Abstract

Now the scientific methodology is created, the theory and practice of the analysis and synthesis of functional safety of responsible electronic programmable devices and systems at all stages of their life cycle are developed. The basics of the methodology are fixed by standards. Methods of analysis and synthesis of functional safety are strictly formalized. They are based on the calculations of functional safety indicators with respect to failures of constituent elements and, especially, dangerous and protective failures of the system. Known methods of calculation are focused on determining the intensity and probability of dangerous failures. The objective of the proposed method lies in the fact that, in graph form, without resorting to the solution of the system of equations in the operator transformations to establish the distribution function of time until the threat or security failure, or any unhealthy condition of the system. These distribution functions determine all the necessary indicators of mean time (and, if necessary, the variance of this time) to a dangerous or protective failure. The proposed semi-Markov (Markov) operator method allows to solve a number of problems of calculation and prediction of functional safety of critical (responsible) systems. The method is formalized and suitable for subsequent computer implementation. This fact testifies to the expediency of further development of graph methods, convenient for the study of the safety of complex critical systems, devoid of the shortcomings of the proposed method in terms of the complexity of the preparatory work to determine the analytical expressions of transition probabilities in the Laplace - Stieltjes transformations. The given example of using the method has an independent value – it allows you to assess the advantages and disadvantages of ensuring functional safety by building a two-channel system without restarting the channels

Highlights

  • The functional safety of safety-critical technical systems has been a focus of attention of experts since the last century (Swir, 1986; Guller, 1991; Braband and Lennartz, 1999)

  • The objective of the proposed method is to establish in graph form, without resorting to solving a system of equations in operational transformations, the time distribution functions to a dangerous or protective failure or to any non-working state of the system

  • All safety indicators listed in clause 2 above are in operator form

Read more

Summary

Introduction

The functional safety of safety-critical technical systems has been a focus of attention of experts since the last century (Swir, 1986; Guller, 1991; Braband and Lennartz, 1999). A scientific methodology, theory and practice of analyzing and synthesizing the functional safety of critical electronic programmable devices and systems at all stages of their life cycle has been developed. Basics of this methodology have been standardized for different branches (IEC 61508-(1-7)-2012), in railway (EN 50126-(1-5):2017, IEC 62278-2098, IEC 62279-2016, IEC 62280-2017, etc), in nuclear energy (IEC 61513- 2011, etc.), industrial networks (IEC 617842016, etc) and other industries. The methods of analysis and synthesis of functional safety parameters are strictly formalized They are based on the calculations of functional safety of technical systems that may be in the following states: i. Functioning or defective state - the state of the system in which all the requirements of technical documentation are provided or at least one of these requirements is not provided, respectively

Methods
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.