{"id":13996,"date":"2017-05-30T14:00:04","date_gmt":"2017-05-30T17:00:04","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=13996"},"modified":"2017-05-30T13:25:41","modified_gmt":"2017-05-30T16:25:41","slug":"fault-tree-analysis-primer","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/fault-tree-analysis-primer\/","title":{"rendered":"Fault Tree Analysis Primer"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-13997\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2017\/05\/Fault-Tree-Analysis-Primer.jpg\" alt=\"Fault Tree Analysis Primer\" width=\"145\" height=\"217\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2017\/05\/Fault-Tree-Analysis-Primer.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2017\/05\/Fault-Tree-Analysis-Primer-100x150.jpg 100w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Clifton A Ericson II<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Maison d&#8217;\u00e9dition CreateSpace Independent Publishing<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> One of the most valuable root-cause analysis tools in the system safety toolbox is fault tree analysis (FTA). A fault tree (FT) is a graphical diagram that uses logic gates to model the various combinations of failures, faults, errors and normal events involved in causing a specified undesired event to occur. The graphical model can be translated into a mathematical model in order to compute failure probabilities and system importance measures. A FT can model all aspects of a system, including hardware, software, human actions and the environment. FTs are employed to evaluate large complex and dynamic systems, in order to understand and prevent potential safety and reliability problems. Using the rigorous and structured methodology of FT construction allows the systems analyst to model the unique combinations of fault events that can cause an UE to occur. This book provides an overview of the FTA process; it describes the symbols, terms, construction methodology and mathematics of FTA.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Clifton A Ericson II Maison d&#8217;\u00e9dition CreateSpace Independent Publishing R\u00e9sum\u00e9: One of the most valuable root-cause analysis tools in the system safety toolbox is fault tree analysis (FTA). A fault tree (FT) is a graphical diagram that uses logic gates to model the various combinations of failures, faults, errors and normal events involved in causing a specified undesired event to occur. The graphical model can be translated into a mathematical&hellip; <\/p>\n","protected":false},"author":3,"featured_media":13997,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,6,19],"tags":[],"class_list":["post-13996","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-livros","category-risco-e-perdas"],"views":283,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/13996","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=13996"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/13996\/revisions"}],"predecessor-version":[{"id":13998,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/13996\/revisions\/13998"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/13997"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=13996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=13996"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=13996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}