في هذا البحث سنقدم تطبيق لكاشف الأعطال ذو بنية هرمية حيث يعتمد التطبيق على
تقسيم بيئة العمل العامة المكونة من مجموعة من العمليات إلى مجموعات فرعية و
اختيار قائد للمجموعات يدعى بالعملية الرئيسية (المركزية) التي تقوم بتوزيع العمليات
على المجموعات الفرعية و اختيار قائد لكل مجموعة فرعية و من ثم تطبيق كاشف
الأعطال عند القادة الفرعيين و استخلاص النتائج و ارسالها إلى العملية الرئيسية.
In this paper, we propose an implementation of hierarchical failure
detectors, which depends on dividing the processes into sub-groups
and elect one leader called the main process .
The main process then distributes the remaining processes into
groups and chooses one leader for each one.
Finally failure detector applied in the chosen leaders which send the
results to the central process.
References used
T. D. Chandra and S. Toueg, “Unreliable failure detectors for reliable distributed systems,” Journal of the ACM, vol. 43,no. 2, pp. 225-267, 1996
S. Bansal, S. Sharma, and I. Trivedi, “Adaptive staircase multiple failure detector for parallel and distributed image processing” in Proceedings of the 1st International Conference on Recent Advances in Information Technology,Dhanbad,India, 2012, pp. 91-94
W. Chen, S. Toueg, and M. K. Aguilera, “On the quality of service of failure detectors,” IEEE Transactions on Computers, vol. 51, no. 5, pp. 561-580, 2002
Failure detection plays a central role in the engineering of
distributed systems. Furthermore, many applications have timing
constraints and require failure detectors that provide quality of
service (QoS) with some quantitative timeliness guarante
We consider the hierarchical representation of documents as graphs and use geometric deep learning to classify them into different categories. While graph neural networks can efficiently handle the variable structure of hierarchical documents using t
Failure Mode and Effects Analysis (FMEA) is a risk assessment tool that explores, identifies,
and prioritizes the potential failure modes in a system, process, service or design.
The failure modes prioritizing technique used by FMEA has been criticized to have many
deficiencies, and various risk priority models have been proposed in the literature to enhance the
performance of FMEA.
While natural language understanding of long-form documents remains an open challenge, such documents often contain structural information that can inform the design of models encoding them. Movie scripts are an example of such richly structured text
This paper focuses on securing zone routing protocol (ZRP) from
one of the most possible attacks such as bogus route attack and
black hole attack. This paper provides a solution against this attack
using identity based cryptography(IBC), We implement, evaluate
our proposal using NS-2 network Simulator.