the purity, molecular structure and macroscopic properties of the produced polysaccharides for specific applications. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
27. Preparation of Genomic DNA from Animal Cells
- Author
-
Surzycki, Stefan and Surzycki, Stefan
- Published
- 2000
- Full Text
- View/download PDF
28. Preparation of Genomic DNA from Bacteria
- Author
-
Surzycki, Stefan and Surzycki, Stefan
- Published
- 2000
- Full Text
- View/download PDF
29. Preparation of Genomic DNA from Plant Cells
- Author
-
Surzycki, Stefan and Surzycki, Stefan
- Published
- 2000
- Full Text
- View/download PDF
30. Optimal inspection for missions with a possibility of abortion or switching to a lighter regime
- Author
-
Maxim Finkelstein, Shyamal Ghosh, and Ji Hwan Cha
- Subjects
Statistics and Probability ,Information Systems and Management ,Expected cost ,Abort ,Computer science ,Survivability ,Regime switching ,Management Science and Operations Research ,Inspection time ,Reliability engineering ,Modeling and Simulation ,Recovery procedure ,Discrete Mathematics and Combinatorics ,Degradation process ,Degradation (telecommunications) - Abstract
Many real-world critical systems, e.g., aircrafts, manned space flight systems and submarines, complex technological processes utilize mission aborts to enhance their survivability. Specifically, a mission can be aborted when a certain malfunction condition is met and a rescue or recovery procedure is then initiated. In this paper, we consider systems with observed degradation when a decision to abort a mission or to continue operation is executed at inspection. If this degradation is larger than the optimally predetermined level, then a mission is aborted, whereas if it is smaller, a system continues its operation either under the initial (full load) regime or under the lighter regime with the decreased load. The latter option also depends on the observed value of degradation at inspection. An optimal problem minimizing the expected costs with respect to the relevant levels of deterioration and inspection time is formulated and analytical relationships for the probabilities of interest and expected cost rates are derived. A new virtual age-based approach to age recalculation after the switching of regimes is proposed. A detailed illustrative example is presented.
- Published
- 2021
- Full Text
- View/download PDF
31. Recovery Procedures in Error Estimation and Adaptivity
- Author
-
Zienkiewicz, O. C., Boroomand, B., Zhu, J. Z., Gladwell, G. M. L., editor, Mang, H. A., editor, and Rammerstorfer, F. G., editor
- Published
- 1999
- Full Text
- View/download PDF
32. Transactional Services for the Internet
- Author
-
Billard, David, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Atzeni, Paolo, editor, Mendelzon, Alberto, editor, and Mecca, Giansalvatore, editor
- Published
- 1999
- Full Text
- View/download PDF
33. Human Performance Reliability in the Design-for-Usability Life Cycle for Safety Human-Computer Interfaces
- Author
-
Filgueiras, Lucia Vilela Leite, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Pasquini, Alberto, Felici, Massimo, editor, and Kanoun, Karama, editor
- Published
- 1999
- Full Text
- View/download PDF
34. Fault-Tolerant GNSS/SINS/DVL/CNS Integrated Navigation and Positioning Mechanism Based on Adaptive Information Sharing Factors
- Author
-
Zhenzhen Mai, Hailiang Xiong, Yujun Li, Bian Ruochen, and Zhengfeng Du
- Subjects
021103 operations research ,Celestial navigation ,Computer Networks and Communications ,Computer science ,Information sharing ,Real-time computing ,0211 other engineering and technologies ,Satellite system ,Fault tolerance ,02 engineering and technology ,Fault detection and isolation ,Computer Science Applications ,Control and Systems Engineering ,GNSS applications ,Recovery procedure ,Electrical and Electronic Engineering ,Inertial navigation system ,Information Systems - Abstract
Real-time positioning feature is becoming an essential part in a variety of military and civilian applications. In particular, the cooperation of multisensors helps to improve navigation accuracy and the universality of the system. In this article, we propose a novel robust fault-tolerant federated filter based on strapdown inertial navigation system (SINS), global navigation satellite system (GNSS), celestial navigation system (CNS), and doppler velocity log (DVL). In the proposed algorithm, the position information of the GNSS, the velocity information of the DVL, and the attitude information of the CNS are introduced as measurement information to correct the divergence error of SINS. The federated filter is exploited for its flexibility and capability in fault toleration. To amend fault and recover information in local filters, a simplified state Chi-square test (SSCST) is utilized as the fault detection, isolation, and recovery procedure. Meanwhile, a new adaptive information sharing factor algorithm based on the results of SSCST and the residuals between the actual observations and the predicted observations is designed, which can adaptively reflect the performance of each local filter. Experimental results show that the accuracy of the proposed integrated navigation and positioning algorithm can be improved and the system remains stable even when the error occurs.
- Published
- 2020
- Full Text
- View/download PDF
35. Can We Improve Transaction-Oriented Database Management?
- Author
-
Chorafas, Dimitris N. and Chorafas, Dimitris N.
- Published
- 1998
- Full Text
- View/download PDF
36. The Accelerated Reduction and Elimination of Toxics in Canada: The Case of Mercury-Containing Medical Instruments in Quebec Hospital Centres
- Author
-
Guerrier, P., Weber, J.-P., Coté, R., Paul, M., Rhainds, M., Porcella, Donald B., editor, Huckabee, John W., editor, and Wheatley, Brian, editor
- Published
- 1995
- Full Text
- View/download PDF
37. Generalized stress–strain recovery formulation applied to functionally graded spherical shells and panels under static loading.
- Author
-
Viola, Erasmo, Rossetti, Luigi, Fantuzzi, Nicholas, and Tornabene, Francesco
- Subjects
- *
FUNCTIONALLY gradient materials , *SPHERICAL shells (Engineering) , *STRESS-strain curves , *STRUCTURAL panels , *DEAD loads (Mechanics) , *DEFORMATIONS (Mechanics) - Abstract
The present investigation concludes the triad of papers by the first three authors concerning the 2D-unconstrained third order shear deformation theory for shell-like structures. Here, the static behavior of functionally graded spherical shells and panels subjected to uniform loadings at the extreme surfaces is studied. The material properties are graded in the thickness direction according to a four parameter power law. The structural model involves the a posteriori stress and strain recovery procedure. The obtained governing equations are solved by means of the GDQ numerical technique. An extensive numerical investigation is carried out to characterize the effect of material parameters on the stress, strain and displacement profiles along the thickness direction. The second order equilibrium operators, of the fundamental system of equations for functionally graded spherical shells and panels, are reported in the extended form. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
38. Automatic recovery of a parallel stable file system
- Author
-
Chengzheng, Sun, Hertzberger, L. O., Goos, Gerhard, editor, Hartmanis, Juris, editor, and America, Pierre, editor
- Published
- 1991
- Full Text
- View/download PDF
39. A Decentralized and Reliable Election-based Key Management Protocol for Communicating Things
- Author
-
Hicham Lakhlef, Abdelmadjid Bouabdallah, and Ramy Chemak
- Subjects
Computer science ,Component (UML) ,Reliability (computer networking) ,Key (cryptography) ,Recovery procedure ,Single point of failure ,Computer security ,computer.software_genre ,Key management ,Protocol (object-oriented programming) ,computer ,Efficient energy use - Abstract
The use of Internet of Things (IoT) is continuously growing, and its application areas henceforth reach all societal and economical fields. The number of connected IoT devices is increasing exponentially, and so is the amount of their exchanged data. To ensure the security and privacy of these data, several Group Key Management (GKM) schemes were proposed. These schemes assume the presence of a centralized Key Manager (KM), which is regarded as the central component of these schemes. However, the huge responsibilities carried out by the KM require that it meets several performance and security criteria. Moreover, the central role it plays in the GKM makes it a classic single point of failure. Solving this issue in an energy efficient way remains a difficult challenge. In this paper, we propose a highly flexible and decentralized election-based protocol for Key Management. We introduce new mechanisms to ensure the technical reliability of our scheme in terms of performance and security. We also describe how our solution tackles the issue of single point of failure, by introducing a simple failure recovery procedure. Our simulations show that our solution have a low energy consumption.
- Published
- 2021
- Full Text
- View/download PDF
40. Improvement of the Zienkiewicz–Zhu Error Recovery Technique Using a Patch Configuration
- Author
-
Majed A. Alrefae, Mohd. Ahmed, Devinder Singh, and Saeed AlQadhi
- Subjects
Zienkiewicz–Zhu techniques ,Technology ,Discretization ,patch recovery ,QH301-705.5 ,QC1-999 ,Degrees of freedom (mechanics) ,stress recovery ,Displacement (vector) ,effectivity ,displacement recovery ,General Materials Science ,Biology (General) ,Instrumentation ,least-squares techniques ,QD1-999 ,Mathematics ,ComputingMethodologies_COMPUTERGRAPHICS ,Fluid Flow and Transfer Processes ,Quadrilateral ,Process Chemistry and Technology ,Physics ,General Engineering ,Engineering (General). Civil engineering (General) ,Finite element method ,Computer Science Applications ,Chemistry ,Rate of convergence ,error estimation ,Displacement field ,Recovery procedure ,TA1-2040 ,Algorithm - Abstract
The Zienkiewicz–Zhu (ZZ) super-convergent patch recovery technique based on a node neighborhood patch configuration is used most widely for recovery of the stress field of a finite element analysis. In this study, an improved ZZ recovery technique using element neighborhood patch configuration is proposed. The improved recovery procedure is based on recovery of the stress field in the least-squares sense over an element patch that consists of the union of the elements surrounding the element under consideration. The proposed patch configuration provides more sampling points and improves the performance of the standard ZZ recovery technique. The effectiveness and reliability of the improved ZZ recovery approach is demonstrated through plane elastic and plastic plate problems. The problem domain is discretized with triangular and quadrilateral elements of different sizes. A comparison of the quality of error estimation using the ZZ recovery of derivative field and recovery of the displacement field using similar element neighborhood patch configurations is also presented. The numerical results show that the ZZ recovery technique and the displacement recovery technique, using a modified patch configuration, yield better results, convergence rate, and effectivity as compared with the standard ZZ super-convergent patch recovery technique. It is concluded that the improved ZZ recovery technique-based adaptive finite element analysis is very effective for converging a predefined accuracy with a significantly smaller number of degrees of freedom, especially in an elastic problem. It is also concluded that the improved ZZ recovery technique captures the plastic deformation problem solution errors more reliably than the standard ZZ recovery technique.
- Published
- 2021
41. Efficient algorithms for crash recovery in distributed systems
- Author
-
Juang, Tony T-Y., Venkatesan, S., Goos, G., editor, Hartmanis, J., editor, Barstow, D., editor, Brauer, W., editor, Brinch Hansen, P., editor, Gries, D., editor, Luckham, D., editor, Moler, C., editor, Pnueli, A., editor, Seegmüller, G., editor, Stoer, J., editor, Wirth, N., editor, Nori, Kesav V., editor, and Veni Madhavan, C. E., editor
- Published
- 1990
- Full Text
- View/download PDF
42. Robust equilibrated a posteriori error estimator for higher order finite element approximations to diffusion problems
- Author
-
Shun Zhang, Zhiqiang Cai, and Difeng Cai
- Subjects
Applied Mathematics ,Numerical analysis ,Estimator ,Flux ,010103 numerical & computational mathematics ,01 natural sciences ,Finite element method ,010101 applied mathematics ,Computational Mathematics ,Recovery procedure ,A priori and a posteriori ,Applied mathematics ,0101 mathematics ,Diffusion (business) ,Reliability (statistics) ,Mathematics - Abstract
We present a patch-based equilibrated flux recovery procedure for the conforming finite element approximation to diffusion problems. The recovered flux is computed as the solution to a local constraint-free minimization problem on each patch. The approach is valid for higher order conforming elements in both two and three dimensions. The resulting estimator admits guaranteed reliability and the robust local efficiency is proved under the quasi-monotonicity condition of the diffusion coefficient. Numerical experiments are given to confirm the theoretical results.
- Published
- 2019
- Full Text
- View/download PDF
43. Eco-friendly and cost-effective strategies for metals recovery from printed circuit boards
- Author
-
Marco Vocciante, Loris Pietrelli, Sergio Ferro, Pietrelli, L., Ferro, S., and Vocciante, M.
- Subjects
e-waste management ,Hybrid solution ,Waste management ,Renewable Energy, Sustainability and the Environment ,020209 energy ,Hydro-metallurgical treatment ,02 engineering and technology ,PCBs’ recycling ,Environmentally friendly ,Hybrid solutions ,Printed circuit board ,PCBs’ characterization ,Sustainability ,Economic sustainability ,0202 electrical engineering, electronic engineering, information engineering ,Recovery procedure ,Environmental science ,Leaching (metallurgy) ,Microwave digestion - Abstract
The possible optimization of metal recovery from Printed Circuit Boards (PCBs) and Central Processing Units (CPUs) has been investigated. Usual practice is to recover primarily the metals with the highest market price. In contrast, the present work shows how strategic considerations of the value share (%) of metals content and data regarding the environmental impact of their recovery can instruct about the best strategies to adopt, pointing at the metals to be recovered as a priority depending on the case. An accurate PCBs’ characterization carried out through microwave digestion with a mixture of HNO3, HF and HCl, is a first essential step of the procedure. Then, metals are recovered through chemical leaching with different chemical substances, exploiting both chemical and physical steps. A proposal is presented to improve the environmental and economic sustainability of the treatment of PCBs, which provides for the initial recovery of Cu, Pb and Sn from the whole boards, through leaching with 6M HNO3, followed by the recovery of gold and other precious metals from the board components once removed and appropriately crushed. Although unusual, the recovery procedure can be adapted accordingly, allowing greater profits, easier management and higher metals recovery rates.
- Published
- 2019
- Full Text
- View/download PDF
44. Optimal Abort Rules for Multiattempt Missions
- Author
-
Maxim Finkelstein, Gregory Levitin, and Hong-Zhong Huang
- Subjects
021110 strategic, defence & security studies ,Optimization problem ,Computer science ,Abort ,0211 other engineering and technologies ,Survivability ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Statistical model ,02 engineering and technology ,010501 environmental sciences ,01 natural sciences ,Reliability engineering ,Continuation ,Physiology (medical) ,Recovery procedure ,Sensitivity (control systems) ,Safety, Risk, Reliability and Quality ,0105 earth and related environmental sciences - Abstract
Many real-world systems use mission aborts to enhance their survivability. Specifically, a mission can be aborted when a certain malfunction condition is met and a risk of a system loss in the case of a mission continuation becomes too high. Usually, the rescue or recovery procedure is initiated upon the mission abort. Previous works have discussed a setting when only one attempt to complete a mission is allowed and this attempt can be aborted. However, missions with a possibility of multiple attempts can occur in different real-world settings when accomplishing a mission is really important and the cost-related and the time-wise restrictions for this are not very severe. The probabilistic model for the multiattempt case is suggested and the tradeoff between the overall mission success probability (MSP) and a system loss probability is discussed. The corresponding optimization problems are formulated. For the considered illustrative example, a detailed sensitivity analysis is performed that shows specifically that even when the system's survival is not so important, mission aborting can be used to maximize the multiattempt MSP.
- Published
- 2019
- Full Text
- View/download PDF
45. Phase Transitions in Recovery of Structured Signals from Corrupted Measurements
- Author
-
Zhongxing Sun, Wei Cui, and Yulong Liu
- Subjects
FOS: Computer and information sciences ,Phase transition ,Information Theory (cs.IT) ,Computer Vision and Pattern Recognition (cs.CV) ,Computer Science - Information Theory ,Gaussian ,Tangent cone ,Computer Science - Computer Vision and Pattern Recognition ,Subderivative ,Library and Information Sciences ,Information theory ,Computer Science Applications ,symbols.namesake ,Convex optimization ,symbols ,Recovery procedure ,Applied mathematics ,Gaussian process ,Information Systems ,Mathematics - Abstract
This paper is concerned with the problem of recovering a structured signal from a relatively small number of corrupted random measurements. Sharp phase transitions have been numerically observed in practice when different convex programming procedures are used to solve this problem. This paper is devoted to presenting theoretical explanations for these phenomenons by employing some basic tools from Gaussian process theory. Specifically, we identify the precise locations of the phase transitions for both constrained and penalized recovery procedures. Our theoretical results show that these phase transitions are determined by some geometric measures of structure, e.g., the spherical Gaussian width of a tangent cone and the Gaussian (squared) distance to a scaled subdifferential. By utilizing the established phase transition theory, we further investigate the relationship between these two kinds of recovery procedures, which also reveals an optimal strategy (in the sense of Lagrange theory) for choosing the tradeoff parameter in the penalized recovery procedure. Numerical experiments are provided to verify our theoretical results., 34 pages, 6 figures
- Published
- 2021
- Full Text
- View/download PDF
46. Self-Repairing Line of Metamorphic Robots
- Author
-
Nooshin Nokhanji and Nicola Santoro
- Subjects
0209 industrial biotechnology ,business.industry ,Computer science ,Distributed computing ,Fault tolerance ,02 engineering and technology ,Modular design ,Task (computing) ,020901 industrial engineering & automation ,Robustness (computer science) ,Line (geometry) ,0202 electrical engineering, electronic engineering, information engineering ,Recovery procedure ,Robot ,020201 artificial intelligence & image processing ,Motion planning ,business - Abstract
A Metamorphic Robots System is a modular self-reconfigurable robotic system composed of autonomous mobile modules in a 2D (or 3D) regular grid. The modules have limited computational capabilities, interact only with neighboring modules, and can move around adjacent modules from a cell to an empty neighboring cell under specific conditions. An important well-studied problem for these robotic systems is Motion Planning, also known as Shape Formationor Self-reconfiguration, requiring the modules to organize themselves into a pre-determined final configuration (i.e., shape); basic shapes such as the line (or chain) are especially important as they are utilized as a foundation for constructing more complicated shapes and are an initial measure for handling complicated tasks. A metamorphic robots system could offer a higher degree of reliability and robustness compared to fixed-architecture robots due to its capacity to self-repair: should some modules fail and no longer move, the shape could be reconstructed by the non-faulty modules. To do this correctly, efficiently, and without restricting the autonomy of the modules is a non-trivial task. In this paper, we study the Line Recoveryproblem, requiring the non-faulty modules to reconstruct the line without violation of connectivity requirements at any time during the recovery procedure. A thorough feasibility characterization of the problem, the necessary conditions for its solvability, and an algorithm that solves the problem, regardless of the number and distribution of faults, are provided.
- Published
- 2021
- Full Text
- View/download PDF
47. Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks
- Author
-
Vinay B. Y. Kumar, Jakub Breier, Shivam Bhasin, Anubhab Baksi, and Anupam Chattopadhyay
- Subjects
Computer science ,business.industry ,Cryptography ,Fault (power engineering) ,Computer security ,computer.software_genre ,Countermeasure ,Symmetric-key algorithm ,Cipher ,Secure communication ,Recovery procedure ,business ,computer ,Edge computing - Abstract
In the current world of the Internet-of-things and edge computing, computations are increasingly performed locally on small connected systems. As such, those devices are often vulnerable to adversarial physical access, enabling a plethora of physical attacks which is a challenge even if such devices are built for security. As cryptography is one of the cornerstones of secure communication among devices, the pertinence of fault attacks is becoming increasingly apparent in a setting where a device can be easily accessed in a physical manner. In particular, two recently proposed fault attacks, Statistical Ineffective Fault Attack (SIFA) and the Fault Template Attack (FTA) are shown to be formidable due to their capability to bypass the common duplication based countermeasures. Duplication based countermeasures, deployed to counter the Differential Fault Attack (DFA), work by duplicating the execution of the cipher followed by a comparison to sense the presence of any effective fault, followed by an appropriate recovery procedure. While a handful of countermeasures are proposed against SIFA, no such countermeasure is known to thwart FTA to date. In this work, we propose a novel countermeasure based on duplication, which can protect against both SIFA and FTA. The proposal is also lightweight with only a marginally additional cost over simple duplication based countermeasures. Our countermeasure further protects against all known variants of DFA, including Selmke, Heyszl, Sigl's attack from FDTC 2016. It does not inherently leak side-channel information and is easily adaptable for any symmetric key primitive. The validation of our countermeasure has been done through gate-level fault simulation.
- Published
- 2021
- Full Text
- View/download PDF
48. Investigation of the reversible performance degradation mechanism of the PEMFC stack during long-term durability test.
- Author
-
Chu, Tiankuo, Wang, Qinpu, Xie, Meng, Wang, Baoyun, Yang, Daijun, Li, Bing, Ming, Pingwen, and Zhang, Cunman
- Subjects
- *
FLUE gases , *GAS distribution , *DURABILITY , *SERVICE life , *IMPEDANCE spectroscopy - Abstract
This paper reports on 3-cell PEMFC stack durability test of 2500 h in dynamic conditions and different recovery procedures. After electrochemical impedance spectroscopy (EIS) analysis, it was determined that the primary cause of the stack performance degradation is the oxidation of platinum (Pt), which is reversible. The air starvation operation reduced the cathode voltage to less than 0.2 V, part of PtO was reduced, and the stack performance loss was partially recovered. However, the recovery of the three cells varies due to defects in the three-cell stack and uneven gas distribution. The fast load-up operation brought the short-term severe air starvation of the three cells to a similar level, the remaining platinum oxide (PtO) was fully reduced, the stack performance improved again, and the voltage consistency of the three cells was restored significantly. With the optimization of operating parameters and combined recovery procedures, the average degradation rate of the stack voltage is 3.08 μV/h within 2500 h. The results indicated that our combined strategy is of huge importance to mitigate the reversible performance degradation and significantly extend the service life of PEMFC stack and be a very appropriate procedure used in laboratories and systems. • We report a 2500 h durability test on a 3-cell PEMFC stack. • The reversible degradation of the stack are explored. • The oxidation of Pt is the primary cause of stack performance degradation. • Our combined strategy is significant for mitigating the reversible degradation. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
49. Performance of Predictive Indoor mmWave Networks with Dynamic Blockers
- Author
-
Nicola Marchetti, Andrea Bonfante, Lorenzo Galati Giordano, and Irene Macaluso
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Artificial neural network ,Computer Networks and Communications ,Wireless network ,Computer science ,Real-time computing ,Stability (learning theory) ,Synthetic data ,Computer Science - Networking and Internet Architecture ,Base station ,Artificial Intelligence ,Hardware and Architecture ,Recovery procedure ,Robot ,5G - Abstract
In this paper, we consider millimeter Wave (mmWave) technology to provide reliable wireless network service within factories where links may experience rapid and temporary fluctuations of the received signal power due to dynamic blockers, such as humans and robots, moving in the environment. We propose a novel beam recovery procedure that leverages Machine Learning (ML) tools to predict the starting and finishing of blockage events. This erases the delay introduced by current 5G New Radio (5G-NR) procedures when switching to an alternative serving base station and beam, and then re-establish the primary connection after the blocker has moved away. Firstly, we generate synthetic data using a detailed system-level simulator that integrates the most recent 3GPP 3D Indoor channel models and the geometric blockage Model-B. Then, we use the generated data to train offline a set of beam-specific Deep Neural Network (DNN) models that provide predictions about the beams' blockage states. Finally, we deploy the DNN models online into the system-level simulator to evaluate the benefits of the proposed solution. Our prediction-based beam recovery procedure guarantee higher signal level stability and up to $82\%$ data rate improvement with respect detection-based methods when blockers move at speed of $2$ m/s., Comment: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
- Published
- 2021
- Full Text
- View/download PDF
50. Movement acts in breakdown situations: How a robot's recovery procedure affects participants' opinions
- Author
-
Patrick Holthaus, Rebekka Soma, and Trenton Schulz
- Subjects
Technology ,adoption of technology ,Movement (music) ,Cognitive Neuroscience ,Applied psychology ,Developmental cognitive neuroscience ,Elderly care ,trust ,Cognitive neuroscience ,Behavioral neuroscience ,Human–robot interaction ,Human-Computer Interaction ,recovery ,Behavioral Neuroscience ,study design ,non-verbal cues and expressiveness ,Developmental Neuroscience ,Artificial Intelligence ,Recovery procedure ,human–robot interaction ,Robot ,movement ,Psychology - Abstract
Recovery procedures are targeted at correcting issues encountered by robots. What are people’s opinions of a robot during these recovery procedures? During an experiment that examined how a mobile robot moved, the robot would unexpectedly pause or rotate itself to recover from a navigation problem. The serendipity of the recovery procedure and people’s understanding of it became a case study to examine how future study designs could consider breakdowns better and look at suggestions for better robot behaviors in such situations. We present the original experiment with the recovery procedure. We then examine the responses from the participants in this experiment qualitatively to see how they interpreted the breakdown situation when it occurred. Responses could be grouped into themes of sentience, competence, and the robot’s forms. The themes indicate that the robot’s movement communicated different information to different participants. This leads us to introduce the concept of movement acts to help examine the explicit and implicit parts of communication in movement. Given that we developed the concept looking at an unexpected breakdown, we suggest that researchers should plan for the possibility of breakdowns in experiments and examine and report people’s experience around a robot breakdown to further explore unintended robot communication.
- Published
- 2021
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.