An overview of fault tree analysis and its application in model based dependability analysis
View/ Open
Article (1.115Mb)
Download
Publication date
2017-072017-07
Author
Kabir, SohagKeyword
Dynamic fault treesExpert systems
Fault tree analysis
Model based dependability analysis
Reliability
Risk analysis
Safety analysis
Rights
© 2017 Elsevier. Reproduced in accordance with the publisher's self-archiving policy. This manuscript version is made available under the CC-BY-NC-ND 4.0 license.Peer-Reviewed
YesAccepted for publication
2017-01-29
Metadata
Show full item recordAbstract
Fault Tree Analysis (FTA) is a well-established and well-understood technique, widely used for dependability evaluation of a wide range of systems. Although many extensions of fault trees have been proposed, they suffer from a variety of shortcomings. In particular, even where software tool support exists, these analyses require a lot of manual effort. Over the past two decades, research has focused on simplifying dependability analysis by looking at how we can synthesise dependability information from system models automatically. This has led to the field of model-based dependability analysis (MBDA). Different tools and techniques have been developed as part of MBDA to automate the generation of dependability analysis artefacts such as fault trees. Firstly, this paper reviews the standard fault tree with its limitations. Secondly, different extensions of standard fault trees are reviewed. Thirdly, this paper reviews a number of prominent MBDA techniques where fault trees are used as a means for system dependability analysis and provides an insight into their working mechanism, applicability, strengths and challenges. Finally, the future outlook for MBDA is outlined, which includes the prospect of developing expert and intelligent systems for dependability analysis of complex open systems under the conditions of uncertainty.Version
Accepted manuscriptCitation
Kabir S (2017) An overview of fault tree analysis and its application in model based dependability analysis. Expert Systems with Applications. 77: 114-135.Link to Version of Record
https://doi.org/10.1016/j.eswa.2017.01.058Type
Articleae974a485f413a2113503eed53cd6c53
https://doi.org/10.1016/j.eswa.2017.01.058
Scopus Count
Collections
Related items
Showing items related by title, author, creator and subject.
-
Performance Analysis and Enhancement of QoS Framework for Fixed WiMAX Networks. Design, analysis and evaluation of 802.16 Point-to-Multipoint (PMP) Quality of Service Framework based on uplink scheduler and call admission control analysis.Awan, Irfan U.; Laias, Elmabruk M. (University of BradfordSchool of Informatics, Department of Computing., 2010-05-28)Given the current developments and advances in the scientific and technological aspects of human knowledge and introducing new approaches in various fields of telecommunication technologies and industries, there has been an increasing growth in its players¿ plans and a positive change in their outlooks in order to achieve the target of "anywhere and anytime access". Recent developments of WiMAX (Worldwide interoperability for Microwave Access) networks, as a sign of increasing needs and demands for new telecommunication services and capabilities, have led to revolutions in global telecommunication which should be perceived properly in terms of the commercial and technical aspects in order to enjoy the new opportunities. Most experts believe that WiMAX technology is a preliminary step to develop Fourth Generation networks known as 4G technologies. It has not only succeeded in the utilization of several of the latest telecommunication techniques in the form of unique practical standards, but also paved the way for the quantitative and qualitative developments of high-speed broadband access. IEEE 802.16 Standard introduces several advantages, and one of them is the support for Quality of Services (QoS) at the Media Access Control (MAC) level. For these purposes, the standard defines several scheduling classes at MAC layer to treat service flow in a different way, depending on QoS requirements. In this thesis, we have proposed a new QoS framework for Point-to-Multi Point (PMP) 802.16 systems operating in Time Division Duplexing (TDD) mode over a WirelessMAN-OFDM physical layer. The proposed framework consists of a Call Admission Control (CAC) module and a scheduling scheme for the uplink traffic as well as a simple frame allocation scheme. The proposed CAC module interacts with the uplink scheduler status and it makes its decision based on the scheduler queue status; on the other hand, the proposed scheduling scheme for the uplink traffic aims to support realtime flows and adapts the frame-by-frame allocations to the current needs of the connections, with respect to the grants boundaries fixed by the CAC module. Extensive OPNET simulation demonstrates the effectiveness of the proposed architecture.
-
Understanding the Corpus of E-Government Research: An analysis of the literature using co-citation analysis and social network analysisSaip, M.A.; Kamala, Mumtaz A.; Tassabehji, Rana (2016-09)The growing body of published e-government literature highlights the importance of e-government in society and the need to make sense of e-government by academia. In order to understand the future of e-government, it is important to understand the research that has been conducted and highlight the issues and themes that have been identified as important by empirical study. This paper analyses the corpus of e-government research published from 2000 to 2013 using Bibliometric and Social Network Analysis (SNA) methods to develop an intellectual structure of e-government research. Factor analysis, multidimensional scaling and centrality measurement are also applied to the e-government dataset using UCINET to identify the core influential articles in the field. This study identifies three core clusters of e-government research that centre around (i) e-government development models (ii) adoption and acceptance of e-government, and (iii) e-government using social media and highlights areas for future research in the field. Discover the world's research
-
Threat analysis versus risk analysis in intelligence and security assessmentAdeka, Muhammad I.; Shepherd, Simon J.; Abd-Alhameed, Raed (2014)A realisation of the relationships among the security terms threat, vulnerability and risk, led to a perception of inconsistency about the security assessment procedure in the defence and public security industry in Nigeria. This is a practice whereby threat analysis is usually over-emphasised to the detriment of vulnerability and risk analyses. An original misconception surrounding the term analysis, as employed in the Intelligence Cycle, and its opposite counterpart, synthesis, was suspect. This paper was designed to sort out the technical relationship between analysis and synthesis, with a view to exploiting the implications optimally. It was revealed that the two terms are opposite in meaning but need to be intricately inter-woven in their employment as evaluation techniques. Unfortunately, most intelligence and security “analysts” embark on analysis with little or no idea about synthesis, thus muddling up the two concepts to the advantage of analysis. This original misconception led to a culture of non systematism and haphazardness in the intelligence assessment procedure. This culture was transmitted, in situ, from intelligence „analysis‟ to security „analysis.‟ Thus, the terms vulnerability and risk in security assessment suffer an almost identical fate with synthesis. It is the same reason that is most probably responsible for the divergence in the security assessment procedure between the public and private segments of the security industry. The implications of this anomaly include the virtual disappearance of synthesist in the global professional vocabulary of intelligence and security organisations, except for India; with resultant inconsistencies in the definition of intelligence analysis, and a culture of lack of systematism and accountability in the security assessment procedure. It is proposed that the phrase intelligence analysis, as employed in intelligence processing, should be replaced with intelligence synthesis. Intelligence products should be made amenable to re-evaluation and accountability. In military and security operations, the object of security assessment should be risk analysis, as opposed to threat analysis. Newly suggested terminologies are analosynthesis, synthonalysis and equisynalysis. Similarly, thesis, as a synonym of dissertation, should be replaced with synthesis.