{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T09:20:36Z","timestamp":1760606436470},"reference-count":23,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2003,10,1]],"date-time":"2003-10-01T00:00:00Z","timestamp":1064966400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["European Journal of Operational Research"],"published-print":{"date-parts":[[2003,10]]},"DOI":"10.1016\/s0377-2217(02)00506-4","type":"journal-article","created":{"date-parts":[[2003,1,30]],"date-time":"2003-01-30T15:52:50Z","timestamp":1043941970000},"page":"406-419","source":"Crossref","is-referenced-by-count":41,"title":["Optimal allocation of multi-state elements in linear consecutively connected systems with vulnerable nodes"],"prefix":"10.1016","volume":"150","author":[{"given":"Gregory","family":"Levitin","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0377-2217(02)00506-4_BIB1","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1109\/24.46467","article-title":"Multistate consecutively-connected systems","volume":"38","author":"Hwang","year":"1989","journal-title":"IEEE Transactions on Reliability"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB2","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1109\/TR.1982.5221423","article-title":"A recursive algorithm to evaluate the reliability of a consecutive-k-out-of-n:F system","volume":"R-31","author":"Shanthikumar","year":"1982","journal-title":"IEEE Transactions on Reliability"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB3","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1109\/TR.1987.5222467","article-title":"Reliability of systems with consecutive minimal cutsets","volume":"R-36","author":"Shanthikumar","year":"1987","journal-title":"IEEE Transactions on Reliability"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB4","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1109\/24.406595","article-title":"Reliability of linear consecutively-connected systems with multistate components","volume":"44","author":"Kossow","year":"1995","journal-title":"IEEE Transactions on Reliability"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB5","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/0951-8320(94)90009-4","article-title":"Reliability of multistate consecutively-connected systems","volume":"44","author":"Zuo","year":"1994","journal-title":"Reliability Engineering & System Safety"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB6","doi-asserted-by":"crossref","first-page":"1417","DOI":"10.1016\/0026-2714(96)00004-2","article-title":"Reliability increase of consecutive-k-out-of-n:F and related systems through components\u2019 rearrangement","volume":"36","author":"Malinowski","year":"1996","journal-title":"Microelectronics and Reliability"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB7","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/S0951-8320(01)00027-8","article-title":"Optimal separation of elements in vulnerable multi-state systems","volume":"73","author":"Levitin","year":"2001","journal-title":"Reliability Engineering & System Safety"},{"issue":"5","key":"10.1016\/S0377-2217(02)00506-4_BIB8","first-page":"118","article-title":"Universal generating function","volume":"24","author":"Ushakov","year":"1986","journal-title":"Soviet Journal of Computing System Science"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB9","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1109\/24.722283","article-title":"Redundancy optimization for series\u2013parallel multi-state systems","volume":"47","author":"Levitin","year":"1998","journal-title":"IEEE Transactions on Reliability"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB10","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/24.855538","article-title":"Multistate series\u2013parallel system expansion-scheduling subject to availability constraints","volume":"49","author":"Levitin","year":"2000","journal-title":"IEEE Transactions on Reliability"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB11","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1002\/qre.388","article-title":"A new approach to solving problems of multi-state system reliability optimization","volume":"47","author":"Levitin","year":"2001","journal-title":"Quality and Reliability Engineering International"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB12","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/S0951-8320(00)00089-2","article-title":"Reliability optimization for weighted voting system","volume":"71","author":"Levitin","year":"2001","journal-title":"Reliability Engineering & System Safety"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB13","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/S0951-8320(00)00105-8","article-title":"Structure optimization of multi-state system with two failure modes","volume":"72","author":"Levitin","year":"2001","journal-title":"Reliability Engineering & System Safety"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB14","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1109\/24.387368","article-title":"Genetic algorithm in optimization of system reliability","volume":"44","author":"Painton","year":"1995","journal-title":"IEEE Transactions on Reliability"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB15","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1109\/24.510811","article-title":"Reliability optimization of series\u2013parallel systems using genetic algorithm","volume":"45","author":"Coit","year":"1996","journal-title":"IEEE Transactions on Reliability"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB16","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/S0360-8352(99)00043-1","article-title":"GA-based reliability design: State-of-the-art survey","volume":"37","author":"Gen","year":"1999","journal-title":"Computers & Industrial Engineering"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB17","series-title":"Genetic Algorithms and Engineering Optimization","author":"Gen","year":"2000"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB18","doi-asserted-by":"crossref","unstructured":"T. B\u00e4ck, Evolutionary Algorithms in Theory and Practice, Evolution Strategies, Evolutionary Programming, Genetic Algorithms, Oxford University Press, 1996","DOI":"10.1093\/oso\/9780195099713.001.0001"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB19","first-page":"49","article-title":"An introduction to genetic algorithms","volume":"5","author":"Austin","year":"1990","journal-title":"AI Expert"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB20","series-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"Goldberg","year":"1989"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB21","unstructured":"D. Whitley, The GENITOR Algorithm and Selective Pressure: Why Rank-Based Allocation of Reproductive Trials is Best, in: D. Schaffer (Ed.), Proceedings of the third International Conference on Genetic Algorithms, Morgan Kaufmann, 1989, pp. 116\u2013121"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB22","series-title":"Foundations of Genetic Algorithms","doi-asserted-by":"crossref","DOI":"10.1016\/B978-0-08-050684-5.50009-4","article-title":"A study of reproduction in generational and steady-state genetic algorithms","author":"Syswerda","year":"1991"},{"key":"10.1016\/S0377-2217(02)00506-4_BIB23","unstructured":"D. Powell, M. Skolnik, Using genetic algorithms in engineering design optimization with non-linear constraints, Proceedings of the fifth International Conference on Genetic Algorithms, Morgan Kaufmann, 1993, pp. 424\u2013431"}],"container-title":["European Journal of Operational Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0377221702005064?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0377221702005064?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T13:07:41Z","timestamp":1622725661000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0377221702005064"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,10]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2003,10]]}},"alternative-id":["S0377221702005064"],"URL":"https:\/\/doi.org\/10.1016\/s0377-2217(02)00506-4","relation":{},"ISSN":["0377-2217"],"issn-type":[{"value":"0377-2217","type":"print"}],"subject":[],"published":{"date-parts":[[2003,10]]}}}