15,493 research outputs found

    A fuzzy set theory-based fast fault diagnosis approach for rotators of induction motors

    Get PDF
    Induction motors have been widely used in industry, agriculture, transportation, national defense engineering, etc. Defects of the motors will not only cause the abnormal operation of production equipment but also cause the motor to run in a state of low energy efficiency before evolving into a fault shutdown. The former may lead to the suspension of the production process, while the latter may lead to additional energy loss. This paper studies a fuzzy rule-based expert system for this purpose and focuses on the analysis of many knowledge representation methods and reasoning techniques. The rotator fault of induction motors is analyzed and diagnosed by using this knowledge, and the diagnosis result is displayed. The simulation model can effectively simulate the broken rotator fault by changing the resistance value of the equivalent rotor winding. And the influence of the broken rotor bar fault on the motors is described, which provides a basis for the fault characteristics analysis. The simulation results show that the proposed method can realize fast fault diagnosis for rotators of induction motors

    Improving Energy Saving of One-sided Matrix Decompositions on CPU-GPU Heterogeneous Systems

    Full text link
    One-sided dense matrix decompositions (e.g., Cholesky, LU, and QR) are the key components in scientific computing in many different fields. Although their design has been highly optimized for modern processors, they still consume a considerable amount of energy. As CPU-GPU heterogeneous systems are commonly used for matrix decompositions, in this work, we aim to further improve the energy saving of one-sided matrix decompositions on CPU-GPU heterogeneous systems. We first build an Algorithm-Based Fault Tolerance protected overclocking technique (ABFT-OC) to enable us to exploit reliable overclocking for key matrix decomposition operations. Then, we design an energy-saving matrix decomposition framework, Bi-directional Slack Reclamation(BSR), that can intelligently combine the capability provided by ABFT-OC and DVFS to maximize energy saving and maintain performance and reliability. Experiments show that BSR is able to save up to 11.7% more energy compared with the current best energy saving optimization approach with no performance degradation and up to 14.1% Energy * Delay^2 reduction. Also, BSR enables the Pareto efficient performance-energy trade-off, which is able to provide up to 1.43x performance improvement without costing extra energy

    Formal Modelling and Verification of the Clock Synchronization Algorithm of FlexRay

    Get PDF
    The hundreds of electronic control devices used in an automotive system can effectively communicate with one another, thanks to an in-vehicle network (IVN) like FlexRay. Even though every node in the network will be running on its local clock, a global notion of time is essential. The clock synchronisation algorithm accomplishes this global time between the nodes in FlexRay. In this era of self-driving cars, the vehicle’s safety is paramount. For the vehicle to operate safely and smoothly, timely communication of information is critical, and the clock synchronisation algorithm plays a vital role in this. It is essential to formally test the clock synchronisation algorithm’s correctness. This paper attempts to model and verify the clock synchronisation algorithm of FlexRay using formal methods, which in turn enhance the reliability of safety-critical automotive systems. The clock synchronisation is modelled as a network of six timed automata in the UPPAAL model checker. Three system models were developed, a model for an ideal clock, another for a drifting clock, and a third model considering propagation delay. The precision of the clocks is verified to be within the prescribed limits. Simulation studies are also conducted on the model to ensure that the clock’s drift is always within the precision

    Performance Analysis and Comparison of Non-ideal Wireless PBFT and RAFT Consensus Networks in 6G Communications

    Full text link
    Due to advantages in security and privacy, blockchain is considered a key enabling technology to support 6G communications. Practical Byzantine Fault Tolerance (PBFT) and RAFT are seen as the most applicable consensus mechanisms (CMs) in blockchain-enabled wireless networks. However, previous studies on PBFT and RAFT rarely consider the channel performance of the physical layer, such as path loss and channel fading, resulting in research results that are far from real networks. Additionally, 6G communications will widely deploy high-frequency signals such as terahertz (THz) and millimeter wave (mmWave), while performances of PBFT and RAFT are still unknown when these signals are transmitted in wireless PBFT or RAFT networks. Therefore, it is urgent to study the performance of non-ideal wireless PBFT and RAFT networks with THz and mmWave signals, to better make PBFT and RAFT play a role in the 6G era. In this paper, we study and compare the performance of THz and mmWave signals in non-ideal wireless PBFT and RAFT networks, considering Rayleigh Fading (RF) and close-in Free Space (FS) reference distance path loss. Performance is evaluated by five metrics: consensus success rate, latency, throughput, reliability gain, and energy consumption. Meanwhile, we find and derive that there is a maximum distance between two nodes that can make CMs inevitably successful, and it is named the active distance of CMs. The research results not only analyze the performance of non-ideal wireless PBFT and RAFT networks, but also provide important references for the future transmission of THz and mmWave signals in PBFT and RAFT networks.Comment: arXiv admin note: substantial text overlap with arXiv:2303.1575

    A suite of quantum algorithms for the shortestvector problem

    Get PDF
    Crytography has come to be an essential part of the cybersecurity infrastructure that provides a safe environment for communications in an increasingly connected world. The advent of quantum computing poses a threat to the foundations of the current widely-used cryptographic model, due to the breaking of most of the cryptographic algorithms used to provide confidentiality, authenticity, and more. Consequently a new set of cryptographic protocols have been designed to be secure against quantum computers, and are collectively known as post-quantum cryptography (PQC). A forerunner among PQC is lattice-based cryptography, whose security relies upon the hardness of a number of closely related mathematical problems, one of which is known as the shortest vector problem (SVP). In this thesis I describe a suite of quantum algorithms that utilize the energy minimization principle to attack the shortest vector problem. The algorithms outlined span the gate-model and continuous time quantum computing, and explore methods of parameter optimization via variational methods, which are thought to be effective on near-term quantum computers. The performance of the algorithms are analyzed numerically, analytically, and on quantum hardware where possible. I explain how the results obtained in the pursuit of solving SVP apply more broadly to quantum algorithms seeking to solve general real-world problems; minimize the effect of noise on imperfect hardware; and improve efficiency of parameter optimization.Open Acces

    Controls on groundwater and surface water salinity in coastal Bangladesh

    Get PDF
    Salinity in surface water and groundwater is a pervasive issue along coastal Bangladesh, a low-lying megadelta where around 35 million people live. A large amount of this land has been reclaimed using a network of low-lying polders. The area is particularly susceptible to flooding from tropical cyclones. Cyclone induced storm surges coupled with the low-lying reclaimed land can breach polder embankments and cause extensive flooding, resulting in excess salinity in soil and surface water. Salinity in drinking water is known to cause adverse effects on human health. It is, therefore, important to identify the controls surface water and groundwater salinity in these coastal areas. A fully coupled surface-subsurface model of a coastal polder by using HydroGeo- Sphere is developed to investigate the impact of storm surge events on groundwater salinity. The hydrological parameters were calibrated from the fieldwork at a field site in the Dacope Upazila, in the southwest coastal region of Bangladesh. The results suggest that sudden salt fluxes in the pond are likely to build up salinity in the underlying sediment. A set of scenarios were considered: a cyclone induced storm surge during both the monsoon and dry seasons, and both with and without remediation. The results show that surge events caused a rise in salinity in drinking water and near-surface groundwater. However, rapid remediation after a surge event could help mitigate the severity of the impact on drinking water. This provides suggestions for water resources management planning. The 2D cross-section model was extended to the 3D model to improve the understanding of the salinity process. Climate change scenarios were then used to evaluate the effects of episodic cyclone surges on shallow groundwater salinity. This study suggests that more frequent cyclones would worsen not only salinity in near-surface groundwater but lateral saltwater intrusion at the shallow or deep aquifers.Open Acces

    Political Islam and grassroots activism in Turkey : a study of the pro-Islamist Virtue Party's grassroots activists and their affects on the electoral outcomes

    Get PDF
    This thesis presents an analysis of the spectacular rise of political Islam in Turkey. It has two aims: first to understand the underlying causes of the rise of the Welfare Party which -later became the Virtue Party- throughout the 1990s, and second to analyse how grassroots activism influenced this process. The thesis reviews the previous literature on the Islamic fundamentalist movements, political parties, political party systems and concentrates on the local party organisations and their effects on the party's electoral performance. It questions the categorisation of Islamic fundamentalism as an appropriate label for this movement. An exploration of such movements is particularly important in light of the event of 11`x' September. After exploring existing theoretical and case studies into political Islam and party activism, I present my qualitative case study. I have used ethnographic methodology and done participatory observations among grassroots activists in Ankara's two sub-districts covering 105 neighbourhoods. I examined the Turkish party system and the reasons for its collapse. It was observed that as a result of party fragmentation, electoral volatility and organisational decline and decline in the party identification among the citizens the Turkish party system has declined. However, the WP/VP profited from this trend enormously and emerged as the main beneficiary of this process. Empirical data is analysed in four chapters, dealing with the different aspects of the Virtue Party's local organisations and grassroots activists. They deal with change and continuity in the party, the patterns of participation, the routes and motives for becoming a party activist, the profile of party activists and the local party organisations. I explore what they do and how they do it. The analysis reveals that the categorisation of Islamic fundamentalism is misplaced and the rise of political Islam in Turkey cannot be explained as religious revivalism or the rise of Islamic fundamentalism. It is a political force that drives its strength from the urban poor which has been harshly affected by the IMF directed neoliberal economy policies. In conclusion, it is shown that the WP/VP's electoral chances were significantly improved by its very efficient and effective party organisations and highly committed grassroots activists

    Digital asset management via distributed ledgers

    Get PDF
    Distributed ledgers rose to prominence with the advent of Bitcoin, the first provably secure protocol to solve consensus in an open-participation setting. Following, active research and engineering efforts have proposed a multitude of applications and alternative designs, the most prominent being Proof-of-Stake (PoS). This thesis expands the scope of secure and efficient asset management over a distributed ledger around three axes: i) cryptography; ii) distributed systems; iii) game theory and economics. First, we analyze the security of various wallets. We start with a formal model of hardware wallets, followed by an analytical framework of PoS wallets, each outlining the unique properties of Proof-of-Work (PoW) and PoS respectively. The latter also provides a rigorous design to form collaborative participating entities, called stake pools. We then propose Conclave, a stake pool design which enables a group of parties to participate in a PoS system in a collaborative manner, without a central operator. Second, we focus on efficiency. Decentralized systems are aimed at thousands of users across the globe, so a rigorous design for minimizing memory and storage consumption is a prerequisite for scalability. To that end, we frame ledger maintenance as an optimization problem and design a multi-tier framework for designing wallets which ensure that updates increase the ledger’s global state only to a minimal extent, while preserving the security guarantees outlined in the security analysis. Third, we explore incentive-compatibility and analyze blockchain systems from a micro and a macroeconomic perspective. We enrich our cryptographic and systems' results by analyzing the incentives of collective pools and designing a state efficient Bitcoin fee function. We then analyze the Nash dynamics of distributed ledgers, introducing a formal model that evaluates whether rational, utility-maximizing participants are disincentivized from exhibiting undesirable infractions, and highlighting the differences between PoW and PoS-based ledgers, both in a standalone setting and under external parameters, like market price fluctuations. We conclude by introducing a macroeconomic principle, cryptocurrency egalitarianism, and then describing two mechanisms for enabling taxation in blockchain-based currency systems
    • …
    corecore