Username   Password       Forgot your password?  Forgot your username? 


A Sequential Inspection Model based on Risk Quantitative Constraint and Component Importance

Volume 14, Number 12, December 2018, pp. 2971-2982
DOI: 10.23940/ijpe.18.12.p7.29712982

Senyang Bai, Zhijun Cheng, Qian Zhao, Xiang Jia, and Hang Yao

College of Systems Engineering, National University of Defense Technology, Changsha, 410073, China

(Submitted on September 11, 2018; Revised on October 18, 2018; Accepted on November 17, 2018)


Due to aerospace equipment’s need to maintain a certain degree of safety and reduce the system risk of operation, relevant maintenance and inspection strategies should be developed to meet the requirements of risk quantitative indicators. The inertial navigation system commonly used in aerospace products is taken as an example, and a sequential inspection and maintenance model based on quantitative risk constraints and component importance is proposed in this paper. Firstly, based on the quantitative constraints of the system risk and the importance of the components, the reliability constraints of the components in the inertial navigation system are determined by the fault tree analysis method. Secondly, the Wiener process is used to establish a performance degradation model for a key component of the inertial navigation system, and the expression of real-time reliability distribution is obtained with close form by use of the first-hitting time theory. The adaptive estimation method is used to estimate the unknown parameters of the model. Once the new degradation information is available, the parameters should be updated with a Bayesian equation. Thirdly, a sequential inspection model is discussed to determine the optimal intervals to satisfy the requirements for the real-time reliability at a certain time. Finally, an example of the drift data of the gyroscopes in the inertial navigation system is given to illustrate the validity of the proposed method.


References: 18

                    1. A. Mancuso, M. Compare, A. Salo, et al., “Risk-based Optimization of Pipe Inspections in Large Underground Networks with Imprecise Information,” Reliability Engineering & System Safety, pp. 228-238, 2016
                    2. Y. Wang, G. Cheng, H. Hu, and W. Wu, “Development of a Risk-based Maintenance Strategy Using FMEA for a Continuous Catalytic Reforming Plant,” Journal of Loss Prevention in the Process Industries, Vol. 6, No. 25, pp. 958-965, 2012
                    3. Z. Tan, J. Li, Z Wu, J. Zheng, and W. He, “An Evaluation of Maintenance Strategy Using Risk based Inspection,” Safety Science, Vol. 6, No. 49, pp. 852-860, 2011
                    4. L. Krishnasamy, F. Khan, and M. Haddara, “Development of a Risk-based Maintenance (RBM) Strategy for a Power-Generating Plant,” Journal of Loss Prevention in the Process Industries, Vol. 2, No. 18, pp. 69-81, 2005
                    5. M. Vileiniskis and R. Remenyte-Prescott, “Quantitative Risk Prognostics Framework based on Petri Net and Bow-Tie models,” Reliability Engineering & System Safety, Vol. 165, pp. 62-73, 2017
                    6. Z. S. Ye, N. Chen, and Y. Shen, “A New Class of Wiener Process Models for Degradation Analysis,” Reliability Engineering & System Safety, Vol. 139, pp. 58-67, 2015
                    7. J. Li, Z. Wang, X. Liu, et al., “A Wiener Process Model for Accelerated Degradation Analysis Considering Measurement Errors,” Microelectronics Reliability, Vol. 65, pp. 8-15, 2016
                    8. Q. Sun, Z. S. Ye, and N. Chen, “Optimal Inspection and Replacement Policies for Multi-Unit Systems Subject to Degradation,” IEEE Transactions on Reliability, Vol. 99, pp. 1-13, 2018
                    9. W. A. Yan, B. W. Song, G. L. Duan, and Y. M. Shi, “Real-Time Reliability Evaluation of Two-Phase Wiener Degradation Process,” Communications in Statistics, Vol. 1, No. 46, pp. 176-188, 2016
                    10. L. Y. Zhang, L. M. Sun, and Z. Q. Shang, “Real-Time Reliability Assessment based on Acceleration Monitoring for Bridge,” Science China Technological Sciences, Vol. 59, No. 8, pp. 1-11, 2016
                    11. Y. Zhang and S. W. Li, “A Study on the Real-Time Reliability of on-Board Equipment of Train Control System,” IOP Conference Series: Materials Science and Engineering, Vol. 351, No. 1, pp. 1-14, 2018
                    12. J. Feng, “Sequential Inspection Method for Long-Storage-Products based on Storage Degradation Mechanism,” Journal of Aerospace Power, Vol. 3, No. 26, pp. 611-616, 2011
                    13. X. Zhao, K. N. Al-Khalifa, and T. Nakagawa, “Approximate Methods for Optimal Replacement, Maintenance, and Inspection Policies,” Reliability Engineering & System Safety, Vol. 144, pp. 68-73, 2015
                    14. R. Jiang, “Optimization of Alarm Threshold and Sequential Inspection Scheme,” Reliability Engineering & System Safety, Vol. 3, No. 95, pp. 208-215, 2010
                    15. M. L. He, X. D. Xiang, and Y. L. Guo, “New Approach on System Reliability Distribution by Component Importance in FTA,” Safety and Environmental Engineering, Vol. 4, No. 16, pp. 62-65, 2009
                    16. M. L. T. Lee and G. A. Whitmore, “Threshold Regression for Survival Analysis: Modeling Event Times by a Stochastic Process Reaching a Boundary,” Statistical Science, Vol. 4, No. 21, pp. 501-513, 2007
                    17. C. Y. Peng and S. T. Tseng, “Mis-specification Analysis of Linear Degradation Models,” IEEE Transactions on Reliability, Vol. 3, No. 58, pp. 444-455, 2009
                    18. X. S. Si and C. H. Hu, “Data-driven Remaining Useful Life Prediction Theory and Applications for Equipment,” National Defense Industry Press, Beijing, 2016


                                      Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

                                      Download this file (IJPE-2018-12-07.pdf)IJPE-2018-12-07.pdf[A Sequential Inspection Model based on Risk Quantitative Constraint and Component Importance]816 Kb
                                      This site uses encryption for transmitting your passwords.