232
Views
6
CrossRef citations to date
0
Altmetric
Original Articles

A particle swarm model for estimating reliability and scheduling system maintenance

, &
Pages 349-377 | Received 24 Dec 2013, Accepted 25 May 2014, Published online: 26 Jun 2014

References

  • Alhazmi, O. H., Y. K. Malaiya, and I. Ray. 2007. “Measuring, Analyzing and Predicting Security Vulnerabilities in Software Systems.” Computers & Security 26 (3): 219–228.
  • Bevilacqua, M., and M. Braglia. 2000. “The Analytic Hierarchy Process Applied to Maintenance Strategy Selection.” Reliability Engineering & System Safety 70 (1): 71–83.
  • Brocklehurst, S., B. Littlewood, T. Olovsson, and E. Jonsson. 1994. “On Measurement of Operational Security.” IEEE Aerospace and Electronic Systems Magazine 9 (10): 7–16.
  • Camci, F. 2008. “Analysis of Velocity Calculation Methods in Binary PSO on Maintenance Scheduling.” In First International Conference on the Applications of Digital Information and Web Technologies, ICADIWT 2008, Ostrava, August 4–6, 12–17. IEEE.
  • Canfield, R. V. 1986. “Cost Optimization of Periodic Preventive Maintenance.” IEEE Transactions on Reliability 35 (1): 78–81.
  • Cheng, C.-Y., and M. C. Chen. 2003. “The Periodic Preventive Maintenance Policy for Deteriorating Systems by Using Improvement Factor Model.” International Journal of Applied Science and Engineering 1 (2): 114–122.
  • Cheung, R. C. 1980. “A User-Oriented Software Reliability Model.” IEEE Transactions on Software Engineering SE-6 (2): 118–125.
  • De Carvalho, A. B., A. Pozo, and S. R. Vergilio. 2010. “A Symbolic Fault-Prediction Model Based on Multiobjective Particle Swarm Optimization.” Journal of Systems and Software 83 (5): 868–882.
  • Eick, S. G., T. L. Graves, A. F. Karr, J. S. Marron, and A. Mockus. 2001. “Does Code Decay? Assessing the Evidence from Change Management Data.” IEEE Transactions on Software Engineering 27 (1): 1–12.
  • Engelbrecht, A. P. 2005. Fundamentals of Computational Swarm Intelligence. Vol. 1. Chichester: Wiley.
  • Everard, A., and D. F. Galletta. 2006. “How Presentation Flaws Affect Perceived Site Quality, Trust, and Intention to Purchase from an Online Store.” Journal of Management Information Systems 22 (3): 56–95.
  • Fogg, B. J., and H. Tseng. 1999. “The Elements of Computer Credibility.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Pittsburgh, PA, 80–87. New York: ACM.
  • Garg, A., and S. G. Deshmukh. 2006. “Maintenance Management: Literature Review and Directions.” Journal of Quality in Maintenance Engineering 12 (3): 205–238.
  • Granger, S. 2001. “Social Engineering Fundamentals, Part I: Hacker Tactics.” Security Focus, December 18. http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics
  • Green, R. C., L. Wang, M. Alam, and C. Singh. 2011. “State Space Pruning for Reliability Evaluation Using Binary Particle Swarm Optimization.” In Power Systems Conference and Exposition (PSCE), 2011 IEEE/PES, Phoenix, AZ, March, 1–7. IEEE.
  • He, Z., F. Shu, Y. Yang, M. Li, and Q. Wang. 2012. “An Investigation on the Feasibility of Cross-Project Defect Prediction.” Automated Software Engineering 19 (2): 167–199.
  • Honeyman, P., G. A. Schwartz, and A. Van Assche 2007. “Interdependence of Reliability and Security.” In Proceedings of the 6th Workshop on Economics of Information Security. WEIS, Pittsburgh, PA, June. http://www.weis2007.econinfosec.org/papers/71.pdf
  • ISO/IEC-14764, IEEE Std. 14764-2006. 2006. Software Engineering—Software Life Cycle Processes—Maintenance. Geneva: IEEE. doi:10.1109/IEEESTD.2006.235774.
  • Jin, C., E.-M. Dong, and L.-N. Qin. 2010. “Software Fault Prediction Model Based on Adaptive Dynamical and Median Particle Swarm Optimization.” In Second International Conference on Multimedia and Information Technology (MMIT), Vol. 1, Kaifeng, April 24–25, 44–47. IEEE.
  • Jøsang, A., R. Ismail, and C. Boyd. 2007. “A Survey of Trust and Reputation Systems for Online Service Provision.” Decision Support Systems 43 (2): 618–644.
  • Jureczko, M., and L. Madeyski. 2010. “Towards Identifying Software Project Clusters with Regard to Defect Prediction.” In Proceedings of the 6th International Conference on Predictive Models in Software Engineering, Timişoara, September 12–13, 9. ACM.
  • Kececioglu, D. 1999. Reliability Engineering Handbook. Vol. 1. Engelwood Cliffs, NJ: PTR Prentice-Hall. ISBN 0-13-772294-X.
  • Kennedy, J., and R. C. Eberhart. 1995. “Particle Swarm Optimization.” Proceedings of the IEEE International Conference on Neural Networks 4: 1942–1948.
  • Koopman, P. 1998. “Toward a Scalable Method for Quantifying Aspects of Fault Tolerance, Software Assurance, and Computer Security.” In Proceedings of the Computer Security, Dependability and Assurance: From Needs to Solutions, Williamsburg, VA, 103–131. Washington, DC: IEEE.
  • Krasner, G. E., and S. T. Pope. 1988. “A Description of the Model-View-Controller User Interface Paradigm in the Smalltalk-80 System.” Journal of Object Oriented Programming 1 (3): 26–49.
  • Krekora, P., and D. Caban. 2007. “Dependability Analysis of Reconfigurable Information Systems.” In 2nd International Conference on Dependability of Computer Systems, DepCoS-RELCOMEX’07, Szklarska, June 14–16, 177–184. IEEE.
  • Land, R. 2002. “Software Deterioration and Maintainability – A Model Proposal.” In Proceedings of Second Conference on Software Engineering Research and Practise in Sweden (SERPS).
  • Leng, K., P. Ren, and L. Gao. 2006. “A Novel Approach to Integrated Preventive Maintenance Planning and Production Scheduling for A Single Machine Using the Chaotic Particle Swarm Optimization Algorithm.” In The Sixth World Congress on Intelligent Control and Automation, WCICA 2006, Vol. 2, Dalian, 7816–7820. IEEE. doi:10.1109/WCICA.2006.1713491.
  • Levitin, G., A. Lisnianski, H. Ben Haim, and D. Elmakis. 2000. “Genetic Algorithm and Universal Generating Function Technique for Solving Problems of Power System Reliability Optimization.” In International Conference on Electric Utility Deregulation, DRPT 2000, London, 582–586. IEEE. doi:10.1109/DRPT.2000.855730.
  • Li, C.-H. 2007. “Preventive Maintenance Scheduling via Particle Swarm Optimization Method.” International Multi Conference of Engineers and Computer Scientists, Kowloon, March 21–23.
  • Lindner, F. F. X. 2006. “Software Security Is Software Reliability.” Communications of the ACM 49 (6): 57–61.
  • Littlewood, B., S. Brocklehurst, N. Fenton, P. Mellor, S. Page, D. Wright, J. Dobson, J. McDermid, and D. Gollmann. 1993. “Towards Operational Measures of Computer Security.” Journal of Computer Security 2 (2): 211–229.
  • Madan, B. B., K. Goševa-Popstojanova, K. Vaidyanathan, and K. S. Trivedi. 2004. “A Method for Modeling and Quantifying the Security Attributes of Intrusion Tolerant Systems.” Performance Evaluation 56 (1–4): 167–186.
  • Miranda, V., L. de Magalhaes Carvalho, M. A. da Rosa, A. M. Leite da Silva, and C. Singh. 2009. “Improving Power System Reliability Calculation Efficiency with EPSO Variants.” IEEE Transactions on Power Systems 24 (4): 1772–1779.
  • Mobley, R. K. 2002. An Introduction to Predictive Maintenance. Amsterdam: Butterworth-Heinemann.
  • Moustafa, M. S., E. Y. Maksoud, and S. Sadek. 2004. “Optimal Major and Minimal Maintenance Policies for Deteriorating Systems.” Reliability Engineering & System Safety 83 (3): 363–368.
  • Munson, J. C., and S. Elbaum. 1999. “Software Reliability as a Function of User Execution Patterns.” In Proceedings of the 32nd Annual Hawaii International Conference on System Sciences, 1999, HICSS-32, 12pp. IEEE.
  • Musa, J. D. 2001. Software Reliability Engineering: More Reliability Software Faster and Cheaper. 2nd ed. Bloomington, IL: Author House. ISBN 1-4184-9387-2.
  • Nakagawa, T. 1980. “Mean Time to Failure with Preventive Maintenance.” IEEE Transactions on Reliability R-29 (4): 341.
  • Ortalo, R., Y. Deswarte, and M. Kaaniche. 1999. “Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security.” IEEE Transactions on Software Engineering 25 (5): 633–650.
  • Parnas, D. L. 1994. “Software Aging.” In Proceedings of the 16th International Conference on Software Engineering, Sorrento, May 16–21, 279–287. IEEE Computer Society Press.
  • Pitt, C. 2012. “Introduction to MVC.” In Pro PHP MVC, edited by E. Buckingham, 1–7. New York: Springer.
  • Raghavan, S. A., and V. S. Murthy. 1990. “Developing Support Agents for Software Maintenance: A Practical Approach.” In Proceedings of the Twenty-Third Annual Hawaii International Conference on System Sciences, 1990, Vol. 2, Kailua-Kona, HI, January 2–5, 82–92. IEEE.
  • Raj Kiran, N., and V. Ravi. 2008. “Software Reliability Prediction by Soft Computing Techniques.” Journal of Systems and Software 81 (4): 576–583.
  • Rempel, J. K., J. G. Holmes, and M. P. Zanna. 1985. “Trust in Close Relationships.” Journal of Personality and Social Psychology 49 (1): 95–112.
  • Reutter III, J. 1981. “Maintenance is a Management Problem and a Programmer’s Opportunity.” In Proceedings of the National Computer Conference, Reston, VA, May 4–7, 343–347. ACM.
  • Rotter, J. B. 1980. “Interpersonal Trust, Trustworthiness, and Gullibility.” American Psychologist 35 (1): 1–7.
  • Ryley, S. 2001. “Corporate Portal Development: A Practical Approach Ensures Real Business Benefits.” Business Information Review 18 (2): 28–34.
  • Saaty, T. 1980. The Analytic Hierarchy Process. New York: McGraw Hill Company.
  • Salgado, M., W. M. Caminhas, and B. R. Menezes. 2009. “Computational Intelligence in Reliability and Maintainability Engineering.” In Annual Reliability and Maintainability Symposium, RAMS 2009, Fort Worth, TX, January 26–29, 304–309. IEEE.
  • Sandhu, R. S. 1990. “Separation of Duties in Computerized Information Systems.” Proceedings of IFIP WG11.3 Workshop on Database Security, Halifax, September 18–21, 179–190.
  • Sheta, A. 2006. “Reliability Growth Modeling for Software Fault Detection Using Particle Swarm Optimization.” In IEEE Congress on Evolutionary Computation, CEC 2006, Vancouver, BC, 3071–3078. IEEE. doi:10.1109/CEC.2006.1688697.
  • Singh Dahiya, S., J. K. Chhabra, and S. Kumar. 2007. “Use of Genetic Algorithm for Software Maintainability Metrics’ Conditioning.” In International Conference on Advanced Computing and Communications, ADCOM 2007, 87–92. IEEE.
  • Suh, B., and I. Han. 2003. “The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce.” International Journal of Electronic Commerce 7: 135–161.
  • Sullivan, G. P., R. Pugh, A. P. Melendez, and W. D. Hunt. 2002. Operations & Maintenance Best Practices. Pacific Northwest National Laboratory (Prepared for the Federal Energy Management Program U.S. Department of Energy). http://www.pnl.gov/main/publications/external/technical_reports/pnnl-13890.pdf
  • Tezcan, N., and W. Wang. 2007. “Distributed Coordination of Sensors for End-To-End Reliable Event and Query Delivery.” In Wireless Communications and Networking Conference, WCNC 2007, Kowloon, March 11–15, 2986–2991. IEEE.
  • Tseng, S., and B. J. Fogg. 1999. “Credibility and Computing Technology.” Communications of the ACM 42 (5): 39–44.
  • Turhan, B., T. Menzies, A. B. Bener, and J. Di Stefano. 2009. “On the Relative Value of Cross-Company and Within-Company Data for Defect Prediction.” Empirical Software Engineering 14 (5): 540–578.
  • Urhuogo, I., V. Vann, and H. C. Chandan. 2012. “Information Systems Maintenance: The Application of Total Quality Management Construct.” Journal of Business 3 (3): 1–15.
  • Wang, C.-H., and T.-W. Lin. 2010. “Optimizing Minimize Periodic Preventive Maintenance Model for Series-Parallel Systems Based on Particle Swarm Optimization.” In 40th International Conference on Computers and Industrial Engineering (CIE), Awaji, July 25–28, 1–6. IEEE.
  • Wang, C.-H., and T.-W. Lin. 2011. “Improved Particle Swarm Optimization to Minimize Periodic Preventive Maintenance Cost for Series-Parallel Systems.” Expert Systems with Applications 38 (7): 8963–8969.
  • Wang, Y. D., and H. H. Emurian. 2005. “An Overview of Online Trust: Concepts, Elements, and Implications.” Computers in Human Behavior 21 (1): 105–125.
  • Yau, S. S., and J. S. Collofello. 1980. “Some Stability Measures for Software Maintenance.” IEEE Transactions on Software Engineering SE-6 (6): 545–552.
  • Yeh, W.-C., Y.-C. Lin, Y. Y. Chung, and M. Chih. 2010. “A Particle Swarm Optimization Approach Based on Monte Carlo Simulation for Solving the Complex Network Reliability Problem.” IEEE Transactions on Reliability 59 (1): 212–221.
  • Zamojski, W., and D. Caban. 2006. “Introduction to the Dependability Modelling of Computer Systems.” In International Conference on Dependability of Computer Systems (DepCos-RELCOMEX’06), Szklarska Poreba, May 25–27, 100–109. IEEE.
  • Zimmermann, T., N. Nagappan, H. Gall, E. Giger, and B. Murphy. 2009. “Cross-Project Defect Prediction: A Large Scale Experiment on Data Vs. Domain Vs. Process.” In Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, Amsterdam, August 24–28, 91–100. ACM.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.