Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 568-572.

• Interdiscipline & Application • Previous Articles     Next Articles

Analysis on Mathematical Models of Maintenance Decision and Efficiency Evaluation of Computer Hardware

ZHAI Yong, LIU Jin,CHEN Jie, LIU Lei,XING Xu-chao,DU Jiang   

  1. National Geomatics Center of China,Beijing 100830,China
  • Online:2018-06-20 Published:2018-08-03

Abstract: Combing the actual conditions of computer hardware maintenance and on the basis of the reliability and avai-lability theory of equipmentl subsystem,a calculation method of maintenance importance variables which include equipment / subsystem asset salvage value,importance of business and unreliability was analyzed in accordance with the principle of maintenance funding efficiency optimization.Based on this,the mathematical model for evaluating the maintenance requirement of equipment/subsystem was researched and constructed,and then the maintenance decision algorithm was put forward.Finally,combining the instances,the paper proposed the method of maintenance efficiency eva-luation by using reliability theory of computer equipment/subsystem and the availability analysis based on Markov chain,providing certain inspiration for quantitative assessment of computer hardware maintenance.

Key words: Reliability, Availability, Asset salvage value, Importance of business, Evaluation of maintenance importance, Maintenance decision, Efficiency evaluation

CLC Number: 

  • TP301
[1]卢明银,徐人平,李乃梁,等.系统可靠性[M].北京:机械工业出版社,2008.
[2]王海鹏,周兴社,张涛,等.面向用户的普适计算系统可用性度量模型[J].计算机科学,2006,33(11):89-93.
[3]刘慧敏.以ITIL为基础的IT服务管理应用研究[J].计算机技术与发展,2012,22(5):195-197.
[4]PECHT M,KAPUR K C,KANG R,et al.Foundations of Reliability Engineering[M].China:Publishing House of Electronics Industry,2011.
[5]刘昊.计算机可用性建模与评估工具的设计与实现[D].哈尔滨:哈尔滨工业大学,2011.
[6]TRIVEDI K S.Probability and Statistics with Reliability,Queuing,and Computer Science Applications,Second Edition[M].Publishing House of Electronics Industry,2015.
[7]XIE M,POH K L,DAI Y S.Computing System Reliability: Models and Analysis[M].Springer Publishing Company,Incorporated,2014.
[8]BEAUDRY M D.Performance-Related Reliability Measures for Computing Systems[J].IEEE Transactions on Computers,2006,C-27(6):540-547.
[9]SCHNEIDEWIND N.Quantitative Methods to Ensure the Relia- bility,Maintainability,and Availability of Computer Hardware and Software[M]∥Systems and Software Engineering with Applications.John Wiley & Sons,Inc.2011:1-43.
[10]EUSGELD I,FECHNER B,SALFNER F,et al.Hardware Reli- ability[M]∥Dependability Metrics.Springer Berlin Heidelberg,2008:59-103.
[11]LOPEZ L D,BOUGAEV A A,GROSS K C,et al.Method and system for the assessment of computer system reliability using quantitative cumulative stress metrics:US,US20130138419[P].2013.
[12]张志华.可靠性理论及工程应用[M].北京:科学出版社,2012.
[13]冯懿.复杂计算机系统可用性评测技术研究[D].哈尔滨:哈尔滨工业大学,2013.
[14]王宁,孙树栋,李淑敏,等.基于DD-HSMM的设备运行状态识别与故障预测方法[J].计算机集成制造系统,2012,18(8):1861-1868.
[15]刘克.实用马尔可夫决策过程[M].北京:清华大学出版社,2004.
[16]陆大絟.随机过程及其应用[M].北京:清华大学出版社,1986.
[1] ZHNAG Kai-qi, TU Zhi-ying, CHU Dian-hui, LI Chun-shan. Survey on Service Resource Availability Forecast Based on Queuing Theory [J]. Computer Science, 2021, 48(1): 26-33.
[2] HE Zhi-peng, LI Rui-lin, NIU Bei-fang. Highly Available Elastic Computing Platform for Metagenomics [J]. Computer Science, 2021, 48(1): 326-332.
[3] ZHAO Hui-qun, WU Kai-feng. Big Data Valuation Algorithm [J]. Computer Science, 2020, 47(9): 110-116.
[4] FENG Kai, LI Jing. Study on Subnetwork Reliability of k-ary n-cubes [J]. Computer Science, 2020, 47(7): 31-36.
[5] WANG Hui-yan, XU Jing-wei, XU Chang. Survey on Runtime Input Validation for Context-aware Adaptive Software [J]. Computer Science, 2020, 47(6): 1-7.
[6] CHENG Yu, LIU Wei, SUN Tong-xin, WEI Zhi-gang, DU Wei. Design of Fault-tolerant L1 Cache Architecture at Near-threshold Voltage [J]. Computer Science, 2020, 47(4): 42-49.
[7] ZHANG Zheng-lin,ZHANG Li-wei,WANG Wen-juan,XIA Li,FU Hao,WANG Hong-zhi,YANG Li-zhuang and
LI Hai. Survey on Computerized Neurocognitive Assessment System [J]. Computer Science, 2020, 47(2): 150-156.
[8] GENG Hai-jun, YIN Xia. Efficient Intra-domain Routing Protection Algorithm Based on i-SPF [J]. Computer Science, 2019, 46(8): 116-120.
[9] LI Mi, ZHUANG Yi, HU Xin-wen. Embedded Software Reliability Model and Evaluation Method Combining AADL and Z [J]. Computer Science, 2019, 46(8): 217-223.
[10] GENG Hai-jun,ZHANG Shuang,YIN Xia. Overview of Routing Availability in Intra-domain Routing Networks [J]. Computer Science, 2019, 46(7): 1-6.
[11] HUANG Hai-yan, LIU Xiao-ming, SUN Hua-yong, YANG Zhi-cai. Application of Clustering Analysis Algorithm in Uncertainty Decision Making [J]. Computer Science, 2019, 46(6A): 593-597.
[12] LI Sen-you, JI Xin-sheng, YOU Wei, ZHAO Xing. Hierarchical Control Strategy for Data Querying Based on Differential Privacy [J]. Computer Science, 2019, 46(11): 130-136.
[13] CHE Jian-hua, REN Shou-gang, YU Yong and XU Huan-liang. Availability Analyzing of Virtual Cluster Nodes Based on State Transition Diagram [J]. Computer Science, 2018, 45(5): 317-321.
[14] YANG Dong-ju and FENG Kai. Distributed and Unified Authentication Optimization Mechanism Based on Cache [J]. Computer Science, 2018, 45(3): 300-304.
[15] YI Ze-long, WEN Yu-mei, LIN Yan-min, CHEN Wei-ting and LV Guan-yu. Impacts of Correlation Effects among Multi-layer Faults on Software Reliability Growth Processes [J]. Computer Science, 2018, 45(2): 241-248.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .