Next Article in Journal
How Does Irrigation Affect Crop Growth? A Mathematical Modeling Approach
Next Article in Special Issue
Mathematical Modeling the Time-Delay Interactions between Tumor Viruses and the Immune System with the Effects of Chemotherapy and Autoimmune Diseases
Previous Article in Journal
The Extended Cone b-Metric-like Spaces over Banach Algebra and Some Applications
Previous Article in Special Issue
Robust Multivariate Shewhart Control Chart Based on the Stahel-Donoho Robust Estimator and Mahalanobis Distance for Multivariate Outlier Detection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Methodology for the Assessment of Imprecise Multi-State System Availability

1
CNRS, Laboratoire Heudiasyc (Heuristics and Diagnosis of Complex Systems), Université de Technologie de Compiègne, CS 60 319, 60203 Compiègne, France
2
12 Rue Marie Curie-CS 42060 10010, Université de Technologie de Troyes, UR InSyTE, 10300 Troyes, France
3
Luxembourg Institute of Socio-Economic Research (LISER), 11 Porte des Sciences, L-4366 Esch-sur-Alzette, Luxembourg
4
Faculty of Engineering, Lebanese University, Beirut 14-6573, Lebanon
*
Author to whom correspondence should be addressed.
Mathematics 2022, 10(1), 150; https://doi.org/10.3390/math10010150
Submission received: 1 November 2021 / Revised: 19 December 2021 / Accepted: 29 December 2021 / Published: 4 January 2022
(This article belongs to the Special Issue Probability and Statistics in Quality and Reliability Engineering)

Abstract

:
Most existing studies of a system’s availability in the presence of epistemic uncertainties assume that the system is binary. In this paper, a new methodology for the estimation of the availability of multi-state systems is developed, taking into consideration epistemic uncertainties. This paper formulates a combined approach, based on continuous Markov chains and interval contraction methods, to address the problem of computing the availability of multi-state systems with imprecise failure and repair rates. The interval constraint propagation method, which we refer to as the forward–backward propagation (FBP) contraction method, allows us to contract the probability intervals, keeping all the values that may be consistent with the set of constraints. This methodology is guaranteed, and several numerical examples of systems with complex architectures are studied.

1. Introduction

In traditional binary-state systems studies, we suppose that system components can only have two states: total functioning or complete failure. However, in many industrial systems, this assumption may not be sufficient. Some systems can have more than two states of levels of performance, ranging from total functioning to total failure. In other words, some systems can have many intermediate states between the two extremum cases. These systems are considered multi-state systems (MSS). The first work related to the theory of MSS was that of Barlow and Wu [1] and El-Neveihi et al. [2]. A complete introduction of MSS reliability theory and their applications are represented in the first book related to the reliability analysis of MSSs [3]. An interesting recent review of the literature was proposed in [4,5]. The main known methods for MSS reliability are the Monte Carlo simulation method [6,7], the Markov approach [8,9], the structure function method [10,11], and the universal generating function (UGF) method [12,13,14].
In the structure function method, the classical Boolean models are extended to multi-valued models. It was the first technique introduced in MSS reliability assessment. However, this method and the Markov method generate all the possible states of the system. The Monte Carlo simulations method can reduce the number of simulations, but it leads to an approximative result dependent on the chosen number of simulations. Consequently, these methods are extremely time consuming when considering large MSSs due to the important number of the system states.
On the other hand, the conventional MSS reliability assessment considers two major assumptions [15]:
  • The probabilities related to the states of MSS components should be characterized by probability distributions or measures.
  • The performance levels of MSS components should be precisely determined.
However, when studying MSS reliabilities, many types of uncertainties concerning the state probabilities and the performance levels of components [16] have to be modeled. The most known categorization is to divide the uncertainty into two types: epistemic and aleatory uncertainties. The latter (also called irreducible uncertainty) arises from the intrinsic variability of a phenomenon across space, through time, or within a population. The former (also called reducible uncertainty) arises from the incompleteness of data/knowledge [17,18,19]. Note that the distinction between these two types of uncertainty is useful when considering computing the reliability of systems [20]. If the data are sufficient, the classical probabilistic approach is the more adequate theory to be used in reliability and risk assessments [20,21,22].
In this paper, we study the problem of representing epistemic uncertainty in the evaluation of multi-state systems/components availabilities, in contrast with works that have considered systems with multi-state performance and only components with binary states [23,24]). To our knowledge, there are only a few works considering the representation of epistemic uncertainty in the evaluation of multi-state systems/components availabilities:
  • In [25], Huang et al. used p-boxes and intervals to represent unknown probabilities of component states when considering UGF functions. In [26], the authors proposed a combined approach based on the universal generating function (UGF) and the Dempster–Shafer evidence theory when considering the epistemic uncertainty, transmission loss, and performance storage simultaneously in the availability/reliability assessment of multi-state phased mission systems. Another study considering the same methodology (the combined UGF and Dempster–Shafer theories) was proposed in [27] when considering common cause failures, and was compared to the interval UGF methods in [28]. In [29], the traditional UGF approach for multi-state system (MSS) availability and reliability assessment was extended by using fuzzy random variables and by considering simultaneously the probabilistic convolution and the fuzzy extension principle. However, the UGF method used in these works can only be applied to series/parallel and parallel/series configurations. This differs from our paper in which the proposed approach can be applied to all configurations.
  • Li et al. [30] proposed an approach based on the use of interval arithmetics with interval-valued probability masses as a model of unknown probability distributions [31], which are different from belief functions. This approach also uses the UGF method.
  • Some works [32,33,34] represented unknown probabilities by fuzzy sets, and propagated uncertainties using the extension principle of Zadeh and fuzzy arithmetics (see, for example, [35]). More specifically, the propagation of uncertainties is based on the use of the extension principle of Zadeh to perform algebraic operations on fuzzy numbers. The extension principle provides a general method for extending crisp mathematical concepts to address fuzzy quantities, such as real algebraic operations on fuzzy numbers, which are a generalization of real numbers in the sense that they do not refer to single values, but rather to a connected set of possible values, where each possible value has its own weight between 0 and 1. In these works, the used fuzzy sets were defined over probabilities and not over component states. They correspond to some categories of hierarchical models [36], i.e., uncertainties were defined over uncertainty models. These approaches are in contrast to our approach defined in the current paper, where the uncertainty representation is characterized by interval values of failure and repair rates [37].
  • In [38], the authors studied the reliability analysis of complex MSS with epistemic uncertainty and common cause failures using the Bayesian network (BN) and Dempster–Shafer (DS) theory. The idea here is to add to the Bayesian system network an uncertain state (a virtual state) in order to express the epistemic uncertainty.
To our knowledge, the combination of a Markovian approach with interval contraction methods has not been investigated. Note that a preliminary work concerning our approach was briefly presented in our short conference papers [39,40]. Apart from the novelty of our proposed work, we can note many reasons to justify why such an extension is appealing:
  • The theory of imprecise probabilities is completely based on the classical probability theory and thus, it can be considered its generalization. Consequently, conventional MSS models can be considered a special case of the proposed imprecise models.
  • Interval contraction methods are guaranteed. For example, when using interval contractions, the result of an interval computation is an interval, which guarantees that the exact value is in the obtained interval.
  • The MSS availability results can have a large imprecision (the length of availability intervals). This fact reflects the incompleteness of initial failure/repair data and can help the decision maker to collect more data if it is possible.
Interval analysis was first developed to quantify the error in numerical computations [41]. It is considered a very rigorous theoretical framework for dealing with uncertainties. In order to efficiently characterize the domain of the variables involved in an equation, interval methods use operators called contractors and separators. The interval operators are used to remove some parts of a box that do not satisfy the equation’s constraints. The result of an interval computation is an interval, also known as a pair of numbers or an upper and a lower bound. This pair of numbers guarantees that the exact value is contained in the interval between the two numbers. In our case, we consider that uncertain transition rates are bounded by intervals, λ = [ λ ̲ , λ ¯ ] and μ = [ μ ̲ , μ ¯ ] .
To model the complex structure of the MSS, we propose using a Markovian model and calculating its asymptotic availability by first solving the following system of equations:
Π . Q = 0
where Π = [ π 1 ] [ π n ] is the state’s probability vector of the system, and its elements are [ π i ] , the probability interval of the system to be in the ith state. Q is the interval transition matrix. The availability is then equal to the sum of the probabilities related to the functioning states.
In this paper, we propose a new method that can calculate the imprecise availability in a simple way. We propose dealing with imprecise data as intervals and applying interval analysis on imprecise Markovian approaches, making it possible for us to calculate the imprecise availability of a system. To calculate the interval form of the availability, we use “the technique of contractors” as defined in [42]. In particular, we use the contractor of the forward–backward propagation (FBP) in order to contract the intervals of steady probabilities and to efficiently assess the imprecise availability of the studied system.
The paper is organized as follows: In Section 1, we detail the imprecise Markovian model in terms of dependability. In Section 2, we present the original study, which deals with the use of the imprecise Markovian model in terms of dependability, and we show the negative aspects of the method. In Section 3, we briefly describe the interval contraction methods. In Section 4, we present our contribution for the purpose of estimating the imprecise availability of an MSS. This method takes all the constraints into account with the aim of computing the availability of a complex MSS. To understand all the steps of the methodology, numerical examples are presented and compared to other results obtained by different existing methods (IUGF [30], BUGF [43], and exact method). We conclude the paper with a discussion and a summary statement.

2. Imprecise Markovian Models in Dependability Studies

2.1. Basics of Imprecise Markovian Models

In Markovian models, the transition rates (for example failure/repair rates) can be usually influenced by many factors. Thus, the evaluation of the transition rates can be difficult due to several reasons: the use of new components, the lack of data, etc. We are convinced that, in this case, we should incorporate these imprecisions into the model instead of ignoring them. The development of some models integrating imprecise probabilities makes it possible. In [44], the authors introduced the use of imprecise probabilities theory in continuous time Markov chain. According to the procedure used in [44], a discretization of imprecise continuous-time Markov chains used lower and upper transition operators [45] based on some expectation operators.
Thus, in our proposition, we consider that the transition rates are given in the form of intervals. Moreover, the imprecision may exist in the transition matrix or/and the initial state probabilities. Formally, the considered imprecise model is written as follows:
P ( X 0 = i 0 ) = [ p i ̲ , p i ¯ ] P ( X n = j = i n | X n 1 = i = i n 1 , , X 0 = i 0 ) = P ( X n = j | X n 1 = i )
where x = 1 , , N , i and j are two elements of x, and X 0 , X n 1 , and X n are random variables that belong to x and satisfy Equation (2).
We are interested in finding the probability that a system is in a working state at infinity (asymptotic availability). Under the assumptions in Equation (2), the stationarity of the system is thus determined in the form of a vector of intervals [ Π ] = [ π 0 ] [ π i ] [ π n ] with i 1 , , n , where [ π i ] is the probability interval of being in a state e i . When considering precise data (i.e., precise transition matrix), we compute the asymptotic availability by solving Equation (1). However, when considering imprecise data, the bounds of the asymptotic availability intervals cannot be computed by simply considering the bounds of the transition matrix [44]. This important remark is discussed in detail in the next subsection. More specifically, some methods were proposed to solve this problem. The “exact method” consists of finding all the possible transition matrices of a system. Then, one has to solve Equation (1) and find a vector of stationary probabilities in order to obtain the vector of intervals that contains all of the possible vectors, and then we simply take the minimum and maximum of this vector. Obviously, this method leads to an accurate result, but its complexity, which can be very important, depends on the system’s size since it takes into account all the possibilities for the different transition matrices. The belief universal generated function (BUGF) [43] and the interval universal generated function (IUGF) [30] proposed two original techniques combining the classical UGF method and intervals. They are, therefore, used in the case of interval-modeled imprecision. These two methods are efficient and give good results. The BUGF is considered to be more efficient than the IUGF, but their use is limited to cases where the system does not have a complex structure (e.g., series-parallel and parallel-series configurations) because the UGF method can be only used for series-parallel and parallel-series configurations.

2.2. Troffaes Method

To the best of our knowledge, only one study has been done on dependability for the availability computing of an MSS based on imprecise Markov models. We now focus on this study and show that part of it is wrong. This paper, published by Troffaes et al. [44], used imprecise continuous-time Markovian models to assess the reliability of power networks. In this study, the authors assumed that the failure and repair rates are bounded by intervals. However, this is not the case for the transition matrix [ Q ] . Instead, they compute two matrices, Q ̲ , the lower bound of [ Q ] , and Q ¯ , the upper bound of [ Q ] . The transition rates [ q i j ] depend on the intervals of the failure and repair rates. Q ̲ is obtained by finding its elements q i j ̲ , where q i j ̲ are the lower values of [ q i j ] . Q ¯ is obtained by finding its elements q i j ¯ , where q i j ¯ are the higher values of [ q i j ] . By obtaining two matrices, the problem is turned into two precise cases of Markovian models. By solving Π . Q = 0 , the two vectors of [ Π ] are found, as is the probability vector of the system, to be in two specific states: the lower bound Π ̲ and the upper bound Π ¯ . In this way, the interval of the availability of the system is found, and it is formed from two bounds: the lower bound is the sum over all the elements of Π ̲ corresponding to working states, and the upper bound is the sum over all the elements of Π ¯ corresponding to working states.
To more clearly illustrate this methodology, let us analyze the example proposed by the authors. Let us consider a network system composed of two power lines, A and B. The states related to the functioning of this system are represented by the set E = A B , A , B , . The labels of these states represent the non-faulty components (i.e., both A and B are non-faulty in AB, whereas both are faulty in ). The common cause failures are modeled by considering the following three events:
  • CAB: common cause failure of both A and B.
  • BI: independent failure of B.
  • AI: independent failure of A.
To simplify, any interval [ x ] is written as x. Moreover, q 1 A represents the rate of AI, q 1 B represents the rate of BI, and q 2 represents the rate of CAB. Similarly, let r B be the repair rate of B and r A be the repair rate of A. For the sake of simplicity, the authors excluded all simultaneous repairs. The transition rate matrix is then
[ Q ] = q 1 A q 1 B q 2 q 1 B q 1 A q 2 r B q 1 A q 2 r B 0 q 1 A + q 2 r A 0 q 1 B q 2 r A q 1 B + q 2 0 r A r B r A r B
The Markov chain is represented in Figure 1. The interval numerical values of the data [46] are
q 1 A = [ 0.32 , 0.37 ] q 1 B = [ 0.32 , 0 , 37 ] q 2 = [ 0.19 , 0 , 24 ] r A = [ 730 , 1460 ] r B = [ 730 , 1460 ]
expressed per year.
The transition matrix Q is the interval Q = Q ̲ , Q ¯ . The lower and upper bounds are defined by
Q ̲ = q 1 A ¯ q 1 B ¯ q 2 ¯ q 1 B ̲ q 1 A ̲ q 2 ̲ r B ̲ q 1 A ¯ q 2 ¯ r B ¯ 0 q 1 A ̲ + q 2 ̲ r A ̲ 0 q 1 B ¯ q 2 ¯ r A ¯ q 1 B ̲ + q 2 ̲ 0 r A ̲ r B ̲ r A ¯ r B ¯
Q ¯ = q 1 A ̲ q 1 B ̲ q 2 ̲ q 1 B ¯ q 1 A ¯ q 2 ¯ r B ¯ q 1 A ̲ q 2 ̲ r B ̲ 0 q 1 A ¯ + q 2 ¯ r A ¯ 0 q 1 B ̲ q 2 ̲ r A ̲ q 1 B ¯ + q 2 ¯ 0 r A ¯ r B ¯ r A ̲ r B ̲
By replacing each term by its value, we obtain
Q ̲ = 0.98 0.32 0.32 0.19 730 1460.61 0 0.51 730 0 1460.61 0.51 0 730 730 2920
Q ¯ = 0.83 0.37 0.37 0.24 1460 730.51 0 0.61 1460 0 730.51 0.61 0 1460 1460 1460
The authors evaluated the lower and upper stationary distributions using the above two transition matrices and solving Π ̲ . Q ̲ = 0 and Π ¯ . Q ¯ = 0 , without taking into account the fact that the sum of the steady probabilities is equal to 1 ( π i = 1 ). For the stationary distribution, the authors found
Π ̲ 1 = 9.985 × 10 1 2.623 × 10 4 2.623 × 10 4 6.513 × 10 5
Π ¯ 1 = 9.994 × 10 1 7.252 × 10 4 7.252 × 10 4 1.647 × 10 4
such that [ Π ̲ 1 , Π ¯ 1 ] is the interval of Π obtained using the method presented in the paper. The interval vector [ Π ] is found by regrouping the two bounds ( Π ̲ and Π ¯ ) together. The authors were able to find the availability of the system from the interval vector [ Π ] . In this example, by calculating the sum over π 1 , π 2 and π 3 , we find that the availability is [ A 1 ] = [ 0.9990246 , 1.00085 ] .
However, the authors made a mistake in this study. The lower transition matrix Q ̲ , where all its elements are the lower bounds of q i j , is surely not the matrix that gives the lower stationary vector Π ̲ . The same remark applies to the upper transition matrix Q ¯ , where all its elements are the upper bounds of q i j , which is surely not the matrix that gives the upper stationary vector Π ¯ . In other words, there are some combinations of the transition rate intervals that can lead to lower or higher matrices that are different from the ones chosen by the authors to find the solutions (vector of probabilities) and that are outside of the range of values proposed by the authors.
In fact, by applying the exact method, we can demonstrate that their assumption is not always correct. The main idea of the exact method is to obtain all possible combinations of the lower and upper bounds of q i j for each combination for which we have a transition matrix. With the transition matrix, we find the vector Π and then the availability of the system. We compare all the values of the availability so that we can choose the matrix Q l that belongs to [ Q ̲ , Q ¯ ] , and that gives the lower bound of [ Π ] , which corresponds to the lowest vector among all the Π s and the lower bound of [ A ] . Q l is given as follows:
Q l = 0.83 0.32 0.32 0.19 730 1460.61 0 0.51 730 0 1460.61 0.51 0 730 730 2920
such that [ Π ̲ 2 , Π ¯ 2 ] is the interval of Π obtained by the exact method, with
Π ̲ 2 = 9.981 × 10 1 5.674 × 10 4 5.674 × 10 4 6.978 × 10 4
Another matrix Q u , which also belongs to [ Q ̲ , Q ¯ ] , gives the upper bound of [ Π ] , which corresponds to the highest vector among all the Π s and the upper bound of [ A ] . Q u is given as follows:
Q u = 0.83 0.32 0.32 0.19 1460 1460.61 0 0.51 1460 0 730.51 0.51 0 730 730 2920
with
Π ¯ 2 = 9.994 × 10 1 1.894 × 10 4 3.787 × 10 4 5.91 × 10 5
By calculating the sum over the probabilities of the working states (in this example, the sum of [ π 1 ] , [ π 2 ] , and [ π 3 ] ), the availability is [ A 2 ] = [ 0.999302 , 1.00005 ] .
Table 1 shows the availability obtained by the method proposed in the article and the availability obtained by the exact method. To show the efficiency of the exact method, we keep the obtained interval as is. However, we should perform the intersection of the obtained interval with [ 0 , 1 ] since the probability must belong to this interval, or we can also normalize the probabilities of being in each state. Note that in this example, and in the rest of the manuscript, the results are obtained after rounding off calculations.
Q l [ Q ̲ , Q ¯ ] gives the lower stationary vector Π ̲ , which gives the lower bound of the system’s availability interval. Thus, Q u [ Q ̲ , Q ¯ ] gives the upper bound Π ¯ , which gives the upper bound of the system’s availability interval. Therefore, it is not as claimed in the article by Troffaes that the lower and upper bounds of [ Π ] are obtained using Q ̲ , all of whose elements are the lower bounds of the intervals, and Q ¯ , all of whose elements are the upper bounds of the intervals. Note that in the article, the authors do not consider the condition that the sum of the probabilities is equal to 1. Later, in Section 2.3, we test our proposed method against the exact method to solve the problem by considering the lower and the upper bounds of q i j .

2.3. Exact Method

In this subsection, we propose a method that we call the exact method since it is the most reliable method for providing a narrow interval of the system availability, and because it contains the real exact value of the availability, which is otherwise impossible to find. We need to take all the possible lower bound or upper bound values of the elements [ q i j ] of the transition matrix (combinations of the bounds of [ λ ] , the failure rates intervals, and [ μ ] , the repair rate intervals of the system components based on their position in the matrix), which means all the possible combinations k. For each combination k, we find the corresponding transition matrix Q k , and we turn the problem into the precise case in order to solve Equation (1) and to find the corresponding stationary vector Π k . Using the vector Π k , we can calculate the corresponding availability A k of the system for the combination k. The number of possible combinations is 2 l , where l is the number of [ q i j ] elements of the transition matrix [ Q ] , and k 1 , , 2 l . The bounds of the system availability are obtained by taking the maximal and minimal availabilities A k of all the combinations.
Example: Consider a series system formed by two components, A and B. Each of these components has two possible states: perfect functioning and total failure. Each component has the following failure and repair rates per hour:
λ A = [ 2 × 10 3 , 4 × 10 3 ] μ A = [ 1.8 × 10 2 , 3.5 × 10 2 ] λ B = [ 3 × 10 3 , 4.5 × 10 3 ] μ B = [ 1.5 × 10 2 , 3 × 10 2 ]
The system only works if both of the components work. The system has four possible states:
  • State 1: Components A and B work.
  • State 2: Component A works and B fails.
  • State 3: Component B works and A fails.
  • State 4: Components A and B fail.
Since the system is a series system, which means that the system works as long as all the components work, we can regroup the system’s states into two groups: working state (state 1) and failure state (states 2, 3, and 4).
The transition matrix elements q i j can take either the lower or the upper bound of the interval [ q i j ] (the combination of the failure and the repair rates of A and B). For example, the first combination k = 1 is when all the q i j take the lower bounds of their intervals as values. The second combination k = 2 is when q 11 takes the upper bound of its intervals as values and the rest take the lower bounds as values, and so on. In this case, we have l = 16 and 2 l = 2 16 possible precise transition matrices Q k , where k 1 , , 2 16 is in the following form:
Q k = ( λ A + λ B ) λ A λ B 0 μ A ( μ A + λ B ) 0 λ B μ B 0 ( λ A + μ B ) λ A 0 μ B μ A ( μ A + μ B )
For each Q k , we solve Π k · Q k = 0 to find the vector Π k and the availability A k . When comparing all the k availabilities, we reform the interval of the availability of the system, where the lower bound has the smallest value from all the A k s and the upper bound has the highest value from all of the A k s.
In this example, the availability of the system is
A = [ 0.5207 , 0.9427 ] .
where the corresponding Q l is the transition matrix that gives A ̲ , and Q u is the transition matrix that gives A ¯ ( Q l and Q u are not the lower and upper transition matrices of Q).
Q l = 0.005 0.002 0.003 1 0.018 0.038 0 1 0.015 0 0.032 1 0 0.015 0.018 1 .
Q u = 0.005 0.004 0.0045 1 0.035 0.038 0 1 0.03 0 0.032 1 0 0.015 0.018 1 .
In conclusion, the exact method is time consuming and computation of the availability at each time is not straightforward.

3. Interval Constraint Propagation

The propagation of interval constraints is done by combining interval arithmetic computation [41] and constraint propagation [42]. The constraints are then used in order to eliminate all the inconsistent values defined in the variables domains.

3.1. Definitions, Notations, and Basic Operations

A real interval [ x ] is defined as a connected and closed subset of R . It is expressed as follows:
x = [ x ̲ , x ¯ ] = x R | x ̲ x x ¯ ,
where x ̲ and x ¯ represents the minimal and maximal bounds of [ x ] , respectively.
A box is a vector [x] in R n . It can be expressed as the Cartesian product of n intervals:
[ x ] = [ x 1 ] × . . . × [ x n ] .
The classical set operation (intersection and union) can be used in interval arithmetics. The interval union of the intervals [ x ] , [ y ] R is expressed as
[ x ] [ y ] = [ [ x ] [ y ] ]
where ∪ refers to the set union operation. The symbol [ . ] denotes that for any set S in R , the interval null operator will return the smallest interval enclosing S. The classical binary operations + , , × , ÷ are also extended to intervals. The resulting interval [ z ] = [ x ] [ y ] is expressed by
[ z ] = [ x ] [ y ] = [ x y | x [ x ] , y [ y ] ] .
The detailed extensions of arithmetic operations are given by
[ x ] + [ y ] = [ x ̲ + y ̲ , x ¯ + y ¯ ] ,
[ x ] [ y ] = [ x ̲ y ¯ , x ¯ y ̲ ] ,
[ x ] × [ y ] = [ m i n ( x ̲ y ̲ , x ̲ y ¯ , x ¯ y ̲ , x ¯ y ¯ ) , m a x ( x ̲ y ̲ , x ̲ y ¯ , x ¯ y ̲ , x ¯ y ¯ ) ] ,
[ x ] ÷ [ y ] = [ x ] × [ 1 / y ¯ , 1 / y ̲ ] , 0 [ y ]

3.2. Contractors

The technique of contractors was first introduced in some applications of artificial intelligence in the 1970s and was considered as a constraints satisfaction [42]. The constraints satisfaction is the process of finding a solution to a set of constraints that impose conditions that the variables must satisfy. Then, the technique of contractors becomes an important parts of the interval analysis field [42]. This technique helps to contract a big interval [ x ] into a smaller one [ x ] .
Let us consider n x variables: x i R where i 1 , . . , n x . These variables are linked by n f constraints, which have the following form:
f j ( x 1 , . . , x n x ) = 0 , j 1 , . . , n f .
The variables x i belong to a domain X i (these domains are represented by intervals denoted by [ x i ] ). A vector x is defined as follows:
x = ( x 1 , . . , x n x ) T
The prior domain of x is represented by the box:
[ x ] = [ x 1 ] × . . × [ x n x ]
Let us consider a function f whose coordinates are f j s. The first equation has the form f ( x ) = 0 . This form represents a constraint satisfaction problem (CSP) H [42] that is expressed as follows:
H : ( f ( x ) = 0 , x [ x ] )
The solution set of H is defined as
S = x [ x ] | f ( x ) = 0
The contraction of H consists in replacing [x] by a smaller domain [x’] such that the solution set remains unchanged, i.e., S [ x ] [ x ] . It was proven that there exists an optimal contraction of H that replaces [x] by the smallest box containing S . A contractor of H is any operator used for the contraction of H.

3.3. Forward–Backward Propagation

Many contractors were proposed in the literature. Each contractor can be efficient for one specific CSPs and has its own algorithm of functioning. The most popular contractor is the forward–backward propagation (FBP) contractor. We chose this contractor because it is known for its ease and simplicity, and many researchers consider that it is more general than other contractors since it works for all types of systems. It also leads to guaranteed results (i.e., when performing the contractions, we always obtain an interval that belongs to the initial interval). Compared to other techniques, the FBP offers great accuracy. For all these reasons, we chose to use the FBP technique to help us to contract the intervals with the aim of finding the availability when t tends to inf, as given in Equation (1) for the case of imprecise data.
The forward–backward contractor C contracts the CSP domains H by considering each constraint of the constraints n f separately. It is based on two steps: forward and backward steps. In the forward step, interval arithmetic operations are applied to all the operators of the function y = f ( x ) (from the variable’s domain ([x]) up to the function’s domain ([y])). In other words, it is applied to the direct forms of equations. In the backward step, it sets the interval associated with the new function’s domain [y] to [ 0 , 0 ] . Then, it applies backward arithmetic from the function’s domain to the variable’s domain. In other words, it uses the inverse of the functions that appear in the equations f(x).
The following example explains the procedure of the FBP technique:
Let us consider the constraint y = 5 x 1 + 2 x 2 = 0 and the initial box-domain x = 1 , 4 × 3 , 7 .
This constraint can be decomposed, as shown in Equation (29), into three primitive constraints (i.e., constraints involving a single operator, such as ( + , , , / ), or a single function) by introducing two intermediate variables, z 1 and z 2 , defined as z 1 = 5 · x 1 and z 2 = 2 · x 2 , respectively. The initial domains for these variables are determined as follows:
[ z 1 ] : = 5 [ x 1 ] = 5 × [ 1 , 4 ] = [ 20 , 5 ] [ z 2 ] : = 2 [ x 2 ] = 2 × [ 3 , 7 ] = [ 6 , 14 ] [ y ] : = [ z 1 ] + [ z 2 ] = [ 20 , 5 ] + [ 6 , 14 ] = [ 26 , 9 ]
We aim to contract H while respecting the constraint f ( x ) = 5 x 1 + 2 x 2 = 0 . Thus, we contract the primitive constraints presented in Equation (29) until the contractions become inefficient (i.e., when the solution converges).
In this case, the domain for y is equal to 0 because f ( x ) = 0 . Then, we add the following step:
[ y ] : = [ y ] 0
If [ y ] is empty, we can say that the CSP does not have any solutions. Otherwise, [ y ] is replaced by the value 0. Then, we apply the backward propagation from the function’s domain ( z 1 and z 2 ) to the variable’s domain ( x 1 and x 2 ). Formally, all the domains associated to the variables should be updated as follows:
[ z 1 ] : = ( [ y ] [ z 2 ] ) [ z 1 ] = ( [ 0 , 0 ] [ 6 , 14 ] ) [ 20 , 5 ] [ z 1 ] = [ 14 , 5 ] [ z 2 ] : = ( [ y ] [ z 1 ] ) [ a 2 ] = ( [ 0 , 0 ] [ 20 , 5 ] ) [ 6 , 14 ] [ z 2 ] = [ 5 , 14 ] [ x 2 ] : = ( [ z 1 ] / 5 ) [ x 1 ] = ( [ 14 , 5 ] / 5 ) [ 1 , 4 ] [ x 1 ] = [ 1 , 14 / 5 ] [ x 2 ] : = ( [ z 2 ] / 2 ) [ x 2 ] = ( [ 5 , 14 ] / 2 ) [ 3 , 7 ] [ x 2 ] = [ 5 / 2 , 7 ] .
The obtained box after the first contraction is:
[ x ] ( 1 ) = [ 1 , 14 / 15 ] × [ 5 / 2 , 7 ]
We then repeat the obvious procedure until the boxes [ x ] ( k ) converge to the smallest possible domain. Table 2 shows the corresponding steps of the FBP contractor applied to this example.

4. The Proposed Methodology

Our main purpose is to calculate the availability of an MSS when t tends to . The uncertainties of the data (failure and repair rates) must be taken into account. The first method, presented in Section 2, cannot be used since the authors found the lower bound of the stationary vector by taking the lower bound of the transition matrix and the upper bound of the stationary vector by taking the upper bound of the same matrix. By detailing the calculation, we show that another matrix may exist that gives the upper and the lower bounds of [ Π ] .
The exact method is the most efficient method for finding the imprecise availability of an MSS. However, when the system becomes much larger, the number of transitions becomes enormous. In this case, we have a combinatorial explosion of the calculation. To avoid this, we need a guaranteed method that helps us to efficiently calculate the imprecise availability of the MSS in order to guarantee that our solution includes the true value of the availability. Our search is aimed at simple calculation procedures with a minimal time cost.
We choose to model the uncertainties of the data in terms of intervals, and we use imprecise Markov models and introduce the contracting technique (cf. Section 3.3) to compute the imprecise availability of an MSS.
In this section, we give the detailed steps of our methodology. To better demonstrate this methodology, we present the different steps through simple examples.

4.1. The Steps of the Methodology

In order to compute the MSS availability, we should follow and apply the steps presented in Figure 2, summarized below:
1.
Step 1: Define the Markov graph to present the states and all transitions between the different system states.
2.
Step 2: Construct the interval transition matrix of the system.
3.
Step 3: Apply the contracting technique to the system of equations Π · Q = 0 .
4.
Step 4: Find Π and the availability of the system.
Before we start with the steps of the method, we need to list all the information about the system we are considering. What type of system do we have and what is its structure? How many components does it have and how many states does each component have? To answer these questions, we determine the system/components states, and we define the corresponding interval failure rates λ and the interval repair rates μ of each component. We then determine the type of connection between one component’s state and the other states. In this way, we can easily define the possible states of the system and understand the types of connections between them.
We should mention that when the components are independent, we can take each component separately and apply the steps of the methodology to compute its availability before computing the availability of the entire system. The interval obtained in this way is more conservative than the availability interval obtained when applying the methodology to the entire system. The following example illustrates the different steps.
Imagine a parallel system of two components, A and B. A parallel system works when at least one of the two components works. For each component, we have two possible states (binary components): state 1 (perfect functioning) and state 2 (total failure). Thus, the whole system has four possible states, where the first three states represent the functioning state of the parallel system and the last state is the failure state. The components have the following failure and repair rates per hour:
λ A = [ 3 × 10 3 , 4 × 10 3 ] ; μ A = [ 2.8 × 10 2 , 3.5 × 10 2 ] λ B = [ 3.5 × 10 3 , 4.5 × 10 3 ] ; μ B = [ 2 × 10 2 , 3 × 10 2 ]

4.1.1. Step 1

Given the system structure and the states of each component, we can easily find the states of the whole system. In the above example, we have two binary components. Thus, the system has four states: total functioning (state 1) and degraded states (states 2 and 3), which are all considered functioning states in the parallel system, and the last state, total failure (state 4). Figure 3 shows the Markov graph of this system.

4.1.2. Step 2

Once we have the Markov graph, either for the system or for each component, we move on to the second step. As in the precise case, we can determine the transition matrix from the Markov graph, the only difference being that we are dealing with uncertainties in terms of intervals. We define the interval transition matrix [ Q ] , where each term of the matrix q i j = [ q i j ̲ , q i j ¯ ] is an interval of failure rates λ i = [ λ i ̲ , λ i ¯ ] and an interval of repair rates μ i = [ μ i ̲ , μ i ¯ ] of dimension ( n × n ) .
We should mention that each term of the transition matrix represents the transition rate from one state to another. The transition matrix of our example is
[ Q ] = [ Q ̲ , Q ¯ ] = [ q 11 ̲ , q 11 ¯ ] [ q 12 ̲ , q 12 ¯ ] [ q 13 ̲ , q 13 ¯ ] [ q 14 ̲ , q 14 ¯ ] · · · · · · · · q 41 ̲ , q 41 ¯ [ q 42 ̲ , q 42 ¯ ] [ q 43 ̲ , q 43 ¯ ] [ q 44 ̲ , q 44 ¯ ]
In our example, [ Q ] is expressed as
[ ( λ A ¯ + λ B ¯ ) , ( λ A ̲ + λ B ̲ ) ] [ λ A ̲ , λ A ¯ ] [ λ B ̲ , λ B ¯ ] 0 [ μ A ̲ , μ A ¯ ] [ ( μ A ¯ + λ B ¯ ) , ( μ A ̲ + λ B ̲ ) ] 0 [ λ B ̲ , λ B ¯ ] [ μ B ̲ , μ B ¯ ] 0 [ ( λ A ¯ + μ B ¯ ) , ( λ A ̲ + μ B ̲ ) ] [ λ A ̲ , λ A ¯ ] 0 [ μ B ̲ , μ B ¯ ] [ μ A ̲ , μ A ¯ ] [ ( μ A ¯ + μ B ¯ ) , ( μ A ̲ + μ B ̲ ) ]
By replacing the values of failure and repair rates, we obtain
[ 8.5 × 10 3 , 6.5 × 10 3 ] [ 3 × 10 3 , 4 × 10 3 ] [ 3.5 × 10 3 , 4.5 × 10 3 ] 0 [ 2.8 × 10 2 , 3.5 × 10 2 ] [ 3.95 × 10 2 , 3.15 × 10 2 ] 0 [ 3.5 × 10 3 , 4.5 × 10 3 ] [ 2 × 10 2 , 3 × 10 2 ] 0 [ 3.4 × 10 2 , 2.3 × 10 2 ] [ 3 × 10 3 , 4 × 10 3 ] 0 [ 2 × 10 2 , 3 × 10 2 ] [ 2.8 × 10 2 , 3.5 × 10 2 ] [ 6.5 × 10 2 , 4.8 × 10 2 ]

4.1.3. Step 3

After we have our transition matrix [ Q ] , we move on to the next step. To determine the availability of the system, we must have the probabilities of being in each state of the system. Since we want to find the availability when the time t tends to , we need to find the steady probabilities of being in each state of the system:
[ Π ] = [ Π ̲ , Π ¯ ] = [ [ π 1 ̲ , π 1 ¯ ] [ π n ̲ , π n ¯ ] ] .
To do this, and since this vector is unknown to us, we assume an initial vector [ Π ] expressed as
[ Π ] = [ [ 0 , 1 ] [ 0 , 1 ] [ 0 , 1 ] ]
where [ Π ] presents all the initial intervals of steady probability of the system to be in each state. To compute the intervals of this vector, we use the contracting technique, which is why we apply Equation (1). We then obtain a system of n equations. The last equation is related to the following constraint:
i = 1 n π i = 1 ,
which means that the sum of all probabilities is equal to 1. By performing the operations of the FBP contractor, we are able to contract our steady probabilities into smaller intervals that contain the unknown but real exact values.
In the previous example, our system of equations is as follows:
[ q 11 ] [ π 1 ] + [ q 21 ] [ π 2 ] + [ q 31 ] [ π 3 ] = 0 ( 1 ) [ q 12 ] [ π 1 ] + [ q 22 ] [ π 2 ] + [ q 41 ] [ π 4 ] = 0 ( 2 ) [ q 13 ] [ π 1 ] + [ q 33 ] [ π 3 ] + [ q 43 ] [ π 4 ] = 0 ( 3 ) [ q 24 ] [ π 2 ] + [ q 34 ] [ π 3 ] + [ q 44 ] [ π 4 ] = 0 ( 4 ) [ π 1 ] + [ π 2 ] + [ π 3 ] + [ π 4 ] = 1 ( 5 )
We apply FBP on the intervals [ π i ] = π i ̲ , π i ¯ to reduce each [ π i ] as much as possible, which means reducing the elements of the vector Π .
We start with the first contraction. Each constraint (equation) in Equation (36) has the following form:
f i ( π 1 , , π n k ) = 0
where f i is broken down into a sequence of elementary operations (i.e., operations with only elementary operators), such as ( + , , , / ). We break down this constraint into constraints [47] involving only single operators. For example, the first constraint in Equation (36) can be decomposed into the following primitive constraints:
[ a 1 ] = [ q 11 ] [ π 1 ] = [ 8.5 × 10 3 , 6.5 × 10 3 ] [ 0 , 1 ] = [ 8.5 × 10 3 , 0 ] , [ a 2 ] = [ q 21 ] [ π 2 ] = [ 2.8 × 10 2 , 3.5 × 10 2 ] [ 0 , 1 ] = [ 0 , 3.5 × 10 2 ] , [ a 3 ] = [ q 31 ] [ π 3 ] = [ 2 × 10 2 , 3 × 10 2 ] [ 0 , 1 ] = [ 0 , 3 × 10 2 ] , [ y ] = [ a 1 ] + [ a 2 ] + [ a 3 ] = [ 8.5 × 10 3 , 6.5 × 10 2 ]
After we obtain the new interval [y], we find the intersection with 0 because the main constraint is y = 0 :
[ y ] 0 = [ 8.5 × 10 3 , 6.5 × 10 2 ] [ 0 , 0 ] = [ 0 , 0 ] .
With this final value of [y], we perform the backward propagation by re-evaluating the three intervals [ a 1 ] , [ a 2 ] , and [ a 3 ] such that, in the end, we can reconstruct the required intervals [ π 1 ] , [ π 2 ] , and [ π 3 ] , as shown in Equation (39):
[ a 1 ] = ( [ y ] [ a 2 ] [ a 3 ] ) [ a 1 ] [ a 2 ] = ( [ y ] [ a 1 ] [ a 3 ] ) [ a 2 ] [ a 3 ] = ( [ y ] [ a 1 ] [ a 2 ] ) [ a 3 ] [ π 1 ] = ( [ a 1 ] / q 11 ) [ π 1 ] [ π 2 ] = ( [ a 2 ] / q 21 ) [ π 2 ] [ π 3 ] = ( [ a 3 ] / q 31 ) [ π 3 ]
The intervals obtained are
[ a 1 ] = [ 6.5 × 10 2 , 0 ] [ 8.5 × 10 3 , 0 ] = [ 8.5 × 10 3 , 0 ] [ a 2 ] = [ 3 × 10 2 , 8.5 × 10 3 ] [ 0 , 3.5 × 10 2 ] = [ 0 , 8.5 × 10 3 ] [ a 3 ] = [ 3.5 × 10 2 , 8.5 × 10 3 ] [ 0 , 3 × 10 2 ] = [ 0 , 8.5 × 10 3 ] [ π 1 ] = [ 0 , 1.30769 ] [ 0 , 1 ] = [ 0 , 1 ] [ π 2 ] = [ 0 , 0.3035714 ] [ 0 , 1 ] = [ 0 , 0.3035714 ] [ π 3 ] = [ 0 , 0.425 ] [ 0 , 1 ] = [ 0 , 0.425 ]
After applying constraint number 1, we obtain the vector Π in the following form:
[ Π 1 ] = [ 0 , 1 ] [ 0 , 0.3035714 ] [ 0 , 0.425 ] [ 0 , 1 ]
We continue the technique of contraction with constraint number 2. By following the same steps, we have the primitive constraints
[ b 1 ] = [ q 12 ] [ π 1 ] = [ 3 × 10 3 , 4 × 10 3 ] [ 0 , 1 ] = [ 0 , 4 × 10 3 ] , [ b 2 ] = [ q 22 ] [ π 2 ] = [ 3.95 × 10 2 , 3.15 × 10 2 ] [ 0 , 0.3035714 ] = [ 1.199107 × 10 2 , 0 ] , [ b 4 ] = [ q 42 ] [ π 4 ] = [ 2 × 10 2 , 3 × 10 2 ] [ 0 , 1 ] = [ 0 , 3 × 10 2 ] , [ y ] = [ b 1 ] + [ b 2 ] + [ b 4 ] = [ 1.199107 × 10 2 , 7 × 10 2 ]
The intersection of [y] with [ 0 , 0 ] yields [ 0 , 0 ] . We now repeat the same operations backwards to re-evaluate [ b 1 ] , [ b 2 ] , and [ b 4 ] , and the newest version of [ π 1 ] , [ π 2 ] , and [ π 4 ] . We find
[ b 1 ] = ( [ y ] [ b 2 ] [ b 4 ] ) [ b 1 ] [ b 2 ] = ( [ y ] [ b 1 ] [ b 4 ] ) [ b 2 ] [ b 4 ] = ( [ y ] [ b 1 ] [ b 2 ] ) [ b 4 ] [ π 1 ] = ( [ b 1 ] / q 12 ) [ π 1 ] [ π 2 ] = ( [ b 2 ] / q 22 ) [ π 2 ] [ π 4 ] = ( [ b 4 ] / q 42 ) [ π 4 ]
where
[ b 1 ] = [ 3 × 10 2 , 1.199107 × 10 2 ] [ 0 , 4 × 10 3 ] = [ 0 , 4 × 10 3 ] [ b 2 = [ 3.4 × 10 2 , 0 ] [ 1.199107 × 10 2 , 0 ] = [ 1.199107 × 10 2 , 0 ] [ b 4 ] = [ 4 × 10 3 , 1.199107 × 10 2 ] [ 0 , 3 × 10 2 ] = [ 0 , 1.199107 × 10 2 ] [ π 1 ] = [ 0 , 1.33333 ] [ 0 , 1 ] = [ 0 , 1 ] [ π 2 ] = [ 0 , 0.3807 ] [ 0 , 0.3035714 ] = [ 0 , 0.3035714 ] [ π 4 ] = [ 0 , 0.05996 ] [ 0 , 1 ] = [ 0 , 0.05996 ]
The newest vector of probabilities is, therefore,
[ Π 2 ] = [ 0 , 1 ] [ 0 , 0.3035714 ] [ 0 , 0.425 ] [ 0 , 0.05996 ]
We then take the third, fourth, and fifth (or final) constraints, applying the same steps as before. Table 3 represents the probability vector Π that is obtained after using the five constraints and applying the contracting technique only one time. We continue repeating the contractions on all the equations until π , the elements of the vector Π , converge. This allows us to obtain the final version of the interval vector Π . Table 4 presents the vector Π after k contractions.
Figure 4 shows how the probability interval for each state changes with each contraction.

4.1.4. Step 4

The system availability A s is given by:
A s = i , over the working states [ π i ]
In the last example, we had a parallel system of two components. π 1 , π 2 , and π 3 are the probabilities that correspond to the working states. π 4 is the probability that corresponds to the failure state of the system.
On the basis of the last version of [ Π ] obtained after ten contractions (when each [ π i ] converges to a certain interval), we compute the availability of the system:
[ π 1 ] + [ π 2 ] + [ π 3 ] = [ 0.7529529 , 1.21107924 ] A s = [ 0.7529529 , 1 ]
Note that we can find the availability of the system when its components are independent by taking each component separately and applying the same steps mentioned in this section. By performing the steps for each component, we find the corresponding [ Π j ] of the component j, which allows us to compute the availability of each component [ A j ] separately. After determining the availability of all the components, we determine the relationship between all the [ A j ] , and we are able to calculate the imprecise availability of the system [ A s ] . In this example, we have a parallel system, which means that the relationship between the availability of the components is
A s = 1 ( 1 A 1 ) ( 1 A 2 )
To verify if the result obtained by the contracting technique is accurate, we apply the exact method and compare the calculated availability with the answer obtained from the contracting technique. Recall that the main idea of the exact method is to take all the possible transition matrices by combining the lower and upper bounds of [ q i j ] (i.e., taking the lower and upper bounds of the intervals of the failure and repair rates).
When we look at the previous example using the exact method, we obtain the lower bound of the steady probabilities:
Π ̲ E = 0.666963 0.098112 0.146102 0.088821
and the upper bound of the steady probabilities:
Π ¯ E = 0.837987 0.060367 0.111134 0.009490
The availability determined by the exact method is
[ A E ] = [ 0.911 , 1 ]
We also consider the “precise method” by considering the center of each transition matrix [ q i j ] . In other words, we do not take into account the imprecision of the transition rates by simply considering the center value of the transition rates intervals q i j m i n + q i j m a x 2 . When we consider the previous example using the precise method, we obtain A P = 0.986 .
Table 5 presents the results obtained by the three methods. As we can see, our proposed method is more conservative than the “exact method”.

5. Metrics for Validation of the Methodology

5.1. Guaranteed Index (GI)

In general, the results provided by the FBP contraction method are guaranteed, which means that on the basis of correct assumptions, the interval contraction provides correct conclusions.
More specifically, in the availability analysis, we consider that a guaranteed availability result is obtained when we are sure that the “real” availability belongs to the availability interval obtained. In order to quantify and validate the efficiency of our method, we consider that a guaranteed result is an interval that contains the exact interval availability. Recall that the exact interval availability is obtained when considering all the combinations of the transition matrix elements q i j (upper and lower failure and repair rates). We can compute the optimal interval from all the obtained intervals.
Thus, we introduce the guaranteed index (GI), which is a binary variable that is equal to 1 if the obtained availability interval contains the exact interval availability, and equal to 0 if it is not the case.

5.2. Conservatism Rate (CR)

We define the conservatism rate (CR) as the ratio of the difference between the width of the interval of the availability obtained by our proposed method and the width of the availability obtained by the exact method.
Formally, the CR is given by
C R = w ( [ A o b t a i n e d ] ) w ( A E ) w ( A o b t a i n e d )
where w ( [ A ] ) = A ¯ A ̲ .

6. Case Studies

To understand and validate the proposed methodology, we propose two MSS case studies and apply the methodology to calculate the imprecise availability. After calculating the imprecise availability, we compare the results to the ones obtained using two well-known methodologies (IUGF [30] and BUGF [43]). The first case study shows the accuracy of our method, compared to other methods. The second one verifies that the method can efficiently handle cases of complex systems that have a large number of components and states.

6.1. Case Study 1

In this section, we use the example presented by Soroudi et al. [48]. Our aim is to compute the system availability described in [48] and presented in Figure 5. It is a flow transmission system from left to right and composed of three pipes. The pipes’ performance is computed using their transmission capacities (tons per minute).
The components 1 and 2 have 3 states: full capacity, partial failure (a partial capacity), and total failure (a capacity of 0). The component 3 has two states: full capacity and total failure. All the performance levels of the component’s states are precise. The system availability is computed using Markov models. We also compare this availability to those obtained by the IUGF method proposed in [30] and by the BUGF method proposed in [43].
In this case study, the repair and failure rates are in form of intervals (cf. Table 6). The system has at most 18 ( 3 × 3 × 2 ) possible states, ranging from the total functional state to the failure state (cf. Figure 6).
The notation 0 j indicates that component j is in the total functional state, the notation 1 j indicates that component j is in the partial working state, and the notation 2 j indicates that component j is in the state of total failure. The performance level g of a state is computed by considering the performance level of components. Thus, the state 1, which is denoted by 0 1 0 2 0 3 , refers to the state where all 3 components are totally functional. The components 1 and 2 are in parallel so that the obtained performance level is equal to the sum of the two performance instances: 2 + 1.5 = 3.5 . The component 3 is in series with the parallel configuration of 1 and 2. Thus, the system performance level g is equal to the minimum, i.e., g = m i n ( 3.5 , 4 ) = 3.5 . We compute the system availability when considering a demand level w = 1.5 . Consequently, we consider the system working states when the total performance level is greater than or equal to w. In Figure 6, the colored states represent working states.
The system availabilities calculated using the IUGF method and BUGF method are shown in Table 7. To obtain the availability using our proposed methodology, we first use the FBP technique to solve the system of equations by contracting the intervals. The system of Equation (1) is equal to zero (18 equations) plus one additional equation representing the fact that the sum of each steady availability term π will be equal to 1. Following the steps of the methodology, we find our imprecise availability. The obtained results are represented in Table 7. The system availability of the exact method is also given in Figure 7 and Table 7.
From Table 7, we can see that the accuracy of the FBP method is close to that obtained when we use the exact method. Moreover, the interval availability obtained by BUGF and IUGF methods are also less conservative than the FBP method since the interval of the contracting technique contains the interval obtained by the exact method, is smaller than the intervals obtained by the IUGF method, and is very close to the one obtained by the BUGF method.
In this case, the GI is equal to 1 since the interval obtained using the FBP contraction technique contains the interval obtained using the exact method. Moreover, the CR of this example is
C R 1 = 0.0809 0.0514 0.0809 = 0.364
We conclude that the FBP method offers, in this case, accurate results regarding the results of the BUGF and IUGF methods (the BUGF and IUGF availability intervals contain the FBP availability interval).

6.2. Case Study 2

We have studied the accuracy of the FBP method regarding the exact, the IUG, and the BUGF methods. We now show that the proposed methodology also remains efficient when the system has a large number of states. To illustrate this, we apply our methodology to the following case study. We aim to compute the availability of the system presented in Figure 8. The system is composed of eight components: A, B, C, D, E, F, G, and H. The transmission flow of the system is considered to be from left to right. The four components B, C, E, and H have states of working (total working and total failure). The three components A, F, and G have three states of working: full working, partial failure, and total failure. The last component D has four possible states: total failure, degraded functioning of type 2, degraded functioning of type 1, and full working. We deduce that the number of system states is 4 × 3 × 3 × 3 × 2 × 2 × 2 × 2 = 1728 . The values of the failure and repair rates of each component are presented in Table 8 (the parameters μ ( k , i ) and λ ( k , i ) are used to represent the repair rate i and failure rate i, respectively, of component k).
Since we assume that the components are independent, we can construct the Markov graph for each component (Figure 9) in order to determine its interval transition matrix. We then apply Equation (1) to find Π ( k ) for each component, where k = A , , H . Finally, we compute the availability of each component by computing the sum of Π ( k , i ) over all the working states. In this example, the availability of the entire system A s y s t e m is presented in the following equation:
A s y s t e m = 1 ( 1 A A A B A C A D ) ( 1 A E A F A G A H )
We apply the FBP method to compute Π ( k ) of components. Then, we compare the system availability obtained using this method with the availabilities obtained using the exact method and the precise method. To simplify the comparison, we elected to present the results in terms of the unavailability ( 1 a v a i l a b i l i t y ). All the results are presented in Table 9 and in Figure 10.
In this example, the obtained interval of system availability using the FBP method contains the interval obtained using the exact method. The GI metric is also 1. When we calculate the CR for this case, we have
C R 2 = 5.224 × 10 7 2.655 × 10 7 5.224 × 10 7 = 0.491
Table 9 shows that the interval obtained using the FBP contraction technique contains the interval obtained using the exact method, and the precise availability belongs to the two availability intervals. As we can see, the FBP method is an efficient methods since it leads to accurate results, even when dealing with larger systems. However, C R 2 > C R 1 since the second system is larger than the first and it has a larger number of components and a larger number of states.

7. Conclusions

In this work, we proposed an original methodology for computing the imprecise availability of multi-state systems (MSS) based on the Markovian model and interval contraction techniques. The imprecision of data was represented by intervals of repair/failure rates. The FBP algorithm was chosen for interval contractions. Regarding the previous work in the literature, this methodology provides many advantages:
  • It can be considered a generalization of classical availability theory for MSS, and thus the results obtained when considering only the center of repair/failure rates intervals are special cases of our proposed method.
  • The availability results are guaranteed in the sense that we are sure that the obtained availability intervals contain the exact value.
  • The imprecision of the availability results (the length of availability intervals) reflects the incompleteness of initial transitions rates and can be used to assist the decision maker by collecting, for example, more data if it is possible.
  • It is less time consuming comparing to the exact method, which consists of considering all the possibilities (upper and lower bounds) of transition rates. On the other hand, it is always more conservative than the exact method.
  • It is straightforward regarding the BUGF and IUGF methods in the sense that we do not have to transform the repair/failure rates into probabilities.
  • It can be applied to all types of configurations, whereas the BUGF and IUGF methods can only be used in series parallel and parallel series configurations.
Moreover, two case studies were proposed. The first one helped us in illustrating the use of the methodology. It also indicates that for small systems, our proposed method gives results very similar to those obtained by the exact method. The second one was proposed to show the computational efficiency of our proposed method for large systems. Moreover, some other techniques can be used to further improve the time computation of our method. For example, the reduction in the state space of components can be performed by finding a smaller component with equivalent behavior and substituting the original component by the smaller one in the Markov model. Another idea for the model reduction is to aggregate states into super states to obtain a Markov model on the aggregated state space.

Author Contributions

Methodology, M.S., E.C., F.A. and J.A.; Data curation, J.A., F.A. and H.H.C.; Software, J.A.; Redaction, All authors. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the ANR (https://anr.fr) grant number Projet ANR-17-CE22-0013.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Barlow, R.; Wu, A. Coherent systems with multi-state elements. Math. Oper. Res. 1978, 3, 275–281. [Google Scholar] [CrossRef] [Green Version]
  2. El-Neveihi, E.; Prochan, F.; Setharaman, J. Multi-state coherent systems. J. Appl. Probab. 1978, 15, 675–688. [Google Scholar] [CrossRef]
  3. Lisnianski, A.; Levitin, G. Multi-State System Reliability: Assessment, Optimization and Applications; World Scientific: Singapore, 2003; Volume 1. [Google Scholar]
  4. Natvig, B. Multistate Systems Reliability Theory with Applications; Wiley: Hoboken, NJ, USA, 2010. [Google Scholar]
  5. Lisnianski, A.; Frenkel, I.; Ding, Y. Multi-State System Reliability Analysis and Optimization for Engineers and Industrial Managers; Springer: London, UK, 2010. [Google Scholar]
  6. Ramirez-Marquez, J.; Coit, D. A Monte-Carlo simulation approach for approximating multi-state two-terminal reliability. Reliab. Eng. Syst. Saf. 2005, 87, 253–264. [Google Scholar] [CrossRef]
  7. Zio, E.; Marella, M.; Podofillini, L. A Monte Carlo simulation approach to the availability assessment of multi-state systems with operational dependencies. Reliab. Eng. Syst. Saf. 2007, 92, 871–882. [Google Scholar] [CrossRef]
  8. Xue, J.; Yang, K. Dynamic reliability analysis of coherent multistate systems. IEEE Trans. Reliab. 1995, 44, 253–264. [Google Scholar]
  9. Lisnianski, A. Extended block diagram method for a multi-state system reliability assessment. Reliab. Eng. Syst. Saf. 2007, 92, 1601–1607. [Google Scholar] [CrossRef]
  10. Pourret, O.; Collet, J.; Bon, J.L. Evaluation of the unavailability of a Multi-state component system using a binary model. Reliab. Eng. Syst. Saf. 1999, 64, 13–17. [Google Scholar] [CrossRef]
  11. Ushakov, I. Handbook of Reliability Engineering; Wiley: Saint-Nom-la-Bretèche, France, 1994. [Google Scholar]
  12. Levitin, G. The Universal Generating Function in Reliability Analysis and Optimization; Springer: London, UK, 2005. [Google Scholar]
  13. Levitin, G.; Lisnianski, A. Importance and sensitivity analysis of multi state systems using the universal generating function method. Reliab. Eng. Syst. Saf. 1999, 65, 271–282. [Google Scholar] [CrossRef]
  14. Levitin, G.; Xing, L. Reliability and performance of multi state systems with propagated failures having selective effect. Reliab. Eng. Syst. Saf. 2010, 95, 655–661. [Google Scholar] [CrossRef]
  15. Ding, Y.; Lisnianski, A. Fuzzy universal generating functions for multi-state system reliability assessment. Fuzzy Sets Syst. 2008, 159, 307–324. [Google Scholar] [CrossRef]
  16. Cheng, C.H.; Mon, D.L. Fuzzy system reliability analysis by interval of confidence. Fuzzy Sets Syst. 1993, 56, 29–35. [Google Scholar] [CrossRef]
  17. Kletz, T.A. Identifying and assessing process industry hazards; Taylor & Francis: Abingdon, UK, 1999. [Google Scholar]
  18. Parry, G.; Drouin, M.T. Risk-Informed Regulatory Decision-Making at the U.S. NRC: Dealing with model uncertainty; US Nuclear Regulatory Commission. 2009. [Google Scholar]
  19. Oberkampf, W.L.; Helton, J.C.; Joslyn, C.A.; Wojtkiewicz, S.F.; Ferson, S. Challenge problems: Uncertainty in system response given uncertain parameters. Reliab. Eng. Syst. Saf. 2004, 85, 11–19. [Google Scholar] [CrossRef]
  20. Aven, T. Interpretations of alternative uncertainty representations in a reliability and risk analysis context. Reliab. Eng. Syst. Saf. 2011, 96, 353–360. [Google Scholar] [CrossRef]
  21. Aven, T.; Zio, E. Some considerations on the treatment of uncertainties in risk assessment for practical decision making. Reliab. Eng. Syst. Saf. 2011, 96, 64–74. [Google Scholar] [CrossRef]
  22. Aven, T. On the need for restricting the probabilistic analysis in risk assessments to variability. Risk Anal. 2010, 30, 354–360. [Google Scholar] [CrossRef]
  23. Ramirez-Marquez, J.; Levitin, G. Algorithm for estimating reliability confidence bounds of multi-state systems. Reliab. Eng. Syst. Saf. 2008, 93, 1231–1243. [Google Scholar] [CrossRef]
  24. Wang, Y.; Li, L. Derivation of reliability and variance estimates for multi-state systems with binary-capacitated components. IEEE Trans. Reliab. 2012, 61, 549–559. [Google Scholar] [CrossRef]
  25. Xiao, N.C.; Huang, H.Z.; Liu, Y.; Li, Y.; Wang, Z. Unified uncertainty analysis by the extension universal generating functions. In Proceedings of the International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (ICQR2MSE), Chengdu, China, 15–18 June 2012; pp. 1160–1166. [Google Scholar]
  26. Chen, C.; Jun, Y.; Lei, L. Reliability Assessment of Multi-State Phased Mission Systems With Common Bus Performance Sharing Subjected to Epistemic Uncertainty. IEEE Trans. Reliab. 2021, 1–13. [Google Scholar] [CrossRef]
  27. Mi, J.; Li, Y.F.; Liu, Y.; Yang, Y.J.; Huang, H.Z. Belief Universal Generating Function Analysis of Multi-State Systems Under Epistemic Uncertainty and Common Cause Failures. IEEE Trans. Reliab. 2015, 64, 1300–1309. [Google Scholar] [CrossRef]
  28. Siqi, Q.; Xinguo, M. Reliability analysis of multi-state series systems with performance sharing mechanism under epistemic uncertainty. Qual. Reliab. Eng. 2019, 35. [Google Scholar] [CrossRef]
  29. Li, Y.; Ding, Y.; Zio, E. Random Fuzzy Extension of the Universal Generating Function Approach for the Reliability Assessment of Multi-State Systems Under Aleatory and Epistemic Uncertainties. IEEE Trans. Reliab. 2014, 63, 13–25. [Google Scholar] [CrossRef] [Green Version]
  30. Li, C.Y.; Chen, X.; Yi, X.S.; Tao, J.Y. Interval-valued reliability analysis of multi-state systems. IEEE Trans. Reliab. 2011, 60, 323–330. [Google Scholar] [CrossRef]
  31. de Campos, L.; Huete, J.; Moral, S. Probability intervals: A tool for uncertain reasoning. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 1994, 2, 167–196. [Google Scholar] [CrossRef]
  32. Ding, Y.; Zuo, M.J.; Lisnianski, A.; Tian, Z.G. Fuzzy multi-state system: General definition and performance assessment. IEEE Trans. Reliab. 2008, 57, 589–594. [Google Scholar] [CrossRef]
  33. Ding, Y.; Zuo, M.J. A framework for reliability approximation of multi- state weighted k-out-of-n systems. IEEE Trans. Reliab. 2010, 59, 297–308. [Google Scholar] [CrossRef]
  34. Liu, Y.; Huang, H.; Levitin, G. Reliability and performance assessment for fuzzy multi-state elements. Proc. Inst. Mech. Eng. Part O J. Risk Reliab. 2008, 222, 675–686. [Google Scholar] [CrossRef]
  35. Dubois, D.; Prade, H. Possibility Theory: An Approach to Computerized Processing of Uncertainty; Plenum Press: New York, NY, USA, 1988. [Google Scholar]
  36. Couso, I.; Sanchez, L. Higher order models for fuzzy random variables. Fuzzy Sets Syst. 2008, 159, 237–258. [Google Scholar] [CrossRef]
  37. Denoeux, T. Modeling vague beliefs using fuzzy-valued belief structures. Fuzzy Sets Syst. 2000, 116, 167–199. [Google Scholar] [CrossRef]
  38. Mi, J.; Li, Y.F.; Peng, W.; Huang, H.Z. Reliability analysis of complex multi-state system with common cause failure based on evidential networks. Reliab. Eng. Syst. Saf. 2018, 174, 71–81. [Google Scholar] [CrossRef]
  39. Akrouche, J.; Sallak, M.; Chatelet, E.; Abdallah, F.; Chehade, H.H. A contribution to the evaluation of imprecise availability of complex systems using markov models. In Proceedings of the 2nd International Conference on Uncertainty Quantification in Computational Sciences and Engineering, Rhodes Island, Greece, 15–17 June 2017; pp. 456–466. [Google Scholar]
  40. Akrouche, J.; Sallak, M.; Chatelet, E.; Abdallah, F.; Chehade, H.H. New method for availability computing of complex systems using imprecise markov models. In Proceedings of the 10th IMA International Conference on Modeling in Industrial Maintenance and Reliability, Manchester, UK, 12–15 June 2018; MIMAR: London, UK, 2018. [Google Scholar]
  41. Moore, R.E. Interval Analysis; Prentice-Hall: Hoboken, NJ, USA, 1999. [Google Scholar]
  42. Jaulin, L. Applied Interval Analysis: With Examples in Parameter and State Estimation, Robust Control and Robotics; Springer: Basel, Switzerland, 2001. [Google Scholar]
  43. Destercke, S.; Sallak, M. An extension of universal generating function in multi-state systems considering epistemic uncertainties. IEEE Trans. Reliab. 2013, 62, 504–514. [Google Scholar] [CrossRef]
  44. Troffaes, M.; Gledhill, J.; Škulj, D.; Blake, S. Using Imprecise Continuous-Time Markov Chains for Assessing the Reliability of Power Networks with Common Cause Failure and Non-Immediate Repair. In Proceedings of the 9th International Symposium on Imprecise Probability: Theories and Applications (ISIPTA ’15), Pescara, Italy, 20–24 July 2015. [Google Scholar]
  45. Cooman, G.D.; Hermans, F.; Quaeghebeur, E. Imprecise Markov chains and their limit behavior. Probab. Eng. Inf. Sci. 2009, 23, 597–635. [Google Scholar] [CrossRef] [Green Version]
  46. Troffaes, M.C.M.; Walter, G.; Kelly, D. A robust Bayesian approach to modeling epistemic uncertainty in common-cause failure models. Reliab. Eng. Syst. Saf. 2014, 125, 13–21. [Google Scholar] [CrossRef] [Green Version]
  47. Lhomme, O. Consistency techniques for numeric csps. IJCAI 1993, 93, 232–238. [Google Scholar]
  48. Soroudi, A.; Amraee, T. Decision making under uncertainty in energy systems: State of the art. Renew. Sustain. Energy Rev. 2013, 28, 376–384. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Markov chain for failure with non-instant repair [44].
Figure 1. Markov chain for failure with non-instant repair [44].
Mathematics 10 00150 g001
Figure 2. Steps of the proposed methodology.
Figure 2. Steps of the proposed methodology.
Mathematics 10 00150 g002
Figure 3. Markov chain of a system of two binary components.
Figure 3. Markov chain of a system of two binary components.
Mathematics 10 00150 g003
Figure 4. The probability intervals for each state after k contractions.
Figure 4. The probability intervals for each state after k contractions.
Mathematics 10 00150 g004
Figure 5. Case study 1: Flow transmission system (flow direction is left to right).
Figure 5. Case study 1: Flow transmission system (flow direction is left to right).
Mathematics 10 00150 g005
Figure 6. Case study1: Markov chain for 18 states.
Figure 6. Case study1: Markov chain for 18 states.
Mathematics 10 00150 g006
Figure 7. The interval availability of the system obtained using each method.
Figure 7. The interval availability of the system obtained using each method.
Mathematics 10 00150 g007
Figure 8. Case study 2: MSS with eight components (flow direction is left to right).
Figure 8. Case study 2: MSS with eight components (flow direction is left to right).
Mathematics 10 00150 g008
Figure 9. Case study 2: The Markov graph for each component in the MSS.
Figure 9. Case study 2: The Markov graph for each component in the MSS.
Mathematics 10 00150 g009
Figure 10. The unavailability of the system obtained using each method.
Figure 10. The unavailability of the system obtained using each method.
Mathematics 10 00150 g010
Table 1. The imprecise availability obtained by the two methods.
Table 1. The imprecise availability obtained by the two methods.
The article’s method [ A 1 ] = [ 0.99902 , 1.00085 ] [ 0 , 1 ] = [ 0.99902 , 1 ]
The Exact method [ A 2 ] = [ 0.99930 , 1.00005 ] [ 0 , 1 ] = [ 0.99930 , 1 ]
Table 2. Steps of C .
Table 2. Steps of C .
Step 1: Forward [ z 1 ] : = 5 [ x 1 ]
Step 2: Forward [ z 2 ] : = 2 [ x 2 ]
Step 3: Forward [ y ] : = [ z 1 ] + [ z 2 ]
Step 4 [ y ] : = [ y ] 0
Step 5: Backward [ z 1 ] : = ( [ y ] [ z 2 ] ) [ z 1 ]
Step 6: Backward [ z 2 ] : = ( [ y ] [ z 1 ] ) [ z 2 ]
Step 7: Backward [ x 1 ] : = ( [ z 1 ] / 5 ) [ x 1 ]
Step 8: Backward [ x 2 ] : = ( [ z 2 ] / 2 ) [ x 2 ]
Table 3. The probability vector obtained after each constraint.
Table 3. The probability vector obtained after each constraint.
Constraint NumberProbability Vector Π
1 [ 0 , 1 ] [ 0 , 0.303 ] [ 0 , 0.425 ] [ 0 , 1 ]
2 [ 0 , 1 ] [ 0 , 0.303 ] [ 0 , 0.425 ] [ 0 , 0.059 ]
3 [ 0 , 1 ] [ 0 , 0.303 ] [ 0 , 0.032 ] [ 0 , 0.599 ]
4 [ 0 , 1 ] [ 0 , 0.303 ] [ 0 , 0.425 ] [ 0 , 0.006 ]
5 [ 0.207 , 1 ] [ 0 , 0.303 ] [ 0 , 0.425 ] [ 0 , 0.063 ]
Table 4. The probability vector obtained after k contractions.
Table 4. The probability vector obtained after k contractions.
Number of Contractions kProbability Vector Π
1 [ 0.207 , 1 ] [ 0 , 0.303 ] [ 0 , 0.425 ] [ 0 , 0.063 ]
2 [ 0.496 , 0.959 ] [ 0.016 , 0.182 ] [ 0.022 , 0.280 ] [ 0.001 , 0.040 ]
3 [ 0.571 , 0.901 ] [ 0.039 , 0.155 ] [ 0.054 , 0.238 ] [ 0.004 , 0.034 ]
6 [ 0.625 , 0.871 ] [ 0.051 , 0.135 ] [ 0.070 , 0.208 ] [ 0.006 , 0.030 ]
10 [ 0.628 , 0.869 ] [ 0.052 , 0.134 ] [ 0.071 , 0.206 ] [ 0.006 , 0.029 ]
Table 5. The system’s availability obtained by different methods.
Table 5. The system’s availability obtained by different methods.
Contracting TechniqueExact MethodPrecise Method
A s = [ 0.752 , 1 ] [ A E ] = [ 0.911 , 1 ] A P = 0.986
Table 6. Transition rates and states for each component.
Table 6. Transition rates and states for each component.
G 1 G 2 G 3
State 1 g 3 1 = 1.5 g 3 2 = 2 g 2 3 = 4
(Completely successful)(Completely successful)(Completely successful)
State 2 g 2 1 = 1 g 2 2 = 1.5 g 1 3 = 0
(Degraded successful)(Degraded successful)(Total failure)
State 3 g 1 1 = 0 g 1 2 = 0
(Total failure)(Total failure)
Failure rates λ 3 , 1 1 = [ 10 5 , 3 × 10 4 ] h 1 λ 3 , 1 2 = [ 2 × 10 5 , 6 × 10 4 ] h 1 λ 2 , 1 3 = [ 10 5 , 4 × 10 4 ] h 1
λ 2 , 1 1 = [ 4 × 10 5 , 5 × 10 4 ] h 1 λ 2 , 1 2 = [ 3 × 10 5 , 4 × 10 4 ] h 1
Repair rates μ 2 , 1 1 = [ 2 × 10 2 , 5 × 10 2 ] h 1 μ 2 , 1 2 = [ 3 × 10 2 , 6 × 10 2 ] h 1 μ 1 , 1 3 = [ 5 × 10 2 , 9 × 10 2 ] h 1
μ 1 , 1 1 = [ 4 × 10 2 , 8 × 10 2 ] h 1 μ 1 , 1 2 = [ 3 × 10 2 , 7 × 10 2 ] h 1
Table 7. Availability when t tends to for each method.
Table 7. Availability when t tends to for each method.
Exact MethodFBP Contraction TechniqueBUGFIUGF
[ 0.9809 , 1.0323 ] [ 0.9551 , 1.0360 ] [0.9550, 1.0361][0.9137, 1.0900]
Table 8. Failure and repair rates from one state to another for each component.
Table 8. Failure and repair rates from one state to another for each component.
ComponentFailure RateRepair Rate
A λ 1 , 1 = [ 3 × 10 5 , 4.5 × 10 5 ] h 1 μ 1 , 1 = [ 4.1 × 10 1 , 7 × 10 1 ] h 1
λ 1 , 2 = [ 2.6 × 10 5 , 7 × 10 5 ] h 1 μ 1 , 2 = [ 3 × 10 1 , 6.2 × 10 1 ] h 1
B λ 2 = [ 2.6 × 10 5 , 3.1 × 10 5 ] h 1 μ 2 = [ 1.6 × 10 1 , 4 × 10 1 ] h 1
C λ 3 = [ 3.5 × 10 5 , 4.6 × 10 5 ] h 1 μ 3 = [ 2.1 × 10 1 , 3 × 10 1 ] h 1
D λ 4 , 1 = [ 2.6 × 10 5 , 3.5 × 10 5 ] h 1 μ 4 , 1 = [ 3.1 × 10 1 , 3.5 × 10 1 ] h 1
λ 4 , 2 = [ 2.9 × 10 5 , 3.7 × 10 5 ] h 1 μ 4 , 2 = [ 2.9 × 10 1 , 3.3 × 10 1 ] h 1
λ 4 , 3 = [ 2.7 × 10 5 , 3.4 × 10 5 ] h 1 μ 4 , 3 = [ 3 × 10 1 , 3.5 × 10 1 ] h 1
E λ 5 = [ 3 × 10 5 , 4.1 × 10 5 ] h 1 μ 5 = [ 2.5 × 10 1 , 3 × 10 1 ] h 1
F λ 6 , 1 = [ 3.1 × 10 5 , 5.6 × 10 5 ] h 1 μ 6 , 1 = [ 2 × 10 1 , 2.4 × 10 1 ] h 1
λ 6 , 2 = [ 2.9 × 10 5 , 4.6 × 10 5 ] h 1 μ 6 , 2 = [ 2.6 × 10 1 , 3 × 10 1 ] h 1
G λ 7 , 1 = [ 4.1 × 10 5 , 4.7 × 10 5 ] h 1 μ 7 , 1 = [ 2.3 × 10 1 , 2.9 × 10 1 ] h 1
λ 7 , 2 = [ 2.9 × 10 5 , 3.2 × 10 5 ] h 1 μ 7 , 2 = [ 2.7 × 10 1 , 3.1 × 10 1 ] h 1
H λ 8 = [ 4.1 × 10 5 , 5 × 10 5 ] h 1 μ 8 = [ 2.7 × 10 1 , 3 × 10 1 ] h 1
Table 9. The unavailability of the system using different methods.
Table 9. The unavailability of the system using different methods.
Exact MethodFBP Contraction MethodPrecise Method
[ 3.318 × 10 8 , 2.987 × 10 7 ] [ 8.508 × 10 9 , 5.310 × 10 7 ] 8.346 × 10 8
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Akrouche, J.; Sallak, M.; Châtelet, E.; Abdallah, F.; Chehade, H.H. Methodology for the Assessment of Imprecise Multi-State System Availability. Mathematics 2022, 10, 150. https://doi.org/10.3390/math10010150

AMA Style

Akrouche J, Sallak M, Châtelet E, Abdallah F, Chehade HH. Methodology for the Assessment of Imprecise Multi-State System Availability. Mathematics. 2022; 10(1):150. https://doi.org/10.3390/math10010150

Chicago/Turabian Style

Akrouche, Joanna, Mohamed Sallak, Eric Châtelet, Fahed Abdallah, and Hiba Hajj Chehade. 2022. "Methodology for the Assessment of Imprecise Multi-State System Availability" Mathematics 10, no. 1: 150. https://doi.org/10.3390/math10010150

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop