By Topic

IEEE Transactions on Reliability

Issue 3 • Date Sep 1994

Filter Results

Displaying Results 1 - 23 of 23
  • Failure-mechanism models for conductive-filament formation

    Publication Year: 1994, Page(s):354 - 360
    Cited by:  Papers (31)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    This tutorial illustrates design and qualification situations where conductive filament formation, a failure mechanism that can occur in laminates, can affect product performance. Empirical models to design against this failure mechanism are presented in this paper. Examples illustrate the use of these models for design and qualification tests in electronic packaging View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A recursive approach for enumerating minimal cutsets in a network

    Publication Year: 1994, Page(s):383 - 388
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    This paper presents a new recursive labelling algorithm for determining all minimal cutsets in a directed network, using an approach adapted from dynamic programming algorithms for the classical shortest route problem. The algorithm produces all minimal cutsets, and uses comparison logic to eliminate any redundant cutsets. Computational experience shows that: (1) the time per cutset varies linearl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Failure distributions for local vs. global and replicate vs. standby redundancies

    Publication Year: 1994, Page(s):476 - 483, 488
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    The paper begins with an arbitrary single-output, discrete-signal, irredundant system consisting of interconnected computing units each of which has the same exponential distribution for failure time. Then it presents several corresponding redundant designs that compute the same function, derives their distributions for failure time, and illustrates them with quantitative examples. None of the str... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Standard deviation as an alternative to fuzziness in fault tree models

    Publication Year: 1994, Page(s):402 - 407
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    Construction of fault-tree models almost always involves some engineering judgment or estimation when it comes to assignment of probabilities for the primary events in the fault tree. The top event probability in a fault tree is, of course, a function of the probabilities of occurrence of the primary events. A clearly desirable goal is to characterize fluctuations in the top-event probability that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal replacement policies for systems with multiple standby components

    Publication Year: 1994, Page(s):414 - 422
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    The authors consider two new preventive replacement policies for a multiple-component cold-standby system. The failure rate of the component in operation is constant. The system is inspected at random points over time to determine whether it is to be replaced. The replacement decision is based on the number of failed components at the time of inspection. There are two replacement options if the co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Locating the faulty component in a malfunctioning repetitive operation

    Publication Year: 1994, Page(s):431 - 438
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB)

    When the output of a repetitive operation is nonconforming, it is desirable to use a method that can locate the particular component that caused the nonconforming output. To minimize the probability of a wrong decision, a Bayes decision approach is used to develop a criterion for locating the source. The criterion is the ratio of the posterior and prior probability values of the parameters associa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power-hierarchy of dependability-model types

    Publication Year: 1994, Page(s):493 - 502
    Cited by:  Papers (61)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    This paper formally establishes a hierarchy, among the most commonly used types of dependability models, according to their modeling power. Among the combinatorial (non-state-space) model types, we show that fault trees with repeated events are the most powerful in terms of kinds of dependencies among various system components that can be modeled. Reliability graphs are less powerful than fault tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Why no additive hazards models?

    Publication Year: 1994, Page(s):484 - 488
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    The intuitively attractive additive hazards model is compared with the proportional hazards and accelerated failure time models. The lack of identifiability limits the use of the model and prevents the application of regression versions using covariates. Fortunately, data analysis based on nonhomogeneous Poisson processes or on proportional hazards is likely to yield most of the information availa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability modeling and performance evaluation of variable link-capacity networks

    Publication Year: 1994, Page(s):378 - 382
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    This paper presents a composite performance index for communication networks with variable link-capacities. This index is based on link reliabilities and multiple-capacity link-states. Source-to-terminal success is the ability to provide connectivity with a certain traffic-carrying capacity. This index is useful for determining the performance of networks with links operating with residual traffic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy-set approach to select maintenance strategies for multistate equipment

    Publication Year: 1994, Page(s):451 - 456
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    Maintenance of any equipment based on its condition is unavoidable. The condition of the equipment can be represented using fuzzy sets. This paper details a fuzzy-set model for maintenance policy of multistate equipment; the model is based on: (a) equipment condition and remaining life, and (b) maximizing a known detailed utility function. The model is extended to maintenance planning for the enti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Review: likelihood method for fitting Weibull log-linear models to accelerated life-test data

    Publication Year: 1994, Page(s):361 - 365
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    The analysis of data from accelerated life-test experiments via the method of maximum likelihood estimation must, for a Weibull log-linear model, be performed numerically. This paper promotes a particular log-likelihood as the basis for such inferences, and introduces notation and formulae to aid the implementation of various numerical methods. Two examples illustrate the performance of a widely-u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • K-terminal reliability in ring networks

    Publication Year: 1994, Page(s):389 - 401
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (972 KB)

    The authors present a new formula for computing K-terminal reliability in a communication network whose stations and links (vertices and edges) form a network graph G having a ring topology, where K-terminal reliability is the probability RK(G) that a subset of R specific terminal stations in G can communicate. This new formula is applied to three Fiber Distributed Data Interface (FDDI)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimation of Pr{X>Y} or Pr{X⩽Y}

    Publication Year: 1994, Page(s):466 - 469
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB)

    The paper presents a procedure for the estimation (point and interval) for a reliability model of the form Pr{X>Y} or Pr{X⩽Y} and Gaussian (normal) distributed variables. The procedures are derived from a quantitative approach that allows the user to get sufficient evidence, concerning the product reliability, by testing a small sample but at severe conditions, rather than testing a large s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software-reliability growth model: primary-failures generate secondary-faults under imperfect debugging

    Publication Year: 1994, Page(s):408 - 413
    Cited by:  Papers (29)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    Little work has been done on extending existing models with imperfect debugging to the more realistic situation where new faults are generated from unsuccessful attempts at removing faults completely. This paper presents a software-reliability growth model which incorporates the possibility of introducing new faults into a software system due to the imperfect debugging of the original faults in th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal maintenance-policies for deteriorating systems under various maintenance strategies

    Publication Year: 1994, Page(s):423 - 430
    Cited by:  Papers (61)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    This paper presents algorithms for deriving optimal maintenance policies to minimize the mean long-run cost-rate for continuous-time Markov deteriorating systems. The degree of deterioration (except failure) of the system is known only through inspection. The time durations of inspection and replacement are nonnegligible. The costs are for inspection, replacement, operation, and downtime (idle). I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A maintenance strategy for systems subjected to deterioration governed by random shocks

    Publication Year: 1994, Page(s):439 - 445
    Cited by:  Papers (39)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    The authors examine the time-stationary availability of maintained systems that deteriorate according to a random-shock process. System failures are not self-announcing; hence, failures must be detected via inspection. The approach considers randomly occurring shocks that cumulatively damage the system; shock magnitudes are taken as random. The authors develop an expression for computing system av... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of type-I and type-II accelerated life tests for selecting the most reliable product

    Publication Year: 1994, Page(s):503 - 510
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    In product research and development, one might wish to select the most reliable of several highly-reliable competing products. Both type-I and type-II accelerated life tests (ALT) are well-known to estimate and compare the life of highly reliable (nonrepairable) products within a reasonable testing time. A common decision problem is to choose the better plan for achieving the above goal. This pape... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distribution of total uptime during a given time interval

    Publication Year: 1994, Page(s):489 - 492
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    The distribution of total uptime during a given time interval for a repairable system is obtained. The total uptime is the total amount of time the system is up (in operation) during the interval. It is assumed that: (1) the system starts to operate at the beginning of the interval and alternately takes only the two states, up and down (under repair); (2) repair restores the system to “like-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probabilistic derivation of overstress for overhead distribution in-line structures

    Publication Year: 1994, Page(s):366 - 374
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    This paper shows how probability techniques can be applied to low and medium voltage distribution and high voltage sub-transmission lines which use self-supporting single-pole structures. The probabilistic concept uses overlapping distributions in which the randomized stress induced by wind pressure is matched to the resisting strength of a pole structure. In this way a risk load is evaluated whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Load-capacity interference and the bathtub curve

    Publication Year: 1994, Page(s):470 - 475
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    Load-capacity (stress-strength) interference theory is used to derive a heuristic failure rate for an item subjected to repetitive loading which is Poisson distributed in time. Numerical calculations are performed using Gaussian distributions in load and capacity. Infant mortality, constant failure rate (Poisson failures), and aging are shown to be associated with capacity variability, load variab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bayes analysis for fault location in distributed systems

    Publication Year: 1994, Page(s):457 - 465, 469
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB)

    The authors propose a simple and practical probabilistic model, using multiple incomplete test concepts, for fault location in distributed systems using a Bayes analysis procedure. Since it is easier to compare test results among processing units, their model is comparison-based. This approach is realistic and complete in the sense that it does not assume conditions such as permanently faulty unit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Calculation of node-pair reliability in large networks with unreliable nodes

    Publication Year: 1994, Page(s):375 - 377, 382
    Cited by:  Papers (52)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    A new efficient method that compensates for unreliable nodes in network reliability computations is presented. This method can be embedded in the modified Dotson algorithm or any algorithm that generates a symbolic reliability expression for networks with perfect nodes. Its cost increases linearly with the number of links, and the effect of unreliable nodes can be directly computed. This method su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimation in the 2-parameter exponential distribution with prior information

    Publication Year: 1994, Page(s):446 - 450
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB)

    This paper proposes a class of estimators for the scale parameter and for the mean of a 2-parameter exponential distribution, which is important in life testing and reliability theory, given a prior estimate of the scale parameter. The class of estimators for the scale parameter is motivated by the work of Jani (1991). These estimators have smaller mean square error than the classical estimators f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Reliability is concerned with the problems involved in attaining reliability, maintaining it through the life of the system or device, and measuring it.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
W. Eric Wong
University of Texas at Dallas
Advanced Res Ctr for Software Testing and Quality Assurance

ewong@utdallas.edu