dc.identifier.citation | [1] US Department of Defence, “MIL-STD-1629 Procedures for performing a failure mode, effects and criticality analysis,” 1949.
[2] C. S. Carlson, Effective FMEAs: Achieving Safe, Reliable, and Economical Products and Processes Using Failure Mode and Effects Analysis. 2012.
[3] G. Q. Huang, J. Shi, and K. L. Mak, “Failure Mode and Effect Analysis (FMEA) Over the WWW,” Int J Adv Manuf Technol, vol. 16, pp. 603–608, 2000.
[4] C. J. Price, D. R. Pugh, M. S. Wilson, and N. Snooke, “The Flame system: automating electrical failure mode and effects\nanalysis (FMEA),” Annu. Reliab. Maintainab. Symp. 1995 Proc., pp. 90–95, 1995.
[5] R. Wirth, B. Berthold, A. Krämer, and G. Peter, “Knowledge-based support of system analysis for the analysis of Failure modes and effects,” Eng. Appl. Artif. Intell., vol. 9, no. 3, pp. 219–229, Jun. 1996.
[6] J. E. Hunt, C. J. Price, and M. H. Lee, “Automating the FMEA process,” Intell. Syst. Eng., vol. 2, no. 2, pp. 119–132, 1993.
[7] C. J. Price and N. S. Taylor, “Automated multiple failure FMEA,” Reliab. Eng. Syst. Saf., vol. 76, no. 1, pp. 1–10, Apr. 2002.
[8] D. H. Stamatis, Failure Mode and Effect Analysis: FMEA from Theory to Execution. 2003.
[9] H.-C. Liu, L. Liu, Q. Bian, Q. Lin, N. Dong, and P. Xu, “Failure mode and effects analysis using fuzzy evidential reasoning approach and grey theory,” Expert Syst. Appl., vol. 38, no. 4, pp. 4403–4415, 2011.
[10] K.-S. Chin, Y.-M. Wang, G. K. K. Poon, and J.-B. Yang, “Failure mode and effects analysis by data envelopment analysis,” Decis. Support Syst., vol. 48, no. 1, pp. 246–256, 2009.
[11] J. M. Legg, “Computerized Approach for Matrix-Form FMEA,” IEEE Trans. Reliab., vol. R-27, no. 4, pp. 254–257, Oct. 1978.
[12] G. Q. Huang, J. Shi, and K. L. Mak, “Failure Mode and Effect Analysis (FMEA) Over the WWW,” Int. J. Adv. Manuf. Technol., vol. 16, no. 8, pp. 603–608, Jul. 2000.
[13] D. Bell, L. Cox, S. Jackson, and P. Schaefer, “Using causal reasoning for automated failure modes and effects analysis (FMEA),” Proc. Annu. Reliab. Maintainab. Symp., pp. 343–353, 1992.
[14] H. B. Dussault, “Automated FMEA Status and Future,” in Annual Reliability and Maintainability Symposium, 1984. Proceedings., 1984, pp. 1–5.
[15] L. Gan, J. Xu, and B. T. Han, “A computer-integrated FMEA for dynamic supply chains in a flexible-based environment,” Int. J. Adv. Manuf. Technol., vol. 59, no. 5–8, pp. 697–717, 2012.
[16] D. Palumbo, “Automating failure modes and effects analysis,” in Proceedings of Annual Reliability and Maintainability Symposium (RAMS), 1994, pp. 304–309.
[17] P. G. Hawkins and D. J. Woollons, “Failure modes and effects analysis of complex engineering systems using functional models,” Artif. Intell. Eng., vol. 12, no. 4, pp. 375–397, 1998.
[18] P. C. Teoh and K. Case, “Failure modes and effects analysis through knowledge modelling,” J. Mater. Process. Technol., vol. 153–154, pp. 253–260, Nov. 2004.
[19] C. J. Price, N. Snooke, D. R. Pugh, J. E. Hunt, and M. S. Wilson, “Combining functional and structural reasoning for safety analysis of electrical designs,” Knowl. Eng. Rev., vol. 12, no. 3, pp. 271–287, Sep. 1997.
[20] N. Hughes, E. Chou, C. Price, and M. Lee, “Automating Mechanical FMEA Using Functional Models.,” FLAIRS Conf., 1999.
[21] M. B. Zaman, E. Kobayashi, N. Wakabayashi, S. Khanfir, T. Pitana, and A. Maimun, “Fuzzy FMEA model for risk evaluation of ship collisions in the Malacca Strait: based on AIS data,” J. Simul., vol. 8, no. 1, pp. 91–104, 2013.
[22] S. Kmenta and K. Ishii, “Scenario-Based Failure Modes and Effects Analysis Using Expected Cost,” J. Mech. Des., vol. 126, no. 6, p. 1027, Nov. 2004.
[23] V. Ebrahimipour, K. Rezaie, and S. Shokravi, “An ontology approach to support FMEA studies,” Expert Syst. Appl., vol. 37, no. 1, pp. 671–677, 2010.
[24] K. W. Noh, H. B. Jun, J. H. Lee, G. B. Lee, and H. W. Suh, “Module-based Failure Propagation (MFP) model for FMEA,” Int. J. Adv. Manuf. Technol., vol. 55, no. 5–8, pp. 581–600, 2011.
[25] N. Snooke and C. Price, “Automated FMEA based diagnostic symptom generation,” Adv. Eng. Informatics, vol. 26, no. 4, pp. 870–888, 2012.
[26] M. Hecht, E. Dimpfl, and J. Pinchak, “Automated Generation of Failure Modes and Effects Analysis from SysML Models,” in 2014 IEEE International Symposium on Software Reliability Engineering Workshops, 2014, pp. 62–65.
[27] C. Price, “AutoSteve : Automated Electrical Design Analysis,” Appl. Model. Reason. (Digest No 1997/338), IEE Colloq., pp. 59–63, 1997.
[28] R. Renu, D. Visotsky, S. Knackstedt, G. Mocko, J. D. Summers, and J. Schulte, “A Knowledge Based FMEA to Support Identification and Management of Vehicle Flexible Component Issues,” Procedia CIRP, vol. 44, pp. 157–162, 2016.
[29] G. Li, J. Gao, and F. Chen, “A novel approach for failure modes and effects analysis based on polychromatic sets,” Artif. Intell. Eng. Des. Anal. Manuf., vol. 23, no. 2, p. 119, Nov. 2008.
[30] T. Kurtoglu and I. Y. Tumer, “A Graph-Based Fault Identification and Propagation Framework for Functional Design of Complex Systems,” J. Mech. Des., vol. 130, no. 5, p. 51401, May 2008.
[31] J. Buddhakulsomsiri, Y. Siradeghyan, A. Zakarian, and X. Li, “Association rule-generation algorithm for mining automotive warranty data,” Int. J. Prod. Res., vol. 44, no. 14, pp. 2749–2770, 2006.
[32] R. P. J. C. B. Bose and W. M. P. Aalst, “Discovering Siganture Patterns from Event Logs,” 2013 IEEE Symp. Comput. Intell. Data Min., pp. 111–118, 2013.
[33] C. Yang, Y. Zou, P. Lai, and N. Jiang, “Data mining-based methods for fault isolation with validated FMEA model ranking,” Appl. Intell., vol. 43, no. 4, pp. 913–923, 2015.
[34] C. E. Shannon and W. Weaver, “The Mathematical Theory of Communication,” Math. theory Commun., vol. 27, no. 4, p. 117, 1949.
[35] A. Sachdeva, P. Kumar, and D. Kumar, “Maintenance criticality analysis using TOPSIS,” IEEM 2009 - IEEE Int. Conf. Ind. Eng. Eng. Manag., pp. 199–203, 2009.
[36] O. Mohsen and N. Fereshteh, “An extended VIKOR method based on entropy measure for the failure modes risk assessment – A case study of the geothermal power plant (GPP),” Saf. Sci., vol. 92, pp. 160–172, 2017.
[37] R. Jin, Y. Breitbart, and C. Muoh, “Data Discretization Unification,” Seventh IEEE Int. Conf. Data Min. (ICDM 2007), pp. 183–192, 2007.
[38] D. L. Olson and D. Delen, Advanced data mining techniques. 2008.
[39] K. Das and O. P. Vyas, “A Suitability Study of Discretization Methods for Associative Classifiers,” Int. J. Comput. Appl., vol. 5, no. 10, pp. 46–51, 2010.
[40] M. X. Ribeiro, M. R. P. Ferreira, a. J. M. Traina, and C. Traina Jr., “Data pre-processing: a new algorithm for feature selection and data discretization,” Proc. 5th Int. Conf. Soft Comput. as Transdiscipl. Sci. Technol., pp. 252–257, 2008.
[41] E. Frank and I. H. Witten, “Making better use of global discretization,” pp. 1–12, 1999.
[42] S. Kotsiantis and D. Kanellopoulos, “Discretization Techniques : A recent survey,” GESTS Int. Trans. Comput. Sci. Eng., vol. 32, no. 1, pp. 47–58, 2006.
[43] J. M. Cadenas, M. C. Garrido, and R. Martinez, “Fuzzy Discretization Process from Small Datasets,” Comput. Intell., no. 808, pp. 101–118, 2010.
[44] Y. Sang, H. Qi, K. Li, Y. Jin, D. Yan, and S. Gao, “An effective discretization method for disposing high-dimensional data,” Inf. Sci. (Ny)., vol. 270, pp. 73–91, 2014.
[45] G. Borowik, K. Kowalski, and C. Jankowski, “Novel approach to data discretization,” XXXVI Symp. Photonics Appl. Astron. Commun. Ind. High-Energy Phys. Exp. (Wilga 2015), vol. 9662, p. 96623U, 2015.
[46] S. Ramírez-Gallego et al., “Data discretization: Taxonomy and big data challenge,” Wiley Interdiscip. Rev. Data Min. Knowl. Discov., vol. 6, no. 1, pp. 5–21, 2016.
[47] S. García, J. Luengo, J. A. Sáez, V. López, and F. Herrera, “A survey of discretization techniques: Taxonomy and empirical analysis in supervised learning,” IEEE Trans. Knowl. Data Eng., vol. 25, no. 4, pp. 734–750, 2013.
[48] H. Liu, F. Hussain, C. L. Tan, and M. Dash, “Discretization: An enabling technique,” Data Min. Knowl. Discov., vol. 6, no. 4, pp. 393–423, 2002.
[49] V. Velychko, P. Stanchev, and K. Vanhoof, “Comparison of Discretization Methods for Preprocessing Data for Pyramidal Growing Network Classification Method,” Methods, pp. 31–39.
[50] D. R. Tobergte and S. Curtis, Data Mining know it all, vol. 53, no. 9. 2013.
[51] R. Kerber, “Chimerge: Discretization of numeric attributes,” Proc. tenth Natl. Conf. Artif. Intell., pp. 123–128, 1992.
[52] M. Richeldi, M; Rossotto, “Class-driven statistical discretization of continuous attributes (extended abstract).pdf,” in In European Conference on Machine Learning, 1995, pp. 335–338.
[53] A. A. Freitas and S. H. Lavington, “Speeding up knowledge discovery in large relational databases by means of a new discretization algorithm,” in Lecture Notes in Computer Science, 1996, pp. 124–133.
[54] J. R. Quinlan, “C4.5 Programs for Machine Learning.pdf,” Morgan Kaufmann, vol. 5, no. 3. p. 302, 1993.
[55] U. Fayyad and K. Irani, “Multi-Interval Discretization of Continuous-Valued Attributes for Classification Learning,” Proc. 13th Int. Jt. Conf. Mach. Learn., pp. 1022–1027, 1993.
[56] D. Ju-Long, “Control problems of grey systems,” Syst. Control Lett., vol. 1, no. 5, pp. 288–294, 1982.
[57] B. F. Yıldırım and E. Önder, Çok Kriterli Karar Verme Yöntemleri, 2nd ed. 2015.
[58] C. Chang, P. Liu, and C. Wei, “Failure mode and effects analysis using grey theory,” Integr. Manuf. Syst., vol. 12, no. 3, pp. 211–216, 2001.
[59] C. Wei and Y. Lee, “Failure mode and effects analysis using fuzzy method and grey theory,” Ind. Eng., 1998.
[60] C. Hwang and K. Yoon, Multiple Attribute Decision Making: Methods and Applications, A State of the Art Survey, vol. 1. New York, New York, USA, 1981.
[61] H.-C. Liu, J.-X. You, M.-M. Shan, and L.-N. Shao, “Failure mode and effects analysis using intuitionistic fuzzy hybrid TOPSIS approach,” Int. J. Syst. Sci., vol. 45, no. 10, pp. 2012–2030, 2014.
[62] M. Braglia, M. Frosolini, and R. Montanari, “Fuzzy TOPSIS Approach for Failure Mode, Effects and Criticality Analysis,” Qual. Reliab. Eng. Int., vol. 19, no. 5, pp. 425–443, 2003.
[63] A. Sachdeva and D. Kumar, “Multi-factor failure mode critically analysis using TOPSIS Anish,” Princessaliceadoptionhome.Org, vol. 9, no. 8, pp. 1–9, 2009.
[64] W. Song, X. Ming, Z. Wu, and B. Zhu, “Failure modes and effects analysis using integrated weight-based fuzzy TOPSIS,” Int. J. Comput. Integr. Manuf., vol. 26, no. 12, pp. 1172–1186, 2013.
[65] S. Helvacioglu and E. Ozen, “Fuzzy based failure modes and effect analysis for yacht system design,” Ocean Eng., vol. 79, pp. 131–141, 2014.
[66] S. Opricovic, “Multicriteria optimization of civil engineering systems,” Fac. Civ. Eng. Belgrade, 1998.
[67] H.-C. Liu, L. Liu, N. Liu, and L.-X. Mao, “Risk evaluation in failure mode and effects analysis with extended VIKOR method under fuzzy environment,” Expert Syst. Appl., vol. 39, no. 17, pp. 12926–12934, 2012.
[68] I. Emovon, R. A. Norman, A. J. Murphy, and K. Pazouki, “An integrated multicriteria decision making methodology using compromise solution methods for prioritising risk of marine machinery systems,” Ocean Eng., vol. 105, pp. 92–103, 2015.
[69] H. Safari, Z. Faraji, and S. Majidian, “Identifying and evaluating enterprise architecture risks using FMEA and fuzzy VIKOR,” J. Intell. Manuf., vol. 27, no. 2, pp. 475–486, 2016.
[70] S. G. Eick, M. C. Nelson, and J. D. Schmidt, “Graphical analysis of computer log files,” Commun. ACM, vol. 37, no. 12, pp. 50–56, 1994.
[71] R. Finlayson, D. Cheriton, R. Finlayson, and D. Cheriton, “Log files: an extended file service exploiting write-once storage,” in Proceedings of the eleventh ACM Symposium on Operating systems principles - SOSP ’87, 1987, vol. 21, no. 5, pp. 139–148.
[72] K. Jeon, S. Park, S. Chun, and J. Kim, “A Study on the Big Data Log Analysis for Security,” vol. 10, no. 1, pp. 13–20, 2016.
[73] T. Sipola, A. Juvonen, and J. Lehtonen, “Anomaly detection from network logs using diffusion maps,” vol. 363 AICT, no. PART 1, pp. 172–181, 2011.
[74] M. Wurzenberger, F. Skopik, G. Settanni, and W. Scherrer, “Complex log file synthesis for rapid sandbox-benchmarking of security- and computer network analysis tools,” Inf. Syst., vol. 60, pp. 13–33, 2016.
[75] D. Nguyen, “Failure Modes and Effects Analysis For Software Reliability,” in Annual RELIABILITY and MAINTAINABILITY Symposium, 2001, pp. 219–222.
[76] B. Russo, G. Succi, and W. Pedrycz, “Mining system logs to learn error predictors: a case study of a telemetry system,” Empir. Softw. Eng., vol. 20, no. 4, pp. 879–927, 2014.
[77] I. Mavridis and H. Karatza, “Performance evaluation of cloud-based log file analysis with Apache Hadoop and Apache Spark,” J. Syst. Softw., vol. 125, pp. 133–151, 2017.
[78] R. Agrawal, T. Imielinski, and A. Swami, “Mining Association in Large Databases,” Proc. 1993 ACM SIGMOD Int. Conf. Manag. data - SIGMOD ’93, pp. 207–216, 1993.
[79] Hamdani and R. Wardoyo, “The complexity calculation for group decision making using TOPSIS algorithm,” AIP Conf. Proc., vol. 1755, 2016. | tr_TR |