Академический Документы
Профессиональный Документы
Культура Документы
CEERMA Center for Risk Analysis, Reliability and Environmental Modeling, Federal University of Pernambuco, Recife, PE, Brazil
Center for Risk and Reliability, Mechanical Engineering Department, University of Maryland, College Park, USA
c
PETROBRAS S.A., Brazil
d
Physical Asset Management Lab, Department of Mining Engineering, Ponticia Universidad Catlica de Chile, Santiago, Chile
b
art ic l e i nf o
a b s t r a c t
Article history:
Received 31 January 2014
Received in revised form
17 August 2014
Accepted 15 September 2014
Available online 28 September 2014
This paper proposes a coupling between Risk-Based Inspection (RBI) methodology and Multi-Objective
Genetic Algorithm (MOGA) for dening efcient inspection programs in terms of inspection costs and
risk level, which also comply with restrictions imposed by international standards and/or local
government regulations. The proposed RBI MOGA approach has the following advantages: (i) a userdened risk target is not required; (ii) it is not necessary to estimate the consequences of failures;
(iii) the inspection expenditures become more manageable, which allows assessing the impact of
prevention investments on the risk level; (iv) the proposed framework directly provides, as part of the
solution, the information on how the inspection budget should be efciently spent. Then, genetic
operators are tailored for solving this problem given the huge size of the search space. The ability of the
proposed RBIMOGA in providing efcient solutions is evaluated by means of two examples, one of
them involving an oil and gas separator vessel subject to internal and external corrosion that cause
thinning. The obtained results indicate that the proposed genetic operators signicantly reduce the
search space to be explored and RBIMOGA is a valuable method to support decisions concerning the
mechanical integrity of plant equipment.
& 2014 Elsevier Ltd. All rights reserved.
Keywords:
Inspection programs
Risk reduction
Risk-Based Inspection
Multi-Objective Genetic Algorithm
1. Introduction
Past accidents in several types of industries have demonstrated
that equipment malfunction is one of the major causes of unexpected and undesirable events such as toxic and inammable
discharges, re and explosions. Failures to function properly are
usually due to inadequate integrity management systems that
may result in cracks, holes, ruptures, and consequently loss of
containment of dangerous substances. Therefore, integrity control
has been used for guaranteeing aging machineries work in an
appropriate manner, assuring plant safety against adverse occurrences [1].
In this context, inspection has been used as a technique to
examine the real situation of equipment exposed to damage
mechanisms (e.g., thinning, stress corrosion cracking, hightemperature hydrogen attack, mechanical fatigue, brittle fracture),
thus reducing the uncertainty of its condition. The aim is to
identify these potential damage mechanisms and steer efforts in
http://dx.doi.org/10.1016/j.ress.2014.09.018
0951-8320/& 2014 Elsevier Ltd. All rights reserved.
254
M.d.C. Moura et al. / Reliability Engineering and System Safety 133 (2015) 253265
M.d.C. Moura et al. / Reliability Engineering and System Safety 133 (2015) 253265
2. Risk-Based Inspection
P hf_w k gf f U Dhf_w k U F MS ;
255
Step 6:
Determine the adjustment factors:
- Online Monitoring
- Injection/Mix Points
- Dead Legs
- Welded Construction
- Maintenance
- Settlement
256
M.d.C. Moura et al. / Reliability Engineering and System Safety 133 (2015) 253265
Dhf wn k:F IP :F DL :F WD :F MA :F SM
F OM
and 4r, respectively. Generally, these higher-than-expected corrosion rates are localized in some points of equipment, but they
usually remain undetected until failure occurs [15]. However, the
better the quality of reliability data, the lower the chance of
occurrence of damage states 2 and 3.
Table 3 shows the degree of condence, 0 r , that the actual
corrosion rate r falls into these three possible discrete damage
states i 1; 2; 3; 0 r is assigned based on the source and quality
of the data available at k 0. Thus, the information given in
Table 3 may be used as a priori degree of condence on the
corrosion rate r at k 0, which should be updated in order to
consider the current damage state of the equipment whenever
new inspections are performed at some time k 4 0 in the future.
This updating step, which measures the impact of the inspection
program on the degree of condence on r (and on the state
damage), may be done through Bayesian inference [16] as follows:
k r i jr
Lk rjr i U k 1 r i
;
Lk rjr 1 U k 1 r 1 Lk rjr 2 U k 1 r 2 Lk rjr 3 U k 1 r 3
4
P hf_w k; r i gf f U Dhf_w k; r i U F MS :
Then, P hf_w k is estimated for the hole size h as follows:
3
P hf_w k P hf_w k; r i k r i ;
i1
for
k 0;
P hf_w k P hf_w k; r i k r i jr ;
otherwise:
i1
Table 1
Inspection effectiveness categories.
Source: Ref. [11]
Qualitative inspection
effectiveness category
Description
The inspection methods will correctly identify the true damage state in nearly every case (or 80100% condence).
The inspection methods will correctly identify the true damage state most of the time (or 6080% condence).
The inspection methods will correctly identify the true damage state about half of the time (or 4060% condence).
The inspection methods will provide little information to correctly identify the true damage state (or 2040% condence).
The inspection method will provide no or almost no information that will correctly identify the true damage state and are
considered ineffective for detecting the specic damage mechanism (less than 20% condence).
M.d.C. Moura et al. / Reliability Engineering and System Safety 133 (2015) 253265
257
Table 2
Thinning damage factors.
Source: Ref. [11]
Art
Inspection effectiveness
E
1 Inspection
2 Inspections
3 Inspections
0.02
0.04
0.06
0.08
0.1
0.12
0.14
0.16
0.18
0.2
0.25
0.3
0.35
0.4
0.45
0.5
0.55
0.6
0.65
1
1
1
1
2
6
20
90
250
400
520
650
750
900
1050
1200
1350
1500
1900
1
1
1
1
2
5
17
70
200
300
450
550
650
800
900
1100
1200
1400
1700
1
1
1
1
1
3
10
50
130
210
290
400
550
700
810
970
1130
1250
1400
1
1
1
1
1
2
6
20
70
110
150
200
300
400
500
600
700
850
1000
1
1
1
1
1
1
1
3
7
15
20
30
80
130
200
270
350
500
700
1
1
1
1
1
4
13
50
170
290
350
400
600
700
800
1000
1100
1300
1600
1
1
1
1
1
2
6
20
70
120
170
200
300
400
500
600
750
900
1105
1
1
1
1
1
1
1
4
10
20
30
40
80
120
160
200
300
400
670
1
1
1
1
1
1
1
1
1
1
2
4
10
30
40
60
100
230
530
1
1
1
1
1
3
10
40
130
260
240
320
540
600
700
900
1000
1200
1300
1
1
1
1
1
1
3
10
35
60
80
110
150
200
270
360
500
620
880
1
1
1
1
1
1
1
1
3
5
6
9
20
50
60
80
130
250
550
1
1
1
1
1
1
1
1
1
1
1
2
5
10
20
40
90
210
500
0.02
0.04
0.06
0.08
0.1
0.12
0.14
0.16
0.18
0.2
0.25
0.3
0.35
0.4
0.45
0.5
0.55
0.6
0.65
1
1
1
1
2
6
20
90
250
400
520
650
750
900
1050
1200
1350
1500
1900
1
1
1
1
1
2
7
30
100
180
200
240
440
500
600
800
900
1000
1200
1
1
1
1
1
1
2
5
15
20
30
50
90
140
200
270
350
450
700
1
1
1
1
1
1
1
1
1
2
2
4
10
20
30
50
100
220
530
1
1
1
1
1
1
1
1
1
1
1
2
4
8
15
40
90
210
500
1
1
1
1
1
2
5
20
70
120
150
180
350
400
500
700
800
900
1100
1
1
1
1
1
1
1
2
7
10
15
25
70
110
160
210
260
360
640
1
1
1
1
1
1
1
1
1
1
2
3
6
10
20
40
90
210
500
1
1
1
1
1
1
1
1
1
1
1
2
4
8
15
40
90
210
500
1
1
1
1
1
1
4
14
50
100
120
150
280
350
400
600
700
800
1000
1
1
1
1
1
1
1
1
3
6
7
10
40
90
130
180
240
300
600
1
1
1
1
1
1
1
1
1
1
1
2
5
9
20
40
90
210
500
1
1
1
1
1
1
1
1
1
1
1
2
4
8
15
40
90
210
500
Table 3
Condence in predicted damage rate.
Source: Ref. [15]
Lowreliability
data
Moderatereliability
data
High-reliability data
Predicted
Damage State 1: The damage in the equipment The rate of general corrosion is less than or
is no worse than what is expected based on equal to the rate predicted by past inspection rate (r) or
less
records, or historical data if no inspections
damage rate models or experience.
have been performed.
0.50
0.70
0.80
Damage State 2: The damage in the equipment The rate of general corrosion is as much as
twice the predicted rate.
is somewhat worse than anticipated. This
level of damage is sometimes seen in similar
equipment items.
Predicted
rate (r) to
two times
rate (2r)
0.30
0.20
0.15
Damage State 3: The damage in the equipment The rate of general corrosion is as much as
is considerably worse than anticipated. This four times the predicted rate.
level of damage is rarely seen in similar
equipment items, but has been observed on
occasion industry-wide.
Two (2r) to
four times
(4r)
predicted
rate
0.20
0.10
0.05
(a) Published
data
(b) Corrosion
rate tables
(a) Laboratory
testing
(b) Limited
coupon
corrosion
testing
Examples
Example-general corrosion
Actual
damage
rate range
258
M.d.C. Moura et al. / Reliability Engineering and System Safety 133 (2015) 253265
Table 4
General corrosioninspection effectiveness.
Source: Ref. [15]
Damage rate
state
Likelihood that
inspection result
determines the true
damage
A
1
2
D/E
First part of Eq. (5) allows propagating the uncertainty on the state
damage to P hf_w k at k 0, when just information given in Table 3
is available. As an inspection technique is performed at k 4 0, we
update the degree of condence on the state damage based on
information in Table 4 and via Eq. (4), which yields k r i jr , and
then we estimate P hf_w k. In this way, the effectiveness of the
inspection techniques performed at each period k, which is
determined in the adopted inspection program, directly inuences
the computation of P hf_w k. Thus, Eq. (5) provides (Fig. 1 Step 7)
the up-to-date P hf_w k for one damage mechanism w, for which
the total probability is given in Fig. 1 Step 8 as follows:
P f _w k P hf_w k:
M.d.C. Moura et al. / Reliability Engineering and System Safety 133 (2015) 253265
259
min C x
j1
10
min P f x P f k;
11
12
k1
260
M.d.C. Moura et al. / Reliability Engineering and System Safety 133 (2015) 253265
Period
Inspection plan
1
0
2
1
3
0
4
0
Technique 2
5
1
6
0
1
1
2
0
3
1
4
1
4.4. Mutation
Table 5
Individual representation for MOGA (inspection plan).
Technique 1
Fig. 3. (a) Example of binary crossover procedure and (b) solving unfeasibility of
child 2.
Technique 3
5
0
6
0
1
1
2
0
3
0
4
0
5
0
6
1
M.d.C. Moura et al. / Reliability Engineering and System Safety 133 (2015) 253265
MOGA+RBI
h
Obtain gff ,
h = 1/4, 1, 4, 16,
and FMS via RBI
Start
Generation of
initial population
Selection and
Paux update
Generation number = 0
Crossover
Replacement
Mutation
No
Pf (x ) via RBI
(Sections 2.1 and 2.2)
C(xi)
i = 1, ..., N
Fitness evaluation
261
Maximum
number of generations is
reached?
Yes
Update Paux
End
5. Numerical experiments
In this section, a numerical example is solved by the proposed
RBI MOGA approach in order to compare the obtained results
against the real non-dominated inspection plans, which are in turn
provided by an exhaustive recursive algorithm. A planning horizon
of m 10 years is considered, n 3 inspection techniques are
available, and two damage mechanisms act on the equipment
(internal and external corrosion) both causing thinning. Techniques 2 and 3 require equipment shutdown; thus they generate
downtime costs. This example has 113,092,992 feasible inspection
plans, which represent 10.53% of the entire search space, and 46
non-dominated solutions.
The required parameters for computing C x (Eq. (10)) and P f x
(Eq. (11)) are presented in Table 6; consider also that lowreliability data (see Table 3) was available at k 0 to estimate
h
the corrosion rates. The gf f for h 1/4, 1, 4 and 16 are,
respectively, 8 10 6 ; 2 10 5 ; 2 10 6 and 6 10 7 failures per year and F MS 1. Table 7 presents the MOGA parameters.
In order to evaluate the stochastic behavior of RBI MOGA, we
ran 100 replications. Some descriptive statistics are shown in
Table 8. In all cases, RBI MOGA was able to nd almost all
solutions from the true Pareto front. In the worst case, about
91% of the exact solutions were provided by RBI MOGA. Such a
proportion is approximately 98% for the best case. The exhaustive
262
M.d.C. Moura et al. / Reliability Engineering and System Safety 133 (2015) 253265
Table 6
RBI parameters and inspection costs, validation example.
Technique
1
2
3
t j; max (years)
1
3
7
cj
1000
5000
10,000
cp
cd
100
500
F OM F IP F DL F WD F MA F SM 1
Damage mechanism
Thickness (mm)
Internal corrosion
Effectiveness
External corrosion
Initial
E
B
A
B
B
A
12
0.08
0.06
Value
size (N)
generations (Ngen)
of crossover (pc)
cut points (c)
of mutation (pm)
250
500
0.95
8
0.05
Pf(x)
Population
Number of
Probability
Number of
Probability
10
r EC 0:6
Table 7
MOGA parameters.
Parameter
Minimum (t min )
0.04
0.02
0.00
4
10
Number of solutions
Minimum
Median
Maximum
Mean
Std. dev.
43
46
46
45.57
0.5730
42
44
45
44.28
0.5333
M.d.C. Moura et al. / Reliability Engineering and System Safety 133 (2015) 253265
263
Table 9
RBI parameters and inspection costs, application example
Technique
t j; max (years)
1
2
3
cj
3
7
15
Damage mechanism
1000
5000
10,000
cp
cd
300
1000
F OM F IP F DL F WD F MA F SM 1
Thickness (mm)
Internal corrosion
Effectiveness
External corrosion
Initial
Minimum (t min )
E
B
A
B
B
A
16
12
r EC 0:454
Table 10
Plan with inspections performed as late as possible in accordance with [17].
Pareto front:
Table 11
Descriptive statistics for the number of solutions per front (30 replications).
Minimum
Median
Maximum
Mean
Std. dev.
112
116
121
116.4
2.2664
0.12
IP1
0.10
Pf(x)
0.08
0.06
0.04
IP2
0.02
IP3
0.00
50000
100000
150000
C(x)
Fig. 7. Pareto front for application example and some selected solutions: C x vs.
P f x
ROI
P f xj P f xi
;
C xj C xi
where i and j are different solutions from the Pareto front. For
example, each monetary unit invested in inspection activities to go
from solution IP 1 to IP 2 corresponds to a reduction of 3:43 10 6
in P f x. On the other hand, from solution IP 2 to IP 3 each additional
monetary unit would reduce P f x by 2:94 10 7 . Thus, high
investments in inspection do not necessarily mean signicant
reductions on the total P f x.
The obtained P f x can be used to compute the risk Rx
associated with every inspection program x from the Pareto front
as the nancial consequence FC is available. In order to illustrate, a
consequence analysis was performed according to Ref. [11] for
the oil and gas separator vessel and FC $ 2; 246; 908:17 was
estimated as given in Section 2.3. The Pareto front presenting
the trade-off between C x and Rx is given in Fig. 9. Note that the
fronts in Figs. 7 and 9 have the same shape and, as expected, the
only difference between them is the scale factor FC, which is
reected in the values of the vertical axis.
If the risk must be smaller than a preset target value Rt ,
possibly to comply with safety regulations, i.e., Rx r Rt or
equivalently P f x r Rt =FC, Pareto solutions satisfying such a constraint are in the region below the corresponding horizontal line
dened by Rt or by Rt =FC in the graphs C x vs. Rx or C x vs. P f x,
respectively. As an illustration, for the present example, if
Rx rRt 45; 000 and consequently P f x r 0:02, there are 87
valid solutions (all of them are under the horizontal lines shown
in Figs. 7 and 9).
It is important to emphasize that in order to obtain the most
efcient inspection programs regarding both C x and Rx through
the proposed RBI MOGA approach, it is not necessary to develop
the very demanding task of assessing the consequences of failure
since the only component that makes the risk level vary over time
is P f x. Thus, the effort to accomplish the analysis is fairly reduced.
Even if a risk constraint is mandatory, it can be considered in a
posterior step, when FC becomes available. This is possible
because, as P f x is an objective to be minimized, such a constraint
264
M.d.C. Moura et al. / Reliability Engineering and System Safety 133 (2015) 253265
Table 12
Selected solutions from Pareto front.
3.5
Pf(k) x 102
3.0
2.5
2.0
1.5
1.0
0.5
0.0
5
10
15
20
k
Fig. 8. Probability P f k
R(x)
250000
IP1
150000
IP2
50000
taken as an objective, the inspection expenditures become manageable and it was possible to assess the impact of prevention
investments on P f x, and then on Rx; this would not be possible
if only RBI methodology had been adopted.
In the MOGA portion, the genetic operators were adapted for
the creation of only feasible inspection programs, which should be
in compliance with restrictions that might be imposed by international standard and/or local regulations. In this way, MOGA
explored the search space in a more efcient way, as only its
feasible portion had been taken into account.
The proposed RBI MOGA was applied to two examples, one of
them involving an oil and gas separator vessel. For these cases,
it was possible to provide information on how the inspection
budget should be spent more efciently, which involves dening
the whole inspection program associated with each pair (P f x,
C x). An ROI analysis was performed on the obtained nondominated inspection programs and it could be inferred that high
investments in inspection do not necessarily yield a signicant
reduction of P f x (thus, Rx). Finally, the results suggest that the
RBI MOGA with the post-optimization ROI analysis is an effective
tool to support efcient decisions related to mechanical integrity
of equipment.
IP3
0
50000
100000
150000
C(x)
Fig. 9. Pareto front for application example and some selected solutions: C x vs. Rx
Acknowledgments
The rst three authors thank the Brazilian research-funding
agency Conselho Nacional de Desenvolvimento Cientco e Tecnolgico (CNPq) for the nancial support through research grants.
References
7. Conclusion
In this paper, an original RBI MOGA methodology was developed in order to provide the decision maker with efcient
inspection programs in terms of both inspection costs C x and
risk Rx (by the direct minimization of P f x). The RBI methodology was used to assess P f x related to the candidate inspection
programs x provided by MOGA.
The fact of directly considering P f x as an objective to be
optimized has two advantages: (i) rst, the user-dened risk target
Rt was no longer required as established in [11]; (ii) the step of
estimating the nancial consequences FC of failures may be
skipped, saving a lot of effort and time. Moreover, as C x is also
M.d.C. Moura et al. / Reliability Engineering and System Safety 133 (2015) 253265
[8] Marangone FC, Freire JLF. Management of the integrity of a pressure vessel
using risk-based inspection (in Portuguese). In: 8a Conferncia sobre Tecnologia de Equipamentos; 2005.
[9] Vinod G, Sharma PK, Santosh TV, Prasad MH, Vaze KK. New approach for risk
based inspection of H2S based process plants. Ann Nucl Energy 2014;66:139.
[10] Shuai J, Han K, Xu X. Risk-based inspection for large-scale crude oil tanks. J
Loss Prev Process Ind 2012;25(1):16675.
[11] API-RBI-581. API (American Petroleum Institute) recommended practice 581:
risk-based inspection technology, 2nd ed. Washington, DC; 2008.
[12] Deb K. Evolutionary algorithms for multicriterion optimization in engineering
design. In: Proceedings of evolutionary algorithms in engineering and computer science (EUROGEN'99); 1999.
[13] Goldberg DE. Genetic algorithms in search, optimization, and machine learning. Reading: Addison-Wesley; 1989.
[14] Modarres M. Risk analysis in engineering: techniques, tools and trends. BocaRaton: Taylor & Francis; 2006.
[15] API-RBI-581. API (American Petroleum Institute) publication 581: risk-based
inspection base resource document. Washington, DC; 2000.
265
[16] Bernardo JM, Smith AFM. Bayesian theory. London, UK: John Wiley & Sons
Ltd.; 1994.
[17] NR-13. Regulamentation standard NR-13 pressure vessels and boilers
(in Portuguese). Ministrio do Trabalho e Emprego do Brasil; 2008.
[18] Lins S. Principles of enumeration (in Portuguese). Rio de Janeiro: Instituto de
Matemtica Pura e Aplicada; 1981.
[19] Lins ID, Droguett EL. Redundancy allocation problems considering systems
with imperfect repairs using multi-objective genetic algorithms and discrete
event simulation. Simul Model Pract Theory 2011;19:36281.
[20] Michalewicz Z. Genetic algorithms data structures evolution programs. 3rd
ed. Berlin: Springer; 1996.