SlideShare a Scribd company logo
1 of 18
Fault Tree Analysis 
Product Configuration 
(applications of BDD) 
Sanjay Saha 
MSc. (1st year) 
University of Dhaka
Fault Tree Analysis 
11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 2
Fault Tree Analysis: Intro 
• a Systematic and Stylized Process 
• Deductive 
• From an initializing event 
• To the base causes of the event 
• Combination of events 
11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 3
Fault Tree Analysis: How? 
• An event first occurs 
• The event is resolved into two immediate and 
necessary causal events. 
• The event is related to causal events using 
appropriate logic 
• To the base causes of the event 
• Repeated until basic causes are found. 
11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 4
Fault Tree Analysis: How? 
• An undesired event is defined 
• The event is resolved into its immediate 
causes 
• This resolution of events continues until basic 
causes are identified 
• A logical diagram called a fault tree is 
constructed 
• Showing the logical event relationships 
11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 5
Fault Tree Analysis: Why? 
• To exhaustively identify the causes of a failure 
• To identify weaknesses in a system 
• To assess a proposed design for its reliability or safety 
• To identify effects of human errors 
• To prioritize contributors to failure 
• To identify effective upgrades to a system 
• To quantify the failure probability and contributors 
• To optimize tests and maintenances 
11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 6
Fault Tree Analysis: Roles 
• FTA is used to resolve the causes of system failure 
• FTA is used to quantify system failure probability 
• FTA is used to evaluate potential upgrades to a 
system 
• FTA is used to optimize resources in assuring system 
safety 
• FTA is used to resolve causes of an incident 
• FTA is used to model system failures in risk 
assessments 
11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 7
Fault Tree Analysis: Structures(1/3) 
11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 8
Fault Tree Analysis: Structures(2/3) 
11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 9
Fault Tree Analysis: Structures(3/3) 
11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 10
Fault Tree Analysis: Example(1/4) 
11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 11
Fault Tree Analysis: Example(2/4) 
11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 12
Fault Tree Analysis: Example(3/4) 
11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 13
Fault Tree Analysis: Example(4/4) 
11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 14
Product Configuration 
11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 15
Product Conf. : Intro 
• Also known as knowledge-based 
configuration 
• Activity of customizing 
• To meet the needs of a particular customer 
• A fixed set of well defined components 
• Different constraints 
• Result: List of instances 
component 
Product 
component 
component 
component 
11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 16
Product Conf. : Example 
11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 17
11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 18

More Related Content

What's hot

Root Cause Corrective Action
Root Cause Corrective ActionRoot Cause Corrective Action
Root Cause Corrective ActionUbersoldat
 
Root Cause Analysis
Root Cause AnalysisRoot Cause Analysis
Root Cause Analysistqmdoctor
 
fault tree analysis
fault tree analysisfault tree analysis
fault tree analysisSiti Mastura
 
Root cause analysis common problems and solutions
Root cause analysis common problems and solutions Root cause analysis common problems and solutions
Root cause analysis common problems and solutions ASQ Reliability Division
 
Fault tree analysis
Fault tree analysisFault tree analysis
Fault tree analysiselsonpaul11
 
Total productive maintenance(TPM)
Total productive maintenance(TPM)Total productive maintenance(TPM)
Total productive maintenance(TPM)Md.Muzahid Khan
 
5 Why Training Slides Oct 14, 2009
5 Why Training Slides Oct 14, 20095 Why Training Slides Oct 14, 2009
5 Why Training Slides Oct 14, 2009ExerciseLeanLLC
 
Introduction to Root Cause Analysis
Introduction to Root Cause AnalysisIntroduction to Root Cause Analysis
Introduction to Root Cause AnalysisCarmel Khan
 
Root Cause Analysis and Corrective Actions
Root Cause Analysis and Corrective ActionsRoot Cause Analysis and Corrective Actions
Root Cause Analysis and Corrective ActionsHannah Stewart
 
Fault Tree Analysis-Concepts and Application-Bill Vesely
Fault Tree Analysis-Concepts and Application-Bill VeselyFault Tree Analysis-Concepts and Application-Bill Vesely
Fault Tree Analysis-Concepts and Application-Bill VeselyMassimo Talia
 
FMEA - Failure mode and effects analysis
FMEA - Failure mode and effects analysisFMEA - Failure mode and effects analysis
FMEA - Failure mode and effects analysisSoumyajit Bhuin
 
Fault tree and event tree in risk analysis
Fault tree and event tree in risk analysisFault tree and event tree in risk analysis
Fault tree and event tree in risk analysisJennifer Gutierrez
 
Effective CAPA Implementation in a Management System - Praneet Surti
Effective CAPA Implementation in a Management System - Praneet SurtiEffective CAPA Implementation in a Management System - Praneet Surti
Effective CAPA Implementation in a Management System - Praneet SurtiPraneet Surti
 
Mini-Training: Using root-cause analysis for problem management
Mini-Training: Using root-cause analysis for problem managementMini-Training: Using root-cause analysis for problem management
Mini-Training: Using root-cause analysis for problem managementBetclic Everest Group Tech Team
 

What's hot (20)

Abnomality and jishu hozen
Abnomality and jishu hozenAbnomality and jishu hozen
Abnomality and jishu hozen
 
Root Cause Corrective Action
Root Cause Corrective ActionRoot Cause Corrective Action
Root Cause Corrective Action
 
Root Cause Analysis
Root Cause AnalysisRoot Cause Analysis
Root Cause Analysis
 
fault tree analysis
fault tree analysisfault tree analysis
fault tree analysis
 
Root Cause Analysis ( RCA )
Root Cause Analysis ( RCA )Root Cause Analysis ( RCA )
Root Cause Analysis ( RCA )
 
Root cause analysis common problems and solutions
Root cause analysis common problems and solutions Root cause analysis common problems and solutions
Root cause analysis common problems and solutions
 
Fault tree analysis
Fault tree analysisFault tree analysis
Fault tree analysis
 
Total productive maintenance(TPM)
Total productive maintenance(TPM)Total productive maintenance(TPM)
Total productive maintenance(TPM)
 
5 Why Training Slides Oct 14, 2009
5 Why Training Slides Oct 14, 20095 Why Training Slides Oct 14, 2009
5 Why Training Slides Oct 14, 2009
 
Root cause analysis by: ICG Team
Root cause analysis by: ICG TeamRoot cause analysis by: ICG Team
Root cause analysis by: ICG Team
 
Msa presentation
Msa presentationMsa presentation
Msa presentation
 
Introduction to Root Cause Analysis
Introduction to Root Cause AnalysisIntroduction to Root Cause Analysis
Introduction to Root Cause Analysis
 
Root Cause Analysis and Corrective Actions
Root Cause Analysis and Corrective ActionsRoot Cause Analysis and Corrective Actions
Root Cause Analysis and Corrective Actions
 
Fault Tree Analysis-Concepts and Application-Bill Vesely
Fault Tree Analysis-Concepts and Application-Bill VeselyFault Tree Analysis-Concepts and Application-Bill Vesely
Fault Tree Analysis-Concepts and Application-Bill Vesely
 
FMEA - Failure mode and effects analysis
FMEA - Failure mode and effects analysisFMEA - Failure mode and effects analysis
FMEA - Failure mode and effects analysis
 
Top 25 lean tools
Top 25 lean toolsTop 25 lean tools
Top 25 lean tools
 
Fault tree and event tree in risk analysis
Fault tree and event tree in risk analysisFault tree and event tree in risk analysis
Fault tree and event tree in risk analysis
 
Effective CAPA Implementation in a Management System - Praneet Surti
Effective CAPA Implementation in a Management System - Praneet SurtiEffective CAPA Implementation in a Management System - Praneet Surti
Effective CAPA Implementation in a Management System - Praneet Surti
 
Mini-Training: Using root-cause analysis for problem management
Mini-Training: Using root-cause analysis for problem managementMini-Training: Using root-cause analysis for problem management
Mini-Training: Using root-cause analysis for problem management
 
Root cause analysis
Root cause analysisRoot cause analysis
Root cause analysis
 

Viewers also liked

FAULT TREE ANALYSIS (FTA) SEMINAR PRESENTATION
FAULT TREE ANALYSIS (FTA) SEMINAR PRESENTATIONFAULT TREE ANALYSIS (FTA) SEMINAR PRESENTATION
FAULT TREE ANALYSIS (FTA) SEMINAR PRESENTATIONOrange Slides
 
FAULT & EVENT TREE ANALYSIS
FAULT & EVENT TREE ANALYSISFAULT & EVENT TREE ANALYSIS
FAULT & EVENT TREE ANALYSISNitesh Dongare
 
Fault treepoker 2010-07-31_release
Fault treepoker 2010-07-31_releaseFault treepoker 2010-07-31_release
Fault treepoker 2010-07-31_releaseWilliam L. McGill
 
Fault Tree Analysis for the EnergyGrid
Fault Tree Analysis for the EnergyGridFault Tree Analysis for the EnergyGrid
Fault Tree Analysis for the EnergyGridE P
 
Safety Analysis Profile
Safety Analysis ProfileSafety Analysis Profile
Safety Analysis ProfileBruce Douglass
 
Pengenalan kepada latihan pemanduan modul perubatan & etika dan profesionalisma
Pengenalan kepada  latihan pemanduan modul perubatan & etika dan profesionalismaPengenalan kepada  latihan pemanduan modul perubatan & etika dan profesionalisma
Pengenalan kepada latihan pemanduan modul perubatan & etika dan profesionalismaLee Oi Wah
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...SlideShare
 

Viewers also liked (14)

FAULT TREE ANALYSIS (FTA) SEMINAR PRESENTATION
FAULT TREE ANALYSIS (FTA) SEMINAR PRESENTATIONFAULT TREE ANALYSIS (FTA) SEMINAR PRESENTATION
FAULT TREE ANALYSIS (FTA) SEMINAR PRESENTATION
 
FAULT & EVENT TREE ANALYSIS
FAULT & EVENT TREE ANALYSISFAULT & EVENT TREE ANALYSIS
FAULT & EVENT TREE ANALYSIS
 
fault tree analysis
fault tree analysisfault tree analysis
fault tree analysis
 
Fault Tree Analysis
Fault Tree AnalysisFault Tree Analysis
Fault Tree Analysis
 
Penjelasan Fault tree analysis
Penjelasan Fault tree analysisPenjelasan Fault tree analysis
Penjelasan Fault tree analysis
 
ST-PRA
ST-PRAST-PRA
ST-PRA
 
Rpra1
Rpra1Rpra1
Rpra1
 
Fault treepoker 2010-07-31_release
Fault treepoker 2010-07-31_releaseFault treepoker 2010-07-31_release
Fault treepoker 2010-07-31_release
 
Fault Tree Analysis for the EnergyGrid
Fault Tree Analysis for the EnergyGridFault Tree Analysis for the EnergyGrid
Fault Tree Analysis for the EnergyGrid
 
Safety Analysis Profile
Safety Analysis ProfileSafety Analysis Profile
Safety Analysis Profile
 
Pengenalan kepada latihan pemanduan modul perubatan & etika dan profesionalisma
Pengenalan kepada  latihan pemanduan modul perubatan & etika dan profesionalismaPengenalan kepada  latihan pemanduan modul perubatan & etika dan profesionalisma
Pengenalan kepada latihan pemanduan modul perubatan & etika dan profesionalisma
 
OSHA
OSHAOSHA
OSHA
 
Manper06 fta
Manper06 ftaManper06 fta
Manper06 fta
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
 

Similar to Fault Tree Analysis

Iimsr student management system
Iimsr student management systemIimsr student management system
Iimsr student management systemSHUJA SHABBIR
 
Chapter 6 - Tool Support for Testing
Chapter 6 - Tool Support for TestingChapter 6 - Tool Support for Testing
Chapter 6 - Tool Support for TestingNeeraj Kumar Singh
 
Brightspace Analytics Core
Brightspace Analytics CoreBrightspace Analytics Core
Brightspace Analytics CoreD2L Barry
 
May/June 2010 Scenario 4
May/June 2010 Scenario 4May/June 2010 Scenario 4
May/June 2010 Scenario 4ianwbhs
 
Role of Statistics In Research.pptx
Role of Statistics In Research.pptxRole of Statistics In Research.pptx
Role of Statistics In Research.pptxDipsanuPaul
 
CSC426 - Software Engineering Lecture Note
CSC426   - Software Engineering Lecture NoteCSC426   - Software Engineering Lecture Note
CSC426 - Software Engineering Lecture NoteBro Shola Ajayi
 
As Applied ICT term 3 Ex 10
As Applied ICT term 3 Ex 10As Applied ICT term 3 Ex 10
As Applied ICT term 3 Ex 10Jordan_0009
 
tool support for testing
tool support for testingtool support for testing
tool support for testingaidil fitra
 
Seminar Proposal Tugas Akhir - SPK Pemilihan tema Tugas Akhir menggunakan Ana...
Seminar Proposal Tugas Akhir - SPK Pemilihan tema Tugas Akhir menggunakan Ana...Seminar Proposal Tugas Akhir - SPK Pemilihan tema Tugas Akhir menggunakan Ana...
Seminar Proposal Tugas Akhir - SPK Pemilihan tema Tugas Akhir menggunakan Ana...Dila Nurlaila
 
Implementing research plan
Implementing research planImplementing research plan
Implementing research plannikhilap
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]owenchambers11
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]owenchambers11
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]owenchambers11
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]owenchambers11
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]owenchambers11
 

Similar to Fault Tree Analysis (20)

Iimsr student management system
Iimsr student management systemIimsr student management system
Iimsr student management system
 
Chapter 6 - Tool Support for Testing
Chapter 6 - Tool Support for TestingChapter 6 - Tool Support for Testing
Chapter 6 - Tool Support for Testing
 
Brightspace Analytics Core
Brightspace Analytics CoreBrightspace Analytics Core
Brightspace Analytics Core
 
May/June 2010 Scenario 4
May/June 2010 Scenario 4May/June 2010 Scenario 4
May/June 2010 Scenario 4
 
Role of Statistics In Research.pptx
Role of Statistics In Research.pptxRole of Statistics In Research.pptx
Role of Statistics In Research.pptx
 
CSC426 - Software Engineering Lecture Note
CSC426   - Software Engineering Lecture NoteCSC426   - Software Engineering Lecture Note
CSC426 - Software Engineering Lecture Note
 
test
testtest
test
 
SDET UNIT 3.pptx
SDET UNIT 3.pptxSDET UNIT 3.pptx
SDET UNIT 3.pptx
 
Showcase 2
Showcase 2Showcase 2
Showcase 2
 
As Applied ICT term 3 Ex 10
As Applied ICT term 3 Ex 10As Applied ICT term 3 Ex 10
As Applied ICT term 3 Ex 10
 
Systematic Literature Review
Systematic Literature ReviewSystematic Literature Review
Systematic Literature Review
 
Scenario 4
Scenario 4Scenario 4
Scenario 4
 
tool support for testing
tool support for testingtool support for testing
tool support for testing
 
Seminar Proposal Tugas Akhir - SPK Pemilihan tema Tugas Akhir menggunakan Ana...
Seminar Proposal Tugas Akhir - SPK Pemilihan tema Tugas Akhir menggunakan Ana...Seminar Proposal Tugas Akhir - SPK Pemilihan tema Tugas Akhir menggunakan Ana...
Seminar Proposal Tugas Akhir - SPK Pemilihan tema Tugas Akhir menggunakan Ana...
 
Implementing research plan
Implementing research planImplementing research plan
Implementing research plan
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]
 
May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]May june 2010 scenario 4 [documentation]
May june 2010 scenario 4 [documentation]
 

More from Sanjay Saha

Face Recognition Basic Terminologies
Face Recognition Basic TerminologiesFace Recognition Basic Terminologies
Face Recognition Basic TerminologiesSanjay Saha
 
Is Face Recognition Safe from Realizable Attacks? - IJCB 2020 - Sanjay Saha, ...
Is Face Recognition Safe from Realizable Attacks? - IJCB 2020 - Sanjay Saha, ...Is Face Recognition Safe from Realizable Attacks? - IJCB 2020 - Sanjay Saha, ...
Is Face Recognition Safe from Realizable Attacks? - IJCB 2020 - Sanjay Saha, ...Sanjay Saha
 
ResNet basics (Deep Residual Network for Image Recognition)
ResNet basics (Deep Residual Network for Image Recognition)ResNet basics (Deep Residual Network for Image Recognition)
ResNet basics (Deep Residual Network for Image Recognition)Sanjay Saha
 
Convolutional Deep Belief Nets by Lee. H. 2009
Convolutional Deep Belief Nets by Lee. H. 2009Convolutional Deep Belief Nets by Lee. H. 2009
Convolutional Deep Belief Nets by Lee. H. 2009Sanjay Saha
 
Image Degradation & Resoration
Image Degradation & ResorationImage Degradation & Resoration
Image Degradation & ResorationSanjay Saha
 
Stack and Queue (brief)
Stack and Queue (brief)Stack and Queue (brief)
Stack and Queue (brief)Sanjay Saha
 

More from Sanjay Saha (7)

Face Recognition Basic Terminologies
Face Recognition Basic TerminologiesFace Recognition Basic Terminologies
Face Recognition Basic Terminologies
 
Is Face Recognition Safe from Realizable Attacks? - IJCB 2020 - Sanjay Saha, ...
Is Face Recognition Safe from Realizable Attacks? - IJCB 2020 - Sanjay Saha, ...Is Face Recognition Safe from Realizable Attacks? - IJCB 2020 - Sanjay Saha, ...
Is Face Recognition Safe from Realizable Attacks? - IJCB 2020 - Sanjay Saha, ...
 
ResNet basics (Deep Residual Network for Image Recognition)
ResNet basics (Deep Residual Network for Image Recognition)ResNet basics (Deep Residual Network for Image Recognition)
ResNet basics (Deep Residual Network for Image Recognition)
 
Convolutional Deep Belief Nets by Lee. H. 2009
Convolutional Deep Belief Nets by Lee. H. 2009Convolutional Deep Belief Nets by Lee. H. 2009
Convolutional Deep Belief Nets by Lee. H. 2009
 
IEEE_802.11e
IEEE_802.11eIEEE_802.11e
IEEE_802.11e
 
Image Degradation & Resoration
Image Degradation & ResorationImage Degradation & Resoration
Image Degradation & Resoration
 
Stack and Queue (brief)
Stack and Queue (brief)Stack and Queue (brief)
Stack and Queue (brief)
 

Recently uploaded

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Fault Tree Analysis

  • 1. Fault Tree Analysis Product Configuration (applications of BDD) Sanjay Saha MSc. (1st year) University of Dhaka
  • 2. Fault Tree Analysis 11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 2
  • 3. Fault Tree Analysis: Intro • a Systematic and Stylized Process • Deductive • From an initializing event • To the base causes of the event • Combination of events 11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 3
  • 4. Fault Tree Analysis: How? • An event first occurs • The event is resolved into two immediate and necessary causal events. • The event is related to causal events using appropriate logic • To the base causes of the event • Repeated until basic causes are found. 11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 4
  • 5. Fault Tree Analysis: How? • An undesired event is defined • The event is resolved into its immediate causes • This resolution of events continues until basic causes are identified • A logical diagram called a fault tree is constructed • Showing the logical event relationships 11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 5
  • 6. Fault Tree Analysis: Why? • To exhaustively identify the causes of a failure • To identify weaknesses in a system • To assess a proposed design for its reliability or safety • To identify effects of human errors • To prioritize contributors to failure • To identify effective upgrades to a system • To quantify the failure probability and contributors • To optimize tests and maintenances 11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 6
  • 7. Fault Tree Analysis: Roles • FTA is used to resolve the causes of system failure • FTA is used to quantify system failure probability • FTA is used to evaluate potential upgrades to a system • FTA is used to optimize resources in assuring system safety • FTA is used to resolve causes of an incident • FTA is used to model system failures in risk assessments 11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 7
  • 8. Fault Tree Analysis: Structures(1/3) 11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 8
  • 9. Fault Tree Analysis: Structures(2/3) 11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 9
  • 10. Fault Tree Analysis: Structures(3/3) 11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 10
  • 11. Fault Tree Analysis: Example(1/4) 11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 11
  • 12. Fault Tree Analysis: Example(2/4) 11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 12
  • 13. Fault Tree Analysis: Example(3/4) 11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 13
  • 14. Fault Tree Analysis: Example(4/4) 11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 14
  • 15. Product Configuration 11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 15
  • 16. Product Conf. : Intro • Also known as knowledge-based configuration • Activity of customizing • To meet the needs of a particular customer • A fixed set of well defined components • Different constraints • Result: List of instances component Product component component component 11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 16
  • 17. Product Conf. : Example 11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 17
  • 18. 11/28/2014 Sanjay Saha, mail_sanjaysaha@yahoo.com 18