Vulnerability Assessment Method for Mixed-flow Manufacturing System with Time-varying Performance Parameters

被引:0
作者
Gao G. [1 ]
Yue W. [1 ]
Wang F. [1 ]
机构
[1] College of Mechanical and Electrical Engineering, Hunan University of Science and Technology, Xiangtan
来源
Jixie Gongcheng Xuebao/Journal of Mechanical Engineering | 2019年 / 55卷 / 18期
关键词
Assessment; L[!sub]Z[!/sub]-transform; Mixed-flow manufacturing system; Vulnerability;
D O I
10.3901/JME.2019.18.215
中图分类号
学科分类号
摘要
For the disadvantages of the conventional vulnerability assessment methods for the mixed flow manufacturing system, by considering the real-time changes performance parameters of this type of system, a quantitative evaluation method for the vulnerability of mixed-flow manufacturing system (MMS) by using the LZ-transform is proposed. Firstly, using the discrete-time Markov principle, the instantaneous probability of each state of the manufacturing unit is obtained. According to the structural characteristics of the MMS, the LZ-transform of manufacturing unit and the series-parallel construction operator of the general generation function, the LZ-transform function of the MMS is obtained. Secondly, by following the system's vulnerability definition and LZ-transform function of MMS, the vulnerability assessment method is established by regarding the availability, expectation of average output, and instantaneous performance defect as the evaluation index. Finally, taking a simple MMS as an example, a vulnerability assessment method which is based on the corresponding LZ-transform function is proposed to evaluate the vulnerability. Compared to the traditional state entropy-based method, the results verify the applicability for the actual situation and the application of vulnerability assessment is also expanded. © 2019 Journal of Mechanical Engineering.
引用
收藏
页码:215 / 224
页数:9
相关论文
共 23 条
[1]  
Deng Y., Mahadevan S., Zhou D., Vulnerability assessment of physical protection systems: A bio-inspired approach, International Journal of Unconventional Computing, 11, pp. 227-243, (2015)
[2]  
Desmit Z., Elhabashy A.E., Wells L.J., Et al., Cyber-Physical vulnerability assessment in manufacturing systems, The, North American Manufacturing Research Conference, (2016)
[3]  
Desmit Z., Elhabashy A.E., Wells L.J., Et al., An approach to cyber-physical vulnerability assessment for intelligent manufacturing systems, Journal of Manufacturing Systems, 43, pp. 339-351, (2017)
[4]  
Yin H., Li B., Zhu J., Et al., Measurement method and empirical research on systemic vulnerability of environmental sustainable development capability, Sustainability, 6, 12, pp. 8485-8509, (2014)
[5]  
Kizhakkedath A., Tai K., Sim M.S., Et al., An Agent- Based Modeling and Evolutionary Optimization Approach for Vulnerability Analysis of Critical Infrastructure Networks, (2013)
[6]  
Cavdaroglu B., Hammel E., Mitchell J.E., Et al., Integrating restoration and scheduling decisions for disrupted interdependent infrastructure systems, Annals of Operations Research, 203, 1, pp. 279-294, (2013)
[7]  
Agudelo C.A.R., Uribe O.D.B., Paez C.A., The vulnerability of agricultural and livestock systems to climate variability: using dynamic system models in the Rancheria upper basin (Sierra Nevada de Santa Marta), Eco Mont-journal on Protected Mountain Areas Research, 7, 2, pp. 50-60, (2015)
[8]  
Kjolle G.H., Utne I.B., Gjerde O., Risk analysis of critical infrastructures emphasizing electricity supply and interdependencies, Reliability Engineering & System Safety, 105, 3, pp. 80-89, (2012)
[9]  
Dawson R.J., Wang M., An agent-based model for risk-based flood incident management, Natural Hazards, 59, 1, pp. 167-189, (2011)
[10]  
Zio E., Ferrario E., A framework for the system-of-systems analysis of the risk for a safety-critical plant exposed to external events, Reliability Engineering & System Safety, 114, 1, pp. 114-125, (2013)