Computer Science ›› 2015, Vol. 42 ›› Issue (3): 124-127, 143.doi: 10.11896/j.issn.1002-137X.2015.03.025

Previous Articles     Next Articles

Research on Model Based Safety Analysis Technology for Avionics System

GU Qing-fan, WANG Guo-qing, ZHANG Li-hua and ZHAI Ming   

  • Online:2018-11-14 Published:2018-11-14

Abstract: This paper introduced a new model based method for safety analysis to address the problem of failure modes integrity,dynamic failure and data consistency currently encountered in safety assessments for integrated avionics system.The method models integrated avionics system hierarchically with layers of application operation,function and resource.It simplifies a large part of the analysis,the development of fault trees,and can guarantee the consistency of results.Event-B language is used to model application layer to check the integrity of operations modes and AltaRica is used to model dysfunction of system to solve the problem of dynamic failure.The efficiency and practice of the method are illustrated by analyzing safety of auto pilot system through Rodin tool which is used for analyzing operational modes of application and Simfia tool which is used for safety analysis.

Key words: Model based method,Avionics system,Safety analysis

[1] Society of Automotive Engineers.ARP-4761:Aerospace Recommended Practice:Guidelines and Methods for Conducting the Safety Assessment[C]∥Process on Civil Airborne Systems and Equipment.1996
[2] Papadopoulos Y,McDermid J A.Hierarchically Performed Ha-zard Origin and Propagation Studies[C]∥Proceedings of SAFECOMP ’99,18th International Conference on Computer Safety,Reliability and Security.1999
[3] Joshi A,Miller S P,Heimdahl M P E.M ode Confusion Analysis of a Flight Guidance System Using Formal Methods[C]∥Proceedings of the 22st Digital Avionics Systems Conference (DASC’03).Indianapolis,Indiana,Oct.2003:12-16
[4] Description A.[2012-01-19].http://www.lix.polytechnique.fr/~rauzy/
[5] IEC 61508 Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems[S].http://zh.wikipedia.org/wiki/IEC-61508,1998
[6] Adeline R,et al.Toward a Methodology for The AltaRica Mo-delling of Multi-Physical Systems[C]∥European Conference on Safety and Reliability (ESREL).Taylor & Francis:Rhodes,Greece,2010
[7] Liu S,McDermid J A.A Model-Oriented Approach to SafetyAnalysis Using Fault Trees and a Support System[J].Journal of Systems and Software,1996,35(2):151-164
[8] Dotti F L,Iliasov A,Ribeiro L,et al.Modal Systems:Specification,Refinement and Realization[C]∥ Proceedings of the 11th International Conference on Formal Engineering Methods:Formal Methods and Software Engineering(ICFEM’09).2009:601-619
[9] Chaudemar J-C,Bensana E,Castel C.Christel Seguin AltaRica and Event-B Models for Operational Safety Analysis:Unmanned Aerial Vehicle Case Study.[2014-03-19].http://www.lix.polytechnique.fr/~rauzy/altarica/AltaRica.html/
[10] Troubitsyna E,Laibinis L.Fault Tolerance in a Layered Architecture:a General Specification Pattern in B[C]∥Proc.of the 2nd Int.Conference on SEFM.Beijing,IEEE,2004:346-355
[11] Abrial J R.The B-book:Assigning Program to Meanings[M].CUP,1996
[12] Gallier J H.Logic for Computer Science:Foundations of Automatic Theorem Proving[M].Publications Dover,1986

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .