国产男女无遮挡_日本在线播放一区_国产精品黄页免费高清在线观看_国产精品爽爽爽

  • 熱門標簽

當前位置: 主頁 > 航空資料 > 國外資料 >

時間:2010-05-10 19:53來源:藍天飛行翻譯 作者:admin
曝光臺 注意防騙 網曝天貓店富美金盛家居專營店坑蒙拐騙欺詐消費者

specifications, emulators and Pseudo-Code Program Description Language products (PDL). Preliminary
code produced by code generators within case tools should be evaluated. Many techniques to be used on the
final code can be "dry run" on these design products. In fact, it is recommended that all analyses planned on
the final code should undergo their first iteration on the code-like products of the detailed design. This will
catch many errors before they reach the final code where they are more expensive to correct. The following
techniques can be used during this design phase. Description of each technique follows the list.
·  J.5.1 Design Logic Analysis
·  J.5.2 Design Data Analysis
·  J.5.3 Design Interface Analysis
·  J.5.4 Design Constraint Analysis
·  J.5.6 Software Fault Tree Analysis (SFTA)
·  J.5.7 Petri-Nets
·  J.5.8 Dynamic Flowgraph Analysis
·  J.5.9 Measurement of Complexity
·  J.5.10 Safe Subsets of Programming languages
·  J.5.11 Formal Methods and Safety-Critical Considerations
·  J.5.12 Requirements State Machines
J.5.1 Design Logic Analysis (DLA)
Design Logic Analysis (DLA) evaluates the equations, algorithms, and control logic of the software design.
Logic analysis examines the safety-critical areas of a software component. A technique for identifying
safety-critical areas is to examine each function performed by the software component. If it responds to, or
has the potential to violate one of the safety requirements, it should be considered critical and undergo logic
analysis. A technique for performing logic analysis is to analyze design descriptions and logic flows and
note discrepancies.
The ultimate, fully rigorous DLA uses the application of Formal Methods (FM). Where FM is
inappropriate, because of its high cost versus software of low cost or low criticality, simpler DLA can be
used. Less formal DLA involves a human inspector reviewing a relatively small quantity of critical software
artifacts (e.g. PDL, prototype code), and manually tracing the logic. Safety critical logic to be inspected can
include failure detection/diagnosis; redundancy management, variable alarm limits, and command inhibit
logical preconditions.
Commercial automatic software source analyzers can be used to augment this activity, but should not be
relied upon absolutely since they may suffer from deficiencies and errors, a common concern of COTS tools
and COTS in general.
FAA System Safety Handbook, Appendix J: Software Safety
December 30, 2000
J-14
J.5.2 Design Data Analysis
Design data analysis evaluates the description and intended use of each data item in the software design.
Data analysis ensures that the structure and intended use of data will not violate a safety requirement. A
technique used in performing design data analysis is to compare description-to-use of each data item in the
design logic.
Interrupts and their effect on data must receive special attention in safety-critical areas. Analysis should
verify that interrupts and interrupt handling routines do not alter critical data items used by other routines.
The integrity of each data item should be evaluated with respect to its environment and host. Shared
memory, and dynamic memory allocation can affect data integrity. Data items should also be protected from
being overwritten by unauthorized applications. Considerations of EMI affecting memory should be
reviewed in conjunction with system safety.
J.5.3 Design Interface Analysis
Design interface analysis verifies the proper design of a software component's interfaces with other
components of the system. This analysis will verify that the software component's interfaces have been
properly designed. Design interface analysis verifies that control and data linkages between interfacing
components have been properly designed. Interface requirements specifications are the sources against which
the interfaces are evaluated.
Interface characteristics to be addressed should include data encoding, error checking and synchronization.
The analysis should consider the validity and effectiveness of checksums and CRCs. The sophistication of
error checking implemented should be appropriate for the predicted bit error rate of the interface. An overall
system error rate should be defined, and budgeted to each interface. Examples of interface problems:
·  Sender sends eight-bit word with bit 7 as parity, but recipient believes bit 0 is parity.
·  Sender transmits updates at 10 Hz, but receiver only updates at 1 Hz.
·  Sender encodes word with leading bit start, but receiver decodes with trailing bit start.
 
中國航空網 www.k6050.com
航空翻譯 www.aviation.cn
本文鏈接地址:System Safety Handbook系統安全手冊下(134)
国产男女无遮挡_日本在线播放一区_国产精品黄页免费高清在线观看_国产精品爽爽爽
国产欧美一区二区三区久久人妖 | 91精品成人久久| 久久久久久久亚洲精品| 中文字幕乱码人妻综合二区三区| 欧美精品v日韩精品v国产精品| av一区二区在线看| 九九久久国产精品| 欧美一区二区在线视频观看| 久久综合婷婷综合| 在线国产99| 国产免费毛卡片| 国产精品成人av在线| 欧美亚洲免费在线| www.欧美精品一二三区| 色欲av无码一区二区人妻| 国产精品一区二区三区在线 | 久久免费高清视频| 亚洲7777| 国产精品12p| 都市激情久久久久久久久久久 | 精品无人乱码一区二区三区的优势| 国产成人短视频| 91精品久久久久久久久中文字幕| 在线视频不卡一区二区三区| 国产欧美日韩视频一区二区三区| 国产精品成人国产乱一区| 狠狠噜天天噜日日噜| 国产精品久久久久久久久久久久久 | 欧美亚洲国产免费| 91精品国产精品| 亚洲专区中文字幕| 97精品国产97久久久久久免费| 中文字幕日韩精品一区二区| 国产欧美中文字幕| 久久国产精品久久久久久久久久| 黄色小网站91| 国产精品久久久久久五月尺| 欧美久久久久久久久久久久久| 国产成人精彩在线视频九色| 日韩在线第一区| 久久精品日产第一区二区三区| 日本精品一区二区三区高清 久久| 91免费版网站入口| 天天久久人人| 日韩中文字幕视频在线| 欧美一级视频在线播放| 日韩在线视频观看| 欧美牲交a欧美牲交aⅴ免费真| 日韩视频免费大全中文字幕| 男人的天堂成人| 精品国产中文字幕| 99免费视频观看| 日本在线视频不卡| 久久精品久久久久| 国产一区欧美二区三区| 亚洲熟妇无码一区二区三区导航| 久久免费国产精品1| 人禽交欧美网站免费| 国产精品久久一区二区三区| 国产欧美精品一区二区三区-老狼| 精品高清视频| 久久久这里只有精品视频| 欧美在线日韩精品| 欧美成人精品影院| 777午夜精品福利在线观看| 欧美无砖专区免费| 这里只有精品66| 国产不卡av在线| 国产一区二区三区高清视频| 午夜精品久久久内射近拍高清| 丝袜美腿亚洲一区二区| 国产日韩欧美精品在线观看| 天堂一区二区三区| 国产精品嫩草视频| 99电影在线观看| 色综合666| 精品久久免费观看| 久久精品人成| 国产欧美精品一区二区三区介绍| 日本欧美色综合网站免费| 不用播放器成人网| 欧美激情国产精品日韩| 亚洲精品久久区二区三区蜜桃臀| 久久深夜福利免费观看| 91干在线观看| 国产日韩在线精品av| 日产国产精品精品a∨| 精品自在线视频| 国产精品视频播放| 久久免费一级片| 极品校花啪啪激情久久| 午夜精品区一区二区三| 国产精品美女无圣光视频| 国产成人精品视| 97精品视频在线| 国产欧美一区二区| 欧美精彩一区二区三区| 日韩**中文字幕毛片| 欧美激情精品在线| 久久久99久久精品女同性| 久久精品综合一区| 成人黄色一区二区| 国产欧美久久久久久| 欧美二区三区在线| 日韩欧美一区二| 中文字幕乱码人妻综合二区三区| 国产精品十八以下禁看| 色久欧美在线视频观看| 国产成人一区二区三区免费看 | 欧美国产亚洲一区| 亚洲精蜜桃久在线| 欧美大成色www永久网站婷| 久久久精品一区| 久久久久久久久一区二区| 国产激情视频一区| 久久青青草综合| 久久亚洲国产精品日日av夜夜| 国产精品影片在线观看| 国产女同一区二区| 国产乱子夫妻xx黑人xyx真爽| 国产一区免费在线观看| 欧美激情国产日韩| 欧美综合第一页| 日本成人黄色免费看| 午夜啪啪福利视频| 亚洲第一在线综合在线| 亚洲欧洲久久| 川上优av一区二区线观看| 亚洲欧洲免费无码| 亚洲精品永久www嫩草| 亚洲一区久久久| 亚洲乱码国产一区三区| 欧美极品在线播放| 国产99久久精品一区二区 夜夜躁日日躁| 国产精品无av码在线观看| 久久久极品av| 国产精品入口尤物| 国产精品成人在线| 国产精品久久九九| 国产精品高潮呻吟视频| 美日韩精品免费视频| 一区二区三区av在线| 亚洲国产日韩综合一区| 无码人妻丰满熟妇区96| 日韩在线综合网| 日本黄网免费一区二区精品| 欧美中文字幕精品| 欧美自拍资源在线| 女同一区二区| 国产欧美日韩中文| 99久久99久久| 久久久久久艹| 国产精品偷伦免费视频观看的 | 日韩在线视频在线观看| 日韩女优中文字幕| 欧美资源在线观看| 国产在线精品一区免费香蕉| 成人免费观看视频在线观看| 久久婷婷国产精品| 国产成人小视频在线观看 | 亚洲欧洲日夜超级视频| 日韩在线国产| 日韩精品―中文字幕| 国产又大又硬又粗| 91精品国产91久久久久久不卡| 久久狠狠久久综合桃花| 久久精品中文字幕| 久久久久久国产| 日韩视频在线播放| 国产一区二区三区高清| 91av在线精品| 久久久成人精品视频| 中文字幕日韩精品久久| 日韩在线观看a| 国内一区二区在线视频观看| 国产女人18毛片| 久久精品国产精品亚洲色婷婷| 国产精品欧美一区二区 | 久久国产精品久久久久| 色综合久久久久久久久五月| 欧美在线精品免播放器视频| 国产欧美亚洲视频| 久久96国产精品久久99软件| 国产精品海角社区在线观看| 午夜精品一区二区三区在线视| 欧美在线一区二区三区四| av片在线免费| 国产精品日韩在线| 日日碰狠狠躁久久躁婷婷| 国产一区二区不卡视频| 久久这里只有精品18| 久久av资源网站| 青青青国产在线视频| 99在线观看视频网站| 久久久精品中文字幕| 婷婷久久五月天| 国产女大学生av| 国产精品色午夜在线观看| 亚洲成熟丰满熟妇高潮xxxxx| 精品少妇一区二区三区在线|