A novel algorithm with heuristic rules to lower boundary points generation for network reliability evaluation

Ding Hsiang Huang, Cheng Fu Huang, Yi-Kuei Lin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

One of the well-known methodology of network reliability evaluation for a stochastic flow network (SFN) is based on all lower boundary points (LBPs). Nevertheless, several algorithms have been presented in the literature for the LBP problem, the efficiency is always the aim for the large SFN. In this study, based on heuristic rules, heuristic-flow vectors is developed to narrow down the searching range of flows for a certain demand. An algorithm based on the heuristic rules is proposed to find all LBPs. We compare the performance of the proposed algorithm and the original one in terms of CPU time through a benchmark network. The experimental results show the efficiency of our proposed a heuristic-LBP algorithm is better than the previous algorithm listed in the literature.

Original languageEnglish
Title of host publicationProceedings - 25th ISSAT International Conference on Reliability and Quality in Design
EditorsHoang Pham
PublisherInternational Society of Science and Applied Technologies
Pages15-19
Number of pages5
ISBN (Electronic)9780991057672
StatePublished - 1 Jan 2019
Event25th ISSAT International Conference on Reliability and Quality in Design, RQD 2019 - Las Vegas, United States
Duration: 1 Aug 20193 Aug 2019

Publication series

NameProceedings - 25th ISSAT International Conference on Reliability and Quality in Design

Conference

Conference25th ISSAT International Conference on Reliability and Quality in Design, RQD 2019
Country/TerritoryUnited States
CityLas Vegas
Period1/08/193/08/19

Keywords

  • Heuristic rules
  • Lower boundary point (LBP)
  • Network reliability
  • Stochastic flow Network

Fingerprint

Dive into the research topics of 'A novel algorithm with heuristic rules to lower boundary points generation for network reliability evaluation'. Together they form a unique fingerprint.

Cite this