Accidentscenario,225ALARP,467
Amelioration,425AnalysisTechniques
Barrieranalysis,335–351Bentpinanalysis,353–364
Causeconsequenceanalysis,383–395Commoncausefailureanalysis,397–422Definitionof,31
Eventtreeanalysis,223–234Failuremodeandeffectsanalysis,
235–259
Faulthazardanalysis,261–269Faulttreeanalysis,183–221
Functionalhazardanalysis,271–289HAZOPanalysis,365–381
Healthhazardassessment,155–168Markovanalysis,317–333MORTanalysis,423–430
Operating&supporthazardanalysis,
131–153
Petrinetanalysis,307–316
Preliminaryhazardanalysis,73–93Preliminaryhazardlist,55–72Safetyrequirements/criteria
analysis,169–181
Sneakcircuitanalysis,291–306
Softwaresafetyassessment,431–449Subsystemhazardanalysis,95–114Systemhazardanalysis,115–129AnalysisTypes
Conceptualdesignhazardanalysis
type,34Definitionof,31
Detaileddesignhazardanalysistype,37Healthdesignhazardanalysistype,41Operationsdesignhazardanalysistype,40Preliminarydesignhazardanalysis
type,35
Requirementsdesignhazardanalysis
type,42
Systemdesignhazardanalysistype,38ANDgate,190
Approximationformulas(faulttree),
201,202
Aslowasreasonablypractical,467Barrier,337,343
Barrieranalysis,335–351Bentpin,354,355
Bentpinanalysis,353–364Bottom-upanalysis,49
Cablefailurematrixanalysis,353Cascadingfailure,401
Causeconsequenceanalysis,383–395Combinatorialmodel,319Commercialofftheshelf,468Commoncausefailure,397,400
Commoncausefailureanalysis,397–422Commonmodefailure,400
Commonmodefailureanalysis,398
HazardAnalysisTechniquesforSystemSafety,byCliftonA.Ericson,IICopyright#2005JohnWiley&Sons,Inc.
497
498
INDEX
Conceptualdesignhazardanalysistype,34COTS,468
Criticalitemlist,238Cutset,191
Deductive,48
Dependentevent,399
Detaileddesignhazardanalysistype,37Deterministicprocess,319Developmentlifecycle,11
Dynamicfaulttreeanalysis,218Energytraceandbarrieranalysis,335Engineeringdevelopmentlifecycle
model,11Eventtree,223
Eventtreeanalysis,223–234
Failure,237
Failurecause,238Failureeffect,238Failuremode,237
Failuremodeandeffectsanalysis,235–259Failuremodeeffectsandcriticality
analysis,235Fault,238
Faulthazardanalysis,261–269Faulttree,183
Faulttreeanalysis,183–221
Faulttreeapproximationformulas,201,202Firmware,433FMEA,235–259FMECA,235FTA,183–221Function,6
Functionaldependencygate,218Functionalflowdiagram,83
Functionalhazardanalysis,271–289Functionalmodel,241Guideword,372
Hazard,15
Hazardactuation,19,20Hazardbarrier,337,343
Hazardcausalfactor,14,18,21Hazardchecklist,25,62,483Hazardcomponents,17Hazardexample,18Hazardmitigation,475Hazardtheory,15Hazardtriangle,17Hazardouselement,17HAZOPanalysis,365–381
Healthdesignhazardanalysistype,41Healthhazardassessment,155–168HHA,155–168
Indenturelevel,238
Indenturedequipmentlist,83Indenturedtasklist,135,136Independentevent,399Inductive,48
Initiatingevent,225Initiatingmechanism,17Inhibitgate,190Interlock,474
Intermittentfailure,243Lessthanadequate,425Markovanalysis,317–333Minimalcutset,191Mishap,14Mishaprisk,16Mitigation,475
MORTanalysis,423–430Mutuallyexclusiveevent,401NDI,475
Nondevelopmentalitem,475
O&SHA,131–153
Operating&supporthazard
analysis,131–153
Operationalsequencediagram,141,142Operationsdesignhazardanalysistype,40ORgate,190
Petrinetanalysis,307–316PHA,73–93
PHAworksheet,79PHL,55–72
PHLworksheet,61Pivotalevent,225
Preliminarydesignhazardanalysistype,35Preliminaryhazardanalysis,73–93Preliminaryhazardlist,55–72
Probabilisticriskassessment,52,385,476ProcessFMEA,242ProductFMEA,242Qualitativeanalysis,51Quantitativeanalysis,51
Reachability,309,312
Requirementsdesignhazardanalysis
type,42
Residualrisk,477Risk,15,17
Riskassessment,478Riskmitigation,475
Riskprioritynumber,238
Safetycritical,478
Safetycriticalfunction,478
Safetycriticalfunctionthread,123,124Safetyrequirements/criteriaanalysis,
169–181SCA,291–306SHA,115–129SHRI,435,438Sneak,293
Sneakcircuit,291
Sneakcircuitanalysis,291–306Sneaklabel,299,300Sneakindicator,300,301Sneakpath,299,300Sneaktiming,299,300Software,433
SoftwareFMEA,243
Softwarehazardriskindex,435,438Softwaresafetyassessment,431–449SRCA,169–181SSHA,95–114
INDEX
499
SSP,481SSPP,481State,319
Statetransitiondiagram,319Stochasticprocess,319Structuralmodel,241Subsystem,480
Subsystemhazardanalysis,95–114System,6,481Systemattributes,7
Systemdesignhazardanalysistype,38Systemfunction,6
Systemhazardanalysis,115–129Systemlifecycle,9Systemsafety,3,481Systemsafetyprocess,4Systemsafetyprogram,481
Systemsafetyprogramplan,481Systemsafetyrequirement,73Target/threat,17
Top-downanalysis,49ToplevelmishapTotalrisk,482Validation,482Verification,482
因篇幅问题不能全部显示,请点此查看更多更全内容