Efficient reliability computation of a multi-state flow network with cost constraint
YF Niu, YF Song, XZ Xu, X Zhao - Reliability Engineering & System Safety, 2022 - Elsevier
The reliability and cost integrated performance measure R (d, b) of a multi-state flow
network, defined as the probability of sending a flow of d units from the source to the sink …
network, defined as the probability of sending a flow of d units from the source to the sink …
Unrepairable system with single production unit and n failure-prone identical parallel storage units
Despite the crucial role of product storage played in the operation of real-world systems,
only very few reliability studies have considered this component in the system reliability …
only very few reliability studies have considered this component in the system reliability …
[HTML][HTML] Effective selfish mining defense strategies to improve bitcoin dependability
Selfish mining is a typical malicious attack targeting the blockchain-based bitcoin system, an
emerging crypto asset. Because of the non-incentive compatibility of the bitcoin mining …
emerging crypto asset. Because of the non-incentive compatibility of the bitcoin mining …
Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features
The term" Internet of things (IoT)” refers to a network in which data from all connected
devices may be gathered, analyzed, and modified as per requirements to offer new services …
devices may be gathered, analyzed, and modified as per requirements to offer new services …
A trust-based reliable confident information coverage model of wireless sensor networks for intelligent transportation
Wireless sensor nodes are vulnerable to interference or intrusion, especially in the tunnel
scenario of intelligent transportation, which leads to potential risks to network security and …
scenario of intelligent transportation, which leads to potential risks to network security and …
Allocation and activation of resource constrained shock-exposed components in heterogeneous 1-out-of-n standby system
In real-world mission-critical applications like unmanned aerial vehicles (UAVs), the standby
sparing design method is typically applied to enhance the mission success probability …
sparing design method is typically applied to enhance the mission success probability …
Joint Optimization of Multiuser Computation Offloading and Wireless-Caching Resource Allocation With Linearly Related Requests in Vehicular Edge Computing …
L Liu, Z Chen - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Recently, vehicular edge computing (VEC) has become one of the hottest research fields in
Internet of Vehicles (IoV). It provides certain computing, storage, and caching resources at …
Internet of Vehicles (IoV). It provides certain computing, storage, and caching resources at …
A more accurate and robust binary ring-LWE decryption scheme and its hardware implementation for IoT devices
D Xu, X Wang, Y Hao, Z Zhang, Q Hao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Learning with error (LWE) over the ring based on binary distribution (ring-BinLWE) has
become a potential Internet-of-Things (IoT) confidentiality solution with its anti-quantum …
become a potential Internet-of-Things (IoT) confidentiality solution with its anti-quantum …
Unrepairable system with consecutively used imperfect storage units
Product storage is a crucial component of some engineering or technological systems.
Considering storage in the system reliability analysis has recently attracted research …
Considering storage in the system reliability analysis has recently attracted research …
Optimizing the maximum filling level of perfect storage in system with imperfect production unit
Reliability of production systems with storage has recently attracted lots of research
attentions. While the existing works have assumed certain maximum capacity of the storage …
attentions. While the existing works have assumed certain maximum capacity of the storage …