This application claims the benefit: of Taiwan Patent Application No. 104119527, filed on Jun. 17, 2015, in the Taiwan Intellectual Property Office, the disclosure of which is incorporated herein in its entirety by reference.
1. Field of the Invention
The present disclosure generally relates to a network reliability evaluation method and a system thereof, in particular to a network reliability evaluation method for acyclic network and a system thereof.
2. Description of the Related Art
At present, many systems, such as computer and communication systems, power transmission and distribution systems, transportation systems, and oil/gas production systems,. can be modeled as networks in the planning, designing, and control of systems. The conventional networks have a source node, some junction nodes and sink nodes. The information transmitted in the networks originates from the source node and the junction node plays the role of the transmission in the network, wherein the junction node transmits information through the arc. Finally, the information is transmitted to different sink nodes. Evaluating the probability of connecting the source node to the sink nodes is defined as the reliability evaluation of the network. The reliability evaluation is applied to be an important indicator for evaluating the network performance.
The network reliability evaluation method is executed after all the minimal paths (MP) or all the minimal cuts (MC) are found. Generally, the method of using the minimal path is better than that using the minimal cut intuitively. In terms of the conventional networks, the methods of searching all the minimal paths are executed based on the arcs, which is more complicated.
The acyclic network plays a crucial role in the various networks. In the binary-state and acyclic networks, all the arcs have working state and failed state, and the connections among the nodes do not have the parallel arcs and are free of the self-loop. Generally, the networks formed of the information set in sequence can be defined as the acyclic networks.
For example, the applications of scheduling problems, data compression, data backtracking, data processing networks, and so on all have the probability of being the acyclic network.
In view of the aforementioned technical problems, the present disclosure aims to provide a method of finding all the minimal paths in the acyclic network and calculating the reliability of the network by the characteristic of the acyclic network, so that the complexity of calculation can be reduced and the computing speed of the network reliability can be accelerated.
In accordance with one objective of the present disclosure, a network reliability evaluation method is provided, and the network reliability evaluation method is feasible for an acyclic network. The acyclic network includes a plurality of nodes and a plurality of arcs which are applied to connect the plurality of nodes. The plurality of nodes form a total node set Vtot, and the total node set Vtot includes a source node and a sink node. The network reliability evaluation method includes the following step:
b′. determining whether there is a first node that belongs to a set [Vtot−(Ui=0kΘi∪Vp)] and is an adjacent node of the node set Vp by the processor, if so, the node set Vp including the first node, adding the count value k by 1, setting the kh corresponding node set Θk to be the first node, and executing the step c, if not, executing the step f;
Preferably, a lower limit value may be the number of the nodes in a shortest path starting from the source node to the sink node.
Preferably, an upper limit value may be the number of the nodes in a longest path starting from the source node to the sink node.
Preferably, after the processor determines that the number of the nodes is not equal to the upper limit value in the step e and before the step b is executed, the network reliability evaluation method further includes the step e′: determining Whether there is a third node v that belongs to the set [Vtot−(Ui=0kΘi∪Vp)] and is close adjacent node of the node set Vp by the processor, if so, the node set Vp including the third node v, adding the count value k by 1, setting the kth corresponding node set Θk including the third node v, and the minimal path set Ω including the path (p−{eij})∪({eiv}, {evj}), wherein eij denotes an arc between a node i and a node j in the node set Vp, eiv denotes an arc between the node i and the third node v, eyj denotes an arc between the third node v and the node j, and the step e is executed, if not, the step b is executed.
In accordance with another objective of the present disclosure, a network reliability evaluation system which is feasible for an acyclic network is provided, which including a plurality of nodes and a plurality of arcs connected to the plurality of nodes, the plurality of nodes forming a total node set Vtot, the total node set Vtot including a source node and a sink node, and the network reliability evaluation system includes a memory which stores an algorithm, and a processor which connects to the acyclic network and the memory, and outputs a network reliability after the algorithm is executed, wherein, the algorithm includes following steps:
Preferably, a lower limit value may be the number of the nodes in the shortest path starting from the source node to the sink node.
Preferably, an upper limit value may be the number of the nodes in the longest path starting from the source node to the sink node.
Preferably, after the algorithm determines that the number of the nodes is not equal to the upper limit value in the step e and before the step b is executed, the algorithm further includes the step e′: determining whether there is a third lode v that belongs to the set [Vtot−(Ui=0kΘi∪Vp)] and is a close adjacent lode of the node set Vp, if so, the node set Vp including the third node v, adding the count value k by 1, setting the kth corresponding node set Θk including the third node v, and the minimal path set Ω including the path (p={eij})∪({eiv},{evj}), wherein eij denotes an arc between a node i and a node j in the node set Vp, eiv denotes an arc between the node i and the third node v, eyj denotes an arc between the third node v and the node j and the step e is executed, if not, the step b is executed.
As mentioned previously, a network reliability evaluation method for acyclic network and a system thereof of the present disclosure may have one or more advantages as follows.
1. The network reliability evaluation method for acyclic network and the system thereof apply the characteristic of the acyclic network to search all the minimal paths, so as to reduce the complexity of calculation.
2. The network reliability evaluation method for acyclic network and the system thereof exclude the node set which has the least probability of having the minimal path in advance according to the lower limit value and upper limit value. Thereby, the efficiency of calculation is promoted.
3. The network reliability evaluation method for acyclic network and the system thereof are able to find out the other minimal paths rapidly by verifying the existence of the close adjacent node of the node set.
In order to facilitate the understanding of the technical features, the contents and the advantages of the present disclosure, and the effectiveness thereof that can be achieved, the present disclosure will he illustrated in detail below through embodiments with reference to the accompanying drawings. On the other hand, the diagrams used herein are merely intended to be schematic and auxiliary to the specification, but are not necessary to be true scale and precise configuration after implementing the present disclosure. Thus, it should not be interpreted in accordance with the scale and the configuration of the accompanying drawings to limit the scope of the present disclosure on the practical implementation.
In accordance with the embodiment(s) of the present invention, the components,. process steps, and data structures described herein may be implemented using various. types of operating systems, computing platforms, computer programs, and/or general purpose machines. In addition, those of ordinary skill in the art will recognize that devices of a less general purpose nature, such as hardwired devices, field programmable gate arrays (FPGAs), application specific integrated circuits (ASICs), or the like, may also be used without departing from the scope and spirit of the inventive concepts disclosed herein. Where a method comprising a series of process steps is implemented by a computer or a machine and those process steps can be stored as a series of instructions readable by the machine, they may be stored on a tangible medium such as a computer memory device (e.g., ROM (Read Only Memory), PROM (Programmable Read Only Memory), EEPROM (Electrically Erasable. Programmable Read Only Memory), FLASH Memory, Jump Drive, and the like), magnetic storage medium (e.g., tape, magnetic disk drive, and the like), optical storage medium (e.g., CD-ROM, DVD-ROM, paper card and paper tape, and the like) and other known types of program memory.
Please refer to
The minimal path (MP) is applied to denote an arc set which forms a path, and when an arc is removed from the arc set, the arc set is not the minimal path anymore. For example, in
The minimal path node subset (MPN) is applied to denote a node set corresponding to the minimal path. For example, the MPN which the MP {e14, e42, e23, e45} corresponds to {1, 4, 2, 3, 5}, and the MPN which the MP {e14, e45} corresponds to is the MP {1, 4, 5}.
The acyclic network is a network without cycle, and the acyclic network applied in the present disclosure satisfies with the following three conditions. (1) Each node in the network is perfectly reliable, totally. (2) Each arc in the network has working state and failed state. (3) The network does not have cyclic or parallel arcs and is free of the self-loop. Specifically, it can be referred to
The adjacent node applied in the present disclosure indicates that if a node i is the adjacent node of a node set V*, it means that the node i does not belong to the node set V*, and the arc eij existed in the entire network connects to the node i and a certain node j in the node set V*.
The close adjacent node applied in the present disclosure indicates that if a node i is the close adjacent node of a node set V*, it means that the node i does not belong to the node set V*, and the arcs eij, eik and eik existed in the entire network respectively connect to the node i and the at least two nodes j and k in the node set V*. Specifically, it can be referred to
The characteristic of the acyclic network is described as follows, and the characteristic of the acyclic network accelerates the process of finding out all the MPs.
Firstly, it has to be addressed that in the conventional network, a MPN set may correspond to more than one MR For example, as shown in
On the contrary, in the acyclic network, a MPN set only corresponds to one MP. For the sake of proving such characteristic, it has to be addressed that each MPN set has the longest path, and the longest path passes through all the nodes of the MPN set. Hence, the definition of the MPN proves that the MPN is a node set defined by a MP which passes through all the nodes, so that the MP exists and belongs to the aforementioned longest path absolutely. Afterwards, what has to be proven is that a MPN set only has a longest path, and the longest path is the MP that the MPN set corresponds to in the acyclic network. To the contrary, if two paths P1 and P2, which have respective longest paths, are found in a MPN set, the sequences of the two paths P1 and P2 passing through the node are not the same as the networks do not have the parallel arcs. That is to say, the MPN set has the node a and the node b, and the path P1 passes through the node a and then passes through the node b of the MPN set, however, the path P2 passes through the node b and then passes through the node a of the MPN set. As a result, it can be found that the longest path P1 necessarily has a secondary path P3 from the node a to the node b and the longest path P2 necessarily has a secondary path P4 from the node b to the node a. So, a cycle between the node a and the node b forms between the secondary path P3 and the secondary path P4 naturally, which does not conform to the foregoing definition of the acyclic network. Therefore, it proves that a MPN set only has a longest path, and the longest path is certainly the MP which the MPN set corresponds to.
As the MPN and the MP in the acyclic network have the one-to-one characteristic, when all the MPs have to be found out, all the MPNs found can be applied to the substitutes.
Comparing to the prior art, an algorithm used to find out all the MPs is performed according to the arcs, and the algorithm applied in the present disclosure is to find out all the MPs based on the nodes by the MPN. The amount of the arcs in the network is denoted by |E|, and the number of the nodes is denoted by |V|. Generally, the computational complexity of |E| and may have the following relationship: O(|E|)=O(|V2|). As a result, the algorithm applied in the present disclosure can effectively reduce the complexity of calculation so as to accelerate the calculation speed and to save the consumed resource for the calculation.
As a result, a network reliability evaluation method applied in the present disclosure can calculate the network reliability for an acyclic network according to the characteristic of the acyclic network. The acyclic network mentioned herein includes a plurality of nodes and a plurality of arcs connected to the plurality of nodes. The plurality of nodes form a total node set Vtot, and the total node set Vtot includes a source node and a sink node. Specifically, the embodiment of a network reliability evaluation method applied in the present disclosure includes the following steps.
The detailed steps of the first embodiment of a network reliability evaluation method applied in the present disclosure have been mentioned as above, and the concept can be further referred to
It is noteworthy that although the foregoing steps only aim to the condition with respect to one source node of the acyclic network to one sink node, it can be corrected easily to become one source node to multiple sink nodes, multiple source nodes to one sink node, or multiple source nodes to multiple sink nodes. Listing the source nodes and the sink nodes and accordingly matching them one-by-one and applying the aforementioned method to each source node and sink node is able to calculate the network reliability corresponding to each of the source nodes and sink nodes.
For the sake of further accelerating the calculation speed, the predetermined upper limit value and the lower limit value are applied to exclude the impossible node set before verifying whether the node set includes the MP. Specifically, the lower limit value is a number of the nodes in the shortest path starting from the source node to the sink node and the upper limit value is a number of the nodes in the longest path starting from the source node to the sink node. The Shortest and the longest paths mentioned herein aim to the entire network. Please refer to
Preferably, in the step e, when the processor determines that the number of the node sets Vpis not equal to the upper limit value before executing the step b, the network reliability evaluation method further includes the following step e′. The step e′ is as follows.
Here, the close adjacent node defined in the algorithm applied in the present disclosure is used to accelerate the calculation process. Please refer to
Please refer to
The flowing steps are applied to concretely describe the implementation of the second embodiment of the network reliability evaluation method of the present disclosure which is applied to the acyclic network shown in
The step a: the node set Vp={1, 5}, the counter k=0, and the minimal path set Ω={ } are set. Here, the minimal path set Ω is the position for saving the MP. The 0th corresponding node set Θ0={ } is set. The maximal value corresponding to the acyclic network is Lub=5, and the minimal value corresponding to the acyclic network is Llb=3. Next, the step b is executed.
The step b: as |Vp|=2<Lub, the step b′ is executed.
The step b′: as the node 2 is the adjacent node of the node set Vp={1, 5} and belongs to the set [Vtot−(Ui=0kΘi∪Vp)]={2, 3, 4}, the node set Vp includes the node 2, so Vp={1, 5, 2}; the counter k is added by 1, so k=1 the first corresponding node set Θ1 includes the node 2, and Θ1={2}. Afterwards, the step c is executed.
The step c: as Llb=|Vp|=3, the step d is executed.
The step d: as the network formed of the node set Vp={1, 5, 2} excludes the path starting from the source node 1 to the sink node 5 via all the nodes in the Vp, the step d′ is executed.
The step d′: as the network formed of the set [Vtot−(Ui=0kΘi−Vp)]={1, 2, 3, 4, 5} includes the path starting from the source node 1 to the sink node 5, the step b is executed.
The step b: as |Vp|=3<Lub=5, the step b′ is executed.
The step b′: as the node 3 is the adjacent node of the node set Vp={1, 5, 2} and belongs to the set [Vtot−(Ui=0kΘi−Vp)]={3, 4}, the node set Vp includes the node 3, so Vp={1, 5, 2, 3}; the counter k is added by 1, so k=2, and the second corresponding node set Θ2 includes the node 3, and Θ2={3}. Afterwards, the step c is executed.
The step c: as Llb=3<|Vp|=4, the step d is executed.
The step d: as the network formed of the Vp={1, 5, 2, 3} includes the path p starting from the source node 1 to the sink node 5 via all the nodes in Vp, so p={e12, e23, e35}, the minimal path Ω includes the path p, and then the step e is executed.
The step e: as Lub=5>|Vp|=4, the step e′ is executed.
The step e′: as the node 4 belongs to the set [Vtot−(Ui=0kΘi∪Vp)]={4} and is the close adjacent node of the node set Vp, the node set Vp includes the node 4, so Vp={1, 5, 2, 3, 4}; the count value k is added by 1, so k=3, the minimal path Ω includes the path (p={eij})∪({eiv},{evj})={e14, e42, e23, e35}, and then the step e is executed.
The step e: as Lub=|Vp|=5, the step f is executed.
The step f: as Llb=2<|Vp|=5, the step f′ is executed.
The step f′: as there are no nodes that belong to the set [Vtot−(Ui=0kΘi∪Vp)]={ } and are the adjacent node of the node set Vp, the last node 4 of the node set Vp is deleted, so Vp={1, 5, 2, 3}, the count value k is subtracted by 1, so k=2, and then the step f is executed.
The step f: as Llb=2<|Vp|=4, the step f′ is executed.
The step f′: as the node 4 belongs to the set [Vtot−(Ui=0iΘi∪Vp)]={4} and is the adjacent node of the node set Vp, the node 4 replaces the last node 3 in the node set Vp, Vp={1, 5, 2, 4}, and the second corresponding node set Θ2 includes the node 4, Θ={4, 3}. Afterwards, the step d is executed.
The step d: as the network formed of the node set Vp={1, 5, 2, 4} excludes the path starting from the source node 1 to the sink node 5 via all the nodes in Vp, the step d′ is executed.
The step d′: as the network formed of Vp={1, 5, 2, 4} includes the path {e14, e45} starting from the source node 1 to the sink node 5 but excludes all the nodes in the node set Vp which started from source node 1 to the sink node 5, the step b is executed.
The step b: as |Vp|=4<Lub=5, the step b′ is executed.
The step b′: as there are no nodes that belong to the set [Vtot−(Ui=0kΘi∪Vp)]={ } and are the adjacent node of the node set Vp, the step f is executed.
The step f: as Llb=2<|Vp|=4, the step f′ is executed.
The step f′: as there are no nodes that belong to set [Vtot−(Ui+0kΘi∪Vp)]={ } and are the adjacent node of the node set Vp, the last node 4 of the node set Vp is deleted, so Vp={5, 2}; the count value k is subtracted by 1, so k=1, and then the step f is executed.
The step f: t as Llb=2<|Vp|=3, he step f′ is executed.
The step f′: as the node 3 belongs to the set [Vtot−(Ui+0kΘi∪Vp)]={3, 4} and is the adjacent node of the node set Vp, the node 3 replaces the last node 2 in the node set Vp, so Vp={1, 5, 3}; and the first corresponding node set Θ1 includes the node 3, Θ1={2, 3}. Afterwards, the step d is executed.
The step d: as the network formed of the node set Vp={1, 5, 3} excludes the path starting from the source node 1 to the sink node 5 via all the nodes in Vp, the step d′ is executed.
The step d′: as the network formed the set [Vtot−(Ui=0kΘi∪Vp)]={1, 3, 4, 5} includes the path stalling from the source node I to the sink node 5, the step b is executed.
The step b: as |Vp|=3<Lub=5, the step b′ is executed.
The step b′: as the node 4 is the adjacent node of the node set Vp={1, 5, 3} and belongs to the set [Vtot−(Ui=0kΘi∪Vp)]={4}, the node set Vp includes the node 4, so Vp={1, 5, 3, 4}; the counter k is added by 1, so k=2, and the second corresponding node set Θ2 includes the node 4, Θ2={4}. Afterwards, the step c is executed.
The step c: as Llb=3<|Vp|=4, the step d is executed.
The step d: as the network formed of the node set Vp={1, 5, 3, 4} includes the path p starting from the source node 1 to the sink node 5 via all the nodes in Vp, p={e14, e43, e35}, the minimal path set Ω includes the path p, and then the step e is executed.
The step e: as Lub=5>|Vp|=4, the step e′ is executed.
The step e′: as there are no nodes that belong to the set [Vtot−(Ui=0kΘi∪Vp)]={ } and are the close adjacent node of the node set Vp, the step b is executed.
The step b: as Vp|=4<Lub=5, the step b′ is executed.
The step b′: as there are no nodes that belong to the set [Vtot−(Ui=0kΘi∪Vp)]={ } and are the adjacent node of the node set Vp, the step f is executed.
The step f: as Llb=2<|Vp|=4, the step f is executed.
The step f′: as there are no nodes that belong to set [Vtot−(Ui=0kΘi∪Vp)]={ } and are the adjacent node of the node set Vp, the last node 4 of the node set Vp is deleted, so Vp={1, 5, 3}; the count value k is subtracted by 1, so k=1, and then the step f is executed.
The step f: as Llb=2|Vp|=3, the step f is executed.
The step f′: as the node 4 belongs to the set [Vtot−(Ui=0kΘi∪Vp)]={4} and is the adjacent node of the set Vp, the node 4 replaces the last node 3 in the set Vp, so V={1, 5, 4}, and the first corresponding node set Θ1 includes the node 4, Θ2={2, 3, 4}. Afterwards, the step d is executed.
The step d: as the network formed of the node set Vp={1, 4, 5} includes the path p starting from the source node 1 to the sink node 5 via all the nodes in Vp, p={e14, e45}, the minimal path set Ω includes the path p, and then the step e is executed.
The step e: as Lub=5>|Vp|=3, the step e is executed.
The step e′: as there are no nodes that belong to the set [Vtot−(Ui=0kΘi∪Vp)]={ } and are the close adjacent node of the node set Vp, the step b is executed.
The step b: as |Vp|=3<Lub=5, the step b′ is executed.
The step b′: as there are no nodes that belong to the set [Vtot−(Ui=0kΘi∪Vp)]={ } and are the adjacent node of the node set Vp, the step f is executed.
The step f: as Llb=2<|Vp|=3, the step f′ is executed.
The step f′: as there are no nodes that belong to the set [Vtot−(Ui=0kΘi∪Vp)]={ } and are the adjacent node of the node set Vp, the last node 4 of the node set Vp is deleted, so Vp={1, 5}; and the count value is subtracted by 1, so k=0. Afterwards, the step f is executed.
The step f: as Llb=|Vp|=2, the step g is executed.
The step g: the network reliability of the acyclic network is calculated according to all the paths {{e12, e23, e35}, {e14,e42, e23, e35}, {e14, e43, e35}, {e14, e45}} in the minimal path set Ω.
According to the forgoing description, it can be found that the network reliability evaluation method for an acyclic network is feasible to find out all the MPs of the acyclic network based on the nodes and to calculate the network reliability of the acyclic network according to all the MPs.
While the means of specific embodiments in present disclosure has been described by reference drawings, numerous modifications and variations could he made thereto by those.
skilled in the art without departing from the scope and spirit of the invention set forth in the claims. The modifications and variations should in a range limited by the specification of the present disclosure.
Number | Date | Country | Kind |
---|---|---|---|
104119527 | Jun 2015 | TW | national |