Component and system reliability-based topology optimization using a single-loop method

Mariana Teixeira Silva, Daniel A Tortorelli, Julian A. Norato, Christopher Ha, Ha Rok Bae

Research output: Contribution to journalArticlepeer-review

Abstract

We perform reliability-based topology optimization by combining reliability analysis and material distribution topology design methods to design linear elastic structures subject to random inputs, such as random loadings. Both component reliability and system reliability are considered. In component reliability, we satisfy numerous probabilistic constraints which quantify the failure of different events. In system reliability, we satisfy a single probabilistic constraint which encompasses the component events. We adopt the first-order reliability method to approximate the component reliabilities and the inclusion-exclusion rule to approximate the system reliability. To solve the probabilistic optimization problem, we use a variant of the single loop method, which eliminates the need for an inner reliability analysis loop. The proposed method is amenable to implementation with existing deterministic topology optimization software, and hence suitable for practical applications. Designs obtained from component and system reliability-based topology optimization are compared to those obtained from traditional deterministic topology optimization and validated via Monte Carlo simulation.

Original languageEnglish (US)
Pages (from-to)87-106
Number of pages20
JournalStructural and Multidisciplinary Optimization
Volume41
Issue number1
DOIs
StatePublished - Feb 2010

Keywords

  • Component reliability
  • Random loads
  • Single-loop method
  • System reliability
  • Topology optimization

ASJC Scopus subject areas

  • Software
  • Control and Systems Engineering
  • Computer Science Applications
  • Computer Graphics and Computer-Aided Design
  • Control and Optimization

Fingerprint

Dive into the research topics of 'Component and system reliability-based topology optimization using a single-loop method'. Together they form a unique fingerprint.

Cite this