Next Article in Journal
An Approach to a Linked Corpus Creation for a Literary Heritage Based on the Extraction of Entities from Texts
Previous Article in Journal
Exploring the Impact of Ambient and Character Sounds on Player Experience in Video Games
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Aggregation of Risk Management and Non-Parametric Models to Rank Failure Modes of Radio Frequency Identification Systems

Department of Industrial Engineering, Eastern Mediterranean University, Turkish Republic of Northern Cyprus (TRNC), Via Mersin 10, Gazimagusa 99628, Turkey
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(2), 584; https://doi.org/10.3390/app14020584
Submission received: 27 November 2023 / Revised: 26 December 2023 / Accepted: 2 January 2024 / Published: 9 January 2024
(This article belongs to the Section Applied Industrial Technologies)

Abstract

:

Featured Application

The method is applied to the RFID system but can be implemented to assess the risks of any other equipment or process.

Abstract

The failure mode causes and effects analysis (FMCEA) is a commonly used reliability approach. It identifies, predicts, and analyzes potential failure modes affecting the proper function of equipment or the process under study, along with their roots and consequences. FMCEA aims to evaluate and assess the risks resulting from their occurrence, intending to suggest corresponding repair, adjustment, and precautionary measures to be planned during the conception, instruction, or implementation stages. However, the FMCEA has been criticized in the literature for its many inherent shortcomings related to risk assessment and prioritization. Therefore, this study presents an enhanced FMCEA method to address the deficiencies of the traditional risk priority number (RPN) and improve the reliability of risk assessments and corrective actions. A data envelopment analysis (DEA), as a non-parametric method, is used to evaluate the efficiency of these failures by considering their fixing time and cost and deciding on their final priority ranks. Sub-failure modes and their interrelationships are also taken into account. The radio frequency identification (RFID) system was chosen as an example due to its core role in Industry 4.0 and the Internet of Things (IoT) to demonstrate the effectiveness and usefulness of the proposed method. A total of 67 failures related to both hardware and software parts, including the environmental impacts of this technology, have been disclosed. The results of the conventional and the suggested FMCEA methods are found to be considerably different, with ten failure modes classified as being the most efficient.

1. Introduction

A failure mode causes and effects analysis (FMCEA) is an analytical technique that combines technology and the knowledge of experts. It is used to identify the possible failure modes (FMs) of a product or a process and manages to eliminate their negative effects. The traditional FMCEA method prioritizes the FMs based on the decreasing values of their risk priority numbers (RPNs), which are equal to the product of the risk factors (occurrence, O; severity, S; and detection, D) [1].
However, the conventional FMCEA has been criticized in the literature due to several deficiencies, including (i) the assignment of equal weights to the risk factors in the RPN computation. Additionally, another drawback of the FMEA method is that (ii) attention is not paid to the time and cost spent to solve the FMs; sometimes, the time and cost spent to fix the riskiest FM can be used to fix many other different FMs in lower ranks. Another issue that may be faced while applying the FMCEA is (iii) that some FMs (parent failures) may have sub-failure modes (SFMs); those sub-failures are most likely to have different risk priorities with large gaps, which puts a big question mark on the overall rank of the parent FM. Moreover, (iv) the efficiency notion is not considered in the risk assessment in the conventional RPN method. Furthermore, (v) hidden or latent risks may remain underestimated or inaccurately estimated due to the possibility of various combinations of risk factors resulting in the same RPN value. Consequently, these undisclosed risks might eventually cause unforeseen errors or issues. Additional shortcomings associated with the FMCEA method, along with some of the methods suggested to address them, can be found in [2,3,4,5] and are summarized in Appendix A.

2. Literature Review

2.1. FMEA and MCDM Methods

A variety of studies and research have aimed to enhance the traditional FMEA by incorporating different multi-criteria and decision-making (MCDM) materials and methods [2,3,4,5]. For instance, the house of reliability (HoR) approach, as outlined in [6], was introduced to manage the domino effects of failure modes. This was achieved by segmenting severity into fundamental components and conducting a cost/worth analysis using quality functional deployment (QFD). Additionally, this method categorized risk factors into two levels and seven sub-risk factors, relying on subjective expert weighting. In another study [7], the TOPSIS (technique for order preference based on similarity to ideal solution) and DEMATEL (decision-making trial and evaluation laboratory) methods were integrated. Attention was focused on analyzing the prioritization of failure modes in FMEA, considering the direct and indirect relationships between failure modes and the causes of failure, and the subjective weights of the risk factors. Furthermore, the authors introduced the intuitionistic fuzzy hybrid TOPSIS approach in [8], wherein domain experts utilized linguistic terms to subjectively weigh risk factors, while their objective ordered weights were derived through the normal-distribution-based method; this approach incorporated risk indicators like cost, time, and maintenance. The analytic hierarchy process (AHP), DEMATEL, and VIKOR (a Serbian acronym for “Vise Kriterijumska Optimizacija I Kompromisno Resenje”, meaning multi-criteria optimization and compromise solution) were combined in [9], with subjective weightage provided directly by experts. The VIKOR method pinpointed risk gaps associated with failure modes across each risk factor. Meanwhile, the AHP approach, in conjunction with DEMATEL, offered a relation map between failures and their causes, aiding in the prioritization of failure modes. The failure modes were then divided into cause and effect groups. The objective weights of the risk factors were determined using the ambiguity measure (AMWRPN) in [10], while the subjective assessments were modeled as basic probability assignments (BPAs). Virtual reality (VR) technology was adopted for identifying potential hazards in [11]. The cloud model and preference ranking organization method for enrichment evaluation (PROMETHEE) were used in [12] to rank failure causes based on considerations such as downtime duration, spare part criticality, and safety-related risks. Furthermore, the degree of uncertainty and divergence degree were used to calculate the primary and secondary weights of decision-makers, respectively. The overall weight was determined using cloud model theory. Moreover, an artificial intelligence method used the fuzzy rule base (FRB) and grey relations theory (GRT) in [13] to address the incomplete information. A fusion of risk evaluation information using the TrFNs-WAIA (weighted arithmetic interaction averaging operator of the trapezoidal fuzzy numbers) operator based on Shapley Choquet, alongside the TODIM method, was formulated to derive the risk evaluation matrix. This was carried out by simulating the psychological behavior characteristics of the team members and considering the correlations among them, and the weights of risk indicators were calculated by considering their interaction [14]. Machine learning uses an artificial neural network (ANN) model and a fuzzy inference system (FIS) to assess the failures of busbars used in the electrical vehicle industry [15]. An integrated-approach WLSM–MOI–partial-ranking method that incorporated the imprecision approach with a nonlinear programming model for the calculation of FRPNs was presented in [16]. The subjective weights of the risk factors were assigned by the expert judgment method. A linear programming model used the fuzzy ordered weighted geometric averaging (FOWGA) operator to assign the objective weights of the risk factors and aggregate their fuzzy ratings for calculating fuzzy RPNs in [17]. The PRISM (partial risk map) methodology was employed to elucidate concealed risks using diverse aggregation functions and to visually represent these hidden risks through the PRISM pattern [18]. Likewise, The action priority (AP) method was utilized for the direct classification of failure modes into high risk (H), medium risk (M), and low risk (L). This approach prioritizes the consideration of severity (S) first, followed by occurrence (O), and finally, detection (D) [19]. The previously mentioned methods represent advancements in calculating the risk priority number (RPN), and they have gained extensive utilization across various industries.

2.2. FMEA and DEA Methods

Data envelopment analysis (DEA) is a non-parametric approach that employs linear programming (LP) models to measure efficiency and determine objective weights using observed data for multiple inputs and outputs [20]. In [21], objective risk factor weights derived by DEA models varied for each failure mode; the failure modes were ranked based on the fuzzy weighted geometric means (FWGMs) of their fuzzy ratings for risk indicators (fuzzy RPN). Subjective weights for these indicators were assigned using the expert judgment method and solved through α-level sets and linear programming models in addition to DEA [22]. In another study [23], the objective weights of risk factors were determined using the DEA method, and the significance of severity criteria was approached through weight restriction [23]. Furthermore, the exponential RPN (ERPN) and DEA model (CCR-AR) were integrated into the FMEA process in [24]. The authors in [25] developed and compared two models that combined FMEA and DEA: the slacks-based measure of the DEA (SBM-DEA) model and the data-driven approach (NDA). The latter was found to possess a relative advantage over the former. In [26], a DEA-FMEA methodology was presented, introducing two additional risk factors—cost and duration of treatment—as uncertain undesirable outputs. These were included alongside occurrence (O), severity (S), and detection (D), which were treated as inputs. The objective weights for these risk indicators were determined using the DEA technique. Interval values were incorporated into DEA in [27], which was then combined with grey relational analysis (GRA) to compute objective weights for risk factors and prioritize failure modes in an auto parts manufacturing process. The slacks-based data envelopment analysis (SBM-DEA) model, without outputs and using values obtained from the fuzzy inference system (FIS) and linguistic FMEA as inputs, was explained in [28]. In another fusion approach [29], AHP, fuzzy set theory, and DEA were combined, wherein experts in FMEA were assigned different weights using AHP. Moreover, the inputs for the DEA model comprised values of OSD and the reciprocal RPN, while the inverse of cost and time served as additional risk indicators set as outputs. Various types of information describing the heterogeneous features of risk factors were applied and clustered in [30], and a DEA model was utilized to rank failure modes using the values of risk factors as inputs. Additionally, in [31], fuzzy AHP, fuzzy VIKOR, and DEA (without input or output) models were integrated to determine the weights of each risk factor, where the relation of maximum to minimum weight was considered. Failure modes were obtained through the SHELL (software, hardware, environment, and liveware) model analysis in [32], where TOPSIS was used to determine the expert weights. The subjective and objective weight distribution of both experts and risk factors was computed by the DEA model using the risk factors as inputs. Meanwhile, the output was set to a constant of one; the cloud model was employed in order to cope with the fuzziness and randomness of the linguistic assessment information. Various other methods used in the literature to address the limitations of FMEA are summarized in Appendix B.

2.3. Method and Case Study Selection

Among the useful and effective methods stated in the previous section, the DEA approach was selected in this study to enforce and increase the efficacity of the traditional FMEA method, with the intention of covering the mentioned shortcomings: (i) The DEA model ensures the assignment of different weights to each risk factor to cope with the shortcomings. (ii) The time and cost required to solve each failure mode will be considered as additional risk indicators and will be used as parameters for the DEA model and deal with the shortage. (iii) Sub-failure modes and their interrelationships will be considered and synthetized using an aggregation procedure to handle the deficiency, and (iv) a combination of outputs and inputs that are different from those found in the literature will be used to address the efficiency limitation. The traditional RPN number has been used since the ranking of the failures will rely on the output of the efficiency measurement and not the RPN ranks. Other improved versions of RPN calculation can definitely be used, such as the exponential RPN, the partial risk map (PRISM), or the action priority (AP).
Why has RFID been selected as an illustrative example of the proposed method?
The fourth industrial revolution, or Industry 4.0, gains advantages every day. As a result of the Internet of Things and cloud technology, everything has become smart and linked together. Radio frequency identification technologies play a critical role in enabling the ease of these connections. Moreover, RFID helped to improve the efficiency and effectiveness of various processes, services, and products in different organizations. This technology became popular by the 1970s, and since then, we have been surrounded by it wherever we go. Every person has more than one RFID tag in their wallet, for example, a control access card, a passport, a bank card, an ID card, etc. This means that these small parts play crucial roles in our daily lives. Therefore, ensuring the proper functioning of this technology is of significant interest. For all of these reasons, this study used combined FMEA and DEA to reach an appropriate priority rank for failures of an RFID system, which helped to decrease the amount of time and money wasted, and increased the system’s efficiency, safety, and reliability.
The framework of this paper is presented in Figure 1. First, the modified FMEA is applied, followed by an aggregation procedure to combine the sub-failure modes of each parent failure mode. Thereafter, the DEA model used the outcomes of the aggregation procedure as inputs/outputs for the efficiency measurement; then, a final rank is assigned to each failure mode. The calculations are explained in Section 2.

3. Materials and Methods

3.1. FMEA Method

FMCEA is a reliability approach that eases the identification, prediction, and analysis of the potential FMs affecting the proper function of the equipment or the process being studied, as well as their causes and effects. This is in order to evaluate and assess the risks resulting from their occurrence and then to suggest the corresponding repairing, adjusting, and precautionary measures to be planned during the conception, construction, or implementation stages. The steps of the FMCEA are explained in detail in [33] and can be summarized as follows:
  • Process selection and review;
  • Generate ideas regarding possible ways a system or process might malfunction or experience faults;
  • Enumerate the possible reasons behind each failure mode and outline the potential consequences associated with them;
  • Prepare the FMCEA sheets and define the severity, occurrence, and detection scales;
  • Allocate ratings for severity, occurrence, and detection levels corresponding to each failure mode;
  • Consolidate the risk assessments contributed by the FMCEA team members;
  • Compute the risk priority number (RPN) for every failure mode;
  • Rank the failure modes based on their prioritization for action or intervention.

3.2. DEA Method

DEA is an empirical, comparative, and non-parametric method employed for the efficiency measurement. The fundamental roles of DEA are to contrast the efficiency of the decision-making unit under observation, D M U o (o = 1, 2, 3 … n, where n is the number of DMUs) to the efficiencies of all other D M U j (j = 1 … n) within the production possibility set (PPS) according to the resources they use (inputs X = ( x 1 j , x 2 j , , x m j ) ) and the outcomes they produce (outputs Y = ( y 1 j , y 2 j , , y s j ) ), and to estimate the production frontier (production function). The objective function of the DEA mathematical model maximizes the efficiency; it returns the optimal values of the weights assigned to each input and output under the principle that a given DMU is able to perform better if another DMU can carry out this function, assuming that the inputs and outputs are identical for all DMUs [34,35]. An input-oriented CCR model can be expressed as shown in Equation (1) and modeled in Figure 2.
M a x       r = 1 s u r y r o S . t     i = 1 m v i x i o = 1           r = 1 s u r y r j i = 1 m v i x i j 0       j = 1 , 2 , , n           u r 0               r = 1 , 2 , , s             v i 0               i = 1 , 2 , , m
where s is the number of outputs and m is the number of inputs.

3.3. The Proposed FMEA–DEA Method

The conventional FMEA ranks the FMs in descending order of their risk priority number (RPN). For each FM, the RPN is equal to the product of its probability of occurrence (O), severity (S), and non-detection (D). Nevertheless, sometimes, solving a set of FMs with moderate RPNs would be more efficient than solving a single FM with a high RPN. This means that allocating the time and costs needed to solve one single FM with a high RPN to solving a group of FMs whose RPNs’ sum is equal to or larger than the former may be more reasonable. Consequently, it is recommended that the notions of cost and time be incorporated into the traditional FMEA and the risk prioritization method be revised. Furthermore, the causes and effects of the same failure mode are most likely to have different severity, occurrence, and detection rates. This makes it necessary to consider the scaled-down rates related to each cause separately, as well as the interrelationships between them. Since the causes of a given parent failure mode may have different ranks with some gaps, it is necessary to assign them a common or synthesized rank. Moreover, in some cases, the RPN number alone is not efficient in risk prioritization; this leaves us with a question regarding how to introduce the notion of efficiency to deal with this shortage.
The proposed solution in this paper will answer the question concerning which FMs should be fixed first or must be fixed prior if we want to consider the efficiency along with the risk associated with the causes and effects rates. Thus, in order to determine solving which FM is efficient, we are going to use a DEA model that allows us to minimize time, cost, O, S, and D by also considering the highest RPN. Additionally, causes and effects will be treated as sub-failure modes belonging to a given parent failure mode. Each of these sub-failure modes will have its own ratings, and they will be grouped in a later step in order to obtain their common rank. Therefore, in the first stage, a modified FMEA will be proposed; this will be followed by the application of the DEA approach in the second stage.

3.3.1. Stage 1: Modified FMEA

The suggested modified FMEA in this paper can be conducted according to the following steps:
  • Step 1.1: Form the FMEA team; let T be the number of experts participating in the study.
  • Step 1.2: Perform a detailed study of the system, the process, or the product being analyzed.
  • Step 1.3: Identify and predict all possible failure modes (FMs) and their causes and effects, and treat the causes as sub-failure modes (SFMs).
    • Let the total number of failure modes be M, and the total number of sub-failure modes be N; it follows that each failure mode F M i has a number n i of sub-failure modes S F M i j , where i = 1 , 2 , 3 , , M   and j = 1 , , n i . It can be clearly seen that
      N = 1 M n i
  • Step 1.4: Set the rating scale for each risk factor.
  • Step 1.5: Prepare the FMEA tableau or sheet; there should be a field for the components, a second for the failures of those components, a third for the causes, and then a fourth for the effects. It must also include columns for risk factors ratings and two additional columns containing the expenses and time necessary to fix each cause of failure (or sub-failure mode).
  • Step 1.6: Collect the data from the FMEA tables filled by the T experts.
    • Let O i j e , S i j e , D i j e , C o s t i j e , and T i m e i j e be the occurrence, the severity, the detection, the cost, and the time rates of the sub-failure mode S F M i j assigned by the eth expert, respectively, where i = 1 , , M   ; j = 1 , , n i   and   e = 1 , T .
  • Step 1.7: Assign a weight λ e to the eth expert reflecting the diversity of the members’ background and experience.
    e = 1 T λ e = 1
  • Step 1.8: Aggregate the assessments and construct the N × 5 judgment matrix as follows: for each sub-failure mode S F M i j , the aggregated rates of the occurrence, severity, detection, cost, and time are O i j , S i j , D i j , C o s t i j , and T i m e i j , respectively, and are calculated according to the following equations:
    O i j = e = 1 T λ e O i j e ;   S i j = e = 1 T λ e S i j e ;   D i j = e = 1 T λ e D i j e ;                         C o s t i j = e = 1 T λ e C o s t i j e   ;   T i m e i j = e = 1 T λ e T i m e i j e
  • Step 1.9: Compute the RPNs for each sub-failure mode S F M i j .
    R P N i j = O i j × S i j × D i j   ; w h e r e   i = 1 , , M   a n d   j = 1 , , n i
  • Step 1.10: Assign a rank a i j ( a i j = 1 , 2 , N )   for each   S F M i j related to the   F M i   based on the descending order of the R P N i j obtained in step 8.
  • Step 1.11: Synthetize the procedure for the   n i sub-failure modes     S F M i j that belong to the same parent failure mode   F M i in order to eliminate the rank gaps. Thus, the common weighted RPN for the SFMs belonging to the same parent FM will attempt to give more weight to the SFM with the highest R P N i j (or the smallest a i j ). On the other hand, solving an FM can be achieved only if all the related SFMs are solved; the total cost and time (aggregated cost and aggregated time) of each FM will be equal to the sum of the costs and times of its related SFMs. As a result, the aggregated occurrence A G G O i , the aggregated severity A G G S i , the aggregated detection A G G D i , the aggregated cost A G G C O S T i , and the aggregated time A G G T I M E i will be calculated as follows:
    A G G O i = j = 1   n i a i j × O i j j = 1   n i a i j ;   A G G S i = j = 1   n i a i j × S i j j = 1   n i a i j ;   A G G D i = j = 1   n i a i j × D i j j = 1   n i a i j ;                           A G G C O S T i = j = 1   n i C o s t i j   ;     A G G T I M E i = j = 1   n i T i m e i j
  • Step 1.12: Construct the synthesized M × 5 judgement matrix using the results obtained in step 10, and compute the aggregated RPN A G G R P N i for each   F M i .
    A G G R P N i = A G G O i × A G G S i × A G G D i
  • Step 1.13: Assign a rank ( b i ) to each F M i according to the dropping order of the aggregated RPN (   A G G R P N i ). All the sub-failure modes of a given parent failure mode will be assigned the same ( b i ).

3.3.2. Stage 2: DEA Approach and Model Selection

We are interested in estimating the efficiency of each failure mode; consequently, the FMs will be considered as DMUs. Since the selection of the input and the output vectors for DEA models is of great importance and has a significant impact on the final results, it is good practice to make these decisions carefully. Starting from the assumption that, on the one hand, the inputs comprise what is in our hand now, and on the other hand, the outputs consist of what we will receive as a result, the RPN, O, S, and D would be suitable as inputs, while cost and time should be considered as outputs. This is because cost and time would not be spent if the corresponding RPN or FM was not selected for action. Moreover, the DEA model attempts to increase the outputs and decrease the inputs; in our case, we expect to consume a minimum amount of time and expenses to solve a maximum number of failure modes with relatively high RPNs. To reach this goal, it is recommended to set O, S, D, and the reciprocal RPN as inputs, while the inverse of the cost and time ought to be regarded as outputs. From standard DEA models, a CCR-input-oriented model has been selected to be applied in this study. This is because, for any FM, if the occurrence, detection, severity, and RPN increase, then its repairing cost and time will be proportionally increased. This indicates a constant return to scale assumption. The DEA model inputs/outputs and DMUs are modeled in Figure 3.
The steps of the second stage are as follows:
  • Step 2.1: Compute the efficiency θ i for each failure mode F M i according to model represented in Figure 3 and Equation (1).
  • Step 2.2: Assign a rank ( C i ) to each F M i according to the dropping order of their efficiencies θ i .
  • Step 2.3: The F M i with equal efficiencies (i.e., Equal C i ) will be ranked according to their rank ( b i ) obtained in stage 1.
  • Step 2.4: Assign a final rank ( d i ) to each F M i and provide the FMEA–DEA report.

4. Case Study: Application of the Modified FMEA–DEA for the RFID System

4.1. An Overview of the RFID System

RFID is a wireless technology using the radio frequency electromagnetic (EM) field. The RFID system consists of the tag, reader, interface software, and host. The proper functionality of the RFID system is contingent upon the logical connection and compatibility of all of these components with each other. The components and the functioning of the RFID system can be found in [36,37,38] and are illustrated in Figure 4.
The collection and the identification of failure modes, their causes, and the effects, as well as current control processes, have been performed based on the team members’ brainstorming, interviews, and communications with many experts, along with the information retrieved from different websites and studies from the existing literature. The effects of RF radiation on human health were disclosed in [39]; meanwhile, the environmental impacts of the RFID and ICT technologies are discussed in [40,41,42]. A failure modes, mechanisms, and effects analysis (FMMEA) was used for testing the environment of qualification of the RFID system [43]; in the same context, the reliability of RFID tags was tested in humid [44] and harsh environmental applications [45] and under thermal storage [46,47]. Conversely, as stated in [48], faults may arise due to temporary antenna tearing, electromagnetic interferences, and optical inductions; the results showed that most vulnerability was related to implementation. Under the same scope, different errors between readers and RFID tags were mentioned in [49,50,51]. FMEA was applied to assess the analog part of the RFID system, presuming faultlessness in the digital segment, as indicated in [52]. Additionally, the FMEA methodology was utilized to scrutinize failure modes within the RFID middleware [53] and to investigate user misconfigurations [54]. Evaluations of RFID device performance within the blood supply chain were conducted, utilizing FMEA to identify departments necessitating reengineering [55]. A review of security concerns in RFID systems was presented in [56]. Furthermore, [57,58,59] outlined the issues and challenges encountered with RFID technology.

4.2. Data Collection and Failure Identification (Steps 1.1–1.3)

A risk assessment team of five groups of experts (not individuals) has been formed. Details regarding the leader of each group are presented in Table 1.
Table 2 contains a compilation of identified failure modes along with their respective causes and effects.
As is seen in Table 1, a failure mode (FM) may contain sub-failure modes (SFMs) due to multiple causes.

4.3. Rating and Aggregating the Failure Modes (Steps 1.4–1.10)

Based on data provided by experts (Supplementary Material), the total number of the identified failure modes (FMs) is M = 43, with a total number of sub-failure modes (SFMs) of N = 67; the number of sub-failure modes n i related to each parent failure mode are depicted in Table 2; the rating scale for each sub-failure mode against each risk factor is from one to five. The number of experts participating in the risk assessment is T = 5; the teams consist of groups of experts and not individuals. Hence, there was insufficient evidence to highlight significant differences among FMEA team members regarding their assessment capabilities; therefore, we assumed an equal weight λ e = 1 / 5   for   all   team   members . The outcomes of the aggregation of risk factor ratings are presented in detail in Appendix C. Table 3 presents the failure modes with sub-failure modes, as well as the ranking gaps among the latter.
The results presented in Table 3 show that there are large gaps between the minimum and the maximum rank of the sub-failure modes of each parent failure mode. In the next step, these gaps will be eliminated by applying a synthetization procedure.

4.4. Synthetization Procedure for the Sub-Failure Modes (Steps 1.11–1.13)

The outcomes of the modified FMEA and the sub-failure mode synthetization are summarized in Table 4.
As the results show, most of the SFM priorities changed when applying the synthetization procedure and considering the relationship between them to rank their parent FM. The synthetization yielded three categories of SFMs; the first category groups the SFMs with fewer priorities, and the traditional FMEA won in terms of ranks when synthetized; however, the consequences of these failures drastically affect the proper functioning of the system. For instance, the SFM 29 , 4 (the sub-failure mode 4 of the parent failure mode 29) previously represented more than 1.49% of the failures, which means that it was not considered to be a very critical failure; however, in reality, the tag would not be detected by the reader if the reading distance was very short, leading to the system not functioning at all. The second category consists of the SFMs whose priority did not change or changed slightly for both methods. Finally, the third category is composed of the SFMs who lost ranks. Contrary to the SFMs of the first category, these failures became less important in terms of the risk they may cause in terms of degrading the operation of the system, but they did not lead to the malfunctioning of the RFID components. The occurrence is not very frequent, and this can be minimized by the application of simple preventive actions such as choosing the right tags and selecting the correct settings of the different parts for the right applications.

4.5. Measurement of the Efficiency of the FMs by DEA (Steps 2.1–2.4)

The outcomes of the modified FMEA and the synthetization procedure served as inputs/outputs of the DEA model explained in Section 3.3.1. The efficiencies of DMUs (FMs) were found using PIM DEA version 3.2; the application of the steps of stage two explained in Section 3.3.2 yielded the results in Appendix C, as summarized in Figure 5.
The ranks of the failure modes in the modified FMEA and the FMEA–DEA methods are contrasted in Figure 6. After the application of the DEA and the incorporation of time and cost, most FM ranks seemingly changed. Consequently, we obtained three categories of FMs: those with increased priority, those with decreased priority, and the few FMs that retained their position. For instance, F M 2 had minimal priority in the FMEA method, but when efficiency was incorporated together with cost and time, its priority rank switched from 43 to 9. This FM concerns the settings that can be adjusted in a short duration of time with the minimum dispensed, whilst not fixing it would lead to improper or even non-functioning of the system. At the same time, the failure mode F M 22 , which is related to the positioning of the tag, was initially ranked last and moved into eighth by winning 33 ranks. Similarly, F M 5 , caused by corrosion, won 33 ranks; this can be avoided by effectively choosing the tag. Meanwhile, the failure mode F M 34 moved down by 34 ranks, which was related to the age of the tag and the non-reception of the signals due to environmental disturbances. This FM occurs infrequently because the life cycle of the tags is usually sufficient for the destined application. Moreover, attempting to deal with the space between the tag and the reader would be very costly and is often uncontrollable.
Table 5 presents some of the FMs that became high-ranking against others that lost ranks, in addition to suggested replacements; obviously, other combinations are possible. As an example, we can use reduced time and cost to solve failure modes 2, 5, and 22 instead of F M 34 . Furthermore, the summation of their RPNs is 32.479. This is more than the RPN of F M 34 , which is equal to 22.52. Another example is F M 35 , which is related to the signal transmission between the tag and the reader caused by wave disturbance. This dropped to the 28th rank by losing 25 positions with an RPN equal to 31.563; solving this FM requires USD 101 and 95 min. Thus, we can solve F M 31   and F M 17 in less time (50 + 42.5 = 70.5 min) and at a cheaper cost (USD 35.25 + USD 35.25 = USD 70.5), with higher resulting RPN (15.84 + 24 = 39.84). This is because F M 31 is related to the reader setting, which is easy and important, and F M 17 occurs when different tags have the same EPC number and can be eliminated solely by quickly checking the tag numbers before using them in applications or projects.
In light of what has been stated previously, we can conclude that the most efficient FMs concern the transfer of data, source of energy, settings, and choice of tags (memory, humidity, life cycle, temperature), as well as the settling of the transponder and the base station.

5. Comparison and Discussion

5.1. Comparison of the Proposed Method and the Conventional FMEA

To demonstrate the efficacy of the suggested model, the conventional risk priority, the synthetized FMEA, and the FMEA–DEA have been applied in the given case study. Figure 7 contrasts the results of the conventional FMEA method and the proposed FMEA–DEA method in this study.
The rankings of sixty-seven sub-failure modes obtained through the three approaches applied in stages one and two are depicted in Figure 8. The percentage priorities are used instead of ranks in order to compare the three methods. Further elaboration on the computation of the priority percentages can be found in Appendix C. Based on the results in Figure 7 and Figure 8, observable distinctions exist among the risk priority rankings generated by the three FMEA methods. This disparity highlights that the conventional RPN, the synthesized FMEA, and the proposed model employ distinct mechanisms for establishing the risk priority ranking of failure modes.
From Figure 8, it can be seen that 21% of SFMs have similar priorities in both the conventional and FMEA–DEA methods, of which 12% had similar priorities in all three methods. Meanwhile, 79% of the SFMs had different priorities in the conventional FMEA and FMEA–DEA methods, of which 49% had similar priorities in the conventional and the synthetized FMEA methods but different priorities when DEA was applied; furthermore, 30% had different priorities in all the three methods. SFMs in category one maintained almost the same rank in all three methods. For example, F M 40 , 1 and F M 25 , 1 , related to data transfer and encasement, respectively, are high-ranking. This is contrary to F M 6 , 1 , F M 8 , 1 , F M 26 , 1 , F M 42 , 1 , and F M 43 , 1 , which are related to the surrounding conditions of the tags and also the environmental impacts of the RFID parts. Thus, solving the former failures will decrease the probability of associated problems. Other examples are F M 2 , 1 and F M 17 , 1 (category 3), which had a minor priority in both FMEA methods but became high-ranking when efficiency was considered. This is because the former is related to simple reader settings, and the latter is related to duplicate identifiers, and this can be solved in a short timeframe with low expenses. On the contrary, F M 18 , 1 and F M 35 , 1 (category 4) are very risky but inefficient; the risk is related to the exposed tags, while the inefficiency is related to the tag antenna failure, and both require considerable expenses and time to make the users aware of the importance of protecting their labels and to repair the infinite small circuit in the latter. SFMs in categories five and six were high-ranking in terms of risk in both FMEA methods and strongly decreased their priorities in terms of efficiency. For instance, F M 34 , 2 related to the electromagnetic field disturbance is risky but often not in control. Instead, we can decrease the distance between the tag and the reader and ensure that there is no obstacle such as liquid or metal, and the same time and cost can be spent solving F M 22 , 1 ,   which belongs to category three.

5.2. Comparison of the Proposed Method, the AP Method, and the PRISM Method

There are limited failure mode analyses within the RFID field, primarily focusing on either the tags [43] or the readers [54]. However, in a specific study [52], the authors delved into examining 12 failure modes associated with the tag, reader, and link layers. It is important to note that in these referenced studies, the use of FMEA was not aimed at ranking the failures but rather at identifying them. Consequently, the data provided could not be utilized for comparison purposes.
The findings from our study will be employed to utilize various methods outlined in the existing literature. These include the conventional FMEA, the partial risk map (PRISM) detailed in [18], and the application priority method referenced in [19] and elucidated in [60]. Figure 9 illustrates the results pertaining to the ranking and classification of the six methods.
From Figure 9, it is evident that the outcomes of the three distinct functions within the PRISM method exhibit close similarities but notably differ from both the conventional FMEA and the application priority (AP) method. Specifically, around 73% of failures were given higher priority in the PRISM method compared to conventional FMEA. Moreover, the AP categorizations differ from both the PRISM and conventional methods for approximately 80% of the failures.
The newly proposed FMEA–DEA method showcases disparities with the conventional FMEA in 80% of the failure modes (FMs) and diverges entirely from PRISM in all failure modes. In particular, approximately 73% of the failures were assigned a lower priority in the FMEA–DEA method compared to other methods. Additionally, the AP classification notably differs from the proposed FMEA–DEA method by approximately 67%.
In summary, it is evident that different methods yield distinct results. This was anticipated due to their individual mechanisms for evaluating and prioritizing risk across failure modes. Table 6 offers a summary of the percentage similarities between the outcomes of the compared methods.

5.3. Limitations of the Proposed Method

Although this method has its advantages, it also has some disadvantages. The limitations of this method can be summarized as follows:
(i)
Data collection and team forming can be critical;
(ii)
It considers equal weights for the risk assessors;
(iii)
Fuzzy logic or linguistic variables can be employed to ensure consistency among team members;
(iv)
Using an advanced calculation method for the RPN, such as PRISM, would be an improvement.

6. Conclusions

In this study, we incorporated the DEA method and cost and time notions for the purpose of evaluating the risk associated with failure modes in FMEA. Firstly, a detailed study of the RFID system was performed. This was carried out in order to shed light on its possible failures and their causes and effects by means of a modified FMEA that considers the relationships among the sub-failures and eliminates the ranking gaps between them. Secondly, the DEA method was employed to calculate the efficiency rates of each failure mode, as well as the coefficients of the risk factors and the risk indicators. The cost and time needed to fix them served as inputs/outputs for the DEA model.
To provide an illustration, the RFID showed that the final FM ranks resulting from the FMEA–DEA method are based on both risk and efficiency, and they are reliable and rational more often than those obtained by the traditional FMEA. Therefore, this method is effective and useful, and it may be generalized and used for assigning risk priority rates of failure modes in different applications, equipment, or processes.
In future research, attention should be directed towards six specific areas. Initially, this will include model rate failure mode risk factors utilizing five-point numeric scales. Given the intricacy of risk analysis problems, FMEA team members often encounter challenges in providing precise assessment information for failure modes concerning each risk factor. Consequently, future exploration could involve integrating the proposed FMEA with fuzzy theories like linguistic fuzzy sets. Secondly, within the proposed FMEA framework, the assumption is that the relative weights of risk assessors are equal. In some situations, the team members have varying backgrounds and knowledge. Therefore, it is crucial to devise efficient techniques for determining the suitable weights of experts, such as AHP or DEA, in future research. Third, other methods can be used to model the interrelationships between failure, causes, and effects, such as DEMATEL. Fourth, a variety of MCDM methods can be incorporated; different combinations can be obtained from Appendix B. Fifth, improved methods for RPN calculation can be used, such as PRISM instead of the traditional method, as presented in Appendix B. Sixth, apart from the RFID system, conducting additional case studies in the future will be beneficial to further validate the proposed risk priority model.

Supplementary Materials

The following supporting information can be downloaded at: https://www.mdpi.com/article/10.3390/app14020584/s1.

Author Contributions

Conceptualization, K.C. and S.D.; methodology, K.C. and S.D.; software PIM DEA version 3.2, S.D.; validation, K.C. and S.D.; formal analysis, K.C. and S.D.; investigation, K.C. and S.D.; resources, K.C. and S.D.; data curation, K.C.; writing—original draft preparation, K.C. and S.D.; writing—review and editing, K.C. and S.D.; visualization, K.C. and S.D.; supervision, S.D.; project administration, S.D.; funding acquisition, K.C. and S.D. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available in supplementary material [02-Data collection—Step 1.6].

Acknowledgments

The authors express their appreciation to the Editors and unnamed reviewers for their invaluable remarks and suggestions that greatly enhanced the article’s quality.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Shortcomings of the traditional FMEA method based on the existing literature.
Figure A1. Traditional FMEA Shortcomings.
Figure A1. Traditional FMEA Shortcomings.
Applsci 14 00584 g0a1

Appendix B

Methods and approaches used to deal with the FMEA deficiencies are based on more than 300 previous studies.
Figure A2. Analysis of methods and approaches used to deal with the FMEA deficiencies.
Figure A2. Analysis of methods and approaches used to deal with the FMEA deficiencies.
Applsci 14 00584 g0a2

Appendix C

Detailed results, interpretation, and comparison of the conventional FMEA, the modified FMEA, and the FMEA–DEA methods are presented in Table A1 and Figure A1. The SFM ranks are from 1 to 67 in the conventional FMEA; when the FMs were aggregated, the ranks ranged from 1 to 43. Thus, to compare and interpret the results of the three methods, it is necessary to normalize their ranks; therefore, we will consider the percentage of priority in lieu of the RPN ranks. For i   = 1 ,   2 ,   3 , , 43   and j   = 1 , , n i :
Letting P a i j be the percentage of priority of S F M i j (i.e., the S F M i j is previously more than P i j % of the remaining SFMs) in the conventional FMEA, P b i j be the percentage of priority of overall F M i (i.e., the F M i is previously more than P b i j % of the remaining FMs) in the synthetized FMEA, and P d i j be the percentage of priority of overall F M i (i.e., the F M i is previously more than P d i j % of the remaining FMs) in the FMEA–DEA, we have
P a i j = 100 a i j 67 × 100 ;   P b i j = 100 b i j 43 × 100 ;   P d i j = 100 d i j 43 × 100
Table A1. The results of the three FMEA methods.
Table A1. The results of the three FMEA methods.
CountFailure Mode
F M i
Sub
Failure Mode
S F M i j
Failure
Mode
Efficiency
θi
Conventional
FMEA
Rank
a i j
Synthetized FMEA
Rank
b i j
Proposed FMEA − DEA
Rank
d i j
Conventional FMEA
Priority
P a i j
Synthetized FMEA
Priority
P b i j
Proposed FMEA − DEA Priority
P d i j
Difference
P b i j P a i j
Difference
P d i j P b i j
Difference
P d i j P a i j
Categories
11110099286.5779.0795.35−7.5016.288.78Category 2− SIS
212100239265.6779.0795.3513.4016.2829.68Category 7− III
321100674390.000.0079.070.0079.0779.07Category 3− SII
4313732193552.2455.8118.603.58−37.21−33.63Category 4− SDD
5414725132462.6969.7744.197.08−25.58−18.50Category 4− SDD
651100614078.966.9883.72−1.9876.7474.77Category 3− SII
7614149293126.8732.5627.915.69−4.651.04Category 1− SSS
8714451322723.8825.5837.211.7011.6313.33Category 3− SII
9814243263035.8239.5330.233.71−9.30−5.59Category 1− SSS
10914029173256.7260.4725.583.75−34.88−31.14Category 4− SDD
11101391883473.1381.4020.938.26−60.47−52.20Category 4− SDD
121114853332120.9023.2651.162.3627.9130.27Category 3− SII
131214928162058.2162.7953.494.58−9.30−4.72Category 1− SSS
14131391573377.6183.7223.266.11−60.47−54.36Category 4− SDD
151418136201446.2753.4967.447.2213.9521.17Category 3− SII
161428127201459.7053.4967.44−6.2113.957.74Category 2− SIS
17151847314329.8527.910.00−1.94−27.91−29.85Category 4− SDD
18152852314322.3927.910.005.52−27.91−22.39Category 4− SDD
1915386431434.4827.910.0023.43−27.91−4.48Category 2− IDS
20154830314355.2227.910.00−27.32−27.91−55.22Category 5− DDD
21155820314370.1527.910.00−42.24−27.91−70.15Category 5− DDD
22156848314328.3627.910.00−0.45−27.91−28.36Category 4− SDD
231611005030525.3730.2388.374.8658.1463.00Category 3− SII
241711002412364.1872.0993.027.9120.9328.84Category 3− SII
2518145222697.0195.3539.53−1.67−55.81−57.48Category 4− SDD
26191431252982.0988.3732.566.28−55.81−49.53Category 4− SDD
272014826142361.1967.4446.516.25−20.93−14.68Category 4− SDD
28211951461179.1086.0574.426.94−11.63−4.69Category 2− SDS
29221100634185.974.6581.40−1.3276.7475.43Category 3− SII
302316858381613.4311.6362.79−1.8051.1649.36Category 3− SII
312418641241238.8144.1972.095.3827.9133.29Category 3− SII
322518519101371.6476.7469.775.10−6.98−1.87Category 1− SSS
332612460353710.4518.6013.958.16−4.653.51Category 1− SSS
342622446353731.3418.6013.95−12.74−4.65−17.39Category 8− DSD
352714857372214.9313.9548.84−0.9734.8833.91Category 3− SII
362812039233841.7946.5111.634.72−34.88−30.16Category 4− SDD
372822037233844.7846.5111.631.74−34.88−33.15Category 4− SDD
38291144344094.0320.936.98−73.10−13.95−87.05Category 5− DDD
39292145344092.5420.936.98−71.61−13.95−85.56Category 5− DDD
402931422344067.1620.936.98−46.23−13.95−60.19Category 5− DDD
41294146634401.4920.936.9819.44−13.955.48Category 2− IDS
422951444344034.3320.936.98−13.40−13.95−27.35Category 5− DDD
433011356284116.4234.884.6518.47−30.23−11.77Category 6− IDD
44302136228417.4634.884.6527.42−30.23−2.81Category 2− IDS
453031331284153.7334.884.65−18.85−30.23−49.08Category 5− DDD
463041354284119.4034.884.6515.48−30.23−14.75Category 6− IDD
473051335284147.7634.884.65−12.88−30.23−43.11Category 5− DDD
48306137284189.5534.884.65−54.67−30.23−84.90Category 5− DDD
493111004527432.8437.2190.704.3753.4957.86Category 3− SII
503219559391011.949.3076.74−2.6467.4464.80Category 3− SII
513311005536617.9116.2886.05−1.6369.7768.14Category 3− SII
52341938154243.2865.122.3321.83−62.79−40.96Category 6− IDD
5334296154291.0465.122.33−25.93−62.79−88.72Category 5− DDD
54343916154276.1265.122.33−11.00−62.79−73.79Category 5− DDD
55344913154280.6065.122.33−15.48−62.79−78.27Category 5− DDD
5635144332895.5293.0234.88−2.50−58.14−60.64Category 4− SDD
5735244832888.0693.0234.884.96−58.14−53.18Category 4− SDD
583612911183683.5858.1416.28−25.44−41.86−67.30Category 5− DDD
593622917183674.6358.1416.28−16.49−41.86−58.35Category 5− DDD
603632940183640.3058.1416.2817.84−41.86−24.02Category 6− IDD
61371671041785.0790.7060.475.62−30.23−24.61Category 4− SDD
623816221111968.6674.4255.815.76−18.60−12.84Category 4− SDD
633916742251837.3141.8658.144.5516.2820.83Category 3− SII
6440110011198.5197.6797.67−0.830.00−0.83Category 1− SSS
654116934221549.2548.8465.12−0.4216.2815.86Category 3− SII
664214633212550.7551.1641.860.42−9.30−8.89Category 1− SSS
67431146542392.992.339.30−0.666.986.32Category 1− SSS
Figure A3. The priorities of the failure modes in the three FMEA methods (stages 1 and 2).
Figure A3. The priorities of the failure modes in the three FMEA methods (stages 1 and 2).
Applsci 14 00584 g0a3

References

  1. MIL STD 1629 A; Military Standard. Department of Defense: Washington, DC, USA, 1980.
  2. Liu, H.-C.; Liu, L.; Liu, N. Risk evaluation approaches in failure mode and effects analysis: A literature review. Expert Syst. Appl. 2013, 40, 828–838. [Google Scholar] [CrossRef]
  3. Liu, H.-C. FMEA Using Uncertainty Theories and MCDM Methods; Springer: Singapore, 2016. [Google Scholar] [CrossRef]
  4. Liu, H.-C.; Chen, X.-Q.; Duan, C.-Y.; Wang, Y.-M. Failure mode and effect analysis using multi-criteria decision making methods: A systematic literature review. Comput. Ind. Eng. 2019, 135, 881–897. [Google Scholar] [CrossRef]
  5. Huang, J.; You, J.-X.; Liu, H.-C.; Song, M.-S. Failure mode and effect analysis improvement: A systematic literature review and future research agenda. Reliab. Eng. Syst. Saf. 2020, 199, 106885. [Google Scholar] [CrossRef]
  6. Braglia, M.; Fantoni, G.; Frosolini, M. The house of reliability. Int. J. Qual. Reliab. Manag. 2007, 24, 420–440. [Google Scholar] [CrossRef]
  7. Chang, K.-H.; Chang, Y.-C.; Lee, Y.-T. Integrating TOPSIS and DEMATEL Methods to Rank the Risk of Failure of FMEA. Int. J. Inf. Technol. Decis. Mak. 2014, 13, 1229–1257. [Google Scholar] [CrossRef]
  8. Liu, H.-C.; You, J.-X.; Shan, M.-M.; Shao, L.-N. Failure mode and effects analysis using intuitionistic fuzzy hybrid TOPSIS approach. Soft Comput. 2015, 19, 1085–1098. [Google Scholar] [CrossRef]
  9. Liu, H.-C.; You, J.-X.; Ding, X.-F.; Su, Q. Improving risk evaluation in FMEA with a hybrid multiple criteria decision making method. Int. J. Qual. Reliab. Manag. 2015, 32, 763–782. [Google Scholar] [CrossRef]
  10. Tang, Y.; Zhou, D.; Chan, F.T.S. AMWRPN: Ambiguity Measure Weighted Risk Priority Number Model for Failure Mode and Effects Analysis. IEEE Access 2018, 6, 27103–27110. [Google Scholar] [CrossRef]
  11. Das, S.; Dhalmahapatra, K.; Maiti, J. Z-number integrated weighted VIKOR technique for hazard prioritization and its application in virtual prototype based EOT crane operations. Appl. Soft Comput. 2020, 94, 106419. [Google Scholar] [CrossRef]
  12. Panwar, N.; Kumar, S. Critical ranking of steam handling unit using integrated cloud model and extended PROMETHEE for maintenance purpose. Complex Intell. Syst. 2021, 7, 367–378. [Google Scholar] [CrossRef]
  13. Hassan, S.; Wang, J.; Kontovas, C.; Bashir, M. Modified FMEA hazard identification for cross-country petroleum pipeline using Fuzzy Rule Base and approximate reasoning. J. Loss Prev. Process Ind. 2022, 74, 104616. [Google Scholar] [CrossRef]
  14. Wang, W.; Liu, X.; Qin, J.; Liu, S. An extended generalized TODIM for risk evaluation and prioritization of failure modes considering risk indicators interaction. IISE Trans. 2019, 51, 1236–1250. [Google Scholar] [CrossRef]
  15. Na’amnh, S.; Salim, M.B.; Husti, I.; Daróczi, M. Using Artificial Neural Network and Fuzzy Inference System Based Prediction to Improve Failure Mode and Effects Analysis: A Case Study of the Busbars Production. Processes 2021, 9, 1444. [Google Scholar] [CrossRef]
  16. Zhang, Z.; Chu, X. Risk prioritization in failure mode and effects analysis under uncertainty. Expert Syst. Appl. 2011, 38, 206–214. [Google Scholar] [CrossRef]
  17. Chen, L.-H.; Ko, W.-C. Fuzzy linear programming models for new product design using QFD with FMEA. Appl. Math. Model. 2009, 33, 633–647. [Google Scholar] [CrossRef]
  18. Bognár, F.; Hegedűs, C. Analysis and Consequences on Some Aggregation Functions of PRISM (Partial Risk Map) Risk Assessment Method. Mathematics 2022, 10, 676. [Google Scholar] [CrossRef]
  19. Ouyang, L.; Che, Y.; Yan, L.; Park, C. Multiple perspectives on analyzing risk factors in FMEA. Comput. Ind. 2022, 141, 103712. [Google Scholar] [CrossRef]
  20. Charnes, A.; Cooper, W.W.; Rhodes, E. Measuring the efficiency of decision making units. Eur. J. Oper. Res. 1978, 2, 429–444. [Google Scholar] [CrossRef]
  21. Chin, K.-S.; Wang, Y.-M.; Poon GK, K.; Yang, J.-B. Failure mode and effects analysis by data envelopment analysis. Decis. Support Syst. 2009, 48, 246–256. [Google Scholar] [CrossRef]
  22. Wang, Y.-M.; Chin, K.-S.; Poon GK, K.; Yang, J.-B. Risk evaluation in failure mode and effects analysis using fuzzy weighted geometric mean. Expert Syst. Appl. 2009, 36, 1195–1207. [Google Scholar] [CrossRef]
  23. Garcia PA de, A.; Leal Junior, I.C.; Oliveira, M.A. A weight restricted DEA model for FMEA risk prioritization. Production 2012, 23, 500–507. [Google Scholar] [CrossRef]
  24. Chang, K.-H.; Chang, Y.-C.; Lai, P.-T. Applying the concept of exponential approach to enhance the assessment capability of FMEA. J. Intell. Manuf. 2014, 25, 1413–1427. [Google Scholar] [CrossRef]
  25. Yu, S.-H.; Su, E.; Chen, Y.-T. Data-Driven Approach to Improving the Risk Assessment Process of Medical Failures. Int. J. Environ. Res. Public Health 2018, 15, 2069. [Google Scholar] [CrossRef]
  26. Yousefi, S.; Alizadeh, A.; Hayati, J.; Baghery, M. HSE risk prioritization using robust DEA-FMEA approach with undesirable outputs: A study of automotive parts industry in Iran. Saf. Sci. 2018, 102, 144–158. [Google Scholar] [CrossRef]
  27. Baghery, M.; Yousefi, S.; Rezaee, M.J. Risk measurement and prioritization of auto parts manufacturing processes based on process failure analysis, interval data envelopment analysis and grey relational analysis. J. Intell. Manuf. 2018, 29, 1803–1825. [Google Scholar] [CrossRef]
  28. Jahangoshai Rezaee, M.; Yousefi, S.; Eshkevari, M.; Valipour, M.; Saberi, M. Risk analysis of health, safety and environment in chemical industry integrating linguistic FMEA, fuzzy inference system and fuzzy DEA. Stoch. Environ. Res. Risk Assess. 2020, 34, 201–218. [Google Scholar] [CrossRef]
  29. Daneshvar, S.; Yazdi, M.; Adesina, K.A. Fuzzy smart failure modes and effects analysis to improve safety performance of system: Case study of an aircraft landing system. Qual. Reliab. Eng. Int. 2020, 36, 890–909. [Google Scholar] [CrossRef]
  30. Yu, A.-Y.; Liu, H.-C.; Zhang, L.; Chen, Y. A new data envelopment analysis-based model for failure mode and effect analysis with heterogeneous information. Comput. Ind. Eng. 2021, 157, 107350. [Google Scholar] [CrossRef]
  31. Baloch, A.U.; Mohammadian, H. Fuzzy failure modes and effects analysis by using fuzzy Vikor and Data Envelopment Analysis-based fuzzy AHP. Int. J. Adv. Appl. Sci. 2016, 3, 23–30. [Google Scholar] [CrossRef]
  32. Liu, J.; Wang, D.; Lin, Q.; Deng, M. Risk assessment based on FMEA combining DEA and cloud model: A case application in robot-assisted rehabilitation. Expert Syst. Appl. 2023, 214, 119119. [Google Scholar] [CrossRef]
  33. Schneider, H.; Stamatis, D.H. Failure Mode and Effect Analysis: FMEA from Theory to Execution. Technometrics 1996, 38, 80. [Google Scholar] [CrossRef]
  34. Wei, Q. Data envelopment analysis. Chin. Sci. Bull. 2001, 46, 1321–1332. [Google Scholar] [CrossRef]
  35. Cook, W.D.; Seiford, L.M. Data envelopment analysis (DEA)—Thirty years on. Eur. J. Oper. Res. 2009, 192, 1–17. [Google Scholar] [CrossRef]
  36. Rao KV, S. An overview of backscattered radio frequency identification system (RFID). In Proceedings of the 1999 Asia Pacific Microwave Conference. APMC’99. Microwaves Enter the 21st Century. Conference Proceedings (Cat. No. 99TH8473), Singapore, 30 November–3 December 1999; pp. 746–749. [Google Scholar] [CrossRef]
  37. Marzuki, A.; Sauli, Z.; Yeon, A. Advances in RFID Components Design: Integrated Circuits. In Development and Implementation of RFID Technology; I-Tech Education and Publishing: London, UK, 2009. [Google Scholar] [CrossRef]
  38. Ahsan, K. RFID Components, Applications and System Integration with Healthcare Perspective. In Deploying RFID—Challenges, Solutions, and Open Issues; InTech: London, UK, 2011. [Google Scholar] [CrossRef]
  39. Arumugam, D.D.; Engels, D.W. Impacts of RF radiation on the human body in a passive RFID environment. In Proceedings of the 2008 IEEE Antennas and Propagation Society International Symposium, San Diego, CA, USA, 5–12 July 2008; pp. 1–4. [Google Scholar] [CrossRef]
  40. Thomas, V.M. Environmental implications of RFID. In Proceedings of the 2008 IEEE International Symposium on Electronics and the Environment, San Francisco, CA, USA, 19–22 May 2008; pp. 1–5. [Google Scholar] [CrossRef]
  41. Bordage, F. RFID et Environnement: Lorsque Les Tags se Compteront par Milliards, Green IT. 2014. Available online: https://www.greenit.fr/2014/05/23/rfid-et-environnement-lorsque-les-tags-se-compteront-par-milliards/ (accessed on 5 November 2023).
  42. Bordage, F.; de Montenay, L.; Benqassem, S.; DelmasOrgelet, J.; Domon, F.; Prunel, D.; Vateau, C.; et Lees Perasso, E. GreenIT.fr. 2021. Behind the Figures: Understanding the Environmental Impacts of ICT and Taking Action. Available online: https://www.greens-efa.eu/files/assets/docs/ict_environmental_impacts-behind_the_figures-5low.pdf (accessed on 26 November 2023).
  43. Sood, B.; Das, D.; Azarian, M.; Pecht, M.; Bolton, B.; Lin, T. Failure site isolation on passive RFID tags. In Proceedings of the 2008 15th International Symposium on the Physical and Failure Analysis of Integrated Circuits, Singapore, 7–11 July 2008; pp. 1–5. [Google Scholar] [CrossRef]
  44. Saarinen, K.; Frisk, L. Reliability of UHF RFID tags in humid environments. In Proceedings of the 2012 IEEE 14th Electronics Packaging Technology Conference (EPTC), Singapore, 5–7 December 2012; pp. 180–184. [Google Scholar] [CrossRef]
  45. Taoufik, S.; Eloualkadi, A.; Dherbécourt, P.; Temcamani, F.; Delacressonniere, B. Reliability and Failure Analysis of UHF-RFID Tags for Harsh Environments Applications. 2016. 〈hal-01341790〉. Available online: https://hal.science/hal-01341790 (accessed on 29 July 2022).
  46. Taoufik, S.; Dherbecourt, P.; el Oualkadi, A.; Temcamani, F. Reliability and Failure Analysis of UHF RFID Passive Tags Under Thermal Storage. IEEE Trans. Device Mater. Reliab. 2017, 17, 531–538. [Google Scholar] [CrossRef]
  47. Ozturk, E.; Dikkers, M.J.; Batenburg, K.M.; Salm, C.; Schmitz, J. RFID Tag Failure after Thermal Overstress. In Proceedings of the 2019 IEEE International Integrated Reliability Workshop (IIRW), South Lake Tahoe, CA, USA, 13–17 October 2019; pp. 1–4. [Google Scholar] [CrossRef]
  48. Hutter, M.; Schmidt, J.-M.; Plos, T. RFID and Its Vulnerability to Faults. In Cryptographic Hardware and Embedded Systems—CHES 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 363–379. [Google Scholar] [CrossRef]
  49. Cmiljanic, N.; Landaluce, H.; Perallos, A. A Comparison of RFID Anti-Collision Protocols for Tag Identification. Appl. Sci. 2018, 8, 1282. [Google Scholar] [CrossRef]
  50. Ma, H.; Wang, Y.; Wang, K. Automatic detection of false positive RFID readings using machine learning algorithms. Expert Syst. Appl. 2018, 91, 442–451. [Google Scholar] [CrossRef]
  51. de Barros Filho, I.E.; Silva, I.; Costa, D.G.; Viegas CM, D.; Ferrari, P. A reliability and performance GSPN-Based model for anti-collision RFID algorithms under noisy channels in industrial internet of things. Comput. Ind. 2021, 125, 103381. [Google Scholar] [CrossRef]
  52. Fritz, G.; Beroulle, V.; Aktouf, O.-E.-K.; Nguyen, M.D.; Hély, D. RFID System On-line Testing Based on the Evaluation of the Tags Read-Error-Rate. J. Electron. Test. 2011, 27, 267–276. [Google Scholar] [CrossRef]
  53. Kheddam, R. SafeRFID-MW: A RFID Middleware with runtime fault diagnosis. J. Commun. Softw. Syst. 2013, 9, 57. [Google Scholar] [CrossRef]
  54. Kheddam, R.; Aktouf, O.-E.-K.; Parissis, I.; Boughazi, S. Monitoring of RFID failures resulting from LLRP misconfigurations. In Proceedings of the 2013 21st International Conference on Software, Telecommunications and Computer Networks—(SoftCOM 2013), Split-Primosten, Croatia, 18–20 September 2013; pp. 1–6. [Google Scholar] [CrossRef]
  55. Caredda, V.; Orrú, P.F.; Romagnoli, G.; Volpi, A.; Zedda, F. RFID technology for blood tracking: An experimental approach for benchmarking different devices. Int. J. RF Technol. 2016, 7, 209–228. [Google Scholar] [CrossRef]
  56. el Beqqal, M.; Azizi, M. Review on security issues in RFID systems. Adv. Sci. Technol. Eng. Syst. J. 2017, 2, 194–202. [Google Scholar] [CrossRef]
  57. Kaur, M.; Sandhu, M.; Mohan, N.; Sandhu, P.S. RFID Technology Principles, Advantages, Limitations & Its Applications. Int. J. Comput. Electr. Eng. 2011, 3, 151–157. [Google Scholar] [CrossRef]
  58. Darcy, P.; Pupunwiwat, P.; Stantic, B. The Challenges and Issues Facing the Deployment of RFID Technology. In Deploying RFID—Challenges, Solutions, and Open Issues; InTech: London, UK, 2011. [Google Scholar] [CrossRef]
  59. RFID Technology İssues—Potential Problems with RFID (2019) RFID Systems for Manufacturing, Assets, Lifting & Logistics. Available online: https://www.corerfid.com/rfid-technology/technology-issues/ (accessed on 5 November 2023).
  60. Automotive Industry Action Group. Failure Mode and Effects Analysis—FMEA Handbook: Design FMEA, Process FMEA, Supplemental FMEA for Monitoring & System Response; Automotive Industry Action Group: Southfild, MI, USA, 2019. [Google Scholar]
Figure 1. The algorithm of the aggregated FMEA–DEA method.
Figure 1. The algorithm of the aggregated FMEA–DEA method.
Applsci 14 00584 g001
Figure 2. DMU inputs and outputs.
Figure 2. DMU inputs and outputs.
Applsci 14 00584 g002
Figure 3. FMEA–DEA model.
Figure 3. FMEA–DEA model.
Applsci 14 00584 g003
Figure 4. RFID components and sub-components.
Figure 4. RFID components and sub-components.
Applsci 14 00584 g004
Figure 5. Measurement of the Efficiency of the FMs by DEA and final ranks.
Figure 5. Measurement of the Efficiency of the FMs by DEA and final ranks.
Applsci 14 00584 g005
Figure 6. The ranks of the failure modes in the modified FMEA vs. the FMEA–DEA.
Figure 6. The ranks of the failure modes in the modified FMEA vs. the FMEA–DEA.
Applsci 14 00584 g006
Figure 7. The priority distribution of the failure modes in the conventional FMEA method and the proposed FMEA–DEA method.
Figure 7. The priority distribution of the failure modes in the conventional FMEA method and the proposed FMEA–DEA method.
Applsci 14 00584 g007
Figure 8. The priority distribution of the failure modes in the three FMEA methods.
Figure 8. The priority distribution of the failure modes in the three FMEA methods.
Applsci 14 00584 g008
Figure 9. The outcomes regarding the ranking and classification of the six methods.
Figure 9. The outcomes regarding the ranking and classification of the six methods.
Applsci 14 00584 g009
Table 1. Expert Information.
Table 1. Expert Information.
Group 1Group 2Group 3Group 4Group 5
Age6035296525
ExperienceProfessor at EMU, Northern Cyprus, for more than 30 yearsEngineer at Lafarge, Casablanca, for more than 10 yearsMechatronic Engineer at Sews, Morocco, and part-time teacher at ENSA for more than 5 yearsElectrical engineer and responsible for customer support at Siemens, Germany, for more than 40 years.Electrical and electronic engineer assistant in a company for repairing electrical boards and researcher in Paris for more than 3 years.
EducationPhD and more in addition to hundreds or research papers.Master of Informatic EngineeringMaster of Mechatronic Engineering and Specialized Technician DiplomaMaster of Electrical and Electronic EngineeringMaster of Data Science and a PhD student in the Electrical and Electronics Department
Table 2. Failure Modes, Causes, and Effects of the RFID System.
Table 2. Failure Modes, Causes, and Effects of the RFID System.
FM Number (i)RFID SYSTEMSub SystemsFailure Modes (FMs)Number of SFMs (ni) SFM Number (j)Cause (s) of Failure (Sub-Failure Modes SFMs)Effects
1TAG The power supply of the label Inefficient conversion of DC energy from RF21The antenna provides insufficient power.The tag is unable to turn on because of not receiving a correct feed; consequently, it does not send signals
2Threshold voltage alteration due to the combined diode and MOS.
2Excess transformation of electrical power 11Excessive energy emitted by the readerThe label is powered and communicates with the reader when it should not.
3Integrated circuit and connectionsShort-circuiting between bumps.11Adhesive becoming over-cured with age.Incorrect or deteriorated operation of the tag.
4Short-circuiting between the antenna pads.11Adhesive being under-cured due to high temperature.
5Inadequate impedance among bumps.11Antenna corrosion occurring in low temperatures.
6Insufficient impedance among the antenna pads.11Bumps corroding due to humidity.
7An open connection between the bump and the antenna pad.11Filter particle corrosion resulting from temperature and humidity.
8Excessive impedance between the bump and the antenna pads at the bonding interface.11Adhesive swelling caused by temperature fluctuations.
9Partial fracture of the antenna lead, causing excessive impedance within the antenna.11Die lift because of humidity cycling
10The antenna exhibits excessive impedance due to an open circuit.11Die disjunction from adhesive resulting from temperature and humidity fluctuations
11The connection between the bump and the antenna pad is intermittent or discontinuous.11Adhesive detached from antenna because of ESD
12There is a short circuit in the IC (integrated circuit).11Empty spaces in the adhesive caused by excessive bonding force.
13Open in IC11Lack of compression for the filler because of insufficient bond force
14Defective IC21Over bond temperatureDefective tag
2The electrical overstress (EOS) causes current leakage
15Insufficient spacing between the antenna and the chip.61The bonding temperature is inadequate.Possible non-detection of the tag
2 The bonding time exceeds the required duration.
3Bonding time inferior to that required
4Mechanical crop
5Mechanical curving
6Mechanical squeezing
16EEPROMInsufficient memory11Limited or inadequate storage memory Loss of the data
17The EPC number in EPC memory bank of the tag is identical for two tags or more.11The electronic product code (EPC) is a randomly repeated number sequence utilized by the manufacturer.The base station is unable to distinguish between two tags
18Contactless cards are more susceptible compared to regular credit cards.11An appropriate reader can query the tag if it lacks proper security measures.Ethical problems in addition to cloning and theft
19Decryption of user data in the user memory bank.11Insufficient or inefficient tag encryptionPrivacy issues along with tracking, blackmail, and coercion
20Unauthorized access to tag data in the reserved memory bank.11Insufficient security measures in the access and lock passwords.The tag can be hacked, copied, counterfeited
21TAGPositioning Wrong tag orientation11Misalignment between the orientation of the tag’s antenna and the reader’s antenna.The reader may fail to detect the tag, or it might detect it with errors.
22Steep angle of the tag during interaction.11The tag’s front is not oriented towards the antenna.Limited read range.
23Application surfaceIncompatibility between the surface material and tag type.11The antenna’s signal transmission and reception are highly sensitive to the material it is placed on.Decreased read range, reduced read rate, or no reading capability.
24Tag attachmentDetachment of the tag from the item.11Attachment damage caused by environmental factors like dust, water, UV light, chemicals, and temperature affecting the lifespan.Inability to track the item.
25EncasementFailure to safeguard the tag IC and antenna.11Encasement damage in harsh environments such as exposure to water, extreme temperatures, or metallic surfaces.Possible potential damage to the tag.
26ReaderReader API communications event management Reader collision issue (reader–reader collision)21Interference: reader communicating with tags covered by another reader.Simultaneous multiple readings of the tag by overlapping readers.
2Overlapping coverage areas of two readers.Signal interference due to overlapping coverage areas of readers.
27Tag collision issue
(tag–tag collision)
11Simultaneous data transmission attempts from multiple tags.Reader’s inability to differentiate between signals.
28Interference between multiple readers (reader–tag collision)21Inadequate distance between two readers.Incorrect information
2Incorrect operating frequency settings for two adjacent readers.
29Short reading distance51Incorrect reader frequency settings.Tag is not read
2Mismatched label and antenna polarization.
3Label surface obstructed by other materials like metal.
4Unconnected RF cable between reader and antenna.
5RFID label’s specifications.
30Cannot read card61Improperly connected serial or network cable.The PC command is unable to be transmitted to the reader.
2Inadequately tightened RFID antenna SMA connector.Missed reading
3Mismatch in ISO standards between the transponder and the reader.
4Size discrepancy between the tag and the receiver construction.
5Frequency mismatch between the tag and the reader.
6Damaged label.
31Accidental reading of EPC (electronic product code) instead of TID (tag identification data).11Inadequate reader settings.Incorrect ID, thus wrong information
32Self-jammer interference.11Continuous wave signal sent to the tag.Saturation of the receiver block leading to a decline in sensitivity.
33The rectifier converts low-level sinusoidal voltage into DC voltage.11Mismatch in power link between the antenna and the rectifier input.Incorrect power feed of the integrated circuit of the reader
34The “between” tag and reader Antenna modemFailure to receive signals by the tag or reader.41Defective sensitivity detection of the tag or the reader.Loss of information
2Electromagnetic field disturbances.
3External aggression affecting the antennas in the tag or the reader.
4Internal failure in the reader.
35Inability to transmit signals to the tag or the reader.21Internal failure in the tag.
2Repetitive software attempts to communicate.
36The transmission in continuous31Interior failure in the tagChannel congestion or overload.
2Interior failure in the reader
3Repetitive trials to communicate by the software
37Electromagnetic fieldThe electromagnetic waves emitted by the tag cannot reach the reader, and vice versa.11Unfavorable environmental conditions (metallic, liquid, etc.).Loss of information
38HOSComputer middleware database, SD cardHack11Inadequate or ineffective protective measures/tools.Breaches in users’ privacy and security.
39Software bugs11Ignorance, big data, slow systemIncorrect, duplicate and missed reading
40Data transfer11Weak or faulty connection between the reader and the host (Wi-Fi/serial interface/Bluetooth, etc.).The host fails to receive data and does not transmit information to the tag.
41Virus attack 11Inappropriate antivirus protectionUnauthorized access, compromised functionality, or system malfunction.
42HealthRF waves Thermal effects: can potentially harm the eye lens, causing damage, and heat cells and biological tissues.
Possibly carcinogenic: There is a potential risk of causing cancer.
11The distance between the reader and the human body is within 10 cm.Elevated specific absorption rate (SAR) of the human head, surpassing 1.6, which is the maximum value permitted by the FCC in the US.
43Green ITheavy metals, silicon, aluminum,
plastics: PVC or PA6
The soaring quantity of RFID tags is leading to a significant consumption of metals and toxic materials.11Chemical reactions occurring with the environment.Pollution and use of rare metals
Table 3. The gaps between the S F M i j of each parent F M i .
Table 3. The gaps between the S F M i j of each parent F M i .
FMi1141526282930343536
Min SFM ij rank ( min a i j ) 927204637476311
Max SFM ij rank ( max a i j ) 2336646039666238840
Gap ( max a i j min a i j ) 14944342625532529
Table 4. The synthetization procedure outcomes.
Table 4. The synthetization procedure outcomes.
FMiAGGSiAGGOiAGGDiAGGCOSTi
(USD)
AGGTIMEi
(Minutes)
AGGRPNiRank bi
13.5282.642.7640.5090.0025.75129
2222.20.2545.008.843
32.52.75335.2595.0020.62519
42.2533.525.2585.0023.62513
52.751.752.50.2575.0012.0312540
62.52.252.7525.2585.0015.4687529
72.7522.7525.2585.0015.12532
83.252.252.2525.2585.0016.45326
93.52.252.7535.2595.0021.6517
103.752.52.7535.2595.0025.781258
113.751.752.2525.2585.0014.7656233
12422.7525.2585.002216
133.52.5335.2595.0026.257
144.1071.752.85726.0055.0020.53520
152.6891.7863.16161.50520.0015.18731
163.8220.5045.0015.230
1742335.2542.502412
184.252.253.535.5095.0033.468752
194.252.25335.5095.0028.68755
204.21.8335.5095.0022.6814
213.22.8325.2537.5026.886
221.62.82.625.2527.5011.64841
232.42.22.635.5050.0013.72838
242.62.2335.5042.5017.1624
254.21.83.425.5055.0025.70410
263.81.62.373584110.00180.0014.4313935
27421.7550.0085.001437
283.90262.0973682.2120.00190.0018.0075623
292.8662.022692.516312176.25260.0014.5905634
303.25301.58363.052244161.50340.0015.7245128
314.41.2335.2550.0015.8427
323.21.4335.2550.0013.4439
333.251.752.525.2540.0014.2187536
344.45201.917802.638356260.50500.0022.5267715
354.16362.2909093.309090101.0095.0031.563803
363.68231.7647053.22941196.00155.0020.9855818
374.23.22.227.5055.0029.5684
3851.53.2540.0085.0024.37511
393.22.6225.2555.0016.6425
404.43.22.630.0032.5036.6081
4142.5245.0055.002022
4231.83.837.5095.0020.5221
43222.410.00265.009.642
Table 5. Suggested replacements of some FMs that lost ranks.
Table 5. Suggested replacements of some FMs that lost ranks.
FMs with Increased PriorityFMs with Decreased Priority
Failure ModesSum of the Costs (USD)Sum of the Time (Minutes)Sum of the RPNsFailure Mode Cost (USD)Time (Minutes)RPN
31 and 1770.592.539.84351019531.563
16 and 3325.758529.4181935.59528.687
1 and 2436132.542.911369615520.985
2, 5 and 2225.75147.532.47934260.550022.52
Table 6. The similarities among the compared methods.
Table 6. The similarities among the compared methods.
Conventional FMEAPRISMNew FMEA–DEAAP
Conventional FMEA-0%20%19%
PRISM -0%20%
New FMEA–DEA -33%
AP -
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chnina, K.; Daneshvar, S. Aggregation of Risk Management and Non-Parametric Models to Rank Failure Modes of Radio Frequency Identification Systems. Appl. Sci. 2024, 14, 584. https://doi.org/10.3390/app14020584

AMA Style

Chnina K, Daneshvar S. Aggregation of Risk Management and Non-Parametric Models to Rank Failure Modes of Radio Frequency Identification Systems. Applied Sciences. 2024; 14(2):584. https://doi.org/10.3390/app14020584

Chicago/Turabian Style

Chnina, Khaoula, and Sahand Daneshvar. 2024. "Aggregation of Risk Management and Non-Parametric Models to Rank Failure Modes of Radio Frequency Identification Systems" Applied Sciences 14, no. 2: 584. https://doi.org/10.3390/app14020584

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop