首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 797 毫秒
1.
Opportunistic Maintenance for Multi-component Shock Models   总被引:1,自引:0,他引:1  
This paper is concerned with opportunistic maintenance on a multi-component cumulative damage shock model with stochastically dependent components. A component fails when its cumulative damage exceeds a given threshold, and any such a failure creates a maintenance opportunity, and triggers a simultaneous repair on all the components, including the non-failed ones, such that damages accumulated at various components are reduced to certain degrees. Utilizing the coupling method, stochastic maintenance comparisons on failure occurrences under different model parameters are obtained. Some positive dependence properties of this multi-component shock model are also presented.Lirong Cui: Supported by the NSF of China grant 70371048.Haijun Li: Supported in part by the NSF grant DMI 9812994.  相似文献   

2.
Single and double attacks against a system of parallel elements are analyzed. The vulnerability of each element depends on an attacker-defender contest success function. The contest intensity may change from the first to the second attack as determined by a contest intensity variation factor. The defender allocates its resource between deploying elements to provide redundancy, and protecting each element. The attacker allocates its resource optimally across the two attacks, may attack a subset of the elements in the first attack, observes which elements are destroyed in the first attack, and attacks all surviving elements in the second attack. A minmax two period game is analyzed where the defender moves first and the attacker moves second. The paper shows how the contest intensity variation factor affects the defense and attack strategies.  相似文献   

3.
GPT public key cryptosystem was proposed by Gabidulin, Paramonov and Tretjakov in 1991. This cryptosystem is based on rank error correcting codes. The main advantage of using rank codes in cryptography is that, it has smaller key size as compared to other code based public key cryptosystems. Several attacks against this system were published and some modifications were also proposed withstanding these attacks. In this paper, we have proposed a modified Niederreiter type GPT cryptosystem based on reducible rank codes by properly choosing the column scrambler matrix to withstand these attacks. Although, the idea of choosing column scrambler matrix from extension field is not new but the approach proposed in this paper, provides more elements of column scrambler matrix from extension field as compared to any previous modifications which makes system more secure against attacks.  相似文献   

4.
A system existing in a random environment receives shocks at random points of time. Each shock causes a random amount of damage which accumulates over time. A breakdown can occur only upon the occurrence of a shock according to a known failure probability function. Upon failure the system is replaced by a new identical one with a given cost. When the system is replaced before failure, a smaller cost is incurred. Thus, there is an incentive to attempt to replace the system before failure. The damage process is controlled by means of a maintenance policy which causes the accumulated damage to decrease at a known restoration rate. We introduce sufficient conditions under which an optimal replacement policy which minimizes the total expected discounted cost is a control limit policy. The relationship between the undiscounted case and the discounted case is examined. Finally, an example is given illustrating computational procedures.  相似文献   

5.
The paper analyzes the efficiency of deploying false targets as part of a defense strategy. It is assumed that the defender has a single object that can be destroyed by the attacker. The defender distributes its resource between deploying false targets and protecting the object from outside attacks. The attacker cannot distinguish the false targets from the defended object (genuine target). Therefore the attacker has no preferences for attacking one target rather than another target. The defender decides how many false targets to deploy whereas the attacker decides how many targets to attack. The article assumes that both the defender and attacker have complete information and full rationality. The optimal number of false targets and the attacked targets are obtained for the case of fixed and variable resources of the defender and the attacker as solutions of a non-cooperative game between the two agents.  相似文献   

6.
Operating system (OS) acts as an intermediary between software and hardware in computer-based systems. In this paper, we analyze the core of the typical Linux OS, Linux kernel, as a complex network to investigate its underlying design principles. It is found that the Linux Kernel Network (LKN) is a directed network and its out-degree follows an exponential distribution while the in-degree follows a power-law distribution. The correlation between topology and functions is also explored, by which we find that LKN is a highly modularized network with 12 key communities. Moreover, we investigate the robustness of LKN under random failures and intentional attacks. The result shows that the failure of the large in-degree nodes providing basic services will do more damage on the whole system. Our work may shed some light on the design of complex software systems.  相似文献   

7.
《Optimization》2012,61(3-4):367-382
This paper investigates discrete type shock semi-Markov decision processes (SMDP for short) with Borel state and action space. The discrete type shock SMDP describes a system which behaves like a discrete type SMDP, except that the system is subject to random shocks from its environment. Following each shock, an instantaneous state transition occurs and the parameters of the SMDP are changed. After presenting the model, we transform the discrete type shock SMDP into an equivalent discrete time Markov decision process under the condition that one of the assumptions P, N, D, holds. So the most results from discrete time Markov decision processes can be generalized directly to hold for the discrete type shock SMDP.  相似文献   

8.
The paper considers optimal resource distribution between offense and defense in a duel. In each round of the duel two actors exchange attacks distributing the offense resources equally across K rounds. The offense resources are expendable (e.g. missiles), whereas the defense resources are not expendable (e.g. bunkers). The outcomes of each round are determined by a contest success functions which depend on the offensive and defensive resources. The game ends when at least one target is destroyed or after K rounds. We show that when each actor maximizes its own survivability, then both actors allocate all their resources defensively. Conversely, when each actor minimizes the survivability of the other actor, then both actors allocate all their resources offensively. We then consider two cases of battle for a single target in which one of the actors minimizes the survivability of its counterpart whereas the counterpart maximizes its own survivability. It is shown that in these two cases the minmax survivabilities of the two actors are the same, and the sum of their resource fractions allocated to offense is equal to 1. However, their resource distributions are different. In the symmetric situation when the actors are equally resourceful and the two contest intensities are equal, then the actor that fights for the destruction of its counterpart allocates more resources to offense. We demonstrate a methodology of game analysis by illustrating how the resources, contest intensities and number of rounds in the duels impact the survivabilities and resource distributions.  相似文献   

9.
Many systems are subject to two mutually dependent competing risks namely degradation and random shocks, and they can fail due to two competing modes of failure, soft and hard failure. Soft failure occurs when the total degradation performance, including continuous degradation and sudden degradation increments caused by random shocks, exceeds a certain critical threshold level. Hard failure occurs when the magnitude of any shock (extreme shock model) or the accumulated damage of shocks (cumulative shock model) is beyond some strength threshold level, which is affected by the temporal degradation performance. From viewpoints of Stress-Strength models and Cumulative damage/shock model, a realistic reliability model is developed in this article for mutually dependent competing failure processes due to degradation and random shocks. Finally, a numerical example of Micro-Electro-Mechanical System (MEMS) is conducted to illustrate the implementation and effectiveness of the proposed model.  相似文献   

10.
In this paper we prove the existence of curved, multidimensional viscous shocks and also justify the small‐viscosity limit. Starting with a curved, multidimensional (inviscid) shock solution to a system of hyperbolic conservation laws, we show that the shock can be obtained as a small‐viscosity limit of solutions to an associated parabolic problem (viscous shocks). The two main hypotheses are a natural Evans function assumption on the viscous profile, together with a restriction on how much the shock can deviate from flatness. The main tools are a conjugation lemma that removes xN/? dependence from the linearization of the parabolic problem about the viscous profile, new degenerate Kreiss‐type symmetrizers used to prove an L2 estimate for the linearized problem, and a finite‐regularity calculus of semiclassical and mixed type (classical‐semiclassical) pseudodifferential operators. © 2003 Wiley Periodicals, Inc.  相似文献   

11.
In this paper, we analyze the equilibrium responses (in terms of defense, R&D and preemption) to a potential terrorist attack in a two-country framework (Home and Foreign) using a multi-stage game with imperfect information. We highlight three different types of strategic interactions: (a) how the choice of defense, R&D and pre-emption affects the choice of the same in the other country (strategic interdependence across countries); (b) the strategic interaction between the instruments of terrorism deterrence, namely, defense, R&D and pre-emption in a given country and (c) the strategic interaction between the terrorist and the defender. Our main results are as follows: (i) defense effort in Home is a strategic complement to the defense effort in Foreign. (ii) Even without R&D sharing between countries, we find that R&D effort in one country is a strategic substitute to that in the other; (iii) similar results hold for pre-emption because of its public good nature; (iv) for a given country, defense and R&D efforts may be strategic substitutes or complements depending on the magnitude of the ratio of weighted expected damage between Foreign and Home; (v) R&D and pre-emption may be strategic substitutes or complements depending on the magnitude of the elasticity of damage and (vi) an increase in the likelihood of the terrorist being weak reduces defense effort, may increase or decrease R&D depending on the magnitude of elasticity of damage but increases pre-emptive effort in both countries.  相似文献   

12.
In this article we look at a one-dimensional infinitesimal particle system governed by the completely inelastic collision rule. Considering uniformly spread mass, we feed the system with initial velocities, so that when time evolves the corresponding velocity field fulfils the inviscid Burgers equation. More precisely, we suppose here that the initial velocities are zero, except for particles located on a stationary regenerative set for which the velocity is some given constant number. We give results of a large deviation type. First, we estimate the probability that a typical particle is located at time 1 at distance at least D from its initial position, when D tends to infinity. Its behaviour is related to the left tail of the gap measure of the regenerative set. We also show the same asymptotics for the tail of the shock interval length distribution. Second, we analyse the event that a given particle stands still at time T as T tends to infinity. The data to which we relate its behaviour are the right tail of the gap measure of the regenerative set. We conclude with some results on the shock structure.  相似文献   

13.
The paper considers strategic defense and attack of a system which can be separated into independent identical homogeneous parallel elements. The defender distributes its resource between separation of the elements and their protection from outside attacks. The attacker distributes its effort evenly among all attacked elements. The vulnerability of each element is determined by a contest success function between the attacker and the defender. The defender can choose a subset of the elements to defend. The attacker does not know which elements are protected and can choose a number of randomly chosen elements to attack. Separation efficiency conditions are formulated dependent on the defender’s and attacker’s budgets, separation costs, contest intensity, and system demand. An algorithm for determining the optimal number of protected elements is suggested for the case when both the defender and the attacker can choose the number of protected and attacked elements freely. The article considers both the cases without and with performance redundancy. Illustrative numerical examples are presented.  相似文献   

14.
For the structure of a sonic boom produced by a simple aerofoil at a large distance from its source we take a physical model which consists of a leading shock (LS), a trailing shock (TS) and a one-parameter family of nonlinear wavefronts in between the two shocks. Then we develop a mathematical model and show that according to this model the LS is governed by a hyperbolic system of equations in conservation form and the system of equations governing the TS has a pair of complex eigenvalues. Similarly, we show that a nonlinear wavefront originating from a point on the front part of the aerofoil is governed by a hyperbolic system of conservation laws and that originating from a point on the rear part is governed by a system of conservation laws, which is elliptic. Consequently, we expect the geometry of the TS to be kink-free and topologically different from the geometry of the LS. In the last section we point out an evidence of kinks on the LS and kink-free TS from the numerical solution of the Euler’s equations by Inoue, Sakai and Nishida [5].  相似文献   

15.
Based on the theoretical framework of adaptive dynamics, the evolution of the predator-prey model with functional response of group defense effect on the predator handling time, was investigated. Firstly, in view of the interaction of predator populations with interspecific competition, the evolutionary conditions for a single predator population to split into 2 populations with different strategies through evolutionary branching were given. Secondly, when the ecological equilibrium of the model is unstable and the system has a limit cycle, the population will have strong coexistence under large mutation, but this coexistence will be evolutionarily unstable. Finally, the conclusions for the model with Holling-Ⅱ type functional response were compared. The results indicate that, with a sufficiently large prey carrying capacity, group defense effects can evolutionarily lead to the extinction of predators. © 2023 Editorial Office of Applied Mathematics and Mechanics. All rights reserved.  相似文献   

16.
安全经济性是企业信息安全防御决策的重要依据,在网络信息系统中企业需要权衡如何在众多不同信息资源节点间实施防御资源的合理分配。本文首先构建了无安全资源约束下的安全防御决策模型,研究企业在信息安全防御中如何来优化分配其防御资源,得出不同信息节点存在防御阀值以及各节点的相对经济防御水平值;在此模型基础上增加了安全防御资源约束条件,分析不同信息资源节点的防御价值、损失预期、攻击概率等因素对决策的影响,得出企业在不同节点上的防御优先级以及防御过程中投入资源量等相关结论。  相似文献   

17.
We study a two dimensional Riemann problem for the self-similar nonlinear wave system which gives rise to an interaction of a transonic shock and a rarefaction wave. The interesting feature of this problem is that the governing equation changes its type from supersonic in the far field to subsonic near the origin. The subsonic region is then bounded above by the sonic line (degenerate) and below by the transonic shock (free boundary). Furthermore due to the rarefaction wave in the downstream, which interacts with the transonic shock, the problem becomes inhomogeneous and degenerate. We establish the existence result of the global solution to this configuration, and present analysis to understand the solution structure of this problem.  相似文献   

18.
暴恐分子有意避开政府机关、机场等关键设施的严密防御范围,选择早市、火车站卖票口等尚未得到有效防御的人群密集场所发动袭击。本文考虑政府反恐力量防御拓扑特征,即政府反恐力量防控范围与恐怖分子发动攻击范围之间相离、相切、相交和相含等拓扑关系,构建了暴恐事件的演化博弈模型,分析多种情景下均衡稳定性,在Netlogo平台下对多种情景的理论结果进行社会模拟分析。结果表明:政府和恐怖分子行为演化均衡策略与政府防控范围、恐怖分子发动攻击范围、政府防控成本、政府防控收益等多种因素有关,随着政府进行有效防控的范围不断增加,恐怖分子选择袭击的可能性将不断减小,直到采取不攻击策略。  相似文献   

19.
We examine the limiting average availability of a maintained system that deteriorates due to random shock process and as a response to its usage (wear out). System’s failures are not self-announcing, hence, failures must be detected via inspection. We consider randomly occurring shocks that arrive according to a Poisson process and cumulatively damage the system. Two models are considered: in Model 1 the shock and wear out processes are independent of the external environment and in Model 2, the shocks arrival rate, the shock magnitudes and the wear out rate are governed by a random environment which evolves as a Markov process. We obtain the system’s availability for both models.  相似文献   

20.
激波在异种气体中传播及诱导的剪切混合研究   总被引:1,自引:0,他引:1  
利用二阶迎风TVD格式求解多组分,层流全N-S方程,针对直通道和突扩直通道,研究了马赫数为2和4的激波在H2和空气界面上的传播及诱导的燃料剪切混合,计算结果表明:(1)直通道中,剪切层中的激波阵面要发生畸变,存在对混合起主要作用的卷吸涡,激波马赫数不同,卷吸涡结构和横向混合的尺寸也不同,激波马赫数低,剪切混合效果好,(2)在突扩直通道中,马赫数为2和4的激波在H2中产生不同强度激波,在剪切层中都能产生顺时针,尺度较大的卷吸涡,后台阶增强了剪切层的混合。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号