This paper presents a modeling method by stochastic Petri net for reliability analysis of phased mission system( PMS) with phase backup. The model consisting of petri nets,depicts the system behaviors of unit level,sy...This paper presents a modeling method by stochastic Petri net for reliability analysis of phased mission system( PMS) with phase backup. The model consisting of petri nets,depicts the system behaviors of unit level,system logic level and phase level. Guard functions of petri nets are used to avoid modeling complexity and make the model flexible to different reliability logical structures. It was shown that the time redundancy within phase and from phase backup for PMS can both be described by use of the proposed model.展开更多
In wide area backup protection of electric power systems, the prerequisite of protection device's accurate, fast and reliable performance is its corresponding fault type and fault location can be discriminated qui...In wide area backup protection of electric power systems, the prerequisite of protection device's accurate, fast and reliable performance is its corresponding fault type and fault location can be discriminated quickly and defined exactly. In our study, global information will be introduced into the backup protection system. By analyzing and computing real-time PMU measurements, basing on cluster analysis theory, we are using mainly hierarchical cluster analysis to search after the statistical laws of electrical quantities' marked changes. Then we carry out fast and exact detection of fault components and fault sections, and finally accomplish fault isolation. The facts show that the fault detection of fault component (fault section) can be performed successfully by hierarchical cluster analysis and calculation. The results of hierarchical cluster analysis are accurate and reliable, and the dendrograms of hierarchical cluster analysis are in intuition.展开更多
Service function chains(SFC)mapping takes the responsibility for managing virtual network functions(VNFs).In SFC mapping,existing solutions duplicate VNFs with redundant instances to provide high availability in respo...Service function chains(SFC)mapping takes the responsibility for managing virtual network functions(VNFs).In SFC mapping,existing solutions duplicate VNFs with redundant instances to provide high availability in response to failures.However,as a compromise,these solutions result in high resource consumption due to device maintenance.In this paper,we propose a novel method named dynamic backup sharing(DBS)that allows SFCs to dynamically share backups to reduce resource consumption.DBS formulates the problem of sharing backups among different VNFs as an integer linear programming(ILP).Thereafter,we design a novel online algorithm based on dynamic programming to solve the problem.The experimental results indicate that DBS outperforms state-ofthe-art works by reducing resource consumption and improving the number of accepted requests.展开更多
Based on ATM Multi section backup VP self healing scheme, analysis of cell loss probability under finite buffer is made by use of queue system method. Optimal buffer size can be fixed on.
As the computer system has developed much in this highly information-oriented society, database security has become a very important problem and its backup strategies need to be made more efficiently and safety. The i...As the computer system has developed much in this highly information-oriented society, database security has become a very important problem and its backup strategies need to be made more efficiently and safety. The image copy method has been used as the most simple and dependable recovery mechanism for media failure. However, this method spends high overhead costs for massive data transmission and much processing time in the normal operation of the database. To cover such weak points, incremental and full backup methods are adopted before updated trucks reach a predetermined level. Moreover, when the number of full backup files exceeded a predetermined level, we stop incremental and full backups and switch it to the image copy. This paper applies cumulative damage model to backup of files in a database system, by putting damage shock by update, failure shock by database failure and damage by dumped files, and considers the tradeoff among overhead costs of image copy and incremental, full backup methods, and discusses analytically an optimal policy for the image copy backup interval. Finally, numerical examples are given in the case of Poisson process and exponential distributions.展开更多
早上的时候,跟随小天“多月”的手机终于支持不住,惨死在小天的魔爪下。死时面目惨白!据专业人士考证——该机因长时间遭受不公正待遇,身心长期遭受非人的折磨,最终白屏而亡……怎么办怎么办?最终,在一位“伪高手”的指导下——格机,倒...早上的时候,跟随小天“多月”的手机终于支持不住,惨死在小天的魔爪下。死时面目惨白!据专业人士考证——该机因长时间遭受不公正待遇,身心长期遭受非人的折磨,最终白屏而亡……怎么办怎么办?最终,在一位“伪高手”的指导下——格机,倒是起死回生了。但是短信、名片全丢,桌面上那么一堆图表又要从新分类整理,玩了很久的游戏存档也 over 了,真是惨不能言啊。展开更多
基金Nationd Natural Science Foundation of China(No.71671185)
文摘This paper presents a modeling method by stochastic Petri net for reliability analysis of phased mission system( PMS) with phase backup. The model consisting of petri nets,depicts the system behaviors of unit level,system logic level and phase level. Guard functions of petri nets are used to avoid modeling complexity and make the model flexible to different reliability logical structures. It was shown that the time redundancy within phase and from phase backup for PMS can both be described by use of the proposed model.
文摘In wide area backup protection of electric power systems, the prerequisite of protection device's accurate, fast and reliable performance is its corresponding fault type and fault location can be discriminated quickly and defined exactly. In our study, global information will be introduced into the backup protection system. By analyzing and computing real-time PMU measurements, basing on cluster analysis theory, we are using mainly hierarchical cluster analysis to search after the statistical laws of electrical quantities' marked changes. Then we carry out fast and exact detection of fault components and fault sections, and finally accomplish fault isolation. The facts show that the fault detection of fault component (fault section) can be performed successfully by hierarchical cluster analysis and calculation. The results of hierarchical cluster analysis are accurate and reliable, and the dendrograms of hierarchical cluster analysis are in intuition.
基金This work is supported by the National Key R&D Program of China(2018YFB1800601)the Key R&D Program of Zhejiang Province(2021C01036,2020C01021)the Fundamental Research Funds for the Central Universities(Zhejiang University NGICS Platform:ZJUNGICS2021021).
文摘Service function chains(SFC)mapping takes the responsibility for managing virtual network functions(VNFs).In SFC mapping,existing solutions duplicate VNFs with redundant instances to provide high availability in response to failures.However,as a compromise,these solutions result in high resource consumption due to device maintenance.In this paper,we propose a novel method named dynamic backup sharing(DBS)that allows SFCs to dynamically share backups to reduce resource consumption.DBS formulates the problem of sharing backups among different VNFs as an integer linear programming(ILP).Thereafter,we design a novel online algorithm based on dynamic programming to solve the problem.The experimental results indicate that DBS outperforms state-ofthe-art works by reducing resource consumption and improving the number of accepted requests.
文摘Based on ATM Multi section backup VP self healing scheme, analysis of cell loss probability under finite buffer is made by use of queue system method. Optimal buffer size can be fixed on.
文摘As the computer system has developed much in this highly information-oriented society, database security has become a very important problem and its backup strategies need to be made more efficiently and safety. The image copy method has been used as the most simple and dependable recovery mechanism for media failure. However, this method spends high overhead costs for massive data transmission and much processing time in the normal operation of the database. To cover such weak points, incremental and full backup methods are adopted before updated trucks reach a predetermined level. Moreover, when the number of full backup files exceeded a predetermined level, we stop incremental and full backups and switch it to the image copy. This paper applies cumulative damage model to backup of files in a database system, by putting damage shock by update, failure shock by database failure and damage by dumped files, and considers the tradeoff among overhead costs of image copy and incremental, full backup methods, and discusses analytically an optimal policy for the image copy backup interval. Finally, numerical examples are given in the case of Poisson process and exponential distributions.
文摘早上的时候,跟随小天“多月”的手机终于支持不住,惨死在小天的魔爪下。死时面目惨白!据专业人士考证——该机因长时间遭受不公正待遇,身心长期遭受非人的折磨,最终白屏而亡……怎么办怎么办?最终,在一位“伪高手”的指导下——格机,倒是起死回生了。但是短信、名片全丢,桌面上那么一堆图表又要从新分类整理,玩了很久的游戏存档也 over 了,真是惨不能言啊。