1 Introduction

One of the main challenges in reliability theory is to establish a system's reliability by examining its independent components' reliability. In order to tackle this challenge, approximative techniques for the system's reliability that are both computationally efficient and effective have been created. It has been found that the bounding approach is a beneficial approximation method. To assess system reliability, it is important to determine both the minimum and maximum bounds. We conducted a thorough evaluation of these bounds for binary systems, taking into account various assumptions about the components' reliabilities. For mechanical systems, a common belief is that reliability systems can be characterized by combining parallel and series collections. However, more than this approach is needed to explain the reliability systems of many complex engineering systems. Therefore, a simple series or parallel arrangement is inadequate to describe such systems. We conducted detailed numerical comparisons to provide a comprehensive assessment of these constraints.

When computing system reliability, a more efficient algorithm is always necessary. The algorithm should be correct in theory, accurate mathematically, and easy to compute. The algorithm described can solve problems with current models and provide improved lower and upper bounds for estimating system reliability. It can be used to estimate the reliability of a two-terminal network by utilizing minimal path (cut) sets. Calculating system reliability accurately is usually an NP-hard problem. Fortunately, several standard methods are available to compute both the reliability lower and the reliability upper bounds of the system. Esary and Proschan (1963) presented a significant paper proving that the trivial bounds can be improved by utilizing the minimal path and cut description of the structure-function. The EPb method is a graph transformation method to assess two-terminal reliability. The upper bound graph is a combination of parallel minimal path sets. If a component appears on multiple minimal path sets, it will be duplicated to create a unique component for each minimal path sets. The lower bound is a collection of all possible combinations of minimal cut sets, duplicating components similarly. When tackling design problems that prioritise caution, it is essential to consider lower bounds for the most informed approach.

Beichelt and Sproß (1989) highlight the importance of clearly defined upper and lower reliability bounds. Simple system paths, cut sets, and disjoint sums can be used to make these bounds. The Sb method is critical because they recognize that many approximation methods rely on complicated mathematics. Instead, it emphasizes the value of having short upper and lower bounds for measuring system reliability. Creating these boundaries requires minimal paths and cuts within the system and generating disjoint sums.

Colbourn (1988) identifies the EDb approaches as one of the numerous effective and widely utilized approximation approaches for reliability that only necessitates discussing some minimal paths or cut sets. The EDb techniques calculate lower and upper bounds based on disjoint edge minimal-path (cut) sets to evaluate system reliability. To ensure accurate reliability calculations, it's important to revise edge-packing techniques. Currently, these techniques must consider the potential of considerable minimal path sets that contain only series and parallel structures, actually if they have joint components. A better way to increase accuracy while maintaining efficiency is by utilizing minimal path sets in parallel and series reduction techniques. This method is more effective than solely concentrating on edge-disjoint minimal path sets.

Jin and Coit (2003) calculated the minimum and maximum bounds of system reliability by adding up the LQb of unreliability for each minimal cut set or path set. The LQb method is used to compute replicated components' highly efficient reliability covariance. Hence LQb significantly enhances the precision and accuracy of the estimation model for network reliability in the two-terminal form.

More efficient approximation methods have been proposed to evaluate more complex networks' reliability. Kaushik and Banka (2015) propose an estimated manufactured neural system (AANN) technique for the network reliability problem when complex system design is required. Datta and Goyal (2017) proposed a "sum of disjoint products" approach to minimize repetitive calculations when determining precise reliability based on flow vectors. Zhu and Zhang (2019) present edge-packing approaches that approximate network reliability more precisely and effectively. In this study, we examine the available bounds from the literature. Xiao et al. (2021) present a new robust timing quality network (RTFN) for obtaining features in time series type. It is made up of a temporal feature network (TFN) and a long brief memory (LSTM)-based focus network (LSTMaN). Xing et al. (2022) presented the projection of a Timecut-expanded performance of the same sequence guided by a faintly augmented sequence. Self-distillation facilitates the transfer of knowledge from upper to lower levels, thereby facilitating the extraction of low-level semantic data.=. Datta and Goyal (2023) suggest three directions if duplicative and disjoint Lower Boundary Flow Vectors as well as to disjoint the non-disjointed Lower Boundary Flow Vectors and present some useful applications of the stochastic system reliability computation.

Graphs are typically used for system definition in engineering (Kuo and Zuo 2003; Mutar and Hassan 2017; Todinov 2013). A graph, denoted as G = (V, E), has a non-empty set V representing its vertices, and a non-empty set E represents a set of pairwise links (also called edges) between those nodes. The probability of the nodes and edges being functional is considered. (Beichelt 2012; Mutar 2022b, 2022c). The focus of this study is to highlight the importance of maintaining communication between source and sink nodes, even in the event of a node or edge failure. This study assumes that all nodes are reliable, so we will only explore techniques for dealing with edge failures. The probability of successful data transfer between two source and sink nodes referred to as two-terminal reliability, depends on the quality of the connecting paths. On the other hand, the reliability of the system is determined by the probability of these two nodes being connected by the most dependable and effective routes, referred to as minimal paths or cuts (Gertsbakh and Shpungin 2011; Mutar 2022d; Rausand 2014). In order to determine reliability bounds, it is essential first to compute and list all the minimal cut (path) sets. The underlying principle here is that every edge in a minimal path set must operate correctly to secure the linkage between two nodes. The connection cannot be guaranteed if any element in the set malfunctions. Minimal paths are the minor path sets without other path sets. A minimum path is set for two-terminal reliability, a process route between the terminals. It's crucial to understand that if all the edges in a minimal cut set fail, it could lead to disconnecting a pair of nodes. However, if some elements in the set are still functional, there's no guarantee of disconnection. To be considered minimal, a cut set must consist solely of a minimal set. (Rodionov and Rodionova 2013). Mutar (2020) described a technique to obtain the IM matrix by originating minimal cut sets from minimal path sets. Alternatively, the algebraic principles were employed to generate the minimal-cut sets for the complex system. One can create the system's matrix-based minimal cut arrangement by algebraically transposing an IM matrix with the truth matrix. This process is commonly used to establish the system's reliability boundaries.

Numerous engineering publications, books, and papers delve into hypothetical and experimental viewpoints about complex systems, networks, and reliability theory (Aggarwal 1993). For example, components in most communication systems have complex configurations, more than one technique (Hassan and Mutar, 2017; Hassan and Udriște 2015; Horváth 2013; Jula and Costin 2012; Malik et al. 2020; Mi et al. 2018; Mutar 2022d; Sharma 2014) was used. Mutar and Hassan (2022) show how mathematical detection tests can be involved in HPOSS to determine the reliability of complex systems. Xiao et al. (2022) proposal, the ETNEEG algorithm demonstrated superior performance compared to fourteen other algorithms on the given datasets.

This paper proposes a new technique to estimate the reliability of engineering design projects. The approach uses a matrix-based technique to compute the minimal paths and cuts of the SCS system with seven components. This system is complex, but the matrix-based deduction simplifies the network and reduces its complexity. After that, various techniques were attempted to bounds reliability, with some advancements based on more modular components. After that, several methods were used to achieve reliability in bounds, with some advancements based on minimal paths and cuts. Complete evaluation of reliability bounds for coherent binary systems. Considering qualitative, quantitative, and imposed on goods, compare these bounds. The structure of the dissertation is as tracks: In Section 1, we presented an overview of the relevant literature and reliability bounds for coherent binary systems. Section 2 provides the necessary theoretical foundations for coherent binary systems and a summary of the most significant reliability bounds identified in the literature. In Section 3, improved mathematical formulas for reliability-bound approaches are established. These formulas can then be applied to a real-world system. In Section 4, numerical comparisons of the reliability bounds are shown, and Sections 5 and 6 detail the results, discussion, and conclusion, respectively.

2 Some important concepts

2.1 Reliability function

A system (network) is considered coherent if its structural function is monotone and each element is essential (Important system components are those whose states are determined by the conditions of other components). The states of component \({x}_{i}\) are determined by whether it is functioning during a certain period (\({x}_{i}\)=1) or has failed (\({x}_{i}\)=0). The binary random variable of component x is represented in Eq. (1).

$${x}_{i} =\left\{\begin{array}{c}1 ,if \,component\, i \,is\, functional, \\ 0 ,if \,component\, i\, is \,fail. \end{array}\right.$$
(1)

Therefore, each component's state is defined by the vector \({\varvec{X}} = \left({x}_{1},{x}_{2},\dots ,{x}_{n}\right)\). The system's requirements can be determined by the binary function φ(X), which performs as the structural function of the system. If \({x}_{1},{x}_{2},\dots ,{x}_{n}\) are i.i.d. random variables with each component having a probability of \(Pr\left({x}_{i}\right)={r}_{i}\), then the reliability of the system \({R}_{Exact}\) can be represented by the component reliabilities \({r}_{1},{r}_{2},\dots ,{r}_{n}\). Also, the system's unreliability \({Q}_{Exact}\) can be computed as:

$${Q}_{Exact} = 1- {R}_{Exact}$$
(2)

where \({q}_{i} = 1- {r}_{i}\). Therefore, Eq. (2) shows that the system's unreliability increases with the number of components, which helps in identifying the components that are prone to failure.

2.2 Exact system reliability

This section will use powerful methods to accurately evaluate the reliability of systems that depend on minimal paths. This approach involves gathering all available minimal paths and creating an incidence matrix (Mutar 2020, 2022a, 2022c, 2022d). For the creation of an incidence matrix with k minimal paths (\({P}_{1}, {P}_{2},\dots , {P}_{k}\)), use the minimal paths as rows and the components as columns. This method ensures the matrix is accurate and efficient, allowing easy and effective analysis. Technically, using the proposed algorithm in MATHEMATICA software (Appendix), compute each minimal path as an incidence matrix (IM) as the following:

$$IM=\begin{array}{cc} & \begin{array}{ccc}{x}_{1 }& {x}_{2}& \begin{array}{cc}\dots & {x}_{n}\end{array}\end{array}\\ \begin{array}{c}{P}_{1}\\ {P}_{2}\\ \begin{array}{c}\vdots \\ {P}_{k}\end{array}\end{array}& \left[\begin{array}{ccc}{e}_{11}& {e}_{12}& \begin{array}{cc}\dots & {e}_{1n}\end{array}\\ {e}_{21}& {e}_{22}& \begin{array}{cc}\dots & {e}_{2n}\end{array}\\ \begin{array}{c}\vdots \\ {e}_{k1}\end{array}& \begin{array}{c}\vdots \\ {e}_{k2}\end{array}& \begin{array}{cc}\begin{array}{c}\ddots \\ \dots \end{array}& \begin{array}{c}\vdots \\ {e}_{kn}\end{array}\end{array}\end{array}\right]\end{array}$$
(3)

where \({e}_{ij}=1\) iff\({x}_{j}\in {P}_{i}\), otherwise \({e}_{ij}=0\) and\(i = 1, 2,\dots ,k , j = 1; 2,\dots , n\). Also, the proposed algorithm can be used to generate the minimal cut matrix (CM) to discover all minimal cut sets. In the CM matrix, the components are organized by column and the cuts by row (Mutar 2020). Hence, the failure conditions of components can be calculated using the proposed algorithm in MATHEMATICA software (Appendix) to compute a single matrix, given as

$$CM=\begin{array}{cc} & \begin{array}{ccc}\overline{{x }_{1}} & \overline{{x }_{2}}& \begin{array}{cc}\dots & \overline{{x }_{n}}\end{array}\end{array}\\ \begin{array}{c}{C}_{1}\\ {C}_{2}\\ \begin{array}{c}\vdots \\ {C}_{m}\end{array}\end{array}& \left[\begin{array}{ccc}{e}_{11}& {e}_{12}& \begin{array}{cc}\dots & {e}_{1n}\end{array}\\ {e}_{21}& {e}_{22}& \begin{array}{cc}\dots & {e}_{2n}\end{array}\\ \begin{array}{c}\vdots \\ {e}_{m1}\end{array}& \begin{array}{c}\vdots \\ {e}_{m2}\end{array}& \begin{array}{cc}\begin{array}{c}\ddots \\ \dots \end{array}& \begin{array}{c}\vdots \\ {e}_{mn}\end{array}\end{array}\end{array}\right]\end{array}$$
(4)

To find all possible minimal cuts

\({C}_{1}, {C}_{2},\dots , {C}_{m}\) in a complex system, the CM matrix is typically utilized, and Mathematica can be used to conduct a minimal cut deduction technique that will give all available minimal cuts (Kuo and Zuo 2003; Marichal 2016). With a parallel arrangement of each minimal path and each minimal cut contained in these rows, the \({R}_{Exact}\) can be determined utilizing the formula:

$${R}_{Exact}=1-\prod_{i=1}^{k}{(1-\mathrm{Pr}(P}_{i}))$$
(5)
$${R}_{Exact}=\prod_{i=1}^{m}{(1-Pr(C}_{i}))$$
(6)

The random variables of Bernoulli (\({x}_{i}^{n}= {x}_{i}\)) imply that the system's structural function can only assume the importance of 1 or 0 (\({1}^{n} = 1\) and \({0}^{n} = 0\)). This connection can be expressed using a substitution rule (Hassan and Mutar, 2017; Hassan and Mutar, 2017; Pyzdek and Keller 2003; Todinov 2013).

3 Reliability bounds measurement approach

3.1 Spross bounds

Given that most approximation methodologies primarily depend on advanced mathematics, Spross highlights the significance of having a specific coverage for system reliability, with both the upper and lower bound. These bounds can be generated with minimal effort by using only a limited number of paths (\({P}_{1}, {P}_{2},\dots , {P}_{k}\)) of the system and by computing disjoint sums as follows:

1- For \({P}_{1}\) assume that \({A}_{\mathrm{0,1}}=\{{P}_{1}\}\) and \({\alpha }_{1}={A}_{\mathrm{0,1}}\).

2- Define the complement set \({P}_{j} -{A}_{s,i}\) of the path \({A}_{s,i}\) such that \({P}_{j} -{A}_{s,i}=\{{x}_{a}|{x}_{a}\in {P}_{j} and {x}_{a}\notin {A}_{s,i}\}\) for \(0\le s<j\le i\) and \(a=\mathrm{1,2},\dots ,n.\)

  • If \({P}_{j} -{A}_{s,i}=\varnothing \) then \({A}_{j,i}=\{{A}_{s,i}\}\) and \({\alpha }_{i}={A}_{s,i}.\)

  • If \({x}_{a}\in {P}_{j} and \overline{{x }_{a}}\in {A}_{s,i}\) where \(\overline{{x }_{a}}=1-{x}_{a}\) then \({P}_{j} -{A}_{s,i}=\varnothing \) and \({\alpha }_{i}={A}_{s,i}.\)

  • If \({P}_{j} -{A}_{s,i}=\{{x}_{a}\}\) then \({A}_{j,i}=\{\overline{{x }_{a}}{A}_{s,i}\}\) and \({\alpha }_{i}={A}_{j,i}\).

  • If \({P}_{j} -{A}_{s,i}=\{{x}_{a}{x}_{b}\}\) for a < b < n then \({B}_{j,r}=\{\overline{{x }_{a}}{A}_{s,i}\}\) and \({B}_{j,r+1}=\{{x}_{a}\overline{{x }_{b}}{A}_{s,i}\}\) then \({A}_{j,i}=\{{B}_{j,r}, {B}_{j,r+1}\}\) and \({\alpha }_{i}=\sum_{r=1}^{r+1}{B}_{j,r}\) \(\forall {B}_{j,r}\in {A}_{j,i}\).

Consequently, every \({\alpha }_{i}\) is determined as a disjoint sum form. The characteristics of the structure–function of a coherent system are as follows:

$$\varphi \left(x\right)=\sum_{i=1}^{k}{\alpha }_{i}$$
(7)

Likewise, minimal cut sets \({C}_{1}, {C}_{2},\dots , {C}_{m}\) can be used in the above algorithm to obtain disjoint products. Then

$$\varphi \left(x\right)=1-\sum_{j=1}^{m}{\beta }_{j}$$
(8)

Hence \({\beta }_{j}\) are disjoint Boolean functions. For many decades, scientists have been trying to find a solution to this issue (see (Rai et al. 1995), and (Soh and Rai 1993)). Reliability is calculated for a system using the disjoint sum form of \(\varphi \left(x\right)\) as follows:

$${R}_{Exact}=\sum_{i=1}^{k}Pr({\alpha }_{i})$$
(9)
$${R}_{Exact}=1-\sum_{j=1}^{m}Pr ({\beta }_{j})$$
(10)

By assume that \({P}_{1}, {P}_{2},\dots , {P}_{k}\) and \({C}_{1}, {C}_{2},\dots , {C}_{m}\) are the provided commonly known as the minimal path and cut sets, respectively, where \(1 \le g \le k\) and \(1 \le h \le m\), the lower reliability bound (\({R}_{LB}\)) as follows:

$${R}_{LB}=\mu \left(g\right)=\sum_{i=1}^{g}Pr({\alpha }_{i})\le {R}_{Exact}$$
(11)

And the upper reliability bound (\({R}_{UB}\)) is computed as

$${R}_{UB}=\gamma (h)=1-\sum_{j=1}^{h}Pr ({\beta }_{j})\ge {R}_{Exact}$$
(12)

For a repaired degree of precision, the calculations of \(\mu \left(g\right)\) and \(\gamma \left(h\right)\) is stopped when \(d\left(g, h\right)\le \epsilon \), where \(d\left(g, h\right)=\mu \left(g\right)-\gamma \left(h\right)\). In that case, g and h would need to be increased in size. Using benchmark networks from the literature, we compared the interpretation of the suggested technique with that of current methods, which are implemented in WOLFRAM MATHEMATICA.

3.2 Esary-proschan bound

The EPb method, which determines the reliability of two-terminal systems, involves transforming a graph. The graph represents the maximum possible reliability by combining parallel minimal cut sets \(({C}_{1}, {C}_{2},\dots , {C}_{m})\). Each component that appears on multiple minimal cut sets is duplicated to create a unique component on each minimal cut sets. The lower bound (\({R}_{LB}\)) is calculated as

$${R}_{LB}=\prod_{i=1}^{m}\left(1-\prod_{t\in {C}_{i}}1-{r}_{t}\right)\le {R}_{Exact}$$
(13)

where \({r}_{t}\) is the component type \(t\) reliability in the minimum possible cut set \({C}_{i}\). Alternatively, assuming that all components of the complete structure have failure paths \(({P}_{1}, {P}_{2},\dots , {P}_{k})\), the upper bound (\({R}_{UB}\)) is the probability of the union of all failure paths.

$${R}_{UB}=1-\prod_{i=1}^{k}\left(1-\prod_{t\in {P}_{i}}{r}_{t}\right)\ge {R}_{Exact}$$
(14)

Here \({r}_{t}\) is the component type \(t\) reliability in the minimal path set \({P}_{i}\). In this case, one must count both the minimal cut sets and the minimal path sets to obtain upper and lower bounds. Lower bounds provide more information for those averse to risk problems with the design (Sebastio et al. 2014; Yang and Frangopol 2020).

3.3 Edge-packing bound

To illustrate the fundamental idea of EDb techniques, consider \({\varvec{P}}=({P}_{1}, {P}_{2},\dots , {P}_{k})\) to define the vector of all minimal path sets and \({\varvec{D}}{\varvec{P}}=\{{P}_{i}|{P}_{i}-{P}_{j}=\varnothing \forall {P}_{i},{P}_{j}\in {\varvec{P}}\}\) to represent the vector of only disjoint minimal path sets. The vector \({\varvec{D}}{\varvec{P}}\) can be used to estimate the lower reliability bound as follows:

$${R}_{LB}=1-\prod_{i=1}^{u}\left(1-\prod_{t\in DP}{r}_{t}\right)\le {R}_{Exact}$$
(15)

where u is defined as the total number of disjoint minimal path sets. Then a second justification for identifying disjoint edge minimal cut sets is their value in defining the network reliability upper bound. Alternatively, consider \({\varvec{C}}=({C}_{1}, {C}_{2},\dots , {C}_{m})\) to define the vector of all minimal cut sets and \({\varvec{D}}{\varvec{C}}=\{{C}_{i}|{C}_{i}-{C}_{j}=\varnothing \forall {C}_{i},{C}_{j}\in {\varvec{C}}\}\) be the vector of disjoint edge minimal cut sets. Then \({\varvec{D}}{\varvec{C}}\) can be used to estimate the upper reliability bound.

$${R}_{UB}=\prod_{i=1}^{W}\left(1-\prod_{t\in DC}1-{r}_{t}\right)\ge {R}_{Exact}$$
(16)

Hence, w is the total number of disjoint minimal cut sets (Jin and Coit 2003; Zhu and Zhang 2019).

3.4 Linear and quadratic bound

The LQb method can be utilized to find the terminal-pair reliability bound of a system, given minimal cut sets \(({C}_{1}, {C}_{2},\dots , {C}_{m})\) for that system. The lower bound is calculated as

$${R}_{LB}=1-\sum_{i=1}^{m}{\mathrm{Pr}(C}_{i})+\sum_{i=1}^{m-1}\sum_{j=i+1}^{m}{\mathrm{Pr}(C}_{i} {C}_{j})\le {R}_{Exact}$$
(17)

Hence \(\mathrm{Pr}\left(\overline{{x }_{t}}\right)=1-{r}_{t}, \forall \overline{{x }_{t}}\in {C}_{i}\). Similar components or hardware can be used in various network applications across the system, and an unmarried reliability assessment is applied universally. This causes the reliability assessments of the components to be statistically interdependent. Equation (17) occurs as the first three outcome terms of Eq. (13) when the system structure is parallel-series. However, Eq. (17) is not limited to parallel-series arrangements. Two-terminal arrangements are usually not in parallel series. Consequently, it is essential to recognize that Eqs. (13), (14), and (17) represent three distinct approximations of the two-terminal reliability.

Finally, a reliability upper bound can be received from the collection of all minimal path sets by using the formula:

$${R}_{UB}=1-\sum_{i=1}^{k}\mathrm{Pr}\left({P}_{i}\right)+\sum_{i=1}^{k-1}\sum_{j=i+1}^{k}{\mathrm{Pr}(P}_{i}{P}_{j})\ge {R}_{Exact}$$
(18)

When \(\mathrm{Pr}\left({x}_{t}\right)=1-{r}_{t}, \forall {x}_{t}\in {P}_{i}\). For each given reliability value, the LQb approach can be used to determine lower and upper bounds. When the reliability values of certain network components are low (Babaei and Rashidi-baqhi 2022; Mutar and Hassan 2022; Romero 2021; Wang et al. 2021).

4 Structure with modules

4.1 Logic diagram of SCS

The diagram in Fig. 1 displays the SCS that uses four sensors (\({M}_{1}, {M}_{2}, {M}_{3}\) and \({M}_{4}\)) to approximate the temperatures and stresses of zones A and B. The CD in the comparator detects a temperature or pressure difference more significant than a necessary value, which activates a system shutdown sign. The SCS is designed to increase resilience by implementing dual comparators and sensor pairs. Signal cables \({C}_{1}\) and \({C}_{2}\) transmit the sensor data to the comparators. Actually, if sensors \({M}_{1}\) and \({M}_{2}\) drop, the SCS will resume functioning. The remaining sensors \({M}_{3}\) and \({M}_{4}\) will send recorded temperature or pressure data through the signal cables \({C}_{1}\) and \({C}_{2}\) to the comparator CD (Jula and Costin 2012; Todinov 2013).

Fig. 1
figure 1

An SCS that approximates estimated pieces between two zones

The system will only function when there is a direct path between two terminals in the network shown in Fig. 2, using operational components. The reliability of complex systems, like communication and electronic management systems, cannot be determined by simply using a series, parallel, or series-parallel configuration. These systems can exhibit high reliability that cannot be achieved through series-parallel arrangements (Hassan and Udriște 2015; Jula and Costin 2012; Todinov 2013).

Fig. 2
figure 2

Block diagram of SCS

To describe the reliability function of the SCS system depicted in Fig. 2, graph G = (V, E) consists of vertices V={a,b,…,e} and edges E={1,2,…,7} can be used. The graph G is a two-terminal, simple, and connected graph with edges that go in the same direction. By examining Fig. 3, the structural function can be determined between the source and sink nodes.

Fig. 3
figure 3

A graph G of SCS

4.2 Calculate all minimal paths and minimal cuts of SCS

In order to represent all potential states of a system, the IM matrix is used. This matrix contains information about whether each component is in good or faulty condition. Additionally, it is essential to note that the IM matrix includes all possible minimal paths. The proposed algorithm in the Appendix can be used to calculate the IM matrix for a complex system illustrated in Fig. 3. The equation for this is provided as Equation (3). The following is its structure:

$$IM=\begin{array}{c} \begin{array}{ccc}\begin{array}{ccc}\begin{array}{ccc}\begin{array}{cc}{x}_{1}& {x}_{2}\end{array}& {x}_{3}& {x}_{4}\end{array}& {x}_{5}& {x}_{6}\end{array}& {x}_{7}& \end{array}\\ \begin{array}{cc}\begin{array}{c}{P}_{1}\\ {P}_{2}\\ \begin{array}{c}{P}_{3}\\ {P}_{4}\\ \begin{array}{c}{P}_{5}\\ \begin{array}{c}{P}_{6}\\ {P}_{7}\end{array}\end{array}\end{array}\end{array}& \left[\begin{array}{ccccccc}0 & 1 & 0 & 0 & 0 & 1 & 0 \\ 0 & 1 & 0 & 0 & 1 & 0 & 1 \\ 1 & 0 & 1 & 0 & 0 & 1 & 0 \\ 1 & 0 & 0 & 1 & 0 & 0 & 1 \\ 0 & 1 & 1 & 1 & 0 & 0 & 1 \\ 1 & 0 & 0 & 1 & 1 & 1 & 0 \\ 1 & 0 & 1 & 0 & 1 & 0 & 1 \end{array}\right]\end{array}\end{array}$$
(19)

Consequently, the system has an n-component with a f\(\varphi :{\left\{0, 1\right\}}^{n} \to \left\{0, 1\right\}\), which represents the order of the system (in this special case,\({2}^{8}=256\)). Only the minimal paths were evaluated, as they indicate the current state of the system's function and the lack of significance. All minimal path sets of the CSC system are:

$${P}_{1}=\left\{{x}_{2} {x}_{6}\right\}, {P}_{2}=\left\{ {x}_{2} {x}_{5} {x}_{7} \right\}, {P}_{3}=\left\{ {x}_{1} {x}_{3} {x}_{6} \right\}, {P}_{4}= \left\{ {x}_{1} {x}_{4} {x}_{7}\right\}, {P}_{5}=\left\{{x}_{2} {x}_{3} {x}_{4} {x}_{7} \right\}, {P}_{6}=\left\{{x}_{1} {x}_{4} {x}_{5} {x}_{6}\right\},{P}_{7}=\left\{{x}_{1} {x}_{3} {x}_{5} {x}_{7}\right\},$$

In this manner, the SCS system depicted in Fig. 3 can be represented utilizing all minimal paths in a series–parallel topology form with repeating subsystem components, as shown in Fig. 4.

Fig. 4
figure 4

All minimal path sets of SCS

Also, the CM matrix provides a comprehensive overview of the failure states of all components. The rows contain all the minimal cuts, while the columns sequence the components accordingly. Consequently, to generate Equation (4) of Fig. 3 by applying the proposed algorithm in Appendix, the CM matrix can be the following structure:

$$CM=\begin{array}{c} \begin{array}{ccc}\begin{array}{ccc}\begin{array}{ccc}\overline{{x }_{1}}& \overline{{x }_{2}}& \overline{{x }_{3}}\end{array}& \overline{{x }_{4}}& \overline{{x }_{5}}\end{array}& \overline{{x }_{6}}& \overline{{x }_{7}}\end{array}\\ \begin{array}{cc}\begin{array}{c}{C}_{1}\\ {C}_{2}\\ \begin{array}{c}{C}_{3}\\ {C}_{4}\\ \begin{array}{c}{C}_{5}\\ {C}_{6}\end{array}\end{array}\end{array}& \left[\begin{array}{ccccccc}0 & 0 & 0 & 0 & 0 & 1 & 1 \\ 0 & 0 & 0 & 1 & 1 & 1 & 0 \\ 0 & 1 & 1 & 0 & 1 & 0 & 1 \\ 0 & 1 & 1 & 1 & 0 & 0 & 0 \\ 1 & 0 & 1 & 0 & 1 & 1 & 0 \\ 1 & 1 & 0 & 0 & 0 & 0 & 0 \end{array}\right]\end{array}\end{array}$$
(20)

Therefore, six minimal cuts can be obtained.

$${C}_{1}=\left\{\overline{{\mathrm{x} }_{6}} \overline{{\mathrm{x} }_{7}}\right\}, {C}_{2}=\left\{\overline{{\mathrm{x} }_{4}} \overline{{\mathrm{x} }_{5}} \overline{{\mathrm{x} }_{6}}\right\},{C}_{3}=\left\{\overline{{\mathrm{x} }_{2}} \overline{{\mathrm{x} }_{3}} \overline{{\mathrm{x} }_{5}} \overline{{\mathrm{x} }_{7}}\right\}$$
$${C}_{4}=\left\{\overline{{\mathrm{x} }_{2}} \overline{{\mathrm{x} }_{3}} \overline{{\mathrm{x} }_{4}}\right\}, {C}_{5}=\left\{\overline{{\mathrm{x} }_{1}} \overline{{\mathrm{x} }_{3}} \overline{{\mathrm{x} }_{5}} \overline{{\mathrm{x} }_{6}}\right\},{C}_{6}= \left\{\overline{{\mathrm{x} }_{1}} \overline{{\mathrm{x} }_{2}}\right\}$$

All minimal cut sets of the complex system in Fig. 3 can be used to rearrange the system in a series–parallel topology with repeating subsystem components, as seen in Fig. 5.

Fig. 5
figure 5

All minimal cut sets of SCS

The reliability estimates of the resultant components are statistically reliant on one another, regardless of whether they are in the same or other cut sets or path sets since minimal paths and minimal cuts can sometimes split a single system component into two or more components. Most existent models consider these redundant components are statistically independent to find system reliability's lower and upper bounds.

4.3 The reliability of SCS

To assess the multivariate polynomial reliability of SCS, one can utilize all minimal path sets that extend from a starting node to a destination node. This can be done by applying the Path Tracing Method (Gertsbakh and Shpungin 2011; Kuo and Zuo 2003; Todinov 2013). By using Equation (19) in conjunction with all minimal path sets, the reliability function of SCS can be obtained in the following form:

$${R}_{Exact}=1-[\left(1-\mathrm{Pr}\left({P}_{1}\right)\right)\left(1-\mathrm{Pr}\left({P}_{2}\right)\right)\left(1-\mathrm{Pr}\left({P}_{3}\right)\right)\times \left(1-\mathrm{Pr}\left({P}_{4}\right)\right)\left(1-\mathrm{Pr}\left({P}_{5}\right)\right)\left(1-\mathrm{Pr}\left({P}_{6}\right)\right)\times \left(1-\mathrm{Pr}({P}_{7})\right)$$
(21)

Consequently, the reliability of the system can be computed as:

$${R}_{Exact}= {r}_{2}{r}_{6}+{r}_{1}{r}_{3}{r}_{6}- {r}_{1}{r}_{2} {r}_{3}{r}_{6}+ {r}_{1} {r}_{4}{r}_{5} {r}_{6}- {r}_{1}{r}_{2}{r}_{4}{r}_{5}{r}_{6}-{r}_{1}{r}_{3}{r}_{4}{r}_{5} {r}_{6}+{r}_{1} {r}_{2}{r}_{3}{r}_{4}{r}_{5} {r}_{6}+{r}_{1}{r}_{4}{r}_{7}+{r}_{2}{r}_{3}{r}_{4}{r}_{7}-{r}_{1}{r}_{2}{r}_{3}{r}_{4}{r}_{7}+{r}_{2}{r}_{5}{r}_{7}+{r}_{1}{r}_{3}{r}_{5}{r}_{7}-{r}_{1}{r}_{2}{r}_{3}{r}_{5}{r}_{7}-{r}_{1}{r}_{2}{r}_{4}{r}_{5}{r}_{7}-{r}_{1}{r}_{3}{r}_{4}{r}_{5}{r}_{7}-{r}_{2}{r}_{3}{r}_{4}{r}_{5}{r}_{7}+2{r}_{1}{r}_{2}{r}_{3}{r}_{4}{r}_{5}{r}_{7}-{r}_{1}{r}_{2}{r}_{4}{r}_{6}{r}_{7}-{r}_{1}{r}_{3}{r}_{4}{r}_{6}{r}_{7}-{r}_{2}{r}_{3}{r}_{4}{r}_{6}{r}_{7}+2{r}_{1}{r}_{2}{r}_{3}{r}_{4}{r}_{6}{r}_{7}-{r}_{2}{r}_{5}{r}_{6}{r}_{7}-{r}_{1}{r}_{3}{r}_{5}{r}_{6}{r}_{7}+{r}_{1}{r}_{2}{r}_{3}{r}_{5}{r}_{6}{r}_{7}-{r}_{1}{r}_{4}{r}_{5}{r}_{6}{r}_{7}+2{r}_{1}{r}_{2}{r}_{4}{r}_{5}{r}_{6}{r}_{7}+2{r}_{1}{r}_{3}{r}_{4}{r}_{5}{r}_{6}{r}_{7}+{r}_{2}{r}_{3}{r}_{4}{r}_{5}{r}_{6}{r}_{7}-3{r}_{1}{r}_{2}{r}_{3}{r}_{4}{r}_{5}{r}_{6}$$
(22)

The reliability of the SCS system with i.i.d. components (\({r}_{i}=r\)) can be calculated using Eq. (22) as follows:

$${R}_{Exact}={r}^{2}+3{r}^{3}+{r}^{4}-12{r}^{5}+11{r}^{6}-3{r}^{7}$$
(23)

4.4 Spross bound of SCS

In order to generate the disjoint sum form for the vector of minimal path sets in Equation (19) for the SCS system depicted in Fig. 3, one can utilize the Spross algorithm. The following steps should be taken:

  • If \({\varvec{i}}=1:\) \({P}_{1}={x}_{2}{x}_{6}\), then, \({A}_{\mathrm{0,1}}=\{{x}_{2}{x}_{6}\}\), As a result \({\alpha }_{1}={x}_{2}{x}_{6}\).

  • If \({\varvec{i}}=2:\) \({P}_{2}={x}_{2}{x}_{5}{x}_{7}\), then, \({A}_{\mathrm{0,2}}=\{{x}_{2}{x}_{5}{x}_{7}\}\). Since \({P}_{1}-{A}_{\mathrm{0,2}}=\{{x}_{6}\}\) as a result \({A}_{\mathrm{1,2}}=\{\overline{{x }_{6}}{P}_{2}\}\). Therefore \({\alpha }_{2}={x}_{2}{x}_{5}\overline{{x }_{6}}{x}_{7}\).

  • If \({\varvec{i}}=3:{P}_{3}={x}_{1}{x}_{3}{x}_{6}\), then, \({A}_{\mathrm{0,3}}=\left\{{x}_{1}{x}_{3}{x}_{6}\right\}.\) So \({P}_{1}-{A}_{\mathrm{0,3}}=\{{x}_{2}\}\) as a result\({A}_{\mathrm{1,3}}=\{\overline{{x }_{2}}{P}_{3}\}\). Therefore\({A}_{\mathrm{1,3}}={x}_{1}\overline{{x }_{2}}{x}_{3}{x}_{6}\), and \({P}_{2}-{A}_{\mathrm{1,3}}=\varnothing \). As a result,\({\alpha }_{3}={x}_{1}\overline{{x }_{2}}{x}_{3}{x}_{6}\).

  • If \({\varvec{i}}=4:{P}_{4}={x}_{1}{x}_{4}{x}_{7}\), then, \({A}_{\mathrm{0,4}}=\{{x}_{1}{x}_{4}{x}_{7}\}\) So \({P}_{1}-{A}_{\mathrm{0,4}}=\{{x}_{2}{x}_{6}\}\) by of above algorithm, we get \({A}_{\mathrm{1,4}}=\{{B}_{\mathrm{1,1}}={x}_{1}\overline{{x }_{2}}{x}_{4}{x}_{7}\), \({B}_{\mathrm{1,2}}={x}_{1}{x}_{2}{x}_{4}\overline{{x }_{6}}{x}_{7}\}\) then \({P}_{2}-{A}_{\mathrm{1,4}}\) lead \({P}_{2}-{B}_{\mathrm{1,1}}=\varnothing \) Then \({B}_{\mathrm{2,1}}={x}_{1}\overline{{x }_{2}}{x}_{4}{x}_{7}\) and \({P}_{2}-{B}_{\mathrm{1,2}}=\{{x}_{5}\}\) Hence \({B}_{\mathrm{2,2}}={x}_{1}{x}_{2}{x}_{4}\overline{{x }_{5}} \overline{{x }_{6}}{x}_{7}\). So\({A}_{\mathrm{2,4}}=\{{B}_{\mathrm{2,1}}={x}_{1}\overline{{x }_{2}}{x}_{4}{x}_{7},{B}_{\mathrm{2,2}}={x}_{1}{x}_{2}{x}_{4}\overline{{x }_{5}} \overline{{x }_{6}}{x}_{7}\}\). Also \({P}_{3}-{A}_{\mathrm{2,4}}\) lead\({P}_{3}-{B}_{\mathrm{2,1}}=\{{x}_{3}{x}_{6}\}\), as a result \({B}_{\mathrm{3,1}}={x}_{1}\overline{{x }_{2}} \overline{{x }_{3}}{x}_{4}{x}_{7}\) and \({B}_{\mathrm{3,2}}={x}_{1}\overline{{x }_{2}}{x}_{3}{x}_{4}\overline{{x }_{6}}{x}_{7}\) on other hand \({P}_{3}-{B}_{\mathrm{2,2}}=\varnothing \) so \({B}_{\mathrm{3,3}}={x}_{1}{x}_{2}{x}_{4}\overline{{x }_{5}} \overline{{x }_{6}}{x}_{7}\) then\({A}_{\mathrm{3,4}}=\{{B}_{\mathrm{3,1}}={x}_{1}\overline{{x }_{2}}\overline{{x }_{3}}{x}_{4}{x}_{7}\), \({B}_{\mathrm{3,2}}={x}_{1}\overline{{x }_{2}}{x}_{3}{x}_{4}\overline{{x }_{6}}{x}_{7},{B}_{\mathrm{3,3}}={x}_{1}{x}_{4}{x}_{7}{x}_{2}\overline{{x }_{6}}\overline{{x }_{5}}\}.\)

Hence

$${\alpha }_{4}={x}_{1}\overline{{x }_{2}} \overline{{x }_{3}}{x}_{4}{x}_{7}+{x}_{1}\overline{{x }_{2}}{x}_{3}{x}_{4}\overline{{x }_{6}}{x}_{7}+{x}_{1}{x}_{2}{x}_{4}\overline{{x }_{5}} \overline{{x }_{6}}{x}_{7}$$

Based on the system's structure, if \(i=5\), the lower bound of system reliability cannot be achieved due to the accuracy measure \(d\left(g, h\right)=\mu \left(g\right)-\gamma \left(h\right)\) such that \(d\left(g, h\right)\le \epsilon \). If not, \(g\) and \(h\) must be increased (see (Beichelt and Sproß, 1989)). From Eq. (11) the reliability lower bound of the SCS system is given as

$${R}_{LB}=\mu \left(4\right)=\sum_{i=1}^{4}Pr({\alpha }_{i})={r}_{2}{r}_{6}+{r}_{2}{r}_{5}{r}_{7}\left(1-{r}_{6}\right)+{r}_{1}{r}_{4}{r}_{7}\left(1-{r}_{2}\right)\left(1-{r}_{3}\right)+{r}_{1}{r}_{3}{r}_{6}\left(1-{r}_{2}\right)+{r}_{1}{r}_{3}{r}_{4}{r}_{7}\left(1-{r}_{2}\right)\left(1-{r}_{6}\right)+{r}_{1}{r}_{2}{r}_{4}{r}_{7}\left(1-{r}_{5}\right)\left(1-{r}_{6}\right)$$
(24)

For i. i. d. reliability of components, Equation (24) becomes as follows:

$${R}_{LB}={r}^{2}+3{r}^{3}-2{r}^{4}-3{r}^{5}+2{r}^{6}$$
(25)

In the same way, to obtain the disjoint sum form for the system in Fig. 3, use the Spross algorithm and the vector of all minimal cut sets in Eq. (20). Follow these steps:

  • If \({\varvec{i}}=1:\) \({C}_{1}=\overline{{x }_{6}} \overline{{x }_{7}}\), then, \({A}_{\mathrm{0,1}}=\{\overline{{x }_{6}} \overline{{x }_{7}}\}\), As a result \({\beta }_{1}=\overline{{x }_{6}} \overline{{x }_{7}}\).

  • If \({\varvec{i}}=2:\) \({C}_{2}=\overline{{x }_{4}} \overline{{x }_{5}} \overline{{x }_{6}}\), then, \({A}_{\mathrm{0,2}}=\{\overline{{x }_{4}} \overline{{x }_{5}} \overline{{x }_{6}}\}\). Since \({C}_{1}-{A}_{\mathrm{0,2}}=\{ \overline{{x }_{7}}\}\) as a result \({A}_{\mathrm{1,2}}=\{ {x}_{7}{C}_{2}\}\). Therefore \({\beta }_{2}=\overline{{x }_{4}} \overline{{x }_{5}} \overline{{x }_{6}} {x}_{7}\).

  • If \({\varvec{i}}=3:{C}_{3}=\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{5}} \overline{{x }_{7}}\), then, \({A}_{\mathrm{0,3}}=\left\{\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{5}} \overline{{x }_{7}}\right\},\) So \({C}_{1}-{A}_{\mathrm{0,3}}=\{\overline{{x }_{6}}\}\) as a result\({A}_{\mathrm{1,3}}=\{{x}_{6}{C}_{3}\}\). Therefore\({A}_{\mathrm{1,3}}=\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{5}} {x}_{6} \overline{{x }_{7}}\), and \({C}_{2}-{A}_{\mathrm{1,3}}=\varnothing \). As a result,\({\beta }_{3}=\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{5}} {x}_{6} \overline{{x }_{7}}\).

  • If\({\varvec{i}}=4:{C}_{4}=\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{4}}\), then, \({A}_{\mathrm{0,4}}=\left\{\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{4}}\right\}\) So \({C}_{1}-{A}_{\mathrm{0,4}}=\left\{\overline{{x }_{6}} \overline{{x }_{7}}\right\}\) by of above algorithm, we get\({A}_{\mathrm{1,4}}=\{{B}_{\mathrm{1,1}}=\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{4}} {x}_{6}\), \({B}_{\mathrm{1,2}}=\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{4}} \overline{{x }_{6}} {x}_{7}\}\) then \({C}_{2}-{A}_{\mathrm{1,4}}\) lead \({C}_{2}-{B}_{\mathrm{1,1}}=\varnothing \) Then \({B}_{\mathrm{2,1}}=\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{4}} {x}_{6}\) and \({C}_{2}-{B}_{\mathrm{1,2}}=\left\{\overline{{x }_{5}}\right\}\) Hence\({B}_{\mathrm{2,2}}=\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{4}} {x}_{5} \overline{{x }_{6}} {x}_{7}\). So.\({A}_{\mathrm{2,4}}=\left\{{B}_{\mathrm{2,1}}=\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{4}} {x}_{6},{B}_{\mathrm{2,2}}=\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{4}} {x}_{5} \overline{{x }_{6}} {x}_{7}\right\}\). Also \({C}_{3}-{A}_{\mathrm{2,4}}\) lead\({C}_{3}-{B}_{\mathrm{2,1}}=\left\{\overline{{x }_{5}} \overline{{x }_{7}}\right\}\), as a result \({B}_{\mathrm{3,1}}=\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{4}} {x}_{5} {x}_{6}\) and \({B}_{\mathrm{3,2}}=\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{4}} \overline{{x }_{5}} {x}_{6} {x}_{7}\) On other hand \({C}_{3}-{B}_{\mathrm{2,2}}=\varnothing \) so \({B}_{\mathrm{3,3}}=\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{4}} {x}_{5} \overline{{x }_{6}} {x}_{7}\) then \({A}_{\mathrm{3,4}}=\{{B}_{\mathrm{3,1}}=\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{4}} {x}_{5} {x}_{6}\) , \({B}_{\mathrm{3,2}}=\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{4}} \overline{{x }_{5}} {x}_{6} {x}_{7},{B}_{\mathrm{3,3}}=\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{4}} {x}_{5} \overline{{x }_{6}} {x}_{7}\}\)

Hence

$${\beta }_{4}=\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{4}} {x}_{5} {x}_{6}+\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{4}} \overline{{x }_{5}} {x}_{6} {x}_{7}+\overline{{x }_{2}} \overline{{x }_{3}} \overline{{x }_{4}} {x}_{5} \overline{{x }_{6}} {x}_{7}$$

The reliability upper bound of a system can be found using Eq. (12).

$${R}_{UB}=\gamma (1)=1-\sum_{j=1}^{1}Pr ({\beta }_{j})=1-(1-{r}_{6})(1-{r}_{7}) $$
(26)

When the reliability of components is i.i.d., Equation (26) grows as follows:

$${R}_{UB}=2r-{r}^{2}$$
(27)

The tabular representations of the numerical values of bounds can be seen further n Tables 1 and 2.

Table 1 Comparison of reliability lower bounds of various methods of SCS
Table 2 Comparison of reliability upper bounds of various methods of SCS

4.5 Esary-proschan bound of SCS

The minimal cut sets of Equation (20) are utilized to get the lower bound for the system shown in Fig. 3, Therefore, use Equation (13) to find

$${R}_{LB}=\prod_{i=1}^{6}\left(1-\prod_{t\in {C}_{i}}1-{r}_{t}\right)=\left(1-\left(1-{r}_{1}\right)\left(1-{r}_{2}\right)\right)\left(1-\left(1-{r}_{6}\right)\left(1-{r}_{7}\right)\right)\times \left(1-\left(1-{r}_{2}\right)\left(1-{r}_{3}\right)\left(1-{r}_{4}\right)\right)\times \left(1-\left(1-{r}_{4}\right)\left(1-{r}_{5}\right)\left(1-{r}_{6}\right)\right)\times \left(1-\left(1-{r}_{1}\right)\left(1-{r}_{3}\right)\left(1-{r}_{5}\right)\left(1-{r}_{6}\right)\right)\times (1-(1-{r}_{2})(1-{r}_{3})(1-{r}_{5})(1-{r}_{7}))$$
(28)

Therefore, assuming components have i.i.d. reliability, Equation (28) grows as follows:

$${R}_{LB}={(1-{(1-r)}^{2})}^{2}{(1-{(1-r)}^{3})}^{2}{(1-{(1-r)}^{4})}^{2}$$
(29)

To compute the reliability upper bound for the system, first take the minimal path sets of Eq. (19), and then by use Eq. (14) to obtain

$${R}_{UB}=1-\prod_{i=1}^{7}\left(1-\prod_{t\in {P}_{i}}{r}_{t}\right)=1-((1-{r}_{2}{r}_{6})(1-{r}_{2}{r}_{5}{r}_{7})(1-{r}_{1}{r}_{3}{r}_{6})\times \left(1-{r}_{1}{r}_{4}{r}_{7}\right)\left(1-{r}_{2}{r}_{3}{r}_{4}{r}_{7}\right)\times (1-{r}_{1}{r}_{4}{r}_{5}{r}_{6})(1-{r}_{1}{r}_{3}{r}_{5}{r}_{7}))$$
(30)

Consequently, if Equation (30) have i.i.d. component reliability, then get

$${R}_{UB}=1-(1-{r}^{2}){(1-{r}^{3})}^{3}{(1-{r}^{4})}^{3}$$
(31)

The data of the bounds are provided in Tables 1 and 2.

4.6 Edge-packing bound of SCS

In order to establish the reliability lower bound of the SCS system, as displayed in Fig. 3, the disjoint minimal path sets can be employed, identified in Eq. (19). It follows that the sets of disjoint minimal paths are \({DP}_{1}=\{{x}_{2}{x}_{6}\}\) and \({DP}_{2}=\{{x}_{1}{x}_{4}{x}_{7}\}\). Then use Eq. (15) to obtain

$${R}_{LB}=1-\prod_{i=1}^{2}\left(1-\prod_{t\in DP}{r}_{t}\right)=1-((1-{r}_{2}{r}_{6})(1-{r}_{1}{r}_{4}{r}_{7}))$$
(32)

Consequently, if equation (32) has i.i.d. component reliability, it must be as follows:

$${R}_{LB}={r}^{2}+{r}^{3}-{r}^{5}$$
(33)

Also, to determine the upper bound for the system, we must first identify the disjoint edge minimal cut sets of Eq. (20). Therefore, the disjoint edge minimal cut sets are \(D{C}_{1}=\left\{\overline{{\mathrm{x} }_{6}} \overline{{\mathrm{x} }_{7}}\right\}\) and \(D{C}_{2}=\left\{\overline{{\mathrm{x} }_{1}} \overline{{\mathrm{x} }_{2}}\right\}\), then use Eq. (14) to derive the upper bound.

$${R}_{UB}=\prod_{i=1}^{2}\left(1-\prod_{t\in DC}1-{r}_{t}\right)=(1-(1-{r}_{1})(1-{r}_{2}))(1-(1-{r}_{6})(1-{r}_{7}))$$
(34)

Therefore, if equation (34) has i.i.d. component reliability, then it can be expressed as follows:

$${R}_{UB}={(1-{(1-r)}^{2})}^{2}$$
(35)

Tables 1 and 2 list the exact values used for the bounds.

4.7 Linear and quadratic bound of SCS

In order to determine the lower bound for the system shown in Fig. 3, it is essential to insert the minimal cut sets derived from Equation (20) into Equation (17) as follows:

$${R}_{LB}=1-\sum_{i=1}^{6}{Pr(C}_{i})+\sum_{i=1}^{5}\sum_{j=i+1}^{6}{Pr(C}_{i} {C}_{j})=1-\mathrm{Pr}({C}_{1})-\mathrm{Pr}({C}_{2})+\mathrm{Pr}({C}_{1}{C}_{2})-\mathrm{Pr}({C}_{3})+\mathrm{Pr}({C}_{1}{C}_{3})+\mathrm{Pr}({C}_{2}{C}_{3})-\mathrm{Pr}({C}_{4})+\mathrm{Pr}({C}_{1}{C}_{4})+\mathrm{Pr}({C}_{2}{C}_{4})+\mathrm{Pr}({C}_{3}{C}_{4})-\mathrm{Pr}{C}_{5}+\mathrm{Pr}({C}_{1}{C}_{5})+\mathrm{Pr}({C}_{2}{C}_{5})+\mathrm{Pr}({C}_{3}{C}_{5})+\mathrm{Pr}({C}_{4}{C}_{5})-\mathrm{Pr}({C}_{6})+\mathrm{Pr}({C}_{1}{C}_{6})+\mathrm{Pr}({C}_{2}{C}_{6})+\mathrm{Pr}({C}_{3}{C}_{6})+\mathrm{Pr}({C}_{4}{C}_{6})+\mathrm{Pr}({C}_{5}{C}_{6})$$
(36)

Representing \({R}_{LB}\) can be achieved by simplifying Eq. (36) for \(Pr\left(\overline{{x }_{i}}\right)=1-{r}_{i}, \forall \overline{{x }_{i}}\in {C}_{i}\) and assuming that the component reliability is i.i.d. This representation follows:

$${R}_{LB}=1-2{\left(1-r\right)}^{2}-2{\left(1-r\right)}^{3}-{\left(1-r\right)}^{4}+4{\left(1-r\right)}^{5}+5{\left(1-r\right)}^{6}+4{\left(1-r\right)}^{7}+{(1-r)}^{8}$$
(37)

The upper bound for the system can be computed by taking the minimal path sets from Equation (19) and putting them into Equation (18).

$${R}_{UB}=1-\sum_{i=1}^{7}Pr({P}_{i})+\sum_{i=1}^{6}\sum_{j=i+1}^{7}{Pr(P}_{i}{P}_{j})=1-\mathrm{Pr}({P}_{1})-\mathrm{Pr}({P}_{2})+\mathrm{Pr}({P}_{1}{P}_{2})-\mathrm{Pr}({P}_{3})+\mathrm{Pr}({P}_{1}{P}_{3})+\mathrm{Pr}({P}_{2}{P}_{3})-\mathrm{Pr}({P}_{4})+\mathrm{Pr}({P}_{1}{P}_{4})+\mathrm{Pr}({P}_{2}{P}_{4})+\mathrm{Pr}({P}_{3}{P}_{4})-\mathrm{Pr}({P}_{5})+\mathrm{Pr}({P}_{1}{P}_{5})+\mathrm{Pr}({P}_{2}{P}_{5})+\mathrm{Pr}({P}_{3}{P}_{5})+\mathrm{Pr}({P}_{4}{P}_{5})-\mathrm{Pr}({P}_{6})+\mathrm{Pr}({P}_{1}{P}_{6})+\mathrm{Pr}({P}_{2}{P}_{6})+\mathrm{Pr}({P}_{3}{P}_{6})+\mathrm{Pr}({P}_{4}{P}_{6})+\mathrm{Pr}({P}_{5}{P}_{6})-\mathrm{Pr}({P}_{7})+\mathrm{Pr}({P}_{1}{P}_{7})+\mathrm{Pr}({P}_{2}{P}_{7})+\mathrm{Pr}({P}_{3}{P}_{7})+\mathrm{Pr}({P}_{4}{P}_{7})+\mathrm{Pr}({P}_{5}{P}_{7})+\mathrm{Pr}({P}_{6}{P}_{7})$$
(38)

Express \({R}_{UB}\) by simplifying Eq. (38) for \(Pr\left({x}_{i}\right)=1-{r}_{i} , \forall {x}_{i}\in {P}_{i}\) and assuming the component reliability is i.i.d. Then

$${R}_{UB}=1-{\left(1-r\right)}^{2}-3{\left(1-r\right)}^{3}-{\left(1-r\right)}^{4}+12{\left(1-r\right)}^{5}+6{(1-r)}^{6}+{(1-r)}^{7}$$
(39)

The exact values used for the bounds are shown in Tables 1 and 2.

5 Result and discussion

The computation reliability of a complex system in the binary case is an NP-hard problem; thus, effective analysis techniques and well-implemented solutions are crucial for practical use. Comparing the four models, Sb, EPb, EDb and LQb, can be challenging due to their differing network structures. Section 4 presents the results achieved for the SCS network. The analysis was conducted from two perspectives computational measures and result quality. Fig. 3 displays these effects. This analysis aims to explain and demonstrate when bound-based approaches are a better choice than analytical approximation formulas. On the theoretical and computational front, some of the applicable properties can be identified:

  • The Sb technique gives a helpful approach to estimating the upper and lower reliability constraints, as in Fig. 7. However, this estimation requires more computational effort as the number of system components increases.

  • The EPb method is advantageous as it offers highly accurate reliability function importance established on the selected components, as shown in Fig. 7. It is a simple mathematical process that relies on minimal cut sets and paths.

  • Based on the selected components, the EDb method offers the most minimal values for the reliability function, as depicted in Fig. 6. However, it cannot be used for systems that do not have disjoint sets.

  • The LQb method is efficient for estimating the lower bound reliability of a system. However, it may not be accurate for estimating the reliability upper bound of the system, as indicated in Fig. 6.

Fig. 6
figure 6

Comparing reliability lower bounds of various methods of SCS

In order to evaluate the significance of the suggested technique in estimating network reliability, small-scale test networks (as illustrated in Fig. 3) were utilized; in this network, all edges are considered undirected, and their reliability gradually increases from 0.7 to 0.95. To determine the network's reliability, we implemented the four approaches described in Sect. 2 to calculate the lower and upper bounds. To prove the effectiveness of the suggested approach, Table 12 and Fig. 67, four different methods were used to obtain lower and upper bounds, and a comparison of these bounds is presented, along with the Exact reliability. In Table 1, the proposed LQb approach consistently shows a lower bound than the Sb, EPb, and EDb methods for all network components. This approach provides a more accurate estimation of the exact reliability. However, it does not improve network performance.

Fig. 7
figure 7

Comparing reliability upper bounds of various methods of SCS

On the other hand, the EDb approach produces the lowest reliability function values based on selected components. Table 2 shows that the proposed EPb approach consistently yields a higher upper bound than the LQb, EPb, and EDb methods for all network components. This approach gives the best possible reliability function values based on selected components. The EDb approach provides a more accurate estimation of the exact reliability, but the network's performance needs to improve.

6 Conclusions

The exact methods for calculating system reliability in polynomial time are restricted to elementary systems, such as series and parallel-connected systems. This study examines the primary techniques for utilizing minimal paths and cuts to determine the reliability bounds of the system. These bounds are evaluated qualitatively and contrasted quantitatively by numerically analyzing example systems. The matrix-based method is offered to simplify the analysis of safety–critical systems with seven components. This approach helps to calculate the system's minimal path and minimal cuts (see Fig. 6 and Fig. 7). The lower and upper-reliability bounds discussed in this study assist the relationship of information on the reliability of systems that are more complex than those tractable with exact methods because it takes only polynomial time to calculate reliability bounds using the provided minimal paths and cuts. Tables 1 and 2 show the results of our numerical comparison of the bounds obtained using the extended SCS structure (Fig. 3). Also, select the optimal approach according to theoretical generalizations addressing the bounds, which hold across the range for component reliability (see Table 12).