redundancy management
Recently Published Documents


TOTAL DOCUMENTS

129
(FIVE YEARS 16)

H-INDEX

11
(FIVE YEARS 1)

2021 ◽  
pp. 663-676
Author(s):  
Liping Ren ◽  
Zhijun Liu ◽  
Hao Song ◽  
Zhiguo Li ◽  
Sixian Sun

2020 ◽  
Author(s):  
Asha Garg ◽  
Uma H. R. ◽  
Usha G. ◽  
Amitabh Saraf

Most modern fighter aircraft are multi-role by design and rely heavily on a number of systems that are computer controlled in real time for achieving the most optimal performance. This paper presents three important real time control systems designed for the Indian Light Combat Aircraft. These are the flight control system, the anti-skid brake control system and the environment control system. Design objectives for these systems along with a description of their various hardware elements, software architecture and design concepts have been presented here. All the systems house extremely critical functions during different phases of flight, and so are designed for high degrees of reliability and extremely low failure probabilities. The concepts adopted for redundancy management, failure identification and failure handling are also presented.


2020 ◽  
Vol 20 (5) ◽  
pp. 1644-1660
Author(s):  
B. Biju Prasad ◽  
N. Biju ◽  
M. R. Radhakrishna Panicker ◽  
K. Kumar ◽  
V. Murugesan

2020 ◽  
Vol 12 (6) ◽  
pp. 168781402093045
Author(s):  
Wending Li ◽  
Guanglin Shi

This paper explores three methods for electro-hydraulic actuator redundancy management strategies based on fuzzy aggregation, Mamdani’s fuzzy logic rules, and fuzzy neural network theory. These intelligent management schemes and implementation strategies are studied for a designed hardware-independent redundancy loop. Fault identification and isolation and system reconstruction are performed by combining fuzzy clustering with Mamdani’s fuzzy control, a fuzzy neural network, and redundancy management. Simulation analyses of the three algorithms are performed and loop simulation models are established based on the analysis algorithm. The methods proposed in this paper can solve the problem of misjudgment encountered in traditional methods and can also avoid uncertain states in the system.


2020 ◽  
Vol 11 (2) ◽  
pp. 96-107
Author(s):  
V. N. Bukov ◽  
◽  
A. M. Ageev ◽  
A. M. Maltsev ◽  
◽  
...  

Author(s):  
Vijander Singh ◽  
Ramesh C. Poonia ◽  
Linesh Raja ◽  
Gourav Sharma ◽  
Narendra Kumar Trivedi ◽  
...  

Intrusion detection system (IDS) is a software application that gives the facility to monitor the traffic of network, event, or activities on networks and finds if any malicious operation occurs. Hackers use different types of attacks to capture the information and use brute force attacks to match the authenticated key with the key, which the hacker has in its stable. When there is a match, the hacker gets the authenticated key through which he can connect with the hotspot or AP. IDS finds invalid or any other misbehavior in the system. The protocol will take care of it; protocol checks the MAC address of the device which wishes to connect with the hotspot or AP, and if any device repeatedly enters a wrong password, the protocol will gives a pop up on the administrator system. The objective of this chapter is to provide information about the protocol that behaves like IDS and is pre-implemented in the routers, which gives the alert to the administrator if any intruder tries to connect with the hotspot or AP (access point) with the rapid wrong key.


Sign in / Sign up

Export Citation Format

Share Document