Hazard Analysis for Safety-critical Systems Using SOFL
The most important mechanism for improving the safety of a system is to identify the hazard state of the system as it has the potential to cause an unexpected, unplanned or undesired event or a series of events. A hazard that occurs in a system could inevitably lead to an accident (loss event), whic...
| Main Authors: | Azma, Abdullah, Liu, Shaoying |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/3612/ http://umpir.ump.edu.my/id/eprint/3612/1/SS-0020.pdf |
Similar Items
Capturing Safety Properties for Safety-critical Systems using SOFL
by: Azma, Abdullah, et al.
Published: (2011)
by: Azma, Abdullah, et al.
Published: (2011)
Capturing Requirement Specification for Safety-critical System using SOFL and UML
by: Azma, Abdullah, et al.
Published: (2015)
by: Azma, Abdullah, et al.
Published: (2015)
Review: The limitations of hazard analysis techniques in safety critical system development
by: Kiriyadhatshini, Gunaratnam, et al.
Published: (2023)
by: Kiriyadhatshini, Gunaratnam, et al.
Published: (2023)
A tool for capturing safety properties from critical system specifications written in SOFL
by: Azma, Abdullah, et al.
Published: (2018)
by: Azma, Abdullah, et al.
Published: (2018)
Hazard analysis techniques, methods and approaches: A review
by: Kiriyadhatshini, Gunaratnam, et al.
Published: (2022)
by: Kiriyadhatshini, Gunaratnam, et al.
Published: (2022)
A review: software safety requirement analysis model in critical software development
by: Azma, Abdullah, et al.
Published: (2023)
by: Azma, Abdullah, et al.
Published: (2023)
SOFL Three-Step Approach to Construct the Formal Specification of a Brain Tumor Treatment System
by: A Rahman, Mat, et al.
Published: (2013)
by: A Rahman, Mat, et al.
Published: (2013)
Hazard analysis for the requirements specification of safety-critical systems using the combination of FHA and FTA techniques
by: Kiriyadhatshini, Gunaratnam
Published: (2023)
by: Kiriyadhatshini, Gunaratnam
Published: (2023)
Safety property attributes in critical systems for requirement specification : A review
by: Azma, Abdullah, et al.
Published: (2023)
by: Azma, Abdullah, et al.
Published: (2023)
Develop earthquake system for safety using wireless sensor network
by: Mohd Saffwan, Mohd Reip
Published: (2018)
by: Mohd Saffwan, Mohd Reip
Published: (2018)
Safety car detection with notification system
by: Nur Fathihah, Mashudi
Published: (2019)
by: Nur Fathihah, Mashudi
Published: (2019)
T-Way Testing Strategies: A Critical Survey and Analysis
by: Kamal Z., Zamli, et al.
Published: (2013)
by: Kamal Z., Zamli, et al.
Published: (2013)
An improved file carver of intertwined jpeg images using X_myKarve
by: Abdullah, Nurul Azma
Published: (2014)
by: Abdullah, Nurul Azma
Published: (2014)
Tracing Significant Association Rules Using Critical Least Association Rules Model
by: Zailani, Abdullah, et al.
Published: (2013)
by: Zailani, Abdullah, et al.
Published: (2013)
Automotive anti-theft system using fuzzy logic method
by: Kahtan, Hasan, et al.
Published: (2017)
by: Kahtan, Hasan, et al.
Published: (2017)
Applying heuristics evaluation to improve the usability of malaysia accounting training management system
by: Zuraidah, Mat Harun, et al.
Published: (2020)
by: Zuraidah, Mat Harun, et al.
Published: (2020)
Heart disease diagnosis system using fuzzy logic
by: Hasan, Kahtan, et al.
Published: (2018)
by: Hasan, Kahtan, et al.
Published: (2018)
Mining significant association rules from educational data using critical relative support approach
by: Zailani, Abdullah, et al.
Published: (2011)
by: Zailani, Abdullah, et al.
Published: (2011)
Design and process metamodels for modelling and verification of safety-related software applications in smart building systems
by: Murni, Fatehah, et al.
Published: (2018)
by: Murni, Fatehah, et al.
Published: (2018)
Applying SOFL to construct requirements specification for examination monitoring system
by: Abdul Rahman, Mat, et al.
Published: (2012)
by: Abdul Rahman, Mat, et al.
Published: (2012)
Mobile edutainment games: road safety for kids
by: Nur Izdihar, Ab Ghani
Published: (2013)
by: Nur Izdihar, Ab Ghani
Published: (2013)
CNAR-M: A model for mining critical negative association rules
by: Herawan, Tutut, et al.
Published: (2012)
by: Herawan, Tutut, et al.
Published: (2012)
Text segmentation techniques: A critical review
by: Pak, Irina *, et al.
Published: (2017)
by: Pak, Irina *, et al.
Published: (2017)
Ontology Development Guide Using Protege: BCS3263SQA at FSKKP
by: Jessie, Ooi, et al.
Published: (2018)
by: Jessie, Ooi, et al.
Published: (2018)
Application of Fuzzy Logic Controller for Safe Braking System: An Anti-Theft Tracking
by: Kahtan, Hasan, et al.
Published: (2018)
by: Kahtan, Hasan, et al.
Published: (2018)
Template matching analysis using neural network for mobile iris recognition system
by: Anis Farihan, Mat Raffei, et al.
Published: (2020)
by: Anis Farihan, Mat Raffei, et al.
Published: (2020)
Critical Success Factors Of Implementing Web Interface Management System For Subsea Projects
by: Marimuthu, Suresh Kumar
Published: (2011)
by: Marimuthu, Suresh Kumar
Published: (2011)
Fax modem system analysis in concept, design & implementation using VHDL / Zuliana Zakaria
by: Zuliana, Zakaria
Published: (2003)
by: Zuliana, Zakaria
Published: (2003)
Selective mode excitation techniques for mode-division multiplexing: A critical review
by: Fazea, Yousef, et al.
Published: (2018)
by: Fazea, Yousef, et al.
Published: (2018)
A Critical Review of General Method and Game-based Method in Learning Time Dilation
by: Lok, Leh Leong, et al.
Published: (2015)
by: Lok, Leh Leong, et al.
Published: (2015)
Analysis of an intrusion detection system based on immunilogy
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
by: Saeed Al-Amoudi, Mohammed Hussein
Published: (2008)
Feasibility study for developing an event prioritizing system using CMSs
by: Aldailami, Abdullah Hussein, et al.
Published: (2023)
by: Aldailami, Abdullah Hussein, et al.
Published: (2023)
Applying Architectural Analysis for Current Software Systems: A Case Study of KFC and Pizza Hut Online Food Ordering Systems in Malaysia
by: Hujainah, Fadhl, et al.
Published: (2017)
by: Hujainah, Fadhl, et al.
Published: (2017)
Influenza pattern analysis system through mining weblogs
by: Khoo, Pei Lin *, et al.
Published: (2012)
by: Khoo, Pei Lin *, et al.
Published: (2012)
Using the web for critical learning of al-Qur’an’s language: an exploratory case study
by: Abdullah, Matin Saad, et al.
Published: (2012)
by: Abdullah, Matin Saad, et al.
Published: (2012)
Intrusion detection systems using K-means clustering system
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019)
Computer-aided system for extending the performance of diabetes analysis and prediction
by: Murad, Saydul Akbar, et al.
Published: (2021)
by: Murad, Saydul Akbar, et al.
Published: (2021)
Study and Implementation of Internet of Things (IoT) Based Vehicle Safety
Alert and Tracking System
by: Sarasvathi, Nahalingham, et al.
Published: (2018)
by: Sarasvathi, Nahalingham, et al.
Published: (2018)
A bibliometric statistical analysis of the fuzzy inference system - based classifiers
by: Chen, Wenhao, et al.
Published: (2021)
by: Chen, Wenhao, et al.
Published: (2021)
A malware analysis and detection system for mobile devices / Ali Feizollah
by: Ali, Feizollah
Published: (2017)
by: Ali, Feizollah
Published: (2017)
Similar Items
-
Capturing Safety Properties for Safety-critical Systems using SOFL
by: Azma, Abdullah, et al.
Published: (2011) -
Capturing Requirement Specification for Safety-critical System using SOFL and UML
by: Azma, Abdullah, et al.
Published: (2015) -
Review: The limitations of hazard analysis techniques in safety critical system development
by: Kiriyadhatshini, Gunaratnam, et al.
Published: (2023) -
A tool for capturing safety properties from critical system specifications written in SOFL
by: Azma, Abdullah, et al.
Published: (2018) -
Hazard analysis techniques, methods and approaches: A review
by: Kiriyadhatshini, Gunaratnam, et al.
Published: (2022)