This paper covers a reliability analysis as a qualitative method, especially focused on axial piston units. The method is based on Fault Tree Analysis (FTA) and results in risk and reliability assessment at the components level. Especially, the development of the reliability assessment as a methodical tool is the core of the paper. Moreover, the FTA is combined with the industrial standard method known as Design Failure Mode Effects Analysis (DFMEA) which is typically used in the development phase of the design. The evaluation and the usability of the FTA methodology is analyzed in connection with field data. Thus, the deviation of the theoretical valuation from the field data was utilized as a success indicator of the method. The analysis of the fault spreading covers the assessment of component faults and links failure states with unit effects. The analysis of the axial piston unit as a system is made on idealized/theoretical design and functional behavior only. Hence, the failure rating and the effect is subsequently applied to determine the fault risk in form of the Risk Priority Number (RPN). The failure modes and effects are based on engineering experience of past decades, supported by existing DFMEAs of axial piston units. Thus, the assessment of the risk priority number is based on previous data, yielding the given severity, occurrence and detection quantification. This approach opens new opportunities of design assessment and the results show a good agreement to the damage accumulation seen in real field data. Furthermore, the connection between theoretical design assessment and field data do support the failure ranking improvement of the DFMEA.
Abstract-Analyzing a communication protocol by means of simulation and real-world experimentation requires careful protocol implementation in both domains. Differences in the implementation may lead to significantly diverging performance results, which may affect the protocol design process adversely. A code-transparent simulation and experimentation framework for Wireless Access Research Platform (WARP) devices is proposed, which is called WARPsim. By extending the simulation engine appropriately, the same application code that runs on WARP devices can be used for simulation. This work studies the implications of this approach using the example of implementing time-critical Medium Access Control Layer (MAC) protocols on WARP devices. In the demonstration, various MAC protocols will be simulated using WARPsim, while changing protocol parameters, but also crucial aspects of the emulated hardware. A graphical representation integrated into the framework allows for an intuitive examination of the protocol behavior.
The occurrence of similar code, or 'code clones', can make program code difficult to read, modify and maintain. This paper describes industrial case studies of clone detection and elimination, and were were performed in collaboration with engineers from Ericsson AB using the refactoring and clone detection tool Wrangler for Erlang.We use the studies to illustrate the complex set of decisions that have to be taken when performing clone elimination in practice; we also discuss how the studies have informed the design of the tool. However, the conclusions we draw are largely language-independent, and set out the pragmatics of clone detection and elimination in real-world projects as well as design principles for clone detection decision-support tools.Context. The context of this work is the fact that a software tool is designed to be used; the success of such a tool therefore depends on its suitability and usability in practice.The work proceeds by observing the use of a tool in particular case studies in detail, through a "participant observer" approach, and drawing qualitative conclusions from these studies, rather than collecting and analysing quantitative data from a larger set of applications. Our conclusions help not only programmers but also the designers of software tools.Inquiry. Data collected in this way make two kinds of contribution. First, they provide the basis for deriving a set of questions that typically need to be answered by engineers in the process of removing clones from an application, and a set of heuristics that can be used to help answer these questions. Secondly, they provide feedback on existing features of software tools, as well as suggesting new features to be added to the tools.Approach. The work was undertaken by the tool designers and engineers from Ericsson AB, working together on clone elimination for code from the company.Knowledge. The work led to a number of conclusions, at different levels of generality. At the top level, there is overwhelming evidence that the process of clone elimination cannot be entirely automated, and needs to include the input of engineers familiar with the domain in question.Furthermore, there is strong evidence that the automated tools are sensitive to a set of parameters, which will differ for different applications and programming styles, and that individual clones can be over-and under-identified: again, involving those with knowledge of the code and the domain is key to successful application.Grounding. The work is grounded in "participant observation" by the tool builders, who made detailed logs of the processes undertaken by the group.Importance. The work gives guidelines that assist an engineer in using clone detection and elimination in practice, as well as helping a tool developer to shape their tool building. Although the work was in the context of a particular tool and programming language, the authors would argue that the high-level knowledge gained applies equally well to other notions of clone, as well as other tools and programm...
This article deals with the comparison of the energy consumption of the hydraulic control system of the working mechanisms of the telescopic excavator UDS 114. There is described the hydraulic system of the excavator. In order to compare the individual losses in the hydraulic circuits for controlling the working mechanisms, the hydraulic oil flow rates through the OTC H50 meter were measured. Firstly, for the machine before a repair and subsequently after the repair. For each hydraulic circuit, the hydraulic oil flow rates between the pump and the distributor and then between the distributor and the appliance were measured at first. The overall power losses of the hydraulic circuit is then determined from particular calculations. From these calculated power losses of individual hydraulic circuits, the efficiency of individual hydraulic circuits in the state of the machine before and after repair was evaluated.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.