Username   Password       Forgot your password?  Forgot your username? 

ISSUES BY YEAR

Volume 15 - 2019

No.1 January 2019
No.1 January 2019
No.2 February 2019
No.2 February 2019
No.3 March 2019
No.3 March 2019
No.4 April 2019
No.4 April 2019
No.5 May 2019
No.5 May 2019

Volume 14 - 2018

No.1 January 2018
No.1 January 2018
No.3 March 2018
No.3 March 2018
No.4 April 2018
No.4 April 2018
No.5 May 2018
No.5 May 2018
No.6 June 2018
No.6 June 2018
No.7 July 2018
No.7 July 2018
No.8 August 2018
No.8 August 2018
No.9 September 2018
No.9 September 2018
No.10 October 2018
No.10 October 2018
No.11 November 2018
No.11 November 2018
No.12 December 2018
No.12 December 2018

Volume 13 - 2017

No.4 July 2017
No.4 July 2017
No.5 September 2017
No.5 September 2017
No.7 November 2017
No.7 November 2017
No.8 December 2017
No.8 December 2017

Volume 12 - 2016

Volume 11 - 2015

Volume 10 - 2014

Volume 9 - 2013

Volume 8 - 2012

Volume 7 - 2011

Volume 6 - 2010

Volume 5 - 2009

Volume 4 - 2008

Volume 3 - 2007

Volume 2 - 2006

 

Evaluating Protection for External Factors in Multi-State Systems

Volume 14, Number 3, March 2018, pp. 579-584
DOI: 10.23940/ijpe.18.03.p19.579584

Hongyan Dui

School of Management Engineering, Zhengzhou University, Zhengzhou, 450001, China

(Submitted on November 19, 2017; First revised on November 23, 2017; Second revised on December 8, 2017; Accepted on December 14, 2017)


Abstract:

An external factor is an added condition beyond the normal load of the system affecting the system’s success. Each external factor has an influence on system components, which may lead to system failure. To decrease the effects of different states of the external factors on system components, multistate protections are established to protect the components from the effects of the external factors. The protection states are dependent on the external factor state. When a protection is at different states, the protection may be damaged. In this paper, considering the joint effect of the external factors and protections on system components, a measure of states of the protections on the system reliability is introduced to identify which protection level has the most important influence on the system success. Based on the importance values of different protections, appropriate actions can be applied in system components to improve the system protection and reliability and reduce the effects of external factors. At last, an example of a computer server system is used to demonstrate the proposed method.

 

References: 10

  1. W. Di, X. Hui, and P. Rui, “Object defense with preventive strike and false targets”, Reliability Engineering & System Safety, vol. 169, pp. 76-80, 2018.
  2. H. Dui, L. Chen, and S. Wu, “Generalized integrated importance measure for system performance evaluation: application to a propeller plane system”, Eksploatacja i Niezawodnosc-Maintenance and Reliability, vol. 19, pp. 279-286, 2017.
  3. H. Dui, S. Si, S. Wu, and C. M. Yam Richard, “An importance measure for multistate systems with external factors,” Reliability Engineering and System Safety, vol. 167, pp. 49-57, 2017.
  4. K. Hausken, and G. Levitin, "Review of systems defense and attack models", International Journal of Performability Engineering, vol. 8, no. 4, pp. 355-366, 2012
  5. G. Levitin, H. Ben-Haim, “Importance of protections against intentional attacks”, Reliability Engineering & System Safety, vol. 93, pp. 639-646, 2008.
  6. R. Peng, Q. Zhai, L. Xing, and J. Yang, “Reliability of 1-out-of-(n+1) Warm Standby Systems Subject to Fault Level Coverage”, International Journal of Performability Engineering, vol. 9, no. 1, pp.117-120, 2013.
  7. S. Si, H. Dui, Z. Cai, and S. Sun. “A novel importance measure for external factors based on system performance,” International Journal of Performability Engineering, vol. 8, no. 4, pp. 447-450, 2012.
  8. G. N. Taranto, T. M. L. Assis, D. M. Falcao, R. C. de Carvalho, “Highlighting the importance of chronology on voltage protection and control in active distribution networks”, IEEE Transactions on Power Delivery, vol. 32, pp. 361-369, 2017.
  9. L. Xing, G. Levitin, “Balancing theft and corruption threats by data partition in cloud system with independent server protection,” Reliability Engineering & System Safety, vol. 167, pp. 248-254, 2017.
  10. Q. Zhai, Z. S. Ye, R. Peng, and W. Wang, “Defense and attack of performance-sharing common bus systems”, European Journal of Operational Research, vol. 256, pp. 962-975, 2016.

 

Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

Attachments:
Download this file (IJPE-2018-03-19.pdf)IJPE-2018-03-19.pdf[Evaluating Protection for External Factors in Multi-State Systems]297 Kb
 

CURRENT ISSUE

Prev Next

Cascaded Trust Network-based Block-Incremental Recommendation Strategy

Shujuan Ji, Da Li, Qing Zhang, Chunjin Zhang, and Chunxiao Bao

Read more

Cuckoo-based Malware Dynamic Analysis

Lele Wang, Binqiang Wang, Jiangang Liu, Qiguang Miao, and Jianhui Zhang

Read more

Colorization for Anime Sketches with Cycle-Consistent Adversarial Network

Guanghua Zhang, Mengnan Qu, Yuhao Jin, and Qingpeng Song

Read more

Bayesian Network Model for Learning Arithmetic Concepts

Yali Lv, Tong Jing, Yuhua Qian, Jiye Liang, Jianai Wu, and Junzhong Miao

Read more

Collaboration System Design of the Transportation Platform

Zhongwen Wang, Dong Liang, Ruizhen Duan, and Mingshan Chi

Read more

Specific Emitter Identification based on Power Amplifier

Zhen Zhang, Jie Chang, Mengqiu Chai, and Nan Tang

Read more

NRSSD: Normalizing Received Signal Strength to Address Device Diversity Problem in Fingerprinting Po…

Chunxiu Li, Jianli Zhao, Qiuxia Sun, Xiang Gao, Guoqiang Sun, and Chendi Zhu

Read more

Fast AIS Data Decoding Algorithm for Multi-Core CPU

Xiangkun Zeng, Huaran Yan, Yingjie Xiao and Xiaoming Yang

Read more
This site uses encryption for transmitting your passwords. ratmilwebsolutions.com