Evaluation of Technical Systems Dependability with the Use of Fuzzy Logic and Experts’ Knowledge

Evaluation of Technical Systems Dependability with the Use of Fuzzy Logic and Experts’ Knowledge

EVALUATION OF TECHNICAL SYSTEMS DEPENDABILITY WITH THE USE OF FUZZY LOGIC AND EXPERTS’ KNOWLEDGE Lech Bukowski Faculty of Management, AGH University of Science and Technology Cracow, Poland and Jerzy Feliks Faculty of Management, AGH University of Science and Technology Cracow, Poland ABSTRACT masking with the practical techniques of error detection, fault diagnosis, and recovery into the concept of fault- The paper proposes a general concept of technical tolerant systems [3] and 8 years later work on software systems dependability and describes a new dependability fault tolerance was done by B. Randell [4]. tree. In this vector based approach, the term dependability The emergence of a consistent set of new concepts and is composed of two main elements: availability, described terminology resulted in the 1992 book Dependability: by reliability, maintainability and maintenance support Basic Concepts and Terminology by J.-C. Laprie [5] and performance, as well as credibility, based on safety and a new research area of “Dependable Computing” was security. A framework for evaluation of technical born. Since that time, computing systems are systems’ dependability was developed, based on fuzzy characterized by four fundamental properties: logic and a system of rules of the „if … then” type, that functionality, performance, cost and dependability. were appropriately weighted. The model is based on a Dependability [6, 7] of a computing system is the ability three-stage procedure of evaluating linguistic variables to deliver service that can be justifiably trusted. The with the WinFACT tools and BORIS and FLOP service delivered by a system is its behavior, as it is simulation package. The results of the simulation, perceived by its user(s); a user is another (physical, presented as 3-D graphs may be used to optimize the human) system that interacts with the former one at a reliability of the system being evaluated. service interface. The function of a system is what the system is intended for and is described by system Keywords: Dependability, Availability, Credibility, specifications. Dependability is an integrative concept Safety, Security, Fuzzy Logic, Expert System. that encompasses the following attributes: Availability - readiness for correct service; 1. INTRODUCTION Reliability - continuity of correct service; Safety - absence of catastrophic consequences on the Usability of technical systems was previously user(s) and the environment; characterized by three fundamental properties: Confidentiality - absence of unauthorized disclosure of functionality, performance and cost. Since late 1940s, information; artificial systems became more and more complicated and Integrity - absence of improper system state alterations; sophisticated, but also less and less reliable. The first Maintainability - ability to undergo repairs and generation of electronic computers used unreliable modifications. components, therefore practical techniques were Security is the concurrent existence of: employed to improve their reliability. In 1956 J. von a) availability for authorized users only, Neumann [1], E. F. Moore and C. E. Shannon [2] b) confidentiality, and developed theories of using redundancy to build reliable c) integrity with ‘improper’ meaning ‘unauthorized’. logic structures from less reliable components, whose The above attributes may be emphasized to a greater or faults were masked by the presence of multiple redundant lesser extent depending on the application: availability is components. The theories of masking redundancy were always required, although to a varying degree, whereas unified by W. H. Pierce as the concept of failure reliability, safety and confidentiality may or may not be tolerance in 1965 [3]. In 1967, A. Avizienis integrated required. The extent to which a system possesses the attributes of dependability should be interpreted in a Availability (AV) – the ability of a system to be in a state relative, probabilistic sense, and not in an absolute, of performing a required function under given conditions deterministic sense. Due to the unavoidable presence or at a given instant or in a given time interval, assuming occurrence of faults, systems are never totally available, that the required external resources are provided. reliable, safe or secure. Definitions of availability and Reliability (REL) is a feature of the performance system reliability emphasize the avoidance of failures, while achieving the required level by using elements safety and security emphasize the avoidance of a specific characterized by proper values of reliability measures class of failures (catastrophic failures, unauthorized (frequency or time) as well as by applying proper access or handling of information, respectively). dependability structures (e.g. surplus ones). Reliability and availability are thus closer to each other Maintainability (MAI) is a feature of the performance than they are to safety on one hand, and to security on the system characterizing the compliance of the system itself other; reliability and availability can be grouped together, for detecting dangers, identifying the state as well as and collectively defined as the avoidance or minimization executing the actions (both planned and unplanned) of service outages. connected with servicing the system. Maintainability indicators are both frequential (e.g. probability of 2. GENERAL CONCEPT OF TECHNICAL servicing, temporary and average intensity of repair) and SYSTEMS’ DEPENDABILITY temporal (e.g. expected reparation time, p-row quintile of reparation time). The concept of “Dependable Computing” became very Maintenance Support Performance (MSP) is the successful in the area of information technology (IT) and measure of dependability of logistic processes supporting computer science (CS), but was not general enough, to servicing the performance system. These are usually cover all types of technical systems, e.g. production processes of providing with proper resources, while systems and logistics processes. The authors of this paper indicators of provisions of servicing are usually temporal proposed at the International Conference on System (e.g. presumed logistics delay, p-row quintile of logistics Engineering in Las Vegas 2008 [8] a general concept of delay). technical systems’ dependability, which connected the As it derives from the above approach, the readiness of computer oriented concept of dependability with the performance system shall be expressed in a vector experience from another areas of technical devices and format, not the hitherto applied scalar one, by one of equipments. We were trying to study such complex indicators such as momentary availability A(t) or average systems as: availability A(Δt). When applying relative measures of indicators or • Intelligent building systems [9], providing balances for specified components of the • Power supply and distribution systems [10], vector, it is possible to find the value of availability as the • Manufacturing systems [11], scalar ratio of separate components of the vector and their • Supply chain and network systems [12], balances. Credibility (CR) – the extend to which a system is able and we had many problems with defining their to recognize and signal the state of the system and to performance and quantitative characteristics, because withstand incorrect inputs or unauthorized access. every subsystem has a typical definition of attributes and Credibility of the system is defined by two components: characteristics (some of them even have standards, e.g. IEC 50 191, IEC 1069). The goal of this idea was to Safety (SAF) is displayed by create one uniform set of attributes for all these systems 9 absence of critical damages (active actions), as a base to analyze, design and optimize complex 9 securing the environment against the effects of technical systems. The proposed general dependability any potential critical damages (passive actions), tree is shown below [8]. Security (SEC) is displayed by DEPENDABILITY 9 confidentiality (unavailability to unauthorized AVAILABILITY users), Reliability 9 integrity (impossibility of introducing changes Maintainability into the system by unauthorized users) and Maintenance Support 9 availability (accessibility for authorized users Performance only). CREDIBILITY It is proposed to accept the following model for a Safety quantitative measure of dependability: Security D = {AV, CR} The various concepts included in this diagram in a hierarchical tree-type structures are defined as follows. AV = {REL, MAI, MSP} Dependability of a technical system is the ability to deliver service that is available and credible under given CR = {SAF, SEC} conditions at a given instant or in a given time interval. 3. FRAMEWORK FOR EVALUATION OF Class Safety (SAF) Security (SEC) TECHNICAL SYSTEMS‘ number DEPENDABILITY Class_1 Very high Very high For evaluating the availability of a system, it is proposed (>99,99%) (>99,99%) to apply linguistic variables, quantified in various ways, depending on the type of the system. Fuzzy sets were Class_2 High High used at several stages of building experts system. Inputs (99,7% – 99,99%) (99,7% – 99,99%) for a fuzzy system are REL, MAI and MSP variables. The evaluation procedure was described in [8]. Class_3 Moderate Moderate For evaluating the credibility of the system, it is proposed (98% - 99,7%) (98% - 99,7%) to also apply linguistic variables, quantified in various ways, depending on the type of the system, SAF and Class_4 Low Low SEC. Examples of applying

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us