PM-ISD Traceability Metrics Enhance Reliability Assessment for Safety-Critical Systems Development Processes: A Case Study of Oil and Gas Well Drilling Project

Author(s):  
Abdulaziz Ahmed Thawaba ◽  
Azizul Azhar Ramli ◽  
Mohd. Farhan Md. Fudzee
Symmetry ◽  
2018 ◽  
Vol 10 (2) ◽  
pp. 45 ◽  
Author(s):  
Jalil Dahooie ◽  
Edmundas Zavadskas ◽  
Mahdi Abolhasani ◽  
Amirsalar Vanaki ◽  
Zenonas Turskis

2021 ◽  
Vol 1064 (1) ◽  
pp. 012059
Author(s):  
R R Gazizov ◽  
A P Chizhov ◽  
V E Andreev ◽  
A V Chibisov ◽  
V V Mukhametshin ◽  
...  

Author(s):  
MARY ANN LUNDTEIGEN ◽  
MARVIN RAUSAND

This article presents a practical approach to reliability assessment of a complex safety instrumented system that is susceptible to common cause failures. The approach is based on fault tree analysis where the common cause failures are included by post-processing the minimal cut sets. The approach is illustrated by a case study of a safety instrumented function of a workover control system that is used during maintenance interventions into subsea oil and gas wells. The case study shows that the approach is well suited for identifying potential failures in complex systems and for including design engineers in the verification of the reliability analyses. Unlike many software tools for fault tree analysis, the approach gives conservative estimates for reliability. The suggested approach represents a useful extension to current reliability analysis methods.


Author(s):  
Lisa J. Burnell ◽  
John W. Priest ◽  
John R. Durrett

An effective knowledge-based organization is one that correctly captures, shares, applies and maintains its knowledge resources to achieve its goals. Knowledge Management Systems (KMS) enable such resources and business processes to be automated and are especially important for environments with dynamic and complex domains. This chapter discusses the appropriate tools, methods, architectural issues and development processes for KMS, including the application of Organizational Theory, knowledge-representation methods and agent architectures. Details for systems development of KMS are provided and illustrated with a case study from the domain of university advising.


2011 ◽  
pp. 571-592
Author(s):  
Lisa J. Burnell ◽  
John W. Priest ◽  
John R. Durrett

An effective knowledge-based organization is one that correctly captures, shares, applies and maintains its knowledge resources to achieve its goals. Knowledge Management Systems (KMS) enable such resources and business processes to be automated and are especially important for environments with dynamic and complex domains. This chapter discusses the appropriate tools, methods, architectural issues and development processes for KMS, including the application of Organizational Theory, knowledge-representation methods and agent architectures. Details for systems development of KMS are provided and illustrated with a case study from the domain of university advising.


2021 ◽  
pp. 41-57
Author(s):  
Gregory Falco ◽  
Eric Rosenbach

The question “How do I assess our cyber risk?” addresses how to identify and characterize cyber risk unique to an organization’s critical systems, networks, and data. The chapter begins with a case study about a cyberattack on Ukraine’s electric grid. It details risk assessment for three types of critical systems: mission-critical systems, business-critical systems, and safety-critical systems. It explains the three types of networks critical to many organizations: business and administrative networks, operational and service delivery networks, and communication networks. In outlining the “CIA triad,” it shows how cyber risk can be characterized as a confidentiality, integrity, or availability issue relating to digital assets. Further, it describes how to assess the importance of different digital assets and how to prioritize them using a business impact analysis (BIA). The chapter concludes with real-world Embedded Endurance strategy lessons Rosenbach gained in Saudi Arabia in the wake of one of the world’s most destructive cyberattacks.


Sign in / Sign up

Export Citation Format

Share Document