Keywords

1 Introduction

From a country’s perspective, critical infrastructures may include such as banks, railways, and power supplies. Each of these infrastructures is so “large” and therefore can also be called as system of system since any one of them is a collection of task-oriented or dedicated sub-systems. All these sub-systems are organized in a manner that their resources and capabilities are pooled together to form a new and more complicated main system. Taking the electricity generation industry as an example, on one hand, the healthy condition of the national grid play a key part in keeping a country functioning properly; on the other hand, every involved power plant (more formally, sub-system) is composed of a large amount of equipments in which each individual machine acts an important role in helping the company to retain competitive in the market. As we can see, no matter how “big” or how “small” (relatively of course) a system is, maintaining its functional status is a maintenance engineer’s major task. Looking at the power plant case again, traditionally, there are a number of ways in which power plant assets (e.g., transformers, turbines, and pipelines) fail and eventually get replaced. “Fail and fix” is often a practiced strategy to cope with this situation. However, as the competition in the global market increases, the accumulated breakdowns occurred in one single power plant may finally generate a fatal impact on the whole power supply system’s performance. Under these circumstances, there is a need to consider all aspects of a sub-system performance, such as improving equipment reliability and availability, reducing unplanned outages, and predicting the remaining life of key system components. In this regard, a critical issue turns into selecting proper information processing and communicating tools to support the inspection and maintenance management. That means, for any an organization, maintenance interventions have to migrate from their traditional reactive approach, namely, “fail and fix”, to a more advanced proactive approach, i.e., “predict and prevent” [1].

One possible direction which may spawn new ways to manage maintenance activities is the adoption and the usage of pervasive digital communications, e.g., mobile devices, remote sensing, online condition monitoring, etc. Accordingly, a new maintenance strategy (i.e., maintainomics) can be envisaged in which maintenance tasks are managed electronically by analyzing various real-time data [2]. For instance, Ref. [3] presented an integrated approach towards e-maintenance of engineering assets that based on radio frequency identification (RFID) technology. In a similar vein, the authors of [4] focused on the research of intelligent maintenance decision-making tools (i.e., Watchdog AgentTM) which is used for multi-sensor assessment and prediction of a machine’s or process’s performance. Although maintainomics is desirable from many perspectives, all those digital bits that have been gathered are at the same time possible undesired and hazardous, just because more data (i.e., big data) does not necessarily mean better insights, in some cases, it even may result in confusion or disaster. Consequently, it is important to think strategically about how to adapt maintainomics to meet new maintenance demands. To address this issue, a graph-theoretic approach (GTA) is used to identify dominant factors that determining the feasibility of such transformation in the era of big data.

The remainder of this chapter is organized as follows. Subsequent to the introduction in Sect. 1, the background of maintenance, e-maintenance, big data, and maintainomics are briefed in Sect. 2. Then, the problem statement is presented in Sect. 3. The proposed methodologies are then detailed in Sect. 4. Next, Sects. 5 and 6 conduct an experimental study to demonstrate the feasibility of our proposed approaches. The future research directions are highlighted in Sect. 7. Finally, the conclusions drawn in Sect. 8 close this chapter.

2 Background

2.1 What is Maintenance?

Maintenance is normally seen as one of the few opportunities to reduce the cost of production, because it is the second highest operation costs in some industries [5]. Briefly, the heart of maintenance processes is condition monitoring that includes data acquisition, processing, analysis, interpretation, and extracting useful information from it. Traditionally, the maintenance actions are performed only when there is evidence of abnormal behaviors of a physical asset [6]. At the same time, researchers and/or scientists have relied upon monitoring programs just using invasive sampling at discrete periods, good experts, and/or handbooks. Limitations associated such programs (e.g., good experts are rare, sample acquisition takes long time, and uncertainty embedded for tedious sample analysis) result in high risk of equipment failures and therefore the company’s top-line revenue plummets. In addition, the previous condition monitoring focuses only on monitoring and diagnostics, ignore prediction and prognosis [7]. As a result, to perform predictive-prognostic maintenance, it is evident that a proactive as well as reactive e-maintenance support system is required.

2.2 What is e-Maintenance?

Nowadays, the dependence on remotely sensed information can be found in many crucial areas of human endeavor such as meteorology, security services, banking systems, supply chains, and scientific researches. In asset management area, several authors pointed out that information and communication technologies (ICT) can be adopted as a tool to support in terms of quality data acquisition, real-time monitoring, and recording of divergences from standard acquisition [3]. In the literature (e.g., [5, 813]), this concept is defined as e-maintenance or tele-maintenance. For instance, a new e-maintenance system has been studied in [14] which is based on the use of Internet and tether-free (i.e., wireless, Web, etc.) communication technologies. Later, Ref. [15] focused on the implementation of Web-based techniques to support e-maintenance services. In a similar vein, the authors of [16] proposed a framework by using RFID technology for real-time management of mobile assets. Also, worldwide case studies (e.g., automobile industry [17], power plant [18]) convinced that the implementation of ICT tools can improve products quality and reduce annual costs for maintenance.

In addition, as the maintenance itself is an extremely complex process and sometimes the inspections are difficult carried out by human operators even performed by dexterous technicians, the using of remotely controlled intelligent robots in an effort to accomplish the inspection or maintenance jobs faster and more reliable has increased greatly in the last few decades. For example, the authors of [19, 20] developed climbing robot for the structural inspection. An intelligent legged climbing robot is designed by [21] to perform the required inspection work in hazardous environments. Meanwhile, a large amount of pipeline inspection robots (i.e., in-pipe robots) have also been designed and fabricated. Generally speaking, the in-pipe robots can be classified into caterpillar [22], inchworm [23], walking [24], wheel [25], and pig types [26] depending on their travelling mechanisms. Interested readers please refer to [27, 28] for more detailed information regarding the intelligent robot assisted e-maintenance.

2.3 What is Big Data?

Recent advances in intelligence products, such as smart phones, and sensors and tracking devices, create tremendous amount of data (i.e., big data), which enable a researcher to extract the meaningful value much easier. According to a recent report compiled by McKinsey, the term “big data” refers to “datasets whose size is beyond the ability of typical database software tools to capture, store, manage, and analyses [29] ”. For example, in genomic research, there are approximately 3 billion base pairs with a personal genome representing approximately 100 gigabytes of data [30]. In e-business, the datasets include social networks, purchase transaction records, blogs, mobile telephony, and digital entertainment. Also, from the maintenance engineers’ point of view, the large historical records, the regular collected digital images, and the transactional information for operational reporting are also comprised of huge data. Other important aspect has been emphasized in addition to the volume is that big data may be unstructured, examples are text with social sentiments, audio and video, click streams, and website log files [31]. At the same time, big data is characterized by velocity, i.e., the rate of generation of data. For instance, to determine real-time roadway traffic conditions. As a result, the era of big data needs more interdisciplinary and multi-perspective research approaches that researchers have to create which were hard to implement before, such as new tools and solution approaches for data analytics [32], new paradigm for big data collection, storage, and processing [33], and privacy and security issues with big data [34].

2.4 What is Maintainomics?

As the maintenance environment more and more rely on the mobile devices and sensors, a serious question raises, namely, a huge amount of maintenance related data (big data in nature and is normally obtained by different kinds of automated sensors) are flooding in at rates never seen before. For instance, data from various control sensors for maintaining the different functions. Under these data overloaded circumstances, different sources of data are collected, although a pretty good news compared with the traditional data scarce maintenance scenario, it is still necessary to sort out the required and useful data. In fact, the data in this type of “wide-area” sensing applications are no longer just focus on the equipment itself but can involve the analysis at scale of environment, legislation, and even workers’ safety. In this study, the term “maintainomics” is utilized to denote the use of very large maintenance data content and the application of advanced core techniques (e.g., data mining, nature-inspired computational algorithms, Web and mobile technologies, new sensors, wireless communications, and different decision supporting systems) to improve the ways of organizations operating its maintenance management. For example, Ref. [35] proposed a conceptual model of a generic data acquisition system for improving maintenance management. Reference [36] broadly suggested that a common database can play an important role in reaching cost-effective improvements of maintenance performance, while Ref. [37] focused on the issue of maintenance-related data integration. Briefly, in the era of big data, maintainomics is an integration of traditional condition based maintenance, modern real-time online monitoring, and advanced intelligent technologies (see Fig. 1 for illustration). Notations ① ~ ⑥ represent different sources of data collected during the process of e-maintenance which form a more complex scenario, i.e., maintainomics.

Fig. 1
figure 1

Maintainomics: maintenance in the era of big data

3 Problem Statement

Confronting with the emerging e-maintenance and the forthcoming maintainomics operating environment, it is necessary for every organization’s strategic planners to make a decision about whether to perform such transformation for their own institution. Nevertheless, reaching a proper decision is often a complex process in practice, for instance, several authors (e.g., [38, 39]) believed in employing e-maintenance concept is not only based on the possibilities that new ICTs could offer but also need to integrate business performance such as operational, financial, human, and cultural factors. Consequently, a question raised by this study is how a company’s “fitness” can be measured in terms of implementing maintainomics strategy. In other words, we need to come up a solution about how to perform a feasibility assessment for a particular firm regarding its suitability of aligning its present asset management policy with the maintainomics goal.

4 Proposed Methodology

Nowadays, a number of approaches have been suggested in the literature for the purpose of feasibility analysis. Amongst them, the graph theoretic approach (GTA) is often widely used to cope with multi-criteria decision making problems in both academic research and in industrial practice [4043]. Inspired by the studies conducted by these scholars, the author of this work makes an attempt to apply a recently proposed GTA based methodology (known as feasibility index of transition, or FIT for short) to a selected industry in exploring its feasibility index during the course of transforming into maintainomics, i.e., data enriched e-maintenance. The following subsections give readers a brief overview regarding FIT and its main theoretical foundation, i.e., graph theory.

4.1 Background of Graph Theory

Graph theoretic approach (GTA) is a powerful decision making tool used to represent the relationships among different variables or subsystems based on the form of a digraph (directional graph) and matrix. Since 1736, GTA has been applied in a variety of fields, such as conceptual modelling [44], diagnosis [45], functional representation [46], and network analysis [47]. Basically, all graphs are composed exclusively of vertices (e.g., nodes, points) and edges (e.g., arcs, connections). To allow mathematical analysis, the interdependence on each other as well as their individual contribution to the system is assigned numerical values and an overall index is calculated. Interested readers are referred to [4850] for more information regarding GTA.

4.2 Background of Feasibility Index of Transition

The feasibility index of transition (abbreviated as FIT) was coined by [51] for describing a chosen company’s feasibility of moving forward to flexible manufacturing system (FMS). In order to analyze the trade-offs between various organizations for the adoption of FMS, certain enablers (or resources) should be chosen. In addition, the heritability of available enablers and the quantity of interactions among them may be directional independent or dependent. Built on this concept, a graph representation, illustrating the involved enablers and their potential interaction, was proposed in [51]. If interactions are found to be non-directional dependent, an undirected graph is thus used; on the opposite case, a digraph depiction is then employed.

For example, in their work [51], six groups of enablers (i.e., behavior enablers, non-behavioral enablers, financial enablers, methodologies, operational enablers, and human and cultural enablers) and their corresponding components were first identified and later used to examine the likelihood of transforming a traditional manufacturing environment into more advanced FMS. By simply calculating an index (i.e., FIT) value, one can easily find out to what degree a chosen target “fits” a company’s situation. Mathematically, this process can be expressed via Eq. (1) [51]:

$$ {\text{FIT for }} {\text{``FMS''}} \, = f\left({\text{Enablers}} \right) $$
(1)

where “FMS” stands for the goal that a manufacturing company wants to achieve.

A more general form of such equation can thus be further written as Eq. (2):

$$ {\text{FIT for }} {\text{``Targeted Scenario''}} = f\left({\text{Enablers}} \right) $$
(2)

where “Targeted Scenario” represents a generic situation that an organization plans to orient itself to.

To check an organization’s “fitness” in transformation, the graph theoretical based approach (utilized in [51]) is composed of four steps, namely, digraph visualization, matrix expression, permanent function establishing, and FIT value scale creating. The following subsections will provide a description of each step’s detailed task.

4.2.1 Visualizing Enablers’ Correlation via Digraph

In order to visualize the correlation between different enablers, a digraph (i.e., directed graph) is introduced at this stage as shown in Eq. (3) (adapted from [51]):

$$ \begin{aligned} G & = \left( {E,e} \right) \\ E & = \left\{ {E_{1} ,E_{2} , \ldots ,E_{P} } \right\} \\ e & = \left\{ {e_{1} ,e_{2} , \ldots ,e_{P} } \right\} \\ \end{aligned} $$
(3)

where G refers to a digraph which consists of two sets of items, namely, vertices (denoted by E), and edges (represented by e). In general, each edge (i.e., e ij ) can be identified via an ordered pair of vertices, (i.e., (E i , E j ). The vertices (E i and E j ) associated with the corresponding edge (e ij ) are thus called the end vertices or the nodes of e ij . Please note, a self-loop occurs when a particular edge has the self-same vertex acting as its both nodes.

In [51], a node (E i ) stands for the ith enabler and the interdependence between enablers is pictured by different connecting directed edges. The number of nodes [i.e., the subscript P in Eq. (3)] is equal to the total number of enabler categories. In other words, P is a scenario-dependent parameter which was set to 6 (matching the total enabler categories’ amount) in [51]. Accordingly, if a node E i impresses a certain degree of influence against another node E j , a directed line (represented by an arrow →) is drawn (from node E i to E j ) to form edge e ij . An illustration of this visualization process can be found below where an FMS enabler digraph (consisting of six enabler categories) is depicted [51].

As shown in Fig. 2, directional edges are found existing between E 1 and E 2, E 3, E 4, E 5, and E 6, respectively, which means that all other five enabler categories are swayed by node E 1 (i.e., behavioral enabler category) to some extent. For other edges, the same rule applies as well.

Fig. 2
figure 2

FMS enabler categories’ digraph

As one can see, this quickly drawn digraph can assist the decision makers in visualizing and analyzing the proposed transformation plan from a holistic perspective. Nevertheless, with the ever increasing number of nodes and their associated interrelationship degree, the digraph becomes more and more complex which will in turn decrease its readability. To cope with issue, a matrix form expression is further discussed as below.

4.2.2 Interpreting Enablers’ Digraph Through Matrix

A matrix is a handy and powerful way of representing a digraph that is more processable by a computer. Suppose there is a digraph with P enablers, a matrix \( {\mathbf{F}} = \left[ {e_{ij} } \right] \) is thus can be used to represent such digraph as expressed in Eq. (4) [51]:

$$ {\mathbf{F}} = \begin{array}{*{20}c} {\begin{array}{*{20}c} {\text{Enabler}} \\ {\text{Categories}} \\ \end{array} } & {\begin{array}{*{20}c} {E_{1} } & {E_{2} } & {E_{3} } & \cdots & \cdots & {E_{P} } \\ \end{array} } \\ {\begin{array}{*{20}c} {E_{1} } \\ {E_{2} } \\ {E_{3} } \\ \vdots \\ \vdots \\ {E_{P} } \\ \end{array} } & {\left( {\begin{array}{*{20}c} {E_{1} } & {e_{12} } & {e_{13} } & \cdots & \cdots & {e_{1P} } \\ {e_{21} } & {E_{2} } & {e_{23} } & \cdots & \cdots & {e_{2P} } \\ {e_{31} } & {e_{32} } & {E_{3} } & \cdots & \cdots & {e_{3P} } \\ \vdots & \vdots & \vdots & \ddots & \cdots & \vdots \\ \vdots & \vdots & \vdots & \vdots & \ddots & \vdots \\ {e_{P1} } & {e_{P2} } & {e_{P3} } & \cdots & \cdots & {E_{P} } \\ \end{array} } \right)} \\ \end{array} $$
(4)

where e ij indicates the interaction between the ith and jth enablers. Built on these principles, an demonstrating matrix expression derived from [51] is shown in Eq. (5):

$$ {\mathbf{F}}^{*} = \begin{array}{*{20}c} {\begin{array}{*{20}c} {\text{Enabler}} \\ {\text{Categories}} \\ \end{array} } & {\begin{array}{*{20}c} {E_{1} } & {E_{2} } & {E_{3} } & {E_{4} } & {E_{5} } & {E_{6} } \\ \end{array} } \\ {\begin{array}{*{20}c} {E_{1} } \\ {E_{2} } \\ {E_{3} } \\ {E_{4} } \\ {E_{5} } \\ {E_{6} } \\ \end{array} } & {\left( {\begin{array}{*{20}c} {E_{1} } & {e_{12} } & {e_{13} } & {e_{14} } & {e_{15} } & {e_{16} } \\ 0 & {E_{2} } & 0 & {e_{24} } & {e_{25} } & 0 \\ {e_{31} } & {e_{32} } & {E_{3} } & {e_{34} } & {e_{35} } & {e_{36} } \\ 0 & 0 & {e_{43} } & {E_{4} } & {e_{45} } & 0 \\ 0 & 0 & 0 & {e_{54} } & {E_{5} } & 0 \\ {e_{61} } & 0 & 0 & {e_{64} } & {e_{65} } & {E_{6} } \\ \end{array} } \right)} \\ \end{array} $$
(5)

where the contributions of six enabler categories in transforming the traditional manufacturing system into FMS are represented via the diagonal elements of the matrix \( {\mathbf{F}}^{*} \), i.e., E 1, E 2, E 3, E 4, E 5, and E 6, respectively. The interdependence of enablers E i and E j is denoted by the connecting edge \( e_{ij} \). Please note that \( e_{ij} \ne e_{ji} \) since the enablers are directed, and \( e_{ii} = 0 \) because there is no self-loop existing (in other words, the interaction between an enabler and itself does not exist).

Although the understandability of a matrix expression is better than digraph’s from the machine perspective, both representations’ uniqueness is inherent low which means they suffer high alterability by simply modifying the labels of their nodes. Under these circumstances, a subsequent fix solution is to establish a permanent function as discussed in subsection below.

4.2.3 Establishing the Matrix’s Permanent Function Expression

For the purpose of developing a unique representation that is independent of labeling, a permanent function based on previously established variable matrix was proposed by the author of [51] at this stage. As mentioned in [51], the permanent function (i.e., \( f_{{_{permanent} }}^{{{\mathbf{F}}^{*} }} \)) is a standard matrix function and plays a starring role in combinatorial mathematics.

Based on this concept, the permanent function of matrix \( {\mathbf{F}}^{*} \) can be written as follows (adapted from [51]):

$$ \begin{array}{*{20}l} {f_{{_{permanent} }}^{{{\mathbf{F}}^{*} }} = item_{1} + item_{2} + item_{3} + item_{4} + item_{5} + item_{6} + item_{7} } \hfill \\ \hline {{\text{where}}\left\{ {\begin{array}{*{20}l} {item_{1} = \prod\limits_{i = 1}^{6} {E_{i} } } \hfill \\ {item_{2} = \prod\limits_{i = 1}^{6} {e_{ii} } } \hfill \\ {item_{3} = \sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{ji} } \right)E_{k} E_{l} E_{m} E_{n} } } \hfill \\ {item_{4} = \sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{jk} e_{ki} + e_{ik} e_{kj} e_{ji} } \right)E_{l} E_{m} E_{n} } } \hfill \\ {\begin{array}{*{20}l} {item_{5} = } \hfill & {\sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{ji} } \right)\left( {e_{kl} e_{lk} } \right)E_{m} E_{n} } + } \hfill \\ {} \hfill & {\sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{jk} e_{kl} e_{li} + e_{il} e_{lk} e_{kj} e_{ji} } \right)E_{m} E_{n} } } \hfill \\ \end{array} } \hfill \\ {\begin{array}{*{20}l} {item_{6} = } \hfill & {\sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{ji} } \right)\left( {e_{kl} e_{lm} e_{mk} + e_{km} e_{ml} e_{lk} } \right)E_{n} } + } \hfill \\ {} \hfill & {\sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{jk} e_{kl} e_{lm} e_{mi} + e_{im} e_{ml} e_{lk} e_{kj} e_{ji} } \right)E_{n} } } \hfill \\ \end{array} } \hfill \\ {\begin{array}{*{20}l} {item_{7} = } \hfill & {\sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{ji} } \right)\left( {e_{kl} e_{lm} e_{mn} e_{nk} + e_{kn} e_{nm} e_{ml} e_{lk} } \right)} + } \hfill \\ {} \hfill & {\sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{jk} e_{ki} } \right)\left( {e_{lm} e_{mn} e_{nl} } \right)} + } \hfill \\ {} \hfill & {\sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{ji} } \right)\left( {e_{kl} e_{lk} } \right)\left( {e_{mn} e_{nm} } \right)} + } \hfill \\ {} \hfill & {\sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{jk} e_{kl} e_{lm} e_{mn} e_{ni} + e_{in} e_{nm} e_{ml} e_{lk} e_{kj} e_{ji} } \right)} } \hfill \\ \end{array} } \hfill \\ \end{array} } \right.} \hfill \\ \end{array} . $$
(6)

The detailed explanation regarding the main characteristics of these seven terms can be found below:

\( item_{1} = \prod\limits_{i = 1}^{6} {E_{i} } \) :

This item denotes the interactions of six main enabler categories, namely, from \( E_{1} \) to \( E_{6} \)

\( item_{2} = \prod\limits_{i = 1}^{6} {e_{ii} } \) :

According to the original constraint setting (i.e., no self-loop found in the enablers digraph), the resultant of this item is null

\( item_{3} = \sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{ji} } \right)E_{k} E_{l} E_{m} E_{n} } \) :

Each component involved in this item stands for dual-element interdependency loop (denoted by \( e_{ij} e_{ji} \)) and the measure of the remaining four (in the context of FMS case) unconnected elements

\( item_{4} = \sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{jk} e_{ki} + e_{ik} e_{kj} e_{ji} } \right)E_{l} E_{m} E_{n} } \) :

In this term, a set of three-element interdependency loops (indicated by \( e_{ij} e_{jk} e_{ki} \) and \( e_{ik} e_{kj} e_{ji} \)) and the measure of the remaining three (still in the context of FMS case) are represented by the components of the fourth item

\( item_{5} \) :

This item is composed of two sub-items, i.e., \( \sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{ji} } \right)\left( {e_{kl} e_{lk} } \right)} \) \( E_{m} E_{n} \) and \( \sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{jk} e_{kl} e_{li} + e_{il} e_{lk} e_{kj} e_{ji} } \right)E_{m} E_{n} } \). Two dual-element (represented by \( e_{ij} e_{ji} \) and \( e_{kl} e_{lk} \)) interdependency loops and two FMS enabler categories (denoted by \( E_{m} E_{n} \)) are involved in the first sub-item; while the second sub-item consists of two four-element interdependency loops (i.e., \( e_{ij} e_{jk} e_{kl} e_{li} \) and \( e_{il} e_{lk} e_{kj} e_{ji} \)) and two FMS enablers (i.e., \( E_{m} E_{n} \))

\( item_{6} \) :

There are also two sub-items contained in this item. The first sub-item (i.e.,\( \sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{ji} } \right)\left( {e_{kl} e_{lm} e_{mk} + e_{km} e_{ml} e_{lk} } \right)E_{n} } \)) is a product of three terms, namely, one dual-element interdependency loop (i.e., \( e_{ij} e_{ji} \)), two three-element interdependency loop (i.e., \( e_{kl} e_{lm} e_{mk} \) and \( e_{km} e_{ml} e_{lk} \)), and one FMS enabler category (i.e., \( E_{n} \)). Following the alike fashion found in \( item_{5} \), two terms (i.e., two five-element interdependency loops and one FMS enabler category) are multiplied to form \( \sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{jk} e_{kl} e_{lm} e_{mi} + e_{im} e_{ml} e_{lk} e_{kj} e_{ji} } \right)E_{n} } \)

\( item_{7} \) :

Four sub-items are organized to configure the seventh item. A product of one dual-element interdependency loop (i.e., \( e_{ij} e_{ji} \)) and two four-element interdependency loop (i.e., \( e_{kl} e_{lm} e_{mn} e_{nk} \) and \( e_{kn} e_{nm} e_{ml} e_{lk} \)) can be found in the first sub-item, i.e., \( \sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{ji} } \right)\left( {e_{kl} e_{lm} e_{mn} e_{nk} + e_{kn} e_{nm} e_{ml} e_{lk} } \right)} \). Then two three-element interdependency loops are multiplied to form the second sub-item, i.e., \( \sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{jk} e_{ki} } \right)\left( {e_{lm} e_{mn} e_{nl} } \right)} \). Next, a multiplication of three two-element interdependency loops is performed to obtain the third sub-item, i.e., \( \sum\limits_{i,j,k,l,m,n} {\left( {e_{ij} e_{ji} } \right)\left( {e_{kl} e_{lk} } \right)\left( {e_{mn} e_{nm} } \right)} \). Finally, two six-element interdependency loops (i.e., \( e_{ij} e_{jk} e_{kl} e_{lm} e_{mn} e_{ni} \) and \( e_{in} e_{nm} e_{ml} e_{lk} e_{kj} e_{ji} \)) are included in the fourth sub-item of the seventh item

Once all 7 types of items have been successfully defined, one can simply substitute the element values of the earlier built FMS enablers’ matrix (i.e., \( {\mathbf{F}}^{*} \) in Sect. 4.2.2) for the just established permanent function, i.e., \( f_{{_{permanent} }}^{{{\mathbf{F}}^{*} }} \). After performing some basic algebraic and arithmetic operations, the final form of permanent function will turn into Eq. (7) as shown below (adapted from [51]):

$$ \begin{aligned} f_{{_{permanent} }}^{{F^{*} }} & = E_{1} E_{2} E_{3} E_{4} E_{5} E_{6} \\ & + \left[ {\left( {e_{13} e_{31} } \right)E_{2} E_{4} E_{5} E_{6} + \left( {e_{45} e_{54} } \right)E_{1} E_{2} E_{3} E_{6} + \left( {e_{16} e_{61} } \right)E_{2} E_{3} E_{4} E_{5} + \left( {e_{34} e_{43} } \right)E_{1} E_{2} E_{5} E_{6} } \right] \\ & + \left[ {\left( {e_{13} e_{36} e_{61} } \right)E_{2} E_{4} E_{5} + \left( {e_{35} e_{54} e_{43} } \right)E_{1} E_{2} E_{6} + \left( {e_{24} e_{43} e_{32} } \right)E_{1} E_{5} E_{6} + \left( {e_{36} e_{64} e_{43} } \right)E_{1} E_{2} E_{5} + \left( {e_{31} e_{14} e_{43} } \right)E_{2} E_{5} E_{6} } \right] \\ & + \left[ {\left( {e_{13} e_{31} } \right)\left( {e_{45} e_{54} } \right)E_{2} E_{6} + \left( {e_{45} e_{54} } \right)\left( {e_{16} e_{61} } \right)E_{2} E_{3} + \left( {e_{25} e_{54} e_{43} e_{32} } \right)E_{1} E_{6} + \left( {e_{36} e_{65} e_{54} e_{43} } \right)E_{1} E_{2} + \left( {e_{31} e_{15} e_{54} e_{43} } \right)E_{2} E_{6} } \right] \\ & + \left[ {\left( {e_{31} e_{16} e_{65} e_{54} e_{43} } \right)E_{2} + \left( {e_{61} e_{16} } \right)\left( {e_{24} e_{43} e_{32} } \right)E_{5} } \right] \\ & + \left[ {\left( {e_{61} e_{16} } \right)\left( {e_{25} e_{54} e_{43} e_{32} } \right)} \right] \\ \end{aligned} $$
(7)

4.2.4 Creating FIT Value Scale

In general, FIT can be regarded as an indicator of the smoothness degree when an organization transforming itself from one state (normally in near out-of-date condition) to another state (preferably in an up-to-date situation). Mathematically, FIT can be described through Eq. (8) (adapted from [51]):

$$ {\text{FIT}} = f_{{_{permanent} }}^{{{\mathbf{F}}^{*} }} = {\text{Permanent}}\;{\text{function}}\;{\text{of}}\;{\text{enablers'}}\;{\text{matrix}} $$
(8)

By computing the value of FIT, the feasibility of initiating the targeted transformation for any given company can thus be quantified. Since no negative term is included in Eq. (6) (see Sect. 4.2.3), we can conclude that the larger input numerical values of \( E_{i} \) and \( e_{ij} \) will always lead to an overall higher output value of FIT. In order to calculate the expected FIT value, the acquisition of the values of \( E_{i} \) and \( e_{ij} \) via the following ways is a must.

\( E_{i} \)’s value:

Each enabler category’s value is decided through treating each \( E_{i} \) as a subsystem and applying the GTA method to it accordingly. \( E_{i} \)’s value is normally determined through analyzing the available system data and relative personnel opinions in an case study organization. In the case of where obtaining a quantitative value is not practicable, a ranked value judgment based on a scale of 1–10 is employed as a trade-off. Nevertheless, no matter which case comes in, the finally value of \( E_{i} \) is largely influenced by the acquirability of each individual building block’s (i.e., \( e_{ij} \)) value

\( e_{ij} \)’s value:

Under each enabler category, there are various influencing constitutes (i.e., \( e_{ij} \)). As suggested by the author of [51], a scale of 1–5 can be assigned to each \( e_{ij} \) individually for overcoming the directly immeasurable issue

To summarize, the FIT value can be gained as follows: First, identifying various influencing constitutes under each enabler category. Then, visualizing the number of constitutes and their corresponding correlation via a digraph. Once the digraph is drawn up, the next step is to interpret it with the help of matrix expression. Finally, after all preparations are done, the permanent function is obtainable and the FIT value can therefore be calculated.

4.2.5 Comparison

By identifying suitable enablers, we can see that FIT is a very helpful measurement in assisting us with the feasibility assessment of different organizations in terms of transforming themselves to a new business operating scenario. As shown in Eq. (\( {\text{FIT}} = f_{{_{permanent} }}^{{{\mathbf{F}}^{*} }} = {\text{Permanent}}\;{\text{function}}\;{\text{of}}\;{\text{enablers'}}\;{\text{matrix}} \)), the value of permanent function (with respect to the enablers’ matrix) determines the final FIT value. In other words, for any selected firms (say two for comparison purpose), their similarity degree is high (from the “suitability to transformation” viewpoint) if their digraphs are selfsame; similarly, their digraphs will be identical if the corresponding enablers’ matrices are alike. Therefore, in order to perform the applicable conversion feasibility analysis, the establishment of the corresponding permanent function is a key. Built on these deductions, the identification set for an firm can be express via Eq. (9) [51]:

$$ /Z_{1} /Z_{2} /Z_{3} /Z_{4} /Z_{51} + Z_{52} /Z_{61} + Z_{62} / $$
(9)

As we have learned that each obtained permanent function is composed of a set of items (seven of them for FMS case), and each individual item also consists of a couple of sub-items, the identification set shown in Eq. (9) for FMS case is understandable in which the value of the ith item is denoted by \( Z_{i} \), and \( Z_{ij} \) stands for the value of the jth sub-item embraced in the ith item. By substituting the values of \( E_{i} \) and \( e_{ij} \) for the corresponding item and sub-item found in the permanent function, the values of \( Z_{i} \) and \( Z_{ij} \) can be acquired. In the case of sub-item does not exist, then let \( Z_{ij} \) equal to \( Z_{i} \), i.e., \( Z_{ij} = Z_{i} \).

In practice, for any two organizations, it is fair to say that the main enabler categories and the various involved empowering elements under each category for transforming into the desired target is rare same. Accordingly, the comparison of two companies can be conducted by assessing the relevant similarity or dissimilarity coefficient. Such coefficient is normally based on the numerical values of the items/sub-items found in an permanent function. The range of similarity/dissimilarity coefficient falls within [0, 1], i.e., the value of similarity coefficient factor is set as 1 while 0 is assigned to dissimilarity coefficient factor if two firms share a high degree of similarity (or low degree of dissimilarity) during the course of the targeted transformation; in a similar vein, the similarity and dissimilarity coefficient factor is set as 0 and 1, respectively, in the case of two firms show a high degree of dissimilarity (or low degree of similarity) within the planned conversion phase. As such, the dissimilarity coefficient for any two comparable firms was proposed in the form of Eq. (10) [51]:

$$ \begin{gathered} Coefficient_{dissimilarity} = \left( \frac{1}{U} \right)\sum\limits_{i,j} {\lambda_{ij} } \hfill \\ U = {\text{maximum of }}\left[ {\sum\limits_{i,j} {\left| {Z_{ij} } \right|} {\text{ and }}\sum\limits_{i,j} {\left| {Z^{\prime}_{ij} } \right|} } \right]. \hfill \\ \end{gathered} $$
(10)

where \( Z_{ij} \) and \( Z^{\prime}_{ij} \) represents the values of the terms involved in the chosen two comparable organizations, and the value of \( \lambda_{ij} \) is defined as \( \lambda_{ij} = \left| {Z_{ij} - Z^{\prime}_{ij} } \right| \). As shown in Eq. (10), only the absolute difference between the values of terms is considered. Meanwhile, the similarity coefficient can also be computed via Eq. (11) [51]:

$$ Coefficient_{similarity} = 1 - Coefficient_{dissimilarity} $$
(11)

By introducing Eqs. (10) and (11), the main advantage of feasibility assessment can thus be quantified. Through the comparison of the relevant values (e.g., \( Z_{ij} \), \( Z^{\prime}_{ij} \), \( Coefficient_{dissimilarity} \), and \( Coefficient_{similarity} \)), the strengths and weaknesses of a particular participated organized can thus be identified and the possibility of corresponding improvement can also be evaluated.

4.2.6 Summary

Through Sects. 4.2.1 to 4.2.5, a GTA based approach for evaluating an organization’s “fitness” degree towards a desired transformation are particularized. To summarize, the major stages embraced in this methodology are outlined as follows:

  • Pinpoint the suitable enabler categories.

  • Visualize the enabler categories’ digraph.

  • Allocate the necessary empowering elements under each category.

  • Build up an empowering elements’ digraph with respect to each enabler category.

  • Establish the variable permanent matrix.

  • Compute the permanent function at each sub-system level.

  • Develop the scenario dependent matrix for enabler categories’ digraph.

  • Figure the permanent function of the previous stage obtained matrix.

  • Sort the different companies in ascending/descending order. The company with the highest FIT value enjoys the best opportunity of fulfilling the examined transformation.

  • Acquire the identification set for each considered organization via Eq. (9).

  • Compare the relevant similarity/dissimilarity coefficient between two organizations based on Eqs. (10) and (11).

  • Diarize the obtained results for future or further analysis.

5 Experimental Study Stage-1: Classifying Enabler Category and Identifying Empowering Element

Once the theoretical foundation of the present study has been finely established, an instant work would be verifying whether the proposed FIT measurement can be successfully applied to our focal question. In order to achieve this goal, a set of enabler categories and their involving empowering elements are first identified via a thorough literature review and an intensive communications with our industrial partner. Following a similar manner discovered in [51], a further grouping operation is performed on the classified enabler categories and the identified empowering elements (see Table 1) so that their permanent function value is more computable.

Table 1 Power plant maintainomics enabler categories and the involving empowering elements

5.1 Behavioral Enabler Category (E 1 )

This enabler class relates to the top management who is responsible for the implementation of maintainomics in an organization. In general term, this is often referred to as the strategic planning process which embraces the establishment of a company’s main goals and objectives, and the allocation of required resources to achieve them [111]. In practice, top management often takes charge of such process, although resources, products, consumers, and competitors are among various factors that are inspected during the process of strategic planning.

According to [112], there is a growing imperative for companies to be able to mine and process big data in order to improve competitiveness. As a result, these enablers are the first step to identify and remove adoption barriers. For example, McKinsey Institute pointed out in a report [53] that if top managers can rethink the role of information in business and invest in better systems (or personnel) to dissect and interpret big data, they ought to gain customer insights, effect more accurate budgeting and better performance management. In a similar vein, [52] suggested that success in the data-driven economy (e.g., e-maintenance) need to access and analyze endless insights on their business. Trouble is, there is huge gaps exist between what organizations want to have and what they are able to do. As advocated in [55] that one of important things is to make sure you have clear vision on the definition being used by your organization, because big data is not just a single set of data, it is able to connect different sets of data together and therefore to create even more sets of information. In addition, several authors (e.g., [58, 59]) concluded that to educate themselves (e.g., plant executives, maintenance managers, and work planners) on how to manipulate and analyze data can help the organizations to make effective decisions. Also, to change attitudes toward the practicality of working with large data stores [57] and to comprehend communication revolution [56] (e.g., a surge in machine-to-machine communications, increased interaction via mobile devices, and massive using of tracking systems) are important, because most companies’ internal IT functions aren’t up to the job.

5.2 Non-behavioral Enabler Category (E 2 )

This enabler group refers to those theoretical foundations that are necessary for supporting e-maintenance deployment and data analysis. Main characteristic of maintainomics is that maintenance information and access to related services can become ubiquitous and transparently available across the maintenance operations chain. For this purpose, researchers increasingly deal with a variety of research fields ranging from operation & maintenance engineering, to software engineering, information and communication systems, and business management [2]. For example, several comprehensive architectural frameworks for e-maintenance have been proposed, such as [14, 37, 65]. In addition, from a technological point of view, maintainomics is made-up from one or several networks with servers (e.g., Intra-Net), wireless technologies (e.g., ZigBee), databases (e.g., open systems architecture for condition based maintenance (OSA-CBM)), semantic data modelling (e.g., MapReduce programming model), smart sensors [e.g., micro electro mechanical systems (MEMS)], personnel mobility supporting (e.g., tablets), and many more. Also, within maintainomics, asset self-identification [e.g., radio frequency identification (RFID)] is a key factor [60]. Furthermore, suppliers are the key non-behavioral enabler as well, because they can develop, evolve, and maintain products and services [2].

5.3 Financial Enabler Category (E 3 )

This enabler set deals with the economic aspects of maintainomics. Collecting maintenance data, analyzing, using and integrating them within different organizations, requires financial supporting. Indeed, the era of big data reshapes the innovation processes from companies to private sectors, government and international cooperation. For example, the PROTEUS project is a collaborative initiative for implementation of web-based e-maintenance centers in Europe [71]. The Dynamite project which is founded by EU as well focused on a set of methodologies and tools to support the e-maintenance processes, such as smart tags, common database schemas, and financial cost-efficiency assessment [60]. In 2012, the White house launched a $200 million initiative and pointed out that the big data research can help government eases their tasks somehow and thus reducing the problems faced [70]. In order to view the different information types on the same computer terminal, the machinery information management open system alliance (MIMOSA) worked closely with the international standards organization (ISO) for machine condition assessment [60]. Also, several private sectors (e.g., healthcare, manufacturing, and consumer products) worked towards big data research [59, 69]. On the other hand, data itself offers opportunities for the companies. According to [13], an increasing number of companies recognize that e-maintenance can be seen as a business opportunity rather than a cost center.

5.4 Methodological Enabler Category (E 4 )

This enabler classification concerns about the physical requirements for the efficient collection of maintenance related data, and the use of various approaches for the efficient data analysis. Different kinds of smart data acquisition devices are commercial available in the market. By investing heavily, most of them are purchasable. Nevertheless, to reach the full potential of maintainomics, a careful selection of suitable equipments and the proper use of data analyzing techniques are two things that we need to think twice before taking action. Looking at computational intelligence (CI), a powerful tool for data mining, as a branch of artificial intelligence, the development of CI enjoys a tremendous prosperity during the past two decades [92]. By mimicking some nature sourced principles, CI algorithms can offer us the capability of digging out the hidden patterns and/or correlations from a biggish data set. The potential of big data cannot be interpreted in a meaningful way without the help of novel computational data mining algorithms.

5.5 Operational Enabler Category (E 5 )

This enabler category is related to the question of how to deal with the challenges of very large datasets in order to improve asset reliability and reduce maintenance outages? Several authors (e.g., [9, 13, 60, 113]) pointed out that colleting, storing, and retrieving all maintenance data (e.g., vibration analysis, non-destructive testing results, and digital images) is critical to resolving an unplanned equipment failure. As a result, more companies are rethinking their planning, operations and IT functions to improve their maintenance processes through large data sets. This requires more efficient scheduling optimization techniques, autonomous and/or remote online monitoring systems (e.g., [87]), new open-source technologies (e.g., non-relational databases, distributed processing framework, and parallel programming model), mature wireless sensor tools (e.g., RFID), and proper decision making regarding the machine condition to work together. For example, different optimization methods (e.g., ant colony optimization [82], artificial bee colony [114], dynamic programming, [115] genetic algorithm [116], simulated annealing [117], and hybrid approaches [118]) have been proposed in the literature to solve maintenance scheduling problem of power systems. Ref. [102] pointed out that smart wireless technology can help operators to identify failed steam traps and leaks as early as possible. In addition, thanks to the new open-source technologies (such as Hadoop), the operators’ ability to process large datasets has been significantly improved.

5.6 Human and Cultural Enabler Category (\( E_{6} \))

The last category focuses on the “soft” factors that affect the adoption of maintainomics. Nowadays, scholars convinced that companies who gain deeper insights into the data can gain superior value in a competitive marketplace. In addition, they agreed that the technology issues are not the biggest barrier [59]. Instead, the majority initiatives have failed to deliver expected results due to those initiatives have ignored the human and cultural side of organizations. For example, recent economist intelligence unit report pointed out that people and skills challenges, process and organizational structure considerations, and cultural changes are the key factors associated with successfully implementing big data initiatives [59]. In a similar vein, report [108] emphasized that democratization of data-driven decision-making, making cross-functional teams big data strategy architects, and leveraging key data and departments are largely aspirational. Another sub-enabler affecting the rapidly of adoption of maintainomics in organization is maintenance culture, with the idea that creation of new maintenance practices. For example, ref. [109] reviewed the maintenance culture in Nigeria and highlighted that poor maintenance culture (e.g., unplanned maintenance services, poor user habits, and lack of awareness) affects the productivity of Nigeria power generation stations. Finally, the different culture between developers, traditional business analysts, and systems administrators is also a crucial factor that affect the adoption of maintainomics.

5.7 Maintainomics Scenario Digraph Representation

According to the six main enabler categories and their associated interdependency, a maintainomics digraph can be drawn as depicted in Fig. 3:

Fig. 3
figure 3

Maintainomics scenario digraph representation

Based on the derived maintainomics enabler categories’ diagraph, the system level maintainomics matrix [see Sect. 4.2.2 for more details about its original form, i.e., Eq.  (4)] can be re-written as Eq. (12):

$$ \begin{array}{*{20}c} {{\mathbf{F}} = \begin{array}{*{20}c} {\begin{array}{*{20}c} {\text{Enabler}} \\ {\text{Categories}} \\ \end{array} } & {\begin{array}{*{20}c} {E_{1} } & {E_{2} } & {E_{3} } & \cdots & \cdots & {E_{P} } \\ \end{array} } \\ {\begin{array}{*{20}c} {E_{1} } \\ {E_{2} } \\ {E_{3} } \\ \vdots \\ \vdots \\ {E_{P} } \\ \end{array} } & {\left( {\begin{array}{*{20}c} {E_{1} } & {e_{12} } & {e_{13} } & \cdots & \cdots & {e_{1P} } \\ {e_{21} } & {E_{2} } & {e_{23} } & \cdots & \cdots & {e_{2P} } \\ {e_{31} } & {e_{32} } & {E_{3} } & \cdots & \cdots & {e_{3P} } \\ \vdots & \vdots & \vdots & \ddots & \cdots & \vdots \\ \vdots & \vdots & \vdots & \vdots & \ddots & \vdots \\ {e_{P1} } & {e_{P2} } & {e_{P3} } & \cdots & \cdots & {E_{P} } \\ \end{array} } \right)} \\ \end{array} } \\ \hline \Downarrow \\ \hline {{\mathbf{F}}^{*} = \begin{array}{*{20}c} {\begin{array}{*{20}c} {\text{Enabler}} \\ {\text{Categories}} \\ \end{array} } & {\begin{array}{*{20}c} {E_{1} } & {E_{2} } & {E_{3} } & {E_{4} } & {E_{5} } & {E_{6} } \\ \end{array} } \\ {\begin{array}{*{20}c} {E_{1} } \\ {E_{2} } \\ {E_{3} } \\ {E_{4} } \\ {E_{5} } \\ {E_{6} } \\ \end{array} } & {\left( {\begin{array}{*{20}c} {E_{1} } & {e_{12} } & {e_{13} } & {e_{14} } & {e_{15} } & 0 \\ 0 & {E_{2} } & {e_{23} } & {e_{24} } & {e_{25} } & 0 \\ {e_{31} } & {e_{32} } & {E_{3} } & {e_{34} } & {e_{35} } & {e_{36} } \\ 0 & {e_{42} } & {e_{43} } & {E_{4} } & {e_{45} } & 0 \\ 0 & {e_{52} } & 0 & {e_{54} } & {E_{5} } & 0 \\ {e_{61} } & 0 & 0 & {e_{64} } & {e_{65} } & {E_{6} } \\ \end{array} } \right)} \\ \end{array} } \\ \end{array} . $$
(12)

6 Experimental Study Stage-2: FIT Value Calculation for Quantification Purpose

Obtaining a holistic digraph serves as a starting point for calculating the required FIT value that matches our maintainomics scenario. Apart from this, the following tasks also need to be performed.

Based on the identified empowering element under each enabler category, a set of digraphs are developed (as illustrated in Fig. 4a–f). Unlike the global digraph delineated in Fig. 3, the nodes in this local digraph stand for the empowering elements, while the edges are used to indicate their mutual relationship.

Fig. 4
figure 4

Digraph representation for empowering elements

As shown in Fig. 4, according to the introduced measure scale, i.e., 1–10 for inheritance and 1–5 for interdependence, each enabler category’s matrix and the corresponding permanent function value can also be obtained. A detailed breakdown of such computing process is demonstrated through \( {\mathbf{F}}_{1}^{*} \) and \( f_{{_{permanent} }}^{{{\mathbf{F}}_{1}^{*} }} \).

Accordingly, the system level maintainomics matrix can be further re-written like Eq. (13) [see Sect. 5.7 for its intermediate form, i.e., Eq. (12)].

$$ \begin{array}{*{20}c} {{\mathbf{F}}^{*} = \begin{array}{*{20}c} {\begin{array}{*{20}c} {\text{Enabler}} \\ {\text{Categories}} \\ \end{array} } & {\begin{array}{*{20}c} {E_{1} } & {E_{2} } & {E_{3} } & {E_{4} } & {E_{5} } & {E_{6} } \\ \end{array} } \\ {\begin{array}{*{20}c} {E_{1} } \\ {E_{2} } \\ {E_{3} } \\ {E_{4} } \\ {E_{5} } \\ {E_{6} } \\ \end{array} } & {\left( {\begin{array}{*{20}c} {E_{1} } & {e_{12} } & {e_{13} } & {e_{14} } & {e_{15} } & 0 \\ 0 & {E_{2} } & {e_{23} } & {e_{24} } & {e_{25} } & 0 \\ {e_{31} } & {e_{32} } & {E_{3} } & {e_{34} } & {e_{35} } & {e_{36} } \\ 0 & {e_{42} } & {e_{43} } & {E_{4} } & {e_{45} } & 0 \\ 0 & {e_{52} } & 0 & {e_{54} } & {E_{5} } & 0 \\ {e_{61} } & 0 & 0 & {e_{64} } & {e_{65} } & {E_{6} } \\ \end{array} } \right)} \\ \end{array} } \\ \hline \Downarrow \\ \hline {{\mathbf{F}}^{*} = \begin{array}{*{20}c} {\begin{array}{*{20}c} {\text{Enabler}} \\ {\text{Categories}} \\ \end{array} } & {\begin{array}{*{20}c} {E_{1} \, } & { \, E_{2} \, } & {E_{3} \, } & {E_{4} \, } & {E_{5} \, } & {E_{6} } \\ \end{array} } \\ {\begin{array}{*{20}c} {E_{1} } \\ {E_{2} } \\ {E_{3} } \\ {E_{4} } \\ {E_{5} } \\ {E_{6} } \\ \end{array} } & {\left( {\begin{array}{*{20}c} {165038} & 2 & 2 & 4 & 3 & 0 \\ 0 & {3500} & 4 & 4 & 3 & 0 \\ 1 & 2 & {10167} & 4 & 3 & 3 \\ 0 & 4 & 4 & {3855} & 4 & 0 \\ 0 & 3 & 0 & 3 & {14690} & 0 \\ 3 & 0 & 0 & 2 & 3 & {26426} \\ \end{array} } \right)} \\ \end{array} } \\ \end{array} . $$
(13)

where the values of diagonal entries are replaced by just acquired sub-systems’ permanent function values, namely, \( E_{1} = f_{{_{permanent} }}^{{{\mathbf{F}}_{1}^{*} }} = 165038 \), \( E_{2} = f_{{_{permanent} }}^{{{\mathbf{F}}_{2}^{*} }} = 3500 \), \( E_{3} = f_{{_{permanent} }}^{{{\mathbf{F}}_{3}^{*} }} = 10167 \), \( E_{4} = f_{{_{permanent} }}^{{{\mathbf{F}}_{4}^{*} }} = 3855 \), \( E_{5} = f_{{_{permanent} }}^{{{\mathbf{F}}_{6}^{*} }} = 14690 \), and \( E_{6} = f_{{_{permanent} }}^{{{\mathbf{F}}_{6}^{*} }} = 26426 \), while the corresponding scale value (15) are used to substitute the values of \( e_{ij} \).

At this stage, the system level permanent function value, i.e., \( f_{{_{permanent} }}^{{{\mathbf{F}}^{*} }} \), is calculable which is found to be equal to \( 9.32018 \times 10^{25} \). Accordingly, the proposed FIT measurement mathematically characterizes the feasibility of the chosen case in converting itself to the maintainomics scenario.

7 Experimental Study Stage-3: FIT Value Calculation for Comparison Purpose

In order to illustrate the usefulness of the proposed FIT measurement, a comparison study between two power plants is further introduced in this section in which the comparison approach is based on the methodology detailed in Sect. 4.2.5, while the selected power plant cases are briefed as follows:

  • Power plant 1—fossil power plant: it is well known that fossil fuel-fired power plants are the main sources of power generating. Traditionally, power companies put “fail and fix” strategy into maintenance practices. However, as the pressure of rapid development around the globe, there is a need to continuously reduce unscheduled downtime and unexpected breakdowns.

  • Power plant 2—wind power plant: several authors (e.g., [119122]) convinced that wind power plants brings huge benefits for electricity generation due to they are clean, inexhaustible, and reduce the noise and visual disturbance to people. However, the wind industry is facing challenges with high installation and maintenance costs, and potentially longer time out of operation at failures [123, 124].

The required values for power plant 1 (\( PP_{1} \)) are already known through Sects. 5 and 6. Following the similar procedure, the values for power plant 2 (\( PP_{2} \)) are also obtainable. All values are listed below:

  • \( PP_{1} \): \( E_{1}^{{PP_{1} }} = 165038 \), \( E_{2}^{{PP_{1} }} = 3500 \), \( E_{3}^{{PP_{1} }} = 10167 \), \( E_{4}^{{PP_{1} }} = 3855 \), \( E_{5}^{{PP_{1} }} = 14690 \), \( E_{6}^{{PP_{1} }} = 26426 \), \( e_{12}^{{PP_{1} }} = 2 \), \( e_{13}^{{PP_{1} }} = 2 \), \( e_{14}^{{PP_{1} }} = 4 \), \( e_{15}^{{PP_{1} }} = 3 \), \( e_{23}^{{PP_{1} }} = 4 \), \( e_{24}^{{PP_{1} }} = 4 \), \( e_{25}^{{PP_{1} }} = 3 \), \( e_{31}^{{PP_{1} }} = 1 \), \( e_{32}^{{PP_{1} }} = 2 \), \( e_{34}^{{PP_{1} }} = 4 \), \( e_{35}^{{PP_{1} }} = 3 \), \( e_{36}^{{PP_{1} }} = 3 \), \( e_{42}^{{PP_{1} }} = 4 \), \( e_{43}^{{PP_{1} }} = 4 \), \( e_{45}^{{PP_{1} }} = 4 \), \( e_{52}^{{PP_{1} }} = 3 \), \( e_{54}^{{PP_{1} }} = 3 \), \( e_{61}^{{PP_{1} }} = 3 \), \( e_{64}^{{PP_{1} }} = 2 \), \( e_{65}^{{PP_{1} }} = 3 \), \( {\mathbf{F}}_{{PP_{1} }}^{*} = \begin{array}{*{20}c} {\begin{array}{*{20}c} {\text{Enabler}} \\ {\text{Categories}} \\ \end{array} } & {\begin{array}{*{20}c} {E_{1} } & {E_{2} } & {E_{3} } & {E_{4} } & {E_{5} } & {E_{6} } \\ \end{array} } \\ {\begin{array}{*{20}c} {E_{1} } \\ {E_{2} } \\ {E_{3} } \\ {E_{4} } \\ {E_{5} } \\ {E_{6} } \\ \end{array} } & {\left( {\begin{array}{*{20}c} {165038} & 2 & 2 & 4 & 3 & 0 \\ 0 & {3500} & 4 & 4 & 3 & 0 \\ 1 & 2 & {10167} & 4 & 3 & 3 \\ 0 & 4 & 4 & {3855} & 4 & 0 \\ 0 & 3 & 0 & 3 & {14690} & 0 \\ 3 & 0 & 0 & 2 & 3 & {26426} \\ \end{array} } \right)} \\ \end{array} \), and \( f_{{_{permanent} }}^{{{\mathbf{F}}_{{PP_{1} }}^{*} }} = 9.32018 \times 10^{25} \).

  • \( PP_{2} \): \( E_{1}^{{PP_{2} }} = 6863 \), \( E_{2}^{{PP_{2} }} = 1899 \), \( E_{3}^{{PP_{2} }} = 89689 \), \( E_{4}^{{PP_{2} }} = 5897 \), \( E_{5}^{{PP_{2} }} = 198996 \), \( E_{6}^{{PP_{2} }} = 9879 \), \( e_{12}^{{PP_{2} }} = 3 \), \( e_{13}^{{PP_{2} }} = 2 \), \( e_{14}^{{PP_{2} }} = 4 \), \( e_{15}^{{PP_{2} }} = 3 \), \( e_{16}^{{PP_{2} }} = 5 \), \( e_{24}^{{PP_{2} }} = 2 \), \( e_{25}^{{PP_{2} }} = 4 \), \( e_{31}^{{PP_{2} }} = 2 \), \( e_{32}^{{PP_{2} }} = 2 \), \( e_{34}^{{PP_{2} }} = 4 \), \( e_{35}^{{PP_{2} }} = 2 \), \( e_{36}^{{PP_{2} }} = 2 \), \( e_{43}^{{PP_{2} }} = 3 \), \( e_{45}^{{PP_{2} }} = 4 \), \( e_{54}^{{PP_{2} }} = 5 \), \( e_{61}^{{PP_{2} }} = 4 \), \( e_{64}^{{PP_{2} }} = 4 \), \( e_{65}^{{PP_{2} }} = 3 \), \( {\mathbf{F}}_{{PP_{2} }}^{*} = \begin{array}{*{20}c} {\begin{array}{*{20}c} {\text{Enabler}} \\ {\text{Categories}} \\ \end{array} } & {\begin{array}{*{20}c} {E_{1} } & {E_{2} } & {E_{3} } & {E_{4} } & {E_{5} } & {E_{6} } \\ \end{array} } \\ {\begin{array}{*{20}c} {E_{1} } \\ {E_{2} } \\ {E_{3} } \\ {E_{4} } \\ {E_{5} } \\ {E_{6} } \\ \end{array} } & {\left( {\begin{array}{*{20}c} {6863} & 3 & 2 & 4 & 3 & 5 \\ 0 & {1899} & 0 & 2 & 4 & 0 \\ 1 & 2 & {89689} & 4 & 2 & 2 \\ 0 & 0 & 3 & {5897} & 4 & 0 \\ 0 & 0 & 0 & 5 & {198996} & 0 \\ 4 & 0 & 0 & 4 & 3 & {9879} \\ \end{array} } \right)} \\ \end{array} \), and \( f_{{_{permanent} }}^{{{\mathbf{F}}_{{PP_{2} }}^{*} }} = 1.628 \times 10^{25} \).

According to Eq. (10) (see Sect. 4.2.5), \( U = {\text{maximum of }}\left[ {\sum\limits_{i,j} {\left| {Z_{ij} } \right|} {\text{ and }}\sum\limits_{i,j} {\left| {Z^{\prime}_{ij} } \right|} } \right] = \) \( f_{{_{permanent} }}^{{{\mathbf{F}}_{{PP_{1} }}^{*} }} = 9.32018 \times 10^{25} \), and \( \sum\limits_{i,j} {\lambda_{ij} } = \sum\limits_{i,j} {\left| {Z_{ij} - Z^{\prime}_{ij} } \right|} = 7.69218 \times 10^{25} \), the dissimilarity coefficient \( Coefficient_{dissimilarity} \) and the similarity coefficient \( Coefficient_{similarity} \) equals to 0.78 and 0.22, respectively.

The results of this work indicate that the dissimilarity degree between \( PP_{1} \) and \( PP_{2} \) is high. In addition to this, although the overall permanent function value of \( PP_{2} \) is lower than its competitor \( PP_{1} \), \( PP_{2} \) enjoys a high permanent function value for its methodological and operational enabler categories. On the contrary, \( PP_{1} \) possesses a higher permanent function value for its behavioral enabler category which in turn implies the suitability for transition to maintainomics is largely influenced by the this enabler category and its associated empowering elements.

8 Future Work

In this chapter, a GTA-based FIT assessment methodology has been successfully applied to our focal problem, i.e., maintainomics transformation. Although the present work offers some novel contributions to both big data and maintenance literature, there is still room for further improvement. One immediately future research direction would be introducing fuzzy graph model. It is quite well acknowledged that graphs are simple models that are easy to use for representing interrelationships between objects in which objects are denoted by vertices, while the correlations are indicated by edges. Nevertheless, in spite of its convenience, when it comes to the situation of vagueness contained in the objects’ description, or found in the relationships, or in both, traditional GTA often performs poorly [125]. The numerical values assigned to \( E_{i} \) and \( e_{ij} \), respectively, in this study are crisp and deterministic in nature. With the ever increasing complexity of many modern systems (e.g., maintainomics case), the uncertainty gradually plays a pivotal role in any attempts of trying to optimize and maximize the overall system model’s usefulness. Under such circumstances, the introduction and application of fuzzy relations to maintainomics FIT evaluation becomes necessary and important. Once the feasibility of the maintainomics is confirmed, another future research direction will be bringing more CI methods into e-maintenance operational level for dealing with big data analytics.

9 Conclusion

Thanks to the use of sensors in maintenance (e.g., online monitoring, smart meters, etc.), the rate of growth of generated sensory data far outstrips human capacity to consume it. As a result, enterprises increasingly meet the challenges imposed by how to convert myriads of available raw data to high-level actionable information. This book chapter studies such emerging phenomena and builds a set of enablers to address those issues. The end-product of this chapter is maintainomics, a new concept that facilitates the entry of e-maintenance to any enterprises by evaluating a permanent feasibility function obtained from an enablers’ digraph. The experimental studies demonstrated the suitability of our proposed methodology.