Username   Password       Forgot your password?  Forgot your username? 


Volume 14 - 2018

No.1 January 2018
No.1 January 2018
No.3 March 2018
No.3 March 2018
No.4 April 2018
No.4 April 2018
No.5 May 2018
No.5 May 2018
No.6 June 2018
No.6 June 2018
No.7 July 2018
No.7 July 2018

Volume 13 - 2017

No.4 July 2017
No.4 July 2017
No.5 September 2017
No.5 September 2017
No.7 November 2017
No.7 November 2017
No.8 December 2017
No.8 December 2017

Volume 12 - 2016

Volume 11 - 2015

Volume 10 - 2014

Volume 9 - 2013

Volume 8 - 2012

Volume 7 - 2011

Volume 6 - 2010

Volume 5 - 2009

Volume 4 - 2008

Volume 3 - 2007

Volume 2 - 2006


Optimization of Software Rejuvenation Policy based on State-Control-Limit

Volume 14, Number 2, February 2018, pp. 210-222
DOI: 10.23940/ijpe.18.02.p3.210222

Weichao Danga,b,*, Jianchao Zengb,c

aCollege of Electrical and Information Engineering, Lanzhou University of Technology, Lanzhou, 730050, China

bDivision of Industrial and System Engineering, Taiyuan University of Science and Technology, Taiyuan, 030024, China

c School of Computer Science and Control Engineering, North University of China, Taiyuan, 030051, China


Software Rejuvenation is a proactive software control technique used to improve computing system performance when a system suffers from software aging. In this paper, a state-control-limit-based rejuvenation policy with periodical inspection has been proposed. The steady-state system availability model has been constructed based on the semi-renewal process. The steady-state probability density of degradation system stated as a function of the inspection interval and the rejuvenation threshold have been derived. The average unavailable time of when a soft failure occurs within an inspection cycle has been taken into account to calculate the steady-state system availability. Finally, the system availability with corresponding optimal inspection time interval and rejuvenation threshold have been obtained numerically.


References: 26

  1. T. Amudha and B. L. Shivakumar, “Parameter Optimization in Genetic Algorithm and Its Impact on Scheduling Solutions.” Springer India, 2015
  2. J. Araujo, R. Matos, V. Alves, P. Maciel, F.V.D. Souza, R. Matias, and K.S. Trivedi, “Software Aging in the Eucalyptus Cloud Computing Infrastructure: Characterization and Rejuvenation,” ACM Journal on Emerging Technologies in Computing Systems, vol. 10, no. 1, pp. 1557-1564, 2014
  3. A. Avritzer, A. Bondi, M. Grottke, K.S. Trivedi, and E.J. Weyuker, “Performance Assurance via Software Rejuvenation: Monitoring, Statistics and Algorithms,” in International Conference on Dependable Systems and Networks, DSN 2006, pp. 435-444, 2006
  4. A. Avritzer and E. J. Weyuker, “Monitoring Smoothly Degrading Systems for Increased Dependability,” Empirical Software Engineering, vol. 2, no. 2, pp. 59-77, 1997
  5. Y. Bao, X. Sun, and K. S. Trivedi, “A Workload-based Analysis of Software Aging, and Rejuvenation,” IEEE Transactions on Reliability, vol. 54, no. 3, pp. 541-548, 2005
  6. A. Bobbio, M. Sereno, and C. Anglano, “Fine Grained Software Degradation Models for Optimal Rejuvenation Policies,” Performance Evaluation, vol. 46, no. 1, pp. 45-62, 2001
  7. K. J. Cassidy, K. C. Gross, and A. Malekpour, “Advanced Pattern Recognition for Detection of Complex Software Aging Phenomena in Online Transaction Processing Servers,” in Proceedings of International Conference on Dependable Systems and Networks, DSN 2002, pp. 478-482, 2002
  8. D. Cotroneo, S. Orlando, R. Pietrantuono, and S. Russo, “A Measurement-based Ageing Analysis of the JVM,” Software Testing Verification & Reliability, vol. 23, no. 3, pp. 199–239, 2013
  9. D. Cotroneo, R. Pietrantuono, S. Russo, and K. Trivedi, “How Do Bugs Surface? A Comprehensive Study on the Characteristics of Software Bugs Manifestation,” Journal of Systems & Software, vol. 113, no. 27-43, 2016
  10. L. Dieulle, C. Berenguer, A. Grall, and M. Roussignol, “Continuous Time Predictive Maintenance Scheduling for a Deteriorating System,” IEEE Transactions on Reliability vol. 51, no. 2, pp. 150-155, 2001
  11. S. Garg, A. Puliafito, M. Telek, and K. Trivedi, “Analysis of Preventive Maintenance in Transactions Based Software Systems,” IEEE Transactions on Computers, vol. 47, no. 1, pp. 96-107, 1998
  12. S. Garg, A. van Moorsel, K. Vaidyanathan, and K.S. Trivedi, “A Methodology for Detection and Estimation of Software Aging,” in Proceedings of Ninth International Symposium on Software Reliability Engineering. pp. 283-292, 1998
  13. J. Gray and D.P. Siewiorek, “High-Availability Computer Systems,” Computer, vol. 24, no. 9, pp. 39-48, 1991
  14. M. Grottke, L. Li, K. Vaidyanathan, and K.S. Trivedi, “Analysis of Software Aging in a Web Server,” Discussion Papers, vol. 55, no. 3, pp. 411 - 420, 2005
  15. Y. Huang, C. Kintala, N. Kolettis, and N.D. Fulton, “Software Rejuvenation: Analysis, Module and Applications,” in proceedings of 25 International Symposium, Fault-Tolerant Computing, FTCS-25. pp. 381-390, 1995
  16. Y.F. Jia, X.E. Chen, L. Zhao, and K.Y. Cai, “On the Relationship between Software Aging and Related Parameters,” in International Conference on Quality Software, pp. 241-246, 2008
  17. E. Marshall, “Fatal Error: How Patriot Overlooked a Scud,” Science, vol. 255, no. 5050, pp. 1347-1347, 1992
  18. R. Matias, A. Andrzejak, F. Machida, D. Elias, and K. Trivedi, “A Systematic Differential Analysis for Fast and Robust Detection of Software Aging,” 2014
  19. H. Meng, J. Liu, X. Hei, H. Meng, J. Liu, and X. Hei, “Modeling and optimizing periodically inspected software rejuvenation policy based on geometric sequences,” Reliability Engineering & System Safety, vol. 133, no. 133, pp. 184-191, 2015
  20. S. Meyn and R. L. Tweedie, “Markov Chains and Stochastic Stability.” Springer-Verlag, 1993
  21. J. M. V. Noortwijk, “A Survey of the Application of Gamma Processes in Maintenance,” Reliability Engineering & System Safety, vol. 94, no. 1, pp. 2-21, 2009
  22. K. Rinsaka and T. Dohi, “Toward High Assurance Software Systems with Adaptive Fault Management,” Software Quality Journal, vol. 24, no. 1, pp. 1-21, 2016
  23. M. Sullivan and R. Chillarege, “Software Defects and Their Impact on System Availability-A Study of Field Failures in Operating Systems,” in Proc. Twenty-First International Symposium on Fault-Tolerant Computing, FTCS-21, pp. 2-9, 1991
  24. A. T. Tai, L. Alkalai, and S.N. Chau, “On-board Preventive Maintenance: A Design-oriented Analytic Study for Long-life Applications,” Performance Evaluation, vol. 35, no. 3–4, pp. 215-232, 1999
  25. D. Wang, W. Xie, and K.S. Trivedi, “Performability Analysis of Clustered Systems with Rejuvenation under Varying Workload,” Performance Evaluation, vol. 64, no. 3, pp. 247-265, 2007
  26. T. H. Zhao, Q. I. Yong, J. Y. Shen, D. Hou, and X.M. Zheng, “Application Server Multi-State Aging Model and Optimal Rejuvenation Strategy Research,” Journal of System Simulation, vol. 19, no. 8, pp. 1705-1709, 2007


Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

Download this file (IJPE-2018-02-03.pdf)IJPE-2018-02-03.pdf[Optimization of Software Rejuvenation Policy based on State-Control-Limit]926 Kb


Prev Next

Data Packet Processing Model based on Multi-Core Architecture

Xian Zhang, Dong Yin, Taiguo Qu, Jia Liu, and Yiwen Liu

Read more

Mixed Weighted KNN for Imbalanced Datasets

Qimin Cao, Lei La, Hongxia Liu, and Si Han

Read more

Query Expansion based on Naive Bayes and Semantic Similarity

Zhiyun Zheng, Mengyao Yu, Ning Wang, Xingjin Zhang, Chunyang Ruan, and Dun Li

Read more

Automated Collaborative Analysis System of Rockburst Mechanism based on Big Data

Yu Zhang, Hongwei Ding, Yange Wang, Fuqiang Ren, Yongzhen Li, and Zhaoyong Lv

Read more

EOR of Spontaneous Imbibition by Surfactant Solution for Tight Oil Reservoirs

Anqi Shen, Yikun Liu, Shuang Liang, Fengjiao Wang, Bo Cai, and Yuebin Gao

Read more

Dynamic Community Mining based on Behavior Prediction

Xiao Chen, Xinzhuan Hu, Xiao Pan, and Jingfeng Guo

Read more

Lithium-ion Power Batteries SOC Estimation based on PCA

Haiying Wang, Yuran Wang, Zhilin Yao, and Zhilong Yu

Read more
This site uses encryption for transmitting your passwords.