931 research outputs found

    Study on fault-tolerant processors for advanced launch system

    Get PDF
    Issues related to the reliability of a redundant system with large main memory are addressed. The Fault-Tolerant Processor (FTP) for the Advanced Launch System (ALS) is used as a basis for the presentation. When the system is free of latent faults, the probability of system crash due to multiple channel faults is shown to be insignificant even when voting on the outputs of computing channels is infrequent. Using channel error maskers (CEMs) is shown to improve reliability more effectively than increasing redundancy or the number of channels for applications with long mission times. Even without using a voter, most memory errors can be immediately corrected by those CEMs implemented with conventional coding techniques. In addition to their ability to enhance system reliability, CEMs (with a very low hardware overhead) can be used to dramatically reduce not only the need of memory realignment, but also the time required to realign channel memories in case, albeit rare, such a need arises. Using CEMs, two different schemes were developed to solve the memory realignment problem. In both schemes, most errors are corrected by CEMs, and the remaining errors are masked by a voter

    Study on advanced information processing system

    Get PDF
    Issues related to the reliability of a redundant system with large main memory are addressed. In particular, the Fault-Tolerant Processor (FTP) for Advanced Launch System (ALS) is used as a basis for our presentation. When the system is free of latent faults, the probability of system crash due to nearly-coincident channel faults is shown to be insignificant even when the outputs of computing channels are infrequently voted on. In particular, using channel error maskers (CEMs) is shown to improve reliability more effectively than increasing the number of channels for applications with long mission times. Even without using a voter, most memory errors can be immediately corrected by CEMs implemented with conventional coding techniques. In addition to their ability to enhance system reliability, CEMs--with a low hardware overhead--can be used to reduce not only the need of memory realignment, but also the time required to realign channel memories in case, albeit rare, such a need arises. Using CEMs, we have developed two schemes, called Scheme 1 and Scheme 2, to solve the memory realignment problem. In both schemes, most errors are corrected by CEMs, and the remaining errors are masked by a voter

    Development and Strategies of E-commerce Patents

    Get PDF
    Internet and information technologies break the transaction barriers, and the permission of the patentable subject matter for business methods and software acts as the moving power for enterprises entering into the knowledge competition age. Computer software can be a patentable subject matter is the inevitable consequence of the development of technology and law, while the patentability of business methods reflects that the advantages of industry competitiveness have shifted from labor to knowledge and innovation. This study analyzes the quantity and trends of e-commerce related patents, and clarify the concepts of patentable subject matter regarding business methods. Since United States is the leading country in the e-commerce and the patent system, decisions and patent statistics of United States are considered as the references in this study. In addition, a set of innovation and patent strategies for enterprises is also proposed to deal with the patent barriers established by technology leaders

    Real-Name Registration Rules and the Fading Digital Anonymity in China

    Get PDF
    China has implemented comprehensive online real-name registration rules, which require Internet users to disclose their identities. Chinese national law has required most online service providers to implement real-name registration since 2012. This article uses the real-name registration rules to illustrate the supremacy and limitations of the Network Authoritarian Model (NAM), an approach leveraging corporate resources for political surveillance and occasionally adopted by the Chinese party-state. By addressing the evolution of real-name registration rules in China, this article illustrates the party-state’s gradual efforts in both eliminating cyberspace anonymity and etching Chinese characteristics on the architecture of the Internet. Although the Chinese government has faced serious challenges in enforcing the real-name registration policy and current enforcement is far from satisfactory, China is not alone in promoting such a policy. Major Internet companies, including Google, Facebook, and LinkedIn, have expressed similar interests in requiring users to register their real names. Moreover, policymakers in developed and developing countries are exploring similarly themed regulations and China, therefore, may well be in the vanguard of the global movement for online real-name registration. Nonetheless, requiring real-name registration in China has not only created huge costs for Internet companies, but also given rise to fierce controversy associated with free speech, privacy, and law enforcement. In this article, we identify several important legal and policy implications of the Chinese real-name registration policy. We also illustrate the foremost predicament currently faced by the Chinese party-state in enforcing the policy. This analysis argues that China may create a “spillover effect” in jurisdictions outside China as well as in the global Internet architecture

    Community College Online Course Retention and Final Grade: Predictability of Social Presence

    Get PDF
    This study employed a quantitative research design to examine the predictive relationships between social presence and course retention as well as final grade in community college online courses. Social presence is defined as the degree of one\u27s feeling, perception and reaction to another intellectual entity in the online environment. Course final grades included A, B. C, D, F, I, or W. Course retention was defined as successfully completed a course with an A to C grade. The results of the binary and ordinal logistic regression analyses suggest that social presence is a significant predictor of course retention and final grade in the community college online environment. Two effective interventions are recommended: establishing integrated social and learning communities; and building effective blended learning programs
    corecore