IBM Journal of Research and Development最新文献

筛选
英文 中文
Active disturbance rejection control of a permanent magnet synchronous generator for wind turbine applications 风力发电用永磁同步发电机的自抗扰控制
IF 1.3 4区 计算机科学
IBM Journal of Research and Development Pub Date : 2021-06-30 DOI: 10.35429/jrd.2021.19.7.9.21
M. A. Aguilar-Orduña, H. Sira-Ramírez
{"title":"Active disturbance rejection control of a permanent magnet synchronous generator for wind turbine applications","authors":"M. A. Aguilar-Orduña, H. Sira-Ramírez","doi":"10.35429/jrd.2021.19.7.9.21","DOIUrl":"https://doi.org/10.35429/jrd.2021.19.7.9.21","url":null,"abstract":"With sight on maximizing the amount of energy that can be extracted, by a wind turbine, from the wind, this article solves the maximum power point tracking problem for a permanent magnet synchronous generator-based horizontal wind turbine connected to the electrical grid. A three-phase back-to-back converter, which allows a decoupling between the electrical grid and the generator, is employed as an interphase between the wind turbine and the utility grid. Based on the mathematical model in the synchronous reference frame and taking advantage of the differential flatness property the system exhibits, controllers based on the active disturbance rejection methodology are designed, in this work, to track the curve of maximum extracted power from the wind and manage the generated electricity into the grid. At the same time, the phase angle of the electricity generated is synchronized with the phase angle of the electrical grid. Numerical simulations are performed to support the controllers presented in this work.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76482081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and simulation of Dynamic Voltage Restorer (DVR) supported by solar panels 太阳能电池板支撑的动态电压恢复器(DVR)的设计与仿真
IF 1.3 4区 计算机科学
IBM Journal of Research and Development Pub Date : 2021-06-30 DOI: 10.35429/jrd.2021.19.7.31.36
Omar Antonio-Lara, P. García-Vite, R. Castillo-Gutiérrez, H. Cisneros-Villegas
{"title":"Design and simulation of Dynamic Voltage Restorer (DVR) supported by solar panels","authors":"Omar Antonio-Lara, P. García-Vite, R. Castillo-Gutiérrez, H. Cisneros-Villegas","doi":"10.35429/jrd.2021.19.7.31.36","DOIUrl":"https://doi.org/10.35429/jrd.2021.19.7.31.36","url":null,"abstract":"This work presents the design and simulation of a Dynamic Voltage Restorer (DVR) to mitigate power quality problems such as voltage sags and swells at sensitive loads to these types of disturbances, but with a compensation topology using one the most popular of the renewable energies, currently employed, which is photovoltaic solar energy. The DVR must operate with a control loop, monitoring the voltage at the load side and generating the voltage for compensation during the disturbances. The energy is obtained, from an array of solar panels for the injection of active power. The control algorithm discussed in this article is based on the Clark and Park transformations to generate the required signals for voltage compensation, these mathematical techniques allow fixing the variables and hence simplicity for the controller design. The results of the simulation in MATLAB/Simulink are used to show the performance of the proposed topology with symmetrical voltage sags in the distribution system.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88304107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preface: IBM z15 Design and Technology 前言:IBM z15设计与技术
IF 1.3 4区 计算机科学
IBM Journal of Research and Development Pub Date : 2020-08-25 DOI: 10.1147/JRD.2020.3009463
{"title":"Preface: IBM z15 Design and Technology","authors":"","doi":"10.1147/JRD.2020.3009463","DOIUrl":"10.1147/JRD.2020.3009463","url":null,"abstract":"","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5288520/9177188/09177210.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46510186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message From the General Manager, IBM Z IBM Z总经理寄语
IF 1.3 4区 计算机科学
IBM Journal of Research and Development Pub Date : 2020-08-25 DOI: 10.1147/JRD.2020.3009462
Ross A. Mauri
{"title":"Message From the General Manager, IBM Z","authors":"Ross A. Mauri","doi":"10.1147/JRD.2020.3009462","DOIUrl":"https://doi.org/10.1147/JRD.2020.3009462","url":null,"abstract":"","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5288520/9177188/09177208.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49986538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design innovations for IBM Z hardware management appliance IBM Z硬件管理设备的设计创新
IF 1.3 4区 计算机科学
IBM Journal of Research and Development Pub Date : 2020-07-10 DOI: 10.1147/JRD.2020.3008095
B. D. Valentine;M. A. Clark;B. E. Myers;P. Callaghan;J. A. Wierbowski;P. J. Clas
{"title":"Design innovations for IBM Z hardware management appliance","authors":"B. D. Valentine;M. A. Clark;B. E. Myers;P. Callaghan;J. A. Wierbowski;P. J. Clas","doi":"10.1147/JRD.2020.3008095","DOIUrl":"https://doi.org/10.1147/JRD.2020.3008095","url":null,"abstract":"The IBM z15 supports the new IBM Z Hardware Management Appliance optional feature, which provides redundant Hardware Management Consoles (HMCs) and Support Elements (SEs) that run on redundant physical servers inside the CPC (Central Processor Complex) frame. This eliminates the need for having to manage one or more separate physical servers for HMCs outside of the frame. This article describes the host HMC/KVM (kernel-based virtual machine) and Virtual SE environment, which is completely managed by IBM Z firmware as a true appliance. It also illustrates the firmware integrity monitoring environment for the host HMC/KVM extended to the Virtual SE to provide secure boot protection for firmware and continuous monitoring and the utilization of a shared trusted platform module. It describes how physical system errors are processed by problem analysis firmware running on the Virtual SE, thereby enabling online guided repair instructions running on the Virtual SE to be used for both HMC and SE detected errors. This article will shares the innovative design basics of the IBM Z Hardware Management Appliance feature, which has significant positive impact potential for both clients and IBM.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1147/JRD.2020.3008095","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IBM Z development transformation IBM Z开发转型
IF 1.3 4区 计算机科学
IBM Journal of Research and Development Pub Date : 2020-07-10 DOI: 10.1147/JRD.2020.3008122
E. C. McCain;P. Bastien;B. F. Belmar;B. Bhattacharya;K. K. Cheruiyot;M. Coq;R. Dartey;K. Deekaram;K. Ghadai;L. D. Lalima;J. Nettey;A. W. Owolabi;K. Phillips;T. M. Shiling;D. T. Schroeder;C. Slegel;B. Steen;D. A. Thorne;E. Venuto;J. D. Willoughby;D. Yaniv;N. Ziemis
{"title":"IBM Z development transformation","authors":"E. C. McCain;P. Bastien;B. F. Belmar;B. Bhattacharya;K. K. Cheruiyot;M. Coq;R. Dartey;K. Deekaram;K. Ghadai;L. D. Lalima;J. Nettey;A. W. Owolabi;K. Phillips;T. M. Shiling;D. T. Schroeder;C. Slegel;B. Steen;D. A. Thorne;E. Venuto;J. D. Willoughby;D. Yaniv;N. Ziemis","doi":"10.1147/JRD.2020.3008122","DOIUrl":"https://doi.org/10.1147/JRD.2020.3008122","url":null,"abstract":"This article discusses how the product development cycle is being transformed with “Artificial Intelligence” (AI) for the first time in zSeries history. This new era of AI, under the project name IBM Z Development Transformation (zDT), has allowed the team to grow and learn new skills in data science. This transformation forces change structurally in how data is prepared and stored. In z14, there were incremental productivity gains with enhancements to automation with eServer Automation Test Solution and a technology data analysis engine called zDataAssist. However, in z15, AI will significantly accelerate our efficiency. This article explains how Design Thinking and Agile principles were used to identify areas that are of high impact and feasible to implement: 1) what and how data is collected via System Test Event Logging and Analysis engine, Problem ticket management system (Jupitr), and Processor data analysis engine (Xrings); 2) problem identification, analysis, and management (AutoJup) along with Intelligent Recovery Verification Assistant; 3) product design documentation search engine (AskTheMachine); and 4) prototype microprocessor allocation processes Intelligent Commodity Fulfillment System using Machine Learning. This article details the approach of these areas for z15, the implementation of these solutions under the zDT project, as well as the results and future work.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1147/JRD.2020.3008122","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
z15 selfboot and secure boot Z15自启动和安全启动
IF 1.3 4区 计算机科学
IBM Journal of Research and Development Pub Date : 2020-07-10 DOI: 10.1147/JRD.2020.3008097
T. Webel;O. Morlok;D. Kiss
{"title":"z15 selfboot and secure boot","authors":"T. Webel;O. Morlok;D. Kiss","doi":"10.1147/JRD.2020.3008097","DOIUrl":"https://doi.org/10.1147/JRD.2020.3008097","url":null,"abstract":"The IBM Z central processor (CP) and storage controller (SC) chips contain hardware and firmware to serve selfboot and secure boot needs. Selfboot initializes the CP/SC chips from hardware and firmware, which reside in each chip module. This establishes a core root of trust and also guarantees a boot time that is independent of the system configuration, which is key for large enterprise class systems consisting of multiple drawers and chips. Secure boot is built on this core root of trust and is used to authenticate the firmware loaded from system memory prior to execution of that firmware. Selfboot and secure boot also guarantee the integrity of the CP and SC chips by restricting hardware and memory accesses through debug or service interfaces during boot, runtime, and code update phases. In this article, we describe the basic hardware and firmware concepts that are implemented and enabled for the z15 CP and SC chips.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1147/JRD.2020.3008097","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49979348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing the enterprise SAN with IBM Fibre Channel Endpoint Security 使用IBM光纤通道端点安全保护企业SAN
IF 1.3 4区 计算机科学
IBM Journal of Research and Development Pub Date : 2020-07-10 DOI: 10.1147/JRD.2020.3008146
P. G. Driever;R. Hathorn;C. Colonna
{"title":"Securing the enterprise SAN with IBM Fibre Channel Endpoint Security","authors":"P. G. Driever;R. Hathorn;C. Colonna","doi":"10.1147/JRD.2020.3008146","DOIUrl":"https://doi.org/10.1147/JRD.2020.3008146","url":null,"abstract":"Controlling access to and privacy of data within the enterprise can prove to be a formidable task with increased complexity and management overhead encountered as the granularity of access control is increased. Fibre Channel is the premier enterprise storage transport, so an organization's most sensitive data flows over Fibre Channel links within and across datacenters. In this article, we discuss a new, easy way to deploy innovation for Fibre Channel connections that ensures data is exchanged only between trusted servers and storage controllers, while also enabling the integrity and confidentiality of the data in flight between the trusted entities. We explain how the components of IBM Fibre Channel Endpoint Security are configured to work together to provide protection from insider threats, requiring minimal steps to deploy, fully controlled via policy, and transparent to applications, middleware, and operating systems.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1147/JRD.2020.3008146","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49986537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sysplex time synchronization using IEEE 1588 Precision Time Protocol (PTP) 基于IEEE 1588精确时间协议(PTP)的Sysplex时间同步
IF 1.3 4区 计算机科学
IBM Journal of Research and Development Pub Date : 2020-07-10 DOI: 10.1147/JRD.2020.3008108
S. R. Guendert;J. S. Houston;P. A. Wojciak;S. Cherniak;D. L. Massey
{"title":"Sysplex time synchronization using IEEE 1588 Precision Time Protocol (PTP)","authors":"S. R. Guendert;J. S. Houston;P. A. Wojciak;S. Cherniak;D. L. Massey","doi":"10.1147/JRD.2020.3008108","DOIUrl":"https://doi.org/10.1147/JRD.2020.3008108","url":null,"abstract":"Timekeeping and highly accurate, precise time synchronization are key requirements for modern information technology systems. While true for several industries, this is especially true for industries involved in transaction processing such as the financial industry. As such, the IBM Z Sysplex needs highly accurate timing/timekeeping and synchronization technology to ensure data integrity, and to also provide the ability to reconstruct a database based upon logs. Recently enacted changes and new regulatory requirements, both in Europe and the United States, have brought increasing attention to time synchronization accuracy. These regulations spurred an interest, both from IBM Z and from our IBM Z clients, in the IEEE 1588 Precision Time Protocol (PTP) being implemented in IBM Z. This article explains the history of PTP, PTP technology, the regulations that led IBM to introduce PTP to IBM Z, PTP's implementation on IBM Z, and IBM's involvement and leadership in the development of the PTP technology and standards going forward.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1147/JRD.2020.3008108","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure your cloud workloads with IBM Secure Execution for Linux on IBM z15 and LinuxONE III 在IBM z15和LinuxONE III上使用IBM Secure Execution for Linux保护您的云工作负载
IF 1.3 4区 计算机科学
IBM Journal of Research and Development Pub Date : 2020-07-10 DOI: 10.1147/JRD.2020.3008109
C. Bornträger;J. D. Bradbury;R. Bündgen;F. Busaba;L. C. Heller;V. Mihajlovski
{"title":"Secure your cloud workloads with IBM Secure Execution for Linux on IBM z15 and LinuxONE III","authors":"C. Bornträger;J. D. Bradbury;R. Bündgen;F. Busaba;L. C. Heller;V. Mihajlovski","doi":"10.1147/JRD.2020.3008109","DOIUrl":"https://doi.org/10.1147/JRD.2020.3008109","url":null,"abstract":"With the growth of IBM Z and LinuxONE in the cloud, customers are expecting their workloads and data to have the same levels of security, isolation, and privacy as running on-premise. In order to achieve these levels of trust, the IBM z15 and LinuxONE III provide the IBM Secure Execution for Linux facility, which isolates customers’ data from each other, as well as from the cloud administrators. Unlike other solutions in the industry, IBM Secure Execution does not require remote attestation, thus simplifying the deployment of applications into the protected environment. Also, unlike some other solutions in the industry, the integrity of data is protected end-to-end, that is, from the boot image on disk to memory as it is paged by the hypervisor and throughout execution. The isolation and integrity are provided by hardware and trusted firmware known as the ultravisor. In this article, we describe the security model of IBM Secure Execution, the functionality of the hardware and ultravisor, as well as the required changes to the hypervisor in order to support protected virtual machines.","PeriodicalId":55034,"journal":{"name":"IBM Journal of Research and Development","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2020-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1147/JRD.2020.3008109","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信