Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Sneak circuit

Although risk analysis of new facilities is required by Ref. 39, the method of conducting the analysis is left quite open. The reference suggests fault hazard analysis, fault tree analysis, or sneak circuit analysis. Ref. 41 is an example of a thorough hazards evaluation and risk analysis for a new facility at Radford Army... [Pg.46]

The recommended techniques for preliminary hazard analysis are energy trace and barrier analysis (ETBA) and failure modes and effects analysis (FMEA). Recommended techniques for system and subsystem hazard analyses are FMEA, fault tree analysis (FTA), common cause analysis, sneak circuit analysis (for electrical, electronic, and some hydraulic or pneumatic circuits) and, of course, software hazard analysis for software. [Pg.68]

Based on the results of the PHA, recommendations made by 30% review boards, and guidance provided in the system safety program plan, detailed hazard analyses are made of specified (critical) subsystems. The techniques for these SSHAs are as outlined in the system safety program plan or as selected by the SSWG. Failure modes and effects analysis (FMEA) and/or fault tree analysis (FTA) are generally the techniques of choice. Software hazard analysis, common cause analysis, and/or sneak circuit analysis may also be appropriate. [Pg.98]

A sneak circuit or path is an unintended energy route, which can allow an undesired function to occur, prevent desired functions from occurring, or adversely affect the timing of functions. Sneak circuit analysis or sneak analysis is performed to identify ways in which built-in design characteristics can either allow an undesired function to occur or prevent desired functions from occurring. Even though most sneak circuits and most sneak circuit analysis... [Pg.262]

An important feature of sneak circuit analysis is that the sneak paths being investigated are not the result of a component failure. They are rather the result of the circuit design. The sneak paths may show up only on rare occasions when the switches (or valves) in the circuit are in a unique configuration. [Pg.263]

Sneak circuit analysis is usually inductive and can be very difficult to perform without the software to aid in producing network trees and other graphics. Much of this software is proprietary, and a large portion of the sneak circuit analysis work done to date has been accomplished by large aerospace and weapons contractors (notably Boeing and General Dynamics). [Pg.263]

The most common approach to sneak circuit analysis involves visual clues found by comparing circuits with the five basic topographs shown in Figure 20-1. Nearly every circuit can be broken down into combinations of these topographs. [Pg.263]

Successful sneak circuit analysis requires a skilled analyst and great care. Unfortunately, sneak circuit analysis is frequently performed with... [Pg.263]

Figure 20-1 Sneak circuit topographs. (Source NASA NSTS 222S4, Methodology for Conduct of NSTS Hazard Analyses.)... Figure 20-1 Sneak circuit topographs. (Source NASA NSTS 222S4, Methodology for Conduct of NSTS Hazard Analyses.)...
Other than electrical, name three types of systems that may be vulnerable to sneak circuits. [Pg.272]

Most sneak circuit analysis has been done by one or two large defense and aerospace contractors. Why ... [Pg.272]

To illustrate this point, this chapter addresses two system safety analytical methods that have been developed as a result technological improvements the sneak circuit analysis and the software hazard analysis. Each is briefly discussed here to demonstrate its applicability and utility in the practice of industrial safety and health. [Pg.175]

The sneak circuit analysis (SCA) (also known as sneak analysis) is a system safety analytical technique used to identify and evaluate the different possible ways in... [Pg.175]

While no particular worksheet is typically used during the performance of an SCA, an example of one is shown in Figure 15.1. The data collected here should be transferred to the sneak circuit report for submission to management. [Pg.177]

Figure 15.1 Sample sneak circuit analysis worksheet. Figure 15.1 Sample sneak circuit analysis worksheet.
The system safety analysis techniques known separately as sneak circuit analysis and software safety analysis have been developed in an effort to address these concerns over system safety and reliability assurance. Although various types of sneak hazards can be identified by analysis, and a variety of software hazard analysis techniques are commonly used, each method is concerned primarily with the same essential objective explained throughout this text hazard risk elimination or reduction to acceptable levels. [Pg.182]

CASCA Computer-aided sneak circuit analysis... [Pg.189]

Fault (or Functional) Hazard Analysis (FHA) Management Oversight and Risk Tree (MORT) Energy Trace and Barrier Analysis (ETBA) Sneak Circuit Analysis (SCA)... [Pg.12]

CASCA Computer-Aided Sneak Circuit Analysis... [Pg.195]


See other pages where Sneak circuit is mentioned: [Pg.336]    [Pg.262]    [Pg.263]    [Pg.263]    [Pg.1]    [Pg.12]    [Pg.175]    [Pg.176]    [Pg.177]    [Pg.178]    [Pg.191]    [Pg.212]    [Pg.171]    [Pg.180]    [Pg.181]    [Pg.181]    [Pg.182]    [Pg.183]    [Pg.197]   
See also in sourсe #XX -- [ Pg.374 ]




SEARCH



Sneak Circuit Analysis (SCA)

Sneak circuit analysis

Sneak circuit topographs

Software sneak circuit analysis

© 2024 chempedia.info