To establish trust in the measurement results, the metrological traceability of the measuring devices utilized must be ensured. This can be accomplished by confirming or calibrating the instruments. In reality, the in...
详细信息
Fulfilling increasing performance demands of space and automotive applications can be problematic as high dependability is required. Memory is one of the most radiationsensitive parts, so it is often protected with in...
Fulfilling increasing performance demands of space and automotive applications can be problematic as high dependability is required. Memory is one of the most radiationsensitive parts, so it is often protected with information redundancy. This paper describes an integration of error correction and detection techniques into the interface of RISC-V processor to protect the data stored in the memory. We also provide a hardware-software interface for reporting errors and software routines for correcting data in memory. Our solution has a negligible impact (-3.9%) on the overall performance of the core with a small area and power consumption overhead.
The use of blockchain technologies and Smart contracts to improve the quality of Microgrid network management is considered. The necessity of using a special mathematical apparatus for system analysis is noted, taking...
详细信息
The theses is in line with works aimed at studying the possibility of using mathematical algorithms for parallel processing of information in reverse blockchain technology. The paper examines the use of parallel signa...
详细信息
Safety/mission-critical applications require high dependability of the control systems. Their state-of-the-art protection approach is a system-level lockstep. This paper compares the system-level dual and triple locks...
详细信息
ISBN:
(数字)9798350377569
ISBN:
(纸本)9798350377576
Safety/mission-critical applications require high dependability of the control systems. Their state-of-the-art protection approach is a system-level lockstep. This paper compares the system-level dual and triple lockstep technique to the microarchitecture-level protection of the Hardisc RISC-V core. For a fair comparison, each system is based on the same core(s) and integrates protection against bit-flips in memory and transient faults in the bus. We propose a fault injection methodology, combining pre-synthesis simulation with synthesis data to analyse the vulnerability of a system to faults. The fault injection campaigns show that the Hardisc can withstand fault rates orders of magnitude higher than the dual-core lockstep system while preserving the same area and power consumption. It comes with a 5% frequency penalty. We have shown that system failures are more frequent once the fault rate reaches an application-specific threshold (one fault in 100 clock cycles).
Mission/safety-critical applications rely on the dependability of their semiconductor control systems. The lockstepping is state-of-the-art when it comes to their protection. This paper compares the dual/triple lockst...
详细信息
ISBN:
(数字)9798350380385
ISBN:
(纸本)9798350380392
Mission/safety-critical applications rely on the dependability of their semiconductor control systems. The lockstepping is state-of-the-art when it comes to their protection. This paper compares the dual/triple lockstep systems with the Hardisc, which features microarchitecture-level protection. For a fair comparison, each system is based on the same architecture and integrates protection against bit-flips in memory and transient faults in the bus. We analyse how individual structures of the system affect the vulnerability of a system to faults. Our fault injection methodology combines pre-synthesis simulation with synthesis data to scale the fault rate of the structures according to their size. The results show that the Hardisc can withstand fault rates orders of magnitude higher than the dual-core lockstep system while preserving the same area and power consumption. It comes with a 5% frequency penalty. The pipeline logic has the most significant impact on the vulnerability of the lockstep system. On the other hand, the ECC-protected register file constraints the maximum failure rate the Hardisc can withstand due to fault accumulation during specific program sections.
Increasing bus frequency to fulfill the performance requirements of dependable applications may increase the susceptibility of the system to transient faults. This paper describes an integration of protection against ...
Increasing bus frequency to fulfill the performance requirements of dependable applications may increase the susceptibility of the system to transient faults. This paper describes an integration of protection against transient bus faults into the interface of the Hardisc RISC-V core. The protection is based on information redundancy with spatial redundancy features. It enables uninterrupted execution in the presence of transient faults and provides a hardware-software interface for its reporting. The benchmarking results indicate that most of the applications will be impacted minimally. The protection has a negligible impact on the maximal frequency and 8% area and power consumption overhead.
A semi-analytical finite element method(SAFEM),based on the two-scale asymptotic homogenization method(AHM)and the finite element method(FEM),is implemented to obtain the effective properties of two-phase fiber-reinfo...
详细信息
A semi-analytical finite element method(SAFEM),based on the two-scale asymptotic homogenization method(AHM)and the finite element method(FEM),is implemented to obtain the effective properties of two-phase fiber-reinforced composites(FRCs).The fibers are periodically distributed and unidirectionally aligned in a homogeneous *** framework addresses the static linear elastic micropolar problem through partial differential equations,subject to boundary conditions and perfect interface contact *** mathematical formulation of the local problems and the effective coefficients are presented by the *** local problems obtained from the AHM are solved by the FEM,which is denoted as the *** numerical results are provided,and the accuracy of the solutions is analyzed,indicating that the formulas and results obtained with the SAFEM may serve as the reference points for validating the outcomes of experimental and numerical computations.
As the demand for reliable and accurate electricity metering escalates in the digital era, traditional systems increasingly need to improve due to their centralized nature, prone to inaccuracies, privacy breaches, and...
详细信息
ISBN:
(数字)9798350365597
ISBN:
(纸本)9798350365603
As the demand for reliable and accurate electricity metering escalates in the digital era, traditional systems increasingly need to improve due to their centralized nature, prone to inaccuracies, privacy breaches, and cybersecurity threats. This paper proposes a novel solution that harnesses the transformative power of Blockchain and Internet of Things (IoT) technologies to address these critical challenges. By integrating the immutable ledger capabilities of blockchain with the real-time data acquisition prowess of IoT, we introduce a decentralized system that ensures the secure and transparent measurement and billing of electricity for domestic consumers. Adopting Hyperledger Fabric within our framework offers a robust, scalable architecture that supports secure transactions and enhances trust through digital identities for all participants. This system mitigates the vulnerabilities associated with centralized authorities and efficiently monitors and manages energy consumption with unprecedented precision. Through this approach, we aim to revolutionize the electricity metering infrastructure, providing a blueprint for future advancements in the energy sector.
In order to achieve the goal of a carbon-neutral power system, significant changes to the power grid are underway, necessitating enhanced interoperability between Transmission System Operators (TSOs) and Distribution ...
详细信息
暂无评论