Analysis of Non-coherent Fault Trees Using Ternary Decision Diagrams

Size: px
Start display at page:

Download "Analysis of Non-coherent Fault Trees Using Ternary Decision Diagrams"

Transcription

1 Analyss of Non-coherent Fault Trees Usng Ternary Decson Dagrams Rasa Remenyte-Prescott Dep. of Aeronautcal and Automotve Engneerng Loughborough Unversty, Loughborough, LE11 3TU, England John Andrews Dep. of Aeronautcal and Automotve Engneerng Loughborough Unversty, Loughborough, LE11 3TU, England Abstract Rsk and safety assessments performed on potentally hazardous ndustral systems commonly utlse Fault Tree Analyss (FTA) to forecast the probablty of system falure. The type of logc for the top event s usually lmted to AND and OR gates whch leads to a coherent fault tree structure. In non-coherent fault trees components workng states as well as components falures contrbute to the falure of the system. The qualtatve and quanttatve analyses of non-coherent fault trees can ntroduce further dffcultes over and above those seen n the coherent case. It s shown that the Bnary Decson Dagram (BDD) method can be used for ths type of assessment. The BDD approach can mprove the accuracy and effcency of the quanttatve analyss of non-coherent fault trees. Ths artcle demonstrates the value of the Ternary Decson Dagram method (TDD) for the qualtatve analyss of non-coherent fault trees. Such analyss can be used to provde nformaton to a decson makng process for future actons of an autonomous system and therefore t must be performed n real tme. In these crcumstances fast processng and small storage requrements are very mportant. The TDD method provdes a fast processng capablty and small storage s acheved when a sngle structure s used for both qualtatve and quanttatve analyses. The effcency of the TDD

2 method s dscussed and compared to the performance of the establshed methods for analyss of non-coherent fault trees. Keywords: fault tree analyss, bnary decson dagrams, non-coherent fault trees, ternary decson dagrams 1. Introducton Fault Tree Analyss (FTA) was frst ntroduced n the 1960s and t s commonly used for the relablty assessment of complex ndustral systems. Causes of system falure are analysed by performng qualtatve and quanttatve analyses. A large number of combnatons of events whch can cause system falure may be produced for real systems (mnmal cut sets/prme mplcant sets) and the calculaton of these falure combnatons can be tme-consumng. Also, the determnaton of the exact top event probablty requres lengthy calculatons. For real systems ths demand may exceed the capablty of the avalable computers, ntroducng approxmatons nto the analyss wth the resultng loss of accuracy. The Bnary Decson Dagram (BDD) method [1] provdes a more concse form for the logc functon of a fault tree. It overcomes some dsadvantages of conventonal FTA technques and provdes an effcent and exact analyss of coherent and non-coherent fault trees. The BDD method s effcent for quantfyng the lkelhood of system falure occurrence because t does not requre system falure modes as an ntermedate step. It s also more accurate snce approxmatons used n the tradtonal approach of knetc tree theory [2] are not appled. Prevous work on the effcency and the accuracy of the BDD method s presented n [3, 4]. Instead of analysng the fault tree drectly, the BDD method frst converts the fault tree to a bnary decson dagram, whch encodes the Boolean equaton for the top event. The resultng structure functon BDD (SFBDD) can be used n the quanttatve analyss to calculate the top event probablty

3 or frequency. An SFBDD s not of the correct form for the qualtatve analyss and further processng s requred. In the coherent case a lst of mnmal cut sets s obtaned by usng the mnmsaton technque [1]. In the non-coherent case a full set of prme mplcants s determned by applyng the consensus theorem [5] to pars of prme mplcant sets nvolvng a normal and negated lteral. There are several methods for the calculaton of prme mplcant sets proposed n the lterature. A metaproducts BDD method, the frst approach to ths problem, was presented n [6] and further developed n [7]. It was followed by a zero-suppressed BDD method (ZBDD), presented n [8]. The thrd alternatve method was developed n [9] and t uses a labelled bnary decson dagram (L-BDD). These methods produce prme mplcant sets and have ther advantages and dsadvantages n the converson and representaton technques. A new alternatve method for performng the qualtatve analyss of non-coherent fault trees s proposed n ths paper. In ths approach a fault tree s converted to a ternary decson dagram (TDD). The man concept of a TDD was presented n [10], whch s expanded nto an mplementaton methodology for fault tree analyss n ths paper. Every node n a TDD has three branches: the 1 branch whch represents the falure relevance of the component, the 0 branch whch represents the repar relevance of the component (so far ths s a conventonal BDD presentaton) and the consensus branch whch represents the rrelevance of the component to the system falure. A TDD encodes all prme mplcant sets, because the consensus branch for a node s calculated by applyng the consensus theorem whch gves all hdden prme mplcant sets. However, the TDD can be non-mnmal, thus, the mnmsaton process s performed to remove non-mnmal paths from the 1 and 0 branches. The obtaned TDD can be used for the quanttatve analyss as well as the qualtatve analyss. 2. Non-coherent fault trees Fault trees are classfed accordng to ther logc functon. If durng fault tree constructon only AND gates and OR gates are used, the resultng fault tree s defned as coherent. If NOT logc s used or drectly mpled the resultng fault tree can be non-coherent.

4 Introduce each component n the system by an ndcator x to show the status of the component: 1f component s faled, x (1) 0 f component s workng. where = 1,2, n, and n s the number of components n the system. The logc structure of the fault tree can be expressed by a structure functon : 1 f system s faled, (2) 0 f system s workng. = (x), where x = (x 1, x 2,, x n ). Accordng to the requrements of coherency [5], a structure functon (x) s coherent f: 1. Each component s relevant to the system,.e. ( 1, x) (0, x) for some x. (3) 2. (x) s ncreasng (non-decreasng) for each x,.e. where ( 1, x) (0, x). (4) 1, x ) ( x,, x,1, x,, x ), (5) ( n 0, x ) ( x,, x,0, x,, x ). (6) ( n The second condton means that the system condton does not change or deterorates as the component deterorates. If the system s non-coherent for component then for a partcular state of the rest of components the system s faled when component works and when component fals the system s restored to the non-faled condton. As a consequence of ths property, system falure mght occur due to the repar of a faled component or for a faled system the falure of an addtonal

5 component may gve a successful outcome of system performance. The fault tree becomes coherent f the NOT logc can be elmnated from the fault tree structure. Consder a smple example n Fgure 1. Cars A and B are approachng the juncton wth lghts on red and should stop. Car C has the rght of way and should proceed through the juncton. Three basc events are consdered: A Car A fals to stop, B Car B fals to stop, C Car C fals to contnue. The collson at the crossroads can happen n two ways: Car A fals to stop and hts car C whch s movng Car A stops but car B drves nto the back of t. A fault tree representng causes of falure of the collson s shown n Fgure 2. Workng n a bottomup way the followng logc expresson s obtaned. Top A C A B, where + s OR, s AND. Therefore, C A, and B A, are prme mplcants, as combnatons of component condtons (workng or faled) whch are necessary and suffcent to cause system falure. Ths lst s ncomplete because there s on more falure mode for the system: { B, C}.e. f B fals to stop and C contnues across the lghts t does not matter what A does there wll be a collson. Therefore, the full logc expresson for the Top event s:

6 Top A C A B B C, whch can be obtaned by applyng the consensus law: A X A Y A X A Y X Y. 3. Fault tree converson to Bnary Decson Dagram For the fault tree to be converted to a BDD t frst needs to be prepared so that n the non-coherent case the NOT logc s pushed down to the level of basc events by usng De Morgan s laws,.e. A B A B, (7) A B A B. (8) Each node n a SFBDD s defned by an te(f-then-else) structure. The te structure te(x, f 1, f 0 ) means that f x fals then consder functon f 1, else consder functon f 0. So, f 1 les on the 1 branch of x and f 0 les on the 0 branch n the dagram. Before the converson process takes place basc events n the fault tree are ordered. SFBDD constructon then moves through the fault tree n a bottom-up manner applyng the varable orderng n the converson process. Each basc event n the system s assgned an te structure: a = te(a,1,0). (9) Alternatvely, a basc event a s assgned an te structure: a = te(a,0,1). (10) For gates whose nputs have already been defned as an te structure the man rule of the converson process s appled,.e. f J = te(x, f 1, f 0 ) and H = te(y, g 1, g 0 ) represent two nputs to a gate of logc type, then:

7 J H te( x, f te( x, f 1 1 H, f g, f H) f x y n theorderng, g )f x y n theorderng. 0 (11) For small examples the varable orderng s largely rrelevant. Varable orderng schemes are dscussed n [11, 12]. For the fault tree example n Fgure 2 consder the varable orderng scheme A < B < C. Applyng the converson rules (9) - (11) to the fault tree results n a SFBDD presented n Fgure Calculaton of prme mplcant sets Knowledge of prme mplcant sets can be valuable n ganng an understandng of the system and the causes of system falure. It can help to develop a repar schedule for faled components f a system cannot be taken off lne for repar. For systems whose state has all the faled components n any prme mplcant care should be taken to ensure that the repar of other components does not then cause the remanng functonng events n the prme mplcant. The SFBDD whch encodes the structure functon cannot be used drectly to produce the complete lst of prme mplcant sets of a non-coherent fault tree and a converson process s usually performed to produce a dfferent form of a BDD whch encodes only the prme mplcants. Consder a general component x n a non-coherent system. In a prme mplcant set component x can appear n a faled or workng state, or can be excluded from the falure mode. In the frst two stuatons x s sad to be relevant, n the thrd case t s rrelevant to the system state. Component x can be ether falure relevant (the prme mplcant set contans x) or repar relevant (the prme mplcant set contans x ). A general node n the SFBDD, whch represents component x, has two branches. The 1 branch corresponds to the falure of x; therefore, x s ether falure relevant or rrelevant. Smlarly, the 0 branch corresponds to the functonng of x and so x s ether repar relevant or rrelevant. Hence t s mpossble to dstngush between the two cases for each branch and the prme mplcant sets cannot be dentfed drectly from the BDD. Therefore, addtonal methods for encodng prme mplcant sets are requred.

8 5. TDD method An approach to buld a Ternary Decson Dagram (TDD) for the analyss of non-coherent fault trees s proposed n ths secton. It employs the consensus theorem and creates, n addton to the two branches of the BDD, a thrd branch for every node, called the consensus branch. Ths thrd branch encodes the hdden prme mplcant sets. The mnmsaton algorthm [1] s appled to remove non-mnmal paths and obtan prme mplcant sets only. 5.1 Converson Every node n the TDD has three ext branches. A new fre structure s defned whch separates relevant and rrelevant components and also dstngushes between the type of relevancy,.e. falure relevant and repar relevant. The fre structure for a node x s gven n Fgure 4. So, f: = fre(x, f 1, f 0, f 2 ), (12) then = x f 1 + x f 0 + f 2, (13) where f 2 = f 1 f 0. (14) The 1 branch encodes prme mplcant sets for whch component x s falure relevant, the 0 branch encodes prme mplcant sets for whch component x s repar relevant, and the C (consensus) branch encodes prme mplcant sets for whch component x s rrelevant. The fre structure shown n Fgure 4 can be nterpreted as follows: If x s falure relevant then consder f 1, else f x s repar relevant

9 then consder f 0 else consder f 2 endf Functon f 2 encodes prme mplcant sets for whch x s rrelevant, but ths branch s not mportant for all components. For components that are only falure or repar relevant but not both ths branch can be kept empty. In our method we assgn f 2 = NIL, f the conjuncton of the two branches f 1 f 0 s not requred. Whle operatng the new symbol n the Boolean algebra, t s defned that NIL A= NIL. Symbol NIL s used to dentfy cases when the C branch s not requred and no Boolean operatons that nvolve ths branch are needed. The converson technque to compute the TDD from the non-coherent fault tree s an extenson of the method used to develop the conventonal BDD. Frst of all, basc events of the fault tree must be ordered. Then the followng process s presented: By the applcaton of De Morgan s laws push NOT logc down through the fault tree untl the basc event level s reached. Each basc event s assgned an fre structure: o If a s only falure or repar relevant: a = fre(a,1,0,nil), (15) a = fre(a,0,1,nil). (16) o If a s falure and repar relevant: a = fre(a,1,0,0) (17) a = fre(a,0,1,0) (18) Traversng the fault tree n a bottom-up manner and consderng gates whose nputs have been expressed n an fre format gves:

10 If J = fre(x, f 1, f 0, f 2 ) and H = fre(y, g 1, g 0, g 2 ), then fre( x, K1, K0, K1 K0 ) J H fre( x, L1, L0, L1 L0 ) f f x y n theorderng, (19) x y n theorderng. here K 1 f H, K f H 1 L 0 0, 1 f1 g1, L0 f0 g0, K 1 K 0 consensus of K 1 and K 0, L 1 L 0 consensus of L 1 and L 0. If component x s falure or repar relevant, K 1 K 0 = NIL, L 1 L 0 = NIL n equaton 19. Wthn each fre calculaton an addtonal consensus calculaton s performed to ensure all the hdden prme mplcant sets are encoded n the TDD. It calculates the conjuncton of the 1 and the 0 branch of every node and thus dentfes the consensus of each node. If a node n the TDD encodes component whch s only falure or repar relevant the conjuncton of the 1 and 0 branch for the node s not requred, because there are no hdden prme mplcant sets assocated wth ths component. Ths property makes the TDD method an effcent technque for performng the qualtatve analyss of non-coherent fault trees. Consder the fault tree n Fgure 2. Introducng the orderng of basc events A < B < C and applyng the rules descrbed n (15)-(19) gves the TDD n Fgure 5. It can be seen that the TDD n Fgure 5 s dfferent from the SFBDD n Fgure 3 only wth ts C branch that represents the ntersecton of the 1 and 0 branches. Only for node F1 there s a new structure F4 created as the C branch. The other nodes have the C branch leadng to value NIL, snce they encode varables that only appear as falure or repar relevant. To obtan prme mplcant sets non-mnmal combnatons from every path need to be removed.

11 5.2 Mnmsaton Once a fault tree s converted to a TDD there s no guarantee that the resultng structure wll be mnmal and gve exact prme mplcant sets. In order to perform the qualtatve analyss a mnmsaton procedure needs to be mplemented. The algorthm developed by Rauzy for mnmsng the BDD [1] was extended to create a mnmal TDD. Consder a general node n the TDD whch s represented by the functon F, where F = fre(x, G, H, K). (20) The process of mnmsaton s descrbed n three cases: 1. Component x s falure and repar relevant 2. Component x s falure relevant 3. Component x s repar relevant In case 1, the set of all mnmal solutons of F s mnmal solutons of G and H (G mn and H mn ), that are not mnmal solutons of K, and also all mnmal solutons of K (K mn ). Then f δ s a set of mnmal solutons of G, whch are not a mnmal soluton of K, then the ntersecton of δ and x ( x ) wll be mnmal solutons of F. Smlarly, let γ be a set of mnmal solutons of H whch are not mnmal solutons of K, then the ntersecton of γ and x ( x ) wll be mnmal solutons of F. The set of all the mnmal solutons of F (sol mn (F)) wll also nclude the mnmal solutons of K, so: sol mn (F) = ( x) ( x) K. (21) The set sol mn (F) represents the mnmal solutons of F by removng any mnmal solutons of G and H that are also mnmal solutons of K. mn

12 In case 2, where x s falure relevant, K = NIL and the calculaton of prme mplcant sets s equvalent adequate to the BDD case where the C branch does not exst,.e. sol mn (F) = ( x) H. (22) The set sol mn (F) represents the mnmal solutons of F by removng any mnmal solutons of G that are also mnmal solutons of H. mn In case 3, where x s repar relevant, K = NIL and the calculaton of prme mplcant sets s defned as: sol mn (F) = ( x) G. (23) The set sol mn (F) represents the mnmal solutons of F by removng any mnmal solutons of H that are also mnmal solutons of G. mn 5.3 Obtanng prme mplcant sets Traversng the TDD n Fgure 5, whch s already n ts mnmal form, from the root vertex to termnal 1 vertces gve all three prme mplcant sets. Agan, the algorthm depends on the relevance of node varable and the value of C branch. 1. If K NIL, traversng the 1 branch of node x results n a faled state of a component n a partcular falure mode. Traversng the 0 branch of node x results n a workng state of a component n a partcular falure mode. Fnally, traversng the C branch of node x does not nclude that component n a partcular falure mode at all. 2. If K = NIL and x s falure relevant, traversng the 1 branch of node x results n a faled state of a component n a partcular falure mode. Traversng the 0 branch of node x does not nclude that component n a partcular falure mode. 3. If K = NIL and x s repar relevant, traversng the 0 branch of node x results n a repared state of a component n a partcular falure mode. Traversng the 1 branch of node x does not nclude that component n a partcular falure mode.

13 The three paths obtaned gve the three prme mplcant sets: F1-F2 { A, C} F1-F3 { A, B} F1-F4-F5 { B, C} Ths method provdes an advanced technque for encodng prme mplcant sets. 5.4 Establshed methods for qualtatve analyss Ths secton presents the exstng methods for convertng non-coherent fault trees to BDDs and obtanng prme mplcant sets. In the later sectons the effcency of all methods, ncludng the TDD method, wll be nvestgated and compared usng some example fault trees Meta-products BDD method Ths method converts a SFBDD to a meta-products BDD whch produces all prme mplcant sets. A meta-products BDD obtaned s n ts mnmal form. The method was developed n [6,7] where two varables are assocated wth every component x. The frst varable, P x, denotes relevancy and the second varable, S x, denotes the type of relevancy,.e. falure or repar relevant. A meta-product, MP(π), s the ntersecton of all the system components accordng to ther relevancy to the system state and π represents the prme mplcant set encoded n meta-product MP(π): Px MP( ) Px Px S x f x, S x f x, f nether x nor x belongs to. (24) Consder node F n a SFBDD, where F = te(x, F1, F0). The meta-products BDD, that descrbes prme mplcant sets usng equaton (20), s expressed as: PI(F) = te(p x, te(s x, P1, P0), P2), (25) where

14 P2 = PI(F1 F0), P1 = PI(F1) P 2, P0 = PI(F0) P 2. x s the frst element n the varable orderng, PI(F) represents the structure of a meta-products BDD, PI s used to denote the prme mplcants. P2 encodes the prme mplcants for whch x s rrelevant, P1 encodes the prme mplcants for whch x s falure relevant and P0 encodes the prme mplcants for whch x s repar relevant. (26) (27) (28) The SFBDD n Fgure 3 has been converted to a meta-products BDD, shown n Fgure 6. Now t s possble to obtan the meta-products and dentfy the prme mplcant sets. Every path from the root node to a termnal 1 gves a prme mplcant set. P A S A PB PC SC { A, C} P A S A PB SB PC { A, B} P A PB SB PC SC { B, C} The number of nodes n a meta-products BDD ncreases largely snce every basc event x s presented by two nodes, P x and S x. The process can be tme-consumng ZBDD method An alternatve method presented by Rauzy n [8] uses the dea of zero-suppressed BDDs (ZBDD). Ths method requres to label nodes wth faled and/or workng states of basc events and to decompose prme mplcant sets accordng to the presence of a gven state of a basc event. Zerosuppressed BDDs are BDDs based on a reducton rule. Ths data structure provdes a unque and compact representaton whch s more effcent and smpler than the usual BDDs when manpulatng sets n combnatoral problems.

15 The prncple of ths algorthm s to traverse the SFBDD that encodes structure functon n a depthfrst way and to buld a ZBDD that encodes the prme mplcant sets of n a bottom-up way. The converson rule s dvded n four cases. Consder node F n a SFBDD, where F = te(x, F1, F0). Case 1: f basc event x appears n ts faled and workng states then: where PI(F) = xp1 xp0 P2, (29) P2 = PI(F1 F0), (30) P1 = PI(F1) \ P2, (31) P0 = PI(F0) \ P2. (32) Here \ s operator wthout [1] that s used mnmsng conventonal BDDs. Case 2: f basc event x appears n ts faled state only then where PI(F) = xp1 P0, (33) P0 = PI(F0), (34) P1 = PI(F1) \ P0. (35) Case 3: f basc event x appears n ts workng state only then t s consdered n a smlar way to case 2. Case 4: f basc event x does not appear n the system then PI(F) = PI(F1 + F0). (36) Applyng ths method to the SFBDD n Fgure 3 gves the ZBDD n Fgure 7. Every path from the root vertex to termnal vertex 1 presents a prme mplcant set. Therefore, ths ZBDD contans three prme mplcant sets: A C { A, C} A B { A, B}

16 B C { B, C} The ZBDD s an effcent technque where all prme mplcant sets are descrbed by a compact and easy handlng structure Labelled varable method The labelled varable method [9] provdes another alternatve method for constructng BDDs for noncoherent fault trees. BDDs constructed usng ths approach consst of varables that are labelled accordng to ther type. They are called labelled bnary decson dagrams (L-BDDs). The structure functon (x) of a non-coherent fault tree may contan three dfferent types of basc events. For example, the functon ( x) a b a c b c contans a double form (DF) varable a that appears n both states, a sngle form postve (SFP) varable b and a sngle form negatve (SFN) varable c. In the further presentaton the SFP varable x wll be smply presented by x, the SFN varable x wll be labelled as $x and the DF varable x wll be labelled as &x. The converson process for computng the L-BDD from the non-coherent fault tree s an extenson to the method used to develop the SFBDD. Consderng the orderng &x < x < $x mplements the addtonal equatons: If J = te(x, f 1, f 0 ) and H = te($x, g 1, g 0 ), then J H te (& x, f1 g0, f0 g1) If J = te(&x, f 1, f 0 ) and H = te(x, g 1, g 0 ), then J H te (& x, f1 g1, f0 g0) If J = te(&x, f 1, f 0 ) and H = te($x, g 1, g 0 ), Then J H te (& x, f1 g0, f0 g1) (37) (38) (39)

17 Applyng the converson rules to the fault tree n Fgure 2 results n a L-BDD presented n Fgure 8 (the top BDD). The L-BDD does not provde all the nformaton for the qualtatve analyss, therefore some addtonal calculatons are performed n order to get all prme mplcant sets. Vstng the L-BDD n the bottom-up way the procedure to be appled to the node F = te(x, F1, F0) to determne the prme mplcants s as follows: If x has label &, then: PI( F) xp1 $ xp0 P2 (40) where P2 F1 F0, P1 F1\ P2, P0 F0 \ P2. (41) Else: PI( F) P1 F0 (42) where x or $ x, P1 F1\ F0. (43) \ s the operator wthout proposed by Rauzy [1]. Some extra rules are appled n the cases wth labelled varables. The heavest operaton s the ntersecton P2 = F1 F0, shown n Fgure 8, the bottom BDD. The three prme mplcant sets are obtaned, tracng all paths from root vertex to termnal vertex 1 and takng nto account the results of ntersecton: & A $ C { A, C} & A B { A, B} B $ C { B, C}

18 The L-BDD method uses the pror nformaton about the type of every varable, however, the labellng ntroduces some addtonal varables and ncreases the sze of the structure. The three establshed methods for the calculaton of prme mplcant sets wll be consdered for the effcency test of the TDD method. 5.5 Quanttatve analyss usng TDDs In order to perform the quanttatve analyss for non-coherent fault trees usng the BDD method, a non-coherent fault tree s converted to a SFBDD that represents the structure functon of the fault tree. In the TDD method the non-coherent fault tree s converted to the TDD that has three branches from each node. The thrd branch s created to encode all prme mplcants of the system. However, the TDD can be used not only for the qualtatve analyss but also for the quanttatve analyss Top event probablty Consder node F n the TDD, F = fre(x, f 1, f 0, f 1 f 0 ). The structure functon (x) was expressed n (12),.e. ( x) xf1 xf0 f1 f0. Usng the pvotal decomposton to the structure functon of order n t s possble to express t n terms of structure functons that are of order n-1. Pvotng (x) about varable x and applyng the absorpton law gves: f1 f1 f0 x f0 f1 f0 xf1 x 0 ( x) x(1, x) x(0, x) x f. (44) Then the expectaton of (x) s obtaned and the top event probablty s calculated: Q SYS where q x s the falure probablty of component x. x q Q f ) 1 q Q( ) E. (45) x ( 1 x f0 Therefore, the probablty of the top event, Q SYS, s the sum of the probabltes of the dsjont paths through the TDD. The dsjont paths, that are taken nto account, can be found by tracng all paths from the root vertex va the 1 and 0 branches to termnal 1 vertces. The dsjont paths va the C branch are not ncluded n the quantfcaton process.

19 If f 1 f 0 = NIL, ( x) xf1 xf0 whch allows to calculate the Q SYS n the same way Brnbaum s measure of mportance The probablty that component s crtcal to system falure can be expressed as the probablty that component s falure crtcal, G F (q), or the probablty that component s repar crtcal, G R (q) [15]: F R, G ( q) G ( q) G ( q). (46) Beeson and Andrews [16] showed how to defne Brnbaum s measure of component falure mportance as the probablty that component s falure relevant to the system state gven by G F ( 1 ' ' q) E[ ] E[ ]. (47) where E[ 1] s the probablty that component s ether falure relevant or rrelevant to the state of the system; and E[ '' ] s the probablty that component s rrelevant to the state of the system. Smlarly s defned Brnbaum s measure of component repar mportance: G R ( 0 ' ' q) E[ ] E[ ]. (48) where E[ 0] s the probablty that component s repar falure relevant or rrelevant to the state of the system. It s possble to calculate E[ 1], E[ 1] and E[ 1] from the ternary decson dagram. The procedure for calculatng the falure and repar crtcalty of component s outlned below: 1, C E [ 1] prx ( q) po ( q). x x 0, C E [ 0] prx ( q) po ( q). x x (49) (50)

20 C E [ ' ' ] prx ( q) po ( q). x x (51) where: prx (q) - the probablty of the path secton from the root vertex to node x, 1, po C ( q) - the probablty of the path secton from the 1 branch of node x x to a termnal 1 vertex va 1 or 0 branches of non-termnal nodes, 0, po C ( q) - the probablty of the path secton from the 0 branch of node x x to a termnal 1 vertex va 1 or 0 branches of non-termnal nodes, po C (q) - the probablty of the path secton from the C branch of node x x to a termnal 1 vertex va 1 or 0 branches of non-termnal nodes. Therefore, the falure and repar crtcalty of component usng the TDD are expressed as: F 1, C C G ( q) prx ( q) po ( q) po ( q). x x x R 0, C C G ( q) prx ( q) po ( q) po ( q). x x x (52) (53) These expressons are true for every component that s falure and repar relevant [17]. For the other two cases,.e. when component s ether falure or repar relevant and the C branch s empty, Brnbaum s measure of mportance s expressed n the followng equatons. If component s only falure relevant, then: F 1, C 0, C G ( q) prx ( q) po ( q) po ( q). x x x (54) G R ( q) 0. (55)

21 If component s only repar crtcal, then: G F ( q) 0. (56) R 0, C 1, C G ( q) prx ( q) po ( q) po ( q). x x x (57) Usng the TDD n Fgure 5 and applyng the above equatons, the Brnbaum s measure of mportance can be calculated for all components n the system. For component A: For component B: G G F R A ( q) pc qb pc pb pc, GA q) qb qb pc qbqc F B ( q) pa, ( q) 0 G R B. (. For component C: G F R C ( q) 0, GC ( q) qa. Summarsng, f the quanttatve analyss s requred as well as the qualtatve analyss, the TDD before the mnmsaton can be used for the quantfcaton process. Addtonal calculatons for obtanng the SFBDD are not requred as t s requred n some of the establshed methods. Ths property makes the TDD method an effcent approach for full analyss of non-coherent fault trees 5.6 Effcency comparson between the TDD method and the establshed methods The effcency of the TDD method and the establshed methods for calculatng prme mplcant sets were nvestgated and compared usng a benchmark set of medum szed fault trees for engneerng systems from several ndustres. The performance over 16 example fault trees was obtaned, snce each method may perform well on some fault trees dependent upon the fault tree structure. The performance of each method over a range of test cases s montored. The complexty of the 16 fault trees s ndcated n columns 2, 3 and 4 of Table 1, representng the number of gates, the number of events and the number of prme mplcant sets n ther soluton. Example fault trees were smplfed pror to the converson process, usng the reducton [13] and modularsaton [14] technques. The number of complex and modular events are shown n columns 5 and 6.

22 The number of nodes usng the TDD method, the meta-products BDD method, the ZBDD method and the L-BDD method are presented n columns The number of nodes n the TDD method descrbes the sum of the number of nodes n the TDD before the mnmsaton (whch s also used for the quanttatve analyss) and the number of nodes n the TDD after the mnmsaton. The number of nodes for the second method covers the number of nodes n the SFBDD and the meta-products BDD. For the ZBDD method the sum of the number of nodes n the SFBDD and the number of nodes n the ZBDD s presented. The number of nodes n the L-BDD method contans the sum of the number of nodes n the L-BDD before applyng the mnmsaton, the number of nodes of the addtonal structures after applyng the conjuncton and the number of nodes n the mnmsed L-BDD. Smlarly, the processng tme covers the tme taken to convert example fault trees to BDDs and perform the qualtatve analyss. Results of processng tme are shown n columns of Table 1 for the four methods respectvely. Total number of nodes and processng tme for the four methods are shown n Table 2. As t s shown n Table 2 the TDD method performed as well as the ZBDD method. Both methods out performed the meta-products and L-BDD methods resultng n the smallest fnal BDDs n shortest calculaton tme. The L-BDD method gave the second worst result and the meta-products BDD method requred the longest processng tme snce the sze of the problem ncreased margnally. These results showed that the TDD method provdes an effcent way to represent prme mplcant sets, where hdden sets are obtaned by applyng the conjuncton of the two branches. It also has an ablty to do so only f t s requred, avodng the generaton of a structure that s not needed. Ths s acheved usng the nformaton about the falure/repar relevance of the component whch determnes f the conjuncton of the two branches s performed or not. The fnal advantage of ths technque s the fact that the quanttatve analyss can be also performed usng the TDD before the mnmsaton.

23 6. Conclusons Ths paper presents a new technque whch s developed for applcaton to fndng prme mplcant sets of non-coherent fault trees. Snce the ntroducton of NOT logc to the logc functon expands the calculaton tme and ncreases the sze of the problem, the BDD method can be used as an effcent way for qualtatve and quanttatve analyses of non-coherent fault trees. Ths paper proposes a new alternatve technque that produces a ternary decson dagram, whch allows the calculaton of all prme mplcants drectly. Its effcency s analysed and compared wth the establshed methods - the conventonal algorthm that produces a meta-products BDD, the zero-suppressed BDD method and the labelled BDD method - usng some example fault trees. Effcency analyss ndcates that the new proposed TDD method provdes as good a representaton of prme mplcant sets as other methods and has the advantage of beng sutable for both qualtatve and quanttatve analyses of non-coherent fault trees. References 1 Rauzy, A. New Algorthms for Fault Tree Analyss, Relablty Engneerng and System Safety, 1993, 40, pp Vesely, W.E. A Tme Dependent Methodology for Fault Tree Evaluaton, Nuclear Desgn and Engneerng, 1970, 13, pp Snnamon, R.M. and Andrews, J.D. Improved Effcency n Qualtatve Fault Tree Analyss, Qualty and Relablty Engneerng Internatonal, 1997, 13, pp Snnamon, R.M. and Andrews, J.D. Improved Accuracy n Quanttatve Fault Tree Analyss, Qualty and Relablty Engneerng Internatonal, 1997, 13, pp Andrews, J.D. To Not or Not to Not!!, Proceedngs of the 18th Internatonal System Safety Conference, 2000, pp

24 6 Courdet, O. and Madre, J.-C. A New Method to Compute Prme and Essental Prme Implcants of Boolean Functons, Advanced Research n VLSI and Parallel Systems, 1992, pp Dutut, Y. and Rauzy, A. Exact and Truncated Computatons of Prme Implcants of Coherent and Non-Coherent Fault Trees wth Arala, Relablty Engneerng and System Safety, 1997, 58, pp Rauzy, A. Mathematcal Foundaton of Mnmal Cutsets, IEEE Transactons on Relablty, 2001, 50(4), pp Contn, S. Bnary Decson Dagrams wth Labelled Varables for Non-Coherent Fault Tree Analyss, European Commsson, Jont Research Centre, Sasao, T. Ternary Decson Dagrams and ther Applcatons, Chapter 12, pp , Representatons of Dscrete Functons, Edted by Sasao, T. and Fujta, M. Kluwer Academc Publshers, Bartlett, L.M. and Andrews, J.D. Comparson of Two New Approaches to Varable Orderng for Bnary Decson Dagrams, Qualty and Relablty Engneerng Internatonal, 2001, 17, pp Bartlett, L.M. and Andrews, J.D. Selectng an Orderng Heurstc for the Fault Tree Bnary Decson Dagram Converson Process Usng Neural Networks, IEEE Transactons on Relablty, 2002, 51(3), pp Platz, O. and Olsen, J.V. FAUNET: A Program Package for Evaluaton of Fault Trees and Networks, Research Establshment Rsk Report, No. 348, DK-4000 Rosklde, Denmark, Dutut, Y. and Rauzy, A. A Lnear-Tme Algorthm to Fnd Modules of Fault Trees, IEEE Trans. Relablty, 1996, 45(3), pp Andrews, J.D. and Beeson, S. Brnbaum s Measure of Component Importance for Noncoherent Systems, IEEE Trans. Relablty, 2003, 52(2), pp

25 16 Beeson, S. and Andrews, J.D. Calculatng the Falure Intensty of a Non-coherent Fault Tree Usng the BDD Technque, Qualty and Relablty Engneerng Internatonal, 2004, 20, pp Remenyte-Prescott, R. System Falure Modellng Usng Bnary Decson Dagrams, Doctoral Thess, Loughborough Unversty, 2007

A fault tree analysis strategy using binary decision diagrams

A fault tree analysis strategy using binary decision diagrams Loughborough Unversty Insttutonal Repostory A fault tree analyss strategy usng bnary decson dagrams Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Addtonal Informaton:

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Conditional Speculative Decimal Addition*

Conditional Speculative Decimal Addition* Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Complex System Reliability Evaluation using Support Vector Machine for Incomplete Data-set

Complex System Reliability Evaluation using Support Vector Machine for Incomplete Data-set Internatonal Journal of Performablty Engneerng, Vol. 7, No. 1, January 2010, pp.32-42. RAMS Consultants Prnted n Inda Complex System Relablty Evaluaton usng Support Vector Machne for Incomplete Data-set

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

Reliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm

Reliability Analysis of Aircraft Condition Monitoring Network Using an Enhanced BDD Algorithm Chnese Journal of Aeronautcs 25 (2012) 925-930 Contents lsts avalable at ScenceDrect Chnese Journal of Aeronautcs journal homepage: www.elsever.com/locate/cja Relablty Analyss of Arcraft Condton Montorng

More information

CHAPTER 2 DECOMPOSITION OF GRAPHS

CHAPTER 2 DECOMPOSITION OF GRAPHS CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science EECS 730 Introducton to Bonformatcs Sequence Algnment Luke Huan Electrcal Engneerng and Computer Scence http://people.eecs.ku.edu/~huan/ HMM Π s a set of states Transton Probabltes a kl Pr( l 1 k Probablty

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

RADIX-10 PARALLEL DECIMAL MULTIPLIER

RADIX-10 PARALLEL DECIMAL MULTIPLIER RADIX-10 PARALLEL DECIMAL MULTIPLIER 1 MRUNALINI E. INGLE & 2 TEJASWINI PANSE 1&2 Electroncs Engneerng, Yeshwantrao Chavan College of Engneerng, Nagpur, Inda E-mal : mrunalngle@gmal.com, tejaswn.deshmukh@gmal.com

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

LOOP ANALYSIS. The second systematic technique to determine all currents and voltages in a circuit

LOOP ANALYSIS. The second systematic technique to determine all currents and voltages in a circuit LOOP ANALYSS The second systematic technique to determine all currents and voltages in a circuit T S DUAL TO NODE ANALYSS - T FRST DETERMNES ALL CURRENTS N A CRCUT AND THEN T USES OHM S LAW TO COMPUTE

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6)

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6) Harvard Unversty CS 101 Fall 2005, Shmon Schocken Assembler Elements of Computng Systems 1 Assembler (Ch. 6) Why care about assemblers? Because Assemblers employ some nfty trcks Assemblers are the frst

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

Assembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface.

Assembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface. IDC Herzlya Shmon Schocken Assembler Shmon Schocken Sprng 2005 Elements of Computng Systems 1 Assembler (Ch. 6) Where we are at: Human Thought Abstract desgn Chapters 9, 12 abstract nterface H.L. Language

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

Unsupervised Learning

Unsupervised Learning Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

MATHEMATICS FORM ONE SCHEME OF WORK 2004

MATHEMATICS FORM ONE SCHEME OF WORK 2004 MATHEMATICS FORM ONE SCHEME OF WORK 2004 WEEK TOPICS/SUBTOPICS LEARNING OBJECTIVES LEARNING OUTCOMES VALUES CREATIVE & CRITICAL THINKING 1 WHOLE NUMBER Students wll be able to: GENERICS 1 1.1 Concept of

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Loop Transformations, Dependences, and Parallelization

Loop Transformations, Dependences, and Parallelization Loop Transformatons, Dependences, and Parallelzaton Announcements Mdterm s Frday from 3-4:15 n ths room Today Semester long project Data dependence recap Parallelsm and storage tradeoff Scalar expanson

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Sorting: The Big Picture. The steps of QuickSort. QuickSort Example. QuickSort Example. QuickSort Example. Recursive Quicksort

Sorting: The Big Picture. The steps of QuickSort. QuickSort Example. QuickSort Example. QuickSort Example. Recursive Quicksort Sortng: The Bg Pcture Gven n comparable elements n an array, sort them n an ncreasng (or decreasng) order. Smple algorthms: O(n ) Inserton sort Selecton sort Bubble sort Shell sort Fancer algorthms: O(n

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE 1 ata Structures and Algorthms Chapter 4: Trees BST Text: Read Wess, 4.3 Izmr Unversty of Economcs 1 The Search Tree AT Bnary Search Trees An mportant applcaton of bnary trees s n searchng. Let us assume

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

Intra-Parametric Analysis of a Fuzzy MOLP

Intra-Parametric Analysis of a Fuzzy MOLP Intra-Parametrc Analyss of a Fuzzy MOLP a MIAO-LING WANG a Department of Industral Engneerng and Management a Mnghsn Insttute of Technology and Hsnchu Tawan, ROC b HSIAO-FAN WANG b Insttute of Industral

More information

Construction of ROBDDs. area. that such graphs, under some conditions, can be easily manipulated.

Construction of ROBDDs. area. that such graphs, under some conditions, can be easily manipulated. A Study of Composton Schemes for Mxed Apply/Compose Based Constructon of s A Narayan 1 S P Khatr 1 J Jan 2 M Fujta 2 R K Brayton 1 A Sangovann-Vncentell 1 Abstract Reduced Ordered Bnary Decson Dagrams

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Multiblock method for database generation in finite element programs

Multiblock method for database generation in finite element programs Proc. of the 9th WSEAS Int. Conf. on Mathematcal Methods and Computatonal Technques n Electrcal Engneerng, Arcachon, October 13-15, 2007 53 Multblock method for database generaton n fnte element programs

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

Synthesizer 1.0. User s Guide. A Varying Coefficient Meta. nalytic Tool. Z. Krizan Employing Microsoft Excel 2007

Synthesizer 1.0. User s Guide. A Varying Coefficient Meta. nalytic Tool. Z. Krizan Employing Microsoft Excel 2007 Syntheszer 1.0 A Varyng Coeffcent Meta Meta-Analytc nalytc Tool Employng Mcrosoft Excel 007.38.17.5 User s Gude Z. Krzan 009 Table of Contents 1. Introducton and Acknowledgments 3. Operatonal Functons

More information

Dijkstra s Single Source Algorithm. All-Pairs Shortest Paths. Dynamic Programming Solution. Performance. Decision Sequence.

Dijkstra s Single Source Algorithm. All-Pairs Shortest Paths. Dynamic Programming Solution. Performance. Decision Sequence. All-Pars Shortest Paths Gven an n-vertex drected weghted graph, fnd a shortest path from vertex to vertex for each of the n vertex pars (,). Dstra s Sngle Source Algorthm Use Dstra s algorthm n tmes, once

More information

(1) The control processes are too complex to analyze by conventional quantitative techniques.

(1) The control processes are too complex to analyze by conventional quantitative techniques. Chapter 0 Fuzzy Control and Fuzzy Expert Systems The fuzzy logc controller (FLC) s ntroduced n ths chapter. After ntroducng the archtecture of the FLC, we study ts components step by step and suggest a

More information

An Approach in Coloring Semi-Regular Tilings on the Hyperbolic Plane

An Approach in Coloring Semi-Regular Tilings on the Hyperbolic Plane An Approach n Colorng Sem-Regular Tlngs on the Hyperbolc Plane Ma Louse Antonette N De Las Peñas, mlp@mathscmathadmueduph Glenn R Lago, glago@yahoocom Math Department, Ateneo de Manla Unversty, Loyola

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Accounting for the Use of Different Length Scale Factors in x, y and z Directions

Accounting for the Use of Different Length Scale Factors in x, y and z Directions 1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,

More information

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp Lfe Tables (Tmes) Summary... 1 Data Input... 2 Analyss Summary... 3 Survval Functon... 5 Log Survval Functon... 6 Cumulatve Hazard Functon... 7 Percentles... 7 Group Comparsons... 8 Summary The Lfe Tables

More information

Investigation of Transformations and Landscapes for Combinatorial Optimization Problems

Investigation of Transformations and Landscapes for Combinatorial Optimization Problems Investgaton of Transformatons and Landscapes for Combnatoral Optmzaton Problems Abstract - Ths paper deals wth an analyss of transformatons between combnatoral optmzaton problems and proposes an approach

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Hierarchical clustering for gene expression data analysis

Hierarchical clustering for gene expression data analysis Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally

More information