ImageVerifierCode 换一换
格式:PDF , 页数:344 ,大小:11.01MB ,
资源ID:445277      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-445277.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ARMY MIL-HDBK-764-1990 SYSTEM SAFETY ENGINEERING DESIGN GUIDE FOR ARMY MATERIEL《军用品的系统安全工程设计指导》.pdf)为本站会员(wealthynice100)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ARMY MIL-HDBK-764-1990 SYSTEM SAFETY ENGINEERING DESIGN GUIDE FOR ARMY MATERIEL《军用品的系统安全工程设计指导》.pdf

1、MIL-HDBK-7b4 SA 7799770 005257b 7 I MIL-HDBK-764(MI) MILITARY HANDBOOK 12 JANUARY 1990 SYSTEM SAFETY ENGINEERING DESIGN GUIDE FOR ARMY MATERIEL AREA SAFT AMSC N/A DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited, Provided by IHS Not for Resale No reproduction or netwo

2、rking permitted without license from IHS -,-,-FOREWORD 1, This military handbook is approved for use by all Activities and Agencies of the Department of the Army and is available for use by all Departments and Agencies of the Department of Defense. 2. Beneficial comments (recommendations, additions,

3、 deletions) and any pertinent data that may be of use in improving this document should be addressed to: Director, US Army AMC Field Safety Activity, ATTN: AMXOS- SE, Charlestown, IN 47 1 1 1-9669, by using the self-addressed Standardization Document Improvement Proposal (DD Form 1426) appearing at

4、the end of this document or by letter. 3. This handbook was developed under the auspices of the US Army Materiel Commands Engineering Design Handbook Program, which is under the direction of the US Army Management Engineering College. Research Triangle Institute was the prime contractor for the prep

5、aration of this handbook, which was prepared under Contract NO. DAAG34-73-C-005 1 I ii Provided by IHS Not for Resale No reproduction or networking permitted without license from IHS -,-,-MIL-HDBK-764 SA U 7977970 0052578 2 m MIL-HDBK-764( M i) CONTENTS Paragraph Page FOREWORD ii LIST OF TABLES xvi

6、LIST OF ABBREVIATIONS AND ACRONYMS . xv111 LIST OF ILLUSTRATIONS :x111 . . PART ONE SYSTEM SAFETY CHAPTER 1 INTRODUCTION TO SYSTEM SAFETY 1-1 PHILOSOPHY . 1-1 1-1.1 1-1.2 OUTDATED CONCEPTS OF ARMY ACCIDENT CAUSES 1-1 SYSTEM SAFETY POLICY AND FUNDAMENTAL CONCEPTS . 1-2 1-2 HISTORY . 1-2 1-3 PRODUCT L

7、IABILITY . 1-3 THE CONTRACTOR AND THE GOVERNMENT . 1-3 1-3.1 1-3.1 . 1 Special Contractor Exposure . 1-3 1-3.1.2 Relaxing the Immunity of the Government 1-3 CONTRACTOR AND GOVERNMENT LIABILITY AND THE MILITARY PERSON . 1-4 THE ROLE OF SYSTEM SAFETY IN PRODUCT LIABILITY 1-5 PRODUCT LIABILITY SUMMARY

8、. 1-5 1-3.2 1-3.3 1-3.4 SYSTEM SAFETY PROGRAM REQUIREMENTS 1-5 1-4.1 DEPARTMENT OF DEFENSE DOCUMENTATION 1-6 1-4.2 DEPARTMENT OF THE ARMY DOCUMENTATION . 1-6 1-4.3 THE US ARMY MATERIEL COMMAND DOCUMENTATION . 1-6 1-4.4 MIL-STD-882 1-6 . 1-4 1-5 SYSTEM SAFETY ENGINEERING AND OTHER DISCIPLINES- 1-7 1-

9、5.1 DESIGN ENGINEERING . 1-7 HUMAN FACTORS ENGINEERING 1-7 RELIABILITY ENGINEERING . . 1-7 1-5.2 1-5.3 1-5.4 MAINTAINABILITY ENGINEERING 1-8 1-5.5 MAINTENANCE?ENGINEERING 1-8 . 1-5.6 TEST ENGINEERING 1-8 1-5.7 PRODUCTION ENGINEERING . 1-8 1-5.8 QUALITY ENGINEERING AND CONTROL . 1-8 1-5.9 INDUSTRIAL

10、HYGIENE . 1-8 SYSTEM SAFETY ENGINEERING AND MANAGEMENT ACTIVITIES 1-9 1-6.1 CONTRACTING . 1-9 1-6.3 1-7 COOPERATION AND INTEGRATION FOR HIGHEST SAFETY LEVEL . 1-9 REFERENCES . 1-9 BIBLIOGRAPHY . 1-10 1-5.10 TRAINING 1-8 1-6 1-62 BUDGETING 1-9 LEGAL ._ -1-9 Provided by IHS Not for Resale No reproduct

11、ion or networking permitted without license from IHS -,-,-VIL-HDBK-7b4 SA 9777770 0052577 4 2- I 2-2 2-3 2-4 2-5 CONTENTS (contd) CHAPTER 2 SAFETY ENGINEERING CONCEPTS AND OBJECTIVES OBJECTIVES . 2-1 LIFE CYCLE APPROACH TO SYSTEM SAFETY . 2-1 2-2.1 SAFETY PROGRAM ACTIONS . 2-2 2-2.2 LIFE CYCLE PHASE

12、S AND SYSTEM SAFETY REQUIREMENTS DURING THE LIFE CYCLE . 2-2 2-2.2.1 Concept Exploration Phase . 2-3 2-2.2.2 Demonstration and Validation Phase 2-4 2-2.2.3 Full-Scale Development Phase 2-5 2-2.2.4 Production and Deployment Phase . 2-4 2-2.2.5 Operating and Support Phase 2-7 2-2.2.5.1 Disposal Action

13、 . 2-7 2-2.2.5.2 Disposal Safety Considerations 2-8 2-2.2.6 System Safety Life Cycle Checklist 2-8 DESIGN CRITERIA, SAFETY ANALYSES. AND SAFETY VERIFICATION . 2-9 2-3.1 THE NATURE OF SAFETY DESIGN CRITERIA . 2-9 2-3.2 M ETUODS OF PRQOF OF SAFETY . 2-11 SAFETY DESIGN REVIEWS . 2-11 2-4 .I INTERDMCiPL

14、INARY DESIGN REVIEW . 2-1 1 2-4.2 SPECIFIC SAFETY REVIEW 2-12 . RISK MANAGEMENT . : 2-12 2-5 1 YAZARR IDNTIFICATIUN-MECEssARY FIRST STEP 2-12 2-5.2 QUANTITATIVE RISK ASSESSMENT METHODS . 2-12 2-S.XI . Probabilities of Occurrence 2-12 24.2.2 Toxicology Quantification . ; . 2-13 M. . 5-33 5-6.1 DESCRI

15、PTION AND PURPOSE 5-34 5-6.2.1 Techniques . 5-35 5-6.2.1.2 Clues . 537 5-6.2.2 Format 5-37 5-6.2.3 Guidelines . 539 5-6.2 TECHNIQUE AND FORMAT . 5-34 5-6.2.1.1 Topographical Patterns . 5-35 5-6.3 SOURCES OF DATA . 5-39 5-6.4 EXAMPLE 5-40 5-6.5 ADVANTAGES 5-40 . 5-6.6 LIMITATIONS . 5-41 REFERENCES .

16、5-47 BIBLIOGRAPHY . 5-47 CHAPTER 6 SYSTEM HAZARD ANALYSIS 6-1 DESCRIPTION AND PURPOSE 6-1 6-1.1 INTERFACES . 6-1 6-1.1.1 Physical Relationships . 6-1 6-1.1.2 Functional Relationships . 6-2 6-1.1.3 Flow Relationships 6-2 6-1.2 METHODS OF ANALYSIS . 6-3 6-2 ANALYSIS FORMAT AND TECHNIQUE 6-3 6-2.2 FORM

17、ATS 6-3 6-2.2 TECHNIQUES 6-4 6-2.2.1 6-2.2.2 Narrative and Tabular Analyses 6-4 Failiire Mode. Effects . and Criticality Analysis 6-4 vii Provided by IHS Not for Resale No reproduction or networking permitted without license from IHS -,-,-.-.-.-. MIL-HDBK-764 SA 7777770 0052583 b a M lk-FiD. 7-2 HOW

18、 S.OFWARE 7-3 7-4 FETY , . , , , . -7-2: METHQDS FOR DJSURIN.6 SAFE S.0FTWPiR.E . 7.3, TECHNIQUE AND: FORMAT T. 3 - 74 .I TE.CHNIQUIZ RATIONALE . , , , , 7-3 74.2. PROPOSED FQHMAT .,. . , . 74 ANALYSIS TEHNJQEJES . , . 7-7- 7-5.1 PR-ELIMNARY EAZARD ANALYSIS/ FAULT BAZA.RD ANALYSIS , . 7-8 7-5.2 LOGI

19、C D.EAGRAM$ . r-9 7-5.3 7-5.4 NUCLEAR SAFETY CROSS-CHECK ANALYSES , . 7.1. 2 7-5.5 SOFTWARE SNEAK AN.ALYSIS .7 12 7-5.6 OPERATING . HAZARD ANALYS.IS . , , . , , . , , , , .7-1 3. 7-6 EXAMPLE 7.14 7-6.1 BACKGROUND . 7-14 7-6.2 LOGIC , 7-14 7-6.3 COMPUTER SOFTWARE PROGRAM , . 7-14 7-6.4 ADVANTAGES , 7

20、.19 . 7-5 . SOFTWARE FAULT TREE ANALYSE . 7-10 ANALYSIS , , , , . , 7.19 LIMITATIONS . , , , . 7-20 REFERENCES . , , . ., , , . , , . , , , I . , . , , , . , , , 7.20 7-7 7-8 BIBLIOGRAPHY . 7-21 CHAPTER 8 OPERATING AND S.UPPORT HAZARD ANALYSIS 8-0 DESCRIPTION AND PURPOSE . , , . 8-1 8-2 PROCEDURE AN

21、ALYSIS .,. 8-1 8.-2.1 DESCRIPTION AXD PURPOSE . . 8-1 8-2.2 ANALYSIS TECHNIQUE AND FORMAT . 8-2 8-2.2.1 Phase 1 Analysis 8-2 . VI11 . Provided by IHS Not for Resale No reproduction or networking permitted without license from IHS -,-,-MIL-HDBK-764 SA 7797970 0052584 MI L-HDBK-764( MI) CONTENTS (eont

22、d) 8-2.2.1.1 Technique for Phase 1 8-2 8-2.2.1.2 Format for Phase 1 . 8-2 Phase 2 Analysis 8-2 8-2.2.2.1 Technique for Phase 2 8-2 8-2.2.2.2 Format for Phase 2 . 8-4 8-2.3 SOURCES OF DATA i 8-4 8-2.4 EXAMPLE 8-10 8-2.5 ADVANTAGES 8-10 8-2.6 LIMITATIONS . 8-10 CONTINGENCY ANALYSIS . ., . -8-10 8-3.1

23、DESCRIPTION AND PURPOSE 8-10 8-3.2 8-2.2.2 8-3 ANALYSIS TECHNIQUE AND FORMAT . 8-13 8-3.2.1 Technique 8-13 8-3.2.2 Format 8-13 8-3.3. SOURCES OF DATA 8-15 8-1.4 EXAMPLE 8-15 8-3.5 ADVANTAGES 8-15 8-3.6 LIMITATIONS . 8-15 -REFERENCES . 8-15 BIBLIOGRAPHY . 8-15 PART THREE GENERAL DESIGN REQUIREMENTS C

24、HAPTER 9 CONSIDERATIONS FOR GENERAL DESIGN APPLICATIONS 6 9-0 LIST OF SYMBOLS 9-1 9-1 INTRODUCTION 9. 1 9-1.1 METHODS OF CONTROL 9-1 9-1.2 ACCEPTABLE CONDITIONS . 9-2 9-1.3 UNDESIRABLE CONDITIONS 9-4 9-2 HAZARD CONTROL METHODS . 9-4 9-2.1 THE ENERGY CONCEPT . 9-4 9-2.2 INTRINSIC SAFETY . 9-4 9-2.2.1

25、 Hazard Elimination . 9-5 9-2.2.2 Hazard-Level Limitation . 9.5 9-2.3 ISOLATION 9-5 9-2.4 LOCKOUTS, LOCKINS, AND INTERLOCKS . 9-6 . 9-2.4.1 .Lockouts and Lockins . 9-6 9-2.4.2 Interlocks . 9.7 9-2.5 FAIL-SAFE DESIGNS . 9-9 9-2.6 FAILURE MINIMIZATION 9-10 9-2.6.1 Failure Rate Reduction . . 9-11 9-2.6

26、.1.1 Derating . 9.12 9-2.6.1.2 Redundancy . 9-12 9-2.6.1.2.1 Parallel Redundancy 9-12 9-2.6.1.2.2 Decision Redundancy . 9-14 9-2.6.1.2.3 Standby System Redundancy . 9-15 9-2.6.1.2.4 Series Redundancy . 9-16 9-2.6.1.3 Screening 9. 16 9-2.6.l.3.1 Weak-Link Screening . 9-16 9-2.6.1.3.2 Burn-In Screenin

27、g 9-17 ix Provided by IHS Not for Resale No reproduction or networking permitted without license from IHS -,-,-MIL-HDBK-764 SA M 7977970 0052585 T M M I L-H D BK-Y64(M t) CONTENTS (contd) 9-2.6.1.3.3 Accelerated-Life Screening . 9-17 9-2.6.1.4 Timed Replacements 9-17 9-2.6.2.2 Measurement 9-19 9-2.6

28、.2.4 Response 9-19 Backout and Recovery . 9-20 9-2.7 SAFETY FACTORS :9-20 9-2.7.2 Electrical Components . 9-21 9-2.8 WARNING DEVICES 9-22 9-2.6.2 Monitoring 9-18 9-2.6.2.1 Detection 9-18 9-2.6.2.3 Interpretation . 9-19 9-2.6.3 9-2.7.1 History and Uses of Safety Factors 9-20 9-2.8.1 Introduction 9-22

29、 9-2.8.2 Label Versus All Human Senses 9-22 9-2.8.3 Visual Warnings 9-22 9-2.8.5 Olfactive Warnings 9-23 9-2.8.4 Auditory Warnings 9-23 9-2.8.6 Tactile Warnings 9-24 9-2.8.7 Gustatory Warnings . 9-24 9-2.9 LABELING 9-24 9-2.9.1 General 9-24 9-2.9.2 Design Requirements for Labels 9-24 9-2.9.3 9-2.9.4

30、 Sources of Logos and Symbofs 9-26 9-2.9.5 Labels: A Last Resort 9-26 9-2.10.1 . Physical solation . 9-27 9-2.10.2 Personal Protective Equipment . . 9-28 9-2.10.3 Energy-Absorbing Mechanisms . 9-29 9-2.1 1 ESCAPE AND RESCUE . 9-29 9-2.1 i . I Escape and Survival Procedures and Equipment . 9-30 9-2;

31、11.2 Rescue Procedures and Equipment 9-30 9-2.12 WEAK LINKS 9-31 9-2.13 SAFE TEST CONSIDERATIONS . -9-32 REFERENCES . 9-35 BIBLIOGRAPHY . 9-35 Recommended Labeling Procedure . 9-25 9-2.10 MINIMIZATION AND CONTAINMENT OF INJURY AND DAMAGE 9-27 CHAPTER 10 HAZARDS 10-1 10-2 10-3 10-4 .y INTRODUCTION .

32、10-1 ENVIRONMENT 10-1 10-2.1 TOLERANCE AND SAFE EXPOSURE LIMITS . 10-10 10-2.2 POTENTIAL HAZARD SOURCES 10-1 1 10-2.3 ENVIRONMENTAL CONTROLTECHNIQUES 10-1 1 THERMAL HAZARDS 10-12 10-3.1, TOLERANCE AND SAFE EXPOSURE LIMITS . 10-13 10-3.2 POTENTIAL HAZARD SOURCES 10-17 10-3.3 10-3.4 PRESSURE 10-22 10-

33、4.1 TOLERANCE AND SAFE EXPOUSRE LIMITS . 10-24 10-4.2 POTENTIAL HAZARD SOURCES . 10-24 10-4.3 HAZARD CONTROL TECHNIQUES 10-24 HAZARD CONTROL TECHNIQUES 10-18 SAFETY CRITERIA FOR DESIGNERS TO FOLLOW 10-22 . Provided by IHS Not for Resale No reproduction or networking permitted without license from IHS -,-,-

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1