SIGNATURE-BASED REPRESENTATIONS FOR THE RELIABILITY OF SYSTEMS WITH HETEROGENEOUS COMPONENTS

被引:0
|
作者
Navarro, Jorge [1 ]
Samaniego, Francisco J. [2 ]
Balakrishnan, N. [3 ,4 ]
机构
[1] Univ Murcia, Fac Matemat, E-30100 Murcia, Spain
[2] Univ Calif Davis, Davis, CA 95616 USA
[3] McMaster Univ, Hamilton, ON L8S 4K1, Canada
[4] King Saud Univ, Riyadh 11451, Saudi Arabia
基金
加拿大自然科学与工程研究理事会;
关键词
Coherent system; k-out-of-n system; order statistic; signature; mixture; copula; stochastic order; COHERENT SYSTEMS; ORDER-STATISTICS; LIFETIMES; MIXTURES; BOUNDS;
D O I
暂无
中图分类号
O21 [概率论与数理统计]; C8 [统计学];
学科分类号
020208 ; 070103 ; 0714 ;
摘要
Signature-based representations of the reliability functions of coherent systems with independent and identically distributed component lifetimes have proven very useful in studying the ageing characteristics of such systems and in comparing the performance of different systems under varied criteria. In this paper we consider extensions of these results to systems with heterogeneous components. New representation theorems are established for both the case of components with independent lifetimes and the case of component lifetimes under specific forms of dependence. These representations may be used to compare the performance of systems with homogeneous and heterogeneous components.
引用
收藏
页码:856 / 867
页数:12
相关论文
共 50 条
  • [41] On the Detection Capabilities of Signature-Based Intrusion Detection Systems in the Context of Web Attacks
    Diaz-Verdejo, Jesus
    Munoz-Calle, Javier
    Estepa Alonso, Antonio
    Estepa Alonso, Rafael
    Madinabeitia, German
    APPLIED SCIENCES-BASEL, 2022, 12 (02):
  • [42] Improving Identity Prediction in Signature-based Unimodal Systems Using Soft Biometrics
    Abreu, Marjory
    Fairhurst, Michael
    BIOMETRIC ID MANAGEMENT AND MULTIMODAL COMMUNICATION, PROCEEDINGS, 2009, 5707 : 348 - 356
  • [43] False alarm minimization techniques in signature-based intrusion detection systems: A survey
    Hubballi, Neminath
    Suryanarayanan, Vinoth
    COMPUTER COMMUNICATIONS, 2014, 49 : 1 - 17
  • [44] An efficient signature-based strategy for supporting inexact filtering in information filtering systems
    Chang, Ye-In
    Huang, Lee-Wen
    Shen, Jun-Hong
    Wang, Yi-Siang
    EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (04) : 8431 - 8442
  • [45] Survival Signature-Based Structural Importance Analysis of Multistate System with Binary-State Components
    Mutar, Emad Kareem
    Hassan, Zahir Abdul Haddi
    ASCE-ASME Journal of Risk and Uncertainty in Engineering Systems, Part B: Mechanical Engineering, 2025, 11 (02):
  • [46] Signature-based Algorithms to Compute Grobner Bases
    Eder, Christian
    Perry, John
    ISSAC 2011: PROCEEDINGS OF THE 36TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND ALGEBRAIC COMPUTATION, 2011, : 99 - 106
  • [47] Discussion of signature-based models of preventive maintenance
    Suarez-Llorens, Alfonso
    APPLIED STOCHASTIC MODELS IN BUSINESS AND INDUSTRY, 2023, 39 (01) : 59 - 61
  • [48] Signature-Based Secure Trajectory Similarity Search
    Teng, Yiping
    Shi, Zhan
    Zhao, Fanyou
    Ding, Guohui
    Xu, Li
    Fan, Chunlong
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 196 - 206
  • [49] Signature-Based Witness Encryption with Compact Ciphertext
    Avitabile, Gennaro
    Doettling, Nico
    Magri, Bernardo
    Sakkas, Christos
    Wohnig, Stella
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT I, 2025, 15484 : 3 - 31
  • [50] Generalization of proxy signature-based on discrete logarithms
    Li, LH
    Tzeng, SF
    Hwang, MS
    COMPUTERS & SECURITY, 2003, 22 (03) : 245 - 255