An Evolutionary Method for Improving the Reliability of Safetycritical Robots against Soft Errors
الموضوعات : journal of Artificial Intelligence in Electrical EngineeringMahnaz Mohammadzadeh 1 , Bahman Arasteh 2
1 -
2 -
الکلمات المفتاحية: Soft-Error, Fault tolerance, Retrieval Blocks Technique, Evolutionary Algorithms,
ملخص المقالة :
Nowadays, Robots account for most part of our lives in such a way that it is impossible for usto do many of affairs without them. Increasingly, the application of robots is developing fastand their functions become more sensitive and complex. One of the important requirements ofRobot use is a reliable software operation. For enhancement of reliability, it is a necessity todesign the fault tolerance system. In this paper, we will present a genetic algorithm andlearning automata with high reliability to evaluate the software designed into the robotagainst soft-error with minimum performance over-head. This method relies on experiment;hence, we use the program sets as criteria in evaluation stages. Indeed, we have used the errorinjection method in the execution of experimental processes. Relevant data, regardingprogram execution behavior were collected and then analyzed. To evaluate the behavior ofprogram, errors entered using the simple scalar simulation software.
1] Rajabzadeh, G. Miremadi and M.
Mohandespour (1999). Error detection
enhancement in COTS superscalar processors
with performance monitoring features,Journal
of Electronic Testing: Theory
Application(JETTA), 20(5), pp. 553–67, 2004
[2] Profeta, N. Andrianos, Yu. Bing, B. Johnson,
T.DeLong and D.Guaspart, (1996). Safetycritical
systems built with COTS, Computer,
29(11), pp.54–60.
[3] P. Tso and P. Galaviz, (1999). Improved
aircraft readiness through COTS, In IEEE
systems readiness technology conference
(AUTOTESTCON_99), pp. 451–6.
[4] M.Jafari-Nodoushan, G.Miremadi and A.Ejlali
(2008). Control-Flow Checking Using Branc
Instructions, In Proceeding of the 8th
International Conference on Embedded and
Ubiquitous Computing, 2008.
[5] Yenier, U. (2003). Fault Tolerant Computing
in Space Environment and Software
Implemented Hardware Fault Tolerance
Techniques, Technical Report, Department of
Computer Engineering, Bosphorus University,
Istanbul.
[6] A. Benso, S. Di Carlo, G. Di Natale, P.
Prinetto, L.Tagliaferri, (2003). “Data
Criticality Estimation in SoftwareAppliction”
,INTERNATIONAL TEST CONFERENCE
[7] D. Borodin and B.H.H. Juurlink, (2010). ”
Protective Redundancy Overhead Reduction
Using Instruction Vulnerability Factor”, ACM
,CF’10, Italy
[8] Shuguang Feng, Shantanu Gupta, Amin Ansari
and Scott Mahlke (2010). “Shoestring:
Probabilistic Soft-error Resilience on the
Cheap,” in ASPLOS.
[9] D. Thaker, D. Franklin, J. Oliver, S. Biswas,
D. Lockhart, T. Metodi, and F. T. Chong
(2006). “Characterization ofError-Tolerant
Applications when Protecting Control Data,”In
Proc. of the IEEE Int’l Symp. on Workload
Characterization.
[10] K. pattabiraman, Z. Kalbarczyk, R. Iyer
(2011). “Automated Derivation of Application
Aware Error Detectors Using Static Analysis:
Trusted Approach”, IEEE Transaction on
Dependable and Secure Computing, Volume 8
, Issue 5.
[11] T. Vijaykumar, I. Pomeranz and K. Chen,
(2002). “ Transient Fault Recovery using
Simultance Multithreading” , in 29th
Internationa Symosium on Computer
Architecture (ISCA).
[12] Benso, S. Chiusano, P. Prinetto. L. Tagliaferri
(2000). “C/C++ Source-to-Source Compiler
for Dependable Applications”, in IEEE
International Conference on Dependable
systems and Networks (DSN
Mahnaz Mohammadzadeh, Bahman Arasteh: An Evolutionary Method for Improving…
17
[13] A. Benso, S. Di Carlo, G. Di Natale, P.
Prinetto, L. Tagliaferri, (2003). “Data
Criticality Estimation in Software
Application”, in International Test Conference,
pp. 802-810.
[14] B.Arasteh., A.Rahmani., A.Mansoor,
GH.Miremadi (2012). ” Using Genetic
Algorithm to Identify Soft-Error Derating
Blocks of an Application
Program”,EuromicroConference on Digital
System Design,
[15] D. E. Goldberg, (1989). “Genetic Algorithms
in Search,Optimization and Machine
Learning”, Reading, MA,Addition-Wesley.
[16] P. Mars, K. S. Narendra, and M. Chrystall
(1983). “Learning Automata Control of
ComputerCommunication
Networks”,Proceedings of Third Yale
Workshop on Application of Adaptive
Systems Theory, Yale University
[17] K. S. Narendra, and M. A. L. Thathachar
(1989). “Learning Automata: An
Introduction”, Prentice-hall, Englewood cliffs.
[18] M. R. Meybodi, and S. Lakshmivarhan,
(1983). “A Learning Approach to Priority
Assignment in a Two Class M/M/1Queuing
System with Unknown Parameters”,
Proceedings of Third Yale Workshop on
Applications of Adaptive System Theory, Yale
University, 106-109
[19] B. J. Oommen, and D. C. Y. Ma, (1988).
“Deterministic Learning Automata Solution to
the Keyboard Optimization Problem”,IEEE
Transaction on Computers, Vol. 37, No. 1, 2-3
[20] Narendra, K.S. and Thathachar, M.A.L.
(1989). “Learning Automata: An
Introduction”, Prentice Hall, Inc
[21] M. R. Meybodi, H. Beigy. (2002). Utilizing
Distributed Learning Automata to Solve
Stochastic Shortest Path Problem. Technical
Report, Soft Computing Laboratory, Computer
Engineering Department, Amirkabir
University of Technology.