The paper focuses on the role of version redundancy, which increases with the expansion of critical applications and the tightening of their functional safety requirements. International standards governing these requ...
ISBN:
(数字)9781728199573
ISBN:
(纸本)9781728199580
The paper focuses on the role of version redundancy, which increases with the expansion of critical applications and the tightening of their functional safety requirements. International standards governing these requirements have already fixed the importance of version redundancy to counter common cause failures in safety-related systems. The problem of hidden faults inherent in these systems is equally acute, undermining confidence in the fault tolerance of circuit solutions important for functional safety. We suggest that this problem be seen as a growth problem where the system rises to the level of diversification in modes of operation by dividing them into normal and emergency and checkability circuits, but components continue to be stamped at a lower level of replication. Then the solution to the problem is to raise the components to the level of the system by developing their version redundancy. We demonstrate this development for FPGA components with LUT-oriented architecture and offer a method to improve the FPGA-ready project by natural version redundancy of its program code. The method generates a set of program code versions and selects versions that improve the checkability of circuits with respect to constant faults and the trustworthiness of results, respectively, in normal and emergency mode to reduce a set of hidden faults. The method is illustrated by an iterative array multiplier implemented in an FPGA project. Versions are generated, evaluated, and selected using the program developed for this.
In this paper, the embedding of m-polar fuzzy graphs which constructed on the surface of spheres is introduced. The m-polar fuzzy genus graphs with its genus value, strong and weak m-polar fuzzy genus graph are define...
详细信息
The algebraic structures have many applications in coding theory, cryptography, and security networks. In this paper, the notion of hybrid subalgebras of BCH-algebras is introduced and related properties are investiga...
详细信息
In this article, a new idea of fuzzy coloring of m-polar fuzzy graph is presented while establishing the relationship between chromatic number of m-polar fuzzy graph and it's underlying crisp graph. Some propertie...
详细信息
The methods of nonlinear adaptation based on an analytical design of aggregated regulators and modal control are discussed for solving the problem of nonlinear control over a robotic arm operating under the conditions...
详细信息
ISBN:
(数字)9781728188409
ISBN:
(纸本)9781728181134
The methods of nonlinear adaptation based on an analytical design of aggregated regulators and modal control are discussed for solving the problem of nonlinear control over a robotic arm operating under the conditions of nonrandom noise. A comparative analysis of control is performed under different types of noise variables. It is shown that both control systems are adaptive and robust, while their transient process quality characteristics differ. The results of numerical modeling support the method of nonlinear adaptation as far as the value of overshoot is concerned in the case of nonrandom noise and evidence in favor of the method of modal control identifying the noise for off-design conditions (random high level noise).
Phishing is a type of cyber-attack aiming to steal people's confidential information using a bait. Smishing is a form of phishing that is carried out via SMS messages sent to mobile phones. Attackers intend to ste...
详细信息
ISBN:
(纸本)9781728139937
Phishing is a type of cyber-attack aiming to steal people's confidential information using a bait. Smishing is a form of phishing that is carried out via SMS messages sent to mobile phones. Attackers intend to steal the private information of their victims through the content they send in their SMS messages. Therefore, the detection of smishing messages has a vital role in information security. In this work, a machine learning-based model is proposed to detect smishing messages. Experiments conducted on a relatively large dataset, which contains legitimate and smishing messages, have shown that the proposed model offers a promising detection performance.
Biocomputing and molecular biology are areas that change knowledge and skills for acquisition, storing, management, analysis, interpretation and dissemination of biological information. This requires the utilization o...
详细信息
ISBN:
(纸本)9781728146188
Biocomputing and molecular biology are areas that change knowledge and skills for acquisition, storing, management, analysis, interpretation and dissemination of biological information. This requires the utilization of high performance computers and innovative software tools for management of the vast information, as well as deployment of innovative algorithmic techniques for analysis, interpretation and prognostication of data in order to get to insight of the design and validation of life-science experiments. Sequence alignment is an important method in DNA and protein analysis. The paper describes the computational challenges in biological sequence processing. The great challenges are to propose parallel computational models and parallel program implementations based on the algorithms for biological sequence alignment. An investigation of the efficiency of sequence alignment based on parallel multithreaded program implementation of Needleman-Wunsch algorithm is presented in this paper. Parallel computational model based on Needleman-Wunsch algorithm is designed. The proposed parallel model is verified by multithreaded parallel program implementation utilizing OpenMP. A number of experiments have been carried out for the case of various data sets and a various number of threads. Parallel performance parameters execution time and speedup are estimated experimentally. The performance estimation and scalability analyses show that the suggested model has good scalability both in respect to the workload and machine size.
This study discusses the relationship between perceived stress and emotional eating based on shiftwork in city bus drivers. It was conducted with 1403 male city bus drivers working in Istanbul. Questions about the dri...
详细信息
This study discusses the relationship between perceived stress and emotional eating based on shiftwork in city bus drivers. It was conducted with 1403 male city bus drivers working in Istanbul. Questions about the drivers’ physical activity and dietary habits, the Healthy Diet Index (HDI), Emotional Appetite Questionnaire and Perceived Stress Scale-10 data were collected and evaluated in two groups: shift and non-shift employees. It was found that the shift workers (SWs) have lower perceived stress, physical activity, HDI and positive emotional appetite averages. In addition, for SWs, a positive correlation was found between negative emotional appetite scores and physical activity and HDI scores. In conclusion, the drivers working in shifts were found to be slightly overweight and had lower physical activity levels, had lower HDI scores, and their nutritional status was more negatively impacted than their counterparts.
The paper presents a new technique for the botnets' detection in the corporate area networks. It is based on the usage of the algorithms of the artificial immune systems. Proposed approach is able to distinguish b...
详细信息
暂无评论