International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
by Andrew Rowland
Management of aging electronic systems is a problem faced by many industries. Management of these systems requires some understanding of their reliability performance. In the United States commercial nuclear industry several approaches are being taken in an attempt to understand the reliability performance of plant systems. This article describes one approach being used. The method is non- parametric and requires no specialized data analysis software.
Application of Fuzzy Logic in Load Balancing of Homogenous Distributed Systems1CSCJournals
Various studies have shown that distributing the work load evenly among processors of a
distributed system highly improves system performance and increases resource utilization. This
process is known as load balancing. Fuzzy logic has been applied in many fields of science and
industry to deal with uncertainties. Existing research in using fuzzy logic for the purpose of load
balancing has only concentrated in utilizing fuzzy logic concepts in describing processors load
and tasks execution length. The responsibility of the fuzzy-based load balancing process itself,
however, has not been discussed and in most reported work is assumed to be performed in a
distributed fashion by all nodes in the network. This paper proposes a new fuzzy dynamic load
balancing algorithm for homogenous distributed systems. The proposed algorithm utilizes fuzzy
logic in dealing with inaccurate load information, making load distribution decisions, and
maintaining overall system stability. In terms of control, we propose a new approach that specifies
how, when, and by which node the load balancing is implemented. Our approach is called
Centralized-But-Distributed (CBD). An evaluation study of the proposed algorithm shows that our
algorithm is able to reduce the average response time and average queue length as compared to
known load balancing algorithms reported in the literature.
Measurement and Evaluation of Reliability, Availability and Maintainability o...IOSR Journals
The growing complexity of equipments and systems often lead to failures and as a consequence the
aspects of reliability, maintainability and availability have come into forefront. The failure of machineries and
equipments causes disruption in production resulting from a loss of availability of the system and also increases
the cost of maintenance. The present study deals with the determination of reliability and availability aspects of
one of the significant constituent in a Railway Diesel Locomotive Engine. In order to assess the availability
performance of these components, a broad set of studies has been carried out to gather accurate information at
the level of detail considered suitable to meet the availability analysis target. The Reliability analysis is
performed using the Weibull Distribution and the various data plots as well as failure rate information help in
achieving results that may be utilized in the near future by the Railway Locomotive Engines for reducing the
unexpected breakdowns and will enhance the reliability and availability of the Engine. In this work, ABC
analysis has been used for the maintenance of spare parts inventory. Here, Power pack assemblies, Engine
System are used to focus on the reliability, maintainability and availability aspects
Cluster Computing Environment for On - line Static Security Assessment of lar...IDES Editor
The increased size of modern power systems
demand faster and accurate means for the security assessment,
so that the decisions for reliable and secure operation planning
could be drawn in a systematic manner. Large computational
overhead is the major impediment in preventing the power
system security assessment (PSSA) from on-line use. To
mitigate this problem, this paper proposes, a cluster computing
based architecture for power system static security assessment,
utilizing the tools in the open source domain. A variant of the
master/slave pattern is used for deploying the cluster of
workstations (COW), which act as the computational engine
for the on-line PSSA. The security assessment is performed
utilizing the developed composite security index that can
accurately differentiate the secure and non-secure cases and
has been defined as a function of bus voltage and line flow
limit violations. Due to the inherent parallel structure of
security assessment algorithm and to exploit the potential of
distributed computing, domain decomposition is employed for
parallelizing the sequential algorithm. Extensive
experimentations were carried out on IEEE 57 bus and IEEE
145-bus 50 machine standard test systems for demonstrating
the validity of the proposed architecture.
A model for run time software architecture adaptationijseajournal
Since the global demand for software systems and constantly changing environments and systems is
increasing, the adaptability of software systems is of significant importance. Due to the architecture of
software system is a high-level view of the system and makes the modifiability possible at an overall level,
the adaptability of the software can be considered an effective approach to adapt software systems by
changing architecture configuration. In this study, the architecture configuration is modified through xADL
language which is a software architecture description language with a high flexibility. Software
architecture reconfiguration is done based on existing rules of rule-based system, which are written with
respect to three strategies of load balancing, fixed bandwidth and fixed latency. The proposed model of the
study is simulated based on samples of client-server system, video conferencing system and students’
grading system. The proposed model can be used in all types of architecture, include Client Server
Architecture, Service Oriented Architecture and etc.
by Andrew Rowland
Management of aging electronic systems is a problem faced by many industries. Management of these systems requires some understanding of their reliability performance. In the United States commercial nuclear industry several approaches are being taken in an attempt to understand the reliability performance of plant systems. This article describes one approach being used. The method is non- parametric and requires no specialized data analysis software.
Application of Fuzzy Logic in Load Balancing of Homogenous Distributed Systems1CSCJournals
Various studies have shown that distributing the work load evenly among processors of a
distributed system highly improves system performance and increases resource utilization. This
process is known as load balancing. Fuzzy logic has been applied in many fields of science and
industry to deal with uncertainties. Existing research in using fuzzy logic for the purpose of load
balancing has only concentrated in utilizing fuzzy logic concepts in describing processors load
and tasks execution length. The responsibility of the fuzzy-based load balancing process itself,
however, has not been discussed and in most reported work is assumed to be performed in a
distributed fashion by all nodes in the network. This paper proposes a new fuzzy dynamic load
balancing algorithm for homogenous distributed systems. The proposed algorithm utilizes fuzzy
logic in dealing with inaccurate load information, making load distribution decisions, and
maintaining overall system stability. In terms of control, we propose a new approach that specifies
how, when, and by which node the load balancing is implemented. Our approach is called
Centralized-But-Distributed (CBD). An evaluation study of the proposed algorithm shows that our
algorithm is able to reduce the average response time and average queue length as compared to
known load balancing algorithms reported in the literature.
Measurement and Evaluation of Reliability, Availability and Maintainability o...IOSR Journals
The growing complexity of equipments and systems often lead to failures and as a consequence the
aspects of reliability, maintainability and availability have come into forefront. The failure of machineries and
equipments causes disruption in production resulting from a loss of availability of the system and also increases
the cost of maintenance. The present study deals with the determination of reliability and availability aspects of
one of the significant constituent in a Railway Diesel Locomotive Engine. In order to assess the availability
performance of these components, a broad set of studies has been carried out to gather accurate information at
the level of detail considered suitable to meet the availability analysis target. The Reliability analysis is
performed using the Weibull Distribution and the various data plots as well as failure rate information help in
achieving results that may be utilized in the near future by the Railway Locomotive Engines for reducing the
unexpected breakdowns and will enhance the reliability and availability of the Engine. In this work, ABC
analysis has been used for the maintenance of spare parts inventory. Here, Power pack assemblies, Engine
System are used to focus on the reliability, maintainability and availability aspects
Cluster Computing Environment for On - line Static Security Assessment of lar...IDES Editor
The increased size of modern power systems
demand faster and accurate means for the security assessment,
so that the decisions for reliable and secure operation planning
could be drawn in a systematic manner. Large computational
overhead is the major impediment in preventing the power
system security assessment (PSSA) from on-line use. To
mitigate this problem, this paper proposes, a cluster computing
based architecture for power system static security assessment,
utilizing the tools in the open source domain. A variant of the
master/slave pattern is used for deploying the cluster of
workstations (COW), which act as the computational engine
for the on-line PSSA. The security assessment is performed
utilizing the developed composite security index that can
accurately differentiate the secure and non-secure cases and
has been defined as a function of bus voltage and line flow
limit violations. Due to the inherent parallel structure of
security assessment algorithm and to exploit the potential of
distributed computing, domain decomposition is employed for
parallelizing the sequential algorithm. Extensive
experimentations were carried out on IEEE 57 bus and IEEE
145-bus 50 machine standard test systems for demonstrating
the validity of the proposed architecture.
A model for run time software architecture adaptationijseajournal
Since the global demand for software systems and constantly changing environments and systems is
increasing, the adaptability of software systems is of significant importance. Due to the architecture of
software system is a high-level view of the system and makes the modifiability possible at an overall level,
the adaptability of the software can be considered an effective approach to adapt software systems by
changing architecture configuration. In this study, the architecture configuration is modified through xADL
language which is a software architecture description language with a high flexibility. Software
architecture reconfiguration is done based on existing rules of rule-based system, which are written with
respect to three strategies of load balancing, fixed bandwidth and fixed latency. The proposed model of the
study is simulated based on samples of client-server system, video conferencing system and students’
grading system. The proposed model can be used in all types of architecture, include Client Server
Architecture, Service Oriented Architecture and etc.
Blackout Prevention Plan – The Stability, Reliability and Security Enhancemen...Power System Operation
The stability, reliability and security of power
system are the concerned issues in Thailand due to the lessons
from the blackout around the world in 2003. Electricity
Generating Authority of Thailand (EGAT), which is responsible
on the generation and transmission system in Thailand, has
considered the measures to avoid the major power failure in
Thailand so-called the blackout prevention plan. The blackout
prevention plan is used as a tool for managing and operating the
system efficiently.
The blackout prevention plan is the preventive plan to
minimize the chance of the failure in the power system in
Thailand as possible. To identify the system vulnerability in the
network, the power system simulations are performed as the
important methodology. The power system analysis is not only
examined on the N-1 criteria but also the events from the past
experience and the potential events that can occur in the
Thailand power grid. Many aspects are analyzed to understand
the constraint on system and select the appropriate methods to
solve the problems efficiently. The investment and maintenance
cost of the solution also are taken into the account to optimize the
security of the system and economics.
In a Power plant with a Distributed Control System ( DCS ), process parameters are continuously stored in databases at discrete intervals. The data contained in these databases
may not appear to contain valuable relational information but practically such a relation exists.
The large number of process parameter values are changing with time in a Power Plant. These parameters are part of rules framed by domain experts for the expert system. With the changes in parameters there is a quite high possibility to form new rules using the dynamics of the process itself. We present an efficient algorithm that generates all significant rules based on the real data. The association based algorithms were compared and the best suited algorithm for this process application was selected. The application for the Learning system is studied in a Power Plant domain. The SCADA interface was developed to acquire online plant data
MAINTENANCE POLICY AND ITS IMPACT ON THE PERFORMABILITY EVALUATION OF EFT SYS...IJCSEA Journal
In the Electronic Funds Transfer (EFT) Systems, faults can cause severe degradation on the performance of this system. Thus, modelling the performance of EFT system without considering dependability aspects can cause inaccurate results. This paper presents a stochastic model for evaluating performance of processing and storage infrastructures of the EFT system. This work also presents a model for evaluating the effects of the proposed preventive maintenance policy and different service level agreements (SLA) on the dependability of the EFT system infrastructure. Then, this paper combines both models (dependability and performance) for evaluating the impact of dependability issues on the performance of the EFT system. Finally, case studies considering EFT system infrastructures are provided to demonstrate the applicability of the adopted approach. Moreover, the results of these case studies are depicted, stressing important aspects of dependability and performance for EFT system planning.
In a Power plant with a Distributed Control System ( DCS ), process parameters are continuously stored in
databases at discrete intervals. The data contained in these databases may not appear to contain valuable
relational information but practically such a relation exists. The large number of process parameter values
are changing with time in a Power Plant. These parameters are part of rules framed by domain experts for
the expert system. With the changes in parameters there is a quite high possibility to form new rules using
the dynamics of the process itself. We present an efficient algorithm that generates all significant rules
based on the real data. The association based algorithms were compared and the best suited algorithm for
this process application was selected. The application for the Learning system is studied in a Power Plant
domain. The SCADA interface was developed to acquire online plant data.
INTERVAL TYPE-2 FUZZY NEURAL NETWORKS FOR SHORT-TERM ELECTRIC LOAD FORECASTIN...ijsc
This paper focuses on the study of short term load forecasting (STELF) using interval Type-2 Fuzzy Logic (IT2FL) and feed-forward Neural Network with back-propagation (NN-BP) tuning algorithm to improve their approximation capability, flexibility and adaptiveness. IT2FL for STELF is presented which provides
additional degrees of freedom for handling more uncertainties for improving prediction accuracy and reducing cost. The IT2FL comprises five components which include; the fuzzification unit, the knowledge base, the inference engine, the type reducer and the defuzzification unit. Gaussian membership function is
used to show the degree of membership of the input variables. The lower and upper membership functions (fired rules) as well as their consequent coefficients of IT2FL are fed into a (NN) which produces a crisp value coresponding to the optimal defuzzified output of IT2FLSs. The NN type reducer is trained to
optimize parameters of membership function (MF) so as to produce an output with minimum error function with the purpose of improving forecasting performance of IT2FLS models. The IT2FNN system has the ability to overcome the limitations of individual technique and enhances their strengths to handle electric load forecasting. The IT2FNN is applied for STELF in Akwa Ibom State-Nigeria. The result of performance
of IT2FNN is compared with IT2FLS and T1FLS methods for short term load forecasting with MSE of 0.00123, 0.00185 and 0.00247 respectively. Also, the results of forecasting are compared using RMSE of 0.035, 0.043 and 0.035 respectively, indicating a best accurate forecasting with IT2FNN. In addition, the result of performance of IT2FNN is compared with IT2FLS and T1FLS methods for short term load forecasting with MAPE of 1.5%, 3% and 4.5% respectively. Simulation results show that the IT2FNN approach takes advantages of accuracy and efficiency and performs better in prediction than IT2FL and
T1FL methods in power load forecasting task. .
A robust algorithm based on a failure sensitive matrix for fault diagnosis of...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
A cost effective computational design of maximum power point tracking for pho...IJECEIAES
Maximum Power Point Tracking (MPPT) is one of the essential controller operations of any Photo-Voltaic (PV) cell design. Developing an efficient MPPT system includes a significant challenge as there are various forms of uncertainty factors that results in higher degree of fluctuation in current and voltage in PV cell. After reviewing existing system, it has been found that there is no presence of any benchmarked model to ensure a better form of computational model. Hence, this paper presents a novel and very simple design of MPPT without using any form of complex design mechanism nor including any form of frequently used iterative approach. The proposed model is completely focused on developing an algorithm that takes the input of voltage (open circuit), current (short circuit), and max power in order to obtain the peak power to be extracted from the PV cells. The study outcome shows faster response time and better form of analysis of current-voltage-power for given state of PV cells.
Initial Optimal Parameters of Artificial Neural Network and Support Vector Re...IJECEIAES
This paper presents architecture of backpropagation Artificial Neural Network (ANN) and Support Vector Regression (SVR) models in supervised learning process for cement demand dataset. This study aims to identify the effectiveness of each parameter of mean square error (MSE) indicators for time series dataset. The study varies different random sample in each demand parameter in the network of ANN and support vector function as well. The variations of percent datasets from activation function, learning rate of sigmoid and purelin, hidden layer, neurons, and training function should be applied for ANN. Furthermore, SVR is varied in kernel function, lost function and insensitivity to obtain the best result from its simulation. The best results of this study for ANN activation function is Sigmoid. The amount of data input is 100% or 96 of data, 150 learning rates, one hidden layer, trinlm training function, 15 neurons and 3 total layers. The best results for SVR are six variables that run in optimal condition, kernel function is linear, loss function is ౬ -insensitive, and insensitivity was 1. The better results for both methods are six variables. The contribution of this study is to obtain the optimal parameters for specific variables of ANN and SVR.
Failure prediction of e-banking application system using adaptive neuro fuzzy...IJECEIAES
Problems often faced by IT operation unit is the difficulty in determining the cause of the failure of an incident such as slowing access to the internet banking url, non-functioning of some features of m-banking or even the cessation of the entire e-banking service. The proposed method to modify ANFIS with Fuzzy C-Means Clustering (FCM) approach is applied to detect four typical kinds of faults that may happen in the e-banking system, which are application response times, transaction per second, server utilization and network performance. Input data is obtained from the e-banking monitoring results throughout 2017 that become data training and data testing. The study shows that an ANFIS modeling with FCM optimized input has a RMSE 0.006 and increased accuracy by 1.27% compared to ANFIS without FCM optimization.
BIO-INSPIRED MODELLING OF SOFTWARE VERIFICATION BY MODIFIED MORAN PROCESSESIJCSEA Journal
A new approach for the control and prediction of verification activities for large safety-relevant software
systems will be presented in this paper. The model is applied on a macroscopic system level and based on
so-called Moran processes, which originate from mathematical biology and allow for the description
ofphenomena as, for instance, genetic drift. Beside the theoretical foundations of this novel approach, its
application on a real-world example from the medical engineering domain will be discussed.
An Imperfect Preventive Maintenance Policy Considering Reliability LimitIJERA Editor
This paper discusses an imperfect preventive maintenance model for a deteriorating repairable system with
consideration of the reliability limitand random maintenance quality. The model is derived from the
combination of failure rate adjustment and age over an infinite time horizon. The maintenance intervals are
obtained assuming both the failure rate increase factor and age restoration factor are random variables with a
uniform distribution. The optimal policy with a sensitivity analysis showing how different cost parameters affect
the long run average maintenance cost rate is presented.
Blackout Prevention Plan – The Stability, Reliability and Security Enhancemen...Power System Operation
The stability, reliability and security of power
system are the concerned issues in Thailand due to the lessons
from the blackout around the world in 2003. Electricity
Generating Authority of Thailand (EGAT), which is responsible
on the generation and transmission system in Thailand, has
considered the measures to avoid the major power failure in
Thailand so-called the blackout prevention plan. The blackout
prevention plan is used as a tool for managing and operating the
system efficiently.
The blackout prevention plan is the preventive plan to
minimize the chance of the failure in the power system in
Thailand as possible. To identify the system vulnerability in the
network, the power system simulations are performed as the
important methodology. The power system analysis is not only
examined on the N-1 criteria but also the events from the past
experience and the potential events that can occur in the
Thailand power grid. Many aspects are analyzed to understand
the constraint on system and select the appropriate methods to
solve the problems efficiently. The investment and maintenance
cost of the solution also are taken into the account to optimize the
security of the system and economics.
In a Power plant with a Distributed Control System ( DCS ), process parameters are continuously stored in databases at discrete intervals. The data contained in these databases
may not appear to contain valuable relational information but practically such a relation exists.
The large number of process parameter values are changing with time in a Power Plant. These parameters are part of rules framed by domain experts for the expert system. With the changes in parameters there is a quite high possibility to form new rules using the dynamics of the process itself. We present an efficient algorithm that generates all significant rules based on the real data. The association based algorithms were compared and the best suited algorithm for this process application was selected. The application for the Learning system is studied in a Power Plant domain. The SCADA interface was developed to acquire online plant data
MAINTENANCE POLICY AND ITS IMPACT ON THE PERFORMABILITY EVALUATION OF EFT SYS...IJCSEA Journal
In the Electronic Funds Transfer (EFT) Systems, faults can cause severe degradation on the performance of this system. Thus, modelling the performance of EFT system without considering dependability aspects can cause inaccurate results. This paper presents a stochastic model for evaluating performance of processing and storage infrastructures of the EFT system. This work also presents a model for evaluating the effects of the proposed preventive maintenance policy and different service level agreements (SLA) on the dependability of the EFT system infrastructure. Then, this paper combines both models (dependability and performance) for evaluating the impact of dependability issues on the performance of the EFT system. Finally, case studies considering EFT system infrastructures are provided to demonstrate the applicability of the adopted approach. Moreover, the results of these case studies are depicted, stressing important aspects of dependability and performance for EFT system planning.
In a Power plant with a Distributed Control System ( DCS ), process parameters are continuously stored in
databases at discrete intervals. The data contained in these databases may not appear to contain valuable
relational information but practically such a relation exists. The large number of process parameter values
are changing with time in a Power Plant. These parameters are part of rules framed by domain experts for
the expert system. With the changes in parameters there is a quite high possibility to form new rules using
the dynamics of the process itself. We present an efficient algorithm that generates all significant rules
based on the real data. The association based algorithms were compared and the best suited algorithm for
this process application was selected. The application for the Learning system is studied in a Power Plant
domain. The SCADA interface was developed to acquire online plant data.
INTERVAL TYPE-2 FUZZY NEURAL NETWORKS FOR SHORT-TERM ELECTRIC LOAD FORECASTIN...ijsc
This paper focuses on the study of short term load forecasting (STELF) using interval Type-2 Fuzzy Logic (IT2FL) and feed-forward Neural Network with back-propagation (NN-BP) tuning algorithm to improve their approximation capability, flexibility and adaptiveness. IT2FL for STELF is presented which provides
additional degrees of freedom for handling more uncertainties for improving prediction accuracy and reducing cost. The IT2FL comprises five components which include; the fuzzification unit, the knowledge base, the inference engine, the type reducer and the defuzzification unit. Gaussian membership function is
used to show the degree of membership of the input variables. The lower and upper membership functions (fired rules) as well as their consequent coefficients of IT2FL are fed into a (NN) which produces a crisp value coresponding to the optimal defuzzified output of IT2FLSs. The NN type reducer is trained to
optimize parameters of membership function (MF) so as to produce an output with minimum error function with the purpose of improving forecasting performance of IT2FLS models. The IT2FNN system has the ability to overcome the limitations of individual technique and enhances their strengths to handle electric load forecasting. The IT2FNN is applied for STELF in Akwa Ibom State-Nigeria. The result of performance
of IT2FNN is compared with IT2FLS and T1FLS methods for short term load forecasting with MSE of 0.00123, 0.00185 and 0.00247 respectively. Also, the results of forecasting are compared using RMSE of 0.035, 0.043 and 0.035 respectively, indicating a best accurate forecasting with IT2FNN. In addition, the result of performance of IT2FNN is compared with IT2FLS and T1FLS methods for short term load forecasting with MAPE of 1.5%, 3% and 4.5% respectively. Simulation results show that the IT2FNN approach takes advantages of accuracy and efficiency and performs better in prediction than IT2FL and
T1FL methods in power load forecasting task. .
A robust algorithm based on a failure sensitive matrix for fault diagnosis of...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
A cost effective computational design of maximum power point tracking for pho...IJECEIAES
Maximum Power Point Tracking (MPPT) is one of the essential controller operations of any Photo-Voltaic (PV) cell design. Developing an efficient MPPT system includes a significant challenge as there are various forms of uncertainty factors that results in higher degree of fluctuation in current and voltage in PV cell. After reviewing existing system, it has been found that there is no presence of any benchmarked model to ensure a better form of computational model. Hence, this paper presents a novel and very simple design of MPPT without using any form of complex design mechanism nor including any form of frequently used iterative approach. The proposed model is completely focused on developing an algorithm that takes the input of voltage (open circuit), current (short circuit), and max power in order to obtain the peak power to be extracted from the PV cells. The study outcome shows faster response time and better form of analysis of current-voltage-power for given state of PV cells.
Initial Optimal Parameters of Artificial Neural Network and Support Vector Re...IJECEIAES
This paper presents architecture of backpropagation Artificial Neural Network (ANN) and Support Vector Regression (SVR) models in supervised learning process for cement demand dataset. This study aims to identify the effectiveness of each parameter of mean square error (MSE) indicators for time series dataset. The study varies different random sample in each demand parameter in the network of ANN and support vector function as well. The variations of percent datasets from activation function, learning rate of sigmoid and purelin, hidden layer, neurons, and training function should be applied for ANN. Furthermore, SVR is varied in kernel function, lost function and insensitivity to obtain the best result from its simulation. The best results of this study for ANN activation function is Sigmoid. The amount of data input is 100% or 96 of data, 150 learning rates, one hidden layer, trinlm training function, 15 neurons and 3 total layers. The best results for SVR are six variables that run in optimal condition, kernel function is linear, loss function is ౬ -insensitive, and insensitivity was 1. The better results for both methods are six variables. The contribution of this study is to obtain the optimal parameters for specific variables of ANN and SVR.
Failure prediction of e-banking application system using adaptive neuro fuzzy...IJECEIAES
Problems often faced by IT operation unit is the difficulty in determining the cause of the failure of an incident such as slowing access to the internet banking url, non-functioning of some features of m-banking or even the cessation of the entire e-banking service. The proposed method to modify ANFIS with Fuzzy C-Means Clustering (FCM) approach is applied to detect four typical kinds of faults that may happen in the e-banking system, which are application response times, transaction per second, server utilization and network performance. Input data is obtained from the e-banking monitoring results throughout 2017 that become data training and data testing. The study shows that an ANFIS modeling with FCM optimized input has a RMSE 0.006 and increased accuracy by 1.27% compared to ANFIS without FCM optimization.
BIO-INSPIRED MODELLING OF SOFTWARE VERIFICATION BY MODIFIED MORAN PROCESSESIJCSEA Journal
A new approach for the control and prediction of verification activities for large safety-relevant software
systems will be presented in this paper. The model is applied on a macroscopic system level and based on
so-called Moran processes, which originate from mathematical biology and allow for the description
ofphenomena as, for instance, genetic drift. Beside the theoretical foundations of this novel approach, its
application on a real-world example from the medical engineering domain will be discussed.
An Imperfect Preventive Maintenance Policy Considering Reliability LimitIJERA Editor
This paper discusses an imperfect preventive maintenance model for a deteriorating repairable system with
consideration of the reliability limitand random maintenance quality. The model is derived from the
combination of failure rate adjustment and age over an infinite time horizon. The maintenance intervals are
obtained assuming both the failure rate increase factor and age restoration factor are random variables with a
uniform distribution. The optimal policy with a sensitivity analysis showing how different cost parameters affect
the long run average maintenance cost rate is presented.
Fault tolerance is an important issue in the field of cloud computing which is concerned with the techniques or mechanism needed to enable a system to tolerate the faults that may encounter during its functioning. Fault tolerance policy can be categorized into three categories viz. proactive, reactive and adaptive. Providing a systematic solution the loss can be minimized and guarantee the availability and reliability of the critical services. The purpose and scope of this study is to recommend Support Vector Machine, a supervised machine learning algorithm to proactively monitor the fault so as to increase the availability and reliability by combining the strength of machine learning algorithm with cloud computing.
Parameter Estimation of Software Reliability Growth Models Using Simulated An...Editor IJCATR
The parameter estimation of Goel’s Okomotu Model is performed victimisation simulated annealing. The Goel’s Okomotu
Model is predicated on Exponential model and could be a easy non-homogeneous Poisson method (NHPP) model. Simulated
annealing could be a heuristic optimisation technique that provides a method to flee local optima. The information set is optimized
using simulated annealing technique. SA could be a random algorithmic program with higher performance than Genetic algorithmic
program (GA) that depends on the specification of the neighbourhood structure of a state area and parameter settings for its cooling
schedule.
Worker Scheduling for Maintenance Modeling SoftwareIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Security Constraint Unit Commitment Considering Line and Unit Contingencies-p...IJAPEJOURNAL
This paper presents a new approach for considering all possible contingencies in short-term power system operation. Based on this new approach, both generator and transmission line outages would be modeled in network-based power system analysis. Multi generator and also parallel transmission lines is modeled in this methodology. We also investigate this claim that feasibility and applicability of this approach is much more than the previous analytical methodologies. Security Constrained Unit commitment (SCUC) program which is carried out by Independent System Operator (ISO), is one of the complex problems which would be handled by this approach. In this paper, a DC-Optimal Power Flow (DCOPF) methodology has been implemented by particle swarm optimization technique. The Lagrangian Relaxation technique is based on the derivatives and the PSO is a non- derivative technique. These approaches are effective tools which can be implemented for short-term and long-term power system analysis, especially for economic analysis of restructured power systems. The DCOPF methodology has been considered for LMP calculation in LR, which is not available in PSO techniques. In the other hand, PSO technique may be able to provide the optimal solution, where LR usually getting stuck at a local optimum in a large scale power system. The simulation results show that the presented methods are both satisfactory and consistent with expectation.
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...ijccmsjournal
Monte-Carlo simulation is widely used in distributed embedded system in our present era. In this
research work, we have put an emphasis on reliability assessment of any distributed embedded system
through Monte-Carlo simulation. We have done this assessment on random data which represents input
voltages ranging from 0 volt to 12 volt; several numbers of trials have been executed on those data to
check the average case behavior of a distributed real time embedded system. From the experimental result, a saturation point has been achieved against the time behavior which shows the average case behavior of the concerned distributed embedded system.
Optimized sensor selection for control and fault tolerance of electromagnetic...ISA Interchange
This paper presents a systematic design framework for selecting the sensors in an optimized manner, simultaneously satisfying a set of given complex system control requirements, i.e. optimum and robust performance as well as fault tolerant control for high integrity systems. It is worth noting that optimum sensor selection in control system design is often a non-trivial task. Among all candidate sensor sets, the algorithm explores and separately optimizes system performance with all the feasible sensor sets in order to identify fallback options under single or multiple sensor faults. The proposed approach combines modern robust control design, fault tolerant control, multi-objective optimization and Monte Carlo techniques. Without loss of generality, it's efficacy is tested on an electromagnetic suspension system via appropriate realistic simulations.
Modified artificial immune system for single row facility layout problemIAEME Publication
One of the main optimization algorithms currently available in the research field is an Artificial Immune System where abundant applications are using this algorithm for clustering and patter recognition processes. These algorithms are providing more effective optimized results in multi-model optimization problems than Genetic Algorithm.
Nowadays, the location and sizing of distributed generation (DG) units in power system network are crucial to be at optimal as it will affect the power system operation in terms of stability and security. In this paper, a new technique termed as Immune Log-Normal Evolutionary Programming (ILNEP) is applied to find the optimal location and size of distributed generation units in power system network. Voltage stability is considered in solving this problem. The proposed technique has been tested on the IEEE 26 bus Reliability Test System to find the optimal location and size of distributed generation in transmission network. In order to study the performance of ILNEP technique in solving DG Installation problem, the results produced by ILNEP were compared with other meta-heuristic techniques like evolutionary programming (EP) and artificial immune system (AIS). It is found that the proposed technique gives better solution in term of lower total system loss compared to the other two techniques.
Guidelines to Understanding to estimate MTBFijsrd.com
To quantifying a reparable system or reliability we can use MTBF. It has been used for various decisions. MTBF is determining the reliability. For developing the MTBF model we can use Poisson distribution, Weibull model and Bayesian are the most popular approach. In this paper we are talking about complexities and misconceptions of MTBF and clarify in sequence what are the items and concerns that need to be consider in estimating MTBF.
Techno-economical Unit Commitment Using Harmony Search Optimization ApproachIJAPEJOURNAL
In this paper, Security-Constrained Unit Commitment (SCUC) model is proposed in a restructured power system. This model consists of a closed-loop modified Unit Commitment (UC) and Security-constrained Optimal Power Flow (SCOPF). The objective of this SCUC model is to obtain the maximum social welfare-based system operating cost while maintaining the system security. In conventional power systems, the demand was forecasted before market operation and determined as a fixed constant. Supplying this demand was therefore considered as a constraint. However, in restructured power system which is based on Standard Market Design (SMD), DISCOs offer the demand and their proposed prices; therefore the demand is modeled as an elastic load. Independent System Operator (ISO) is responsible for operating the power market. The ISO performed the power market using the SCUC software to obtain feasible and economical operation as much as possible. In this paper, Harmony Search Algorithm (HSA) has been implemented to solve SCUC problem. Since the SCUC problem is a non-linear, mixed integer, large scale and non-convex problem, harmony search optimization is addressed as an efficient technique to overcome the aforementioned challenges. The simulation results show that the presented method is both satisfactory and consistent with expectation.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Proactive cloud service assurance framework for fault remediation in cloud en...IJECEIAES
Cloud resiliency is an important issue in successful implementation of cloud computing systems. Handling cloud faults proactively, with a suitable remediation technique having minimum cost is an important requirement for a fault management system. The selection of best applicable remediation technique is a decision making problem and considers parameters such as i) Impact of remediation technique ii) Overhead of remediation technique ii) Severity of fault and iv) Priority of the application. This manuscript proposes an analytical model to measure the effectiveness of a remediation technique for various categories of faults, further it demonstrates the implementation of an efficient fault remediation system using a rulebased expert system. The expert system is designed to compute a utility value for each remediation technique in a novel way and select the best remediation technique from its knowledgebase. A prototype is developed for experimentation purpose and the results shows improved availability with less overhead as compared to a reactive fault management system.
An Investigation of Fault Tolerance Techniques in Cloud Computingijtsrd
Cloud computing which is created on Internet has the most powerful architecture of computation that provides users with the capabilities of information technology as a service and allows them to have access to these services without having specialized information or controlling the infrastructure. Fault tolerance has. The main advantages of using fault tolerance that has all the necessary techniques to keep active power and reliability in cloud computing include failure recovery, lower costs, and improved performance criteria. In this paper, we will investigation of the different techniques that are used for fault tolerance on cloud computing. Ya Min | Khin Myat Nwe Win | Aye Mya Sandar "An Investigation of Fault Tolerance Techniques in Cloud Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26611.pdfPaper URL: https://www.ijtsrd.com/computer-science/distributed-computing/26611/an-investigation-of-fault-tolerance-techniques-in-cloud-computing/ya-min
Survey on deep learning applied to predictive maintenance IJECEIAES
Prognosis health monitoring (PHM) plays an increasingly important role in the management of machines and manufactured products in today’s industry, and deep learning plays an important part by establishing the optimal predictive maintenance policy. However, traditional learning methods such as unsupervised and supervised learning with standard architectures face numerous problems when exploiting existing data. Therefore, in this essay, we review the significant improvements in deep learning made by researchers over the last 3 years in solving these difficulties. We note that researchers are striving to achieve optimal performance in estimating the remaining useful life (RUL) of machine health by optimizing each step from data to predictive diagnostics. Specifically, we outline the challenges at each level with the type of improvement that has been made, and we feel that this is an opportunity to try to select a state-of-the-art architecture that incorporates these changes so each researcher can compare with his or her model. In addition, post-RUL reasoning and the use of distributed computing with cloud technology is presented, which will potentially improve the classification accuracy in maintenance activities. Deep learning will undoubtedly prove to have a major impact in upgrading companies at the lowest cost in the new industrial revolution, Industry 4.0.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Leading Change strategies and insights for effective change management pdf 1.pdf
Mg3421962205
1. M. Abdallah, Y. Massim, M. Benguediab and A. Zeblah / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2196-2205
2196 | P a g e
Efficient Artificial Immune Algorithm for Preventive-
Maintenance-Planning For Multi State Systems
M. Abdallah1
; Y. Massim1
; M. Benguediab1
and A. Zeblah1
(1) University Djillali Liabes of Sidi Bel Abbes. Algeria.
Abstract
In this paper we use an artificial immune
optimization algorithm in conjunction with the
universal generating function (UGF) to solve the
preventive maintenance (PM) problem for multi-
state series-parallel system. In this work, we
consider the situation where system and its
components have several ranges of performance
levels. Such systems are called multi-state systems
(MSS). To enhance system availability or
(reliability), scheduled preventive maintenance
actions are performed to equipments. These PM
actions affect strongly the effective age of
components and increase system reliability. The
MSS measure is related to the ability of the system
to satisfy the demand. The objective is to develop
an algorithm to generate an optimal sequence of
maintenance actions for providing a system
working with the desired level of availability or
(reliability) during its lifetime with minimal
maintenance cost. To evaluate the MSS system
availability, a fast method based on UGF is
suggested. The immune algorithm (IA) approach
is applied as an optimization technique and
adapted to this PM optimization problem.
Keywords: Universal generating function, Immune
algorithm, Optimization, Preventive Maintenance.
I. INTRODUCTION
A necessary precondition for high
production is availability of the technical equipment.
In addition, reliability engineers have to build a
reliable and efficient production system. The system
reliability is affected essentially by the reliability of
its equipments. This characteristic is a function of
equipment age on system’s operation life. In this
work, we consider multi-states series-parallel
systems. To keep the desired levels of availability, it
is necessary to perform preventive maintenance
actions to components rather than breakdown repairs.
This suggestion is supported by a number of case
studies demonstrating the benefits of PM in [1]. In
this case, the task is to specify how PM activity
should be scheduled. One of the commonly used PM
policies is called periodic PM, which specifies that
systems are maintained at integer multiple of some
fixed period. Another PM is called sequential PM, in
which the system is maintained at a sequence of
interval that have unequal lengths. The first kind of
PM is more convenient to schedule. Contrary the
second is more realistic when the system requires
more frequent maintenance in relation to equipment’s
age. A common assumption used in both these PM is
that minimal repair is conducted on system if it fails
between successive PM activities. In other words,
minimal repairs do not change the hazard function or
the effective age of the system.
Traditionally PM models assume that the
system after PM is either as good as new state in this
case it is called perfect PM or replacement, or as bad
as old state which is equivalent to minimal repair,
where only the function of the system is restored
without affecting the system age [2]. However, the
more realistic assumption is that the system after PM
does not return to zero age and remains between as
good as new and as bad as old. This kind of PM is
called imperfect PM. The case when equipment fails,
a corrective maintenance (CM) is performed which
returns equipment to operating condition without
reducing system age. in fact, the task of preventive
maintenance actions served to adjust the virtual age
of equipment. Our particular interest under
investigation is to present an artificial immune
algorithm which determines the optimal intervals of
PM actions to minimize maintenance-cost rate while
achieving desired mission reliability.
1.1. Summuray of previous work
Several years ago, much work was reported
on policy optimization of preliminary planned PM
actions with minimal repair as in [3-4]. Most of these
Nomenclature:
MjC : Minimimal repair cost.
ivA : Availability of j-th MSS devices.
jh : Hazard function.
jQ : Probability of failure of j-th devices.
iv: Performance of j-th devices of version v .
W : Demand levels.
: Distributive operator.
: operator for parallel devices.
Abbreviations:
IA : Immune Algorithm.
PM : Preventive maintenance.
MSS : Multi states system.
UMGF: Universal moment generating function.
2. M. Abdallah, Y. Massim, M. Benguediab and A. Zeblah / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2196-2205
2197 | P a g e
researches are based on two popular approaches to
determine the optimal intervals for a PM sequence.
The first is reliability-based method and the second is
optimization method.
In the first one the PM is performed
whenever the system availability or the hazard
function of the system reaches a predetermined level
and the optimal PM intervals will be selected. The
second is finding the optimal intervals as a decision
variable in the optimization problem.
Wang [5] and Nakagawa [6] have treated a
series–parallel configuration as a single piece of
equipment in order to reduce the complexity of
planning a PM strategy for multiple components.
Some studies have addressed this issue by focusing
on each system component to determine an overall
PM strategy [7;8].
Due to inherent complexity of solving
preventive maintenance problems, good results are
obtained when meta-heuristic algorithms are utilized
to solve various aspects of the preventive
maintenance model.
[9] Presents an algorithm to determine the
optimal intervals based on the reliability models of
the effective age reduction and hazard function. [10]
Presents a genetic algorithm to determine a minimal
cost plan of the selecting PM actions which provides
the required levels of power system reliability. A list
of possible PM actions available for each MSS, are
used. Each PM action is associated with cost and
reduction age coefficient of its implementation.
Shalaby et al (2004) [11] use a combination of
genetic algorithm and simulation to solve the
optimization problem for preventive maintenance
scheduling of multi-component and multi-state
systems. Suresh and Kumarappan (2006) [12]
develop an optimization model and use a
combination of genetic algorithm with simulated
annealing. The authors apply their method to
determine the preventive maintenance schedule in a
power system. Samrout et al (2006) [13] present an
algorithm based on the combination of an ant colony
algorithm and genetic algorithm to optimize a large-
scale preventive maintenance problem. However,
there is still much work needed for improvements in
search methods to increase the efficacy of solving
any specified preventive maintenance problem.
1.2. Approach and outlines
The proposed approach is based on the
optimization method using artificial immune
algorithm, which determines the sequence of PM
actions to minimize the maintenance-cost subject to
availability and minimum system performance
constraints. The goal of the proposed approach is to
know when, where, to which component and what
kind of available PM actions among the set of
available PM actions should be implemented. To
evaluate the reliability and the effect of PM actions of
series-parallel MSS, UGF method is applied. It’s
proved to be effective at solving problems of MSS
redundancy and maintenance in [14-15-16].
The rest of this paper is outlined as follows.
We start in section 2 with the general description of
the preventive maintenance model. Next, we describe
the optimization problem formulation in section 3. A
description of availability estimation based on UGF
method is presented in section 4. In section 5, we
present the artificial immune algorithm. Illustrative
example and conclusion are given in section 6.
II. PREVENTIVE MAINTENANCE
It has been shown that the incorporation of
the preventive maintenance has an economical
benefit and the investment in PM not only pays for
itself but also produces an important return on the
investment. Also it was observed that the impact of
the decrease of component failure rate and
improvement of component reliability is vital to
maintain efficiency of production. The major subject
of maintenance is focused on the planning of the
system maintenance service. However, all actions of
PM not capable to reduce age component to zero age
are imperfect. There are two main alternatives for
modeling an imperfect PM activity. The first one
assumes that PM is equivalent to minimal repair with
probability p and p1 is the equivalent to
replacement in [17]. The second model directly
analyzes how the hazard function or the effective age
change after PM as in [9]. The proposed model is
based on reduction age concept. Let consider the
series-parallel MSS system shown in figures 1.
Element1
Element2
Element3
ElementK1
Element1
Element2
Element3
ElementK2
ComponentC1 ComponentC2
Element1
Element2
Element3
ElementKn
Kn
ComponentCn
FIGURE.1. SERIES-PARALLEL POWER SYSTEM
If the component j undergoes PM actions
at chronological calendar as follows:
( jnj tt ...,,1 ) (1)
Based on the second model description, the effective
age after i-th PM actions may be written as:
)()()( jijj tttt
for nittt jiji 1,1
(2)
3. M. Abdallah, Y. Massim, M. Benguediab and A. Zeblah / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2196-2205
2198 | P a g e
and )()()()( 11
jijijijijijijij ttttt
where )( jij t
is the age of component immediately
after the i–th PM action which ranges in the interval
[0, 1]. By definition, we assume that 0)0(j ,
0t 0j and i is the age reduction coefficient. Two
limits for PM actions can be distinguished when
1i and 0i . In the first case the component is
only restored to “as bad as old” state which assumes
that PM does not affect the effective age. In the
second case the model reduce the component age to
“as good as new”, which means that the component
age reaches zero age (replacement). In fact, all PM
actions which improve the component age are
imperfect. As it is mentioned and demonstrated in
[9], the hazard function of component j , as function
of its actual age, can be calculated as
0
*
)( jjjj hthh (3)
where )(thj is the hazard function is defined when
equipment does not undergo PM actions and 0jh
correspond to the initial age of equipment. The
reliability of the equipment j in the interval between
PM actions i and 1i can be written as:
))(())((exp
)(exp)(
)(
)(
*
tHtH
dxxhtr
jjjijj
t
t
jj
j
jij
(4)
)(jH represents the accumulative hazard function.
Clearly if jitt in equation (4) the reliability
reaches the maximum and is equal to 1.
The Minimal repairs are performed if MSS
equipment fails between PM actions, and there cost
expected in interval [0, t] can be given as
t
jjMj dxxhcC
0
)( (5)
Possible equipment j , undergoes PM
actions at each chronological time jjnj tt ...,,1 , in this
case, the total minimal repair cost is the sum of all
cost can be written as :
j
j jij
jij
n
i
jijjjijj
n
i
t
t
jjMj
tHtHc
dxxhcC
0
1
0
)(
)(
))(())((
)(
1
(6)
where 00 jt and Tt jjn 1 where T represents the
lifetime.
III. OPTIMIZATION PROBLEM
Let consider a power system organized with
components connected in series arrangement. Each
component contains different component put in
parallel. Components are characterized by their
nominal performance rate j, hazard function hj(t)
and associated minimal repair cost Cj. The system is
composed of a number of failure prone components,
such that the failure of some components leads only
to a degradation of the system performance. This
system is considered to have a range of performance
levels from perfect working to complete failure. In
fact, the system failure can lead to decreased
capability to accomplish a given task, but not to
complete failure. An important MSS measure is
related to the ability of the system to satisfy a given
demand.
When applied to electric power systems,
reliability is considered as a measure of the ability of
the system to meet the load demand (W), i.e., to
provide an adequate supply of electrical energy ().
This definition of the reliability index is widely used
for power systems: see e.g., [18-19-20-21-22]. The
Loss of Load Probability index (LOLP) is usually
used to estimate the reliability index [23]. This index
is the overall probability that the load demand will
not be met. Thus, we can write R = Probab(MSS W)
or R = 1-LOLP with LOLP = Probab(MSSW). This
reliability index depends on consumer demand W.
For reparable MSS, a multi-state steady-state
instantaneous availability A is used as Probab(MSS
W). While the multi-state instantaneous availability is
formulated by equation (7):
D
jMSS
j
)t(PW,tA (7)
where MSS (t) is the output performance of MSS at
time t . To keep system reliability at desired level,
preventive and curative maintenance can be realized
on each MSS. PM actions modify components
reliability and CM actions does not affect it. The
effectiveness of each PM actions is defined by the
age reduction coefficient ranging from 0 to1. As in
[10], the structure of the system as defined by an
available list of possible PM actions v for a given
MSS. In this list each PM actions v is associated
with the cost of its implementation vCp , and vM
is the number of equipment affected corresponding to
their age reduction v . Commonly the system
lifetime T is divided into y unequal lengths, and
each interval have duration y Yy1 , at each
end of this latter an PM action is performed. This
action will be performed if the MSS reliability
w,tR becomes lower than the desirable level 0R .
4. M. Abdallah, Y. Massim, M. Benguediab and A. Zeblah / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2196-2205
2199 | P a g e
All the PM actions performed to maintain
the MSS reliability are arranged and presented by a
vector V as they appear on the PM list. Each time
the PM is necessary to improve the system reliability;
the following action to be performed is defined by the
next number from this vector. When the scheduled
PM action iv was insufficient to improve reliability,
automatically the 1iv action should be performed at
the same time and so on.
For a given vector V , the total number jn
and chronological times of PM action in equation (1)
are determined for each component j Jj 1 . For
all scheduled PM actions iv V the total cost of PM
actions can be expressed as
N
1i
ipp vCVC (8)
and the cost of minimal repair can be calculated as
jn
i
jijjij
J
j
jM tHtHcVC
0
1
1
))(())(( (9)
The optimization problem can be formulated
as follows: find the optimal sequence of the PM
actions chosen from the list of available actions
which minimizes the total maintenance cost while
providing the desired MSS availability. That is,
Minimize:
VCVCCVf Mp (10)
Subject To:
A (V, D, t) R0 (11)
To solve this combinatorial optimization
problem, it is important to have an effective and fast
procedure to evaluate the availability index. Thus, a
method is developed in the following section to
estimate the system availability.
IV. RELIABILITY ESTIMATION BASED ON
USHAKOV’S METHOD
The last few years have seen the appearance
of a number of works presenting various methods of
quantitative estimation of systems consisting of
devices that have a range of working levels in [24-
25]. Usually one considers reducible systems. In
general forms the series connection, the level of
working is determined by the worst state observed for
any one of the devices, while for parallel connection
is determined by the best state. However, such the
approach is not applicable for the majority of real
systems.
In this paper the procedure used is based on the
universal z-transform, which is a modern
mathematical technique introduced in [26]. This
method, convenient for numerical implementation, is
proved to be very effective for high dimension
combinatorial problems. In the literature, the
universal z-transform is also called UMGF or simply
u-transform. The UMGF extends the widely known
ordinary moment generating function [11]. The
UMGF of a discrete random variable is defined as
a polynomial:
j
zP)z(u
J
1j
j
(12)
The probabilistic characteristics of the random
variable can be found using the function u(z). In
particular, if the discrete random variable is the
MSS stationary output performance, the availability
A is given by the probability )WProba( which
can be defined as follows:
W
z)z(u)WProba(
(13)
where is a distributive operator defined by
expressions (14) and (15):
Wif,0
Wif,P
)Pz( W
(14)
J
1j
W
j
J
1j
W
j
jj
zPzP
(15)
It can be easily shown that equations (14)–(15) meet
condition Proba( W) =
W
j
j
P . By using the
operator , the coefficients of polynomial u(z) are
summed for every term with j W, and the
probability that is not less than some arbitrary
value W is systematically obtained.
Consider single devices with total failures and
each device i has nominal performance i and
reliability Ai. The UMGF of such an device has only
two terms can be defined as:
i
zAz)A1()z(u i
0
ii
= i
zA)A1( ii
(16)
To evaluate the MSS availability of a series-parallel
system, two basic composition operators are
introduced. These operators determine the
polynomial u(z) for a group of devices.
Parallel devices: Let consider a system device m
containing Jm devices connected in parallel. The total
performance of the parallel system is the sum of
performances of all its devices. In power systems, the
term capacity is usually used to indicate the
quantitative performance measure of a device in [27].
Examples: generating capacity for a generator,
carrying capacity for an electric transmission line,
etc. Therefore, the total performance of the parallel
unit is the sum of capacity (performances) in [26].
The u-function of MSS device m containing Jm
parallel devices can be calculated by using the
operator:
5. M. Abdallah, Y. Massim, M. Benguediab and A. Zeblah / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2196-2205
2200 | P a g e
))(...,),(),(()( 21 zuzuzuzu np
where
n
i
in
1
21 )...,,,( .
Therefore for a pair of devices connected in parallel:
n
1i
m
1j
ba
ji
m
1j
b
j
n
1i
a
i21
ji
ji
zQP
)zQ,zP()z(u),z(u(
The parameters ai and bj are physically
interpreted as the performances of the two devices. n
and m are numbers of possible performance levels for
these devices. Pi and Qj are steady-state probabilities
of possible performance levels for devices. One can
see that the operator is simply a product of the
individual u-functions. Thus, the device UMGF is:
mJ
1j
jp )z(u)z(u . Given the individual UMGF of
devices defined in equation (11), we have:
m
i
J
1j
jjp )zAA1()z(u .
Series devices: When the devices are connected in
series, the device with the least performance becomes
the bottleneck of the system. This device therefore
defines the total system productivity. To calculate the
u-function for system containing n devices connected
in series, the operator should be used:
))z(u...,),z(u),z(u()z(u m21s , where
m21m21 ...,,,min)...,,,( so that
n
1i
m
1j
b,amin
ji
m
1j
b
j
n
1i
a
i21
ji
ji
zQP
zQ,zP))z(u),z(u(
Applying composition operators and
consecutively, one can obtain the UMGF of the entire
series-parallel system.
V. ARTIFICIAL IMMUNE SYSTEM
OPTIMIZATION ALGORITHM
5.1 Immune system
The natural immune system is a powerful
and efficient defence system that exhibits many signs
of cognitive learning and intelligence [28]. In
particular the acquired immune system, comprised
mainly of lymphocytes which are special types of
white blood cells, is a complex adaptive pattern-
recognition system that defends the body from
foreign pathogens (bacteria or viruses). The adaptive
immune system uses lymphocytes, which can quickly
evolve to destroy invading antigens. Lymphocytes
exist in two forms, B cells and T cells. Each of this
has distinct chemical structures and surface receptors
molecules. The receptors’ molecules attached
primarily to the surface of B cells are called
Antibodies whose aim is to recognize and bind to
antigens (Jerne, 1973) [29].
When an antibody (Ab) strongly matches an invading
antigen (Ag) the corresponding B-cell is selected to
proliferate and start replicating itself. During this
self-replicating process, a hyper mutation process
takes place on the variable region of the B-cell. The
hypermutation plays a critical role in creating
diversity, increasing affinity and enhancing
specificity of antibody. Figs. 3 and 4 [30,31] illustrate
respectively the antigen recognition, the negative
selection, clonal selection, expansion, and affinity
maturation processes. A comprehensive survey of the
IA theory, including the structure of its basic
procedures, has been provided by N. de Castro and J.
Von Zuben [30].
5.2 Artificial Immune Systems
Artificial Immune Systems (AIS) are
adaptive systems based on the emulation of the
biological immune system behaviour and applied to
problem solving. This new paradigm has already
been identified as extremely useful in a wide range of
engineering applications. The AIS, like genetic
algorithms and neural nets, is an intelligent tool for
advanced search procedures. (De Castro and Von
Zuben, 2002a) [30]. In 1986 the theoretical
immunologist, J.D. Farmer [32], first suggested a
possible relationship between biological immunology
Fig 3: Recognition of an Antigen by a
B-Cell Receptor.
Fig 4: Negative and Clonal Selection
Principle
6. M. Abdallah, Y. Massim, M. Benguediab and A. Zeblah / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2196-2205
2201 | P a g e
and computing in a paper which compared natural
immune systems, adaptation and machine learning.
Since then, the field has expanded quickly, with
numerous papers published by scientists applying
AIS to a wide range of topics. Although algorithms
based on the traits of AIS have been efficiently
applied in various optimization tasks covering a wide
range of real-world applications such as scheduling
[33], buffer allocation problem BAP [34], and
several other engineering applications
[35 ;36 ;37 ;38], their application to Preventive
maintenance problem has not been thoroughly
explored. This work consists of a first time efficient
application of an AIS algorithm based on the clonal
selection paradigm in the PM problem for series-
parallel multi-state systems under availability and
performance constraint.
Encoding:
Every solution or antibody Ab is represented
by a PM matrix .
The matrix has N columns and L lines, where:
L is the number of elements in the system and N the
number of PM intervals. Each interval i has duration
i; ; where T is system lifetime. Thus
each line in the matrix represents the PM actions to
be performed in sequence for the corresponding
element.
(17)
Overview of the IA Algorithm
Step 1. Define antigen
The objective function that we aim to minimize and
the availability constraint defined in eq. 7 represent
the antigen. As illustrated in fig.4, the antigen
represents the configuration of PM actions in the
optimal solution of the optimization problem, and the
corresponding segment of the antibody represents a
trial solution for the variables. The antigen is
recognised by the antibody receptors in a manner
similar to a lock and a key relationship.
Step 2. Random initialization of antibody population
Initial integer-matrix antibody population is
randomly generated. The antibody population
represents PM actions vectors for each system
component. As previously described, a position-
based representation is used in this study to represent
the antibody. This representation will generate valid
offspring in the crossover and mutation procedures.
Step 3.
Evaluate fitness of antibodies to antigen
The fitness of each antibody to antigen in the
population is calculated based on its objective
function value and potential constraint violations. In
evaluating the fitness of individual antibodies,
constraint requirements were also examined. When a
constraint is violated, the degree of violation is
weighted to penalize the antibody’s fitness.
Antibodies with high fitness represent good
individuals.
The fitness of each antibody is a positive number in
the range given by:
(18)
Where:
and are respectively the cost and the
availability of the configuration represented by
antibody .
is a penalty factor used to penalize antibodies
which violate the constraint requirement. In equation
(20), the antigenic fitness of antibodies satisfying the
availability constraint is a function of costs
only.
STEP 4. Select m best antibodies to be kept in system
memory (M).
Select the n, mn highest affinity antibodies in
relation to the antigen for cloning.
STEP 5. Generate clone set (C)
Generate clone set (C) for the best n antibodies
sorted in ascending order [ better individual than
for all (j>i)]. The number of copies is
proportional to their affinities: the higher the affinity,
the larger the clone size. The cloning of best n
individuals is implemented by the rule:
i
n
roundNCi
Where iNC is the number of clones for antibody
n is the number of selected antibodies
is a size factor
For 40n and 1 , the highest affinity antibody
(i=1) will produce 40 clones, while the second highest
affinity (i=2) produces 20 clones, etc.
STEP 6. Execute genetic hypermutation and generate
maturated clone set (C*
)
Fig 4. : Lock and Key Relationship
between Antigen and Antibody
7. M. Abdallah, Y. Massim, M. Benguediab and A. Zeblah / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2196-2205
2202 | P a g e
6.1 Mutation operations:
Cloned structures are mutated with a rate
inversely proportional to their affinities with the
antigen: the higher the affinity, the smaller the
mutation rate. Mutation is executed following a
biased probability rule that enables higher or lower
mutation rates of antibodies according to their
affinity with antigen as follows:
In each iteration j, and for each antibody i, evaluate the
mutation threshold value as:
(19)
Generate a random number in interval [0, 1]
If then mutate antibody , else move to next
antibody.
6.2 Crossover operations:
The crossover operations are performed on
the parents’ vectors. To illustrate the crossover
procedure let us consider a PM programme of six
interventions and consider two parent antibodies
and . For illustration we only consider the
PM vectors of the first element (first line in antibody
matrix).
To generate the first line of the offspring
antibody , we proceed as follows: the first line
of antibody parent is copied in the offspring
then the fragment of genes between two
arbitrary positions and of antibody parent
are copied to the corresponding
positions of offspring . The crossover procedure
for the first element (first line in antibody ) is
illustrated for
Crossover operations for the other components and
the buffer vector are performed in a similar manner.
For each component, the crossover procedure is
executed only if the outcome of a randomly
generated number is less than a
specified threshold limit . The value of the
parameter can be set to depend on the cycle
number. Equation (20) sets the threshold value for
executing a crossover.
(20)
Where is the evaluation number and the maximal
evaluation number and a scaling factor. was set to
0.2, so the crossover execution probability varies from
80% in the early stages of the optimization process to
17% in the late stages.
Place all antibodies issued of genetic operations in
maturated clone set (C*
).
Step 7. Generate new random population (R).
Generate new random population (R) to replace the
eliminated population in repertoire (S) and to avoid
premature convergence to local optima.
Step 8: Place antibodies of (C), (C*
), (M), (R) in
repertoire (S) and Survey newly generated antibodies
The antibody–antigen affinities of
antibodies generated in Step 6 and 7 were evaluated.
Moreover, to retain the antibody diversity in the
current repertoire, affinity (hereafter,
“antibody-antibody affinity”) between antibodies i
and the best antibody in repertoire (P) were also
investigated. Antibodies showing high affinity
beyond a threshold limit TL with the best antibody
are deleted with a deletion probability P(d) given by:
T
G
dP (21)
Where is a probability scaling number in the
range [0, 1], G the evaluation number and T the
maximal evaluation number.
It is apparent from Eq. (21) that during early search
stages antibodies having high “antibody antibody
affinity” are deleted with high probability
allowing antibody diversity in the immune system
memory and causing the search procedure to cover
uniformly the decision space. At latter search stages
when the space region likely containing the global
optimum is located, near optimal individuals are
allowed to perform fine local search.
The antibody-antibody affinity in this
study can be expressed as:
(22)
1
1
k
j
jiD
Where (23)
Where iD is the Hamming distance between
antibodies i and the best antibody, is the jth
element in component k of antibody i, and
is the jth element in component k of the best
antibody.
The Hamming distance between two antibodies is the
number of equivalent locations for which the
corresponding machines or buffers are different.
Step 10: Generate memory set (M) Reselect m
highest affinity of these maturated individuals to be
8. M. Abdallah, Y. Massim, M. Benguediab and A. Zeblah / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2196-2205
2203 | P a g e
kept as memories of the immune system. Select n
best affinity candidates for cloning.
Step 11: Repeat steps 6 to 10 until a certain stopping
criterion is met. The stopping condition applied in
this work is based on the stagnation feature of the
algorithm (less than 0.1% change in the cost function
in ten consecutive generations).
VI. ILLUSTRATIVE EXAMPLE
Let consider a series-parallel MSS (Nuclear
power systems) consisting of components connected
in series arrangement as depicted in figure.3. The
system contains 10 equipments with different
performance and reliability, the process is done with
basic components to transmit the stream energy to the
electrical generator. The reliability of each
component is defined by veibull
function: 0
1
h)t()t(h
MSS lifetime is 20 years. The time for possible
PM_actions
FIGURE.3. SERIES-PARALLEL NUCLEAR POWER
SYSTEM
Are spaced by intervals of = 2 months. The
problem is to find the best PM plan that achieves a
system performance and reliability not less than (0,
R0 ).
TABLE 1
PARAMETER OF ELEMENTS
TABLE 1
PARAMETER OF COMPONENTS SYSTEM
TABLE 2
PARAMETER OF PM_ACTIONS
TABLE 3
THE BEST PM PLAN FOR R(T,0.85)0.9
TABLE 4
THE BEST PM PLAN FOR R(T,0.85)0.95
TABLE 4
THE BEST PM PLAN FOR R(T,0.85)0.95
CONCLUSION
t PM_Actions Affected
Elements
R (t,0.85)
02.250
05.652
07.120
09.312
11.648
14.046
16.343
17.879
19.671
8
13
20
5
17
12
4
8
2
4
7
10
3
9
7
2
4
1
0.907
0.912
0.917
0.922
0.934
0.939
0.931
0.914
0.918
Total
PM Cost 13.9 103
$
h0 Min repair
Cost
%
1
2
3
4
5
6
7
8
9
10
0.05
0.05
0.05
0.05
0.02
0.02
0.02
0.08
0.07
0.05
1.8
1.8
1.8
1.8
1.3
1.3
1.3
1.6
1.8
1.8
0.001
0.003
0.003
0.003
0.002
0.002
0.002
0.006
0.005
0.003
1.02
0.9
0.9
0.9
0.7
0.6
0.7
0.8
0.6
0.8
97
80
80
80
70
70
70
85
89
90
PM_Action Element
Number
Age
Reduction
Ɛ
PM_Cost
103
$
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
1
1
1
2
3
3
4
4
5
5
6
7
7
8
8
9
9
9
10
10
1
0.6
0.4
1
0.7
0.4
1
0.5
0.6
0.3
0.8
1
0.4
1
0.5
1
0.5
0.3
0.8
0.5
17.2
3.9
2.8
2.4
1.6
1.1
1.9
1.1
1.3
0.5
0.1
0.7
0.1
2.1
1.0
3.7
2.2
1.1
1.3
0.8
0.56
0.00
t PM_Actions Affected
Elements
R (t,0.85)
01.783
03.547
06.054
08.131
09.894
11.576
13.077
14.634
15.714
17.237
18.368
19.749
8
13
19
5
18
4
12
7
17
2
8
20
4
7
10
3
9
2
7
4
9
1
4
10
0.952
0.959
0.966
0.956
0.951
0.959
0.964
0.954
0.957
0.965
0.955
0.951
Total
PM Cost 18.2 103
$
9. M. Abdallah, Y. Massim, M. Benguediab and A. Zeblah / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2196-2205
2204 | P a g e
In this paper we formulated the problem of
imperfect maintenance optimization for series-
parallel nuclear power system structure. This work
focused on selecting the optimal sequence of
intervals to perform PM actions to improve the
system reliability under system performance
constraint. The model analyzes cost and reliability, to
construct a strategy to select the optimal maintenance
intervals, formulating a complex problem. We show
results for two examples involving different
reliability levels, to give an indication of how PM
schedules can vary in response to changes in
reliability of system. An exhaustive examination of
all possible solution is not realistic, considering
reasonable time limitations. Because of this, an
efficient optimization algorithm based on artificial
immune system was applied to solve the formulated
problem. It can be seen from tables 3 and 4 for that
more than more than 30% in PM spending is required
to increase the power system reliability from 0.90 to
0.95 for desired minimum system performance not
less than 85%.
To test the consistency of the proposed
algorithm, the immune algorithm was repeated 50
times with different starting antibody repertoires and
clone sizes. All immune procedures converged to the
same values. The algorithm converged faster to
optimal values when the antibody repertoire size and
clone size parameters were set respectively to 250 and
30.
References
[1] D. Gude and K.H.Schmidt, 1993. Preventive
maintenance of advanced manufacturing
systems: a laboratory experiment and its
implications for human centered approach.
International Journal of Human factors in
Manufacturing; 3, 335-350.
[2]. M. Brown and F. Proschan, 1983. Imperfect
repair. Journal of Applied probability; 20:
851-859.
[3]. M. Zhao, 2003. On preventive maintenance
policy of critical reliability level for system
subject to degradation. To appear on 2003 in
Reliability Engineering & System Safety.
[4]. E. Borgonovo and M. Marseguerra, 2000.
Reliability Engineering & System Safety;
67: 61-73.
[5] Wang, H. Z. (2002). A survey of
maintenance policies of deteriorating
systems. European Journal of Operational
Research, 139, 469–489.
[6] Nakagawa, T. (2005). Maintenance theory
of reliability. London: Springer.
[7] Bai, J.,& Pham, H. (2006). Cost analysis on
renewable full-service warranties for multi-
component systems. European Journal of
Operational Research, 168, 492–508.
[8] Bris, R., Chatelet, E.,& Yalaoui, F. (2003).
New method to minimize the preventive
maintenance cost of series-parallel systems.
Reliability Engineering& System Safety, 82,
247–255.
[9]. D. Lin, M.J. Zuo and RCM. Yam, 2000.
General sequence imperfect preventive
maintenance models. International Journal
of reliability, Quality and safety
Engineering; Vol. 7, No. 3: 253-266.
[10]. G. Levitin and A. Lisniaski, 2000.
Optimization of imperfect preventive
maintenance for multi-state systems,
reliability Engineering and System safety
67, 193-203.
[11]. Shalaby, M.A., Gomaa, A.H., Mohib, A.M.,
(2004) A genetic algorithm for preventive
maintenance scheduling in a multiunit
multistate system, Journal of Engineering
and Applied Science, v 51, n 4, August
2004, p 795-811.
[12] Suresh, K., Kumarappan, N., (2006)
Combined genetic algorithm and simulated
annealing for preventive unit maintenance
scheduling in power system, 2006 IEEE
Power Engineering Society General
Meeting, PES, 18-22 June 2006, Montreal,
Quebec, Canada.
[13] Samrout, M., Benouhiba, T., Chatelet, E.,
Yalaoui, F., (2006) Preventive maintenance
optimization using evolutionary hybrid
algorithm, 2006 International Conference on
Service Systems and Service Management,
25-27 October 2006, Troyes, France.
[14] A. Monga, R. Toogood and M.J. Zuo, 1997,
reliability-based design of systems
considering preventive maintenance and
minimal repair. International Journal of
Reliability, Quality and Safety Engineering;
4: 55-71.
[15]. G. Levitin and A. Lisniaski, 1999. Optimal
multistage modernization of power system
subject to reliability and capacity
requirements. Electric Power System
Research ; 50: 183-90.
[16]. I.A. Ushakov, G. Levitin and A. Lisnianski
2002. Multi-state system reliability: from
theory to practice. Proc. of 3 Int. Conf. on
mathematical methods in reliability, MMR
2002, Trondheim, Norway, pp. 635-638.
[17]. T. Nakagawa, 1999. Sequential imperfect
preventive maintenance policies. IEEE
Transactions on Reliability; 37(3): 295-8.
[18]. S.M. Ross, 1993. Introduction to probability
models. Academic press.
[19]. J. Murchland, 1975. Fundamental concepts
and relations for reliability analysis of
multi-state systems. Reliability and Fault
10. M. Abdallah, Y. Massim, M. Benguediab and A. Zeblah / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.2196-2205
2205 | P a g e
Tree Analysis, ed. R. Barlow, J. Fussell, N.
Singpurwalla. SIAM, Philadelphia.
[20] G. Levitin, A. Lisnianski, H. Ben-Haim and
D. Elmakis, 1998 Redundancy optimization
for series-parallel multi-state systems. IEEE
Transactions on Reliability vol. 47, No. 2,
pp.165-172.
[21]. G. Levitin, A. Lisniaski, H. Ben-haim and
D. Elmakis, 1996. Power system structure
optimization subject to reliability
constraints, Electric Pôwer System
Research; 40: 145-52.
[22]. G. Levitin, A. Lisnianski, H. Ben-Haim and
D. Elmakis, 1997. Structure optimization of
power system with different redundant
elements. Electric Power Systems Research,
vol. 43, No. 1, pp.19-27.
[23]. R. Billinton and R. Allan, 1990. Reliability
evaluation of power systems. Pitman.
[24]. B. Reinschke. System of elements with
many states. radio i svyaz, Moscow, 1985.
[25]. E. El-Neweihi and F. Proschan. Degradable
systems: A survey of multistates system
theory. Common. Statist. Theor. math.,
13(4), 1984.
[26]. I.A. Ushakov. Universal generating
function. Sov. J. Computing System Science,
Vol. 24, N 5, 1986, pp 118-129.
[27]. M.S Chern. On the Computational
Complexity of Reliability redundancy
Allocation in a Series System. Operations
Research Letters, Vol. 11, 1992, 309-315.
[28] D. Dasgupta, “Artificial immune systems
and their applications,” SpringerVerlag,
1999
[29] Jerne, N. K., The Immune System,
Scientific American, 229(1) (1973), p.52-60
[30] L. N. De Castro, and F. J Von
Zuben,.,2002b. Learning and optimization
using the clonal selection principle. IEEE
Transactions on Evolutionary Computation,
6(3), p. 239-250.
[31] L. N. De Castro, and J. Timis, Artificial
iImmune systems: A novel paradigm to
pattern recognition. In Artificial Neural
Networks in Pattern Recognition , J. M.
Corchado, L. lonso, and C. Fyfe (eds.),
SOCO-2002, University of Paisley, UK, p.
67-84, 2002.
[32] J. Farmer, N. H. Packard and A. Perelson,
The immune system, adaption and machine
learning. Physica D, 22 (1986), p.187-204.
[33] Zandieh, M., Fatemi Ghomi, S.M.T., &
Moattar Husseini, S.M. (2006). An immune
algorithm approach to hybrid flow shops
scheduling with sequence-dependent setup
times. Applied Mathematics and
Computation, 180(6), 111–127.
[34] Massim, Y., Yalaoui, F., Amodeo, L.,
Chatelet, E., & Zeblah, A. (2010). Efficient
combined immune-decomposition algorithm
for optimal buffer allocation in production
lines for throughput and profit
maximization. Computers & Operations
Research, 37, 611 – 620.
[35] Wen, X. & Song A. (2004). An immune
evolutionary algorithm for sphericity error
evaluation. Int. Journal. Mach. Tools
Manuf, 44 (10), 1077-1084.
[36] Miyamoto, A., Nakamura, H. & Kruszka, L.
(2004). Application of the improved immune
algorithm to structural design support system.
J. Struct. Eng.-ASCE, 130 (1), 108–119.
[37] Chen, T. C., & You, P.S. (2005). Immune
algorithms-based approach for redundant
reliability problems with multiple component
choices. Comput. Ind, 56 (2), 195–205.
[38] Chu, C.W., Lin, M.D., & Liu, G.F., Sung,
Y.H. (2008). Application of immune
algorithms on solving minimum-cost problem
of water distribution network. Mathematical
and Computer Modelling, 48, 1888–1900