Method and system for constructing fault tree based on mind map
A technology of mind mapping and construction methods, which is applied in general control systems, control/regulation systems, test/monitoring control systems, etc., and can solve problems such as inconsistent functional design, poor reusability, and heavy workload of fault tree construction and confirmation.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0034] see figure 1 As shown, a method for constructing a fault tree based on a mind map shown in this embodiment includes the following steps:
[0035] Step 1. Analyze the functional information flow diagram of the system architecture, determine the equipment through which the functional information flows from the source to the end point, and draw a mind map of the functional information flow based on this; where a node in the mind map corresponds to the functional information A device that flows through.
[0036] As an example, the functional information flow diagram is as follows figure 2 As shown, information source 1 (RM1) and information source 2 (RM2) perceive external information, which can be understood as information collection devices such as sensors, and information synthesis equipment (PM) comprehensively processes the data of information source 1 and information source 2, and then Hand over the processing results to the information display unit (DU) for displa...
Embodiment 2
[0048] This embodiment provides a mind map-based fault tree construction system that implements the mind map-based fault tree construction method described in Embodiment 1, including a mind map construction module, a security configuration module, Fault tree building block and fault tree output block.
[0049] The mind map building block is used to analyze the imported functional information flow diagram, determine the equipment through which the functional information flows from the source to the end point, and draw a mind map of the functional information flow based on this; among them, the A node corresponds to a device through which functional information flows.
[0050]The security configuration module is used to collect the loss probability and error probability of each node in the mind map, that is, the availability index of the equipment and the integrity index of the equipment. At the same time, it collects the security information of the power supply equipment that s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


