Analysis of Non-coherent Fault Trees Using Ternary Decision Diagrams
|
|
- Lily Shaw
- 5 years ago
- Views:
Transcription
1 Analyss of Non-coherent Fault Trees Usng Ternary Decson Dagrams Rasa Remenyte-Prescott Dep. of Aeronautcal and Automotve Engneerng Loughborough Unversty, Loughborough, LE11 3TU, England John Andrews Dep. of Aeronautcal and Automotve Engneerng Loughborough Unversty, Loughborough, LE11 3TU, England Abstract Rsk and safety assessments performed on potentally hazardous ndustral systems commonly utlse Fault Tree Analyss (FTA) to forecast the probablty of system falure. The type of logc for the top event s usually lmted to AND and OR gates whch leads to a coherent fault tree structure. In non-coherent fault trees components workng states as well as components falures contrbute to the falure of the system. The qualtatve and quanttatve analyses of non-coherent fault trees can ntroduce further dffcultes over and above those seen n the coherent case. It s shown that the Bnary Decson Dagram (BDD) method can be used for ths type of assessment. The BDD approach can mprove the accuracy and effcency of the quanttatve analyss of non-coherent fault trees. Ths artcle demonstrates the value of the Ternary Decson Dagram method (TDD) for the qualtatve analyss of non-coherent fault trees. Such analyss can be used to provde nformaton to a decson makng process for future actons of an autonomous system and therefore t must be performed n real tme. In these crcumstances fast processng and small storage requrements are very mportant. The TDD method provdes a fast processng capablty and small storage s acheved when a sngle structure s used for both qualtatve and quanttatve analyses. The effcency of the TDD
2 method s dscussed and compared to the performance of the establshed methods for analyss of non-coherent fault trees. Keywords: fault tree analyss, bnary decson dagrams, non-coherent fault trees, ternary decson dagrams 1. Introducton Fault Tree Analyss (FTA) was frst ntroduced n the 1960s and t s commonly used for the relablty assessment of complex ndustral systems. Causes of system falure are analysed by performng qualtatve and quanttatve analyses. A large number of combnatons of events whch can cause system falure may be produced for real systems (mnmal cut sets/prme mplcant sets) and the calculaton of these falure combnatons can be tme-consumng. Also, the determnaton of the exact top event probablty requres lengthy calculatons. For real systems ths demand may exceed the capablty of the avalable computers, ntroducng approxmatons nto the analyss wth the resultng loss of accuracy. The Bnary Decson Dagram (BDD) method [1] provdes a more concse form for the logc functon of a fault tree. It overcomes some dsadvantages of conventonal FTA technques and provdes an effcent and exact analyss of coherent and non-coherent fault trees. The BDD method s effcent for quantfyng the lkelhood of system falure occurrence because t does not requre system falure modes as an ntermedate step. It s also more accurate snce approxmatons used n the tradtonal approach of knetc tree theory [2] are not appled. Prevous work on the effcency and the accuracy of the BDD method s presented n [3, 4]. Instead of analysng the fault tree drectly, the BDD method frst converts the fault tree to a bnary decson dagram, whch encodes the Boolean equaton for the top event. The resultng structure functon BDD (SFBDD) can be used n the quanttatve analyss to calculate the top event probablty
3 or frequency. An SFBDD s not of the correct form for the qualtatve analyss and further processng s requred. In the coherent case a lst of mnmal cut sets s obtaned by usng the mnmsaton technque [1]. In the non-coherent case a full set of prme mplcants s determned by applyng the consensus theorem [5] to pars of prme mplcant sets nvolvng a normal and negated lteral. There are several methods for the calculaton of prme mplcant sets proposed n the lterature. A metaproducts BDD method, the frst approach to ths problem, was presented n [6] and further developed n [7]. It was followed by a zero-suppressed BDD method (ZBDD), presented n [8]. The thrd alternatve method was developed n [9] and t uses a labelled bnary decson dagram (L-BDD). These methods produce prme mplcant sets and have ther advantages and dsadvantages n the converson and representaton technques. A new alternatve method for performng the qualtatve analyss of non-coherent fault trees s proposed n ths paper. In ths approach a fault tree s converted to a ternary decson dagram (TDD). The man concept of a TDD was presented n [10], whch s expanded nto an mplementaton methodology for fault tree analyss n ths paper. Every node n a TDD has three branches: the 1 branch whch represents the falure relevance of the component, the 0 branch whch represents the repar relevance of the component (so far ths s a conventonal BDD presentaton) and the consensus branch whch represents the rrelevance of the component to the system falure. A TDD encodes all prme mplcant sets, because the consensus branch for a node s calculated by applyng the consensus theorem whch gves all hdden prme mplcant sets. However, the TDD can be non-mnmal, thus, the mnmsaton process s performed to remove non-mnmal paths from the 1 and 0 branches. The obtaned TDD can be used for the quanttatve analyss as well as the qualtatve analyss. 2. Non-coherent fault trees Fault trees are classfed accordng to ther logc functon. If durng fault tree constructon only AND gates and OR gates are used, the resultng fault tree s defned as coherent. If NOT logc s used or drectly mpled the resultng fault tree can be non-coherent.
4 Introduce each component n the system by an ndcator x to show the status of the component: 1f component s faled, x (1) 0 f component s workng. where = 1,2, n, and n s the number of components n the system. The logc structure of the fault tree can be expressed by a structure functon : 1 f system s faled, (2) 0 f system s workng. = (x), where x = (x 1, x 2,, x n ). Accordng to the requrements of coherency [5], a structure functon (x) s coherent f: 1. Each component s relevant to the system,.e. ( 1, x) (0, x) for some x. (3) 2. (x) s ncreasng (non-decreasng) for each x,.e. where ( 1, x) (0, x). (4) 1, x ) ( x,, x,1, x,, x ), (5) ( n 0, x ) ( x,, x,0, x,, x ). (6) ( n The second condton means that the system condton does not change or deterorates as the component deterorates. If the system s non-coherent for component then for a partcular state of the rest of components the system s faled when component works and when component fals the system s restored to the non-faled condton. As a consequence of ths property, system falure mght occur due to the repar of a faled component or for a faled system the falure of an addtonal
5 component may gve a successful outcome of system performance. The fault tree becomes coherent f the NOT logc can be elmnated from the fault tree structure. Consder a smple example n Fgure 1. Cars A and B are approachng the juncton wth lghts on red and should stop. Car C has the rght of way and should proceed through the juncton. Three basc events are consdered: A Car A fals to stop, B Car B fals to stop, C Car C fals to contnue. The collson at the crossroads can happen n two ways: Car A fals to stop and hts car C whch s movng Car A stops but car B drves nto the back of t. A fault tree representng causes of falure of the collson s shown n Fgure 2. Workng n a bottomup way the followng logc expresson s obtaned. Top A C A B, where + s OR, s AND. Therefore, C A, and B A, are prme mplcants, as combnatons of component condtons (workng or faled) whch are necessary and suffcent to cause system falure. Ths lst s ncomplete because there s on more falure mode for the system: { B, C}.e. f B fals to stop and C contnues across the lghts t does not matter what A does there wll be a collson. Therefore, the full logc expresson for the Top event s:
6 Top A C A B B C, whch can be obtaned by applyng the consensus law: A X A Y A X A Y X Y. 3. Fault tree converson to Bnary Decson Dagram For the fault tree to be converted to a BDD t frst needs to be prepared so that n the non-coherent case the NOT logc s pushed down to the level of basc events by usng De Morgan s laws,.e. A B A B, (7) A B A B. (8) Each node n a SFBDD s defned by an te(f-then-else) structure. The te structure te(x, f 1, f 0 ) means that f x fals then consder functon f 1, else consder functon f 0. So, f 1 les on the 1 branch of x and f 0 les on the 0 branch n the dagram. Before the converson process takes place basc events n the fault tree are ordered. SFBDD constructon then moves through the fault tree n a bottom-up manner applyng the varable orderng n the converson process. Each basc event n the system s assgned an te structure: a = te(a,1,0). (9) Alternatvely, a basc event a s assgned an te structure: a = te(a,0,1). (10) For gates whose nputs have already been defned as an te structure the man rule of the converson process s appled,.e. f J = te(x, f 1, f 0 ) and H = te(y, g 1, g 0 ) represent two nputs to a gate of logc type, then:
7 J H te( x, f te( x, f 1 1 H, f g, f H) f x y n theorderng, g )f x y n theorderng. 0 (11) For small examples the varable orderng s largely rrelevant. Varable orderng schemes are dscussed n [11, 12]. For the fault tree example n Fgure 2 consder the varable orderng scheme A < B < C. Applyng the converson rules (9) - (11) to the fault tree results n a SFBDD presented n Fgure Calculaton of prme mplcant sets Knowledge of prme mplcant sets can be valuable n ganng an understandng of the system and the causes of system falure. It can help to develop a repar schedule for faled components f a system cannot be taken off lne for repar. For systems whose state has all the faled components n any prme mplcant care should be taken to ensure that the repar of other components does not then cause the remanng functonng events n the prme mplcant. The SFBDD whch encodes the structure functon cannot be used drectly to produce the complete lst of prme mplcant sets of a non-coherent fault tree and a converson process s usually performed to produce a dfferent form of a BDD whch encodes only the prme mplcants. Consder a general component x n a non-coherent system. In a prme mplcant set component x can appear n a faled or workng state, or can be excluded from the falure mode. In the frst two stuatons x s sad to be relevant, n the thrd case t s rrelevant to the system state. Component x can be ether falure relevant (the prme mplcant set contans x) or repar relevant (the prme mplcant set contans x ). A general node n the SFBDD, whch represents component x, has two branches. The 1 branch corresponds to the falure of x; therefore, x s ether falure relevant or rrelevant. Smlarly, the 0 branch corresponds to the functonng of x and so x s ether repar relevant or rrelevant. Hence t s mpossble to dstngush between the two cases for each branch and the prme mplcant sets cannot be dentfed drectly from the BDD. Therefore, addtonal methods for encodng prme mplcant sets are requred.
8 5. TDD method An approach to buld a Ternary Decson Dagram (TDD) for the analyss of non-coherent fault trees s proposed n ths secton. It employs the consensus theorem and creates, n addton to the two branches of the BDD, a thrd branch for every node, called the consensus branch. Ths thrd branch encodes the hdden prme mplcant sets. The mnmsaton algorthm [1] s appled to remove non-mnmal paths and obtan prme mplcant sets only. 5.1 Converson Every node n the TDD has three ext branches. A new fre structure s defned whch separates relevant and rrelevant components and also dstngushes between the type of relevancy,.e. falure relevant and repar relevant. The fre structure for a node x s gven n Fgure 4. So, f: = fre(x, f 1, f 0, f 2 ), (12) then = x f 1 + x f 0 + f 2, (13) where f 2 = f 1 f 0. (14) The 1 branch encodes prme mplcant sets for whch component x s falure relevant, the 0 branch encodes prme mplcant sets for whch component x s repar relevant, and the C (consensus) branch encodes prme mplcant sets for whch component x s rrelevant. The fre structure shown n Fgure 4 can be nterpreted as follows: If x s falure relevant then consder f 1, else f x s repar relevant
9 then consder f 0 else consder f 2 endf Functon f 2 encodes prme mplcant sets for whch x s rrelevant, but ths branch s not mportant for all components. For components that are only falure or repar relevant but not both ths branch can be kept empty. In our method we assgn f 2 = NIL, f the conjuncton of the two branches f 1 f 0 s not requred. Whle operatng the new symbol n the Boolean algebra, t s defned that NIL A= NIL. Symbol NIL s used to dentfy cases when the C branch s not requred and no Boolean operatons that nvolve ths branch are needed. The converson technque to compute the TDD from the non-coherent fault tree s an extenson of the method used to develop the conventonal BDD. Frst of all, basc events of the fault tree must be ordered. Then the followng process s presented: By the applcaton of De Morgan s laws push NOT logc down through the fault tree untl the basc event level s reached. Each basc event s assgned an fre structure: o If a s only falure or repar relevant: a = fre(a,1,0,nil), (15) a = fre(a,0,1,nil). (16) o If a s falure and repar relevant: a = fre(a,1,0,0) (17) a = fre(a,0,1,0) (18) Traversng the fault tree n a bottom-up manner and consderng gates whose nputs have been expressed n an fre format gves:
10 If J = fre(x, f 1, f 0, f 2 ) and H = fre(y, g 1, g 0, g 2 ), then fre( x, K1, K0, K1 K0 ) J H fre( x, L1, L0, L1 L0 ) f f x y n theorderng, (19) x y n theorderng. here K 1 f H, K f H 1 L 0 0, 1 f1 g1, L0 f0 g0, K 1 K 0 consensus of K 1 and K 0, L 1 L 0 consensus of L 1 and L 0. If component x s falure or repar relevant, K 1 K 0 = NIL, L 1 L 0 = NIL n equaton 19. Wthn each fre calculaton an addtonal consensus calculaton s performed to ensure all the hdden prme mplcant sets are encoded n the TDD. It calculates the conjuncton of the 1 and the 0 branch of every node and thus dentfes the consensus of each node. If a node n the TDD encodes component whch s only falure or repar relevant the conjuncton of the 1 and 0 branch for the node s not requred, because there are no hdden prme mplcant sets assocated wth ths component. Ths property makes the TDD method an effcent technque for performng the qualtatve analyss of non-coherent fault trees. Consder the fault tree n Fgure 2. Introducng the orderng of basc events A < B < C and applyng the rules descrbed n (15)-(19) gves the TDD n Fgure 5. It can be seen that the TDD n Fgure 5 s dfferent from the SFBDD n Fgure 3 only wth ts C branch that represents the ntersecton of the 1 and 0 branches. Only for node F1 there s a new structure F4 created as the C branch. The other nodes have the C branch leadng to value NIL, snce they encode varables that only appear as falure or repar relevant. To obtan prme mplcant sets non-mnmal combnatons from every path need to be removed.
11 5.2 Mnmsaton Once a fault tree s converted to a TDD there s no guarantee that the resultng structure wll be mnmal and gve exact prme mplcant sets. In order to perform the qualtatve analyss a mnmsaton procedure needs to be mplemented. The algorthm developed by Rauzy for mnmsng the BDD [1] was extended to create a mnmal TDD. Consder a general node n the TDD whch s represented by the functon F, where F = fre(x, G, H, K). (20) The process of mnmsaton s descrbed n three cases: 1. Component x s falure and repar relevant 2. Component x s falure relevant 3. Component x s repar relevant In case 1, the set of all mnmal solutons of F s mnmal solutons of G and H (G mn and H mn ), that are not mnmal solutons of K, and also all mnmal solutons of K (K mn ). Then f δ s a set of mnmal solutons of G, whch are not a mnmal soluton of K, then the ntersecton of δ and x ( x ) wll be mnmal solutons of F. Smlarly, let γ be a set of mnmal solutons of H whch are not mnmal solutons of K, then the ntersecton of γ and x ( x ) wll be mnmal solutons of F. The set of all the mnmal solutons of F (sol mn (F)) wll also nclude the mnmal solutons of K, so: sol mn (F) = ( x) ( x) K. (21) The set sol mn (F) represents the mnmal solutons of F by removng any mnmal solutons of G and H that are also mnmal solutons of K. mn
12 In case 2, where x s falure relevant, K = NIL and the calculaton of prme mplcant sets s equvalent adequate to the BDD case where the C branch does not exst,.e. sol mn (F) = ( x) H. (22) The set sol mn (F) represents the mnmal solutons of F by removng any mnmal solutons of G that are also mnmal solutons of H. mn In case 3, where x s repar relevant, K = NIL and the calculaton of prme mplcant sets s defned as: sol mn (F) = ( x) G. (23) The set sol mn (F) represents the mnmal solutons of F by removng any mnmal solutons of H that are also mnmal solutons of G. mn 5.3 Obtanng prme mplcant sets Traversng the TDD n Fgure 5, whch s already n ts mnmal form, from the root vertex to termnal 1 vertces gve all three prme mplcant sets. Agan, the algorthm depends on the relevance of node varable and the value of C branch. 1. If K NIL, traversng the 1 branch of node x results n a faled state of a component n a partcular falure mode. Traversng the 0 branch of node x results n a workng state of a component n a partcular falure mode. Fnally, traversng the C branch of node x does not nclude that component n a partcular falure mode at all. 2. If K = NIL and x s falure relevant, traversng the 1 branch of node x results n a faled state of a component n a partcular falure mode. Traversng the 0 branch of node x does not nclude that component n a partcular falure mode. 3. If K = NIL and x s repar relevant, traversng the 0 branch of node x results n a repared state of a component n a partcular falure mode. Traversng the 1 branch of node x does not nclude that component n a partcular falure mode.
13 The three paths obtaned gve the three prme mplcant sets: F1-F2 { A, C} F1-F3 { A, B} F1-F4-F5 { B, C} Ths method provdes an advanced technque for encodng prme mplcant sets. 5.4 Establshed methods for qualtatve analyss Ths secton presents the exstng methods for convertng non-coherent fault trees to BDDs and obtanng prme mplcant sets. In the later sectons the effcency of all methods, ncludng the TDD method, wll be nvestgated and compared usng some example fault trees Meta-products BDD method Ths method converts a SFBDD to a meta-products BDD whch produces all prme mplcant sets. A meta-products BDD obtaned s n ts mnmal form. The method was developed n [6,7] where two varables are assocated wth every component x. The frst varable, P x, denotes relevancy and the second varable, S x, denotes the type of relevancy,.e. falure or repar relevant. A meta-product, MP(π), s the ntersecton of all the system components accordng to ther relevancy to the system state and π represents the prme mplcant set encoded n meta-product MP(π): Px MP( ) Px Px S x f x, S x f x, f nether x nor x belongs to. (24) Consder node F n a SFBDD, where F = te(x, F1, F0). The meta-products BDD, that descrbes prme mplcant sets usng equaton (20), s expressed as: PI(F) = te(p x, te(s x, P1, P0), P2), (25) where
14 P2 = PI(F1 F0), P1 = PI(F1) P 2, P0 = PI(F0) P 2. x s the frst element n the varable orderng, PI(F) represents the structure of a meta-products BDD, PI s used to denote the prme mplcants. P2 encodes the prme mplcants for whch x s rrelevant, P1 encodes the prme mplcants for whch x s falure relevant and P0 encodes the prme mplcants for whch x s repar relevant. (26) (27) (28) The SFBDD n Fgure 3 has been converted to a meta-products BDD, shown n Fgure 6. Now t s possble to obtan the meta-products and dentfy the prme mplcant sets. Every path from the root node to a termnal 1 gves a prme mplcant set. P A S A PB PC SC { A, C} P A S A PB SB PC { A, B} P A PB SB PC SC { B, C} The number of nodes n a meta-products BDD ncreases largely snce every basc event x s presented by two nodes, P x and S x. The process can be tme-consumng ZBDD method An alternatve method presented by Rauzy n [8] uses the dea of zero-suppressed BDDs (ZBDD). Ths method requres to label nodes wth faled and/or workng states of basc events and to decompose prme mplcant sets accordng to the presence of a gven state of a basc event. Zerosuppressed BDDs are BDDs based on a reducton rule. Ths data structure provdes a unque and compact representaton whch s more effcent and smpler than the usual BDDs when manpulatng sets n combnatoral problems.
15 The prncple of ths algorthm s to traverse the SFBDD that encodes structure functon n a depthfrst way and to buld a ZBDD that encodes the prme mplcant sets of n a bottom-up way. The converson rule s dvded n four cases. Consder node F n a SFBDD, where F = te(x, F1, F0). Case 1: f basc event x appears n ts faled and workng states then: where PI(F) = xp1 xp0 P2, (29) P2 = PI(F1 F0), (30) P1 = PI(F1) \ P2, (31) P0 = PI(F0) \ P2. (32) Here \ s operator wthout [1] that s used mnmsng conventonal BDDs. Case 2: f basc event x appears n ts faled state only then where PI(F) = xp1 P0, (33) P0 = PI(F0), (34) P1 = PI(F1) \ P0. (35) Case 3: f basc event x appears n ts workng state only then t s consdered n a smlar way to case 2. Case 4: f basc event x does not appear n the system then PI(F) = PI(F1 + F0). (36) Applyng ths method to the SFBDD n Fgure 3 gves the ZBDD n Fgure 7. Every path from the root vertex to termnal vertex 1 presents a prme mplcant set. Therefore, ths ZBDD contans three prme mplcant sets: A C { A, C} A B { A, B}
16 B C { B, C} The ZBDD s an effcent technque where all prme mplcant sets are descrbed by a compact and easy handlng structure Labelled varable method The labelled varable method [9] provdes another alternatve method for constructng BDDs for noncoherent fault trees. BDDs constructed usng ths approach consst of varables that are labelled accordng to ther type. They are called labelled bnary decson dagrams (L-BDDs). The structure functon (x) of a non-coherent fault tree may contan three dfferent types of basc events. For example, the functon ( x) a b a c b c contans a double form (DF) varable a that appears n both states, a sngle form postve (SFP) varable b and a sngle form negatve (SFN) varable c. In the further presentaton the SFP varable x wll be smply presented by x, the SFN varable x wll be labelled as $x and the DF varable x wll be labelled as &x. The converson process for computng the L-BDD from the non-coherent fault tree s an extenson to the method used to develop the SFBDD. Consderng the orderng &x < x < $x mplements the addtonal equatons: If J = te(x, f 1, f 0 ) and H = te($x, g 1, g 0 ), then J H te (& x, f1 g0, f0 g1) If J = te(&x, f 1, f 0 ) and H = te(x, g 1, g 0 ), then J H te (& x, f1 g1, f0 g0) If J = te(&x, f 1, f 0 ) and H = te($x, g 1, g 0 ), Then J H te (& x, f1 g0, f0 g1) (37) (38) (39)
17 Applyng the converson rules to the fault tree n Fgure 2 results n a L-BDD presented n Fgure 8 (the top BDD). The L-BDD does not provde all the nformaton for the qualtatve analyss, therefore some addtonal calculatons are performed n order to get all prme mplcant sets. Vstng the L-BDD n the bottom-up way the procedure to be appled to the node F = te(x, F1, F0) to determne the prme mplcants s as follows: If x has label &, then: PI( F) xp1 $ xp0 P2 (40) where P2 F1 F0, P1 F1\ P2, P0 F0 \ P2. (41) Else: PI( F) P1 F0 (42) where x or $ x, P1 F1\ F0. (43) \ s the operator wthout proposed by Rauzy [1]. Some extra rules are appled n the cases wth labelled varables. The heavest operaton s the ntersecton P2 = F1 F0, shown n Fgure 8, the bottom BDD. The three prme mplcant sets are obtaned, tracng all paths from root vertex to termnal vertex 1 and takng nto account the results of ntersecton: & A $ C { A, C} & A B { A, B} B $ C { B, C}
18 The L-BDD method uses the pror nformaton about the type of every varable, however, the labellng ntroduces some addtonal varables and ncreases the sze of the structure. The three establshed methods for the calculaton of prme mplcant sets wll be consdered for the effcency test of the TDD method. 5.5 Quanttatve analyss usng TDDs In order to perform the quanttatve analyss for non-coherent fault trees usng the BDD method, a non-coherent fault tree s converted to a SFBDD that represents the structure functon of the fault tree. In the TDD method the non-coherent fault tree s converted to the TDD that has three branches from each node. The thrd branch s created to encode all prme mplcants of the system. However, the TDD can be used not only for the qualtatve analyss but also for the quanttatve analyss Top event probablty Consder node F n the TDD, F = fre(x, f 1, f 0, f 1 f 0 ). The structure functon (x) was expressed n (12),.e. ( x) xf1 xf0 f1 f0. Usng the pvotal decomposton to the structure functon of order n t s possble to express t n terms of structure functons that are of order n-1. Pvotng (x) about varable x and applyng the absorpton law gves: f1 f1 f0 x f0 f1 f0 xf1 x 0 ( x) x(1, x) x(0, x) x f. (44) Then the expectaton of (x) s obtaned and the top event probablty s calculated: Q SYS where q x s the falure probablty of component x. x q Q f ) 1 q Q( ) E. (45) x ( 1 x f0 Therefore, the probablty of the top event, Q SYS, s the sum of the probabltes of the dsjont paths through the TDD. The dsjont paths, that are taken nto account, can be found by tracng all paths from the root vertex va the 1 and 0 branches to termnal 1 vertces. The dsjont paths va the C branch are not ncluded n the quantfcaton process.
19 If f 1 f 0 = NIL, ( x) xf1 xf0 whch allows to calculate the Q SYS n the same way Brnbaum s measure of mportance The probablty that component s crtcal to system falure can be expressed as the probablty that component s falure crtcal, G F (q), or the probablty that component s repar crtcal, G R (q) [15]: F R, G ( q) G ( q) G ( q). (46) Beeson and Andrews [16] showed how to defne Brnbaum s measure of component falure mportance as the probablty that component s falure relevant to the system state gven by G F ( 1 ' ' q) E[ ] E[ ]. (47) where E[ 1] s the probablty that component s ether falure relevant or rrelevant to the state of the system; and E[ '' ] s the probablty that component s rrelevant to the state of the system. Smlarly s defned Brnbaum s measure of component repar mportance: G R ( 0 ' ' q) E[ ] E[ ]. (48) where E[ 0] s the probablty that component s repar falure relevant or rrelevant to the state of the system. It s possble to calculate E[ 1], E[ 1] and E[ 1] from the ternary decson dagram. The procedure for calculatng the falure and repar crtcalty of component s outlned below: 1, C E [ 1] prx ( q) po ( q). x x 0, C E [ 0] prx ( q) po ( q). x x (49) (50)
20 C E [ ' ' ] prx ( q) po ( q). x x (51) where: prx (q) - the probablty of the path secton from the root vertex to node x, 1, po C ( q) - the probablty of the path secton from the 1 branch of node x x to a termnal 1 vertex va 1 or 0 branches of non-termnal nodes, 0, po C ( q) - the probablty of the path secton from the 0 branch of node x x to a termnal 1 vertex va 1 or 0 branches of non-termnal nodes, po C (q) - the probablty of the path secton from the C branch of node x x to a termnal 1 vertex va 1 or 0 branches of non-termnal nodes. Therefore, the falure and repar crtcalty of component usng the TDD are expressed as: F 1, C C G ( q) prx ( q) po ( q) po ( q). x x x R 0, C C G ( q) prx ( q) po ( q) po ( q). x x x (52) (53) These expressons are true for every component that s falure and repar relevant [17]. For the other two cases,.e. when component s ether falure or repar relevant and the C branch s empty, Brnbaum s measure of mportance s expressed n the followng equatons. If component s only falure relevant, then: F 1, C 0, C G ( q) prx ( q) po ( q) po ( q). x x x (54) G R ( q) 0. (55)
21 If component s only repar crtcal, then: G F ( q) 0. (56) R 0, C 1, C G ( q) prx ( q) po ( q) po ( q). x x x (57) Usng the TDD n Fgure 5 and applyng the above equatons, the Brnbaum s measure of mportance can be calculated for all components n the system. For component A: For component B: G G F R A ( q) pc qb pc pb pc, GA q) qb qb pc qbqc F B ( q) pa, ( q) 0 G R B. (. For component C: G F R C ( q) 0, GC ( q) qa. Summarsng, f the quanttatve analyss s requred as well as the qualtatve analyss, the TDD before the mnmsaton can be used for the quantfcaton process. Addtonal calculatons for obtanng the SFBDD are not requred as t s requred n some of the establshed methods. Ths property makes the TDD method an effcent approach for full analyss of non-coherent fault trees 5.6 Effcency comparson between the TDD method and the establshed methods The effcency of the TDD method and the establshed methods for calculatng prme mplcant sets were nvestgated and compared usng a benchmark set of medum szed fault trees for engneerng systems from several ndustres. The performance over 16 example fault trees was obtaned, snce each method may perform well on some fault trees dependent upon the fault tree structure. The performance of each method over a range of test cases s montored. The complexty of the 16 fault trees s ndcated n columns 2, 3 and 4 of Table 1, representng the number of gates, the number of events and the number of prme mplcant sets n ther soluton. Example fault trees were smplfed pror to the converson process, usng the reducton [13] and modularsaton [14] technques. The number of complex and modular events are shown n columns 5 and 6.
22 The number of nodes usng the TDD method, the meta-products BDD method, the ZBDD method and the L-BDD method are presented n columns The number of nodes n the TDD method descrbes the sum of the number of nodes n the TDD before the mnmsaton (whch s also used for the quanttatve analyss) and the number of nodes n the TDD after the mnmsaton. The number of nodes for the second method covers the number of nodes n the SFBDD and the meta-products BDD. For the ZBDD method the sum of the number of nodes n the SFBDD and the number of nodes n the ZBDD s presented. The number of nodes n the L-BDD method contans the sum of the number of nodes n the L-BDD before applyng the mnmsaton, the number of nodes of the addtonal structures after applyng the conjuncton and the number of nodes n the mnmsed L-BDD. Smlarly, the processng tme covers the tme taken to convert example fault trees to BDDs and perform the qualtatve analyss. Results of processng tme are shown n columns of Table 1 for the four methods respectvely. Total number of nodes and processng tme for the four methods are shown n Table 2. As t s shown n Table 2 the TDD method performed as well as the ZBDD method. Both methods out performed the meta-products and L-BDD methods resultng n the smallest fnal BDDs n shortest calculaton tme. The L-BDD method gave the second worst result and the meta-products BDD method requred the longest processng tme snce the sze of the problem ncreased margnally. These results showed that the TDD method provdes an effcent way to represent prme mplcant sets, where hdden sets are obtaned by applyng the conjuncton of the two branches. It also has an ablty to do so only f t s requred, avodng the generaton of a structure that s not needed. Ths s acheved usng the nformaton about the falure/repar relevance of the component whch determnes f the conjuncton of the two branches s performed or not. The fnal advantage of ths technque s the fact that the quanttatve analyss can be also performed usng the TDD before the mnmsaton.
23 6. Conclusons Ths paper presents a new technque whch s developed for applcaton to fndng prme mplcant sets of non-coherent fault trees. Snce the ntroducton of NOT logc to the logc functon expands the calculaton tme and ncreases the sze of the problem, the BDD method can be used as an effcent way for qualtatve and quanttatve analyses of non-coherent fault trees. Ths paper proposes a new alternatve technque that produces a ternary decson dagram, whch allows the calculaton of all prme mplcants drectly. Its effcency s analysed and compared wth the establshed methods - the conventonal algorthm that produces a meta-products BDD, the zero-suppressed BDD method and the labelled BDD method - usng some example fault trees. Effcency analyss ndcates that the new proposed TDD method provdes as good a representaton of prme mplcant sets as other methods and has the advantage of beng sutable for both qualtatve and quanttatve analyses of non-coherent fault trees. References 1 Rauzy, A. New Algorthms for Fault Tree Analyss, Relablty Engneerng and System Safety, 1993, 40, pp Vesely, W.E. A Tme Dependent Methodology for Fault Tree Evaluaton, Nuclear Desgn and Engneerng, 1970, 13, pp Snnamon, R.M. and Andrews, J.D. Improved Effcency n Qualtatve Fault Tree Analyss, Qualty and Relablty Engneerng Internatonal, 1997, 13, pp Snnamon, R.M. and Andrews, J.D. Improved Accuracy n Quanttatve Fault Tree Analyss, Qualty and Relablty Engneerng Internatonal, 1997, 13, pp Andrews, J.D. To Not or Not to Not!!, Proceedngs of the 18th Internatonal System Safety Conference, 2000, pp
24 6 Courdet, O. and Madre, J.-C. A New Method to Compute Prme and Essental Prme Implcants of Boolean Functons, Advanced Research n VLSI and Parallel Systems, 1992, pp Dutut, Y. and Rauzy, A. Exact and Truncated Computatons of Prme Implcants of Coherent and Non-Coherent Fault Trees wth Arala, Relablty Engneerng and System Safety, 1997, 58, pp Rauzy, A. Mathematcal Foundaton of Mnmal Cutsets, IEEE Transactons on Relablty, 2001, 50(4), pp Contn, S. Bnary Decson Dagrams wth Labelled Varables for Non-Coherent Fault Tree Analyss, European Commsson, Jont Research Centre, Sasao, T. Ternary Decson Dagrams and ther Applcatons, Chapter 12, pp , Representatons of Dscrete Functons, Edted by Sasao, T. and Fujta, M. Kluwer Academc Publshers, Bartlett, L.M. and Andrews, J.D. Comparson of Two New Approaches to Varable Orderng for Bnary Decson Dagrams, Qualty and Relablty Engneerng Internatonal, 2001, 17, pp Bartlett, L.M. and Andrews, J.D. Selectng an Orderng Heurstc for the Fault Tree Bnary Decson Dagram Converson Process Usng Neural Networks, IEEE Transactons on Relablty, 2002, 51(3), pp Platz, O. and Olsen, J.V. FAUNET: A Program Package for Evaluaton of Fault Trees and Networks, Research Establshment Rsk Report, No. 348, DK-4000 Rosklde, Denmark, Dutut, Y. and Rauzy, A. A Lnear-Tme Algorthm to Fnd Modules of Fault Trees, IEEE Trans. Relablty, 1996, 45(3), pp Andrews, J.D. and Beeson, S. Brnbaum s Measure of Component Importance for Noncoherent Systems, IEEE Trans. Relablty, 2003, 52(2), pp
25 16 Beeson, S. and Andrews, J.D. Calculatng the Falure Intensty of a Non-coherent Fault Tree Usng the BDD Technque, Qualty and Relablty Engneerng Internatonal, 2004, 20, pp Remenyte-Prescott, R. System Falure Modellng Usng Bnary Decson Dagrams, Doctoral Thess, Loughborough Unversty, 2007
A fault tree analysis strategy using binary decision diagrams
Loughborough Unversty Insttutonal Repostory A fault tree analyss strategy usng bnary decson dagrams Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Addtonal Informaton:
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationFor instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)
Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationCourse Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms
Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationConditional Speculative Decimal Addition*
Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationCircuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)
Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationAssignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.
Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationProgramming in Fortran 90 : 2017/2018
Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationR s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes
SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationOptimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming
Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered
More information2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements
Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More informationComplex System Reliability Evaluation using Support Vector Machine for Incomplete Data-set
Internatonal Journal of Performablty Engneerng, Vol. 7, No. 1, January 2010, pp.32-42. RAMS Consultants Prnted n Inda Complex System Relablty Evaluaton usng Support Vector Machne for Incomplete Data-set
More informationClassifying Acoustic Transient Signals Using Artificial Intelligence
Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)
More informationReliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm
Chnese Journal of Aeronautcs 25 (2012) 925-930 Contents lsts avalable at ScenceDrect Chnese Journal of Aeronautcs journal homepage: www.elsever.com/locate/cja Relablty Analyss of Arcraft Condton Montorng
More informationCHAPTER 2 DECOMPOSITION OF GRAPHS
CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng
More informationNon-Split Restrained Dominating Set of an Interval Graph Using an Algorithm
Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,
More informationEECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science
EECS 730 Introducton to Bonformatcs Sequence Algnment Luke Huan Electrcal Engneerng and Computer Scence http://people.eecs.ku.edu/~huan/ HMM Π s a set of states Transton Probabltes a kl Pr( l 1 k Probablty
More informationHelsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)
Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute
More informationRADIX-10 PARALLEL DECIMAL MULTIPLIER
RADIX-10 PARALLEL DECIMAL MULTIPLIER 1 MRUNALINI E. INGLE & 2 TEJASWINI PANSE 1&2 Electroncs Engneerng, Yeshwantrao Chavan College of Engneerng, Nagpur, Inda E-mal : mrunalngle@gmal.com, tejaswn.deshmukh@gmal.com
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationMeta-heuristics for Multidimensional Knapsack Problems
2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,
More informationAn Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices
Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal
More informationType-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data
Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES
More informationCMPS 10 Introduction to Computer Science Lecture Notes
CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationOn Some Entertaining Applications of the Concept of Set in Computer Science Course
On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationLOOP ANALYSIS. The second systematic technique to determine all currents and voltages in a circuit
LOOP ANALYSS The second systematic technique to determine all currents and voltages in a circuit T S DUAL TO NODE ANALYSS - T FRST DETERMNES ALL CURRENTS N A CRCUT AND THEN T USES OHM S LAW TO COMPUTE
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationHarvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6)
Harvard Unversty CS 101 Fall 2005, Shmon Schocken Assembler Elements of Computng Systems 1 Assembler (Ch. 6) Why care about assemblers? Because Assemblers employ some nfty trcks Assemblers are the frst
More informationChapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward
More informationSupport Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationProper Choice of Data Used for the Estimation of Datum Transformation Parameters
Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and
More informationOutline. Type of Machine Learning. Examples of Application. Unsupervised Learning
Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton
More informationFast Computation of Shortest Path for Visiting Segments in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationAssembler. Building a Modern Computer From First Principles.
Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought
More informationAssembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface.
IDC Herzlya Shmon Schocken Assembler Shmon Schocken Sprng 2005 Elements of Computng Systems 1 Assembler (Ch. 6) Where we are at: Human Thought Abstract desgn Chapters 9, 12 abstract nterface H.L. Language
More informationON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE
Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationMachine Learning: Algorithms and Applications
14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of
More informationGA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks
Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member
More informationThe Shortest Path of Touring Lines given in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More informationUnsupervised Learning
Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and
More informationF Geometric Mean Graphs
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationLecture 5: Multilayer Perceptrons
Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented
More informationMATHEMATICS FORM ONE SCHEME OF WORK 2004
MATHEMATICS FORM ONE SCHEME OF WORK 2004 WEEK TOPICS/SUBTOPICS LEARNING OBJECTIVES LEARNING OUTCOMES VALUES CREATIVE & CRITICAL THINKING 1 WHOLE NUMBER Students wll be able to: GENERICS 1 1.1 Concept of
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationLoop Transformations, Dependences, and Parallelization
Loop Transformatons, Dependences, and Parallelzaton Announcements Mdterm s Frday from 3-4:15 n ths room Today Semester long project Data dependence recap Parallelsm and storage tradeoff Scalar expanson
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationSorting: The Big Picture. The steps of QuickSort. QuickSort Example. QuickSort Example. QuickSort Example. Recursive Quicksort
Sortng: The Bg Pcture Gven n comparable elements n an array, sort them n an ncreasng (or decreasng) order. Smple algorthms: O(n ) Inserton sort Selecton sort Bubble sort Shell sort Fancer algorthms: O(n
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationAnalysis of Continuous Beams in General
Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,
More informationCE 221 Data Structures and Algorithms
CE 1 ata Structures and Algorthms Chapter 4: Trees BST Text: Read Wess, 4.3 Izmr Unversty of Economcs 1 The Search Tree AT Bnary Search Trees An mportant applcaton of bnary trees s n searchng. Let us assume
More informationA Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems
A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty
More informationIntra-Parametric Analysis of a Fuzzy MOLP
Intra-Parametrc Analyss of a Fuzzy MOLP a MIAO-LING WANG a Department of Industral Engneerng and Management a Mnghsn Insttute of Technology and Hsnchu Tawan, ROC b HSIAO-FAN WANG b Insttute of Industral
More informationConstruction of ROBDDs. area. that such graphs, under some conditions, can be easily manipulated.
A Study of Composton Schemes for Mxed Apply/Compose Based Constructon of s A Narayan 1 S P Khatr 1 J Jan 2 M Fujta 2 R K Brayton 1 A Sangovann-Vncentell 1 Abstract Reduced Ordered Bnary Decson Dagrams
More informationSmoothing Spline ANOVA for variable screening
Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory
More informationGSLM Operations Research II Fall 13/14
GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationMultiblock method for database generation in finite element programs
Proc. of the 9th WSEAS Int. Conf. on Mathematcal Methods and Computatonal Technques n Electrcal Engneerng, Arcachon, October 13-15, 2007 53 Multblock method for database generaton n fnte element programs
More information3. CR parameters and Multi-Objective Fitness Function
3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft
More informationSynthesizer 1.0. User s Guide. A Varying Coefficient Meta. nalytic Tool. Z. Krizan Employing Microsoft Excel 2007
Syntheszer 1.0 A Varyng Coeffcent Meta Meta-Analytc nalytc Tool Employng Mcrosoft Excel 007.38.17.5 User s Gude Z. Krzan 009 Table of Contents 1. Introducton and Acknowledgments 3. Operatonal Functons
More informationDijkstra s Single Source Algorithm. All-Pairs Shortest Paths. Dynamic Programming Solution. Performance. Decision Sequence.
All-Pars Shortest Paths Gven an n-vertex drected weghted graph, fnd a shortest path from vertex to vertex for each of the n vertex pars (,). Dstra s Sngle Source Algorthm Use Dstra s algorthm n tmes, once
More information(1) The control processes are too complex to analyze by conventional quantitative techniques.
Chapter 0 Fuzzy Control and Fuzzy Expert Systems The fuzzy logc controller (FLC) s ntroduced n ths chapter. After ntroducng the archtecture of the FLC, we study ts components step by step and suggest a
More informationAn Approach in Coloring Semi-Regular Tilings on the Hyperbolic Plane
An Approach n Colorng Sem-Regular Tlngs on the Hyperbolc Plane Ma Louse Antonette N De Las Peñas, mlp@mathscmathadmueduph Glenn R Lago, glago@yahoocom Math Department, Ateneo de Manla Unversty, Loyola
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationAccounting for the Use of Different Length Scale Factors in x, y and z Directions
1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,
More informationLife Tables (Times) Summary. Sample StatFolio: lifetable times.sgp
Lfe Tables (Tmes) Summary... 1 Data Input... 2 Analyss Summary... 3 Survval Functon... 5 Log Survval Functon... 6 Cumulatve Hazard Functon... 7 Percentles... 7 Group Comparsons... 8 Summary The Lfe Tables
More informationInvestigation of Transformations and Landscapes for Combinatorial Optimization Problems
Investgaton of Transformatons and Landscapes for Combnatoral Optmzaton Problems Abstract - Ths paper deals wth an analyss of transformatons between combnatoral optmzaton problems and proposes an approach
More informationParallel matrix-vector multiplication
Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more
More informationHierarchical clustering for gene expression data analysis
Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally
More information