Next Article in Journal
A New Advanced Class of Convex Functions with Related Results
Next Article in Special Issue
Research on PDF Shape Control for Nonlinear Stochastic System Using an Approximate Solution of FPK Equation
Previous Article in Journal
A Nonparametric Dual Control Algorithm of Multidimensional Objects with Interval-Valued Observations
Previous Article in Special Issue
Condition-Based Maintenance Optimization Method Using Performance Margin
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimization of Leakage Risk and Maintenance Cost for a Subsea Production System Based on Uncertain Fault Tree

1
No. 3 Department, Naval Aviation University, Yantai 264001, China
2
College of Artificial Intelligence, Tianjin University of Science and Technology, Tianjin 300457, China
3
College of Management, Tianjin University of Technology, Tianjin 300384, China
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Axioms 2023, 12(2), 194; https://doi.org/10.3390/axioms12020194
Submission received: 18 December 2022 / Revised: 8 February 2023 / Accepted: 9 February 2023 / Published: 13 February 2023
(This article belongs to the Special Issue Advances in Uncertain Optimization and Applications)

Abstract

:
Traditional fault tree analysis is an effective tool used to evaluate system risk if the required data are sufficient. Unfortunately, the operation and maintenance data of some complex systems are difficult to obtain due to economic or technical reasons. The solution is to invite experts to evaluate some critical aspect of the performance of the system. In this study, the belief degrees of the occurrence of basic events evaluated by experts are measured by an uncertain measure. Then, a system risk assessment method based on an uncertain fault tree is proposed, based on which two general optimization models are established. Furthermore, the genetic algorithm (GA) and the nondominated sorting genetic algorithm II (NSGA-II) are applied to solve the two optimization models, separately. In addition, the proposed risk assessment method is applied for the leakage risk evaluation of a subsea production system, and the two general optimization models are used to optimize the leakage risk and maintenance cost of the subsea production system. The optimization results provide a theoretical basis for practitioners to guarantee the safety of subsea production system.

1. Introduction

Optimization between risk and cost is an important topic in the field of industrial and systems engineering. In past decades, researchers have paid attention to risk assessment and optimization methods for complex systems based on probability theory, such as Faddoul et al. [1], Hong et al. [2], Liu et al. [3], Ma et al. [4] and Yousefi et al. [5]. However, to take probability theory as a mathematical basis for risk evaluation and optimization, three basic premises need to be met at the same time: events need to be clearly defined; there are a large number of samples; there is probability repeatability between samples. and In the field of engineering, it is difficult to obtain sufficient data. Therefore, experts are invited to evaluate the technical condition of systems, which are often described with ambiguous language. In 1965, Zadeh [6] proposed the concept of fuzzy set to deal with imprecise and subjective information. After that, researchers began to deal with various optimization problems in fuzzy environments, such as Mortazavi [7], Sayyaadi and Baghsheikhi [8], Yang et al. [9], Zhou et al. [10], and so on. Unfortunately, Liu [11] showed that fuzzy theory is unsuitable for modeling belief degree via a counter example of the strength of a bridge. A similar situation exists in the field of system risk evaluation. For example, system risk is evaluated by experts as approximately 0.0. If the system risk is regarded as a triangular fuzzy variable (0.005, 0.01, 0.015), it can be concluded that the possibility of the system risk is exactly 0.01 is 1 and the possibility of the system risk is not 0.01 is 1 based on the possibility measure. It is usually thought that the possibility of the system risk is exactly 0.01 is 0. In addition, the system risk is exactly 0.01 and the system risk is not 0.01 have the same possibility measure. This contradictory conclusion also shows that the belief degree of experts is unsuitable for modeling by the possibility measure because it does not have a duality property.
In order to measure belief degree, uncertainty theory was founded by Liu [12] and refined by Liu [13] based on normality, duality, subadditivity, and product measure axioms. In recent years, uncertainty theory has been widely used in various fields, such as reliability analysis [14], inference controller [15], risk assessment [16], and statistics [17]. In terms of optimization problems, uncertainty theory is still an effective mathematical modeling tool. For instance, Ke and Yao [18] regarded the units as uncertain variables and proposed a block replacement strategy in uncertain environments. Liu et al. [19] gave the upper and lower bounds of insurance premiums with uncertain random losses and established a mathematical model of an optimal insurance problem. Zhang and Peng [20] solved the uncertain optimal assignment problem by giving the uncertainty distribution of the optimal assignment profit. Li et al. [21] regarded the return rate of risky assets as an uncertain variable and established an uncertain model for portfolio optimization. Li et al. [22] provided a new reliability metric that encompassed two types of task time uncertainties and developed a multiple objective to maximize the reliability and efficiency of assembly lines. Wen et al. [23] presented the minimal expected backorder model and the minimal backorder rate model with the constraints of costs and supply availability based on an uncertain measure. Li et al. [24] derived some useful theorems related to the optimal solutions by modeling the uncertain task time. Guo et al. [25] established a multiechelon multi-indenture optimization LORA model that took the best cost-effectiveness ratio as the criterion.
GA and NSGA-II, as well-known evolutionary algorithms for solving optimization problems, have been successfully applied to different real-world applications, including reliability optimization.
Andrews and Bartlett [26] used GA for the single objective optimization of a firewater deluge system on an offshore platform, in which the system was presented with the structure of a fault tree. Pattison and Andrews [27] described a design optimization scheme for systems that require a high likelihood of functioning on demand by using GA. Cui et al. [28] proposed a novel reliability design and optimization method of planetary gears using the GA, based on the Kriging model. Ardakan and Rezvan [29] considered the multiobjective optimization of the reliability–redundancy allocation problem with a cold-standby strategy using NSGA-II. Bhattacharyya and Cheliyan [30] solved a subsea production system optimization problem by using GA and NSGA-II, in which the risk was evaluated with fault tree analysis. Due to the advantages of GA and NSGA-II, we continued to use the above two algorithms to solve optimization models.
Subsea production systems are mainly composed of Xmas trees, manifolds, jumper tubes, umbilical cables, pipelines, etc. [31]. With the increase in service time of subsea production systems, more and more safety problems have emerged, especially leakage. The leakage of subsea production systems results in serious environment pollution and significant economic losses. Therefore, it is essential to ensure the safety of subsea production systems. Additionally, the total maintenance cost is expected as low as possible. Bhattacharyya and Cheliyan [30] paid attention to such problems and optimized the cost and reliability of a subsea production system on the basis of a traditional fault tree. Unfortunately, it is difficult to obtain sufficient data to evaluate the risk of subsea production systems. In this situation, experts must evaluate the key performance indicators of a subsea production system. Then, Cheliyan and Bhattacharyya [32] assessed the leakage risk of a subsea production system based on a fuzzy fault tree, in which the epistemic uncertainty was modeled with fuzzy set theory. Because the possibility measure has no duality property, a self-dual measure is absolutely needed in both theory and practice.
The major contributions of this study are as follows: A risk assessment method for complex systems with insufficient data is proposed based on uncertain fault tree analysis; two general optimization models are established for complex systems with insufficient data, and the GA and NSGA-II are applied to solve the two optimization models, separately. Leakage risk is evaluated; two optimization models of the leakage risk and maintenance cost are established for a subsea production system. Then, the optimization results are discussed.
The remainder of this paper is organized as follows Section 2 proposes a risk assessment method for systems with insufficient data. Section 3 establishes two general optimization models based on uncertain fault tree and describes the algorithms for solving the two optimization models. Section 4 outlines a leakage risk evaluation for a subsea production system, establishes the optimization models of maintenance cost and leakage risk for the subsea production system, and we discuss the optimization results. In addition, the steps of GA and NSGA-II are provided in Appendix A.

2. Risk Assessment Method Based on Uncertain Fault Tree

A fault tree is called an uncertain fault tree if the occurrences of the input events are evaluated by the uncertain measure proposed by Liu [12]. The system risk is the belief degree of the occurrence of the top event; for the operation rules, refer to Liu [33].
Theorem 1. 
If Λ i , i = 1 , 2 , , N are independent input events, the belief degree of the occurrence of output event Λ is
M { Λ } = i = 1 N M { Λ i } , for AND gate i = 1 N M { Λ i } , for OR gate .
Proof. 
If independent input events Λ i , i = 1 , 2 , , N are connected by an “AND” gate, the belief degree of the occurrence of the output event Λ can be derived by
M { Λ } = M Λ 1 Λ 2 Λ N = M { Λ 1 } M { Λ 2 } M { Λ N } = i = 1 N M { Λ i } .
If independent input events Λ i , i = 1 , 2 , , N are connected by an “OR” gate, the belief degree of the occurrence of the output event Λ can be derived by
M { Λ } = M Λ 1 Λ 2 · · · Λ N = M { Λ 1 } M { Λ 2 } M { Λ N } = i = 1 N M { Λ i } .
The proof is completed. □
Example 1. 
The fault tree shown in Figure 1 describes the system risk. Λ i , j = 1 , 2 , , 7 denote independent basic events, A k , k = 1 , 2 , 3 , 4 denote the intermediate events, and Λ T o p denotes the top event in the fault tree. Table 1 lists the belief degrees of the occurrence of the basic events.
As shown in Figure 1, the top event Λ T o p can be expressed as
Λ T o p = A 1 A 2 = Λ 1 A 3 Λ 2 Λ 3 A 4 = Λ 1 Λ 4 Λ 5 Λ 2 Λ 3 Λ 6 Λ 7 .
Then, the belief degree of occurrence of the top event Λ T o p can be determined, i.e., the risk of the top event Λ T o p , namely,
M { Λ T o p } = M Λ 1 Λ 4 Λ 5 Λ 2 Λ 3 Λ 6 Λ 7 = M Λ 1 Λ 4 Λ 5 Λ 2 M Λ 3 Λ 6 Λ 7 = M Λ 1 M Λ 4 M Λ 5 M Λ 2 M Λ 3 M Λ 6 M Λ 7 = 0.4 0.3 0.5 0.3 0.2 0.35 0.4 = 0.3 .
If the belief degree is replaced by probability in Example 1, then the risk of the top event Λ T o p can be calculated with the probability method, namely,
P { Λ T o p } = P Λ 1 Λ 4 Λ 5 Λ 2 Λ 3 Λ 6 Λ 7 = P Λ 1 · P Λ 4 + P Λ 5 · P Λ 2 + P Λ 3 · P Λ 6 + P Λ 7 = 0.4 · 0.3 + 0.5 · 0.3 + 0.2 · 0.35 + 0.4 = 0.246 .
It can be seen that P { Λ T o p } and M { Λ T o p } are different, which implies when the data are sufficient, traditional fault tree analysis is applied to evaluate the probability of the occurrence of the top event; when the data are insufficient, uncertain fault tree analysis is used to evaluate the belief degree of the occurrence of the top event.
By comparison of M { Λ T o p } and P { Λ T o p } in Example 1, it can be seen that M { Λ T o p } is larger than P { Λ T o p } . However, this does not mean that M { Λ T o p } is always larger than P { Λ T o p } . For example, if M { Λ 2 } and P { Λ 2 } change to 0.2 , then M { Λ T o p } = 0.2 and P { Λ T o p } = 0.214 . Therefore, we cannot simply compare the values of M { Λ T o p } and P { Λ T o p } without knowing the fault tree structure and the belief degrees and probabilities of the occurrence of all basic events.

3. General Optimization Models Based on Uncertain Fault Tree

In this section, an uncertain fault tree is used to evaluate system risk. Then, a single-objective optimization model and a multiobjective optimization model based on uncertain fault tree are separately established.
Consider an uncertain fault tree consisting of n independent basic events. Suppose that N ( N n ) basic events have a variety of maintenance techniques, and incomplete maintenance, denoted by Λ i , i = 1 , 2 , , N , is usually used. The maintenance cost C i of basic event Λ i is related to its own risk; it can be expressed by
C i = F i ( M { Λ i } ) , i = 1 , 2 , , N ,
where F i is called the risk–cost function. Usually, the risk–cost function is a monotonically decreasing function, that is, the lower the risk achieved through maintenance, the higher the maintenance cost to be invested. The total maintenance cost of the top event Λ T o p is
C T o p = i = 1 N C i = i = 1 N F i ( M { Λ i } ) .

3.1. Single-Objective Optimization Model

The aim of the single-objective optimization model is to determine the risk to be achieved after basic event maintenance when the total maintenance cost is minimized under the given system risk level. Decision variables are denoted by M { Λ i } , i = 1 , 2 , , N ; the system risk, denoted by M T o p , is the function of M { Λ i } , i = 1 , 2 , , N ; and the total maintenance cost C T o p is also a function of M { Λ i } , i = 1 , 2 , , N . Then, the single-objective optimization model can be expressed by the following mathematical programming
M i n C T o p s . t . M T o p = τ μ i M { Λ i } ν i , i = 1 , 2 , , N ,
where μ i and ν i are the lower and upper bounds of decision variables M { Λ i } , i = 1 , 2 , , N , respectively. The range of τ is
M T o p ( μ 1 , μ 2 , , μ N ) τ M T o p ( ν 1 , ν 2 , , ν N ) .

3.2. Multiobjective Optimization Model

The aim of the multiobjective optimization model is to determine the risk to be achieved after basic event maintenance when the total maintenance cost and the system risk are minimized at the same time. M T o p and C T o p are the functions of decision variables M { Λ i } , i = 1 , 2 , , N . Then, the multiobjective optimization model can be expressed by the following mathematical programming
M i n C T o p M i n M T o p s . t . μ i M { Λ i } ν i , i = 1 , 2 , , N .

3.3. Solutions of Optimization Models

GA is a method to search the optimal solution by simulating natural evolution process. It is an effective and efficient algorithm to solve the single-objective optimization model. NSGA-II is used to solve the multiobjective optimization model since it can reduces the complexity of noninferior sorting genetic algorithm and has the advantages of fast running speed and good convergence of solution set. NSGA-II yields a non-dominated set of solutions known as the Pareto-optimal solutions. The steps of GA and NSGA-II are described in the Appendix A.

4. Optimization of Leakage Risk and Maintenance Cost for a Subsea Production System

The operation and maintenance data of subsea production systems are difficult to obtain due to the underwater environment, or the obtained data are often interpreted by experts. Therefore, evaluations of the leakage risk based on the traditional fault tree analysis method are limited. In this section, the leakage risk of the subsea production system is evaluated with uncertain fault tree analysis. Then, two optimization models of leakage risk and maintenance cost are established for subsea production systems. Finally, the optimization results are presented to show the optimal relationship between leakage risk and maintenance cost, and the risks of basic events to be achieved after maintenance are given.

4.1. Leakage Risk Assessment of Subsea Production System

Subsea production systems are the main lifeline of offshore oil and gas exploitation, which consist of Xmas trees, manifolds, jumper tubes, umbilical cables, pipelines, etc. The fault tree structure with subsea production system leakage as the top event was reported in Cheliyan and Bhattacharyya [32]. Table 2 and Table 3 briefly describe the fault tree structure. All basic events (BEs) are described in Table 2. The description of the intermediate events and top event and their connectivity with events are shown in Table 3.
Based on the uncertain fault tree analysis, the leakage risk of the subsea production system (denoted by M T o p ) is
M T o p = M { Λ 26 } M { Λ 38 } M { Λ 39 } M { Λ 40 } = M { Λ 26 } M { Λ 1 } M { Λ 2 } M { Λ 11 } M { Λ 36 } M { Λ 32 } M { Λ 33 } M { Λ 34 } M { Λ 35 } M { Λ 37 } = M { Λ 1 } M { Λ 2 } M { Λ 26 } M { Λ 11 } M { Λ 27 } M { Λ 28 } M { Λ 29 } M { Λ 30 } M { Λ 18 } M { Λ 19 } M { Λ 20 } M { Λ 21 } M { Λ 22 } M { Λ 23 } M { Λ 24 } M { Λ 25 } M { Λ 17 } M { Λ 31 } = M { Λ 1 } M { Λ 2 } M { Λ 18 } M { Λ 19 } M { Λ 11 } M { Λ 3 } M { Λ 4 } M { Λ 5 } M { Λ 6 } M { Λ 7 } M { Λ 8 } M { Λ 9 } M { Λ 10 } M { Λ 20 } M { Λ 21 } M { Λ 22 } M { Λ 23 } M { Λ 24 } M { Λ 25 } M { Λ 26 } M { Λ 17 } M { Λ 12 } M { Λ 13 } M { Λ 14 } M { Λ 15 } M { Λ 16 } .

4.2. Single-Objective Optimization Model of Leakage Risk and Maintenance Cost for Subsea Production System

The fault tree of the subsea production system contains 26 basic events, in which 25 basic events require a variety of maintenance techniques. For all risk–cost functions, we used the data in [30]. Each risk–cost function is assumed to be two straight lines of different slopes and can be determined by three points ( M 1 { Λ i } , C i 1 ) , ( M 2 { Λ i } , C i 2 ) , ( M 3 { Λ i } , C i 3 ) , i = 1 , 2 , , 25 , in which
M 1 { Λ i } = M 2 { Λ i } 2 , M 3 { Λ i } = 2 M 2 { Λ i } , C i 1 = 3 C i 2 , C i 3 = C i 2 2 .
So, ( M 2 { Λ i } , C i 2 ) , i = 1 , 2 , , 25 need to be defined, which are shown in Table 4. The unit cost of C i 2 , i = 1 , 2 , , 25 is in million USD. The risk tolerance of basic events is 0.2.
From the single-objective optimization model described in (9), the optimization model of leakage risk and maintenance cost for the subsea production system can be expressed as
M i n C T o p s . t . M T o p = τ 0 M { Λ i } 0.2 , i = 1 , 2 , , 25 ,
In which M T o p can be obtained from Formula (7) and
C T o p = i = 1 25 C i = i = 1 25 F i ( M { Λ i } ) .
Then, we solve the optimal risk level of all basic events after maintenance (denoted by M { Λ i } , i = 1 , 2 , , 25 ), so as to minimize the total maintenance cost under the allowable leakage risk of the subsea production system.

4.3. Multiobjective Optimization Model of Leakage Risk and Maintenance Cost for Subsea Production System

From the multiobjective optimization model described in (10), the optimization model of leakage risk and maintenance cost for the subsea production system can be expressed by
M i n C T o p M i n M T o p s . t . 0 M { Λ i } 0.2 , i = 1 , 2 , , 25 ,
where M T o p and C T o p can be calculated by (7) and (9). Then, we solve the optimal risk level of all basic events after maintenance (denoted by M { Λ i } , i = 1 , 2 , , 25 ), so as to minimize the total maintenance cost and leakage risk at the same time.

4.4. Results and Discussion

The single-objective optimization Model (8) can be solved by the GA described in Appendix A.1. The optimization solutions are obtained by running the GA multiple times because Min C T o p converges with increasing generations, each time with a prescribed value of M T o p . The key parameters of the GA were assigned as follows: the population size is 100, the crossover probability is 0.8, and the mutation probability is 0.04. As shown in Figure 2, if M T o p is assigned as 0.03, Min C T o p converges when the number of generations reaches 130, and the total maintenance cost is USD 33.4456. The optimal risks of the basic events are presented in Table 5. So, the number of generations was specified as 300 to ensure convergence. The optimization results, i.e., the relationship between M T o p and Min C T o p , are presented in Table 6 and Figure 3.
The multiobjective optimization Model (10) can be solved by the NSGA-II described in Appendix A.2. The key parameters of the NSGA-II were assigned as follows: the population size is 100, the crossover probability is 0.8, and the mutation probability is 0.04. Figure 4 shows a comparison between the Pareto front and the solutions of the initial population, 50th-generation population, 80th-generation population, and 180th-generation population. The values of C T o p and M T o p almost converge when the number of generations reaches 180. The converge maximum and minimum values of C T o p and M T o p are used to construct the ranges of the Pareto front.
As shown in Figure 4 and Figure 5, the maximum and minimum values of C T o p and M T o p converge when the number of generations reaches 300. So, the number of generations was specified as 300 to ensure the Pareto front converged. Table 7 shows the Pareto optimal solutions on the Pareto front. It is up to the decision maker to adopt a Pareto optimal solution that lies on this Pareto front.
The optimization results provide the theoretical basis for practitioners to guarantee the safety of subsea production systems when they do not have sufficient data, which can help practitioners determine the preliminary funds need required in consideration of the system risk and give the maintenance degree of basic events.

5. Conclusions

It is difficult to obtain operation and maintenance data of subsea production systems, and the obtained data are often interpreted by experts. Therefore, evaluations of leakage risk based on the traditional fault tree analysis method are limited. Although the fuzzy fault tree is also used to evaluate system risk under incomplete information, it often produces conflicting evaluation results because the possibility measure does not have a duality property. In this study, the belief degrees of occurrence of basic events were measured with an uncertain measure. Then, the leakage risk of a subsea production system was evaluated with uncertain fault tree analysis. Furthermore, optimization models were established to optimize the leakage risk and maintenance cost of a subsea production system. The specific contributions of this study are as follows:
(1)
The belief degrees of the occurrence of basic events evaluated by experts are measured with an uncertain measure. A risk assessment method for complex systems with insufficient data was proposed based on uncertain fault tree analysis.
(2)
Two general optimization models were established for complex systems with insufficient data, in which the system risk is evaluated by an uncertain fault tree. GA and NSGA-II were applied to solve the two optimization models, separately.
(3)
The leakage risk of the subsea production system was evaluated with the proposed risk assessment method. Based on the findings, two optimization models were proposed to optimize the leakage risk and maintenance cost of a subsea production system, and the optimization results were discussed.
In future research, the proposed risk assessment method and optimization models will be used in the risk assessment and optimization problems for other complex systems with insufficient data.

Author Contributions

Conceptualization, J.Z. and Y.L.; methodology, L.M.; software, Y.S.; project administration, Y.L.; resources, Y.L. and J.Z.; data curation, Y.L. and L.M.; writing—original draft, L.M.; validation, Y.S. and X.S.; writing—review and editing, J.Z. and Y.L.; funding acquisition, Y.L. and J.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This study was supported by the Humanities and Social Sciences Foundation of the Ministry of Education (Youth Fund) grant No. 18YJC630108 and the Scientific Research Project of Tianjin Education Commission grant No. 2019KJ233.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data that support the findings of this study are available from https://doi.org/10.1016/j.ress.2018.12.030, (accessed on 27 December 2018) and https://doi.org/10.1016/j.joes.2017.11.005, (accessed on 5 December 2017).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Appendix A.1. The Steps of GA

Step 1: Initialization
For each basic event Λ i , M { Λ i } is generated by
M { Λ i } = μ i + α i ( ν i μ i ) ,
in which α i is a random number generated between 0 and 1; μ i and ν i are the minimum and maximum values of M { Λ i } , i = 1 , 2 , , N , respectively. The chromosome is constituted by M { Λ 1 } , M { Λ 2 } , , M { Λ N } . Then, k chromosomes are generated; the jth risk of basic event Λ i is denoted by M ( j ) { Λ i } , i = 1 , 2 , , N , j = 1 , 2 , , k .
Step 2: Calculate the risk of the top event
According to the fault tree structure of the subsea production system, the risk of the top event is calculated with Theorem 1. Then, the k risk of the top event is obtained, denoted by M T o p ( j ) , j = 1 , 2 , , k .
Step 3: Calculate the total maintenance cost
If M T o p ( j ) = τ , j = 1 , 2 , , k , the total maintenance cost can be calculated with Equation (3).
If M T o p ( j ) τ , j = 1 , 2 , , k , proceed to Step 4.
Step 4: Selection
Calculate the average value
M ¯ T o p = 1 k j = 1 k M T o p ( j ) , j = 1 , 2 , , k .
Compare M ¯ T o p with τ , if M ¯ T o p τ , then M T o p ( j ) , j = 1 , 2 , , k , which is greater than M ¯ T o p , is selected. If M ¯ T o p > τ , then M T o p ( j ) , j = 1 , 2 , , k , which is less than M ¯ T o p , is selected.
Step 5: Crossover
For each basic event Λ i , two individuals M ( j 1 ) { Λ i } and M ( j 2 ) { Λ i } are randomly selected; random numbers p and q between 0 and 1 are generated. Then, new individuals are generated by
M ( j 1 ´ ) { Λ i } = p · M ( j 2 ) { Λ i } + q · M ( j 1 ) { Λ i }
and
M ( j 2 ´ ) { Λ i } = p · M ( j 1 ) { Λ i } + q · M ( j 2 ) { Λ i } ,
in which j 1 = 1 , 2 , , k , j 2 = 1 , 2 , , k and j 1 j 2 .
Replace M ( j 1 ) { Λ i } and M ( j 2 ) { Λ i } with M ( j 1 ´ ) { Λ i } and M ( j 2 ´ ) { Λ i } , respectively.
Step 6: Mutation
The individuals and locations to be mutated are randomly selected.

Appendix A.2. Steps of NSGA-II

Step 1: Initialization
For each basic event Λ i , M { Λ i } is generated by
M { Λ i } = μ i + α i ( ν i μ i )
in which α i is a random number generated between 0 and 1; μ i and ν i are the minimum and maximum values of M { Λ i } , i = 1 , 2 , , N , respectively. The chromosome is constituted by M { Λ 1 } , M { Λ 2 } , , M { Λ N } . Then, k chromosomes are generated; the jth risk of basic event Λ i is denoted by M ( j ) { Λ i } , i = 1 , 2 , , N , j = 1 , 2 , , k .
Step 2: Fast nondominated sort
Calculate the objective functions M T o p ( j ) and C T o p ( j ) , j = 1 , 2 , , k with Equations (7) and (3), respectively. Arrange these chromosomes by using the fast nondominated sorting approach and arrive at the set X 1 ( j ) , j = 1 , 2 , , k .
Step 3: Crossover
Randomly select individuals M ( j 1 ) { Λ i } and M ( j 2 ) { Λ i } , 0 j 1 , j 2 k , j 1 j 2 to generate new individuals by
M ( j 1 ) { Λ i } = 0.5 [ ( 1 + r 1 ) × M ( j 1 ) { Λ i } + ( 1 r 1 ) × M ( j 1 ) { Λ i } ]
and
M ( j 2 ) { Λ i } = 0.5 [ ( 1 r 1 ) × M ( j 1 ) { Λ i } + ( 1 + r 1 ) × M ( j 1 ) { Λ i } ] ,
in which
r 1 = ( 2 u 1 ) 1 η + 1 , if u 1 0.5 1 2 ( 1 u 1 ) 1 η + 1 , if u 1 > 0.5 ,
where u 1 is a random number in [0,1], and η > 0 is a distribution index.
Step 4: Mutation
The individuals who undergo mutation are randomly selected with probability p, and the new individuals after the mutation are generated by
M ( j ) { Λ i } = δ · M ( j ) { Λ i } ,
in which
δ = [ 2 u 2 + ( 1 2 u 2 ) × ( 1 δ 1 ) η m + 1 ] 1 η m + 1 1 , if u 2 0.5 1 [ 2 ( 1 u 2 ) + 2 ( u 2 0.5 ) × ( 1 δ 2 ) η m + 1 ] 1 η m + 1 , if u 2 > 0.5
where u 2 is a random number in the interval [0,1]; η m is the distribution index, δ 1 and δ 2 are generated by
δ 1 = M ( j ) { Λ i } ν i ν i μ i a n d δ 2 = μ i M ( j ) { Λ i } ν i μ i , r e s p e c t i v e l y .
Then, k new chromosomes are generated, denoted by ( X ( j ) ) , j = 1 , 2 , , k .
Step 5: Elite retention strategy
Combine X 1 ( j ) , j = 1 , 2 , , k and ( X ( j ) ) , j = 1 , 2 , , k to construct 2k chromosome set, denoted by ( X 1 ( j ) ) , j = 1 , 2 , , 2 k . Compute the objective functions ( M T o p ( j ) ) and ( C T o p ( j ) ) of ( X 1 ( j ) ) , j = 1 , 2 , , k with Equations (7) and (3), respectively. Rearrange the chromosome set ( X 1 j ) , j = 1 , 2 , , 2 k and retain the top k chromosomes as chromosome set X 2 ( j ) , j = 1 , 2 , , k . Rename X 2 ( j ) by X 1 ( j ) , j = 1 , 2 , , k , and proceed to Step 3 until the end of Step 5. The chromosomes construct the near-optimal Pareto front.

References

  1. Faddoul, R.; Raphael, W.; Chateauneuf, A. Maintenance optimization of series systems subject to reliability constraints. Reliab. Eng. Syst. Saf. 2018, 180, 179–188. [Google Scholar] [CrossRef]
  2. Hong, C.; Estefen, S.F.; Wang, Y.X.; Lourenco, M.I. An integrated optimization model for the layout design of a subsea production system. Appl. Ocean. Res. 2018, 77, 1–13. [Google Scholar] [CrossRef]
  3. Liu, X.Q.; Zheng, J.; Fu, J.J.; Ji, J.Q.; Chen, G.M. Multi-level optimization of maintenance plan for natural gas pipeline systems subject to external corrosion. J. Nat. Gas Sci. Eng. 2018, 50, 64–73. [Google Scholar] [CrossRef]
  4. Ma, X.Y.; Liu, B.; Yang, L.; Peng, R.; Zhang, X.D. Reliability analysis and condition-based maintenance optimization for a warm standby cooling system. Reliab. Eng. Syst. Saf. 2020, 193, 106588. [Google Scholar] [CrossRef]
  5. Yousefi, N.; Coit, D.W.; Song, S.L.; Feng, Q.M. Optimization of on-condition thresholds for a system of degrading components with competing dependent failure processes. Reliab. Eng. Syst. Saf. 2019, 192, 106547. [Google Scholar] [CrossRef]
  6. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef]
  7. Mortazavi, A. A new fuzzy strategy for size and topology optimization of truss structures. Appl. Soft Comput. J. 2020, 93, 106412. [Google Scholar] [CrossRef]
  8. Sayyaadi, H.; Baghsheikhi, M. Developing a novel methodology based on the adaptive neuro-fuzzy interference system for the exergoeconomic optimization of energy systems. Energy 2018, 164, 218–235. [Google Scholar] [CrossRef]
  9. Yang, H.F.; Zhu, Z.J.; Li, C.; Li, R.R. A novel combined forecasting system for air pollutants concentration based on fuzzy theory and optimization of aggregation weight. Appl. Soft Comput. J. 2020, 87, 105972. [Google Scholar] [CrossRef]
  10. Zhou, J.; Han, Y.L.; Liu, J.; Pantelous, A.A. New approaches for optimizing standby redundant systems with fuzzy lifetimes. Comput. Ind. Eng. 2018, 123, 263–277. [Google Scholar] [CrossRef]
  11. Liu, B.D. Why is there a need for uncertainty? J. Uncertain Syst. 2012, 6, 3–10. [Google Scholar]
  12. Liu, B.D. Uncertainty Theory, 2nd ed.; Springer: Berlin, Germany, 2007. [Google Scholar]
  13. Liu, B.D. Uncertainty Theory: A Branch of Mathematics for Modeling Human Uncertainty; Springer: Berlin, Germany, 2010. [Google Scholar]
  14. Liu, Y.; Zhao, J.Y.; Qu, Z.G.; Wang, L. Structural reliability assessment based on subjective uncertainty. Int. J. Comput. Methods 2021, 18, 2150046. [Google Scholar] [CrossRef]
  15. Gao, Y. Uncertain inference control for balancing an inverted pendulum. Fuzzy Optim. Decis. Mak. 2012, 11, 481–492. [Google Scholar] [CrossRef]
  16. Hu, L.H.; Kang, R.; Pan, X.; Zuo, D.J. Risk assessment of uncertain random system-level-1 and level-2 joint propagation of uncertainty and probabiltiy in fault tree analysis. Reliab. Eng. Syst. Saf. 2020, 198, 106874. [Google Scholar] [CrossRef]
  17. Zu, T.P.; Kang, R.; Wen, M.L. Graduation formula: A new method to construct belief reliability distribution under epistemic uncertainty. J. Syst. Eng. Electron. 2020, 31, 626–633. [Google Scholar]
  18. Ke, H.; Yao, K. Block replacement policy with uncertain lifetimes. Reliab. Eng. Syst. Saf. 2016, 148, 119–124. [Google Scholar] [CrossRef]
  19. Liu, Y.; Li, X.Z.; Liu, Y.L. The bounds of premium and optimality of stop loss insurance under uncertain random environments. Insur. Math. Econ. 2015, 64, 273–278. [Google Scholar] [CrossRef]
  20. Zhang, B.; Peng, J. Uncertain programming model for uncertain optimal assignment problem. Appl. Math. Model. 2013, 37, 6458–6468. [Google Scholar] [CrossRef]
  21. Li, B.; Sun, Y.F.; Aw, G.; Teo, K.L. Uncertain portfolio optimization problem under a minimax risk measure. Appl. Math. Model. 2019, 76, 274–281. [Google Scholar] [CrossRef]
  22. Li, Y.C.; Peng, R.; Kucukkoc, I.; Tang, X.W.; Wei, F. System reliability optimization for an assembly line under uncertain random environment. Comput. Ind. Eng. 2020, 146, 106540. [Google Scholar] [CrossRef]
  23. Wen, M.L.; Han, Q.; Yang, Y.; Kang, R. Uncertain optimization model for multi-echelon spare parts supply system. Appl. Soft Comput. 2017, 56, 646–654. [Google Scholar] [CrossRef]
  24. Li, Y.C.; Hu, X.F.; Tang, X.W.; Kucukkoc, I. Type-1 U-shaped assembly line balancing under uncertain task time. IFAC Pap. Online 2019, 52, 992–997. [Google Scholar] [CrossRef]
  25. Guo, L.H.; Fun, J.J.; Wen, M.L.; Kang, R. Joint optimization of LORA and spares stocks considering corrective maintenance time. J. Syst. Eng. Electron. 2015, 26, 85–95. [Google Scholar] [CrossRef]
  26. Andrews, J.; Bartlett, L. Genetic algorithm optimization of a firewater deluge system. Qual. Reliab. Eng. Int. 2003, 19, 39–52. [Google Scholar] [CrossRef]
  27. Pattison, R.; Andrews, J. Genetic algorithms in optimal safety system design. Proc. Inst. Mech. Eng. Part E J. Process Mech. Eng. 1999, 213, 187–197. [Google Scholar] [CrossRef]
  28. Cui, D.; Wang, G.Q.; Lu, Y.P.; Sun, K.K. Reliability design and optimization of the planetary gear by a GA based on the DEM and Kriging model. Reliab. Eng. Syst. Saf. 2020, 203, 107074. [Google Scholar] [CrossRef]
  29. Ardakan, M.A.; Rezvan, M.T. Multi-objective optimization of reliability-redundancy allocation problem with cold-standby strategy using NSGA-II. Reliab. Eng. Syst. Saf. 2018, 172, 225–238. [Google Scholar] [CrossRef]
  30. Bhattacharyya, S.K.; Cheliyan, A.S. Optimization of a subsea production system for cost and reliability using its fault tree model. Reliab. Eng. Syst. Saf. 2019, 185, 213–219. [Google Scholar] [CrossRef]
  31. Wang, W.; Sun, L.P.; Bai, Y. Investigation on subsea production systems. China Offshore Platf. 2019, 24, 41–45. [Google Scholar]
  32. Cheliyan, A.S.; Bhattacharyya, S.K. Fuzzy fault tree analysis of oil and gas leakage in subsea production systems. J. Ocean. Eng. Sci. 2018, 3, 38–48. [Google Scholar] [CrossRef]
  33. Liu, B.D. Some research problems in uncertainty theory. J. Uncertain Syst. 2009, 3, 3–10. [Google Scholar]
Figure 1. A fault tree structure.
Figure 1. A fault tree structure.
Axioms 12 00194 g001
Figure 2. The convergence of Min C T o p with the increase in generations.
Figure 2. The convergence of Min C T o p with the increase in generations.
Axioms 12 00194 g002
Figure 3. The solution of the singe-objective optimization model.
Figure 3. The solution of the singe-objective optimization model.
Axioms 12 00194 g003
Figure 4. Convergence process of Pareto optimal solution. The solution of (a) initial population; (b) 50th-generation population; (c) 80th-generation population; (d) 180th-generation population.
Figure 4. Convergence process of Pareto optimal solution. The solution of (a) initial population; (b) 50th-generation population; (c) 80th-generation population; (d) 180th-generation population.
Axioms 12 00194 g004aAxioms 12 00194 g004b
Figure 5. The ranges of C T o p and M T o p with the number of generations: (a) maximum value of C T o p ; (b) minimum value of C T o p ; (c) maximum value of M T o p ; (d) minimum value of M T o p .
Figure 5. The ranges of C T o p and M T o p with the number of generations: (a) maximum value of C T o p ; (b) minimum value of C T o p ; (c) maximum value of M T o p ; (d) minimum value of M T o p .
Axioms 12 00194 g005aAxioms 12 00194 g005b
Table 1. The belief degrees of the occurrence of basic events.
Table 1. The belief degrees of the occurrence of basic events.
Basic Events Λ 1 Λ 2 Λ 3 Λ 4 Λ 5 Λ 6 Λ 7
Belief degree of occurrence0.40.30.20.30.50.350.4
Table 2. Information of basic events.
Table 2. Information of basic events.
BEDescriptionBEsDescription
Λ 1 Overpressure in well Λ 14 Defect in pipe manifold connector
Λ 2 Failure of control in well Λ 15 Defect in pipe–PLET connector
Λ 3 Jumper puncture Λ 16 Defect in pipe–PLEM connector
Λ 4 Jumper rupture Λ 17 Failure of connector leakage control
Λ 5 Flowline puncture Λ 18 Defect in X-tree
Λ 6 Flowline rupture Λ 19 Failure of X-tree leakage control
Λ 7 Pipeline puncture Λ 20 Defect in manifold
Λ 8 Pipeline rupture Λ 21 Failure of manifold leakage control
Λ 9 Riser puncture Λ 22 Defect in PLET
Λ 10 Riser rupture Λ 23 Failure of PLET leakage control
Λ 11 Failure of leakage control of pipe Λ 24 Defect in PLEM
Λ 12 Defect in X-tree wellhead connector Λ 25 Failure of PLEM leakage control
Λ 13 Defect in pipe connector Λ 26 Third-party damage
Table 3. Information of the top and intermediate events.
Table 3. Information of the top and intermediate events.
EventDescriptionGatesConnected Event
Λ T o p Oil and gas leakageOR Λ 26 , Λ 38 , Λ 39 , Λ 40
Λ 40 Leakage in key facilitiesOR Λ 32 , Λ 33 , Λ 34 , Λ 35 , Λ 37
Λ 39 Leakage in pipeAND Λ 11 , Λ 36
Λ 38 Leakage in gas or oil wellAND Λ 1 , Λ 2
Λ 37 Connector leakageAND Λ 17 , Λ 31
Λ 36 Defect in pipeOR Λ 27 , Λ 28 , Λ 29 , Λ 30
Λ 35 PLEM leakageAND Λ 24 , Λ 25
Λ 34 PLET leakageAND Λ 22 , Λ 23
Λ 33 Manifold leakageAND Λ 20 , Λ 21
Λ 32 X-tree leakageAND Λ 18 , Λ 19
Λ 31 Defect in connectorOR Λ 12 , Λ 13 , Λ 14 , Λ 15 , Λ 16
Λ 30 Defect in riserOR Λ 9 , Λ 10
Λ 29 Defect in pipelineOR Λ 7 , Λ 8
Λ 28 Defect in flowlineOR Λ 5 , Λ 6
Λ 27 Defect in jumperOR Λ 3 , Λ 4
Table 4. Information of risk–cost functions of basic events.
Table 4. Information of risk–cost functions of basic events.
BEs Λ 1 Λ 2 Λ 3 Λ 4 Λ 5
( M 2 { Λ i } , C i 2 ) (0.043, 2)(0.0332, 2)(0.0095, 0.15)(0.0094, 0.15)(0.007, 2.5)
BEs Λ 6 Λ 7 Λ 8 Λ 9 Λ 10
( M 2 { Λ i } , C i 2 ) (0.095, 2.5)(0.0078, 6)(0.0103, 6)(0.023, 3.5)(0.0288, 3.5)
BEs Λ 11 Λ 12 Λ 13 Λ 14 Λ 15
( M 2 { Λ i } , C i 2 ) (0.0538, 1)(0.0195, 0.75)(0.0205, 0.75)(0.0193, 1.5)(0.0175, 2)
BEs Λ 16 Λ 17 Λ 18 Λ 19 Λ 20
( M 2 { Λ i } , C i 2 ) (0.0183, 1)(0.0425, 0.25)(0.0199, 2)(0.032, 2)(0.0204,6)
BEs Λ 21 Λ 22 Λ 23 Λ 24 Λ 25
( M 2 { Λ i } , C i 2 ) (0.0223, 1.5)(0.0189, 2)(0.0214, 0.75)(0.0189, 2)(0.0214, 1.5)
Table 5. The optimized risk of basic events after maintenance.
Table 5. The optimized risk of basic events after maintenance.
M { Λ 1 } M { Λ 2 } M { Λ 3 } M { Λ 4 } M { Λ 5 }
0.0860.0299850.00190.01880.013999
M { Λ 6 } M { Λ 7 } M { Λ 8 } M { Λ 9 } M { Λ 10 }
0.0190.01560.0205990.0299700.02999
M { Λ 11 } M { Λ 12 } M { Λ 13 } M { Λ 14 } M { Λ 15 }
0.107590.0390.0410.03860.034999
M { Λ 16 } M { Λ 17 } M { Λ 18 } M { Λ 19 } M { Λ 20 }
0.03660.0298500.029950.0640.0408
M { Λ 21 } M { Λ 22 } M { Λ 23 } M { Λ 24 } M { Λ 25 }
0.029990.03780.029980.03780.02999
Table 6. The solution of the singe-objective optimization model.
Table 6. The solution of the singe-objective optimization model.
M T o p 0.01900.02000.02500.03000.0350
Min C T o p 53.327951.030740.693033.445630.7314
M T o p 0.04000.04500.05000.05500.0600
Min C T o p 29.146528.445827.949627.528926.8427
Table 7. The Pareto optimal solutions on the Pareto front.
Table 7. The Pareto optimal solutions on the Pareto front.
No. M Top C Top No. M Top C Top
10.061263824827.7478222490.031061904634.0771521
20.057256419527.981213500.030852424834.2760071
30.056742195228.021177510.030367244534.278854
40.056418455228.0770276520.030284016234.3660938
50.05171034528.131183530.03007475434.5212012
60.050289217728.1920152540.029969718434.6846129
70.050024266428.3133204550.029915253335.037695
80.048245492928.3294124560.029306175635.0816926
90.048243770328.5376517570.028833762935.2052424
100.047921035428.6258182580.028799391135.5243215
110.044726339728.7626312590.028777022235.7700708
120.043444427928.9295184600.028753573435.9526883
130.042967430629.0469512610.028463884935.9577624
140.04237039629.2535414620.02807893836.1577861
150.042327974329.269485630.027784403836.1922948
160.040788168629.4583618640.027763822836.3396034
170.040787956929.5225774650.027606540236.4926474
180.040055727129.7408744660.02754852236.7284912
190.039870155829.9324046670.027357234936.8581749
200.03971435230.0555856680.027338692236.9791893
210.038941776130.1112929690.026889579837.1414137
220.038845356930.2700468700.02678826237.3833141
230.038630.4555862710.026764019537.4583168
240.037747336130.5280521720.026483759837.7025692
250.037513747530.5707205730.026163421737.9739896
260.036873665530.7223616740.026104670238.0523796
270.036779034330.8394166750.026060830438.2207902
280.036701054531.0388581760.025673419838.3436548
290.036404444331.1345122770.025541457738.4349168
300.036389186431.3961569780.025366159838.5428964
310.036028338831.4052595790.025350715938.7729405
320.035880082831.4852581800.025237836738.9022766
330.035823891331.644148810.025132101839.1191081
340.035386368131.8501649820.024770133539.1363357
350.035375119131.8641366830.024728353939.3371158
360.035031053632.1544939840.024410664239.575638
370.034918431232.3140202850.024250624139.7369331
380.034300031732.5272719860.024125578540.1756648
390.034201304832.6522411870.023831558240.3140573
400.034037853132.7191019880.023793455840.476925
410.033349494732.8159548890.023710028440.5409006
420.032861701632.9674031900.023444251640.6835945
430.032677398933.3421619910.023334657240.6969574
440.032113678733.4693596920.023243498141.1975037
450.032082253233.657781930.022810790741.318251
460.031506206733.7166985940.022743219841.4199314
470.031451168833.75349950.022615118741.7470685
480.031065258533.912054960.022641.7627859
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhao, J.; Ma, L.; Sun, Y.; Shan, X.; Liu, Y. Optimization of Leakage Risk and Maintenance Cost for a Subsea Production System Based on Uncertain Fault Tree. Axioms 2023, 12, 194. https://doi.org/10.3390/axioms12020194

AMA Style

Zhao J, Ma L, Sun Y, Shan X, Liu Y. Optimization of Leakage Risk and Maintenance Cost for a Subsea Production System Based on Uncertain Fault Tree. Axioms. 2023; 12(2):194. https://doi.org/10.3390/axioms12020194

Chicago/Turabian Style

Zhao, Jianyin, Liuying Ma, Yuan Sun, Xin Shan, and Ying Liu. 2023. "Optimization of Leakage Risk and Maintenance Cost for a Subsea Production System Based on Uncertain Fault Tree" Axioms 12, no. 2: 194. https://doi.org/10.3390/axioms12020194

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop