Optimal allocation of multistate elements in linear consecutivelyconnected systems with vulnerable nodes Gregory Levitin Reliability Department, Planning, Development and Technology Division, Bait Amir, The Israel Electric Corporation Ltd., P.O. Box 10, Haifa, 31000 Israel E-mail: [email protected] Abstract A linear multistate consecutively-connected system (LMCCS) consists of N+1 linear ordered positions (nodes). M statistically independent multistate elements (MEs) with different characteristics are to be allocated at the N first positions. Each element can provide a connection between the position in which it is llocated and the next few positions. The reliability of the connection for any given element depends on the position in which it is allocated and on the number of positions it connects. The system fails if the first position (source) is not connected with N+1-th one (sink). Each system node with all the MEs allocated at this node can be destroyed by external impact with a given probability. The system survivability is defined as the probability that at least one path exists from the source to the sink when both external impacts and internal failures can cause MEs unavailability. The algorithm for finding the ME distribution providing the greatest possible LMCCS survivability is suggested. A genetic algorithm is used as the optimization tool. Illustrative examples are presented. Keywords: System survivability; multistate elements; linear consecutively-connected systems; universal generating function; genetic algorithm. 1 Acronyms ME multistate element LMCCS linear multistate consecutively-connected system UGF universal generating function GA genetic algorithm Notation Pr{x} probability of event x R reliability of LMCCS S survivability of LMCCS N number of positions (nodes) in LMCCS M number of MEs in LMCCS node vulnerability probability that node survives during the system operation time (=1-) ei i-th ME of LMCCS Cn n-th position (node) of LMCCS E set of all available MEs: E={e1,…,eM} En set of MEs located at position n h(i) number of position the ME ei is allocated at: eiEh(i) H vector representing allocation of MEs in LMCCS: H={h(i),1iM} K maximal number of different states of MEs Gi random state of i-th ME pik(n) Pr{Gi=k | eiEn} PI(n) vector representing probabilistic state distribution of i-th ME: Pi={pi0(n),…,piK-1(n)} Tn random number of the most remote position to which arc from Cn exists 2 Yn random number of the most remote position to which path from C1 provided by MEs n belonging to Ei exists i 1 qnk Pr{Tn=k} uin(z) u-function for i-th ME located at position n (i=0 corresponds to absence of ME) Un(z) u-function for the group of MEs belonging to En (located at position n) n ~ (z) u-function for subset of MEs Un Ei i 1 ,, operators over u-functions () (x)=min{x,N+1} 1() 1(x)=1 if x is true, 1(x)=0 if x is false 1. Introduction The LMCCS consists of N+1 consequently ordered positions (nodes) Cn, n[1,N+1]. The first position C1 is the source and the last one CN+1 is the sink (see Figure 1). At each position C1,…,CN, elements from a set E={e1,…,eM} can be allocated. These elements provide connections (arcs) between the position in which they are allocated and further positions. Each element ei has K states, where state Gi of ei is a discrete random value with distribution depending on location of the element. For an ME located at node Cn: Pr{G i k} p ik (n ), K 1 pik (n ) 1. k 0 Gi=k for element ei allocated at position Cn implies that arcs exist from Cn to each of Cn+1, Cn+2,…,C(n+k), where (x)=min{x,N+1}. Gi=0 implies the total failure state of ei (no arcs exist from Cn). Note that though different MEs can have different number of states, one can define the same number of states for all the MEs without loss of generality. Indeed, if ME ei has Ki states and ME 3 em has Km states (KiKm), one can consider both MEs as having K=max{Ki,Km} states while assigning pik=0 for Kik<K. All the states Gi are independent. The system is failed if there is no path from C1 to CN+1. An example of the LMCCS is a set of radio relay stations with a transmitter allocated at C 1 and a receiver allocated in CN+1. Each station Cn (2nN) can have retransmitters generating signals that reach the next Gi stations. Note that Gi is a random value dependent on power and availability of retransmitter amplifiers as well as on signal propagation conditions. The aim of the system is to provide propagation of a signal from transmitter to receiver. The LMCCS was first introduced by Hwang & Yao [1] as a generalization of linear consecutive-k-out-of-n:F system and linear consecutively-connected system with 2-state elements, studied by Shanthikumar [2,3]. Algorithms for LMCCS reliability evaluation were developed by Hwang & Yao [1], Kossow & Preuss [4] and Zuo & Liang [5]. The problem of optimal element allocation in LMCCS was first formulated by Malinowski & Preuss in [6]. In this problem, elements with different characteristics should be allocated in positions C1,…,CN in such a way that maximizes the LMCCS reliability. A multi-start local search algorithm was suggested for solving this problem. In all the mentioned works, only the systems with M=N are considered in which only one ME is located in each position. In many cases, even for M=N, greater reliability can be achieved if some of MEs are gathered in the same position providing redundancy (in hot standby mode) than if all the MEs are evenly distributed between all the positions. Consider, for example, the simplest case in which two identical MEs should be allocated within LMCCS with N=2. Each ME has three states: state 0 (total failure), state 1 in which the ME is able to connect the position in which it is located with the next position and state 2 in which the ME is able to connect position it is located in with the next two positions. The 4 probabilities of being in each state don't depend on MEs allocation and are p0, p1 and p2, respectively. There are two possible allocations of the MEs within the LMCCS (figure 2): A. Both MEs are located in the first position. B. The MEs are located in the first and second positions. In case A, the LMCCS succeeds if at least one of the MEs is in state 2 and the system reliability is RA=2p2-p22. (1) In case B, the LCCS succeeds either when the ME located in the first position is in state 2 or if it is in state 1 and the second element is not in state 0. The system reliability in this case is RB=p2+p1(p1+p2). (2) By comparing (1) and (2), one can decide which allocation of the elements is preferable for any given p1 and p2. Figure 3 presents the decision curve R A=RB on the plane (p1,p2). Observe that for combinations of p1 and p2 located below the curve, the solution A is preferable while for combinations of p1 and p2 located above the curve, solution A provides lower system reliability than solution B. When a system operates in battle conditions or is affected by a corrosive medium or other hostile environment, the ability of a system to tolerate both the impact of external factors (attack) and internal causes (accidental failures or errors) should be considered. The measure of this ability is referred to as system survivability. An external factors usually cause failures of group of system elements sharing some common resource (allocated within the same protective casing, having the same power source, gathered geographically etc.). Therefore adding more redundant parallel elements will improve a system reliability but will not be effective from a vulnerability standpoint without sufficient separation between elements [7]. In LMCCS all the MEs located at the same node can be destroyed by a single external impact. 5 When the LMCCS nodes are vulnerable the allocation providing the greatest system survivability can change. In order to estimate the effect of the node vulnerability on the optimal ME allocation one has to include this parameter into LMCCS survivability model. Consider the same simplest LMCCS model (figure 2) in which each node (with all the MEs it contains) can be destroyed with probability . In case A, the LMCCS survives if node C1 is not destroyed and at least one of the MEs is in state 2. The system survivability is SA=(2p2-p22). (3) In case B, the LMCCS survives either when the node C1 is not destroyed and ME located in C1 is in state 2, or if both nodes C1 and C2 are not destroyed, the ME located in C1 is in state 1 and the ME located in C2 is not in state 0. The system survivability in this case is SB=p2+2p1(p1+p2). (4) By comparing (3) and (4), one can decide which allocation of the elements is preferable for any given , p1 and p2. Condition SASB can be rewritten as (2p2-p22)p2+2p1(p1+p2). and finally as p2(1-p2)/(p1(p1+p2)). (5) Figure 4 presents the maximal values of for whish SASB as function of variables p1 and p2. Observe that for given combinations of p1 and p2 the values of located below the curve correspond to cases when the solution A is preferable while the values of located above the curve correspond to cases when solution A provides lower system survivability than solution B. Note that the end point of each curve (p2) belongs to line =p2. Indeed, since p0+p1+p2=1, the maximal possible value of p1 for each given p2 is 1-p2. Substituting p1 with 1-p2 in Eq. (5) one obtains p2. 6 This paper presents an algorithm for optimal allocation of MEs in LMCCS in which the nodes vulnerability is taken into account. The algorithm finds the allocation of arbitrary number M of MEs with given state probability distributions (depending on MEs allocation) which maximizes system survivability. To evaluate the reliability of LMCCS with redundant MEs the procedure based on the use of a universal generating function is developed. A genetic algorithm based on principles of evolution is used as an optimization engine. The integer string solution encoding technique is adopted to represent element allocation in the GA. Section 2 of the paper presents a formulation of the optimal allocation problem. Section 3 describes the technique used for evaluating the LMCCS reliability for the given allocation of different MEs with the specified state distributions. Section 4 describes the optimization approach used and its adaptation to the problem formulated. The fifth section contains illustrative examples in which the best-obtained allocation solutions are presented for two different LMCCSs. 2. Problem formulation The MEs allocation problem can be considered as a problem of partitioning a set E of M elements into a collection of N mutually disjoint subsets En (1nN), i.e. such that N E n E, (6) E i E j ø, ij. (7) n 1 Each set En, corresponding to LMCCS position Cn, can contain from 0 to M elements. The partition of the set E can be represented by the vector H={h(i),1iM}, where h(i) is the number of the subset to which element i belongs. One can easily obtain the cardinality of each subset En as 7 M |En|= 1(h (i) n ). (8) i 1 In the general case, the probability of being at state k for any ME ei can depend on the position in which the ME is located (in the example presented above, each relay station can have different conditions of signal propagation and, therefore, different probability of connecting to the next stations even when using identical equipment). This can be taken into account by introducing vector-function Pi(n)={pi0(n),…,piK-1(n)} for each ME ei located in position n for 1nN. Each node can be destroyed with probability . The node destruction means simultaneous transition of all its MEs to state 0. For the given set of MEs with specified vectors P1(n),…, PM(n) representing distribution of their states and for the given node vulnerability , the only factor influencing the LMCCS survivability is the allocation of its elements H. Therefore, the optimal allocation problem can be formulated as follows. Find vector H* maximizing the LMCCS survivability S: H*( P1(n),…, PM(n))=arg{S(H, P1(n),…, PM(n))max}. (9) 3. LMCCS survivability estimation based on a universal generating function The procedure used in this paper for LMCCS survivability evaluation is based on the universal z-transform (also called u-function or UGF) technique, which was introduced in [8] and which proved to be very effective for reliability evaluation of different types of multi-state systems [7,9-13]. The u-function extends the widely known ordinary moment generating function. 8 3.1. u-function for individual ME The UGF of a discrete random value X is defined as a polynomial u (z) K 1 pk z x k , (10) k 0 where the variable X has K possible values and pk is the probability that X is equal to xk. Consider ME ei located at position Cn. In each state k (1k<K), the ME makes Cn connected with Cn+1,…,C(n+k). The probability of state k for ME ei located at Cn is pik(n). Let random value Tn be the number of the most remote position to which the arc from Cn exists. The polynomial uin(z) can represent all the possible states of the ME by relating the probabilities of each state to the value of Tn in this state: u in (z) K 1 pik (n )z (n k ) . (11) k 0 Note that the absence of any ME in position Cn implies that no arcs exist from Cn to any other position. This means that any arc reaching Cn has no continuation with probability 1. In this case, the corresponding u-function takes the form u0n(z)=zn. (12) 3.2. u-function for group of MEs allocated at the same position A composition operator is introduced in order to obtain the u-function of a subsystem containing a number of MEs located at the same position. This operator determines the ufunction for a group of MEs belonging to En using simple algebraic operations on the individual u-functions of MEs. The composition operator for a pair of MEs ei and em takes the form: K 1 (u in (z), u mn (z)) ( p ik (n )z K 1 K 1 k 0 pik (n )p mj (n )z k 0 j 0 9 ( n k ) K 1 , p mj (n )z (n j) ) j 0 max{ ( n k ), ( n j)} (13) The resulting polynomial relates probabilities of each of the possible combinations of states of the two MEs (obtained by multiplying the probabilities of corresponding states of each ME) with the number of the most remote position to which the arc from Cn exists when the MEs are in the given states. It can be easily seen that when one ME is in state k and the second ME is in state j,the arcs from Cn to Cn+1,…,Cmax{(n+k),(n+j)} exist. Note that for any uin(z) (u0n(z),uin(z))=uin(z). (14) One can see that the operator satisfies the following conditions: {u1 (z),..., u k (z), u k 1 (z),..., u v (z)} {{u1 (z),..., u k (z)}, {u k 1 (z),...., u v (z)}} (15) for arbitrary k. Therefore, it can be applied in sequence to obtain the u-function for an arbitrary group of MEs allocated at Cn: iE n (u in (z)) ( n K 1) k n q nk z k . (16) This polynomial determines the probabilistic distribution of Tn provided by all the MEs belonging to En. Observe that, after collecting like terms, the resulting polynomial (as well as polynomials uin(z) for individual MEs) can have no more than min{K,N-n+2} terms (corresponding to values of Tn{n,n+1,…,min{n+K,N+1}). 3.3. Incorporating node vulnerability into corresponding u-function When MEs are gethered within a single node Cn with vulnerability , this means that all these elements can be destroyed with probability . The probabilities qnk in (16) relate only to reliability of MEs (internal system reliability). In order to incorporate external destructive factors into the model, the probabilities qnk should be considered as conditional probabilities that the node Cn is connected with the corresponding set of nodes under assumption that the node survives external attacks during the system operation time. Unconditional probability that node 10 Cn is connected with the corresponding set of nodes is, therefore, equal to (1-)qnk=qnk. If the node Cn is destroyed its MEs cannot provide connection with any other node (this state corresponds to term zn in Eq. (16)). Therefore the u-function of MEs located at vulnerable node Cn takes form U n (z) ( ( n K 1) k n k q nk z ) ( n K 1) k n k n q nk z z ( n K 1) k n 1 q nk z k ( q nn )z n . (17) 3.4. u-function for the entire LMCCS Consider now the paths starting from C1 that are provided by elements allocated in subsequent positions. Let random value Yn be the number of the farthest position of a path from n C1 provided by MEs belonging to E i . All the paths provided by MEs from E1 are single arc i 1 paths and, therefore, Y1=T1. The probabilistic distribution of Y1 can be represented by u-function ~ U1 ( z ) which is equal to U1(z). For an arbitrary pair of adjacent positions Cn and Cn+1, the paths provided by the MEs n belonging to E i can be continued by arcs provided by MEs belonging to En+1 only if Yn>n (the i 1 path reaches Cn+1). If this condition is satisfied, the most remote position of a path from C 1 n 1 provided by subset of MEs Ei can be determined as Yn+1=max{Yn,Tn+1}. i 1 n In order to consider only the combinations of states of elements from Ei corresponding i 1 to cases in which paths from C1 to Cn+1 exist (Yn>n), we introduce the following operator ~ which eliminates the term with Yn=n from polynomial U n (z) : 11 ~ ( U n (z)) ( ( n K 1) j n j q njz ) ( n K 1) j n 1 q njz j . (18) Now, having the distribution of random value Yn and random value Tn+1, represented by ~ ~ U n (z) and Un+1(z) respectively, one can determine u-function U n 1 (z) representing distribution of random value Yn+1: ~ ~ U n 1 (z) =(( U n (z) ),Un+1(z)). (19) ~ Applying in sequence equation (19), one obtains U N (z) containing two terms corresponding ~ to YN=N and YN=N+1. ( U N (z) ) has only one term corresponding to the probability that the path from C1 to CN+1 exists. The coefficient of this term is equal to LMCCS survivability S. 3.5. Algorithm for determination of LMCCS survivability The following procedure determines the survivability of LMCCS with the given allocation of MEs. 1. Assign Un(z)=u0n(z)=zn for each n[1,N]. 2. For the given h(i) for each 1iM (vector H), determine uih(i)(z) using Eq. (11) and modify Uh(i)(z): Uh(i)(z)=(Uh(i)(z),uih(i)(z)). 3. Modify Uh(i)(z) using operator incorporating node vulnerability: Uh(i)(z)=(Uh(i)(z)). ~ 3. Assign U1 ( z ) =U1(z) and apply in sequence Eq. (19) for n=1,…,N-1. ~ 4. Obtain the coefficient of the resulting single term polynomial ( U N (z) ) as the LMCCS survivability. 3.6. Simple example 12 In order to illustrate the procedure, consider the LMCCS with N=M=2 and K=3 presented in Fig. 2. Pr{Gi=j}=pij(n) for ME ei allocated at position Cn. Case A corresponds to ME allocation represented by the vector HA={1,1}. The u-functions of the individual MEs allocated as determined by the vector HA are: u11(z)=p10(1)z1+p11(1)z2+p12(1)z3, u21(z)=p20(1)z1+p21(1)z2+p22(1)z3, The u-functions representing distributions of random values T1 and T2 for the groups of MEs allocated at the same positions are: (u11(z),u21(z))=p10(1)p20(1)z1+[p10(1)p21(1)+p11(1)(1-p22(1))]z2+[p12(1)+p22(1)-p12(1)p22(1)]z3, U1(z)=((u11(z),u21(z)))= [+p10(1)p20(1)]z1+[p10(1)p21(1)+p11(1)(1-p22(1))]z2+ [p12(1)+p22(1)-p12(1)p22(1)]z3, U2(z)=(u02(z))=(z2)=(+)z2=z2. The u-functions representing random values Y1 and Y2 are: ~ U1 ( z ) =U1(z), ~ ( U1 ( z ) )=[p10(1)p21(1)+p11(1)(1-p22(1))]z2+[p12(1)+p22(1)-p12(1)p22(1)]z3, ~ ~ U 2 (z) =(( U1 ( z ) ),U2(z))= [p10(1)p21(1)+p11(1)(1-p22(1))]z2+[p12(1)+p22(1)-p12(1)p22(1)]z3, ~ ( U 2 (z) )=[p12(1)+p22(1)-p12(1)p22(1)]z3. ~ Finally, the LMCCS survivability obtained from ( U 2 (z) ) is: SA=[p12(1)+p22(1)-p12(1)p22(1)]. If p12(1)=p22(1)=p2 as in Eq. (3), SA=(2p2-p22). Case B corresponds to ME allocation represented by the vector HB={1,2}. The u-functions of the individual MEs allocated as determined by the vector HB are: u11(z)=p10(1)z1+p11(1)z2+p12(1)z3, u22(z)=p20(2)z2+[p21(2)+p22(2)]z3, The u-functions representing distribution of random values T1 and T2 are: 13 U1(z)=(u11(z))=[+p10(1)]z1+p11(1)z2+p12(1)z3, U2(z)=(u22(z))=[+p20(2)]z2+[p21(2)+p22(2)]z3, The u-functions representing random values Y1 and Y2 are: ~ U1 ( z ) =U1(z), ~ ( U1 ( z ) )=p11(1)z2+p12(1)z3, ~ ~ U 2 (z) =(( U1 ( z ) ),U2(z))=p11(1)[+p20(2)]z2+{2p11(1)[p21(2)+p22(2)] +p12(1)[+p20(2)]+2p12(1)[p21(2)+p22(2)]}z3, ~ ( U 2 (z) )={2p11(1)p21(2)+2p11(1)p22(2)+p12(1)+2p12(1)p20(2) +2p12(1)p21(2)+2p12(1)p22(2)}z3. ~ Since =1- the LMCCS survivability obtained from ( U 2 (z) ) is: SB=p12(1)+2{p11(1)p21(2)+p11(1)p22(2)-p12(1)+p12(1)(p20(2)+p21(2)+p22(2)]}= p12(1)+2{p11(1)p21(2)+p11(1)p22(2)}. If the MEs are identical i.e. p11(1)=p21(2)=p1 and p12(1)=p22(2)=p2 as in Eq. (4), SB=p2+2p1(p1+p2). 4. Optimization technique Finding the optimal ME allocation in LMCCS is a complicated combinatorial optimization problem having NM possible solutions. An exhaustive examination of all these solutions is not realistic even for a moderate number of positions and elements, considering reasonable time limitations. As in most combinatorial optimization problems, the quality of a given solution is the only information available during the search for the optimal solution. Therefore, a heuristic search algorithm is needed which uses only estimates of solution quality and which does not require derivative information to determine the next direction of the search. 14 The recently developed family of genetic algorithms is based on the simple principle of evolutionary search in solution space. GAs have been proven to be effective optimization tools for a large number of applications. Successful applications of GAs in reliability engineering are reported in [7,9-17]. It is recognized that GAs have the theoretical property of global convergence [18]. Despite the fact that their convergence reliability and convergence velocity are contradictory, for most practical, moderately sized combinatorial problems, the proper choice of GA parameters allows solutions close enough to the optimal one to be obtained in a short time. 4.1. Genetic Algorithm Basic notions of GAs are originally inspired by biological genetics. GAs operate with "chromosomal" representation of solutions, where crossover, mutation and selection procedures are applied. "Chromosomal" representation requires the solution to be coded as a finite length string. Unlike various constructive optimization algorithms that use sophisticated methods to obtain a good singular solution, the GA deals with a set of solutions (population) and tends to manipulate each solution in the simplest manner. A brief introduction to genetic algorithms is presented in [19]. More detailed information on GAs can be found in Goldberg’s comprehensive book [20], and recent developments in GA theory and practice can be found in books [17,18]. The steady state version of the GA used in this paper was developed by Whitley [21]. As reported in [22] this version, named GENITOR, outperforms the basic “generational” GA. The structure of steady state GA is as follows: Algorithm GENITOR 1. Generate an initial population of Ns randomly constructed solutions (strings) and evaluate their fitness. (Unlike the “generational” GA, the steady state GA performs the evolution search 15 within the same population improving its average fitness by replacing worst solutions with better ones). 2. Select two solutions randomly and produce a new solution (offspring) using a crossover procedure that provides inheritance of some basic properties of the parent strings in the offspring. The probability of selecting the solution as a parent is proportional to the rank of this solution. (All the solutions in the population are ranked by increasing order of their fitness). Unlike the fitness-based parent selection scheme, the rank-based scheme reduces GA dependence on the fitness function structure, which is especially important when constrained optimization problems are considered [23]. 3. Allow the offspring to mutate with given probability Pm. Mutation results in slight changes in the offspring structure and maintains diversity of solutions. This procedure facilitates jumps in the solution space, which helps the GA to avoid premature convergence to a local optimum [20]. The positive changes in the solution code created by the mutation can be later propagated throughout the population via crossovers. 4. Decode the offspring to obtain the objective function (fitness) values. These values are a measure of quality, which is used in comparing different solutions. 5. Apply a selection procedure that compares the new offspring with the worst solution in the population and selects the one that is better. The better solution joins the population and the worse one is discarded. If the population contains equivalent solutions following the selection process, redundancies are eliminated and, as a result, the population size decreases. Note that each time the new solution has sufficient fitness to enter the population, it alters the pool of prospective parent solutions and increases the average fitness of the current population. The average fitness increases monotonically (or, in the worst case, does not vary) during each genetic cycle (steps 2-5). 6. Generate new randomly constructed solutions to replenish the population after repeating steps 2-5 Nrep times (or until the population contains a single solution or solutions with equal 16 quality). Run the new genetic cycle (return to step 2). In the beginning of a new genetic cycle, the average fitness can decrease drastically due to inclusion of poor random solutions into the population. These new solutions are necessary to bring into the population new "genetic material" which widens the search space and, like a mutation operator, prevents premature convergence to the local optimum. 7. Terminate the GA after Nc genetic cycles. End_Algorithm The final population contains the best solution achieved. It also contains different nearoptimal solutions, which may be of interest in the decision-making process. 4.2. Solution representation and basic GA procedures To apply the genetic algorithm to a specific problem, one must define a solution representation and decoding procedure, as well as specific crossover and mutation procedures. As it was shown in section 2, any arbitrary M-length vector H with elements h(i) belonging to the range [1,N] represents a feasible allocation of MEs. Such vectors can represent each one of the possible NM different solutions. The fitness of each solution is equal to the survivability of LMCCS with allocation, represented by the corresponding vector H. To estimate the LMCCS survivability for the arbitrary vector H, one should apply the procedure presented in section 3. The random solution generation procedure provides solution feasibility by generating vectors of random integer numbers within the range [1,N]. It can be seen that the following crossover and mutation procedures also preserve solution feasibility. The crossover operator for given parent vectors P1, P2 and the offspring vector O is defined as follows: first P1 is copied to O, then all numbers of elements belonging to the fragment between a and b positions of the vector P2 (where a and b are random values, 1a<bM) are copied to the corresponding positions of O. The following example illustrates the crossover procedure for M=6, N=4: 17 P1=2 4 1 4 2 3 P2=1 1 2 3 4 2 O=2 4 2 3 4 3 The mutation operator moves the randomly chosen ME to the adjacent position (if such a position exists) by modifying a randomly chosen element h(i) of H using rule h(i)=max{h(i)-1,1} or rule h(i)=min{h(i)+1,N} with equal probability. The vector O in our example can take the following form after applying the mutation operator : O=2 3 2 3 4 3. 5. Illustrative examples 5.1. Two ME allocation problems. Consider the ME allocation problem presented in [6], in which N=M=13 and reliability characteristics of MEs do not depend on their allocation. All the MEs have two states with nonzero probabilities. The state probability distributions of the MEs are presented in Table 1. In order to compare the solution presented in [6] (solution A) with the solution obtained by the GA (solution B), we first solve the allocation problem for node vulnerability =0 when allocation of no more than one ME at each position is allowed. This is done by imposing a penalty on the solutions in which more than one ME is allocated in the same position. Both solutions are presented in Table 2. One can see that solution B which was obtained by the GA is better. This solution considerably improves when all the limitations on the ME allocation are removed. Observe that the best solution obtained by the GA (solution C), in which only 5 out of 13 positions are occupied by the MEs, provides much greater reliability than solution B. (Note that when =0 the system survivability is equal to its reliability since only internal factors can cause the system failure). The ME allocation solutions obtained for =0.06 and =0.3 (solutions D and E respectively) are also presented in Table 2. In Figure 5 the three optimal solutions obtained for different values 18 of node vulnerability are presented in the form of graphs. In these graphs maximal length arcs provided by each ME in operable condition are depicted. Note that each solution provides the greatest possible system survivability only for the given value of . When varies, the optimal ME allocation changes. One can see the LMCCS survivability obtained for solutions C, D and E as function of variable node vulnerability in Figure 6. Observe that the greater the node vulnerability, the greater the number of occupied nodes in the optimal solution. Indeed, by increasing ME separation the system tries to compensate its increasing vulnerability. In the second example, LMCCS consists of N=20 positions and M=16 MEs. There are four groups of identical MEs (four elements in each group). The ME state distributions depend on the ME allocation. All the positions are divided into three groups, such that the positions belonging to the same group have the same influence on the MEs state distributions. The probabilistic distributions of MEs states are presented in Table 3. Two ME allocation solutions obtained by the GA for =0 and =0.06 (solutions A and B respectively) are presented in Table 4. Observe that in the solution B all the MEs are totally separated. While for invulnerable system (=0) the reliability of the solution B is slightly lower than the reliability of the solution A, for =0.06 the solution B provides system survivability increase by 12.7% over solution A. 5.2. Computational Effort and Algorithm Consistency The C language realization of the algorithm was tested on a Pentium II PC on a set of 20 randomly generated problems with 10N25 and 10M30. Different GA parameters were tested in the ranges 50NS300, 500Nrep10000, 5Nc200 and 0Pm1. The chosen combination of parameters that provided the GA convergence to the best achieved solutions by 19 the shortest time in 75% of the tests is NS=100, Nrep=2000, Nc=200 and Pm=1. The time taken to obtain the best-in-population solution (time of the last modification of the best solution obtained) for the GA with the chosen parameters did not exceed 200 seconds. When this GA was tested on the first and second problems presented in section 5.1 the times taken to obtain the best-inpopulation solutions were 40 seconds and 90 seconds respectively. To demonstrate the consistency of the suggested algorithm, we repeated the GA 100 times with different starting solutions (initial population) for the second problem (M=16, N=20). The coefficient of variation was calculated for fitness values of best-in-population solutions obtained during the genetic search by different GA search processes. The variation of this index during the GA procedure is presented in Fig. 7. One can see that the standard deviation of the final solution fitness does not exceed 1.7 % of its average value. 6. Conclusions The paper presents an algorithm for evaluating survivability of linear multistate consecutively-connected system in which any system node can be destroyed by external impact. An example of such system is a set of vulnerable radio relay stations in which multistate retransmitters with different characteristics are allocated. The problem of finding an allocation of the retransmitters among the system nodes that provides the greatest system survivability is formulated. The procedure for solving this problem is suggested which uses a genetic algorithm as the optimization tool. It is shown that in many cases greater survivability can be achieved if some of retransmitters are gathered in the same node providing redundancy than if all the retransmitters are evenly distributed among all the nodes. The greater the node vulnerability, the greater the number of occupied nodes in the optimal solution since by increasing retransmitter separation the system tries to compensate its increasing vulnerability. 20 References [1] F. Hwang, Y. Yao, Multistate consecutively-connected systems , IEEE Transactions on Reliability, vol. 38, 1989, pp. 472-474. [2] J. Shanthikumar, A recursive algorithm to evaluate the reliability of a consecutive-k-out-of-n:F system, IEEE Transactions on Reliability, vol. R-31, 1982, pp. 442-443. [3] J. Shanthikumar, Reliability of systems with consecutive minimal cutsets , IEEE Transactions on Reliability, vol. R-36, 1987, pp. 546-550. [4] A. Kossow, W. Preuss, Reliability of linear consecutively-connected systems with multistate components, IEEE Transactions on Reliability, vol. 44, 1995, pp. 518-522. [5] M. Zuo, M. Liang, Reliability of multistate consecutively-connected systems, Reliability Engineering & System Safety, vol. 44, 1994, pp. 173-176. [6] J. Malinowski, W. Preuss, Reliability increase of consecutive-k-out-of-n:F and related systems through components' rearrangement, Microelectronics and Reliability, vol. 36, 1996, pp. 1417-1423. [7] G. Levitin, A. Lisnianski, Optimal separation of elements in vulnerable multi-state systems, Reliability Engineering & System Safety, vol. 73, 2001, pp. 55-66. [8] I. A. Ushakov, Universal generating function, Sov. J. Computing System Science, vol. 24, No 5, 1986, pp. 118-129. [9] G. Levitin, A. Lisnianski, H. Beh-Haim, D. Elmakis, Redundancy Optimization for Series-parallel Multi-state Systems, IEEE Transactions on Reliability, vol. 47, 1998, pp. 165-172. [10] G. Levitin, Multistate series-parallel system expansion-scheduling subject to availability constraints, IEEE Transactions on Reliability, vol. 49, 2000, pp. 71-79. [11] G. Levitin, A. Lisnianski, A new approach to solving problems of multi-state system reliability optimization, Quality and Reliability Engineering International, vol. 47, 2001, pp. 93-104. [12] G. Levitin, A. Lisnianski, Reliability optimization for weighted voting system, Reliability Engineering & System Safety, vol. 71, 2001, pp. 131-138. [13] G. Levitin, A. Lisnianski, Structure Optimization of Multi-state System with Two Failure Modes, Reliability Engineering & System Safety, vol. 72, 2001, pp. 75-89. [14] L. Painton and J. Campbell, Genetic algorithm in optimization of system reliability, IEEE Trans. Reliability, 44, 1995, pp. 172-178. [15] D. Coit and A. Smith, Reliability optimization of series-parallel systems using genetic algorithm, IEEE Trans. Reliability, 45, 1996, pp. 254-266. [16] M. Gen and J. Kim, GA-based reliability design: state-of-the-art survey, Computers & Ind. Engng, 37, 1999, pp. 151-155. [17] M. Gen and R. Cheng, Genetic Algorithms and engineering optimization, John Wiley & Sons, New York, 2000. [18] T. Bck, Evolutionary Algorithms in Theory and Practice. Evolution Strategies. Evolutionary Programming. Genetic Algorithms, Oxford University Press, 1996. [19] S. Austin, An introduction to genetic algorithms, AI Expert, 5, 1990, pp. 49-53. [20] D. Goldberg, Genetic Algorithms in Search, Optimization and Machine Learning, Addison Wesley, Reading, MA, 1989. [21] D. Whitley, The GENITOR Algorithm and Selective Pressure: Why Rank-Based Allocation of Reproductive Trials is Best. Proc. 3th International Conf. on Genetic Algorithms. D. Schaffer, ed., pp. 116-121. Morgan Kaufmann, 1989. [22]. G. Syswerda, A study of reproduction in generational and steady-state genetic algorithms, in G.J.E. Rawlings (ed.), Foundations of Genetic Algorithms, Morgan Kaufmann, San Mateo, CA, 1991. [23]. D. Powell, M. Skolnik, Using genetic algorithms in engineering design optimization with non-linear constraints, Proc. Of the fifth Int. Conf. On Genetic Algorithms, Morgan Kaufmann, 1993, pp. 424-431. 21 Figure Captions Figure 1: LMCCS structure. Figure 2: Two possible allocations of MEs in LMCCS with N=M=2. Figure 3: Comparison of two possible allocations of MEs in LMCCS with N=M=2. Figure 4: Comparison of two possible allocations of MEs in LMCCS with vulnerable nodes and N=M=2. Figure 5: Three ME allocations obtained by the GA for =0 (C), =0.06 (D) and =0.3 (E). Figure 6: LMCCS survivability as function of node vulnerability for the three ME allocations obtained by the GA for =0 (C), =0.06 (D) and =0.3 (E). Figure 7: Coefficient of variation of best-in-population solution fitness obtained by 100 different search processes as function of number of crossovers. 22 Table 1. MEs' state distributions for the first allocation problem. Element e1 e2 e3 e4 e5 e6 e7 e8 e9 e10 e11 e12 e13 0 1 No of state 2 3 4 0.70 0.65 0.60 0.55 0.50 0.45 0.40 0.35 0.30 0.25 0.20 0.15 0.10 0.00 0.00 0.00 0.00 0.50 0.55 0.00 0.00 0.00 0.75 0.00 0.00 0.00 0.00 0.00 0.00 0.45 0.00 0.00 0.00 0.00 0.70 0.00 0.00 0.85 0.00 0.30 0.00 0.40 0.00 0.00 0.00 0.00 0.65 0.00 0.00 0.80 0.00 0.00 0.00 0.35 0.00 0.00 0.00 0.00 0.60 0.00 0.00 0.00 0.00 0.00 0.90 Table 2. Solutions of the first allocation problem. Node Solution A C1 C2 C3 C4 C5 C6 C7 C8 C9 C10 C11 C12 C13 S for =0 13 5 1 4 12 8 7 2 9 3 11 6 10 0.58756 ME allocation Solution B Solution C Solution D 13 6 5 1 12 3 11 2 8 7 4 9 10 0.59201 4,9,12 13 1,3,11 2,7,8 5,6,10 0.72319 23 13 1,2,11 5,6,12 4,9 7,10 3,8 0.70762 Solution E 13 2 11 3,4 1,6,12 5,9 7,10 8 0.648004 Table 3. MEs' state distributions for the second allocation problem. Positions 1, 2, 3, 8, 13 6, 7, 10, 11, 14, 18, 19, 20 4, 5, 9, 12, 15, 16, 17 Elements e1-e4 e5-e8 e9-e12 e13-e16 e1-e4 e5-e8 e9-e12 e13-e16 e1-e4 e5-e8 e9-e12 e13-e16 No of state 0 0.03 0.05 0.02 0.05 0.03 0.05 0.05 0.05 0.05 0.08 0.05 0.10 1 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.10 0.30 0.22 0.95 0.05 2 0.15 0.00 0.05 0.95 0.85 0.10 0.85 0.85 0.65 0.00 0.00 0.85 Table 4. Solutions of the second allocation problem. Position C1 C2 C3 C4 C5 C6 C7 C8 C9 C10 C11 C12 C13 C14 C15 C16 C17 C18 C19 C20 S for =0.00 S for =0.06 ME allocation Solution A Solution B 4, 14 9, 11 1,7 12 8 3 10 5 13, 15 6, 16 2 0.96291 0.69539 10 11 1 13 9 8 12 7 4 2 6 15 14 16 5 3 0.93653 0.78428 24 3 0.65 0.10 0.93 0.00 0.12 0.05 0.10 0.00 0.00 0.70 0.00 0.00 4 0.17 0.85 0.00 0.00 0.00 0.80 0.00 0.00 0.00 0.00 0.00 0.00
© Copyright 2026 Paperzz