A Software Safety Requirements Elicitation Approach Based on Hazardous Control Action Tree Modelling

来源 :电子学报(英文版) | 被引量 : 0次 | 上传用户:qishi008
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Software safety requirements are crucial for safety assurance of safety-critical software systems.A novel accident causality model,Systems-theoretic accident modeling and processes (STAMP),has been proposed to overcome the limitations of traditional safety techniques in software safety requirements elicitation.However,the STAMP-based method is ad-hoc with no rigorous procedure to elicit software safety requirements effectively.Furthermore,the time-related safety requirements,which are important to software safety,have been paid little attention in STAMP-based method.With the purpose of overcoming these limitations,this paper strives to find a systematic approach to elicit software safety requirements with STAMP,especially the time-related safety requirements.Firstly,a new process model of STAMP is proposed to model all the system varilables and the ralationship of them in control processes.Then based on the process model,an approach HCAT-SSRA is proposed to elicit the software safety requirements by building Hazardous control action tree (HCAT) for each control action in system control processes.Additionally,several rules are proposed to guide time-related software safety requirements analysis.Finally,a case study is given to illustrate the availability and feasibility of the proposed method.
其他文献
Increasing pulses Coherent processing interval (CPI) can effectively improve the location parameters estimation performance in passive localization.However,for
Digit information has been used in many areas and has been widely spread in the Internet era because of its convenience.However,many ill-disposed attackers,such
针对两列滚动体尺寸及接触角都不同的双列向心球面滚子轴承(简称:非对称双列向心球面滚子轴承)的基本额定动载荷的理论计算方法,分析了单列及多列线接触向心滚子轴承额定动载荷的计算原理,并以240/600为例,给出了非对称双列向心球面滚子轴承基本额定动载荷的计算求解过程。
The three-party authenticated key agree-ment protocol is a significant cryptographic mechanism for secure communication,which encourages two entities to authent
In the field of robust audio watermarking,how to seek a good trade-off between robustness and imperceptibility is challenging.The existing studies use the same
为研究最优的、低成本圆弧型的汽车圆锥滚子轴承的滚子母线修形方案,本文应用MASTA作为计算分析工具,计算出不同圆弧、不同圆弧-直线的母线修形方案下的轴承中各粒滚子的应力;并借助正交试验法找出纯圆弧修形方案和圆弧-直线修形方案中各个几何参数对于轴承滚子最大应力的影响机制;最后,根据正交试验的结果找出圆弧型滚子母线和圆弧-直线型滚子母线的最优几何参数组合。
随着移动通信系统的高速建设和发展,射频信号的包络信号带宽越来越宽,功率峰均比越来越大,恒定电压供电的基站功放效率越来越低。针对该问题,论文设计了一种电源调制电路。该电路输出的电压根据峰值检测后的电压值对功率放大器的供电端进行实时控制,保持功率放大器工作状态一直在最高效率点上,从而提高功率放大器的效率。实验表明:在原电路负载不变的情况下,设计的电源调制电路的工作效率提高了30%以上,为使用包络跟踪技术提高功率放大器的效率提供了理论支持与实验支撑。
Density peak clustering (DPC) can identify cluster centers quickly,without any prior knowledge.It is supposed that the cluster centers have a high density and l
Keyword extraction by Term frequency-Inverse document frequency (TF-IDF) is used for text information retrieval and mining in many domains,such as news text,soc
The fast development and the rapid spread of information technology have raised the issue of digital-image copyright protection,which was mostly addressed throu