Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

SAFETI software

The SPINLINE 3 software of each digital unit is developed by using a set of tools and procedures dedicated to nuelear safety software developments. The software tools are based on a System and Software Development Enviroiunent (SSDE) named CLARISSE, whieh allows developing a complex multi-unit proeessing system. CLARISSE is standardised and is delivered as an independent software paekage. It provides the software tools a libraries needed to perform SPINLINE 3 configuration and the applieation software development. [Pg.25]

The safety characteristics of the SP1NL1NE3 solution and the stringent and proven safety software development process applied by the Nuclear department of the Schneider Electric company have made acceptable the principle of a design based on redundant identical processing units for this project. In addition, because of the possible consequences in case of the NIS not performing its protection fonction on demand, the licensing authority has required an FMEA oriented toward the SCCF risk as part of the safety case. [Pg.49]

Modularization of the safety software for its reuse and effective execution of V V... [Pg.130]

EFFECTS 8. 2009. TNO Safety Software, TNO Industrial and External Safety, Utrecht. [Pg.1126]

The validation of the SRECS application safety software shall be carried out in accordance with a prepared plan. [Pg.258]

The SRCF under test or analysis, with specific references to the requirements specified dining the SRECS appHcation safety software vaHdation planning. [Pg.259]

Security of data has become an important consideration. With the expanded use of the Internet, unauthorized individuals may gain access to private and confidential information found in safety software and applications. It is illegal to make some personal information available. Examples are human resource information, medical information, and other data that may link to accident and injury or illness cases. One kind of security involves keeping secure data and information on computers that do not link to other applications. Another kind of security involves encryption techniques for secure data and information. When data and applications reside in other locations, the communicafion interfaces must be secure along with the remote computer systems themselves. [Pg.551]

That environmental, safety, and health risks and impacts associated with work processes can be minimized while maximizing the reliability and performance of work products. To establish QA process requirements to be implemented under a QAP for the control of suspect/counterfeit items (S/Cls), safety issue corrective actions, and safety software. [Pg.671]

The implementation of the safety policy is supported by several internal trainings which can be accessed by every employee, cort rising system safety, software quality management with focus on software safety, reliability engineering and a special training programme called the Safety Certificate. [Pg.85]

This part of the problem involves prediction of software integrity from the character of the methods used in a single phase of a safety software life-cycle presented in a standard such as IEC61508-3. There is some previous work that is relevant to this problem as summarised briefly in section 3. Die network structure in Figure 3 is proposed. [Pg.248]

In the proposed BBN, as a general principle, we model the rigour of application of any method (its effectiveness), in terms of two subsidiary concepts the inherent power to do the job ( power of build/verification method i nodes) and the intensity of its application ( intensity at which build/verification method i was applied nodes). The multiple node notation presented in Figure 3 indicates that every phase of the IEC61508 safety software development lifecycle has one or more build and verification methods, the precise number of nodes depends on -... [Pg.248]

Figure 3 - Generic BBN Flat structure for one phase of the safety software development lifecycle. Figure 3 - Generic BBN Flat structure for one phase of the safety software development lifecycle.
This view is more conq)lex than previous process-based attempts to capture software reliability using BBNs. It takes the view that a phase is associated with a set of processes (e.g. a requirements specification), and these processes are subject to active updating for the duration of the project due to work in later phases. This approach allows us to capture intricate influences between phases . The generic BBN structure shown in Figure 4 presents a sub-net for each phase of the safety software life-cycle and a net for interaction among phases. The interaction net aggregates integrity estimates from multiple phases. [Pg.250]

In each phase of the safety software development life cycle, there is a verification exercise that aims to find errors introduced in the development process. This verification exercise, or process, aims to find errors that are relevant to particular phase at which is being applied. The verification process of a particular phase can clearly also find errors made in previous phases of the safety software life cycle. [Pg.250]

Figure 4 - Generic BBN Multi-Levelled structure for several phases of the safety software... Figure 4 - Generic BBN Multi-Levelled structure for several phases of the safety software...
Figure 5 - Reliability estimation for phase I of the safety software lifecycle. Figure 5 - Reliability estimation for phase I of the safety software lifecycle.
Figure 6- Bayesian belief network model of three phases of the safety software life-cycle. Figure 6- Bayesian belief network model of three phases of the safety software life-cycle.
NOTE 2 Adequate independence means that neither the failure of any non-safety functions nor the programming access to the non-safety software functions is capable of causing a dangerous failure of the safety instrumented... [Pg.56]

Martyn Thomas, an acknowledged authority on safety related computer systems, quoted in New Scientist suggested the possibility that the London Ambulance system was never identified as being safety-critical E.Geake, Did ambulance chiefs Specify Safety Software , New Scientist,... [Pg.246]

PureSafety, a leading provider of workforce health and safety software, has ranked for the fourth consecutive year on Deloitte s Technology Fast 500 hst of the fastest growing technology, media, telecommunications, life sciences and clean technology companies in North America. [Pg.46]

National Aeronautics and Space Administration. 2004. NASA Safety Software Guidebook. [Pg.251]

Keywords Safety, software reliability, fault tolerance, failure dependency, software diversity, difficulty function. [Pg.186]

Fig. 4.79 Safety-related dataflow of safety software in addition to application software... Fig. 4.79 Safety-related dataflow of safety software in addition to application software...
Join us at this technology Webinar and learn more about how IndustrySafe Safety Management Software allows your organization to develop, collect, and measure safety metrics for incidents, inspections, corrective actions and more. The software is easy to use and cost effective to implement. IndustrySafe Safety Software offers robust features for multiple locations to review, analyze, and track safety metrics. [Pg.85]


See other pages where SAFETI software is mentioned: [Pg.39]    [Pg.871]    [Pg.39]    [Pg.878]    [Pg.18]    [Pg.58]    [Pg.78]    [Pg.80]    [Pg.7]    [Pg.479]    [Pg.35]    [Pg.242]    [Pg.254]    [Pg.18]    [Pg.37]    [Pg.89]    [Pg.79]    [Pg.587]    [Pg.400]    [Pg.46]    [Pg.61]    [Pg.8]    [Pg.196]    [Pg.385]    [Pg.525]   
See also in sourсe #XX -- [ Pg.396 ]

See also in sourсe #XX -- [ Pg.531 ]




SEARCH



Application software safety life cycle (in realization phase)

Application software safety life-cycle requirements

Application software safety lifecycle requirements

Application software safety requirements specification

Application software safety validation planning

Design, process safety software

Hardware/software safety analysis

Human Factors, and Software Safety

Safety critical software

Safety instrumentation systems software issues

Safety instrumented systems software system failures

Safety system containing software

Safety-related control systems software

Software Safety

Software Safety Analysis

Software Safety Using Fault Tree Analysis Technique

Software systems safety

Software technology safety modeling

© 2024 chempedia.info