scholarly journals ARCHITECTURAL DESIGN OF AN AVIATION FAULT-TOLERANT COMPUTER BASED ON ARINC 659 BUS TECHNOLOGY

2020 ◽  
Vol 35 (1) ◽  
pp. 51-67
Author(s):  
A.S.A. Al-Masri ◽  

RN-659 cars are essential to ensure high reliability and stability of the international computer communication system. This case looks at the RNA C659 Series ray tracing model and debris failure mechanism. According to the pilot, a computer anti-aircraft system consisting of 4 aircraft was created. In addition, a computer and computer development program were created for the computer's command and screen components. Computer Security Management System does not complete invalid cards, computer votes, and sub-monitoring and control instructions.

2018 ◽  
Vol 179 ◽  
pp. 03025
Author(s):  
Gang An ◽  
Yu Li ◽  
Xin Li

The ARINC659 backplane bus is suitable for high safety and high reliability requirements of aircraft on-board computer communication systems. This paper analyzes the structure of ARINC 659 serial backplane bus and the bus fault tolerance mechanism. On the basis of backplane bus, a 4 degree of aviation fault-tolerant computer is designed. Moreover, the computer architecture and computer system of the instruction branch and monitoring branch are designed in the computer channel. The fault-tolerant management of the computer is realized by bus fault tolerance, redundancy voting between computers and the monitoring of the instruction and monitoring branches.


2015 ◽  
Vol 11 (4) ◽  
pp. 34
Author(s):  
Jinfeng Li ◽  
Shun Cao ◽  
Jia-xin Duan ◽  
Peng-cheng Gao ◽  
Yong Hou

A powerful and cost effective home security system based on GSM communication network and wireless communication module CC1100 is proposed for anti-theft, fireproofing, waterproofing, anti-gas leak and remote appliance control. The system uses STC89C516 microcontroller as the core and real-timely detects the home environment through a variety of sensors. The dual detections are utilized to reduce the false alarm rate and enhance system reliability and interference immunity. The wireless data transmission is adopted between the main controller and sensor nodes, which does not require a lot of wiring. The bidirection communication between the main controller and the mobile terminal is realized by the GSM networks. Once detecting suspicious activities, the system sends an alarm message to the host’s mobile phone. The user can remotely query the home security status and control the home appliance by the GSM module. The communication is assured within the GSM coverage area, and the distance is unlimited. The GSM short message alarm overcomes the hidden troubles of vulnerable damage and no alarm when calling in the fixed telephone dialing. The interaction interface is optimized. The user can modify the passwords, change the target phone number, alter the upper and lower limits of alarm, query the alarm recording and deploy/cancel defense via the LCD and keyboard. The buttons are installed for help in case of emergencies. The test results show that the system can real-timely monitor and remotely query the home environment, control the appliances and initiatively send alarm messages in case of accidents. The system possesses full function, high reliability, low false alarm rate, strong expansion, friendly user interface and low cost. The application space is very broad.


Author(s):  
David R Desaulniers ◽  
Stephen Fleger

Since 1980 the Institute of Electrical and Electronics Engineers (IEEE) has supported development of human factors (HF) standards. Within IEEE, Subcommittee 5 (SC5) of the Nuclear Power Engineering Committee develops and maintains HF standards applicable to nuclear facilities. These standards are structured in a hierarchical fashion. The top-level standard (IEEE Std. 1023) defines the HF tasks required to support the integration of human performance into the design process. Five lower tier documents (IEEE Std. 845, 1082, 1289, 1786 and 1707) expand upon the upper tier standard. Presently, two new HF standards projects are underway; one to provide HF guidance for the validation of the system interface design and integrated systems operation and another for designing and developing computer-based displays for monitoring and control of nuclear facilities. SC5 is also involved in outreach activities, including sponsorship of a series of conferences on human factors and nuclear power plants.


Author(s):  
C.T. Nguyen ◽  
H.H. Le ◽  
Y. Robichaud ◽  
K. Srinivasan ◽  
G. Santerre

2011 ◽  
Vol 204-210 ◽  
pp. 1370-1377 ◽  
Author(s):  
Xiong Feng Huang ◽  
Chun Jie Zhou ◽  
Yuan Qing Qing ◽  
Ye Wang ◽  
Ming Yue Yang

Transient faults are hard to be detected and located due to their unpredictable nature and short duration, and they are the dominant causations of system failures, which makes it necessary to consider transient fault-tolerant design in the development of modern safety-critical industrial system. In this paper an approach based on system theory is proposed to tolerate the transient faults in tunnel construction wireless monitoring and control systems (TCWMCS), in which the effects of transient faults are expressed by dysfunction of interactions among software applications. After analyzing the dysfunctional interactions of the system by the operational process model and educing the causes of dysfunction in the functional control diagram, a safety enhancement way was proposed for the designers, in which effictive safety constraints were set up to tolerate the transient faults. The experiment evaluation indicated that the effects of transient faults could be exposed by the causal factors of dysfunctional interactions and system safety could be enhanced by the enforcement of appropriate constraints.


Author(s):  
R. V. Kyrychok ◽  
◽  
G. V. Shuklin

The article considers the problem of determining and assessing the quality of the vulnerability validation mechanism of the information systems and networks. Based on the practical analysis of the vulnerability validation process and the analytical dependencies of the basic characteristics of the vulnerability validation quality obtained using the Bernstein polynomials, additional key indicators were identified and characterised, which make it possible to assert with high reliability about the positive progress or consequences of the vulnerability validation of the target corporate network. The intervals of these indicators were experimentally determined at which the vulnerability validation mechanism is of high quality. In addition, during the calculations, a single integral indicator was also derived to quantitatively assess the quality of the vulnerability validation mechanism of the corporate networks, and an experimental study was carried out, as well as the assessment of the quality of the automatic vulnerability validation mechanism of the db_autopwn plugin designed to automate the Metasploit framework vulnerability exploitation tool. As a result, it was proposed the methodology for analysing the quality of the vulnerability validation mechanism in the corporate networks, which allows one to quantify the quality of the validation mechanism under study, which in turn will allow real-time monitoring and control of the validation progress of the identified vulnerabilities. Also, in the study, the dependences of previously determined key performance indicators of the vulnerability validation mechanism on the rational cycle time were obtained, which makes it possible to build the membership functions for the fuzzy sets. The construction of these sets, in particular, allows making decisions with minimal risks for an active analysis of the security of corporate networks.


Author(s):  
William Whitford ◽  
James B. Hoying

 Synergies in bioprinting are appearing from individual researchers focusing on divergent aspects of the technology. Many are now evolving from simple mono-dimensional operations to model-controlled multi-material, interpenetrating networks using multi-modal deposition techniques. Bioinks are being designed to address numerous critical process parameters. Both the cellular constructs and architectural design for the necessary vascular component in digitally biomanufactured tissue constructs is being addressed. Advances are occurring from the topology of the circuits to the source of the of the biological microvessel components. Instruments monitoring and control of these activates are becoming interconnected. More and higher quality data are being collected and analysis is becoming richer. Information management and model generation is now describing a “process network.” This is promising; more efficient use of both locally and imported raw data supporting accelerated strategic as well as tactical decision making. This allows real time optimization of the immediate bioprinting bioprocess based on such high value criteria as instantaneous progress assessment and comparison to previous activities. Finally, operations up- and down-stream of the deposition are being included in a supervisory enterprise control.


Energies ◽  
2018 ◽  
Vol 11 (12) ◽  
pp. 3430 ◽  
Author(s):  
Roberto Casado-Vara ◽  
Zita Vale ◽  
Javier Prieto ◽  
Juan Corchado

The monitoring of the Internet of things networks depends to a great extent on the availability and correct functioning of all the network nodes that collect data. This network nodes all of which must correctly satisfy their purpose to ensure the efficiency and high quality of monitoring and control of the internet of things networks. This paper focuses on the problem of fault-tolerant maintenance of a networked environment in the domain of the internet of things. Based on continuous-time Markov chains, together with a cooperative control algorithm, a novel feedback model-based predictive hybrid control algorithm is proposed to improve the maintenance and reliability of the internet of things network. Virtual sensors are substituted for the sensors that the algorithm predicts will not function properly in future time intervals; this allows for maintaining reliable monitoring and control of the internet of things network. In this way, the internet of things network improves its robustness since our fault tolerant control algorithm finds the malfunction nodes that are collecting incorrect data and self-correct this issue replacing malfunctioning sensors with new ones. In addition, the proposed model is capable of optimising sensor positioning. As a result, data collection from the environment can be kept stable. The developed continuous-time control model is applied to guarantee reliable monitoring and control of temperature in a smart supermarket. Finally, the efficiency of the presented approach is verified with the results obtained in the conducted case study.


Sign in / Sign up

Export Citation Format

Share Document