The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

16981-17000hit(21534hit)

  • Fault Tolerance in Decentralized Systems

    Brian RANDELL  

     
    INVITED PAPER

      Vol:
    E83-B No:5
      Page(s):
    903-907

    In a decentralised system the problems of fault tolerance, and in particular error recovery, vary greatly depending on the design assumptions. For example, in a distributed database system, if one disregards the possibility of undetected invalid inputs or outputs, the errors that have to be recovered from will just affect the database, and backward error recovery will be feasible and should suffice. Such a system is typically supporting a set of activities that are competing for access to a shared database, but which are otherwise essentially independent of each other--in such circumstances conventional database transaction processing and distributed protocols enable backward recovery to be provided very effectively. But in more general systems the multiple activities will often not simply be competing against each other, but rather will at times be attempting to co-operate with each other, in pursuit of some common goal. Moreover, the activities in decentralised systems typically involve not just computers, but also external entities that are not capable of backward error recovery. Such additional complications make the task of error recovery more challenging, and indeed more interesting. This paper provides a brief analysis of the consequences of various such complications, and outlines some recent work on advanced error recovery techniques that they have motivated.

  • An Electronic Soccer Lottery System that Uses Bit Commitment

    Kunio KOBAYASHI  Hikaru MORITA  Mitsuari HAKUTA  Takanori NAKANOWATARI  

     
    PAPER

      Vol:
    E83-D No:5
      Page(s):
    980-987

    This paper proposes an electronic soccer lottery protocol suitable for the Internet environment. Recently, protocols based on public-key schemes such as digital signature have been proposed for electronic voting systems or other similar systems. For a soccer lottery system in particular, it is important to reduce the computational complexity and the amount of communication data required, because we must expect that a large number of tickets will be purchased simultaneously. These problems can be solved by introducing hash functions as the core of protocol. This paper shows a practical soccer lottery system based on bit commitment and hash functions, in which the privacy of prize-winners is protected and illegal acts by the lottery promoter or lottery ticket shops can be revealed.

  • On Reconfiguration Latency in Fault-Tolerant Systems

    Hagbae KIM  Sangmoon LEE  Taewha HONG  

     
    LETTER-Fault Tolerance

      Vol:
    E83-D No:5
      Page(s):
    1181-1182

    The reconfiguration latency defined as the time taken for reconfiguring a system upon failure detection or mode change. We evaluate it quantitatively for backup sparing, which is one of the most popular reconfiguration methods, by investigating the effects of key parameters.

  • An Analysis on Magnetostatic Waves by FDTD Method

    Toshiro KODERA  Hitoshi SHIMASAKI  Makoto TSUTSUMI  

     
    PAPER

      Vol:
    E83-C No:5
      Page(s):
    713-719

    This report introduces a new approach to the time domain analysis of the magnetostatic wave in ferrite materials. The time domain analysis is carried out by the finite difference time domain (FDTD) method. To include the gyromagnetic properties which is the origin of magnetostatic wave, direct differentiation of magnetic dipole moment equation in time and space domains without any approximation are carried out and is combined with Maxwell's equation under the FDTD method. As a result, the possibilities of the analysis on the magnetostatic wave with the FDTD method are confirmed and the validities of this approach are confirmed by some inspections. In addition, the analyses of the nonlinear characteristics on the magnetostatic backward volume waves (MSBVW) are carried out and clarify the dependance of the space profile on the input power.

  • Practicability of Autonomous Decentralized Scheduling Method for a Metal Mold Assembly Process

    Hitoshi IIMA  Norihisa ICHIMI  Nobuo SANNOMIYA  Yasunori KOBAYASHI  

     
    PAPER-Novel Applications

      Vol:
    E83-B No:5
      Page(s):
    1060-1066

    In this paper, a new approach is proposed for solving a real scheduling problem in a metal mold assembly process. This process is of a job-shop type, and the problem is large-scale and has complicated constraints. In this problem precedence relations exist not only among operations but also among jobs. The system has several types of single function machines and a type of multi-function machine. Furthermore, the number of machines belonging to each type is not single but plural. Therefore the selection of machine is necessary for executing each operation. An autonomous decentralized scheduling method is applied to this problem. In this method, a number of decision makers called modules cooperate with one another in order to attain the goal of the overall system. They determine the scheduling plan on the basis of their cooperation and the satisfaction of their own objective function levels. Particularly, the practicability of this method is considered through numerical results.

  • A Proposal of Availability Model and Its Applications

    Saad ALKHATEIB  Tieling ZHANG  Michio HORIGOME  

     
    PAPER

      Vol:
    E83-A No:5
      Page(s):
    828-834

    There are two distinct types of maintenance action, namely preventive one and corrective one. Preventive maintenance is performed at regular intervals and can contribute significantly towards the increase of reliability and availability. It must be scheduled carefully in order that the availability is maximized through optimizing regular interval. On the other hand, corrective maintenance is performed when the system fails, and so the occurrence of corrective maintenance action is a random variable that cannot be predicted beforehand. From these considerations, it is clear that time is the most important factor in maintainability, and therefore, we classify maintenance data into two groups, that is, scheduled maintenance data and unscheduled maintenance one. Next, based on these classified data, we propose the new availability model which modifies Policy II proposed by R. Barlow and L. Hunter. Finally, we show the usefulness of the new model proposed here by applying these theoretical results to real data of some power plant.

  • Evaluation of Mental Workload by Variability of Pupil Area

    Atsuo MURATA  Hirokazu IWASE  

     
    LETTER-Medical Engineering

      Vol:
    E83-D No:5
      Page(s):
    1187-1190

    It is generally known that the autonomic nervous system regulates the pupil. In this study, we attempted to assess mental workload on the basis of the fluctuation rhythm in the pupil area. Controlling the respiration interval, we measured the pupil area during mental tasking for one minute. We simultaneously measured the respiration curve to monitor the respiration interval. We required the subject to perform two mental tasks. One was a mathematical division task, the difficulty of which was set to two, three, four, and five dividends. The other was a Sternberg memory search task, which had four work levels defined by the number of memory sets. In the Sternberg memory search, the number of memory set changed from five to eight. In such a way, we changed the mental workload induced by mental loading. As a result of calculating an autoregressive (AR) power spectrum, we could observe two peaks which corresponded to the blood pressure variation and respiratory sinus arrhythmia under a low workload. With an increased workload, the spectral peak related to the respiratory sinus arrhythmia disappeared. The ratio of the power at the low frequency band, from 0.05-0.15Hz, to the power at the respiration frequency band, from 0.35-0.4Hz, increased with the work level. In conclusion, the fluctuation of the pupil area is a promising means for the evaluation of mental workload or autonomic nervous function.

  • Mobile Agent-Based Transactions in Open Environments

    Flavio Morais de ASSIS SILVA  Radu POPESCU-ZELETIN  

     
    PAPER-Mobile Agents

      Vol:
    E83-B No:5
      Page(s):
    973-987

    This paper describes a transaction model for open environments based on mobile agents. Mobile agent-based transactions combine mobility and the execution of control flows with transactional semantics. The model presented represents an approach for providing reliability and correctness of the execution of distributed activities, which fulfills important requirements of applications in Open Environments. The presented transaction model is based on a protocol for providing fault tolerance when executing mobile agent-based activities. This protocol is outlined in this paper. With this protocol, if an agent executing an activity at an agency (logical "place" in a distributed agent environment) becomes unreachable for a long time, the execution of the activity can be recovered and continue at another agency. The fault tolerance approach supports "multi-agent activities," i. e. , activities where some of its parts are spawned to execute and migrate asynchronously in relation to other parts. The described transaction model, called the basic (agent-based) transaction model, is an open nested transaction model. By being based on the presented fault tolerance mechanism, subtransactions can be executed asynchronously in relation to their parent transactions and agent-based transactions can explore alternatives in the event of agent unavailability. The model fulfills requirements for supporting the autonomy of organizations in a distributed agent environment.

  • Three-Dimensional Beam Propagation Analysis of Quasi-Phase Matched Second Harmonic Generation Devices with Triangular and Semi-Circular Domain Inversion Profiles

    Takashi YASUI  Masanori KOSHIBA  

     
    INVITED PAPER

      Vol:
    E83-C No:5
      Page(s):
    697-704

    A three-dimensional beam propagation method based on a finite element scheme is described for the analysis of second harmonic generation devices. For the wide-angle beam propagation analysis, the Pade approximation is applied to the differential operator along the propagation direction. In order to avoid spurious reflection from the computational windows edges, the transparent boundary condition is introduced. Numerical results are shown for quasi-phase matched second harmonic generation devices using periodically domain-inverted LiNbO3 and LiTaO3 waveguides. The influences of the shape of domain-inverted regions and the inversion width on the conversion efficiencies are investigated in detail.

  • Design and Evaluation of Computer Telephony Services in a Distributed Processing Environment

    Shinji MOTEGI  Masaru ENOMOTO  Eiji UTSUNOMIYA  Hiroki HORIUCHI  Toshikane ODA  

     
    PAPER-Novel Applications

      Vol:
    E83-B No:5
      Page(s):
    1075-1084

    TINA (Telecommunications Information Networking Architecture) has been developed to support efficient operation of a wide range of complex services. TINA is effective in building advanced multimedia related services and provides effective solutions for complex service control and management along with a high level of quality of services. However the benefits and effectiveness of TINA for other types of services such as ordinary telephone services and facsimile messaging services are not clear. This paper clarifies how to apply TINA to control and management of computer telephony (CT) services and ordinary telephony services. We designed and implemented CT services in a distributed processing environment (DPE), and in particular a click-to-dial service, as a target for our study. We demonstrate the effectiveness of the design through qualitative and quantitative evaluation. The results of our study show that the distributed processing technique, based on component concepts makes it easy to build and extend CT services, and also that TINA service architecture is applicable to ordinary telephony and advanced CT services.

  • Current-Writing Active-Matrix Circuit for Organic Light-Emitting Diode Display Using a-Si:H Thin-Film-Transistors

    Reiji HATTORI  Tsutomu TSUKAMIZU  Ryusuke TSUCHIYA  Kazunori MIYAKE  Yi HE  Jerzy KANICKI  

     
    LETTER-Electronic Displays

      Vol:
    E83-C No:5
      Page(s):
    779-782

    In this letter, we describe a four thin-film-transistor (TFT) pixel circuit based on hydrogenated amorphous silicon (a-Si:H) technology for the active-matrix organic light-emitting diode (AMOLED) display applications. The circuit uses current-writing mechanism and can automatically adjust the threshold-voltage shifts of both the organic light-emitting diodes (OLEDs) and the TFTs induced by the circuit aging or process variations. Experimental results indicate virtually no variation of the output driving current after long-term bias-temperature-stress (BTS).

  • A Program Generator for Object-Based Implementation of Communication Protocol Software

    Chung-Shyan LIU  

     
    PAPER-Object Management Architecture/Design Pattern/Frameworks

      Vol:
    E83-B No:5
      Page(s):
    1013-1022

    In this paper, a program generator for communication protocol software will be presented. Our program generator takes an extended finite state machine as a domain model and generates a group of C++ classes needed for an implementation. For each state of the FSM, a C++ class is generated, where the interface events are implemented as member functions of the corresponding state object. Protocol data units (PDUs) are embedded as Message objects and specified in the same way as packet filter and is interpreted to generate necessary PDU definition statements and PDU manipulation statements. Also, protocol objects from different layers can be linked together by using an organization model, where a protocol entity is invoked by its upper layer entity or lower layer entity by member function calls.

  • Optimum Order Time for a Spare Part Inventory System Modeled by a Non-Regenerative Stochastic Petri Net

    Qun JIN  Richard F. VIDALE  Yoshio SUGASAWA  

     
    PAPER

      Vol:
    E83-A No:5
      Page(s):
    818-827

    We determine the optimum time TOPT to order a spare part for a system before the part in operation has failed. TOPT is a function of the part's failure-time distribution, the lead (delivery) time of the part, its inventory cost, and the cost of downtime while waiting delivery. The probabilities of the system's up and down states are obtained from a non-regenerative stochastic Petri net. TOPT is found by minimizing E[cost], the expected cost of inventory and downtime. Three cases are compared: 1) Exponential order and lead times, 2) Deterministic order time and exponential lead time, and 3) Deterministic order and lead times. In Case 1, it is shown analytically that, depending on the ratio of inventory to downtime costs, the optimum policy is one of three: order a spare part immediately at t = 0, wait until the part in operation fails, or order before failure at TOPT > 0. Numerical examples illustrate the three cases.

  • RP-Reconstructing ARP Strategy for Micro-Cellular Systems

    Hiromasa FUJII  Kouhei MIZUNO  Takahiko SABA  Iwao SASASE  

     
    PAPER-Wireless Communication Switching

      Vol:
    E83-B No:5
      Page(s):
    1122-1127

    In cellular systems, autonomous reuse partitioning (ARP) is one of the channel assignment strategy which attains the high spectral efficiency. In the strategy, the movement of mobile stations (MSs) causes the disturbance of reuse partition. Furthermore the smaller cell size causes the spectral efficiency worse. In this paper, we propose a new ARP strategy with reuse partitioning reconstructing, named RP-reconstructing ARP strategy, for microcellular systems. We evaluate the performance of the proposed strategy with blocking rate and forced call termination rate by the computer simulation. The results show that the system with the proposed strategy accommodates 1.5 times as many users as the system with ARP does.

  • A Distributed Approach against Computer Viruses Inspired by the Immune System

    Takeshi OKAMOTO  Yoshiteru ISHIDA  

     
    PAPER-Communication and Computer Architecture/Assurance Systems

      Vol:
    E83-B No:5
      Page(s):
    908-915

    More than forty thousands computer viruses have appeared so far since the first virus. Six computer viruses on average appear every day. Enormous expansion of the computer network opened a thread of explosive spread of computer viruses. In this paper, we propose a distributed approach against computer virus using the computer network that allows distributed and agent-based approach. Our system is composed of an immunity-based system similar to the biological immune system and recovery system similar to the recovery mechanism by cell division. The immunity-based system recognizes "non-self" (which includes computer viruses) using the "self" information. The immunity-based system uses agents similar to an antibody, a natural killer cell and a helper T-cell. The recover system uses a copy agent which sends an uninfected copy to infected computer on LAN, or receives from uninfected computer on LAN. We implemented a prototype with JAVATM known as a multi-platform language. In experiments, we confirmed that the proposed system works against some of existing computer viruses that can infect programs for MS-DOSTM.

  • Types and Basic Properties of Leaky Modes in Microwave and Millimeter-Wave Integrated Circuits

    Arthur A. OLINER  

     
    INVITED PAPER

      Vol:
    E83-C No:5
      Page(s):
    675-686

    Leaky waves have been known for many years in the context of leaky-wave antennas, but it is only within the past dozen years or so that it was realized that the dominant mode on printed-circuit transmission lines used in microwave and millimeter-wave integrated circuits can also leak. Such leakage is extremely important because it may cause power loss, cross talk between neighboring parts of the circuit, and various undesired package effects. These effects can ruin the performance of the circuit, so we must know when leakage can occur and how to avoid it. In most cases, these transmission lines leak only at high frequencies, but some lines leak at all frequencies. However, those lines can be modified to avoid the leakage. This paper explains why and when leakage occurs, and shows how the dominant mode behaves on different lines. The paper also examines certain less well known but important features involving unexpected new physical effects. These include an additional dominant mode on microstrip line that is leaky at higher frequencies, and a simultaneous propagation effect, which is rather general and which occurs when the line's relative cross-sectional dimensions are changed. The final section of the paper is concerned with three important recent developments: (a) the new effects that arise when the frequency is raised still higher and leakage occurs into an additional surface wave, (b) a basic and unexpected discovery relating to improper real modes, which are nonphysical but which can strongly influence the total physical field under the right circumstances, and (c) the important practical issue of how leakage behavior is modified when the circuit is placed into a package.

  • On the Concept of "Stability" in Asynchronous Distributed Decision-Making Systems

    Tony S. LEE  Sumit GHOSH  

     
    PAPER-Real Time Control

      Vol:
    E83-B No:5
      Page(s):
    1023-1038

    Asynchronous, distributed, decision-making (ADDM) systems constitute a special class of distributed problems and are characterized as large, complex systems wherein the principal elements are the geographically-dispersed entities that communicate among themselves, asynchronously, through message passing and are permitted autonomy in local decision-making. A fundamental property of ADDM systems is stability that refers to their behavior under representative perturbations to their operating environments, given that such systems are intended to be real, complex, and to some extent, mission critical systems, and are subject to unexpected changes in their operating conditions. ADDM systems are closely related to autonomous decentralized systems (ADS) in the principal elements, the difference being that the characteristics and boundaries of ADDM systems are defined rigorously. This paper introduces the concept of stability in ADDM systems and proposes an intuitive yet practical and usable definition that is inspired by those used in Control Systems and Physics. A comprehensive stability analysis on an accurate simulation model will provide the necessary assurance, with a high level of confidence, that the system will perform adequately. An ADDM system is defined as a stable system if it returns to a steady-state in finite time, following perturbation, provided that it is initiated in a steady-state. Equilibrium or steady-state is defined through placing bounds on the measured error in the system. Where the final steady-state is equivalent to the initial one, a system is referred to as strongly stable. If the final steady-state is potentially worse then the initial one, a system is deemed marginally stable. When a system fails to return to steady-state following the perturbation, it is unstable. The perturbations are classified as either changes in the input pattern or changes in one or more environmental characteristics of the system such as hardware failures. Thus, the key elements in the study of stability include steady-state, perturbations, and stability. Since the development of rigorous analytical models for most ADDM systems is difficult, if not impossible, the definitions of the key elements, proposed in this paper, constitute a general framework to investigate stability. For a given ADDM system, the definitions are based on the performance indices that must be judiciously identified by the system architect and are likely to be unique. While a comprehensive study of all possible perturbations is too complex and time consuming, this paper focuses on a key subset of perturbations that are important and are likely to occur with greater frequency. To facilitate the understanding of stability in representative real-world systems, this paper reports the analysis of two basic manifestations of ADDM systems that have been reported in the literature --(i) a decentralized military command and control problem, MFAD, and (ii) a novel distributed algorithm with soft reservation for efficient scheduling and congestion mitigation in railway networks, RYNSORD. Stability analysis of MFAD and RYNSORD yields key stable and unstable conditions.

  • Integrating Hard and Soft Real-Time Communication in Autonomous Robot Systems

    Michael MOCK  Edgar NETT  

     
    PAPER-Novel Applications

      Vol:
    E83-B No:5
      Page(s):
    1067-1074

    Designing control and robotic systems as autonomous decentralized systems introduces a new degree of flexibility in the manufacturing and in the application of such systems. This flexibility is required for the systems to work in environments that are not totally predictable and that can change dynamically. In this paper, we present a new concept for real-time communication that supports this flexibility while still preserving real-time guarantees for hard real-time communication. The concept is designed to work on multiple-access busses. In particular, we consider its application on wireless local area networks and field-busses. The concept addresses requirements of hard-real time, soft real-time and non real-time communication. For this, we extend the TDMA (time- division multiple-access) approach for time-triggered hard-real time communication by the concept of shared channels that support event-triggered communication and coexist with hard real-time channels. A first implementation of concept has been carried out in the context of the CAN-bus.

  • Migration Transparency in Agent Systems

    Bruno SCHULZE  Edmundo R. M. MADEIRA  

     
    PAPER-Mobile Agents

      Vol:
    E83-B No:5
      Page(s):
    942-950

    Migration transparency is considered in the context of multi-agent systems. A mobile agent architecture is proposed with an Availability service and a Transparency interface. We define mobility as explicit (or proactive) when the agent decides when and where to move and define mobility as implicit (i. e. , transparent or reactive) when it is a consequence of changes in the environment. Implicit mobility of agents is explored in addition to the usual explicit mobility. The search for a target agent (or agency) follows a transparent location and selection. The client agent preferably moves towards the target agent. If not possible, the target agent will move towards the client agent when calling back. If both agents can not move then the execution takes place remotely or is abandoned. Transparency is goal oriented.

  • Failure Diagnosis Utilizing the Series/Parallel Structure of Systems

    Masato TAKAHASHI  Kenji TANAKA  

     
    PAPER

      Vol:
    E83-A No:5
      Page(s):
    788-795

    We deal here with diagnosis for failures of series/parallel structure system. The conventionals have assumed that the system failure is caused by a single minimal cut set (MCS). The purposes of this paper are to propose a new diagnosis method to identify all MCSs by utilizing the series/parallel structure and repair information without requiring an excessive number of inspections. Moreover, by applying our method to several types of series/parallel structure system, and to system having some kinds of probability distributions, desirable system for our method are persuaded. We evaluate not just the number of inspections but also the cost of diagnosis, and show the condition under which our method is effective.

16981-17000hit(21534hit)