您当前所在位置: 首页 > 学者
在线提示

恭喜!关注成功

在线提示

确认取消关注该学者?

邀请同行关闭

只需输入对方姓名和电子邮箱,就可以邀请你的同行加入中国科技论文在线。

真实姓名:

电子邮件:

尊敬的

我诚挚的邀请你加入中国科技论文在线,点击

链接,进入网站进行注册。

添加个性化留言

已为您找到该学者21条结果 成果回收站

上传时间

2019年01月20日

【期刊论文】Reliability of interdependent networks with cascading failures Niezawodność współzależnych sieci z uszkodzeniami kaskadowymi

彭锐

Eksploatacja i Niezawodnosc – Maintenance and Reliability,2018,2(2):273-277

2018年04月01日

摘要

The reliability of network systems of various structures has been studied by many researchers. However, most of the works just consider the reliability of a single network system. In practice, different networks may be interdependent such that the failure in one network may result in the failure in another network. The cascading failures have been shown to be catastrophic by some researchers. However, the quantitative evaluation for the reliability of interdependent networks has not been proposed. In this paper, a multi-valued decision diagram based approach is presented to evaluate the reliability of interdependent networks. Illustrative examples are proposed to demonstrate the application of the framework.

reliability,, , networks, cascading failure,, interdependency,, multi-valued decision diagram.,

上传时间

2019年01月20日

【期刊论文】Reliability of Linear Consecutive-k-Out-of-n Systems With Two Change Points

彭锐

IEEE TRANSACTIONS ON RELIABILITY,2018,0(0):0

2018年08月01日

摘要

Linear consecutive-k-out-of-n systems are frequently used to model vacuum systems, telecommunication networks, oil pipeline systems, and the photographing of nuclear accelerators. Substantial research has been devoted to analyzing the reliability of such systems, using many different approaches and assumptions. Nevertheless, existing reliability formulas may not be suitable for all real systems. This paper therefore proposes a nonrecursive closed-form expression for a consecutive-k-out-of-n system that is made up of three types of nonidentical components. The corresponding dynamic survival function and mean time to failure are derived for the suggested system, and numerical experiments are carried out to illustrate its application.

Consecutive-k-out-of-n systems,, mean time to failure (, MTTF), ,, reliability,, survival function.,

上传时间

2019年01月20日

【期刊论文】Defense Resource Allocation Against Sequential Unintentional and Intentional Impacts

彭锐

IEEE TRANSACTIONS ON RELIABILITY,2019,0(0):1-11

2019年01月01日

摘要

This paper studies the defense strategy for a parallel system subject to an unintentional impact and an intentional impact. Existing research assumes that system damage is caused by either natural disasters (unintentional impacts) or strategic attackers (intentional impacts). However, in practice, the defender may encounter diverse scenarios, where these two kinds of impacts can happen in a sequential order.Without knowing the precise occurrence sequence, the defender must allocate its limited resources against two successive impacts. In each contest, the defender can construct redundant elements and protect them from damage, to minimize the expected loss from system destructions. Illustrative examples of the optimal strategy are presented in three cases: first, where the unintentional impact comes first; second, where the intentional impact comes first; and third, where the two impacts come in an uncertain order. Supplemental protection is considered in the model extension, where the defender can allocate additional protection resources to those elements that have survived after the first impact.

Defense strategy,, expected damage,, intentional impact,, system vulnerability,, unintentional impact.,

上传时间

2019年01月20日

【期刊论文】A two-phase preventive maintenance policy considering imperfect repair and postponed replacement

彭锐

European Journal of Operational Research,2019,274(0):966-977

2019年01月01日

摘要

This paper investigates a novel two-phase preventive maintenance policy for a single-component system with an objective of maximizing the revenue generated by the performance-based contracting (PBC). The system undergoes a defective state before failure, and produces signal hinting the condition. The maintenance policy consists of two phases: imperfect maintenance phase followed by postponed replacement phase. In the imperfect maintenance phase, inspection is performed to reveal the defective state, leading to a possible repair. Both the inspection and the repair are imperfect. In the postponed replacement phase, preventive replacement is performed during the upcoming scheduled maintenance window, before which no inspection or repair is executed. The expected net revenue under PBC is maximized via the joint optimization of the inspection interval, number of inspection and preventive replacement interval. We apply the model to a case from a steel converter plant, and the results show that our proposed maintenance policy outperforms some existing maintenance policies in terms of the net revenue.

Keywords: Maintenance Delay time Imperfect repair Postponed replacement Performance-based contract

上传时间

2019年01月20日

【期刊论文】Equilibrium analysis of bitcoin block withholding attack: A generalized model

彭锐

Reliability Engineering and System Safety,2019,185(1):318-328

2019年01月01日

摘要

Block withholding attack is an action where a miner who has found a legal block chooses not to submit it but rather directly abandons it. This attack makes the mining pool lose all bitcoin rewards contained within the block. In this paper, we construct a generalized model where two participants can choose to either cooperate with each other or employ a block withholding attack in the mining pool. To make the model more realistic, we consider both the cost of partial proof of work and the cost of cooperation. We also calculate the reward-per-time instead of profit-per-time to better measure the payoffs of each party. Further, we discuss the case where the payoff function and cost function are directly related to the computational power. The pure strategy and mixed strategy are analyzed respectively and the segmentations of the equilibrium are shown. We demonstrate that increasing the information asymmetry by utilizing information conceal mechanisms could lower the occurrence of the BWH attack. 1. Introduction The concept of Bitcoin was originally proposed by Nakamoto [1], and it is basically known as an open source software and a P2P network constructed on the software. Unlike most existing currencies, Bitcoin does not rely on a specific currency institution for its creation and distribution. Instead, it is generated by a large number of calculations based on a specific algorithm. The Bitcoin economy uses a distributed database of nodes in the entire P2P network to confirm and record all transaction behaviors, and it employs cryptographic design to ensure the security of all aspects of currency circulation. The advantages of this new economy include decentralization, worldwide circulation, exclusive ownership, lower transaction costs, no hidden costs and crossplatform mining. Swan [2] performed a detailed introduction to blockchain, which includes the concepts, features and functionality of Bitcoin and how one can use the blockchain for automated tracking of all digi

Bitcoin Blockchain Block withholding attack Equilibrium analysis Payoff per time Computational power

合作学者

  • 彭锐 邀请

    北京科技大学,北京

    尚未开通主页