Review: The limitations of hazard analysis techniques in safety critical system development
Hazards might lead to major system breakdowns. For instance, it has been known in the US since 2009 that a software flaw led to an underestimation of patients' heart rates. Serious adverse effects have resulted from this. The accident shows how important it is to use hazard analysis (HA) when m...
| Main Authors: | Kiriyadhatshini, Gunaratnam, Azma, Abdullah |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
2M World Sdn Bhd
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/37601/ http://umpir.ump.edu.my/id/eprint/37601/1/Review-%20The%20limitations%20of%20hazard%20analysis%20techniques%20in%20safety.pdf http://umpir.ump.edu.my/id/eprint/37601/2/Review-The%20limitations%20of%20hazard%20analysis%20techniques%20in%20safety_FULL.pdf |
Similar Items
Hazard analysis techniques, methods and approaches: A review
by: Kiriyadhatshini, Gunaratnam, et al.
Published: (2022)
by: Kiriyadhatshini, Gunaratnam, et al.
Published: (2022)
Hazard analysis for the requirements specification of safety-critical systems using the combination of FHA and FTA techniques
by: Kiriyadhatshini, Gunaratnam
Published: (2023)
by: Kiriyadhatshini, Gunaratnam
Published: (2023)
Hazard Analysis for Safety-critical Systems Using SOFL
by: Azma, Abdullah, et al.
Published: (2013)
by: Azma, Abdullah, et al.
Published: (2013)
Safety property attributes in critical systems for requirement specification : A review
by: Azma, Abdullah, et al.
Published: (2023)
by: Azma, Abdullah, et al.
Published: (2023)
Applying heuristics evaluation to improve the usability of malaysia accounting training management system
by: Zuraidah, Mat Harun, et al.
Published: (2020)
by: Zuraidah, Mat Harun, et al.
Published: (2020)
A review: software safety requirement analysis model in critical software development
by: Azma, Abdullah, et al.
Published: (2023)
by: Azma, Abdullah, et al.
Published: (2023)
Capturing Safety Properties for Safety-critical Systems using SOFL
by: Azma, Abdullah, et al.
Published: (2011)
by: Azma, Abdullah, et al.
Published: (2011)
Capturing Requirement Specification for Safety-critical System using SOFL and UML
by: Azma, Abdullah, et al.
Published: (2015)
by: Azma, Abdullah, et al.
Published: (2015)
Text segmentation techniques: A critical review
by: Pak, Irina *, et al.
Published: (2017)
by: Pak, Irina *, et al.
Published: (2017)
Selective mode excitation techniques for mode-division multiplexing: A critical review
by: Fazea, Yousef, et al.
Published: (2018)
by: Fazea, Yousef, et al.
Published: (2018)
Develop earthquake system for safety using wireless sensor network
by: Mohd Saffwan, Mohd Reip
Published: (2018)
by: Mohd Saffwan, Mohd Reip
Published: (2018)
A review on big data stream processing applications: contributions, benefits, and limitations
by: Ahmed Alwaisi, Shaimaa Safaa, et al.
Published: (2021)
by: Ahmed Alwaisi, Shaimaa Safaa, et al.
Published: (2021)
A review : Static analysis of android malware and detection technique
by: Juliza, Mohamad Arif, et al.
Published: (2021)
by: Juliza, Mohamad Arif, et al.
Published: (2021)
Safety car detection with notification system
by: Nur Fathihah, Mashudi
Published: (2019)
by: Nur Fathihah, Mashudi
Published: (2019)
Modelling safety critical systems with ageing components, with application to underground railway risk and hazards
by: Naybour, Susannah
Published: (2021)
by: Naybour, Susannah
Published: (2021)
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)
by: Shakirah, Saidin, et al.
Published: (2018)
Final Year Project Allocation System Techniques: A Systematic Literature Review
by: Nik Intan Syahiddatul Ilani, Jailani, et al.
Published: (2022)
by: Nik Intan Syahiddatul Ilani, Jailani, et al.
Published: (2022)
Limiter removal: fitness tracking mobile application
by: Muhammad Asyraf, Rahman
Published: (2019)
by: Muhammad Asyraf, Rahman
Published: (2019)
Review of intrusion detection systems based on deep learning
techniques: coherent taxonomy, challenges, motivations,
recommendations, substantial analysis and future directions
by: Aleesa, A. M., et al.
Published: (2004)
by: Aleesa, A. M., et al.
Published: (2004)
T-Way Testing Strategies: A Critical Survey and Analysis
by: Kamal Z., Zamli, et al.
Published: (2013)
by: Kamal Z., Zamli, et al.
Published: (2013)
Watermarking techniques for mobile application: A review
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
A Critical Review of General Method and Game-based Method in Learning Time Dilation
by: Lok, Leh Leong, et al.
Published: (2015)
by: Lok, Leh Leong, et al.
Published: (2015)
A Literature Review on Gold Price Predictive Techniques
by: Nurul Asyikin, Zainal, et al.
Published: (2015)
by: Nurul Asyikin, Zainal, et al.
Published: (2015)
Review on cost-value approach for requirements prioritization techniques
by: Tan, Amelia, et al.
Published: (2018)
by: Tan, Amelia, et al.
Published: (2018)
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
Review of hybrid analysis technique for malware detection
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
by: Yus Kamalrul, Mohamed Yunus, et al.
Published: (2020)
Design and process metamodels for modelling and verification of safety-related software applications in smart building systems
by: Murni, Fatehah, et al.
Published: (2018)
by: Murni, Fatehah, et al.
Published: (2018)
Comparative analysis between FPA and COCOMO techniques for software cost estimation
by: Ali Moftah, Abu Baker
Published: (2014)
by: Ali Moftah, Abu Baker
Published: (2014)
Critical Success Factors Of Implementing Web Interface Management System For Subsea Projects
by: Marimuthu, Suresh Kumar
Published: (2011)
by: Marimuthu, Suresh Kumar
Published: (2011)
Ontology Development Guide Using Protege: BCS3263SQA at FSKKP
by: Jessie, Ooi, et al.
Published: (2018)
by: Jessie, Ooi, et al.
Published: (2018)
Customer intent prediction using sentiment analysis techniques
by: Lye, Say Hong *, et al.
Published: (2021)
by: Lye, Say Hong *, et al.
Published: (2021)
An improved file carver of intertwined jpeg images using X_myKarve
by: Abdullah, Nurul Azma
Published: (2014)
by: Abdullah, Nurul Azma
Published: (2014)
Hazard analysis critical control point and self-regulation
by: Eglezos, S., et al.
Published: (2014)
by: Eglezos, S., et al.
Published: (2014)
Mobile edutainment games: road safety for kids
by: Nur Izdihar, Ab Ghani
Published: (2013)
by: Nur Izdihar, Ab Ghani
Published: (2013)
CNAR-M: A model for mining critical negative association rules
by: Herawan, Tutut, et al.
Published: (2012)
by: Herawan, Tutut, et al.
Published: (2012)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
The efficiency of hidden naïve bayes technique compared with data mining techniques in early diagnosis of diabetes and prediction system
by: Bassam Abdo, Al-Hameli, et al.
Published: (2020)
by: Bassam Abdo, Al-Hameli, et al.
Published: (2020)
An analysis of ambiguity detection techniques for Software Requirements Specification (SRS)
by: Oo, Khin Hayman, et al.
Published: (2018)
by: Oo, Khin Hayman, et al.
Published: (2018)
Feature extraction analysis, techniques and issues in vehicle types recognition
by: Nor'Aqilah, Misman, et al.
Published: (2018)
by: Nor'Aqilah, Misman, et al.
Published: (2018)
Similar Items
-
Hazard analysis techniques, methods and approaches: A review
by: Kiriyadhatshini, Gunaratnam, et al.
Published: (2022) -
Hazard analysis for the requirements specification of safety-critical systems using the combination of FHA and FTA techniques
by: Kiriyadhatshini, Gunaratnam
Published: (2023) -
Hazard Analysis for Safety-critical Systems Using SOFL
by: Azma, Abdullah, et al.
Published: (2013) -
Safety property attributes in critical systems for requirement specification : A review
by: Azma, Abdullah, et al.
Published: (2023) -
Applying heuristics evaluation to improve the usability of malaysia accounting training management system
by: Zuraidah, Mat Harun, et al.
Published: (2020)