Next Article in Journal
Using a Strongly Intense Observable to Study the Formation of Quark-Gluon String Clusters in pp Collisions at LHC Energies
Next Article in Special Issue
Two-Stage Fuzzy Interactive Multi-Objective Approach under Interval Type-2 Fuzzy Environment with Application to the Remanufacture of Old Clothes
Previous Article in Journal
A Novel Disturbance Rejection Method Based on Robust Sliding Mode Control for the Secure Communication of Chaos-Based System
Previous Article in Special Issue
Law of Large Numbers, Central Limit Theorem, and Law of the Iterated Logarithm for Bernoulli Uncertain Sequence
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Risk-Based Maintenance Optimization for a Subsea Production System with Epistemic Uncertainty

1
College of Artificial Intelligence, Tianjin University of Science and Technology, 13th Street, TEDA, Tianjin 300000, China
2
Advanced Structural Integrity International Joint Research Centre, Tianjin University of Science and Technology,1038 DaguNanlu, Hexi District, Tianjin 300000, China
3
College of Electronic Information and Automation, Tianjin University of Science and Technology, 1038 DaguNanlu, Hexi District, Tianjin 300000, China
*
Author to whom correspondence should be addressed.
Submission received: 11 July 2022 / Revised: 30 July 2022 / Accepted: 10 August 2022 / Published: 11 August 2022
(This article belongs to the Special Issue Fuzzy Set Theory and Uncertainty Theory)

Abstract

:
The lack of operation and maintenance data brings difficulties to traditional risk assessment based on probability methods. Therefore, experts are invited to evaluate the key performance indicators related to system risk. These evaluation results are usually described by ambiguous language, so they have epistemic uncertainty. Uncertainty theory is a branch of mathematics used to model experts’ degrees of belief. The uncertain measure has duality, that is, some symmetry, which means that the sum of the uncertain measure of an event and the uncertain measure of its complementary set is equal to 1. Therefore, the risk occurrence time of each basic event evaluated by experts is modeled by the uncertain variable in this article. Then, the risk assessment method of systems with epistemic uncertainty is proposed based on an uncertain fault tree analysis. Furthermore, two risk-based maintenance optimization models for systems with epistemic uncertainty are established. In particular, the leakage risk assessment method and the two risk-based maintenance optimization models for a subsea production system are considered, and the optimization results are given. The optimization results can help practitioners to warn of the leakage risk and make scientific maintenance decisions based on expert knowledge, so as to extend the service life of subsea production systems.

1. Introduction

With the sustained and rapid development of the national economy, the demand for oil and gas resources all over the world is becoming more and more urgent. Marine oil and gas reserves are rich, which is of great significance in the energy strategy. Therefore, the exploration of marine oil and gas resources is also increasing. Submarine accidents have gradually increased with the rapid development of the offshore oil and gas industry, which can cause pipeline breaks, oil and gas leakage, serious environmental pollution, huge economic losses, and even casualties. As one of the most widely used production facilities operates in the submarine environment, it is necessary to make quantitative risk assessment and scientific maintenance decision-making for subsea production systems.
A fault tree (FT) is a tree-logic causality diagram, which uses event symbols and logic gate symbols to describe the causality between various events in the system. The “AND” gate implies that the output event will occur if all the input events occur, while the “OR” gate implies that the output event will occur if any one of the input events occur. Fault tree analysis (FTA) is a top–down deductive failure analysis for estimating the risk by using Boolean logic. FTA solves the occurrence probability of the top event according to the probability of occurrence of each basic event. In the past few decades, FTA has been successfully applied in many fields for risk assessment. For instance, Ruijters and Stoelinga [1] surveyed over 150 papers on FTA and provided an in-depth overview of the state-of-the-art in FTA. Sianipar and Adams [2] presented the use of a fault tree for the qualitative and quantitative evaluation of element-interaction phenomena. Volkanovski et al. [3] analyzed the reliability of a power system using a fault tree, in which the fault trees were related to the disruption of energy delivery from generators to the specific load points. Sun et al. [4] proposed a reliability-assessment method for a cyber-physical distribution network, in which the sequential fault processing and corresponding results considering the cyber impact were established based on the fault tree. Ikwan et al. [5] used a quantitative analysis of relevant risks through the development of fault-tree-analysis and risk-analysis methods to aid in real-time risk prediction and safety evaluation of leaks in a storage tank. Bhsttacharyya and Cheliyan [6] considered the optimization problem of a subsea production system for cost and reliability using its fault tree model. Based on the historical fault data of the spreaders accumulated during their online service for 13 years, Zheng et al. [7] built a complete spreader fault tree with three layers of fault phenomena, fault classification, and fault causes. Dickerson et al. [8] was concerned with developing a formal transformation method that mapped control flows modeled in unified modeling language activities to semantically equivalent fault trees. Ben El-Shanawany et al. [9] developed a closed-form approximation for the fault tree’s top event-uncertainty distribution, which was applicable when the uncertainties in the basic events of the model were log-normally distributed. Matsuoka [10] presented a procedure to solve mutually dependent fault trees in the expression of success events. Wang et al. [11] built a fault tree to analyze the causes of fire accidents and used the the Fussell Vesely importance method to compare the contribution degrees of the basic events.
In conventional FTA, the probabilities of failure of basic events are considered as exact values or random variables. However, the data are severely lacking in the field of subsea production systems, so it is unrealistic to evaluate the failure probabilities of basic events in its fault tree. Then, experts are invited to evaluate the degrees of belief about basic events. Cheliyan and Bhattacharyya [12] introduced fuzzy set theory to deal with subjective opinions of experts and calculated the failure probabilities of the intermediate events and the top event through the fault tree. Unfortunately, Liu [13] showed, via an example, that fuzzy theory was inappropriate to model the degree belief. A similar situation exists in the risk evaluation of subsea production systems. For example, the leakage risk of a subsea production system at time t is evaluated by expert as “approximately 0.01”. If the leakage risk of the subsea production system is regarded as a triangular fuzzy variable (0.05, 0.01, 0.15), it can be concluded that the possibility of “the leakage risk of the subsea production system is exactly 0.01” is 1, and the possibility of “the leakage risk of the subsea production system is not 0.01” is 1, based on the possibility measure. It is usually believed that the probability of “the leakage risk of the subsea production system is exactly 0.01” is 0. In addition, “the leakage risk of the subsea production system is exactly 0.01” and “the leakage risk of the subsea production system is not 0.01” have the same possibility value. This contradictory result also shows that the leakage risk evaluation of subsea production is unsuitable to be modeled by fuzzy theory, since the possibility measure does not have the duality property.
In order to measure the degree of belief, uncertainty theory was founded by Liu [14] and refined by Liu [15] based on normality, duality, subadditivity, and product-measure axioms. In recent years, uncertainty theory was widely used in various fields, such as structural reliability assessment [16], time series analysis [17], risk assessment [18], reliability modelling [19], and statistics [20].
In the past, several contributions have used various genetic algorithms as optimization techniques in the field of system reliability, in which the system was represented by a fault tree. Andrews and Bartlett [21] used GA for single-objective optimization of a firewater deluge system on an offshore platform, in which the system was presented by the structure of the fault tree. Pattison and Andrews [22] described a design optimization scheme for systems that required a high likelihood of functioning on demand by using GA. Bhsttacharyya and Cheliyan [6] solved a subsea production system optimization problem using GA and NSGA-II, in which the risk was evaluated by fault tree analysis. The difference between GA and NSGA-II, which are used in this paper, is that the fault tree analysis method adopts an uncertain algorithm.
The major contributions of this study are as follows: the risk occurrence time of each basic event evaluated by experts is modeled by an uncertain variable; the risk-assessment method of systems with epistemic uncertainty is proposed based on uncertain fault tree analysis; two risk-based maintenance optimization models for systems with epistemic uncertainty are established; the leakage risk assessment method and the two risk-based maintenance optimization models for a subsea production system are considered, and the optimization results are given.
The remainder of this article is organized as follows. Section 2 recalls some basic concepts related to uncertain variables. In Section 3, the risk assessment method of systems with epistemic uncertainty is proposed by using an uncertain fault tree analysis, and then two risk-based maintenance optimization models are established; in addition, the steps of GA and NSGA-II are given to solve the two optimization models. In Section 4, a leakage risk assessment and two risk-based maintenance optimization models for a subsea production system are considered, and then the optimization results are given.

2. Preliminaries

Let Γ be a nonempty set and Ł a σ -algebra over Γ . Each element Λ Ł is called an event. Then a number M { Λ } will be assigned to each event Λ to indicate the degree of belief with which we believe that Λ will happen. In order to rationally and scientifically describe a degree of belief, Liu [14] proposed the normality, duality, subadditivity, and product measure axioms.
Definition 1
(Liu [14]). The set function M is called an uncertain measure if it satisfies the normality, duality, subadditivity, and product measure axioms.
Definition 2
(Liu [14]). Let Γ be a nonempty set, Ł a σ-algebra over Γ, and M an uncertain measure. Then, the triplet ( Γ , Ł , M ) is called an uncertainty space.
Definition 3
(Liu [14]). An uncertain variable is a function ξ from an uncertainty space ( Γ , Ł , M ) to the set of real numbers such that { ξ B } is an event for any Borel set B of real numbers.
Definition 4
(Liu [14]). The uncertainty distribution Φ of an uncertain variable ξ is defined by
Φ ( x ) = M ξ x
for any real number x.
Definition 5
(Liu [15]). An uncertain variable ξ is called normal if it has a normal uncertainty distribution
Φ ( x ) = 1 + e x p π ( e x ) 3 σ 1 , x R ,
denoted by N ( e , σ ) , where e and σ are real numbers with σ > 0 .
Definition 6
(Liu [23]). The uncertain variables ξ 1 , ξ 2 , , ξ n are said to be independent if
M i = 1 n { ξ i B i } = i = 1 n M { ξ i B i }
for any Borel sets B 1 , B 2 , , B n of real numbers. (is the minimum operator.)
Theorem 1
(Liu [23]). The uncertain variables ξ 1 , ξ 2 , , ξ n are independent if and only if
M i = 1 n { ξ i B i } = i = 1 n M { ξ i B i }
for any Borel sets B 1 , B 2 , , B n of real numbers. (is the maximum operator).

3. Risk-Based Maintenance Optimization Models for a System with Epistemic Uncertainty

The risk of systems with epistemic uncertainty is evaluated by an uncertain fault tree in this section. Then two risk-based maintenance optimization models based on uncertain fault tree are established, respectively.

3.1. System Risk Assessment

The risk of systems with epistemic uncertainty can be evaluated by uncertain fault tree. A fault tree is called an uncertain fault tree if the occurrence of all basic events is evaluated by an uncertain measure. Let Λ 1 , Λ 2 , , Λ n be the independent input events. By Definition 6 and Theorem 1, the risk of the output event Λ , i.e., the belief degree of occurrence of the output event Λ , is
M { Λ } = i = 1 n M { Λ i } , for   AND   gate i = 1 n M { Λ i } , for   OR   gate .
Let T 1 , T 2 , , T n be the failure occurrence times of independent input events Λ 1 , Λ 2 , , Λ n , respectively. Suppose that T 1 , T 2 , , T n are uncertain variables with uncertain distributions Φ 1 ( t ) , Φ 2 ( t ) , , Φ n ( t ) . Denote the state of the input event Λ i at time t by ξ i ( t ) , i = 1 , 2 , , n . Let ξ i ( t ) = 1 if Λ i occurs at time t and ξ i ( t ) = 0 if Λ i does not occur at time t. It is easy to see that ξ i ( t ) , i = 1 , 2 , , n are uncertain variables and
ξ i ( t ) = 1 , with uncertain measure Φ i ( t ) 0 , with uncertain measure 1 Φ i ( t ) .
Then, the risk of input event Λ i at time t is the belief degree of uncertain event “ { ξ i ( t ) = 1 } ”, which is just Φ i ( t ) , i = 1 , 2 , , n .
Denote the state of the output event Λ at time t by ξ ( t ) . Let ξ ( t ) = 1 if Λ occurs at time t. If Λ 1 , Λ 2 , , Λ n are connected by the “AND” gate, then the risk of the output event Λ at time t is
Φ ( t ) = M { ξ ( t ) = 1 } = M i = 1 n { ξ i ( t ) = 1 } = i = 1 n M { ξ i ( t ) = 1 } = i = 1 n Φ i ( t ) .
If Λ 1 , Λ 2 , , Λ n are connected by the “OR” gate, then the risk of the output event Λ at time t is
Φ ( t ) = M { ξ ( t ) = 1 } = M i = 1 n { ξ i ( t ) = 1 } = i = 1 n M ξ i ( t ) = 1 = i = 1 n Φ i ( t ) .
Then the risk of the output event Λ at time t can be summarized as follows
Φ ( t ) = i = 1 n Φ i ( t ) , for   AND   gate i = 1 n Φ i ( t ) , for   OR   gate .
If the occurrence times of all basic events and their uncertain distributions are given, Equation (5) can be extended to any fault tree structure to evaluate the system risk at time t. Then the following theorem is proposed.
Theorem 2.
Let Φ 1 ( x ) , Φ 2 ( x ) , , Φ n ( x ) be distribution functions of occurrence times of basic events Λ 1 , Λ 2 , , Λ n , respectively, and let T U be the uncertain fault tree structure function of the system consisting ofandoperators. Then, the system risk at time t is
Φ T o p ( t ) = T U ( Φ 1 ( t ) , Φ 2 ( t ) , , Φ n ( t ) ) .

3.2. Maintenance Cost

Consider an uncertain fault tree that consists of N independent basic events, where n basic events have cost functions, since there are more than one choices of maintenance technologies for these events, denoted by Λ i , i = 1 , 2 , , n . The maintenance cost of basic event Λ i at time t (denoted by C i ( t ) ) is related with its maintenance measures at time t. The maintenance measures of basic event Λ i at time t can be transformed to the degree of risk aversion, denoted by M i ( t ) , i = 1 , 2 , , n . Then the maintenance cost of basic event Λ i at time t is
C i ( t ) = F i ( M i ( t ) ) ,
where F i is called the “risk-cost” function. Usually, F i is non-increasing with respect to M i ( t ) , i = 1 , 2 , , n .
It is assumed that if the system is maintained, all basic events are repaired and incomplete maintenance is usually adopted. Therefore, the total maintenance cost at time t is
C T o p ( t ) = i = 1 n C i ( t ) = i = 1 n F i ( M i ( t ) ) .

3.3. Risk-Based Maintenance Optimization Models

3.3.1. The Single-Objective Maintenance Optimization Model

The aim of the single-objective optimization model is to determine the maintenance strategy M 1 ( t ) , M 2 ( t ) , , M n ( t ) at any time t when the total maintenance cost is minimized under the risk constraints. Denote the system risk at time t by Φ T o p ( t ) . It is easy to see that Φ T o p ( t ) is the function of M 1 ( t ) , M 2 ( t ) , , M n ( t ) . Then, the single-objective maintenance optimization model is established by
Min C T o p ( t ) s . t . Φ T o p ( t ) τ ( t ) 0 M i ( t ) Φ i ( t ) , i = 1 , 2 , , n ,
where Φ T o p ( t ) is calculated by Equation (6), C T o p ( t ) is calculated by Equation (8), and τ ( t ) is the given allowable risk level of the system at time t. Since the uncertain fault tree structure function T U is monotonic non-decreasing, the range of τ ( t ) is usually in 0 τ ( t ) T U ( Φ 1 ( t ) , , Φ n ( t ) ) .

3.3.2. The Multi-Objective Maintenance Optimization Model

The aim of the multi-objective optimization model is to determine the maintenance strategy M 1 ( t ) , M 2 ( t ) , , M n ( t ) at any time t to minimize the system risk and the total maintenance cost at the same time. The multi-objective optimization model is established by
Min C T o p ( t ) Min Φ T o p ( t ) s . t . 0 M i ( t ) Φ i ( t ) , i = 1 , 2 , , n ,
where Φ T o p ( t ) and C T o p ( t ) can be calculated by Equations (6) and (8), respectively.

3.4. Solutions of the Optimization Problems

The solution to the single-objective maintenance optimization model (9) can be obtained by GA. Compared with some conventional optimization algorithms, GA can usually obtain better optimization results faster. The solution to the multi-objective maintenance optimization model (10) can be obtained by NSGA-II, since it reduces the complexity of the non-inferior sorting genetic algorithm and has the advantages of fast running speed and good convergence of the solution set.

3.4.1. The Genetic Algorithm

Step 1: Initialization
For basic events Λ i , i = 1 , 2 , , n , the maintenance strategies are generated by
M i ( t ) = α i × Φ i ( t ) , i = 1 , 2 , , n ,
where α i , i = 1 , 2 , , n are random numbers generated in interval [0,1] and generated with each iteration. M i ( t ) , i = 1 , 2 , , n constitute a chromosome structure. ( M 1 ( t ) , M 2 ( t ) , , M n ( t ) ) constitute a chromosome structure. M i ( t ) , i = 1 , 2 , , n , Φ i ( t ) , i = 1 , 2 , , n , , and the fault tree structure are used to calculate the system risk Φ T o p ( t ) . If Φ t o p ( t ) τ ( t ) , a chromosome is generated. Predetermined the allowable risk level of the system at time t, denoted by τ ( t ) . If Φ t o p ( t ) > τ ( t ) , chromosomes need to be regenerated by Equation (11). Repeat the above process until k chromosomes are generated. The maintenance strategy of basic event Λ i in the jth chromosome is denoted as M i ( j ) ( t ) , i = 1 , 2 , , n , j = 1 , 2 , , k .
Step 2: Selection
Consider 1 C T o p ( t ) as the fitness function.The roulette algorithm is used for selection.
Step 3: Crossover
Select individuals M i ( j 1 ) ( t ) and M i ( j 2 ) ( t ) , 0 j 1 , j 2 k , j 1 j 2 randomly in the current population to generate new individuals by
M i ( j 1 ) ( t ) = 0.5 [ ( 1 + r 1 ) × M i ( j 1 ) ( t ) + ( 1 r 1 ) × M i ( j 2 ) ( t ) ]
and
M i ( j 2 ) ( t ) = 0.5 [ ( 1 r 1 ) × M i ( j 1 ) ( t ) + ( 1 + r 1 ) × M i ( j 2 ) ( t ) ] ,
in which
r 1 = ( 2 u 1 ) 1 η + 1 , if u 1 0.5 1 2 ( 1 u 1 ) 1 η + 1 , if u 1 > 0.5 ,
where u 1 is a random number in [0, 1] and η > 0 is a distribution index.
Step 4: Mutation
The individuals participating in mutation are selected randomly with probability p, and the new individuals after mutation are generated by the following formula
M i ( j ) ( t ) = M i ( j ) ( t ) δ · Φ i ( t )
in which
δ = [ 2 u 2 + ( 1 2 u 2 ) × ( 1 δ 1 ) η m + 1 ] 1 η m + 1 1 , if u 2 0.5 1 [ 2 ( 1 u 2 ) + 2 ( u 2 0.5 ) × ( 1 δ 2 ) η m + 1 ] 1 η m + 1 , if u 2 > 0.5 ,
where u 2 is the random number in the interval [0,1], η m is the distribution index, and δ 1 and δ 2 are generated by
δ 1 = M i ( j ) ( t ) Φ i ( t ) 0 Φ i ( t ) and δ 2 = 0 M i ( j ) ( t ) 0 Φ i ( t ) ,
respectively. Then, continue step 2 until the end of step 4. The chromosome constructs a near-optimal solution.

3.4.2. The Non-Dominated Sorting Genetic Algorithm II

Step 1: Initialization
For each basic event Λ i , the maintenance strategy is generated by
M i ( t ) = α i × Φ i ( t )
where α i is a random number generated in interval [0, 1] and generated with each iteration. M i ( t ) , i = 1 , 2 , , n constitute a chromosome structure. Suppose that the initial population consists of k chromosomes, denoted by X ( j ) , j = 1 , 2 , , k . The maintenance strategy of the basic event Λ i in the jth chromosome is denoted as M i ( j ) ( t ) , i = 1 , 2 , , n , j = 1 , 2 , , k .
Step 2: Fast non-dominated sort
Calculate the objective functions Φ T o p ( j ) ( t ) and C T o p ( j ) ( t ) , j = 1 , 2 , , k , respectively. Arrange these chromosomes by using the fast non-dominated sorting approach in Deb et al. [24] and arrive the set X 1 ( j ) , j = 1 , 2 , , k .
Step 3: Crossover
Select individuals M i ( j 1 ) ( t ) and M i ( j 2 ) ( t ) , 0 j 1 , j 2 k , j 1 j 2 randomly to generate new individuals by
M i ( j 1 ) ( t ) = 0.5 [ ( 1 + r 2 ) × M i ( j 1 ) ( t ) + ( 1 r 2 ) × M i ( j 2 ) ( t ) ]
and
M i ( j 2 ) ( t ) = 0.5 [ ( 1 r 2 ) × M i ( j 1 ) ( t ) + ( 1 + r 2 ) × M i ( j 2 ) ( t ) ] ,
in which
r 2 = ( 2 u 3 ) 1 η + 1 , if u 3 0.5 1 2 ( 1 u 3 ) 1 η + 1 , if u 3 > 0.5 ,
where u 3 is a random number in [0,1] and η > 0 is a distribution index.
Step 4: Mutation
The individuals that undergo the mutation are selected randomly with probability p, and the new individuals after the mutation are generated by
M i ( j ) ( t ) = M i ( j ) ( t ) δ 3 · Φ i ( t ) ,
in which
δ 3 = [ 2 u 4 + ( 1 2 u 4 ) × ( 1 δ 4 ) η m + 1 ] 1 η m + 1 1 , if u 4 0.5 1 [ 2 ( 1 u 4 ) + 2 ( u 4 0.5 ) × ( 1 δ 5 ) η m + 1 ] 1 η m + 1 , if u 4 > 0.5 ,
where u 4 is a random number in the interval [0,1], η m is the distribution index, δ 4 and δ 5 are generated by
δ 4 = M i ( j ) ( t ) Φ i ( t ) 0 Φ i ( t ) a n d δ 5 = 0 M i ( j ) ( t ) 0 Φ i ( t ) ,
respectively. Then, k new chromosomes are generated, denoted by ( X ( j ) ) , j = 1 , 2 , , k .
Step 5: Elite retention strategy
Combine X 1 ( j ) , j = 1 , 2 , , k and ( X ( j ) ) , j = 1 , 2 , , k together to construct a 2 k chromosome set, denoted by ( X 1 ( j ) ) , j = 1 , 2 , , 2 k . Compute the objective functions ( Φ T o p ( j ) ( t ) ) and ( C T o p ( j ) ( t ) ) by ( X 1 ( j ) ) , j = 1 , 2 , , k . Rearrange the chromosome set ( X 1 j ) , j = 1 , 2 , , 2 k and retain the top k chromosomes as the chromosome set X 2 ( j ) , j = 1 , 2 , , k . Rename X 2 ( j ) by X 1 ( j ) , j = 1 , 2 , , k and go to step 3 until the end of step 5. The chromosomes construct near-optimal Pareto front.

4. Risk-Based Maintenance Optimization Models for a Subsea Production System

Subsea production systems are the main lifeline of offshore oil and gas exploitation and consist of Xmas-trees, manifolds, jumper tube, umbilical cable, pipelines, etc. In this section, the fault tree structure of the subsea production system in Cheliyan and Bhattacharyya [12] is still used. However, the traditional fault tree analysis is replaced by the uncertain fault tree analysis and is extended to a time-varying situation, which can be used to evaluate the risk of the subsea production system at any time. Then, two risk-based maintenance optimization models for the subsea production system are given. In addition, GA and NSGA-II are used to solve the two optimization models. The result can help practitioners to give early warning of oil and gas leakage risk and make scientific maintenance decisions.

4.1. The Leakage Risk Assessment for the Subsea Production System

Consider a subsea production system in an extremely harsh marine environment. The fault tree of the subsea production system takes “oil and gas leakage” as the top event (denoted by Λ T o p ) and consists of 40 events (denoted by Λ i , i = 1 , 2 , , 40 ), in which Λ i , i = 1 , , 26 are basic events and Λ i , i = 27 , , 40 are intermediate events. Let T i , i = 1 , 2 , , 40 be the uncertain failure occurrence times of events Λ i , i = 1 , 2 , , 40 , respectively. Suppose that T i , i = 1 , 2 , , 26 are evaluated by domain experts. The detailed descriptions of the top event, intermediate events, and basic events are shown in Table 1 and Table 2.
Denote the uncertainty distributions of the failure occurrence time of the top event by Φ T o p ( t ) , and denote the uncertainty distribution of T i by Φ i ( t ) , i = 1 , 2 , , 40 . By Theorem 2, we can arrive at
Φ T o p ( t ) = Φ 26 ( t ) Φ 38 ( t ) Φ 39 ( t ) Φ 40 ( t ) = Φ 26 ( t ) Φ 1 ( t ) Φ 2 ( t ) Φ 11 ( t ) Φ 36 ( t ) Φ 32 ( t ) Φ 33 ( t ) Φ 34 ( t ) Φ 35 ( t ) Φ 37 ( t ) = Φ 1 ( t ) Φ 2 ( t ) Φ 26 ( t ) Φ 11 ( t ) Φ 27 ( t ) Φ 28 ( t ) Φ 29 ( t ) Φ 30 ( t ) Φ 18 ( t ) Φ 19 ( t ) Φ 20 ( t ) Φ 21 ( t ) Φ 22 ( t ) Φ 23 ( t ) Φ 24 ( t ) Φ 25 ( t ) Φ 17 ( t ) Φ 31 ( t ) = Φ 1 ( t ) Φ 2 ( t ) Φ 18 ( t ) Φ 19 ( t ) Φ 11 ( t ) Φ 3 ( t ) Φ 4 ( t ) Φ 5 ( t ) Φ 6 ( t ) Φ 7 ( t ) Φ 8 ( t ) Φ 9 ( t ) Φ 10 ( t ) Φ 20 ( t ) Φ 21 ( t ) Φ 22 ( t ) Φ 23 ( t ) Φ 24 ( t ) Φ 25 ( t ) Φ 26 ( t ) Φ 17 ( t ) Φ 12 ( t ) Φ 13 ( t ) Φ 14 ( t ) Φ 15 ( t ) Φ 16 ( t ) ) ) .
Bring the data in Table 1 into Formula (15) to obtain the specific distribution function. As shown in Figure 1, when the subsea production system is put into use in the early stage, the leakage risk is relatively low. As the service period grows, the leakage risk of the subsea production system increases gradually. This conclusion can assist decision makers in quantitatively assessing the risk status of the subsea production system at any time, so as to make early warnings and take corresponding maintenance measures.

4.2. The Maintenance Cost for the Subsea Production System

Suppose that basic events Λ i , i = 1 , 2 , 25 have cost functions, since there are more than one choices of maintenance technologies for these events. The risk-cost functions F i , i = 1 , 2 , , 25 are considered linear functions, which means that they can be determined by the slopes in Table 3.
Take the risk-cost function of Λ 15 , for example, its “risk-cost” function is shown in Figure 2.

4.3. Risk-Based Maintenance Optimization Models for the Subsea Production System

4.3.1. The Single-Objective Maintenance Optimization Model

The single-objective optimization model described in (9) is considered. The risks of basic events avoided after taking maintenance measures at time t are considered as decision variables, denoted by M i ( t ) , i = 1 , 2 , , 25 . Then the single-objective optimization model for the subsea production system can be expressed by
Min C T o p ( t ) s . t . Φ T o p ( t ) τ ( t ) 0 M i ( t ) Φ i ( t ) , i = 1 , 2 , , 25 ,
in which
Φ T o p ( t ) = T U ( Φ 1 ( t ) M 1 ( t ) , , Φ 26 ( t ) M 26 ( t ) ) = ( Φ 1 ( t ) M 1 ( t ) ) ( Φ 2 ( t ) M 2 ( t ) ) ( Φ 18 ( t ) M 18 ( t ) ) ( Φ 19 ( t ) M 19 ( t ) ) ( Φ 11 ( t ) M 11 ( t ) ) ( Φ 3 ( t ) M 3 ( t ) ) ( Φ 4 ( t ) M 4 ( t ) ) ( Φ 5 ( t ) M 5 ( t ) ) ( Φ 6 ( t ) M 6 ( t ) ) ( Φ 7 ( t ) M 7 ( t ) ) ( Φ 8 ( t ) M 8 ( t ) ) ( Φ 9 ( t ) M 9 ( t ) ) ( Φ 10 ( t ) M 10 ( t ) ) ( Φ 20 ( t ) M 20 ( t ) ) ( Φ 21 ( t ) M 21 ( t ) ) ( Φ 22 ( t ) M 22 ( t ) ) ( Φ 23 ( t ) M 23 ( t ) ) ( Φ 24 ( t ) M 24 ( t ) ) ( Φ 25 ( t ) M 25 ( t ) ) Φ 26 ( t ) ( Φ 17 ( t ) M 17 ( t ) ) ( Φ 12 ( t ) M 12 ( t ) ) ( Φ 13 ( t ) M 13 ( t ) ) ( ( Φ 14 ( t ) M 14 ( t ) ) ( Φ 15 ( t ) M 15 ( t ) ) ( Φ 16 ( t ) M 16 ( t ) )
and
C T o p ( t ) = i = 1 25 F i ( M i ( t ) ) = 2000 43 M 1 ( t ) + 5000 83 M 2 ( t ) + 300 19 M 3 ( t ) + 750 47 M 4 ( t ) + 2500 7 M 5 ( t ) 5000 19 M 6 ( t ) + 10 , 000 13 M 7 ( t ) + 60 , 000 103 M 8 ( t ) + 3500 23 M 9 ( t ) + 4375 36 M 10 ( t ) 5000 269 M 11 ( t ) + 500 13 M 12 ( t ) + 1500 41 M 13 ( t ) + 15 , 000 193 M 14 ( t ) + 800 7 M 15 ( t ) 10 , 000 183 M 16 ( t ) + 625 113 M 17 ( t ) + 20 , 000 199 M 18 ( t ) + 125 2 M 19 ( t ) + 5000 17 M 20 ( t ) 15 , 000 223 M 21 ( t ) + 20 , 000 189 M 22 ( t ) + 3750 107 M 23 ( t ) + 20 , 000 189 M 24 ( t ) + 7500 107 M 25 ( t ) .
Remark 1.
The objective function C T o p ( t ) does not include the maintenance cost of Λ 26 since it does not involve multiple maintenance technologies, so it does not participate in the optimization process.
The single-objective optimization model can be solved by the GA. The key parameters of the GA are assigned as follows: τ ( t ) is set from 0 to T U ( Φ 1 ( t ) , , Φ 26 ( t ) ) , the population size is 100, the crossover probability is 0.8, the mutation probability is 0.04, and the number of generations is 100. The relationship between maintenance time t, Φ T o p ( t ) , and Min C T o p ( t ) are presented in Figure 3, in which “×” denotes the optimized solutions in the eighth year. In particular, if τ ( t ) is set to T U ( 0.7 Φ 1 ( 8 ) , , 0.7 Φ 26 ( 8 ) ) , the optimal maintenance strategy M i * ( 8 ) , i = 1 , 2 , , 25 can refer to Table 4 and the optimal maintenance cost in the eighth year is 216.64 million dollar. Then the leakage risk of the subsea production system after maintenance is shown in Figure 4.
This conclusion can give the solution to when and how much maintenance funds the enterprise needs to prepare under the allowable risk level, and then give the maintenance strategy for each basic event, so as to improve the enterprise’s risk- and maintenance-management abilities and extend the service life of the subsea production system.
Remark 2.
Take the situation of the subsea production system in the eighth year as an example. The relationship between the number of generations and Min C T o p ( 8 ) is shown in Figure 5. It is easy to see that with the increase in the number of generations, the value of Min C T o p ( 8 ) converges gradually. When the number of generations reaches 80, the value of Min C T o p ( 8 ) has stabilized. Then, the number of generations in GA is set to 100.

4.3.2. The Multi-Objective Maintenance Optimization Model

The leakage risk of the subsea production system at time t can also be evaluated by uncertain failure tree analysis directly. Then, the muti-objective optimization model of the subsea production system can be established by (10), namely,
Min C T o p ( t ) Min Φ T o p ( t ) s . t . 0 M i ( t ) Φ i ( t ) , i = 1 , 2 , , 25 ,
in which Φ T o p ( t ) and C T o p ( t ) are determined by Equations (17) and (18), respectively.
The multi-objective optimization model can be solved by NSGA-II. The key parameters of the NSGA-II are assigned as follows: the population size is 100, the crossover probability is 0.5, the mutation probability is 0.01, and the number of generations is 120. In Figure 6, the relationship between maintenance time t, Φ T o p ( t ) and C T o p ( t ) is presented, in which “×” denotes the optimized non-dominated solution set in the eighth year. In order to show the optimized non-dominated solution set of the eighth year more clearly, Figure 7 is given. In particular, when the point ( 0.1359 , 312.13 ) in Figure 7 is selected, one of the optimal maintenance strategies is shown in Table 5.
This conclusion presents the relationship between the leakage risk and the total maintenance cost of the subsea production system at any time. It can help decision makers to arrange maintenance tasks according to the annual maintenance funds and give the maintenance strategy of each basic event.
Remark 3.
Take the situation of the subsea production system in the eighth year as an example. The ranges of C T o p ( 8 ) and Φ T o p ( 8 ) with the growth of generations is shown in Figure 8. It is easy to see that with the increase in the number of generations, the values of Max C T o p ( 8 ) , Min C T o p ( 8 ) , and Max Φ T o p ( 8 ) converge gradually. When the number of generations reaches 100, the values of Max C T o p ( 8 ) , Min C T o p ( 8 ) , and Max Φ T o p ( 8 ) have stabilized. The minimum value of Min Φ T o p ( 8 ) is always around 0.067. Therefore, the number of generations in NSGA-II is set to 120.

5. Conclusions

The subsea production system is in a harsh submarine environment, which causes great difficulties in data acquisition and brings difficulties to the traditional risk-assessment methods. Experts are invited to evaluate the key performance indicators related to system risk, which are often described by ambiguous language. In this article, a risk-assessment method and two basic risk-based maintenance optimization models are established for systems with epistemic uncertainty, which are used in the field of a subsea production system. The specific contributions of this article are as follows:
(1)
The risk occurrence time of each basic event evaluated by experts is modeled by uncertain variable.
(2)
A risk assessment method for systems with epistemic uncertainty is proposed based on uncertain fault tree analysis.
(3)
Two risk-based maintenance optimization models for systems with epistemic uncertainty are established, and the specific calculation steps of the algorithms are presented accordingly.
(4)
The leakage risk of a subsea production system is given. On that basis, two risk-based optimization models for a subsea production system are established. In addition, the optimization results are given.
The current work can help practitioners to warn the leakage risk and make scientific maintenance decisions with only expert knowledge, so as to extend the service life of the subsea production system. In the future, the risk assessment method and risk-based maintenance optimization models will be applied to other equipment that are difficult to obtain sufficient data.

Author Contributions

Conceptualization, Y.L.; Methodology, L.M.; Software, L.S. and Y.Y.; Project administration, Y.L.; Resources, Y.L. and Z.Q.; Data curation, X.Z., Y.L. and L.M.; Writing-original draft, L.M.; Validation, L.S. and X.Z.; Writing-review and editing, Y.L. and Q.Z.; Funding acquisition, Y.L. and Z.Q. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China Grant No.61873187 and No.62173246, the Humanities and Social Sciences Foundation of the Ministry of Education (Youth Fund) Grant No.18YJC630108, the Scientific Research Project of Tianjin Education Commission Grant No.2019KJ233, and the Natural Science Foundation of Tianjin City Grant No.18JCQNJC69800.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data that support the findings of this study are available in https://0-doi-org.brum.beds.ac.uk/10.1016/j.ress.2018.12.030 and https://0-doi-org.brum.beds.ac.uk/10.1016/j.joes.2017.11.005 (accessed on 1 January 2022).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ruijters, E.; Stoelinga, M. Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools. Comput. Sci. Rev. 2015, 15, 29–62. [Google Scholar] [CrossRef]
  2. Sianipar, P.R.M.; Adams, T.M. Fault-tree model of bridge element deterioration due to interaction. J. Infrastruct. Syst. 1997, 3, 103–110. [Google Scholar] [CrossRef]
  3. Volkanovski, A.; Čepin, M.; Mavko, B. Application of the fault tree analysis for assessment of power system reliability. Reliab. Eng. Syst. Saf. 2009, 94, 1116–1127. [Google Scholar] [CrossRef]
  4. Sun, X.; Liu, Y.L.; Deng, L.C. Reliability assessment of cyber-physical distribution network based on the fault tree. Renew. Energy 2020, 155, 1411–1424. [Google Scholar] [CrossRef]
  5. Ikwan, F.; Sanders, D.; Hassan, M. Safety evaluation of leak in a storage tank using fault tree analysis and risk matrix analysis. J. Loss Prev. Process Ind. 2021, 73, 104597. [Google Scholar] [CrossRef]
  6. Bhattacharyya, S.K.; Cheliyan, A.S. Optimization of a subsea production system for cost and reliability using its fault tree model. Reliab. Eng. Syst. Saf. 2019, 185, 213–219. [Google Scholar] [CrossRef]
  7. Zheng, Y.; Zhao, F.; Wang, Z. Fault diagnosis system of bridge crane equipment based on fault tree and bayesian network. Int. J. Adv. Manuf. Technol. 2019, 105, 3605–3618. [Google Scholar] [CrossRef]
  8. Dickerson, C.E.; Roslan, R.; Ji, S. A formal transformation method for automated fault tree generation from a UML activity model. IEEE Trans. Reliab. 2018, 67, 1219–1236. [Google Scholar] [CrossRef]
  9. El-Shanawany, A.B.; Ardron, K.H.; Walker, S.P. Lognormal approximations of fault tree uncertainty distributions. Risk Anal. 2018, 38, 1576–1584. [Google Scholar] [CrossRef]
  10. Matsuoka, T. Procedure to solve mutually dependent fault trees (FT with loops). Reliab. Eng. Syst. Saf. 2021, 214, 107667. [Google Scholar] [CrossRef]
  11. Wang, Y.F.; Liu, Z.M.; Jiang, J.C.; Khan, F.; Wang, J. Blowout fire probability prediction of offshore drilling platform based on system dynamics. J. Loss Prev. Process Ind. 2019, 62, 103960. [Google Scholar] [CrossRef]
  12. Cheliyan, A.S.; Bhattacharyya, S.K. Fuzzy fault tree analysis of oil and gas leakage in subsea production systems. J. Ocean Eng. Sci. 2018, 3, 38–48. [Google Scholar] [CrossRef]
  13. Liu, B.D. Why is there a need for uncertainty theory. J. Uncertain Syst. 2012, 6, 3–10. [Google Scholar]
  14. Liu, B.D. Uncertainty Theory, 2nd ed.; Springer: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
  15. Liu, B.D. Uncertainty Theory: A Branch of Mathematics for Modeling Human Uncertainty; Springer: Berlin/Heidelberg, Germany, 2010. [Google Scholar]
  16. Liu, Y.; Zhao, J.Y.; Qu, Z.G.; Wang, L. Structural reliability assessment based on subjective uncertainty. Int. J. Comput. Methods 2021, 18, 2150046. [Google Scholar] [CrossRef]
  17. Ye, T.; Yang, X. Analysis and prediction of confirmed COVID-19 cases in china with uncertain time series. Fuzzy Optim. Decis. Mak. 2021, 20, 209C228. [Google Scholar] [CrossRef]
  18. Hu, L.H.; Kang, R.; Pan, X.; Zuo, D.J. Risk assessment of uncertain random system—Level-1 and level-2 joint propagation of uncertainty and probability in fault tree analysis. Reliab. Eng. Syst. Saf. 2020, 198, 106874. [Google Scholar] [CrossRef]
  19. Liu, Y.; Qu, Z.G.; Li, X.Z.; An, Y.; Yin, W.L. Reliability modeling for repairable systems with stochastic lifetimes and uncertain repair times. IEEE Trans. Fuzzy Syst. 2019, 27, 2396–2405. [Google Scholar] [CrossRef]
  20. Zu, T.; Kang, R.; Wen, M. Graduation formula: A new method to construct belief reliability distribution under epistemic uncertainty. J. Syst. Eng. Electron. 2020, 31, 626–633. [Google Scholar]
  21. Bartlett, J.A.a.L. Genetic algorithm optimization of a firewater deluge system. Qual. Reliab. Eng. Int. 2003, 19, 39–52. [Google Scholar]
  22. Pattison, R.; Andrews, J. Genetic algorithms in optimal safety system design. Proc. Inst. Mech. Eng. Part E J. Process Mech. Eng. 1999, 213, 187–197. [Google Scholar] [CrossRef]
  23. Liu, B.D. Some research problems in uncertainty theory. J. Uncertain Syst. 2009, 3, 3–10. [Google Scholar]
  24. Deb, K.; Pratap, A.; Agarwal, S.; Meyarivan, T. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 2002, 6, 182–197. [Google Scholar] [CrossRef]
Figure 1. The uncertainty distribution of the failure occurrence time of the top event Λ T o p .
Figure 1. The uncertainty distribution of the failure occurrence time of the top event Λ T o p .
Symmetry 14 01672 g001
Figure 2. The risk-cost function of Λ 15 .
Figure 2. The risk-cost function of Λ 15 .
Symmetry 14 01672 g002
Figure 3. The relationship between maintenance time t, Φ T o p ( t ) and Min C T o p ( t ) .
Figure 3. The relationship between maintenance time t, Φ T o p ( t ) and Min C T o p ( t ) .
Symmetry 14 01672 g003
Figure 4. The leakage risk of the subsea production system after maintenance.
Figure 4. The leakage risk of the subsea production system after maintenance.
Symmetry 14 01672 g004
Figure 5. The convergence of Min C T o p ( 8 ) with the growth of generations.
Figure 5. The convergence of Min C T o p ( 8 ) with the growth of generations.
Symmetry 14 01672 g005
Figure 6. The relationship between maintenance time t, Φ T o p ( t ) , and C T o p ( t ) .
Figure 6. The relationship between maintenance time t, Φ T o p ( t ) , and C T o p ( t ) .
Symmetry 14 01672 g006
Figure 7. The optimized non-dominated solution set in the eighth year.
Figure 7. The optimized non-dominated solution set in the eighth year.
Symmetry 14 01672 g007
Figure 8. The ranges of C T o p ( 8 ) and Φ T o p ( 8 ) with the growth of generations. (a) The convergence of the maximum value of C T o p ( 8 ) . (b) The convergence of the minimum value of C T o p ( 8 ) . (c) The convergence of the maximum value of Φ T o p ( 8 ) .
Figure 8. The ranges of C T o p ( 8 ) and Φ T o p ( 8 ) with the growth of generations. (a) The convergence of the maximum value of C T o p ( 8 ) . (b) The convergence of the minimum value of C T o p ( 8 ) . (c) The convergence of the maximum value of Φ T o p ( 8 ) .
Symmetry 14 01672 g008
Table 1. Information of the top event and intermediate events.
Table 1. Information of the top event and intermediate events.
EventsDescriptionsGatesConnected Events
Λ T o p Oil and gas leakageOR Λ 26 , Λ 38 , Λ 39 , Λ 40
Λ 40 Leakage in key facilitiesOR Λ 32 , Λ 33 , Λ 34 , Λ 35 , Λ 37
Λ 39 Leakage in pipeAND Λ 11 , Λ 36
Λ 38 Leakage in gas or oil wellAND Λ 1 , Λ 2
Λ 37 Connector leakageAND Λ 17 , Λ 31
Λ 36 Defect in pipeOR Λ 27 , Λ 28 , Λ 29 , Λ 30
Λ 35 PLEM leakageAND Λ 24 , Λ 25
Λ 34 PLET leakageAND Λ 22 , Λ 23
Λ 33 Manifold leakageAND Λ 20 , Λ 21
Λ 32 X-tree leakageAND Λ 18 , Λ 19
Λ 31 Defect in connectorOR Λ 12 , Λ 13 , Λ 14 , Λ 15 , Λ 16
Λ 30 Defect in riserOR Λ 9 , Λ 10
Λ 29 Defect in pipelineOR Λ 7 , Λ 8
Λ 28 Defect in flowlineOR Λ 5 , Λ 6
Λ 27 Defect in jumperOR Λ 3 , Λ 4
Table 2. Information of basic events.
Table 2. Information of basic events.
Basic EventsDescriptionsFailure Occurrence TimesFailure Time Distributions
Λ 1 Overpressure in well T 1 N ( 10 , 3 )
Λ 2 Failure of control in well T 2 N ( 11 , 3 )
Λ 3 Jumper puncture T 3 N ( 12 , 3.5 )
Λ 4 Jumper rupture T 4 N ( 10 , 2.5 )
Λ 5 Flowline puncture T 5 N ( 8 , 2.4 )
Λ 6 Flowline rupture T 6 N ( 8 , 2.5 )
Λ 7 Pipeline puncture T 7 N ( 11 , 3 )
Λ 8 Pipeline rupture T 8 N ( 11 , 2.8 )
Λ 9 Riser puncture T 9 N ( 10 , 3 )
Λ 10 Riser rupture T 10 N ( 9 , 2.5 )
Λ 11 Failure of leakage control of pipe T 11 N ( 9 , 3 )
Λ 12 Defect in X-tree wellhead connector T 12 N ( 8 , 2.4 )
Λ 13 Defect in pipe connector T 13 N ( 9 , 3 )
Λ 14 Defect in pipe manifold connector T 14 N ( 10 , 3.5 )
Λ 15 Defect in pipe-PLET connector T 15 N ( 10 , 3.2 )
Λ 16 Defect in pipe-PLEM connector T 16 N ( 11 , 3.2 )
Λ 17 Failure of connector leakage control T 17 N ( 11 , 2.9 )
Λ 18 Defect in X-tree T 18 N ( 9 , 3 )
Λ 19 Failure of X-tree leakage control T 19 N ( 9 , 3 )
Λ 20 Defect in manifold T 20 N ( 8 , 2.6 )
Λ 21 Failure of manifold leakage control T 21 N ( 10 , 3.2 )
Λ 22 Defect in PLET T 22 N ( 11 , 3 )
Λ 23 Failure of PLET leakage control T 23 N ( 9 , 3 )
Λ 24 Defect in PLEM T 24 N ( 10 , 3 )
Λ 25 Failure of PLEM leakage control T 25 N ( 8 , 3 )
Λ 26 Third party damage T 26 N ( 10 , 2.6 )
Table 3. The slopes for risk-cost functions (Unit: million dollars).
Table 3. The slopes for risk-cost functions (Unit: million dollars).
Basic events Λ 1 Λ 2 Λ 3 Λ 4 Λ 5
Slopes 2000 43 5000 83 300 19 750 47 2500 7
Basic events Λ 6 Λ 7 Λ 8 Λ 9 Λ 10
Slopes 5000 19 10 , 000 13 60 , 000 103 3500 23 4375 36
Basic events Λ 11 Λ 12 Λ 13 Λ 14 Λ 15
Slopes 5000 269 500 13 1500 41 15 , 000 193 800 7
Basic events Λ 16 Λ 17 Λ 18 Λ 19 Λ 20
Slopes 10 , 000 183 625 113 20 , 000 199 125 2 5000 17
Basic events Λ 21 Λ 22 Λ 23 Λ 24 Λ 25
Slopes 15 , 000 223 20 , 000 189 3750 107 20 , 000 189 7500 107
Table 4. The optimal maintenance strategy in the eighth year.
Table 4. The optimal maintenance strategy in the eighth year.
M 1 * ( 8 ) M 2 * ( 8 ) M 3 * ( 8 ) M 4 * ( 8 ) M 5 * ( 8 ) M 6 * ( 8 ) M 7 * ( 8 ) M 8 * ( 8 ) M 9 * ( 8 )
0.0329 0.0124 0.0045 0.0427 0.1500 0.1500 0.0068 0.0124 0.0288
M 10 * ( 8 ) M 11 * ( 8 ) M 12 * ( 8 ) M 13 * ( 8 ) M 14 * ( 8 ) M 15 * ( 8 ) M 16 * ( 8 ) M 17 * ( 8 ) M 18 * ( 8 )
0.0779 0.0665 0.1500 0.0638 0.0329 0.0427 0.0150 0.0150 0.0759
M 19 * ( 8 ) M 20 * ( 8 ) M 21 * ( 8 ) M 22 * ( 8 ) M 23 * ( 8 ) M 24 * ( 8 ) M 25 * ( 8 )
0.0779 0.1500 0.0246 0.0150 0.0779 0.0329 0.1500
Table 5. One of the optimal maintenance strategies in the eighth year.
Table 5. One of the optimal maintenance strategies in the eighth year.
M 1 * ( 8 ) M 2 * ( 8 ) M 3 * ( 8 ) M 4 * ( 8 ) M 5 * ( 8 ) M 6 * ( 8 ) M 7 * ( 8 ) M 8 * ( 8 ) M 9 * ( 8 )
0.0507 0.0191 0.0069 0.0658 0.2311 0.2311 0.0104 0.0191 0.0443
M 10 * ( 8 ) M 11 * ( 8 ) M 12 * ( 8 ) M 13 * ( 8 ) M 14 * ( 8 ) M 15 * ( 8 ) M 16 * ( 8 ) M 17 * ( 8 ) M 18 * ( 8 )
0.1201 0.1024 0.2311 0.0983 0.0507 0.0658 0.0231 0.0231 0.1169
M 19 * ( 8 ) M 20 * ( 8 ) M 21 * ( 8 ) M 22 * ( 8 ) M 23 * ( 8 ) M 24 * ( 8 ) M 25 * ( 8 )
0.1201 0.2311 0.0379 0.0231 0.1201 0.0507 0.2311
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Liu, Y.; Ma, L.; Sun, L.; Zhang, X.; Yang, Y.; Zhao, Q.; Qu, Z. Risk-Based Maintenance Optimization for a Subsea Production System with Epistemic Uncertainty. Symmetry 2022, 14, 1672. https://0-doi-org.brum.beds.ac.uk/10.3390/sym14081672

AMA Style

Liu Y, Ma L, Sun L, Zhang X, Yang Y, Zhao Q, Qu Z. Risk-Based Maintenance Optimization for a Subsea Production System with Epistemic Uncertainty. Symmetry. 2022; 14(8):1672. https://0-doi-org.brum.beds.ac.uk/10.3390/sym14081672

Chicago/Turabian Style

Liu, Ying, Liuying Ma, Luyang Sun, Xiao Zhang, Yunyun Yang, Qing Zhao, and Zhigang Qu. 2022. "Risk-Based Maintenance Optimization for a Subsea Production System with Epistemic Uncertainty" Symmetry 14, no. 8: 1672. https://0-doi-org.brum.beds.ac.uk/10.3390/sym14081672

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop