04192024Fri
Last updateSun, 04 Feb 2024 4am

Comparing FMEDA Predicted Failure Rates to OREDA

exida has released a new white paper entitled: Comparing FMEDA Predicted Failure Rates to OREDA - Estimated Failure Rates for Sensor and Valve Assemblies.

Failure rates predicted by Failure Modes Effects and Diagnostic Analysis (FMEDA) are compared to failure rates estimated from the Offshore Reliability Data (OREDA) project for sensor and valve assemblies. Because the two methods of data analysis are fundamentally different in nature, it may be surprising that, when appropriately compared, the results from the two methods are generally quite similar. The nature of the published data for FMEDA and OREDA is explored. The relative merits of each method are discussed.

Download WhitePaper

 


Increasing safety in a wastewater treatment plant

The implementation of an automatic dosing of the flocculants allows the customer to respect (24h a day, 365 days a year) the limit for phosphate in the outlet and save a lot of money: resulting in less chemicals and sludge production.

The results

  • Saving of 26.000 €/year of flocculants (PAC)
  • 2% reduction of sludge production
  • Even with a big peak of phosphate in the inlet, the outlet was under the official limit each time

Customer challenge:

The inlet of this wastewater treatment plant is variable due to industrial high load wastewater. The manual dosing of flocculants was not enough to maintain the concentration of phosphate in the outlet under the official limit of 1 mg/l P total. The customer challenge is to respect the official outlet limit of Phosphate and manage the chemicals’ costs efficiently.

Download Success Story

 

When Good Alarms Go Bad

White Paper by Exida: Some of the significant process industries incidents occurred by overflowing vessels, including BP Texas City and Buncefield. In many overflow incidents, alarms were designed to signal the need for operator intervention. These alarms may have been identified as safeguards or layers of protection, but they did not succeed in preventing the incident. This paper reviews several overflow incidents to consider the alarm management and human factors elements of the failures.

Alarms are often cited as safeguards or independent protection layers to prevent hazardous events, yet incidents continue to occur where the alarm did not prompt action to prevent the consequence. The investigation of these incidents focuses on the root causes, but there is an opportunity to also examine the contributing factors that allowed the protection layers to fail. A set of failure mechanisms for alarms can map the failure to the activities of the alarm management lifecycle and the operator feedback model from ANSI/ISA -18.2 [1] . Many of the failures can be related to human factors failure mechanisms, or situational awareness demons. A set of similar overflow incidents are analyzed using this methodology to develop recommendations.

Download White Paper

Nike Air Max

A Users Guide to Intrinsic Safety

Intrinsic Safety.jpgIntrinsic Safety is the natural choice for all low voltage instrumentation problems. This application note looks at the design, installation, maintenance and repair of Intrinsically Safe equipment and also considers the risks associated with dust.

Intrinsic safety (IS) is a low-energy signalling technique that prevents explosions from occurring by ensuring that the energy transferred to a hazardous area is well below the energy required to initiate an explosion. The energy levels made available for signalling are small but useable and more than adequate for the majority of instrumentation systems. The two mechanisms being considered that could initiate an explosion are:

  • A spark
  • A hot surface

Download full Technical Article by MTL

Off White X Max 90

ISA introduces ISA Cybersecurity Tech Pack, a downloadable collection of its latest technical papers

To help manufacturers and plant and facility operators improve their cybersecurity defenses and better confront the growing dangers of cyberwarfare, the International Society of Automation (ISA) today announces the availability of the ISA Cybersecurity Tech Pack.

“The ISA Cybersecurity Tech Pack is an assembly of the latest technical papers, PowerPoint presentations, technical books and InTech articles developed by some of the world’s leading experts in cybersecurity and industrial automation and control systems security,” says Susan Colwell, manager of publications development at ISA. “These materials—which can be downloaded from the ISA website—include the latest cybersecurity strategies, recommendations and tools that can immediately be applied to protect your industrial control systems and process control networks.”

As a widely recognized, world leader in cybersecurity standards development, training and educational resources, ISA provides the proven technical expertise and know-how to help safeguard industrial automation and control systems.

For instance, the ANSI/ISA99 (IEC 62443), Industrial Automation and Control Systems Security standards—developed by a cross-section of international cybersecurity subject-matter experts from industry, government and academia—represent a comprehensive approach to cybersecurity in all industry sectors. ISA and its sister organization, the Automation Federation, is currently assisting the Obama administration and US federal agency officials develop the initial version of a national cybersecurity framework—as called for by President Obama in February of this year.

The ISA Cybersecurity Tech Pack also includes two cybersecurity-focused ISA books: the popular Industrial Network Security by David J. Teumim; and the recently introduced Industrial Automation and Control Systems Security Principles by Ronald L. Krutz, Ph.D. As an added bonus, the compilation includes many highly relevant and informative cybersecurity articles published in InTech magazine, ISA’s bi-monthly magazine for automation and control professionals.

Below is a complete list of what is included in the ISA Cybersecurity Tech Pack.

Technical papers

Cyber Security Implications of SIS Integration with Control Networks

Practical Nuclear Cyber Security

Establishing an Effective Plant Cybersecurity Program

LOGIIC Benchmarking Process Control Security Standards

Stronger than Firewalls: Strong Cyber-Security Protects the Safety of Industrial Sites

Integrated Perimeter and Critical Infrastructure Protection with Persistent Awareness

Applying ISA/IEC 62443 to Control Systems

Establishing an Effective Plant Cybersecurity Program

Getting Data from a Control System to the Masses While Maintaining Cybersecurity–The Case for “Data Diodes”

Reconciling Compliance and Operation with Real Cyber Security in Nuclear Power Plants

Wastewater Plant Process Protection—Process Hazard Analysis

Water/Wastewater Plant Process Protection: A different approach to SCADA cyber security

Using Cyber Security Evaluation Tool (CSET) for a Wastewater Treatment Plant

Improving Water and Wastewater SCADA Cyber Security

An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist

To learn more about or purchase the Cybersecurity Tech Pack, visit www.isa.org/PR13/CYBETechPack

Nike Tiempo Legend