Özet
Since the terms of system and process have emerged, increase of quality of these and efforts for continuously improving them have become significantly important topics. In the literature and the studies that have been carried out up to now, quality and continuous improvement have been handled by using different methods by the researchers and authors. When technological opportunities were very limited, improvements were generally based on the efforts of experts. Along with the technological developments, operations and error records during processing can be stored in almost all the computer based systems. However, operations and records may reach massive sizes and thus new statistical methods have to be developed to obtain useful information from the raw data.
Failure Modes and Effects Analysis (FMEA) is a powerful and proactive quality tool for defining, detecting, and identifying potential failure modes and their effects. An FMEA team consisting experts from different departments is organized in carrying out FMEA using traditional methods. This team firstly determines the failure modes. Afterwards, the effects of determined failure modes are analyzed and the analyzed failure modes are scored for different risk metrics. Finally, for each failure mode, a Risk Prioritization Number (RPN) is obtained by multiplying the score values. RPN values are evaluated for the effects of failure modes and the most important failure modes in the system are determined by ranking the RPN values.
FMEA can be applied in any stage of a system. If FMEA is applied during the design stage, it enables prevention of possible failures. If it is applied at later stages of the system, it provides methods for analyzing and decreasing the failures which have been revealed. However, traditional FMEA consists of many deficiencies and inadequacies in a lot of ways. The leading and the most significant one of these deficiencies is that varying scores caused by different experts, and thus subjective decisions. Former studies were mainly focused on RPN and there was not much done research to decrease subjectiveness of scores decisions.
In this thesis, computer log data domains are considered as application area. It is aimed to automate the stages of the FMEA and thus to remove both subjective decisions as well as making the analysis easier. Initially, the data obtained from the computers were pre-processed to make them fit for an FMEA study. At this stage, noisy and repeat data were removed. Failure modes were determined automatically from this data set instead of subjective expert decisions. For evaluating each failure mode, data based different objective risk metrics were suggested along with traditional methods and the suggested metrics were analyzed in detail. After that, by using Gray Relational Analysis (GRA), TOPSIS, VIKOR methods, and a traditional FMEA based method, risk rankings were ascertained. Results and methods are compared.
Künye
[1] US Department of Defence, “MIL-STD-1629 Procedures for performing a failure mode, effects and criticality analysis,” 1949.
[2] C. S. Carlson, Effective FMEAs: Achieving Safe, Reliable, and Economical Products and Processes Using Failure Mode and Effects Analysis. 2012.
[3] G. Q. Huang, J. Shi, and K. L. Mak, “Failure Mode and Effect Analysis (FMEA) Over the WWW,” Int J Adv Manuf Technol, vol. 16, pp. 603–608, 2000.
[4] C. J. Price, D. R. Pugh, M. S. Wilson, and N. Snooke, “The Flame system: automating electrical failure mode and effects\nanalysis (FMEA),” Annu. Reliab. Maintainab. Symp. 1995 Proc., pp. 90–95, 1995.
[5] R. Wirth, B. Berthold, A. Krämer, and G. Peter, “Knowledge-based support of system analysis for the analysis of Failure modes and effects,” Eng. Appl. Artif. Intell., vol. 9, no. 3, pp. 219–229, Jun. 1996.
[6] J. E. Hunt, C. J. Price, and M. H. Lee, “Automating the FMEA process,” Intell. Syst. Eng., vol. 2, no. 2, pp. 119–132, 1993.
[7] C. J. Price and N. S. Taylor, “Automated multiple failure FMEA,” Reliab. Eng. Syst. Saf., vol. 76, no. 1, pp. 1–10, Apr. 2002.
[8] D. H. Stamatis, Failure Mode and Effect Analysis: FMEA from Theory to Execution. 2003.
[9] H.-C. Liu, L. Liu, Q. Bian, Q. Lin, N. Dong, and P. Xu, “Failure mode and effects analysis using fuzzy evidential reasoning approach and grey theory,” Expert Syst. Appl., vol. 38, no. 4, pp. 4403–4415, 2011.
[10] K.-S. Chin, Y.-M. Wang, G. K. K. Poon, and J.-B. Yang, “Failure mode and effects analysis by data envelopment analysis,” Decis. Support Syst., vol. 48, no. 1, pp. 246–256, 2009.
[11] J. M. Legg, “Computerized Approach for Matrix-Form FMEA,” IEEE Trans. Reliab., vol. R-27, no. 4, pp. 254–257, Oct. 1978.
[12] G. Q. Huang, J. Shi, and K. L. Mak, “Failure Mode and Effect Analysis (FMEA) Over the WWW,” Int. J. Adv. Manuf. Technol., vol. 16, no. 8, pp. 603–608, Jul. 2000.
[13] D. Bell, L. Cox, S. Jackson, and P. Schaefer, “Using causal reasoning for automated failure modes and effects analysis (FMEA),” Proc. Annu. Reliab. Maintainab. Symp., pp. 343–353, 1992.
[14] H. B. Dussault, “Automated FMEA Status and Future,” in Annual Reliability and Maintainability Symposium, 1984. Proceedings., 1984, pp. 1–5.
[15] L. Gan, J. Xu, and B. T. Han, “A computer-integrated FMEA for dynamic supply chains in a flexible-based environment,” Int. J. Adv. Manuf. Technol., vol. 59, no. 5–8, pp. 697–717, 2012.
[16] D. Palumbo, “Automating failure modes and effects analysis,” in Proceedings of Annual Reliability and Maintainability Symposium (RAMS), 1994, pp. 304–309.
[17] P. G. Hawkins and D. J. Woollons, “Failure modes and effects analysis of complex engineering systems using functional models,” Artif. Intell. Eng., vol. 12, no. 4, pp. 375–397, 1998.
[18] P. C. Teoh and K. Case, “Failure modes and effects analysis through knowledge modelling,” J. Mater. Process. Technol., vol. 153–154, pp. 253–260, Nov. 2004.
[19] C. J. Price, N. Snooke, D. R. Pugh, J. E. Hunt, and M. S. Wilson, “Combining functional and structural reasoning for safety analysis of electrical designs,” Knowl. Eng. Rev., vol. 12, no. 3, pp. 271–287, Sep. 1997.
[20] N. Hughes, E. Chou, C. Price, and M. Lee, “Automating Mechanical FMEA Using Functional Models.,” FLAIRS Conf., 1999.
[21] M. B. Zaman, E. Kobayashi, N. Wakabayashi, S. Khanfir, T. Pitana, and A. Maimun, “Fuzzy FMEA model for risk evaluation of ship collisions in the Malacca Strait: based on AIS data,” J. Simul., vol. 8, no. 1, pp. 91–104, 2013.
[22] S. Kmenta and K. Ishii, “Scenario-Based Failure Modes and Effects Analysis Using Expected Cost,” J. Mech. Des., vol. 126, no. 6, p. 1027, Nov. 2004.
[23] V. Ebrahimipour, K. Rezaie, and S. Shokravi, “An ontology approach to support FMEA studies,” Expert Syst. Appl., vol. 37, no. 1, pp. 671–677, 2010.
[24] K. W. Noh, H. B. Jun, J. H. Lee, G. B. Lee, and H. W. Suh, “Module-based Failure Propagation (MFP) model for FMEA,” Int. J. Adv. Manuf. Technol., vol. 55, no. 5–8, pp. 581–600, 2011.
[25] N. Snooke and C. Price, “Automated FMEA based diagnostic symptom generation,” Adv. Eng. Informatics, vol. 26, no. 4, pp. 870–888, 2012.
[26] M. Hecht, E. Dimpfl, and J. Pinchak, “Automated Generation of Failure Modes and Effects Analysis from SysML Models,” in 2014 IEEE International Symposium on Software Reliability Engineering Workshops, 2014, pp. 62–65.
[27] C. Price, “AutoSteve : Automated Electrical Design Analysis,” Appl. Model. Reason. (Digest No 1997/338), IEE Colloq., pp. 59–63, 1997.
[28] R. Renu, D. Visotsky, S. Knackstedt, G. Mocko, J. D. Summers, and J. Schulte, “A Knowledge Based FMEA to Support Identification and Management of Vehicle Flexible Component Issues,” Procedia CIRP, vol. 44, pp. 157–162, 2016.
[29] G. Li, J. Gao, and F. Chen, “A novel approach for failure modes and effects analysis based on polychromatic sets,” Artif. Intell. Eng. Des. Anal. Manuf., vol. 23, no. 2, p. 119, Nov. 2008.
[30] T. Kurtoglu and I. Y. Tumer, “A Graph-Based Fault Identification and Propagation Framework for Functional Design of Complex Systems,” J. Mech. Des., vol. 130, no. 5, p. 51401, May 2008.
[31] J. Buddhakulsomsiri, Y. Siradeghyan, A. Zakarian, and X. Li, “Association rule-generation algorithm for mining automotive warranty data,” Int. J. Prod. Res., vol. 44, no. 14, pp. 2749–2770, 2006.
[32] R. P. J. C. B. Bose and W. M. P. Aalst, “Discovering Siganture Patterns from Event Logs,” 2013 IEEE Symp. Comput. Intell. Data Min., pp. 111–118, 2013.
[33] C. Yang, Y. Zou, P. Lai, and N. Jiang, “Data mining-based methods for fault isolation with validated FMEA model ranking,” Appl. Intell., vol. 43, no. 4, pp. 913–923, 2015.
[34] C. E. Shannon and W. Weaver, “The Mathematical Theory of Communication,” Math. theory Commun., vol. 27, no. 4, p. 117, 1949.
[35] A. Sachdeva, P. Kumar, and D. Kumar, “Maintenance criticality analysis using TOPSIS,” IEEM 2009 - IEEE Int. Conf. Ind. Eng. Eng. Manag., pp. 199–203, 2009.
[36] O. Mohsen and N. Fereshteh, “An extended VIKOR method based on entropy measure for the failure modes risk assessment – A case study of the geothermal power plant (GPP),” Saf. Sci., vol. 92, pp. 160–172, 2017.
[37] R. Jin, Y. Breitbart, and C. Muoh, “Data Discretization Unification,” Seventh IEEE Int. Conf. Data Min. (ICDM 2007), pp. 183–192, 2007.
[38] D. L. Olson and D. Delen, Advanced data mining techniques. 2008.
[39] K. Das and O. P. Vyas, “A Suitability Study of Discretization Methods for Associative Classifiers,” Int. J. Comput. Appl., vol. 5, no. 10, pp. 46–51, 2010.
[40] M. X. Ribeiro, M. R. P. Ferreira, a. J. M. Traina, and C. Traina Jr., “Data pre-processing: a new algorithm for feature selection and data discretization,” Proc. 5th Int. Conf. Soft Comput. as Transdiscipl. Sci. Technol., pp. 252–257, 2008.
[41] E. Frank and I. H. Witten, “Making better use of global discretization,” pp. 1–12, 1999.
[42] S. Kotsiantis and D. Kanellopoulos, “Discretization Techniques : A recent survey,” GESTS Int. Trans. Comput. Sci. Eng., vol. 32, no. 1, pp. 47–58, 2006.
[43] J. M. Cadenas, M. C. Garrido, and R. Martinez, “Fuzzy Discretization Process from Small Datasets,” Comput. Intell., no. 808, pp. 101–118, 2010.
[44] Y. Sang, H. Qi, K. Li, Y. Jin, D. Yan, and S. Gao, “An effective discretization method for disposing high-dimensional data,” Inf. Sci. (Ny)., vol. 270, pp. 73–91, 2014.
[45] G. Borowik, K. Kowalski, and C. Jankowski, “Novel approach to data discretization,” XXXVI Symp. Photonics Appl. Astron. Commun. Ind. High-Energy Phys. Exp. (Wilga 2015), vol. 9662, p. 96623U, 2015.
[46] S. Ramírez-Gallego et al., “Data discretization: Taxonomy and big data challenge,” Wiley Interdiscip. Rev. Data Min. Knowl. Discov., vol. 6, no. 1, pp. 5–21, 2016.
[47] S. García, J. Luengo, J. A. Sáez, V. López, and F. Herrera, “A survey of discretization techniques: Taxonomy and empirical analysis in supervised learning,” IEEE Trans. Knowl. Data Eng., vol. 25, no. 4, pp. 734–750, 2013.
[48] H. Liu, F. Hussain, C. L. Tan, and M. Dash, “Discretization: An enabling technique,” Data Min. Knowl. Discov., vol. 6, no. 4, pp. 393–423, 2002.
[49] V. Velychko, P. Stanchev, and K. Vanhoof, “Comparison of Discretization Methods for Preprocessing Data for Pyramidal Growing Network Classification Method,” Methods, pp. 31–39.
[50] D. R. Tobergte and S. Curtis, Data Mining know it all, vol. 53, no. 9. 2013.
[51] R. Kerber, “Chimerge: Discretization of numeric attributes,” Proc. tenth Natl. Conf. Artif. Intell., pp. 123–128, 1992.
[52] M. Richeldi, M; Rossotto, “Class-driven statistical discretization of continuous attributes (extended abstract).pdf,” in In European Conference on Machine Learning, 1995, pp. 335–338.
[53] A. A. Freitas and S. H. Lavington, “Speeding up knowledge discovery in large relational databases by means of a new discretization algorithm,” in Lecture Notes in Computer Science, 1996, pp. 124–133.
[54] J. R. Quinlan, “C4.5 Programs for Machine Learning.pdf,” Morgan Kaufmann, vol. 5, no. 3. p. 302, 1993.
[55] U. Fayyad and K. Irani, “Multi-Interval Discretization of Continuous-Valued Attributes for Classification Learning,” Proc. 13th Int. Jt. Conf. Mach. Learn., pp. 1022–1027, 1993.
[56] D. Ju-Long, “Control problems of grey systems,” Syst. Control Lett., vol. 1, no. 5, pp. 288–294, 1982.
[57] B. F. Yıldırım and E. Önder, Çok Kriterli Karar Verme Yöntemleri, 2nd ed. 2015.
[58] C. Chang, P. Liu, and C. Wei, “Failure mode and effects analysis using grey theory,” Integr. Manuf. Syst., vol. 12, no. 3, pp. 211–216, 2001.
[59] C. Wei and Y. Lee, “Failure mode and effects analysis using fuzzy method and grey theory,” Ind. Eng., 1998.
[60] C. Hwang and K. Yoon, Multiple Attribute Decision Making: Methods and Applications, A State of the Art Survey, vol. 1. New York, New York, USA, 1981.
[61] H.-C. Liu, J.-X. You, M.-M. Shan, and L.-N. Shao, “Failure mode and effects analysis using intuitionistic fuzzy hybrid TOPSIS approach,” Int. J. Syst. Sci., vol. 45, no. 10, pp. 2012–2030, 2014.
[62] M. Braglia, M. Frosolini, and R. Montanari, “Fuzzy TOPSIS Approach for Failure Mode, Effects and Criticality Analysis,” Qual. Reliab. Eng. Int., vol. 19, no. 5, pp. 425–443, 2003.
[63] A. Sachdeva and D. Kumar, “Multi-factor failure mode critically analysis using TOPSIS Anish,” Princessaliceadoptionhome.Org, vol. 9, no. 8, pp. 1–9, 2009.
[64] W. Song, X. Ming, Z. Wu, and B. Zhu, “Failure modes and effects analysis using integrated weight-based fuzzy TOPSIS,” Int. J. Comput. Integr. Manuf., vol. 26, no. 12, pp. 1172–1186, 2013.
[65] S. Helvacioglu and E. Ozen, “Fuzzy based failure modes and effect analysis for yacht system design,” Ocean Eng., vol. 79, pp. 131–141, 2014.
[66] S. Opricovic, “Multicriteria optimization of civil engineering systems,” Fac. Civ. Eng. Belgrade, 1998.
[67] H.-C. Liu, L. Liu, N. Liu, and L.-X. Mao, “Risk evaluation in failure mode and effects analysis with extended VIKOR method under fuzzy environment,” Expert Syst. Appl., vol. 39, no. 17, pp. 12926–12934, 2012.
[68] I. Emovon, R. A. Norman, A. J. Murphy, and K. Pazouki, “An integrated multicriteria decision making methodology using compromise solution methods for prioritising risk of marine machinery systems,” Ocean Eng., vol. 105, pp. 92–103, 2015.
[69] H. Safari, Z. Faraji, and S. Majidian, “Identifying and evaluating enterprise architecture risks using FMEA and fuzzy VIKOR,” J. Intell. Manuf., vol. 27, no. 2, pp. 475–486, 2016.
[70] S. G. Eick, M. C. Nelson, and J. D. Schmidt, “Graphical analysis of computer log files,” Commun. ACM, vol. 37, no. 12, pp. 50–56, 1994.
[71] R. Finlayson, D. Cheriton, R. Finlayson, and D. Cheriton, “Log files: an extended file service exploiting write-once storage,” in Proceedings of the eleventh ACM Symposium on Operating systems principles - SOSP ’87, 1987, vol. 21, no. 5, pp. 139–148.
[72] K. Jeon, S. Park, S. Chun, and J. Kim, “A Study on the Big Data Log Analysis for Security,” vol. 10, no. 1, pp. 13–20, 2016.
[73] T. Sipola, A. Juvonen, and J. Lehtonen, “Anomaly detection from network logs using diffusion maps,” vol. 363 AICT, no. PART 1, pp. 172–181, 2011.
[74] M. Wurzenberger, F. Skopik, G. Settanni, and W. Scherrer, “Complex log file synthesis for rapid sandbox-benchmarking of security- and computer network analysis tools,” Inf. Syst., vol. 60, pp. 13–33, 2016.
[75] D. Nguyen, “Failure Modes and Effects Analysis For Software Reliability,” in Annual RELIABILITY and MAINTAINABILITY Symposium, 2001, pp. 219–222.
[76] B. Russo, G. Succi, and W. Pedrycz, “Mining system logs to learn error predictors: a case study of a telemetry system,” Empir. Softw. Eng., vol. 20, no. 4, pp. 879–927, 2014.
[77] I. Mavridis and H. Karatza, “Performance evaluation of cloud-based log file analysis with Apache Hadoop and Apache Spark,” J. Syst. Softw., vol. 125, pp. 133–151, 2017.
[78] R. Agrawal, T. Imielinski, and A. Swami, “Mining Association in Large Databases,” Proc. 1993 ACM SIGMOD Int. Conf. Manag. data - SIGMOD ’93, pp. 207–216, 1993.
[79] Hamdani and R. Wardoyo, “The complexity calculation for group decision making using TOPSIS algorithm,” AIP Conf. Proc., vol. 1755, 2016.