<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Availability Model of Critical NPP I&amp;C Systems Considering Software Reliability Indices</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Bogdan Volochiy</string-name>
          <email>bvolochiy@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vitaliy Yakovyna</string-name>
          <email>yakovyna@polynet.lviv.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Mulyak</string-name>
          <email>mulyak.oleksandr@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Key Terms. Mathematical Modeling</institution>
          ,
          <addr-line>Method, Software Systems</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National University Lviv Polytechnic</institution>
          ,
          <addr-line>12 Bandera St., 79013, Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Providing the high availability level for the Instrumentation and Control (I&amp;C) Systems in Nuclear Power Plants (NPP) is highly important. The availability of the critical NPP I&amp;C systems depends on the hardware and software reliability behavior. The high availability of the I&amp;C systems is ensured by the following measures: structural redundancy with choice of the I&amp;C system configurations (two comparable sub-systems in the I&amp;C system, majority voting "2oo3", "2oo4", etc.); maintenance of the I&amp;C system, which implies the repair (changing) of no operational modules; using the N-version programming; software updates; automatic software restart after temporary interrupts caused by the hardware fault. This paper proposes solution of the following case: the configuration of the fault-tolerant I&amp;C system with known reliability indexes of hardware (failure rate and temporary failure rate) is chosen, the maintenance strategy of hardware (mean time to repair, numbers of repair), methods to forecast the number of software failures and the failure rate is specified. To solve this issue, the availability model of the fault-tolerant I&amp;C system was developed in the discrete-continuous stochastic system form. We have estimated the influence of the I&amp;C system on the operational software parameters. Two configurations of I&amp;C systems are presented in this paper: two comparable subsystems in I&amp;C system, and I&amp;C system with majority voting "2oo3".</p>
      </abstract>
      <kwd-group>
        <kwd />
        <kwd>Instrumentation and Control (I&amp;C) System</kwd>
        <kwd>Discrete-Continuous Stochastic System</kwd>
        <kwd>Reliability Behavior</kwd>
        <kwd>Structural-Automated Model</kwd>
        <kwd>Markovian Chains</kwd>
        <kwd>Software Reliability</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>- 400
1
1.1</p>
    </sec>
    <sec id="sec-2">
      <title>Introduction</title>
      <sec id="sec-2-1">
        <title>Motivation</title>
        <p>Nowadays the development of fault-tolerant computer-based systems (FTCSs) is a
part of weaponry components, space, aviation, energy and other critical systems. One
of the main tasks is to provide requirements of reliability, availability and functional
safety. Thus the two types of possible risks relate to the assessment of risk, and to
ensuring their safety and security.</p>
        <p>
          Reliability (dependability) related design (RRD) [
          <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6">1-6</xref>
          ] is a main part of
development of complex fault-tolerant systems based on computers, software (SW) and
hardware (HW) components. The goal of RRD is to develop the structure of FTCS
tolerating HW physical failure and SW designs faults and assure required values of
reliability, availability and other dependability attributes. To ensure fault-tolerance
software, two or more versions of software (developed by different developers, using
other languages and technologies, etc) are used [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].Therefore use of structural
redundancy for FTCS with multiple versions of software is mandatory. When
commissioning software some bugs (design faults) remain in its code [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], this leads to the
shutdown of the FTCS. After detection the bugs, a software update is carried out. These
factors have influence on the availability of the FTCS and should be taken into
account in the availability indexes. During the operation of FTCS it is also possible that
the HW will fail leading to failure of the software. To recover the software
operability, an automatic restart procedure, which is time consuming, is performed. The
efficiency of fault-tolerant hardware of FTCS is provided by maintenance and repair.
        </p>
        <p>Insufficient level of adequacy of the availability models of FTCS leads either to
additional costs (while underestimating of the indexes), or to the risk of total failure
(when inflating their values), namely accidents, material damage and even loss of life.
Reliability and safety are assured by using (selection and development) fault-tolerant
structures at RRD of the FTCS, and identifying and implementing strategies for
maintenance. Adoption of wrong decisions at this stage leads to similar risks.
1.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Related Works Analysis</title>
        <p>
          Research papers, which focus on RRD, consider models of the FTCS. Most models
are primarily developed to identify the impact of one the above-listed factors on
reliability indexes. The rest of the factors are overlooked. Papers [
          <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
          ] describe the
reliability model of FTCS which illustrates separate HW and SW failures. Paper [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] offer
reliability model of a fault-tolerant system, in which HW and SW failures are
differentiated and after corrections in the program code the software failure rate is
accounted for. Paper [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] describes the reliability model of the FTCS, which accounts for
the software updates. In paper [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] the author outlines the relevance of the estimation
of the reliability indexes of FTCS considering the failure of SW and recommends a
method for their determination. Such reliability models of the FTCS produce analysis
of its conditions under the failure of SW. This research suggests that
MTTFsystem=MTTFsoftware. Thus, it is possible to conclude that the author considers the
HW of the FTCS as absolutely reliable. Such condition reduces the credibility of the
result, especially when the reliability of the HW is commensurable to the reliability of
the SW. Paper [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] presents the assessment of reliability parameters of FTCS through
modeling behavior using Markovian chains, which account for multiple software
updates. Nevertheless there was no evidence of the quantitative assessments of the
reliability measures of presented FTCS.
        </p>
        <p>
          In paper [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], the authors propose a model of FTCS using Macro-Markovian
chains, where the software failure rate, duration of software verification, failure rate
and repair rate of HW are accounted for. The presented method of Macro-Markovian
chains modeling [
          <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
          ] is based on logical analysis and cannot be used for profound
configurations of FTCS due to their complexity and high probability of the
occurrence of mistakes. Also there is a discussion around the definition of requirements for
operational verification of software of the space system, together with the research
model of the object for availability evaluation and scenarios preference. It is noted
that over the last ten years out of 27% of space devices failures, which were fatal or
such that restricted their use, 6% were associated with HW failure and 21% with SW
failure.
        </p>
        <p>
          Software updates are necessary due to the fact that at the point of SW
commissioning they may contain a number of undetected faults, which can lead to critical failures
of the FTCS. Presence of HW faults relates to the complexity of the system, and
failure to conduct overall testing, as such testing is time consuming and needs substation
financial support. To predict the number of SW faults at the time of its commissioning
various models can be used, one for example is Jelinski-Moranda [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ].
        </p>
        <p>A goal of the paper is to suggest a technique to develop a Markovian chain for
critical NPP I&amp;C system with different redundancy types (first of all, structure and
version) using the proposed formal procedure and tool. The main idea is to decrease
risks of errors during development of Markovian chain (MC) for systems with very
large (tens and hundreds) number of states. We propose a special notation which
allows supporting development chain step by step and designing final MC using
software tools. The paper is structured in the following way. The aim of this research is
calculating the availability function of critical NPP I&amp;C system with
versionstructural redundancy and double software updates.</p>
        <p>To achieve this goal we propose a newly designed reliability model of critical NPP
I&amp;C system. As an example a special critical NPP I&amp;C system is researched (Fig.1).
The following factors are accounted for in this model: overall reserve of critical NPP
I&amp;C system and joint cold redundancy of modules of main and diverse systems of
critical NPP I&amp;C system; the existence of three software versions; SW double update;
physicals fault.</p>
        <p>
          Structure of the paper is the following. Researched critical NPP I&amp;C system is
described in the second section. An approach to developing mathematical model based
on Markovian chain and detailed procedure for the critical NPP I&amp;C system are
suggested in the third and fourth sections correspondingly. Simulation results for
researched Markov’s model are analyzed in the section 4. Last section concludes the
paper and presents some directions of future researches and developments.
Here we provide the structure (Fig.1) of researched typical NPP Instrumentation and
Control system (I&amp;C) based on the digital platform [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. This platform consists of
main and diverse systems which are based on the Field Programmable Gates Arrays
(FPGA) chips [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. Main and Diverse systems based on the FPGA safety controller
(FSC) with three parallel channels on voting logic “2-out-of-3”.
        </p>
        <p>This architecture consists of two system (main, diverse) each of them consists three
channels connected in parallel with majority voting arrangement for the output
signals, such that the output state is not charged if only one channel gives a different
result, which disagrees with the other two channels.</p>
        <p>The signals from Main and Diverse systems are comparing by element OR.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Methods to Forecast the Number of Software Failures and the Software Failure Rate</title>
      <p>
        The papers [
        <xref ref-type="bibr" rid="ref18 ref19">18, 19</xref>
        ] describe methods of predicting numbers of undetected SW
design faults. This method is based on the SW reliability model with index of
complexity [
        <xref ref-type="bibr" rid="ref20 ref21">20, 21</xref>
        ]. The SW reliability model [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] describes the behavior of SW failures in
non homogeneous Poisson process forms. The cumulative number of SW failures up
to time t is calculated based on formula (1):
mt     st s et  sGt s,
(1)
z
where Gz  p    t p 1et dt – an incomplete gamma function, α – the coefficient
0
describes the total number of SW failure, β – the factor that represents the rate of
detection of SW failures, s – an index of SW complexity.
      </p>
      <p>
        Work [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] researches and specifies the intervals of value of the complexity index
of SW s. This circumstance has allowed for the elaboration of a formal selection rule
for SW reliability models with different complexity indexes. The total number of SW
failures (and, consequently, the total number of SW design faults Ndef, on condition
that one SW failure is caused by one SW design fault) is determined by the value of
the function of the cumulative number of SW failures (1) at t:
      </p>
      <p>N def  m  sGs ,
(2)
where G(s) – the Gamma function.</p>
      <p>
        To estimate the undetected numbers of SW design faults, the following steps [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]
should be performed:
─ carry out SW testing and represent the result as the number of SW failures in
defined interval. The input range of statistical sampling is divided into equal interval
l ≤ 5lg(n) (where n – the total number of SW failures obtained during testing);
─ define the point estimates of the reliability SW model parameters α, β, and define
parameter s by using the method of maximum likelihood [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ];
─ carry out the Kolmogorov – Smirnov test for quality, reviewing the experimental
reliability model described;
─ use the point estimates of the reliability SW model parameters according to (2) the
defined total number of SW design faults Ndef . The forecast for the number of
undetected SW design faults is obtained by subtracting the total number of SW
design faults Ndef and defined SW design faults.
      </p>
      <p>
        Using regression analysis [
        <xref ref-type="bibr" rid="ref18 ref19">18, 19</xref>
        ], it is possible to:
─ increase the accuracy of the forecast of the total number of SW design faults using
formula (2); or
─ decrease the time required to forecast the number of SW design faults.
      </p>
      <p>The number SW faults depends on the duration of SW testing, which provides
information about SW failure behavior. The variable Ndef from formula (2) was
estimated using a nonlinear regression with explanatory variables Ti – time of SW testing.
The following equation (3) was used as the regression equation.</p>
      <p>exp</p>
      <p>N def Ti   A1   k Ti  Tc d  , (3)
where A, k, d, Tc – parameters of the regression equation.</p>
      <p>It is then possible to determine the adjusted forecast of the total number of SW
failures N d*ef from equation (3) on condition of the time of SW testing being
unlimited (Ti). Based on the equation (3) the total number of SW failure is equal to the
value of regression parameter A.</p>
      <p>
        To estimate the adjusted forecast for the total number of undetected SW failures
N d*ef , the following steps should be performed:
─ during the SW testing procedure, it is necessary to calculate the point estimates of
the reliability SW model parameters α, β and s [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] by using the methods of
maximum likelihood on the interval (0; Ti), where Ti - the current moment of SW
testing. It is also is necessary to calculate Ndef(Ti) according the equation (2);
─ estimate the parameter of regression equation (3) by using the least squares method
for set of Ndef(Ti); N d*ef  A ;
─ the forecast number of undetected SW faults is determined by subtracting the
number of detected and fixed SW faults from N d*ef ;
─ in the case where a continuation of the process for SW testing is necessary, go back
to step 1 and continue adding the new value to set Ndef(Ti).
      </p>
      <p>
        An example of dependence Ndef(Ti) [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] which was obtained during the SW testing
procedure is presented in figure 2.
      </p>
      <p>40
38
36
fe34
d
N
,ts32
c
fee30
d
fro28
e
b26
m
u
N24
22
20
0
200
400 600 800
Testing duration, Ti (runs)
1000
1200</p>
      <p>
        In this case, using the methods of forecasting t the SW failure numbers and
equation (3) increases the accuracy of forecasting by 2-3%. Also, this method decreases
the time required to forecast the number of SW failures [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>
        An advantage of the SW reliability model [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] is that it is possibile to estimate the
SW failure rate based on SW testing results at the appropriate level of the life cycle.
The SW failure rate depends on the time of SW testing (this dependence is caused by
correction of the SW faults on the appropriate live cycle). The relationship takes the
form (4):
      </p>
      <p>dt
 t   dmt    s1t set ,
(4)</p>
      <p>As a result of using equation (4), the point value of the model parameters and the
duration of SW , it is possible to calculate the SW failure rate SW – which is constant
in time. It is necessary to estimate the value of SW, the availability of the I&amp;C NPP
system based on Markovian analysis.</p>
      <p>
        The authenticity of the estimate of the undetected SW faults [
        <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
        ] is provided by
forecasting the SW failure numbers (as result SW faults) based on artificial neural
networks (NN) with radial basis function (RBF). The NN RBF is a nonparametric
model of behavior of SW reliability which does not require a priori knowledge and
assumptions about the behavior of SW failure. In this research, input data about SW
failures were presented in cumulative time series form. The cumulative time series is
used for learning about the neural networks RBF and for forecasting the value of SW
failure on subsequent time series.
      </p>
      <p>
        The most reasonable results of forecasting SW failure are obtained by using NN
RBF with an Inverse Multi-quadratic function (10 neurons in input layer and 30
neurons hidden layer) [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. In this configuration, the mean square error of approximation
is 1,0%. The coefficient of determination between the forecasting and controlled
series is 0,9965. Although the accuracy of forecasting decreases by 1,7%, it is possible
to reduce the duration of learning time of the neural network by 3-6 times by using a
Gaussian function (15 neurons in the input layer and 10 neurons in the hidden layer)
[
        <xref ref-type="bibr" rid="ref23 ref24">23, 24</xref>
        ].
      </p>
      <p>As a result of the different SW systems analysed, a configuration of neural network
RBF was conducted that could be used for time series forecast with homogeneous
failure process represented by a cumulative time series.</p>
      <p>Figure 3 presents an example of forecasting t, specifically, the total number of SW
failures of the web-browser Chromium forecast using the neural network RBF with
parameters listed above.</p>
      <p>100
110
120
130
140</p>
      <p>150</p>
      <sec id="sec-3-1">
        <title>Time</title>
        <p>Fig. 3. An example of forecasting t, the total number of SW failures of web-browser</p>
        <p>Chromium, using the neural network RBF
160
140
s
lt
u
a
f
e
r
taw120
f
o
S
100</p>
      </sec>
      <sec id="sec-3-2">
        <title>Experiment Prediction</title>
        <p>
          This parts of paper outlines the estimated numbers of undetected SW faults using
two methods based on regressions analysis and neural networks. This is used for
reliably estimating the number of undetected SW faults and ensures the requirements of
standard [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ] are satisfied. It is considered acceptable when number of SW faults
calculated by two methods is equal to or less than the standards requirement.
4
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Markov’s Model for Critical NPP I&amp;C Systems with Software Updates</title>
      <p>
        The method of automated development the Markovian chain of the researched critical
NPP I&amp;C systems is described in the works [
        <xref ref-type="bibr" rid="ref26 ref9">9, 26</xref>
        ]. It involves a formalized
representation of the object of study as a “structural-automated model”. To develop this
availability model of the critical NPP I&amp;C systems one needs to perform the following
tasks: develop a verbal description of the research object (fig. 1); define the basic
events; define the components of vector states, which can be described as a state of
random time; define the parameters for the object of research, which should be in the
model; and shape the tree of the modification of the rules and component of the vector
of states.
4.1
      </p>
      <sec id="sec-4-1">
        <title>The Procedures to Describe Behavior of the Critical NPP I&amp;C Systems</title>
        <p>The critical NPP I&amp;C systems behavior is described by the following procedures:
─ Procedure 1. Detection the failure in the critical NPP I&amp;C systems (hardware
failure, software failure). Failure can occur in the Main system (MS) and Diverse
system (DS).
─ Procedure 2. Detection of failure in the MS or in the DS of the critical NPP I&amp;C
systems.
─ Procedure 3. Connection of the module from cold standby to faulty systems.
─ Procedure 4. Loading the software on the module with connections from cold
standby to faulty systems.
─ Procedure 5. Software updating.
─ Procedure 6. Repair (replacement) of the HW of the faulty systems.
4.2</p>
      </sec>
      <sec id="sec-4-2">
        <title>A Set of the Events for the Critical NPP I&amp;C Systems</title>
        <p>
          According to described procedures which determine the behavior of critical NPP I&amp;C
systems, a list of events is composed. Events are presented in pairs corresponding to
the start and the end of time intervals to perform each procedure. From this list of
events for “structural-automated model” basic events are selected [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>As a result of analysis, seven basic events in particular were determined: Event 1
“Hardware failure of the MS module”; Event 2 - “Software failure of the MS
module”; Event 3 - “Hardware failure of the DS module”; Event 4 - “Software failure of
the DS module”; Event 5 - “Completing of the module switching from cold standby to
non-operational systems”; Event 6 - “Completing of the software updates procedure”;
Event 7 - “Completing of the procedure of the hardware repair”</p>
      </sec>
      <sec id="sec-4-3">
        <title>Components of Vector States for the Critical NPP I&amp;C Systems</title>
        <p>Components of the vector state that can also be described as a state of random time.
To describe the state of the system, eleven components are used: V1 – displays the
current number of modules in the MS (the initial value of components V1 equal to n);
V2 – displays the current number of modules in the DS (the initial value of
components V2 equal to k); V3 – displays the current number of modules in cold standby
(the initial value of components V3 equal to mc); V4 – displays which software
version is operated by the MS (V4=0 – first version, V4=1 – second version, V4=2 –
third version); V5 – displays which software version operated by DS (V5=0 – first
version, V5=1 – second version, V5=2 – third version); V6 – displays the SW faults
in the MS; V7 – displays the SW faults in the DS; V8 – displays the SW failure in the
MS; V9 – displays the SW failure in the DS; V10 – displays the number of
nonoperational module, due to HW failure.
4.4</p>
      </sec>
      <sec id="sec-4-4">
        <title>The Parameters of the Critical NPP I&amp;C Systems Markov’s Model</title>
        <p>Developing Markov’s model of the critical NPP I&amp;C systems, its composition and
separate components should be set to relevant parameters in particular: n – number of
modules that are the part of the MS; k – number of modules that are the part of the
DS; mc –number of the modules in the cold standby;hw– the failure rate that is in MS
or DS and in the hot standby; sw11, sw12 – the failure rate of first and second software
versions;Tup1, Tup2 – mean time of the first and second software updates; Tswitch – mean
time of the module connections from standby; Trep– mean time of hardware repair.
4.5</p>
      </sec>
      <sec id="sec-4-5">
        <title>Structural-Automaded Model of the Critical NPP I&amp;C System for the</title>
      </sec>
      <sec id="sec-4-6">
        <title>Automated Development the Markovian Chain with Software Updates</title>
        <p>
          According to the technology of a modeling, the discrete-continuous stochastic
systems [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] based on certain events using the component vector state and the parameters
that describe critical NPP I&amp;C systems, and model of the critical NPP I&amp;C systems
for automated development of the Markovian chains are presented on the table 1.
Below is describes the procedures of structural-automated model development:
        </p>
      </sec>
      <sec id="sec-4-7">
        <title>Terms and conditions</title>
      </sec>
      <sec id="sec-4-8">
        <title>Formula used for the intensity of the events</title>
      </sec>
      <sec id="sec-4-9">
        <title>Rule of modification component for the state vector</title>
        <p>Event 1. Hardware failure of the MS module
(V1&gt;=(n-1)) AND (V6=0)</p>
        <p>V1·λhw</p>
        <p>V1:=V1-1; V8:=V8+1</p>
        <p>Event 2. Software failure of the MS module
(V1&gt;=(n-1)) AND (V4=0)</p>
        <p>AND (V6=0)</p>
        <p>V1·λsw11</p>
        <p>V1:=V1-1;
V6:=1</p>
        <p>V4:=0;</p>
        <p>The number of software updates can be also changed. It is necessary to change
vectors V4 and V5 the event 6, that are responsible for the number of updates. For
V1:=n; V2:=k; V8:=0
V1:=n; V4:=1; V6:=0
V1:=n; V4:=2; V6:=0
V2:=k; V5:=1; V7:=0
V2:=k; V5:=2; V7:=0
V1:=V1+1; V3:=V3-1
V2:=V2+1; V3:=V3-1
V1:=n; V6:=0; V8:=0</p>
        <p>V2:=k; V7:=0; V8:=0
example, if there are three software updates, the entry component of the event will be
as follows:</p>
      </sec>
      <sec id="sec-4-10">
        <title>Automated Development of the Markovian Chain and Determining of Availability Function</title>
        <p>
          The developed availability model of the critical NPP I&amp;C system gives the
possibilities according to technology [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] for automated construct of the Markovian chains.
This construction provides a software module ASNA [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. The Markovian chains
which take into account the following settings critical NPP I&amp;C system: n=3; k=3;
mc=0; hw; sw11, sw12; Tup1, Tup2; Tswitch;Trep, are consists of 169 state and 436
transitions. Information is available on the status of each software module ASNA we have
on file "vector.vs", which is written in the form:
        </p>
        <p>State 1: V1=3; V2=3; V3=0; V4=0; V5=0; V6=0; V7=0; V8=0
State 2: V1=2; V2=3; V3=0; V4=0; V5=0; V6=0; V7=0; V8=1
State 3: V1=1; V2=3; V3=0; V4=0; V5=0; V6=0; V7=0; V8=2</p>
        <p>……….</p>
        <p>State 169: V1=1; V2=1; V3=0; V4=2; V5=2; V6=0; V7=0; V8=4</p>
        <p>As the configurations of researched critical NPP I&amp;C system changes the
dimension of graphs increases. Therefore for the configuration of critical NPP I&amp;C sys (Fig.
1) with one module in a cold standby graph has 506 states and 1434 transitions.</p>
        <p>The proposed availability model of critical NPP I&amp;C system can be easily
transformed for other features of the object of study. It is enough to: add / remove basic
event; attach / remove components of the state vector; and include / exclude
parameters that describe the studied system. Based on information about the work of critical
NPP I&amp;C system an appropriate change in the model could be made (Fig. 1).</p>
        <p>Basing on the Markovian chains formulas for designing of availability critical NPP
I&amp;C system can be assembled. One measure of the availability of recovered critical
NPP I&amp;C system reveals it is an availability function. Availability functions of critical
NPP I&amp;C system is calculated as the sum of the probability functions staying in
operable states of chains. Basing on these states the critical NPP I&amp;C system availability
function with parameters of critical NPP I&amp;C is determined by the formula (5):</p>
        <p>Based on the Markovian chains ("vector.vs") a system of differential equations (6)
was formed. Its solution allows us to estimate the function availability value of
researched critical NPP I&amp;C system.</p>
        <p> 6  hw  sw11   Р2 t  
 Р8 t   Р9 t   Р11 t   Р16 t 
1   Р2 t   Р3 t   Р6 t   Р7 t  </p>
        <p>Trepl
  1  Р2 t   2 sw11Р2 t   2 hw  Р2 t   3hw  Р2 t  </p>
        <p>Trepl
 2 hwР1 t 
  1  Р3 t   3 hw  sw11   Р3 t   2 hwР2 t </p>
        <p>Trepl
(6)
,
(6)
dP1 t </p>
        <p>dt
dP2 t </p>
        <p>dt
dP3 t </p>
        <p>dt

dP169 t 
dt
  1  Р169 t   2 hwР156 t   2 sw12 Р168 t </p>
        <p>Trepl
; ...</p>
        <p>Initial conditions for the system (2) are: P1 ︵t ︶1 P2 ︵t ︶ P169 ︵t ︶0 .
5
5.1</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Simulation Results</title>
      <sec id="sec-5-1">
        <title>Research of Influence of Software Updates Duration on the Availability</title>
      </sec>
      <sec id="sec-5-2">
        <title>Function</title>
        <p>With the assistance of the proposed model, the following questions can be answered:
What are the duration values of the first and the second software update (ensuring the
values of the availability function of critical NPP I&amp;C system of the initial phase of
its operation do not reach below the specified level)? What are the allowed duration
values of the first and the second SW updates? How does the correlation between the
first and the second SW updates influence on the availability function?</p>
        <p>The experiment is conducted for the condition where the duration of the first
software update is significantly shorter than the duration of the second update. The
duration of the first update is given within 10 - 50 hours, and the duration of the second
update - 200 hours. The experiment is conducted with the following parameters
critical NPP I&amp;C system: hw = 1·10-5 hour-1; sw11 = 2·10-3 hour-1, sw12=1·10-3 hour-1;
Tswitch=6 min; Trep=200 hour; Tup2=200 hour; (line 1 -Tup1=10 hour; line2 -Tup1=20
hour; line3 -Tup1=30 hour; line4 -Tup1=40 hour; line5 -Tup1=50hour).
Fig. 4. Dependencies of availability function of the critical NPP I&amp;C system on values
of the software update durations (duration of the first software update for 10 to 50 hours;
the duration of the second firmware update - 200 hours)</p>
        <p>The following results are produced by the proposed experiments:
─ The minimal decrease level of the availability function of the readiness of critical
NPP I&amp;C system in the first and the second experiments is the different. Hence
could be argued that the first and second software updates has different influence
on the reliability behavior of the critical NPP I&amp;C system.
─ With the assistance of the proposed model it is possible to choose the duration of
software updates that helps to ensure a minimum allowed level of the decrease of
the availability function of the critical NPP I&amp;C system.
6</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>This research presents a model of critical NPP I&amp;C system with double software
updates to illustrate automated development of Markovian chains using a special
technology and tool ASNA. Also this research presents two methods of forecasting the
number of software failure with indexes of complexity and software failure rates.</p>
      <p>The presented model can be easily adapted to different configurations of critical
NPP I&amp;C system, which envisages the use different majority voting, standby of the
hardware part and as a consequence in the majority of software versions from
different developers. In fact, this model can be adopted for an arbitrary number of software
updates.</p>
      <p>Future research has the potential to supplement this model with further factors:
─ Erlang distribution for durations of software updates;
─ Unsuccessful restarting; unreliable commutation of elements and so on.
 </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Mudry</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vannel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tempesti</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mange</surname>
            ,
            <given-names>D.:</given-names>
          </string-name>
          <article-title>A reconfigurable hardware platform for prototyping cellular architectures</article-title>
          .
          <source>In: International Parallel and Distributed Processing Symposium</source>
          . IEEE International, pp.
          <fpage>96</fpage>
          --
          <lpage>103</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Viktorov</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Reconfigurable Multiprocessor System Reliability Estimation</article-title>
          .
          <source>Asian Jounal of Information Technology</source>
          <volume>6</volume>
          (
          <issue>9</issue>
          ), pp.
          <fpage>958</fpage>
          --
          <lpage>960</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Rajesh</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vinoth</surname>
            <given-names>Kumar C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Srivatsan</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harini</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shanthi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Fault Tolerance in Multicore Processors With Reconfigurable Hardware Unit</article-title>
          .
          <source>In: 15thInternational conference on high performance computing. Bangalore</source>
          , INDIA, pp.
          <fpage>166</fpage>
          --
          <lpage>171</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Amerijckx</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Legat</surname>
          </string-name>
          , J.
          <string-name>
            <surname>-D.</surname>
            :
            <given-names>A</given-names>
          </string-name>
          <string-name>
            <surname>Low-Power Multiprocessor ArchitectureFor Embedded Reconfigurable</surname>
          </string-name>
          <article-title>Systems</article-title>
          . In: Power and
          <string-name>
            <given-names>Timing</given-names>
            <surname>Modeling</surname>
          </string-name>
          , Optimization and Simulation, International Workshop, pp.
          <fpage>83</fpage>
          --
          <lpage>93</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Zhu</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gu</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dick</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shang</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Reliable multiprocessor system-on-chip synthesis</article-title>
          .
          <source>In: Proc. International Conference Hardware/Software Co-design and System Synthesis</source>
          , pp.
          <fpage>239</fpage>
          --
          <lpage>244</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Gostelow</surname>
            ,
            <given-names>K. P.:</given-names>
          </string-name>
          <article-title>The design of a fault-tolerant, realtime, multi-core computer system</article-title>
          .
          <source>In: Proc. Aerospace Conference</source>
          , IEEE, pp.
          <fpage>1</fpage>
          --
          <lpage>8</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Lyu</surname>
            ,
            <given-names>M.R</given-names>
          </string-name>
          . (ed.):
          <source>Software Fault Tolerance</source>
          , John Wiley &amp; Sons, New York, NY, USA (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Korotun</surname>
          </string-name>
          , Т.М.:
          <article-title>Models and methods for testing software systems</article-title>
          .
          <source>Programming problems</source>
          ,
          <volume>2</volume>
          ,
          <fpage>76</fpage>
          --
          <lpage>84</lpage>
          (
          <year>2007</year>
          )
          <article-title>(in Russian)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Volochii</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Technology of modeling the information systems</article-title>
          .
          <source>Publishing NU "Lviv Polytechnic"</source>
          , Lviv, Ukraine (
          <year>2004</year>
          )
          <article-title>(in Ukrainian)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Xiong</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tan</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>Effects of Soft Error to System Reliability</article-title>
          .
          <source>In: Proc. Workshops of International Conference on Advanced Information Networking and Applications</source>
          . pp.
          <fpage>204</fpage>
          --
          <lpage>209</lpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Ponochonvyi</surname>
            ,
            <given-names>J.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Odarushchenko</surname>
            ,
            <given-names>E.B.</given-names>
          </string-name>
          :
          <article-title>The reliability modeling non-redundant information and control systems with software updated</article-title>
          .
          <source>Radio-electronic and Computer Systems</source>
          ,
          <volume>4</volume>
          (
          <issue>8</issue>
          ),
          <fpage>93</fpage>
          --
          <lpage>97</lpage>
          (
          <year>2004</year>
          )
          <article-title>(in Russian)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Kharchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Odarushchenko</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Odarushchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Popov</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Selecting Mathematical Software for Dependability Assessment of Computer Systems Described by Stiff Markov Chains</article-title>
          . In: Ermolayev,
          <string-name>
            <surname>V.</surname>
          </string-name>
          et al. (Eds.):
          <source>Proc. Int. Conf. ICTERI</source>
          <year>2013</year>
          , pp.
          <fpage>146</fpage>
          --
          <lpage>162</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Kharchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ponochovny</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boyarchuk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <source>Availability Assessment of Information and Control Systems with Online Software Update and Verification. In: Information and Communication Technologies in Education, Research, and Industrial Applications Communications in Computer and Information Science</source>
          , Vol.
          <volume>469</volume>
          , , pp.
          <fpage>300</fpage>
          -
          <lpage>324</lpage>
          , Springer International Publishing,
          <string-name>
            <surname>Switzerland</surname>
          </string-name>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Moranda</surname>
            ,
            <given-names>P. B.</given-names>
          </string-name>
          :
          <article-title>An error detection model for application during software development</article-title>
          .
          <source>IEEE Trans. Reliability, N. 4</source>
          ,
          <fpage>309</fpage>
          --
          <lpage>312</lpage>
          (
          <year>1981</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Kharchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sklyar</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Volkoviy</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Development and Verification of Dependable Multi-Version Systems on the Basic of IP-Cores</article-title>
          .
          <source>In: Proc. Int. Conf. Dependability of Computer Systems</source>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <article-title>Review Guidelines for Field-Programmable Gate Arrays in Nuclear Power Plant Safety Systems</article-title>
          . NUREG/CR-7006, U.S. Nuclear Regulatory Commission, Washington,
          <string-name>
            <given-names>D.C.</given-names>
            ,
            <surname>USA</surname>
          </string-name>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Bobalo</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Volochiy</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lozynskyi</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mandzii</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ozirkovskyi</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedasuk</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shcherbovskyh</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jakovyna</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Mathematical models and methods for reliability analysis of electronic, electrical and software systems</article-title>
          , Lviv Polytechnic Press, Lviv, Ukraine (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Yakovyna</surname>
            ,
            <given-names>V.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seniv</surname>
            ,
            <given-names>M.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harangda</surname>
            ,
            <given-names>I. J.:</given-names>
          </string-name>
          <article-title>Improved procedure for determining the number of software defects in the early stages of testing</article-title>
          . In:
          <article-title>International scientific conference "Intelligent Decision Support Systems and Computational Intelligence problems" (ISDMCI'</article-title>
          <year>2012</year>
          ), pp.
          <fpage>238</fpage>
          ,
          <string-name>
            <surname>Ukraine</surname>
          </string-name>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Yakovyna</surname>
            ,
            <given-names>V.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedasuk</surname>
            ,
            <given-names>D.V.</given-names>
          </string-name>
          :
          <article-title>Improved procedure forecasting of software failures based on the reliability model with index of complexity</article-title>
          .
          <source>Software Engineering</source>
          ,
          <volume>2</volume>
          ,
          <fpage>5</fpage>
          --
          <lpage>13</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Chabanjuk</surname>
            ,
            <given-names>J.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yakovyna</surname>
            ,
            <given-names>V.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedasuk</surname>
            ,
            <given-names>D.V.</given-names>
          </string-name>
          :
          <article-title>Building and research the software reliability model with index value of the project</article-title>
          .
          <source>Software Engineering</source>
          ,
          <volume>1</volume>
          ,
          <fpage>24</fpage>
          --
          <lpage>29</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Yakovyna</surname>
            ,
            <given-names>V.S.</given-names>
          </string-name>
          :
          <article-title>Modeling of software failure flow parameter and determine the series of complexity index</article-title>
          .
          <source>Proceedings of the National University "Lviv Polytechnic”</source>
          ,
          <volume>806</volume>
          ,
          <fpage>296</fpage>
          --
          <lpage>302</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Yakovyna</surname>
            ,
            <given-names>V.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedasuk</surname>
            ,
            <given-names>D.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seniv</surname>
            ,
            <given-names>M.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chabanjuk</surname>
            ,
            <given-names>J.M.:</given-names>
          </string-name>
          <article-title>The method of estimation and forecasting software reliability based model with a dynamic index value of the project</article-title>
          .
          <source>Computing</source>
          ,
          <volume>2</volume>
          (
          <issue>10</issue>
          ),
          <fpage>97</fpage>
          --
          <lpage>107</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Yakovyna</surname>
            ,
            <given-names>V. S.:</given-names>
          </string-name>
          <article-title>Influence of RBF neural network input layer parameters on software reliability prediction</article-title>
          .
          <source>In: Proc. 4-th International Conference Inductive Modelling (ICIM'</source>
          <year>2013</year>
          ). pp.
          <fpage>344</fpage>
          --
          <lpage>347</lpage>
          ,
          <string-name>
            <surname>Kyiv</surname>
          </string-name>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Yakovyna</surname>
            ,
            <given-names>V. S.:</given-names>
          </string-name>
          <article-title>Software failures prediction using RBF neural network</article-title>
          .
          <source>Proceedings of Odessa Politechic University</source>
          ,
          <volume>2</volume>
          (
          <issue>46</issue>
          ),
          <fpage>111</fpage>
          --
          <lpage>118</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <article-title>Nuclear power plants - Instrumentation and control important to safety - General requirements for systems</article-title>
          .
          <source>ІЕС 61513</source>
          .
          <article-title>(</article-title>
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Volochiy</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mulyak</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ozirkovskyi</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kharchenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Automation of Quantitative Requirements Determination to Software Reliability of Safety Critical NPP I&amp;C systems</article-title>
          .
          <source>In: Proc. 2nd Int. Symp. on Stochastic Models in Reliability Engineering, Life Science and Operations Management (SMRLO'16)</source>
          , Beer Sheva, Israel,
          <source>February 15-18</source>
          , pp.
          <fpage>337</fpage>
          --
          <lpage>346</lpage>
          , IEEE CPS,
          <volume>978</volume>
          -1-
          <fpage>4673</fpage>
          -9941-8/16, DOI 10.1109/SMRLO.
          <year>2016</year>
          .
          <volume>65</volume>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>