首页> 外文会议>International system safety conference >Top-Down Analysis Approach for Threat Hazard Assessment on Insensitive Munition Programs
【24h】

Top-Down Analysis Approach for Threat Hazard Assessment on Insensitive Munition Programs

机译:自上而下的不敏感弹药计划威胁危险评估方法

获取原文

摘要

Threat hazard assessment is traditionally viewed as an inductive analysis technique which seeks to assess the effectsthreats within the life cycle impart on the weapon system. Under MIL-STD-2105 there are eleven tests that may beapplied to simulate these threats. Four of these tests represent environmental threats, and the other 7 involveabnormal, but potentially credible threats. For many projects involving insensitive munition development, theinductive approach made sense because of the potential for identifying a previously unknown threat. This bottom-upapproach, however, creates a large analysis documents with the expected result indicating which of the eleven testsapplied. With systems that have well established life cycles and threat environments, a top down approach may bemore appropriate. Using a functional fault tree model, the threats that would lead to a one of the eleven testscenarios can be assessed. This approach provides a more streamlined analysis of threats and may be used toeliminate unrealistic threats while providing a sound analysis framework for justifying the conclusion. The benefitof this approach is that the threat is more quickly characterized, the determination of whether a test is required canbe achieved more succinctly, and the end result is identical to the inductive approach. The analyst would still need tocharacterize the credible threats and tailor the eleven tests to align with the product?s life cycle environmental profileand the threats contained therein. However, this effort can be more focused to identify where the threat deviatesfrom the military standards and technical orders. Traditional analysis tools within fault tree analysis can be used tohelp identify the most significant threat scenarios such as importance analysis and cutset assessments.
机译:传统上,威胁危害评估被视为一种归纳分析技术,旨在评估影响 生命周期内的威胁会影响武器系统。根据MIL-STD-2105,可能有十一项测试 用于模拟这些威胁。这些测试中有四个代表环境威胁,另外七个涉及 异常但潜在的可信威胁。对于许多涉及弹药开发不灵敏的项目, 归纳方法之所以有意义,是因为它有潜力识别以前未知的威胁。自下而上 但是,该方法会创建一个大型分析文档,其预期结果指示出这11种测试中的哪一种 应用。对于具有确定的生命周期和威胁环境的系统,自上而下的方法可能是 更合适。使用功能故障树模型,将导致十一个测试之一的威胁 情景可以评估。这种方法可以更简化地分析威胁,并且可以用来 消除不切实际的威胁,同时提供合理的分析框架以证明结论的正确性。好处 这种方法的特点是可以更快地确定威胁的特征,确定是否需要进行测试可以 更简洁地实现,最终结果与归纳法相同。分析人员仍然需要 确定可信威胁的特征并定制十一项测试,以与产品的生命周期环境特征保持一致 以及其中包含的威胁。但是,可以更加集中精力确定威胁偏离的位置 从军事标准和技术命令。故障树分析中的传统分析工具可用于 帮助确定最重要的威胁情况,例如重要性分析和割据评估。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号