Username   Password       Forgot your password?  Forgot your username? 


Volume 14 - 2018

No.1 January 2018
No.1 January 2018
No.3 March 2018
No.3 March 2018
No.4 April 2018
No.4 April 2018
No.5 May 2018
No.5 May 2018
No.6 June 2018
No.6 June 2018
No.7 July 2018
No.7 July 2018
No.8 August 2018
No.8 August 2018

Volume 13 - 2017

No.4 July 2017
No.4 July 2017
No.5 September 2017
No.5 September 2017
No.7 November 2017
No.7 November 2017
No.8 December 2017
No.8 December 2017

Volume 12 - 2016

Volume 11 - 2015

Volume 10 - 2014

Volume 9 - 2013

Volume 8 - 2012

Volume 7 - 2011

Volume 6 - 2010

Volume 5 - 2009

Volume 4 - 2008

Volume 3 - 2007

Volume 2 - 2006


Optimization of Software Rejuvenation Policy based on State-Control-Limit

Volume 14, Number 2, February 2018, pp. 210-222
DOI: 10.23940/ijpe.18.02.p3.210222

Weichao Danga,b,*, Jianchao Zengb,c

aCollege of Electrical and Information Engineering, Lanzhou University of Technology, Lanzhou, 730050, China

bDivision of Industrial and System Engineering, Taiyuan University of Science and Technology, Taiyuan, 030024, China

c School of Computer Science and Control Engineering, North University of China, Taiyuan, 030051, China


Software Rejuvenation is a proactive software control technique used to improve computing system performance when a system suffers from software aging. In this paper, a state-control-limit-based rejuvenation policy with periodical inspection has been proposed. The steady-state system availability model has been constructed based on the semi-renewal process. The steady-state probability density of degradation system stated as a function of the inspection interval and the rejuvenation threshold have been derived. The average unavailable time of when a soft failure occurs within an inspection cycle has been taken into account to calculate the steady-state system availability. Finally, the system availability with corresponding optimal inspection time interval and rejuvenation threshold have been obtained numerically.


References: 26

  1. T. Amudha and B. L. Shivakumar, “Parameter Optimization in Genetic Algorithm and Its Impact on Scheduling Solutions.” Springer India, 2015
  2. J. Araujo, R. Matos, V. Alves, P. Maciel, F.V.D. Souza, R. Matias, and K.S. Trivedi, “Software Aging in the Eucalyptus Cloud Computing Infrastructure: Characterization and Rejuvenation,” ACM Journal on Emerging Technologies in Computing Systems, vol. 10, no. 1, pp. 1557-1564, 2014
  3. A. Avritzer, A. Bondi, M. Grottke, K.S. Trivedi, and E.J. Weyuker, “Performance Assurance via Software Rejuvenation: Monitoring, Statistics and Algorithms,” in International Conference on Dependable Systems and Networks, DSN 2006, pp. 435-444, 2006
  4. A. Avritzer and E. J. Weyuker, “Monitoring Smoothly Degrading Systems for Increased Dependability,” Empirical Software Engineering, vol. 2, no. 2, pp. 59-77, 1997
  5. Y. Bao, X. Sun, and K. S. Trivedi, “A Workload-based Analysis of Software Aging, and Rejuvenation,” IEEE Transactions on Reliability, vol. 54, no. 3, pp. 541-548, 2005
  6. A. Bobbio, M. Sereno, and C. Anglano, “Fine Grained Software Degradation Models for Optimal Rejuvenation Policies,” Performance Evaluation, vol. 46, no. 1, pp. 45-62, 2001
  7. K. J. Cassidy, K. C. Gross, and A. Malekpour, “Advanced Pattern Recognition for Detection of Complex Software Aging Phenomena in Online Transaction Processing Servers,” in Proceedings of International Conference on Dependable Systems and Networks, DSN 2002, pp. 478-482, 2002
  8. D. Cotroneo, S. Orlando, R. Pietrantuono, and S. Russo, “A Measurement-based Ageing Analysis of the JVM,” Software Testing Verification & Reliability, vol. 23, no. 3, pp. 199–239, 2013
  9. D. Cotroneo, R. Pietrantuono, S. Russo, and K. Trivedi, “How Do Bugs Surface? A Comprehensive Study on the Characteristics of Software Bugs Manifestation,” Journal of Systems & Software, vol. 113, no. 27-43, 2016
  10. L. Dieulle, C. Berenguer, A. Grall, and M. Roussignol, “Continuous Time Predictive Maintenance Scheduling for a Deteriorating System,” IEEE Transactions on Reliability vol. 51, no. 2, pp. 150-155, 2001
  11. S. Garg, A. Puliafito, M. Telek, and K. Trivedi, “Analysis of Preventive Maintenance in Transactions Based Software Systems,” IEEE Transactions on Computers, vol. 47, no. 1, pp. 96-107, 1998
  12. S. Garg, A. van Moorsel, K. Vaidyanathan, and K.S. Trivedi, “A Methodology for Detection and Estimation of Software Aging,” in Proceedings of Ninth International Symposium on Software Reliability Engineering. pp. 283-292, 1998
  13. J. Gray and D.P. Siewiorek, “High-Availability Computer Systems,” Computer, vol. 24, no. 9, pp. 39-48, 1991
  14. M. Grottke, L. Li, K. Vaidyanathan, and K.S. Trivedi, “Analysis of Software Aging in a Web Server,” Discussion Papers, vol. 55, no. 3, pp. 411 - 420, 2005
  15. Y. Huang, C. Kintala, N. Kolettis, and N.D. Fulton, “Software Rejuvenation: Analysis, Module and Applications,” in proceedings of 25 International Symposium, Fault-Tolerant Computing, FTCS-25. pp. 381-390, 1995
  16. Y.F. Jia, X.E. Chen, L. Zhao, and K.Y. Cai, “On the Relationship between Software Aging and Related Parameters,” in International Conference on Quality Software, pp. 241-246, 2008
  17. E. Marshall, “Fatal Error: How Patriot Overlooked a Scud,” Science, vol. 255, no. 5050, pp. 1347-1347, 1992
  18. R. Matias, A. Andrzejak, F. Machida, D. Elias, and K. Trivedi, “A Systematic Differential Analysis for Fast and Robust Detection of Software Aging,” 2014
  19. H. Meng, J. Liu, X. Hei, H. Meng, J. Liu, and X. Hei, “Modeling and optimizing periodically inspected software rejuvenation policy based on geometric sequences,” Reliability Engineering & System Safety, vol. 133, no. 133, pp. 184-191, 2015
  20. S. Meyn and R. L. Tweedie, “Markov Chains and Stochastic Stability.” Springer-Verlag, 1993
  21. J. M. V. Noortwijk, “A Survey of the Application of Gamma Processes in Maintenance,” Reliability Engineering & System Safety, vol. 94, no. 1, pp. 2-21, 2009
  22. K. Rinsaka and T. Dohi, “Toward High Assurance Software Systems with Adaptive Fault Management,” Software Quality Journal, vol. 24, no. 1, pp. 1-21, 2016
  23. M. Sullivan and R. Chillarege, “Software Defects and Their Impact on System Availability-A Study of Field Failures in Operating Systems,” in Proc. Twenty-First International Symposium on Fault-Tolerant Computing, FTCS-21, pp. 2-9, 1991
  24. A. T. Tai, L. Alkalai, and S.N. Chau, “On-board Preventive Maintenance: A Design-oriented Analytic Study for Long-life Applications,” Performance Evaluation, vol. 35, no. 3–4, pp. 215-232, 1999
  25. D. Wang, W. Xie, and K.S. Trivedi, “Performability Analysis of Clustered Systems with Rejuvenation under Varying Workload,” Performance Evaluation, vol. 64, no. 3, pp. 247-265, 2007
  26. T. H. Zhao, Q. I. Yong, J. Y. Shen, D. Hou, and X.M. Zheng, “Application Server Multi-State Aging Model and Optimal Rejuvenation Strategy Research,” Journal of System Simulation, vol. 19, no. 8, pp. 1705-1709, 2007


Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

Download this file (IJPE-2018-02-03.pdf)IJPE-2018-02-03.pdf[Optimization of Software Rejuvenation Policy based on State-Control-Limit]926 Kb


Prev Next

Program Disturb Research and Error Avoidance Algorithm Design of 3D-TLC NAND Flash Memory

Xiaoshan Yang, Ligu Zhu, Qicong Zhang, Meng Zhang, Fei Wu, and Wei Zhang

Read more

Data Complexity Analysis for Software Defect Detection

Ying Ma, Yichang Li, Junwen Lu, Peng Sun, Yu Sun, and Xiatian Zhu

Read more

Fuzzy AHP-based Comprehensive Evaluation for Smart Grid in Energy Internet Systems

Ying Ma, Yichang Li, Shunzhi Zhu, Nan Qin, Guang Zhao, and Chao Huang

Read more

User Group-based Method for Cold-Start Recommendation

Jing He, Shuo Yuan, Yi Xiang, and Wei Zhou

Read more

Object Tracking Method based on 3D Cartoon Animation in Broadcast Soccer Videos

Chunlong Xie, Zhiqian Zhang, Chunsheng Wang, and Zhengqing Liu

Read more

Image Encryption Method based on Hill Matrix and Dynamic DNA Encoding

Xuncai Zhang, Zheng Zhou, Yishan Liu, Guangzhao Cui, Ying Niu, and Yanfeng Wang

Read more

Video Indexing and Retrieval based on Key Frame Extraction

Wenshi Wang, Zhangqin Huang, Weidong Wang, Shuo Zhang, and Rui Tian

Read more

Modeling Approach Combining Performance and Reliability for Mobile Cloud System

Han Xu, Haiqing Wang, Liang Luo, Xiwei Qiu, Sa Meng, and Xun Guo

Read more

Understanding the Similarity of Log Revision Behaviors in Open Source Software

Xu Niu, Shanshan Li, Zhouyang Jia, Shulin Zhou, Wang Li, and Xiangke Liao

Read more

Learning to Predict Price based on E-commerce Online Auction Machine

Xiaohui Li, Hongbin Dong, Xiaowei Wang, and Shuang Han

Read more

Rate Control Algorithm for Multiview Video Coding based on Human Visual Characteristics

Tao Yan, In-Ho Ra, Qiuwen Zhang, Hui Wen, Hang Xu, and Shuqing Chen

Read more
This site uses encryption for transmitting your passwords.