IDEAS home Printed from https://ideas.repec.org/a/spr/fuzinf/v2y2010i4d10.1007_s12543-010-0058-1.html
   My bibliography  Save this article

Reliability and cost analysis of series system models using fuzzy parametric geometric programming

Author

Listed:
  • B. S. Mahapatra

    (Seacom Engineering College)

  • G. S. Mahapatra

    (Siliguri Institute of Technology)

Abstract

In this paper, we have discussed series system models with system reliability and cost. We have considered two types of the model; the former focuses on a problem of optimal reliability for series system with cost constraint and the latter is a center system cost model with reliability goal. It is necessary to improve the reliability of the system under limited available cost of system and also to minimize the systems cost subject to target goal of the reliability. Practically, cost of components has always been imprecise with vague in nature. So they are taken as fuzzy in nature and the reliability models are formulated as a fuzzy parametric geometric programming problem. Numerical examples are given to illustrate the model through fuzzy parametric geometric programming technique.

Suggested Citation

  • B. S. Mahapatra & G. S. Mahapatra, 2010. "Reliability and cost analysis of series system models using fuzzy parametric geometric programming," Fuzzy Information and Engineering, Springer, vol. 2(4), pages 399-411, December.
  • Handle: RePEc:spr:fuzinf:v:2:y:2010:i:4:d:10.1007_s12543-010-0058-1
    DOI: 10.1007/s12543-010-0058-1
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s12543-010-0058-1
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s12543-010-0058-1?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
    2. A. J. Federowicz & M. Mazumdar, 1968. "Use of Geometric Programming to Maximize Reliability Achieved by Redundancy," Operations Research, INFORMS, vol. 16(5), pages 948-954, October.
    3. Sung, C. S. & Cho, Y. K., 2000. "Reliability optimization of a series system with multiple-choice and budget constraints," European Journal of Operational Research, Elsevier, vol. 127(1), pages 159-171, November.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. G. S. Mahapatra & T. K. Mandal, 2012. "Posynomial Parametric Geometric Programming with Interval Valued Coefficient," Journal of Optimization Theory and Applications, Springer, vol. 154(1), pages 120-132, July.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    2. Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    3. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    4. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    5. Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
    6. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    7. Wenzel, Lars & Wolf, André, 2013. "Protection against major catastrophes: An economic perspective," HWWI Research Papers 137, Hamburg Institute of International Economics (HWWI).
    8. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    9. F He & J Zhuang, 2012. "Modelling ‘contracts’ between a terrorist group and a government in a sequential game," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 790-809, June.
    10. Juan Li & Bin Xin & Panos M. Pardalos & Jie Chen, 2021. "Solving bi-objective uncertain stochastic resource allocation problems by the CVaR-based risk measure and decomposition-based multi-objective evolutionary algorithms," Annals of Operations Research, Springer, vol. 296(1), pages 639-666, January.
    11. Ramirez-Marquez, Jose E. & Rocco, Claudio M. & Levitin, Gregory, 2011. "Optimal network protection against diverse interdictor strategies," Reliability Engineering and System Safety, Elsevier, vol. 96(3), pages 374-382.
    12. Paulson, Elisabeth C. & Linkov, Igor & Keisler, Jeffrey M., 2016. "A game theoretic model for resource allocation among countermeasures with multiple attributes," European Journal of Operational Research, Elsevier, vol. 252(2), pages 610-622.
    13. Pei-Yu Chen & Frank Yeong-Sung Lin, 2013. "Recovery and Resource Allocation Strategies to Maximize Mobile Network Survivability by Using Game Theories and Optimization Techniques," Journal of Applied Mathematics, Hindawi, vol. 2013, pages 1-9, September.
    14. Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
    15. Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
    16. Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
    17. Dan Kovenock & Brian Roberson, 2012. "Strategic Defense And Attack For Series And Parallel Reliability Systems: Comment," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 507-515, October.
    18. Frank Yeong-Sung Lin & Yu-Shun Wang & Ming-Yang Huang, 2013. "Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet," Journal of Applied Mathematics, Hindawi, vol. 2013, pages 1-11, August.
    19. Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
    20. Jun Zhuang & Vicki M. Bier, 2010. "Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 30(12), pages 1737-1743, December.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:fuzinf:v:2:y:2010:i:4:d:10.1007_s12543-010-0058-1. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.