Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Safety computer systems monitoring

Mazda and others have been working on advanced safety vehicles with monitor screens to show rear and side views, voice-interactive navigation systems and collision avoidance technology. The Ford 24.7 concept car had a computer console in the dashboard with Internet access that is voice-activated. [Pg.161]

Computer systems used to control, monitor, or record functions that may be critical to the safety of a product should be checked for accuracy at intervals of sufficient frequency to provide assurance that the system is under control. If part of a computerized system that controls a function critical to the safety of the product is found not to be accurate, then the safety of the product back to the last known date that the equipment was accurate must be determined. [Pg.126]

One year later the U.K. Department of Health (DoH) GLP Monitoring Unit pubhshed its expectation for computer systems in laboratories conducting human health and environmental safety studies.23 It identihes laboratory management responsibilities for ... [Pg.26]

Nowadays, for reasons of safety and performance, monitoring and supervision have an important role in process control. The complexity and the size of industrial systems induce an increasing number of process variables and make difficult the work of operators. In this context, a computer aided decision-making tool seems to be wise. Nevertheless the implementation of fault detection and diagnosis for stochastic system remains a challenging task. Various methods have been proposed in different industrial contexts (Venkatasubramanian et al., 2003). [Pg.412]

Computer based systems are used both to perform functions important to safety and to monitor and test systems important to safety. It should be ensured that computer based systems of both types are qualified for use and are maintained in accordance with their importance to safety. Maintenance activities on computer based systems should be carried out and managed in accordance with a maintenance plan that has been agreed between the user and the system developer prior to acceptance of the system. [Pg.33]

Typically, MR pulse sequences (including radio-frequency and gradient waveforms) are computer generated and computer controlled. The computer also generates eddy-current compensation for the gradients and perhaps other types of compensation for imperfections. Patient tables are typically under computer control. RF receivers interface with computers that convert the raw receiv data into images. Computers typically display and possibly monitor patient comfort and patient safety parameters. Computers typically monitor system hardware as well. [Pg.627]

The computer system of the station control and data acquisition is a distributed micro processer based systems. A digital multiplexed control system takes the place of hard wired analogue control. This accounts for a significant reduction in cable usage. Built-in diagnostics and board level maintenance makes restoration of operability of any fault in the system a matter of replacement of printed circuit cards. Automatic control systems and procedures are deployed to simplify these procedures and power level manoeuvers. In case of unsafe conditions the reactor protection system (PMS) takes over and automatically scrams the reactor and actuates the relevant safety systems. Diverse methods are used to assure the shutdown of the reactor in hypothetical situations. The systems also provide for post-accident monitoring. [Pg.68]

The safeguards and security-dedicated computer system at the ICPP provides storage basin and operations personnel with a detailed processing list, criticality safety with additional administrative controls, and S S with a means of monitoring process activities. In addition tO providing criticality controls, various operational plans can be readily evaluated. The computerized system has been used for the 1978 and 1980 dissolution campaigns and has proved an invaluable aid to plant operation. [Pg.703]

Intrusion detection is defined as active monitoring of computer systems or networks in desktop IT domains to detect attacks and misuse [1]. Intrusion detection systems are instruments, which provide IDS process (from event detection, evaluation, escalation, and documentation). An IDS detects so called cyber attacks based on analysis of log records of unexpected activities and known attacker activities [9]. The detection of malicious activities on the computer systems are the main task of IDS, so it focuses on computer security. The realisation of safety requirements is not the goal for IDS in homogeneous desktop IT systems. [Pg.293]

The purpose of the pipeline control system is to control and monitor the transportation of crude oil through two pipelines. For safety and availability reasons a redundant process controlling computer system is used. An important component of the pipeline control system is a microprocessor controlled remote action system which transmits all measured values and commands ... [Pg.148]

The requirements specifications of monitoring and control systems often demand high levels of performance from a computational system. For example, the computational task may involve real-world data acquisition, combinational or sequential logic functions, complex arithmetic calculations, and the generation of control outputs to the application plant. The computational response may be required within very tight time constraints, perhaps as part of a real-time schedule. The schedule may have to be maintained in the presence of asynchronous external inputs, such as operator commands or alarms. In addition, the system may have to perform safety functions or functions with safety implications. [Pg.165]

This guideline will address the operational phase of the computer system life cycle (18). It will thus concentrate on how to keep the system safe and reliable whilst it is subject to varying stresses due to its working environment, operational procedures and practise, maintenance and enhancement, and changing requirements. A safety related computer system will require careful monitoring until it is retired from service. The... [Pg.254]

A PES is an electronic computer system that does not utilize mechanical parts for decision making. It involves a computer or a PLD that can be programmed to perform the desired system functions. For example, a PES may be a controller unit for a numerical control milUng machine. Quite often a PES is used as a safety system in a larger system, such as a safety monitoring device for a chemical process plant. [Pg.301]

To address the problem of safety (the system should not produce an erroneous signal), the basic element is the command (COM) and monitoring (MON) failsafe computer. These computers are subjected to draconian safety requirements and are functionally composed of a command channel and a monitoring channel. [Pg.205]

Digital computer systems are used in I C systems important to safety to perform functions of protection, data acquisition, computation, control monitoring and display. If properly designed, they can offer the advantages of improved reliability, accuracy and functionality in comparison with analog systems. The computer system... [Pg.50]

Computer systems may be used to advantage in detecting and monitoring faults internal and external to plant systems and equipment important to safety. [Pg.51]

The instrumentation and control system of the JRR-3M consists of its constituent systems of neutron instrumentation, process instrumentation, reactor power control, reactor protection, engineered safety feature stating and process radioactivity monitoring The system is designed and constructed under the laws, standards and criteria of those days with a satisfactory quality assurance program A specific feature of the system is an extensive introduction of computer systems with a process computer and a management computer This contributes to lightening operators loads satisfactorily... [Pg.113]

Improved sensors allow computer monitoring of the system for safety and protection of the equipment from damage. Sensors include lubrication-flow monitors and alarms, bearing-temperature sensors, belt scales, rotation sensors, and proximity sensors to detect ore level under the crusher. The latter prevent jamming of the output with too high an ore level, and protect the conveyor from impact of lumps with too low an ore level. Motion detectors assure that the conveyor is moving. Control applied to crusher systems including conveyors can facilitate use of mobile crushers in quarries and mines, since these can be controlled remotely by computer with reduced labor. [Pg.1845]

Process control plays an important role in how a plant process upset can be controlled and subsequent emergency actions executed. Without adequate and reliable process controls, an unexpected process occurrence cannot be monitored, controlled and eliminated. Process controls can range from simple manual actions to computer logic controllers, remote from the required action point, with supplemental instrumentation feedback systems. These systems should be designed such as to minimize the need to activate secondary safety devices. The process principles, margins allowed, reliability and the means of process control are mechanisms of inherent safety that will influence the risk level at a facility. [Pg.111]


See other pages where Safety computer systems monitoring is mentioned: [Pg.479]    [Pg.5]    [Pg.22]    [Pg.10]    [Pg.92]    [Pg.620]    [Pg.49]    [Pg.95]    [Pg.620]    [Pg.313]    [Pg.517]    [Pg.46]    [Pg.203]    [Pg.187]    [Pg.138]    [Pg.1684]    [Pg.19]    [Pg.109]    [Pg.66]    [Pg.236]    [Pg.73]    [Pg.44]    [Pg.50]    [Pg.459]    [Pg.466]    [Pg.625]    [Pg.23]    [Pg.94]    [Pg.511]    [Pg.129]    [Pg.620]   
See also in sourсe #XX -- [ Pg.554 ]




SEARCH



Computer monitoring

Computer monitors

Computer systems

Monitor system

Monitoring system

Safety computer systems

Safety monitoring

© 2024 chempedia.info