作者:
CERMINARA, JKOTACKA, ROJohn Cerminara:is a principal engineer with Westinghouse Machinery Technology Division
Electrical Systems Department. He holds a B.S. degree in electrical engineering from the University of Pittsburgh. He is a registered professional engineer and a member of IEEE ASNE and the Ship Steering Group of the Combat Survivability Division of ADPA. Mr. Cerminara has had over 30 years of multidiscipline experience ranging from engineering and construction in heavy industry to standards and publications. Past assignments include DOE/ NASA wind turbine project manager for Westinghouse and task leader of MTD electrical systems. Most recent assignments have included hull mechanical and electrical (HM&E) distributive system survivability analyses of the LSD-41 mobility mission area and application and validation of NavSea computer-aided design of Survivable Distributive System (CADSDiS) Program. Rolf O. Kotacka:is presently a ship systems engineer in the Ship Systems Engineering Branch of the Naval Sea Systems Command Engineering Directorate
where his primary responsibility is ship system survivability. He is a 1977 graduate of SUNY Maritime College where he received his bachelor of engineering degree in marine electrical engineering as well as a U.S. Coast Guard Third Assistant Engineer License and a commission in the U. S. Naval Reserve. Upon graduation Mr. Kotacka was employed by Charleston Naval Shipyard as a field engineer until 1981 where he gained his background in surface ship HM&E systems and equipment. He then transferred to the Supervisor of Shipbuilding Conversion and Repair Groton where he served as a senior electrical engineer monitoring the design and construction of Trident and 688 class submarines and received the Meritorious Unit Citation. Prior to his present position Mr. Kotacka was the life cycle manager for diesel generator sets in the Naval Sea Systems Command's Generators Branch. He has coauthored several papers dealing with power generation for ASE and SNAME. Mr. Kotacka is also a lieutena
This paper highlights the survivability concerns in the design of ship service power systems. The paper gives a brief description of what constitutes a typical ship service electric power system and concentrates on el...
详细信息
This paper highlights the survivability concerns in the design of ship service power systems. The paper gives a brief description of what constitutes a typical ship service electric power system and concentrates on electric power generation and associated controls. Established survivability design principles and guidelines are highlighted and the application of those guidelines are discussed. General Specifications (Gen Specs) for Ships of the U.S. Navy are cited as the cornerstone for design. Specific design criteria are cited as well as the rationale associated with the survivability design guidelines pertaining to power generation and distribution. The application of these survivability design guidelines plus the use of the deactivation diagram/damage tolerance analysis cited in the Gen Spec section 072e will enhance overall design and help ensure survivable electric power systems for surface combatants.
A testbed-based approach to the evaluation of fault-tolerant distributed computing schemes is discussed. The approach is based on experimental incorporation of system structuring and design techniques into real-time d...
详细信息
A testbed-based approach to the evaluation of fault-tolerant distributed computing schemes is discussed. The approach is based on experimental incorporation of system structuring and design techniques into real-time distributed computing testbeds centered around tightly coupled microcomputer networks. The effectiveness of this approach has been confirmed through some experiments conducted in the author's laboratory. Primary advantages of the testbed-based approach include the relatively high accuracy of the data obtained on timing and logical complexity as well as the relatively high degree of assurance that can be obtained on the practical effectiveness of the scheme evaluated. This paper discusses various design issues encountered in the course of establishing the basic microcomputer network testbed facilities and augmenting them to support some experiments conducted. The shortcomings of the testbeds that have been recognized are also discussed together with the desired extensions of the testbeds. Some of the desired extensions are beyond the state of the art in microcomputer network implementation. [ABSTRACT FROM AUTHOR]
作者:
PAKZAD, SComputer Engineering Program
Department of Electrical Engineering The Pennsylvania State University University Park Pennsylvania 16802 USA
The issue of the fault tolerance of interconnection networks has received considerable attention since the last decade. The theoretical framework developed by J. P. Shen and J. P. Hays ( IEEE Trans. Comput. C-33 , 3 (...
详细信息
The issue of the fault tolerance of interconnection networks has received considerable attention since the last decade. The theoretical framework developed by J. P. Shen and J. P. Hays ( IEEE Trans. Comput. C-33 , 3 (Mar. 1984), 241–248) and extended by S. Pakzad and S. Lakshmivarahan ( Internat. J. Comput. Syst. Sci. Engrg. 3 , 2 (April 1988), 91–99) can be used as a guideline to analyze the fault tolerance behavior of the interconnection networks in a multicomputer environment. This paper analyzes the fault tolerance characteristics of a range of rearrangeable β-networks based on the concepts and the framework developed by S. Pakzad and S. Lakshmivarahan (cited earlier). These rearrangeable β-networks include the Benes network, the Waksman network, the Joel network, and the serial network. In addition, this paper presents a comparative analysis of the aforementioned networks according to their hardware cost, performance, and degree of fault tolerance.
A new single-key-lock (SKL) mechanism used for implementing the access matrix of the computer protection system is proposed. The key selection is very flexible. The lock values are generated recursively based on the N...
详细信息
A new single-key-lock (SKL) mechanism used for implementing the access matrix of the computer protection system is proposed. The key selection is very flexible. The lock values are generated recursively based on the Newton's interpolating polynomial. The insertion of a new user/file into the system can be successfully implemented without recomputing all locks/keys. [ABSTRACT FROM AUTHOR]
We report the observation of electrically induced changes in transmissivity in Fabry-Perot devices consisting of spin-cast azo-dye/polymer films deposited between gold mirrors. In poled samples the observed modulation...
详细信息
We report the observation of electrically induced changes in transmissivity in Fabry-Perot devices consisting of spin-cast azo-dye/polymer films deposited between gold mirrors. In poled samples the observed modulation shows a linear dependence on the applied modulating voltage. The ratio of the transmissivity modulation observed using incident transverse magnetic polarization to that observed using transverse electric polarization is used to demonstrate that the electrooptic effect dominates the modulation. This is, to our knowledge, the first reported use of a polymeric thin film linear electrooptic material in a Fabry-Perot structure and demonstrates the use of etalons to enhance electrooptic effects in very thin films.
The Monte Carlo method is rapidly becoming the model of choice for simulating light transport in tissue. This paper provides all the details necessary for implementation of a Monte Carlo program. Variance reduction sc...
详细信息
This paper proposes a new ID-based cryptographic scheme for implementing public-key cryptosystem and signature. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to...
详细信息
Several different approaches are discussed for implementing conversations in loosely coupled distributed computer systems (DCSs). Important implementation factors considered include the control of exits of processes o...
详细信息
Several different approaches are discussed for implementing conversations in loosely coupled distributed computer systems (DCSs). Important implementation factors considered include the control of exits of processes on completion of their conversation tasks and the approach to execution of the conversation acceptance test. Two different exit control strategies, one in a synchronous manner and the other in an asynchronous manner, and three different approaches to execution of the conversation acceptance test, centralized, decentralized, and semi-centralized, are examined and compared in terms of system performance and implementation cost. The effectiveness of these execution approaches also depends on the way conversations are structured initially by program designers. Therefore, the two major types of conversation structures, name-linked recovery block and abstract data type conversations are examined to analyze which execution approaches are the most efficient for each conversation structure. These results provide guidelines for implementing conversations in loosely coupled DCSs.< >
A novel ID-based cryptographic scheme for implementing a public-key cryptosystem and signature is proposed. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to cho...
详细信息
A novel ID-based cryptographic scheme for implementing a public-key cryptosystem and signature is proposed. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to choose his/her name or network address as his/her public key. This eliminates the needs of a large public field and the exchange of private or public keys. The major advantage of the ID-based cryptosystem based on this scheme over other published ID-based cryptosystems is that the number of users can be extended to t*L users without degrading the system's security even when users conspire, where L is the number of the system's secrets, and t is the number of factors in p-1, where p is a large prime number.< >
A password authentication mechanism based on the public-key distribution cryptosystem is proposed. The scheme uses an authentication table to replace the traditional password file. With this scheme, even if the authen...
详细信息
A password authentication mechanism based on the public-key distribution cryptosystem is proposed. The scheme uses an authentication table to replace the traditional password file. With this scheme, even if the authentication table is comprised, the system security is preserved. The user's password is effectively bound to the user's identification in a timely, efficient, and simple manner.< >
暂无评论