← All reports
PDF Excel ReqIF

Remote Weapon Station (RWS)

Verification Plan (SVP) — ISO/IEC/IEEE 15289 — Plan | IEEE 29148 §6.6
Generated 2026-03-27 — UHT Journal / universalhex.org

120
Verification Entries
133
Verification Links
11
Orphans

Verification Requirements (VER)

RefRequirementMethodTags
VER-100 Verify IFC-REQ-025: Connect instrumented BMS simulator to TDP external interface; confirm MIL-STD-6016 message exchange at minimum 115.2kbps. Pass criterion: ≥1000 tactical messages exchanged with zero framing errors over a 60-minute test at maximum data rate.
Rationale: Integration test verifying the physical radio interface meets BMS throughput requirements before field deployment.
Test verification, communications-interface-unit
VER-REQ-001 Verify SUB-REQ-001: Perform safety integrity analysis of the Dual-Channel Safety Controller design. Review channel independence, cross-channel data comparison logic, and PFD calculation against IEC 61508 SIL 3 PFD ceiling of 1e-4/hr. Pass criteria: PFD calculation shows margin ≥2x on the SIL 3 ceiling with documented assumptions.
Rationale: 1oo2D redundancy cannot be fully verified by test alone — the statistical reliability claim requires analytical demonstration using FMEDA (Failure Modes, Effects, and Diagnostic Analysis). Pass criteria require a 2x margin to account for environmental derating and manufacturing variation.
Analysis verification, safety-interlock-system, session-618, idempotency:ver-sub001-618
VER-REQ-002 Verify SUB-REQ-002: Inject arming command sequences in SIS test harness. Test cases: (a) key only — expect ARMED state NOT entered; (b) software ARM only — expect ARMED state NOT entered; (c) key then software ARM within 2s — expect ARMED state entered; (d) key then software ARM after 2s — expect ARMED state NOT entered; (e) simultaneous de-assert — expect revert to SAFE. Measure timing with oscilloscope. Pass criteria: all 5 test cases produce specified state in ≥100 trials.
Rationale: Combinatorial testing of the two-action sequence covers the four possible input combinations and the timeout path. 100 trials per case provides statistical confidence at the level appropriate for a SIL 3 function. Oscilloscope measurement verifies the 2-second window is accurately implemented.
Test verification, safety-interlock-system, sil-3, session-618, idempotency:ver-sub002-618
VER-REQ-003 Verify SUB-REQ-005: Simulate data link heartbeat dropout at SIS bench test harness. Inject heartbeat at 10Hz, then drop all packets. Measure time from last heartbeat to safe-state trigger assertion using oscilloscope capture. Repeat 50 times at -40°C, +20°C, +70°C. Pass criteria: safe-state trigger asserted within 200ms in all 150 trials across temperature range.
Rationale: Temperature range testing is required because watchdog timer accuracy can drift with temperature in hardware implementations. 50 trials per temperature point is the minimum to detect systematic failures. Oscilloscope measurement provides millisecond-accurate timing independent of any logging latency.
Test verification, safety-interlock-system, sil-2, session-618, idempotency:ver-sub005-618
VER-REQ-004 Verify SUB-REQ-008: Inject simulated faults into SIS test harness (channel mismatch, diagnostic monitor trip, output feedback discrepancy). For each fault type, measure time from fault injection to actuator de-energisation. Test latch behaviour by attempting software reset without deliberate operator sequence. Pass criteria: safe state reached within 100ms for all fault types; latch maintained until operator reset sequence confirmed by independent observer.
Rationale: Fault injection testing at component level is required by IEC 61508 to verify the diagnostic response chain. Testing the latch behaviour independently (not relying on the system's own logging) eliminates the risk that a software fault could falsely indicate a successful reset.
Test verification, safety-interlock-system, sil-3, session-618, idempotency:ver-sub008-618
VER-REQ-005 Verify IFC-REQ-011: Connect Arming Key Switch Assembly to SIS test harness. Rotate key through all 3 positions (SAFE, ARMED, MAINTENANCE-LOCKOUT). Measure voltage at controller input terminals. Simulate open-circuit (wire cut) and short-circuit faults. Verify continuity monitoring detects each fault within 10ms. Pass criteria: voltages within spec, faults detected within 10ms in ≥20 trials.
Rationale: Direct measurement at controller terminals (not at key switch) verifies the full wiring harness including connectors. Open/short fault testing validates the 100Hz continuity monitoring function that supports the fault-safe-state budget.
Test verification, safety-interlock-system, sil-3, session-618, idempotency:ver-ifc011-618
VER-REQ-006 Verify IFC-REQ-013: Apply 24VDC energise command from SIS test harness to Hardware Firing Interlock Relay. Test AND-gate logic by asserting channel A only, channel B only, and both channels. Measure relay de-energise time on command withdrawal with oscilloscope. Simulate relay weld (hold contacts closed) and verify feedback detection. Pass criteria: relay energises only on dual-channel assert; de-energises within 10ms; weld fault detected within one polling cycle.
Rationale: AND-gate functional test is required to prove the dual-channel firing barrier. Relay weld testing addresses the critical failure mode that could defeat the firing barrier without detection.
Test verification, safety-interlock-system, sil-3, session-618, idempotency:ver-ifc013-618
VER-REQ-007 The Hardware Firing Interlock Relay shall be verified to be a normally-open fail-safe relay by de-energising the coil and confirming the firing solenoid circuit reads open-circuit with resistance > 1MΩ. Test shall confirm relay reverts to normally-open state within 20ms of coil de-energisation.
Rationale: SUB-REQ-003 specifies a normally-open fail-safe relay as a SIL 3 hardware safety measure. Physical verification by circuit-open measurement confirms the fail-safe state is achieved without software intervention. The 20ms criterion matches the SIS de-energise budget.
Test session-619, qc, safety-interlock-system, sil-3, idempotency:ver-hfir-normally-open-619
VER-REQ-008 The Hardware Firing Interlock Relay shall be verified to de-energise and open the firing solenoid circuit within 10ms of receiving a FIRE-INHIBIT command, measured from command assertion to relay contact open state under maximum specified inductive load, across the full operating temperature range of -40°C to +70°C.
Rationale: SUB-REQ-004 specifies 10ms de-energise time as the SIL 3 hardware safety timing budget. Testing under worst-case inductive load and temperature extremes confirms the relay meets the budget in all operational conditions, which is required for the overall SIS response time chain.
Test session-619, qc, safety-interlock-system, sil-3, idempotency:ver-hfir-timing-619
VER-REQ-009 The Safe State Output Driver shall be verified to de-energise all actuator outputs and assert the SSOD-SAFE status signal within 50ms of Emergency Stop activation. Test shall inject E-stop signal and measure time-to-de-energise for each output channel (azimuth brake, elevation brake, firing inhibit relay) independently and simultaneously, confirmed by instrumented relay current measurement.
Rationale: SUB-REQ-006 specifies 50ms SSOD response as the intermediate timing budget within the 200ms E-stop chain required by SYS-REQ-010. Individual channel measurement catches partial-failure modes where one output de-energises but another does not, which is critical for 1oo2D SIS architecture.
Test session-619, qc, safety-interlock-system, sil-2, idempotency:ver-ssod-estop-619
VER-REQ-010 While the Arming Key Switch Assembly is in MAINTENANCE-LOCKOUT position, the Safety Interlock System shall be verified to maintain firing circuit inhibit and turret drive lockout via inspection of hardwired interlocks with key physically inserted in MAINTENANCE-LOCKOUT, confirmed by attempted fire command injection and turret drive command injection with zero actuation response.
Rationale: SUB-REQ-007 requires a physical lockout that cannot be overridden by software — the inspection method with physical key insertion confirms the hardwired nature of the lockout. Software injection of fire and drive commands while the key is inserted is the only way to confirm software cannot override the physical interlock.
Inspection session-619, qc, safety-interlock-system, sil-3, idempotency:ver-arming-lockout-619
VER-REQ-011 The Safety Interlock System shall be verified to operate correctly from supply voltages across the 22–32VDC nominal range. Test shall apply minimum (22VDC), nominal (28VDC), and maximum (32VDC) supply voltages and confirm all SIS functions (fire inhibit, E-stop response, lockout detection, BITE) operate within specification at each voltage level.
Rationale: SUB-REQ-009 specifies 22–32VDC operating range reflecting MIL-STD-1275 (Characteristics of 28-Volt DC Electrical Systems in Military Vehicles) voltage tolerance for vehicle power buses. Testing the full range confirms the SIS does not have a latent voltage-induced failure mode that could cause spurious safe-state assertion or inhibit safe-state activation.
Test session-619, qc, safety-interlock-system, sil-3, idempotency:ver-sis-power-619
VER-REQ-012 The interface between the Safety Interlock System and the Weapon and Ammunition Handling Assembly shall be verified by injecting an arming command through the SIS-WAHA interface and confirming the WAHA-FIRE-ENABLE signal is only asserted when all SIS enable conditions are met (arming key in ARMED, no E-stop, dual-channel agreement). Test shall also confirm WAHA-FIRE-ENABLE is de-asserted within 15ms of any SIS safe-state trigger.
Rationale: IFC-REQ-009 defines the last physical gate before ammunition discharge. End-to-end interface testing from SIS enable logic to WAHA-FIRE-ENABLE signal confirms the hardware firing path matches the SIS design. The 15ms de-assertion timing test detects wiring faults or relay contact welding that would prevent safe-state from inhibiting fire.
Test session-619, qc, safety-interlock-system, sil-3, idempotency:ver-sis-waha-619
VER-REQ-013 The interface between the Safety Interlock System and the Turret Drive Assembly shall be verified by injecting a drive command to both azimuth and elevation axes while the SIS DRIVE-INHIBIT signal is asserted, confirming zero turret motion. Test shall also confirm DRIVE-INHIBIT assertion latency is not greater than 20ms from SIS safe-state trigger, verified by simultaneous oscilloscope capture of SIS trigger and TDA drive enable line.
Rationale: IFC-REQ-010 specifies a hardwired drive inhibit as a backup to the E-stop brake engagement. Verifying zero motion under commanded drive with inhibit asserted confirms the hardwired path is not software-bypassable, which is essential for the SIL 2 uncommanded turret motion hazard mitigation.
Test session-619, qc, safety-interlock-system, sil-2, idempotency:ver-sis-tda-inhibit-619
VER-REQ-014 Verify SUB-REQ-013: Inject simulated 50Hz track data from TTP simulator, log FCC demand timestamps, compute achieved loop rate and latency. Pass: loop rate ≥50Hz, demand latency ≤20ms in all 1000 consecutive cycles under hardware-representative load.
Rationale: HIL test using production FCC hardware with TTP simulator validates control loop timing under realistic software load. 1000-cycle sample provides statistical confidence on timing conformance.
Test verification, fire-control-system, session-620, idempotency:ver-sub013-fcs-620
VER-REQ-015 Verify SUB-REQ-015: Apply step-change in LRF range measurement while logging BCM compute timestamp. Measure elapsed time to new ballistic correction output. Pass: latency ≤20ms in 100 consecutive trials across three ammunition profiles.
Rationale: BCM latency directly affects hit probability (SYS-REQ-001). Test across three ammunition profiles confirms the ballistic model runtime is within budget for all supported munition types.
Test verification, fire-control-system, session-620, idempotency:ver-sub015-bcm-620
VER-REQ-016 Verify SUB-REQ-017: With FCS in ARMED state and firing sequence active, assert SIS SAFE_STATE signal via hardware injection. Verify WCI CEASE assertion within 1ms and no further FIRE pulses within 100ms. Pass: CEASE latency ≤1ms, zero subsequent FIRE pulses, FCS enters INHIBITED state requiring explicit RE-ARM.
Rationale: Safety verification for H-003 mitigation. Hardware injection test required at SIL 2 to confirm the software-level safing is not bypassed by race conditions or interrupt latency. The 1ms CEASE latency is tighter than the 5ms activation latency in SUB-REQ-016 because the safing path is interrupt-driven.
Test verification, fire-control-system, sil-2, safety, session-620, idempotency:ver-sub017-sis-safing-620
VER-REQ-017 Verify IFC-REQ-015: Connect TTP to FCC over production PCIe bus. Inject 50Hz simulated track frames and measure received data rate and latency at FCC PCIe driver. Pass: received rate 50±0.5Hz, frame-to-FCC latency ≤1ms for 10,000 consecutive frames.
Rationale: Integration test verifying PCIe latency budget for the TTP–FCC interface. 10,000-frame sample detects intermittent latency spikes that a short test would miss. Frame rate tolerance ±0.5Hz ensures the FCC control loop is not rate-starved by PCIe scheduling jitter.
Test verification, fire-control-system, session-620, idempotency:ver-ifc015-ttp-fcc-620
VER-REQ-018 Verify IFC-REQ-018: Connect Barrel Change Mechanism barrel retention sensor to SIS test harness. Test barrel locked (0V) and unlocked (24V) states, verifying SIS reads correct logical state. Apply open-circuit and short-circuit fault conditions to wiring harness; confirm SIS detects fault within 50ms and enters BARREL-FAULT state. Pass: correct logic levels in ≥20 trials; faults detected within 50ms in all injected cases.
Rationale: Direct measurement at SIS input terminals verifies the full wiring path. Open/short fault testing confirms active-low fail-safe convention is correctly implemented — an open circuit must not be interpreted as barrel-locked.
Test verification, weapon-and-ammunition-handling, sil-2, session-621, idempotency:ver-ifc018-bcm-sis-621
VER-REQ-019 Verify IFC-REQ-019: Connect Ammunition Magazine Assembly to FCC integration bench. Log round-count messages at 1Hz over a 10-minute period with 60, 200, and 390 rounds loaded. Verify update rate is 1±0.1Hz and count accuracy is within ±5 rounds at each level. Pass: rate within tolerance for ≥95% of intervals; count within ±5 rounds at all three load levels.
Rationale: Integration test at bench level using production AMA and FCC hardware. Rate tolerance testing confirms 1553B scheduling does not cause message dropout. Three load levels verify sensor accuracy across the full range, not just at nominal.
Test verification, weapon-and-ammunition-handling, session-621, idempotency:ver-ifc019-ama-fcc-621
VER-REQ-020 Verify SUB-REQ-022: Mount production Weapon Cradle and Mount on structural test rig. Apply 25kN static load at weapon receiver interface. Measure alignment change at muzzle reference point before and after load application and after 500 load cycles simulating burst fire. Pass: alignment deviation ≤0.5 mrad after single load; no permanent deformation measurable by CMM after 500 cycles.
Rationale: Static and fatigue testing under worst-case load conditions confirms structural and alignment requirements simultaneously. 500 cycles represents approximately 10 barrel lives of burst fire and is the acceptance criterion for structural fatigue.
Test verification, weapon-and-ammunition-handling, sil-2, session-621, idempotency:ver-sub022-wcm-recoil-621
VER-REQ-021 Verify IFC-REQ-021: Connect FCC to TDC over production PCIe interface. Inject 50Hz aiming demand stream from FCC simulator, measure received demand rate and FCC-to-TDC actuator command latency using hardware timestamps. Repeat at 0°C and 40°C. Pass: received demand rate 50±0.5Hz, end-to-end latency ≤5ms for ≥9,999/10,000 consecutive packets.
Rationale: Integration test of the FCC-TDC interface under production hardware conditions. Temperature testing confirms PCIe driver timing is not affected by thermal derating. 10,000-packet sample detects latency spikes that a short test would not reveal.
Test verification, turret-drive-assembly, sil-2, session-621, idempotency:ver-ifc021-fcc-tdc-621
VER-REQ-022 Verify IFC-REQ-023: Connect EOSA to FCC integration bench. Stream simultaneous thermal and daylight channels at 50Hz. Measure frame-to-FCC buffer timestamp delta for 1000 consecutive frames on each channel. Verify channel synchronisation (simultaneous frames within 5ms). Pass: both channel latencies ≤30ms, synchronisation within 5ms, for ≥990/1000 frames.
Rationale: Integration bench test using production EOSA and FCC hardware verifies the dual-channel video interface under realistic conditions. Frame synchronisation test confirms the day and thermal channels can be correlated by the FCS target tracker.
Test verification, electro-optical-sensor-assembly, sil-2, session-621, idempotency:ver-ifc023-eosa-fcc-621
VER-REQ-024 Verify IFC-REQ-027: Inject GPS NMEA-0183 stream at 10 Hz on RS-422 input and measure UDP datagram delivery to Fire Control Computer subscriber. Pass criterion: all frames delivered within 5ms of GPS time-of-validity timestamp, zero missed frames over a 300-second test.
Rationale: Integration test verifying GPS data distribution to FCS meets timing accuracy required for ballistic computation.
Test verification, communications-interface-unit, session-622, idempotency:ver-ifc027-cpg-fcs-proper-622
VER-REQ-025 Verify IFC-REQ-028: Apply controlled load shedding to all non-SIS subsystem branches simultaneously; measure SIS supply rail voltage throughout. Pass criterion: SIS supply voltage remains within 18-32VDC with less than 500mV transient during full load shed event.
Rationale: Safety function requires uninterrupted supply; test confirms the always-on SIS branch is electrically independent from load-shedded branches.
Test verification, power-distribution-unit, sil-3, session-622, idempotency:ver-ifc028-sis-always-on-622
VER-REQ-026 Verify SUB-REQ-039: Inject short-circuit fault on one SSPC output branch; measure time to isolation and monitor all other output branches. Pass criterion: faulted branch isolated within 10ms, all other branches remain within ±5% of nominal voltage throughout fault event.
Rationale: SSPC fault isolation time is critical to prevent safety-critical subsystem power interruption during fault conditions.
Test verification, power-distribution-unit, session-622, idempotency:ver-sub039-sspc-isolation-622
VER-REQ-031 Verify IFC-REQ-016: On integrated FCS test bench, inject synthetic LRF range (1000m), target angular velocity (5 mrad/s), and IMU data at 100Hz; measure BCM azimuth/elevation correction return latency. Pass criterion: BCM correction returned within 20ms of last input update across 1000 consecutive cycles with no missed responses.
Rationale: Hardware-in-the-loop test at the FCC-BCM PCIe interface is the only way to verify sub-20ms latency under realistic computational load; simulation cannot confirm PCIe scheduling jitter.
Test verification, fire-control-system, session-623, idempotency:ver-ifc016-fcc-bcm-623
VER-REQ-032 Verify IFC-REQ-017: Connect FCC and WCI via RS-422; transmit FIRE, CEASE, and SAFE command sequences at 115200 baud with 16-bit CRC; measure end-to-end command latency and verify round-counter and fault-status telemetry at 10Hz. Pass criterion: all commands acknowledged within 1ms, CRC check passes on 10,000 consecutive frames, telemetry rate measured ≥10Hz over 300-second test.
Rationale: The 1ms end-to-end command latency is the hardware interlock response budget—only physical bench test with production RS-422 hardware can confirm actual propagation and interrupt service timing.
Test verification, fire-control-system, session-623, idempotency:ver-ifc017-fcc-wci-623
VER-REQ-033 Verify IFC-REQ-020: Mount weapon assembly at full traverse extremes (0°, 90°, 180°, 270° azimuth; -20° and +55° elevation); measure belt tension at feed port using calibrated load cell. Pass criterion: tension within 15N–25N at all 8 test positions, sustained across 10 simulated ammunition load cycles.
Rationale: Belt tension limits are mechanically derived from feed mechanism geometry across the traverse envelope; only physical integration testing can validate tension variation due to gravity, belt weight, and cable routing at the limit positions.
Test verification, weapon-ammunition-handling, session-623, idempotency:ver-ifc020-belt-tension-623
VER-REQ-034 Verify IFC-REQ-022: Drive azimuth slip ring through 50,000 continuous rotation cycles under rated load (24VDC at 20A, MIL-STD-1553B 1Mbps, 100BASE-TX Ethernet, ±10V analogue at 10kHz). Measure contact resistance and signal attenuation at 0, 10k, 25k, and 50k rotation milestones. Pass criterion: contact resistance ≤10mΩ and signal attenuation ≤3dB at all checkpoints.
Rationale: Slip ring contact degradation is a wear-out failure mode unique to rotating machinery; only endurance testing through the rated 50,000-rotation life can confirm resistance and attenuation compliance at end-of-life, which simulation cannot predict.
Test verification, turret-drive-assembly, session-623, idempotency:ver-ifc022-slip-ring-623
VER-REQ-035 Verify IFC-REQ-024: On integrated OCU-FCS bench, stream dual-channel video (thermal + daylight) at maximum bandwidth while injecting operator command packets at 100Hz; measure end-to-end command latency from OCU to FCC. Pass criterion: command latency ≤5ms at 95th percentile over 10-minute sustained test, total video bandwidth ≤200 Mbps as measured by network analyser, zero command packet drops.
Rationale: The 5ms latency budget is derived from the engagement timeline—operator reaction time is the gating factor. Only integrated test under concurrent video load confirms latency is not crowded out by video bandwidth on the shared 100BASE-TX link.
Test verification, operator-control-unit, fire-control-system, session-623, idempotency:ver-ifc024-ocu-fcc-623
VER-REQ-036 Verify SUB-REQ-052: supplementary verification covering WCI SAFE state transition. On FCC hardware, confirm that watchdog starvation results in WCI safe assertion via the watchdog-initiated output path, distinct from direct de-energisation. This test is superseded by VER-REQ-044 which covers the consolidated SUB-REQ-052 requirement.
Rationale: Watchdog hardware timeout is a SIL-2 safety function; software simulation cannot verify the hardware timer fires and the WCI responds within the 100ms budget under actual hardware scheduling and interrupt latency.
Test verification, fire-control-system, sil-2, session-623, idempotency:ver-sub020-fcc-watchdog-623, reqs-eng-session-641, superseded-by-VER-REQ-044
VER-REQ-037 Verify SUB-REQ-021: Apply 20V, 28V, and 32VDC to FCC power input; verify FCC remains operational and current draw ≤8A steady-state at each voltage. Apply power-on surge at 20V and 32V; verify peak current ≤15A for ≤50ms using calibrated current clamp at 10kHz sample rate. Pass criterion: stable operation at all three voltages, surge current within spec on all 5 repeated power-on cycles per voltage.
Rationale: MIL-STD-1275E operating range and surge current limits protect FCC against vehicle electrical transients; bench test across the full voltage range with surge measurement is required to confirm the power supply design margin before environmental qualification.
Test verification, fire-control-system, session-623, idempotency:ver-sub021-fcc-power-623
VER-REQ-038 Verify SUB-REQ-042: Apply 22V, 28V, and 32VDC to DCSC power input; verify DCSC remains in safe-state-ready condition and current draw ≤500mA per channel. Apply power-on transient; verify inrush ≤2A for ≤20ms using current probe at 50kHz sample rate. Pass criterion: stable operation at all three voltages, no spurious safe-state assertions, inrush within spec on 5 consecutive power cycles.
Rationale: SIL-3 component power verification requires physical test across MIL-STD-1275E range to confirm no false safe-state assertions from voltage transients—analysis alone is insufficient for SIL-3.
Test verification, safety-interlock-system, sil-3, session-623, idempotency:ver-sub042-dcsc-power-623
VER-REQ-039 Verify SUB-REQ-043: Apply 18V, 24V, and 30VDC to HFIR coil; measure coil current, operate time, and release time using oscilloscope. Pass criterion: coil current ≤200mA at all three voltages, operate time ≤10ms, release time ≤5ms across 10 consecutive switching cycles at each voltage.
Rationale: Relay operate and release times at voltage extremes determine whether the interlock de-energises before a complete burst cycle—physical test is required since relay timing varies with coil voltage and contact wear.
Test verification, safety-interlock-system, sil-3, session-623, idempotency:ver-sub043-hfir-power-623
VER-REQ-040 Verify SUB-REQ-044: Command TDA elevation drive from -20° to +60° under maximum weapon load on a locked azimuth test fixture. Measure angle achieved at drive limits and slew rate between limits. Pass criterion: full angular range achieved within ±0.5° and slew rate ≥30°/s throughout range.
Rationale: Integration test confirming the elevation axis meets both the angular range and rate requirements of SYS-REQ-003, under load conditions representative of the heaviest qualified weapon.
Test verification, turret-drive-assembly, session-624, idempotency:ver-sub044-tda-elev-624
VER-REQ-041 Verify SUB-REQ-049: Mount RWS on a motion simulator generating 6-DOF vehicle motion profiles at 30 km/h terrain traverse. Measure EOSA sensor line-of-sight error using a reference collimator over a 120-second test run. Pass criterion: LOS residual error < 0.1 mrad RMS throughout test.
Rationale: Motion simulator test replicates actual vehicle dynamics while enabling precision LOS measurement against a fixed reference, which cannot be achieved in field conditions. 120-second duration captures multiple stabilisation transients.
Test verification, electro-optical-sensor-assembly, session-624, idempotency:ver-sub049-eosa-gyrostab-624
VER-REQ-042 Verify SUB-REQ-048: Power-cycle the FCS three times and observe the automated boresight routine output each time. Then introduce a deliberate 1.2 mrad misalignment and confirm the FCS inhibits firing. Pass criterion: routine completes within 30 seconds of power-on, alignment within 0.5 mrad on all three cycles, firing inhibited at 1.2 mrad.
Rationale: Power-cycle repetition tests routine reliability across start-up states. Deliberate misalignment injection directly validates the 1.0 mrad inhibit threshold required by SUB-REQ-048.
Test verification, fire-control-system, session-624, idempotency:ver-sub048-fcc-boresight-624
VER-REQ-043 Verify SUB-REQ-046: Conduct Reliability Demonstration Test per MIL-HDBK-781A Method 9 using accelerated life test schedule. Accept if observed MTBCF is ≥500 hours at 80% confidence. Supplement with Design FMEA (per MIL-STD-1629A) predicting FCS MTBCF against parts count data.
Rationale: Demonstration testing to MIL-HDBK-781A is the accepted method for reliability compliance claims. FMEA supplements test data where sample size is insufficient for statistical significance at 80% confidence.
Analysis verification, fire-control-system, reliability, session-624, idempotency:ver-sub046-fcs-mtbcf-624
VER-REQ-044 Verify SUB-REQ-052: On FCC hardware test rig, simulate watchdog starvation by halting the fire control application; measure time from last watchdog service to WCI firing output de-energisation and HMI fault flag assertion. Pass criterion: WCI firing output de-energised within 100ms ±5ms and HMI fault flag visible within 500ms, in 10 consecutive trials at -40°C and +70°C operating extremes.
Rationale: Direct hardware test of the watchdog timeout boundary at operating temperature extremes. The ±5ms tolerance accommodates crystal oscillator drift without invalidating the safety margin. Temperature extremes verify the RC timing network used in watchdog hardware is within tolerance across the vehicle thermal envelope.
Test session-625, verification, fire-control-system, idempotency:ver-fcc-watchdog-session-625, reqs-eng-session-641
VER-REQ-045 Verify SUB-REQ-053: Interrupt WCI-FCC communication link while WCI firing output is in energised state. Measure time from comms loss to firing solenoid de-energisation via oscilloscope on solenoid coil. Pass criterion: de-energise ≤10ms in 20 consecutive trials across power supply range 22-32VDC.
Rationale: Oscilloscope measurement directly validates the fail-safe timing requirement. Testing across 22-32VDC supply range verifies the output driver and relay operate within spec at vehicle battery voltage extremes. 20 trials provide statistical confidence that the result is not a timing anomaly.
Test session-625, verification, fire-control-system, idempotency:ver-wci-failsafe-session-625
VER-REQ-046 Verify SUB-REQ-055: Inspect the FCS LRU against its approved mechanical drawing. Measure enclosure volume (displacement method) and mass (calibrated scale). Verify 4-point mounting interface dimensions against NATO STANAG 4059 template. Inspect MIL-DTL-38999 Series III connector type and pin count. Pass criteria: volume not exceeding 8L, mass not exceeding 4.5 kg, mounting interface conformant, connector model verified.
Rationale: Physical embodiment requirements for LRUs are verified by inspection against the as-built hardware; dimensional and mass compliance cannot be assured by analysis alone for procurement and acceptance.
Inspection verification, fire-control-system, session-626, idempotency:ver-sub-055-physical-v2-626
VER-REQ-047 Verify SUB-REQ-056: Connect a link simulator to the CAN Bus and Serial Protocol Gateway; inject heartbeat at 10 Hz, then drop the heartbeat. Measure time from last heartbeat to LINK-LOSS signal assertion on SIS interface. Repeat 10 times. Pass criteria: LINK-LOSS asserted within 200ms of heartbeat gap exceeding 100ms on all 10 trials.
Rationale: Timing compliance for link-loss detection is safety-critical (feeds the 500ms SYS-REQ-009 budget) and must be verified by hardware-in-the-loop test to account for real bus latency and gateway processing time.
Test verification, communications-interface-unit, session-626, idempotency:ver-sub-056-link-detection-626
VER-REQ-048 Verify SUB-REQ-057: On an OCU test bench connected to FCS simulator, inject a thermal imager fault signal. Measure elapsed time from fault injection to amber status icon display on ODU. Verify icon appearance, colour (amber), and text identifies 'Thermal Imager' as the failed subsystem. Pass criteria: annunciation within 500ms, amber icon displayed, correct subsystem named in status bar.
Rationale: Annunciation latency and content must be verified end-to-end with a realistic fault injection on an integrated test bench, as display timing depends on the OCU CPU processing pipeline and display update rate.
Test verification, operator-control-unit, session-626, idempotency:ver-sub-057-degraded-annunciation-626
VER-REQ-049 Verify SUB-REQ-058: Mount RWS on a 6-DOF motion simulator generating cross-country vibration profiles per MIL-STD-810H (Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems) Method 514.8 at 30 km/h equivalent. Command static target position. Sample weapon pointing error at 1 kHz for 60 seconds. Compute RMS pointing error. Pass criteria: pointing error not exceeding 0.1 mrad RMS across the 60-second test window.
Rationale: Stabilisation accuracy under vehicle motion is a safety-relevant performance parameter that cannot be verified by analysis — hardware-in-the-loop testing on a motion simulator is the only method that exercises the actual closed-loop dynamics of the TDC with real sensor and actuator characteristics.
Test verification, turret-drive-assembly, session-626, idempotency:ver-sub-058-stabilisation-626
VER-REQ-051 Verify : Inject 1000 valid fire solution input frames on BCM test bench; then inject 100 frames with corrupted CRC. Verify: (a) all valid frames accepted and processed within 20ms; (b) all corrupt frames rejected within one processing cycle with DATA_INTEGRITY_FAULT asserted on HMI output within 500ms. Pass criteria: 0 valid frames rejected, 0 corrupt frames accepted.
Rationale: End-to-end test at BCM input validates both the integrity check logic and the fault reporting path. Using 100 corrupt injections ensures statistical coverage across CRC bit-error patterns.
Test verification, fire-control-system, sil-2, session-627, idempotency:ver-bcm-data-integrity-627
VER-REQ-052 Verify SUB-REQ-050: Subject FCS LRU to MIL-STD-810H Method 507.6 (Humidity) and Method 514.8 (Vibration) test profiles. Pass criteria: LRU powers on and executes full BIT without fault after humidity exposure; LRU maintains pointing loop accuracy within 0.1 mrad RMS during and after vibration profile.
Rationale: Environmental qualification by physical test is the only method that validates hermetic seal integrity and structural robustness under representative vehicle-mounted vibration. Analysis cannot substitute for physical exposure at this qualification stage.
Test verification, fire-control-system, sil-2, session-627, idempotency:ver-sub050-fcs-env-qual-627
VER-REQ-053 Verify SUB-REQ-051: Mount HFIR sample on MIL-STD-202 salt-spray test rig; expose for 1000 hours per Method 101. Then actuate relay for 50,000 cycles. Measure contact resistance with 4-wire milliohmmeter after test. Pass criteria: contact resistance ≤50mΩ and relay operational on all test samples.
Rationale: Contact resistance degradation under salt spray and mechanical cycling cannot be predicted analytically for electromechanical relays in defence environments; physical endurance testing per MIL-STD-202 is required for SIL-3 hardware qualification.
Test verification, safety-interlock-system, sil-3, session-627, idempotency:ver-sub051-hfir-contacts-627
VER-REQ-054 Verify SUB-REQ-054: On PDU bench with six SSPC channels at nominal load, inject a hard short on Channel 1 while measuring voltage on Channels 2-6. Pass criteria: Channel 1 trips within 1ms; Channels 2-6 maintain voltage within 5% of nominal with no interruption.
Rationale: SSPC fault isolation must be verified under representative load conditions; analytical models of trip behaviour cannot account for PCB parasitics and component tolerance stacking. Test directly confirms the 1ms isolation criterion that protects safety-critical loads.
Test verification, power-distribution-unit, session-627, idempotency:ver-sub054-pdu-sspc-627
VER-REQ-056 Verify SUB-REQ-060: Subject assembled TDA to MIL-STD-810H Method 501.7 (High Temperature) and 502.7 (Low Temperature) soak cycles then IP67 ingress test (1m immersion, 30min) per IEC 60529. Pass: all drive axes operational post-test, no water ingress on internal inspection, encoder error within SUB-REQ-058 specification.
Rationale: IP67 sealing and temperature range for the TDA drive mechanism must be verified by test because seal integrity under thermal cycling and water pressure cannot be confirmed by analysis of bearing datasheets alone.
Test verification, turret-drive-assembly, environmental, session-628, idempotency:ver2-sub060-tda-env-628
VER-REQ-057 Verify SUB-REQ-061: Subject SIS Dual-Channel Safety Controller to MIL-STD-810H Method 501.7 (High Temperature, +70°C) and Method 502.7 (Low Temperature, -40°C) soak, then IP65 water jet test per IEC 60529. During temperature test: inject firing command on both channels and confirm SAFE_STATE output correct. Pass: safety function maintained at temperature extremes; no water ingress after IP65 test.
Rationale: IEC 61508 SIL 3 requires the safety function to be verified under all operational conditions including temperature extremes. Test at -40°C and +70°C is the only method to confirm relay contact resistance and diagnostic monitor thresholds remain within SIL 3 PFD budget under thermal stress.
Test verification, safety-interlock-system, environmental, sil-3, session-628, idempotency:ver-sub061-sis-env-628
VER-REQ-058 Verify SUB-REQ-062: Obtain MIL-PRF-39016 qualification test report for selected relay component. Measure contact resistance at -55°C, +25°C, and +125°C using 4-wire kelvin method with relay coil energised and de-energised. Pass: contact resistance ≤100mΩ at all temperatures; coil-to-contact isolation ≥500VDC at +25°C.
Rationale: MIL-PRF-39016 qualification test report provides established reliability screening data required for SIL 3 PFD calculation. Contact resistance verification across temperature range confirms the relay remains within the firing circuit voltage budget at thermal extremes.
Inspection verification, safety-interlock-system, hardware-firing-interlock-relay, sil-3, session-628, idempotency:ver-sub062-hwilk-relay-628
VER-REQ-059 Verify SUB-REQ-014: Mount a calibrated thermal target (0.5K IR contrast delta-T above background) at 1000m in controlled environment. Command the Target Tracking Processor to acquire and track the target. Measure track error centroid deviation from target centre over 30-second hold. Pass criteria: track error does not exceed 0.1 mrad RMS on 5 consecutive acquisitions in both stationary and 2 deg/s slew conditions.
Rationale: Auto-track accuracy on minimum-contrast targets defines the boundary condition for engagement probability in degraded IR conditions. Only physical test against a calibrated thermal target replicates the actual signal-to-noise environment; analysis cannot validate the IR image processing algorithms against real scene clutter.
Test verification, fire-control-system, sil-2, session-629, idempotency:ver-sub014-ttp-autotrack-629
VER-REQ-060 Verify SUB-REQ-018: Disable the thermal imaging channel in the FCS software and command engagement of a 2m x 2m visual contrast target at 200m range. Verify that the day camera auto-track remains locked and that the system reports Degraded Mode status on the operator display. Pass criteria: track maintained at 200m with day camera only; Degraded Mode status flag active; no unintended mode transitions observed over 60-second hold.
Rationale: Degraded mode operation with failed thermal channel is a ConOps scenario where the day camera provides the only targeting solution. SIL-2 classification requires that the degraded mode be verified to maintain a safe engagement capability without creating new hazards such as missed mode transition annunciation.
Test verification, fire-control-system, sil-2, degraded, session-629, idempotency:ver-sub018-degraded-mode-629
VER-REQ-061 Verify SUB-REQ-019: Power-cycle the FCS from cold start and monitor the operator display during BIT execution. Measure time from power-on to BIT complete status. Deliberately inject a fault (disconnect WCI cable) and verify BIT reports the correct fault code. Pass criteria: BIT complete within 30 seconds; all safety-interlocked functions reported; injected WCI fault detected and annunciated with correct code.
Rationale: BIT is the primary mechanism for detecting latent failures in safety-interlocked functions before engagement. The 30-second BIT duration is a ConOps constraint — operators require system readiness within that window from cold start. Fault injection testing verifies that BIT fault codes are accurate and not masked.
Test verification, fire-control-system, session-629, idempotency:ver-sub019-fcs-bit-629
VER-REQ-062 Verify SUB-REQ-023: Mount the weapon system on a force measurement platform with calibrated load cells on the mounting interface. Fire 10 rounds at full cyclic rate. Record peak force transmitted to the mounting interface for each shot. Pass criteria: peak transmitted force does not exceed 5 kN on any shot; no structural distress or fastener loosening observed post-test.
Rationale: Recoil force transmitted to the turret ring and vehicle interface is a safety requirement — 5 kN is the structural design limit of the mounting interface per the vehicle integration specification. Analysis alone cannot validate the non-linear compliance of the hydraulic buffer under dynamic firing conditions; physical test is required to confirm the damping characteristic against the actual weapon system impulse.
Test verification, weapon-and-ammunition-handling, sil-2, session-629, idempotency:ver-sub023-recoil-buffer-629
VER-REQ-063 Verify SUB-REQ-028: Command full 360-degree azimuth rotation at maximum slew rate with weapon at neutral elevation. Measure continuous slew velocity using shaft encoder output at 1 kHz sampling. Also measure azimuth position accuracy after commanding to 5 known positions (0, 90, 180, 270, 360 degrees). Pass criteria: maximum slew rate not less than 60 deg/s sustained; position error not exceeding 1.0 mrad at all test positions; no mechanical binding or encoder dropout.
Rationale: 360-degree continuous traverse without a hard stop is a defining capability of the RWS that distinguishes it from limited-traverse systems. SYS-REQ-003 requires 60 deg/s minimum; any reduction below this prevents engagement of fast-moving targets. The slip ring assembly that enables unlimited traverse must be verified not to introduce binding or electrical dropout that would interrupt the azimuth control loop.
Test verification, turret-drive-assembly, session-629, idempotency:ver-sub028-azimuth-drive-629
VER-REQ-064 Verify SUB-REQ-034: Connect a MIL-STD-6016 (STANAG 5516) compliant BMS simulator to the Tactical Data Link Processor external port. Command the TDP to transmit position reports. Measure message transmission rate using a protocol analyser on the link. Also inject a received track message and verify decode latency. Pass criteria: position reports transmitted at minimum 1 Hz; received track decode latency not exceeding 200 ms; all messages conform to MIL-STD-6016 message format with zero malformed messages over 5-minute test run.
Rationale: MIL-STD-6016 (STANAG 5516) compatibility is a NATO interoperability requirement that cannot be verified by inspection of the implementation alone; only protocol-level test with a conformant BMS simulator confirms proper message encoding, timing, and format compliance. The 1 Hz minimum rate is the SYS-REQ-013 threshold derived from BMS track refresh rate requirements.
Test verification, communications-interface-unit, session-629, idempotency:ver-sub034-tdp-datalink-629
VER-REQ-065 Verify SUB-REQ-010: Apply 20V, 28V, and 32VDC to the TDA power input port using a programmable DC supply. Measure input current at each voltage. Verify drive motor and encoder functions are operational at all voltages. Pass criteria: TDA operates correctly across 20-32V range; maximum current draw does not exceed the specified limit at 28V nominal; no loss of encoder function at voltage boundaries.
Rationale: MIL-STD-1275E (Characteristics of 28-Volt DC Electrical Systems in Military Vehicles) defines the vehicle bus voltage transient environment. Verification across the full 20-32V operating range is required to confirm that TDA servo control does not fail at voltage extremes that occur during vehicle engine start or high-current switching events.
Test verification, turret-drive-assembly, power, session-629, idempotency:ver-sub010-tda-power-629
VER-REQ-066 Verify SUB-REQ-024: Using a single trained maintainer wearing standard field PPE (including heat-resistant gloves), execute the barrel change procedure on a weapon system at operating temperature (barrel warmed to 150 degrees C minimum by firing or heat gun simulation). Time from initiating the barrel release to installation of the replacement barrel and system ready status. Pass criteria: complete procedure achievable within 15 minutes by the single maintainer; no special tools required beyond standard tool kit; replacement barrel locked and functional test passed.
Rationale: 15-minute barrel change is a SYS-REQ-015 maintainability requirement driven by the tactical need to restore fire capability within the window of a brief operational pause. Demonstration by a single trained maintainer under realistic conditions (hot barrel, PPE, time pressure) validates the procedure is feasible as designed, not just theoretically achievable.
Demonstration verification, weapon-and-ammunition-handling, session-629, idempotency:ver-sub024-barrel-change-629
VER-REQ-067 Verify SUB-REQ-011: Apply 20V, 28V, and 32VDC to the FCS power input using a programmable supply. Verify fire control processor, sensor interfaces, and Weapon Control Interface functions are all operational at each voltage point. Pass criteria: FCS BIT passes at all three voltage test points; no watchdog resets; no loss of sensor or WCI interface communication.
Rationale: FCS contains the SIL-2 fire control processor and the Weapon Control Interface which must remain functional across the MIL-STD-1275E vehicle bus operating range. A voltage-induced reset of the fire control processor during a firing sequence is a hazardous event that could produce an unintended burst.
Test verification, fire-control-system, power, sil-2, session-629, idempotency:ver-sub011-fcs-power-629
VER-REQ-068 Verify SUB-REQ-016: Inject a FIRE command from FCS simulator to Weapon Control Interface (WCI) using a calibrated signal generator. Measure time from FIRE command assertion to trigger solenoid activation using an oscilloscope connected to the solenoid drive line. Pass criteria: solenoid activation latency ≤5ms on 10 consecutive trials at nominal and boundary supply voltages (22V, 28V, 32VDC).
Rationale: Trigger actuation latency is the direct cause of muzzle timing error at slew rates up to 40°/s; a 5ms error at 40°/s elevation rate produces 0.03° muzzle deflection, degrading first-round hit probability below the SYS-REQ-001 threshold of P_h ≥ 0.7. Functional test at three supply voltage points verifies compliance under MIL-STD-1275E operating range extremes.
Test verification, fire-control-system, sil-2, session-629, idempotency:ver-sub016-wci-trigger-629
VER-REQ-069 Verify SUB-REQ-063: Mount instrumented weapon system to vehicle test rig moving at 15 km/h on representative terrain; command engagement against 2m x 2m target at 200m. Record 50 fire events. Pass criterion: first-round hit count ≥ 35 (P_h ≥ 0.70). Log IMU correction rate; confirm ≥ 100Hz during all fire events.
Rationale: Statistical confidence on P_h ≥ 0.70 requires minimum 35 hits in 50 shots (95% CI lower bound ~0.64). Dynamic platform test is mandatory because bench-static boresight testing cannot exercise the stabilisation compensation path.
Test verification, fire-control-system, sil-2, session-630, idempotency:ver-sub063-fcs-stabilisation-630
VER-REQ-070 Verify SUB-REQ-064: Command TDA through full 360 degree azimuth sweep and -20 to +60 degree elevation sweep at rated slew rates with ice loading applied per MIL-STD-810H Method 521.4. Measure achieved slew rate at 10 equidistant points. Pass criterion: slew rate not less than 60 deg/s azimuth and 40 deg/s elevation at all measurement points.
Rationale: The TDA kinematic envelope under worst-case load is only verifiable by physical test with applied ice mass; analysis alone cannot account for bearing friction variation under frozen lubricant conditions.
Test verification, turret-drive-assembly, sil-2, session-630, idempotency:ver-sub064-tda-traverse-630
VER-REQ-071 Verify SUB-REQ-066: Connect CIU to BMS simulator via MIL-STD-6016 compatible radio link. Record 3600 position messages over 60 minutes and 900 video frames per minute. Pass criterion: position message rate not less than 1 per second, video delivery rate not less than 15 fps, zero dropped messages in 3600-message sequence.
Rationale: BMS data link throughput and video delivery rate are integration-testable requirements that cannot be verified by inspection or analysis.
Test verification, communications-interface-unit, session-630, idempotency:ver-sub066-ciu-milstd6016-630
VER-REQ-072 Verify SUB-REQ-067: Place system in Maintenance mode, then command transition to Operational mode. Record time from mode command to BORESIGHT-VERIFIED status. Measure optical axis alignment between day camera and thermal imager outputs. Pass criterion: BORESIGHT-VERIFIED status achieved within 5 minutes; optical axes aligned to within 0.1 mrad.
Rationale: Automated boresight verification is a time-critical function for operational readiness; the 5-minute constraint cannot be verified by design review alone.
Test verification, fire-control-system, maintenance, session-630, idempotency:ver-sub067-fcs-boresight-630
VER-REQ-073 Verify SUB-REQ-068: Inspect Dual-Channel Safety Controller LRU against approved mechanical drawing. Confirm separate PCBs for each channel, electrically-shielded common housing, sealing to STANAG 4370 AECTP 400 requirements. Pass criterion: as-built configuration matches approved drawing; channel separation confirmed by continuity check; seal integrity confirmed by IP67 test.
Rationale: Physical separation of dual-channel safety-critical hardware is a SIL 3 architectural requirement that must be verified by inspection; it cannot be tested by functional means alone.
Inspection verification, safety-interlock-system, sil-3, session-630, idempotency:ver-sub068-dcsc-physical-lru-630
VER-REQ-074 Verify SUB-REQ-065: Disable thermal imager LRU while system is in operational mode. Measure time from fault detection to manual tracking mode activation using day camera. Confirm day-camera output at 1920x1080 at 15fps with automatic exposure active. Pass criterion: mode switch completes within 5 seconds of thermal imager fault; video output confirmed at specification.
Rationale: The 5-second degraded-mode switchover is a safety-relevant performance constraint that must be verified under live fault injection; the switchover logic cannot be validated by analysis alone.
Test verification, electro-optical-sensor-assembly, fire-control-system, degraded-mode, session-630, idempotency:ver-sub065-degraded-day-camera-630
VER-REQ-075 Verify IFC-REQ-001: Inspect the RWS turret ring mounting against the NATO STANAG 4569 Level IV interface drawing. Confirm bolt pattern, ring diameter, and load path meet the specification. Pass criterion: as-built configuration matches the approved interface drawing within specified tolerances.
Rationale: NATO STANAG 4569 turret ring compliance is a hard physical interface constraint; only inspection against the approved drawing can confirm conformance of the manufactured part.
Inspection verification, interface, session-631, idempotency:ver-ifc001-turret-ring-631, idempotency:ver-ifc001-turret-ring-631
VER-REQ-076 Verify IFC-REQ-002: Apply 18VDC, 28VDC, and 32VDC to the RWS power input. Record input current, output regulation, and system functional status at each voltage. Pass criterion: full system functionality at all three voltages; no BIT faults on power subsystem channel.
Rationale: MIL-STD-1275E (Characteristics of 28 Volt DC Electrical Systems in Military Vehicles) compliance requires live testing across the full operating range; datasheet analysis alone cannot verify system-level behaviour at voltage extremes.
Test verification, interface, power, session-631, idempotency:ver-ifc002-power-631, idempotency:ver-ifc002-power-631
VER-REQ-077 Verify IFC-REQ-003: Connect RWS to a vehicle platform simulator transmitting CAN frames at 500 kbps per ISO 11898 (Road vehicles - Controller area network). Inject vehicle motion data and power management commands. Confirm RWS responds to all defined message IDs within the specified latency. Pass criterion: all required messages acknowledged within 20ms.
Rationale: CAN bus message exchange is a functional requirement that must be tested with live traffic at the interface; the message set and timing are not verifiable by inspection of wiring alone.
Test verification, interface, can-bus, session-631, idempotency:ver-ifc003-canbus-631, idempotency:ver-ifc003-canbus-631
VER-REQ-078 Verify IFC-REQ-004: Connect a GNSS simulator to the RWS navigation input. Inject position and heading data via the specified protocol. Confirm the FCS ingest of position/heading and incorporation into the ballistic solution within the required latency. Pass criterion: ballistic solution updates within 100ms of position fix.
Rationale: GNSS data ingestion timing directly affects ballistic solution accuracy; the end-to-end latency from navigation input to fire solution update cannot be derived by analysis of component specs alone and requires integration test.
Test verification, interface, gnss, session-631, idempotency:ver-ifc004-gnss-631, idempotency:ver-ifc004-gnss-631
VER-REQ-079 Verify IFC-REQ-005: Load a STANAG 4090 compatible ammunition link into the AHA and cycle the weapon feed mechanism. Confirm link engagement, feeding, and disengagement without misfeeds. Pass criterion: zero link jams over 50 feed cycles at the maximum cyclic rate.
Rationale: STANAG 4090 (Ammunition Link Design Requirements) ammunition interface compliance requires live feed testing; link engagement geometry cannot be verified by dimensional inspection alone because dynamic forces during feeding affect compatibility.
Test verification, interface, ammunition, session-631, idempotency:ver-ifc005-ammo-link-631, idempotency:ver-ifc005-ammo-link-631
VER-REQ-080 Verify IFC-REQ-006: Connect RWS to a MIL-STD-6016 (Tactical Digital Information Link) data link receiver. Stream compressed sensor video and target data for 10 minutes at operational update rate. Pass criterion: video decoded without frame loss; target track data received at specified update rate; measured throughput meets the specification.
Rationale: MIL-STD-6016 (Tactical Digital Information Link - TADIL J) interoperability must be confirmed against an external receiver; link budget and encoding are not verifiable by analysis of the transmitter specification alone.
Test verification, interface, datalink, session-631, idempotency:ver-ifc006-tdl-631, idempotency:ver-ifc006-tdl-631
VER-REQ-081 Verify IFC-REQ-007: Connect a calibrated video analyser to the EOSA-FCS interface. Capture uncompressed video frames from both channels. Measure pixel resolution, frame rate, and end-to-end sensor-to-FCS latency. Pass criterion: day camera delivers minimum 1920x1080 at 30fps; thermal imager delivers minimum 640x480 at 25fps; both within specified latency budget.
Rationale: Video throughput and latency across the EOSA-FCS interface determines tracking loop bandwidth; compliance cannot be verified by datasheet analysis because it depends on the physical link implementation.
Test verification, interface, video, eosa, fcs, session-631, idempotency:ver-ifc007-eosa-fcs-video-631, idempotency:ver-ifc007-eosa-fcs-video-631
VER-REQ-082 Verify IFC-REQ-008: Configure FCS to issue servo demand signals at 100Hz to the TDA. Inject a step demand and measure TDA response time, tracking accuracy, and signal latency via oscilloscope at the interface. Pass criterion: servo demand delivered at 100Hz ±1Hz; TDA closed-loop settling to within 0.1 mrad of demand within the specified time.
Rationale: The FCS-TDA servo loop timing is a performance-critical interface; 100Hz demand rate and the resulting pointing accuracy cannot be confirmed without measuring the actual interface signals under closed-loop conditions.
Test verification, interface, servo, tda, fcs, session-631, idempotency:ver-ifc008-fcs-tda-servo-631, idempotency:ver-ifc008-fcs-tda-servo-631
VER-REQ-083 Verify IFC-REQ-012: Actuate E-stop while system is in Operational mode. Measure time from E-stop actuation to de-energisation of the firing relay and DRIVE-INHIBIT assertion. Confirm dual hardwire routing via continuity trace. Pass criterion: both channels reach safe state within 50ms; dual wiring topology confirmed by inspection.
Rationale: The E-stop to DCSC interface is a SIL 3 safety function per IEC 61508 (Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems); response time and dual-channel routing must be verified by live fault injection and wiring inspection, not analysis.
Test verification, interface, safety, sil-3, e-stop, session-631, idempotency:ver-ifc012-estop-dcsc-631, idempotency:ver-ifc012-estop-dcsc-631
VER-REQ-084 Verify IFC-REQ-014: Inject a simulated SIS fault condition. Measure the signal timing on the DCSC-to-SSOD separate drive command lines for both channels. Confirm independence of channel A and channel B command paths. Pass criterion: both channels command safe state within 10ms of fault assertion; channel cross-dependency eliminated by signal monitoring.
Rationale: Dual-channel independence on the DCSC-to-SSOD interface is a SIL 3 architectural requirement; independence must be confirmed under fault injection because it cannot be verified by inspection of the schematic alone.
Test verification, interface, safety, sil-3, session-631, idempotency:ver-ifc014-dcsc-ssod-631, idempotency:ver-ifc014-dcsc-ssod-631
VER-REQ-085 Verify IFC-REQ-026: Stream video and metadata from VCNIM to TDL Processor at the specified data rate. Measure throughput, packet loss, and latency. Pass criterion: data throughput meets specification with less than 0.1% packet loss over a 5-minute sustained transmission.
Rationale: The VCNIM-TDL Processor interface carries high-bandwidth compressed video; actual throughput depends on network implementation and cannot be inferred from link specification alone.
Test verification, interface, video, datalink, session-631, idempotency:ver-ifc026-vcnim-tdl-631, idempotency:ver-ifc026-vcnim-tdl-631
VER-REQ-086 Verify IFC-REQ-029: Apply nominal and fault power conditions to RWS. Confirm PMCU telemetry messages are received by the FCC within the required update period. Inject an over-current condition and confirm FCC fault response. Pass criterion: telemetry received at minimum 1Hz; fault condition reported within two telemetry frames.
Rationale: PMCU-to-FCC telemetry latency determines how quickly the FCS can respond to power fault conditions; compliance requires live power fault injection to verify end-to-end detection and response timing.
Test verification, interface, power, fcs, session-631, idempotency:ver-ifc029-pmcu-fcc-631, idempotency:ver-ifc029-pmcu-fcc-631
VER-REQ-087 Verify SUB-REQ-026: Mount RWS on a vehicle motion simulator generating cross-country profile at 30km/h. Command a fixed azimuth-elevation aimpoint. Record weapon pointing error via optical encoder feedback over a 60-second run. Pass criterion: pointing error RMS does not exceed 0.1 mrad; peak error does not exceed 0.3 mrad.
Rationale: Weapon pointing accuracy under vehicle motion is the primary driver of first-round hit probability (SYS-REQ-001); the 0.1 mrad RMS threshold requires stabilisation loop validation under dynamic excitation, which analysis of the servo specification cannot substitute.
Test verification, tda, performance, session-631, idempotency:ver-sub026-tda-pointing-631, idempotency:ver-sub026-tda-pointing-631
VER-REQ-088 Verify SUB-REQ-025: With barrel retention sensor set to UNLOCKED state via test fixture, command fire. Confirm firing circuit remains de-energised. Restore LOCKED state and confirm firing circuit enables. Pass criterion: no firing pulse when UNLOCKED; firing circuit active when LOCKED and all other conditions met.
Rationale: The barrel retention interlock is a safety function; IEC 61508 SIL-2 requires functional verification by deliberate fault injection to confirm the interlock prevents firing with an unlocked barrel.
Test verification, aha, safety, sil-2, session-631, idempotency:ver-sub025-aha-barrel-safety-631, idempotency:ver-sub025-aha-barrel-safety-631
VER-REQ-089 Verify SUB-REQ-029: Place calibrated point source target at 1000m range. Switch TI to narrow field. Record IFOV using the collimator bar method. Pass criterion: IFOV of 0.3 mrad or better confirmed; minimum detectable temperature contrast measured as 0.05K or better.
Rationale: TI camera IFOV determines target detection range performance; actual IFOV is a function of the detector array and optics that must be measured on the delivered unit, not inferred from the optical design specification.
Test verification, eosa, ti, performance, session-631, idempotency:ver-sub029-ti-ifov-631, idempotency:ver-sub029-ti-ifov-631
VER-REQ-090 Verify SUB-REQ-030: Range calibrated retroreflectors at 200m, 1000m, 2000m, and 4000m from the system. Fire laser rangefinder at each target and record measured range. Pass criterion: range error does not exceed ±5m (1-sigma) at any range point; range update confirmed at minimum 1Hz.
Rationale: LRF range accuracy is critical to ballistic solution quality (SUB-REQ-015); the ±5m specification must be measured against calibrated range targets because laser pulse timing drift cannot be assessed from component datasheets alone.
Test verification, eosa, lrf, performance, session-631, idempotency:ver-sub030-lrf-range-631, idempotency:ver-sub030-lrf-range-631
VER-REQ-091 Verify SUB-REQ-032: Stream live sensor video through FCS to ODU. Insert frame timestamp at sensor output. Measure displayed frame timestamp at ODU output via high-speed camera. Pass criterion: end-to-end display latency does not exceed the specified maximum for both channels.
Rationale: Operator display latency directly affects target tracking reaction time; the latency limit is derived from human factors analysis and must be validated under live video streaming conditions.
Test verification, ocu, display, session-631, idempotency:ver-sub032-odu-latency-631, idempotency:ver-sub032-odu-latency-631
VER-REQ-092 Verify SUB-REQ-038: Apply input voltages at 18VDC (minimum), 28VDC (nominal), and 32VDC (maximum) to the PDU. Record output rail voltages, ripple, and current draw at each setpoint. Pass criterion: all regulated outputs remain within ±2% of nominal; ripple within spec; no BIT fault at any voltage.
Rationale: PDU input range compliance ensures the system operates correctly across vehicle electrical bus excursions per MIL-STD-1275E (Characteristics of 28 Volt DC Electrical Systems in Military Vehicles); end-to-end output compliance must be measured on the integrated unit.
Test verification, pdu, power, session-631, idempotency:ver-sub038-pdu-voltage-631, idempotency:ver-sub038-pdu-voltage-631
VER-REQ-093 Verify SUB-REQ-040: Measure all three regulated output rails (12V, 5V, 3.3V) under no-load, 50% load, and full load conditions. Record voltage, ripple, and transient response to 10% step load. Pass criterion: regulation within ±2% of nominal and ripple within spec at all load points.
Rationale: DC-DC converter output accuracy affects digital logic and analogue sensor circuits; ±2% tolerance must be verified under load variations because converter regulation worsens at extremes that datasheets may not fully characterise for the integrated thermal environment.
Test verification, pdu, power, session-631, idempotency:ver-sub040-dcdc-rails-631, idempotency:ver-sub040-dcdc-rails-631
VER-REQ-094 Verify SUB-REQ-045: Image a 1951 USAF resolution target at a standardised distance. Measure resolved spatial frequency per MIL-STD-150A (Photography). Pass criterion: camera resolves groups at or better than 0.3 mrad/pixel angular subtense; minimum frame rate of 30fps confirmed under full dynamic range conditions.
Rationale: Day camera resolution is the foundational sensor performance parameter for target identification and tracking; actual resolution depends on detector pixel pitch, optics quality, and focus, which must be measured on the delivered unit.
Test verification, eosa, day-camera, performance, session-631, idempotency:ver-sub045-day-camera-res-631, idempotency:ver-sub045-day-camera-res-631
VER-REQ-095 Verify SUB-REQ-069: Using HIL test bench with FCS computer and TTP simulator, command target tracking sequence and verify TTP output packet rate is not less than 50 Hz and angular resolution is not coarser than 0.05 mrad over 60 seconds of continuous tracking. Pass criterion: 0 missed packets in 60 s, resolution confirmed by oscilloscope capture of raw PCIe bus.
Rationale: Integration test verifying TTP output specification at the FCS internal interface. Test bench allows repeatable stimulus without live optics.
Test verification, fire-control-system, session-632, idempotency:ver-sub-069-632
VER-REQ-096 Verify SUB-REQ-070: Using ballistic test bench with known meteorological inputs and a reference trajectory database, run 100 fire solution computations at 1500m range with 0, 10, and 20 km/h simulated crosswind. Compare BCM output (lead angle, elevation correction, fuze delay) against reference database. Pass criterion: output latency less than 20ms per solution, first-round hit prediction error within P1H 0.7 accuracy against 2m x 2m target model.
Rationale: Ballistic accuracy is safety-significant — incorrect fire solutions cause engagement failures and potential collateral effects. Test bench validation with reference trajectories allows pre-qualification before live firing.
Test verification, fire-control-system, session-632, idempotency:ver-sub-070-632
VER-REQ-097 Verify SUB-REQ-071: Using CIU test bench with network packet injection tool, transmit 200 MIL-STD-6016 messages with correct authentication and 50 messages with corrupted authentication tokens. Verify: all 200 valid messages processed, all 50 invalid messages rejected and logged, no rejected message propagates to fire control data bus. Pass criterion: 0 false accepts, 0 missed rejects, 100% logging of rejection events.
Rationale: Authentication failure allows injection of false target data or fire commands — this is a safety-significant cybersecurity requirement. Test bench injection simulates adversarial network attack without live network exposure.
Test verification, communications-interface-unit, cybersecurity, session-632, idempotency:ver-sub-071-632
VER-REQ-098 Verify SUB-REQ-073: Inject a synthetic processing fault signal into the Fire Control Computer test interface while weapon is in fire-ready state. Confirm: (a) weapon firing inhibited within 100ms, (b) fault code annunciated on OCU display, (c) no weapon discharge occurs. Pass if all three conditions met in 5 repeated trials.
Rationale: Functional safety test for FCC fault response. Must demonstrate deterministic safe-state transition within the 100ms timing budget under fault injection conditions representative of worst-case processing failure.
Test verification, fire-control-system, sil-2, session-633, idempotency:ver-sub-073-v2-633
VER-REQ-099 Verify SUB-REQ-074: With weapon in fire-ready state, apply fire command alone (no safety controller agree) and confirm firing relay does not energise. Apply safety controller agree alone and confirm firing relay does not energise. Apply both simultaneously and confirm firing relay energises within timing spec. Remove one input and confirm relay de-energises within 5ms. Pass if all cases behave as specified.
Rationale: Combinatorial test of dual-confirmation logic must verify all four input combinations to demonstrate that the AND gate is correctly implemented in hardware, not only the positive case.
Test verification, fire-control-system, sil-2, session-633, idempotency:ver-sub-074-633
VER-REQ-100 Verify SUB-REQ-079: From a cold system state, attempt to achieve fire-ready state without performing target identification on the OCU. Confirm system blocks fire-ready transition. Perform positive ID procedure with operator confirmation. Confirm fire-ready state is now achievable. Review post-engagement audit log and verify timestamp and operator ID are recorded. Pass if blocking and logging both verified.
Rationale: ROE requirement must be verified both functionally (blocking behaviour) and as an audit trail (logging completeness). Inspection of the audit log is the only verifiable evidence of the ethical compliance obligation.
Inspection verification, fire-control-system, ethical, roe, session-633, idempotency:ver-sub-079-633
VER-REQ-101 Verify SUB-REQ-081: Following a barrel replacement, command boresight verification from OCU. Measure time from command to result display. Introduce a calibrated 0.25 mrad bore offset and confirm pass result. Introduce 0.35 mrad offset and confirm fail result. Pass if: (a) result displayed within 60s, (b) 0.25 mrad gives pass, (c) 0.35 mrad gives fail.
Rationale: Boresight verification must be tested at both sides of the 0.3 mrad threshold to confirm the measurement system resolution is adequate and the pass/fail criterion is correctly implemented, not merely that a result is displayed.
Test verification, fire-control-system, session-633, idempotency:ver-sub-081-633
VER-REQ-103 Verify SUB-REQ-083: Power-cycle FCC three times using hardware watchdog timeout injection. Measure time from watchdog assertion to restoration of operational mode via BIT completion. Pass if all three restarts complete within 10 seconds with weapon remaining in SAFE state confirmed by Safety Interlock System state log.
Rationale: Directly verifies the 10s recovery time bound and SAFE state maintenance defined in SUB-REQ-083 under hardware-injected fault conditions.
Test verification, fire-control-system, sil-2, fcc-fdir, session-634, idempotency:ver-sub083-restart-634
VER-REQ-104 Verify SUB-REQ-084: Present a representative operator to the OCU interface without prior training for this specific layout. Task: from rest state, reach and activate ARM, FIRE, MODE SELECT, and TRACK ENABLE functions. Count control actuations per function. Pass if all four functions reachable within two actuations.
Rationale: Usability demonstration with naive operator provides a valid test of the two-actuation bound without familiarity bias, directly verifying the human factors requirement.
Demonstration verification, operator-control-unit, hmi, session-634, idempotency:ver-sub084-hmi-634
VER-REQ-105 Verify SYS-REQ-018: Set up two NATO standard vehicle targets (2.3m x 2.3m) at 1500m (day) and 800m (night/obscured) under prescribed illumination conditions. Operator identifies all 10 targets across two sensor modalities. Pass criterion: >= 9/10 correct identifications at each range using both EO and TI channels independently.
Rationale: SYS-REQ-018 is a performance acceptance criterion that directly drives field trials. Range verification must use a representative tactical scenario with human operator to confirm the full system (optics + stabilisation + display chain) meets the PID requirement, not just the sensor module in isolation.
Test session-635, qc, sensors, idempotency:qc-635-ver-sys-req-018-pid
VER-REQ-106 Verify SYS-REQ-010: With RWS on system integration test bench, weapon loaded and turret in motion at 30 deg/s azimuth, activate E-STOP at OCU. Measure time from E-STOP button press to (a) firing solenoid circuit open and (b) both axis brake solenoids energised, using instrumented current probes at 1kHz sampling. Perform 20 trials at +25°C and 5 trials at -46°C cold soak. Pass criterion: turret drives de-energised and brakes engaged within 200ms on all 25 trials; firing circuit open within 50ms on all 25 trials.
Rationale: SYS-REQ-010 is the system-level 200ms E-STOP timing requirement addressing H-002 (uncommanded turret motion crushing personnel, SIL-2) and H-003 (failure to safe state, SIL-3). Sub-component tests VER-REQ-009 and VER-REQ-084 verify individual SSOD and SIS signal paths but do not demonstrate end-to-end system timing from operator input to full mechanical brake engagement. A system-level test with instrumented current probes is required to close the safety argument for H-002 and H-003 at the SYS requirement level.
Test session-636, validation, safety-interlock-system, sil-2, sil-3, idempotency:ver-sys-010-estop-system-test-636
VER-REQ-107 Verify SYS-REQ-009: On system integration bench with RWS in Engagement mode (weapon armed, turret active), interrupt the operator control link (OCU CAN bus cable disconnected) and measure time to (a) SAFE state assertion on the SIS bus and (b) firing solenoid circuit open, using instrumented CAN bus monitor and current probe at 1kHz. Perform 10 trials at ambient and 3 trials after 4-hour cold soak at -46°C. Also test link degradation scenario: inject 300ms sporadic dropout followed by total loss. Pass criterion: SAFE state asserted and firing circuit open within 500ms of last valid heartbeat on all 13 trials; no inadvertent safe-state trigger during the sporadic dropout phase.
Rationale: SYS-REQ-009 directly addresses H-006 (loss of operator control while weapon armed, SIL-2): the 500ms safe-state timing must be verified at system level because the chain spans three subsystems (OCU/gateway heartbeat watchdog, SIS DCSC, SSOD relay). VER-REQ-003 verifies SUB-REQ-005 watchdog timing only; no existing VER test demonstrates the full end-to-end 500ms chain including relay actuation at system level. The sporadic dropout case tests the hazard where EMI or connector vibration causes intermittent link loss — the system must not false-trigger while still responding to genuine link loss.
Test session-636, validation, safety-interlock-system, sil-2, idempotency:ver-sys-009-linkloss-system-test-636
VER-REQ-108 Verify SYS-REQ-017: Submit complete RWS assembly to MIL-STD-461G (Requirements for the Control of Electromagnetic Interference Characteristics of Subsystems and Equipment) conducted emissions and susceptibility test suite. Test cases shall include: RE102 radiated emissions scan from 10kHz to 18GHz; RS103 radiated susceptibility from 10kHz to 40GHz at field strengths per MIL-STD-461G Table RS103-I; CE102 conducted emissions on all power input cables; CS114/CS115 conducted susceptibility on power and signal lines. During RS103 exposure, the RWS shall be in Engagement mode with weapon armed. Pass criterion: RE102 emissions below applicable limits at all frequencies; RS103 susceptibility test results in no weapon state change, no loss of operator display, and no spurious safe-state assertions; CE102 within limits. Following EMC test, execute full BIT and confirm no latent faults.
Rationale: SYS-REQ-017 is safety-relevant: H-001 and H-007 both cite EMI as a cause of uncommanded weapon discharge (SIL-3 hazard) and software state machine corruption. Performing RS103 susceptibility with weapon armed directly tests whether EMI can cause inadvertent firing — this is the key scenario not covered by any existing VER requirement. No VER entry for SYS-REQ-017 existed prior to this session. MIL-STD-461G (not just 461F) is the current applicable standard for ground military vehicles per DEF-STAN 59-411.
Test session-636, validation, sil-3, emc, idempotency:ver-sys-017-emc-test-636
VER-REQ-109 Verify SYS-REQ-002: From a running vehicle in Surveillance mode, an operator acquires a stationary 2m x 2m target presented at 200m via thermal channel. Measure elapsed time from operator designation of target to first round fired (all operator actions timed). Perform 20 trials with two qualified crews in representative terrain/lighting. Pass criterion: detection-to-fire sequence completes within 8 seconds on ≥90% of trials (18/20); no trial exceeds 12 seconds. Record all sub-intervals: time-to-designation, ARM sequence duration, auto-tracker acquisition time, fire control solution latency.
Rationale: SYS-REQ-002 (≤8s detection-to-fire) is a top-level system performance requirement derived from STK-REQ-001 (effective threat response in urban patrol). The 8s budget is decomposed across auto-tracker acquisition (SUB-REQ-066, ≤3s), FCC solution latency (SUB-REQ-063, ≤200ms), and ARM sequence (SUB-REQ-002), but no system-level test validates the complete human-in-the-loop sequence time including OCU menu interactions. This test closes the scenario validation gap in the Urban Patrol Engagement ConOps scenario.
Test session-636, validation, fire-control-system, idempotency:ver-sys-002-sequence-timing-636
VER-REQ-110 Verify SYS-REQ-012: Apply power to RWS after 4-hour cold soak at -46°C. Measure time from power application to either (a) Surveillance mode ready state (all BIT checks pass) or (b) fault-displayed state (BIT detects safety-critical failure). Monitor SIS, FCS, servo drives, and sensor status via test instrumentation. Perform 5 trials at -46°C and 5 trials at +71°C. Pass criterion: BIT completes and mode transition occurs within 90 seconds on all trials; injected fault in servo drive (open-circuit fault) is detected and displayed within BIT on all 5 fault-injection trials; BIT does not pass with injected fault present.
Rationale: SYS-REQ-012 is the gate between Initialization/BIT mode and Surveillance — a critical safety mode transition requirement. Failure to detect safety-critical faults during BIT allows the system to enter operational mode with unsafe hardware, directly enabling H-001, H-002, and H-003. The 90-second timing at -46°C is the worst-case temperature; no existing VER requirement verifies the BIT as a complete system sequence including fault detection sensitivity. The fault injection case is essential to validate that BIT has sufficient coverage to detect the failure modes it claims to catch.
Test session-636, validation, safety-interlock-system, sil-3, idempotency:ver-sys-012-bit-timing-636
VER-REQ-111 Verify SYS-REQ-008: On fully integrated RWS with FCS in Engagement mode and weapon ARMED, force the FCS main processor into a software exception state (inject memory corruption pattern at known address in test firmware). Confirm: (a) the Hardware Firing Interlock Relay remains de-energised (no firing solenoid current), (b) the Dual-Channel Safety Controller independently commands SAFE state within 100ms of FCS watchdog timeout, (c) no weapon discharge occurs. Repeat with SIS test harness applying all defined safety conditions in sequence (E-STOP, maintenance mode key, interlock trip, link loss). Pass criterion: firing solenoid circuit reads <1mA (open) under all FCS fault states; each safety condition individually prevents firing independently of FCS state within 100ms.
Rationale: SYS-REQ-008 states the hardware firing interlock must be independent of fire control software — directly addressing H-001 (uncommanded discharge via electrical fault or software error, SIL-3) and H-007 (software fault causing fire via state machine corruption, SIL-3). The independence property cannot be verified by sub-component tests alone; it requires demonstrating that with FCS software in a known fault state, the hardware interlock still enforces safe-state. This is the key IEC 61508 (Functional safety of E/E/PE safety-related systems) architectural independence argument for SIL-3 at the system level.
Test session-636, validation, safety-interlock-system, sil-3, idempotency:ver-sys-008-hw-interlock-independence-636
VER-REQ-112 Verify SUB-REQ-077: Configure PDU test harness with three safety-critical branch loads (firing interlock relay simulator, safety controller supply, servo drive supply). Inject a sustained overcurrent fault (2x fuse rating for 200ms) on each branch in turn. Confirm: (a) the faulted branch disconnects and the load de-energises, (b) both remaining safety-critical branches remain energised and delivering rated voltage (28VDC ±2V) throughout the fault and recovery, (c) post-fault BIT detects the blown fuse and flags the fault within 5s. Repeat for all three branches. Pass criterion: zero voltage excursion >5% on non-faulted safety-critical branches; BIT detects all three fuse-blow events.
Rationale: SUB-REQ-077 is SIL-3 rated because PDU branch failure that interrupts safety interlock or safety controller power directly enables H-001 (uncommanded discharge) and H-003 (failure to safe). The independence property must be verified at system level with real overcurrent injection — PCB-level inspection cannot confirm isolation under fault conditions. The test proves the branching architecture protects all safety-critical loads simultaneously.
Test session-638, validation, power-distribution-unit, sil-3, idempotency:ver-sub077-pdu-branch-isolation-638
VER-REQ-113 Verify SUB-REQ-027: Connect SIS test harness to TDA servo controller. Establish normal azimuth slew at 30°/s. Command DRIVE-INHIBIT from SIS. Measure elapsed time from DRIVE-INHIBIT signal assertion to servo drive de-energisation and mechanical brake engagement on both axes. Log azimuth/elevation encoder data at 1kHz during the transition. Test at ambient temperature (+20°C) and cold soak (-40°C). Attempt to issue RESUME command while DRIVE-INHIBIT remains asserted; verify no motion occurs. Issue DRIVE-INHIBIT de-assert followed by FCC RESUME command and verify normal operation restores. Pass criterion: both axes cease motion and brakes engage within 200ms on all 10 trials at both temperatures; zero motion detected on RESUME-only command while DRIVE-INHIBIT is asserted.
Rationale: SUB-REQ-027 addresses H-002 (uncommanded turret motion, SIL-2): when the SIS determines a hazardous condition, the TDA must stop within 200ms to prevent personnel injury. The 200ms budget is safety-derived — turret inertia at 30°/s takes approximately 120ms to dissipate; the 200ms ceiling includes signal propagation and brake engagement. Testing at -40°C is required because lubricant viscosity affects brake engagement speed. The RESUME guard test verifies the SIS cannot be bypassed by the FCC.
Test session-638, validation, turret-drive-assembly, sil-2, idempotency:ver-sub027-tda-drive-inhibit-638
VER-REQ-114 Verify SUB-REQ-075: With FCS in Engagement mode and active auto-track on a designated target, inject a simulated target track dropout at TTP (suppress track update output). Measure: (a) time from dropout to FCS firing circuit inhibit, (b) time from dropout to operator warning display, (c) whether FCS requires explicit operator re-designation before accepting a new firing solution. Run 10 trials with dropout at 501ms (boundary), 1000ms, and 5000ms. Pass criterion: firing circuit inhibited within 600ms of 500ms continuous dropout; operator warning displayed within 1s of dropout; FCS refuses to compute firing solution until operator explicitly re-designates target on all 10 trials. No self-recovery without operator action accepted.
Rationale: SUB-REQ-075 is SIL-2 because stale track data driving an active fire solution without operator awareness directly enables H-004 (friendly fire via sensor degradation). The 500ms threshold is chosen because track loss shorter than this is within normal target obscuration tolerance; beyond 500ms the track is operationally invalid and must not drive autonomous firing. The operator re-designation guard prevents the system from resuming engagement on a track whose validity was lost without operator confirmation.
Test session-638, validation, fire-control-system, sil-2, idempotency:ver-sub075-fcs-trackloss-638
VER-REQ-115 Verify SUB-REQ-047: With weapon system mounted to vehicle, weapon cleared and condition confirmed SAFE by SIS BIT. Provide two qualified armourers with standard military tool sets (no specialist equipment). Initiate barrel change procedure: disassemble feed, remove barrel, fit new calibrated barrel, re-assemble feed, re-zero barrel alignment, confirm secure. Time from initiation to maintenance-complete with BIT pass confirmation. Perform 3 trials per armourer pair (6 total). Also perform 3 round-jam clearance trials. Pass criterion: barrel change completes within 15 minutes on all 6 trials (not 30 as per STK; SUB-REQ-047 allocates 30 total; barrel change alone must be ≤15 minutes to leave margin for round jam clearance); round jam clearance completes within 10 minutes on all 3 trials; BIT passes and confirms weapon safe after each trial.
Rationale: SUB-REQ-047 is SIL-2 because a weapon that cannot be brought to a safe confirmed state during maintenance (jam clearance timed out, barrel not seated correctly) creates a hazardous condition for the maintenance crew. Demonstration is appropriate because MTTR is a human factors metric that depends on tool set design and procedure quality; it must be demonstrated with qualified personnel under realistic field conditions, not simulated analytically.
Demonstration session-638, validation, weapon-and-ammunition-handling, sil-2, maintainability, idempotency:ver-sub047-waha-mttr-638
VER-REQ-116 Verify SUB-REQ-076: On FCS test bench, attempt to load firing table data via the BCM update interface using: (a) a valid authenticated packet with correct cryptographic signature, (b) a packet with corrupted signature (1-bit flip), (c) a replay of a previously accepted valid packet with incremented sequence counter, (d) an unauthenticated plaintext data payload. Log BCM acceptance or rejection for each case. Then load a valid authenticated firing table with a known ballistic solution offset; confirm the BCM fires solution reflects the loaded table. Pass criterion: (a) accepted and applied; (b), (c), (d) all rejected with fault logged; BCM ballistic solution reflects authenticated table contents within 2 computation cycles.
Rationale: SUB-REQ-076 is SIL-2 because a corrupted or adversarially injected firing table could produce systematic ballistic errors enabling H-004 (friendly fire from target misidentification or erroneous fire solution). Authentication of firing table updates is a safety-critical data integrity control. The replay attack case (c) tests sequence-counter enforcement which prevents an adversary replaying a previously-valid but now-stale table.
Test session-638, validation, fire-control-system, ballistic-computation-module, sil-2, cybersecurity, idempotency:ver-sub076-bcm-auth-638
VER-REQ-117 Verify SUB-REQ-082: With RWS in Degraded Operation mode and thermal imager deliberately disabled (fault injected via test interface), designate a stationary 2m x 2m target at 800m using day-channel only. Attempt target engagement using day channel tracking and LRF ranging. Measure: (a) minimum range at which target can be positively identified and tracked in day channel, (b) time from sensor failure detection to DEGRADED mode alert on OCU display (must be ≤3s per requirement), (c) engagement capability with remaining sensor. Perform 5 trials in typical overcast lighting. Pass criterion: positive target identification and stable track achievable at ≥800m in day channel; DEGRADED alert on OCU within 3s of sensor failure on all 5 trials; fire control solution computed and weapon capable of engaging within DEGRADED mode constraints.
Rationale: SUB-REQ-082 is a system-level degraded mode capability requirement derived from the Degraded Sensor Operation ConOps scenario (thermal crossover renders TI ineffective, crew must maintain mission capability on day camera). Demonstration is appropriate because the 800m engagement range under degraded conditions depends on the integrated sensor/FCS/human performance chain. No subsystem test verifies this end-to-end capability — it requires the full system with a qualified crew.
Demonstration session-638, validation, electro-optical-sensor-assembly, fire-control-system, degraded-mode, idempotency:ver-sub082-degraded-mode-638
VER-REQ-118 Verify SUB-REQ-078: With RWS powered and thermal imaging channel active, inject a simulated primary optical channel failure via test interface. Measure: (a) time from fault injection to thermal imaging data appearing on FCC video input (must be ≤2s), (b) operator alert displayed on OCU within 2s of failure. Repeat for 5 trials at ambient and boundary temperatures. Pass criterion: transition latency ≤2s and operator alert confirmed on all trials.
Rationale: SUB-REQ-078 requires the EOSA to continue providing thermal imaging data with no more than 2s transition latency when the optical channel fails. Identified as unverified during validation session 638. Demonstration required because failover involves sensor hardware, FCC processing, and operator display chain.
Demonstration reqs-eng-session-641, electro-optical-sensor-assembly, verification
VER-REQ-119 The Electro-Optical Sensor Assembly SHALL be verified to operate correctly when supplied with 20V, 28V, and 32VDC input. Measure power consumption, sensor image quality, and stabilisation performance at each voltage. Pass criterion: all sensor functions nominal across the full 20-32V range.
Rationale: SUB-REQ-012 specifies EOSA 28VDC power input with 20-32V operating range. Boundary testing at min/max voltage ensures sensors maintain performance under vehicle power bus variation.
Test verification
VER-REQ-120 While the Thermal Imaging Camera is in FAILED state, the Electro-Optical Sensor Assembly SHALL be verified to continue providing day-channel video to the Fire Control Computer. Inject a TI channel failure and confirm day video stream continuity within 2s. Repeat for 5 trials. Pass criterion: day channel uninterrupted on all trials.
Rationale: SUB-REQ-031 requires EOSA to provide day-channel continuity when TI fails. This is the inverse of SUB-REQ-078 (optical failure → TI continuity). Both failover paths must be demonstrated to confirm SYS-REQ-011 degraded operation.
Demonstration review-session-642, electro-optical-sensor-assembly, verification
VER-REQ-121 The Gunner Hand Controller SHALL be verified to transmit azimuth and elevation slew commands at the specified rate. Connect GHC to OCU CPU via production cable and measure command output rate and latency using a protocol analyser. Pass criterion: slew command rate and latency within SUB-REQ-033 specification.
Rationale: SUB-REQ-033 specifies GHC command output rate for operator control responsiveness. Untested GHC output could introduce control latency affecting engagement timelines (SYS-REQ-002).
Test review-session-642, operator-control-unit, verification
VER-REQ-122 The Video Compression and Network Interface Module SHALL be verified to compress and transmit daylight and thermal video at the specified resolution and frame rate. Stream live sensor video through VCNIM to a network analyser. Measure output bitrate, resolution, latency, and frame rate. Pass criterion: meets SUB-REQ-035 specification.
Rationale: SUB-REQ-035 specifies VCNIM compression performance for video distribution to BMS and tactical data link. Insufficient compression or excess latency would degrade remote situational awareness (SYS-REQ-013).
Test review-session-642, communications-interface-unit, verification
VER-REQ-123 The CAN Bus and Serial Protocol Gateway SHALL be verified to receive and republish CAN bus and serial data correctly. Inject CAN 2.0B and RS-422 test frames at rated bus speed and confirm correct republishing on all output ports. Pass criterion: zero frame loss over 10000 frames at rated speed.
Rationale: SUB-REQ-036 specifies the gateway's CAN/serial bridging function. Incorrect republishing would corrupt sensor data or control commands between subsystems (SYS-REQ-013, IFC-REQ-027).
Test review-session-642, communications-interface-unit, verification
VER-REQ-124 The EMC Filter and Surge Protection Assembly SHALL be verified to suppress conducted emissions to the levels specified in MIL-STD-461G CE102. Apply conducted emissions test per MIL-STD-461G Method CE102 with PDU powered at rated load. Pass criterion: emissions below MIL-STD-461G CE102 limits across 10kHz–10MHz.
Rationale: SUB-REQ-037 specifies EMC filter performance to meet SYS-REQ-017 MIL-STD-461G compliance. Without verification, conducted emissions could interfere with vehicle electronics or fail platform EMC certification.
Test review-session-642, power-distribution-unit, verification
VER-REQ-125 The Power Monitor and Control Unit SHALL be verified to sample voltage and current on each subsystem power rail at the specified rate and accuracy. Apply calibrated voltage and current sources to PMCU inputs and compare PMCU readings against reference instrumentation. Pass criterion: measurement accuracy within SUB-REQ-041 specification.
Rationale: SUB-REQ-041 specifies PMCU monitoring accuracy for health monitoring and fault detection. Inaccurate power monitoring could mask overload conditions or trigger false fault alarms (IFC-REQ-029).
Test review-session-642, power-distribution-unit, verification
VER-REQ-126 The Tactical Data Link Processor SHALL be verified to operate correctly from the vehicle 28V DC bus across the 18V–32V operating range. Apply 18V, 28V, and 32VDC to TDLP power input and verify MIL-STD-6016 message processing at each voltage. Pass criterion: all link functions nominal at boundary voltages.
Rationale: SUB-REQ-072 specifies TDLP power input range from the vehicle DC bus. Power boundary verification ensures tactical data link availability under vehicle electrical transients — critical for remote engagement authorisation.
Test review-session-642, communications-interface-unit, verification
VER-REQ-127 The Tactical Data Link Processor SHALL be verified to comply with MIL-STD-6016E message format and timing. Connect TDLP to a certified MIL-STD-6016E test facility and execute the standard interoperability test suite. Pass criterion: full compliance with MIL-STD-6016E J-series message catalogue and network timing.
Rationale: SUB-REQ-080 specifies MIL-STD-6016E compliance for tactical data exchange. Interoperability testing is essential — non-compliant message formatting would prevent integration with allied C2 systems.
Demonstration review-session-642, communications-interface-unit, verification

Traceability Matrix — Verification

RequirementVerified ByDescription
VER-REQ-067 SUB-REQ-011 FCS power input range verification
REQ-SEREMOTEWEAPONSTATIONRWS-008 SUB-REQ-012 EOSA 28VDC power boundary test
REQ-SEREMOTEWEAPONSTATIONRWS-009 SUB-REQ-031 EOSA TI failure day-channel continuity
REQ-SEREMOTEWEAPONSTATIONRWS-011 SUB-REQ-035 VCNIM video compression performance
REQ-SEREMOTEWEAPONSTATIONRWS-010 SUB-REQ-033 GHC slew command output rate and latency
REQ-SEREMOTEWEAPONSTATIONRWS-013 SUB-REQ-037 EMC filter conducted emissions MIL-STD-461G
REQ-SEREMOTEWEAPONSTATIONRWS-012 SUB-REQ-036 CAN/serial gateway frame republishing
REQ-SEREMOTEWEAPONSTATIONRWS-015 SUB-REQ-072 TDLP power boundary voltage test
REQ-SEREMOTEWEAPONSTATIONRWS-014 SUB-REQ-041 PMCU voltage/current measurement accuracy
REQ-SEREMOTEWEAPONSTATIONRWS-016 SUB-REQ-080 TDLP MIL-STD-6016E interoperability
REQ-SEREMOTEWEAPONSTATIONRWS-007 SUB-REQ-078 VER-REQ-118 verifies SUB-REQ-078 EOSA TI-to-optical channel failover ≤2s
VER-REQ-117 SUB-REQ-082 Full-system degraded mode demonstration verifies 800m engagement capability with single sensor modality
VER-REQ-116 SUB-REQ-076 Cryptographic authentication and replay attack test verifies BCM rejects unauthenticated firing table updates
VER-REQ-115 SUB-REQ-047 Timed barrel change and jam clearance demonstration verifies WAHA MTTR ≤30 minutes by two-person team
VER-REQ-114 SUB-REQ-075 Track dropout injection test verifies FCS disarms and requires operator re-designation on track loss
VER-REQ-113 SUB-REQ-027 Servo timing and brake engagement test verifies TDA stops within 200ms of DRIVE-INHIBIT assertion
VER-REQ-112 SUB-REQ-077 Overcurrent fault injection test verifies PDU safety-critical branch independence at system level
REQ-SEREMOTEWEAPONSTATIONRWS-006 SUB-REQ-073 VER-REQ-102 verifies SUB-REQ-073 FCC fault response
REQ-SEREMOTEWEAPONSTATIONRWS-005 SUB-REQ-016 VER-REQ-068 verifies SUB-REQ-016 WCI FIRE command
REQ-SEREMOTEWEAPONSTATIONRWS-004 SUB-REQ-060 VER-REQ-055 verifies SUB-REQ-060 TDA environmental testing
REQ-SEREMOTEWEAPONSTATIONRWS-003 SUB-REQ-055 VER-REQ-050 verifies SUB-REQ-055 FCS enclosure inspection
VER-REQ-104 SUB-REQ-084 Verification of OCU two-actuation HMI workload bound
VER-REQ-103 SUB-REQ-083 Verification of FCC controlled restart and SAFE state maintenance
REQ-SEREMOTEWEAPONSTATIONRWS-006 SUB-REQ-073 Verification of SUB-REQ-073 fault response behaviour
VER-REQ-101 SUB-REQ-081 Verification of automated boresight accuracy and timing
VER-REQ-100 SUB-REQ-079 Negative-path test verifies FCS positive ID enforcement and audit logging
VER-REQ-099 SUB-REQ-074 Verification of WCI dual-confirmation hardware logic
VER-REQ-098 SUB-REQ-073 Verification of FCC fault-to-safe-state transition
VER-REQ-097 SUB-REQ-071 Packet injection test verifies TDL authentication
VER-REQ-096 SUB-REQ-070 Ballistic bench test verifies BCM output specification
VER-REQ-095 SUB-REQ-069 HIL test verifies TTP output specification
VER-REQ-094 SUB-REQ-045 Verification of SUB-REQ-045
VER-REQ-090 SUB-REQ-030 Verification of SUB-REQ-030
VER-REQ-091 SUB-REQ-032 End-to-end latency measurement verifies ODU display latency bound
VER-REQ-092 SUB-REQ-038 Verification of SUB-REQ-038
VER-REQ-093 SUB-REQ-040 Verification of SUB-REQ-040
VER-REQ-089 SUB-REQ-029 Verification of SUB-REQ-029
VER-REQ-088 SUB-REQ-025 Verification of SUB-REQ-025
VER-REQ-087 SUB-REQ-026 Verification of SUB-REQ-026
VER-REQ-074 SUB-REQ-065 Verification of SUB-REQ-065 degraded mode switchover
VER-REQ-073 SUB-REQ-068 Verification of SUB-REQ-068
VER-REQ-072 SUB-REQ-067 Verification of SUB-REQ-067
VER-REQ-071 SUB-REQ-066 Verification of SUB-REQ-066
VER-REQ-070 SUB-REQ-064 Verification of SUB-REQ-064
VER-REQ-069 SUB-REQ-063 Verification of SUB-REQ-063
VER-REQ-001 SUB-REQ-001 FMEDA analysis verifies 1oo2D PFD meets SIL 3
VER-REQ-002 SUB-REQ-002 Combinatorial state test verifies two-action arming and timeout
VER-REQ-003 SUB-REQ-005 Temperature-swept timing test verifies 200ms watchdog trigger
VER-REQ-004 SUB-REQ-008 Fault injection test verifies 100ms safe state response and latch
VER-REQ-007 SUB-REQ-003 Hardware firing interlock relay normally-open state verification
VER-REQ-008 SUB-REQ-004 Hardware firing interlock relay de-energise timing test
VER-REQ-009 SUB-REQ-006 Safe State Output Driver E-stop actuation test
VER-REQ-010 SUB-REQ-007 Arming Key Switch MAINTENANCE-LOCKOUT inspection
VER-REQ-011 SUB-REQ-009 Safety Interlock System power supply range test
VER-REQ-014 SUB-REQ-013 HIL loop rate test verifies FCC 50Hz pointing loop
VER-REQ-015 SUB-REQ-015 BCM step-response test verifies 20ms ballistic computation latency
VER-REQ-016 SUB-REQ-017 Hardware injection test verifies FCS safe-state response to SIS
VER-REQ-020 SUB-REQ-022 Structural and alignment test for Weapon Cradle and Mount
VER-REQ-026 SUB-REQ-039 Verification of SSPC fault isolation time
VER-REQ-036 SUB-REQ-020 Hardware watchdog starvation test verifies SAFE assertion within 100ms
VER-REQ-037 SUB-REQ-021 Power supply bench test verifies MIL-STD-1275E voltage range compliance
VER-REQ-038 SUB-REQ-042 Power range test verifies DCSC MIL-STD-1275E compliance
VER-REQ-039 SUB-REQ-043 Relay switching test verifies HFIR coil current and operate/release timing
VER-REQ-040 SUB-REQ-044 Elevation range and rate test against TDA elevation drive spec
VER-REQ-041 SUB-REQ-049 Motion simulator LOS error test against gyrostabilisation spec
VER-REQ-042 SUB-REQ-048 Boresight routine test including misalignment inhibit validation
VER-REQ-043 SUB-REQ-046 Reliability demonstration test and FMEA analysis for FCS MTBCF
VER-REQ-044 SUB-REQ-052 Watchdog starvation test verifies FCC WCI de-energisation and HMI notification
VER-REQ-045 SUB-REQ-053 Comms-loss solenoid timing test verifies WCI fail-safe requirement
VER-REQ-046 SUB-REQ-055 Inspection verification of FCS physical embodiment
VER-REQ-047 SUB-REQ-056 HIL test verification of link-loss detection timing
VER-REQ-048 SUB-REQ-057 Test verification of OCU degraded mode annunciation
VER-REQ-049 SUB-REQ-058 Motion simulator HIL test of TDC stabilisation accuracy
REQ-SEREMOTEWEAPONSTATIONRWS-003 SUB-REQ-055 Duplicate VER for SUB-REQ-055 physical embodiment
VER-REQ-051 SUB-REQ-059 Integration test verifying BCM CRC integrity check and fault flag
VER-REQ-052 SUB-REQ-050 Environmental qualification test for FCS LRU per MIL-STD-810H
VER-REQ-053 SUB-REQ-051 Endurance test verifying HFIR contact resistance under salt spray and cycling
VER-REQ-054 SUB-REQ-054 Fault injection test verifying PDU SSPC per-channel isolation time
VER-REQ-056 SUB-REQ-060 Temperature and IP67 test verifies TDA environmental protection requirement
VER-REQ-057 SUB-REQ-061 Environmental test verifies SIS temperature range and IP65 sealing
VER-REQ-058 SUB-REQ-062 Relay qualification test and contact resistance measurement verifies HW interlock relay spec
REQ-SEREMOTEWEAPONSTATIONRWS-004 SUB-REQ-060 Environmental qualification test for TDA mechanical assembly
REQ-SEREMOTEWEAPONSTATIONRWS-005 SUB-REQ-016 Trigger latency verification test for Weapon Control Interface
VER-REQ-059 SUB-REQ-014 Auto-track accuracy test for Target Tracking Processor
VER-REQ-060 SUB-REQ-018 Degraded mode day-camera tracking test
VER-REQ-061 SUB-REQ-019 Built-In Test functional verification for FCS
VER-REQ-062 SUB-REQ-023 Recoil force attenuation test for Recoil Buffer and Damping System
VER-REQ-063 SUB-REQ-028 Azimuth drive 360-degree rotation and position accuracy test
VER-REQ-064 SUB-REQ-034 MIL-STD-6016 data link conformance test for TDP
VER-REQ-065 SUB-REQ-010 TDA power input range verification
VER-REQ-066 SUB-REQ-024 Barrel change time demonstration
VER-100 IFC-REQ-025 VER-100 verifies IFC-REQ-025 BMS interface throughput
REQ-SEREMOTEWEAPONSTATIONRWS-002 IFC-REQ-027 VER-REQ-028 verifies IFC-REQ-027 GPS NMEA interface
VER-REQ-086 IFC-REQ-029 Verification of IFC-REQ-029
VER-REQ-085 IFC-REQ-026 Verification of IFC-REQ-026
VER-REQ-084 IFC-REQ-014 Verification of IFC-REQ-014
VER-REQ-083 IFC-REQ-012 Verification of IFC-REQ-012
VER-REQ-082 IFC-REQ-008 Verification of IFC-REQ-008
VER-REQ-081 IFC-REQ-007 Verification of IFC-REQ-007
VER-REQ-080 IFC-REQ-006 Verification of IFC-REQ-006
VER-REQ-076 IFC-REQ-002 Verification of IFC-REQ-002
VER-REQ-077 IFC-REQ-003 Verification of IFC-REQ-003
VER-REQ-075 IFC-REQ-001 Physical inspection + load test verifies turret ring interface compliance
VER-REQ-078 IFC-REQ-004 Verification of IFC-REQ-004
VER-REQ-079 IFC-REQ-005 Verification of IFC-REQ-005
REQ-SEREMOTEWEAPONSTATIONRWS-002 IFC-REQ-027 Integration test verifying CAN-gateway GPS data distribution to FCS
REQ-SEREMOTEWEAPONSTATIONRWS-001 IFC-REQ-025 Integration test verifying TDP-BMS MIL-STD-6016 interface
VER-REQ-035 IFC-REQ-024 Integrated bench test verifies OCU-FCC command latency under video load
VER-REQ-034 IFC-REQ-022 Life endurance test verifies slip ring contact resistance and signal integrity
VER-REQ-033 IFC-REQ-020 Physical integration test verifies belt tension at traverse extremes
VER-REQ-032 IFC-REQ-017 RS-422 bench test verifies FCC-WCI command latency and CRC
VER-REQ-031 IFC-REQ-016 HIL test verifies FCC-BCM data interface latency
VER-REQ-030 IFC-REQ-027 Verification of IFC-REQ-027 GPS timing accuracy to FCS
VER-REQ-029 IFC-REQ-025 Verification of IFC-REQ-025 BMS radio interface throughput
VER-REQ-025 IFC-REQ-028 Verification of SIS always-on supply interface
VER-REQ-024 IFC-REQ-027 Verification of CAN gateway GPS distribution to FCS
VER-REQ-023 IFC-REQ-025 Verification of TDP-BMS interface
VER-REQ-022 IFC-REQ-023 EOSA dual-channel video interface integration test
VER-REQ-021 IFC-REQ-021 FCC-TDC interface integration test
VER-REQ-019 IFC-REQ-019 Verification of round-count interface
VER-REQ-018 IFC-REQ-018 Verification of barrel retention interface
VER-REQ-017 IFC-REQ-015 PCIe latency test verifies TTP-FCC interface rate and latency
VER-REQ-013 IFC-REQ-010 SIS to TDA drive inhibit hardwired path test
VER-REQ-012 IFC-REQ-009 Relay timing and isolation test verifies SIS-WAH firing circuit interrupt
VER-REQ-006 IFC-REQ-013 AND-gate and weld test verifies dual-channel firing barrier interface
VER-REQ-005 IFC-REQ-011 Interface test verifies key switch voltage levels and continuity monitoring
VER-REQ-111 SYS-REQ-008 FCS fault injection test verifies hardware firing interlock is independent of software state - the architectural independence claim for SIL-3
VER-REQ-110 SYS-REQ-012 System-level BIT completion and fault detection test verifies 90s mode gate timing and safety-critical fault coverage
VER-REQ-109 SYS-REQ-002 System-level detection-to-fire sequence test verifies 8s timing requirement with two-crew trial
VER-REQ-108 SYS-REQ-017 Full MIL-STD-461G test suite verifies system-level EMC compliance and safety under EMI exposure
VER-REQ-107 SYS-REQ-009 System-level link-loss end-to-end timing test verifies SYS 500ms safe-state requirement
VER-REQ-106 SYS-REQ-010 System-level E-STOP end-to-end timing test verifies SYS requirement for 200ms safe-state transition
VER-REQ-105 SYS-REQ-018 VER-REQ-105 verifies SYS-REQ-018 PID range via field trial

Orphan Requirements (no trace links)

RefDocumentRequirement
VER-REQ-068 verification-plan Verify SUB-REQ-016: Inject a FIRE command from FCS simulator to Weapon Control Interface (WCI) using a calibrated signal...
VER-REQ-118 verification-plan Verify SUB-REQ-078: With RWS powered and thermal imaging channel active, inject a simulated primary optical channel fail...
VER-REQ-119 verification-plan The Electro-Optical Sensor Assembly SHALL be verified to operate correctly when supplied with 20V, 28V, and 32VDC input....
VER-REQ-120 verification-plan While the Thermal Imaging Camera is in FAILED state, the Electro-Optical Sensor Assembly SHALL be verified to continue p...
VER-REQ-121 verification-plan The Gunner Hand Controller SHALL be verified to transmit azimuth and elevation slew commands at the specified rate. Conn...
VER-REQ-122 verification-plan The Video Compression and Network Interface Module SHALL be verified to compress and transmit daylight and thermal video...
VER-REQ-123 verification-plan The CAN Bus and Serial Protocol Gateway SHALL be verified to receive and republish CAN bus and serial data correctly. In...
VER-REQ-124 verification-plan The EMC Filter and Surge Protection Assembly SHALL be verified to suppress conducted emissions to the levels specified i...
VER-REQ-125 verification-plan The Power Monitor and Control Unit SHALL be verified to sample voltage and current on each subsystem power rail at the s...
VER-REQ-126 verification-plan The Tactical Data Link Processor SHALL be verified to operate correctly from the vehicle 28V DC bus across the 18V–32V o...
VER-REQ-127 verification-plan The Tactical Data Link Processor SHALL be verified to comply with MIL-STD-6016E message format and timing. Connect TDLP ...