Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
CONTINUOUSLY IMPROVE THE PERFORMANCE OF PLANNING AND SCHEDULING MODELS WITH P...Alkis Vazacopoulos
Continuously improving the accuracy and precision of planning and scheduling models is not new; unfortunately it is not institutionalized in practice. The intent of this paper is to highlight a relatively simple approach to historize or memorize past and present actual planning and scheduling data collected into what we call the past rolling horizon (PRH). The PRH is identical to the future rolling horizon (FRH) used in hierarchical production planning and model predictive control to manage omnipresent uncertainty in the model and data. Instead of optimizing future decisions such as throughputs, operating-modes and conditions we now optimize or estimate key model parameters. Although bias-updating using a single time-sample of data is common practice in advanced process control and optimization to incorporate “parameter” feedback, this is only realizable for real-time applications with comprehensive measurement systems. Proposed in this paper is the use of multiple synchronous or asynchronous time-samples in the past in conjunction with simultaneous reconciliation and regression to update a subset of the model parameters on a past rolling horizon basis to improve the performance of planning and scheduling models.
CONTINUOUSLY IMPROVE THE PERFORMANCE OF PLANNING AND SCHEDULING MODELS WITH P...Alkis Vazacopoulos
Continuously improving the accuracy and precision of planning and scheduling models is not new; unfortunately it is not institutionalized in practice. The intent of this paper is to highlight a relatively simple approach to historize or memorize past and present actual planning and scheduling data collected into what we call the past rolling horizon (PRH). The PRH is identical to the future rolling horizon (FRH) used in hierarchical production planning and model predictive control to manage omnipresent uncertainty in the model and data. Instead of optimizing future decisions such as throughputs, operating-modes and conditions we now optimize or estimate key model parameters. Although bias-updating using a single time-sample of data is common practice in advanced process control and optimization to incorporate “parameter” feedback, this is only realizable for real-time applications with comprehensive measurement systems. Proposed in this paper is the use of multiple synchronous or asynchronous time-samples in the past in conjunction with simultaneous reconciliation and regression to update a subset of the model parameters on a past rolling horizon basis to improve the performance of planning and scheduling models.
QUERY PROOF STRUCTURE CACHING FOR INCREMENTAL EVALUATION OF TABLED PROLOG PRO...csandit
The incremental evaluation of logic programs maintains the tabled answers in a complete and
consistent form in response to the changes in the database of facts and rules. The critical
challenges for the incremental evaluation are how to detect which table entries need to change,
how to compute the changes and how to avoid the re-computation. In this paper we present an
approach of maintaining one consolidate system to cache the query answers under the nonmonotonic
logic. We use the justification-based truth-maintenance system to support the
incremental evaluation of tabled Prolog Programs. The approach used in this paper suits the
logic based systems that depend on dynamic facts and rules to benefit in their performance from
the idea of incremental evaluation of tabled Prolog programs. More precisely, our approach
favors the dynamic rules based logic systems.
TOWARDS MORE ACCURATE CLUSTERING METHOD BY USING DYNAMIC TIME WARPINGijdkp
An intrinsic problem of classifiers based on machine learning (ML) methods is that their learning time
grows as the size and complexity of the training dataset increases. For this reason, it is important to have
efficient computational methods and algorithms that can be applied on large datasets, such that it is still
possible to complete the machine learning tasks in reasonable time. In this context, we present in this paper
a more accurate simple process to speed up ML methods. An unsupervised clustering algorithm is
combined with Expectation, Maximization (EM) algorithm to develop an efficient Hidden Markov Model
(HMM) training. The idea of the proposed process consists of two steps. In the first step, training instances
with similar inputs are clustered and a weight factor which represents the frequency of these instances is
assigned to each representative cluster. Dynamic Time Warping technique is used as a dissimilarity
function to cluster similar examples. In the second step, all formulas in the classical HMM training
algorithm (EM) associated with the number of training instances are modified to include the weight factor
in appropriate terms. This process significantly accelerates HMM training while maintaining the same
initial, transition and emission probabilities matrixes as those obtained with the classical HMM training
algorithm. Accordingly, the classification accuracy is preserved. Depending on the size of the training set,
speedups of up to 2200 times is possible when the size is about 100.000 instances. The proposed approach
is not limited to training HMMs, but it can be employed for a large variety of MLs methods.
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...ijcsit
In this paper, we present an algorithm for feature selection. This algorithm labeled QC-FS: Quantum
Clustering for Feature Selection performs the selection in two steps. Partitioning the original features
space in order to group similar features is performed using the Quantum Clustering algorithm. Then the
selection of a representative for each cluster is carried out. It uses similarity measures such as correlation
coefficient (CC) and the mutual information (MI). The feature which maximizes this information is chosen
by the algorithm
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A developer needs to evaluate software performance metrics such as power consumption at an early stage of design phase to make a device or a software efficient especially in real-time embedded systems. Constructing performance models and evaluation techniques of a given system requires a significant effort. This paper presents a framework to bridge between a Functional Modeling Approach such as FSM, UML etc. and an Analytical (Mathematical) Modeling Approach such as Hierarchical Performance Modeling (HPM) as a technique to find the expected average power consumption for different layers of abstractions. A Hierarchical Generic FSM “HGFSM” is developed to be used in order to estimate the expected average power. A case study is presented to illustrate the concepts of how the framework is used to estimate the average power and energy produced.
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
TRACEABILITY OF UNIFIED MODELING LANGUAGE DIAGRAMS FROM USE CASE MAPSijseajournal
The Unified Modeling Language (UML) is a general purpose modeling language for specifying, constructing and documenting the artifacts of software systems. It is used in developing systems by combining the use of different types of diagrams to express different views of the systems. These diagrams allow transition between requirements and implementation. The lack of traceability between the diagrams
makes any changes difficult and expensive. In this paper, it is proposed using the Use Case Maps (UCMs) notation which allows the full description of the system in terms of high-level causal scenario and helps in visualizing and understanding the system in early stage. UCMs was used in the early stage to describe the system and generate the proper UML diagrams from UCMs. By defining a traceability relationship between UCMs and UML, we facilitate the maintains and the consistency of the UML diagrams.
Validation Study of Dimensionality Reduction Impact on Breast Cancer Classifi...ijcsit
A fundamental problem in machine learning is identifying the most representative subset of features from
which we can construct a predictive model for a classification task. This paper aims to present a validation
study of dimensionality reduction effect on the classification accuracy of mammographic images. The
studied dimensionality reduction methods were: locality-preserving projection (LPP), locally linear
embedding (LLE), Isometric Mapping (ISOMAP) and spectral regression (SR). We have achieved high
rates of classifications. In some combinations the classification rate was 100%. But in most of the cases the
classification rate is about 95%. It was also found that the classification rate increases with the size of the
reduced space and the optimal value of space dimension is 60. We proceeded to validate the obtained
results by measuring some validation indices such as: Xie-Beni index, Dun index and Alternative Dun
index. The measurement of these indices confirms that the optimal value of reduced space dimension is
d=60.
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM AlgorithmIOSR Journals
There is structure in nature; also it is believed that there is an underlying structure in most of
phenomena, to be understood. in image recognition ,mole biology applications such as protein folding and 3D
molecular structure, cancer detection many others the underlying structure exists .by finding structure one
classifies the data according to similar patterns, features and other characteristics .this general idea is known
as classification. In classification, also termed clustering, the most important issue is deciding what criteria to
classify against.This paper presents the fuzzy classification techniques to classify the data of cancer disease.
Cluster analysis, cluster validity and fuzzy C-mean (FCM) technique are proposed to be discussed and applied
in cancer data classification.
In recent years, structural integrity monitoring has become increasingly important in structural engineering and construction management. It represents an important tool for the assessment of the dependability of existing complex structural systems as it integrates, in a unified perspective, advanced engineering analyses and experimental data processing. In the first part of this work
the concepts of dependability and structural integrity are
discussed and it is shown that an effective integrity assessment
needs advanced computational methods. For this purpose, soft computing methods have shown to be very useful. In particular, in this work the neural networks model is chosen and successfully improved by applying the Bayesian inference at four hierarchical levels: for training, optimization of the regularization terms, databased model selection, and evaluation of the relative importance of different inputs. In the second part of the article,
Bayesian neural networks are used to formulate a
multilevel strategy for the monitoring of the integrity of long span bridges subjected to environmental actions: in a first level the occurrence of damage is detected; in a following level the specific damaged element is recognized and the intensity of damage is quantified.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
QUERY PROOF STRUCTURE CACHING FOR INCREMENTAL EVALUATION OF TABLED PROLOG PRO...csandit
The incremental evaluation of logic programs maintains the tabled answers in a complete and
consistent form in response to the changes in the database of facts and rules. The critical
challenges for the incremental evaluation are how to detect which table entries need to change,
how to compute the changes and how to avoid the re-computation. In this paper we present an
approach of maintaining one consolidate system to cache the query answers under the nonmonotonic
logic. We use the justification-based truth-maintenance system to support the
incremental evaluation of tabled Prolog Programs. The approach used in this paper suits the
logic based systems that depend on dynamic facts and rules to benefit in their performance from
the idea of incremental evaluation of tabled Prolog programs. More precisely, our approach
favors the dynamic rules based logic systems.
TOWARDS MORE ACCURATE CLUSTERING METHOD BY USING DYNAMIC TIME WARPINGijdkp
An intrinsic problem of classifiers based on machine learning (ML) methods is that their learning time
grows as the size and complexity of the training dataset increases. For this reason, it is important to have
efficient computational methods and algorithms that can be applied on large datasets, such that it is still
possible to complete the machine learning tasks in reasonable time. In this context, we present in this paper
a more accurate simple process to speed up ML methods. An unsupervised clustering algorithm is
combined with Expectation, Maximization (EM) algorithm to develop an efficient Hidden Markov Model
(HMM) training. The idea of the proposed process consists of two steps. In the first step, training instances
with similar inputs are clustered and a weight factor which represents the frequency of these instances is
assigned to each representative cluster. Dynamic Time Warping technique is used as a dissimilarity
function to cluster similar examples. In the second step, all formulas in the classical HMM training
algorithm (EM) associated with the number of training instances are modified to include the weight factor
in appropriate terms. This process significantly accelerates HMM training while maintaining the same
initial, transition and emission probabilities matrixes as those obtained with the classical HMM training
algorithm. Accordingly, the classification accuracy is preserved. Depending on the size of the training set,
speedups of up to 2200 times is possible when the size is about 100.000 instances. The proposed approach
is not limited to training HMMs, but it can be employed for a large variety of MLs methods.
Q UANTUM C LUSTERING -B ASED F EATURE SUBSET S ELECTION FOR MAMMOGRAPHIC I...ijcsit
In this paper, we present an algorithm for feature selection. This algorithm labeled QC-FS: Quantum
Clustering for Feature Selection performs the selection in two steps. Partitioning the original features
space in order to group similar features is performed using the Quantum Clustering algorithm. Then the
selection of a representative for each cluster is carried out. It uses similarity measures such as correlation
coefficient (CC) and the mutual information (MI). The feature which maximizes this information is chosen
by the algorithm
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A developer needs to evaluate software performance metrics such as power consumption at an early stage of design phase to make a device or a software efficient especially in real-time embedded systems. Constructing performance models and evaluation techniques of a given system requires a significant effort. This paper presents a framework to bridge between a Functional Modeling Approach such as FSM, UML etc. and an Analytical (Mathematical) Modeling Approach such as Hierarchical Performance Modeling (HPM) as a technique to find the expected average power consumption for different layers of abstractions. A Hierarchical Generic FSM “HGFSM” is developed to be used in order to estimate the expected average power. A case study is presented to illustrate the concepts of how the framework is used to estimate the average power and energy produced.
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
TRACEABILITY OF UNIFIED MODELING LANGUAGE DIAGRAMS FROM USE CASE MAPSijseajournal
The Unified Modeling Language (UML) is a general purpose modeling language for specifying, constructing and documenting the artifacts of software systems. It is used in developing systems by combining the use of different types of diagrams to express different views of the systems. These diagrams allow transition between requirements and implementation. The lack of traceability between the diagrams
makes any changes difficult and expensive. In this paper, it is proposed using the Use Case Maps (UCMs) notation which allows the full description of the system in terms of high-level causal scenario and helps in visualizing and understanding the system in early stage. UCMs was used in the early stage to describe the system and generate the proper UML diagrams from UCMs. By defining a traceability relationship between UCMs and UML, we facilitate the maintains and the consistency of the UML diagrams.
Validation Study of Dimensionality Reduction Impact on Breast Cancer Classifi...ijcsit
A fundamental problem in machine learning is identifying the most representative subset of features from
which we can construct a predictive model for a classification task. This paper aims to present a validation
study of dimensionality reduction effect on the classification accuracy of mammographic images. The
studied dimensionality reduction methods were: locality-preserving projection (LPP), locally linear
embedding (LLE), Isometric Mapping (ISOMAP) and spectral regression (SR). We have achieved high
rates of classifications. In some combinations the classification rate was 100%. But in most of the cases the
classification rate is about 95%. It was also found that the classification rate increases with the size of the
reduced space and the optimal value of space dimension is 60. We proceeded to validate the obtained
results by measuring some validation indices such as: Xie-Beni index, Dun index and Alternative Dun
index. The measurement of these indices confirms that the optimal value of reduced space dimension is
d=60.
Unsupervised Clustering Classify theCancer Data withtheHelp of FCM AlgorithmIOSR Journals
There is structure in nature; also it is believed that there is an underlying structure in most of
phenomena, to be understood. in image recognition ,mole biology applications such as protein folding and 3D
molecular structure, cancer detection many others the underlying structure exists .by finding structure one
classifies the data according to similar patterns, features and other characteristics .this general idea is known
as classification. In classification, also termed clustering, the most important issue is deciding what criteria to
classify against.This paper presents the fuzzy classification techniques to classify the data of cancer disease.
Cluster analysis, cluster validity and fuzzy C-mean (FCM) technique are proposed to be discussed and applied
in cancer data classification.
In recent years, structural integrity monitoring has become increasingly important in structural engineering and construction management. It represents an important tool for the assessment of the dependability of existing complex structural systems as it integrates, in a unified perspective, advanced engineering analyses and experimental data processing. In the first part of this work
the concepts of dependability and structural integrity are
discussed and it is shown that an effective integrity assessment
needs advanced computational methods. For this purpose, soft computing methods have shown to be very useful. In particular, in this work the neural networks model is chosen and successfully improved by applying the Bayesian inference at four hierarchical levels: for training, optimization of the regularization terms, databased model selection, and evaluation of the relative importance of different inputs. In the second part of the article,
Bayesian neural networks are used to formulate a
multilevel strategy for the monitoring of the integrity of long span bridges subjected to environmental actions: in a first level the occurrence of damage is detected; in a following level the specific damaged element is recognized and the intensity of damage is quantified.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
2-DOF BLOCK POLE PLACEMENT CONTROL APPLICATION TO:HAVE-DASH-IIBTT MISSILEZac Darcy
In a multivariable servomechanism design, it is required that the output vector tracks a certain reference
vector while satisfying some desired transient specifications, for this purpose a 2DOF control law
consisting of state feedback gain and feedforward scaling gain is proposed. The control law is designed
using block pole placement technique by assigning a set of desired Block poles in different canonical forms.
The resulting control is simulated for linearized model of the HAVE DASH II BTT missile; numerical
results are analyzed and compared in terms of transient response, gain magnitude, performance
robustness, stability robustness and tracking. The suitable structure for this case study is then selected.
FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELLFORMED NETScsandit
Multi-agent systems are asynchronous and distributed computer systems. These characteristics make them also a discrete-event dynamic system. It is, therefore, important to analyze the behavior of such systems to ensure that they terminate correctly and satisfy other important properties. This paper presents a formal modeling and analysis of MAS, based on Well-formed Nets, in order to ensure the absence of any undesired or unexpected behavior. To validate our ontribution, we consider the timetable problem, which is a multi-agent resource allocation problem.
Stability and stabilization of discrete-time systems with time-delay via Lyap...IJERA Editor
The stability and stabilization problems for discrete systems with time-delay are discussed .The stability and
stabilization criterion are expressed in the form of linear matrix inequalities (LMI). An effective method
allowing us transforming a bilinear matrix Inequality (BMI) to a linear matrix Inequality (LMI) is developed.
Based on these conditions, a state feedback controller with gain is designed. An illustrative numerical example
is provided to show the effectiveness of the proposed method and the reliability of the results.
2-DOF Block Pole Placement Control Application To: Have-DASH-IIBITT MissileZac Darcy
In a multivariable servomechanism design, it is required that the output vector tracks a certain reference
vector while satisfying some desired transient specifications, for this purpose a 2DOF control law
consisting of state feedback gain and feedforward scaling gain is proposed. The control law is designed
using block pole placement technique by assigning a set of desired Block poles in different canonical forms.
The resulting control is simulated for linearized model of the HAVE DASH II BTT missile; numerical
results are analyzed and compared in terms of transient response, gain magnitude, performance
robustness, stability robustness and tracking. The suitable structure for this case study is then selected.
2-DOF Block Pole Placement Control Application To: Have-DASH-IIBITT MissileZac Darcy
In a multivariable servomechanism design, it is required that the output vector tracks a certain reference
vector while satisfying some desired transient specifications, for this purpose a 2DOF control law
consisting of state feedback gain and feedforward scaling gain is proposed. The control law is designed
using block pole placement technique by assigning a set of desired Block poles in different canonical forms.
The resulting control is simulated for linearized model of the HAVE DASH II BTT missile; numerical
results are analyzed and compared in terms of transient response, gain magnitude, performance
robustness, stability robustness and tracking. The suitable structure for this case study is then selected.
MAINTENANCE POLICY AND ITS IMPACT ON THE PERFORMABILITY EVALUATION OF EFT SYS...IJCSEA Journal
In the Electronic Funds Transfer (EFT) Systems, faults can cause severe degradation on the performance of this system. Thus, modelling the performance of EFT system without considering dependability aspects can cause inaccurate results. This paper presents a stochastic model for evaluating performance of processing and storage infrastructures of the EFT system. This work also presents a model for evaluating the effects of the proposed preventive maintenance policy and different service level agreements (SLA) on the dependability of the EFT system infrastructure. Then, this paper combines both models (dependability and performance) for evaluating the impact of dependability issues on the performance of the EFT system. Finally, case studies considering EFT system infrastructures are provided to demonstrate the applicability of the adopted approach. Moreover, the results of these case studies are depicted, stressing important aspects of dependability and performance for EFT system planning.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Designing Run-Time Environments to have Predefined Global DynamicsIJCNCJournal
The stability and the predictability of a computer network algorithm's performance are as important as the
main functional purpose of networking software. However, asserting or deriving such properties from the
finite state machine implementations of protocols is hard and, except for singular cases like TCP, is not
done today. In this paper, we propose to design and study run-time environments for networking protocols
which inherently enforce desirable, predictable global dynamics. To this end we merge two complementary
design approaches: (i) A design-time and bottom up approach that enables us to engineer algorithms based
on an analyzable (reaction) flow model. (ii) A run-time and top-down approach based on an autonomous
stack composition framework, which switches among implementation alternatives to find optimal operation
configurations. We demonstrate the feasibility of our self-optimizing system in both simulations and realworld
Internet setups
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
Neural Network-Based Actuator Fault Diagnosis for a Non-Linear Multi-Tank SystemISA Interchange
The paper is devoted to the problem of the robust actuator fault diagnosis of the dynamic non-linear systems. In the proposed method, it is assumed that the diagnosed system can be modelled by the recurrent neural network, which can be transformed into the linear parameter varying form. Such a system description allows developing the designing scheme of the robust unknown input observer within H1 framework for a class of non-linear systems. The proposed approach is designed in such a way that a prescribed disturbance attenuation level is achieved with respect to the actuator fault estimation error, while guaranteeing the convergence of the observer. The application of the robust unknown input observer enables actuator fault estimation, which allows applying the developed approach to the fault tolerant control tasks.
EVALUATING THE PREDICTED RELIABILITY OF MECHATRONIC SYSTEMS: STATE OF THE ARTmeijjournal
Reliability analysis of mechatronic systems is one of the most young field and dynamic branches of research. It is addressed whenever we want reliable, available, and safe systems. The studies of reliability must be conducted earlier during the design phase, in order to reduce costs and the number of prototypes required in the validation of the system. The process of reliability is then deployed throughout the full cycle of development; this process is broken down into three major phases: the predictive reliability, the experimental reliability and operational reliability. The main objective of this article is a kind of portrayal of the various studies enabling a noteworthy mastery of the predictive reliability. The weak points are highlighted, in addition presenting an overview of all approaches existing in quantitative and qualitative modeling and evaluating the reliability prediction is so important for the futures reliability studies, and for academic researches to innovate other new methods and tools. the Mechatronic system is a hybrid system; it is dynamic, reconfigurable, and interactive. The modeling carried out of reliability prediction must take into account these criteria. Several methodologies have been developed in this track of research. In this article, we will try to handle them from a critical angle.
EVALUATING THE PREDICTED RELIABILITY OF MECHATRONIC SYSTEMS: STATE OF THE ARTmeijjournal
Reliability analysis of mechatronic systems is one of the most young field and dynamic branches of research. It is addressed whenever we want reliable, available, and safe systems. The studies of reliability must be conducted earlier during the design phase, in order to reduce costs and the number of prototypes required in the validation of the system. The process of reliability is then deployed throughout the full cycle of development; this process is broken down into three major phases: the predictive reliability, the experimental reliability and operational reliability. The main objective of this article is a kind of portrayal of the various studies enabling a noteworthy mastery of the predictive reliability. The weak points are highlighted, in addition presenting an overview of all approaches existing in quantitative and qualitative modeling and evaluating the reliability prediction is so important for the futures reliability studies, and for academic researches to innovate other new methods and tools. the Mechatronic system is a hybrid system; it is dynamic, reconfigurable, and interactive. The modeling carried out of reliability prediction must take into account these criteria. Several methodologies have been developed in this track of research. In this article, we will try to handle them from a critical angle.
multicast conventions to improve obstacle detection and collusion avoidance ...INFOGAIN PUBLICATION
As of late, it got to be obvious that gathering focused administrations are one of the essential application classes focused by MANETs. In spite of the fact that these conventions perform well under particular versatility situations, movement loads, and system conditions, no single convention has been appeared to be ideal in all situations. The objective of this paper is to describe the execution of multicast conventions over an extensive variety of MANET situations. To this end, we assess the execution of lattice and tree-based multicast steering plans in respect to flooding and prescribe conventions most reasonable for particular MANET situations. In view of the investigation and reproduction results, we likewise propose two varieties of flooding, perused flooding and hyper flooding, as a way to diminish overhead and expansion unwavering quality, separately. Another commitment of the paper is a recreation based relative investigation of the proposed flooding varieties against plain flooding, work, and tree-based MANET directing. In this paper we researched about various sending technique for GPSR in remote system furthermore discover the issues and their answers. The principle point of our study was to distinguish which directing strategy has better execution in very versatile environment of VANET. In MANET, this depletion of vitality will be more because of its infrastructure less nature and versatility. Because of this, the topology get shifted. This may definitely influence the execution of steering convention furthermore influence the system lifetime. To address this issue another calculation has been created which uses the system parameters identifying with element nature of hubs viz. vitality channel rate, relative versatility estimation to foresee the hub lifetime and connection lifetime. At that point execute this calculation in the DYMO convention environment. This will expand the system lifetime and adaptability. Further enhance the execution, we have actualized another calculation by incorporating course lifetime expectation calculation alongside the molecule swarm enhancement (PSO) calculation.
Performance Comparision of Machine Learning AlgorithmsDinusha Dilanka
In this paper Compare the performance of two
classification algorithm. I t is useful to differentiate
algorithms based on computational performance rather
than classification accuracy alone. As although
classification accuracy between the algorithms is similar,
computational performance can differ significantly and it
can affect to the final results. So the objective of this paper
is to perform a comparative analysis of two machine
learning algorithms namely, K Nearest neighbor,
classification and Logistic Regression. In this paper it
was considered a large dataset of 7981 data points and 112
features. Then the performance of the above mentioned
machine learning algorithms are examined. In this paper
the processing time and accuracy of the different machine
learning techniques are being estimated by considering the
collected data set, over a 60% for train and remaining
40% for testing. The paper is organized as follows. In
Section I, introduction and background analysis of the
research is included and in section II, problem statement.
In Section III, our application and data analyze Process,
the testing environment, and the Methodology of our
analysis are being described briefly. Section IV comprises
the results of two algorithms. Finally, the paper concludes
with a discussion of future directions for research by
eliminating the problems existing with the current
research methodology.
Fuzzy expert system based optimal capacitor allocation in distribution system-2IAEME Publication
One of the most popular image denoising methods based on self-similarity is called nonlocal
means (NLM). Though it can achieve remarkable performance, this method has a few shortcomings,
e.g., the computationally expensive calculation of the similarity measure, and the lack of reliable
candidates for some non repetitive patches. In this paper, we propose to improve NLM by integrating
Gaussian blur, clustering, and row image weighted averaging into the NLM framework.
Experimental results show that the proposed technique can perform denoising better than the original
NLM both quantitatively and visually, especially when the noise level is high.
Similar to International Journal of Engineering Research and Development (20)
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Key Trends Shaping the Future of Infrastructure.pdf
International Journal of Engineering Research and Development
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 8 (August 2014), PP.36-44
Formalization of an Approach for Improvement of Maintenance
Policy on Multi-State Systems
Fadaba Danioko1, Sid Ali Addouche2, Abderrahman El Mhamedi3
1 ,2 ,3Equipe MGSI-Université Paris8/LISMMA EA 2336, 140, rue de la Nouvelle France,
Montreuil France.
Abstract:- This work includes part of the results of I.W.Soro on performance evaluation of Multi-State Systems
(MSS) about the preventive maintenance policy. It was to assess the availability and the rate of production of a
multi-state system based on a rate of transitions in the level of β degradation. The formalism of calculation
based on Markov chains used and Chapman-Kolmogorov equations induce as many calculations as possible
cases of β transition rates to deduce the one that brings the best drift of the availability curves and production
rates. Moreover, the representation of multi-state system by a Markov graph quickly becomes dense and
difficult to use. In this paper, it will first be presented formalization of the transition process of multi-state
system (MSS) by Bayesian Networks (especially compact) and the rules governing promotion from the Markov
graph. In a second step, it will be exhibited, the cost function of preventive maintenance and the best method for
identifying the β transition rates and thus the best preventive maintenance policy to adopt. The optimization has
done by reinforcement learning.
Keywords:- Multi-State Systems, Graph Markov, Dynamic Bayesian Networks, Preventive Maintenance ,
Modeling
I. INTRODUCTION
Today, the complexity of industrial systems and production requirements prompt maintenance services
to make a management even more rigorous in their task and a continuous search for improvement of
maintenance strategies. That will require the availability of tools for decision support on the choice of these
strategies according to indicators, notably the cost and the productivity.
Commonly, to satisfy production requirements such as productivity improvements, the production
machines are forced to operate continuously under several levels of performance with the least possible
downtime. This operating mode called "multi-state" will cause multiple damage (fatigue, wear, physico-chemical
alterations, etc..) without the input of a process of national policy maintenance (preventive and
36
corrective).
It is in this context that is currently oriented researches on the reliability, the modeling and optimization
of the preventive maintenance of Multi-State Systems (MMS).
Our objective of this paper is, firstly, to present our work on the formalization of various system states
by the Dynamic Bayesian Network from a degradation model by Markov chain and on the other hand, the
formulation evaluation of the availability, the cost function and the preventive maintenance method for
identifying the best combination of β transition rates and thus the best preventive maintenance policy to adopt
continuously. The remain of the paper is organized as follows. Section 2 is devoted to a review of the MSS.
Section 3 compares the formalism of Dynamic Bayesian Network (DBN) to the Markov chain. Section 4
presents the proposed approach. Section 5 is the application of the approach with the results. Section 6 provides
a conclusion of the work.
II. STATE OF THE ART
2.1 Concept of Multi-State
In the classical concept, in binary mode systems worked either in perfect condition or completely failed
state. The theory of this binary system in [1] paved the way to the mathematical theory and statistical reliability.
In practice with production issues, we realized the need of another mode of operation that may confer to
production services and maintenance flexibility of operating their facilities therefore to have the desired
availability and maintenance costs reasonable. The system will integrate several operating states corresponding
to levels of system performance, hence the name of multi-state systems.
In reality, the system components can operate at different levels of degradation. This degradation varies
between states of operation and the total failure of the element [2] . For example: sheller's status can be 0, 1, 2, 3,
4 corresponding to 0%, 25%, 50%, 75%, 100% of its total capacity.
2. Formalization of an Approach for Improvement of Maintenance Policy on Multi-State Systems
The theory of multi-state systems emerged with the work in [3] which defines the system state as the
state of the worst component at best minimal link, or the state of the best component at minimal cut. The
performance of any system depends on the state of its components and there are different configurations: the
systems in series, parallel, series-parallel and parallel-series, k-among-n, k-consecutive among-n. K-consecutive
among-n systems are also the subject of interesting studies considering their better reliability
compared with series systems, cheaper than parallel systems and their large application [4].
2.2 Methods of assessment and review of Multi-State Systems
Many studies have been done on analyzing the availability or reliability of multistate systems. We
identified four main approaches in the literature to assess the availability and reliability of these Multi-State
Systems (MSS):
Stochastic [5],
Monte Carlo[6],
Functional [7],
UMGF [8].
As for estimating the availability of larger systems, the UMGF method is the best applied among other
methods (Stochastic, Monte Carlo). A literature review relatively exhaustive on the reliability of MSS can be
found for example in [9]. Many researchers have focused on the study of MSS and their application in various
fields such as industry, medicine etc., each with different approaches or formalisms more or less varied as
follows:
Reference [10] has shown properties for deterministic and probabilistic system performance.
Reference [11] used the approach of a Markovian system in three states. He led a study, of the availability status,
frequency of failure and mean time to failure.
Reference [12] developed a simulation algorithm to calculate the probability distribution of system state and
also used the theory of Markov chain to give the component reliability and the system.
Reference [13] developed a model to assess the availability, the production rate and the reliability
function of degraded multi state systems subjected to minimal repairs and imperfect preventive maintenance .
They associated to each state of its system Markov model a performance rate. The aim is that the rate of system
performance at time t exceeds the customer's request. The transition from one state to another is made according
to the exponential law. The analytical model is established by the Chapman-Kolmogorov equations. However
we find that this customer demand (production rate) is constant this is not the case in practice.
Reference [14] proposed a study and a construction of a general model for representing generic term models that
can adapt to multi-state systems, with the laws of any stay time and possibly a contextual dependency. To do
this, they propose a particular Dynamic Bayesian Network appointed Model Graphical Time (MGD).
Reference [15] established an integrated planning of preventive maintenance and production of multi-state
systems, the work provides planning templates to generate an optimal production plan at the tactical level and
the moments when response intervals for preventive maintenance actions (acyclic or cyclic). To obtain optimal
solutions, they developed methods of assessing time and cost of maintenance, capabilities relating to systems
and some algorithms of resolution. This work provides an economic impact by integrating the planning of
preventive maintenance and production.
Reference [16] based on the dynamic Bayesian network, on the one hand they offered a cost function to
evaluate maintenance policies and on the other hand an optimization algorithm type genetics in order to retain
the optimal preventive maintenance policy. Their approach is applied to a distribution system for three valves.
III. MARKOV CHAIN FORMALISM AND DYNAMIC BAYESIAN NETWORK
We present here Dynamic Bayesian Networks and Markov Chain while exposing the strengths and benefits of
each.
37
3.1 Dynamic Bayesian Networks
Dynamic Bayesian Networks (DBN) are really an extension of Bayesian networks in which the
temporal evolution of the variables is represented in ([17], [18], [19]). Dynamic Bayesian Networks are also
shown as an extension of Markov Chains [20]. In many works on the representation of complex systems,
probabilistic graphical models such as DBN hold a prominent place in the modeling of dynamic systems with
discrete and finite states [21].
It aims to model the probability distribution of a series of variables X X X X t 1 t T 1, t 2, t n , t 1
t
T , ,...,
on
a sequence of length T∈ℕ. The process is represented by a node
i
t X at time step t with a finite number of
3. Formalization of an Approach for Improvement of Maintenance Policy on Multi-State Systems
S and arcs represent dependencies between time points. A state space is
n i i i .
-1 -1 -2 -2 1 1 -1 -1
P X j X i X i X i P X j X i (1)
P X j X i is called the transition probability.
ij n n n
P P X j X i (2)
38
i i
possible states : S X ,..., S
X
i
i N X
N
Ω= .
SX i
the cross product of the values of states for individual state variables: i
i=1
p X being the probability
t
distribution on variable states at step time t. The nodes correspond to state variables that can be partitioned into
two sets: one corresponding to the state variables at time step t and the other corresponding to the system state at
next time step (t +1). The variable is then represented at successive times in this case.
The following figure shows a dynamic Bayesian network with two time steps t and (t +1), the network is called
dynamic Bayesian network with two slices named DBN-2.
Fig. 1: Modeling of a 2-DBN
Many studies speak of the relationship or the link of Markov chains to Dynamic Bayesian Network.
A correspondence between Markov chains and Dynamic Bayesian Network is presented case by case, an
advantage of the Bayesian network of Markov chains is highlighted in [22].
Indeed the Dynamic Bayesian Network is most suitable and appropriate in the reliability analysis of large
complex systems.
3.2 Markov Chain
The sequence of random variables X1, X2,..., Xn forms a Markov chain with discrete state space if for all n ℕ
and all possible values of Xn random variables , we have :
1 2
...
| , ,..., |
n n n n n n n n
This conditional probability |
n n -1 n
-1
Indeed the transition probability allows for a transition from Ei state at step (n-1) to the Ei state at step nth.
The Markov chain is said to be homogeneous when this probability does not depend on n, that is to say
|
-1 -1
The following figure shows an example of a Markov chain with two states, the model represents the transition
probabilities that are associated with each arc.
Fig. 2: Example of Markov chain
In the case of a Markov process with time independent the failure rate is considered constant while in
the Markov process at this time dependent this rate is not constant so variable. This is explained by the fact that
degradation of the component of a system within an industrial environment is constantly changing over time due
to its use or age.
However the use of Markov models have limitations in particular the combinatorial explosion in the number of
states likely to be occupied by the system which is desired to model the behaviour [23] (Innal, F., et al., 2006).
4. Formalization of an Approach for Improvement of Maintenance Policy on Multi-State Systems
IV. APPROACH
Our goal is to provide an approach and a tool for decision support that enable searching the optimal
preventive maintenance policy based on a simulation of an entire operating horizon of material with a learning
gradually( history) decisions and performance (failure rate and availability) obtained each time. In addition, the
tool should allow to add expert knowledge of a cognitive nature. As a dysfunctional representation of the
equipment, we start from a state representation via a graph and Markov chain:
i. We produce the structure of a Dynamic Bayesian Network (DBN) and define the conditional probability
tables (modeling the transition parameters of multi-state systems). The nodes correspond to the transition
parameters;
ii. We define the rules for the passage of the Markov graph to a Dynamic Bayesian Network (setting rule of
conditional probability tables CPT, ...). These are generic rules of passage and not specific to application
case treated;
iii. We integrate the indicators performance for the assessment (availability, maintenance cost, ...) in DBN;
iv. We simulate the behavior of the equipment (multi-state) on a service life where the parameters are
stochastic and not constant. The target node is the variable state of degradation. The stochastic evolution of
PM levels will be associated with each iteration, the availability and cost of operational maintenance of
equipment;
v. We use a reinforcement learning algorithm to obtain the optimal level of preventive maintenance in view of
39
the simulation.
V. BAYESIAN MODELLING OF MULTI-STATE SYSTEM
We start from the representation of the Markov graph that shows the different states that could have a
production system.
The parameters of transitions between states are:
i
: Failure rate from i state to i+1 state
i
: Degradation rate from i state to i+1 state
i
: Rate of passage from degraded state to next degraded state
i
: Repair rate from failure state to degraded state
To follow the evolution of a given system, we consider a decision variable of preventive maintenance policy
called x in the graph of Markov chain (Fig.9).
5.1 Bayesian model of MSS
From the Markov graph, we establish the structure of our Dynamic Bayesian Network as shown in Fig.3.
Fig. 3: Bayesian model of MSS
i i
Et et Et 1 respectively denote the state of system at time t, the state of system at time ( t+1).
A t et t respectively denote vectors consisted of and avec i 1,2,...,n .
1 t et t respectively denote the vectors formed of i
and i
with i 1,2,...,n
5. Formalization of an Approach for Improvement of Maintenance Policy on Multi-State Systems
In this article we will use the following structure of the DBN
Fig. 4: Bayesian model used
To fill in the conditional probability tables of our DBN structure, we use the Chapman-Kolmogorov equations to
determine the transitions probability of system states.
k k k k k k k k k
P P P x P d
( 1) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( )
1 1
1 1 1 1 2 1 1 2 1
k k k k k k k k k k k
j d P j j P P P x j j P j j j j j d
k k k k k
P d d P d
d P d
k k k k k
j d P P P d j d j d j d j d j
(4)
(5)
state c k : utility associated with the state k of the component v.
C t c a c a g a c k P X k
40
( 1) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( )
2,...., 1 : 1 2 1 2 1 1 2 1 2 3 2 1
k k k d k k
P d d d x j j
( 1) ( ) ( ) ( ) ( )
1
2 1
1
j
k k k k k
P d d P d d P d
1 ( ) ( ) ( ) ( ) ( )
2 1 2 1 2 3
( 1) ( ) ( ) ( ) ( )
1
2 1 1 2 1 2 1
( 1) ( ) ( ) ( ) ( )
2,..., 1 : 1
2 2 1 2 1
k k k k
P d m P d m d m P d m
P P j j n
n k
Pi t T
i
( 1) ( ) ( ) ( )
2 2 1 2 1
(0) (0)
1, 0; 2,...,
1
( )
1;0
1
5.2 Performance indicators
We consider in our approach the following performance indicators:
The availability of multi-state system is the probability of being in an acceptable state of operation at time t :
2 1
A t P
1
n
j
j
The states (2j-1) correspond to states of the system degraded.
The cost level of a component is:
v act pen state
t t
a A k
x
act c a : utility (cost) associated with a maintenance action (repair or replacement) belonging to A, which
denotes all maintenance actions.
pen c a : utility associated with the penalty due to the sudden failure of the system. We assume that cpen (a) is
always 0 for preventive maintenance. On the other hand, for a curative preventive maintenance policy 1 , this
utility can quantify itself for example the loss in preparation time of the maintenance team (to get spare parts, to
call logistics technicians ..) and this before effective repair of the system.
Traditional models assume that the component after the preventive maintenance tasks is "as good as new".
But in some cases, the system is not really refurbished, after preventive maintenance. This preventive action is
called imperfect maintenance and unsatisfactory. In this work we model the effects of imperfect preventive
maintenance by reducing the effective age of the component held, using an adjustment factor.
6. Formalization of an Approach for Improvement of Maintenance Policy on Multi-State Systems
Suppose that the preventive maintenance is performed every k time, such as k = 0, 1, 2, 3, ... and designates the
time step. The total replacement of the component is expected after an operating time greater than * N .
The probability that the component is in good working order after a preventive maintenance action is:
PXk (1)PX1 where is the adjustment factor.
The total cost of system maintenance is:
(6)
41
N
C T C t C x P sys s
1
V sys
t
t s
S
Where S and syst C s respectively denote the set of states and the utility of the s state of the Sys system, during
a time unit.
We integrate our structure by RBD performance indicators such as the maintenance cost and availability (Fig. 5).
Fig. 5: Integration indicators
VI. SIMULATION
It is considered that the transition parameters are constant and their values are taken in the table.
Table I: The parameters of transition
Then given the Table I and Chapman-Kolmogorov equations, probability distributions of the various nodes of
our RBD are calculated and put in their conditional probability tables (CPT).
The simulation is made over a period of two teams working 17600h or 8h on 20 working days in the month and
during five years.
Fig.6: Markov graph with constant parameters
We consider a system with six states (Fig. 6) and simulation studies give us about 35% of availability
with an average hourly income of 24% or about 2,457 euro (fig. 7).
7. Formalization of an Approach for Improvement of Maintenance Policy on Multi-State Systems
Fig. 7: Simulation curve
To better analyze and get the optimal preventive maintenance level, we set here three ways:
no preventive maintenance
minimal preventive maintenance
maximal preventive maintenance
The D1 decision node imposes the one of maintenance levels cited above and a learning algorithm to
make a good decision among the terms at each iteration and the occurrence of the state 5.
We note by learning the system studied has about an availability of 38% against 35% in the previous case
without learning with average hourly income of 27% against 24% in the simulation (Fig. 8). So a 3% increase in
availability and in income compared to simulation without learning.
Fig. 8: Simulation curve - learning on preventive maintenance
VII. CONCLUSION
The study of multi-states is very interesting and complex in nature and objective assessment of actual
ability. In this paper, we provide a review of multi-state systems, an assessment of availability and maintenance
cost model and optimization approach provides a better choice of maintenance policy.
We consider in our study aspects of transitions where the parameters are constant or variable over time. Our
formalism is based on stochastic processes including the graph associated with the Markov chain to model the
dysfunctional behavior of production systems in time by the DBN.
A simulation study is conducted over a period of 5 years to find the best configurations of policy choices
maintenance curves and deduce indicators of system performance.
42
8. Formalization of an Approach for Improvement of Maintenance Policy on Multi-State Systems
The proposed model can be applied by the manufacturers subject to variability of the maintenance policy.
Fig. 9: Graph of Markov chain considered
REFERENCES
[1]. A. Birnbaum, Some latent trait models and their use in inferring an examinee’s ability, In F. M. Lord &
M. R. Novick (Eds.), Statistical theories of mental test scores, 1968.
[2]. S. Bouri “Optimisation de la production et de la structure d'énergie électrique par les colonies de
fourmis ”, Thèse, Université Jilali Liabès, 2007.
[3]. W. Barlow, and A. Wu, Coherent systems with multi-state components, Math. Oper. Res.volume(3),
43
N°4, pp. 275-281, 1978.
[4]. S. Belaloui “Évaluation des systèmes de fiabilité a configuration complexe”, Thèse université,
Mentouri Constantine, 2009.
[5]. J. Xue, K. Yang, Dynamic reliability analysis of coherent multi-state systems, IEEE Transactions on
Reliability; 44: 683–8, 1995.
[6]. E. Zio, L. Podofillini, A Monte Carlo approach to the estimation of importance measures of multi-state
components. In: Reliability and maintainability annual symposium (RAMS). p. 129–34, 2004.
[7]. S.M. Ross, Multivalued state component systems, Annals of Probability;7(2):379–83, 1979.
[8]. G. Levitin, Universal generating function, in: reliability analysis and optimization. Berlin
(Heidelberg/New York): Springer-Verlag, 2003.
[9]. A. Lisnianski, G. Levitin, Multi-state system reliability: assessment, optimization and applications.
World scientific Publishing Co. Pte Ltd, Singapore, 2003.
[10]. E. El-Neweihi, F. Proschan, and J. Sethuraman, Multi-state coherent systems, J. Appl.Prob., volume
15, pp. 675-688, 1978.
[11]. K.B. Misra , Reliability analysis and prediction: A methodology oriented treatment , Elsevier, 1992.
[12]. A.J. Li, W. Yu., K. Liu, Reliability estimation and prediction of M.S components and coherent system,
Reliability Engineering System Safety, pp. 93-98, 2005
[13]. I.W Soro, M. Nourelfath, A.-K. Daouda, Performance evaluation of multi-state degraded systems with
minimal repairs and imperfect preventive maintenance, Reliability Engineering and System Safety 95
(2), pages 65-69. 2009.
[14]. R. Donat, P. Leray, L. Bouillaut, P. Aknin, Réseaux bayésiens dynamiques pour la représentation de
modèles de durée en temps discret, 2008.
[15]. C. Fitouhi, M. Nourelfath, “Optimisation de la planification intégrée de la maintenance préventive et de
la production des systèmes multi-états” Thèse université de Laval, faculté des sciences et de génie,
2011.
[16]. I. Ayadi, L. Bouillaut, P. Aknin, Optimisation par algorithme génétique de la maintenance préventive
dans un contexte de modélisation par modèles graphiques probabilistes, 17ème congrès de Maîtrise des
Risques et de Sûreté de Fonctionnement, la Rochelle, 2011.
[17]. T. Dean, K. Kanazawa, A model for reasoning about persistence and causation, Computationnal
Intelligence, 5(3), 1, 142–150, 1989.
9. Formalization of an Approach for Improvement of Maintenance Policy on Multi-State Systems
[18]. D. Bellot, “Fusion de données avec des réseaux bayésiens pour la modélisation des systèmes
dynamiques et son application en télémédecine ” Thèse, Université Henri Poincaré, Nancy 1, France,
2002.
[19]. J. Binder, K. Murphy and S. Russell, Space-efficient inference in dynamic probabilistic networks. in
Proceedings of the 15th International Joint Conference on Artificial Intelligence(IJCAI’97), (pp.
1292–1296), Morgan Kaufmann Publishers, 1997.
[20]. P. Weber, L. Jouffe, Reliability modelling with Dynamic Bayesian Networks. 5th IFAC Symposium on
Fault Detection, Supervision and Safety of Technical Processes,Washington, D.C, USA, June 9-11,
2006.
[21]. H. Bouillaut, J.B. Dugan, Coherent system, Reliability Engineering System Safety, pp. 93-98, 2005.
[22]. A. Salem Ben, A. Müller, P. Weber, Dynamic Bayesian Networks in system reliability analysis, IFAC,
44
2006.
[23]. F. Innal, & Y. Dutuit, Evaluation de la performance d’un système de production et des contributions
individuelles de ses unités constitutives, 2006.