Next Article in Journal
A New Approach to Fuzzy TOPSIS Method Based on Entropy Measure under Spherical Fuzzy Information
Previous Article in Journal
Digital Volume Pulse Measured at the Fingertip as an Indicator of Diabetic Peripheral Neuropathy in the Aged and Diabetic
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Approach to Support Failure Mode, Effects, and Criticality Analysis Based on Complex Networks

1
School of Reliability and Systems Engineering, Beihang University, Beijing 100191, China
2
Nanjing Chenguang Group Co., Limited, Nanjing 210006, China
*
Author to whom correspondence should be addressed.
Entropy 2019, 21(12), 1230; https://doi.org/10.3390/e21121230
Submission received: 13 November 2019 / Revised: 9 December 2019 / Accepted: 13 December 2019 / Published: 16 December 2019

Abstract

:
Failure Mode, Effects and Criticality Analysis (FMECA) is a method which involves quantitative failure analysis. It systematically examines potential failure modes in a system, as well as the components of the system, to determine the impact of a failure. In addition, it is one of the most powerful techniques used for risk assessment and maintenance management. However, various drawbacks are inherent to the classical FMECA method, especially in ranking failure modes. This paper proposes a novel approach that uses complex networks theory to support FMECA. Firstly, the failure modes and their causes and effects are defined as nodes, and according to the logical relationship between failure modes, and their causes and effects, a weighted graph is established. Secondly, we use complex network theory to analyze the weighted graph, and the entropy centrality approach is applied to identify influential nodes. Finally, a real-world case is presented to illustrate and verify the proposed method.

1. Introduction

The formation of product quality runs through the whole process of product development, from product design and machining to assembly. Improving performance of products and reducing the failure of them has always been the common pursuit of academia and industry. However, due to the random fluctuation of the process factors, deviations in quality characteristics occur, and variations in quality characteristics lead to defects as time goes on, which may cause product failure. As we all know, the failure of products may be a destructive blow to the company’s production and operation. Therefore, it is crucial to identify the failure modes that may exist on products. Hence, the possible effect of any failure mode shall be analyzed, so as to prevent it from happening and reduce its losses. However, with an increasing complexity of current products, a number of products are always composed of several subsystems [1,2] and interaction between each subsystem in order to carry out system function [3]. Moreover, for complex products, the components in the subsystem have many quality characteristics, which are coupled to each other, and different coupling modes make the failure modes in products diverse. In addition, products are affected by various external factors in the design, development and production process. In the Internet of Things (IoT), many devices are connected together by outside resources [4]. If a device fails, the Internet of Things devices may not function properly at the network layer. These make the identification and importance ranking of failure modes in products more and more difficult.
One of the main identification and importance ranking methods of failure modes is the failure mode, effects and criticality analysis (FMECA). FMECA is a reliability analysis method which discovers the potential failure modes in a system, so as to evaluate the effects on system performance [5]. The method consists of two parts: failure mode effect analysis (FMEA) and criticality analysis (CA). On the basis of the CEI EN 60812 standard [6], FMEA is a systematic procedure for the analysis of a system to identify potential failure modes, and their causes and effects on system performance. On the other hand, Criticality Analysis plans and focuses the maintenance activities according to a set of priorities by giving failures with the highest risk the highest priority [7]. Carrying out a typical FMECA, a complex product can be considered as a system, and the system is divided into several subsystems based on the fundamental principle of functional independence. Then, the subsystem is divided into component level, layer by layer, until the level of single component. FMECA starts from the indenture lowest level (single component) and continues analyzing the upper hierarchical level. According to the importance of the failure modes, FMECA assigns different priorities for taking countermeasures. The higher the importance of the failure mode is, the higher its priority. In the traditional FMECA, importance of each failure mode is ranked based on the risk priority number (RPN), which is derived by the product of three risk factors: occurrence (O), severity (S) and detection (D) [8]. Therefore, FMECA is a good way to simplify and solve complex product reliability and continuously improve product performance. It has also been widely applied in a range of fields, such as machine tool [9], healthcare field [8], wind industry [10] and nuclear industry [11]. However, the classical RPN formula has highlighted many drawbacks in analyzing practical problems [12,13]. Further, FMECA ignores the association and influence between failure modes, and their causes and effects, and fails to fully exploit failure information. Obviously, as mentioned above, due to its functional coupling, complex structure and numerous parts, classical FCECA is difficult to solve the importance ranking of failure modes in complex products. Therefore, the failure coupling information between products, components and parts must be fully mined to analyze the failure mode more accurately.
Thus, this paper introduces the complex network theory that defines failure modes, and their causes and effects as nodes. The logical relationship between failure cause and failure mode are defined as the edge, and the weight of the edge is represented by the square root of occurrence (O) multiplied by detection (D). Analogously, the relation between failure mode and failure effect is denoted as edge, and the weight of the edge is represented by severity (S). Then a weighted graph is established. Furthermore, the entropy centrality approach is applied to identify influential nodes. Finally, a real-world case is presented to illustrate and verify the proposed method.
The contributions of this paper can be summarized as follows.
(1) Complex network theory is introduced into FMECA, and a weighted graph is established to analyze the influence relation between failure modes, and their causes and effects.
(2) Entropy centrality is used to identify the vital nodes of a weighted graph, and the weight of the network is mutative; moreover, the number of nodes in the network is also changing.
The remaining sections of the paper are organized as follows. Section 2 reviews the literature on FMECA improvement and identifying influential nodes. Section 3 includes details of the proposed approach and gives a summary of the method. Section 4 contains details about a real-world case to illustrate and verify the proposed method. We conclude our work in Section 5.

2. Literature Review

This article is mainly related to two streams of literature. The first one is the literature on FMECA improvement. The traditional FMECA uses Risk Priority Number (RPN), which given by the multiplication of the risk parameters O, S, D of a failure to quantify the risk of failure modes [6,14].
RPN   =   O S D
In Equation (1), O defines the probability of a failure mode will come out, S indicates the degree of failure mode effect system, D implies the probability of failure mode has been identified before the system is affected, and each risk factor generally takes a discrete value in the range [1,10].
Despite its wide use, the classical RPN has many shortcomings, which have been highlighted countless times, such as the presence of gaps in the range of admissible values and the high sensitivity to small changes [7,15,16,17].
Several authors proposed some methods to deal with the restriction of RPN. Braband adopts the sum of the three parameters to improve RPN assessment, which is called IPRN [18]. An exponential RPN (ERPN) was proposed by Chang et al. to reduce the number of duplicates RPNs [19]. To make the ERPN better, Akbarzade Khorshidi et al. came up with URPN [20]. Both ERPN and URPN well-solved the trouble of duplicates RPNs and of relative importance among O, S and D. Carmignani suggested the use of a fourth parameter in the RPN calculation [21]. The profitability based on costs and possible profits after minimizing losses due to failure is taken into consideration. Except the above optimization of RPN, most of the work is mainly focused on fuzzy logic, for the classical FMECA ignores some real situations. Hence, fuzzy FMECA methods are employed to express the uncertainty [22,23]. The approach needs a large amount of proper expertise and experience. Thus, the use of evidence theory [24] is presented to manage the uncertainty and support to characterize this type of evaluation.
Rathore et al. [25] discussed how a selection with hesitant fuzzy information is a multi-criteria decision-making problem. The multi-criteria decision method (MCDM) is also frequently used to support FMECA. Braglia [26] proposed the Analytic Hierarchy Process (AHP), which uses the classical risk parameters O, S and D along with the expected cost due to failure as a standard to compare the potential causes of failures. Braglia et al. [27] also adopted the fuzzy technique for order preference by similarity to ideal solution (FTOPSIS) method to prioritize the potential risks of failure modes in criticality analysis. A combined FTOPSIS and fuzzy-AHP [28] approach to FMECA is proposed by Kutlu and Ekmekçioğlu [29]. Based on FTOPSIS and AHP, a decision support tool is proposed by Carpitella et al. to perform a reliability analysis with relation to a subsystem, in which the consensus obtained by modeling the different decision-making capabilities of each expert is not taken into account in the process of judging from the experts. Liu et al. provided an algorithm to cope with the group decision making characterized by the large number of participators in distributed groups and based on conflict assessments and majority opinions [8].
The second related stream of research is on complex network theory. Complex network theory is an effective method to analyze system complexity, and it has been widely applied to many fields, such as social networks, and biological networks [30,31]. It is crucial to identify the most influential nodes in complex networks for optimizing the network structure and accelerating information dissemination. In network analysis, measuring centrality is one of the important ways to identify the most influential spreaders. Degree centrality (DC) [32] is a basics measure, and the importance of one node is measured by the number of its neighbors. Global measures such as betweenness centrality (BC) [33] and closeness centrality (CC) [34] can identify node influences in the global scope. Kitsak [35] proposed a new centrality measure called “k-shell decomposition”. This measure, which determines the centrality of nodes based on their locations in the network, considers nodes topographically located in the core of the network as influential nodes. Katz [36] introduced a measure of centrality known as Katz centrality, which computed influence by taking into account the number of walks between a pair of nodes. Stephenson and Zelen [37] defined the information centrality using the “information” contained in all possible paths between pairs of points. Ahmad Zareie et al. [38] have taken advantage of an entropy-based approach to detect the spreading capability of nodes in networks on the basis of their topological information.

3. Proposed Method

3.1. Preliminaries

The FMECA worksheet contains a wealth of product failure information, but it can only meet the needs of simple information retrieval. The information mining of failure modes, and their causes and effects are the descriptions of quality features of products from multi-level, which can be transformed between different levels.
FMECA denotes that the cause of failure is failure mode in the lower layer, and the effect of failure is failure mode in the upper layer. The transformation and logical relation between failure modes, and their causes and effects, are shown in Figure 1.
Where failure cause leads to failure mode break out, failure mode has three different effects on the product function, which are the local influence on the layer, the high-level impact on the upper adjacent layer, and the final impact on the initial indenture level. We introduce a complex network to describe the coupling relations between failure modes, and their causes and effects. Based on Figure 1, we consider failure mode, and their causes and effects as nodes. Moreover, the logical relations between failure modes, and their causes and effects, are mapped as edges, for each edge may have different impact on other nodes, and we set weighted value to represent the difference.

3.2. The Construction of Weighted Network

According FMECA, we should first determine the indenture levels dependent on the functional relationship or composition characteristics of products. Generally, it can be divided into three layers, which are initial indenture level, other indenture level and lowest indenture level. Suppose that n and m are the numbers of failure modes, and their causes and effects and indenture levels, respectively, then the failure set and indenture level set are written as F   =   { f 1 ,   f 2 ,     ,   f β } and D   =   { d 1 ,   d 2 ,   ,   d α } . For any two nodes, the coupling relation between f i and f j is denoted as l ij . So the coupling set is represented as L   =   { l ij | 1     i     n ,   1     j     n } . If there exists node i and node j directly connected with edge e ij , then l ij =   1 , otherwise l ij =   0 . In addition, the set of weighted values is denoted as W , which indicates the force of a node on other nodes. In traditional FMECA, occurrence (O) and detection (D) have a certain overlap in the information. Generally speaking, it is easily to be detected for the failure mode if the probability of occurrence is large. Therefore, in order to eliminate the redundancy of information, according to the meaning of failure modes, and their causes and effects, combined with the influence relations between them, O ij D ij is represented as the weight of failure cause to failure mode in this paper, and S i j is used to weight the influence of that failure mode on failure effect. So we represent the FMECA model as the following.
G = (N, E, W)
where, N   =   { N 1 ,   N 2 ,     ,   N n } ,   E   =   { e 11 ,   e 12 ,     e ij ,   } n × n ,   W   =   { w 11 ,   w 12 ,     w ij ,   } n × n ( 1     i     n ,   1     j     n ) denote the nodes set, edges set and weights set, respectively. Particularly, w ij is represented by O ij D ij or S i j . Based on the logical relationships at different levels of products in Figure 1, we propose a complex network structure diagram as shown in Figure 2. The steps to determine the entire structure diagram are as follows:
Step 1: According to the quality control needs of products, determine the initial indenture level d 1 , find failure modes of level d 1 and determine their causes and effects.
Step 2: The failure causes of initial the indenture level d 1 is respectively corresponding to the failure modes of the other indenture level d 2 , and the failure modes of d 1 are mapped as the failure effects of the other indenture level d 2 , respectively; furthermore, determine failure causes of level d 2 .
Step 3: In the same way, continue to search for failure modes and their causes and effects of the next level, until all of them are searched; denote this level as the lowest indenture level d α .
Step 4: Searching up from the lowest indenture level d α , layer by layer until all fault modes are no longer matched to the failure causes of the other level.
Step 5: Finally, all the failure modes and their causes and effects are respectively mapped to nodes, and the relationship existing between them is converted into an edge, and only one node is reserved for the recurring nodes. Accordingly, a structure diagram of FMECA is established as shown in Figure 2.
In Figure 2, { f 1 ,   f 2 , ,   f β } is represented to failure modes, and their causes and effects set. The black solid line is used to describe the direct coupling relation and the dash line indicates that failure modes, and their causes and effects, correspond to each other in different levels; each black solid line is given a weight w ij .
Assume that there are only the initial indenture level d 1 and the lowest indenture level d 2 in Figure 2. Then an example of a weighted network is set up in Figure 3.
As shown in Figure 3, { N 1 ,   N 2 , ,   N 9 } and { f 1 ,   f 2 , ,   f 9 } is one-to-one correspondence. The values of weights, denoted as w ij , are listed in Table 1.

3.3. Information Entropy and Algorithm

Information entropy is widely used in information science and statistical physics to describe the order of information distribution [39]. If X is a set of possible events x 1 , x 2 , …,   x n , and p i is the probability of x i , the entropy of X can be calculated as:
E ( X )   =   i   =   1 n p i log f 0 ( p i )
where, 0     p i     1 ,   i =   1 n p i = 1. On the one hand, when the values of n are equal, if the probabilities p i have uniform distribution, then the higher the entropy value will be. Additionally, as the value of n increases, so does the entropy value. Therefore, employing entropy can be useful for the detection of nodes with high-degree, more uniform neighbors.
Dehmer suggested introducing a tuple ( λ 1 ,   λ 2 ,   ,   λ n ) of non-negatives in order to form a probability distribution p   =   ( p 1 ,   p 2 , ,   p n ) which is described as follows [40].
p i   =   λ i j   =   1 n λ j i   =   1 ,   2 , ,   n
In Equation (4), λ i represents the ith non-negative integer. Therefore, the Equation (4) can be written as
E ( X )   =   log ( i = 1 n λ i ) i   =   1 n λ i j   =   1 n λ j log λ i
In addition, we find that a neighborhood network of FMECA usually concludes three argument structures, which are showed in Figure 4.
Particularly, in a complex network for FMECA, there is a direct connection between fault cause and fault mode, and fault mode link to fault effect as well. Moreover, a correspondence between different indenture level makes a number of vertices directly linked together; the second order or above neighbor node in the network is quite rare. Based on the above analysis, although research has shown that the entropy centrality should have higher precision if considering the influence of the second order or above neighbor node, this paper calculates entropy centrality and only considers the first neighbor node.
In this paper, we take advantages of both topological structure and information entropy, where the local power of a given vertex includes not only structural entropy but also interaction frequency entropy [41]. The structural entropy evaluates the influence or strength of a given node based on the topographic properties of the sub-graph. Similarly, the interaction frequency entropy, which takes advantage of information contained in the weights of edges that rest between nodes and nodes, depicts the propagation effectiveness of a given node.
Additionally, the degree of node i is represented as DC i , and expresses the influence on the neighbor nodes,
DC i   =   j n e ij ,   j     i
where, e ij which denotes the node i has a direct link to the neighbor node j. In addition, we denote M is the number of first order neighbors of node i. Thus, we obtain the tuple ( λ 1 ,   λ 2 ,   ,   λ M   +   1 ), and define it as follows.
λ i   =   DC i
Based on the above definition, we obtain that the structural entropy centrality of node i is denoted by EC i s :
EC i s   =   log ( i   =   1 M   + 1 DC i ) i   =   1 M   + 1 DC i i   =   1 M   +   1 DC i log DC i
In addition, the weight of edges plays a role in estimating the interaction frequency, we denote EC i f as the interaction frequency entropy of node i, and it is defined as:
EC i f   =   j   =   1 M log W ij k   =   1 M W ik log W ij k   =   1 M W ik
where W ij denotes the weight of the edge and M indicates the number of first order neighbors of node i. Combining EC i s with EC i f , denoted as EC i , which equals the summation of the structural entropy and frequency entropy, multiplied by two parameters, respectively, so the EC i is computed through the following equation:
EC i   =   ξ 1 EC i   s   +   ξ 2 EC i f
where ξ 1 and ξ 2 stand for the weight coefficients, respectively, and ξ 1 + ξ 2   =   1 .

3.4. A Summary of Method

We present a novel method for supporting FMECA that introduces complex theory into FMECA, and failure modes, and their causes and effects are denoted as nodes, while the edges represent nodes connected to the other nodes. In addition, the edge between failure cause and failure mode is weighted as OD , and the link for that failure mode with failure effect is denoted as S. By mining topological structure in complex networks, and making use of information contained in the weighted links, we finally get an improved RPN indicator, which is EC i , and it is named as ECRPN, and means a way to evaluate RPN by entropy centrality. Moreover, the weight of each edge will change as long as any indicator of the O, S, D changes. Besides, with the improvement of social management and technology, when people discover there is no longer any influence relation on certain failure modes, and their causes and effects, or some failure modes, and their causes and effects no longer affect the product quality, some corresponding vertices or edges will also disappear. Therefore, the weighted graph which we established is dynamic. Further, values for ξ 1 and ξ 2 are purposely set as 0.4 and 0.6 , respectively. Peng et al. [42] have demonstrated that entropy-based centrality outperformances the classic degree-based centralities and path-based centralities under the conditions of this particular set of parameters. Thus, the Equation (10) is denoted as:
EC i   =   0 . 4 j   =   1 M +   1 DC i i   =   1 M   +   1 DC i log DC i i   =   1 M   +   1 DC i 0 . 6 j   =   1 M W ij k   =   1 M W ik log W ij k   =   1 M W ik     0 . 4 log ( M   +   1 )   +   0 . 6 log M
where, M is the number of node i’s neighbors. Furthermore, a specific safe threshold is set to screen for nodes with high risk, and the safe threshold is 70% of the maximum value of the entropy centrality of each node. It is represented as the Equation (12).
EC i safe   =   0 . 28   log ( M   +   1 )   +   0 . 42   log   M
According to the above description, the flow of the whole method we proposed is shown in Figure 5.

4. Case Study

A real-world case about the Heating, Ventilation and Air Conditioning (HVAC) system was analyzed by FMECA, which came from Ciani et al.’s study [7]. Ciani et al. focused on some of the most critical components that make up the HVAC: compressor, evaporator blower and air flow detector. According to the actual situation, the component is regarded as the lowest indenture level. In addition, based on the difference of product hardware, the system is regarded as the initial indenture level. Hence, we can divide the system into two indenture levels, where the HVAC system is the initial indenture level d 1 , and the components are the lowest indenture level d 2 . All the failure modes, and their causes and effects, are shown in Appendix A Figure A1, based on the method we proposed, and the weighted graph is shown in Figure 6.
Moreover, the weight between nodes and the nodes’ degrees are included in Appendix A Table A1. Further, we take the node 1 as an example to describe the calculating process of the proposed algorithm. On the basis of Equation (8), if 10 is the base of the logarithmic function, then the structural entropy of node 1 is computed as follows:
EC 1 s   =   log (   i   = 1 7 DC i )   i   = 1 7 DC i i   =   1 7 DC i log DC i     =   0.726
Furthermore, following Equation (9), the interaction frequency entropy is expressed as follows:
EC 1 f   =   j   =   1 6 log W ij k   =   1 6 W ik log W ij k   =   1 6 W ik   =   0.7759
And according to the Equation (10), we finally obtain the improved RPN indicator, represented by EC 1 , which is stated as follows:
EC 1   =   0 . 4 EC 1 s   +   0 . 6 EC 1 f   =   0.7562
As discussed above, based on the entropy centrality approach, the power of each node and the corresponding results are recorded in Table 2.
Further, the results obtained from the analysis of our proposed method are compared with each node’s safe threshold, and we present the result in Figure 7.
In addition, we compare the results with traditional RPN method and alternative RPNs method, the difference is shown in Table 3.
As shown in Figure 7, in the whole network, node 1, node 8, node 34 and node 38 are obviously more important than other nodes, for their changes can have a greater impact on the nature of the network, and they can affect more nodes, too. Besides, excepting node 5 and node 12, the remaining nodes have entropy centrality values that exceed their safe threshold. Therefore, these nodes whose entropy centrality values are more than the safe thresholds should be taken as control measures.
Moreover, in Table 3, it is shown that node 7 has the highest risk priority number based on the traditional RPN method, but it is not among the four most important nodes, it is ranked fifth place. Although node 1 and node 8 are ranked third and fourth floor with the classical RPN method, but their neighbor nodes are all 6, and the neighbor nodes of node 7 are 5, and lastly node 1 and node 8 are more influential than node 7 in the weighted network. On the one hand, nodes 1 and 8 have more neighbor nodes than node 7, which indicates that nodes 1 and 8 have more functional coupling relationships with other nodes. Through functional coupling, components compressor and evaporator blower complete certain specified actions, respectively. On the other hand, the parameters O and D overlap in information, O and D of node 1 are 8 and 7, respectively, O and D of node 7 are 9 and 6, and O and D of node 8 are 8 and 5, respectively. If traditional FMECA is used, the results for nodes 1, 7 and 8 are 56, 54 and 40, respectively. The parameters S of nodes 1, 7 and 8 are 6, 8 and 8, respectively. By combining the results of filtering the information of parameters O and D, and the size of parameter S, obviously, the results of ECRPN are more scientific. Moreover, for HVAC systems, more than half of the failures are caused by electrical reasons, while nearly 20% of failures are mechanical faults, and a small part is caused by pipelines and switches, and about 85% of electrical failures are caused by motors which do not start on demand, and considering the effect caused by the failure, and the difficulty of detecting failure, the actual situation shows that the ranking of ECRPN is closer to the actual situation.

5. Conclusions and Discussion

This paper proposed a novel approach of introducing complex network theory into FMECA. The approach starts from the need to transform traditional FMECA into a weighted complex network. So initially we determined indenture levels that depended on the functional relationship or composition characteristics of products. Then, we use traditional FMECA to identify all failure modes, the causes and effects of each mode of the system. Next, we defined failure modes, and their causes and effects as nodes, and the logical relation of nodes are denoted as edges, where the edge between failure cause and failure mode is weighted as OD , and the link of that failure mode with failure effect is denoted as S. Then a weighted graph is established. Furthermore, the entropy centrality approach is applied to rank influential nodes. Finally, a real-world case is presented to illustrate and verify the proposed method. The results show that considering the logical relationship between the failure modes, and their causes and effects, it does have an impact on the failure mode ranking.
In this study, we use the entropy centrality method to estimate the influential nodes of the weighted graph we proposed, obviously, perfect algorithms do not exist without any limitations or assumptions. Thus, as for future work, we expect to carry out further work on improving entropy-based centrality. Moreover, the work presented in this article does not consider the difference among the local influence on the layer, the high-level impact on the upper adjacent layer, and the final impact on the initial indenture level. The magnitude of these three effects is represented by the weight S, which may not match the real-world situation. In addition, this method is based on complex networks to mine the relation between failure information. It may not be applicable to systems with insufficient failure information. Thus, our proposed method could be enhanced in the future, making it more applicable.

Author Contributions

L.W. conceived and designed the methods; W.D. devised and validated the model; Y.Z. analyzed the data. L.W. and G.L. contributed to the writing and editing of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (No. 51705015), the National Defense Fundamental Research Foundation of China (JCKY2018203C005), and the Technical foundation program (grant JSZL2017601C002 and Z132014A002) from the Ministry of Industry and Information Technology of China.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Figure A1. Failure modes and effects analysis for the HVAC system, which include three most critical components: (a) compressor; (b) evaporator blower; (c) air flow detector.
Figure A1. Failure modes and effects analysis for the HVAC system, which include three most critical components: (a) compressor; (b) evaporator blower; (c) air flow detector.
Entropy 21 01230 g0a1aEntropy 21 01230 g0a1b
Table A1. The weight between nodes and the degrees of nodes.
Table A1. The weight between nodes and the degrees of nodes.
Between Two NodesWeight DC i Between Two NodesWeight DC i
1 29 56 17 3 42 1
1 386 18 3 42 1
11 1 56 19 451
12 1 56 620 5 20 1
13 1 56 21 5 20 1
14 1 56 22 5 20 1
2 30 12 23 6 32 1
2 395424 6 32 1
15 2 12 25 7 54 1
16 2 12 26 7 54 2
3 31 42 26 8 40
3 386427 8 40 1
17 3 42 28 8 40 1
18 3 42 29 386
4 32 25 1 29 56 3
4 386 5 29 20
12 4 25 430 3952
19 4 25 2 30 12
5 29 20 31 3862
5 33 20 3 31 42
5 386632 3862
20 5 20 4 325
21 5 20 33 3862
22 5 20 5 33 20
6 34 32 34 408
6 408434 418
23 6 32 6 34 32 5
24 6 32 7 34 54
7 34 54 8 34 40
7 418 35 4272
12 7 54 59 357
25 7 54 36 4272
26 7 54 9 367
8 34 40 37 433
8 418 37 4433
12 8 40 610 377
26 8 40 1 38 56
27 8 40 3 38 42
28 8 40 4 385
9 357 5 38 20 8
9 367429 386
9 427 31 386
12 97 32 386
10 377 33 386
10 43342 39 12 2
10 443 30 395
12 107 6 4082
11 1 56 134 408
12 1 56 7 418
12 45 8 4183
12 7 54 634 418
12 8 40 9 427
12 97 35 4273
12 107 36 427
13 1 56 110 4332
14 1 56 137 433
15 2 12 110 4432
16 2 12 137 443

References

  1. Okaro, I.A.; Tao, L. Reliability analysis and optimisation of subsea compression system facing operational covariate stresses. Reliab. Eng. Syst. Saf. 2016, 156, 159–174. [Google Scholar] [CrossRef] [Green Version]
  2. He, B.; Pan, Q.; Deng, Z. Product carbon footprint for product life cycle under uncertainty. J. Clean. Prod. 2018, 187, 459–472. [Google Scholar] [CrossRef]
  3. He, B.; Xue, H.; Liu, L.; Pan, Q.; Tang, W.; Ostrosi, E. Rigid-flexible coupling virtual prototyping-based approach to the failure mode, effects, and criticality analysis. Int. J. Adv. Manuf. Technol. 2019, 100, 1695–1717. [Google Scholar] [CrossRef]
  4. Rathore, S.; Park, J.H. Semi-supervised learning based distributed attack detection framework for IoT. Appl. Soft. Comput. 2018, 72, 79–89. [Google Scholar] [CrossRef]
  5. Verma, A.K.; Srividya, A.; Karanki, D.R. Reliability and Safety Engineering; Springer: London, UK, 2016. [Google Scholar]
  6. EN 60812 Standard. Analysis Techniques for System Reliability—Procedure for Failure Mode and Effects Analysis (FMEA); International Electrotechnical Commission: Geneve, Suisse, 2018. [Google Scholar]
  7. Ciani, L.; Guidi, G.; Patrizi, G. A Critical Comparison of Alternative Risk Priority Numbers in Failure Modes, Effects, and Criticality Analysis. IEEE Access 2019, 7, 92398–92409. [Google Scholar] [CrossRef]
  8. Liu, H.-C.; You, X.-Y.; Tsung, F.; Ji, P. An improved approach for failure mode and effect analysis involving large group of experts: An application to the healthcare field. Qual. Eng. 2018, 30, 762–775. [Google Scholar] [CrossRef]
  9. He, X. Recent development in reliability analysis of NC machine tools. Int. J. Adv. Manuf. Technol. 2016, 85, 115–131. [Google Scholar] [CrossRef]
  10. Ozturk, S.; Fthenakis, V.; Faulstich, S. Failure Modes, Effects and Criticality Analysis for Wind Turbines Considering Climatic Regions and Comparing Geared and Direct Drive Wind Turbines. Energies 2018, 11, 2317. [Google Scholar]
  11. Garcia, P.A.A.; Schirru, R.; Melo, P. A fuzzy data envelopment analysis approach for fmea. Prog. Nucl. Energy 2005, 46, 359–373. [Google Scholar] [CrossRef]
  12. Certa, A.; Hopps, F.; Inghilleri, R.; La Fata, C.M. A Dempster-Shafer Theory-based approach to the Failure Mode, Effects and Criticality Analysis (FMECA) under epistemic uncertainty: Application to the propulsion system of a fishing vessel. Reliab. Eng. Syst. Saf. 2017, 159, 69–79. [Google Scholar] [CrossRef]
  13. Chemweno, P.; Pintelon, L.; De Meyer, A.-M.; Muchiri, P.N.; Van Horenbeek, A.; Wakiru, J. A Dynamic Risk Assessment Methodology for Maintenance Decision Support. Qual. Reliab. Eng. Int. 2017, 33, 551–564. [Google Scholar] [CrossRef]
  14. Catelani, M.; Ciani, L.; Venzi, M. Failure modes, mechanisms and effect analysis on temperature redundant sensor stage. Reliab. Eng. Syst. Saf. 2018, 180, 425–433. [Google Scholar] [CrossRef]
  15. Antonella, C.; Mario, E.; Maria, G.G.; Manuela, L.F.C. ELECTRE TRI-based approach to the failure modes classification on the basis of risk parameters: An alternative to the risk priority number. Comput. Ind. Eng. 2017, 108, 100–110. [Google Scholar]
  16. Shrestha, S.M.; Mallineni, J.K.; Yedidi, K.R.; Knisely, B.; Tatapudi, S.; Kuitche, J.; TamizhMani, G. Determination of Dominant Failure Modes Using FMECA on the Field Deployed c-Si Modules Under Hot-Dry Desert Climate. IEEE J. Photovolt. 2015, 5, 174–182. [Google Scholar] [CrossRef]
  17. Mohammadi, A.; Tavakolan, M. Construction project risk assessment using combined fuzzy and FMEA. In Proceedings of the 2013 Joint IFSA World Congress and NAFIPS Annual Meeting (IFSA/NAFIPS), Edmonton, AB, Canada, 24–28 June 2013; pp. 232–237. [Google Scholar]
  18. Jens, B. Improving the risk priority number concept. Syst. Saf. 2003, 39, 21–23. [Google Scholar]
  19. Chang, K.-H.; Chang, Y.-C.; Lai, P.-T. Applying the concept of exponential approach to enhance the assessment capability of FMEA. J. Intell. Manuf. 2014, 25, 1413–1427. [Google Scholar] [CrossRef]
  20. Khorshidi, H.A.; Gunawan, I.; Ibrahim, M.Y. Applying UGF Concept to Enhance the Assessment Capability of FMEA. Qual. Reliab. Eng. Int. 2016, 32, 1085–1093. [Google Scholar] [CrossRef]
  21. Carmignani, G. An integrated structural framework to cost-based FMECA: The priority-cost FMECA. Reliab. Eng. Syst. Saf. 2009, 94, 861–871. [Google Scholar] [CrossRef]
  22. Liu, L.; Ma, S.; Wang, Z.; Li, P. Use-related risk analysis for medical devices based on improved FMEA. Work J. Prev. Assess. Rehabil. 2012, 41, 5860–5865. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  23. Dagsuyu, C.; Gocmen, E.; Narli, M.; Kokangul, A. Classical and fuzzy FMEA risk analysis in a sterilization unit. Comput. Ind. Eng. 2016, 101, 286–294. [Google Scholar] [CrossRef]
  24. Giuseppe, C.; Giacomo Maria, G.; Manuela La Fata, C. A Dempster-Shafer theory-based approach to compute the birnbaum importance measure under epistemic uncertainty. Int. J. Appl. Eng. Res. 2016, 11, 10574–10585. [Google Scholar]
  25. Rathore, S.; Sharma, P.K.; Sangaiah, A.K.; Park, J.J. A Hesitant Fuzzy Based Security Approach for Fog and Mobile-Edge Computing. IEEE Access 2018, 6, 688–701. [Google Scholar] [CrossRef]
  26. Braglia, M. MAFMA: Multi-attribute failure mode analysis. Int. J. Qual. Reliab. Manag. 2000, 17, 1017–1033. [Google Scholar] [CrossRef] [Green Version]
  27. Braglia, M.; Bevilacqua, M. Fuzzy modelling and analytical hierarchy processing as a means of quantifying risk levels associated with failure modes in production systems. Technol. Law Insur. 2000, 5, 125–134. [Google Scholar] [CrossRef]
  28. Chan, F.T.S.; Kumar, N.; Tiwari, M.K.; Lau, H.C.W.; Choy, K.L. Global supplier selection: A fuzzy-AHP approach. Int. J. Prod. Res. 2008, 46, 3825–3857. [Google Scholar] [CrossRef]
  29. Kutlu, A.C.; Ekmekçioğlu, M. Fuzzy failure modes and effects analysis by using fuzzy TOPSIS-based fuzzy AHP. Expert Syst. Appl. 2012, 39, 61–67. [Google Scholar] [CrossRef]
  30. Newman, M.E.J. The Structure and Function of Complex Networks. SIAM Rev. 2003, 45, 167–256. [Google Scholar] [CrossRef] [Green Version]
  31. Boccaletti, S.; Latora, V.; Moreno, Y.; Chavez, M.; Hwang, D. Complex networks: Structure and dynamics. Phys. Rep. 2006, 424, 175–308. [Google Scholar] [CrossRef]
  32. Freeman, L.C. Centrality in social networks conceptual clarification. Soc. Netw. 1978, 1, 215–239. [Google Scholar] [CrossRef] [Green Version]
  33. Freeman, L.C. A Set of Measures of Centrality Based on Betweenness. Sociometry 1977, 40, 35. [Google Scholar] [CrossRef]
  34. Sabidussi, G. The centrality index of a graph. Psychometrika 1966, 31, 581–603. [Google Scholar] [CrossRef] [PubMed]
  35. Kitsak, M.; Gallos, L.K.; Havlin, S.; Liljeros, F.; Muchnik, L.; Stanley, H.E.; Makse, H.A. Identification of influential spreaders in complex networks. Nat. Phys. 2010, 6, 888–893. [Google Scholar] [CrossRef] [Green Version]
  36. Katz, L. A new status index derived from sociometric analysis. Psychometrika 1953, 18, 39–43. [Google Scholar] [CrossRef]
  37. Stephenson, K.; Zelen, M. Rethinking centrality: Methods and examples. Soc. Netw. 1989, 11, 1–37. [Google Scholar] [CrossRef]
  38. Zareie, A.; Sheikhahmadi, A.; Fatemi, A. Influential nodes ranking in complex networks: An entropy-based approach. Chaos Solitons Fractals 2017, 104, 485–494. [Google Scholar] [CrossRef]
  39. Ma, X.; Ma, Y. Identifying influential spreaders in complex networks based on entropy method. Int. J. Sci. 2018, 5, 133–137. [Google Scholar]
  40. Dehmer, M. Information processing in complex networks: Graph entropy and information functionals. Appl. Math. Comput. 2008, 201, 82–94. [Google Scholar] [CrossRef]
  41. Qiao, T.; Shan, W.; Yu, G.; Liu, C. A Novel Entropy-Based Centrality Approach for Identifying Vital Nodes in Weighted Networks. Entropy 2018, 20, 261. [Google Scholar] [CrossRef] [Green Version]
  42. Peng, S.; Yang, A.; Cao, L.; Shui, Y.; Xie, D. Social influence modeling using information theory in mobile social networks. Inf. Sci. 2017, 379, 146–159. [Google Scholar] [CrossRef]
Figure 1. Transformation and logical relation between failure modes, and their causes and effects.
Figure 1. Transformation and logical relation between failure modes, and their causes and effects.
Entropy 21 01230 g001
Figure 2. A case of structure diagram of the Failure Mode, Effects and Criticality Analysis (FMECA).
Figure 2. A case of structure diagram of the Failure Mode, Effects and Criticality Analysis (FMECA).
Entropy 21 01230 g002
Figure 3. An example of a weighted network.
Figure 3. An example of a weighted network.
Entropy 21 01230 g003
Figure 4. Argument structure in neighborhoods network, which is included as: (a) node j and m are first-order neighbors of node i; (b) node j is first-order neighbor of node i, and node m and k are second-order neighbors of node i; (c) node j and m are first-order neighbors of node i, and node k is the second-order neighbors of node i.
Figure 4. Argument structure in neighborhoods network, which is included as: (a) node j and m are first-order neighbors of node i; (b) node j is first-order neighbor of node i, and node m and k are second-order neighbors of node i; (c) node j and m are first-order neighbors of node i, and node k is the second-order neighbors of node i.
Entropy 21 01230 g004
Figure 5. The flow of the whole proposed method.
Figure 5. The flow of the whole proposed method.
Entropy 21 01230 g005
Figure 6. The weighted graph of HVAC system.
Figure 6. The weighted graph of HVAC system.
Entropy 21 01230 g006
Figure 7. Comparison results of each node’s total influence and safe threshold.
Figure 7. Comparison results of each node’s total influence and safe threshold.
Entropy 21 01230 g007
Table 1. The weights of one node to another.
Table 1. The weights of one node to another.
Between Two NodesWeightBetween Two NodesWeight
1–3 O 13 D 13 3–5 S 35
1–4 S 14 3–6 S 36
1–5 S 15 7–1 O 71 D 71
1–6 S 16 7–2 O 72 D 72
2–3 O 23 D 23 8–1 O 81 D 81
2–4 S 24 8–2 O 82 D 82
2–5 S 25 9–1 O 91 D 91
2–6 S 26 9–2 O 92 D 92
3–4 S 34
Table 2. The results of entropy centrality of each node and the corresponding ranking results.
Table 2. The results of entropy centrality of each node and the corresponding ranking results.
Node EC i s EC i f Total InfluenceNo.Node EC i s EC i f Total InfluenceNo.
10.72660.77590.75623230.120400.120417
20.65820.53370.583512240.120400.120417
30.65820.60170.62437250.120400.120417
40.65820.60030.62348260.45150.14850.269716
50.74760.49890.598411270.120400.120417
60.65820.59660.62139280.120400.120417
70.68760.69860.69425290.59330.47710.523614
80.72660.81750.78122300.47710.30100.371415
90.65890.60200.62486310.47710.30100.371415
100.65890.58110.612210320.47110.30100.371415
110.120400.120417330.47110.30100.371415
120.69010.77020.531513340.76110.69900.70604
130.120400.120417350.47110.30100.371415
140.120400.120417360.47110.30100.371415
150.120400.120417370.59330.47710.523614
160.120400.120417380.87850.90240.89291
170.120400.120417390.47710.30100.371415
180.120400.120417400.47710.30100.371415
190.120400.120417410.59330.47710.523614
200.120400.120417420.59330.47710.523614
210.120400.120417430.47710.30100.371415
220.120400.120417440.47710.30100.371415
Table 3. Failure mode of the Heating, Ventilation and Air Conditioning (HVAC) system ranked using traditional and alternative risk priority numbers (RPNs).
Table 3. Failure mode of the Heating, Ventilation and Air Conditioning (HVAC) system ranked using traditional and alternative risk priority numbers (RPNs).
Failure ModeOSDRPNIRPNERPNURPNLRPNECRPN
ValueRankValueRankValueRankValueRankValueRankValueRank
f186733632129477422,5925252730.75622
f23546010121035110178091778100.583510
f366725261963645716,9446240160.62435
f456515071681215810,0857217670.62346
f546512091591053980688207990.59849
f6884256520513,203395,3903240850.62137
f7986432123126,9731160,9711263610.69423
f8885320421213,3652119,2382250540.78121
f977734322126561553,7354253520.62484
f1z7371478774401698410216780.61228

Share and Cite

MDPI and ACS Style

Wang, L.; Dai, W.; Luo, G.; Zhao, Y. A Novel Approach to Support Failure Mode, Effects, and Criticality Analysis Based on Complex Networks. Entropy 2019, 21, 1230. https://doi.org/10.3390/e21121230

AMA Style

Wang L, Dai W, Luo G, Zhao Y. A Novel Approach to Support Failure Mode, Effects, and Criticality Analysis Based on Complex Networks. Entropy. 2019; 21(12):1230. https://doi.org/10.3390/e21121230

Chicago/Turabian Style

Wang, Lixiang, Wei Dai, Guixiu Luo, and Yu Zhao. 2019. "A Novel Approach to Support Failure Mode, Effects, and Criticality Analysis Based on Complex Networks" Entropy 21, no. 12: 1230. https://doi.org/10.3390/e21121230

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop