=Paper=
{{Paper
|id=Vol-3156/paper42
|storemode=property
|title=Computer System for Evaluation the Reliability of Technological Systems
|pdfUrl=https://ceur-ws.org/Vol-3156/paper42.pdf
|volume=Vol-3156
|authors=Kateryna Yalova,Kseniia Yashyna,Leonid Dranishnikov,Abdel-Badeeh M. Salem
|dblpUrl=https://dblp.org/rec/conf/intelitsis/YalovaYDS22
}}
==Computer System for Evaluation the Reliability of Technological Systems==
Computer System for Evaluation the Reliability of Technological
Systems
Kateryna Yalovaa , Kseniia Yashynaa , Leonid Dranishnikova and Abdel-Badeeh M. Salemb
a
Dniprovsky State Technical University, Dniprobydivska str.2, Kamyanske, 51918, Ukraine
b
Ain Shams University, El-Khalyfa El-Mamoun Street Abbasya, Cairo , Egypt
Abstract
The paper presents the results of developing a computer system for evaluation of reliability of
technological systems, which uses the logical-graphic method Fault Tree Analysis.
Automation of the Fault Tree construction process is aimed at accelerating and improving the
accuracy of graphical representation process of the technological system model to assess the
level of its reliability and identify the components that most affect the risk of accidents. The
paper substantiates the feasibility of using the Fault Tree and describes the algorithm for
qualitative and quantitative analysis of Fault Tree data. The architecture of the developed
computer system is multi-layered, divided into data layer, user interface layer, and business
logic layer. The input for a computer system is a description of a technological system – the
object of study – which is defined by a set of interrelated events with a given intensity of
occurrence, the combination of which can result in a particular major undesirable event.
Based on the entered input data, the Fault Tree is automatically constructed, the probability
polynomial is formed, the probabilities of occurrence of intermediate events and the top event
are calculated, the list of the minimum emergency combinations and trajectories is
developed. The relational database proposes storing data on technological systems, events,
types of connections, and graphic notations to implement information actions of inserting,
deleting, editing, committing, and exporting data. The adequacy of the implemented design
solutions was proved by testing the computer system on the Fault Tree of different
complexity from different domain. The results of its application to analyze the reliability of
the technological design of brown smoke suppression of metallurgical production in the
framework of research work “System analysis and computer modeling of technological
processes and information technologies” are presented.
Keywords 1
System reliability analysis, fault tree analysis, computer system
1. Introduction
It is impossible to achieve absolute safety for systems that use energy. All measures for the safe
operation of technological systems must consider the possibility of dangerous, undesirable situations
and focus on the relevant risk [1]. Analyzing the reliability of technological equipment has recently
become increasingly important. The concept of manufactured risk management emerged when, given
the growing number of potentially dangerous facilities and the associated increase in accidents and
catastrophes, the question arose as to which strategy to choose to ensure the safety of manufacturing
facilities. The tasks of systems reliability evaluation in engineering practice are faced by specialists
who perform design and engineering work, developers of plans for localization and elimination of
IntelITSIS’2022: 3rd International Workshop on Intelligent Information Technologies and Systems of Information Security, March 23–25,
2022, Khmelnytskyi, Ukraine
EMAIL: yalovakateryna@gmail.com (K. Yalova); yashinaksenia85@gmail.com (K. Yashyna); dr-leon@ukr.net (L. Dranyshnykov);
abmsalem@yahoo.com (A.-B. M. Salem)
ORCID: 0000-0002-2687-5863 (K. Yalova); 0000-0002-8817-8609 (K. Yashyna); 0000-0002-9291-4074 (L. Dranyshnykov); 0000-0003-
0268-6539 (A.-B. M. Salem)
©️ 2022 Copyright for this paper by its authors.
Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
CEUR Workshop Proceedings (CEUR-WS.org)
emergencies and accidents, developers of safety declarations for high-risk facilities. Risk should be
understood as the expected frequency or probability of specific hazards class or the amount of
possible damage (loss, damage) from an undesired event or some combination of these values. The
application of the concept of risk, thus, allows to translate the danger into the category of measurable
categories, where risk is a measure of danger and includes the following quantitative indicators:
• probability of occurrence (frequency of occurrence) of the dangerous factor under
consideration;
• the amount of damage from the influence of a dangerous factor;
• uncertainty of losses and probabilities.
The term “risk” is used to analyze the reliability of technological systems, determine the level of
hazards and form a set of actions to reduce the risk of an adverse event [2]. Suppose the concept of
“risk” is applied to the technosphere. In that case, it should describe the probability of an accident
when using the mechanisms or machines of a technological system particular process. The
manufactured risk analysis is used to assess the reliability of technological systems, which aims to
determine the frequency of adverse events and calculate the probabilities of their occurrence.
In general, the main tasks of risk assessment are related to:
1. Identification of hazards.
2. Analysis of the frequency or probability of adverse events.
3. Assessing the consequences of adverse events.
The generalized assessment of the reliability of technological systems should reflect the state of
industrial safety, taking into account the risk indicators of all adverse events that may occur at the
hazardous production facility, and based on the results:
• integration of risk indicators of all adverse events (accident scenarios), taking into account
their mutual influence;
• analysis of uncertainty and accuracy of the obtained results;
• analysis of operating conditions compliance with industrial safety requirements and
acceptable risk criteria.
In modern accidents researching, causation and effect diagrams with a branching structure and
called a “tree” (fault tree, event tree), each of which is a branched, finite and connected graph that
does not have loops or cycles, have become widespread.
To solve the problems of a quantitative evaluation of reliability and safety of complex
technological systems, logical-probabilistic methods, logical-graphic methods [3]: event trees, Fault
Tree Analysis (FTA), topological methods have become the most widespread. The first analysis of the
reliability of complex technological systems, implemented by FTA, was conducted in the ’60s [4].
Today, FTA is effectively used in the aerospace, nuclear energy, chemical and processing industries,
pharmaceuticals, petrochemicals, and other high-risk industries [5-7].
Despite the extensive coverage in the scientific and technical literature, experts make some
methodological and logical errors in practice, which leads to incorrect results of the technological
systems reliability analysis [8]. The urgency of automating the process of technological systems
reliability evaluation is associated with the ever-increasing structural complexity and dimensionality
of modern technical systems and the need to increase the level of reliability and safety of such
systems. Computer systems development and software applications with the function of automatic
construction and calculation of the events occurrence probability allows to increase the speed of
technological system model construction, simplify the Fault Tree (FT) design process, reduce errors
in calculations, get a mechanism for modeling various system states occurrence of adverse events.
Currently, there are a lot of commercial and non-commercial software and platforms that allow
building the FT and performing analysis of the technological systems reliability in automated mode,
such as [9]: OpenFTA, OpenAltaRica platform, ALD Fault Tree Analyzer, DFTCalc, CAFTA, RAM
Commander FTA. In addition to opening and advertising software products, scientists Y. Hiraoka, M.
Takahashi, A. Majdara, T. Wakabayashi [10,11] describe corporate software development to assess
the reliability of specific technological systems. The main disadvantage of commercial software is
paying for the purchased license. Free software has some limitations for building a FT, such as
restrictions on the number of initiating events or logical operators, the inability to save or reuse the
created FT, customization for a specific data domain.
The primary purpose of this work is to present the results of modeling, development, and practical
application of non-profit computer system, which provides the ability to design a FT for quantitative
and qualitative analysis of a wide range of technological systems reliability.
2. Models, methods and technology
System analysis, including the formulation and decomposition of the problem’s solution, is used to
formalize the process of technological system research, the reliability of which must be evaluated.
FTA is used to evaluate the system’s reliability, which is one of the main methods of quantifying
the probabilistic component of risk – the frequency of accidents. When constructing a FT, it is
necessary to define the conditions for the appearance of the top event; decompose complex
prerequisites; identify co-operating factors; exclude feedback between elements specify the reasons
for their occurrence; check the validity of all accepted assumptions and initial data. Using the trace-
back algorithm allows calculating the probability of events occurrence included in the FT, starting
from the bottom level of the tree. The significance of the events leading to the main undesirable event
is assessed using the Fussell-Vesely algorithm.
During the computer system design and implementation, the principles of system analysis,
function-oriented method of data domain analysis, data normalization rules, principles of relational
database design are used. The user interface development was carried out, taking into account the
interface’s usability.
The methods, principles, and algorithms used in the course of the work make it possible to state
that the study results are reasonable and reproducible.
2.1. Features of the Fault Tree construction
FTA is a logical-graphical method, which is to build and analyze a model of reliability (safety),
that is a model of causal relationships of studied system failures with failures of its elements and other
influences, which allows elaborating visually and in detail related elements of infrastructure and
events that affect reliability. The advantages of the FT are [12]:
• analysis focuses on finding failures, which allows showing the existing unreliable places
of the system;
• provides graphics and presents visual material for those professionals who participate in
the maintenance of the system;
• provides an opportunity to perform qualitative or quantitative analysis of system
reliability.
The graphical representation of the model uses a highly branched tree data structure, the elements
of which reflect the structure of the causal relationships of hazardous situations in reverse so that the
root of the tree is the main undesirable event in the technological system probability of which must be
established.
The main advantage of the FTA (compared to other methods) is that the analysis is limited to
finding only those elements of the system and events that lead to a particular system failure or
accident. The main disadvantage of FTA is that the tree has the form of a Boolean algebra diagram,
which shows only two states: working and non-working, which makes it impossible to consider the
state of partial failure of elements.
The generalized FT construction algorithm can be represented as a set of the following steps:
1. Determining the content of analysis, which establishes the system’s boundaries, determines
the data for the analysis of its reliability, sets the top adverse event, the risk of which will be
analyzed. This fact considers that FT can build both for the whole system and its part.
2. Identify the set of initiating events and states that can lead to the top event. Also, many
additional conditions are formed, which in the presence of particular type initiating events can
contribute to the development of accidents in an undesirable direction.
3. Establishing logical relationships between established events.
4. Determining the frequency of adverse events.
5. Graphical representation of the failure tree and calculation of intermediate events and top one
probabilities.
The main reasons for errors when building a FT are:
• errors of system analysis when describing the composition of the technological system and
the set of process events to be analyzed;
• incorrect use of logical symbols;
• incorrect use of statistics on the initiating events probabilities.
The following steps of working with the graphic model data of FT are aimed to conduct a
qualitative and quantitative analysis of system reliability.
2.1.1. Fault tree elements
The FT elements can be divided into three groups: primary failures or initiating, or basic events
(conditions in which the technical system usually operates); secondary failures (deviations from
process regulations); control failures (equipment does not receive control signals for any reason). A
FT includes one top event connected by logical conditions with those intermediate and initial
prerequisites, the occurrence of some of which can lead to a specific incident.
The graphical display of the FT uses standardized graphic notations, which makes it possible to
clearly define events, logical elements, and types of transmission [4,11]. Event symbols allow setting
such events as: “Top Event”, “Intermediate Event”, “Initiating Basic Event”, undeveloped event,
external event. The initiating events do not develop further, and the intermediate events are at the
output of the elements. The logical gates symbols describe the relationship between input and output
events and correspond to classical Boolean logic. Transmission elements are used to connect the
inputs and outputs of the corresponding FT, such as the FT of the subsystem in its system. Table 1
shows the basic graphic notations used to build the FT.
Table 1
Basic graphic notations of the failure tree
Graphic notation Description
The main element of the FT. It describes the main and
intermediate events that can be broken down into components.
Describes initiating events that are at the lowest level of the
hierarchy and have no underlying connections.
AND gate - sets the logical connection “AND”. Used to describe a
situation where an output event occurs if all input events occur
simultaneously.
OR gate - displays the OR connection used to describe the
situation when the output Event occurs if any of the input
events occur.
The most commonly used logical elements are AND and OR, but some trees may also use logical
operators such as XOR or NAND. For any event to be further analyzed, first look at all possible
events that are inputs of operation OR, then that are inputs of operation AND. This scheme is applied
to the basic event and all other events whose analysis makes sense to continue.
2.1.2. Fault tree analysis
FT can be used for qualitative and quantitative analysis of system reliability. At the qualitative
level, it is used to identify possible causes and ways of failure (final event); at the quantitative level –
to calculate the probability of a final event based on data on the probabilities of causal events.
Qualitative analysis requires an understanding of the system and the reasons for the failure and a
technical understanding of how the system may fail. When conducting the analysis, it is advisable to
draw up detailed schemes. It is necessary to set basic events BE={BE1,…BEn} and a set of
intermediate events IE={IE1,…IEn}, each of which occurs when a single initiating event or set of
initiating events. Boolean algebra is used to describe the relationships between intermediate and
initiating events. A complex tree has different sets of initiating events, in which an event is reached at
the top; they are called emergency combinations (sections). The minimal cut set is the minor set of
initiating events in which an event occurs at the top. The complete set of minimum emergency
combinations of a tree represents all variants of combinations of events at which there can be an
accident. The minimum trajectory is the smallest group of events in which an accident occurs.
Qualitative analysis of the tree is carried out using the selected minimum emergency combinations
and trajectories; it compares different routes and initial events to the final and identifies critical (most
dangerous) pathways leading to the accident.
Quantitative analysis of the FT calculates the probability of an accident during a given time on all
possible routes. The calculation of the probabilities of the intermediate and main events, which are
part of the constructed FT, is based on the input statistics of the frequency of occurrence of the
initiating events. The following data are used to determine the frequency of occurrence of initiating
events:
• statistical data on accidents and reliability of the technological system, the specifics of the
hazardous production facility;
• expert assessments by taking into account the opinion of experts in this field;
• analysis of accidents in order to determine the required probability.
The probability of occurrence of events is associated with the intensity of the event by exponential
law [13]:
𝑃 = 1 − exp(−𝑡), (1)
where – the intensity of the failure event in the technological system, t – the operating time of the
technological system, which determines the intensity of the failure event in the technological system.
In the case of𝑡 < 0,1 equation (1) turns into:
𝑃 𝑡. (2)
FT quantitative analysis can be carried out in various ways:
• using structural functions (calculated probability polynomials);
• step-by-step reduction of the FT using trace-back algorithm;
• quantitative assessment of the top event probability using minimal combinations of initial
prerequisites.
Using structural functions. In this case the problem is to simplify the relations according to the
rules of event algebra in order to obtain calculated probability polynomials. The prediction of the
probability of a top event is carried out in the following sequence [3]:
1. The analytical model of the process is decompressed into separate blocks;
2. In selected blocks, those subsets of events that are interconnected by conditions AND, OR
and have known probabilities are distinguished;
3. For the selected units the probability calculation at the event vertices is performed;
4. The structural function is simplified by replacing each subset of the property with one
member having an equivalent probability;
5. The probability of the occurrence of the FT top event is calculated in a similar way.
Using trace-back algorithm. If the probabilities of all initiating events are known, the trace-back
algorithm to calculate the probabilities of intermediate events and the main undesirable event can be
used. The probability of intermediate events depends on the relationship between the events that lead
to them. The trace-back algorithm calculates the probability of events that are part of the generated FT
by levels, starting from the lowest. N failure tree prerequisites combined by logical condition AND
are replaced by one event with equivalent probability of occurrence 𝑃∩ [14]:
𝑁 (3)
𝑃∩ = 𝑃1 ∙ 𝑃2 ∙∙∙ 𝑃𝑛 = ∏ 𝑃𝑖 .
𝑖=1
M of the FT initial prerequisites, connected by a logical gate OR, are also replaced by one event,
and its equivalent probability 𝑃∪ is calculated using a formula that estimates the probability of
realizing at least one initial event:
𝑚
𝑃∪ = 1 − (1 − 𝑃1 )(1 − 𝑃2 ) ∙∙∙ (1 − 𝑃𝑚 ) = 1 − ∏(1 − 𝑃𝑖 ),
𝑖=1 (4)
where Pi – the probability of i-th event occurrence.
Also, the probability of a basic event can be determined based on the minimum cut sets as [5]:
𝑁𝑐 (5)
𝑃(𝑇) = 1 − ∏(1 − 𝑃(𝐶𝑖 )).
𝑖=1
where Ci(i=1,..,Nc) – is the minimum cut set combination at which a top event occurs.
Using minimal combinations of initial prerequisites. This method consists of constructing another
tree equivalent to the analyzed FT and including all minimal combinations of one type [15]. The new
diagram is also a FT and has only one logical condition: AND if only minimum cut set combinations
are used, and OR – when only minimum throughput combinations are used. To calculate the
probability Q of incidents, the following expressions are used:
𝑎 𝑚𝑖 (6)
𝑄 = 1 − ∏ (1 − ∏ 𝑃𝑖𝑗 .) .
𝑖=1 𝑗=1
𝑏 𝑛𝑘
𝑄 = 1 − ∏ [1 − ∏(1 − 𝑃𝑙𝑘 ).]
𝑘=1 𝑙=1
where a ,b – the amount of minimum cut set and minimum throughput combination of the FT, mi, nk,
the number of initial prerequisites in each of its i-th throughput and k-th cut set minimum
combinations of initial events prerequisites.
Importance indicators are used to determine the contribution of each event or their combination to
the occurrence of a system failure. The assessment of the importance of an event is based on the logic
of its association with other FT events. It is advisable to use the Fussell-Vesely algorithm to assess the
importance of the occurrence of a particular event on the occurrence of the main adverse event.
Fussell-Vesely Importance is defined as [16]:
𝑃min 𝑐𝑢𝑡 (Х𝑖 ) (7)
𝐼𝑖𝐹𝑉 =
𝑄
where Pmin cut (Xi) – is the probability of the i-th minimum cut sets leading to the basic event, Q is the
probability of the main undesirable event.
3. Experiment, Results and Discussions
The analysis of software used to build a FT of complex technological systems made it possible to
form functional and non-functional requirements for system software, main of which are:
1. Client-server data processing, with the ability to save data in a database.
2. Implementation of mechanisms for forming a description of the technological process or system
in the form of events set with the probabilities of their occurrence.
3. Implementation of probabilistic modeling software mechanisms with automatic calculation of
events occurrence probabilities in the system and creation of probability function polynomial.
4. Graphical construction of the FT.
5. Qualitative and quantitative analysis realizing on FT data.
3.1. Computing system for automated FTA construction
The computer system is designed as a desktop application in C # as Windows Form Application,
does not require an Internet connection, interacts with the user through a standardized interface. The
primary functional purpose is the automated design of FT to conduct qualitative and quantitative
analysis of the reliability of technological systems.
The system architecture is multi-layered, consisting of a data representation layer, a business logic
layer, and a data layer. The scheme of the architecture of the developed computer system is presented
in the Figure 1.
Figure 1: Architecture of the developed computer system
The data layer of the system was designed based on the approach described in [17], which
implements the division of the data layer into three components: normative, operation, and resulting
information. Normative information of the system is conditionally unchanged data, repeatedly used in
data entry and the resulting samples formation. Operation information entered by the user is the
primary source of data describing changes in the state of the data domain. Obtaining the resulting
information is the purpose of the system; it is formed based on the results of queries to the database.
The data storage in this system is a relational database, which stores descriptions of technological
systems, sets of graphic notations, and types of relationships between events to build a FT, sets of
accidents, and the intensity of their occurrence over time.
The business logic layer is designed as a set of software modules:
1. Module for data and descriptions of the technological system input.
2. Module of the FT graphic model construction.
3. Module for calculating and analyzing the data obtained.
Data processing mechanisms were implemented through stored procedures and representations of
the database level and software application.
The data representation layer is a user interface developed on the base of the Window – Image –
Menu – Pointer (WIMP) graphics standard as a set of screen forms. All graphic forms meet the
requirements of unification and standardization and implement the same algorithms to build a
dialogue between the user and the software application.
3.2. Roles and functions analysis
The developed computer system is user-dependent, i.e., the reliability of input data describing
basic and intermediate events sets, the establishment of the main undesirable event, the choice of the
logical relationships types of between events, the correctness of initiating events intensity or
probability input is the responsibility of system users. The system validates the input data.
During the data domain analysis, two roles of computer system users were identified: the operator
and the administrator. The available functions are determined, and the schemes of interaction and
support of work with the system are formed considering each user’s rights to access information. The
system operator is a user-analyst who has sufficient knowledge of the technological system, the
reliability analysis of which will be carried out. Table 2 lists the main functions and available
operations for the system operator.
Table 2
Functions and available actions of the computer system users
Function Action
Access to the projects Create a new one
stored in the database Open an existing one
Top event, intermediate and initiating events insert
Overview of the technological system model current content
Working with a new Deleting, editing the top event, intermediate and initiating
project events
Transactions committing
Inserting data on the intensity of the initiating events occurrence
Designing a technological Selection of the intermediate i-th event
system model Identification of the events set that cause the i-th event to occur
Establishing of the relation type between the events that lead to
the i-th event
Updating, deleting, committing data on relations between events
Graphic representation of Choice of technological system for FT construction
a FT Getting a graphic display
Image saving and importing
Reliability analysis Obtaining a probability polynomial
Obtaining the values of the intermediate events and the top
event probabilities
Obtaining a list of minimum emergency combinations and
minimum emergency trajectories
Obtaining an array of the significance of the initiating and
intermediate events estimates
A system administrator is a user who has access rights to the information stored in a database. In
addition to the actions described in Table 2, the administrator has the functions of database
management and administration: backup, recovery, data archiving, determination of server connection
characteristics, etc.
The functions and actions of users are distributed between screen forms to simplify the dialogue of
users with the system, the general scheme of transition between which corresponds to the following
logical sequence:
1. Entering data on the technological system, determining the main adverse event.
2. Form a list of initiating events with data entry on the intensity of their occurrence over time
and entering data of intermediate events that may affect the technological system reliability and
contribute to emergencies.
3. Forming relations between events.
4. Request for automatic construction of the FT and obtaining its graphical model.
5. Request for qualitative and quantitative analysis of the generated FT data.
In addition to the mainline of dialogue with the computer system to implement all the actions
described in Table 2, child modal forms are used. The results of confirmed data transactions are
displayed in a single relational database.
3.3. Data storage
Data and system logic are shared between the database, user interface, and business rule
algorithms for implementing information operations with data. According to the proposed system
architecture (Figure 1), the normative and operation data are subject to storage in the data storage,
implemented in a relational database. The normative information of the system includes:
• set of graphic notations;
• list of developed projects;
• description of technological systems and a set of events.
The input information of the system, which has the properties of dynamism and is entered by
operators, is the relationship between events, the intensity of events, the timing of the system, for
which it is necessary to calculate the probabilities. The resulting information is a graphical
representation of the FT, the formed probability polynomial, the set of calculated probabilities of the
base, intermediate and main event, the set of minimum emergency combinations and trajectories. The
resulting information is generated by the system automatically according to the input parameters of
the calculation.
Database modeling was performed based on the data domain object model with the application of
data normalization rules. The specification of the main objects characteristics stored in the database is
presented in Table 3.
Table 3
Basic entities stored in the database
Entity Entity description Properties Links to Relation
external plurality
entities
Tree A dynamic entity describing The entity is characterized by: Event 1:1
event the data of each event name, serial number in the tree, Type 1:1
included in the tree intensity/probability of Graphic
occurrence, graphical notation. notation
Project Static entity describing the Entity, characterized by the Tree 1:N
main characteristics of a name of the technological
given data domain system, a description of the
main characteristics of the
system.
Relation A dynamic entity describing The entity is characterized by: Event 1:N
data about the type of name, graphic notation, Graphic 1:1
relationship between tree calculation algorithm. notation
events
Tree Dynamic entity describing The entity is characterized by Event 1:N
data for system reliability the name, the name of the top
analysis event, the date, time of
creation.
Event Static entity The entity is used to determine Tree 1:1
type the type of event: base, event
intermediate, main
Graphic Static entity The entity is used to store and
notation display the type of the project
object
Inserting data on the “event” entity, the user is given the opportunity to choose which numerical
characteristic will be included in the list of initiating events properties of a particular system: the
intensity of occurrence or probability. If the user enters the intensity, the system automatically
calculates the probabilities of occurrence for the initiating events for (1) – (2). The obtained
probability values are then used to calculate the probabilities of intermediate events and top event
probabilities using (3) – (5).
The default calculating period is a calendar year. The user can change this value. If necessary, the
user can specify n time calculation periods for which the system will give the results of the probability
calculation. Based on the introduced characteristics and calculated probabilities, the system generates
minimal cut sets and calculates their contribution to the occurrence of the top event according to (7).
Accuracy of probability calculations is 10-5.
3.4. Adequacy substantiation
The adequacy of the implemented design solutions was carried out by checking the manually
constructed FTs for different technological systems and the results obtained in the developed system.
The data of technological systems were used as a test set:
1. Conveyor system bulk cargo overload in assessing the main undesirable event, “Destruction
of the conveyor belt”, data on the intensity of the initiating events, and the results of calculating
the probabilities described in the works of A. A. Tverigin.
2. Computer System in estimating the top adverse event “Computer is not functioning” based on
A. Saxena and T. Manglani.
3. Filling system in an automotive production line in assessing the main adverse event “Failure
in the fluid filling system” based on data from H. Soltanali, M. Khojastehpour, J. T. Farinha, J. E.
Pais [5].
Testing the developed software on actual data showed the adequacy of the applied methods,
correctness of calculations, and indicators of system reliability. The result of test checks was the
conclusion that the implemented design solutions are universal and can be used to calculate the
reliability of other technological systems.
4. Practical application
After substantiating the adequacy of the implemented software solutions, the developed computer
system was used to assess the reliability of the brown smoke suppression system during the release of
steel from the blast furnace in the research work “System analysis and computer modeling of
technological processes and information technologies” conducted by the team of the Department of
Software Systems at Dniprovsky State Technical University. Input data on the technological chain,
equipment composition, the intensity of accidents are taken from actual industrial data of
technological process logs.
The top event for the analysis and construction of the FT is the emission of brown smoke during
the release of steel from the blast furnace.
This event is undesirable because, during the interaction of steel with oxygen, iron oxidizes and
partially evaporates, turning into dust, the particles of which rise into the air and form orange (brown)
smoke. Emissions of brown smoke reduce the volume of fused steel by 0.0025-0.0075%, significantly
pollute the environment, and threaten employees.
The technological system is supplemented by various devices controlled through an automated
control system to minimize the formation of brown smoke – the type of automated workplace shown
in Figure 2.
The input parameters for building a FT in a given data domain are technological processes set,
technological events, and technological equipment, presented in a hierarchical dependence of system
states and transitions between them.
The array of input data describing the baseline events was set with the values of the intensity of
occurrence and the period t = 1 year. The set of initiating events BE={BE1,…BE11}, their description
and intensity are given in Table 4.
The set of intermediate events IE={IE1,…IE8}, the occurrence of which contributes to the
development of the emergency situation consists of 8 events described in Table 5.
Figure 2: The main screen of the automated brown smoke suppression system
Table 4
List of initiating events of the brown smoke suppression system
Event Event name Intensity of occurrence, 1/year
number
BE1 Power plant №1 failed 0,00500
BE2 Power plant №2 failed 0,00500
BE3 Lack of nitrogen in the tanks 0,01000
BE4 Engine failure 0,02000
BE5 No engine power 0,03200
BE6 No connection to controller 0,02800
BE7 Network switch failure 0,02800
BE8 The controller power supply burned out 0,03100
BE9 The limit switch has failed 0,03300
BE10 Damage of electrical power wires 0,03700
BE11 Voltage surge 0,02400
Table 5
List of intermediate events of the brown smoke suppression system
Event Event name
number
IE1 There is no electricity
IE2 There is no nitrogen pressure
IE3 The dome of the tap hole does not fall
IE4 The dome of the ladle does not fall
IE5 There is no pressure in the network
IE6 Closed valve
IE7 Pressure sensor failure
IE8 Lack of power to the pressure sensor
After entering the input data, the user is allowed to view the results of the automatic FT design and
analyze the results of automatic calculations. The screen form of the system with the generated tree is
shown in Figure 3. The events B9-B14 on Figure 3 are the same as BE3-BE8 respectively. The events
B15 B16, B17 are the same as BE9, BE10, BE11 respectively.
Figure 3: Screen form with constructed FT
The screen form of the resulting information is divided into three parts:
1. The area of the FT graphical representation.
2. The area of the output descriptions of the events entering into the FT;
3. The area of calculated data presentation.
Standardized graphical elements for events and logical elements are used to increase the visibility
of the displayed FT.
Each event graphic element contains its sequence number in the event list, displayed in an
additional area of the screen form.
The top event has the sequence number 0, the base and intermediate events are marked with the
sequence number of their set. There are no restrictions on the number of basic, intermediate events
and logical elements.
As the size of the FT increases, horizontal and vertical scrolls appear on the screen. The graphic
representation of the tree can be exported as a graphic element.
The data generated by the system allows for qualitative and quantitative analysis of the generated
FT. The result of the qualitative analysis is the formed set of minimal emergency combinations.
For the case under consideration, C={C1,..,C6} and is described as:
𝐶1 = 𝐵𝐸1 ∩ 𝐵𝐸2 , (8)
𝐶2 = 𝐵𝐸3 ,
𝐶3 = 𝐵𝐸10 ∪ 𝐵𝐸11 ,
𝐶4 = 𝐶5 = 𝐵𝐸4 ∪ 𝐵𝐸5 ∪ 𝐵𝐸6 ∪ 𝐵𝐸7 ∪ 𝐵𝐸8 ∪ 𝐵𝐸9 ,
𝐶6 = 𝐵𝐸3 ∪ 𝐵𝐸10 ∪ 𝐵𝐸11 .
The probability РТ of the top event occurrence event can be calculated as follow:
𝑃𝑇 = 1 − [(1 − 𝑃𝐶1 )(1 − 𝑃𝐶2 )(1 − 𝑃𝐶3 )(1 − 𝑃𝐶4 )(1 − 𝑃𝐶5 )(1 − 𝑃𝐶6 )]. (9)
where PС1,..,PС6 is the probability of the i-th minimum emergency combination leading to the top
event. Quantitative analysis of the tree is performed by the system automatically based on (8) - (9).
The results of calculating the probabilities of occurrence of all intermediate events are presented in
Table 6. The probabilities of occurrence of the minimum cut sets, and their weight in the occurrence
of the main event are shown in table 7.
The estimated probability of occurrence of the main event is 0.40757. Obtained data can be used to
identify potential causes of failure, understand co-occurrence events that lead to system failure,
establish a list of measures to reduce the probabilities of a “brown smoke emission” event, and
increase the reliability of the process as a whole.
Table 6
Automatically calculated probabilities of intermediate events
Event Calculated probability of event occurrence
Event name for t=1 year
number
IE1 There is no electricity 0,00002
IE2 There is no nitrogen pressure 0,06854
IE3 The dome of the tap hole does not fall 0,16950
IE4 The dome of the ladle does not fall 0,16950
IE5 There is no pressure in the network 0,00995
IE6 Closed valve 0,05918
IE7 Pressure sensor failure 0,02371
IE8 Lack of power to the pressure sensor 0,03632
Table 7
Automatically calculated probability of cut sets
Event number Probability of occurrence Contribution to the top event
С1 0,00002 0,00006
С2 0,00995 0,02469
С3 0,06004 0,14895
С4 0,16950 0,42053
С5 0,16950 0,42053
С6 0,06999 0,17364
5. Сonclusions
Determining the reliability of technological systems is an important task. It allows identifying
hazardous parts of the technological system and developing measures to minimize adverse events.
One of the ways to quantitatively and qualitatively assess the system’s reliability and the probability
of occurrence of a particular event is FTA, which allows to visually and mathematically describe a
given technological system.
The developed computer system is a unified software tool for creating FTs and risk analysis of
technological systems. It is not adapted to a specific data domain or a specific process, expertly
dependent at the stage of process description and entering of input parameters of the frequency of
occurrence of events included in the FT.
The primary purpose of creating a computer system for FT design is to increase the speed of FT
construction, automatic polynomial construction to calculate the probabilities of the intermediate and
main event, increase the accuracy of calculation, minimize the impact of skills and accuracy of
analysts’ calculations. Otherwise, the calculation is performed automatically under the rules for
constructing a probabilistic polynomial, changing the incoming system parameters to analyze risks
and identify the most vulnerable points in the system. Using trace-back algorithm makes it possible to
calculate the probability of FT events occurrence starting from the lowest level. Application of the
Fussell-Vesely algorithm allows evaluating the contribution of each event to the probability of the
main undesirable event occurrence.
The paper describes main functional requirements for the system, defines the target audience,
functions, and available actions depending on the level of data access rights. The system architecture
is multi-layered, which ensures the logical and functional independence of the layers. The system data
storage is implemented in the form of a relational database that allows storing data on the results of
design and analysis of the FT. Testing of the developed system on real industrial data showed the
adequacy of the applied methods, correctness of calculations and indicators of system reliability. The
practical value of the proposed system is applicability to various data domains, no restrictions on the
size of the studied system, the ability to save and export data.
6. References
[1] D. Gabriska, Evaluation of the level of reliability in hazardous technological process, Applied
Sciences 11 (2021) 1–13. doi: 10.3390/app11010134.
[2] M. Leimeister, A. Kolios, A review of reliability-based methods for rosk analysis and their
application in the offshore wind industry, Renewable and Sustainable Energy Reviews 91
(2018) 1065–1076. doi: 10.1016/j.rser.2018.04.004.
[3] N. A. Wessiani, F. Yoshio, Failure mode effect analysis and fault tree analysis as a combined
methodology in risk management, in: Proceeding of the International Conference on
Industrial and System Engineering, IConISE 2017, IOP Publishing Ltd, Denpasar, Indonesia
2017, pp. 1–11. doi: 10.1088/1757-899X/337/1/012033.
[4] S. Kabir, An overview of fault tree analysis and its application in model based dependability
analysis, Expert systems with application 77 (2018) 114–135 doi:
10.1016/j.eswa.2017.01.058.
[5] H. Soltanali, M. Khojastehpour, J. T. Farinha, J. E. Pais, An integrated fuzzy fault tree model
with Bayesian network-based maintenance optimization of complex equipment in automotive
manufacturing, Energies 14 (2021) 1–22 doi: 10.3390/en14227758.
[6] J. Ignac-Nowicka, T. Krenicky, Fault tree analysis as a tool to increase the level of security in
an enterprise, MAPE 1 (2018) 719–725. doi: 10.2478/mape-2018-0091.
[7] N. R. Nurwulan, W. A. Veronica, Implementaion of failure mode and effect analysis and fault
tree analysis in paper mill: a case study, Jurnal Rekayasa Sistem Industri 9 (2020) 171–176
doi: 10.26593/jrsi.v9i3.4059.171-176
[8] G.-J. Jiang, Z.-Y. Li, G. Qiao, H.-X. Chen. H.-B. Li, H.-H. Sun, Reliability analysis of
dynamic fault tree based on binary decision diagrams for explosive vehicle, Mathematical
Problems in Engineering 2021 1–13. doi: 10.1155/2021/5559475.
[9] A. Baklouti, N. Nguyen, J. Choley, F. Mhenni, A. Mlika, Free and open source fault tree
analysis tools survey, in: Proceeding of the Annual IEEE International Systems Conference,
SysCon 2017, IEEE, Monreal, Canada 2017, pp. 1–8, doi: 10.1109/SYSCON.2017.7934794.
[10] Y. Hiraoka, T. Murakami, K. Yamamoto, Y. Furukawa, Method of computer-aided fault
tree analysis for high-reliable and safety design, Transactions on Reliability 65 (2016) 1–17.
doi: 10.1109/TR.2015.2513050.
[11] M. Takahashi, Y. Anang, Y. Watanabe, A proposal of fault tree analysis for embedded
control software, Information 11(9) (2020) 1–22. doi: 10.3390/info11090402.
[12] G. M. Chodur, X. Zhao, E. Biehl, J. Mitrani-Reiser, R. Neff, Assessing food system
vulnerabilities: a fault tree modelling approach, Public Health 18:817 (2018) 1–18. doi:
10.1186/s12889-018-5563-x.
[13] N. A. Zahrin, S. A. Sobri, M. Mohamed, M. F. Mohamed, W. O. Ismail, M. R. Taharin, M.
H. Hairi, R. Junid, N. A. Shuaib, Implementation of fault tree analysis (FTA) in
manufacruting process: a case study from a wood-based product company, Journal of critical
reviews 7 (2020) 3086–3096.
[14] F. Zhang, S. Tan, L. Zhang, Y. Wang, Y. Gao, Fault tree interval analysis of complex
systems based on universal grey operation, Complexity (2019) 1–8. doi:
10.1155/2019/1046054.
[15] F. Oshiro, Using quantitative fault tree analysis based on methods of cut sets to predict
failure, 2021. URL: https://reliabilityweb.com/articles/entry/using-quantitative-fault-tree-
analysis-based-on-method-of-cut-sets-to-predi
[16] А. Saxena, T. Manglani, Enhahcing computer system reliability using fault tree analysis,
International Journal of Recent Research and Review 6 (2013) 12–17.
[17] K. Yalova, K. Yashyna, The 11th IEEE International Conference on Intelligent Data
Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS
2021, IEEE, Cracow, Poland 2021, pp. 774–778.