Qualitative Analysis of Commercial Services in MEC as Phased-Mission Systems
Currently, mobile edge computing (MEC) is one of the most popular techniques used to respond to real-time services from a wide range of mobile terminals. Compared with single-phase systems, commercial services in MEC can be modeled as phased-mission systems (PMS) and are much more complex, because o...
Saved in:
Published in | Security and communication networks Vol. 2020; no. 2020; pp. 1 - 11 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Cairo, Egypt
Hindawi Publishing Corporation
2020
Hindawi John Wiley & Sons, Inc |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Currently, mobile edge computing (MEC) is one of the most popular techniques used to respond to real-time services from a wide range of mobile terminals. Compared with single-phase systems, commercial services in MEC can be modeled as phased-mission systems (PMS) and are much more complex, because of the dependencies across the phases. Over the past decade, researchers have proposed a set of new algorithms based on BDD for fault tree analysis of a wide range of PMS with various mission requirements and failure behaviors. The analysis to be performed on a fault tree can be either qualitative or quantitative. For the quantitative fault tree analysis of PMS by means of BDD, much work has been conducted. However, for the qualitative fault tree analysis of PMS by means of BDD, no much related work can be found. In this paper, we have presented some efficient methods to calculate the MCS encoding by a PMS BDD. Firstly, three kinds of redundancy relations-inclusive relation, internal-implication relation, and external-implication relation-within the cut set are identified, which prevent the cut set from being minimal cut set. Then, three BDD operations, IncRed, InImpRed, and ExImpRed, are developed, respectively, for the elimination of these redundancy relations. Using some proper combinations of these operations, MCS can be calculated correctly. As an illustration, some experimental results on a benchmark MEC system are given. |
---|---|
AbstractList | Currently, mobile edge computing (MEC) is one of the most popular techniques used to respond to real-time services from a wide range of mobile terminals. Compared with single-phase systems, commercial services in MEC can be modeled as phased-mission systems (PMS) and are much more complex, because of the dependencies across the phases. Over the past decade, researchers have proposed a set of new algorithms based on BDD for fault tree analysis of a wide range of PMS with various mission requirements and failure behaviors. The analysis to be performed on a fault tree can be either qualitative or quantitative. For the quantitative fault tree analysis of PMS by means of BDD, much work has been conducted. However, for the qualitative fault tree analysis of PMS by means of BDD, no much related work can be found. In this paper, we have presented some efficient methods to calculate the MCS encoding by a PMS BDD. Firstly, three kinds of redundancy relations-inclusive relation, internal-implication relation, and external-implication relation-within the cut set are identified, which prevent the cut set from being minimal cut set. Then, three BDD operations, IncRed, InImpRed, and ExImpRed, are developed, respectively, for the elimination of these redundancy relations. Using some proper combinations of these operations, MCS can be calculated correctly. As an illustration, some experimental results on a benchmark MEC system are given. |
Author | Mo, Yuchang Gong, Yuhuan |
Author_xml | – sequence: 1 fullname: Gong, Yuhuan – sequence: 2 fullname: Mo, Yuchang |
BookMark | eNqFkF1LwzAUhoNMcJveeS0BL7UuSdM2uRxlfsBEZXpdTtOEZfRjJt1k_97ODgVBvDrn4nnfc3hGaFA3tUbonJIbSqNowggjEyFYKCN2hIZUhjIglLHB9075CRp5vyIkpjzhQzR_2UBpW2jtVuNpDeXOW48bg9OmqrRTFkq80G5rlfbY1vhxlmLw-HkJXhfBo_XeNjVe7HyrK3-Kjg2UXp8d5hi93c5e0_tg_nT3kE7ngQpj0gaS0whYUmiTs4TyOBHcKMqAcqGVZKER2igpgScqL0IicshBFgnVRQKREnk4Rpd979o17xvt22zVbFz3vM8YjzgVccjjjrruKeUa75022drZCtwuoyTb-8r2vrKDrw5nv3D15aWpWwe2_Ct01YeWti7gw_534qKndcdoAz80IyKSIvwE8bWFhw |
CitedBy_id | crossref_primary_10_1109_ACCESS_2020_3045283 crossref_primary_10_1155_2021_4539540 |
Cites_doi | 10.1109/TCBB.2020.2994780 10.1109/TDSC.2015.2504092 10.1109/tii.2020.2988944 10.1109/JIOT.2020.2985082 10.1109/TCSS.2019.2932288 10.1109/JIOT.2020.3000871 10.1109/TETC.2018.2860051 10.1016/j.eswa.2020.113361 10.1177/0036850419881088 10.1109/tr.2009.2034946 10.1016/j.enbuild.2019.109689 10.1109/tr.2014.2299497 10.1109/TETCI.2019.2910242 10.1109/tc.1986.1676819 10.1016/0951-8320(93)90060-c 10.1109/TNSE.2020.2969489 10.1016/j.ress.2018.04.017 10.1016/j.knosys.2020.106196 10.1109/tr.2014.2299674 10.1016/j.ejor.2019.10.049 10.1016/j.ymssp.2018.08.064 10.1109/TITS.2020.2982186 10.1080/0740817x.2016.1146424 10.1109/access.2019.2894344 10.1109/jiot.2019.2944007 10.1109/tsmca.2010.2089513 10.1109/TCSS.2020.2987846 |
ContentType | Journal Article |
Copyright | Copyright © 2020 Yuhuan Gong and Yuchang Mo. Copyright © 2020 Yuhuan Gong and Yuchang Mo. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
Copyright_xml | – notice: Copyright © 2020 Yuhuan Gong and Yuchang Mo. – notice: Copyright © 2020 Yuhuan Gong and Yuchang Mo. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
DBID | ADJCN AHFXO RHU RHW RHX AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
DOI | 10.1155/2020/8823952 |
DatabaseName | الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database CrossRef |
Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1939-0122 |
Editor | Xu, Xiaolong |
Editor_xml | – sequence: 1 givenname: Xiaolong surname: Xu fullname: Xu, Xiaolong |
EndPage | 11 |
ExternalDocumentID | 10_1155_2020_8823952 1208598 |
GrantInformation_xml | – fundername: Program for Innovative Research Team in Science and Technology in Fujian Province University, Quanzhou High-Level Talents Support Plan grantid: 2017ZT012 – fundername: National Natural Science Foundation of China grantid: 61972156 |
GroupedDBID | .4S .DC 05W 0R~ 123 1OC 24P 31~ 3SF 4.4 52U 5DZ 66C 8-1 8UM AAESR AAEVG AAFWJ AAJEY AAONW AAZKR ACBWZ ACGFO ACXQS ADBBV ADIZJ ADJCN AEIMD AENEX AFBPY AFKRA AHFXO AJXKR ALMA_UNASSIGNED_HOLDINGS AMBMR ARAPS ARCSS ASPBG ATUGU AVWKF AZFZN AZVAB BCNDV BDRZF BENPR BGLVJ BHBCM BNHUX BOGZA BRXPI CCPQU CS3 DR2 DU5 EBS EIS EJD F1Z FEDTE G-S GODZA GROUPED_DOAJ H13 HCIFZ HVGLF HZ~ IAO ICD IX1 K7- LH4 LITHE LW6 MY. MY~ NNB O9- OIG OK1 P2P PIMPY RHX ROL SUPJJ TH9 TUS W99 WBKPD XV2 ITC RHU RHW AAYXX ACCMX ADMLS CITATION 7SC 7SP 8FD AAMMB AEFGJ AGXDD AIDQK AIDYY JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c360t-9415a27defb27146784fc12a148ec923f8efc99a47cbd308baba9d71ed7a5c8b3 |
IEDL.DBID | RHX |
ISSN | 1939-0114 |
IngestDate | Fri Jul 25 20:52:50 EDT 2025 Tue Jul 01 01:43:44 EDT 2025 Thu Apr 24 23:02:56 EDT 2025 Sun Jun 02 18:51:23 EDT 2024 Tue Nov 26 16:44:32 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2020 |
Language | English |
License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. https://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c360t-9415a27defb27146784fc12a148ec923f8efc99a47cbd308baba9d71ed7a5c8b3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-1976-5412 0000-0003-4496-7929 |
OpenAccessLink | https://dx.doi.org/10.1155/2020/8823952 |
PQID | 2454186346 |
PQPubID | 1046363 |
PageCount | 11 |
ParticipantIDs | proquest_journals_2454186346 crossref_primary_10_1155_2020_8823952 crossref_citationtrail_10_1155_2020_8823952 hindawi_primary_10_1155_2020_8823952 emarefa_primary_1208598 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2020-00-00 |
PublicationDateYYYYMMDD | 2020-01-01 |
PublicationDate_xml | – year: 2020 text: 2020-00-00 |
PublicationDecade | 2020 |
PublicationPlace | Cairo, Egypt |
PublicationPlace_xml | – name: Cairo, Egypt – name: London |
PublicationTitle | Security and communication networks |
PublicationYear | 2020 |
Publisher | Hindawi Publishing Corporation Hindawi John Wiley & Sons, Inc |
Publisher_xml | – name: Hindawi Publishing Corporation – name: Hindawi – name: John Wiley & Sons, Inc |
References | 22 23 24 25 26 27 10 11 12 13 14 15 16 17 18 19 1 2 3 4 5 6 7 8 9 20 21 |
References_xml | – ident: 2 doi: 10.1109/TCBB.2020.2994780 – ident: 16 doi: 10.1109/TDSC.2015.2504092 – ident: 23 doi: 10.1109/tii.2020.2988944 – ident: 1 doi: 10.1109/JIOT.2020.2985082 – ident: 17 doi: 10.1109/TCSS.2019.2932288 – ident: 25 doi: 10.1109/JIOT.2020.3000871 – ident: 18 doi: 10.1109/TETC.2018.2860051 – ident: 22 doi: 10.1016/j.eswa.2020.113361 – ident: 5 doi: 10.1177/0036850419881088 – ident: 15 doi: 10.1109/tr.2009.2034946 – ident: 6 doi: 10.1016/j.enbuild.2019.109689 – ident: 13 doi: 10.1109/tr.2014.2299497 – ident: 4 doi: 10.1109/TETCI.2019.2910242 – ident: 19 doi: 10.1109/tc.1986.1676819 – ident: 20 doi: 10.1016/0951-8320(93)90060-c – ident: 10 doi: 10.1109/TNSE.2020.2969489 – ident: 8 doi: 10.1016/j.ress.2018.04.017 – ident: 27 doi: 10.1016/j.knosys.2020.106196 – ident: 14 doi: 10.1109/tr.2014.2299674 – ident: 11 doi: 10.1016/j.ejor.2019.10.049 – ident: 21 doi: 10.1016/j.ymssp.2018.08.064 – ident: 3 doi: 10.1109/TITS.2020.2982186 – ident: 9 doi: 10.1080/0740817x.2016.1146424 – ident: 7 doi: 10.1109/access.2019.2894344 – ident: 26 doi: 10.1109/jiot.2019.2944007 – ident: 12 doi: 10.1109/tsmca.2010.2089513 – ident: 24 doi: 10.1109/TCSS.2020.2987846 |
SSID | ssj0061474 |
Score | 2.1548336 |
Snippet | Currently, mobile edge computing (MEC) is one of the most popular techniques used to respond to real-time services from a wide range of mobile terminals.... |
SourceID | proquest crossref hindawi emarefa |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1 |
SubjectTerms | Algorithms Boolean Edge computing Failure analysis Fault tree analysis Mobile computing Qualitative analysis Redundancy Variables |
Title | Qualitative Analysis of Commercial Services in MEC as Phased-Mission Systems |
URI | https://search.emarefa.net/detail/BIM-1208598 https://dx.doi.org/10.1155/2020/8823952 https://www.proquest.com/docview/2454186346 |
Volume | 2020 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA5aKOhBfFutJYd6ksXdTXaTHKW0FLEiYqG3JU8s6FZsxb9vZpv1VURvG5jkMJPMN7OZfINQN7aW8NyJyGgqI0qYjISQNAIiFsMhYojhgfPoJh-O6dUkmwSSpPnqFb5HO0jP4wsfCBKReV-77jcYJOXDSe1wPcCwcHkMpT8Jrevbf8z9hjxN-yT9h4ej5gMkv2_TFWdcIcxgG22F0BBfLm25g9ZsuYs2vxAG7qHrJeVFRdaNaz4RPHMY3nlA7yQ_vz79eFriUb-H5RzfPnisMtFoCiWvJQ4s5ftoPOjf94ZR6IcQaZLHi0h4sJUpM9aplIGH49TpJJU-o7HaB2qOW6dB00wrQ2KupJLCsMQaJjPNFTlAjXJW2iOEKbWOGaW0z2BonhrFE-k0NB4WjGgtWui81lWhA1k49Kx4LKqkIcsK0GwRNNtCZx_Sz0uSjF_kDoPaP8WgR6jgLdQNZvhjgXZtoyKctXmR0owmPCc0P_7fKidoA4bLHylt1Fi8vNpTH1osVMcH1Xdpp9pe78tkxGk |
linkProvider | Hindawi Publishing |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Qualitative+Analysis+of+Commercial+Services+in+MEC+as+Phased-Mission+Systems&rft.jtitle=Security+and+communication+networks&rft.au=Gong%2C+Yuhuan&rft.au=Mo%2C+Yuchang&rft.date=2020&rft.pub=Hindawi&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2020&rft_id=info:doi/10.1155%2F2020%2F8823952&rft.externalDocID=10_1155_2020_8823952 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon |