On signature-based expressions of system reliability

被引:35
|
作者
Marichal, Jean-Luc [1 ]
Mathonet, Pierre [1 ]
Waldhauser, Tamas [1 ,2 ]
机构
[1] Univ Luxembourg, Math Res Unit, FSTC, L-1359 Luxembourg, Luxembourg
[2] Univ Szeged, Bolyai Inst, H-6720 Szeged, Hungary
关键词
System signature; System reliability; Coherent system; Order statistic; COHERENT SYSTEMS; LATTICE POLYNOMIALS; COMPONENTS;
D O I
10.1016/j.jmva.2011.05.007
中图分类号
O21 [概率论与数理统计]; C8 [统计学];
学科分类号
020208 ; 070103 ; 0714 ;
摘要
The concept of signature was introduced by Samaniego for systems whose components have i.i.d. lifetimes. This concept proved to be useful in the analysis of theoretical behaviors of systems. In particular, it provides an interesting signature-based representation of the system reliability in terms of reliabilities of k-out-of-n systems. In the non-i.i.d. case, we show that, at any time, this representation still holds true for every coherent system if and only if the component states are exchangeable. We also discuss conditions for obtaining an alternative representation of the system reliability in which the signature is replaced by its non-i.i.d. extension. Finally, we discuss conditions for the system reliability to have both representations. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:1410 / 1416
页数:7
相关论文
共 50 条
  • [41] Discussion of signature-based models of preventive maintenance
    Suarez-Llorens, Alfonso
    APPLIED STOCHASTIC MODELS IN BUSINESS AND INDUSTRY, 2023, 39 (01) : 59 - 61
  • [42] Signature-Based Secure Trajectory Similarity Search
    Teng, Yiping
    Shi, Zhan
    Zhao, Fanyou
    Ding, Guohui
    Xu, Li
    Fan, Chunlong
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 196 - 206
  • [43] Signature-Based Witness Encryption with Compact Ciphertext
    Avitabile, Gennaro
    Doettling, Nico
    Magri, Bernardo
    Sakkas, Christos
    Wohnig, Stella
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT I, 2025, 15484 : 3 - 31
  • [44] Generalization of proxy signature-based on discrete logarithms
    Li, LH
    Tzeng, SF
    Hwang, MS
    COMPUTERS & SECURITY, 2003, 22 (03) : 245 - 255
  • [45] Multiresolution signature-based SAR target detection
    McClure, M
    Bharadwaj, P
    Carin, L
    ALGORITHMS FOR SYNTHETIC APERTURE RADAR IMAGERY V, 1998, 3370 : 318 - 329
  • [46] A Fuzzy Signature-Based Approach for Recommendation Systems
    Aliberti, Luca
    D'Aniello, Giuseppe
    Gaeta, Matteo
    Marzolo, Alice
    2024 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, FUZZ-IEEE 2024, 2024,
  • [47] A Signature-Based Power Model for MPSoC on FPGA
    Piscitelli, Roberta
    Pimentel, Andy D.
    VLSI DESIGN, 2012, 2012
  • [48] A Real-Time Kinect Signature-Based Patient Home Monitoring System
    Blumrosen, Gaddi
    Miron, Yael
    Intrator, Nathan
    Plotnik, Meir
    SENSORS, 2016, 16 (11):
  • [49] FIXIDS: A High-Speed Signature-based Flow Intrusion Detection System
    Erlacher, Felix
    Dressler, Falko
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [50] LimonDroid: a system coupling three signature-based schemes for profiling Android malware
    Franklin Tchakounté
    Roger Corneille Ndjeumou Ngassi
    Vivient Corneille Kamla
    Kalum Priyanath Udagepola
    Iran Journal of Computer Science, 2021, 4 (2) : 95 - 114