Failure Risk Evaluation of Security System Based on Fuzzy FTA

Article Preview

Abstract:

The reliability of security system affects the ability of the system to protect people's lives and property safety. Failure risk assessment of security system is an effective method to test the reliability of the system. The fault tree analysis method has been applied to analyze the system failure risk from the angle of each part and considering the human factors. The traditional fault tree analysis method assumes that the probability of bottom events is certain to calculate the top event probability. To obtain accurate bottom events probability is difficult, even impossible because statistical data is not sufficient and the bottom events is fuzzy in fact. Analysis of the fuzzy mathematics theory is introduced into the fault tree. The calculation provides reference for the system design and management.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 945-949)

Pages:

1094-1097

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Wei Lianfang. Study on the evaluation process of security technology system [J]. China Security & Protection, 2007, 11: 25-28.

Google Scholar

[2] Itakura Shuichiro. New evaluation system for antisabotage physical protection[J]. Transactions of the Atomic Energy Society of Japan, 2008, 3(7): 12-20.

DOI: 10.3327/taesj.j06.050

Google Scholar

[3] Jonathan Pollet, Joe Cummins. All Hazards Approach for Assessing Readiness of Critical Infrastructure [C]. IEEE Conference on Technologies for Homeland Security, 2009: 366-372.

DOI: 10.1109/ths.2009.5168060

Google Scholar

[4] Sun Yanhua. Quantitative Evaluation of Physical Protection. System in Nuclear Power Plant, 2009, 30(1): 20-25.

Google Scholar

[5] Wu Qiong. Enterprise security system of risk evaluation model research [J]. Security and Safety Technology Magazine, 2010, 10: 10-14.

Google Scholar