Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Fault tree analysis mitigated event

The estimated impact is then compared to hazard acceptance criteria to determine whether the consequences are tolerable without additional loss prevention and mitigation measures. If the identified consequences are not tolerable, the next step is to estimate the ffequency/probability of occurrence of the identified failure modes leading to loss of containment. For simple cases, frequency estimates are combined with consequences to yield a qualitative estimate of risk. For complex cases, fault tree analysis is used to estimate the frequency of the event leading to the hazard. These estimates are then combined with the consequences to yield a measure of risk. The calculated risk level is compared to a risk acceptance criterion to determine if mitigation is required for further risk reduction. [Pg.168]

HAZOP and What-If reviews are two of the most common petrochemical industry qualitative methods used to conduct process hazard analyses. Up to 80% of a company s process hazard analyses may consist of HAZOP and What-If reviews with the remainder 20% from Checklist, Fault Tree Analysis, Event Tree, Failure Mode and Effects Analysis, etc. An experienced review team can use the analysis to generate possible deviations from design, construction, modification, and operating intent that define potential consequences. These consequences can then be prevented or mitigated by the application of the appropriate safeguards. [Pg.1]

Abstract. In smart card domain, attacks and coimtermeasures are advancing at a fast rate. In order to have a generic view of all the attacks, we propose to use a Fault Tree Analysis. This method used in safety analysis helps to understand and implement aU the desirable and undesirable events existing in this domain. We apply this method to Java Card vulnerability analysis. We define the properties that must be ensured integrity and confidentiality of smart card data and code. By modehng the conditions, we discovered new attack paths to get access to the smart card contents. Then we introduce a new security API which is proposed to mitigate the undesirable events defined in the tree models. [Pg.82]

Risk analysis and mitigation (that is, fault tree and event tree analysis)... [Pg.33]

Based on any unacceptable and unmitigated risk identified during hazard analysis, further risk assessment and risk mitigation techniques need to be applied. LORA and conceptual SIS designs based on Risk Matrix can be employed if a qualitative to semi-quantitative method is preferred. Fault tree and event tree analyses with a robust LOPA can be applied if a quantitative method is essential... [Pg.93]

Qualitative analysis and fault tree constmction are performed for all classes of safety front-line systems and supporting systems that contribute to prevention or mitigation of severe accident events. The analysis identifies the importance of each component for each system. Extensive analyses are performed with MAAP4, NOTRUMP and other codes to determine the success criteria for system mitigation following initiating events. [Pg.147]


See other pages where Fault tree analysis mitigated event is mentioned: [Pg.84]    [Pg.10]    [Pg.303]    [Pg.300]    [Pg.344]    [Pg.150]    [Pg.221]   
See also in sourсe #XX -- [ Pg.352 ]




SEARCH



Event Tree Analysis

Event trees

Fault Tree Analysis

Fault Tree Analysis analyses

Fault analyses

Fault event

Fault tree

Fault tree analysis events

Mitigation

Tree analysis

© 2024 chempedia.info