Analyze driverless system security from eight steps

Strictly speaking, there are many restrictions on Automated road transport systems in CityMobil2, not only the automatic system itself, but also system applications. Before implementation, a system security assessment and analysis is needed. After the investment, there will be no legal issues that are very entangled in the follow-up (this is applied in Europe). The focus here is on the process of the entire system safety assessment and examples of assessments on the edge of the Italian beach.

The whole process is divided into eight major steps.

1) Project evaluation

2) PHA initial hazard list assessment: In short, here we have extended the safety of the HARA from the original to the inside of the car to the people inside and outside the car.

3) FMECA system failure mode, impact and hazard analysis

4) System security & functional safety confirmation

This involves the design requirements of the carrier of the automatic operation system, the engineering implementation and the failure mode, impact and harm of the engineering implementation itself, and the problems that may occur in itself are also updated to the hazard list. In a sense, it is more like a broader functional safety concept and system design implementation process.

5) Operation description

6) Operational preparation confirmation

Technically, this initial system works like a tram without a track. Therefore, from the allocation of road resources, to the speed limit of roads, to the analysis of road conditions, these tasks are actually very detailed. The technical state of CityMobil2 is now a separate lane from the motor vehicle that can be shared with the bicycle.

7) Design security status + operational safety status assessment

8) Operational testing

Take Oristano, Sardinia, Italy as an example. The road is not long and the site is set up.

Here is a beach, divided into eight stations, in the middle of the road through the middle of the area as a road back and forth. The specific task is to evaluate the vision of each segment and assess the possible problems when a person suddenly rushes out or the bicycle rushes out.

1) Analyze detectable and non-detectable areas at each specific intersection

2) It is also necessary to distinguish here that some people concentrate on not needing to judge that this person may suddenly cross the road. The most important thing here is to outline the crowds.

3) Through the adjustment of the infrastructure, the vehicle is designed to reflect the braking time of pedestrians and bicycles to improve the maximum speed of the vehicle through the crosswalk line.

After reading this carefully, I have some thoughts:

1) The design here is based on most pedestrians or pedestrian crossings crossing the road

2) The motor vehicles here are not allowed to enter, similar to the concept of pedestrian street

3) There are no non-motor vehicles with high speed and acceleration such as electric bicycles.

4) In the case of a large number of people, the best way for the vehicle is to wait for people to go to the beach, but in the parks, tourist attractions, and peak periods in China, the car will wait. In the urban environment, the implementation of the people is not only very difficult to detect, but the vehicle movement strategy is not good.

summary:

1) Really understand the limitations of a system's safe operation. In fact, there is a lot of attention. After running this model, it still takes a lot of effort.

2) What we see and what we actually do, it takes a lot of work.

FINGERPRINT BURGLARY SAFES

FINGERPRINT burglary SAFES have passed Chinese 3C certification and are equipped with state of the art fingerprint identification systems.

Details:

These Fingerprint safes have hidden fingerprint verification and high precision scanning;

Our patent: dual system protection is included;

The shelf is removable;

Our safes are side door safes with an independently installed board.


Fingerprint Burglary Safe

Fingerprint Sensor,Fingerprint Safe Box,Safe Fingerprint,Fingerprint Lock Safe

YONGFA INTELLIGENT TECHNOLOGY SECURITY CO., LTD. , https://www.yongfa-safe.com

Posted on