{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T19:01:30Z","timestamp":1772737290208,"version":"3.50.1"},"reference-count":84,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004761","name":"Natural Science Foundation of Hainan Province","doi-asserted-by":"publisher","award":["2024JJ5453"],"award-info":[{"award-number":["2024JJ5453"]}],"id":[{"id":"10.13039\/501100004761","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1109\/tr.2025.3576121","type":"journal-article","created":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T13:27:22Z","timestamp":1750426042000},"page":"5633-5646","source":"Crossref","is-referenced-by-count":1,"title":["Availability Modeling and Evaluation of Distributed Topology"],"prefix":"10.1109","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8608-1977","authenticated-orcid":false,"given":"Jinbiao","family":"Wu","sequence":"first","affiliation":[{"name":"School of Mathematics and Statistics, Central South University, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5993-3823","authenticated-orcid":false,"given":"Muhammad Salihu","family":"Isa","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Central South University, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4849-0163","authenticated-orcid":false,"given":"Ibrahim","family":"Yusuf","sequence":"additional","affiliation":[{"name":"Department of Mathematical Sciences, Bayero University, Kano, Nigeria"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932477"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-83640-5_7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMR.159.29"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/I2MTC.2013.6555453"},{"issue":"1","key":"ref5","first-page":"13","article-title":"Reliability analysis of multi-workstation computer network configured as series parallel system via Gumbel Hougaard family copula","volume":"19","author":"Isa","year":"2022","journal-title":"Int. J. Operations Res."},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/9781119865421.ch5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2022.119655"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2022.3194021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891282"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2022.3161638"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.30699\/IJRRS.4.1.7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-04434-3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08630-w"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3111031"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2022.3160460"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-14838-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.55938\/ijgasr.v1i1.6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3088233"},{"issue":"4","key":"ref19","article-title":"FANETs in wildlife monitoring: Applications and challenges","volume":"12","author":"Khare","year":"2022","journal-title":"J. Electron. Eng."},{"key":"ref20","article-title":"A survey and analysis of extreme machine learning models and its techniques","author":"Pande","year":"2021","journal-title":"Shri Govindram Seksaria Inst. Technol. Sci."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2018.09.020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.04.010"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.09.001"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.21203\/rs.3.rs-621258\/v1","article-title":"A hybrid methodology for flower images segmentation & recognition with extended deep convolution neural network (CNN)","author":"Rathore","year":"2021"},{"issue":"1","key":"ref25","first-page":"49","article-title":"Frequency-based damage detection method using FRFs in high frequency","volume":"10","author":"Duarte","year":"2020","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.46338\/ijetae0422_15"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.46338\/ijetae1222_12"},{"issue":"16","key":"ref28","first-page":"5012","article-title":"The impact of artificial intelligence on renewable energy systems","volume":"20","author":"Gupta","year":"2022","journal-title":"Neuro Quantol."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.irbm.2020.07.003"},{"issue":"3","key":"ref30","first-page":"59","article-title":"Reliability analysis of distributed system for enhancing data replication using Gumbel Hougaard family copula approach joint probability distribution","volume":"17","author":"Yusuf","year":"2021","journal-title":"J. Ind. Eng. Int."},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3352078"},{"issue":"4","key":"ref32","doi-asserted-by":"crossref","first-page":"1456","DOI":"10.1007\/s13198-023-01905-4","article-title":"Reliability and cost optimization of seriesparallel system with metaheuristic algorithm","volume":"15","author":"Shivani","year":"2024","journal-title":"Int. J. Syst. Assurance Eng. Manage."},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04619-9"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.02.006"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(02)00200-4"},{"issue":"1","key":"ref36","first-page":"23","article-title":"Network topology availability analysis","volume":"3","author":"Cabarkapa","year":"2011","journal-title":"Telfor J."},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/sym14051014"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/563\/4\/042035"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3389\/fenrg.2022.910518"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6639432"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2012.08.015"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2023.3234055"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3132774"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2023.3244955"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2020.3013158"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.107947"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2023.3252592"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking.2017.8264850"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.02.011"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.58496\/mjbd\/2022\/002"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.58496\/MJBD\/2022\/003"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.58496\/MJBD\/2022\/006"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.14744\/sigma.2024.00095"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.14744\/sigma.2024.00097"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2024-Spring62846.2024.10683485"},{"issue":"4","key":"ref56","doi-asserted-by":"crossref","first-page":"3557","DOI":"10.11591\/ijece.v14i4.pp3557-3569","article-title":"Multi-objective optimal reconfiguration of distribution networks using a novel meta-heuristic algorithm","volume":"14","author":"Negar","year":"2024","journal-title":"Int. J. Elect. Comput. Eng."},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICC-ROBINS60238.2024.10533888"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1002\/qre.3414"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2022.108342"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1080\/16843703.2020.1853320"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2020.107240"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2021.107642"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2020.107006"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1002\/sys.21420"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2018.08.011"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1108\/MMMS-10-2018-0165"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1142\/S0218539320400070"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1108\/ijqrm-05-2019-0160"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1108\/JQME-01-2022-0008"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1017\/9781316163047"},{"key":"ref71","first-page":"157","article-title":"Stochastic dependability analysis of client server architectures","volume-title":"Proc. Pacific Rim Int. Symp. Fault Tolerant Syst.","author":"Xie","year":"1993"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(01)00034-7"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-2367-3"},{"issue":"6","key":"ref74","first-page":"495","article-title":"Modeling and analysis of transient behaviors of repairable multiprocessor systems","volume":"35","author":"Goyal","year":"1986","journal-title":"IEEE Trans. Comput."},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1002\/9781119285441"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvcm4gtc"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2019.06.048"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-020-04690-5"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1080\/16843703.2020.1755088"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31375-3_7"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2020.106910"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1504\/IJOR.2014.063154"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.24200\/sci.2020.52933.2955"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/s12597-019-00369-0"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/24\/11273031\/11045554.pdf?arnumber=11045554","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:42:03Z","timestamp":1764787323000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11045554\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":84,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tr.2025.3576121","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]}}}