Software qualification activities for safety critical software

Gee Yong Park, Se Woo Cheon, Kee Choon Kwon, Kwang Yong Koh, Poong Hyun Seong, Eunkyoung Jee, Sungduck Cha

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

Rigorous verification and validation (V&V) activities and software safety analyses have been performed on the safety critical software for a digital reactor protection system (RPS) that has been developed under the KNICS (Korea Nuclear Instrumentation and Control) project. This paper describes various V&V activities performed in the KNICS project and presents a strategy and various techniques for a software safety analysis. Some experiences obtained from the application of these activities to safety software are also presented.

Original languageEnglish
Title of host publication6th American Nuclear Society International Topical Meeting on Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies 2009
Pages312-323
Number of pages12
Publication statusPublished - 2009
Event6th American Nuclear Society International Topical Meeting on Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies 2009 - Knoxville, TN, United States
Duration: 2009 Apr 52009 Apr 9

Publication series

Name6th American Nuclear Society International Topical Meeting on Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies 2009
Volume1

Other

Other6th American Nuclear Society International Topical Meeting on Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies 2009
Country/TerritoryUnited States
CityKnoxville, TN
Period09/4/509/4/9

Keywords

  • Reactor protection system
  • Safety software
  • Software safety analysis
  • V&V activities

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Energy Engineering and Power Technology
  • Nuclear Energy and Engineering

Fingerprint

Dive into the research topics of 'Software qualification activities for safety critical software'. Together they form a unique fingerprint.

Cite this