Username   Password       Forgot your password?  Forgot your username? 


Volume 14 - 2018

No.1 January 2018
No.1 January 2018
No.3 March 2018
No.3 March 2018
No.4 April 2018
No.4 April 2018
No.5 May 2018
No.5 May 2018
No.6 June 2018
No.6 June 2018

Volume 13 - 2017

No.4 July 2017
No.4 July 2017
No.5 September 2017
No.5 September 2017
No.7 November 2017
No.7 November 2017
No.8 December 2017
No.8 December 2017

Volume 12 - 2016

Volume 11 - 2015

Volume 10 - 2014

Volume 9 - 2013

Volume 8 - 2012

Volume 7 - 2011

Volume 6 - 2010

Volume 5 - 2009

Volume 4 - 2008

Volume 3 - 2007

Volume 2 - 2006


Optimization of Software Rejuvenation Policy based on State-Control-Limit

Volume 14, Number 2, February 2018, pp. 210-222
DOI: 10.23940/ijpe.18.02.p3.210222

Weichao Danga,b,*, Jianchao Zengb,c

aCollege of Electrical and Information Engineering, Lanzhou University of Technology, Lanzhou, 730050, China

bDivision of Industrial and System Engineering, Taiyuan University of Science and Technology, Taiyuan, 030024, China

c School of Computer Science and Control Engineering, North University of China, Taiyuan, 030051, China


Software Rejuvenation is a proactive software control technique used to improve computing system performance when a system suffers from software aging. In this paper, a state-control-limit-based rejuvenation policy with periodical inspection has been proposed. The steady-state system availability model has been constructed based on the semi-renewal process. The steady-state probability density of degradation system stated as a function of the inspection interval and the rejuvenation threshold have been derived. The average unavailable time of when a soft failure occurs within an inspection cycle has been taken into account to calculate the steady-state system availability. Finally, the system availability with corresponding optimal inspection time interval and rejuvenation threshold have been obtained numerically.


References: 26

  1. T. Amudha and B. L. Shivakumar, “Parameter Optimization in Genetic Algorithm and Its Impact on Scheduling Solutions.” Springer India, 2015
  2. J. Araujo, R. Matos, V. Alves, P. Maciel, F.V.D. Souza, R. Matias, and K.S. Trivedi, “Software Aging in the Eucalyptus Cloud Computing Infrastructure: Characterization and Rejuvenation,” ACM Journal on Emerging Technologies in Computing Systems, vol. 10, no. 1, pp. 1557-1564, 2014
  3. A. Avritzer, A. Bondi, M. Grottke, K.S. Trivedi, and E.J. Weyuker, “Performance Assurance via Software Rejuvenation: Monitoring, Statistics and Algorithms,” in International Conference on Dependable Systems and Networks, DSN 2006, pp. 435-444, 2006
  4. A. Avritzer and E. J. Weyuker, “Monitoring Smoothly Degrading Systems for Increased Dependability,” Empirical Software Engineering, vol. 2, no. 2, pp. 59-77, 1997
  5. Y. Bao, X. Sun, and K. S. Trivedi, “A Workload-based Analysis of Software Aging, and Rejuvenation,” IEEE Transactions on Reliability, vol. 54, no. 3, pp. 541-548, 2005
  6. A. Bobbio, M. Sereno, and C. Anglano, “Fine Grained Software Degradation Models for Optimal Rejuvenation Policies,” Performance Evaluation, vol. 46, no. 1, pp. 45-62, 2001
  7. K. J. Cassidy, K. C. Gross, and A. Malekpour, “Advanced Pattern Recognition for Detection of Complex Software Aging Phenomena in Online Transaction Processing Servers,” in Proceedings of International Conference on Dependable Systems and Networks, DSN 2002, pp. 478-482, 2002
  8. D. Cotroneo, S. Orlando, R. Pietrantuono, and S. Russo, “A Measurement-based Ageing Analysis of the JVM,” Software Testing Verification & Reliability, vol. 23, no. 3, pp. 199–239, 2013
  9. D. Cotroneo, R. Pietrantuono, S. Russo, and K. Trivedi, “How Do Bugs Surface? A Comprehensive Study on the Characteristics of Software Bugs Manifestation,” Journal of Systems & Software, vol. 113, no. 27-43, 2016
  10. L. Dieulle, C. Berenguer, A. Grall, and M. Roussignol, “Continuous Time Predictive Maintenance Scheduling for a Deteriorating System,” IEEE Transactions on Reliability vol. 51, no. 2, pp. 150-155, 2001
  11. S. Garg, A. Puliafito, M. Telek, and K. Trivedi, “Analysis of Preventive Maintenance in Transactions Based Software Systems,” IEEE Transactions on Computers, vol. 47, no. 1, pp. 96-107, 1998
  12. S. Garg, A. van Moorsel, K. Vaidyanathan, and K.S. Trivedi, “A Methodology for Detection and Estimation of Software Aging,” in Proceedings of Ninth International Symposium on Software Reliability Engineering. pp. 283-292, 1998
  13. J. Gray and D.P. Siewiorek, “High-Availability Computer Systems,” Computer, vol. 24, no. 9, pp. 39-48, 1991
  14. M. Grottke, L. Li, K. Vaidyanathan, and K.S. Trivedi, “Analysis of Software Aging in a Web Server,” Discussion Papers, vol. 55, no. 3, pp. 411 - 420, 2005
  15. Y. Huang, C. Kintala, N. Kolettis, and N.D. Fulton, “Software Rejuvenation: Analysis, Module and Applications,” in proceedings of 25 International Symposium, Fault-Tolerant Computing, FTCS-25. pp. 381-390, 1995
  16. Y.F. Jia, X.E. Chen, L. Zhao, and K.Y. Cai, “On the Relationship between Software Aging and Related Parameters,” in International Conference on Quality Software, pp. 241-246, 2008
  17. E. Marshall, “Fatal Error: How Patriot Overlooked a Scud,” Science, vol. 255, no. 5050, pp. 1347-1347, 1992
  18. R. Matias, A. Andrzejak, F. Machida, D. Elias, and K. Trivedi, “A Systematic Differential Analysis for Fast and Robust Detection of Software Aging,” 2014
  19. H. Meng, J. Liu, X. Hei, H. Meng, J. Liu, and X. Hei, “Modeling and optimizing periodically inspected software rejuvenation policy based on geometric sequences,” Reliability Engineering & System Safety, vol. 133, no. 133, pp. 184-191, 2015
  20. S. Meyn and R. L. Tweedie, “Markov Chains and Stochastic Stability.” Springer-Verlag, 1993
  21. J. M. V. Noortwijk, “A Survey of the Application of Gamma Processes in Maintenance,” Reliability Engineering & System Safety, vol. 94, no. 1, pp. 2-21, 2009
  22. K. Rinsaka and T. Dohi, “Toward High Assurance Software Systems with Adaptive Fault Management,” Software Quality Journal, vol. 24, no. 1, pp. 1-21, 2016
  23. M. Sullivan and R. Chillarege, “Software Defects and Their Impact on System Availability-A Study of Field Failures in Operating Systems,” in Proc. Twenty-First International Symposium on Fault-Tolerant Computing, FTCS-21, pp. 2-9, 1991
  24. A. T. Tai, L. Alkalai, and S.N. Chau, “On-board Preventive Maintenance: A Design-oriented Analytic Study for Long-life Applications,” Performance Evaluation, vol. 35, no. 3–4, pp. 215-232, 1999
  25. D. Wang, W. Xie, and K.S. Trivedi, “Performability Analysis of Clustered Systems with Rejuvenation under Varying Workload,” Performance Evaluation, vol. 64, no. 3, pp. 247-265, 2007
  26. T. H. Zhao, Q. I. Yong, J. Y. Shen, D. Hou, and X.M. Zheng, “Application Server Multi-State Aging Model and Optimal Rejuvenation Strategy Research,” Journal of System Simulation, vol. 19, no. 8, pp. 1705-1709, 2007


Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

Download this file (IJPE-2018-02-03.pdf)IJPE-2018-02-03.pdf[Optimization of Software Rejuvenation Policy based on State-Control-Limit]926 Kb


Prev Next

Temporal Multiscale Consumption Strategies of Intermittent Energy based on Parallel Computing

Huifen Chen, Yiming Zhang, Feng Yao, Zhice Yang, Fang Liu, Yi Liu, Zhiheng Li, and Jinggang Wang

Read more

Decision Tree Incremental Learning Algorithm Oriented Intelligence Data

Hongbin Wang, Ci Chu, Xiaodong Xie, Nianbin Wang, and Jing Sun

Read more

Spark-based Ensemble Learning for Imbalanced Data Classification

Jiaman Ding, Sichen Wang, Lianyin Jia, Jinguo You, and Ying Jiang

Read more

Classification Decision based on a Hybrid Method of Weighted kNN and Hyper-Sphere SVM

Peng Chen, Guoyou Shi, Shuang Liu, Yuanqiang Zhang, and Denis Špelič

Read more

An Improved Algorithm based on Time Domain Network Evolution

Guanghui Yan, Qingqing Ma, Yafei Wang, Yu Wu, and Dan Jin

Read more

Auto-Tuning for Solving Multi-Conditional MAD Model

Feng Yao, Yi Liu, Huifen Chen, Chen Li, Zhonghua Lu, Jinggang Wang, Zhiheng Li, and Ningming Nie

Read more

Smart Mine Construction based on Knowledge Engineering and Internet of Things

Xiaosan Ge, Shuai Su, Haiyang Yu, Gang Chen, and Xiaoping Lu

Read more

A Mining Model of Network Log Data based on Hadoop

Yun Wu, Xin Ma, Guangqian Kong, Bin Wang, and Xinwei Niu

Read more
This site uses encryption for transmitting your passwords.