Qingqing Zhai

Shanghai University

EngineeringReliability engineeringInfluence diagramMathematicsReal-time computing

31Publications

14H-index

423Citations

What is this?

Publications 36

Newest

#1Piao ChenH-Index: 5

#2Zhi-Sheng Ye (NUS: National University of Singapore)H-Index: 21

Last. Qingqing Zhai (SHU: Shanghai University)H-Index: 14

view all 3 authors...

AbstractMany large organizations have developed ambitious programs to build reliability databases by collecting field failure data from a large variety of components. To make the database concise, ...

#1Qingqing Zhai (SHU: Shanghai University)H-Index: 14

#1Qingqing Zhai (SHU: Shanghai University)

Last. Zhi-Sheng Ye (NUS: National University of Singapore)

view all 2 authors...

AbstractThe recent decade has witnessed an emerging usage of Unmanned Aerial Vehicles (UAVs) in both military and civilian applications. Compared with manned aircrafts, a much larger percentage of ...

#1Lijuan ShenH-Index: 1

#2Yudong WangH-Index: 1

Last. Yincai TangH-Index: 1

view all 4 authors...

#1Rui Peng (Beijing University of Technology)H-Index: 1

#2Kaiye Gao (BISTU: Beijing Information Science & Technology University)H-Index: 1

Last. Qingqing Zhai (SHU: Shanghai University)H-Index: 14

view all 4 authors...

This paper studies the reliability of a distributed computing system where the task on a computer may be aborted if it is still not finished until a time threshold. The mission is regarded as successful if all these tasks are completed by at least one computer before a pre-specified time. An abort policy model is proposed and a multi-valued decision diagram approach is adopted to evaluate the system reliability for any given abort policy. A numerical example is provided to illustrate the applica...

#1Kaiye Gao (BISTU: Beijing Information Science & Technology University)H-Index: 1

#2Rui Peng (Beijing University of Technology)H-Index: 1

Last. Qingqing Zhai (SHU: Shanghai University)H-Index: 14

view all 4 authors...

Tuberculosis is one of leading threats to human beings’ health. Thus, the screening is essential as it can contribute to the more effective treatment of the patients infected with tuberculosis and the reduction of unintended infection from these patients to others. Adopting the Cox survival model to characterize the infection probability, an optimal screening strategy is proposed to minimize the corresponding total cost. Numerical examples are presented to illustrate the proposed model.

#1Lanqing Hong (NUS: National University of Singapore)H-Index: 3

#2Qingqing Zhai (SHU: Shanghai University)H-Index: 14

Last. Zhi-Sheng Ye (NUS: National University of Singapore)H-Index: 21

view all 4 authors...

Components in a system work under the same dynamic operating conditions, and their lifetimes are generally positively correlated. Ignorance of the correlation may lead to a significant bias in the evaluation of system reliability. Using the cumulative exposure principle, we model the equivalent operating time of the components, resulting from the cumulative effects of the dynamic environments, as a monotone increasing stochastic time scale. Commonly-used models, such as the compound Poisson, gam...

#1Rui Peng (Beijing University of Technology)H-Index: 1

#2Xiaoyang Ma (BISTU: Beijing Information Science & Technology University)

Last. Kaiye Gao (BISTU: Beijing Information Science & Technology University)

view all 4 authors...

As one of the most important indexes to evaluate the quality of software, software reliability experiences an increasing development in recent years. We investigate a software reliability growth model (SRGM). The application of this model is to predict the occurrence of the software faults based on the non-homogeneous Poisson process (NHPP). Unlike the independent assumptions in other models, we consider fault dependency. The testing faults are divided into three classes in this model: leading f...

#1Rui PengH-Index: 18

#2Di WuH-Index: 1

Last. Qingqing ZhaiH-Index: 14

view all 4 authors...

This paper analyzes the optimal strategies for the attacker in an attack-defense game on a network consisting of interdependent subnetworks. The defender moves first and evenly allocates the scarce resource to protect the network nodes. The attacker moves after observing the actions taken by the defender, allocating its limited resources to attack the network nodes. Binary Decision Diagram is employed to obtain all potential states of a given interdependent network after attack. For each of the ...

#1Rui Peng (USTB: University of Science and Technology Beijing)H-Index: 18

#2Di Wu (Xi'an Jiaotong University)H-Index: 1

Last. Qingqing Zhai (SHU: Shanghai University)H-Index: 14

view all 3 authors...

This paper studies the defense strategy for a parallel system subject to an unintentional impact and an intentional impact. Existing research assumes that system damage is caused by either natural disasters (unintentional impacts) or strategic attackers (intentional impacts). However, in practice, the defender may encounter diverse scenarios, where these two kinds of impacts can happen in a sequential order. Without knowing the precise occurrence sequence, the defender must allocate its limited ...

#1Qingqing Zhai (SHU: Shanghai University)H-Index: 14

#2Piao ChenH-Index: 5

Last. Lijuan Shen (NUS: National University of Singapore)H-Index: 2

view all 4 authors...

Abstract Due to the variability of raw materials and the fluctuation in the manufacturing process, degradation of products may exhibit unit-to-unit variability in a population. The heterogeneous degradation rates can be viewed as random effects, which are often modeled by a normal distribution. Despite of its mathematical convenience, the normal distribution has certain limitations in modeling the random effects. In this study, we propose a novel random-effects Wiener process model based on idea...

1234