Anda di halaman 1dari 11

International J ournal of Computational Intelligence and Information Security, J uly 2014 Vol. 5, No.

4
ISSN: 1837-7823

CONSISTENCY OF A TWO-UNIT PARALLEL REDUNDENT SYSTEM WORKING IN
THREE DIFFERENT WEATHER CONDITIONS

Dr. Deepankar Sharma
Prof. & Dean-Academics, Divya J yoti College of Engg. & Tech., Modinagar, U.P.
Dr.Anshu Murarka
Dept. of Maths, Pillai Institute of I.T., Engg., Media Studies & Research, Mumbai
Avneesh Kumar
Research Scholar, Dept. of Maths, Sai Nath University, Ranchi


Abstract
In this paper, the author has done his exercise for the evaluation of consistency of a two-unit
parallel redundant system working in three different weather conditions. On failure of any one unit of
considered system, the whole system works in reduced efficiency state. Also, the whole system can fail
due to environmental reasons, like flood, storm etc. Repair facilities are always available to repair any
type of failure expected the case of environmental failure. An inspection is required before repair in case
of environmental failure. All the failures follow exponential time distribution whereas all repairs follow
general time distribution.
Since, the considered system is Non-Markovian, the author has utilized supplementary variables to
convert this into Markovian. Laplace transform has been used to solve the mathematical model of the
system. Availability function, reliability function and mean time to system failure have been computed.
Steady-state behaviour of the system and a particular case, have also been appended to improve practical
utility of the model. A numerical computation and its graphical illustration have also been mentioned in
the end to highlight important results of this study.
Key Words: Reliability, availability, mean time to failure, Supplementary variables, Laplace transform,
steady state behavior etc.








4

International J ournal of Computational Intelligence and Information Security, J uly 2014 Vol. 5, No. 4
ISSN: 1837-7823

1. Introduction
In our daily life, we feel that the ability of a various systems differ in different weather
conditions. For example, if we talk about computers, then its ability remains higher in cool and
dry weather as compared to other weather conditions. Keeping this fact in mind, the author has
considered a two-unit parallel redundant system for its ability evaluation while it is working in
three different weather conditions. Transition-state diagram for this system has been shown in
fig-1. Mathematical model has been developed for this system using inclusion of supplementary
variables. The probabilities of various transition states of fig-1 have been obtained.

2. Assumptions
The following assumptions have been associated with this chapter:
(i) Initially, the whole system is good and operable.
(ii) All failures follow exponential time distribution and are S-independent.
(iii) Nothing can fail form a failed state.
(iv) Repairs follow general time distribution and are always available to serve degraded or
failed state.
(v) In case, system is failed due to environmental reasons, an inspection is required
before the repair of the systems.
(vi) After repair, system works like new.

3. Notations
List of notations is as follow:
( ) 3 , 2 , 1 = i w
i

:
Failure rate for
th
i weather condition.
2 1
,e e
: Environmental failure rates.
) ( j
i
w
:
First order probability that failure in
th
i weather can be
repaired in time interval ) , ( + j j , conditioned that no repair is
given up to time j.
: Failure rate of one component of the system.
( ) m
: Inspection rate.
) (r : Repair rate of single unit of considered system.
5

International J ournal of Computational Intelligence and Information Security, J uly 2014 Vol. 5, No. 4
ISSN: 1837-7823

) (n
E

: First order probability that environmental failure can be
repaired in ) , ( + n n , conditioned that, no repair has given up
to time n.
) (
2
t P
: Pr {System is good and both the units working properly}.
) , (
1
t r P
: Pr {System is operable while one unit of system has been
failed}. Elapsed repair time lies in ) , ( + r r .
) , ( / ) , (
1 2
t j P t j P
i i
w w

:
Pr {System is failed in
th
i weather condition while 2/1 unit is
operable}. Elapsed repair time lies in the interval ) , ( + j j .
) , ( t m P
E

: Pr {System is failed due to environmental reasons}. Elapsed
inspection time lies in ) , ( + m m .
) , ( t n P
R
E

: Pr {System is failed due to environmental reasons and is ready
for repair}. Elapsed repair time lies in ) , ( + n n .

4. Formulation of mathematical model
Probability considerations and continuity arguments yield the following set of difference-
differential equations, which is continuous in time and discrete in space, governing the behaviour
of considered system:
( ) [ ] ( ) t P e w w w t P
2
1 3 2 1
2
) 2 1 )( 1 )( 1 )( 1 )( 1 ( = +
( ) ( ) ( ) ( )


+ +
0
2
0
2
2 2 1 1
, , dy y t y P dx x t x P
w w w w

( ) ( ) ( ) ( )


+ +
0
1
0
2
, ,
3 3
dr r t r P dz z t z P
w w

( ) ( )

+
0
, dn n t n P
E
R
E








6

International J ournal of Computational Intelligence and Information Security, J uly 2014 Vol. 5, No. 4
ISSN: 1837-7823


1
w

) (
1
x
w



2
w

) (
2
y
w




3
w

) (
3
z
w

2
1
e
) (r

2
e

1
w

) (
1
x
w


2
w ) (m
) (
2
y
w



3
w

) (
3
z
w




) (n
E




Fig-1: State-Transition Diagram







) (
2
t P

) , (
2
1
t x P
w

) , ( t m P
E

) , (
1
t r P

) , (
2
2
t y P
w

) , (
2
3
t z P
w

) , (
1
1
t x P
w

) , (
1
2
t y P
w

) , (
1
3
t z P
w

) , ( t n P
R
E

7

International J ournal of Computational Intelligence and Information Security, J uly 2014 Vol. 5, No. 4
ISSN: 1837-7823

( ) ( )
( ) ( ) ( ) ( )

+ + + + + =

0
2 2
1 3 2 1
2 2
1 1
, 2 dx x t x P t P e w w w
t P t P
w w

( ) ( ) ( ) ( )


+ +
0
2
0
2
3 3 2 2
, , dz z t z P dy y t y P
w w w w

( ) ( ) ( ) ( )


+ +
0 0
1
, , dn n t n P dr r t r P
E
R
E

(up to 1st approximation)
Taking limit as , 0 we obtain
( ) ( ) ( ) ( ) ( )


+ =

+ + + + +
0
2
0
2 2
1 3 2 1
2 2 1 1
, , 2 dy y t y P dx x t x P t P e w w w
dt
d
w w w w

( ) ( ) ( ) ( )


+ +
0
1
0
2
, ,
3 3
dr r t r P dz z t z P
w w

( ) ( )

+
0
, dn n t n P
E
R
E






(1)
Similarly, we obtain equations for all other states:
( ) ( ) 0 ,
2
=

t j P j
t j
i i


3 2 1
, , w w w i = and z y x j , , = respectively.

(2)
( ) 0 , ) (
1
2 3 2 1
=

+ + + + +

t r P r e w w w
t r

(3)
( ) ( ) 0 ,
1
=

t j P j
t j
i i


3 2 1
, , w w w i = and z y x j , , = respectively.

(4)
( ) ( ) 0 , =

t m P m
t m
E

(5)
( ) ( ) 0 , =

t n P n
t n
R
E E

(6)

Boundary conditions are:
( ) ( ) , , 0
2 2
t P i t P
i
=
3 2 1
, w and w w i =
(7)
8

International J ournal of Computational Intelligence and Information Security, J uly 2014 Vol. 5, No. 4
ISSN: 1837-7823

( ) ( ) , , 0
1 1
t P i t P
i
=
3 2 1
, w and w w i =
(8)
( ) ( ) ( ) ( ) ( ) ( )


+ + =
0
1
0
1 2 1
2 2 1 1
, , 2 , 0 dy y t y P dx x t x P t P t P
w w w w

( ) ( )

+
0
1
3 3
, dz z t z P
w w




(9)
( ) ( ) ( ) t P e t P e t P
E
1
2
2
1
, 0 + =
(10)
( ) ( ) ( ) , , 0
0

= dm m t m P t P
E
R
E


(11)
Initial Conditions are:
1 ) 0 (
2
= P
All other probabilities, at 0 = t , =0


(12)

5. Solution of the model
Taking Laplace transforms of equations (1) through (11) subjected to initial conditions
(12) and then on solving them one by one, we obtain:

( )
) (
1 2
s B
s P =

(13)
( )
( )
,
) (
2
s B
s iD
s P
i
i =
3 2 1
, w and w w i =

(14)
( )
) (
) ( 1
s B
s A
s P =

(15)
( )
( )
,
) (
) ( 1
s B
s D s iA
s P
i
i =
3 2 1
, w and w w i =

(16)
( )
[ ]
) (
) ( ) ( ) (
2 1
s B
s D s S s A e e
s P
E
R
E
+
=

(17)
( ) [ ] ) ( ) (
) (
1
2 1
s D s A e e
s B
s PE

+ =

(18)

9

International J ournal of Computational Intelligence and Information Security, J uly 2014 Vol. 5, No. 4
ISSN: 1837-7823

where ( )
( )
( ) ( ) ( ) ( ) ( ) [ ]
2 3 2 1 3 2 1
2 3 2 1
3 2 1
1
2
e w w w s D s S w s S w s S w
e w w w s D
s A
w w w + + + + + +
+ + + +
=



(19)
and ( ) ( ) ( ) s S w s S w s S w e w w w s s B w w w
3 2 1 3 2 1 1 3 2 1
2 ) ( + + + + + =
[ ] ) ( ) ( ) (
2 1
s S s S s A e e E +
( ) ( ) ( ) ( ) [ ] ( )
2 3 2 1 3 2 1 3 2 1
) ( 2 e w w w s S s S w s S w s S w s A w w w + + + + + + +



(20)
It is further interesting to note that
Sum of equations (13) through (18) =
s
1

This shows that the results obtained are correct.

6. Steady-state analysis of the system
Using Abels Lemma viz., ( ) ), ( ) (
0
say P s P s Lim t P Lim
s t
= =

provided limit on left exists;
we obtain the following steady-state behavior of considered system from equations (13) through
(18):
) 0 (
1
2
B
P

=
(21)
,
) 0 (
2
B
iM
P
i
i


3 2 1
, w and w w i =
(22)
) 0 (
) 0 (
1
B
A
P

=
(23)
,
) 0 (
) 0 (
1
B
M iA
P
i
i

=
3 2 1
, w and w w i =
(24)
[ ]
) 0 (
) 0 (
2 1
B
M A e e
P
E R
E

+
=
(25)
[ ]
) 0 (
) 0 (
2 1
B
M A e e
P
E

+
=


(26)
where ( )
0
) 0 (
=

=
s
s B
ds
d
B
( ) 0 E
E
S M

= etc.
10

International J ournal of Computational Intelligence and Information Security, J uly 2014 Vol. 5, No. 4
ISSN: 1837-7823

and
[ ]
) (
) ( 1 2
) 0 (
2 3 2 1 3 2
2 3 2 1
e w w w S w e
e w w w S
A
+ + + +
+ + +
=




7. Particular case
When all repairs, inspection rates follow exponential time distribution
In this case, setting ( ) ( )
i
i
i
E
E
E
s
s S
s
s S

+
=
+
= , for
3 2 1
, , w w w i = , etc. in equations (13)
through (18), we can obtain the Laplace transforms of various transition-state probabilities for
this particular case.

8. Availability of the system
Availability of the considered system is given by

+ + + +
+
+ + + + +
=
2 3 2 1 1 3 2 1
2
1
2
1
) (
e w w w s e w w w s
s Pup


Taking inverse Laplace transform, we get
( )
( )t e w w w
up
e
e e
t P
1 3 2 1
2
1 2
2
2
1
+ + + +


+ =



( )t e w w w
e
e e
2 3 2 1
1 2
2
2
+ + +

(27)
Also, ) ( 1 ) ( t P t P
up down
= (28)
It is worth noticing that 1 ) 0 ( =
up
P
9. Reliability and M.T.T.F. of the system
For the considered system, we have
1 3 2 1
2
1
) (
e w w w s
s R
+ + + + +
=


( )
( ) t e w w w
e t R
2
1 3 2 1
+ + + +
=

(29)
Again, M.T.T.F. = ( )

0
dt t R

1 3 2 1
2
1
e w w w + + + +
=

(30)
11

International J ournal of Computational Intelligence and Information Security, J uly 2014 Vol. 5, No. 4
ISSN: 1837-7823


10. Numerical computation
For a numerical computation, we consider the following values for different failure rates:
008 . 0 , 003 . 0 , 06 . 0
2 1
= = = e e
03 . 0 , 05 . 0 , 07 . 0
3 2 1
= = = w w w
Putting = 2 , 1 , 0 t and above values in (27), (29) and (30). We compute table-1 and the
corresponding graphs have been shown in fig-2, 3 and 4 respectively.


t
(t) P
up

W1=0.07
W2=0.05 A1
W3=0.03
W1=0.02
W2=0.03 A2
W3=0.09
W1=0.03
W2=0.10 A3
W3=0.04
0 1 1 1
1 0.857883 0.866505 0.840895
2 0.735572 0.750432 0.706730
3 0.630404 0.649603 0.593693
4 0.540049 0.562088 0.498528
5 0.462474 0.486185 0.418463
6 0.395913 0.420395 0.351143
7 0.338834 0.363402 0.294568
8 0.289910 0.314056 0.247045
9 0.247994 0.271348 0.207142
10 0.212095 0.234401 0.173649
Table-1

12

International J ournal of Computational Intelligence and Information Security, J uly 2014 Vol. 5, No. 4
ISSN: 1837-7823

Availability Vs Time
0
0.2
0.4
0.6
0.8
1
1.2
1 2 3 4 5 6 7 8 9 10 11
Ti me-->
A
v
a
i
l
a
b
i
l
i
t
y
-
-
>
A1
A2
A3
0
0.2
0.4
0.6
0.8
1
1.2
1 2 3 4 5 6 7 8 9 10 11
Time ----->
R
e
l
i
a
b
i
l
i
t
y


-
-
-
-
-
>

Fig-2: Availability Vs Time Fig-3: Reliability Vs Time

Fig-4: MTTF Vs Failure rate


11. Results and discussion
Observation of table-1 and fig-2 reveals that availability remains highest for second set of
data (i.e.
1 3
w w > and
2
w ). In other words, availability of considered system will remain best
when values of
1
w and
2
w are low as compared to
3
w .
Examination of fig-3 yields that reliability of considered system decreases slowly in the
beginning but thereafter it decreases rapidly with increase in the values of time t.
Fig-4 shows that mean time to failure of the considered system decreases nearly in a constant
manner as we make increase in the value of failure rate .
0
1
2
3
4
5
6
7
.01 .02 .03 .04 .05 .06 .07 .08 .09 .10

----->
M
.
T
.
T
.
F
.


-
-
-
-
-
>


13

International J ournal of Computational Intelligence and Information Security, J uly 2014 Vol. 5, No. 4
ISSN: 1837-7823

Also, it is worth noticing that system remains available continuously although it efficiency
decreases with time.

12. References

[1]. Adachi, K. and M. Kodama (1980); Availability analysis of two unit warm standby system with
inspection time, Microelectron Reliab., 20, 449-455.
[2]. Agnihotri, R.K. and S.K. Satsangi (1996); Two unit identical system with priority based on repair
and inspection, Microelectron Reliab., 36, 279-282.
[3]. Dhillon, B.S. and N-Yang (1992); Reliability and availability analysis of warm standby with
common cause failure and human error, Microelectron Reliab., 32, 561-576.
[4]. Goel, L.R., P. Srivastava and R. Gupta (1992); Two unit cold standby system with correlated
failures and repairs, Int. Jr. of System Science, 23(3), 379-391.
[5]. Goel, L.R. and P. Srivastava (1991); Profit analysis of a two unit redundant system with provision
for rest and correlated failures and repairs, Microelectron Reliab., 31(5), 827-833.
[6]. Gopalan, M.N., R. RadhaKrishna and A. Vijay Kumar (1984); Cost benefit analysis of a two unit
cold standby system subject to slow switch, Microelectron Reliab., 24, 1019-1021.
[7]. Kumar, A. and R. Lal (1979); Stochastic behaviour of a two unit standby system with constant
failure and intermittently repair facility Int. Jr. of System Science, 10(6), 589-603.
[8]. Murari, K. and Vibha Goel (1984) Comparison of two-unit cold standby reliability models with
three types of repair facilities Microelectron Reliab., 24(1), 35-39.
[9]. Osaki, S. (1972); Reliability of a two-unit standby redundant system with preventive
maintenance, IEEE Trans. Reliab., R-21, 24-29.
[10]. Singh, S.K. and A.K. Mishra (1994); Profit evaluating of a two unit cold standby redundant
system with two operating systems; Microelectron Reliab., 34(4), 747-750.

14

Anda mungkin juga menyukai