Conference Paper

A unified approach to failure mode, effects and criticality analysis (FMECA)

US DOE, Washington, DC
DOI: 10.1109/ARMS.1991.154445 Conference: Reliability and Maintainability Symposium, 1991. Proceedings., Annual
Source: IEEE Xplore


A unified approach in performing a failure mode, effects and
criticality analysis (FMECA) is described. This procedure provides a
technique for performing a thorough analysis that can identify
engineering problem areas and failure modes at specific plant levels,
and contribute to the validity of design review process. It provides
formats for documenting plant/equipment operating characteristics so
that failure modes can readily be identified with a functional
characteristic. In addition, it gives an analytical technique that can
identify necessary corrective action with which top management can make
critical decisions

41 Reads
  • Source
    • "Lambert and Patterson (2002) demonstrate identification of delay scenarios in hurricane recovery of a transportation agency. Wei et al. (1991) describe failure mode, effects and criticality analysis for scenario identification. Scheringer (2001) performs scenario based risk assessment to "
    [Show abstract] [Hide abstract]
    ABSTRACT: We describe a method for tracking model complexity in system vulnerability analysis. The method builds on the collection of risk scenarios describing known vulnerabilities of systems and system components. We introduce the concept of an interaction as a mapping between a risk scenario and one or more system components. An interaction is direct when the mapping is obvious. An interaction is indirect when the mapping can make use of nonobvious relationships among system components. Indirect interactions characterize the rippling effects of a risk scenario and are used to identify the nonobvious interdependencies. With the above foundation, the method extends traditional process control charts to track evolving knowledge of scenarios and systems. The charts signal the emergence of anomalous variation in emerging knowledge of system vulnerability. The method is applied iteratively to avoid situations of surprise in an emerging model (scenarios and systems) of system vulnerability. An application of the method is discussed
    Preview · Conference Paper · May 2004
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: A new concept is appearing in the field of man-machine interaction: the design of “intelligent” interfaces. The aims of this article are threefold, first to show what an “intelligent” interface is and present a five-step design process for such an interface–specifically: (1) man-machine system analysis; (2) operator, task, and process modeling; (3) specifying those assistance tools that form an “intelligent” interface; (4) realization of the assistance tool; and (5) evaluation. The second part describes the structure of an “intelligent” interface, called D.M.I. (Decisional Module of Imagery), which is currently being developed. The final part explains the D.M.I.'s development, using the five process steps outlined above.
    Full-text · Article · Apr 1992 · International Journal of Human Factors in Manufacturing
  • [Show abstract] [Hide abstract]
    ABSTRACT: The feasibility of integrating failure modes and effects analysis (FMEA) and sneak circuit analysis (SCA) into a comprehensive reliability analysis technique is examined especially from the perspective of automation. FMEA looks at a system's strengths and weaknesses; SCA looks for latent circuit conditions which may lead to unplanned or unexpected modes of operation. The goals of the two techniques complement each other and their combination results in a more comprehensive analysis than either technique alone can achieve. The rich collection of heuristics used in SCA can be applied to design validation and also used as guidelines at various stages of system design. At both the functional level and the component level, the combined analysis is done using the same circuit representation as for the SCA and for the FMEA, and draws on the same database
    No preview · Conference Paper · Feb 1993
Show more