تعداد نشریات | 418 |
تعداد شمارهها | 9,987 |
تعداد مقالات | 83,495 |
تعداد مشاهده مقاله | 76,810,029 |
تعداد دریافت فایل اصل مقاله | 53,906,634 |
An Evolutionary Method for Improving the Reliability of Safetycritical Robots against Soft Errors | ||
journal of Artificial Intelligence in Electrical Engineering | ||
مقاله 2، دوره 3، شماره 12، خرداد 2015، صفحه 8-17 اصل مقاله (654.84 K) | ||
نویسندگان | ||
Mahnaz Mohammadzadeh؛ Bahman Arasteh | ||
چکیده | ||
Nowadays, Robots account for most part of our lives in such a way that it is impossible for us to do many of affairs without them. Increasingly, the application of robots is developing fast and their functions become more sensitive and complex. One of the important requirements of Robot use is a reliable software operation. For enhancement of reliability, it is a necessity to design the fault tolerance system. In this paper, we will present a genetic algorithm and learning automata with high reliability to evaluate the software designed into the robot against soft-error with minimum performance over-head. This method relies on experiment; hence, we use the program sets as criteria in evaluation stages. Indeed, we have used the error injection method in the execution of experimental processes. Relevant data, regarding program execution behavior were collected and then analyzed. To evaluate the behavior of program, errors entered using the simple scalar simulation software. | ||
کلیدواژهها | ||
Soft-Error؛ Fault tolerance؛ Retrieval Blocks Technique؛ Evolutionary Algorithms | ||
مراجع | ||
1] Rajabzadeh, G. Miremadi and M. Mohandespour (1999). Error detection enhancement in COTS superscalar processors with performance monitoring features,Journal of Electronic Testing: Theory Application(JETTA), 20(5), pp. 553–67, 2004 [2] Profeta, N. Andrianos, Yu. Bing, B. Johnson, T.DeLong and D.Guaspart, (1996). Safetycritical systems built with COTS, Computer, 29(11), pp.54–60. [3] P. Tso and P. Galaviz, (1999). Improved aircraft readiness through COTS, In IEEE systems readiness technology conference (AUTOTESTCON_99), pp. 451–6. [4] M.Jafari-Nodoushan, G.Miremadi and A.Ejlali (2008). Control-Flow Checking Using Branc Instructions, In Proceeding of the 8th International Conference on Embedded and Ubiquitous Computing, 2008. [5] Yenier, U. (2003). Fault Tolerant Computing in Space Environment and Software Implemented Hardware Fault Tolerance Techniques, Technical Report, Department of Computer Engineering, Bosphorus University, Istanbul. [6] A. Benso, S. Di Carlo, G. Di Natale, P. Prinetto, L.Tagliaferri, (2003). “Data Criticality Estimation in SoftwareAppliction” ,INTERNATIONAL TEST CONFERENCE [7] D. Borodin and B.H.H. Juurlink, (2010). ” Protective Redundancy Overhead Reduction Using Instruction Vulnerability Factor”, ACM ,CF’10, Italy [8] Shuguang Feng, Shantanu Gupta, Amin Ansari and Scott Mahlke (2010). “Shoestring: Probabilistic Soft-error Resilience on the Cheap,” in ASPLOS. [9] D. Thaker, D. Franklin, J. Oliver, S. Biswas, D. Lockhart, T. Metodi, and F. T. Chong (2006). “Characterization ofError-Tolerant Applications when Protecting Control Data,”In Proc. of the IEEE Int’l Symp. on Workload Characterization. [10] K. pattabiraman, Z. Kalbarczyk, R. Iyer (2011). “Automated Derivation of Application Aware Error Detectors Using Static Analysis: Trusted Approach”, IEEE Transaction on Dependable and Secure Computing, Volume 8 , Issue 5. [11] T. Vijaykumar, I. Pomeranz and K. Chen, (2002). “ Transient Fault Recovery using Simultance Multithreading” , in 29th Internationa Symosium on Computer Architecture (ISCA). [12] Benso, S. Chiusano, P. Prinetto. L. Tagliaferri (2000). “C/C++ Source-to-Source Compiler for Dependable Applications”, in IEEE International Conference on Dependable systems and Networks (DSN Mahnaz Mohammadzadeh, Bahman Arasteh: An Evolutionary Method for Improving… 17 [13] A. Benso, S. Di Carlo, G. Di Natale, P. Prinetto, L. Tagliaferri, (2003). “Data Criticality Estimation in Software Application”, in International Test Conference, pp. 802-810. [14] B.Arasteh., A.Rahmani., A.Mansoor, GH.Miremadi (2012). ” Using Genetic Algorithm to Identify Soft-Error Derating Blocks of an Application Program”,EuromicroConference on Digital System Design, [15] D. E. Goldberg, (1989). “Genetic Algorithms in Search,Optimization and Machine Learning”, Reading, MA,Addition-Wesley. [16] P. Mars, K. S. Narendra, and M. Chrystall (1983). “Learning Automata Control of ComputerCommunication Networks”,Proceedings of Third Yale Workshop on Application of Adaptive Systems Theory, Yale University [17] K. S. Narendra, and M. A. L. Thathachar (1989). “Learning Automata: An Introduction”, Prentice-hall, Englewood cliffs. [18] M. R. Meybodi, and S. Lakshmivarhan, (1983). “A Learning Approach to Priority Assignment in a Two Class M/M/1Queuing System with Unknown Parameters”, Proceedings of Third Yale Workshop on Applications of Adaptive System Theory, Yale University, 106-109 [19] B. J. Oommen, and D. C. Y. Ma, (1988). “Deterministic Learning Automata Solution to the Keyboard Optimization Problem”,IEEE Transaction on Computers, Vol. 37, No. 1, 2-3 [20] Narendra, K.S. and Thathachar, M.A.L. (1989). “Learning Automata: An Introduction”, Prentice Hall, Inc [21] M. R. Meybodi, H. Beigy. (2002). Utilizing Distributed Learning Automata to Solve Stochastic Shortest Path Problem. Technical Report, Soft Computing Laboratory, Computer Engineering Department, Amirkabir University of Technology. | ||
آمار تعداد مشاهده مقاله: 889 تعداد دریافت فایل اصل مقاله: 711 |