+ All Categories
Home > Documents > dr-g-l-pahuja-090612003214-phpapp01

dr-g-l-pahuja-090612003214-phpapp01

Date post: 27-Nov-2014
Category:
Upload: ashok-kumar
View: 43 times
Download: 0 times
Share this document with a friend
152
Presented By: Dr. G.L.Pahuja NIT Kurukshetra [email protected]
Transcript
Page 1: dr-g-l-pahuja-090612003214-phpapp01

Presented By:Dr. G.L.Pahuja

NIT Kurukshetra

[email protected]

Page 2: dr-g-l-pahuja-090612003214-phpapp01

Ten most important product attributes

Attribute Average score

Performance 9.5

Lasts a long time (reliability) 9.0

Service 8.9

Easily repaired (maintainability) 8.8

Warranty 8.4

Easy to use 8.3

Appearance 7.7

Brand name 6.3

Packaging/display 5.8

Latest model 5.4

Page 3: dr-g-l-pahuja-090612003214-phpapp01

Definition of Reliability

The Probability of an item ( component/system) to perform adequately for a specified period of time. under stated conditions

Page 4: dr-g-l-pahuja-090612003214-phpapp01

Important Concerns• Probability

• Adequate Performance

• Time

• Conditions of use

Page 5: dr-g-l-pahuja-090612003214-phpapp01

Failure characteristics

Page 6: dr-g-l-pahuja-090612003214-phpapp01

Mortality curve

Page 7: dr-g-l-pahuja-090612003214-phpapp01

The bath tub curve : Table Characterized by Caused by Reduced by

Burn-in DFR Manufacturing defects: Burn-in testing Welding flaws, cracks, Screening Defective parts , Quality control Poor quality control, Acceptance testing Contamination, poor Workman ship Useful life CFR Environment Redundancy Random loads Excess strength “Acts of God” Chance events

Wear-out IFR Fatigue Derating Corrosion Preventive maintenance Aging Parts replacement Friction Technology Cyclical Loading

Page 8: dr-g-l-pahuja-090612003214-phpapp01

generation years Technology Performance

Switching device Storage device Switching time

MTBF

First 1949-55 Vacuum tubes Acoustic delay lines and later magnetic drums.

1Kbyte memory

0.1 to 1ms 0.5 to 1h

Second 1956-65 Transistors Magnetic core main memory, tapes and disks

as peripheral memory 100Kbyte main memory

1 to 10µs About 10hrs

Third 1966-75 Integrated circuits (IC) High speed magnetic cores. Large disks (100 MB). 1 MB

main memory

0.1 to 1 µs About 100 hours

Fourth 1975-91 Large sclae integrated circuits. Microprocessor

(LSI)

Semi conductor memory. Winchester disk. 10MB main memory. 1000 MB

disks

10 to 100ns About 1000

hourts

Fifth 1991- VLSI, Associative memories. Optical disks. 10GB of

distribute storage

0.1ns speed measure in

gig lips

10000 hours

Comparison of performance of successive generations of digital computers

Page 9: dr-g-l-pahuja-090612003214-phpapp01

System Modeling

– Series model

– Parallel model

– Series parallel model

– Parallel series model

– K out of M models– Non Series Parallel Models

Page 10: dr-g-l-pahuja-090612003214-phpapp01

ASSUMPTIONS

1 Each unit and the system has two states i.e. either good or failed

2 Unit states are s-independent

3 Sensing and switching of failed unit out of the system is perfect

4 Unit reliabilities are not necessary equal and reliability of each unit is known

5 The system is good if and only if at least k of its n units are good.

6 Unit of the system are numbered from 1 to n.

Page 11: dr-g-l-pahuja-090612003214-phpapp01

Series Model :Automobile with four Wheels

Page 12: dr-g-l-pahuja-090612003214-phpapp01

Characteristics:

• All components must operate successfully for the system success.

• System reliability ,Rs=

• MTTF=

0)( dttRs

n

ii

1

1

n

ii

1

Page 13: dr-g-l-pahuja-090612003214-phpapp01

Mean Time to Failure-MTTF

0 0

0 0 0

( ) ( )

( ) ( ) ( )

1

MTTF tf t dt tR t dt

tR t R t dt R t dt

Page 14: dr-g-l-pahuja-090612003214-phpapp01

Parallel model: Two Boilers But needed

One for operation

Page 15: dr-g-l-pahuja-090612003214-phpapp01

Characteristics:

Rs =

=

)1(11

m

ii

0

)( dttRsMTTF

m

ii

q1

1

m

i

i1

)1(

Page 16: dr-g-l-pahuja-090612003214-phpapp01

Series- Parallel model

Page 17: dr-g-l-pahuja-090612003214-phpapp01

Characteristics:

Rs =

=

=

=

)}1(1{1 1

n

i jij

mi

})1(1{1

min

ii

})1(1{1

mn

ii

nmP ])1(1[

smallqnqq mnm ,1)1(

dteMTTF nmt ])1(1[0

Page 18: dr-g-l-pahuja-090612003214-phpapp01

Parallel – Series model

Page 19: dr-g-l-pahuja-090612003214-phpapp01

characteristics:

Rs = 1- }1{1 1

m

i jij

ni

}1{11 1

m

i

n

jij

}1{11

m

i

n

i

mn}1{1

dteMTTF mtn ))1(1(0

Page 20: dr-g-l-pahuja-090612003214-phpapp01

k out of m models

• Probability of exactly k successes out of m is

kmk

k

pppmk m )1()(),;(

imim

ki i

ppRs m

)1()(

pqqqRs imim

kmi im

1,)1()(1

1

Page 21: dr-g-l-pahuja-090612003214-phpapp01

K-out-of-n: G(F) systems

Page 22: dr-g-l-pahuja-090612003214-phpapp01

k-out-of-n: G(F) systems• Introduced by Birnbaum [42] in 1961

• Most general model in the studies of Series –Parallel System

DEFINITION

A k-out-of-n :G(F) system is a system of n components in which at least k components must function (fail) for the system to function (fail).

K-out-of –n :G system is exactly equivalent to (n-k+1)-out-of-n:F system

Page 23: dr-g-l-pahuja-090612003214-phpapp01

SPECIAL CASES

for

k= 0 perfectly reliable system

k=1 parallel system

k= (n+1)/2 NMR system (voting)

k= n-1 Fail safe system

k= n Series system

1<k<n Partially redundant system

Page 24: dr-g-l-pahuja-090612003214-phpapp01

Examples:

Reactor Protection System

Sensor System

Alarm generating System

A bus structured microprocessor computer system

consisting N processors and sharing M memory unit

via Z buses

A piece of stranded wire with n strands out of which

at least k - strands are necessary to pass the

required current

Voting networks

Automobile air bag restraining system

Page 25: dr-g-l-pahuja-090612003214-phpapp01

ASSUMPTIONS

1 Each unit and the system has two states i.e. either good or failed

2 Unit states are s-independent

3 Sensing and switching of failed unit out of the system is perfect

4 Unit reliabilities are not necessary equal and reliability of each unit is known

5 The system is good if and only if at least k of its n units are good.

6 Unit of the system are numbered from 1 to n.

Page 26: dr-g-l-pahuja-090612003214-phpapp01

Reliability Evaluation of k-out-n :G System

For identical unit

…(1)

Where q= 1-p

(1) Utilizes binomial expansion , B(k, n, p) = c( n k) pk (1-p)n-k

Binomial expansion cannot be used to evaluate reliability of k-out-of-n :G system with unidentical components.

inin

ki

ppincnkR

1,,

inin

ki

ppinc

1,

Page 27: dr-g-l-pahuja-090612003214-phpapp01

Reliability Evaluation of k-out-of-n:G System with Unidentical Units

Basic Difficulties

1. To determine the Sets of minimum components whose success will ensure success of the system.

Total number of minimum success terms = c(n,k).

Example for 4-out-of-6 :G system , number of minimum success terms are c(6,4)=15

2. To obtain reliability expression

Page 28: dr-g-l-pahuja-090612003214-phpapp01

Different Basic Method /Technique Used

TECHNIQUE 1 Let number of minimum Success term used be,

c(k,n) = m

System success function

Where each Ti is a min success term & m = c(n,

k)

mm

m

i kjikji

jijii

TTTTP

TTTPTTPTPnkR

...1...

...,

3211

1

m

iiTSSSF

1

,

Page 29: dr-g-l-pahuja-090612003214-phpapp01

For (n-k+1) –out-of- n:F system :

Number of minimum failed terms c(n-k+1,n)=m

R(k,n)= 1 - U(k,n)

Where

c(k,n) and c(n-k+1,n) have been termed as min terms

Total no of terms in reliability expression =2m –1

Technique is cumbersome and time consuming

Both canceling and non canceling terms are generated.

mm

m

i kjikji

jijii

CCCCP

TTTPCCPCPnkU

....1......

...,

3211

1

Page 30: dr-g-l-pahuja-090612003214-phpapp01

TECHNIQUE - 2•S1.

•S2

•S3

Efficiency of the technique depends upon how Sdisj expression in S2 is obtained.

m

iiTSSSF

1

,

dm

jjdisj TS

1

dm

jjrdisjr TPSP

1

dmrrr TPTPTP ...21

Page 31: dr-g-l-pahuja-090612003214-phpapp01

TECHNIQUE - 3

WhereReliability expression is obtained by changing

&

n

iidisj TSSSF

1

,

n

jir

n

iir TPTPnKR

11

,

tSri XXXT ......

tt

sS

rr

pX

qX

pX

Page 32: dr-g-l-pahuja-090612003214-phpapp01

TECHNIQUE - 4System

(1) is in sum of disjoint products.

R(k,n) is obtained by recursive use of (1) for different values of k.

)...(1,11,, InkSnkSXnkS i

)...(,11,1, IIknRqknRpnkR ii

Page 33: dr-g-l-pahuja-090612003214-phpapp01

Classification of k-out-of-n: G Systems

Technique 1 Inclusion-Exclusion (IE) Method.

Technique 2 Disjoint Product (DP) Method

Technique 3 State Enumeration (SE)

Method

Technique 4 Decomposition Technique

Page 34: dr-g-l-pahuja-090612003214-phpapp01

INFERENCES1. Number of terms of the reliability expression, number of multiplications / divisions and number of additions / subtractions involved in these terms can not be the sole criterian of computational complexity.

2. Most suitable algorithm can be chosen only if the computational costs and the specific requirements of the application in case of symbolical evaluation have been considered.

Illustration: Suppose the component reliabilities are given by symbolic expressions. Aim is to determine sensitivity or MTTF. Then considering only the number of multiplications in the comparison of different algorithms does not give a fair picture of computational costs.

Application (say MTTF to be computed symbolically) depends upon the symbolic reliability expression.

Page 35: dr-g-l-pahuja-090612003214-phpapp01

Consider three reliability expressions for 2 – out – of – 3: G system

(i) p1 p2 + (p1 + (q1 – p1) p2 – p1 p2) p3 + p1 p2 p3 [BH – I]

(ii) p1 p2 q3 + p1 q2 p3 + q1 p2 p3 + p1 p2 p3 (state enumeration)

(iii) p1 p2 + p1 p3 + p2 p3 – 2 p1 p2 p3

The most suitable is expression (iii) 3. For a true comparison, jumps to sub expressions (recursive algorithms) have to be accounted for.4. Temporal complexity in most of the methods depends upon the

version (reliability or unreliability) of the algorithm. AR [47] has same complexity for reliability and unreliability versions. 5. Inconsistency in the computational complexity of the algorithms needs to be investigated and resolved as computational complexity in most of these have been compared on the basis of multiplications / divisions, and additions / subtractions of the terms involved in reliability expressions.

The statement: A problem that has taken more than its share in the literature [54], is true with regards to plethora of information available in terms of algorithms but computational complexity needs to be investigated further.

Page 36: dr-g-l-pahuja-090612003214-phpapp01

6. Controversy with regard to computational existed in four

algorithms mainly these are JG [49], RSPK [51], SP [55] and

BH [46]. BH [46] supersedes [48, 53, 54] JG [49], RSPK [51]

and SP [55] & probably optimal [48]. BH-1 has better worst

case bound and RSPK-1 has the worst case computational

bound. JG’s [49] worst case bounds are in between BH –I and

RSPK-I.

7. State Enumeration is a worst case of disjointing products

(DPs) algorithms. BH [46] employs state enumeration

approach and yields optimal solution temporally.

8. Method of Behr et [57] utilizes IE law for obtaining terms and

factoring for signed domination [78].

& d (k, n: G) =

for n = k d (k, k: G) =

111

k

kn n

0111

kn

Page 37: dr-g-l-pahuja-090612003214-phpapp01

Classification of k-out-of-n: G Systems.

Recursive Non-Recursive

StateEnumeratio

n

InclusionExclusion

DisjointProduct

Decomposition

AR [47]RSPK [51]

JG [49]BCP [57]

Haskin [56]

BH [46]Locks [61]MG [50]BM [43]SP [55]

Huang [59]

Rissel [54]Pham et al [53]Rushdi [48]

Comparison of Complexity Related issues of algorithms.

Page 38: dr-g-l-pahuja-090612003214-phpapp01

Capacity-k-out-of-n System Reliability Evaluation

• A new measure of k-out-of-n: G (F) System.

• Unlike recursive algorithm advanced by Wu et al [58], the

proposed method is a non-recursive technique.

DEFINITION:

• A capacity-k-out-of-n: G (F) System is a System of n

components, each with its own positive integer transmission

capacity such that the system is good (failed) if and only if

the total capacity of good (failed) components is at least k

[58].

• The reliability of capacity-k-out-of-n: G System is the

complement of the unreliability of capacity-(w – k + 1) – out –

of - n: F System where, w is the total capacity of the system.

Page 39: dr-g-l-pahuja-090612003214-phpapp01

APPLICATIONS:

Supply systems comprising components

with fixed ratings for their capacity, flow,

throughput. The system is said to be successful

when it is able to transmit a specified minimum

flow.

ASSUMPTIONS:

1.    Each component has a fixed transmission

capacity.

2. The system is good iff the total capacity of

good components is at least k.

Page 40: dr-g-l-pahuja-090612003214-phpapp01

METHOD The method determines all the minimal success terms

satisfying the flow constraint. The procedure is given as under:

S1 Capacity-k of the system to be transmitted is given. Let it be wmin. The maximum capacity wmax of the system is

obtained by adding the capacity of all the n components of the system. Components are numbered in a sequence according to decreasing order of their capacity & let it be represented by set A. Also define a set B for minimal success terms to start with it is a null set.

S2 If the maximum transmission capacity of the system is greater than or equal to the minimum transmission capacity of the network, then solution of the problem exists.

Page 41: dr-g-l-pahuja-090612003214-phpapp01

S3 If the capacity of first element is greater than or

equal to wmin, first element of the set A is

transferred to set B. The procedure is repeated for

all the elements of set A.

The cardinality of the set A reduces and is equal to

the difference between the total number of

components present initially and the number of

components transferred to set B. Let the set A with its

reduced cardinality be termed as AR (1).

S4 The above process from S2 to S3 is repeated

considering all the combinations of two components at a

time for the set AR (1) & is explained as given below:

Page 42: dr-g-l-pahuja-090612003214-phpapp01

If the maximum capacity of set AR (1) is greater than or equal to wmin, then obtain the sum of capacity of first two components. If it is greater than or equal to wmin then product (intersection) of these two components is copied to set B. The procedure is repeated for all the combinations of two components such that first component is included in each combination. When all such combinations have been exhausted the cardinality of set AR (1) is reduced to AR (2) by deleting first element of AR (1). The procedure adopted for AR (1) is now repeated with set AR (2), AR (3) and so on.

The process from S2 to S4 is repeated for all the combinations of three components, four components & so on. The elements of set B are the possible minimal success terms satisfying the flow constraint. A disjoint sum-of-products is obtained using any of the existing disjointing technique. The reliability expression in obtained by changing logical variables of the terms present in disjoint expression into corresponding probability variables. The algorithm developed for the capacity-k-out-of-n: G (F) system is given as under:

Page 43: dr-g-l-pahuja-090612003214-phpapp01

ALGORITHM S1: Initialization

Input wi, i =1 to n in decreasing order, , wmin= 5; B =

. Arrange the components i = 1, in decreasing order with regard

to their capacity.

i.e. A = [X1 X2 X3 X4 X5]

s.t. w1 = 5; w2 = 4; w3 = 3; w4 = 3; w5 = 2;let i = 1, w = [5 4 3 3 2]

S2: If wmax wmin, Go to next step (S3).S3: Otherwise Go to S6.

(i)      if (wi - wmin)

(ii)      {B} = {B} {Xi}

(iii)     {A} = {A} – {Xi}

(iv)     wmax = wmax - wi

(v)      {w} = {w} - wi

Increment i, & go to S2.

n

iiww

1max

Page 44: dr-g-l-pahuja-090612003214-phpapp01

S4: A (I) = W (I) = X (J)For I = i, j = i +1 to n

R = wmin - wi

R1 = Xj+1 – R

If (Xj – R)

B = B Xi Xj

Increment j (until j > n end)

[A] = [A] – [Xi]

wmax = wmax - wi

[W] = [W] – [wi]Increment i, & go to S2.W (I) = X (J) = Y (K)

For I = i, I = i + 1 to n – 1, K = i + 2 to n

Do begin R2 = R – Xj

Page 45: dr-g-l-pahuja-090612003214-phpapp01

S5: If (Xj+1 – R2)

B = B Xi Xj Xk

Increment k and

A = [A] - Xi

wmax = wmax – wi

[W] = [W]– [Wi]increment i.Repeat steps for four variables at a time and so on.

S6: B = Xi Xi Xj Xi Xj Xk …….

Obtain Bdisj .

S7: Reliability expression is obtained by changing logical variables into corresponding probability variables, pi (qi).

Page 46: dr-g-l-pahuja-090612003214-phpapp01

ILLUSTRATIONS Example A system has five components. The capacity of each component is shown in Table 1.

Reliability of capacity-5-out-of-5: G system is to be determined.Solution:

S1 Initialization Input-Set A = {X1, X2, X3, X4, X5}

Input wi, i = 1 to 5. Arrange capacity of components in decreasing order, represented by a se W.

Let W = { 5 4 3 3 2}; B =

k = wmin = 5 (given) Let i = 1

S2 Now wmax (17) wmin (5), Go To S3.

Comp Xi 1 2 3 4 5

Capacity, wi

2 3 3 4 5

5

1max 17

iiww

Page 47: dr-g-l-pahuja-090612003214-phpapp01

S3If (wi – wmin) i.e. 5 – 5 0

B = B X1 B = X1

A = A – X1 A = {X2, X3, X4, X5}

wmax = wmax – w1 wmax = 12 w = {4 3 3 2}Increment i i.e. i.j = 2, go to S2.

S2(wmax – wmin) = 12 – 4 = 8 go to S3.

S3(w2 – wmin) = 4 – 5 < 0 go to S4.

S4A (I) = X (J) X = {X2 X3 X4 X5}Do for I = i to n – 1, J = i + 1 to n begin

R = wmin – w2 e.2 = 5 -3 & R1 = Xj +1 – R R1 = 3 - 2 = 1

B = X1 X2 X3 end. Repeated the process for j = 3. For j = n – 1 (= 4)

B = B X2 X4

{A} = {A} – X2 {A} = {X3 X4 X5}

wmax = wmax (12) – w2 (3) wmax = 9

w = w – w2 {w} = { 3 3 2}Increment i go to S2.

Page 48: dr-g-l-pahuja-090612003214-phpapp01

S4 A [I] = X(J) i.e. {A} = {X3 X4 X5}

{X} = {X3 X4 X5}

B = B X3 X4

B = B X3 X5

[A] = [A] – [X3] {A} = {X4 X5}

wmax = wmax – w3 wmax = 8 – 3 = 5

w = {w} – {w2} {w} = { X4, X5}Increment i go to S2.

S2 this S4 are valid.

{B} = {B} X4 X5

S5 Set {A} is empty.

B ={X1X2X3X2X4X2X5X3X4X3X5X4X5}

S6 Bdisj=

S7 FR (k, n)= p1+q1p2p3+q1q3p2p4+q1q3q4p2p5+ q1q2q4p3p5+ q1q2q5p3p4+ q1q2q3p4p5

543215432154321

5432143213211

XXXXXXXXXXXXXXX

XXXXXXXXXXXXX

Page 49: dr-g-l-pahuja-090612003214-phpapp01

Reliability Evaluation of Complex Systems

Page 50: dr-g-l-pahuja-090612003214-phpapp01

Complex system Reliability Evaluation

• Probability calculus

• Event space

• Path set

• Cut set

• Decomposition

• Flow Graph Method/ Inspection Method

Page 51: dr-g-l-pahuja-090612003214-phpapp01

RELIABILITY EVALUATION METHODS OF COMPLEX

SYSTEMS

Page 52: dr-g-l-pahuja-090612003214-phpapp01

Classification 1:•Non Path sets or Cut Sets (NPOC) approaches

•Path Sets or Cut Set (POC) approaches

Classification 2:Based on maintenance activity of the system 1)Maintained systems 2)Non-maintained systems

Page 53: dr-g-l-pahuja-090612003214-phpapp01

Path sets and Cut Sets approach

1. In this approach, reliability evaluation requires path sets /cut sets knowledge

2. Obtain path sets/cut sets of the system from information on system topology or logical interconnection of elements within the system

3. Obtain an algebraic expression of system reliability in symbolic form from path sets and cut sets

Page 54: dr-g-l-pahuja-090612003214-phpapp01

• Employ elemental reliability to obtain system reliability

• If there are m disjoint path sets then Rs = S1 – S2 + S3 - …………+ (-1)m-1 Sm

where S1 ,S2 ,----- are sum of the probabilities of m path sets taken one at a time, two at a time,……m at a time

Page 55: dr-g-l-pahuja-090612003214-phpapp01

• It can also be represented as

s1 =

where Ti is the ith path set

Similarily

S2

Page 56: dr-g-l-pahuja-090612003214-phpapp01

Using sum of disjoint product (SDP) Rs can be expressed as:

P[ E1 U E2 U…….. Em ] = P[E1 ] + P[Ē1∩ E2 ] +P[Ē1

∩ Ē1 ∩ E3 ] + ……. + P[Ē1 ∩ Ē2 ∩ Ē3 ∩…….. ĒM-

1 ∩ Em]

Page 57: dr-g-l-pahuja-090612003214-phpapp01

NON PATH SETS OR CUT SETS APPROACHES

• The following methods belongs to the non path sets or cut sets approach of reliability evaluation

»Event space method»Decomposition method (Baye’s

theorem)»Method of inspection»Flow graph method»Probability calculus method

Page 58: dr-g-l-pahuja-090612003214-phpapp01

Event space method

• Assumed that each element and system has two states

» Operating and failed states

• This method is one of the most elementary and a straight forward method

• If a network has n elements, then there are 2n possible combinations

• List all possible combinations , and sort out success states, and hence write system success function as union of these success states

Page 59: dr-g-l-pahuja-090612003214-phpapp01
Page 60: dr-g-l-pahuja-090612003214-phpapp01
Page 61: dr-g-l-pahuja-090612003214-phpapp01
Page 62: dr-g-l-pahuja-090612003214-phpapp01

• From the above figure we can write

the structure function of the system is given as

S = { E1 U E2 UE3 U E4 U E5U E6U E7U E8 UE10 UE11 UE12 U E14UE15UE16UE17U E26 }Now transforming ith element state without super bar as pi and ith element with super bar as qi , then the reliability becomes Rs = p1 p2 p3 p4 p5 + q1 p2 p3 p4 p5 + p1 q2 p3 p4 p5 +

p1p2q3p4p5+p1p2p3q4p5+p1p2p3p4q5+q1q2p3p4p5+q1p2q3p4p5+…………+q1q2q3p4p5+p1p2q3q4q5

Page 63: dr-g-l-pahuja-090612003214-phpapp01

DECOMPOSITION METHOD

Baye’s theorem : if A is an event which depends upon of two mutually exclusive events Bi and Bj , of which one must necessarily occur, then the probability of occurrence of A is given by

P{A} = P{ A/Bi } + P{A/BJ } P{BJ }

Page 64: dr-g-l-pahuja-090612003214-phpapp01

RELIABILITY EVALUATION OF A BRIDGE NETWORK

Page 65: dr-g-l-pahuja-090612003214-phpapp01
Page 66: dr-g-l-pahuja-090612003214-phpapp01
Page 67: dr-g-l-pahuja-090612003214-phpapp01

METHOD OF INSPECTION• This method is useful for small systems with fewer branches,

and it is based on system configuration only

• In this method one has to trace out all sub graphs between the terminals for which the terminal reliability has to be computed

• Forward paths (without any loops) are computed first.

• Then paths with one loop, and subsequently two, three etc.

• Finally the system reliability would be the sum of product terms providing the product of reliability of involved branches and with an appropriate sign according to the sign rule

Page 68: dr-g-l-pahuja-090612003214-phpapp01
Page 69: dr-g-l-pahuja-090612003214-phpapp01

• Rs = F1 –F2 + F3 - ……………» Where F1 = Ui (all simple paths)

» F2 = Ui ( all sub graphs with one loop

» F3 = Ui (all sub graphs with two loops and so on)

• Mathematically reliability is given as

» Rs =

Sign rule is

Number of loops sign

o +

1 -

2 +

3 -

Page 70: dr-g-l-pahuja-090612003214-phpapp01

MARKOV PROCESS

• A Markov process is a stochastic process whose dynamic behavior is such that probability distributions of its future development depend only on the present state and not on how the process arrived in that state.

Page 71: dr-g-l-pahuja-090612003214-phpapp01

• In order to formulate Markov model ,first define all mutually exclusive states of the system

• The transition probabilities must obey the following two rules

» the probability of transition in time Δt from one state to another is given by z(t) Δt, where z(t) is the hazard associated with the two states . If all the z i(t) are constants the zi(t) = λI and the model is called homogeneous. If any hazards are time functions, the model is called non homogeneous.» The probabilities of more than one transition in time Δt are infinitesimals of a higher order and can be neglected.

Page 72: dr-g-l-pahuja-090612003214-phpapp01

Examples : one component system

• The probability of being in state S0 at time

t+Δt is written as P0 (t+ Δt ). This is given by the probability that the system is in state S0 at time t, P0 (t), times the probability of no failure in time Δt 1-z(t) Δt , plus the probability of being in state S1 at time t, P1 (t), times the probability of repair in time Δt, which equals zero

S0 = x1 and S1 = x’1

Page 73: dr-g-l-pahuja-090612003214-phpapp01

The resulting equation is

P0 (t+ t) =[(1-Z(t) t]P0 (t) + 0(P1 (t))△ △Similarly , the probability of being in state S1 at time t+ t is given by△

P1 (t+ t) = [z(t) t] P0 (t) + 1 ( P1 (t)△ △

The transition probability z(t) t is the probability of failure and the probability of△Remaining in state S1 is unity.

Re arranging the above equations we have

[P0 (t+ t)-P0 (t)]/ t = -z(t)P0 (t)△

[P1 (t+ t)-P1(t)]/ t = z(t)P0 (t)△ △

Passing to a limit as t becomes small, it was obtained as

dP0 (t)/dt = -z(t)P0 (t)

dP1(t)/dt = z(t)P0 (t)

Page 74: dr-g-l-pahuja-090612003214-phpapp01

The above equations can be solved in conjunction with the appropriate initial Conditions for P0 (t) and P1(t) . The most common initial condition is that the system is good at t=0 i.e is P0 (t=0) =1 and P1(t=0) =0

the solution is given as P0 (t) = exp[- ]

P1 (t) = 1- exp[- ]

MARKOV GRAPH

1-Z(t) △t 1

z(t) t△S0 S1

Page 75: dr-g-l-pahuja-090612003214-phpapp01

Markov model for two element system

• Let the two elements of the system be x1 and x2 and the corresponding four states will be given as

» S0 = x1 x2

» S1 = x’1 x2

» S3 = x1 x’2» S4 = x’1 x’2

Page 76: dr-g-l-pahuja-090612003214-phpapp01

• The probability expression for the state S0 is given by

» P0 (t+ t) =[(1-{Z △ 01(t) +Z 02(t)} t ]P△ 0 (t)

Where {Z 01(t) +Z 02(t)} t is the probability of a △transition in time t from S△ 0 to S1 or S2.

For state S1 ,

P1(t+ t) =Z △ 01(t) t P△ 0 (t) +[1-Z 13(t) t ]P△ 1(t)

Where Z 13(t) t is the probability of a transition from S△ 1 to S3 . Similarly for state S2 ,

P2(t+ t) =Z △ 02(t) t P△ 0 (t) +[1-Z 23(t) t ]P△ 2(t)

Where Z 23(t) t is the probability of transition from states △S2 to S3.

Page 77: dr-g-l-pahuja-090612003214-phpapp01

MARKOV GRAPH FOR TWO ELEMENT SYSTEM IS

S0 = X1 X2

Z 01(t)

Z 02(t) Δt

Z 13(t) Δt

Z 23(t)

Δt

S1 = X’1 X2

S2 = X1 X’2

S3 = X’1 X’2

ΔT

1-( Z01 (t) +Z02 (t)) ΔT

1-Z1 (t) ΔT

1-Z23 (t) ΔT

1

For state S3 the transition equation is

P3(t+ t) =Z 13(t) t P1 (t) + Z 23(t) t P2 (t) + 1 P3(t) △ △ △

Page 78: dr-g-l-pahuja-090612003214-phpapp01

RELIBILITY OF FLOW NETWORKS

Page 79: dr-g-l-pahuja-090612003214-phpapp01

RELIBILITY OF FLOW NETWORKS

ST Reliability: Most common quantitative index.

It is the probability of successful communication between

source and terminal node.

Basic Assumption: The required amount of flow can always

be transmitted from source to terminal node whenever a path

is available.

This Assumption: An implication which is neither physically

valid nor economically justified. Since most of the practical

system are flow limited networks.

Page 80: dr-g-l-pahuja-090612003214-phpapp01

Examples:

• Power Transmission system has limited power ratings of its power lines.

• Transport system might not allow traffic more than a particular value.

• A chemical system in which oil or gas flow through pipes is permissible only upto safe limits.

• A communication system having fixed channel capacities of its links.

Page 81: dr-g-l-pahuja-090612003214-phpapp01

Reliability of a flow Network:

The network is successful if and only if it is able to transfer at least the required flow from the input node to the out node.

The performance measure combining both reliability and capacity has been referred to as capacity related reliability (CRR) capacity constrained reliability (CCR).

Two types of performance indices (PIs) exist in literature.

(1)Weighted Reliability PI, PI-1 [30, 89]

It is defined as PI - 1

Where wi is the normalized weight & is defined as:

wi = Ci / Cmax

& Ri probability of the system being in state Si

& PI-2 [26, 28, 32, 35, 36]

The network is good if and only if a specified amount of flow (wmin) can be transmitted from the input node to output node or (s, t) node pair [36].

Si

iiRw

Page 82: dr-g-l-pahuja-090612003214-phpapp01

PI-1: More generalized.Aggarwal [30] State Enumeration ApproachKumar [89] Substitutionary Decomposition.Limitations:• Aggarwal’s Method [30] suffers from the fact that 2n system states

are to be evaluated. Thus rendering it unattractive for medium & large networks.

• It generates both cancelling and non-cancelling terms.• The PI contributing terms are required to be subjected to checks

to confirm if these contribute to PI or not.• Kumar’s Method [89] also generates both success and failed

terms but has the advantage over Aggarwal’s method that success terms are not subjected to such checks as in [30].

• The method generates large number of intermediate terms which are not included in the PI. Thus rendering the method computationally inefficient.

Proposed Method is free from these limitations.

Page 83: dr-g-l-pahuja-090612003214-phpapp01

PRELIMINARIES

Composite Performance Index (CPI) [30]

The weighted reliability measure i.e. composite performance index (CPI), integrating both capacity and reliability may be stated as:

Where wi is the normalized weight & is defined as:

wi = Ci / Cmax

i.e. the ratio of capacity in the i-th state to the maximum capacity (Cmax) of the system

& Ri probability of the system being in state Si & is given as:

 

)(xSi

iiRwCPI

1/ 0/ij ikSj Sk

kjiri qpXPR

Page 84: dr-g-l-pahuja-090612003214-phpapp01

Capacity Functions of Simple Networks [35]

For Series Network,

For Parallel Network

For non-series-parallel network:

Using max-flow min-cut theorem.

Key-Element:

A key-element is the branch of the network used to factor an expression into two expressions. One expression is obtained by substituting the key-element ‘1’ and the second expression is obtained by substituting the key-element “0” in the expression to be decomposed.

iSER CXC min

Xi

iPAR CXC

iallforcutww iiminmax

Page 85: dr-g-l-pahuja-090612003214-phpapp01

Let a success expression be given as below:

Selecting Xi as the key-element, the two

decomposed expressions obtained by substituting the

key element Xi ‘1’ and substituting ‘0’ are obtained as:

5325414321 XXXXXXXXXXS

532544321 XXXXXXXXXS

532431 XXXXXXS

53544321 1 XXXXXXXXS

544321 XXXXXXS

Page 86: dr-g-l-pahuja-090612003214-phpapp01

Final Term:

The key- term associated with S (key) that represents a decomposed expression in which each product term (belonging to sum of the products success expression) has been substituted by either one or zero. The right hand side of a final term contains no logical / Boolean variable either in complemented or in uncomplemented form.

…(1)

S (key) = 1 is a success term.

Terms for which S (key) = 0, say (1), has been termed as drop terms in [89]. These drop terms are not generated in the proposed method.

111154321 XXXXXS

054321 XXXXXS

54321 XXXXXS

Page 87: dr-g-l-pahuja-090612003214-phpapp01

Minimization of a decomposed expression (right hand side of a key-term-say represented by a S(key) in [89] has been done using the following Boolean algebra rules:

In the proposed method additional simplified algebra rules have been suggested. With the use of these rules, on the terms of decomposed expression results in faster generation of final term(s).Algebra RulesRule 1: … (2)

Provided no variable between Xi+1 to Xm is missing then (2) can be expressed as

Example: Let Then according to Rule 1

The Rule 1 is also applicable in case of variables in the key-term of S(key) are in complimented form and/or in the mixed form.

111;101;110;000 XXX &

m

ikki XXXS

11,...

1...... 2121 miii XXXXXXS

54321 XXXXXS

154321 XXXXXS

Page 88: dr-g-l-pahuja-090612003214-phpapp01

Rule 2: … (3)then the different resulting key-terms can be obtained as:

simplifying the s(key)’s are expressed as:

Example: Let then according to Rule 2 the resulting key-terms obtained

are given as follows:

The procedure of minimization using Kumar’s method [89] is given as below:

i.e. the procedure adopted using method [89] not only inefficient but generates drop terms also where as using any of the proposed rules no drop terms are generated.

211,..., iii XXXXS

2121211... iiiiiii XXXXXXXX

1... 211 iii XXXXS 1... 211 iii XXXXS

1... 211 iii XXXXS

54321 XXXXXS

154321 XXXXXS 154321 XXXXXS 154321 XXXXXS

54321 XXXXXS 54321 1 XXXXXS

54321 XXXXXS 11154321 XXXXXS 154321 XXXXXS

154321 XXXXXS

054321 XXXXXS

Page 89: dr-g-l-pahuja-090612003214-phpapp01

Rule 3: then the different resulting key-terms

generated are given as follows:

Illustration Rule 3:Letthen the key-terms generated are:

&

2

1

1...,i

ixki XXS

1... 1 iiXXS

1... 21 iii XXXS

1... 21 iii XXXS

54321 1 XXXXXS

14321 XXXXS

154321 XXXXXS

154321 XXXXXS

Page 90: dr-g-l-pahuja-090612003214-phpapp01

nnn XXXS 23...,

nnnnnnn XXXXXXXSskeyS 12123...'

nnnnnnnn XXXXXXXXS 123123....

1... 123 nnnn XXXXS

1... 123 nnnn XXXXS

Rule 4: Given

then success key- terms are generated using:

i.e. two S(key)’s are obtained & these are:

Illustration Rule 4:

Let

Two key – terms generated using Rule 4 are:

754321 XXXXXXS

17654321 XXXXXXXS

17654321 XXXXXXXS

Page 91: dr-g-l-pahuja-090612003214-phpapp01

Rule 5: Given The different (three) key – terms generated are:

Illustration Rule 5:Let The three key – terms generated using Rule 5 are given as below:

It has been observed that Boolean algebra rules X 1=1 and X XY = X yield incorrect results and should not be used in minimization process of the decomposing terms [89].

Rule 6: The key term obtained for a chosen key-element turns out to be a s-t cut then the term is not considered for further expansion.

3221... iiiii XXXXXS

1... 321 iiii XXXXS

1... 321 iiii XXXXS

1... 321 iiii XXXXS

76654321 XXXXXXXXS

17654321 XXXXXXXS

17654321 XXXXXXXS

17654321 XXXXXXXS

Page 92: dr-g-l-pahuja-090612003214-phpapp01

ALGORITHMThe algorithm is a modification over algorithm in [89]

S1) Let Pi, I = 1 to n be the minimal paths. These can be

obtained using any of the existing technique.

S2) Write down system success function (SSF),S expressed as union of minimal paths i.e.

S3) The network branches represented as logical variables are assigned numbers in a sequence (say X1 1, X2 2 & so

on). Let the number of variables be m.

S4) j 1

S5) Choose link / element j as a key-element

S6) Decompose expression in S2 into two “1” substituted and “0” substituted expressions for the chosen key-element j.

S7) Apply Rule 1 through Rules 6 (whichever applicable).

If or . It is a success term.

n

iiTSSSF

1

,

1jS 1jS

Page 93: dr-g-l-pahuja-090612003214-phpapp01

S8) if j > m then goto S 11.

S9) For the remaining S(key) terms (which do not result into retained terms): (a) check for the applicability of

minimization rules & / or (b) next variable (branch) be chosen as key-element.

S10) Repeat the process, S6 through S9 until all the success (retain) terms have been obtained.

S11) For each success term, obtain Ci using min-cut-max

flow theorem [36].

S12) The CPI for the system is obtain by replacing the logical variables to the corresponding probability variables i.e.

Xi pi

Xj pj

Si Skk

Sjii CqpCCPI

ijij

max//

/

11

Page 94: dr-g-l-pahuja-090612003214-phpapp01

ILLUSTRATIONS Example 3.4.1 CPI of bridge network shown in Fig. is to be evaluated. The number in parenthesis is the capacity of the element.

Figure

3

x2(3)

t s

x4(4)

x1(7)

x3(3)

x5(5)

4

(a)

Cmax = 7

E(5) E(5

Pr {E} = Pr {E} = PE

(b)

4

3

Page 95: dr-g-l-pahuja-090612003214-phpapp01

Solution: Generation of System Success Function (SSF), S

S1) The four minimal paths / Tie sets for the network are:

T1 = X1 X2 T3 = X1 X4 X5

T2 = X3 X4 T4 = X2 X3 X5

S2)

…(1)

S3) Number the links (elements)

X1 1, X2 2, X3 3, X4 4, X5 5

S4) j 1

S6) a) Substituting X1 1 in SSF(S2), we get

…(2)

b) is obtained by substituting X1 0 i.e.

…(3)

4321

4

1

, TTTTTSSSFi

i

5325414321 XXXXXXXXXX

532544321 XXXXXXXXXS

532431 XXXXXXS

1XS

Page 96: dr-g-l-pahuja-090612003214-phpapp01

S7) Since neither nor , none of these result in success term.

S8) j m (m = 5), algorithm goes to S9.

S9) Select X2 as a key element. Obtain decomposed expressions substituting X2 1, X2 0 .

The resulting four expression are …(4-7)

Apply Rule 1 to (7) the key-terms generated are expressed as follow: Since

…(8-9)then

53544321 1 XXXXXXXXS

544321 XXXXXXS

534321 XXXXXXS

4321 XXXXS

4321 XXXXS

14321 XXXXS

Page 97: dr-g-l-pahuja-090612003214-phpapp01

Apply Rule 5 to (5), three key terms are:

…(10-12)

S10) As all the success terms are not obtained, the process is repeated. i.e. Algorithm branches to S8.

As j ( = 2) > m ( = 5). Steps S9 through S11 are executed repeatedly until j > m. Performing S9 through S11, the following key – terms are obtained. From (4),

…(13-14)and (6)

…(15)is not expanded as is a cut (Rule 6).

154321 XXXXXS

154321 XXXXXS

154321 XXXXXS

5544321 1 XXXXXXXS

54321 1 XXXXXS

54321 XXXXXS 321 XXXS

31XX

Page 98: dr-g-l-pahuja-090612003214-phpapp01

From (13)

…(16-17)

From (14) Using Rule 3

…(18-20)

From (15) Using Rule 2

Applying Rule 3 on (16) & (17) the key-terms obtained are:

S11) The S(Key) Success terms generated alongwith capacity of each term are listed in Table.

5554321 111 XXXXXXXS

54321 1 XXXXXS

14321 XXXXS 154321 XXXXXS

154321 XXXXXS

154321 XXXXXS 154321 XXXXXS

154321 XXXXXS

154321 XXXXXS 154321 XXXXXS

154321 XXXXXS 154321 XXXXXS

Page 99: dr-g-l-pahuja-090612003214-phpapp01

TABLE

Sr. No.

Key terms Capacity Sr. No.

Key terms Capacity

1. 4 8. 4

2. 4 9. 3

3. 4 10. 4

4. 5 11. 7

5. 3 12. 7

6. 3 13. 3

7. 7 14. 3

4321 XXXXS

54321 XXXXXS

54321 XXXXXS

54321 XXXXXS

54321 XXXXXS

54321 XXXXXS

54321 XXXXXS

54321 XXXXXS

54321 XXXXXS

54321 XXXXXS

54321 XXXXXS

54321 XXXXXS

54321 XXXXXS

54321 XXXXXS

Page 100: dr-g-l-pahuja-090612003214-phpapp01

S12) The CPI may be expressed as given below:

The CPI defined is a general in nature as it may be used to evaluate the s-t reliability (connectivity measure), when all the links and the network is assumed to transport / communicate any amount of flow.

It can also be used to evaluate the PI as defined in methods [26, 89]. If Cmax appearing in the denominator of PI is dropped and the key

(success) – terms with capacity, C Cr, appearing in the expression of

PI are retained & rest of the terms (C < Cr) are dropped.

The proposed method generates 14 success terms, 11 intermediate terms and generation of failed terms is fully avoided whereas method [89] generates total 38 terms against 25 terms generated by the proposed method, 17 intermediate terms and 14 success terms. There is a total saving 34% with the proposed method.

7/}3

3774

7334

444{

max

Cqqrrr

rqrrrqrrrrrrrrrrrrrq

rrqrrqrrqrrrqrrrrqqr

qrrqrrrrqrrrqqCPI

edcba

edcbaedcbaedcbaedcba

edcbacddcbadcbaedcba

edcbaedcbadcba

Page 101: dr-g-l-pahuja-090612003214-phpapp01

• In life cycle cost analysis, the quality and reliability costs can be split into two components

» Controllable costs» Resultant costs

Controllable costs :

these are the costs of the activities that are planned and include all such activities which are necessary to ensure quality and reliability.

e.g. : Inspection costs, testing costs

Page 102: dr-g-l-pahuja-090612003214-phpapp01

• Resultant costs :» These are unplanned costs, and as such result from not

achieving the desired levels of quality and reliability.» These include external and internal failure costsThe manufacturer ha to include the following elements , to

optimize the costs and customer satisfaction,

Reliability design costs:1) planning costs2) Inspection and life

testing3) training and

management cost4) research and

development

Page 103: dr-g-l-pahuja-090612003214-phpapp01
Page 104: dr-g-l-pahuja-090612003214-phpapp01
Page 105: dr-g-l-pahuja-090612003214-phpapp01

Reliability section

• Responsibilities are

» Reliability data management and analysis» Reliability analysis and prediction» Reliability appointment and design» Specifications, material section and vendor control» Reliability tests planning and demonstration» Reliability education and statistical services» Intra departmental coordination.

Page 106: dr-g-l-pahuja-090612003214-phpapp01

Reliability an inter disciplinary effortPHASE EXPERT NEEDED

CONCEPTUAL SYSTEM ENGINEER

DESIGN AND DEVELOPEMENT MATHEMATICIANS OR SYSTEM ANALYSTS,DESIGN ENGINEER,PHYSICISTS,MATERIAL SCIENTIST,METTALURGIST,PROCESS TECHNOLOGIST,CHEMICAL ENGINEER,ELECTRICAL,ELECTRONICS,MECHANICAL,STRUCTURAL ENGINEER

MANUFACTURE AND INSTALL PRUCHASE ENGINEER,PRODUCTION ENGINEER,STATISTICIAN,QUALITY CONTROL ENGINEER,PACAKAGING EXPERT,MANAGEMENT EXPERTS,SERVICE ENGINEER

USE OPERATION ENGINEER,MAINTENANCE ENGINEER

Experts required to handle reliability problems

Page 107: dr-g-l-pahuja-090612003214-phpapp01

CHALLENGES FOR FUTURE

Page 108: dr-g-l-pahuja-090612003214-phpapp01

RELIABILITY MANAGEMENT

• It is concerned with the top management

• The concern of reliability management is to achieve organized reliability

• Any organization, to remain in business and to maximize customer satisfaction at the same time, has to look into the cost effectiveness of the activity i.e life cycle costs are important.

Page 109: dr-g-l-pahuja-090612003214-phpapp01

Methodologies for dealing with uncertainty , ambiguity, fuzziness and imprecision

CLASS OF AMBIGUITY METHODOLOGY USED

Uncertainty / Randomness

Theory of stochastic process and theory of decision making, Principle of uncertainty

Fuzziness Fuzzy set theory/ subjective probability theory/ theory of fuzzy or approximate reasoning/ invocation of knowledge engineering oriented approach

Ambiguity Fuzzy set theory/ fuzzy logic/ modal logic/semantics of information

Blur /Vagueness Filtering techniques /relaxation operations/ image interpretation techniques

Imprecision Structural modeling technique

Page 110: dr-g-l-pahuja-090612003214-phpapp01

Failure characteristics

Page 111: dr-g-l-pahuja-090612003214-phpapp01

Phases in equipment life

CONCEPT OF DEFINITION

DESIGN AND DEVELOPMENT

MANUFACTURE ANDINSTALL

OPERATION ANDMAINTAINANCE

BIRTH

QUALITY

MAINTAINABILITY

DEATH

RELIABILITY

Page 112: dr-g-l-pahuja-090612003214-phpapp01

HIGH PRESSURE OXYGEN SUPPLY SYSTEM OF A SPACECRAFT LIFE SUPPORT SYSTEM

Page 113: dr-g-l-pahuja-090612003214-phpapp01

Fault Tree Analysis

By

By Dr. G L PahujaNational Institute of Technology,

Kurukshetra

June 09,2009 GNEC Ludhiana

Page 114: dr-g-l-pahuja-090612003214-phpapp01

Fault Tree Analysis

• Fault Tree Analysis (FTA) is a systems engineering technique which provides an organized, illustrative approach to the identification of high risk areas.

Page 115: dr-g-l-pahuja-090612003214-phpapp01

• A Fault Tree (FT) is an event logic diagram, providing a logical representation of the events occurring within a complex system.

• Construction of a FT begins with the definition of the top undesired event (the system failure).

• The causes are then indicated and connected to the top event by conventional logic gates.

• The procedure is repeated for each of the causes and the causes of the causes, etc., until all the events have been considered.

Fault Tree

Page 116: dr-g-l-pahuja-090612003214-phpapp01

Product Development Chart with Scheduled FTA Inputs

Conceptual Phase

System Development

Phase

Equipment Development

Phase

Production Phase

Operational Use Phase

Feasibility Studies operational and

logistics concepts. System Analysis, Optimization, Synthesis

and Definition.

Detailed Equipment Design Layouts, Parts Lists,

Drawings, Support Data

Fabrication, Assembly, Test Inspect, Deploy,

Operational Equipment.

Operate and Maintain Equipment

in the Field

Conceptual Design Review

System Design Reviews

Equipment Design Reviews

Critical Design Review

In-service Design Review

Page 117: dr-g-l-pahuja-090612003214-phpapp01

Major Steps of Fault Tree Analysis

1. Define System and its bounds.

2. Define the undesired event (TOPEVENT).

3. Construct Fault Tree.

4. Perform qualitative evaluation.

5. Perform quantitative evaluation.

Page 118: dr-g-l-pahuja-090612003214-phpapp01

General Structure of a Fault Tree

Top Event:

System Failure

Resultant Events

AND/OR Gates

Basic Events

Page 119: dr-g-l-pahuja-090612003214-phpapp01

FT Construction Steps

1. Understand the system to be evaluated.2. Define the undesired event.3. Analyze the system to determine the logical

interrelationships of higher and lower functional events which may cause a predefined system fault condition.

4. Apply logical relationships to input fault events which are defined in terms of basic,independent and identifiable faults that may be assigned probability values.

5. Use FT symbols to connect this information.6. Reduce the FT if possible.7. Eliminate any feedback paths.8. Check to ensure all FT rules have been followed.

Page 120: dr-g-l-pahuja-090612003214-phpapp01

Symbol Symbol Name

Description Reliability Model Inputs

Basic Event

Basic event for which reliability information is available

Component failure mode, or a failure mode cause

0

Conditional Event

Event that is a condition of occurrence of another event when both must occurs for the output to occur

Occurrence of event that must occur for another event to occur

0

Event Symbols

Page 121: dr-g-l-pahuja-090612003214-phpapp01

Undeveloped Event

A part of the system that yet has to be developed-defined

A contributor to the probability of failure. Structure of that system part is not yet defined

0

Dormant Event

A basic event that represents a dormant failure

Dormant component failure mode or dormant failure cause

0

House External Event or Trigger Event

Occurrence of event that must occur for resultant Event to occur

0

Intermediate event

Event resulting from occurrence of other events

Consequent to other events

1

Page 122: dr-g-l-pahuja-090612003214-phpapp01

Gate SymbolsSymbol Symbol

NameDescription Reliability Model Inputs

AND Gate

The output event takes place if all of the input events occur

Parallel redundancy, one out of n equal or different branches

>2

OR GATE This output event occurs if any of its input event occur

Failure occurs if any of the parts of that system fails-series system

>2

Page 123: dr-g-l-pahuja-090612003214-phpapp01

PRIORITY AND

The output event occurs only if the input events do in sequence from left to right

Good for representation of secondary failures & enabling sequence of events

>2

INHIBIT GATE

The output occurs only if both of the input events do, one of them conditional

Conditional probability of occurrence of the final event

2

NOT GATE

The outcome is present only if the input event does not occur

Exclusive events or preventive measure does not take place

1

Page 124: dr-g-l-pahuja-090612003214-phpapp01

m

MAJORITY VOTE GATE

This output occurs if m of the inputs occur

Redundancy k out of n, where m=n-k+1

>3

EXCLUSIVE OR

The output event takes place if one, but not the other input occur

A failure of the system occurring only if one, not both of the two possible failures happens

2

Page 125: dr-g-l-pahuja-090612003214-phpapp01

Transfer Symbols

In

Out

Symbol Symbol Name

Description Reliability Model Inputs

Transfer Gate

Gate indicating that this part of the system is developed in another part or page of the diagram

A partial reliability block diagram that is shown in other location of the overall system block diagram

0/1

Page 126: dr-g-l-pahuja-090612003214-phpapp01

An example of the use of AND/OR gates..

Tank ruptures

Over Pressure

OR

Wall Fatiguefailure

Fig (a):

Over Pressure

AND

Excessive temperature

Relief Valvefails

Fig (b):

Page 127: dr-g-l-pahuja-090612003214-phpapp01

An example of the use of AND/OR gates..

Tank ruptures

Over pressure Wall Fatiguefailure

AND

Excessive temperature

Relief Valvefails

OR

Fig (c):

Page 128: dr-g-l-pahuja-090612003214-phpapp01

An R-C Filter Circuit

Input~ Output

X2

X1

X3

Page 129: dr-g-l-pahuja-090612003214-phpapp01

System States

T1 Normal output

T2 False output signal but safe

T3 False and dangerous output signal

Page 130: dr-g-l-pahuja-090612003214-phpapp01

States of R-C filter circuitComponent State

Capacitor: X1X11 Working Normally

X12 Open Circuit Fault

X13 Short Circuit Fault

Diode: X2X21 Working Normally

X22 Open Circuit Fault

X23 Short Circuit Fault

Resistor: X3X31 Working Normally

X32 Open Circuit Fault

Page 131: dr-g-l-pahuja-090612003214-phpapp01

Fault Tree for T1

T1

X11 X21X31

Page 132: dr-g-l-pahuja-090612003214-phpapp01

Fault Tree for T2

T2

X12 X13 X31 X13 X23X21

Page 133: dr-g-l-pahuja-090612003214-phpapp01

Fault Tree for T3

T3

X12 X31 X11 X23 X31X23

Page 134: dr-g-l-pahuja-090612003214-phpapp01
Page 135: dr-g-l-pahuja-090612003214-phpapp01

PARTS OF SOLDERING IRON 1. Cord Set (a) Plug (b) Cord 2. Handle 3. Heating Element 4. Soldering Tip 5. Shroud 6. Fiber Insulator 7. Solderless Crimp Connector 8. Long Screws 9. Short Screws (3) 10. Washers under Long Screws(2) 11. Nameplate

Page 136: dr-g-l-pahuja-090612003214-phpapp01

Critical Shock Hazard

Potential Shock caused by Defective Plug

Potential Shock caused by defective line cord

Potential Shock caused by shorted tip

Person grounded or at different

potential than shock

voltage

Person touches plug

The plug is connected

Person touches

defective cord or touch

something conductive at defect

Tip in contact

with high potential energy source

Power on condition

A

B C

D

Fault Tree for Soldering

Iron

Page 137: dr-g-l-pahuja-090612003214-phpapp01

Person in electrical contact

Insulation broken off

plug

Defective cord

Short in contact

with metal part

Plug cracks

Burned line cord

Abraded line cord Potential short

AC line cord to shroud or tip

Heater wire short

Hot tip or shroud contacts line cord

Line cord insulation not designed to withstand

foreseeable heatLine cord fiber

separator or insulator wire

failure

Person touches shroud

Person cleans

tip

Person adjusts screws

Cord rubs against rough

surface

Person touches conductive

surface

Tip in contact with conductive

surface

Line cord insulation not designed to

withstand foreseeable abrasion

Plug/Line cord

separation

A

BC

D

Plug is defective

Line cord defect

Flaw in tip

Page 138: dr-g-l-pahuja-090612003214-phpapp01

FTA-Simplification Rules

1. A = AO. A = OA . A = OA + A = 1A . A = AA + AB = AA + AB = A + B

A1 A2 = O

Page 139: dr-g-l-pahuja-090612003214-phpapp01

FTA – Example (MOCUS)T

I2I1

I4I3 X4

X1 X2

X31

X1 X32

Page 140: dr-g-l-pahuja-090612003214-phpapp01

FTA – Example (MOCUS)

T

Page 141: dr-g-l-pahuja-090612003214-phpapp01

FTA – Example (MOCUS)

T

I1

I2

Page 142: dr-g-l-pahuja-090612003214-phpapp01

FTA – Example (MOCUS)

T

I1

I2

X31I3

X4I4

Page 143: dr-g-l-pahuja-090612003214-phpapp01

FTA – Example (MOCUS)

T

I1

I2

X31I3

X4I4

X31X1

X31X2

X4X1

X4X32

Page 144: dr-g-l-pahuja-090612003214-phpapp01

FTA – Example (MOCUS)

T

I1

I2

X31I3

X4I4

X31X1

X31X2

X4X1

X4X32

T= X1X31 + X2X31 + X1X4 + X32X4

Page 145: dr-g-l-pahuja-090612003214-phpapp01

Uses of Fault Tree Analysis

1. Direct the analysis to ferret out failures deductively.

2. Pointing out the aspects of the system involved in the failure of interest.

3. Providing a graphical aid for those in system management who are not involved/removed from the system’s design changes.

4. Providing options for qualitative, as well as quantitative, system reliability analysis.

5. Allowing the analyst to concentrate on one particular system failure at a time.

6. Providing the analyst with insight into system behavior.

Page 146: dr-g-l-pahuja-090612003214-phpapp01

Fault Tree With Disjoint Events

Page 147: dr-g-l-pahuja-090612003214-phpapp01

Advantages of Fault Tree Analysis

1. Analysis to the degree of details desired.

2. Permits concentration on a particular undesired event at a time.

3. Important aspects with respect to failure event of interest identified.

4. Provides genuine insight into the system behavior.

5. Provides both qualitative and quantitative analysis.

6. Environmental and other external influences can be easily accommodated.

7. Easily modifiable to account for certain factors.

8. Provides visual and graphical aid for system management and planning.

Page 148: dr-g-l-pahuja-090612003214-phpapp01

Disadvantages of Fault Tree Analysis

1. Cost of development is high.

2. Shortage of skilled persons in the art of fault tree development.

3. Lack of efficient mathematical techniques.

4. Scarcity of pertinent failure data.

Page 149: dr-g-l-pahuja-090612003214-phpapp01

Current Literature in Reliability & Maintainability

IEEE transactions on Reliability Proceedings annual Reliability and

Maintainability symposium Technometrics Applied statistics Operations research IIE transactions Journal of the American statistical association

Page 150: dr-g-l-pahuja-090612003214-phpapp01

Reliability review Naval research logistics International journal of reliability ,quality and safety

engineering Microelectronics and reliability Reliability engineering Journal of applied reliability

Page 151: dr-g-l-pahuja-090612003214-phpapp01

ACKNOWLEDGEMENT

• Mr. Sreenivas Anchuri

• Ms. Deepika Arora

• Dr. J.S. Lather

• Dr. Krishan Gopal

• Mr.M.Vivekanand

• Mr.Manoj Gubbala

Page 152: dr-g-l-pahuja-090612003214-phpapp01

THANK YOU


Recommended