878 resultados para Fault-proneness
Resumo:
The analysis of electromagnetic transients arising in EHV/UHV power networks gives necessary information about the possible stresses on the different network components, which will determine their proper design, limits of operation as well as their pertinent protection strategies. This paper describes the transient analysis of 765 kV EHV transmission system which is a typical expansion in Indian power grid system. Considering various conditions, switching transient and fault transient studies are carried out. A FORTRAN version of EMTP is developed, to study a practical example, then a comparison with the results available in the literature is made.
Resumo:
This paper presents studies on the use of carbon nanotubes dispersed in an insulating fluid to serve as an automaton for healing open-circuit interconnect faults in integrated circuits. The physics behind the repair mechanism is the electric-field-induced diffusion limited aggregation. On the occurrence of an open fault, the repair is automatically triggered due to the presence of an electric field across the gap. We perform studies on the repair time as a function of the electric field and dispersion concentrations with the above application in mind.
Resumo:
Exascale systems of the future are predicted to have mean time between failures (MTBF) of less than one hour. Malleable applications, where the number of processors on which the applications execute can be changed during executions, can make use of their malleability to better tolerate high failure rates. We present AdFT, an adaptive fault tolerance framework for long running malleable applications to maximize application performance in the presence of failures. AdFT framework includes cost models for evaluating the benefits of various fault tolerance actions including checkpointing, live-migration and rescheduling, and runtime decisions for dynamically selecting the fault tolerance actions at different points of application execution to maximize performance. Simulations with real and synthetic failure traces show that our approach outperforms existing fault tolerance mechanisms for malleable applications yielding up to 23% improvement in application performance, and is effective even for petascale systems and beyond.
Resumo:
This paper deals with line protection challenges experienced in system having substantial wind generation penetration. Two types of WTGU: Doubly Fed (DFIG) and Squirrel Cage (SCIG) Induction Generators are simulated and connected to grid with single circuit transmission line. The paper summarizes analytical investigations carried out on the impedance seen by distance relays by varying fault resistances and grid short circuit MVA, for the protection of such transmission lines during faults. The results are also compared with systems having conventional synchronous machine connected to the grid.
Resumo:
This paper presents a multi-class support vector machine (SVMs) approach for locating and diagnosing faults in electric power distribution feeders with the penetration of Distributed Generations (DGs). The proposed approach is based on the three phase voltage and current measurements which are available at all the sources i.e. substation and at the connection points of DG. To illustrate the proposed methodology, a practical distribution feeder emanating from 132/11kV-grid substation in India with loads and suitable number of DGs at different locations is considered. To show the effectiveness of the proposed methodology, practical situations in distribution systems (DS) such as all types of faults with a wide range of varying fault locations, source short circuit (SSC) levels and fault impedances are considered for studies. The proposed fault location scheme is capable of accurately identify the fault type, location of faulted feeder section and the fault impedance. The results demonstrate the feasibility of applying the proposed method in practical in smart grid distribution automation (DA) for fault diagnosis.
Resumo:
First principles calculations were done to evaluate the lattice parameter, cohesive energy and stacking fault energies of ordered gamma' (Ll(2)) precipitates in superalloys as a function of composition. It was found that addition of Ti and Ta lead to an increase in lattice parameter and decrease in cohesive energy, while Ni antisites had the opposite effect. Ta and Ti addition to stoichiometric Ni3Al resulted in an initial increase in the energies of APB((111)), CSF(111), APB((001)) and SISF(111). However, at higher concentrations, the fault energies decreased. Addition of Ni antisites decreased the energy of all four faults monotonically. A model based on nearest neighbor bonding was used for Ni-3(Al, Ta), Ni-3(Al, Ti) and Ni-3(Al, Ni) pseudo-binary systems and extended to pseudo- ternary Ni-3(Al, Ta, Ni) and Ni-3(Al, Ti, Ni) systems. Recipes were developed for predicting lattice parameters, cohesive energies and fault energies in pseudo- ternary systems on the basis of coefficients derived from simpler pseudobinary systems. The model predictions were found to be in good agreement with first principles calculations for lattice parameters, cohesive energies, and energies of APB((111)) and CSF(111).
Resumo:
Mobile nodes observing correlated data communicate using an insecure bidirectional switch to generate a secret key, which must remain concealed from the switch. We are interested in fault-tolerant secret key rates, i.e., the rates of secret key generated even if a subset of nodes drop out before the completion of the communication protocol. We formulate a new notion of fault-tolerant secret key capacity, and present an upper bound on it. This upper bound is shown to be tight when the random variables corresponding to the observations of nodes are exchangeable. Further, it is shown that one round of interaction achieves the fault-tolerant secret key capacity in this case. The upper bound is also tight for the case of a pairwise independent network model consisting of a complete graph, and can be attained by a noninteractive protocol.
Resumo:
A new hybrid multilevel power converter topology is presented in this paper. The proposed power converter topology uses only one DC source and floating capacitors charged to asymmetrical voltage levels, are used for generating different voltage levels. The SVPWM based control strategy used in this converter maintains the capacitor voltages at the required levels in the entire modulation range including the over-modulation region. For the voltage levels: nine and above, the number of components required in the proposed topology is significantly lower, compared to the conventional multilevel inverter topologies. The number of capacitors required in this topology reduces drastically compared to the conventional flying capacitor topology, when the number of levels in the inverter output increases. This topology has better fault tolerance, as it is capable of operating with reduced number of levels, in the entire modulation range, in the event of any failure in the H-bridges. The transient as well as the steady state performance of the nine-level version of the proposed topology is experimentally verified in the entire modulation range including the over-modulation region.
Resumo:
The evolution of deformation texture in a Ni-60Co alloy with low stacking fault energy and a grain size in the nanometre range has been investigated. The analyses of texture and microstructure suggest different mechanisms of deformation in nanocrystalline as compared to microcrystalline Ni-60Co alloy. In nanocrystalline material, the mechanism responsible for texture formation has been identified as partial slip, whereas in microcrystalline material, a characteristic texture forms due to twinning and shear banding.
Resumo:
Several papers have studied fault attacks on computing a pairing value e(P, Q), where P is a public point and Q is a secret point. In this paper, we observe that these attacks are in fact effective only on a small number of pairing-based protocols, and that too only when the protocols are implemented with specific symmetric pairings. We demonstrate the effectiveness of the fault attacks on a public-key encryption scheme, an identity-based encryption scheme, and an oblivious transfer protocol when implemented with a symmetric pairing derived from a supersingular elliptic curve with embedding degree 2.
Resumo:
Three materials, pure aluminium, Al-4 wt.% Mg, alpha-brass have been chosen to understand the evolution of texture and microstructure during rolling. Pure Al develops a strong copper-type rolling texture and the deformation is entirely slip dominated. In Al-4Mg alloy, texture is copper-type throughout the deformation. The advent of Cu-type shear bands in the later stages of deformation has a negligible effect on the final texture. alpha-brass shows a characteristic brass-type texture from the early stages of rolling. Extensive twinning in the intermediate stages of deformation (epsilon(t) similar to 0.5) causes significant texture reorientation towards alpha-fiber. Beyond 40% reduction, deformation is dominated by Bs-type shear bands, and the banding coincides with the evolution of <111>parallel to ND components. The crystallites within the bands preferentially show <110>parallel to ND components. The absence of the Cu component throughout the deformation process indicates that, for the evolution of brass-type texture, the presence of Cu component is not a necessary condition. The final rolling texture is a synergistic effect of deformation twinning and shear banding.
Resumo:
Exascale systems of the future are predicted to have mean time between failures (MTBF) of less than one hour. At such low MTBFs, employing periodic checkpointing alone will result in low efficiency because of the high number of application failures resulting in large amount of lost work due to rollbacks. In such scenarios, it is highly necessary to have proactive fault tolerance mechanisms that can help avoid significant number of failures. In this work, we have developed a mechanism for proactive fault tolerance using partial replication of a set of application processes. Our fault tolerance framework adaptively changes the set of replicated processes periodically based on failure predictions to avoid failures. We have developed an MPI prototype implementation, PAREP-MPI that allows changing the replica set. We have shown that our strategy involving adaptive process replication significantly outperforms existing mechanisms providing up to 20 percent improvement in application efficiency even for exascale systems.
Resumo:
The time division multiple access (TDMA) based channel access mechanisms perform better than the contention based channel access mechanisms, in terms of channel utilization, reliability and power consumption, specially for high data rate applications in wireless sensor networks (WSNs). Most of the existing distributed TDMA scheduling techniques can be classified as either static or dynamic. The primary purpose of static TDMA scheduling algorithms is to improve the channel utilization by generating a schedule of smaller length. But, they usually take longer time to schedule, and hence, are not suitable for WSNs, in which the network topology changes dynamically. On the other hand, dynamic TDMA scheduling algorithms generate a schedule quickly, but they are not efficient in terms of generated schedule length. In this paper, we propose a novel scheme for TDMA scheduling in WSNs, which can generate a compact schedule similar to static scheduling algorithms, while its runtime performance can be matched with those of dynamic scheduling algorithms. Furthermore, the proposed distributed TDMA scheduling algorithm has the capability to trade-off schedule length with the time required to generate the schedule. This would allow the developers of WSNs, to tune the performance, as per the requirement of prevalent WSN applications, and the requirement to perform re-scheduling. Finally, the proposed TDMA scheduling is fault-tolerant to packet loss due to erroneous wireless channel. The algorithm has been simulated using the Castalia simulator to compare its performance with those of others in terms of generated schedule length and the time required to generate the TDMA schedule. Simulation results show that the proposed algorithm generates a compact schedule in a very less time.