• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 349
  • 61
  • 49
  • 48
  • 13
  • 11
  • 11
  • 11
  • 11
  • 11
  • 11
  • 9
  • 9
  • 8
  • 8
  • Tagged with
  • 666
  • 400
  • 218
  • 166
  • 114
  • 111
  • 109
  • 103
  • 92
  • 70
  • 64
  • 55
  • 54
  • 53
  • 52
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

The use of performability in the design of communication networks

Sesmun, Amardiya January 1997 (has links)
No description available.
22

Timed Fault Tolerant Supervisory Control

Alsuwaidan, Amal January 2016 (has links)
With the ever growing complexity of computer-controlled systems, the need for discrete- event systems has emerged. Many contributions have been done to improve and dis- cuss discrete-event system properties. In this thesis, we investigate the problem of fault tolerance in timed discrete-event systems. Our goal is to establish a timed fault tolerant supervisory control approach. We start by presenting our settings and providing different fault scenarios. We then provide four fault tolerant definitions to verify that the system will remain controllable in each scenario. Also, we introduce algorithms to verify timed controllability for each scenario. We implement a tool extension for the software research tool, DESpot, to verify timed controllability. Furthermore, we implement a tool extension to verify fault tolerant untimed controllability and nonblocking, and timed fault tolerant controllability for the fault scenarios. Finally, we present a simple example to illustrate our approach. / Thesis / Master of Applied Science (MASc)
23

Evaluation of soybean performance following multiple exposures to sub-lethal rates of dicamba

Corban, Nelson 09 August 2019 (has links)
In 2017, dicamba formulations were labeled for PRE and POST applications and utilized in soybean to control herbicide-resistant weed species. Dicamba-tolerant soybean cultivars were grown in proximity to those representing other herbicide-resistant technologies, creating the potential for problems with off-target movement. Field studies conducted in 2017 and 2018 in Stoneville, MS, characterized the soybean response to exposure to sub-lethal rates of different dicamba formulations and evaluated the performance of soybean cultivars representing different soybean maturity groups following multiple exposures to a sub-lethal rate of dicamba. Other field experiments in 2018 evaluated the performance of soybean following a single exposure to sub-lethal rates of dicamba at different growth stages (Rate and Timing Study) and characterized soybean response to multiple exposures of a sub-lethal rate of dicamba at different growth stages (Multiple Exposures Study).
24

Low-cost assertion-based fault tolerance in hardware and software

Vemu, Ramtilak, 1981- 10 October 2012 (has links)
In the recent past, there has been an increasing demand for low-cost safety critical applications. Custom-off-the-shelf (COTS) processors are preferred for usage in these applications due to their low cost. The reliability provided by these processors, however, is not sufficient to meet the safety requirements of these applications. Furthermore, due to the trends followed by the processor industry to enhance the performance of processors, the reliability provided by these processors is projected to decrease in the future. Traditional techniques for enhancing the reliability of computer systems are not viable for these applications due to the high overheads (and hence cost) incurred by them. This thesis describes fault tolerance techniques tailored for these applications, adhering to the tight overhead constraints in the area, memory, and performance dimensions. Techniques at both the hardware level (to be used by the processor manufacturers) and the software level (to be used by the application developers) are presented. At the hardware level, this thesis presents a technique for detecting faults in the processor control logic, for which techniques proposed previously incur very high overheads. Rather than detect all modeled faults, the technique protects against a subset of faults such that the best possible overall protection is achieved while incurring only permissible overheads. This subset of faults is selected depending on the probability of each individual fault causing damage to the architectural state of the processor and the overhead incurred in protecting against the fault. The technique is validated on control logic modules of an industrial processor. At the software level, this thesis concentrates on a category of errors called control flow errors. We describe an error detection technique which incurs lower overheads than any of the previously proposed techniques while at the same time detecting more errors than all of them. Even these low overheads may be too restrictive for some applications. For such applications, we present a technique for providing the best error detection capability possible at the overheads allowed. Once an error is detected, error recovery actions need to be performed. In this thesis, we present an error correction technique which automatically performs error recovery with a very low latency. The technique reuses the information available from the error detection technique to perform the recovery and hence, does not incur any additional performance penalty. All the techniques proposed at the software level have been integrated with GCC, a commonly used software compiler. This permits the fault tolerance to be incorporated into the application automatically as part of the compilation process itself. Evaluations are performed on SPEC and MiBench benchmark programs using an in-house software error injection framework. / text
25

Fault-tolerant wormhole routing for mesh computers

周繼鵬, Zhou, Jipeng. January 2001 (has links)
published_or_final_version / Computer Science and Information Systems / Doctoral / Doctor of Philosophy
26

Performance and fault-tolerance studies of wormhole routers in 2D meshes

何偉康, Ho, Wai-hong. January 1997 (has links)
published_or_final_version / Electrical and Electronic Engineering / Master / Master of Philosophy
27

A proof methodology for verification of real-time and fault-tolerance properties of distributed programs.

Hay, Karen June. January 1993 (has links)
From the early days of programming, the dependability of software has been a concern. The development of distributed systems that must respond in real-time and continue to function correctly in spite of hardware failure have increased the concern while making the task of ensuring dependability more complex. This dissertation presents a technique for improving confidence in software designed to execute on a distributed system of fail-stop processors. The methodology presented is based on a temporal logic augmented with time intervals and probability distributions. A temporal logic augmented with time intervals, Bounded Time Temporal Logic (BTTL), supports the specification and verification of real-time properties such as, "The program will poll the sensor every t to T time units." Analogously, a temporal logic augmented with probability distributions, Probabilistic Bounded Time Temporal Logic (PBTTL), supports reasoning about fault-tolerant properties such as, "The program will complete with probability less than or equal to p", and a combination of these properties such as, "The program will complete within t and T time units with probability less than or equal to p." The syntax and semantics of the two logics, BTTL and PBTTL, are carefully developed. This includes development of a program state model, state transition model, message passing system model and failure system model. An axiomatic program model is then presented and used for the development of a set of inference rules. The inference rules are designed to simplify use of the logic for reasoning about typical programming language constructs and commonly occurring programming scenarios. In addition to offering a systematic approach for verifying typical behaviors, the inference rules are intended to support the derivation of formulas expressing timing and probabilistic relationships between the execution times and probabilities of individual statements, groups of statements, message passing and failure recovery. Use of the methodology is demonstrated in examples of varying complexity, including five real-time examples and four combined real-time and fault-tolerant examples.
28

Growth and development of sorghum in relation to drought tolerance

Terry, Andrew Charles January 1989 (has links)
No description available.
29

Development of a fault tolerant flight control system

Feldstein, Cary Benjamin. 10 April 2008 (has links)
No description available.
30

Engineering Mutation-Tolerant Genes

January 2019 (has links)
abstract: Ideas from coding theory are employed to theoretically demonstrate the engineering of mutation-tolerant genes, genes that can sustain up to some arbitrarily chosen number of mutations and still express the originally intended protein. Attention is restricted to tolerating substitution mutations. Future advances in genomic engineering will make possible the ability to synthesize entire genomes from scratch. This presents an opportunity to embed desirable capabilities like mutation-tolerance, which will be useful in preventing cell deaths in organisms intended for research or industrial applications in highly mutagenic environments. In the extreme case, mutation-tolerant genes (mutols) can make organisms resistant to retroviral infections. An algebraic representation of the nucleotide bases is developed. This algebraic representation makes it possible to convert nucleotide sequences into algebraic sequences, apply mathematical ideas and convert results back into nucleotide terms. Using the algebra developed, a mapping is found from the naturally-occurring codons to an alternative set of codons which makes genes constructed from them mutation-tolerant, provided no more than one substitution mutation occurs per codon. The ideas discussed naturally extend to finding codons that can tolerate t arbitrarily chosen number of mutations per codon. Finally, random substitution events are simulated in both a wild-type green fluorescent protein (GFP) gene and its mutol variant and the amino acid sequence expressed from each post-mutation is compared with the amino acid sequence pre-mutation. This work assumes the existence of synthetic protein-assembling entities that function like tRNAs but can read k nucleotides at a time, with k greater than or equal to 5. The realization of this assumption is presented as a challenge to the research community. / Dissertation/Thesis / Masters Thesis Biomedical Engineering 2019

Page generated in 0.035 seconds