您当前所在位置: 首页 > 学者
为您找到 21 条相关结果
按相关度
  • 按相关度
  • 按时间
  • 按阅读量
  • 代表性成果优先

上传时间

2017年08月04日

  • 74浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 0下载

  • 0评论

  • 引用

上传时间

2017年08月04日

  • 50浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 0下载

  • 0评论

  • 引用

上传时间

2017年08月04日

  • 37浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 0下载

  • 0评论

  • 引用

上传时间

2017年08月04日

  • 34浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 0下载

  • 0评论

  • 引用

上传时间

2017年08月04日

  • 33浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 0下载

  • 0评论

  • 引用

上传时间

2017年08月04日

  • 14浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 0下载

  • 0评论

  • 引用

上传时间

2017年08月04日

  • 29浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 0下载

  • 0评论

  • 引用

上传时间

2017年08月04日

【期刊论文】考虑两种故障模式的最佳维修策略

彭锐

,-0001,():

摘要

暂无

关键词:

  • 16浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 0下载

  • 0评论

  • 引用

上传时间

2017年08月04日

  • 26浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 0下载

  • 0评论

  • 引用

上传时间

2013年12月10日

  • 31浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 157下载

  • 0评论

  • 引用

上传时间

2013年12月10日

  • 28浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 501下载

  • 0评论

  • 引用

上传时间

2013年12月10日

  • 16浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 125下载

  • 0评论

  • 引用

上传时间

2013年12月10日

  • 27浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 104下载

  • 0评论

  • 引用

上传时间

2013年12月10日

  • 18浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 82下载

  • 0评论

  • 引用

上传时间

2013年12月10日

  • 10浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 32下载

  • 0评论

  • 引用

上传时间

2019年01月20日

【期刊论文】无人驾驶飞机的任务终止和路线安排联合优化

彭锐

Reliability Engineering & System Safety,2018,177(1):131-137

2018年05月01日

摘要

This paper incorporates the abort policy into the routing problem of unmanned aerial vehicles (UAV). In order to serve a number of targets, some UAVs can be deployed each visiting part of the targets. Different from other works on routing of UAVs, it is assumed that each UAV may experience shocks during the travel. In order to reduce the expected cost of UAV destruction, it is allowed that a UAV aborts the mission if it is found to have undergone too many shocks after it finishes serving a certain number of targets. The optimal routing plan together with the abort policy for each UAV are studied, with the objective to minimize the total cost consisting of the expected cost of UAV destruction and the expected cost for unvisited targets. Test case is used to illustrate the application of the framework.

关键词: Unmanned aerial vehicle Optimization Tabu search Routing Mission abort policy Shocks

  • 32浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 0下载

  • 0评论

  • 引用

上传时间

2019年01月20日

【期刊论文】Equilibrium analysis of bitcoin block withholding attack: A generalized model

彭锐

Reliability Engineering and System Safety,2019,185(1):318-328

2019年01月01日

摘要

Block withholding attack is an action where a miner who has found a legal block chooses not to submit it but rather directly abandons it. This attack makes the mining pool lose all bitcoin rewards contained within the block. In this paper, we construct a generalized model where two participants can choose to either cooperate with each other or employ a block withholding attack in the mining pool. To make the model more realistic, we consider both the cost of partial proof of work and the cost of cooperation. We also calculate the reward-per-time instead of profit-per-time to better measure the payoffs of each party. Further, we discuss the case where the payoff function and cost function are directly related to the computational power. The pure strategy and mixed strategy are analyzed respectively and the segmentations of the equilibrium are shown. We demonstrate that increasing the information asymmetry by utilizing information conceal mechanisms could lower the occurrence of the BWH attack. 1. Introduction The concept of Bitcoin was originally proposed by Nakamoto [1], and it is basically known as an open source software and a P2P network constructed on the software. Unlike most existing currencies, Bitcoin does not rely on a specific currency institution for its creation and distribution. Instead, it is generated by a large number of calculations based on a specific algorithm. The Bitcoin economy uses a distributed database of nodes in the entire P2P network to confirm and record all transaction behaviors, and it employs cryptographic design to ensure the security of all aspects of currency circulation. The advantages of this new economy include decentralization, worldwide circulation, exclusive ownership, lower transaction costs, no hidden costs and crossplatform mining. Swan [2] performed a detailed introduction to blockchain, which includes the concepts, features and functionality of Bitcoin and how one can use the blockchain for automated tracking of all digi

关键词: Bitcoin Blockchain Block withholding attack Equilibrium analysis Payoff per time Computational power

  • 74浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 0下载

  • 0评论

  • 引用

上传时间

2019年01月20日

【期刊论文】A two-phase preventive maintenance policy considering imperfect repair and postponed replacement

彭锐

European Journal of Operational Research,2019,274(0):966-977

2019年01月01日

摘要

This paper investigates a novel two-phase preventive maintenance policy for a single-component system with an objective of maximizing the revenue generated by the performance-based contracting (PBC). The system undergoes a defective state before failure, and produces signal hinting the condition. The maintenance policy consists of two phases: imperfect maintenance phase followed by postponed replacement phase. In the imperfect maintenance phase, inspection is performed to reveal the defective state, leading to a possible repair. Both the inspection and the repair are imperfect. In the postponed replacement phase, preventive replacement is performed during the upcoming scheduled maintenance window, before which no inspection or repair is executed. The expected net revenue under PBC is maximized via the joint optimization of the inspection interval, number of inspection and preventive replacement interval. We apply the model to a case from a steel converter plant, and the results show that our proposed maintenance policy outperforms some existing maintenance policies in terms of the net revenue.

关键词: Keywords: Maintenance Delay time Imperfect repair Postponed replacement Performance-based contract

  • 164浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 0下载

  • 0评论

  • 引用

上传时间

2019年01月20日

【期刊论文】Defense Resource Allocation Against Sequential Unintentional and Intentional Impacts

彭锐

IEEE TRANSACTIONS ON RELIABILITY,2019,0(0):1-11

2019年01月01日

摘要

This paper studies the defense strategy for a parallel system subject to an unintentional impact and an intentional impact. Existing research assumes that system damage is caused by either natural disasters (unintentional impacts) or strategic attackers (intentional impacts). However, in practice, the defender may encounter diverse scenarios, where these two kinds of impacts can happen in a sequential order.Without knowing the precise occurrence sequence, the defender must allocate its limited resources against two successive impacts. In each contest, the defender can construct redundant elements and protect them from damage, to minimize the expected loss from system destructions. Illustrative examples of the optimal strategy are presented in three cases: first, where the unintentional impact comes first; second, where the intentional impact comes first; and third, where the two impacts come in an uncertain order. Supplemental protection is considered in the model extension, where the defender can allocate additional protection resources to those elements that have survived after the first impact.

关键词: Defense strategy,, expected damage,, intentional impact,, system vulnerability,, unintentional impact.,

  • 32浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 0下载

  • 0评论

  • 引用

上传时间

2019年01月20日

【期刊论文】Reliability of Linear Consecutive-k-Out-of-n Systems With Two Change Points

彭锐

IEEE TRANSACTIONS ON RELIABILITY,2018,0(0):0

2018年08月01日

摘要

Linear consecutive-k-out-of-n systems are frequently used to model vacuum systems, telecommunication networks, oil pipeline systems, and the photographing of nuclear accelerators. Substantial research has been devoted to analyzing the reliability of such systems, using many different approaches and assumptions. Nevertheless, existing reliability formulas may not be suitable for all real systems. This paper therefore proposes a nonrecursive closed-form expression for a consecutive-k-out-of-n system that is made up of three types of nonidentical components. The corresponding dynamic survival function and mean time to failure are derived for the suggested system, and numerical experiments are carried out to illustrate its application.

关键词: Consecutive-k-out-of-n systems,, mean time to failure (, MTTF), ,, reliability,, survival function.,

  • 56浏览

  • 0点赞

  • 0收藏

  • 0分享

  • 0下载

  • 0评论

  • 引用