Next Article in Journal
Research on the Correlation between the Exchange Rate of Offshore RMB and the Stock Index Futures
Next Article in Special Issue
Investigating the Influence of Non-Uniform Characteristics of Layered Foundation on Ground Vibration Using an Efficient 2.5D Random Finite Element Method
Previous Article in Journal
State-Difference Feedback Control for Discrete-Time Takagi–Sugeno Fuzzy Descriptor Systems with Parameter Uncertainties and External Noises
Previous Article in Special Issue
Wake Control of Flow Past Twin Cylinders via Small Cylinders
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimal Corrective Maintenance Policies via an Availability-Cost Hybrid Factor for Software Aging Systems

School of Science, Tianjin University of Commerce, Tianjin 300134, China
Mathematics 2024, 12(5), 694; https://doi.org/10.3390/math12050694
Submission received: 15 January 2024 / Revised: 20 February 2024 / Accepted: 26 February 2024 / Published: 27 February 2024

Abstract

:
Availability is an important index for the evaluation of the performance of software aging systems. Although the corrective maintenance increases the system availability, the associated cost may be very high; therefore, the balancing of availability and cost during the corrective maintenance phase is a critical issue. This paper investigates optimal corrective maintenance policies via an availability-cost hybrid factor for software aging systems. The system is described by a group of coupled differential equations, where the multiplier effect of the repair rate on a system variable is bilinear term. Our aim is to drive an optimal repair rate that ensures a balance between the maximal system availability and the minimal repair cost. In a finite time interval [ 0 , T ] , we rigorously discuss the state space of the system and prove the existence of the optimal repair rate, and then derive the first-order necessary optimality conditions by applying a variational inequality with the adjoint variables.

1. Introduction

Software aging, caused by aging-related bugs and crash-related bugs, is an inevitable phenomenon that plagues many long-running software systems and manifests itself in reduced system availability [1,2,3]. The earliest system studied for software aging issues was the Unix system [4], followed by the Window NT system [5], Linux system [6], Android system [7], and virtual machines [8].
With the rapid growth of Internet technology and the emergence of advanced online applications, it is important to ensure the high availability of software systems. To meet such a requirement, software systems need to be maintained. When maintenance strategies are carried out, the availability of the system increases, but at the same time, the cost of maintenance also increases. Therefore, how to strike a balance between availability and cost is a worthy issue. Software rejuvenation, first proposed by Huang et al. [9], is a preventive and proactive maintenance method for performance degradation caused by software aging phenomenons. As Alonso et al. [10] pointed out, service outages that are caused by rejuvenating the software system involve an overhead because of process terminations, job drops, or data loss. Hence, it is important to determine the optimal trigger time of software rejuvenation for achieving the best trade-off between the system availability and the rejuvenation cost. Up to now, a lot of works have been performed on such optimization problems. Huang et al. [9] deduced the threshold conditions of optimal rejuvenation time for telecommunications billing applications based on the downtime and the cost caused by downtime. Dohi et al. [11] formulated the software rejuvenation models, and derived the optimal software rejuvenation schedules by considering steady-state availability and the expected cost per unit time in the steady-state. Chen and Trivedi [12] established a semi-Markov decision process of a condition-based maintenance strategy optimization for preventive maintenance problems, and proposed a method of joint optimization of maintenance rate and maintenance strategy considering the system operating cost. Eto and Dohi [13] considered an operational software system with multiple degradations, and obtained the optimal software rejuvenation strategy with the minimum expected operating cost per unit time in steady-state through the method of dynamic programming. Meng et al. [14] investigated a periodically inspected rejuvenation policy for software systems, obtained the system availability function and cost rate function, and derived the optimal inspection time and the rejuvenation interval for maximizing system availability and minimizing cost rate. Koutras and Platis [15] developed multi-objective optimization problems to derive the rejuvenation policies for optimizing the system overall performance capability, taking into account availability and operating cost constraints. Zheng et al. [16] proposed a stochastic framework composed of a composite stochastic Petri reward net and its resulting non-Markovian availability model to capture the dynamic behavior of an operational software system in which time-based software rejuvenation and checkpointing are both aperiodically conducted. Baghi and Navimipour [17] utilized a hybrid cuckoo search (CS) and genetic algorithm (GA) to optimize the scheduling of cloud database paths, aiming to enhance the availability and reduce the cost of cloud computing.
Maintenance policies are divided into preventive maintenance and corrective maintenance [18]. Corrective maintenance, as a strategy for system maintenance, also known as post-fault maintenance, refers to taking maintenance measures after the system fails to restore the system to its normal state [18]. Since this maintenance strategy can only be implemented after the system fails, considering the maintenance costs under the control of the repair rate is important [19]. Saranga [20] proposed a general downtime cost model and used genetic algorithms to optimize the maintenance costs for complex systems. Ding et al. [21] evaluated the total expected cost and the upper and lower bounds of system availability of multi-state aging systems based on a continuously increasing failure rate function and a segmented constant approximation method, maximizing system availability, and minimizing expected costs. Özgür-Ünlüakın et al. [22] proposed a cost-effective dynamic Bayesian network modeling method, maximizing the reliability of the thermal storage air heaters systems and minimizing maintenance costs. Although there has been a rapid growth in the literature on preventive maintenance of software aging systems to combat the aging phenomenon for achieving the best balance between the software system availability and the rejuvenation cost, the research on corrective maintenance is very limited. In fact, corrective maintenance is an effective method to solve a system’s sudden service failures or crashes caused by the software aging phenomenon [23]. In this paper, we study a bilinear control problem for software aging systems by taking the repair rate as corrective maintenance. Mathematically, the system is formulated as a group of coupled differential equations. Compared with the other control strategies of software aging systems in the existing literature [24,25], the significant characteristic of this system is that the repair rate takes multiplicative effect on the system variable, named a bilinear control system [26].
The rest of the paper is organized as follows: Section 2 presents the mathematical framework of the software aging system and describes the corrective rejuvenation policy as an optimal repair rate control problem. Section 3 discusses the well-posedness of the software system and the existence of the optimal repair rate within a finite time interval [ 0 , T ] . In Section 4, the first-order necessary condition for the optimal repair rate is derived using a variational inequality, and the Bang-Bang property of the optimal repair rate control is derived. Section 5 provides a summary of the paper.

2. System Model and Preliminary Results

Let us recall the model of the considered software aging systems [27]. The system consists of the following three states: robust state, failure-prone state, and failure state, which are represented in Figure 1 as 0, 1, and 2, respectively. The sojourn times from 0 to 1, from 1 to 2, and from 0 to 2 follows an exponential distribution with parameters α , β and γ , respectively. The repair time from 2 to 0 follows a general distribution with repair rate μ ( x ) . In this model, the system that begins operating in state 0 can either go into state 1 and then into state 2 due to the aging-related bugs, or directly go into state 2 due to the crash-related bugs [1,2]. In state 2, the system will be repaired and return to state 0.
By the supplementary variable method [28], the system can be expressed as the following set of coupled differential equations:
d p 0 ( t ) d t = ( α + γ ) p 0 ( t ) + 0 μ ( x ) p 2 ( t , x ) d x d p 1 ( t ) d t = α p 0 ( t ) β p 1 ( t ) p 2 ( t , x ) t + p 2 ( t , x ) x = μ ( x ) p 2 ( t , x )
with the boundary condition
p 2 ( t , 0 ) = γ p 0 ( t ) + β p 1 ( t )
and the initial values
p 0 ( 0 ) = 1 , p 1 ( 0 ) = p 2 ( 0 , x ) = 0 ,
here p 0 ( t ) and p 1 ( t ) stand for the probability that the system is in the robust state and in the failure probable state at time t , respectively, p 2 ( t , x ) stands for the probability density that the system is in the failure state and has an elapsed repair time of x at time t .
Let T be a fixed time satisfying 0 < T < . This paper investigates the corrective maintenance policy for software aging systems (1)—(3) in the time interval [ 0 , T ] , with the aim of analyzing the optimal repair rate that strikes a balance between the maximal system interval availability and the minimal repair cost of the system.
For the software aging system (1)–(3), we solve p 2 ( t , x ) by using the method of characteristics [29]. Let p ¯ 2 ( t ) = p 2 ( t , x ) , we transform the third partial differential equation of (1) into ordinary differential equation as follows:
d p ¯ 2 ( t ) d t = p 2 ( t , x ) t + p 2 ( t , x ) x · d x d t = μ ( x ) p ¯ 2 ( t ) .
Let d x d t = 1 , we obtain x = t + ξ ( ξ is a constant), then Equation (4) can be rewritten as follows:
d p ¯ 2 ( t ) d t = μ ( t + ξ ) p ¯ 2 ( t ) .
For x < t , we integrate (5) from ξ to t and use p ¯ 2 ( ξ ) = p 2 ( ξ , 0 ) = p 2 ( t x , 0 ) as follows:
p 2 ( t , x ) = p ¯ 2 ( t ) = p ¯ 2 ( ξ ) e ξ t μ ( s + ξ ) d s = p 2 ( t x , 0 ) e 0 x μ ( s ) d s = ( γ p 0 ( t x ) + β p 1 ( t x ) ) e 0 x μ ( s ) d s ;
for x t , we integrate (5) from 0 to t , and use p ¯ 2 ( 0 ) = p 2 ( 0 , ξ ) = p 2 ( 0 , x t ) = 0 and initial values (3) as follows:
p 2 ( t , x ) = p ¯ 2 ( t ) = p ¯ 2 ( 0 ) e 0 t μ ( s + ξ ) d s = 0 .
Thus, the dynamical solution p 2 ( t , x ) of the software aging system (1)–(3) can be expressed as follows:
p 2 ( t , x ) = ( γ p 0 ( t x ) + β p 1 ( t x ) ) e 0 x μ ( s ) d s , x < t , 0 , x t ,
so when t [ 0 , T ] , 0 μ ( x ) p 2 ( t , x ) d x = 0 T μ ( x ) p 2 ( t , x ) d x , and then the system (1)–(3) is equivalent to the following:
d p 0 ( t ) d t = ( α + γ ) p 0 ( t ) + 0 T μ ( x ) p 2 ( t , x ) d x , d p 1 ( t ) d t = α p 0 ( t ) β p 1 ( t ) , p 2 ( t , x ) t + p 2 ( t , x ) x = μ ( x ) p 2 ( t , x ) , p 2 ( t , 0 ) = γ p 0 ( t ) + β p 1 ( t ) , p 0 ( 0 ) = 1 , p 1 ( 0 ) = p 2 ( 0 , x ) = 0 .
To maximize the availability and minimize the repair cost of the software system in time interval [ 0 , T ] , we establish an optimal repair rate μ ( x ) as the control variable and define the set of admissible controls as follows:
U a d = { μ ( x ) L ( 0 , T ) | 0 μ ( x ) μ ¯ < , a . e . x [ 0 , T ] } ,
in which μ ¯ = sup x ( 0 , T ) μ ( x ) . Clearly, U a d is a convex and closed set in L ( 0 , T ) . At this point, the system (9) within the admissible control domain is referred to as the controlled system (9).
Let m ( x ) L 1 ( 0 , T ) be the repair cost of the system (9) in state 2. For a given terminal time 0 < T < , the current work aims at deriving the optimal repair rate μ ( x ) U a d such that the following objective functional is minimized:
J ( μ ) = a 0 T 0 T p 2 ( t , x ) d x d t + b 0 T μ ( x ) m ( x ) d x
where a > 0 , b > 0 are the control weight parameters, 0 T 0 T p 2 ( t , x ) d x d t means the probability that the system (9) is in state 2 within the time interval [ 0 , T ] , 0 T μ ( x ) m ( x ) d x is the total repair cost of the system (9) within the time interval [ 0 , T ] . Note that our control problem is a bilinear control due to the product term μ ( x ) p 2 ( t , x ) of the controlled system (9).

3. Existence of an Optimal Repair Rate

In this section, we investigate the existence of the optimal repair rate μ * ( x ) U a d for the controlled system (9). To this end, we introduce the following definitions: 1 and 2, as well as Theorems 1 and 2.
Definition 1
(Weak convergence, weak * convergence [30]). Let X be a linear normed space, and X * be its dual space. A sequence { x n } X is said to weakly converge to x , denoted as x n x , if for all x * X * , x * , x n x 0 ; A sequence { x n * } X * is said to weak * converge to x * , denoted as x n * * x * , if for all x X , x n * x * , x 0 .
Theorem 1
(Banach-Alaoglu [30]). Let X * be the dual space of a separable linear normed space X . Suppose { x n * n = 1 , 2 , } X * is a sequence that is bounded in norm: M = sup x n * < . Then it must have a subsequence that weakly * converges.
Definition 2
(Weakly lower semi-continuous [30]). Let X be a linear normed space, and f be a function. The function f is said to be weakly lower semi-continuous if and only if for any sequence x n x 0 , we have f ( x 0 ) lim ̲ n f ( x n ) .
Theorem 2
([30]). Suppose X is the dual space of a separable Banach space, and let E X be a weak * sequentially closed, non-empty subset. If f : E R 1 is weak * lower semi-continuous and coercive (i.e., x E , f ( x ) + as x ), then f attains its minimum on E .
As Theorem 2 implies, to establish the existence of the optimal repair rate μ * ( x ) U a d , it is necessary to investigate the state space of the controlled system (9), which satisfies weak closedness and weak continuity.

3.1. State Space Description of the Controlled System (9)

In this subsection, we investigate the state space of the controlled system (9). To this end, we first give the concept of standard Sobolev space.
For any positive integer m and 1 p , we consider the standard Sobolev space W m , p ( 0 , T ) { u | D α u L p ( 0 , T ) f o r 0 | α | m } as follows:
u m , p = 0 | α | m D α u p p 1 / p , if 1 p < ;
u m , = max 0 | α | m D α u ,
where D α u is a weak partial derivative of u . Let L t 1 ( 0 , T ) and L x 1 ( 0 , T ) refer to the L 1 -space, with respect to t and x .
Theorem 3.
The software system (9) has a unique non-negative dynamical solution
P ( t ) = ( p 0 ( t ) , p 1 ( t ) , p 2 ( t , x ) ) T = e ( α + γ ) t + 0 t e ( α + γ ) ( t s ) 0 s μ ( x ) p 2 ( s , x ) d x d s α e β t 0 t p 0 ( s ) e β s d s ( γ p 0 ( t x ) + β p 1 ( t x ) ) e 0 x μ ( s ) d s , x < t , e ( α + γ ) t + 0 t e ( α + γ ) ( t s ) 0 s μ ( x ) p 2 ( s , x ) d x d s α e β t 0 t p 0 ( s ) e β s d s 0 , x t ,
 which satisfies 
p 0 ( t ) + p 1 ( t ) + 0 T p 2 ( t , x ) d x = 1 , t 0
 and 
( p 0 ( t ) , p 1 ( t ) , p 2 ( t , x ) ) T W 1 , ( 0 , T ) × W 1 , ( 0 , T ) × ( W 1 , ( 0 , T ; L 1 ( 0 , T ) ) L ( 0 , T ; W 1 , 1 ( 0 , T ) ) ) .
Proof. 
Firstly, we derive (14). Substituting the dynamical solution (8) of p 2 ( t , x ) into the first and second equations of the system (9) and combining the initial values p 0 ( 0 ) = 1 , p 1 ( 0 ) = p 2 ( 0 , x ) = 0 shows that when x < t or x t ,
p 0 ( t ) = e ( α + γ ) t + 0 t e ( α + γ ) ( t s ) 0 s μ ( x ) p 2 ( s , x ) d x d s , p 1 ( t ) = α e β t 0 t p 0 ( s ) e β s d s ;
Obviously, the solution P ( t ) is non-negative. This completes the proof of (14).
Secondly, we derive (15). Taking the integral of the third partial differential equation of (9) with respect to x from 0 to T , and then adding it to the first and second differential equation of (9) to obtain the following:
d p 0 ( t ) d t + d p 1 ( t ) d t + d d t 0 T p 2 ( t , x ) d x = 0 , 0 t T ,
which implies the following:
p 0 ( t ) + p 1 ( t ) + 0 T p 2 ( t , x ) d x = p 0 ( 0 ) + p 1 ( 0 ) + 0 T p 2 ( 0 , x ) d x = 1 , 0 t T ,
As a consequence, the system is conservative as follows:
sup t [ 0 , T ] p 0 1 , sup t [ 0 , T ] p 1 1 , and sup t [ 0 , T ] p 2 L x 1 ( 0 , T ) 1 .
Then based on (9), (10), and (18), we have the following:
sup t [ 0 , T ] d p 0 ( t ) d t ( α + γ ) p 0 L t 1 ( 0 , T ) + sup t [ 0 , T ] 0 T μ ( x ) p 2 ( t , x ) d x α + γ + μ ¯ ;
sup t [ 0 , T ] d p 1 ( t ) d t α p 0 L t 1 ( 0 , T ) + β p 1 L t 1 ( 0 , T ) α + β ,
which yields p 0 ( t ) W 1 , ( 0 , T ) and p 1 ( t ) W 1 , ( 0 , T ) . Moreover, for x < t , from (14) and the third partial differential equation of (9) is as follows:
p 2 ( t , x ) x = ( γ d p 0 ( t x ) d t + β d p 1 ( t x ) d t ) e 0 x μ ( s ) d s μ ( x ) ( γ p 0 ( t x ) + β p 1 ( t x ) ) e 0 x μ ( s ) d s .
Combining (21) with (18)–(20) obtains the following:
sup t [ 0 , T ] 0 T p 2 ( t , x ) x d x sup t [ 0 , T ] 0 T ( ( γ | d p 0 ( t x ) d t | + β | d p 1 ( t x ) d t | ) e 0 x μ ( s ) d s d x + sup t [ 0 , T ] 0 T ( γ p 0 ( t x ) + β p 1 ( t x ) ) e 0 x μ ( s ) d s μ ( x ) d x ( γ sup t [ 0 , T ] | d p 0 ( t x ) d t | + β sup t [ 0 , T ] | d p 1 ( t x ) d t | ) 0 T e 0 x μ ( s ) d s d x + ( γ sup t [ 0 , T ] p 0 ( t ) + β sup t [ 0 , T ] p 1 ( t ) ) 0 T e 0 x μ ( s ) d s μ ( x ) d x [ γ ( α + γ + μ ¯ ) + β ( α + β ) ] T + ( γ + β ) ,
which yields the following:
sup t [ 0 , T ] 0 T p 2 ( t , x ) t d x sup t [ 0 , T ] 0 T p 2 ( t , x ) x d x + sup t [ 0 , T ] 0 T | μ ( x ) p 2 ( t , x ) | d x [ γ ( α + γ + μ ¯ ) + β ( α + β ) ] T + ( γ + β ) + μ ¯ .
Therefore, p 2 ( t , x ) W 1 , ( 0 , T ; L 1 ( 0 , T ) ) L ( 0 , T ; W 1 , 1 ( 0 , T ) ) ) .
Finally, due to the Rellich–Kondrachov embedding theorem, for any that give T ( 0 < T < ) , we have the following [30]:
W 1 , ( 0 , T ) C [ 0 , T ] ; W 1 , 1 ( 0 , T ) L 1 ( 0 , T )
are compact; moreover, according to the Aubin–Lions–Simon Lemma [31], we know that
W 1 , ( 0 , T ; L 1 ( 0 , T ) ) L ( 0 , T ; W 1 , 1 ( 0 , T ) ) C [ 0 , T ] ; L 1 ( 0 , T )
is compact. This finishes the proof for Theorem 3.
Based on Theorem 3, we can derive the following corollary:
Corollary 1.
W 1 , ( 0 , T ) × W 1 , ( 0 , T ) × ( W 1 , ( 0 , T ; L 1 ( 0 , T ) ) L ( 0 , T ; W 1 , 1 ( 0 , T ) ) ) C [ 0 , T ] × C [ 0 , T ] × C [ 0 , T ] ; L 1 ( 0 , T ) is compact.

3.2. Existence of an Optimal Repair Rate

In this subsection, we investigate the existence of an optimal repair rate of (11).
Theorem 4.
There exists an optimal repair rate μ * ( x ) U a d such that J ( μ * ) = inf μ U a d J ( μ ) .
Proof. 
Since J ( μ ) is bounded from below, we choose { μ n } U a d as a minimizing sequence for (10) such that
lim n J ( μ n ) = inf μ U a d J ( μ ) ,
that is, for any given ε > 0 , there exists a N ( ε ) > 0 , when n N ( ε ) , we have the following:
J ( μ n ) < inf μ U a d J ( μ ) + ε M > 0 ,
while (11) shows that μ n L ( 0 , T ) < J ( μ n ) < M . Thus, we derive that { μ n ( x ) } is uniformly bounded in L ( 0 , T ) ; that is,
μ n ( x ) L ( 0 , T ) C 1 , n = 1 , 2 , ,
here, C 1 is a positive constant that is independent of n .
For convenience, we complete the remainder proof of this theorem in Steps 13.
Step 1: Prove that there exists μ * ( x ) such that μ n ( x ) * μ * ( x ) and μ * U a d .
By the Theorem 1 and the uniformly boundedness of μ n ( x ) in L ( 0 , T ) , it follows that there exists a convergent subsequence { u n k ( x ) } , still denoted { μ n ( x ) } , such that in L ( 0 , T ) ,
μ n ( x ) * μ * ( x ) ,
as n . Moreover, from (10), it follows that U a d is closed under the weak * topology of L ( 0 , T ) , i.e., μ * U a d .
Step 2: Prove that there exists P * ( t ) C [ 0 , T ] × C [ 0 , T ] × C [ 0 , T ] ; L 1 ( 0 , T ) such that the solution sequence P n ( t ) of the controlled system (9) corresponds to { μ n ( x ) } , converges to P * ( t ) , and P * ( t ) is the solution corresponding to μ * ( x ) .
Let sequence { P n ( t ) } = { ( p 0 n ( t ) , p 1 n ( t ) , p 2 n ( t , x ) ) T } be the solution corresponding to { μ n ( x ) } , we have
d p 0 n ( t ) d t = ( α + γ ) p 0 n ( t ) + 0 μ n ( x ) p 2 n ( t , x ) d x d p 1 n ( t ) d t = α p 0 ( t ) β p 1 n ( t ) p 2 n ( t , x ) t + p 2 n ( t , x ) x = μ n ( x ) p 2 n ( t , x ) p 2 n ( t , 0 ) = γ p 0 n ( t ) + β p 1 n ( t ) p 0 n ( 0 ) = 1 , p 1 n ( 0 ) = p 2 n ( 0 , x ) = 0 .
With Theorem 3, there exists a convergent subsequence { P n k ( t ) } , still denoted { P n ( t ) } , such that
P n ( t ) P * ( t ) strongly in C [ 0 , T ] × C [ 0 , T ] × C [ 0 , T ] ; L 1 ( 0 , T ) .
Next we verify that P * ( t ) is the solution corresponding to μ * ( x ) based on (14) by showing that
sup t [ 0 , T ] p 0 n p 0 * 0 , sup t [ 0 , T ] p 1 n p 1 * 0 , sup t [ 0 , T ] p 2 n p 2 * L x 1 ( 0 , T ) 0 .
In fact, as indicated by (14), we can obtain that
sup t [ 0 , T ] p 0 n p 0 * = sup t [ 0 , T ] 0 t e ( α + γ ) ( t τ ) 0 τ μ n ( x ) p 2 n ( τ , x ) d x d τ 0 t e ( α + γ ) ( t τ ) 0 τ μ ( x ) p 2 * ( τ , x ) d x d τ sup t [ 0 , T ] 0 t e ( α + γ ) ( t τ ) 0 τ μ n ( x ) ( p 2 n ( τ , x ) p 2 * ( τ , x ) ) d x d τ + sup t [ 0 , T ] 0 t e ( α + γ ) ( t τ ) 0 τ ( μ n ( x ) μ * ( x ) ) p 2 * ( τ , x ) d x d τ μ ¯ T sup t [ 0 , T ] p 2 n p 2 * L x 1 ( 0 , T ) + sup t [ 0 , T ] 0 t ( μ n ( x ) μ * ( x ) ) x t e ( α + γ ) ( t τ ) p 2 * ( τ , x ) d τ d x 0 .
sup t [ 0 , T ] p 1 n p 1 * = sup t [ 0 , T ] α e β t 0 t e β s ( p 0 n ( s ) p 0 * ( s ) ) d s 0
and
sup t [ 0 , T ] p 2 n p 2 * L x 1 ( 0 , T ) = sup t [ 0 , T ] 0 T ( γ p 0 n ( t x ) + β p 1 n ( t x ) ) e 0 x μ n ( s ) d s ( γ p 0 * ( t x ) + β p 1 * ( t x ) ) e 0 x μ * ( s ) d s γ sup t [ 0 , T ] 0 T ( p 0 n ( t x ) p 0 * ( t x ) ) e 0 x μ n ( s ) d s d x + γ sup t [ 0 , T ] 0 T p 0 * ( t x ) ( e 0 x μ n ( s ) d s e 0 x μ * ( s ) d s ) d x + β sup t [ 0 , T ] 0 T ( p 1 n ( t x ) p 1 * ( t x ) ) e 0 x μ n ( s ) d s d x + β sup t [ 0 , T ] 0 T p 1 * ( t x ) ( e 0 x μ n ( s ) d s e 0 x μ * ( s ) d s ) d x γ sup t [ 0 , T ] 0 T p 0 n ( t ) p 0 * ( t ) d x 0 t e 0 x μ n ( s ) d s d x + β sup t [ 0 , T ] 0 T p 1 n ( t ) p 1 * ( t ) d x 0 t e 0 x μ n ( s ) d s d x + ( γ + β ) sup t [ 0 , T ] 0 t e 0 x μ n ( s ) d s e 0 x μ * ( s ) d s d x γ T sup t [ 0 , T ] p 0 n ( t ) p 0 * ( t ) + β T sup t [ 0 , T ] p 1 n ( t ) p 1 * ( t ) + ( γ + β ) T sup t [ 0 , T ] e 0 x μ n ( s ) d s e 0 x μ * ( s ) d s 0 .
Therefore, P * ( t ) is the solution corresponding to μ * ( x ) in view of (10).
Step 3: Prove that J ( μ * ) = inf μ U a d J μ , μ * U a d .
The functional defined on L 1 ( 0 , T ) is given as follows:
μ n ( h ) = 0 T μ n ( x ) h ( x ) d x ,
then μ n ( h ) L ( 0 , T ) , and from (24), we know that as n ,
μ n ( h ) = 0 T μ n ( x ) h ( x ) d x 0 T μ * ( x ) h ( x ) d x = μ * ( h )
and μ * ( x ) L ( 0 , T ) . Because | μ n ( h ) | μ n h L 1 ( 0 , T ) , we have the following:
inf k n | μ k ( h ) | inf k n μ k h L 1 ( 0 , T ) .
Taking n , we obtain the following:
lim ̲ n | μ n ( h ) | ( lim ̲ n μ n ) h L 1 ( 0 , T ) .
Combining (29) with (28) derives the following:
| μ * ( h ) | = lim n | μ n ( h ) | = lim ̲ n | μ n ( h ) | ( lim ̲ n μ n ) h L 1 ( 0 , T ) ,
thus
μ * lim ̲ n μ n L ( 0 , T ) ,
which means that μ L ( 0 , T ) is weak * lower semi-continuous at μ * L ( 0 , T ) .
From (27), it follows that for μ n ( x ) * μ * ( x ) ,
p 2 * L x 1 ( 0 , T ) lim n inf k n p 2 k ( t , x ) L x 1 ( 0 , T ) ,
meaning that the function μ p 2 ( t , x ) L x 1 ( 0 , T ) is weak * lower semi-continuous.
Combining (30), (31) and J ( μ ) given in (11), we have that J ( μ ) is weak-* lower semi-continuous at μ * U a d , i.e., as follows:
J ( μ * ) lim ̲ n J ( μ n ) .
At the same time, from (22) and the definition of infimum, we know that
lim ̲ n J ( μ n ) = lim n inf k n J ( μ k ) inf μ U a d J μ ,
thus we have the following:
J ( μ * ) inf μ U a d J μ .
On the other hand, based on the definition of infimum, we have the following:
J ( μ * ) inf μ U a d J μ , μ * U a d .
From (32) and (33), we obtain the following:
J ( μ * ) = inf μ U a d J μ , μ * U a d ,
which implies that μ * ( x ) is an optimal repair rate of problem (11).

4. First-Order Necessary Optimality Conditions

In this section, we investigate the first-order necessary conditions for an optimal control problem (11) by applying a variational inequality [32]; that is, if μ * ( x ) is an optimal solution of the controlled system (9), then
J ( μ * ) · ( ν μ * ) 0 , ν U a d .
If μ * ( x ) denotes the optimal repair rate control for the controlled system (9), and for any given ν U a d , let ν μ * = h , z 0 * = p 0 ( μ * ) h , z 1 * = p 1 ( μ * ) h , z 2 * = p 2 ( μ * ) h for ν U a d , which satisfies the following:
d z 0 * ( t ) d t = ( α + γ ) z 0 * ( t ) + 0 T μ * ( x ) z 2 * ( t , x ) d x + 0 T h ( x ) p 2 * ( t , x ) d x d z 1 * ( t ) d t = α z 0 * ( t ) β z 1 * ( t ) z 2 * ( t , x ) t + z 2 * ( t , x ) x = μ * ( x ) z 2 * ( t , x ) h ( x ) p 2 * ( t , x )
with the following boundary condition:
z 2 * ( t , 0 ) = γ z 0 * ( t ) + β z 1 * ( t )
and the following initial values:
z 0 * ( 0 ) = 0 , z 1 * ( 0 ) = z 2 * ( 0 , x ) = 0 .
According to the definition of J in (5), we have the following:
J ( μ * ) · ( ν μ * ) = a 0 T 0 T z 2 * ( t , x ) d x d t + b 0 T m ( x ) ( ν ( x ) μ * ( x ) ) d x .
To obtain the first-order necessary conditions of (38), we define the adjoint space X * = R × R × L x ( 0 , T ) of X = R × R × L x 1 ( 0 , T ) for system (9) with the following relationship:
( P * , Q * ) X , X * = p 0 * q 0 * + p 1 * q 1 * + 0 T p 2 * q 2 * d x
between P * ( t ) = ( p 0 * ( t ) , p 1 * ( t ) , p 2 * ( t , x ) ) T X and its adjoint state Q * ( t ) = ( q 0 * ( t ) , q 1 * ( t ) , q 2 * ( t , x ) ) T satisfying the following adjoint system:
d q 0 * ( t ) d t = ( α + γ ) q 0 * ( t ) α q 1 * ( t ) γ q 2 * ( t , 0 ) , d q 1 * ( t ) d t = β q 1 * ( t ) β q 2 * ( t , 0 ) , q 2 * ( t , x ) t + q 2 * ( t , x ) x = μ * ( x ) q 2 * ( t , x ) μ * ( x ) q 0 * ( t ) + a , q 0 * ( T ) = q 1 * ( T ) = q 2 * ( T , x ) = 0 ,
By solving (40) using the method of characteristics, we obtain the following:
q 0 * ( t ) = t T e ( α + γ ) ( s t ) ( α q 1 * ( s ) + γ q 2 * ( s , 0 ) ) d s , q 1 * ( t ) = t T e β ( s t ) β q 2 * ( s , 0 ) d s , q 2 * ( t , x ) = t T e x x + s t μ * ( ρ ) d ρ ( μ * ( x + s t ) q 0 * ( s ) a ) d s .
Theorem 5.
Let μ * ( x ) U a d be an optimal bilinear control of (11), whose corresponding solutions ( p 0 * , p 1 * , p 2 * ( x ) ) T and ( q 0 * , q 1 * , q 2 * ( x ) ) T are given by (14) and (41), then
μ * ( x ) = 0 , 1 b 0 T p 2 * ( t , x ) ( q 0 * ( t ) q 2 * ( t , x ) ) d t < m ( x ) , μ ¯ , 1 b 0 T p 2 * ( t , x ) ( q 0 * ( t ) q 2 * ( t , x ) ) d t > m ( x ) ,
and if there exists  x * [ 0 , T ] such that 1 b 0 T p 2 * ( t , x * ) ( q 0 * ( t ) q 2 * ( t , x ) ) d t = m ( x * ) , μ * ( x * ) can take any value within [ 0 , μ ¯ ] .
Proof. 
With (35)–(40) and integration by parts, the first part of (38) can be calculated as follows:
a 0 T 0 T z 2 * ( t , x ) d x d t = 0 T 0 T ( q 2 ( t , x ) t + q 2 * ( t , x ) x μ * ( x ) q 2 * ( t , x ) + μ * ( x ) q 0 * ( t ) ) z 2 * ( t , x ) d x d t = 0 T ( γ z 0 * ( t ) + β z 1 * ( t ) ) q 2 * ( t , 0 ) d t 0 T 0 T q 2 * ( t , x ) ( z 2 * ( t , x ) t + z 2 * ( t , x ) x ) d x d t 0 T 0 T μ ( x ) q 2 * ( t , x ) z 2 * ( t , x ) d x d t + 0 T 0 T μ ( x ) q 0 * ( t ) z 2 * ( t , x ) d x d t = 0 T ( γ z 0 * ( t ) + β z 1 * ( t ) ) q 2 * ( t , 0 ) d t + 0 T 0 T q 2 * ( t , x ) h ( x ) p 2 * ( t , x ) d x d t + 0 T 0 T μ * ( x ) q 0 * ( t ) z 2 * ( t , x ) d x d t = 0 T β z 1 * ( t ) q 2 * ( t , 0 ) d t + 0 T 0 T q 2 * ( t , x ) h ( x ) p 2 * ( t , x ) d x d t + 0 T α q 1 * ( t ) z 0 * ( t ) d t 0 T 0 T h ( x ) p 2 * ( t , x ) d x q 0 * ( t ) d t = 0 T β z 1 * ( t ) q 2 * ( t , 0 ) d t + 0 T 0 T q 2 * ( t , x ) h ( x ) p 2 * ( t , x ) d x d t + 0 T ( d z 1 * ( t ) d t + β z 1 * ( t ) ) q 1 * ( t ) d t 0 T 0 T h ( x ) p 2 * ( t , x ) d x q 0 * ( t ) d t = 0 T 0 T ( q 2 * ( t , x ) q 0 * ( t ) ) h ( x ) p 2 * ( t , x ) d x d t
Since μ * ( x ) U a d is an optimal solution of (11), we have the following:
J ( μ * ) · ( ν μ * ) = a 0 T 0 T z 2 * ( t , x ) d x d t + b 0 T m ( x ) ( ν ( x ) μ * ( x ) ) d x = 0 T 0 T ( q 2 * ( t , x ) q 0 * ( t ) ) ( ν ( x ) μ * ( x ) ) p 2 * ( t , x ) d x d t + b 0 T m ( x ) ( ν ( x ) μ * ( x ) ) d x 0 ,
which implies that the (42) holds. Moreover, if there exists x * [ 0 , T ] such that 1 b 0 T p 2 * ( t , x * ) ( q 0 * ( t ) q 2 * ( t , x ) ) d t = m ( x * ) , μ * ( x * ) can take any value within [ 0 , μ ¯ ] .
Remark 6.
The optimal repair rate control exhibits the Bang-Bang property: when 1 b 0 T p 2 * ( t , x ) ( q 0 * ( t ) q 2 * ( t , x ) ) d t < m ( x ) , no maintenance is required to maximize the interval availability and minimize maintenance cost of system (9) over the time interval; when 1 b 0 T p 2 * ( t , x ) ( q 0 * ( t ) q 2 * ( t , x ) ) d t > m ( x ) , the maintenance rate is set to to maximize the interval availability and minimize maintenance cost of system (9) over the time interval; when 1 b 0 T p 2 * ( t , x ) ( q 0 * ( t ) q 2 * ( t , x ) ) d t = m ( x ) , regardless of the value of chosen from the interval, system (9) can achieve maximum interval availability and minimum maintenance cost over the time interval.These theoretical results provide valuable guidance for optimizing the availability and maintenance costs of software aging systems.

5. Conclusions

This paper has proposed a corrective rejuvenation policy for software aging systems, with the aim of finding the optimal repair rate that maximizes the interval availability of the system and minimizes the repair cost within a given time interval [ 0 , T ] . Firstly, the corrective rejuvenation policy was described as an optimal repair rate control problem. Secondly, the existence of the optimal repair rate μ * ( x ) U a d was proven using the theory of functional extreme values. Finally, the first-order necessity condition of the optimal repair rate was derived from the variational inequality, and the Bang-Bang property of the optimal repair rate control was obtained. These theoretical results have offered valuable direction for enhancing the availability and managing the maintenance expenses of software systems.
In the future, I will focus on conducting sensitivity analysis on the parameters of the software aging system and discussing how changes in these parameters affect the optimal maintenance strategy.

Funding

This research received no external funding.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Acknowledgments

The author would like to thank the editors and the anonymous reviewers for their fruitful comments and suggestions which lead to a number of improvements of the paper.

Conflicts of Interest

The author declare no conflicts of interest.

References

  1. Zheng, J.J.; Okamura, H.; Dohi, T. A transient interval reliability analysis for software rejuvenation models with phase expansion. Softw. Qual. J. 2020, 28, 173–194. [Google Scholar] [CrossRef]
  2. An, L.; Khomh, F.; Gueheneuc, Y.G. An empirical study of crash-inducing commits in Mozilla Firefox. Softw. Qual. J. 2018, 26, 553–584. [Google Scholar] [CrossRef]
  3. Garg, S.; Puliafito, A.; Telek, M.; Trivedi, K.S. On the analysis of software rejuvenation policies. In Proceedings of the 2th Annual Conference on Computer Assurance, Gaithersburg, MD, USA, 16–19 June 1997; pp. 88–96. [Google Scholar]
  4. Yesavage, J.A.; Taylor, J.L.; Mumenthaler, M.S.; Noda, A.; O’Hara, R. Relationship of age and simulated flight performance. J. Am. Geriatr. Soc. 1999, 47, 819–823. [Google Scholar] [CrossRef] [PubMed]
  5. Puligundla, C.; Agarwal, R. Com components on heterogeneous platforms for e-com applications. IETE Tech. Rev. 2000, 4, 229–234. [Google Scholar] [CrossRef]
  6. Jia, Y.F.; Zhou, Z.Q.; Wu, R. Software ageing process as an evolving dynamic system. IET Softw. 2020, 14, 702–710. [Google Scholar] [CrossRef]
  7. Cotroneo, D.; Iannillo, A.K.; Natella, R.; Pietrantuono, R. A comprehensive study on software aging across android versions and vendors. Empir. Softw. Eng. 2020, 25, 3357–3395. [Google Scholar] [CrossRef]
  8. Bai, J.; Chang, X.L.; Ning, G.R.; Zhang, Z.; Trivedi, K.S. Service availability analysis in a virtualized system: A markov regenerative model approach. IEEE Trans. Cloud Comput. 2022, 10, 2118–2130. [Google Scholar] [CrossRef]
  9. Huang, Y.; Kintala, C.; Kolettis, N.; Fulton, N.D. Software rejuvenation: Analysis, module and applications. FTCS 1995, 381–390. [Google Scholar]
  10. Alonso, J.; Matias, R.; Vicente, E.; Maria, A.; Trivedi, K.S. A comparative experimental study of software rejuvenation overhead. Perform. Eval. 2013, 70, 231–250. [Google Scholar] [CrossRef]
  11. Dohi, T.; Gos˘eva-Popstojanova, K.; Trivedi, K.S. Estimating software rejuvenation schedules in high-assurance systems. Comput. J. 2001, 44, 473–485. [Google Scholar] [CrossRef]
  12. Chen, D.; Trivedi, K.S. Optimization for condition-based maintenance with semi-Markov decision process. Reliab. Eng. Syst. Safe. 2005, 90, 25–29. [Google Scholar] [CrossRef]
  13. Eto, H.; Dohi, T. Determining the optimal software rejuvenation schedule via semi-Markov decision process. J. Comput. Sci.-Neth. 2006, 2, 528–534. [Google Scholar] [CrossRef]
  14. Meng, H.N.; Liu, J.J.; Hei, X.H. Modeling and optimizing periodically inspected software rejuvenation policy based on geometric sequences. Reliab. Eng. Syst. Safe. 2015, 133, 184–191. [Google Scholar] [CrossRef]
  15. Koutras, V.P.; Platis, A.N. On the performance of software rejuvenation models with multiple degradation levels. Softw. Qual. J. 2020, 28, 135–171. [Google Scholar] [CrossRef]
  16. Zheng, J.J.; Okamura, H.; Dohi, T. Availability analysis of software systems with rejuvenation and checkpointing. Mathematics 2021, 9, 846. [Google Scholar] [CrossRef]
  17. Baghi, Z.S.; Navimipour, N.J. A cloud database route scheduling method using a hybrid optimization algorithm. Int. J. Commun. Syst. 2023, 36, 1–18. [Google Scholar]
  18. Duffuaa, S.O.; Ben-Daya, M.; Al-Sultan, K.S.; Andijani, A.A. A generic conceptual simulation model for maintenance systems. J. Qual. Main. Eng. 2001, 7, 207–219. [Google Scholar] [CrossRef]
  19. Jørgensen, M. An empirical study of software maintenance tasks. J. Softw. Main. 1995, 7, 27–48. [Google Scholar] [CrossRef]
  20. Saranga, H. Opportunistic maintenance using genetic algorithms. J. Qual. Main. Eng. 2004, 10, 66–74. [Google Scholar] [CrossRef]
  21. Ding, Y.; Lisnianski, A.; Frenkel, I.; Khvatskin, L. Optimal corrective maintenance contract planning for aging multi-state system. Appl. Stoch. Model. Bus. 2009, 65, 612–631. [Google Scholar] [CrossRef]
  22. Özgür Ünlüakın, D.; Türkali, B.; Aksezer, S.C. Cost-effective fault diagnosis of a multi-component dynamic system under corrective maintenance. Appl. Soft. Comput. 2021, 102, 107092. [Google Scholar] [CrossRef]
  23. Lientz, B.P.; Swanson, E.B.; Tompkins, G.E. Characteristics of application software maintenance. Commun. ACM 1978, 21, 466–471. [Google Scholar] [CrossRef]
  24. Liang, H.H.; Gu, P.F.; Tang, J.Z.; Chen, W.H.; Gao, F. Discussion on software aging management of nuclear power plant safety digital control system. SpringerPlus 2016, 5, 2092. [Google Scholar] [CrossRef] [PubMed]
  25. Dang, W.C.; Zeng, J.C. Optimization of software rejuvenation policy based on state-control-limit. Int. J. Perform. Eng. 2018, 14, 210–222. [Google Scholar] [CrossRef]
  26. Pardalos, P.M.; Yatsenko, V.A. Optimization and Control of Bilinear Systems: Theory, Algorithms, and Applications; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2010. [Google Scholar]
  27. Huo, H.X.; Xu, H.B.; Chen, Z.Q. Modelling and dynamic behavior analysis of the software rejuvenation system with periodic impulse. Math. Comp. Model. Dyn. 2021, 27, 522–542. [Google Scholar] [CrossRef]
  28. Alfa, A.S.; Rao, T.S. Supplementary variable technique in stochastic models. Probab. Eng. Inform. Sci. 2000, 14, 203–218. [Google Scholar] [CrossRef]
  29. Yang, Q.L. Mathematical Physics Equations and Special Functions; Tsinghua University Press: Beijing, China, 2004. [Google Scholar]
  30. Zhang, G.Q. Lecture Notes on Variational Calculus; Higher Education Press: Beijing, China, 2011. [Google Scholar]
  31. Boyer, F.; Fabrie, P. Mathematical Tools for the Study of the Incompressible Navier–Stokes Equations and Related Models; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
  32. Mitter, S.; Lions, J. Optimal Control of Systems Governed by Partial Differential Equations; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
Figure 1. State transition diagram of software aging systems.
Figure 1. State transition diagram of software aging systems.
Mathematics 12 00694 g001
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Huo, H. Optimal Corrective Maintenance Policies via an Availability-Cost Hybrid Factor for Software Aging Systems. Mathematics 2024, 12, 694. https://doi.org/10.3390/math12050694

AMA Style

Huo H. Optimal Corrective Maintenance Policies via an Availability-Cost Hybrid Factor for Software Aging Systems. Mathematics. 2024; 12(5):694. https://doi.org/10.3390/math12050694

Chicago/Turabian Style

Huo, Huixia. 2024. "Optimal Corrective Maintenance Policies via an Availability-Cost Hybrid Factor for Software Aging Systems" Mathematics 12, no. 5: 694. https://doi.org/10.3390/math12050694

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop