欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    REG NASA-LLIS-0837-2000 Lessons Learned False Alarm Mitigation Techniques.pdf

    • 资源ID:1018483       资源大小:20.54KB        全文页数:5页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    REG NASA-LLIS-0837-2000 Lessons Learned False Alarm Mitigation Techniques.pdf

    1、Best Practices Entry: Best Practice Info:a71 Committee Approval Date: 2000-04-20a71 Center Point of Contact: JSCa71 Submitted by: Wil HarkinsSubject: False Alarm Mitigation Techniques Practice: Minimize the occurrence and effect of Built In Test (BIT) false alarms by applying principles and techniqu

    2、es that are intended to reduce the probability of false alarms and increase the reliability of BIT in avionics and other electronic equipment.Programs that Certify Usage: This practice has been used on International Space Station Program and the National Space Transportation System.Center to Contact

    3、 for Information: JSCImplementation Method: This Lesson Learned is based on Maintainability Technique number DFE-2 from NASA Technical Memorandum 4628, Recommended Techniques for Effective Maintainability.Benefit:Effectively implementing Built-in-Test (BIT) techniques automatically reduces the numbe

    4、r of BIT false alarms. Decreasing the number of BIT false alarms increases a systems availability and decreases the maintenance man-hours required. The overall result is a reduction of the systems life cycle cost.Provided by IHSNot for ResaleNo reproduction or networking permitted without license fr

    5、om IHS-,-,-Implementation Method:To mitigate false alarms, a systems BIT circuitry must be able to cope with a limited amount of anomalous performance. NASA Handbook 5300.4 (1E) defines a false alarm as “an indicated fault where no fault exists.“ Based on this definition, this technique is concerned

    6、 only with BIT indications of system malfunction which cause unnecessary maintenance actions. The inability of a system to detect or report the occurrence of a failure, a “fails to alarm condition“, is not a false alarm and is not addressed.BIT should be designed to distinguish between actual failur

    7、es and anomalies which must be tolerated due to adverse operating conditions or that are normal anomalies within acceptable limits. To accomplish this, the following principles and techniques must be mandated in the system specifications, requirement documents, and design policies and implemented in

    8、 the system design.Voting SchemeOne technique is called the “Voting Scheme.“ With the voting scheme, all test data are analyzed by three or more different computers. A failure is declared only when a majority of the computers detect the same failure. An example of this type of architecture is the Sp

    9、ace Shuttle Orbiter Avionics System. The five General Purpose Computers (GPCs) are all interconnected to the same 28 serial data channels. The GPCs perform all system-level processing and require a majority agreement on all test signals. This technique requires an extensive use of resources but is e

    10、xtremely effective at mitigating false alarms. A less complicated version of this is the use of double or triple redundant monitors. Having two or more sensors in series increases the reliability of the test data reported while only requiring a single computer or processor.Continuous MonitoringConti

    11、nuous monitoring with BIT filtering can be used in place of the voting scheme. With this technique, BIT results are based on a integration of successive measurements of a signal over a period of time instead of a single check of the signal. The monitoring of the signal does not have to be continuous

    12、 but only sampled over the time period. The filtering involves comparing the current reading of a signal with past and future readings of the same signal. This filtering allows for the disregarding of sporadic out-of-limit measurements. Only when a signal is out-of-limits for a predefined time limit

    13、 or a sequence of tests identify the same failure, should the BIT flag be set.To maximize the effectiveness of continuous monitoring, the BIT data must be recorded. Once recorded, the data need to be summarized and evaluated so that trends can be tracked and weaknesses identified. Controls should be

    14、 implemented to help manage all of this data. The number of signals monitored and the maximum sample rate can be limited. The time span over which data are collected should be set at a reasonable period, and the type of data accumulated should be restricted. Finally, computing techniques can be used

    15、 that do not require the storage of old data. Once the information is Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-gathered, a failure log should be created.This failure log is the basis for future modifications to the systems BIT. To improve the

    16、BIT, every instant of anomalous performance not related to an identified failure mode should be analyzed and the root causes identified. Some form of corrective action must be taken to avoid recurrence. If a design change cannot be made, then the BIT must be modified to accommodate the non-failure c

    17、ausing anomaly.The need for modification requires BIT to be flexible. Test parameters and limits must be easily changed. The operator should be able to control or even change the test sequence. This flexibility allows the necessary changes in the BIT to be made if false alarms start occurring. For e

    18、xample, the Space Stations Command and Data Handling System uses programmable Deadman Timers in the multiplexer/demultiplexer (MDMs) and standard data processor (SDPs). The response intervals of the timers can be adjusted by the system controller to accommodate changes in system configuration or mod

    19、e of operation. However, the BIT software must be changed without disturbing the system operation. For this to be possible, the BIT software must be independent of the operating software.Decentralized ArchitectureAnother technique for mitigating false alarms is the use of a distributed or decentrali

    20、zed BIT architecture. With this approach the BIT is implemented so that a “NO GO“ on a given test directly isolates the implied failure to a replaceable unit. Locating most of the BIT internal to a unit greatly reduces the possibility of incorrect isolation of a failure. Although the decentralized B

    21、IT concept consists primarily of unit level tests, some system level testing is still required.An excellent technology for combining unit level testing with system level testing is boundary scan. Boundary scan is the application of a partitioning scan ring at the boundary of integrated circuit (IC)

    22、designs to provide controllability and observability access via scan operations. In Figure 1, an IC is shown with an application logic section, related input and output, and a boundary scan path consisting of a series of boundary scan cells (BSC), one BSC per IC function pin. The BSCs are interconne

    23、cted to form a scan path between the host ICs Test Data Input (TDI) pin and Test Data Output (TDO) pin, for serial access.Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-refer to D descriptionD Figure 1. Integrated Circuit with Boundary Scan Paths Du

    24、ring normal IC operation, input and output signals pass freely through each BSC, from the Normal Data Input (NDI) to the Normal Data Output (NDO). However, when the boundary test mode is entered, the ICs boundary is partitioned in such a way that test stimulus can be shifted in and applied from each

    25、 BSC output (NDO). The test response can then be captured at each BSC input (NDI) and shifted out for inspection. Internal testing of the application logic is accomplished by applying test stimulus from the input BSCs and capturing test response at the output BSCs. External testing of wiring interco

    26、nnects and neighboring ICs on a board assembly is accomplished by applying test stimulus from the output BSCs and capturing test response at the input BSCs. This application of a scan path at the boundary of IC designs provides an embedded testing capability that can overcome test access problems. T

    27、he unit level tests can also be combined for a subsystem or system level verification (Figure 2). More details on applying these techniques are in IEEE Standards 1149.1 “Boundary Scan“ and 1149.5 “System and Maintenance Bus.“refer to D descriptionD Figure 2: Typical Test Regimen for Space Systems Fi

    28、nally, high-reliability components should be used in the design. The reliability of the BIT hardware should at least equal or exceed that of the hardware it is testing. The BIT software also needs to be thoroughly tested and verified to ensure that it will not be a source of false alarms. Accordingl

    29、y, adequate amounts of effort and resources must be allocated during the design phase. The designer Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-should not be unduly limited by memory size, component count, or any other allocated resource.These gu

    30、idelines are not all inclusive. The false alarm problem is very complex. Each system is unique and must be approached differently. The best approach is simply to eliminate each factor as it is identified.References:1. Coppola, Anthony, A Design Guide for Built-In-Test (BIT), RADC-TR-78-224, April 19

    31、79.2. Malcolm, John G., Highland, Richard W., Analysis of Built-In-Test False Alarm Conditions, RADC-TR-81-220, August 1981.3. NASA Handbook 5300.4 (1E), Maintainability Program Requirements for Space Systems, March 10, 1987.4. Texas Instruments Inc., TESTABILITY, Test and Emulation Primer, 1989.Imp

    32、act of Non-Practice: The reliability of a systems BIT can be determined in part by the number of false alarms it experiences. If the BIT can not accurately identify and report the occurrence of failures then the test has failed its mission. Testability must be treated with the same level of importan

    33、ce as other design disciplines. BIT reliability must be considered just as critical as any other performance requirement. A system cannot perform its mission if its components are constantly being removed for false maintenance.Related Practices: N/AAdditional Info: Approval Info: a71 Approval Date: 2000-04-20a71 Approval Name: Eric Raynora71 Approval Organization: QSa71 Approval Phone Number: 202-358-4738Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-


    注意事项

    本文(REG NASA-LLIS-0837-2000 Lessons Learned False Alarm Mitigation Techniques.pdf)为本站会员(visitstep340)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开