A Model-Based Failure Identification and Propagation Framework for Conceptual Design of Complex Systems

Author(s):  
Hoda Mehrpouyan ◽  
David C. Jensen ◽  
Christopher Hoyle ◽  
Irem Y. Tumer ◽  
Tolga Kurtoglu

In this paper, a model-based failure identification and propagation (MFIP) framework is introduced for early identification of potential safety issues caused by environmental disturbances and subsystem failures within a complex avionic system. The MFIP framework maps hazards and vulnerability modes to specific components in the system and analyzes failure propagation paths. Block definition diagrams (BDD) are used to represent system functional requirements in the form of demonstrating the relationships between various requirements, their associations, generalizations, as well as dependencies. These concept models help to identify hazardous factors and the relationships through which their detrimental effects are transferred through-out the proposed system architecture. As such, the approach provides the opportunity to reduce costs associated with redesign and provide important information on design viability. Using this technique, designers can examine the impacts of environmental and subsystem risks on the overall system during the early stages of design and develop hazard mitigation strategies.

Author(s):  
Anargyros Tsadimas ◽  
Mara Nikolaidou ◽  
Dimosthenis Anagnostopoulos

Model-based system design is served by a single, multi-layered model supporting all design activities, in different levels of detail. SysML is a modeling language, endorsed by OMG, for system engineering, which aims at defining such models for system design. It provides discrete diagrams to describe system structure and components, to explore allocation policies crucial for system design, and to identify design requirements. In this chapter, SysML is used for the model-based design of enterprise information system architecture, supporting a systemic view of such systems, where software and hardware entities are treated as system components composed to create the system architecture. SysML extensions to facilitate the effective description of non-functional requirements, especially quantitative ones, and their verification are presented. The integration of evaluation parameters and results into a discrete SysML diagram enhances the requirement verification process, while the visualization of evaluation data helps system engineers to explore design decisions and properly adjust system design. Based on the proposed extensions, a SysML profile is developed. The experience obtained when applying the profile for renovating the architecture of a large-scale enterprise information system is also briefly discussed to explore the potential of the proposed extensions.


2016 ◽  
pp. 278-301
Author(s):  
Anargyros Tsadimas ◽  
Mara Nikolaidou ◽  
Dimosthenis Anagnostopoulos

Model-based system design is served by a single, multi-layered model supporting all design activities, in different levels of detail. SysML is a modeling language, endorsed by OMG, for system engineering, which aims at defining such models for system design. It provides discrete diagrams to describe system structure and components, to explore allocation policies crucial for system design, and to identify design requirements. In this chapter, SysML is used for the model-based design of enterprise information system architecture, supporting a systemic view of such systems, where software and hardware entities are treated as system components composed to create the system architecture. SysML extensions to facilitate the effective description of non-functional requirements, especially quantitative ones, and their verification are presented. The integration of evaluation parameters and results into a discrete SysML diagram enhances the requirement verification process, while the visualization of evaluation data helps system engineers to explore design decisions and properly adjust system design. Based on the proposed extensions, a SysML profile is developed. The experience obtained when applying the profile for renovating the architecture of a large-scale enterprise information system is also briefly discussed to explore the potential of the proposed extensions.


2002 ◽  
Vol 713 ◽  
Author(s):  
Allan Hedin ◽  
Ulrik Kautsky ◽  
Lena Morén ◽  
Patrik Sellin ◽  
Jan-Olof Selroos

ABSTRACTIn preparation for coming site investigations for siting of a deep repository for spent nuclear fuel, the Swedish Nuclear Fuel and Waste Management Company, SKB has carried out the longterm safety assessment SR 97, requested by the Swedish Government. The repository is of the KBS-3 type, where the fuel is placed in isolating copper canisters with a high-strength cast iron insert. The canisters are surrounded by bentonite clay in individual deposition holes at a depth of 500 m in granitic bedrock. Geological data are taken from three sites in Sweden to shed light on different conditions in Swedish granitic bedrock.The future evolution of the repository system is analysed in the form of five scenarios. The first is a base scenario where the repository is postulated to be built entirely according to specifications and where present-day conditions in the surroundings, including climate, persist. The four other scenarios show the evolution if the repository contains a few initially defective canisters, in the event of climate change, in the event of earthquakes, and in the event of future inadvertent human intrusion.The principal conclusion of the assessment is that the prospects of building a safe deep repository for spent nuclear fuel in Swedish granitic bedrock are very good. The results of the assessment also serve as a basis for formulating requirements and preferences regarding the bedrock in site investigations, for designing a programme for site investigations, for formulating functional requirements on the repository's barriers, and for prioritisation of research.SR 97 has been reviewed both by an international group of OECD/NEA experts and by Swedish authorities. The NEA reviewers concluded that “SR 97 provides a sensible illustration of the potential safety of the KBS-3 concept”, and no issues were identified that need to be resolved prior to proceeding to the investigation of potential sites. The authorities' conclusions were in principal consistent with those of the NEA.Uncertainties and lack of knowledge in different areas identified in SR 97 have strongly influenced the contents and structure of SKBs most recent research programme, RD&DProgramme 2001.Since SR 97, the methodology for probabilistic consequence analyses have been further developed. Analytic approximations to the numerical transport models used in SR 97 have been developed. The new models have been used to extend the probabilistic calculations in SR 97.


2015 ◽  
Vol 713-715 ◽  
pp. 825-828 ◽  
Author(s):  
Peng Fei Peng ◽  
Li Gong ◽  
Qian Yu

The problems confronting multi-UAV systems when carrying out tasks are described from the perspective of architecture. According to the traits of multi-UAV systems and the needs when performing combat tasks, the functional requirements are analyzed. And a scheme of the system architecture for multi-UAV systems based on autonomous cooperation is put forward according to the thoughts of autonomous cooperative control. Meanwhile, the architecture reconstruction method of f multi-UAV system architecture under conditions of uncertainty is further studied. The design process showed that: the proposed architecture can meet the functional requirements and has good application prospects in future engineering practice.


2021 ◽  
Vol 14 (6) ◽  
pp. 1093-1101
Author(s):  
Stephen Macke ◽  
Hongpu Gong ◽  
Doris Jung-Lin Lee ◽  
Andrew Head ◽  
Doris Xin ◽  
...  

Computational notebooks have emerged as the platform of choice for data science and analytical workflows, enabling rapid iteration and exploration. By keeping intermediate program state in memory and segmenting units of execution into so-called "cells", notebooks allow users to enjoy particularly tight feedback. However, as cells are added, removed, reordered, and rerun, this hidden intermediate state accumulates, making execution behavior difficult to reason about, and leading to errors and lack of reproducibility. We present nbsafety, a custom Jupyter kernel that uses runtime tracing and static analysis to automatically manage lineage associated with cell execution and global notebook state. nbsafety detects and prevents errors that users make during unaided notebook interactions, all while preserving the flexibility of existing notebook semantics. We evaluate nbsafety's ability to prevent erroneous interactions by replaying and analyzing 666 real notebook sessions. Of these, nbsafety identified 117 sessions with potential safety errors, and in the remaining 549 sessions, the cells that nbsafety identified as resolving safety issues were more than 7X more likely to be selected by users for re-execution compared to a random baseline, even though the users were not using nbsafety and were therefore not influenced by its suggestions.


2016 ◽  
Vol 41 (3) ◽  
pp. 38-43
Author(s):  
Qin Yan ◽  
Yin Pan

Planning for underground spaces has become an effective way to use central areas in cities given the steady economic growth in China. The development of underground spaces in mountainous cities has satisfied the needs of the diversification of the city commercial areas and pedestrian movement. Safety issues exist because these underground spaces were originally used for civil air defense. This study was based on the underground commercial street in Chongqing, which is a typical mountainous city. Based on the results of combined fieldwork and survey, this paper summarized current safety issues, which include the not-fully-open exit, the imbalanced exit location, blocked evacuation routes, and the poor awareness of the potential safety issues. This paper proposed a framework of the safety factors for the underground space and synopsized prevention strategies that are specific to potential disasters in the underground environment. The framework comprises ensuring that the exits are fully open, the underground corridors are kept unblocked, the open space on the street is increased for disaster prevention, and equipment security is maintained and managed. At last, This paper summarized disaster prevention strategies, which include ensuring unimpeded exits, balancing the locations of the exits, avoiding blocks, increasing the disaster prevention square area in the underground space, maintaining and managing the security of the equipment.


Author(s):  
Ayda Saidane ◽  
Nicolas Guelfi

The quality of software systems depends strongly on their architecture. For this reason, taking into account non-functional requirements at architecture level is crucial for the success of the software development process. Early architecture model validation facilitates the detection and correction of design errors. In this research, the authors are interested in security critical systems, which require a reliable validation process. So far, they are missing security-testing approaches providing an appropriate compromise between software quality and development cost while satisfying certification and audit procedures requirements through automated and documented validation activities. In this chapter, the authors propose a novel test-driven and architecture model-based security engineering approach for resilient systems. It consists of a test-driven security modeling framework and a test based validation approach. The assessment of the security requirement satisfaction is based on the test traces analysis. Throughout this study, the authors illustrate the approach using a client server architecture case study.


2014 ◽  
pp. 2072-2098
Author(s):  
Ayda Saidane ◽  
Nicolas Guelfi

The quality of software systems depends strongly on their architecture. For this reason, taking into account non-functional requirements at architecture level is crucial for the success of the software development process. Early architecture model validation facilitates the detection and correction of design errors. In this research, the authors are interested in security critical systems, which require a reliable validation process. So far, they are missing security-testing approaches providing an appropriate compromise between software quality and development cost while satisfying certification and audit procedures requirements through automated and documented validation activities. In this chapter, the authors propose a novel test-driven and architecture model-based security engineering approach for resilient systems. It consists of a test-driven security modeling framework and a test based validation approach. The assessment of the security requirement satisfaction is based on the test traces analysis. Throughout this study, the authors illustrate the approach using a client server architecture case study.


Sign in / Sign up

Export Citation Format

Share Document