An approach to allow safety requirements to be efficiently decomposed , traced , and validated

نویسندگان

  • Achille Penna
  • Barbara Gallina
  • Kristina Forsberg
  • Kristina Lundqvist
چکیده

ARP 4754A and ARP 4761 are international standards for the avionics domains. ARP 4761 provides a guidance for the safety assessment process, while the ARP 4754A prescribes close interactions between the safety assessment process and system development process in order to capture safety requirements imposed on the design. According to the ARP 4754A, the safety requirements should be carefully traced and validated. A phase of the safety assessment process is the FHA (Functional Hazard Analysis) and the high-level safety requirements are derived. ARP 4754A indicates that the safety requirements obtained from the FHA phase should be allocated and validated, but the standard only indicates " What " should be done, but not " How " to do it. Hence, when developing an avionic system, an ad-hoc method must be provided to allocate and validate the safety requirements. Thesis work is focused on providing a systematic approach to allow safety managers jointly with designers to decompose, allocate and validate the safety requirements. Furthermore, the proposed approach is aligned with the ARP 4754A and DOORS tool, including how to decompose and validate the safety requirements in the system development process. This way will reduce the necessity to provide an ad-hoc method each avionic systems, and overcome the lacking methodology. Finally, a safety-critical system developed by SAAB is used as case study to validate the proposed approach. 3 Acknowledgements First of all, I would like to thank my family, which they gave me the big opportunity to study abroad and to have this wonderful experience. I am most grateful to Kristina Forsberg, to give me a great opportunity to do the thesis work in SAAB AB. Which I had a wonderful experience in the company, and I met nice " colleagues ". I would like to thank my supervisor, Barbara Gallina, for her patience and support during the entire thesis period. I would like to thank my examiner, Kristina Lundqvist. Without her, I never had the opportunity to know the safety-critical systems engineering field and interest in it. more for a great time that we spent together during my stay in Västerås.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Fuzzy Mixed-integer Goal Programming Model for Determining an Optimal Compromise Mix of Design Requirements in Quality Function Deployment

Quality function deployment is a well-known customer-oriented design procedure for translating the voice of customers into a final production. This is a way that higher customer satisfaction is achieved while the other goals of company may also be met. This method, at the first stage, attempts to determine the best fulfillment levels of design requirements which are emanated by customer needs. ...

متن کامل

Implementation of VlSI Based Image Compression Approach on Reconfigurable Computing System - A Survey

Image data require huge amounts of disk space and large bandwidths for transmission. Hence, imagecompression is necessary to reduce the amount of data required to represent a digital image. Thereforean efficient technique for image compression is highly pushed to demand. Although, lots of compressiontechniques are available, but the technique which is faster, memory efficient and simple, surely...

متن کامل

Economic Growth and Highly Educated Manpower Requirements in Iran

The quantitative relationship between higher education and economic growth in the tradition of “growth accounting equations” and also “neoclassical production function” approach have occupied a pride of place in economics of education, particularly the literature on more developed countries. However, production function type models that allow for isolating the “indirect” (external) effects of h...

متن کامل

Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

متن کامل

Application of triangulation approach in requirements engineering process: A study in analysis and design of the pediatrics epilepsy information system

Introduction: Requirements Engineering process is a crucial phase in software development. In order to achieve a successful design of health information systems (HISs), applying the best methodologies is essential. Therefore, the aim of the present study was to design pediatrics Epilepsy Information System (EPIS) as well as the use of triangulation approach in elicitation and validation of epil...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015