You are currently viewing a new version of our website. To view the old version click .
Applied Sciences
  • Article
  • Open Access

10 October 2025

A Unified Modelling Framework Combining FTA, RBD, and BowTie for Reliability Improvement

,
and
1
Department of Mechanical and Aerospace Engineering, School of Engineering, The University of Manchester, Manchester M13 9PL, UK
2
Jabatan Teknologi Kejuruteraan Mekanikal, Universiti Teknikal Malaysia Melaka, Hang Tuah Jaya, Durian Tunggal 76100, Malaysia
3
Alliance Manchester Business School, The University of Manchester, Manchester M13 9PL, UK
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Uncertainty and Reliability Analysis for Engineering Systems

Abstract

Ensuring reliability and safety is essential in complex energy systems such as wind turbines, where failures can trigger unexpected downtimes, severe incidents, and significant costs. This study proposes a hybrid BowTie-based reliability framework that integrates Fault Tree Analysis, Reliability Block Diagrams, and BowTie methodology to quantify risk and evaluate the effectiveness of safety barriers. The framework employs key reliability metrics including availability, probability of failure on demand, and probability of failure per hour, and supports scenario-based sensitivity analyses to explore redesign options. A simulation-based case study of a wind turbine generator subsystem is presented, using parameter values drawn from published reliability data. Results highlight that protective relays and automatic trip systems represent critical single points of defence, while improvements such as enhanced oil analysis and redundant dashboards reduce consequence frequency from 2.912 × 10−17 to 8.257 × 10−19 failures/h (a 97.16% reduction, nearly two orders of magnitude). Compared to conventional models, the proposed framework introduces explicit defence in depth modelling, improves computational compactness, and provides a practical decision support tool for asset managers by balancing safety and reliability. At this stage, the study should be regarded as a proof of concept that demonstrates feasibility and sets a foundation for future research and application to larger, more complex infrastructures.

1. Introduction

Reliability analysis is an essential method in engineering that concentrates on the design, operation, and maintenance of complex systems, guiding maintenance strategies to improve asset performance. Traditional methods, such as Fault Tree Analysis (FTA) and Reliability Block Diagrams (RBDs), remain prevalent, offering structured approaches to identify failure logic and assess system performance. FTA, a top-down approach, uses Boolean logic to estimate failure probability, while RBD offers a complementary view at the system level, illustrating how components and subsystems interact through series and parallel configurations to ensure system functionality. Both techniques have proven effective in safety-critical fields such as nuclear power, aerospace, and energy infrastructure. Despite their long-standing usefulness, each has notable limitations when used alone [,]. FTA, although straightforward and rigorous, can become unwieldy in large systems due to combinatorial complexity and is limited by its static nature, which hampers its ability to model repair processes, time-dependent phenomena, or conditional interactions []. Conversely, RBD allows quick system-level insights but relies on binary assumptions, making it challenging to represent multi-state, dependent, or sequential behaviours. These constraints are particularly problematic in modern critical infrastructure, such as wind turbines (WT), where systems operate under dynamic conditions and exhibit interdependent failure modes.
Recent studies have attempted to overcome these limitations by hybridising FTA, RBD, and related methods. For example, Rivera et al. [] suggest an integrated method that combines FTA, RBD, the Analytical Hierarchy Process (AHP), High Reliability Organisation (HRO), and Learning from Failures (LFF) tools to analyse long-term patterns of small to medium chronic failures in an Oil and Gas (O&G) organisation. However, this unified framework increases complexity and is sensitive to expert bias. Conversely, Kabir et al. [] address individual limitations by assigning large, mainly series or parallel segments to a modularisation technique using Binary Decision Diagram (BDD) and Markov models. This approach can reduce the size and complexity of the embedded FTA, preventing the exponential growth of cut sets. Still, it requires advanced solvers and can make model traceability across modules challenging. Cheng et al. [] share a similar viewpoint in their study on unified approaches, connecting FTA logic to a Hierarchical Belief Rule Base (BRB). They manage to mitigate issues related to excessive indexes and avoid combinatorial explosion [], but the framework’s scalability remains unvalidated, and it has a limited domain focus.
Recent work has also explored hybrid frameworks that combine the BowTie method with probabilistic reasoning to overcome its static nature and expand its analytical capabilities. For example, Khakzad et al. [] mapped a BowTie model into a Bayesian network to perform dynamic safety analysis. They noted that the BowTie approach remains popular for accident modelling but is limited by its static representation and inability to represent conditional dependencies. By translating the BowTie to a Bayesian network, probabilities can be updated in response to new information and causal relationships. Similarly, de Barnier et al. [] introduce a possibility-based BowTie to quantify uncertainties in barrier performance. Another dynamic risk-assessment study [] emphasises that BowTie is a visual method for depicting event progression from causes to effects, while a Bayesian network captures stochastic relationships. The translation from BowTie to Bayesian network modifies the representation to include intrinsic uncertainties while maintaining logical relationships. Although valuable, these unified methodologies often trade clarity for complexity, a lack of redundancy integration, and risk fragmentation in tool support across different methods []. The limitations of hybrid methods could lead to additional design and verification burdens affecting reproducibility and traceability. A comparative taxonomy of recent hybrid methods is summarised in Table 1, which positions the present work relative to state-of-the-art contributions.
Table 1. Comparative summary of hybrid reliability-modelling frameworks (2010–2024).
This review highlights clear research limitations within existing hybrid methods. Firstly, conventional models struggle to handle intricate systems due to their inability to reduce combinatorial complexity. Secondly, although hybrid models may capture uncertainty, they neglect redundancy and conditional interactions. Lastly, hybrid models retain domain-specificity that limits generalisation.
To address these limitations, this study introduces a hybrid BowTie-based reliability framework that integrates FTA’s top-down logical structure with RBD’s system-level quantitative features within a barrier-centric architecture. The framework tackles combinatorial complexity by compressing large FTA subtrees into modular BowTie substructures, where threats and barriers are organised using RBD configurations (series, parallel, or k-out-of-n). This modularisation prevents the exponential growth of minimal cut sets and ensures that barrier interactions remain traceable. Redundancy and conditional dependencies are explicitly represented, with series and parallel redundancy modelled through RBD logic, while barrier sufficiency and dependence are quantified using Risk Achievement Worth (RAW) and Barrier Importance Factor (BIF). Conditional probabilities are assigned to barriers and propagated through the BowTie logic, overcoming the binary constraints of traditional RBD models. Finally, the framework is designed to be generalisable, as the probability inversion and modular substitution techniques are independent of domain specifics and can be applied to any engineered system with barrier data. This makes the approach scalable and transferable beyond a specific case study, supporting wider critical infrastructures that require defence-in-depth and quantitative reliability justification.
Accordingly, this study is guided by the research question: Which failure scenarios and corresponding recovery pathways in the system architecture contribute most to overall risk, and where should redundancy or controls be implemented or redesigned to maximise reliability and safety? To answer this question, this study outlines measurable outcomes: (1) ranking of risk contribution (using Risk Achievement Worth); (2) quantified reliability improvements (reduction in failure frequencies) influenced by implemented strategies; (3) evidence of greater model efficiency, demonstrated through more streamlined pathways compared to conventional reliability model; (4) quantitative justification of barrier sufficiency, using metrics such as availability, average probability of failure on demand (PFDavg), and probability of failure per hour (PFH) under mission time. These outcomes are exemplified through a case study of a WT subsystem in Section 3 to ensure its practicality.
This paper is organised into six sections, including an introduction (Section 1) to promote a more precise understanding. Section 2 introduces the proposed framework architecture underlying the research. Section 3 concentrates on implementing the proposed framework in a case study of WT subsystems. Section 4 examines the results obtained from the BowTie framework computation. Section 5 discusses the outcomes produced by the proposed framework. Finally, Section 6 summarises the paper by reflecting on the significance and contributions of this study within the theoretical context.

2. Proposed BowTie Framework Architecture

This section provides the conceptual and methodological foundation of the study. The unified BowTie framework adapts several core components from traditional BowTie analysis, such as hazard, TE, threat, consequence, barrier, and escalation factor. Standard BowTie analysis employs two main methods: FTA as the threat pathway and Event Tree Analysis (ETA) as the consequence pathway, as shown in Figure 1. Unlike traditional methods discussed in this paper, the BowTie model includes human and socio-technical factors, thus extending beyond purely mechanical systems. Its dual representation allows risks to be quantified and risk-informed in decision-making for safety and performance improvement.
Figure 1. Standard BowTie diagram.
The proposed method enhances traditional BowTie by integrating RBD features, such as series, parallel, and k-out-of-n architectures, to arrange threat, barrier, and consequence positioning and sequencing, thereby offering a more flexible and scalable model. This integration follows a sequential workflow, as shown in Figure 2. First, FTA is initially developed to define threats and their causal structures, identifying logical combinations of basic events that lead to the TE. At this stage, it provides initial threat frequencies, λ t h r e a t , i . Next, the barriers, such as PFDavg, PFH, Human Error Probability (HEP) or conditional probability, Pconditional, are collected and converted into equivalent failure probability, Pfail, using standardised rules as presented in Table 2. This ensures consistent reliability representation and resolves unit mismatches between FTA probabilities and RBD reliability functions. Then, these barriers are organised in RBD, with AND gates represented as series chains and OR gates as parallel structures, preserving the logical relationships from FTA. These outputs are integrated into the BowTie framework, where the prevention side aims to avert threats, and the mitigation side manages the consequences if the TE occurs. This combination calculates the TE frequency, λ T E ( t ) , and the associated consequence frequencies, f C ( t ) . The findings based on λ T E ( t ) and f C ( t ) metrics are evaluated to observe the model’s effectiveness.
Figure 2. The workflow of FTA, RBD, and the BowTie integration framework.
Table 2. Illustrative of the Barrier Catalogue and conversion rule.
Figure 3 shows the detailed process flow in the proposed model to explain how it functions before exploring the following subsections.
Figure 3. The proposed unified Bowtie framework architecture.

2.1. Data Collection and Preprocessing

To advance the process, one should gather the data and preprocess it to achieve a consistent domain. The process starts with a list of threats derived from the basic event of FTA, which must be established beforehand, based on IEC 61025 []. The list should include the threat’s name, a unique identification code, and a description to facilitate easy tracking and identification. Each threat is then quantified with annual failure rates obtained from an established maintenance record, such as a Computerised Maintenance Management System (CMMS).
Another important tool in the proposed BowTie is the barrier’s information, also called the barrier catalogue. This catalogue includes details about preventive actions that stop threats from occurring. It contains the barrier name, barrier input type, expression type, unit dimension, role, input value, data sources and conversion rule, as illustrated in Table 2. Operational data such as annual demands, proof test dates, and repairs must be included in the catalogue.
Furthermore, it is important to note that before normalising input values into the same domain, the mission time, T, must be chosen, as each barrier may operate over different time intervals. Once T is selected, all input values of barriers are normalised into the same domain, such as converting failure rates into probabilities; this improves calculation accuracy. If the historical data are inconsistent across reporting years or incomplete, median values are used. Otherwise, if the data are missing, the values are supplemented by peer-reviewed literature or standard reliability databases. After data collection and normalisation are complete, the process moves on to the preventive chain side, as illustrated in Figure 3.

2.2. Preventive Pathway

The proposed framework’s preventive chain represents the left-hand side of the BowTie structure, where threats or basic events are systematically determined and controlled by proactive barriers before they escalate into the TE. Each barrier is selected from the barrier catalogue, which specifies its function, type and performance metric as demonstrated in Table 2. These quantitative metrics depend on barrier type, as outlined by the Centre for Chemical Process Safety (CCPS) []. Table 3 shows the mapping of barrier types and their corresponding quantitative metrics, along with descriptions.
Table 3. Barrier Types and Their Quantitative Metrics.
Each barrier is characterised by its attributes, as documented in the barrier catalogue. The proposed framework utilises RBD features by arranging barriers in series when there is a sequential dependence, or in parallel if there is redundancy, depending on the system architecture. For the preventive pathway, all equations are based on failure probability, similar to FTA. However, there is a slight difference when applying equations for series and parallel structures compared to the RBD and FTA theory models.
Within the BowTie model, regardless of whether the configuration is series or parallel, all barriers must fail for a TE to occur. As a result, both configurations have the same equations as follows:
P all_fail,pre, i ( t )   =   j B i P f a i l , p r e , i j t
where j B i means that each preventive barrier j belongs to the set of preventive barriers, B i . Pfail,pre,ij(t) is the failure probability of each preventive barrier j within threat i by time, t, and Pall_fail,pre,i(t) is the prevention path failure probability for threat i when all barriers have failed by time t. The derivation of Equation (1) differs from conventional RBD and FTA methods. In FTA and RBD, a series system requires all components to work, so a single failure causes system failure. Conversely, parallel systems need only one component to operate; for instance, the system fails only if all components fail. In the BowTie approach, these logics do not apply because barriers act as sequential safeguards. For the TE to happen, every barrier in the chain must fail, regardless of how the barriers are arranged. Although the equation appears similar, the model still incorporates redundancy or parallelism to enhance reliability. From Pall_fail,pre,i(t), the TE frequency, λ T E ( t ) , for each threat or basic event can be derived, as explained in Section 2.3 and Section 2.4.
Establishing barriers within the BowTie framework follows a few guiding principles, as recommended by CCPS []. First, the placement of barriers, whether triggered first or last, depends on the chronological sequence of their effect. This means preventive and mitigative barriers should be positioned logically based on their intended function. Second, active barriers, aside from those mentioned in Table 3, must incorporate elements of Detect-Decide-Action (DDA). Third, barriers’ properties should be independent, effective, and auditable. These principles are crucial for ensuring their proper functionality. Finally, to prevent common-mode failure, it is advisable to use more than one type of barrier on each pathway. Having multiple barrier types can compensate for the limitations of others and reduce the risk of simultaneous failure caused by a common cause.

2.3. Aggregate Top Event

At this stage, the goal is to compute the time-dependent aggregated TE frequency, λ T E ( t ) , by summing the contributions of all initiating threats. Each threat’s contribution is calculated as the failure rate of the basic event multiplied by the probability that the entire preventive pathway fails, Pfail,pre,ij(t). The resulting λ T E ( t ) , is then used to determine the frequencies of potential consequences, f C ( t ) . Table 4 represents a snapshot of the computation for each threat.
Table 4. Illustrative of each threat computation given barrier value and failure rate.
From Table 4, specific rules of the framework need to be adhered to obtain barrier failure probabilities from the input value. First, if the input value given is PFDavg, it must be inverted numerically to determine an equivalent barrier failure rate, λ b , by using the following:
PFD avg   =   1 1 e λ b T λ b T
Equation (2) is solved numerically for λ b using an initial guess λ 0 ≈ 2∙PFDavg/T. Then
R b , i j ( t ) = e λ b t
P fail , pre , i j ( t ) = 1 R b , i j = 1 e λ b t
where R b , i j is the reliability of each barrier j within threat i by time, t. Given that “t” is a mission time, T. Therefore, Pfail,pre,ij(T) = 1 e λ b T .
Second, if the input value given is PFH (failures per hour), then PFH = λ b . Therefore, Equation (4) can be used to determine Pfail,pre,ij(t). Otherwise, if the input value given is HEP (per-demand), then,
P fail , pre , i j ( T ) = 1 1 H E P n
In this case, n represents the number of demands during mission time, T, assuming the HEP remains constant. Lastly, if the input value is a conditional probability, Pconditional (socio-technical) or the probability of failure, F(t) (passive hardware), they are treated as per-mission Pfail,pre,ij(t) (constant),
P fail , pre , i j ( t ) = P c o n d i t i o n a l   O R   F ( t )
It is worth noting that for time series plots, the study uses Pfail,pre,ij(t) as a vector over time, while HEP, Pconditional, and F(t) remain constant.
Next, in the proposed BowTie logic, a TE occurs only if all preventive barriers for threat i fail. When this happens, the individual Pfail,pre,ij(t) values for each preventive barrier in the threat are obtained, and Equation (1) is applied to multiply these Pfail,pre,ij(t) values together. This product equals Pall_fail,pre,i (t). The Pall_fail,pre,i (t) is then used in the following formula:
λ T E , i ( t ) =   λ t h r e a t , i × P a l l _ f a i l , p r e , i t
λ T E , i ( t ) is the TE frequency of threat i, and λ t h r e a t , i is the failure rate of threat i. Equation (7) calculates the individual threat contribution of TE intensity, λ T E , i t , by considering the probability of failure when all barriers are failed within that threat i. Each calculated λ T E , i ( t ) , based on the individual threat i is then aggregated together using the following formula:
λ T E ( t ) =   i λ T E , i ( t )
The λ T E ( t ) value is then used in Section 2.4 to determine the consequence frequency, f C ( t ) , in the mitigation pathway.

2.4. Mitigation Pathway

The mitigation pathway on the right side of the BowTie represents mitigative barriers that reduce the likelihood of a TE leading to a particular consequence. This study computes time-dependent mitigation reliabilities, Rmit,ck(t), combines them based on the system’s architecture, and determines how frequently consequences occur over time. The analysis process for the mitigation pathway closely resembles that of the prevention pathway, where the barrier input value from the barrier catalogue must be converted into Pfail,mit,ck(t), as shown in Table 4. From Pfail,mit,ck(t), the mitigation pathway is translated into reliability, Rmit,ck(t), reflecting the probability of the system successfully preventing the consequence. Combining these success probabilities in series or parallel yields the overall mitigation chain reliability Rchain,mit,c(t).
Apply the same conversion rules used for prevention. If the input value is PFDavg, after solving Equation (2) to find λ b , use the reliability formula as follows:
R mit , c k ( t )   =   e λ b t , k M c
where,   k M c means each mitigative barrier, k, belongs to the set of mitigative barriers, M c . Rmit,ck(t) is the mitigative barrier reliability, k, at each consequence, c. If the input value is PFH, it is considered equivalent to λ b ( λ b = PFH). Subsequently, Equation (9) is used to compute Rmit,ck(t). In case of HEP value for behavioural barrier, after solving Equation (5) and obtaining Pfail,mit,ck(t), then
R mit , c k ( t ) = 1 P f a i l , m i t , c k t
Equation (10) also applies to the input values of F(t) (passive barrier) and Pconditional (socio-technical barrier).
This study’s mitigation logic topology follows the defence-in-depth principle, where the consequences can be prevented if at least one mitigation measure succeeds. Conversely, the outcome only occurs if all mitigation layers fail. The defence-in-depth principle does not apply to FTA, ETA, and RBD, because, whether in series or parallel arrangements, both topologies require at least one mitigative barrier to prevent the effect. Therefore, to determine Rchain,mit,c(t), both cases use the same equation as follows:
R chain , mit , c ( t )   =   1 k M c 1 R m i t , c k ( t )
Given the aggregated TE frequency, λ T E ( t ) , obtained from Equation (8), the time-dependent consequence frequency, f C , c ( t ) , is
f C , c ( t ) = λ T E ( t ) Pr m i t i g a t i o n   c h a i n   f a i l s   a t   t
Under defence-in-depth,
f C , c ( t ) = λ T E ( t ) × ( 1 R c h a i n , m i t , c t )
If the BowTie framework includes several mitigation pathways resulting in multiple consequences, then Equation (13) can be reformulated as follows:
f C ( t ) =   c = 1 f C , c ( t )
The computations above are then evaluated, and their outputs can serve as decision-support tools.

2.5. Barrier Parameterisation and Time-Dependent Mapping

In this study, time dependence is obtained directly from the exponential reliability model. The mission time is set to T = 8760   h (1 year), consistent with the typical annual operation and maintenance cycle of wind turbines and the reporting horizon of failure statistics in CMMS datasets. This choice ensures that the derived reliability metrics are directly aligned with industry practice and planning intervals. For any barrier characterised by PFDavg (low demand) or PFH, the framework first maps the input to an equivalent constant failure rate λ b , then computes the time-varying failure probability P f a i l ( t ) over the mission horizon [0 until 8760] 0.8760 h with a 1 h step. When PFDavg is specified over the mission time T (here T = 8760 h), λ b is obtained via Equation (2). When PFH is provided, the computation sets λ b = P F H . In both cases, once λ b is known, Equation (4) yields
P f a i l t = 1 e λ b t , t = 0 , 1 , 2 , , 8760   h .
These time series are then propagated through the BowTie logic to produce the top-event rate λ T E ( t ) and consequence frequency f C ( t ) , making the results explicitly time-dependent rather than single point values. This yields time-dependent results without imposing additional solver assumptions and relies only on the standard exponential form.

2.6. Evaluation, Decision Support and Framework Outputs

This section outlines the comparison framework and decision-support outputs used to assess BowTie scenarios. After calculating time-dependent reliability and availability metrics, as detailed in Section 2.2, Section 2.3 and Section 2.4, the study ranks barriers and threats using key measures such as BIF, and RAW. The framework also assesses design modifications like adding redundancy, reducing failure probabilities, and implementing process improvements through scenario comparisons. These evaluation results are summarised in tables and plots and integrated into a decision-making process that connects reliability improvements to practical interventions. This method facilitates transparent prioritisation of prevention and mitigation measures.

2.6.1. Importance Measures

Importance measures determine how each barrier influences overall system risk and aid in guiding design, testing, and investment decisions. This study uses two complementary measures, which are:
  • Risk Achievement Worth (RAW) measures the increase in λ T E ( t ) if a particular barrier completely fails ( P f a i l , i j ( t ) = 1). It assesses a barrier’s risk significance by comparing the baseline scenario to a scenario where the barrier is entirely failed. The RAW formula for barrier i is expressed as,
    RAW   ( B i ) = λ T E n e w   t o t a l   w h e n   B i   r e m o v e d λ T E b a s e l i n e   t o t a l
    λ T E ( t ) states that the TE frequency occurs with all barriers modelled as designed. On the other hand, λ T E ( n e w   t o t a l   w h e n   B i   r e m o v e d ) defines that the TE frequency occurs when barrier i is assumed always to fail ( P f a i l , i j ( t ) = 1). If RAW ≈ 1, this means barrier i has no significant influence on λ T E ( t ) , and removing it barely changes them. Otherwise, if RAW ≥ 1, barrier i is highly risk significant and its failure leads to a substantial increase in λ T E ( t ) . Therefore, RAW shows how much the risk affects the system if the barrier completely fails.
  • The Barrier Importance Factor (BIF) identifies which barriers significantly reduce λ T E ( t ) . It measures how much λ T E ( t ) could be lowered if these barriers were perfect. This concept offers a straightforward, quantitative method to prioritise improvements or actions for redundancy. The formula of BIF can be presented as follows:
    BIF   ( B i ) = T E 0 T E i T E 0 × 100 %
    TE0 represents the baseline λ T E ( t ) with all barriers modelled as usual. Conversely, TEi is the λ T E ( t ) if the barrier, B i , is considered perfect ( P f a i l , i j ( t ) = 0). A high BIF suggests that the barrier is crucial, and making it perfect could significantly lower the overall impact of λ T E ( t ) .
All significant measure results are displayed and visualised using a bar chart, clearly illustrating the significance of the findings.

2.6.2. Sensitivity Analysis Workflow

This study adopts a structured, scenario-based sensitivity analysis workflow to evaluate potential design and operational improvements. It begins by establishing a baseline that represents the current system setup. From this baseline, it develops alternative scenarios reflecting proposed barrier upgrades. Each scenario is characterised by explicit modifications to barrier parameters, such as reducing oil system failure probability. Multiple parameter changes can also be combined into scenario sets, allowing the assessment of joint effects.
For each scenario, the reliability parameters are recomputed using the exact inversion, as described in Section 2.2, Section 2.3 and Section 2.4. This avoids potential hidden biases that may arise if baseline conversions are reused without modification. Finally, the comparison results are plotted over time, t, using λ T E ( t ) and f C t as performance indicators to analyse the trend. The comparison framework is shown in Figure 4.
Figure 4. The comparison workflow for comparing baseline and alternative scenarios.

2.6.3. Model Efficiency

Model efficiency assesses computational and representational performance by comparing the BowTie aggregation to explicit ETA/FTA enumeration. This framework reports the minimal cut-set counts and sizes, and the total number of explicit event-tree sequences,
N ET = i = 1 N t h r e a t s 2 n m i t , i
Each TE with the number of mitigation, nmit, would branch per TE = 2 n m i t , i . The number of sequences the BowTie avoids representing explicitly is shown as follows:
N avoided   =   N E T N r e p
where Nrep indicates the number of sequences explicitly represented by the BowTie. Additionally, to validate the efficiency of the BowTie model, this framework compares the runtimes of calculating the consequence frequency, f C t , using the BowTie model versus explicit ETA enumeration. It also performs a numerical comparison of outcomes from both methods, ETA and BowTie, using the following formula:
Δ f   =   f C , b o w T f C , E T T
This value is then reported to assess whether it lies within tolerance.

3. Case Study

This section demonstrates how the proposed BowTie-reliability framework can be applied through a real case study. The study referenced here is conducted initially by Ozturk [], who examines WT failures using reliability methods and Machine Learning (ML). Ozturk focused solely on identifying criticality, modelling reliability, and predicting WT failure. However, this paper sees potential to expand the scope further, motivating the application of the proposed BowTie framework using Ozturk’s foundational information. Although their study addresses many reliability issues related to WT, it does not aim to reduce failure risks, prevent the TE, or mitigate failure consequences—areas prioritised here. As a result, this work develops two common reliability models, the FTA and RBDs, based on Ozturk’s data and additional insights from related studies. From this foundation, the BowTie model is constructed, assessed, and discussed.

3.1. Background of the Case Study

Wind energy is widely regarded as a leading renewable resource among alternative energy sources. Its environmentally friendly and sustainable qualities have driven rapid growth in its deployment. As the failure rate of WT increases significantly, the focus has shifted toward enhancing their reliability and availability to ensure continuous power generation. The study led by Ozturk, part of the Scientific Measurement and Evaluation Programme (WMEP) in Germany, is a key component of a government effort to analyse onshore WTs from 1989 to 2006. It compiled 64,000 maintenance and repair reports from 1500 turbines, representing over 15,000 years of operational data. Ozturk’s findings provide valuable insights into WT reliability, aiding the development and validation of a reliability modelling framework.
This study focuses on the generator as a key subcomponent of the WT system, selected based on its criticality in prior research. Both Ozturk [] and Parnon et al. [] identify the generators as the highest-ranked subsystem in their criticality analyses, though derived from different frameworks. This finding is also supported by Pulikollu et al. [], who consistently identify generators as the most vulnerable and costly assets, with failures such as imbalance, cracking, or lubrication deficiencies leading to sudden breakdowns, extended downtime, and high replacement costs. While the generator’s annual failure rate falls within the range of 1% to 4%, its downtime may lead to significant production losses and unplanned repair costs, estimated at around $100,000 to $225,000 []. Owing to this criticality, the generator is selected for developing the FTA and demonstrating the proposed framework. The following section provides further details on the development of both approaches.

3.2. Development of Reliability Modelling

This section illustrates the development of the FTA and RBDs based on a study conducted by Ozturk [] and other studies [,,]. It starts with comparing several established FTA diagrams created by Novaković et al. [], Márquez et al. [], and Kang et al. []. To produce an FTA based on these established studies, a screening criterion is specified as follows:
  • Include if:
    • Mentioned in ≥2 literature sources OR
    • Found in the dataset OR
    • Has a significant impact
As stated in Section 3.1, this study focuses on the generator as a subcomponent of the WT that requires evaluation. Consequently, Figure 5 illustrates an FTA diagram of the WT generator, developed based on the referenced studies [,,] and screening criteria. Table 5, furthermore, showcases the list of TEs, intermediate events, and basic events with sources of references.
Figure 5. FTA diagram of WT generator for the case study.
Table 5. Logic gates and principal events of the WT generator.
The RBD model, in Figure 6, is derived from the FTA diagram in Figure 5, based on studies by Ozturk [], Einarsson et al. [], and Linsday et al. []. Afterwards, the minimal cut set equation is formulated to construct the BowTie model.
Figure 6. RBD model of WT Generator.
Based on the FTA and RBDs, a minimal cut set can be formulated to determine the smallest set of subcomponent failures needed to cause the entire system to fail. The logic operator in Figure 5 consists solely of OR gates, which correspond to the arithmetic “+” sign in accordance with IEC 61025 []. Using this convention, the minimal cut set formula can be derived as follows:
F a i l   s t a t e = G 5
G 5 = G 9 + G 10
G 9 = L 6 + L 7
G 10 = L 8 + L 9
Derivation involving Equations (20)–(23) generates the final minimal cut set equation:
F a i l   s t a t e = L 6 +   L 7 + L 8 + L 9 =   L 6 ,   L 7 , L 8 , L 9
L6, L7, L8, and L9 constitute the primary first-order minimal cut sets that need to be emphasised in the BowTie model.

3.3. Development of BowTie Model

The BowTie model, clarified in Section 2 with an illustrative diagram in Figure 1 consists of several components, including the hazard, TE, the preventive pathway (left), the mitigation pathway (right), and the associated barriers. This subsection describes how the BowTie model is developed using a case study centred on the minimal cut set identified in Section 3.2.
Section 3.2 of this study reveals that L6, L7, L8, and L9 are the fundamental events of the developed FTA model in Figure 5. As first-order events, their states are highly susceptible to failure and need focused improvement. To convert information from FTA and RBD into the BowTie model, the minimal cut set is directly identified as threats. The consequences or effects of the TE follow the taxonomy of Ozturk []. Barriers, preventive and mitigative, are selected from the literature and industry practice to address each threat and consequence. The full BowTie diagram is presented in Figure 7.
Figure 7. The proposed BowTie model for the WT generator.
To ensure transparency and reproducibility, this study provides supporting materials alongside the BowTie model, including the assumption table listing modelling assumptions and units and quantitative data, such as failure rate and probability. The calculation methods have been presented in Section 2, from Equations (1)–(19). This information is summarised in tabular form, where Table 6 exhibits the modelling assumptions and metrics, Table 7 presents BowTie core elements, while Table 8, Table 9, Table 10, Table 11 and Table 12 detail the preventive and mitigative barriers associated with specific threats and consequences, supported by quantitative evidence from prior studies. The assumptions in Table 6 are adopted for demonstration purposes to keep the case study tractable; they are not rigid requirements of the framework and can be relaxed or adjusted depending on the application context.
Table 6. The modelling assumptions and metrics.
Table 7. The proposed BowTie core elements.
Table 8. Preventive barriers by threat (L6).
Table 9. Preventive barriers by threat (L7).
Table 10. Preventive barriers by threat (L8).
Table 11. Preventive barriers by threat (L9).
Table 12. Mitigative barriers by Consequence (C04).
Finally, the results and discussion sections include model validation. The validity of key modelling assumptions, as mentioned in Table 6 is implicitly tested through scenario-based sensitivity analysis in Section 2.6.2 and Section 3.4. By systematically varying barrier parameters, this analysis provides analytical insights into how deviations from baseline assumptions influence λ T E ( t ) and f C ( t ) .

3.4. Sensitivity Analysis

As outlined in Section 2.6.2, a sensitivity analysis is conducted to evaluate the robustness of the model by systematically varying key barrier parameters. Each manipulation represents a distinct scenario to observe the resulting trends in both λ T E ( t ) and f C ( t ) . In this case study, there are four scenarios, with one baseline for comparison purposes. Table 13 summarises these scenarios, where each represents modifications in barriers such as redundancy, reduction, and frequent proof-test frequency, as well as combined improvements across multiple barriers.
Table 13. Sensitivity analysis scenarios.
Each scenario is analysed and evaluated using the outlined workflow in Figure 4. The findings are then explained in Section 4.4.

4. Results

This section highlights the analysis results from the BowTie model applied to the WT case study. The outcomes emphasise WT’s reliability performance and the strategies for preventing and mitigating major failures. Findings are organised according to the research question outlined in Section 1, focusing on four key measurable aspects: risk contribution ranking, quantitative assessment of barrier adequacy, reliability improvements through scenario-based sensitivity analysis, and overall model efficiency.
Using Equation (1) through (19) with the provided information from Table 6, Table 7, Table 8, Table 9, Table 10, Table 11 and Table 12, the results are shown in Table 14, which addresses four measurable aspects of outcomes. The inversion of PFDavg values into λ b is implemented using the built-in fzero function in MATLAB R2025a Update 1 (Version 25.1.0.2973910). Initial guesses for λ b are taken from λ 0 ≈ 2∙PFDavg/T, where T = 8760 h represents one year of operation. Convergence is accepted when the absolute residual of the inversion equation, ϵ = 1 1 e b T λ b T P F D a v g T a r g e t , is less than 1   × 10 10 , where all results are well within tolerance between 10 12 and 10 14 , as presented in Table 15. However, if the residual is unable to achieve within the specified tolerance, the λ b value is taken from the approximated equation, 2∙PFDavg/T.
Table 14. Summary of BowTie outcomes.
Table 15. Validation of PFDavg-to- λ b inversion for selected barriers (mission time T = 8760 h).

4.1. Risk Contribution Ranking

RAW analysis, as described in Section 2.6.1, assesses barriers’ contribution to λ T E ( t ) assuming they fail completely. Figure 8 indicates that most barriers have relatively low RAW values, such as the CBM dashboard, routine checks, and oil analysis. This suggests that their absence would only slightly raise λ T E ( t ) . However, a few barriers show very high RAW values, notably the sync-check relays and trigger auto trip, which exceed 104. Additionally, rotor balancing, lube practice, and modern IED are also highly critical. These barriers act as vital single points of defence, with their effectiveness significantly controlling the likelihood of avoiding a hazardous outcome.
Figure 8. Barrier RAW analysis, including mitigation outcomes.
The pattern also demonstrates the defence-in-depth approach of the BowTie model. Barriers relying solely on human action, like lubrication practices, or static hardware, such as a soft starter, provide additional protection. However, active barriers, such as auto-trip triggers or check relays, play a more significant role in the RAW distribution. This suggests that while barriers not aligned with DDA elements can help mitigate hazards, those fulfilling DDA criteria are primarily responsible for protecting the system.
From a decision perspective, RAW analysis indicates that prioritising investment in maintaining and testing high-RAW barriers is crucial, since their failure could lead to exponential increases in system risk. Conversely, for barriers with lower RAW values, the model suggests they still contribute to system resilience but may need optimisation or streamlining, ensuring safety remains unaffected.

4.2. Barrier Importance Factor

The BIF measures how much each preventive barrier helps prevent λ T E ( t ) . A higher BIF shows that improving these barriers can significantly reduce λ T E ( t ) . Figure 9 displays the BIF results from the BowTie model.
Figure 9. Barrier Importance Factor with respect to λ T E ( t ) .
Figure 9 clearly shows that all three preventive barriers under threat L07 collectively contribute 100% to the λ T E ( t ) . This implies that the effectiveness of preventing the TE from happening is dependent on maintaining these barriers at their proper functioning level. Furthermore, these results also highlight that L07 is fully controlled by its associated barriers, meaning any failure or removal of these barriers would directly lead to an increase in λ T E ( t ) . Unlike other threats, where barrier contributions barely emerge and are distributed unevenly, L07 requires rigorous monitoring and maintenance.

4.3. Barrier Quantitative Assessment over Time

This section shows the trends of λ T E ( t ) and f C ( t ) over mission time, T. The goal is to observe how barrier systems behave along with their threats and consequences as time progresses. Figure 10 and Figure 11 display the λ T E ( t ) and f C t over a year, or 8760 h. As explained in Section 2.5, in all cases, barriers parameterised by PFDavg (over T = 8760 h) or PFH are mapped to an equivalent constant rate λ b , and their time-varying failure probability is computed using Equation (4). This gradual increase in P f a i l ( t ) over t explains the near-linear growth of λ T E ( t ) under constant λ t h r e a t and λ b from approximately 2.02 × 10−9 to 2.023 × 10−9 failures per hour during the mission, as shown in Figure 10. Although the increase is monotonic, the change remains minimal, indicating that barrier degradation is slow and the preventive configuration sustains a consistently low top-event rate across the operating horizon.
Figure 10. The λ T E ( t ) pattern over mission time, T.
Figure 11. The f C ( t ) pattern over mission time, T.
Figure 11 illustrates how f C ( t ) evolves over time, showing a rapid increase from 0 to 2000 h during the early mission phase. After this period, it gradually stabilises around 10−18 failures per hour. This effectively prevents the escalation of TE into serious consequences. The data suggest that, within a defence-in-depth framework, the occurrence of severe outcomes remains very low.
The combined reliability analysis shows that although λ T E ( t ) continues to rise over time because of barrier wear-out, the mitigation measures keep the impact of TE very low (≤10−17/h). This indicates the long-term effectiveness of the defence-in-depth strategy.

4.4. Scenario-Based Sensitivity Analysis Outcomes

Section 4.4 assesses the impact of barrier modifications on system reliability using a series of what-if scenarios outlined in Section 3.4. The findings are presented in tabular format in Table 16 and graphically in Figure 12 and Figure 13 to enable a quantitative and visual evaluation of barrier performance.
Table 16. The outcomes of scenario-based sensitivity analysis outcomes.
Figure 12. The baseline vs. scenarios of λ T E ( t ) .
Figure 13. The baseline vs. scenarios of f C t .
Table 16 shows that the baseline case results for both λ T E ( t ) and f C ( t ) are 2.023 × 10−9 failures per hour and 2.912 × 10−17 failures per hour, which serve as the reference point for comparison. Both tabular and graphical results display this as the highest frequency, emphasising the system’s vulnerability under the current barrier effectiveness.
In the initial alternate scenario, the failure probability of the oil analysis barrier decreases from 0.72 to 0.20. As a result, f C ( t ) drops sharply to 8.101 × 10−18 failures per hour, marking a 72.18% reduction. This notable decline is clearly shown in Figure 12 and Figure 13, where the curve for this scenario diverges significantly from the original baseline.
Focusing on the redundant dashboard scenario, it significantly benefits by reducing 89.95% of f C ( t ) , equating to 2.034 × 10−18 failures per hour. Figure 12 and Figure 13 show these findings, with the dashboard curve positioned well below the baseline and oil-analysis curves, highlighting the substantial impact of redundancy in operator interface barriers.
In contrast, cutting the proof-test interval of the auto-alarm in half did not influence λ T E ( t ) because the proof-test modification applies to a mitigation-side barrier, which affects the f C ( t ) . Therefore, no distinct curve appears in Figure 12. However, this approach slightly reduced failures, f C t , to approximately 2.911 × 10−17 per hour, or roughly 0.03%. The results are consistent with the plots in Figure 13, where the new curve overlaps with the baseline, indicating that this scenario does not contribute significantly to overall risk reduction. This behaviour can be explained by the fact that halving PFD avg would reduce the proof-test interval by half. When both parameters are halved, the underlying dangerous failure rate λ b remains unchanged. Consequently, the function f C ( t ) remains unaffected by this change, affecting only the time profile (which resets at each proof test) rather than the entire one-year outcome.
Lastly, the combined improvement between oil analysis and dashboard redundancy achieved the most significant outcome by lowering the f C ( t )   to 8.257 × 10−19 failures per hour, approximately 97.16% reduction. Figure 12 and Figure 13 display this curve positioned at the lowest point across the mission time, T.
Table 16 and plotted curves, Figure 12 and Figure 13, consistently show the most effective scenarios for oil analysis and dashboard barriers. Additionally, cutting the proof test period in half does not significantly reduce the auto-alarm proof test interval and has a limited impact. Using multiple approaches together can provide the most significant benefit, with a reduction of nearly two orders of magnitude.

4.5. Model Performance Comparison

This section assesses the effectiveness of the proposed BowTie model, as outlined in Section 2.6.3. It examines this assessment through minimal cut sets, runtime performance, and model compactness. The traditional FTA yields four first-order minimal cut sets, as derived in Equation (24). This equation suggests that these single basic events alone could potentially trigger TE, indicating that their presence makes the system highly fragile. Conversely, the proposed BowTie-based analysis expands the FTA model beyond Boolean logic. It captures the interaction of barriers across both pathways. In this case study, the proposed model identifies four dominant cut-sets of order four or higher, which are 4, 4, 5, and 4, as displayed in Figure 14. This chart illustrates that multiple barriers must fail together for TE to propagate, reflecting more realistically the defence-in-depth principles embedded in engineered systems. While this illustrates the usefulness of BowTie in demonstrating resilience, this study acknowledges that the observed difference is specific to this case, and outcomes may differ for other subsystems or system architectures.
Figure 14. The number and size of the cut-set of the BowTie model.
Another key feature of the BowTie model is its computational advantage, which is clear when comparing runtimes. Figure 15 shows that the BowTie aggregation method completes the task in around 0.0009 s, whereas full ETA enumeration takes 0.0729 s. This demonstrates that the framework can achieve efficiency gains while retaining analytical rigour. Although this case study involves a single subsystem, the results highlight the model’s potential for scaling to more complex systems where state-space growth poses a challenge.
Figure 15. A runtime comparison between the BowTie model and ETA.
Ultimately, the proposed BowTie model showcases its capability through its compact representation. As per Equations (18) and (19), the explicit ETA requires 64 distinct states to capture event sequences. In contrast, the BowTie model achieves the same analytical outcome using just 21 states, thereby eliminating 43 redundant states, as illustrated in Figure 16. This simplification of the BowTie model does not compromise analytical rigour, as evidenced by the value of Δf = 0.0000. While the state reduction achieved here is a clear advantage, the study notes that efficiency gains must always be balanced with the preservation of critical dependencies. In this case, the framework successfully maintained accuracy while improving compactness, underscoring its potential as a reliable yet efficient alternative to exhaustive enumeration.
Figure 16. Compactness comparison between BowTie and the ETA model.
Another aspect of model comparison is the performance difference between the TE probability, P T E ( t ) estimated using the proposed BowTie framework with the conventional FTA (threat-only) approach. Figure shows the FTA curve (orange, dashed) rises sharply during the initial phase and quickly stabilises around 10−2, reflecting the fragility implied when threats are modelled as direct precursors to the top event. In contrast, the BowTie curve (blue, solid) remains several orders of magnitude lower, stabilising in the range of 10−6–10−7 over the mission time. This outcome demonstrates the defence-in-depth effect: a top event occurs only when all associated preventive barriers fail, resulting in significantly reduced probabilities compared to the threat-only representation.

5. Discussions

The study answer the research question via four measurable outcomes: (i) risk contribution ranking using RAW and BIF (Figure 8 and Figure 9), (ii) quantified reliability improvements from scenario redesigns (Table 13; Figure 12 and Figure 13), (iii) quantitative evidence of barrier sufficiency over mission time (Figure 10 and Figure 11), and (iv) streamlined analysis relative to ETA/FTA (Figure 14, Figure 15 and Figure 16). The discussions presented in this section aim to interpret the main findings related to the research question in Section 1 and highlight their implications for system reliability and asset management.

5.1. Criticality of Barriers and Risk Contributions

The RAW findings in Section 4.1 emphasise significant variability in how individual barriers contribute to λ T E ( t ) . This inconsistency is clearly evident in key system components, such as sync-check relays and automatic trip triggers, which serve as single points of defence; their failure can directly cause system breakdown. Conversely, barriers like CBM dashboards and routine operator checks show a relatively low risk contribution to λ T E ( t ) . This suggests that removing these barriers would not significantly increase the λ T E ( t ) . Therefore, high-RAW barriers require strict routine maintenance, regular proof testing, and consideration of redundancy, while low-RAW barriers are optimised or rationalised depending on circumstances, such as operational costs.
Another important aspect of barrier contributions is the findings from BIF. It is essential to highlight that BIF analysis assumes barriers can either be perfected or improved. This implies that the probability of failure is negligible. According to BIF’s findings, all barriers at threat level L07 could significantly lower λ T E ( t ) , contradicting the conclusions reached by RAW. There are several fundamental differences between the BIF and RAW analyses. BIF focuses on the advantages of enhancing a barrier, while RAW evaluates the potential damage that would occur if the barrier fails. A barrier that performs well (with a low Pfail) may have a low BIF (indicating limited room for improvement) but a high RAW (suggesting severe consequences if compromised), and the reverse can also be true. In practice, maintenance managers can use RAW to identify which barriers need maximum protection, while BIF helps justify investments by estimating the return on risk reduction []. For example, improving the oil analysis programme reduces the probability of failure from 0.72 to 0.20 and lowers λ T E ( t ) by more than 70%, providing a clear business case for enhanced monitoring. By contrast, halving the proof-test interval for the automatic trip barrier has a negligible impact on risk, suggesting that resources would be better spent elsewhere.
These insights bridge the gap between technical analysis and financial decision-making. High-priority barriers (those with a high RAW) should be allocated greater inspection and testing budgets, as their failure would lead to prolonged outages and expensive repairs. In contrast, low-priority barriers may be grouped or de-scoped to save costs. BIF-driven improvements, such as upgrading vibration alarms or adopting more advanced oil-analysis sensors, can be compared against their implementation costs to evaluate the return on investment. This aligns with the broader reliability engineering literature, where risk-based inspection (RBI) and reliability-centred maintenance (RCM) frameworks are utilised to allocate maintenance resources based on both risk and cost considerations [].

5.2. Reliability Improvements Through Barrier Redesign

The scenario-based sensitivity analysis in Section 4.4 reveals that not all preventive or mitigation strategies yield proportional gains. While redundancy and lowering barrier failure rates lead to significant reductions in system risk, as shown in Table 13, simply increasing proof-test frequency yields minimal additional benefit. In this case study, halving the auto-alarm proof-test interval reduced f C ( t )   by ≈0.03% (Table 13), indicating minimal marginal benefit versus redundancy or Pfail reduction. This outcome is consistent with modern reliability engineering and barrier management principles, which emphasise targeting the most influential safeguards rather than applying uniform maintenance escalation. For example, Yuan et al. [] present a dynamic risk-informed safety barrier management approach where barrier interventions are prioritised based on current performance and risk contribution rather than scheduled intensification. Their method demonstrates that optimising high-leverage barriers yields more risk reduction per unit cost than blanket increases in inspection or testing intervals. Likewise, in the risk-based maintenance literature, Leoni et al. [] compare various RBM methods and show that prioritisation based on probability × consequence offers more efficient resource allocation than across-the-board maintenance increases. Hence, the results of this study, where proof testing offers little marginal gain while barrier redesign and redundancy deliver considerable benefits, align with the principle of maintenance prioritisation by risk importance, reinforcing that strategic intervention wins over intensification. This prioritise-by-influence result mirrors risk-based barrier management and RCM guidance, which favour targeting high-leverage safeguards over blanket escalation of proof-testing or inspection intervals [,,,].

5.3. BowTie Modelling and Scalability

One of the key benefits of the proposed BowTie framework is its ability to simplify reliability modelling without compromising accuracy. This can be seen through the minimal cut set analysis, where the BowTie model can produce higher-order cut sets (size 4–5), requiring multiple barriers to fail to escalate the TE. In contrast, conventional FTA in Figure 5 generates first-order cut sets, suggesting that a single failure of basic events is enough to cause a catastrophic event. This difference indicates that the BowTie framework better reflects the defence-in-depth strategies used in practice, which capture the system’s resilience rather than exposing single-point vulnerabilities. Additionally, the BowTie model can reduce computational states compared to ETA enumeration without losing crucial detail. This means the proposed model has a high potential for scalability, making it suitable for larger or more complex systems where combinatorial explosion is a significant concern. This pattern is consistent with defence-in-depth guidance, where layered safeguards raise the minimum failure-combination order required for escalation.

5.4. Barrier Sufficiency over Mission Time

Investigating barrier sufficiency quantitatively shows that λ T E ( t ) , increases linearly but remains nearly constant over the mission period due to its small slope effect. The consequence frequency, f C ( t ) , on the other hand, remains at negligible levels, approximately 10−17/h. These findings provide strong evidence that the barrier configuration in the case study is sufficient to maintain reliability over the operating horizon. In practice, the defence-in-depth strategy ensures that even with gradual wear-out and ageing effects, the probability of escalation to severe consequences is effectively controlled and minimised, strengthening confidence in current operational practice.

5.5. Practical Implications and Generalisability

From an asset management perspective, this study highlights the benefits of a risk-informed approach to barrier design and maintenance prioritisation. The comparison in Figure 17 reinforces this point, as relying solely on FTA tends to overstate system fragility by overlooking the role of barriers. Incorporating preventive and mitigative defences through the BowTie framework demonstrates that the likelihood of generator failure is drastically reduced by several orders of magnitude over the mission duration. For example, the combined oil-analysis + dashboard scenario reduces f C ( t ) by 97.16% to 8.257 × 10−19 h−1 (Table 16), illustrating the material impact of diagnostic upgrades on consequence frequency. For asset managers, this distinction is crucial because it clearly shows the value of barrier design and maintenance investments. Measures like trip relays, dashboards, and oil analysis directly lead to lower top-event risks. This approach thus supports risk-informed decisions, helping identify where resources should be focused and illustrating how defence-in-depth strategies offer meaningful improvements in reliability.
Figure 17. The performance difference of P T E ( t ) estimated using the proposed model and FTA.
The proposed BowTie model thus offers decision-makers a structured approach to effectively balance safety and reliability by quantitatively ranking barriers, assessing the impacts of redesign, and verifying sufficiency. This approach aligns with risk-based inspection (RBI) by focusing maintenance resources on critical equipment while optimising inspection schedules to reduce operational costs without compromising safety [,]. Concerning the WT paradigm, the findings of this study indicate the importance of emphasising diagnostic redundancy and hybridisation, which lead to the most significant decrease in failure rates. Regarding the importance of barriers, critical protective relays, and automatic trip triggers significantly enhance overall system reliability when properly maintained. On the other hand, barriers that have a minimal impact can be optimised or streamlined to prevent unnecessary waste of resources. This viewpoint aligns closely with the principles of reliability engineering, which emphasise the importance of achieving the optimal level of system reliability by balancing risk reduction with economic practicality throughout the asset’s lifecycle [].
Aside from the WT domain, the suggested BowTie methodology can also be applied to various critical infrastructures where a defence-in-depth approach is necessary to prevent a major incident. Yang et al. [] showcase this approach by combining BowTie analysis with a Bayesian network to improve risk management in oil storage facilities. This enhances emergency response strategies and supports operational decision-making.

5.6. Limitations and Future Research

Several limitations of this study should be noted. First, the case study is limited to the generator subsystem of a WT, which constrains the generalisability of the findings; applying the framework to other subsystems or different infrastructures would provide broader validation. Second, the analysis relies on the assumption of constant failure rates for threats and barriers, without accounting for repair, degradation, or ageing effects. Similarly, HEPs and conditional probabilities are treated as fixed values, overlooking potential variability due to factors such as operator experience, fatigue, or context. Third, the data sources span multiple years and industries, including technical reports and cross-sector studies, which may introduce inconsistencies and reduce direct transferability to wind energy systems. Fourth, barrier independence is assumed, with dependencies and common-cause failures not explicitly considered. Fifth, the framework is presented deterministically, without quantifying uncertainty or providing error bounds for the reported results. Finally, efficiency gains over ETA are demonstrated for a single subsystem only; additional benchmarking on larger and more complex systems is required to substantiate scalability. In this paper, these assumptions are partially probed via scenario-based sensitivity, as explained in Section 3.4 and Section 4.4, to observe directional robustness of λ T E t and f C ( t ) under barrier redesign.
Future research should build on this work by extending the framework to multiple subsystems and other critical infrastructures, incorporating non-constant failure behaviours such as repair and ageing, and refining the treatment of human and conditional probabilities to capture contextual variability. Explicit modelling of barrier dependencies and common-cause failures, together with validation against field data, would further enhance robustness. In addition, integrating uncertainty propagation techniques, such as Monte Carlo simulation or Bayesian inference, would enable the reporting of confidence intervals or error ranges, thereby strengthening interpretability. Finally, systematic benchmarking across larger case studies is needed to evaluate trade-offs between efficiency and accuracy, and to confirm the framework’s scalability for complex engineered systems.

6. Conclusions

This research has illustrated the BowTie framework based on reliability, which delivers a practical and effective method for quantifying system reliability, ranking barriers, and validating the adequacy of defence-in-depth measures. The framework provides a transparent and computationally efficient alternative to traditional reliability models, such as FTA, ETA, and RBD, by incorporating key metrics, including RAW and BIF, alongside cut-set analysis and scenario-based sensitivity evaluations. The findings indicate that high-risk barriers, such as protective relays and automation triggers, play a significant role in escalation pathways. In contrast, low-impact barriers exert only a marginal influence on overall system reliability. Furthermore, the higher-order cut sets generated by the proposed BowTie model provide a more realistic representation of the resilience of WT systems compared to the single-point vulnerabilities identified by conventional FTA.
The study also demonstrates significant efficiency gains: the BowTie model reduces runtime by approximately 40 times compared to ETA enumeration (0.0009 s vs. 0.0729 s) and compresses state requirements from 64 to 21 without loss of fidelity. These improvements highlight its potential for a scalable application. Nevertheless, several limitations remain. The current analysis is restricted to a single subsystem, assumes constant failure rates and barrier independence, and does not explicitly address common-cause failures or repair processes.
Future research should address these limitations by validating the framework across multiple WT subsystems and other infrastructures, incorporating non-constant failure behaviours (repair, ageing, degradation), and explicitly modelling dependencies between barriers. Large-scale benchmarking against conventional reliability techniques is also needed to assess scalability, computational trade-offs, and accuracy in complex engineered systems.

Author Contributions

Conceptualization, M.A.A.P., K.A.P. and J.K.S.; methodology, M.A.A.P.; software, M.A.A.P.; validation, M.A.A.P.; formal analysis, M.A.A.P.; investigation, M.A.A.P.; writing—original draft preparation, M.A.A.P.; writing—review and editing, K.A.P. and J.K.S.; visualization, M.A.A.P.; supervision, K.A.P. and J.K.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Acknowledgments

The authors would like to acknowledge the University of Manchester for providing facilities for access to journals, conference papers, and other important documents to support this research. During the preparation of this manuscript, the authors used Grammarly (Version v1.2.203.1770) for grammar and language editing purposes only. The authors have reviewed and edited the output and take full responsibility for the content of this publication.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AHPAnalytical Hierarchy Process
BIFBarrier Importance Factor
BRBBelief Rule Base
CBMCondition-based Monitoring
CCPSCentre for Chemical Process Safety
CMMSComputerised Maintenance Management System
DDADetect-Decide-Action
DFTDynamic Fault Tree
ETAEvent Tree Analysis
FTAFault Tree Analysis
HEPHuman Error Probability
HROHigh Reliability Organisation
IEDIntelligent Electronic Device
LFFLearning from Failures
MLMachine Learning
O&GOil and Gas
PANDPriority-AND
PFDavgAverage Probability of Failure on Demand
PFHProbability of Failure per Hour
RAWRisk Achievement Worth
RBDReliability Block Diagrams
ROIReturn on Investment
SPARStandardised Plant Analysis Risk
TETop Event
THERPTechnique for Human Error Rate Prediction
VFDVariable Frequency Drive
WMEPScientific Measurement and Evaluation Programme
WTWind Turbine

References

  1. Kabir, S. An overview of fault tree analysis and its application in model based dependability analysis. Expert Syst. Appl. 2017, 77, 114–135. [Google Scholar] [CrossRef]
  2. Ahmad, W.; Hasan, O.; Tahar, S.; Hamdi, M.S. Formal reliability analysis of oil and gas pipelines. Proc. Inst. Mech. Eng. 2018, 232, 320–334. [Google Scholar] [CrossRef]
  3. Chiacchio, F.; Compagno, L.; D’Urso, D.; Manno, G.; Trapani, N. Dynamic fault trees resolution: A conscious trade-off between analytical and simulative approaches. Reliab. Eng. Syst. Saf. 2011, 96, 1515–1526. [Google Scholar] [CrossRef]
  4. Rivera, G.; Yunusa-Kaltungo, A.; Labib, A. A hybrid approach for an oil and gas company as a representative of a high reliability organization. Saf. Reliab. 2021, 40, 130–156. [Google Scholar] [CrossRef]
  5. Kabir, S.; Aslansefat, K.; Sorokos, I.; Papadopoulos, Y.; Konur, S. A hybrid modular approach for dynamic fault tree analysis. IEEE Access 2020, 8, 97175–97188. [Google Scholar] [CrossRef]
  6. Cheng, X.; Long, M.; He, W.; Zhu, H. Milling fault detection method based on fault tree analysis and hierarchical belief rule base. Comput. Syst. Sci. Eng. 2023, 46, 2821–2844. [Google Scholar] [CrossRef]
  7. Khakzad, N.; Khan, F.; Amyotte, P. Dynamic safety analysis of process systems by mapping bow-tie into Bayesian network. Process Saf. Environ. Prot. 2013, 91, 46–53. [Google Scholar] [CrossRef]
  8. de Barnier, T.; Olivier-Maget, N.; Bourgeois, F.; Gabas, N.; Iddir, O. Towards an improved bowtie method for quantifying industrial risks. Chem. Eng. Trans. 2022, 90, 67–72. [Google Scholar] [CrossRef]
  9. Wu, X.; Huang, H.; Xie, J.; Lu, M.; Wang, S.; Li, W.; Huang, Y.; Yu, W.; Sun, X. A novel dynamic risk assessment method for the petrochemical industry using bow-tie analysis and Bayesian network analysis method based on the methodological framework of ARAMIS project. Reliab. Eng. Syst. Saf. 2023, 237, 109397. [Google Scholar] [CrossRef]
  10. Zhu, H.-L.; Liu, S.-S.; Qu, Y.-Y.; Han, X.-X.; He, W.; Cao, Y. A new risk assessment method based on belief rule base and fault tree analysis. Proc. Inst. Mech. Eng. Part O J. Risk Reliab. 2022, 236, 420–438. [Google Scholar] [CrossRef]
  11. International Electrotechnical Commission. IEC 61025: Fault Tree Analysis (FTA); IEC: Geneva, Switzerland, 2006. [Google Scholar]
  12. CCPS; Energy Institute. Bow Ties in Risk Management; Wiley: Hoboken, NJ, USA, 2018. [Google Scholar] [CrossRef]
  13. Ozturk, S. Forecasting Wind Turbine Failures and Associated Costs. Master’s Thesis, Columbia University, New York, NY, USA, 2019. [Google Scholar]
  14. Parnon, M.A.A.; Papadopoulou, K.A.; Sinha, J.K. A unified framework for asset ranking based on their criticality through case studies. Int. J. Qual. Reliab. Manag. 2025, 42, 2561–2586. [Google Scholar] [CrossRef]
  15. Pulikollu, R.V.; Dykes, K.; Guo, Y.; Sethuraman, L.; Parsons, T.; King, R.N.; Sethuraman, L.; Veers, P. Wind Turbine Generator Reliability Analysis to Reduce Operations and Maintenance (O&M) Costs; Sandia National Laboratories Report; Sandia National Laboratories: Livermore, CA, USA, 2023. [Google Scholar] [CrossRef]
  16. Novaković, B.; Radovanović, L.; Vidaković, D.; Đorđević, L.; Radišić, B. Evaluating wind turbine power plant reliability through fault tree analysis. Appl. Eng. Lett. J. Eng. Appl. Sci. 2023, 8, 175–182. [Google Scholar] [CrossRef]
  17. Márquez, F.P.G.; Pérez, J.M.P.; Marugán, A.P.; Papaelias, M. Identification of critical components of wind turbines using FTA over the time. Renew. Energy 2016, 87, 869–883. [Google Scholar] [CrossRef]
  18. Kang, J.; Sun, L.; Soares, C.G. Fault tree analysis of floating offshore wind turbines. Renew. Energy 2019, 133, 1455–1467. [Google Scholar] [CrossRef]
  19. Einarsson, S. Wind Turbine Reliability Modeling. Master’s Thesis, Reykjavík University, Reykjavík, Iceland, 2016. [Google Scholar]
  20. Linsday, J.; Briand, D.; Hill, R.; Stinebaugh, J.; Benjamin, A. Wind Turbine Reliability: A Database and Analysis Approach; Sandia National Laboratories: Albuquerque, NM, USA; Lawrence Livermore National Laboratory: Livermore, CA, USA, 2008. [Google Scholar] [CrossRef]
  21. Swain, A.D.; Guttmann, H.E. Handbook of Human Reliability Analysis with Emphasis on Nuclear Power Plant Applications (NUREG/CR-1278); U.S. Nuclear Regulatory Commission: Washington, DC, USA, 1983.
  22. May, A.; McMillan, D. Condition based maintenance for offshore wind turbines: The effects of false alarms from condition monitoring systems. In Proceedings of the ESREL 2013—Safety, Reliability and Risk Analysis: Beyond the Horizon, Amsterdam, The Netherlands, 29 September–2 October 2013; CRC Press: Boca Raton, FL, USA, 2013; pp. 783–789. [Google Scholar]
  23. Pepperl+Fuchs GmbH. Safety Manual SIL KFD0-RSH-1.4S.PS Relay Module; Pepperl+Fuchs: Mannheim, Germany, 2010. [Google Scholar]
  24. National Renewable Energy Laboratory (NREL). Gearbox reliability database (GRD) statistics. Available online: https://grd.nrel.gov/stats (accessed on 11 September 2025).
  25. NSK Ltd. Advanced Bearing Solutions for the Wind Industry; NSK Ltd.: Tokyo, Japan, 2018. [Google Scholar]
  26. Brewer, R.; Pelkey, A.; Miller, A. Limitations of Offline Oil Analysis for Determining Gearbox Health; Technical Report; Poseidon Systems: Rochester, NY, USA, 2018. [Google Scholar]
  27. Nogueira, W.F.; de Andrade, M.A.H.; de Souza, G.F.M. Wind turbine fault detection through autoencoder-based neural network and FMSA. Sensors 2025, 25, 4499. [Google Scholar] [CrossRef]
  28. Precision Electric. Variable Frequency Drives (VFDs)–Comprehensive Technical Overview; Technical Report; Precision Electric: Livermore, CA, USA, 2025. [Google Scholar]
  29. Kumar, R.R.; Waisale, L.O.; Tamata, J.L.; Tortella, A.; Kia, S.H.; Andriollo, M. Advanced fault detection and severity analysis of broken rotor bars in induction motors: Comparative classification and feature study using dimensionality reduction techniques. Machines 2024, 12, 890. [Google Scholar] [CrossRef]
  30. Gertman, D.I.; Blackman, H.S.; Marble, J.L.; Byers, J.C.; Smith, C.L. The SPAR-H Human Reliability Analysis Method (NUREG/CR-6883, INL/EXT-05-00509); U.S. Nuclear Regulatory Commission: Washington, DC, USA, 2005.
  31. Western Electricity Coordinating Council (WECC). 2023 Protection Systems Performance Report; WECC: Salt Lake City, UT, USA, 2024. [Google Scholar]
  32. Liebusch, F. Relays in Safety-Related Control Systems; White Paper; TE Connectivity: Galway, Ireland, 2020. [Google Scholar]
  33. Generowicz, M.; Martin, R. Introduction to the MoonSIF Spreadsheet Workbook: Failure Probability Model. I&E Systems Pty Ltd., Nov. 2023. Available online: https://creativecommons.org/licenses/by-sa/4.0/legalcode (accessed on 11 September 2025).
  34. Lawrance, G.; Paul, P.S.; Shylu, D.S.; Ebenezer Jacob Dhas, D.S.; Dineshkumar, C.; Jeyakumar, P.D.; Muthiya, S.J.; Getachew, N.A. Effect of metallic substrate and rubber elastic materials over passive constrained layer damping on tool vibration during boring process. J. Low Freq. Noise Vib. Act. Control. 2024, 43, 1139–1157. [Google Scholar] [CrossRef]
  35. U.S. Department of Defense. MIL-HDBK-217F: Reliability Prediction of Electronic Equipment; Department of Defense: Washington, DC, USA, 1991.
  36. Vairo, T.; Benvenuto, A.C.; Tedeschi, A.; Reverberi, A.; Fabiano, B. Make Bow-Tie Dynamic by Rethinking It as a Hierarchical Bayesian Network: Dynamic Risk Assessment of an LNG Bunkering Operation. Chem. Eng. Trans. 2022, 91, 277–282. [Google Scholar] [CrossRef]
  37. Yuan, S.; Reniers, G.; Yang, M. Dynamic-Risk-Informed Safety Barrier Management: An Application to Cost-Effective Barrier Optimization Based on Data from Multiple Sources. J. Loss Prev. Process Ind. 2023, 83, 105034. [Google Scholar] [CrossRef]
  38. Leoni, L.; De Carlo, F.; Paltrinieri, N.; Sgarbossa, F.; BahooToroody, A. On Risk-Based Maintenance: A Comprehensive Review of Three Approaches to Track the Impact of Consequence Modelling for Predicting Maintenance Actions. J. Loss Prev. Process Ind. 2021, 72, 104555. [Google Scholar] [CrossRef]
  39. Hosseinnia Davatgar, B.; Paltrinieri, N.; Bubbico, R. Safety barrier management: Risk-based approach for the oil and gas sector. J. Mar. Sci. Eng. 2021, 9, 722. [Google Scholar] [CrossRef]
  40. Kaliszewski, N.; Marian, R.; Chahl, J. A reliability centred maintenance-oriented framework for modelling, evaluating, and optimising complex repairable flow networks. Complex Intell. Syst. 2025, 11, 223. [Google Scholar] [CrossRef]
  41. Aven, T. Improving the foundation and practice of reliability engineering. Proc. Inst. Mech. Eng. Part O J. Risk Reliab. 2017, 231, 295–305. [Google Scholar] [CrossRef]
  42. Yang, D.; Xing, K.; Pan, L.; Lu, N.; Yu, J. Sustainable risk management framework for petroleum storage facilities: Integrating bow-tie analysis and dynamic Bayesian networks. Sustainability 2025, 17, 2642. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.