彭锐
高被引学者 https://www.instrument.com.cn/news/20130425/
- 姓名:彭锐
- 目前身份:
- 担任导师情况:
- 学位:
-
学术头衔:
- 职称:-
-
学科领域:
管理理论
- 研究兴趣:
彭锐,男,北京科技大学东凌经济管理学院副教授。2007年毕业于中国科学技术大学少年班光信息科学与技术专业获学士学位,并被新加坡国立大学工业与系统工程系以全额奖学金录取直接进入博士阶段学习。2011年取得博士学位。博士期间主要从事的研究方向包括:软件错误数据的统计分析,网络可靠性模拟与优化,复杂系统的维修与防护。已有41篇论文发表在sci收录的国际期刊上,如iie transactions, reliability engineering & systems safety, journal of the operational research society。 2010年12月到2011年12月全职担任新加坡temasek国防系统研究院多个无人驾驶飞机协作路线安排项目的研究工程师, 完成了综合拐点信息的无人驾驶飞机路线优化软件并从事了无人驾驶飞机侦查系统的可靠性研究。已经获得国家国家自然科学基金青年项目;考虑故障覆盖和切换失效的、带有温备份的冗余系统可靠性研究;,合20.5 万。又获得面上,合45.5万。
-
凯发k8国际首页主页访问
1736
-
关注数
1
-
成果阅读
2017
-
成果数
21
上传时间
2019-01-20
彭锐
eksploatacja i niezawodnosc – maintenance and reliability,2018,2(2):273-277
2018年04月01日
the reliability of network systems of various structures has been studied by many researchers. however, most of the works just consider the reliability of a single network system. in practice, different networks may be interdependent such that the failure in one network may result in the failure in another network. the cascading failures have been shown to be catastrophic by some researchers. however, the quantitative evaluation for the reliability of interdependent networks has not been proposed. in this paper, a multi-valued decision diagram based approach is presented to evaluate the reliability of interdependent networks. illustrative examples are proposed to demonstrate the application of the framework.
reliability,, , networks, cascading failure,, interdependency,, multi-valued decision diagram.,
-
165浏览
-
0点赞
-
0收藏
-
0分享
-
0下载
-
引用
上传时间
2019-01-20
彭锐
ieee transactions on reliability,2018,0(0):0
2018年08月01日
linear consecutive-k-out-of-n systems are frequently used to model vacuum systems, telecommunication networks, oil pipeline systems, and the photographing of nuclear accelerators. substantial research has been devoted to analyzing the reliability of such systems, using many different approaches and assumptions. nevertheless, existing reliability formulas may not be suitable for all real systems. this paper therefore proposes a nonrecursive closed-form expression for a consecutive-k-out-of-n system that is made up of three types of nonidentical components. the corresponding dynamic survival function and mean time to failure are derived for the suggested system, and numerical experiments are carried out to illustrate its application.
consecutive-k-out-of-n systems,, mean time to failure (, mttf), ,, reliability,, survival function.,
-
122浏览
-
0点赞
-
0收藏
-
0分享
-
0下载
-
引用
上传时间
2019-01-20
彭锐
ieee transactions on reliability,2019,0(0):1-11
2019年01月01日
this paper studies the defense strategy for a parallel system subject to an unintentional impact and an intentional impact. existing research assumes that system damage is caused by either natural disasters (unintentional impacts) or strategic attackers (intentional impacts). however, in practice, the defender may encounter diverse scenarios, where these two kinds of impacts can happen in a sequential order.without knowing the precise occurrence sequence, the defender must allocate its limited resources against two successive impacts. in each contest, the defender can construct redundant elements and protect them from damage, to minimize the expected loss from system destructions. illustrative examples of the optimal strategy are presented in three cases: first, where the unintentional impact comes first; second, where the intentional impact comes first; and third, where the two impacts come in an uncertain order. supplemental protection is considered in the model extension, where the defender can allocate additional protection resources to those elements that have survived after the first impact.
defense strategy,, expected damage,, intentional impact,, system vulnerability,, unintentional impact.,
-
68浏览
-
0点赞
-
0收藏
-
0分享
-
0下载
-
引用
上传时间
2019-01-20
彭锐
european journal of operational research,2019,274(0):966-977
2019年01月01日
this paper investigates a novel two-phase preventive maintenance policy for a single-component system with an objective of maximizing the revenue generated by the performance-based contracting (pbc). the system undergoes a defective state before failure, and produces signal hinting the condition. the maintenance policy consists of two phases: imperfect maintenance phase followed by postponed replacement phase. in the imperfect maintenance phase, inspection is performed to reveal the defective state, leading to a possible repair. both the inspection and the repair are imperfect. in the postponed replacement phase, preventive replacement is performed during the upcoming scheduled maintenance window, before which no inspection or repair is executed. the expected net revenue under pbc is maximized via the joint optimization of the inspection interval, number of inspection and preventive replacement interval. we apply the model to a case from a steel converter plant, and the results show that our proposed maintenance policy outperforms some existing maintenance policies in terms of the net revenue.
keywords: maintenance delay time imperfect repair postponed replacement performance-based contract
-
230浏览
-
0点赞
-
0收藏
-
0分享
-
0下载
-
引用
上传时间
2019-01-20
彭锐
reliability engineering and system safety,2019,185(1):318-328
2019年01月01日
block withholding attack is an action where a miner who has found a legal block chooses not to submit it but rather directly abandons it. this attack makes the mining pool lose all bitcoin rewards contained within the block. in this paper, we construct a generalized model where two participants can choose to either cooperate with each other or employ a block withholding attack in the mining pool. to make the model more realistic, we consider both the cost of partial proof of work and the cost of cooperation. we also calculate the reward-per-time instead of profit-per-time to better measure the payoffs of each party. further, we discuss the case where the payoff function and cost function are directly related to the computational power. the pure strategy and mixed strategy are analyzed respectively and the segmentations of the equilibrium are shown. we demonstrate that increasing the information asymmetry by utilizing information conceal mechanisms could lower the occurrence of the bwh attack. 1. introduction the concept of bitcoin was originally proposed by nakamoto [1], and it is basically known as an open source software and a p2p network constructed on the software. unlike most existing currencies, bitcoin does not rely on a specific currency institution for its creation and distribution. instead, it is generated by a large number of calculations based on a specific algorithm. the bitcoin economy uses a distributed database of nodes in the entire p2p network to confirm and record all transaction behaviors, and it employs cryptographic design to ensure the security of all aspects of currency circulation. the advantages of this new economy include decentralization, worldwide circulation, exclusive ownership, lower transaction costs, no hidden costs and crossplatform mining. swan [2] performed a detailed introduction to blockchain, which includes the concepts, features and functionality of bitcoin and how one can use the blockchain for automated tracking of all digi
bitcoin blockchain block withholding attack equilibrium analysis payoff per time computational power
-
164浏览
-
0点赞
-
0收藏
-
0分享
-
0下载
-
引用
上传时间
2019-01-20
彭锐
reliability engineering & system safety,2018,177(1):131-137
2018年05月01日
this paper incorporates the abort policy into the routing problem of unmanned aerial vehicles (uav). in order to serve a number of targets, some uavs can be deployed each visiting part of the targets. different from other works on routing of uavs, it is assumed that each uav may experience shocks during the travel. in order to reduce the expected cost of uav destruction, it is allowed that a uav aborts the mission if it is found to have undergone too many shocks after it finishes serving a certain number of targets. the optimal routing plan together with the abort policy for each uav are studied, with the objective to minimize the total cost consisting of the expected cost of uav destruction and the expected cost for unvisited targets. test case is used to illustrate the application of the framework.
unmanned aerial vehicle optimization tabu search routing mission abort policy shocks
-
91浏览
-
0点赞
-
0收藏
-
0分享
-
0下载
-
引用
上传时间
2017-08-04
彭锐
,-0001,():
-1年11月30日
-
189浏览
-
0点赞
-
0收藏
-
0分享
-
0下载
-
引用
上传时间
2017-08-04
彭锐
,-0001,():
-1年11月30日
-
125浏览
-
0点赞
-
0收藏
-
0分享
-
0下载
-
引用
上传时间
2017-08-04
彭锐
,-0001,():
-1年11月30日
-
86浏览
-
0点赞
-
0收藏
-
0分享
-
0下载
-
引用
上传时间
2017-08-04
彭锐
,-0001,():
-1年11月30日
-
79浏览
-
0点赞
-
0收藏
-
0分享
-
0下载
-
引用