G Pahuja - Academia.edu (original) (raw)
Papers by G Pahuja
Applied Mechanics and Materials, 2014
Redundancy allocation (RA) is one of the important approaches to improve system reliability by in... more Redundancy allocation (RA) is one of the important approaches to improve system reliability by incorporating generally s-identical and s-independent components. However in the presence of common cause failures (CCF), a rarely studied problem as Redundancy optimization, the optimized system reliability may be adversely affected. In this paper the effect of CCF on Reliability Optimization using Redundancy Allocation has been expedited. The paper is implemented in two steps. Step1 involves obtaining the optimized solution of the problem using existing techniques. In the next step, modifications are done to compute optimized system reliability under CCF. The optimized reliability expression is modified to depict the effect of CCF. The work is extended to complex network analysis & implicit method has been used to do this work. The adverse effect of CCF on system reliability has also been demonstrated quantitatively with the help of example.
2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2018
Systems such as aircraft control need very high levels of reliability, so redundancy is adopted f... more Systems such as aircraft control need very high levels of reliability, so redundancy is adopted for acquiring the same. The reliability of the system gets affected due to the coverage. When a component in a system fails, the detection and isolation of the system are less than perfect. This is called as coverage. Fault Coverage Model is of two types, Perfect Fault Coverage Mode (PFCM) and Imperfect Fault Coverage Mode (IFCM). In PFCM, coverage is perfect i.e. its value is unity while in IFCM, coverage is not perfect i.e. it can take any value other than unity. Flight Control System (FCS) also falls under this category. FCS consists of sensor, computer, actuator and two communication channel. In this paper, three different configurations of FCS are considered in terms of Redundancy Corporation. For all the three systems, reliability indices for both PFCM and IFCM have been calculated by considering communication channel as perfect and imperfect. It has been observed that IFCM reliabil...
In present paper three heuristics algorithms to optimize the problem of constrained redundancy al... more In present paper three heuristics algorithms to optimize the problem of constrained redundancy allocation in complex system are described and used to allocate redundancy in a manufacturing system namely pharmaceutical plant. Computational procedures of proposed algorithms are outlined. These algorithms are applied to find the best redundancy strategy, combination of components, and levels of redundancy for each subsystem in order to maximize the system reliability under cost constraints.Results of these algorithms are compared to get best possible solution for the proposed problem. Key Words –Redundancy, Optimization, Heuristic Method, Reliability. 1.
Microgrids (MGs) give solutions for energy management in power systems. It is an important part o... more Microgrids (MGs) give solutions for energy management in power systems. It is an important part of the energy system to have a local generation of power from renewable energy sources to meet power demands with high efficiency and minimum operating cost. Optimization architecture of MG for optimal dispatch is established in this paper considering thermal diesel generating units (DGs), wind power generation, and solar photovoltaic units (PVs) as renewable sources of energy and energy storage system (ESS). Considering the islanded operating mode of MG, the system modeling is done in IEEE modified 33-bus system. Injection of renewable energy and localized power generation allows grid operators to meet their energy needs without having to purchase power from the grid. The purpose of this paper is to optimize power allocation of the given system to reduce the cost of operation and have an efficient dispatch of power in MG taking into account renewable power generation and energy storage t...
The paper presents a new heuristic algorithm for determining optimal redundancy allocation of com... more The paper presents a new heuristic algorithm for determining optimal redundancy allocation of complex networks. Th e present algorithm is an iterative method; all the paths of the network are first arranged in decreasing order of their priority determined using a path sensitivity factor, the highest priority path is optimized first by adding redundant components for suof the path iteratively based on proposed subsystem selection factor. In case of availability of any residual resources next lower priority paths are considered for redundancy allocation. The proposed algorithm not only demonstrates improved performance in comparison with most of the existing heuristic algorithms but also leaves minimum slack of components without any further possibility of redundancy.
Risk analysis of a system is important to guarantee the quality and safety operation of a system.... more Risk analysis of a system is important to guarantee the quality and safety operation of a system. To identify the risky or critical components and to prioritize the safety improvements, Importance Measures (IM) play vital role. Risk analysis of a system using cost based importance measures is essential for system cost-risk analysis to reduce the maintenance cost. This paper presents the cost-risk analysis of Substation Automation System (SAS) using existing Cost Importance Measure (CIM) and an advanced cost based importance measure i.e NCIM which is easier, computationally more accurate and produce necessary ranking. The non cost based importance measures criticality, Fussel-Vesely (FV) and cost based importance measures CIM and NCIM for redundant cascading architecture of SAS have been determined. The results of criticality, FV, CIM and NCIM measures have been compared and the cost based importance measures yield more useful information compared to non cost based importance measure...
Redundancy Optimization (RO) remained as a regular practice for reliability optimization of any s... more Redundancy Optimization (RO) remained as a regular practice for reliability optimization of any systems since a long time ago. This practice is being carried out either at component level or system level with identical elements. This demands selection of right component or subsystem to improve the overall reliability. For component selection of a simple system, existing heuristic approach does not consume ample time, but it increases the time and computational complexity once the system becomes complex. Hence, a new approach has been proposed here for redundancy optimization. In this approach, the algorithm is developed to search the highest reliable path for optimization, rather than searching for weak components in all possible paths unlike in existing heuristic methods. The highest reliable path is now considered as main path and second highest reliable path as back up path. Further to mitigate the root cause of Common Cause Failures (CCF), design divergent components have been i...
AbstractMultistage Interconnection Networks (MIN) play vital role in routing of large data for hi... more AbstractMultistage Interconnection Networks (MIN) play vital role in routing of large data for highly efficient parallel processors and hence their designing is an important factor which decides the performance of these systems. So MIN are required to be highly reliable and fault tolerant. To increase the fault tolerance of MIN beyond its fixed limit extra hardware in form of extra stage has been added in past. But with the increased number of paths between each sourcedestination (S-D) node pair, it does not provide disjoint paths while adding extra hardware complexity and cost to the network. Hence reliability does not improve as expected. Recently a new method has been proposed in literature to increase reliability of networks by making use of MUX and DEMUX at input and output terminals respectively and acclaimed highest reliability. In this paper the method of using MUX and DEMUX has been used for all other counterparts of one of the regular MIN that is Shuffle Exchange Network (...
Delays appear often in all real world engineering systems. Delay systems have the property that t... more Delays appear often in all real world engineering systems. Delay systems have the property that the rate of variation in the system state depends on the previous states also. They are frequently a source of instability and poor system performance. In order to get the required performance from the delay system controller design plays a vital role. Because of the robust nature, easy structure Proportional Integral Derivative (PID) controllers are extensively used in many industrial loops. Parameter tuning of the PID controller is an essential task. Numerous industrial processes, whose transfer function is of first order, can be easily controlled with PI controllers. This paper presents the comparative analysis of an approach based on Lambert W function for PI controller design for first order systems with time delay among Smith predictor (SP) and ZeiglerNichols (ZN) methods of design. Performance of the considered methods in terms of various performance specifications through simulati...
The paper presents a Genetic Algorithm (GA) approach for solving constrained reliability redundan... more The paper presents a Genetic Algorithm (GA) approach for solving constrained reliability redundancy optimization of general systems. The advanced GA technique uses a dynamic adaptive penalty function to consider the infeasible solutions also and guides the search to optimal or near optimal solution. The penalty technique is applied to keep a certain amount of infeasible solutions in each generation so as to enforce genetic search towards an optimal solution from both the sides of feasible and infeasible regions. The performance of the method is compared with GA tool Box of MATLAB.
Reliability evaluation of a complex network is mostly done by exact and approximate approaches. R... more Reliability evaluation of a complex network is mostly done by exact and approximate approaches. Redundancy allocation (with s-identical and s-independent components) is one of the commonly used techniques for reliability optimization. But the occurrence of common cause failure (CCF) defeats the benefit of redundancy optimization. To validate the same, we have presented five exact approaches to evaluate the reliability of complex network. Also extended the work to evaluate and compare the reliability of the same network under CCF. To incorporate the CCFs in reliability evaluation, conditional probability approach is used. The qualitative and quantitative analysis of the evaluation process is discussed by implementing on a complex network with five subsystems. It includes the process of reliability optimization, process to incorporate CCF, quantitative demonstration of the concept with five evaluation methods, observations and conclusions.
2015 International Conference on Energy, Power and Environment: Towards Sustainable Growth (ICEPE), 2015
Multistage Interconnection Networks (MIN), characterized by minimum latency, high Bandwidth & Thr... more Multistage Interconnection Networks (MIN), characterized by minimum latency, high Bandwidth & Throughput and cost effectiveness as compared to counterparts, embedded in parallel and multiprocessing systems allow faster communication of data related to nuclear reactor and nuclear fusion in effective and efficient generation of electricity along with decision making and functioning of the system. Reliability and Fault Tolerance of different variants of SEN MIN such as SEN, SEN+, SEN+2 exist in literature. Recently reliability evaluation of SEN-has been advanced. Limitations such as no full connectivity, Single path availability have been figured out by us and also (i) a new topology of SEN-has been purposed that mitigates the limitations, and (ii) Terminal reliability of purposed network has been computed and demonstrated that it not only outperforms other SEN variants in terms of terminal reliability and cost but has the improved features of fault tolerance and disjoint minimal lengt...
2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA), 2019
Recent renewable energy system is heavily dependent upon power electronic devices like multilevel... more Recent renewable energy system is heavily dependent upon power electronic devices like multilevel converter (MLC), for integrating renewable energy sources to the grid or to provide power to loads in islanding mode. However, the power electronic switches used in these converters have high failure rates (approximately 34%). Therefore reliability study of these converters is of paramount importance. Most of the research has been done to develop an efficient, cost-effective, fault-tolerant topology and to reduce the number of device count, but reliability study of these topologies has not been explored much. In this paper, comparison of some of the existing five-level topologies has been made on the basis of device count, peak device current, number of dc voltage sources and capacitors required to produce the same peak output voltage. The best among these topologies are selected for reliability modeling and evaluation. The failure rate of different elements of this topology is computed...
Invertis Journal of Science & Technology, 2020
TMR (Triple Modular Redundancy) is the most widely used Redundancy Technique in digital circuits.... more TMR (Triple Modular Redundancy) is the most widely used Redundancy Technique in digital circuits. TMR hides the fault before spreading it through the rest of the system. In this paper, we propose a modular common-mode fault tolerating NMR (N Modular Redundancy) system capable of tolerating permanent, transient and intermittent faults that also indicates the number of modules that are faulty in the system, generally this later feature uncommon in existing techniques. It can also tolerate compensating module failures. It utilizes a word voter instead of conventional bit-bybit voter. The proposed modular design is valid for NMR and is demonstrated for 3MR. To the best of our knowledge, no single technique or design exists having all these features. Keywords—Availability, Common mode failure, Compensating module failure, Data integrity, Redundancy, Stuck-at-faults, TMR. Acronyms. AVTMR: All Voting TMR F: Fault condition FIM: Fault Injection Mechanism FIOM: Fault Indicating Output Module...
Multistage interconnection networks (MINs) provide an effective way to communicate between proces... more Multistage interconnection networks (MINs) provide an effective way to communicate between processors and memory modules in supercomputer systems. Although shuffle-exchange network (SEN) is viewed as a potential network to manage as MIN for its regular structure and most modest size of switching element (SE), the fault tolerance is an issue in SEN because it is a unique path network. Many networks have been introduced in the past to increase the fault tolerance in the SEN such as SEN−, SEN+, SEN+2, SHSEN. It has been observed that all these networks provide maximum of one fault tolerance at input/output stage. In this paper, a new network has been proposed as FTSM (fault-tolerant SEN-Minus), which addresses the fault tolerance issue with increased number of totally disjoint paths, thus improving the reliability of the entire network. To assure that reliability has been improved and increased, a thorough comparison of 2-terminal reliability has been done with all other SENs.
International Journal of Communication Networks and Distributed Systems
The mobile ad hoc networks (MANETs) are an infrastructure-less network consisting of a collection... more The mobile ad hoc networks (MANETs) are an infrastructure-less network consisting of a collection of wireless mobile self-directed nodes that communicate with each other without using any centralised authority. MANET is a network in which large numbers of powered mobile nodes are used but the network has always suffered from limited power resource problem due to the mobility nature of nodes. So, in the proposed work we have focused on the least power utilisation by developing an artificial intelligence-based enhanced leach (E-LEACH) routing protocol and designed a hybrid neuro-soft computing technique for the problem. The proposed solution is effective in solving the power resource problem and trust management in MANETs. This work has found a reliable solution to the route optimisation problem in E-LEACH protocol. The whole framework has been titled as energy efficient neuro genetic leach (EENG LEACH). Various performance metrics as throughput, bit error rate (BER), packet delivery ratio (PDR), congestion and energy consumption have been calculated to authenticate the proposed method.
2015 1st International Conference on Next Generation Computing Technologies (NGCT), 2015
A method to generate disjoint spanning trees and hence to compute source to all terminal (SAT) re... more A method to generate disjoint spanning trees and hence to compute source to all terminal (SAT) reliability of acyclic directed networks is proposed in this paper. SAT reliability of a directed network is defined as the probability that there exists a minimal spanning tree from source node to all terminal nodes of the network. The method initiates with a specific directed spanning tree and produces all the disjoint spanning trees by exploiting the knowledge of the specific directed spanning tree. In literature various methods exist to determine SAT reliability of undirected networks with two step approach and most of the methods are arduous and lengthy so making these inefficient. The proposed method generates all the disjoint directed spanning trees in a simple and straightforward manner. The method is efficient as it involves minimum number of terms in reliability expression. Also, no duplicate spanning trees are formed during the process of spanning tree generation. The method is illustrated with the help of examples and its efficacy and simplicity has been demonstrated by comparing it with existing methods.
Applied Mechanics and Materials, 2014
Redundancy allocation (RA) is one of the important approaches to improve system reliability by in... more Redundancy allocation (RA) is one of the important approaches to improve system reliability by incorporating generally s-identical and s-independent components. However in the presence of common cause failures (CCF), a rarely studied problem as Redundancy optimization, the optimized system reliability may be adversely affected. In this paper the effect of CCF on Reliability Optimization using Redundancy Allocation has been expedited. The paper is implemented in two steps. Step1 involves obtaining the optimized solution of the problem using existing techniques. In the next step, modifications are done to compute optimized system reliability under CCF. The optimized reliability expression is modified to depict the effect of CCF. The work is extended to complex network analysis & implicit method has been used to do this work. The adverse effect of CCF on system reliability has also been demonstrated quantitatively with the help of example.
2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2018
Systems such as aircraft control need very high levels of reliability, so redundancy is adopted f... more Systems such as aircraft control need very high levels of reliability, so redundancy is adopted for acquiring the same. The reliability of the system gets affected due to the coverage. When a component in a system fails, the detection and isolation of the system are less than perfect. This is called as coverage. Fault Coverage Model is of two types, Perfect Fault Coverage Mode (PFCM) and Imperfect Fault Coverage Mode (IFCM). In PFCM, coverage is perfect i.e. its value is unity while in IFCM, coverage is not perfect i.e. it can take any value other than unity. Flight Control System (FCS) also falls under this category. FCS consists of sensor, computer, actuator and two communication channel. In this paper, three different configurations of FCS are considered in terms of Redundancy Corporation. For all the three systems, reliability indices for both PFCM and IFCM have been calculated by considering communication channel as perfect and imperfect. It has been observed that IFCM reliabil...
In present paper three heuristics algorithms to optimize the problem of constrained redundancy al... more In present paper three heuristics algorithms to optimize the problem of constrained redundancy allocation in complex system are described and used to allocate redundancy in a manufacturing system namely pharmaceutical plant. Computational procedures of proposed algorithms are outlined. These algorithms are applied to find the best redundancy strategy, combination of components, and levels of redundancy for each subsystem in order to maximize the system reliability under cost constraints.Results of these algorithms are compared to get best possible solution for the proposed problem. Key Words –Redundancy, Optimization, Heuristic Method, Reliability. 1.
Microgrids (MGs) give solutions for energy management in power systems. It is an important part o... more Microgrids (MGs) give solutions for energy management in power systems. It is an important part of the energy system to have a local generation of power from renewable energy sources to meet power demands with high efficiency and minimum operating cost. Optimization architecture of MG for optimal dispatch is established in this paper considering thermal diesel generating units (DGs), wind power generation, and solar photovoltaic units (PVs) as renewable sources of energy and energy storage system (ESS). Considering the islanded operating mode of MG, the system modeling is done in IEEE modified 33-bus system. Injection of renewable energy and localized power generation allows grid operators to meet their energy needs without having to purchase power from the grid. The purpose of this paper is to optimize power allocation of the given system to reduce the cost of operation and have an efficient dispatch of power in MG taking into account renewable power generation and energy storage t...
The paper presents a new heuristic algorithm for determining optimal redundancy allocation of com... more The paper presents a new heuristic algorithm for determining optimal redundancy allocation of complex networks. Th e present algorithm is an iterative method; all the paths of the network are first arranged in decreasing order of their priority determined using a path sensitivity factor, the highest priority path is optimized first by adding redundant components for suof the path iteratively based on proposed subsystem selection factor. In case of availability of any residual resources next lower priority paths are considered for redundancy allocation. The proposed algorithm not only demonstrates improved performance in comparison with most of the existing heuristic algorithms but also leaves minimum slack of components without any further possibility of redundancy.
Risk analysis of a system is important to guarantee the quality and safety operation of a system.... more Risk analysis of a system is important to guarantee the quality and safety operation of a system. To identify the risky or critical components and to prioritize the safety improvements, Importance Measures (IM) play vital role. Risk analysis of a system using cost based importance measures is essential for system cost-risk analysis to reduce the maintenance cost. This paper presents the cost-risk analysis of Substation Automation System (SAS) using existing Cost Importance Measure (CIM) and an advanced cost based importance measure i.e NCIM which is easier, computationally more accurate and produce necessary ranking. The non cost based importance measures criticality, Fussel-Vesely (FV) and cost based importance measures CIM and NCIM for redundant cascading architecture of SAS have been determined. The results of criticality, FV, CIM and NCIM measures have been compared and the cost based importance measures yield more useful information compared to non cost based importance measure...
Redundancy Optimization (RO) remained as a regular practice for reliability optimization of any s... more Redundancy Optimization (RO) remained as a regular practice for reliability optimization of any systems since a long time ago. This practice is being carried out either at component level or system level with identical elements. This demands selection of right component or subsystem to improve the overall reliability. For component selection of a simple system, existing heuristic approach does not consume ample time, but it increases the time and computational complexity once the system becomes complex. Hence, a new approach has been proposed here for redundancy optimization. In this approach, the algorithm is developed to search the highest reliable path for optimization, rather than searching for weak components in all possible paths unlike in existing heuristic methods. The highest reliable path is now considered as main path and second highest reliable path as back up path. Further to mitigate the root cause of Common Cause Failures (CCF), design divergent components have been i...
AbstractMultistage Interconnection Networks (MIN) play vital role in routing of large data for hi... more AbstractMultistage Interconnection Networks (MIN) play vital role in routing of large data for highly efficient parallel processors and hence their designing is an important factor which decides the performance of these systems. So MIN are required to be highly reliable and fault tolerant. To increase the fault tolerance of MIN beyond its fixed limit extra hardware in form of extra stage has been added in past. But with the increased number of paths between each sourcedestination (S-D) node pair, it does not provide disjoint paths while adding extra hardware complexity and cost to the network. Hence reliability does not improve as expected. Recently a new method has been proposed in literature to increase reliability of networks by making use of MUX and DEMUX at input and output terminals respectively and acclaimed highest reliability. In this paper the method of using MUX and DEMUX has been used for all other counterparts of one of the regular MIN that is Shuffle Exchange Network (...
Delays appear often in all real world engineering systems. Delay systems have the property that t... more Delays appear often in all real world engineering systems. Delay systems have the property that the rate of variation in the system state depends on the previous states also. They are frequently a source of instability and poor system performance. In order to get the required performance from the delay system controller design plays a vital role. Because of the robust nature, easy structure Proportional Integral Derivative (PID) controllers are extensively used in many industrial loops. Parameter tuning of the PID controller is an essential task. Numerous industrial processes, whose transfer function is of first order, can be easily controlled with PI controllers. This paper presents the comparative analysis of an approach based on Lambert W function for PI controller design for first order systems with time delay among Smith predictor (SP) and ZeiglerNichols (ZN) methods of design. Performance of the considered methods in terms of various performance specifications through simulati...
The paper presents a Genetic Algorithm (GA) approach for solving constrained reliability redundan... more The paper presents a Genetic Algorithm (GA) approach for solving constrained reliability redundancy optimization of general systems. The advanced GA technique uses a dynamic adaptive penalty function to consider the infeasible solutions also and guides the search to optimal or near optimal solution. The penalty technique is applied to keep a certain amount of infeasible solutions in each generation so as to enforce genetic search towards an optimal solution from both the sides of feasible and infeasible regions. The performance of the method is compared with GA tool Box of MATLAB.
Reliability evaluation of a complex network is mostly done by exact and approximate approaches. R... more Reliability evaluation of a complex network is mostly done by exact and approximate approaches. Redundancy allocation (with s-identical and s-independent components) is one of the commonly used techniques for reliability optimization. But the occurrence of common cause failure (CCF) defeats the benefit of redundancy optimization. To validate the same, we have presented five exact approaches to evaluate the reliability of complex network. Also extended the work to evaluate and compare the reliability of the same network under CCF. To incorporate the CCFs in reliability evaluation, conditional probability approach is used. The qualitative and quantitative analysis of the evaluation process is discussed by implementing on a complex network with five subsystems. It includes the process of reliability optimization, process to incorporate CCF, quantitative demonstration of the concept with five evaluation methods, observations and conclusions.
2015 International Conference on Energy, Power and Environment: Towards Sustainable Growth (ICEPE), 2015
Multistage Interconnection Networks (MIN), characterized by minimum latency, high Bandwidth & Thr... more Multistage Interconnection Networks (MIN), characterized by minimum latency, high Bandwidth & Throughput and cost effectiveness as compared to counterparts, embedded in parallel and multiprocessing systems allow faster communication of data related to nuclear reactor and nuclear fusion in effective and efficient generation of electricity along with decision making and functioning of the system. Reliability and Fault Tolerance of different variants of SEN MIN such as SEN, SEN+, SEN+2 exist in literature. Recently reliability evaluation of SEN-has been advanced. Limitations such as no full connectivity, Single path availability have been figured out by us and also (i) a new topology of SEN-has been purposed that mitigates the limitations, and (ii) Terminal reliability of purposed network has been computed and demonstrated that it not only outperforms other SEN variants in terms of terminal reliability and cost but has the improved features of fault tolerance and disjoint minimal lengt...
2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA), 2019
Recent renewable energy system is heavily dependent upon power electronic devices like multilevel... more Recent renewable energy system is heavily dependent upon power electronic devices like multilevel converter (MLC), for integrating renewable energy sources to the grid or to provide power to loads in islanding mode. However, the power electronic switches used in these converters have high failure rates (approximately 34%). Therefore reliability study of these converters is of paramount importance. Most of the research has been done to develop an efficient, cost-effective, fault-tolerant topology and to reduce the number of device count, but reliability study of these topologies has not been explored much. In this paper, comparison of some of the existing five-level topologies has been made on the basis of device count, peak device current, number of dc voltage sources and capacitors required to produce the same peak output voltage. The best among these topologies are selected for reliability modeling and evaluation. The failure rate of different elements of this topology is computed...
Invertis Journal of Science & Technology, 2020
TMR (Triple Modular Redundancy) is the most widely used Redundancy Technique in digital circuits.... more TMR (Triple Modular Redundancy) is the most widely used Redundancy Technique in digital circuits. TMR hides the fault before spreading it through the rest of the system. In this paper, we propose a modular common-mode fault tolerating NMR (N Modular Redundancy) system capable of tolerating permanent, transient and intermittent faults that also indicates the number of modules that are faulty in the system, generally this later feature uncommon in existing techniques. It can also tolerate compensating module failures. It utilizes a word voter instead of conventional bit-bybit voter. The proposed modular design is valid for NMR and is demonstrated for 3MR. To the best of our knowledge, no single technique or design exists having all these features. Keywords—Availability, Common mode failure, Compensating module failure, Data integrity, Redundancy, Stuck-at-faults, TMR. Acronyms. AVTMR: All Voting TMR F: Fault condition FIM: Fault Injection Mechanism FIOM: Fault Indicating Output Module...
Multistage interconnection networks (MINs) provide an effective way to communicate between proces... more Multistage interconnection networks (MINs) provide an effective way to communicate between processors and memory modules in supercomputer systems. Although shuffle-exchange network (SEN) is viewed as a potential network to manage as MIN for its regular structure and most modest size of switching element (SE), the fault tolerance is an issue in SEN because it is a unique path network. Many networks have been introduced in the past to increase the fault tolerance in the SEN such as SEN−, SEN+, SEN+2, SHSEN. It has been observed that all these networks provide maximum of one fault tolerance at input/output stage. In this paper, a new network has been proposed as FTSM (fault-tolerant SEN-Minus), which addresses the fault tolerance issue with increased number of totally disjoint paths, thus improving the reliability of the entire network. To assure that reliability has been improved and increased, a thorough comparison of 2-terminal reliability has been done with all other SENs.
International Journal of Communication Networks and Distributed Systems
The mobile ad hoc networks (MANETs) are an infrastructure-less network consisting of a collection... more The mobile ad hoc networks (MANETs) are an infrastructure-less network consisting of a collection of wireless mobile self-directed nodes that communicate with each other without using any centralised authority. MANET is a network in which large numbers of powered mobile nodes are used but the network has always suffered from limited power resource problem due to the mobility nature of nodes. So, in the proposed work we have focused on the least power utilisation by developing an artificial intelligence-based enhanced leach (E-LEACH) routing protocol and designed a hybrid neuro-soft computing technique for the problem. The proposed solution is effective in solving the power resource problem and trust management in MANETs. This work has found a reliable solution to the route optimisation problem in E-LEACH protocol. The whole framework has been titled as energy efficient neuro genetic leach (EENG LEACH). Various performance metrics as throughput, bit error rate (BER), packet delivery ratio (PDR), congestion and energy consumption have been calculated to authenticate the proposed method.
2015 1st International Conference on Next Generation Computing Technologies (NGCT), 2015
A method to generate disjoint spanning trees and hence to compute source to all terminal (SAT) re... more A method to generate disjoint spanning trees and hence to compute source to all terminal (SAT) reliability of acyclic directed networks is proposed in this paper. SAT reliability of a directed network is defined as the probability that there exists a minimal spanning tree from source node to all terminal nodes of the network. The method initiates with a specific directed spanning tree and produces all the disjoint spanning trees by exploiting the knowledge of the specific directed spanning tree. In literature various methods exist to determine SAT reliability of undirected networks with two step approach and most of the methods are arduous and lengthy so making these inefficient. The proposed method generates all the disjoint directed spanning trees in a simple and straightforward manner. The method is efficient as it involves minimum number of terms in reliability expression. Also, no duplicate spanning trees are formed during the process of spanning tree generation. The method is illustrated with the help of examples and its efficacy and simplicity has been demonstrated by comparing it with existing methods.