-
141
Risk Intelligence: Making Profit from Uncertainty in Data Processing System
Published 2014-01-01“…In extreme scale data processing systems, fault tolerance is an essential and indispensable part. …”
Get full text
Article -
142
A review on control systems hardware and software for robots of various scale and purpose. Part 2. Service robotics
Published 2020-01-01“…The analysis of approaches to control systems scaling, the use of intelligent control, the achievement of fault tolerance, and the reduction of the weight and size of control system elements belonging to various classes of robotic systems were carried out. …”
Get full text
Article -
143
Research on Dual Security Control for a Non-Linear CPS with Multi-Objective Constraints under DoS Attack and Actuator Fault: An Active-Passive Attack-Tolerant Approach
Published 2022-01-01“…Second, a non-linear CPS dual security control framework that integrates active-passive attack tolerance for DoS attack and active fault tolerance for actuator fault is constructed. Third, the low-energy DoS attack is regarded as a special kind of time delay, and a robust observer for the estimation of system states and actuator fault is designed, and a codesign method of passive attack tolerance, active fault tolerance, and communication is proposed. …”
Get full text
Article -
144
RWA-BFT: Reputation-Weighted Asynchronous BFT for Large-Scale IoT
Published 2025-01-01“…This paper introduces RWA-BFT, a reputation-weighted asynchronous Byzantine Fault Tolerance (BFT) consensus algorithm designed to address the scalability and performance challenges of blockchain systems in large-scale IoT scenarios. …”
Get full text
Article -
145
Hierarchical proxy consensus optimization for IoV based on blockchain and trust value
Published 2022-06-01“…With the rapid development of Internet of vehicles, 5G and artificial intelligence technologies, intelligent transportation has become the development trend of transportation technology.As a vehicle-vehicle and vehicle-road information interaction platform, the Internet of vehicles is the basic support platform for intelligent traffic information sharing and processing.At the same time, the security of Internet of vehicles has attracted much attention, especially data security which may cause user privacy leakage.The blockchain technology has become a solution, but it still faces new challenges in efficiency, security and other aspects.With the increase of vehicle nodes and information, how to efficiently achieve information consensus in high-speed vehicle moving environment has become a key problem.Then a bottom-up RSU (road side unit) chain consensus protocol was proposed based on blockchain and trust value.Several typical consensus structures were compared, and bottom-up two-layer consensus structure was adopted according to the actual scenarios of the Internet of vehicles.Moreover, a group leader node election algorithm was proposed which is based on node participation, work completion and message value.The system security was ensured by assigning trust value to each vehicle.Following the consensus structure and algorithm work mentioned above, the specific process of the protocol was comprehensively described, which was divided into six steps: region division, group leader node selection, local consensus, leader primary node selection, global consensus, and intra-domain broadcast.Then the experiments were analyzed from four aspects: security, communication complexity, consensus algorithm delay and fault tolerance rate.Experiments showed that, compared with other schemes, the proposed protocol can effectively reduce communication complexity and shorten consensus delay under the condition of resisting conspiracy attack, witch attack and other attacks.On the premise of security, the protocol improves fault tolerance rate and enables more nodes to participate in information sharing to satisfy the requirements of Internet of vehicles scenarios.…”
Get full text
Article -
146
Research on the selection of grid data storage technology
Published 2018-05-01“…Unstructured data and real-time data were storaged by state grid company’s big data platform distributed file system (based on HDFS optimized package).Based on HDFS optimized packaging,HDFS was characterized by high fault tolerance,low cost and high throughput.It was suitable for large-scale data set applications and effectively supports large file storage.The unstructured data storage and real-time data storage was introduced,and the selection of grid data storage technology was studied.…”
Get full text
Article -
147
Fault diagnosis and restoration strategy based on Voronoi diagram and resolving set
Published 2015-11-01“…As a communication backbone,high fault tolerance was a significant property in communication of WSNs.A novel fault diagnosis and restoration strategy based on Voronoi diagram and resolving set was designed.This strategy effectively reduced the communication cost during the fault diagnosis and recovery process through introducing a resolving set based coordinate system.Theoretical analysis and simulation results validate the performance of the proposed strategy.…”
Get full text
Article -
148
Diffusion-based time synchronization protocol for wireless sensor networks
Published 2008-01-01“…DTSP cancels the synchronization root existing in most protocols which may cause security problems, by utilizing time-division and fault-tolerance technology, the surviv- ability is enhanced further. …”
Get full text
Article -
149
Entangled state testing in the quantum Byzantine agreement
Published 2016-11-01“…In distributed computing,Byzantine agreement is a practical method to solve its fault-tolerance problem.There is a variation of the Byzantine agreement which is called detectable Byzantine agreement.This kind of protocol is unsolvable by classical means,but can be solved using quantum resources——quantum entangled states.A typical quantum detectable Byzantine agreement is the GBKCW protocol.The part with the generation and distribution of the lists in the GBKCW protocol was dealed with.In order to keep the GBKCW protocol from the intercept-and-resend strategy,the property of the determination of entangled states were employed to test the sharing state between the parties.…”
Get full text
Article -
150
Uncertainty, fragility, resilience
Published 2019-12-01“…Therefore, we look with attention at the adaptive approach, based on reactivity, ability to self-repair individual parts and fault tolerance, which has always enabled living organisms to survive in hostile contexts. …”
Get full text
Article -
151
Forecast of Chemical Export Trade Based on PSO-BP Neural Network Model
Published 2022-01-01“…The neural network is a nonlinear dynamic system, with strong nonlinear mapping ability, strong robustness, and fault tolerance. It has unique advanced advantages for solving nonlinear problems and is very suitable for solving nonlinear problems.…”
Get full text
Article -
152
Measurement of electromagnetic transients in high voltage substations based on wireless transmission technique under strong electromagnetic interference
Published 2025-01-01“…Secondly, a compression algorithm with fault tolerance prevents signal distortion. Then, a distributed wireless synchronous sampling strategy ensures accurate sampling under varying conditions. …”
Get full text
Article -
153
Bearing Fault Diagnosis based on ACSBP Algorithm
Published 2017-01-01“…The diagnostic results show that the ACSBP algorithm has stronger fault tolerance compared with CSBP and PSOBP models,and can effectively improve the accuracy of bearing fault diagnosis.…”
Get full text
Article -
154
A scalable load balancing strategy based on distributed server cluster
Published 2017-09-01“…A distributed database load balancing algorithm based on software defined networking was proposed,which separated the data,control and application to calculate the actual load of a single server in the server cluster.By querying the streams sampling record,the minimum number of server paths were determined,the request response time was reduced,the system throughput and fault tolerance were improved,and the full use of the purpose of server resources was achieved.The general load balancing technology was compared with the load balancing technology based on the software defined networking in the internal network of the distributed database experiment,the result shows that in the load state of the different server clusters,the average response time of the latter is smaller than that of the former,and can get better load balancing effect.…”
Get full text
Article -
155
Novel self-organized resource management mechanism for large-scale Grid over OBS networks
Published 2010-01-01“…In order to avoid the problems of client/server(C/S)-based resource management scheme in grid over optical burst switching(OBS) networking,an improved self-organized resource management mechanism based on the peer-to-peer(P2P) technology and the previous works was proposed.By utilizing the P2P technology and special descrip-tion of resources,the proposed mechanism could achieve distributed resource information storage and fast resource dis-covery capability.Simulation results show that the proposed mechanism can not only address the issues of poor scalabil-ity and fault-tolerance introduced by traditional C/S-based schemes,but also reduce the time for resource discovery.Therefore,it is more suitable for future large-scale consumer-oriented optical grid applications.…”
Get full text
Article -
156
Security capability analysis of software-based heterogeneous redundant execution system
Published 2021-09-01“…Software-based redundant execution (SRE) is a popular fault-tolerant design method which makes use of faults occurring randomly to achieve fault-tolerance.Software-based heterogeneous redundant execution (SHRE) uses heterogeneous redundant software replicas with identical function based on SRE and diversity of software.By comparing the results of heterogeneous redundant software replicas, SHRE can resist threats from software vulnerabilities and homogenization.The classification method of SHRE was proposed, and the security capability of SHRE was introduced.Based on N-modular redundancy, I/O operation mode and the recovery capability of attacked software replica, resistance to attack of different structures were analyzed.The analysis shows that the security capability of SHRE performs best when it is triple-mode redundancy architecture and attacked software replica can be recovered.Besides, by shortening the recovery time of attacked software replica, security to SHRE can be improved.…”
Get full text
Article -
157
A blockchain sharding scheme in edge computing
Published 2023-12-01“…The low security and poor privacy of the data in edge computing restrict the development of edge computing.Block chains can provide security for data in edge computing using their own tamper resistance, while protecting privacy by use of traceability.But the bottleneck of blockchain's scalability has become a barrier to their application in the field of edge computing.To solve the problem that blockchain can not meet the needs of a large number of nodes to process data at the same time when applied to edge computing, a two-layer sharding scheme was presented, which meets the needs of edge computing scenarios.Geographic location-based partitioning of nodes was implemented using the improved K-means algorithm, and a local blockchain network consensus (LBNC) algorithm was designed based on the idea of delegated proof of stake (DPoS) and practical Byzantine fault tolerance (PBFT).Simulation results show that the proposed scheme has less delay and higher throughput than those of PBFT, and the total throughput increases with the number of shards.…”
Get full text
Article -
158
Trust management scheme for driver-vehicle separation on dual-layer blockchain
Published 2024-11-01“…Additionally, the adaptive size-practical Byzantine fault tolerance (AS-PBFT) consensus algorithm was designed to optimize the consensus scale and reduce consensus time. …”
Get full text
Article -
159
A Diagnosis-Based Clustering and Multipath Routing Protocol for Wireless Sensor Networks
Published 2012-09-01“…Multipath routing provided by directed acyclic graph (DAG) increases system fault tolerance. Furthermore, clustering and multihop routing consider residual energy and routing cost, respectively; thus balanced energy consumption is achieved. …”
Get full text
Article -
160
A Design Space Exploration Framework for ANN-Based Fault Detection in Hardware Systems
Published 2017-01-01“…ANNs can be used for fault detection purposes since they have excellent characteristics such as generalization capability, robustness, and fault tolerance. Designing an ANN in order to be used for fault detection purposes includes different parameters. …”
Get full text
Article