G.V. Berg

Size: px
Start display at page:

Download "G.V. Berg g.v.berg@student.utwente.nl"

Transcription

1 Monte Carlo sampling of Dynamic Fault Trees for reliability prediction G.V. Berg ABSTRACT In the past few decades the field of reliability engineering has developed several useful techniques to achieve their main objective of being able to systematically analyze systems for reliability and robustness. One important technique is Fault Tree Analysis and over time it has been extended into the more versatile method of Dynamic Fault Tree (DFT) Analysis. With a DFT one can compute the probability of failure during a certain mission time. Calculating this probability of failure can be computationally expensive. In this paper we describe a tool which reduces the computational complexity of calculating the failure probability for a DFT. The tool will compute DFT failure probabilities using Monte Carlo simulation techniques. Keywords Monte Carlo simulation, reliability prediction, dynamic fault tree 1. INTRODUCTION The IEEE Reliability Society defines reliability as: Reliability is a design engineering discipline which applies scientific knowledge to assure a product will perform its intended function for the required duration within a given environment [IRS07]. One aspect of reliability engineering is reliability prediction. NASA, for example, is eager to know the chance of having one failed component in their satellites and how this situation affects other components (and thus the functioning of the satellite as a whole). One established theory for calculating such probabilities (based on known failure rates of individual components) is a technique called Fault Tree Analysis (FTA). The Fault Tree Handbook published by the United States Nuclear Regulatory Commission [VGR+81] has set the basic standard for analyzing the safety of mission critical systems such as nuclear reactors. Since then much progress has been made in making FTs more expressive. In particular, Dugan et al [DBB92] have extended FTs with what are called dynamic gates, which gave rise to the dynamic fault tree formalism. The DFT formalism puts order of occurrence of events into FTs. The most notable implementation for analysing (Dynamic) FTs is Galileo [BSC99]. Galileo attempts to analytically solve DFTs. It does so by trying to calculate the exact reliability value of a DFT using a combination of Markov Chains and Binary Decision Diagrams (BDDs) [And97]. The BDDs are used when the FT contains no dynamic gates. For DFTs Galileo computes the system reliability by solving the underlying Markov Chains. These Markov Chains suffer from state space explosions. A linear increase in DFT size will make the state space of the Markov Chain exponentially greater. For complex DFTs Galileo needs lots of memory and time before it can compute the answer. To counter these state space explosions Monte Carlo sampling techniques are useful. Instead of trying to compute the answer sampling techniques approach the answer in a computationally less expensive way. The main idea is that, when taken enough samples, the answer will be accurate enough (i.e. close to the analytically computed value). To sample system reliabilities several approaches have been tried. Boyd and Bavuso [BB93] used a variation reduction technique called importance sampling. They write: [..] analytical solution techniques are preferable whenever the model is small enough [..] simulation is preferred [..] when the model is too large or exhibits system behaviour too complex to be accommodated by analytical solution techniques. Gedam and Beaudet [GB00] also did work on using sampling techniques in the field of reliability engineering. They used Monte Carlo sampling to solve Reliability Block Diagrams (RBDs). This diagram technique is a combinatorial one. A static FT can be translated in a RBD and vice versa. For DFTs this is not possible. In this paper we describe a tool we have implemented. The tool uses Monte Carlo sampling to compute the reliability of DFTs. It does not use Markov Chains or BDDs. It works directly on the FT. Gedam and Beaudets approach will be shown as being an effective approach. The computational complexity and state space explosion of the traditional Galileo methods are countered by our tool. This will be proven using the results of our case studies. Our cases are based upon the ones Boyd and Bavuso [BB93] used to test their Galileo implementation. 2. BACKGROUND 2.1 Fault trees and dynamic fault trees A Fault Tree (FT) is a Directed Acyclic Graph (DAG) in which the leaves are basic events (BEs) and the other elements are gates. This definition is based on [BCS07]. BEs model component failures whereas the gates model how component failures induce a system failure. Fault Trees have three types of gates: 1. AND gate (Figure 1.a) which fails if all inputs fail 2. OR gate (Figure 1.b) which fails if at least one of its inputs fails. 3. K/M gate, also known as VOTING gate (Figure 1.c) which fails if at least K (the threshold) out of M inputs fails.

2 2.2 Example of a DFT Suppose a cyclist has a unicycle which fails when its tire fails. The cyclist has also brought a spare tire: if a tire fails he can replace the tire with the spare one. After the spare tire is used failure of the tire will bring the system (i.e. the unicycle) down. This situation is modelled by a DFT as shown in Figure 2. unicycle fails sp Figure 1: DFT gates Dynamic Fault Trees (DFTs) are a superset of (Static) Fault Trees 1. They have the ability to also specify ordering in which the BEs occur. DFTs extend SFTs with the following gates 2 1. PAND gate (Figure 1.d) is a Priority AND gate which fails when all its inputs fail from left to right in order. 2. SPARE gate 3 (Figure 1.e) which has one primary input and zero or more spare inputs. All inputs are BEs. When the primary input fails it is replaced by the first available spare input. When that one fails it is replaced by the next available spare input, etc. If the primary and all the spares have failed the SPARE gate fails. 3. FDEP gate (Figure 1.f) is a functional dependency gate which has a trigger event (i.e. a failure) and a set of dependent events [BCS07]. When the trigger event occurs all dependent components become inaccessible or unusable. Dependant events are BEs and are assumed to have failed after the trigger event takes place. An FDEP gate has a dummy output which is not taken into account when calculating the system failure probability. The gates extert influences towards each other depending on their type and they define how failures propagate through the entire system. A reliability engineer can compute the chance of a system failing, during a specified mission time, with a FT and a list of failure rates, for every BE present. This information can be used to support engineering and management decisions, trade-off analysis and risk assessments. Each BE has a failure distribution. This is a statistical distribution and the ones mostly used are the Weibull and the exponential distribution. For static FTs computing the reliability value is straightforward since no ordering of events takes place. This makes the reliabilities solvable by using Binary Decision Diagrams (BDDs). These BDDs are data structures (rooted DAGs) used to represent boolean functions [And97]. For DFTs we need the ordering of events. Computing the system failure of a DFT is done by solving the corresponding Markov Chain. This tends to get difficult since it suffers from state space explosion as the DFT gets bigger. 1 From now on we will use the term Static Fault Trees (SFTs) when referring to FTs without DFT extensions 2 A Sequence Enforcing (SEQ) gate has been defined in [DBB92] but since it is also expressible in terms of SPARE gates we ignored it 3 In most literature ([BCS07],[DBB92]) SPARE inputs are divided into cold, warm and hot SPARE inputs. We will return on this subject later on in section tire fails spare tire fails Figure 2: Unicycle DFT It is also a clear example on how reliability engineers have to make choices on which BEs to include in their FTs and which ones not to include. If the cyclist loses the spare tire he carries on him, the unicycle will fail immediately after the collapse of the first tire (since there would be no spare to replace it with). The DFT in Figure 2 does not take this situation (losing the spare tire, i.e. failure of that BE before the primary) into account. 2.3 Monte Carlo simulation Monte Carlo simulation is a technique which can help us solving DFTs. It is easy to use lots of rounds of random sampling to produce worthwhile results [KW86]. The main components of Monte Carlo sampling are: probability distribution functions (PDF) random number generators (RNG) Example We take the unicycle DFT in figure 3. We assume both tires (i.e. BEs) have the same failure distribution. It is the exponential failure distribution we use. This means that the PDF of the BE is defined as: and the cumulative distribution function (CDF - i.e. the cumulative failure distribution of our tires) is defined as: Both tires have lambda = 2. We use a random number generator (RNG) to select a random number u in the range [0, 1]. We then solve x for CDF(x) = F(x) = u. When applied to a failure distribution we will get x which denotes the time the BE failed. If we do this for lots of random numbers and then compute the average time the BE failed we can compute the Mean Time To Failure (MTTF). A few samples are shown in the table below.

3 Primary tire fails Table 1. Unicycle samples Spare tire fails RNG = u Time t RNG = u Time t We can now approximate the MTTF of the first tire failing. This is the same as the average of the four sampled times. The approximated MTTF of the first tire is For the second tire it is If we had taken more samples the answer would come closer to 0.5. Please note that for exponential distributions the MTTF is 1 / lambda. Which in this case is 1 / 2. To compute the value of the spare gate we need to take one more thing into account. The spare tire cannot fail before the first tire, as we have established in section 2.3. So we have to take the time of the primary tire failing into account. This yields the following PDF definition for the spare input with pfail denoting the time at which the primary tire failed: This PDF describes the failure distribution of the spare tire with parameter lambda at time x under the condition that the primary tire failed at time pfail. We do not have to resample all the values for the spare tire since the inverse PDF just returns the time (denoted by x in the previous equations) at which the component failed. For the spare tire we need to take x + pfail to adjust for the failing of the primary tire. In short, for each row we add the value in column 2 and column 4 together. For each row this value denotes the time at which the spare tire failed (after the primary already being in a failed state). Doing this delivers the following values: Table 2. Sampled values From these values we can compute the approximated MTTF for the spare gate as a whole since the unicycle spare gate fails as soon as the one and only spare fails. This yields an approximated MTTF value for the unicycle DFT of (the mean of the values in the table above). For a example mission time of 0.6 we have got only one sampled value failing before the mission time. Out of four only one sample fails before the mission ends so the sampled unreliability of the unicycle DFT is 1 / 4 = MONTE CARLO SIMULATION OF DYNAMIC FAULT TREES In this section we will describe the method used to sample the reliability of a Dynamic Fault Tree. All the BEs have exponentially failure distributions since our research only focussed on those types of BEs. 3.1Sampling The sampling starts by sampling all the BEs. For each BE we generate a random number r and solve (with the inverse CDF) for F cdf(t) = r as described before in the unicycle example. This yields a list of failure times for all the BEs. We now move on to the propagation of these failure times through the tree. We take the BEs we just sampled and move up the tree according to the arcs coming out of the BEs. We hand these values to the gates. After this we will compute the values of all the gates upon where we will move these values up the tree according to the arcs. This is done until we arrive at the top node at which point we have a sampled failure time of the entire tree. The methodology for calculating the failure time of each gate is described below: 3.1.1AND gate This gate only fails after all its inputs have failed. So the output failure time of an AND gate is equal to the largest failure time of its inputs (or infinity if not all of its inputs fail) OR gate This gate fails after one or more of its inputs have failed. The output failure time of an OR gate is equal to the lowest failure time of its inputs (or infinity if none of its inputs fail) K/M gate The K/M gate, also known as VOTING gate, fails if at least K out of M inputs failed. We take M inputs and sort the failure times ascendingly. The K th value (start counting at 0) of the sorted failure times denotes the time at which the K/M gate fails PAND gate The PAND gate fails if all its inputs from left to right in order have failed. So we take all the inputs of the gate (in order) and check if the values are sorted ascendingly. If they are we return the last value. If they are not we return infinity since the failure of its inputs occurred in another order than specified so the PAND gate will not fail FDEP gate For the FDEP gate things become more complicated. The FDEP gate doesn't propagate failure times up the tree. In other words; it doesn't have any functional output. It exterts its influence from the first input BE towards the rest of the input BEs. As soon as the first input BE fails all the other input BEs have also failed. This means, when propagating, that we have to be careful when we encounter a BE which is also an input for an FDEP gate. Take the following example (depicted in Figure 3): An FDEP gate has failure input BE1 and one other functional dependent input named BE2. BE1 is in the sampling step sampled as failing at time t = 3. BE2 is in the sampling step sampled as failing at time t = 4.

4 Figure 3: FDEP gate In this case we cannot, for BE2, just take the time t=4 as the sampled value and continue propagating. Because of the FDEP gate BE2 fails at the time the input of the FDEP gate also fails. In this case BE1 fails at t = 3 so this means BE2 also fails at t = 3 and not at t = 4. If BE2 would have a sampled failure time t = 2 we would not have to worry about the FDEP dependency since BE2 already fails before the FDEP gate. To incorporate the illustrated behavior above in our methodology we do the following; after the sampling, and before propagating any of the failure times, we check all the FDEP gates present in the system. Since their input events are already sampled we can also track all the dependent BEs for the FDEP gate. If the sampled failure time of the dependent BEs (like our example before) is higher than the one outputted by the FDEP gate we reset the failure time of the BE to the one supplied by the FDEP. Otherwise the initial sampled failure time of the BE stays the same SPARE gate The SPARE gate is the most complicated one. It basically consists of three subtypes, also present in Galileo, namely the Cold Spare (CSP), Warm Spare (WSP) and Hot Spare (HSP) gate. Since we would like to stick to the correct terminology we will talk about SPARE gates here only. The spare input BEs to a spare gate also have a parameter called the dormancy factor. This expresses whether the spare input can even fail before the primary input has failed. The dormancy factor influences the failure rate of the spare input if the primary input has not failed yet. It is denoted by mu. The dormancy factor is a number between 0 and 1 inclusive and is only taken into account when the primary has not failed yet. With pfail denoting the time at which the primary gate failed a spare input's failure distribution becomes: spare inputs with dormancy factors other than 1) equal like an AND gate since its inputs may fail at any time whereas the gate will fail if all of them have failed. Sampling a SPARE gate is easy when there are only CSP and HSP inputs attached. For CSP inputs the process is the same as described in the unicycle example. For HSP inputs the whole gate becomes an AND gate. In other cases our methodology does the following: Take a sample t' from the failure distribution of the spare input and assume it fails before the primary fails (which fails at pfail) Take a sample t'' from the failure distribution of the spare input and assume the primary already failed. Take the sampled time at which the primary fails denoted by pfail. If pfail > t' we assume the primary fails after the spare input so the failure time of the spare gate as a whole becomes pfail + t'. If pfail < t' we assume the primary fails before the spare input so the failure time of the spare gate as a whole becomes pfail + t''. The failure time of the spare gate will be computed as described before and will be propagated up the tree. 3.2Calculating system reliability After all the sampling and propagation has been done we can calculate the system reliability and the mean time to failure (MTTF). Suppose we have calculated N failure times of the top node of the tree. The MTTF is the sum of all the failure times divided by N. To get the system unreliability measure we count the number of failure times in our list which is below our threshold (the mission time). Call this M. The system unreliability is denoted by M divided by N. To get the system reliability (the chance it stays up during the given mission time) we just do 1 unreliability. 3.3Confidence interval The confidence interval is a measurement of the range in which the real system reliability lies based upon all the samples. It is used to determine if an answer is accurate enough. To compute the confidence interval we first need to compute the standard deviation of all the samples we have taken. We first calculate the mean of all the samples: The standard deviation is given by: There are two special cases: The first one is where mu is 0. This means the spare cannot fail before the primary. This is the same as in the unicycle example in section 2. In Galileo this type of gate is also dubbed a CSP gate. The spare itself can also be referred to as being a cold spare. The second one is where mu is 1. This means the spare can fail before the primary but it will do so with effectively the standard failure distribution and not with a changed failure rate. This makes the spare gate (if it doesn't have any other The confidence offset is denoted by: z / n Z is a value we can look up in tables for the normal distribution. According to Moore and McCabe [MM03] we are allowed to assume that for a large enough n the distribution will behave like a normal distribution.

5 3.3.1Example Suppose we take 1000 samples. The standard deviation is equal to 50. The mean of the sampled values is 300. For a confidence of 99.9% the table in Moore and McCage yields as a value for z. This yields a confidence offset of: / 300 = With a confidence of 99% we can now say that the real mean value of the distribution lays between: ( , ) 4.IMPLEMENTATION In this section we will briefly describe our implementation. The tool we have built requires the following input: the DFT in Galileo text format mission time for which we want to calculate the reliability of the DFT number of samples to take As output it will give: Mean Time to Failure of the DFT Unreliability for the inputted mission time 99.9% confidence interval of the unreliability The tool has been implemented in Python. Python was chosen because it's an agile programming language in which one can prototype programs with relative ease. For the sampling we used SciPy which is a python package for scientists in order to do complex scientific calculations [Sci07]. It contains, for example, a lot of standard probability distributions. The parser for the Galileo format files is based upon supplied ANTLR grammar files. They were written to produce Java code, so we had to translate the ANTLR files into Python code producing parsers. 5.CASE STUDIES For comparing the tool to existing techniques we performed several case studies. These case studies are based upon two case studies from the paper by Dugan et al [DBB992]. The DFTs in that paper model several types of Fault-Tolerant Computer Systems. These systems were explicitly designed to be as redundant and reliable as possible. The Dugan case studies are depicted in appendix A. The first case in Dugans paper was chosen because it has four FDEP and twelve PAND gates. This means that with traditionally solving of that DFT an enormous state space explosion will take place when trying to solve the underlying Markov Chain. This makes it difficult to completely compute the system reliability so our methodology might prove a good alternative. The second case in Dugans paper was chosen because it has four SPARE gates. The SPARE gates also have shared spare inputs. This means for analytically computing the system reliability of the DFT the Markov Chain will be very complex. Especially because of the shared spare inputs since this makes all the SPARE gates dependent on each other. Being able to solve this faster with our methodology would be quite desirable. We have drawn a few DFT's based upon the selection criteria we have mentioned before and simulated those. The cases themselves and the results for each independent case is shown below. Each case will detail the DFT analyzed and give the unreliability output by our tool. These unreliabilities will also be accompanied with the confidence interval and the number of samples taken. We will also analyze the DFTs with several mission times. Our results will be compared against the unreliability measures computed by Galileo. Based upon this we are going to show the methodology and its implementation are working. 5.1 Case Study #1: DFT without FDEP gates This DFT is based upon the one depicted in appendix B, except that the FDEP gates included there were ignored. The DFT contains: 1 K/M gate (2/3) 3 OR gates 3 AND gates 3 PAND gates 12 BEs Compared with appendix B the FDEP gates named FDEP1 and FDEP2 are excluded. So are the NE1 and NE2 Basic Events. All the Basic Events have exponential failure distributions. For every BE the parameter lambda is The table below depicts the number of samples taken, the corresponding mission time and the computed unreliability ) (including the confidence interval). As expected, the confidence interval becomes smaller when more samples are been taken. mission time Table 3. Case #1: results number of samples taken 1,000 10, / / / / Galileo computes the following unreliability measures: for mission time 100 and for mission time 250. The tool clearly is converging to these answers and with more samples we could approach the analytically computed value of Galileo even better. 5.2 Case Study #2: DFT with FDEP gates This DFT is the one in appendix B. It contains: 1 K/M gates (2/3) 3 OR gates 3 AND gates 3 PAND gates 2 FDEP gates 14 BEs All the basic events have exponential failure distributions. The basic events depicted by NE1 and NE2 have parameter lambda is The other basic events have parameter lambda is The table below shows the results of the analysis.

6 mission time Table 4. Case #2: results number of samples taken 1,000 10, , / / / / / / Galileo was not able to compute these unreliabilities. It continuously crashed after a few minutes no matter what type of computation (simulation, calculation) was entered. We have not validated the result analytically. Since the specific gates have all been tested we assumed the new FDEP gate in our tool doesn't introduce additional problems. This yields the following range for the unreliability of the DFT: for mission time 100: ( , ) for mission time 250: ( , ) This example shows a case where the conventional analytical solution used by Galileo is not able to produce an answer. Our tool is able to give an answer and with reasonable confidence we can say it's near the real answer. 5.3 Case Study #3: DFT with warm spare inputs Appendix C shows the DFT for this case study. It's a DFT specifically designed to test the sampling of multiple SPARE gates in a DFT. It contains the following gates: 1 K/M gate (2/3) 2 spare gates 5 BEs The spare gates have warm spare inputs. All the basic events have dormancy factors of 0.5. For BE1, BE3 and BE5 who are not spare input BEs the dormancy factor is set but it's not taken into account at any point in the simulation. The lambda's for each BE are shown in the table below: Table 5. BE Lambda values BE1 BE2 BE3 BE4 BE The results after running the simulation are in the following table: mission time Table 6. Case #3: results number of samples taken 1,000 10, , / / / / / / Galileo outputted for a mission time of 100 an unreliability of and for mission time 250 an unreliability of The answers by our tool seem to be somewhat of the mark. The unreliability computed by Galileo always seems to be at the end of our simulated confidence interval. This behavior was only observed with SPARE gates with warm spare inputs. Due to time constraints we were not able to figure out whether there's a bug in our implementation or not. Our methodology seems to work for simple DFTs with only one SPARE gate and one warm spare input. It might be a side effect of the simulation but it is more probable that we have stumbled upon an implementation error. This will have to be investigated further. 6.CONCLUSION The methodology described in this paper seems to work well for smaller cases. For the cases we have been able to test the results are encouraging. The simulation seems to give accurate enough answers and is able to calculate the unreliabilities for systems which cannot even be analytically analyzed by Galileo. The sampling of the warm spare inputs in larger DFTs does not seem to match the rest of the test data. Most of our methodology was proven and has been put to the test so this might give other researchers a good start to further improve our implementation and find more accurate ways of Monte Carlo simulation for DFTs. 6.1 Future work The tool should be extended with a feature where, instead of the number of samples, it gets a confidence interval as input. This way a user doesn't have to guess the number of samples which are needed to get an accurate enough sampled answer. The implementation should just continue sampling and terminate as soon as the calculated confidence interval is below the threshold specified by the user. The tool should be extended with support for DFTs which contain SPARE gates that share spare inputs. This is quite a common occurrence (as can be seen in some of our case studies mentioned before) in systems which need to be modeled. One should look into the problems regarding warm spare inputs (as mentioned before in the case study section). 7.ACKNOWLEDGMENTS The author wants to thank his supervisor, Hichem Boudali for making available several references and discussing several aspects of this paper. Gratitude is also expressed towards my supervisors, Mariëlle Stoelinga and Lodewijk Bergmans, and my fellow students for reviewing and commenting on this paper. 8.REFERENCES [And97] [BB93] H. R. Andersen An Introduction to Binary Decision Diagrams Lecture notes for Advanced Algorithms E97, October 1997, Dept. of Information Technology, Technical University of Denmark, accessed at 21 st of March 2008 Mark A. Boyd and Salvatore J. Bavuso. Simulation modeling for long duration spacecraft control systems. Proceedings of the Annual Reliability and Maintainability Symposium, pages , 1993

7 [BCS07] [BSC99] [Dug04] [DBB92] [Gen03] [GB00] [IRS07] [KW86] H. Boudali, P. Crouzen, M. Stoelinga, A compositional semantics for Dynamic Fault Trees in terms of Interactive Markov Chains Dept. of Computer Science, University of Twente, to be published Joanne Bechta Dugan, Kevin J. Sullivan, and David Coppit. Developing a low-cost, high-quality software tool for dynamic fault tree analysis. Transactions on Reliability, December 1999, pages J.B. Dugan, Fault Tree Analysis of Computer-Based systems, Lecture at Reliability and Maintainability Symposium, University of Virginia 2004 J.B Dugan, S.J. Bavuso, M.A. Boyd Dynamic Fault-Tree Models for Fault-Tolerant Computer Systems, IEEE transactions on reliability, vol 41; number 3 IEEE institute of electrical and electronics, USA Gentle, J.E. Random number generation and Monte Carlo methods, 2 nd edition Springer-Link, New York, 2003 G. Gedam, Steven T. Beaudet, Monte Carlo Simulation using Excel Spreadsheet for Predicting Reliability of a Complex System, Motorola Satellite Communications Group, Chandler, Proceedings IEEE Communications and Reliability Symposium 2000 IEEE Reliability Society website, accessed at 11 th of March 2008 Kalos H.M., Whitlock P.A., Monte Carlo methods, Volume 1: Basics Courant Institute of Mathetmatical Sciences, New York University John Wiley & Sons, New York, 1986 [MM03] [Sci07] Moore, D.S., McCabe, G.P. Statistiek in de praktijk,3 rd edition Academic Service, the Hague, oktober 2003 SciPy website accessed at 25 th of March 2008 [VGR+81] W.E. Vesely, F.F. Goldberg, N.H. Roberts, D.F. Haasl Fault Tree Handbook, U.S. Nuclear Regulatory Commission, January 1981 U.S. Government Printing Office, Washington

8 APPENDIX A: CASE STUDIES FROM DUGAN

9 APPENDIX B: DFT #1 APPENDIX C: DFT CASE #2

Chapter 3 RANDOM VARIATE GENERATION

Chapter 3 RANDOM VARIATE GENERATION Chapter 3 RANDOM VARIATE GENERATION In order to do a Monte Carlo simulation either by hand or by computer, techniques must be developed for generating values of random variables having known distributions.

More information

Chapter 11 Monte Carlo Simulation

Chapter 11 Monte Carlo Simulation Chapter 11 Monte Carlo Simulation 11.1 Introduction The basic idea of simulation is to build an experimental device, or simulator, that will act like (simulate) the system of interest in certain important

More information

Military Reliability Modeling William P. Fox, Steven B. Horton

Military Reliability Modeling William P. Fox, Steven B. Horton Military Reliability Modeling William P. Fox, Steven B. Horton Introduction You are an infantry rifle platoon leader. Your platoon is occupying a battle position and has been ordered to establish an observation

More information

TEACHING SIMULATION WITH SPREADSHEETS

TEACHING SIMULATION WITH SPREADSHEETS TEACHING SIMULATION WITH SPREADSHEETS Jelena Pecherska and Yuri Merkuryev Deptartment of Modelling and Simulation Riga Technical University 1, Kalku Street, LV-1658 Riga, Latvia E-mail: merkur@itl.rtu.lv,

More information

Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1

Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1 Traffic Behavior Analysis with Poisson Sampling on High-speed etwork Guang Cheng Jian Gong (Computer Department of Southeast University anjing 0096, P.R.China) Abstract: With the subsequent increasing

More information

The Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy

The Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy BMI Paper The Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy Faculty of Sciences VU University Amsterdam De Boelelaan 1081 1081 HV Amsterdam Netherlands Author: R.D.R.

More information

Estimating Software Reliability In the Absence of Data

Estimating Software Reliability In the Absence of Data Estimating Software Reliability In the Absence of Data Joanne Bechta Dugan (jbd@virginia.edu) Ganesh J. Pai (gpai@virginia.edu) Department of ECE University of Virginia, Charlottesville, VA NASA OSMA SAS

More information

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: M.Vidyasagar@utdallas.edu October 17, 2015 Outline

More information

Row Echelon Form and Reduced Row Echelon Form

Row Echelon Form and Reduced Row Echelon Form These notes closely follow the presentation of the material given in David C Lay s textbook Linear Algebra and its Applications (3rd edition) These notes are intended primarily for in-class presentation

More information

SIMPLIFIED PERFORMANCE MODEL FOR HYBRID WIND DIESEL SYSTEMS. J. F. MANWELL, J. G. McGOWAN and U. ABDULWAHID

SIMPLIFIED PERFORMANCE MODEL FOR HYBRID WIND DIESEL SYSTEMS. J. F. MANWELL, J. G. McGOWAN and U. ABDULWAHID SIMPLIFIED PERFORMANCE MODEL FOR HYBRID WIND DIESEL SYSTEMS J. F. MANWELL, J. G. McGOWAN and U. ABDULWAHID Renewable Energy Laboratory Department of Mechanical and Industrial Engineering University of

More information

SENSITIVITY ANALYSIS AND INFERENCE. Lecture 12

SENSITIVITY ANALYSIS AND INFERENCE. Lecture 12 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License. Your use of this material constitutes acceptance of that license and the conditions of use of materials on this

More information

Model-based Synthesis. Tony O Hagan

Model-based Synthesis. Tony O Hagan Model-based Synthesis Tony O Hagan Stochastic models Synthesising evidence through a statistical model 2 Evidence Synthesis (Session 3), Helsinki, 28/10/11 Graphical modelling The kinds of models that

More information

3 Some Integer Functions

3 Some Integer Functions 3 Some Integer Functions A Pair of Fundamental Integer Functions The integer function that is the heart of this section is the modulo function. However, before getting to it, let us look at some very simple

More information

Guide to Writing a Project Report

Guide to Writing a Project Report Guide to Writing a Project Report The following notes provide a guideline to report writing, and more generally to writing a scientific article. Please take the time to read them carefully. Even if your

More information

Simple Regression Theory II 2010 Samuel L. Baker

Simple Regression Theory II 2010 Samuel L. Baker SIMPLE REGRESSION THEORY II 1 Simple Regression Theory II 2010 Samuel L. Baker Assessing how good the regression equation is likely to be Assignment 1A gets into drawing inferences about how close the

More information

CS311 Lecture: Sequential Circuits

CS311 Lecture: Sequential Circuits CS311 Lecture: Sequential Circuits Last revised 8/15/2007 Objectives: 1. To introduce asynchronous and synchronous flip-flops (latches and pulsetriggered, plus asynchronous preset/clear) 2. To introduce

More information

Probability and Random Variables. Generation of random variables (r.v.)

Probability and Random Variables. Generation of random variables (r.v.) Probability and Random Variables Method for generating random variables with a specified probability distribution function. Gaussian And Markov Processes Characterization of Stationary Random Process Linearly

More information

The Taxman Game. Robert K. Moniot September 5, 2003

The Taxman Game. Robert K. Moniot September 5, 2003 The Taxman Game Robert K. Moniot September 5, 2003 1 Introduction Want to know how to beat the taxman? Legally, that is? Read on, and we will explore this cute little mathematical game. The taxman game

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES Contents 1. Random variables and measurable functions 2. Cumulative distribution functions 3. Discrete

More information

Using simulation to calculate the NPV of a project

Using simulation to calculate the NPV of a project Using simulation to calculate the NPV of a project Marius Holtan Onward Inc. 5/31/2002 Monte Carlo simulation is fast becoming the technology of choice for evaluating and analyzing assets, be it pure financial

More information

Compression algorithm for Bayesian network modeling of binary systems

Compression algorithm for Bayesian network modeling of binary systems Compression algorithm for Bayesian network modeling of binary systems I. Tien & A. Der Kiureghian University of California, Berkeley ABSTRACT: A Bayesian network (BN) is a useful tool for analyzing the

More information

Chapter Seven. Multiple regression An introduction to multiple regression Performing a multiple regression on SPSS

Chapter Seven. Multiple regression An introduction to multiple regression Performing a multiple regression on SPSS Chapter Seven Multiple regression An introduction to multiple regression Performing a multiple regression on SPSS Section : An introduction to multiple regression WHAT IS MULTIPLE REGRESSION? Multiple

More information

ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015

ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015 ECON 459 Game Theory Lecture Notes Auctions Luca Anderlini Spring 2015 These notes have been used before. If you can still spot any errors or have any suggestions for improvement, please let me know. 1

More information

Two-sample inference: Continuous data

Two-sample inference: Continuous data Two-sample inference: Continuous data Patrick Breheny April 5 Patrick Breheny STA 580: Biostatistics I 1/32 Introduction Our next two lectures will deal with two-sample inference for continuous data As

More information

CRASHING-RISK-MODELING SOFTWARE (CRMS)

CRASHING-RISK-MODELING SOFTWARE (CRMS) International Journal of Science, Environment and Technology, Vol. 4, No 2, 2015, 501 508 ISSN 2278-3687 (O) 2277-663X (P) CRASHING-RISK-MODELING SOFTWARE (CRMS) Nabil Semaan 1, Najib Georges 2 and Joe

More information

Association Between Variables

Association Between Variables Contents 11 Association Between Variables 767 11.1 Introduction............................ 767 11.1.1 Measure of Association................. 768 11.1.2 Chapter Summary.................... 769 11.2 Chi

More information

Products reliability assessment using Monte-Carlo simulation

Products reliability assessment using Monte-Carlo simulation Products reliability assessment using Monte-Carlo simulation Dumitrascu Adela-Eliza and Duicu Simona Abstract Product reliability is a critical part of total product quality. Reliability is a measure of

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 7, July 23 ISSN: 2277 28X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Greedy Algorithm:

More information

1.7 Graphs of Functions

1.7 Graphs of Functions 64 Relations and Functions 1.7 Graphs of Functions In Section 1.4 we defined a function as a special type of relation; one in which each x-coordinate was matched with only one y-coordinate. We spent most

More information

Take-Home Exercise. z y x. Erik Jonsson School of Engineering and Computer Science. The University of Texas at Dallas

Take-Home Exercise. z y x. Erik Jonsson School of Engineering and Computer Science. The University of Texas at Dallas Take-Home Exercise Assume you want the counter below to count mod-6 backward. That is, it would count 0-5-4-3-2-1-0, etc. Assume it is reset on startup, and design the wiring to make the counter count

More information

TEST 2 STUDY GUIDE. 1. Consider the data shown below.

TEST 2 STUDY GUIDE. 1. Consider the data shown below. 2006 by The Arizona Board of Regents for The University of Arizona All rights reserved Business Mathematics I TEST 2 STUDY GUIDE 1 Consider the data shown below (a) Fill in the Frequency and Relative Frequency

More information

Numerical Methods for Option Pricing

Numerical Methods for Option Pricing Chapter 9 Numerical Methods for Option Pricing Equation (8.26) provides a way to evaluate option prices. For some simple options, such as the European call and put options, one can integrate (8.26) directly

More information

The Standard Normal distribution

The Standard Normal distribution The Standard Normal distribution 21.2 Introduction Mass-produced items should conform to a specification. Usually, a mean is aimed for but due to random errors in the production process we set a tolerance

More information

Variables Control Charts

Variables Control Charts MINITAB ASSISTANT WHITE PAPER This paper explains the research conducted by Minitab statisticians to develop the methods and data checks used in the Assistant in Minitab 17 Statistical Software. Variables

More information

Confidence Intervals for Exponential Reliability

Confidence Intervals for Exponential Reliability Chapter 408 Confidence Intervals for Exponential Reliability Introduction This routine calculates the number of events needed to obtain a specified width of a confidence interval for the reliability (proportion

More information

Reliability Guarantees in Automata Based Scheduling for Embedded Control Software

Reliability Guarantees in Automata Based Scheduling for Embedded Control Software 1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,

More information

Permutation Tests for Comparing Two Populations

Permutation Tests for Comparing Two Populations Permutation Tests for Comparing Two Populations Ferry Butar Butar, Ph.D. Jae-Wan Park Abstract Permutation tests for comparing two populations could be widely used in practice because of flexibility of

More information

Counters and Decoders

Counters and Decoders Physics 3330 Experiment #10 Fall 1999 Purpose Counters and Decoders In this experiment, you will design and construct a 4-bit ripple-through decade counter with a decimal read-out display. Such a counter

More information

Probability and Statistics Prof. Dr. Somesh Kumar Department of Mathematics Indian Institute of Technology, Kharagpur

Probability and Statistics Prof. Dr. Somesh Kumar Department of Mathematics Indian Institute of Technology, Kharagpur Probability and Statistics Prof. Dr. Somesh Kumar Department of Mathematics Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #15 Special Distributions-VI Today, I am going to introduce

More information

DEFINING AND COMPUTING EQUIVALENT INDUCTANCES OF GAPPED IRON CORE REACTORS

DEFINING AND COMPUTING EQUIVALENT INDUCTANCES OF GAPPED IRON CORE REACTORS ISEF 20 - XV International Symposium on Electromagnetic Fields in Mechatronics, Electrical and Electronic Engineering Funchal, Madeira, September -3, 20 DEFINING AND COMPUTING EQUIVALENT INDUCTANCES OF

More information

Week 4: Standard Error and Confidence Intervals

Week 4: Standard Error and Confidence Intervals Health Sciences M.Sc. Programme Applied Biostatistics Week 4: Standard Error and Confidence Intervals Sampling Most research data come from subjects we think of as samples drawn from a larger population.

More information

Measuring Exchange Rate Fluctuations Risk Using the Value-at-Risk

Measuring Exchange Rate Fluctuations Risk Using the Value-at-Risk Journal of Applied Finance & Banking, vol.2, no.3, 2012, 65-79 ISSN: 1792-6580 (print version), 1792-6599 (online) International Scientific Press, 2012 Measuring Exchange Rate Fluctuations Risk Using the

More information

Verification of Triple Modular Redundancy (TMR) Insertion for Reliable and Trusted Systems

Verification of Triple Modular Redundancy (TMR) Insertion for Reliable and Trusted Systems Verification of Triple Modular Redundancy (TMR) Insertion for Reliable and Trusted Systems Melanie Berg 1, Kenneth LaBel 2 1.AS&D in support of NASA/GSFC Melanie.D.Berg@NASA.gov 2. NASA/GSFC Kenneth.A.LaBel@NASA.gov

More information

Chapter 9 Monté Carlo Simulation

Chapter 9 Monté Carlo Simulation MGS 3100 Business Analysis Chapter 9 Monté Carlo What Is? A model/process used to duplicate or mimic the real system Types of Models Physical simulation Computer simulation When to Use (Computer) Models?

More information

Reliability Block Diagram RBD

Reliability Block Diagram RBD Information Technology Solutions Reliability Block Diagram RBD Assess the level of failure tolerance achieved RELIABIL ITY OPTIMIZATION System reliability analysis for sophisticated and large scale systems.

More information

14.1 Rent-or-buy problem

14.1 Rent-or-buy problem CS787: Advanced Algorithms Lecture 14: Online algorithms We now shift focus to a different kind of algorithmic problem where we need to perform some optimization without knowing the input in advance. Algorithms

More information

SOFTWARE PERFORMANCE EVALUATION ALGORITHM EXPERIMENT FOR IN-HOUSE SOFTWARE USING INTER-FAILURE DATA

SOFTWARE PERFORMANCE EVALUATION ALGORITHM EXPERIMENT FOR IN-HOUSE SOFTWARE USING INTER-FAILURE DATA I.J.E.M.S., VOL.3(2) 2012: 99-104 ISSN 2229-6425 SOFTWARE PERFORMANCE EVALUATION ALGORITHM EXPERIMENT FOR IN-HOUSE SOFTWARE USING INTER-FAILURE DATA *Jimoh, R. G. & Abikoye, O. C. Computer Science Department,

More information

BOOLEAN ALGEBRA & LOGIC GATES

BOOLEAN ALGEBRA & LOGIC GATES BOOLEAN ALGEBRA & LOGIC GATES Logic gates are electronic circuits that can be used to implement the most elementary logic expressions, also known as Boolean expressions. The logic gate is the most basic

More information

Time Series and Forecasting

Time Series and Forecasting Chapter 22 Page 1 Time Series and Forecasting A time series is a sequence of observations of a random variable. Hence, it is a stochastic process. Examples include the monthly demand for a product, the

More information

Autonomous Fault Detection and Recovery System in Large-scale Networks

Autonomous Fault Detection and Recovery System in Large-scale Networks Autonomous Fault Detection and Recovery System in Large-scale Networks Raheel Ahmed Memon 1, Yeonseung Ryu, Abdul Qadir Rahimoo Abstract In networks like Combat ship data network, the Ethernet is required

More information

Real Roots of Univariate Polynomials with Real Coefficients

Real Roots of Univariate Polynomials with Real Coefficients Real Roots of Univariate Polynomials with Real Coefficients mostly written by Christina Hewitt March 22, 2012 1 Introduction Polynomial equations are used throughout mathematics. When solving polynomials

More information

Lecture 2. Marginal Functions, Average Functions, Elasticity, the Marginal Principle, and Constrained Optimization

Lecture 2. Marginal Functions, Average Functions, Elasticity, the Marginal Principle, and Constrained Optimization Lecture 2. Marginal Functions, Average Functions, Elasticity, the Marginal Principle, and Constrained Optimization 2.1. Introduction Suppose that an economic relationship can be described by a real-valued

More information

Vector and Matrix Norms

Vector and Matrix Norms Chapter 1 Vector and Matrix Norms 11 Vector Spaces Let F be a field (such as the real numbers, R, or complex numbers, C) with elements called scalars A Vector Space, V, over the field F is a non-empty

More information

CRITICAL PATH ANALYSIS AND GANTT CHARTS

CRITICAL PATH ANALYSIS AND GANTT CHARTS CRITICAL PATH ANALYSIS AND GANTT CHARTS 1. An engineering project is modelled by the activity network shown in the figure above. The activities are represented by the arcs. The number in brackets on each

More information

Binary Adders: Half Adders and Full Adders

Binary Adders: Half Adders and Full Adders Binary Adders: Half Adders and Full Adders In this set of slides, we present the two basic types of adders: 1. Half adders, and 2. Full adders. Each type of adder functions to add two binary bits. In order

More information

Hedge Effectiveness Testing

Hedge Effectiveness Testing Hedge Effectiveness Testing Using Regression Analysis Ira G. Kawaller, Ph.D. Kawaller & Company, LLC Reva B. Steinberg BDO Seidman LLP When companies use derivative instruments to hedge economic exposures,

More information

Parsing Technology and its role in Legacy Modernization. A Metaware White Paper

Parsing Technology and its role in Legacy Modernization. A Metaware White Paper Parsing Technology and its role in Legacy Modernization A Metaware White Paper 1 INTRODUCTION In the two last decades there has been an explosion of interest in software tools that can automate key tasks

More information

Why Semantic Analysis is Better than Sentiment Analysis. A White Paper by T.R. Fitz-Gibbon, Chief Scientist, Networked Insights

Why Semantic Analysis is Better than Sentiment Analysis. A White Paper by T.R. Fitz-Gibbon, Chief Scientist, Networked Insights Why Semantic Analysis is Better than Sentiment Analysis A White Paper by T.R. Fitz-Gibbon, Chief Scientist, Networked Insights Why semantic analysis is better than sentiment analysis I like it, I don t

More information

MATH 140 Lab 4: Probability and the Standard Normal Distribution

MATH 140 Lab 4: Probability and the Standard Normal Distribution MATH 140 Lab 4: Probability and the Standard Normal Distribution Problem 1. Flipping a Coin Problem In this problem, we want to simualte the process of flipping a fair coin 1000 times. Note that the outcomes

More information

Normal distribution. ) 2 /2σ. 2π σ

Normal distribution. ) 2 /2σ. 2π σ Normal distribution The normal distribution is the most widely known and used of all distributions. Because the normal distribution approximates many natural phenomena so well, it has developed into a

More information

Reliability. 26.1 Reliability Models. Chapter 26 Page 1

Reliability. 26.1 Reliability Models. Chapter 26 Page 1 Chapter 26 Page 1 Reliability Although the technological achievements of the last 50 years can hardly be disputed, there is one weakness in all mankind's devices. That is the possibility of failure. What

More information

Using Excel for inferential statistics

Using Excel for inferential statistics FACT SHEET Using Excel for inferential statistics Introduction When you collect data, you expect a certain amount of variation, just caused by chance. A wide variety of statistical tests can be applied

More information

Efficient Data Structures for Decision Diagrams

Efficient Data Structures for Decision Diagrams Artificial Intelligence Laboratory Efficient Data Structures for Decision Diagrams Master Thesis Nacereddine Ouaret Professor: Supervisors: Boi Faltings Thomas Léauté Radoslaw Szymanek Contents Introduction...

More information

Roots of Equations (Chapters 5 and 6)

Roots of Equations (Chapters 5 and 6) Roots of Equations (Chapters 5 and 6) Problem: given f() = 0, find. In general, f() can be any function. For some forms of f(), analytical solutions are available. However, for other functions, we have

More information

START Selected Topics in Assurance

START Selected Topics in Assurance START Selected Topics in Assurance Related Technologies Table of Contents Introduction Some Statistical Background Fitting a Normal Using the Anderson Darling GoF Test Fitting a Weibull Using the Anderson

More information

Pricing Barrier Option Using Finite Difference Method and MonteCarlo Simulation

Pricing Barrier Option Using Finite Difference Method and MonteCarlo Simulation Pricing Barrier Option Using Finite Difference Method and MonteCarlo Simulation Yoon W. Kwon CIMS 1, Math. Finance Suzanne A. Lewis CIMS, Math. Finance May 9, 000 1 Courant Institue of Mathematical Science,

More information

Notes on Continuous Random Variables

Notes on Continuous Random Variables Notes on Continuous Random Variables Continuous random variables are random quantities that are measured on a continuous scale. They can usually take on any value over some interval, which distinguishes

More information

Notes on Complexity Theory Last updated: August, 2011. Lecture 1

Notes on Complexity Theory Last updated: August, 2011. Lecture 1 Notes on Complexity Theory Last updated: August, 2011 Jonathan Katz Lecture 1 1 Turing Machines I assume that most students have encountered Turing machines before. (Students who have not may want to look

More information

4. Continuous Random Variables, the Pareto and Normal Distributions

4. Continuous Random Variables, the Pareto and Normal Distributions 4. Continuous Random Variables, the Pareto and Normal Distributions A continuous random variable X can take any value in a given range (e.g. height, weight, age). The distribution of a continuous random

More information

Linear Programming Notes VII Sensitivity Analysis

Linear Programming Notes VII Sensitivity Analysis Linear Programming Notes VII Sensitivity Analysis 1 Introduction When you use a mathematical model to describe reality you must make approximations. The world is more complicated than the kinds of optimization

More information

SOME ASPECTS OF GAMBLING WITH THE KELLY CRITERION. School of Mathematical Sciences. Monash University, Clayton, Victoria, Australia 3168

SOME ASPECTS OF GAMBLING WITH THE KELLY CRITERION. School of Mathematical Sciences. Monash University, Clayton, Victoria, Australia 3168 SOME ASPECTS OF GAMBLING WITH THE KELLY CRITERION Ravi PHATARFOD School of Mathematical Sciences Monash University, Clayton, Victoria, Australia 3168 In this paper we consider the problem of gambling with

More information

Schedule Risk Analysis Simulator using Beta Distribution

Schedule Risk Analysis Simulator using Beta Distribution Schedule Risk Analysis Simulator using Beta Distribution Isha Sharma Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, Haryana (INDIA) ishasharma211@yahoo.com Dr. P.K.

More information

Notes on Factoring. MA 206 Kurt Bryan

Notes on Factoring. MA 206 Kurt Bryan The General Approach Notes on Factoring MA 26 Kurt Bryan Suppose I hand you n, a 2 digit integer and tell you that n is composite, with smallest prime factor around 5 digits. Finding a nontrivial factor

More information

The Method of Least Squares

The Method of Least Squares The Method of Least Squares Steven J. Miller Mathematics Department Brown University Providence, RI 0292 Abstract The Method of Least Squares is a procedure to determine the best fit line to data; the

More information

7 Gaussian Elimination and LU Factorization

7 Gaussian Elimination and LU Factorization 7 Gaussian Elimination and LU Factorization In this final section on matrix factorization methods for solving Ax = b we want to take a closer look at Gaussian elimination (probably the best known method

More information

Lecture 3: Finding integer solutions to systems of linear equations

Lecture 3: Finding integer solutions to systems of linear equations Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture

More information

CHAPTER 2. Logic. 1. Logic Definitions. Notation: Variables are used to represent propositions. The most common variables used are p, q, and r.

CHAPTER 2. Logic. 1. Logic Definitions. Notation: Variables are used to represent propositions. The most common variables used are p, q, and r. CHAPTER 2 Logic 1. Logic Definitions 1.1. Propositions. Definition 1.1.1. A proposition is a declarative sentence that is either true (denoted either T or 1) or false (denoted either F or 0). Notation:

More information

Embedded Systems Lecture 9: Reliability & Fault Tolerance. Björn Franke University of Edinburgh

Embedded Systems Lecture 9: Reliability & Fault Tolerance. Björn Franke University of Edinburgh Embedded Systems Lecture 9: Reliability & Fault Tolerance Björn Franke University of Edinburgh Overview Definitions System Reliability Fault Tolerance Sources and Detection of Errors Stage Error Sources

More information

Offline 1-Minesweeper is NP-complete

Offline 1-Minesweeper is NP-complete Offline 1-Minesweeper is NP-complete James D. Fix Brandon McPhail May 24 Abstract We use Minesweeper to illustrate NP-completeness proofs, arguments that establish the hardness of solving certain problems.

More information

A Non-Linear Schema Theorem for Genetic Algorithms

A Non-Linear Schema Theorem for Genetic Algorithms A Non-Linear Schema Theorem for Genetic Algorithms William A Greene Computer Science Department University of New Orleans New Orleans, LA 70148 bill@csunoedu 504-280-6755 Abstract We generalize Holland

More information

Generic Reliability Evaluation Method for Industrial Grids with Variable Frequency Drives

Generic Reliability Evaluation Method for Industrial Grids with Variable Frequency Drives Energy and Power Engineering, 2013, 5, 83-88 doi:10.4236/epe.2013.54b016 Published Online July 2013 (http://www.scirp.org/journal/epe) Generic Reliability Evaluation Method for Industrial Grids with Variable

More information

Monitoring Software Reliability using Statistical Process Control: An Ordered Statistics Approach

Monitoring Software Reliability using Statistical Process Control: An Ordered Statistics Approach Monitoring Software Reliability using Statistical Process Control: An Ordered Statistics Approach Bandla Srinivasa Rao Associate Professor. Dept. of Computer Science VRS & YRN College Dr. R Satya Prasad

More information

Static and dynamic analysis: basic concepts and examples

Static and dynamic analysis: basic concepts and examples Static and dynamic analysis: basic concepts and examples Ragnar Nymoen Department of Economics, UiO 18 August 2009 Lecture plan and web pages for this course The lecture plan is at http://folk.uio.no/rnymoen/econ3410_h08_index.html,

More information

Cartesian Products and Relations

Cartesian Products and Relations Cartesian Products and Relations Definition (Cartesian product) If A and B are sets, the Cartesian product of A and B is the set A B = {(a, b) :(a A) and (b B)}. The following points are worth special

More information

Lecture 5 - CPA security, Pseudorandom functions

Lecture 5 - CPA security, Pseudorandom functions Lecture 5 - CPA security, Pseudorandom functions Boaz Barak October 2, 2007 Reading Pages 82 93 and 221 225 of KL (sections 3.5, 3.6.1, 3.6.2 and 6.5). See also Goldreich (Vol I) for proof of PRF construction.

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide

More information

Evaluating Trading Systems By John Ehlers and Ric Way

Evaluating Trading Systems By John Ehlers and Ric Way Evaluating Trading Systems By John Ehlers and Ric Way INTRODUCTION What is the best way to evaluate the performance of a trading system? Conventional wisdom holds that the best way is to examine the system

More information

Second Order Linear Nonhomogeneous Differential Equations; Method of Undetermined Coefficients. y + p(t) y + q(t) y = g(t), g(t) 0.

Second Order Linear Nonhomogeneous Differential Equations; Method of Undetermined Coefficients. y + p(t) y + q(t) y = g(t), g(t) 0. Second Order Linear Nonhomogeneous Differential Equations; Method of Undetermined Coefficients We will now turn our attention to nonhomogeneous second order linear equations, equations with the standard

More information

5. Continuous Random Variables

5. Continuous Random Variables 5. Continuous Random Variables Continuous random variables can take any value in an interval. They are used to model physical characteristics such as time, length, position, etc. Examples (i) Let X be

More information

Pre-Algebra Lecture 6

Pre-Algebra Lecture 6 Pre-Algebra Lecture 6 Today we will discuss Decimals and Percentages. Outline: 1. Decimals 2. Ordering Decimals 3. Rounding Decimals 4. Adding and subtracting Decimals 5. Multiplying and Dividing Decimals

More information

CS556 Course Project Performance Analysis of M-NET using GSPN

CS556 Course Project Performance Analysis of M-NET using GSPN Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 CS6 Course Project Performance Analysis of M-NET using GSPN Jinchun Xia. Introduction Performance is a crucial factor in software

More information

Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams

Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams André Ciré University of Toronto John Hooker Carnegie Mellon University INFORMS 2014 Home Health Care Home health care delivery

More information

SMock A Test Platform for the Evaluation of Monitoring Tools

SMock A Test Platform for the Evaluation of Monitoring Tools SMock A Test Platform for the Evaluation of Monitoring Tools User Manual Ruth Mizzi Faculty of ICT University of Malta June 20, 2013 Contents 1 Introduction 3 1.1 The Architecture and Design of SMock................

More information

3 An Illustrative Example

3 An Illustrative Example Objectives An Illustrative Example Objectives - Theory and Examples -2 Problem Statement -2 Perceptron - Two-Input Case -4 Pattern Recognition Example -5 Hamming Network -8 Feedforward Layer -8 Recurrent

More information

Stats on the TI 83 and TI 84 Calculator

Stats on the TI 83 and TI 84 Calculator Stats on the TI 83 and TI 84 Calculator Entering the sample values STAT button Left bracket { Right bracket } Store (STO) List L1 Comma Enter Example: Sample data are {5, 10, 15, 20} 1. Press 2 ND and

More information

TEACHING AGGREGATE PLANNING IN AN OPERATIONS MANAGEMENT COURSE

TEACHING AGGREGATE PLANNING IN AN OPERATIONS MANAGEMENT COURSE TEACHING AGGREGATE PLANNING IN AN OPERATIONS MANAGEMENT COURSE Johnny C. Ho, Turner College of Business, Columbus State University, Columbus, GA 31907 David Ang, School of Business, Auburn University Montgomery,

More information

A Robust Method for Solving Transcendental Equations

A Robust Method for Solving Transcendental Equations www.ijcsi.org 413 A Robust Method for Solving Transcendental Equations Md. Golam Moazzam, Amita Chakraborty and Md. Al-Amin Bhuiyan Department of Computer Science and Engineering, Jahangirnagar University,

More information

Practical Guide to the Simplex Method of Linear Programming

Practical Guide to the Simplex Method of Linear Programming Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear

More information

Confidence Intervals for One Standard Deviation Using Standard Deviation

Confidence Intervals for One Standard Deviation Using Standard Deviation Chapter 640 Confidence Intervals for One Standard Deviation Using Standard Deviation Introduction This routine calculates the sample size necessary to achieve a specified interval width or distance from

More information

1 The Brownian bridge construction

1 The Brownian bridge construction The Brownian bridge construction The Brownian bridge construction is a way to build a Brownian motion path by successively adding finer scale detail. This construction leads to a relatively easy proof

More information