• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1485
  • 547
  • 296
  • 192
  • 80
  • 32
  • 30
  • 27
  • 22
  • 13
  • 10
  • 10
  • 10
  • 10
  • 10
  • Tagged with
  • 3353
  • 628
  • 610
  • 556
  • 544
  • 412
  • 400
  • 372
  • 364
  • 347
  • 339
  • 337
  • 314
  • 268
  • 256
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

Concurrent detection of transient faults in microprocessors

Khan, Mohammad Ziaullah January 1989 (has links)
A large number of errors in digital systems are due to the presence of transient faults. This is especially true of microprocessor-based systems working in a radiation environment that experience transient faults due to single event upsets. These upsets cause a temporary change in the state of the system without any permanent damage. Because of their random and non-recurring nature, transient faults are difficult to detect and isolate, hence they become a source of major concern, especially in critical real-time application areas. Concurrent detection of these errors is necessary for real-time operation. Most existing fault tolerance schemes either use redundancy to mask effects of transient faults or monitor the system for abnormal operations and then perform recovery operation. Although very effective, redundancy schemes incur substantial overhead that makes them unsuitable for small systems. Most monitoring schemes, on the other hand, only detect control flow errors. A new approach called Concurrent Processor Monitoring for on-line detection of transient faults is proposed that attempts to achieve high error coverage with small error detection latency. The concept of the execution profile of an instruction is defined and is used for detecting control flow and execution errors. To implement this scheme, a watchdog processor is designed for monitoring operation of the main processor. The effectiveness of this technique is demonstrated through computer simulations. / Ph. D.
122

Hardware Fault Attack Detection Methods for Secure Embedded Systems

Deshpande, Chinmay Ravindra 15 February 2018 (has links)
In our daily life, we are increasingly putting our trust in embedded software applications, which run on a range of processor-based embedded systems from smartcards to pay-TV units. This trend expands the threat model of embedded applications from software into hardware. Over the last 20 years, fault attacks have emerged as an important class of hardware attacks against embedded software security. In fault attacks, an adversary breaks the security by injecting well chosen, targeted faults during the execution of embedded software, and systematically analyzing softwares fault response. In this work, we propose cycle-accurate and fully digital techniques that can efficiently detect different types of fault attacks. The detection methods are low-cost regarding the area and power consumption and can be easily implemented using the standard cell based VLSI design flow. In addition to the architecture of the detectors, we present a detailed analysis of the design considerations that affect the cost and accuracy of the detectors. The functionality of the detectors is validated by implementing on ASIC and FPGA platforms (Spartan-6, Cyclone IV). Additionally, the proposed detection methods have demonstrated to successfully detect all of the injected faults without any false alarm. / Master of Science / Embedded systems nowadays play a very crucial role in day to day life. They are always gathering sensitive and private data of the users. So they become an attractive target for the attackers to steal this important data. As a result, the security of these devices has become a grave concern. Fault attacks are a class of hardware attacks where the attacker injects faults into the system while it is executing a known program and observes the reaction. The abnormal reactions of the system are later analyzed to obtain the valuable data. Several mechanisms to detect such attacks exist in the literature, but they are not very effective. In this work, we first analyze the effect of different types of fault attacks on the embedded processor. Then we propose various low-cost digital techniques that can efficiently detect these attacks.
123

The influence of damage on the petrophysical properties of carbonate-hosted fault zones

Michie, Emma A. H. January 2015 (has links)
Carbonate reservoirs contain approximately two-thirds of the world's oil and gas reserves (Al-Anzi et al., 2003). Carbonates often pose a significant problem when it comes to understanding their reservoir quality because of their heterogeneous nature, which is caused by both the variety of processes occurring depositionally and their high susceptibility to diagenetic alterations. In order to fully characterise the behaviour of carbonate rocks in the subsurface is it important to understand their textural heterogeneity and also how faulting can modify their textures. Deformation in fault zones causes the petrophysical properties (e.g. porosity, permeability and velocity) to alter from the background values. For example, fracturing in damage zones surrounding faults increase the permeability, creating conduits to fluids, conversely, fault cores often act as barriers, created by pore occluding processes. However, faulting in carbonate rocks is often complicated by their textural variations, leading to a variety of deformation microstructures, and each will create different petrophysical properties. This thesis aims to understand how faulting effects different carbonate rocks and analyse the controls on any alterations to the petrophysical properties (porosity, permeability and velocity) into the fault zones. Alterations to the permeability are important to unravel in order to assess the fluid flow potential and hydraulic properties of a rock. Understanding the alterations to the velocity can help to better image faults at depth and to provide information on their microstructures.
124

The deep electrical structure of the Great Glen Fault, Scotland

Meju, Maxwell Azuka January 1988 (has links)
No description available.
125

Fault detection using transfer function techniques

Paterson, Neil Ewing January 1987 (has links)
No description available.
126

Fault-tolerant wormhole routing for mesh computers

周繼鵬, Zhou, Jipeng. January 2001 (has links)
published_or_final_version / Computer Science and Information Systems / Doctoral / Doctor of Philosophy
127

Performance and fault-tolerance studies of wormhole routers in 2D meshes

何偉康, Ho, Wai-hong. January 1997 (has links)
published_or_final_version / Electrical and Electronic Engineering / Master / Master of Philosophy
128

Fault detection and fault-tolerant control for dynamic systems

Wang, Haibo., 王海波 January 2002 (has links)
published_or_final_version / Mechanical Engineering / Doctoral / Doctor of Philosophy
129

Precedent-free fault isolation in a diesel engine EGR valve system

Cholette, Michael Edward 25 August 2010 (has links)
An application of a recently introduced framework for isolating unprecedented faults for an automotive engine EGR valve system is presented. Using normal behavior data generated by a high fidelity engine simulation, the Growing Structure Multiple Model System (GSMMS) is used to construct models of normal behavior for EGR valve system and its various subsystems. Using the GSMMS models as a foundation, anomalous behavior of the entire system is then detected as statistically significant departures of the most recent modeling residuals from the modeling residuals during normal behavior. By reconnecting anomaly detectors to the constituent subsystems, the anomaly can be isolated without the need for prior training using faulty data. Furthermore, faults that were previously encountered (and modeled) are recognized using the same approach as the anomaly detectors. / text
130

Visualization of multivariate process data for fault detection and diagnosis

Wang, Ray Chen 02 October 2014 (has links)
This report introduces the concept of three-dimensional (3D) radial plots for the visualization of multivariate large scale datasets in plant operations. A key concept of this representation of data is the introduction of time as the third dimension in a two dimensional radial plot, which allows for the display of time series data in any number of process variables. This report shows the ability of 3D radial plots to conduct systemic fault detection and classification in chemical processes through the use of confidence ellipses, which capture the desired operating region of process variables during a defined period of steady-state operation. Principal component analysis (PCA) is incorporated into the method to reduce multivariate interactions and the dimensionality of the data. The method is applied to two case studies with systemic faults present (compressor surge and column flooding) as well as data obtained from the Tennessee Eastman simulator, which contained localized faults. Fault classification using the interior angles of the radial plots is also demonstrated in the paper. / text

Page generated in 0.0445 seconds