Advertisement

Decomposition of the Failure Histogram

  • Richard R. ZitoEmail author
Chapter

Abstract

Peterson and Arellano (2002) have shown in a seminal paper published in Reliability Review that, in general, the normalized defect rate (normalized failure rate) of software modules usually varies with time according to a Rayleigh distribution (Peterson and Arellano in Reliability Review, 22, 2002). However, the normalized failure rates observed in the “tails” (large values of time) are higher than those predicted by the Rayleigh model. And, the normalized failure rate histograms (normalized failure rate vs. time) of some data sets do not seem to fit the Rayleigh model very well at all. Furthermore, normalized software failure rates observed in the field after development follow an exponential decay law. How are all these difficulties to be resolved? The observations by Peterson and Arellano have profound implications, not just for complex software, but for complex systems in general. This chapter will take their analysis one step further. A unified theory of (normalized) failure rates will be presented that removes the paradoxes of the simple Rayleigh model. It will be shown that the behavior of real-world complex systems can be understood in terms of multiple Rayleigh failure rate laws, one for each subsystem, such that the modes of these Rayleigh distributions have values that are themselves distributed according to a probability density function law. Furthermore, subsequent chapters will demonstrate that this theorem is a fundamental building block of system safety science because it will allow a priori computation of the “Black Swan” probability of unlikely events represented by the area under the tail of real-world (normalized) failure rate laws.

References

  1. 1.
    Peterson, J., & Arellano, R. (2002, March). Modeling software reliability for a widely distributed, safety-critical system. Reliability Review, 22(1).Google Scholar
  2. 2.
    Papoulis, A. (1965). Probability, random variables and stochastic processes (pp. 151–152). New York: McGraw-Hill.zbMATHGoogle Scholar
  3. 3.
    Pearson, C. E. (Ed.) (1983). Handbook of applied mathematics (pp. 163, 1228, 1256–1259). New York: Van Nostrand.Google Scholar
  4. 4.
    Gradshteyn, I. S., & Ryzhik, I. M. (1965). Table of integrals, series, and products (4th ed., p. 340). New York: Academic Press.Google Scholar
  5. 5.
    DeHaan, D. B. (1867). Nouvelles tables D’Integrales definies (p. 144). New York: Hafner.Google Scholar
  6. 6.
    Gradshteyn, I. S., & Ryzhik, I. M. (1965). Table of integrals, series, and products (4th ed., p. 972). New York: Academic Press.Google Scholar
  7. 7.
    Pearson, C. E. (Ed.) (1983). Handbook of applied mathematics (p. 961). New York: Van Nostrand.Google Scholar
  8. 8.
    Jahnke, E., & Emde, F. (1945). Tables of functions (4th ed., p. 19). New York: Dover.zbMATHGoogle Scholar
  9. 9.
    Abramowitz, M., & Stegun, I. A. (1972). Handbook of mathematical functions (p. 258). Washington: NBS.zbMATHGoogle Scholar
  10. 10.
    Jahnke, E., & Emde, F. (1945). Tables of functions (4th ed., p. 2). New York: Dover.zbMATHGoogle Scholar
  11. 11.
    Abramowitz, M., & Stegun, I. A. (1972). Handbook of mathematical functions (p. 255). Washington: NBS.zbMATHGoogle Scholar
  12. 12.
    Hoel, P. G., Port, S. C., & Stone, C. J. (1971). Introduction to statistical theory (p. 226). Boston: Houghton Mifflin.zbMATHGoogle Scholar
  13. 13.
    Anon. Weibull distribution. Wikipedia. http://en.wikipedia.org/wiki/Weibull_distribution. Accessed 29 Dec 2012.
  14. 14.
    Zito, R. R. (2012). The curious bent pin problem-IV: Limit methods. In 30th International System Safety Conference, Atlanta, GA.Google Scholar
  15. 15.
    Jakeman, E., & Pusey, P. N. (1976). A model for non-rayleigh sea echo. IEEE Transactions Antennas and Propagation, AP-24(6), 806–814.Google Scholar
  16. 16.
    Trunk, G. V., & George, S. F. (1970). Detection of targets in non-Gaussian sea clutter. IEEE Transactions Aerospace Electron Systems, AES-6, 620–628.Google Scholar
  17. 17.
    Fisz, M. (1963). Probability theory and mathematical statistics (p. 171). New York: Wiley.zbMATHGoogle Scholar
  18. 18.
    Montgomery, D. C. (2012). Statistical quality control (p. 95). New York: Wiley. ISBN 9781118146811.Google Scholar
  19. 19.
    Anon. (2013). System evolution and reliability of systems. http://www.sys-ev.com/reliability01.htm. Accessed 4 Jan 2013.
  20. 20.
    Crevecoeur, G. U. (1993). A model for the integrity assessment of ageing repairable systems. IEEE Transactions Reliability, 42(1), 148–155.CrossRefGoogle Scholar
  21. 21.
    Crevecoeur, G. U. (1994). Reliability assessment of ageing operating systems. European Journal of Mechanical and Environmental Engineering, 39(4), 219–228.Google Scholar
  22. 22.
    Nelson, W. B. (2003). Applied life data analysis (pp. 1–662). New York: Wiley.Google Scholar
  23. 23.
    Peterson, J. R. (2013, 7 Feb). Raytheon network concentric systems. Fullerton, CA, 714-446-2927, Private Communications.Google Scholar
  24. 24.
    Zito, R. R. (1988). The shape of SAR histograms. Computer Vision, Graphics, and Image Processing, 43, 281–293.CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Richard R. Zito Research LLCTucsonUSA

Personalised recommendations