CN103150481A - Computer-based realization method of cut set non-intersection in fault tree analysis - Google Patents

Computer-based realization method of cut set non-intersection in fault tree analysis Download PDF

Info

Publication number
CN103150481A
CN103150481A CN 201310102253 CN201310102253A CN103150481A CN 103150481 A CN103150481 A CN 103150481A CN 201310102253 CN201310102253 CN 201310102253 CN 201310102253 A CN201310102253 A CN 201310102253A CN 103150481 A CN103150481 A CN 103150481A
Authority
CN
China
Prior art keywords
minimal cut
cut set
event
friendship
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201310102253
Other languages
Chinese (zh)
Inventor
安凯
王晓英
安培亮
安宏亮
Original Assignee
安凯
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 安凯 filed Critical 安凯
Priority to CN 201310102253 priority Critical patent/CN103150481A/en
Publication of CN103150481A publication Critical patent/CN103150481A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a computer-based realization method for acquiring the minimal cut sets of a top event through the Boole function of a fault tree and carrying out non-intersection treatment on the minimal cut sets. The basic method of the non-intersection treatment comprises the steps of: dividing one event into the sum of subevents and complementary events thereof, and carrying out a plurality of such operation on intersecting events until non-intersection events are obtained through division. The computer-based realization method is realized by mapping the minimal cut sets into one set of n-dimensional vectors and defining an operation, corresponding to the intersection operation among the minimal cut sets, in the set. The computer-based realization method has the following characteristics that (1) as long as the minimal cut sets are coded, the coded minimal cut sets can be input into a computer and then subjected to the non-intersection treatment automatically by the computer, so that the automation degree is high, and no manual intervention is needed; and (2) the minimal cut set with the fewest bottom events is preferentially selected as the non-intersection minimal cut set, so that the number of the minimal cut sets is reduced after non-intersection treatment, and the top event failure probability is simpler to calculate.

Description

Not friendship and computer implemented method of cut set in fault tree analysis
Technical field
The present invention relates in a kind of fault tree analysis the not computer implemented method of friendship of cut set
Background technology
Fault tree analysis is assessment and a kind of standard method that improves reliability and security, is used widely in the fields such as aerospace, nuclear energy, electronics, electric power, chemical industry, railway, transportation and insurance.Early stage Fussell-Vesely algorithm and Semanderes algorithm can adopt boolean to absorb the minimal cut set that strategy obtains top event, and this is being feasible and effective aspect fault tree qualitative analysis.Yet, carry out quantitative test to fault tree, must be at first to the not friendship processing of minimal cut set of top event.Yet, to minimal cut set not the appearance of friendship processing to scold theorem be " NP " difficult problem, its main cause is that the identical bottom event in different cut sets may cause operand acutely to increase in the friendship union of top event, i.e. so-called " shot array " problem.Although early stage not friendship fault tree synthesis function can reduce operand to a certain extent, adopt the long-pending sum theorem of not friendship type to realize that it is loaded down with trivial details and time-consuming that cut set is not shipped the process of calculation.
In international reliability in 1996 and maintainability annual meeting, Joanne B.Dugan and Stacy A.Doyle and Roslyn M.Sinnamon and John D.Andrews have provided respectively the thinking of utilizing BDD to carry out fault tree analysis, for " shot array " problem that solves in fault tree analysis provides new outlet.Due to expression on its room and time with process the high efficiency of Boolean function, BDD is widely used in the aspect such as the logic function checking in large-scale Design of Digital System, comprehensive and model detection and day by day comes into one's own.Many scholars have carried out the research based on the fault tree analysis of BDD, and some achievements have been obtained, but the fault tree analysis based on BDD still exists many deficiencies and open question, at first be that bottom event index order is larger on the impact of BDD scale, also do not have at present a kind of method can solve sequencing problem, the fault tree module also needs manual analysis; Next be achievement method versatility poor,, operand is large, can not be fully by computer realization.
Method
Summary of the invention
The present invention aims to provide a kind of Boole function by fault tree and obtains the top event minimal cut set, and to the minimal cut set computer implemented method of friendship processing not.
The present invention has following features:
(1) obtain the minimal cut set of top event by the Boole function after; As long as these minimal cut sets are encoded, the input computing machine can be realized the not friendship processing of minimal cut set automatically by computing machine, and automaticity is high, does not need manual intervention;
(2) preferentially select the minimum minimal cut set of bottom event as not handing over minimal cut set, reduced the not friendship processing number of minimal cut set afterwards, make the calculating of top event failure probability simpler.
Description of drawings
Fig. 1 does not hand over the block diagram of changing handling procedure.
Embodiment
1. not friendship disposal route and convergence thereof
Suppose A 1, A 2..., A nBe n bottom event, the Boole function of fault tree can be expressed as
F=B 1UB 2U…UB N
Wherein
Figure BSA00000870327800021
Be minimal cut set, N is the minimal cut set number,
Figure BSA00000870327800022
Can be
Figure BSA00000870327800023
Or
Figure BSA00000870327800024
(
Figure BSA00000870327800025
Opposite event), n 1, n 2... n N∈ 1,2 ..., n}, F are top events. and replace the union of " ∪ " presentation of events with "+" when event is non-intersect.
For reducing operand and being convenient to fault analysis, minimal cut set should not make the quantity of cut set the least possible after the friendship processing, and in other words, the bottom event that consists of each cut set should be the least possible.Make n m=min{n 1, n 2... n N, wherein, m ∈ 1,2 ..., N} is got by the formula in theory of probability
F = B m + B m &prime; &cap; &cup; k < N , k &NotEqual; m B k = B m + &cup; k < N , k &NotEqual; m ( B k &cap; B m &prime; ) - - - ( 1 )
B after the equation right-hand member in one k∩ B m' be the common factor of some bottom events or its opposite event, if some bottom events event opposite to it occurs simultaneously, B k∩ B m'=φ (empty set), otherwise B k∩ B m' remain minimal cut set.After removing empty set
Figure BSA00000870327800027
Remain the union of minimal cut set, be designated as v 2, and note U 1=B m,
F=U 1+V 2
U wherein 1, V 2Mutually disjoint, V 2The union of minimal cut set. said process has been completed once not friendship processing, U 1Not hand over to change the event that processing obtains, V 2It is the event that not yet realizes not handing over change.
After the processing of above-mentioned not friendship, if V 1=φ, or V 1Only be comprised of a minimal cut set, the friendship process does not finish; If V 1The middle minimal cut set that comprises is more than 1, and repeating above-mentioned not friendship processing procedure can obtain
F=U 1+U 2+V 3
Usually, if r V after the friendship processing not rThe minimal cut set that comprises is still more than 1,
F=U 1+U 2+…U r+V r+1
V wherein rThe union of minimal cut set, and U 1, U 2..., U r, V r+1Mutually disjoint.
Due to cut set be all shape as
Figure BSA00000870327800031
The union of some events, so U 1, U 2..., U rIn all comprise at least a shape as
Figure BSA00000870327800032
Event, and shape as
Figure BSA00000870327800033
The number maximum 2 of event nIndividual.Each time not after the friendship processing, the cut set that mutually disjoints and concentrate increase at least a shape as
Figure BSA00000870327800034
Event, therefore when enough F must be expressed as the mutually disjointing union of cut set greatly time of friendship number of processes not.
2. the computer realization of friendship processing not
Formula in equation (1) in applied probability
Figure BSA00000870327800035
F = B m + &cup; k < N , k &NotEqual; m ( B k &cap; B m &prime; )
= B m + &cup; k < N , k &NotEqual; m ( &cap; j = 1 n k A - k j &cap; ( &cap; t = 1 n m A - m t ) &prime; )
= B m + &cup; k < N , k &NotEqual; m ( &cap; j = 1 n k A - k j &cap; ( &cap; t = 1 n m A - m t ) &prime; )
= B m + &cup; k < N , k &NotEqual; m &cup; t = 1 n m ( A - m t &prime; &cap; j = 1 n k A - k j ) - - - ( 2 )
Therefore the fundamental operation of friendship processing is not exactly the calculation of shipping of bottom event or its opposite event and minimal cut set.For the common factor in after equation (2) right-hand member one If have
Figure BSA000008703278000311
Make
Figure BSA000008703278000312
Can divide two kinds of situations this moment, namely A &OverBar; m t &prime; = A &OverBar; k j ^ Perhaps A &OverBar; m t &prime; = A &OverBar; k j ^ &prime; . The previous case A &OverBar; i t &prime; &cap; j = 1 n k A &OverBar; i j = &cap; j = 1 n k A &OverBar; i j , Latter event A &OverBar; i t &prime; &cap; j = 1 n k A &OverBar; i j = &phi; . If
Figure BSA000008703278000317
Consist of
Figure BSA000008703278000318
Bottom event number ratio Many 1, namely bottom event or its opposite event are not all the factor event in minimal cut set, and the result of shipping calculation is the common factor of bottom event and minimal cut set.
Realize the calculation of shipping with above-mentioned characteristic of bottom event or its opposite event and minimal cut set for computer, define an event
Figure BSA000008703278000320
Mapping to the n-dimensional vector space
Figure BSA000008703278000321
As follows:
Figure BSA000008703278000322
Wherein
Figure BSA00000870327800041
j=1,2,…,n
Figure BSA00000870327800042
It is set
Figure BSA00000870327800043
To set P={ (x 1, x 2..., x n), x i=1 ,-1,0, i=1,2 ..., the mapping one by one of n}, and
Figure BSA00000870327800044
Figure BSA00000870327800045
Figure BSA00000870327800046
To arbitrarily
Figure BSA00000870327800047
(x 1, x 2, x n) ∈ P, defining a kind of computing, might as well be designated as
Figure BSA00000870327800048
, make:
If x i=0,
Figure BSA00000870327800049
If x i≠ 0, x i=± 1 o'clock
Figure BSA000008703278000410
If x i≠ 0,
Figure BSA000008703278000411
The time
Figure BSA000008703278000412
Like this, the calculation of shipping of bottom event or its opposite event and minimal cut set just can be by mapping
Figure BSA000008703278000413
With they be converted in P shape as
Figure BSA000008703278000414
Vector and P in another vector
Figure BSA000008703278000415
Computing.
Figure BSA000008703278000416
Computing can also be generalized to (y arbitrarily 1, y 2..., y n), (x 1, x 2..., x n) ∈ P, i.e. definition
Figure BSA000008703278000417
As seen two vectors in P
Figure BSA000008703278000418
Operation result is a subset of vector in P.
4. friendship handling procedure not
The friendship handling procedure is not as follows:
1) obtain the Boole function of top event according to fault tree, obtain thus all minimal cut sets, and change into corresponding n-dimensional vector collection, be designated as V 0, put i=0;
2)
Figure BSA00000870327800051
At V iSeek the n-dimensional vector that nonzero component is minimum, be designated as U i
3) storage U i, calculate
Figure BSA00000870327800052
4) if V i+1Middle vectorial number returns to 2 greater than 1);
5) if V i+1In a vector is arranged, U i+1=V i+1Storage;
6) stop.
The block diagram of friendship handling procedure is not seen Fig. 1.

Claims (3)

1. not friendship and computer implemented method of cut set in a fault tree analysis, is characterized in that: supposition A 1, A 2..., A nBe n the bottom event of top event F, the Boole function of fault tree can be expressed as F=B 1UB 2U ... UB N, wherein N is the minimal cut set number,
Figure FSA00000870327700011
Minimal cut set, n 1, n 2... n N∈ 1,2 ..., n},
Figure FSA00000870327700012
Can be Or
Figure FSA00000870327700014
(
Figure FSA00000870327700015
Opposite event), method comprises two steps, i.e. not friendship and computer realization; In the friendship process for reducing operand and being convenient to fault analysis, the bottom event of making every effort to consist of each cut set is the least possible, therefore makes n m=min{n 1, n 2... n N, wherein, m ∈ 1,2 ..., N}, and F is divided into
Figure FSA00000870327700016
Realize the not event of friendship; Repeat above-mentioned not friendship processing procedure r time, until V r+1The minimal cut set number that comprises is not more than 1,
F=U 1+U 2+…U r+V r+1
If V r+1≠ φ makes U r+1=V r+1, U 1, U 2..., U r, U r+1, otherwise U 1, U 2..., U rDo not hand over minimal cut set for one group that is F.
2. not friendship and computer implemented method of cut set in fault tree analysis according to claim 1, its computer implemented method is: definition set
Figure FSA00000870327700017
To set P={ (x 1, x 2..., x n), x i=1 ,-1,0, i=1,2 ..., the mapping of n}
Figure FSA00000870327700018
As follows:
Figure FSA00000870327700019
Wherein
Figure FSA000008703277000110
J=1,2 ..., n, and to any
Figure FSA000008703277000111
(x 1, x 2..., x n) ∈ P, the definition computing
Figure FSA000008703277000112
As follows:
If x i=0,
Figure FSA000008703277000113
If x i≠ 0, x i=± 1 o'clock
If x i≠ 0,
Figure FSA000008703277000115
The time
Figure FSA000008703277000116
To any Definition
3. not friendship and computer implemented method of cut set in fault tree analysis according to claim 1, its computer implemented program is:
1) obtain the Boole function of top event according to fault tree, obtain thus all minimal cut sets, and change into corresponding n-dimensional vector collection, be designated as V 0, put i=0;
2)
Figure FSA00000870327700023
At V iSeek the n-dimensional vector that nonzero component is minimum, be designated as U i
3) storage U i, calculate
4) if V i+1Middle vectorial number returns to 2 greater than 1);
5) if V i+1In a vector is arranged, U i+1=V i+1Storage;
6) stop.
CN 201310102253 2013-03-14 2013-03-14 Computer-based realization method of cut set non-intersection in fault tree analysis Pending CN103150481A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201310102253 CN103150481A (en) 2013-03-14 2013-03-14 Computer-based realization method of cut set non-intersection in fault tree analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201310102253 CN103150481A (en) 2013-03-14 2013-03-14 Computer-based realization method of cut set non-intersection in fault tree analysis

Publications (1)

Publication Number Publication Date
CN103150481A true CN103150481A (en) 2013-06-12

Family

ID=48548555

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201310102253 Pending CN103150481A (en) 2013-03-14 2013-03-14 Computer-based realization method of cut set non-intersection in fault tree analysis

Country Status (1)

Country Link
CN (1) CN103150481A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105652805A (en) * 2014-11-14 2016-06-08 中国科学院沈阳计算技术研究所有限公司 Simplified-FTA-method-based numerical control device hardware safety protection method and apparatus
CN107025172A (en) * 2017-03-22 2017-08-08 厦门大学 A kind of method for testing software based on probabilistic risk assessment
CN107609325A (en) * 2017-10-18 2018-01-19 中国航空无线电电子研究所 The method that fault tree based on SAT solves minimal cut set
US11347919B2 (en) * 2018-12-18 2022-05-31 Siemens Industry Software Nv Computer-implemented method for generating a mixed-layer fault tree of a multi-component system combining different layers of abstraction

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105652805A (en) * 2014-11-14 2016-06-08 中国科学院沈阳计算技术研究所有限公司 Simplified-FTA-method-based numerical control device hardware safety protection method and apparatus
CN107025172A (en) * 2017-03-22 2017-08-08 厦门大学 A kind of method for testing software based on probabilistic risk assessment
CN107025172B (en) * 2017-03-22 2018-01-05 厦门大学 A kind of method for testing software based on probabilistic risk assessment
CN107609325A (en) * 2017-10-18 2018-01-19 中国航空无线电电子研究所 The method that fault tree based on SAT solves minimal cut set
US11347919B2 (en) * 2018-12-18 2022-05-31 Siemens Industry Software Nv Computer-implemented method for generating a mixed-layer fault tree of a multi-component system combining different layers of abstraction

Similar Documents

Publication Publication Date Title
Gray et al. All complete intersection Calabi-Yau four-folds
Burkard et al. Assignment problems: revised reprint
Taylor et al. Conic AC transmission system planning
Hosseinian et al. A new linear programming method for weights generation and group decision making in the analytic hierarchy process
CN103150481A (en) Computer-based realization method of cut set non-intersection in fault tree analysis
Ben Abdallah et al. Anomalous diffusion limit for kinetic equations with degenerate collision frequency
CN105046574A (en) Black-start scheme evaluation method
CN105480737B (en) Three-dimensional vanning scheme generation method based on three step Dynamic Programmings
Chattopadhyay et al. Extracting Jacobi Structures in Reeb Spaces.
Shi et al. Graph based power flow calculation for energy management system
CN102799960A (en) Parallel operation flow anomaly detection method oriented to data model
Holweck et al. Singularity of type D4 arising from four-qubit systems
Li et al. ChatTwin: toward automated digital twin generation for data center via large language models
Holweck et al. Three-qutrit entanglement and simple singularities
Campoamor-Stursberg et al. Symmetry preserving discretization of ordinary differential equations. Large symmetry groups and higher order equations
WO2010095418A1 (en) Design workflow construction device, design workflow construction method, design system, design method, design workflow construction program, and computer readable recording medium on which design workflow construction program is recorded
Lin et al. Hunting for dynamical supersymmetry breaking in theories that S-confine
Goubault et al. Future path-components in directed topology
Huang et al. Decision-making method of reconfigurable manufacturing system's reconfiguration timing based on catastrophe theory
Zhang et al. Product manufacturing process similarity measure based on attributed graph matching
Coley et al. Basis for scalar curvature invariants in three dimensions
Fleites et al. Large-Scale Correlation-Based Semantic Classification Using MapReduce.
Eisenstat Equivalence of Krylov subspace methods for skew-symmetric linear systems
Lombard Honey from the hives: A theoretical and computational exploration of combinatorial hives
Moroianu Higher transgressions of the Pfaffian

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130612