Qualitative Analysis of Commercial Services in MEC as Phased-Mission Systems

Currently, mobile edge computing (MEC) is one of the most popular techniques used to respond to real-time services from a wide range of mobile terminals. Compared with single-phase systems, commercial services in MEC can be modeled as phased-mission systems (PMS) and are much more complex, because o...

Full description

Saved in:
Bibliographic Details
Published inSecurity and communication networks Vol. 2020; no. 2020; pp. 1 - 11
Main Authors Gong, Yuhuan, Mo, Yuchang
Format Journal Article
LanguageEnglish
Published Cairo, Egypt Hindawi Publishing Corporation 2020
Hindawi
John Wiley & Sons, Inc
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Currently, mobile edge computing (MEC) is one of the most popular techniques used to respond to real-time services from a wide range of mobile terminals. Compared with single-phase systems, commercial services in MEC can be modeled as phased-mission systems (PMS) and are much more complex, because of the dependencies across the phases. Over the past decade, researchers have proposed a set of new algorithms based on BDD for fault tree analysis of a wide range of PMS with various mission requirements and failure behaviors. The analysis to be performed on a fault tree can be either qualitative or quantitative. For the quantitative fault tree analysis of PMS by means of BDD, much work has been conducted. However, for the qualitative fault tree analysis of PMS by means of BDD, no much related work can be found. In this paper, we have presented some efficient methods to calculate the MCS encoding by a PMS BDD. Firstly, three kinds of redundancy relations-inclusive relation, internal-implication relation, and external-implication relation-within the cut set are identified, which prevent the cut set from being minimal cut set. Then, three BDD operations, IncRed, InImpRed, and ExImpRed, are developed, respectively, for the elimination of these redundancy relations. Using some proper combinations of these operations, MCS can be calculated correctly. As an illustration, some experimental results on a benchmark MEC system are given.
AbstractList Currently, mobile edge computing (MEC) is one of the most popular techniques used to respond to real-time services from a wide range of mobile terminals. Compared with single-phase systems, commercial services in MEC can be modeled as phased-mission systems (PMS) and are much more complex, because of the dependencies across the phases. Over the past decade, researchers have proposed a set of new algorithms based on BDD for fault tree analysis of a wide range of PMS with various mission requirements and failure behaviors. The analysis to be performed on a fault tree can be either qualitative or quantitative. For the quantitative fault tree analysis of PMS by means of BDD, much work has been conducted. However, for the qualitative fault tree analysis of PMS by means of BDD, no much related work can be found. In this paper, we have presented some efficient methods to calculate the MCS encoding by a PMS BDD. Firstly, three kinds of redundancy relations-inclusive relation, internal-implication relation, and external-implication relation-within the cut set are identified, which prevent the cut set from being minimal cut set. Then, three BDD operations, IncRed, InImpRed, and ExImpRed, are developed, respectively, for the elimination of these redundancy relations. Using some proper combinations of these operations, MCS can be calculated correctly. As an illustration, some experimental results on a benchmark MEC system are given.
Author Mo, Yuchang
Gong, Yuhuan
Author_xml – sequence: 1
  fullname: Gong, Yuhuan
– sequence: 2
  fullname: Mo, Yuchang
BookMark eNqFkF1LwzAUhoNMcJveeS0BL7UuSdM2uRxlfsBEZXpdTtOEZfRjJt1k_97ODgVBvDrn4nnfc3hGaFA3tUbonJIbSqNowggjEyFYKCN2hIZUhjIglLHB9075CRp5vyIkpjzhQzR_2UBpW2jtVuNpDeXOW48bg9OmqrRTFkq80G5rlfbY1vhxlmLw-HkJXhfBo_XeNjVe7HyrK3-Kjg2UXp8d5hi93c5e0_tg_nT3kE7ngQpj0gaS0whYUmiTs4TyOBHcKMqAcqGVZKER2igpgScqL0IicshBFgnVRQKREnk4Rpd979o17xvt22zVbFz3vM8YjzgVccjjjrruKeUa75022drZCtwuoyTb-8r2vrKDrw5nv3D15aWpWwe2_Ct01YeWti7gw_534qKndcdoAz80IyKSIvwE8bWFhw
CitedBy_id crossref_primary_10_1109_ACCESS_2020_3045283
crossref_primary_10_1155_2021_4539540
Cites_doi 10.1109/TCBB.2020.2994780
10.1109/TDSC.2015.2504092
10.1109/tii.2020.2988944
10.1109/JIOT.2020.2985082
10.1109/TCSS.2019.2932288
10.1109/JIOT.2020.3000871
10.1109/TETC.2018.2860051
10.1016/j.eswa.2020.113361
10.1177/0036850419881088
10.1109/tr.2009.2034946
10.1016/j.enbuild.2019.109689
10.1109/tr.2014.2299497
10.1109/TETCI.2019.2910242
10.1109/tc.1986.1676819
10.1016/0951-8320(93)90060-c
10.1109/TNSE.2020.2969489
10.1016/j.ress.2018.04.017
10.1016/j.knosys.2020.106196
10.1109/tr.2014.2299674
10.1016/j.ejor.2019.10.049
10.1016/j.ymssp.2018.08.064
10.1109/TITS.2020.2982186
10.1080/0740817x.2016.1146424
10.1109/access.2019.2894344
10.1109/jiot.2019.2944007
10.1109/tsmca.2010.2089513
10.1109/TCSS.2020.2987846
ContentType Journal Article
Copyright Copyright © 2020 Yuhuan Gong and Yuchang Mo.
Copyright © 2020 Yuhuan Gong and Yuchang Mo. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
Copyright_xml – notice: Copyright © 2020 Yuhuan Gong and Yuchang Mo.
– notice: Copyright © 2020 Yuhuan Gong and Yuchang Mo. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
DBID ADJCN
AHFXO
RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1155/2020/8823952
DatabaseName الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals
معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete
Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
CrossRef

Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1939-0122
Editor Xu, Xiaolong
Editor_xml – sequence: 1
  givenname: Xiaolong
  surname: Xu
  fullname: Xu, Xiaolong
EndPage 11
ExternalDocumentID 10_1155_2020_8823952
1208598
GrantInformation_xml – fundername: Program for Innovative Research Team in Science and Technology in Fujian Province University, Quanzhou High-Level Talents Support Plan
  grantid: 2017ZT012
– fundername: National Natural Science Foundation of China
  grantid: 61972156
GroupedDBID .4S
.DC
05W
0R~
123
1OC
24P
31~
3SF
4.4
52U
5DZ
66C
8-1
8UM
AAESR
AAEVG
AAFWJ
AAJEY
AAONW
AAZKR
ACBWZ
ACGFO
ACXQS
ADBBV
ADIZJ
ADJCN
AEIMD
AENEX
AFBPY
AFKRA
AHFXO
AJXKR
ALMA_UNASSIGNED_HOLDINGS
AMBMR
ARAPS
ARCSS
ASPBG
ATUGU
AVWKF
AZFZN
AZVAB
BCNDV
BDRZF
BENPR
BGLVJ
BHBCM
BNHUX
BOGZA
BRXPI
CCPQU
CS3
DR2
DU5
EBS
EIS
EJD
F1Z
FEDTE
G-S
GODZA
GROUPED_DOAJ
H13
HCIFZ
HVGLF
HZ~
IAO
ICD
IX1
K7-
LH4
LITHE
LW6
MY.
MY~
NNB
O9-
OIG
OK1
P2P
PIMPY
RHX
ROL
SUPJJ
TH9
TUS
W99
WBKPD
XV2
ITC
RHU
RHW
AAYXX
ACCMX
ADMLS
CITATION
7SC
7SP
8FD
AAMMB
AEFGJ
AGXDD
AIDQK
AIDYY
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c360t-9415a27defb27146784fc12a148ec923f8efc99a47cbd308baba9d71ed7a5c8b3
IEDL.DBID RHX
ISSN 1939-0114
IngestDate Fri Jul 25 20:52:50 EDT 2025
Tue Jul 01 01:43:44 EDT 2025
Thu Apr 24 23:02:56 EDT 2025
Sun Jun 02 18:51:23 EDT 2024
Tue Nov 26 16:44:32 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2020
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
https://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c360t-9415a27defb27146784fc12a148ec923f8efc99a47cbd308baba9d71ed7a5c8b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-1976-5412
0000-0003-4496-7929
OpenAccessLink https://dx.doi.org/10.1155/2020/8823952
PQID 2454186346
PQPubID 1046363
PageCount 11
ParticipantIDs proquest_journals_2454186346
crossref_primary_10_1155_2020_8823952
crossref_citationtrail_10_1155_2020_8823952
hindawi_primary_10_1155_2020_8823952
emarefa_primary_1208598
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2020-00-00
PublicationDateYYYYMMDD 2020-01-01
PublicationDate_xml – year: 2020
  text: 2020-00-00
PublicationDecade 2020
PublicationPlace Cairo, Egypt
PublicationPlace_xml – name: Cairo, Egypt
– name: London
PublicationTitle Security and communication networks
PublicationYear 2020
Publisher Hindawi Publishing Corporation
Hindawi
John Wiley & Sons, Inc
Publisher_xml – name: Hindawi Publishing Corporation
– name: Hindawi
– name: John Wiley & Sons, Inc
References 22
23
24
25
26
27
10
11
12
13
14
15
16
17
18
19
1
2
3
4
5
6
7
8
9
20
21
References_xml – ident: 2
  doi: 10.1109/TCBB.2020.2994780
– ident: 16
  doi: 10.1109/TDSC.2015.2504092
– ident: 23
  doi: 10.1109/tii.2020.2988944
– ident: 1
  doi: 10.1109/JIOT.2020.2985082
– ident: 17
  doi: 10.1109/TCSS.2019.2932288
– ident: 25
  doi: 10.1109/JIOT.2020.3000871
– ident: 18
  doi: 10.1109/TETC.2018.2860051
– ident: 22
  doi: 10.1016/j.eswa.2020.113361
– ident: 5
  doi: 10.1177/0036850419881088
– ident: 15
  doi: 10.1109/tr.2009.2034946
– ident: 6
  doi: 10.1016/j.enbuild.2019.109689
– ident: 13
  doi: 10.1109/tr.2014.2299497
– ident: 4
  doi: 10.1109/TETCI.2019.2910242
– ident: 19
  doi: 10.1109/tc.1986.1676819
– ident: 20
  doi: 10.1016/0951-8320(93)90060-c
– ident: 10
  doi: 10.1109/TNSE.2020.2969489
– ident: 8
  doi: 10.1016/j.ress.2018.04.017
– ident: 27
  doi: 10.1016/j.knosys.2020.106196
– ident: 14
  doi: 10.1109/tr.2014.2299674
– ident: 11
  doi: 10.1016/j.ejor.2019.10.049
– ident: 21
  doi: 10.1016/j.ymssp.2018.08.064
– ident: 3
  doi: 10.1109/TITS.2020.2982186
– ident: 9
  doi: 10.1080/0740817x.2016.1146424
– ident: 7
  doi: 10.1109/access.2019.2894344
– ident: 26
  doi: 10.1109/jiot.2019.2944007
– ident: 12
  doi: 10.1109/tsmca.2010.2089513
– ident: 24
  doi: 10.1109/TCSS.2020.2987846
SSID ssj0061474
Score 2.1548336
Snippet Currently, mobile edge computing (MEC) is one of the most popular techniques used to respond to real-time services from a wide range of mobile terminals....
SourceID proquest
crossref
hindawi
emarefa
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Algorithms
Boolean
Edge computing
Failure analysis
Fault tree analysis
Mobile computing
Qualitative analysis
Redundancy
Variables
Title Qualitative Analysis of Commercial Services in MEC as Phased-Mission Systems
URI https://search.emarefa.net/detail/BIM-1208598
https://dx.doi.org/10.1155/2020/8823952
https://www.proquest.com/docview/2454186346
Volume 2020
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA5aKOhBfFutJYd6ksXdTXaTHKW0FLEiYqG3JU8s6FZsxb9vZpv1VURvG5jkMJPMN7OZfINQN7aW8NyJyGgqI0qYjISQNAIiFsMhYojhgfPoJh-O6dUkmwSSpPnqFb5HO0jP4wsfCBKReV-77jcYJOXDSe1wPcCwcHkMpT8Jrevbf8z9hjxN-yT9h4ej5gMkv2_TFWdcIcxgG22F0BBfLm25g9ZsuYs2vxAG7qHrJeVFRdaNaz4RPHMY3nlA7yQ_vz79eFriUb-H5RzfPnisMtFoCiWvJQ4s5ftoPOjf94ZR6IcQaZLHi0h4sJUpM9aplIGH49TpJJU-o7HaB2qOW6dB00wrQ2KupJLCsMQaJjPNFTlAjXJW2iOEKbWOGaW0z2BonhrFE-k0NB4WjGgtWui81lWhA1k49Kx4LKqkIcsK0GwRNNtCZx_Sz0uSjF_kDoPaP8WgR6jgLdQNZvhjgXZtoyKctXmR0owmPCc0P_7fKidoA4bLHylt1Fi8vNpTH1osVMcH1Xdpp9pe78tkxGk
linkProvider Hindawi Publishing
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Qualitative+Analysis+of+Commercial+Services+in+MEC+as+Phased-Mission+Systems&rft.jtitle=Security+and+communication+networks&rft.au=Gong%2C+Yuhuan&rft.au=Mo%2C+Yuchang&rft.date=2020&rft.pub=Hindawi&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2020&rft_id=info:doi/10.1155%2F2020%2F8823952&rft.externalDocID=10_1155_2020_8823952
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon