single-jc.php

JACIII Vol.24 No.2 pp. 232-242
doi: 10.20965/jaciii.2020.p0232
(2020)

Paper:

Characteristics for Performance Optimization of Safety-Critical System Development (SCSD)

Abdulaziz Ahmed Thawaba*,†, Azizul Azhar Ramli*, Mohd. Farhan Md. Fudzee*, and Junzo Wadata**

*Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia
86400 Parit Raja, Batu Pahat, Johor Darul Takzim, Malaysia

**Computer and Information Sciences Department, Center for Research in Data Science (CERDAS), Universiti Teknologi PETRONAS
32610 Seri Iskandar, Perak Darul Ridzuan, Malaysia

Corresponding author

Received:
January 15, 2019
Accepted:
February 5, 2020
Published:
March 20, 2020
Keywords:
safety-critical systems (SCSs), safety-critical system development (SCSD), area, system development, performance
Abstract

Safety-critical systems (SCS) are the most significant systems that affect our daily life in many areas such as flight control systems, railway systems, medical devices, nuclear systems, and military weapons. SCS failures could result in losing life or serious injuries. Improving the practices during development phases of SCS can reduce failures up to 40%, thus resulting developers to follows specific development practices and techniques. Developers should improve safety-critical system development (SCSD) by taking into account all factors and understanding the causes of failure. Previous studies have highlighted the causes of failure during the development of SCS, but for specific areas such as designs, requirements, or the human factor, while developers need to know the causes of failure in all areas and the relationship between them clearly and comprehensively. This research aims to analyze SCSD characteristics and discuss performance improvement as well as causes of failure. This paper proposed a guideline that helps developers reduce the causes of failure during SCS development. This guide has four characteristics, each with a role in improving SCSD and reducing causes of failure.

Cite this article as:
A. Thawaba, A. Ramli, M. Fudzee, and J. Wadata, “Characteristics for Performance Optimization of Safety-Critical System Development (SCSD),” J. Adv. Comput. Intell. Intell. Inform., Vol.24, No.2, pp. 232-242, 2020.
Data files:
References
  1. [1] K. S. Kushal, J. J. Paul, M. Nanda, and J. Jayanthi, “Model-based analysis of safety critical systems,” Proc. of the 2017 Int. Conf. on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp. 1-11, doi: 10.1109/ICIIECS.2017.8275937, 2017.
  2. [2] V. Kulkarni and M. Nanda, “Data driven prognosis approach for safety critical systems,” Proc. of the 2016 IEEE Int. Conf. on Recent Trends in Electronics, Information & Communication Technology (RTEICT), pp. 1699-1703, doi: 10.1109/RTEICT.2016.7808123, 2016.
  3. [3] N. Silva and M. Vieira, “Towards Making Safety-Critical Systems Safer: Learning from Mistakes,” Proc. of the 2014 IEEE Int. Symp. on Software Reliability Engineering Workshops, pp. 162-167, doi: 10.1109/ISSREW.2014.97, 2014.
  4. [4] C. Lin and W. Shen, “Applying Safety Case Pattern to Generate Assurance Cases for Safety-Critical Systems,” Proc. of the 2015 IEEE 16th Int. Symp. on High Assurance Systems Engineering, pp. 255-262, doi: 10.1109/HASE.2015.44, 2015.
  5. [5] W. Moon, K. Yoo, and Y. Choi, “Air Traffic Volume and Air Traffic Control Human Errors,” J. of Transportation Technologies, Vol.1, No.3, pp. 47-53, doi: 10.4236/jtts.2011.13007, 2011.
  6. [6] A. Fabio, “Killed by a Machine: The Therac-25,” Hackaday, 2015, https://hackaday.com/2015/10/26/killed-by-a-machine-the-therac-25/ [accessed March 4, 2019]
  7. [7] S. A. Khan, N. A. Zafar, F. Ahmad, and S. Islam, “Extending Petri net to reduce control strategies of railway interlocking system,” Applied Mathematical Modelling, Vol.38, Issue 2, pp. 413-424, doi: 10.1016/j.apm.2013.06.002, 2014.
  8. [8] J. Escribano-Barreno and M. García-Valls, “Supporting the monitoring of the verification process of critical systems’software,” arXiv: 1512.04782, 2015.
  9. [9] S. Khalid, T. Shehryar, and S. Arshad, “The role of knowledge management in global software engineering,” Proc. of the 2015 Int. Conf. on Industrial Engineering and Operations Management (IEOM), pp. 1-5, doi: 10.1109/IEOM.2015.7093908, 2015.
  10. [10] W. E. Wong, T. Gidvani, A. Lopez, R. Gao, and M. Horn, “Evaluating Software Safety Standards: A Systematic Review and Comparison,” Proc. of the 2014 IEEE 8th Int. Conf. on Software Security and Reliability-Companion (SERE-C), pp. 78-87, doi: 10.1109/SERE-C.2014.25, 2014.
  11. [11] J. J. Kwon, D. Kim, J. J. Park, and J. E. Hong, “Collision Analysis of Safety Devices to Prevent Hazards in Safety Critical Systems,” Proc. of the 2014 8th Int. Conf. on Software Security and Reliability (SERE), pp. 245-254, doi: 10.1109/SERE.2014.38, 2014.
  12. [12] S. Krämer, P. Raab, J. Mottok, and S. Racek, “Comparison of Enhanced Markov Models and Discrete Event Simulation: For Evaluation of Probabilistic Faults in Safety-Critical Real-Time Task Sets,” Proc. of the 2014 17th Euromicro Conf. on Digital System Design, pp. 591-598, doi: 10.1109/DSD.2014.42, 2014.
  13. [13] L. E. G. Martins and T. Gorschek, “Requirements Engineering for Safety-Critical Systems: Overview and Challenges,” IEEE Software, Vol.34, No.4, pp. 49-57, doi: 10.1109/MS.2017.94, 2017.
  14. [14] J. Davies, D. Milward, C.-W. Wang, and J. Welch, “Formal model-driven engineering of critical information systems,” Science of Computer Programming, Vol.103, pp. 88-113, doi: 10.1016/j.scico.2014.11.004, 2015.
  15. [15] S. R. Koo, P. H. Seong, and S. D. Cha, “Software design specification and analysis technique for the safety critical software based on programmable logic controller (PLC),” Proc. of the 8th IEEE Int. Symp. on High Assurance Systems Engineering, pp. 283-284, doi: 10.1109/HASE.2004.1281760, 2004.
  16. [16] F. C. Saunders, A. W. Gale, and A. H. Sherry, “Mapping the multi-faceted: Determinants of uncertainty in safety-critical projects,” Int. J. of Project Management, Vol.34, Issue 6, pp. 1057-1070, doi: 10.1016/j.ijproman.2016.02.003, 2016.
  17. [17] P. Trivedi and A. Sharma, “A comparative study between iterative waterfall and incremental software development life cycle model for optimizing the resources using computer simulation,” Proc. of the 2013 2nd Int. Conf. on Information Management in the Knowledge Economy, pp. 188-194, 2013.
  18. [18] M. Wiboonrat, “Applying agile to data center project,” Proc. of the 2016 Management and Innovation Technology Int. Conf. (MITicon), pp. MIT-93-MIT-98, doi: 10.1109/MITICON.2016.8025239, 2013.
  19. [19] A. I. M. Leite, “An Approach to Support the Specification of Agile Artifacts in the Development of Safety-Critical Systems,” Proc. of the 2017 IEEE 25th Int. Requirements Engineering Conf. (RE), pp. 526-531, doi: 10.1109/RE.2017.43, 2017.
  20. [20] F. McCaffery and A. Dorling, “medi-SPICE: An Overview,” Proc. of the 9th Int. Conf. on Software Process Improvement and Capability Determination (SPICE 2009), pp. 34-41, 2009.
  21. [21] T. Varkoi, R. Nevalainen, and T. Mäkinen, “Toward nuclear SPICE – integrating IEC 61508, IEC 60880 and SPICE,” J. of Software: Evolution and Process, Vol.26, Issue 3, pp. 357-365, doi: 10.1002/smr.1584, 2014.
  22. [22] S. Nair, J. L. de la Vara, M. Sabetzadeh, and D. Falessi, “Evidence management for compliance of critical systems with safety standards: A survey on the state of practice,” Information and Software Technology, Vol.60, pp. 1-15, doi: 10.1016/j.infsof.2014.12.002, 2015.
  23. [23] Y. Chang, L. Huang, H. Liu, C. Yang, and C. Chiu, “Assessing automotive functional safety microprocessor with ISO 26262 hardware requirements,” Technical Papers of 2014 Int. Symp. on VLSI Design, Automation and Test, 4pp., doi: 10.1109/VLSI-DAT.2014.6834876, 2014.
  24. [24] J. Hatcliff, A. Wassyng, T. Kelly, C. Comar, and P. Jones, “Certifiably safe software-dependent systems: challenges and directions,” Proc. of the on Future of Software Engineering (FOSE 2014), pp. 182-200, doi: 10.1145/2593882.2593895, 2014.
  25. [25] A. Freitas and R. Vieira, “An Ontology for Guiding Performance Testing,” Proc. of the 2014 IEEE/WIC/ACM Int. Joint Confs. on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), pp. 400-407, doi: 10.1109/WI-IAT.2014.62, 2014.
  26. [26] V. Kharytonov, “Software Measurement: Its Estimation and Metrics Used,” The Consortium for IT Software Quality (CISQ), 2012, https://it-cisq.org/software-meausrement-estimation-metrics/ [accessed: March 9, 2019]
  27. [27] Anuradha K, “Important Software Test Metrics and Measurements – Explained with Examples and Graphs,” Software Testing Help, 2018, https://www.softwaretestinghelp.com/software-test-metrics-and-measurements/ [accessed March 2, 2019]
  28. [28] J. Sziray, “A Test Model for Hardware and Software Systems,” J. Adv. Comput. Intell. Intell. Inform., Vol.8, No.5, pp. 523-529, doi: 10.20965/jaciii.2004.p0523, 2004.
  29. [29] K. Skogmar, “PRINCE2®, the PMBOK® Guide and ISO 21500,” 2015.
  30. [30] A. Tomer, “Software mangineeringment: teaching project management from software engineering perspective,” Proc. of the 2014 IEEE Global Engineering Education Conf. (EDUCON), pp. 1-7, doi: 10.1109/EDUCON.2014.6914698, 2014.
  31. [31] S. Yamamoto, “A Knowledge Integration Approach of Safety-critical Software Development and Operation based on the Method Architecture,” Procedia Computer Science, Vol.35, pp. 1718-1727, doi: 10.1016/j.procs.2014.08.265, 2014.
  32. [32] D. Li and M. Lu, “Automated Generation of Work Breakdown Structure and Project Network Model for Earthworks Project Planning: A Flow Network-Based Optimization Approach,” J. of Construction Engineering and Management, Vol.143, No.1, doi: 10.1061/(ASCE)CO.1943-7862.0001214, 2017.
  33. [33] E. Siami-Irdemoosa, S. R. Dindarloo, and M. Sharifzadeh, “Work breakdown structure (WBS) development for underground construction,” Automation in Construction, Vol.58, pp. 85-94, doi: 10.1016/j.autcon.2015.07.016, 2015.
  34. [34] D. Leffingwell, “SAFe® 4.0 Reference Guide: Scaled Agile Framework® for Lean Software and Systems Engineering,” 1st Edition, Addison-Wesley Professional, 2016.
  35. [35] R. Brenner and S. Wunder, “Scaled Agile Framework: Presentation and real world example,” Proc. of the 2015 IEEE 8th Int. Conf. on Software Testing, Verification and Validation Workshops (ICSTW), 2pp., doi: 10.1109/ICSTW.2015.7107411, 2015.
  36. [36] J.-L. Boulanger and Q. Ochem, “AdaCore Technologies for CENELEC EN 50128:2011,” 2018, https://www.adacore.com/books/cenelec-en-50128-2011 [accessed March 9, 2019]
  37. [37] European Committee for Electrotechnical Standardization (CENELEC), “CENELEC – EN 50128: Railway applications – Communication, signalling and processing systems - Software for railway control and protection systems,” Engineering360, 2011, https://standards.globalspec.com/std/1678027/cenelec-en-50128 [accessed March 6, 2019]
  38. [38] J.-L. Boulanger, “CENELEC 50128 and IEC 62279 Standards,” ISTE Ltd and John Wiley & Sons, Inc., 2015.
  39. [39] A. A. Thawaba, A. A. Ramli, M. F. M. Fudzee, and J. Wadata, “A Mechanism to Support Agile Frameworks Enhancing Reliability Assessment for SCS Development: A Case Study of Medical Surgery Departments,” Recent Advances on Soft Computing and Data Mining: Proc. of the 4th Int. Conf. on Soft Computing and Data Mining (SCDM 2020), doi: 10.1007/978-3-030-36056-6_7, pp. 66-76, 2020.

*This site is desgined based on HTML5 and CSS3 for modern browsers, e.g. Chrome, Firefox, Safari, Edge, Opera.

Last updated on Aug. 09, 2020