• Beta
Software Step 2
  • 09 Aug 2024
  • 1 Minute to read
  • Contributors
  • Dark
    Light
  • PDF

Software Step 2

  • Dark
    Light
  • PDF

Article summary

Step 2 Identify Threats and Barriers (Define the CL):

Below is explained how to implement Step 2 in the Software. See also Methodology Step 2.


The Corrosion Loop (CL) that was created in Step 1 (see Creating Corrosion Loops) can now be defined:

Define CL Boundaries, Process and Potential DMs

To define the CL, capture the information that was gathered to Define the Corrosion Loop Boundaries and to Define the Corrosion Loop Process and Potential DMs. Do this in the different CL sections.

See Defining CL Boundaries, Process and Potential DMs.

As a minimum, add descriptions to the following sections:

  • Loop Description
  • Process Description
  • Corrosion Description

Define the Degradation Mechanisms

See Defining Degradation Mechanisms.

When you Assign Components to the CL, and later assign DMs to them (this happens in Step 3 Start RBI Analysis and Assign DMs to the Component), additional information (if available for these Components) will be displayed on the DM cards: Actual CRs (if the Component is set to inherit this from a Circuit – see Relationship between CLs, Components and Circuits) and Strategy (driving RBI results, driving CCAM). The associated Circuits, Components and Equipment will also become available to access from the DM card. Also, in some cases, Common Barrier types will be suggested.

See Defining Barriers (and linking to IOWs). Also see Creating and Defining IOWs.

M- and D-type Barriers require Components to be verified. This association happens automatically when you Assign Components to the CL, and then (later) assign DMs to these Components (Step 3 Start RBI Analysis and Assign DMs to the Component). The Driving RBI Consequence of all the associated Component/DM Assessments will be shown on the applicable Barrier card. Also, a Criticality Matrix will be shown, based on the selected Likelihood of LOPC and Driving RBI Consequence (or User Consequence if specified). From this Matrix the Barrier Risk is determined.

Initial Barrier Assessment

At this stage an initial Barrier Assessment can be done and you can then adjust/add Barrier information where needed. See Methodology Step 2.

Assign Components to the CL

See Assigning Components to CLs.

In Step 3 the DMs will be assigned to the Components. 



Attachments

Was this helpful? Click to add feedback comments

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Eddy AI, facilitating knowledge discovery through conversational intelligence