Causal Analysis For Alarm Flood Reduction

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Preprint, 11th IFAC Symposium on Dynamics and Control of Process Systems,

including Biosystems
June 6-8, 2016. NTNU, Trondheim, Norway

Causal analysis for alarm flood reduction


Vicent Rodrigo ∗,∗∗ Moncef Chioua ∗∗ Tore Hagglund ∗
Martin Hollender ∗∗

Department of Automatic Control, Lund University, SE-221 00 Lund,
Sweden (email: vicent.rodrigo.marco@gmail.com, tore@control.lth.se).
∗∗
ABB Corporate Research Germany, Wallstadter Strasse 59 (email:
moncef.chioua@de.abb.com, martin.hollender@de.abb.com)

Abstract: The introduction of distributed control systems and the high level of interconnectiv-
ity of modern process plants has caused alarm flooding to become one of the main problems in
alarm management of process plants. A reduction of alarm flood periods contributes to a decrease
in plant incidents. In this work, a combination of alarm log, process data and connectivity
analysis is used to isolate consequence alarms originating from the same process abnormality
and to provide a causal alarm suggestion. The effectiveness of the method is illustrated on an
industrial case study of an ethylene plant, a typical example of a large-scale industrial system.

Keywords: alarm systems, fault detection and diagnosis, root-cause, plant-wide disturbance,
plant connectivity, approximate sequence matching, large-scale systems.

1. INTRODUCTION propagates through the plant, these methods are unable to


suppress consequence alarms and to provide a proper di-
Alarm systems are crucial elements in the operation of agnosis. This task demands to identify all causal relations
process plants as they continuously monitor the process between alarms (Hollender and Beuthel, 2007).
and inform the operators if an undesired process state that
requires their assessment or action is reached (IEC-62682, Recently, several contributions from academia and indus-
2014). try proposed systematic methods for the grouping of con-
sequence alarms. Event correlation is applied in Higuchi
The introduction of distributed control systems in the et al. (2009) and Yang et al. (2012) for this purpose.
process industry has increased the number of alarms per On the other hand, noticing that a large portion of the
operator exponentially (Hollifield and Habibi, 2011). Ad- alarms occurring in an alarm flood are related to each
ditionally, nowadays, modern process plants present a high other and follow a specific pattern, Kabir et al. (2013)
level of interconnectivity due to steam recirculation, heat and Cheng et al. (2013) suggest using sequence pattern
integration and use of complex control systems. A dis- matching for grouping consequence alarms. Kabir et al.
turbance affecting the process plant can therefore spread (2013) presented a method in which the similarity between
through its material, energy and information connections alarm flood sequences is determined under the assump-
and affect all the process variables on the path. Alarms tion that alarms occur in a consequential manner. This
associated to these process variables are triggered and may assumption, may however not always be true as the or-
overload the control room operators who will not be able der of occurrence of alarms is highly dependent on their
to properly investigate each of these alarms (Wang et al., limit setting. Postulating that the exact order of alarm
2015). This undesired situation known as alarm flood occurrences is not as important as their proximity in time,
has been recognized as a major cause of most industrial Cheng et al. (2013) proposed an alternative method for
incidents investigated by the US Chemical Safety Board pattern matching of alarm flood sequences based on the
(Beebe et al., 2007). The ANSI/ISA-18.2 (2009) defines Smith-Waterman algorithm. Time stamps of the alarms
an alarm flood as the occurrence of more than 10 alarms present in the alarm flood sequence are used to blur the
per 10 minutes and per operator. In such situation, the order of the alarm sequence when the alarm time stamps
operators might not be able to keep the process plant are considered close to each other. Lai and Chen (2015)
within safe operation endangering human lives and the proposed an extension of this algorithm to the case of
environment (Bransby and Jenkinson, 1998). aligning multiple alarm flood sequences.
Henningsen and Kemmerer (1995) pointed out that in a In Schleburg et al. (2013), the authors suggest a method
typical alarm log, a significant part of nuisance alarms to group consequence alarms based on both a topology
fall in the following categories: repetitive alarms, standing model describing the process connectivity and a set of rules
alarms and consequence alarms. For removing repetitive built using process knowledge. In this method, every pair
and standing alarms methods such as the use of filter- of alarms is checked against the set of rules and the plant
ing, time-delay, dead-band and difference functions are connectivity to evaluate if two alarms are related.
proposed. These techniques succeed in lowering the num-
ber of alarms when the process is running under nomi- While grouping related alarms has a clear benefit in
nal conditions. Nevertheless if an abnormality occurs and assisting the operators reacting to an alarm flood episode,

Copyright © 2016 IFAC 723


IFAC DYCOPS-CAB, 2016
June 6-8, 2016. NTNU, Trondheim, Norway

pointing them to the causal alarm (i.e. the alarm related Alarm log
to the root-cause of the alarm flood) could significantly
reduce their reaction time.
Remove cha=ering
Causal root-cause analysis for process troubleshooting is alarms
Alarm log without
the topic of several recent contributions investigating the cha=ering alarms
design of systematic methods for abnormality propagation Iden7fy alarm flood
paths determination and plant-wide disturbances causal periods
analysis. Quantitative data-driven methods detecting di- Alarm flood sequences
rectionality between measurements have emerged, such as Cluster alarm flood
time delay analysis (Fan and Deyun, 2012) or transfer sequences Alarm flood sequences
entropy, which is used to identify the causality between clustered and an
abnormality template
measurements even in absence of observable time delays for each cluster
between them (Bauer et al., 2007). A combination of quan-
titative process history methods and qualitative models Map alarms to
Topology data Process data
signals and assets
like Signed direct graphs (SDG) (Fan and Deyun, 2012)
are proposed in Thambirajah et al. (2009). Abnormality
templates and alarm,
The present work follows the line of thought in Schleburg signal and assets
et al. (2013) but aims at developing a systematic method iden7fiers mapped
Isolate the causal
for the isolation of the causal alarm in an alarm flood. The alarm
proposed approach relies on the use of multiple process
information sources: alarm logs, historical process data Abnormality templates and
and a topology model of the process. Even though the corresponding causal
data originating from different information sources differ alarms

in their nature, they are related to each other.


Fig. 1. Method’s workflow
By combining alarm log, process data and conectivity
analysis not only related alarms of an alarm flood can be A = [a1 , a2 , ..., aM ]
grouped, but also their causal alarm can be identified. am = (em , tm ), m = 1, 2, ..., M and em ∈ Σ
where em is the alarm type, particularly a tag contained
2. CAUSAL ANALYSIS FOR ALARM FLOOD in the alphabet of alarm types Σ, and tm its time stamp.
REDUCTION
2.1 Remove chattering alarms
This section describes an approach for alarm flood reduc-
tion and causal alarm determination. Chattering alarms are defined by the industrial standard
The proposed approach relies on two assumptions: ANSI/ISA-18.2 (2009) as “alarms that repeatedly tran-
sition between the alarm state and the normal state in
(1) Alarm floods are the result of an abnormality prop- a short period of time”. Since the present work focuses
agating in the process through material, energy and on analyzing consequence alarms, chattering alarms are
information connections. removed prior to the causal analysis.
(2) If two alarm flood sequences are similar, then they
stem from the same process abnormality. Following Kabir et al. (2013), in order to remove chattering
alarms, a minimal admissible time interval length is chosen
Regarding the first hypothesis, the aim of this work is and if the time elapsed between the occurrences of two
to reduce alarm floods caused by a disturbance spreading alarms of the same type is lower than the chosen interval,
through the plant due to its high level of interconnectivity. the second alarm is removed. The minimal admissible time
As for the second hypothesis, if two alarm flood sequences interval length in the present work is taken as 10 min,
share a common pattern and if a large portion of the alarm based on the definition of alarm flood.
occurrences in the alarm floods are present in this pattern,
it is very likely that they originate from the same process 2.2 Identify alarm flood periods
abnormality.
This step isolates time periods where alarm floods occur
The method consists of five steps. In the first step, chatter-
and builds the corresponding alarm flood sequences.
ing alarms are removed from the alarm log. In the second
step, time intervals containing alam floods are identified The alarm log is divided into time intervals of 10 min.
and alarm flood sequences are built. Similar alarm flood Intervals with more alarm occurrences than a specified
sequences are clustered in the third step. In the fourth threshold are highlighted. The threshold (τ ) is chosen
step, the signals and assets associated with the analyzed based on the definition of an alarm flood, i.e. more than
alarms are identified. In the last step, process data causal 10 alarms per 10 min and per operator.
analysis followed by connectivity validation are performed
in order to suggest a causal alarm. The method’s general Duration of alarm floods in process plants ranges from a
workflow is depicted in Fig. 1. few minutes to several hours. In order to identify an alarm
flood regardless of its duration, consecutive intervals with
In the present work it is assumed that an alarm sequence more alarm occurrences than the specified threshold are
is defined as follows: merged. Since the alarm log is discretized, it might happen

724
IFAC DYCOPS-CAB, 2016
June 6-8, 2016. NTNU, Trondheim, Norway

that the beginning or the end of an alarm flood sequence is abnormality. Therefore, an alarm template can be built
cut out, in order not to lose part of the sequence, the time for each cluster/process abnormality. This alarm template
intervals before and after the consecutive time intervals contains the representative alarms that identify the corre-
containing more than τ alarms are also included. sponding process abnormality (Bouchair et al., 2013), see
Fig. 1. Alarms that are not related to a process abnormal-
2.3 Cluster alarm flood sequences ity can trigger during the same time interval. Obviously,
these alarms should not be included in the abnormality
Once the alarm flood time intervals are isolated and template. Filtering out these alarms is achieved based on
the alarm flood sequences are built, similar alarm flood their frequency of occurrence in the training set of alarm
sequences are clustered using sequence pattern matching. floods. The threshold on frequency of occurrence is set to
Alarm time stamps are taken into account as the proximity 50%, i.e. an alarm is kept only if it occurs in more than
in time of the alarms is more important than the exact or- 50% of the sequences belonging to a given cluster.
der of occurrence. We use the method described in Cheng
et al. (2013) based on a modified Smith-Waterman (MSW) Similarity
Clustering
Pre-filter and create
algorithm to blur the order of the alarms in the sequence indices
templates
when they occur closely in time. A similarity matrix is Set of alarm flood Reduced set of Similarity indices Alarm flood sequences
built using pairwise similarity indices obtained from the sequences combinations of alarm clustered and a fault
flood sequences template for each cluster
MSW algorithm. Finally, agglomerative hierarchical clus-
tering (AHC) with the average linkage criterion is applied
to cluster the alarm flood sequences. Fig. 2. Clustering alarm flood sequences step
One main disadvantage of the MSW algorithm is its The third step of the proposed method where alarm flood
heavy computational burden. In order to overcome this sequences are clustered and a set of templates defining
problem a prefiltering stage is added. A less precise but the process abnormalities of all clusters is generated is
less time consuming method is used (Kabir et al., 2013). summarized in Fig. 2 and described in Alg. 1.
Combinations of alarm sequences with low similarity are
filtered out and the MSW index computation is applied to
Alg. 1: Cluster alarm flood sequences
a subset of alarm sequence combinations with a significant input : Alarm flood sequences {Ai } : i = 1, 2, ..., N
similarity. A pair of alarm sequences is considered similar output: Clusters {Ck } : k = 1, 2, ..., K Ck = {Ai : i ∈ 1, 2, ..., N } and
fault templates {Tk } : k = 1, 2, ..., K Tk = {e : e ∈ Σ}
if the two alarm sequences have a high ratio of alarms
1 For each pair {Ai , Aj } : i 6= j and i, j = 1, 2, ..., N
in common. If two alarm sequences have few alarms in if(SIpref (Ai , Aj ) ≥ λpref ) add to list LM SW
common, the computation of the MSW similarity index is 2 Build an N × N similarity matrix S
discarded. A zero similarity index will be assumed. n
SIM SW (Ai , Aj ), if {Ai , Aj } ∈ LM SW
si,j =
0, otherwise
Two thresholds are used: the prefilter threshold (λpref )
and the clustering threshold (λclus ). The first threshold 3 {Ck } = AHC(S, λclus )
decides whether a pair of alarm sequences is filtered out. 4 For each Ck if (alarm type e ∈ Σ is present in more than 50% of
Ai ∈ Ck ) add e to Tk
The second threshold sets the stopping criteria of the
clustering algorithm. The values of these two thresholds
are interrelated: for a given clustering threshold, setting
the prefilter threshold too high can lead to combinations of 2.4 Map alarms to signals and assets
alarm sequences with MSW similarity index large enough
for being clustered, but with a prefilter similarity index The absence of a common naming convention for alarm,
too low to pass the prefilter. A solution to facilitate the signal and assets tags hinders a straightforward mapping
thresholds’ choice is to make the prefilter and the MSW between the different process information sources. We
similarity indices comparable. If one could insure that propose to map alarms, signals and assets based on the
SIpref ilter ≥ SIM SW , for a given clustering threshold if similarity of the symbols contained in their tag names.
the prefilter threshold is set to be equal or smaller than the For instance, the tag name of a temperature controller
clustering threshold, all pairs of alarms that have a MSW from the case study is TC11 in the P&ID, this controller
similarity index high enough to be clustered together will has a signal associated whose tag is TC11CO.XAY and
pass the prefilter. an alarm type TC11CO is assigned to this signal.
Given two alarm sequences A and B, a similarity index In this work six hashmaps {M apx→y : x 6= y, x, y =
that meet this requirement is: e, si, as} mapping alarm types (e), signals (si) and assets
(as) are generated based on the computation of a similarity
|A ∩ B| index as described in Alg. 2. Particularly, the similarity
SIpref ilter (A, B) = (1) index (SISW ) obtained from the original Smith Waterman
max(|A|, |B|) algorithm (Smith and Waterman, 1981).
The numerator represents the number of common alarm
occurrences in both sequences. And the denominator is the Alg. 2: Mapping signals and alarms
input : Sets of all signal tags Si={sitag } and all alarm types Σ
number of alarm occurrences of the longest sequence (the output: M apsi→e and M ape→si
similarity index is normalized between 0 and 1). 1 For each sitag , find emap : emap ∈ Σ, SISW (sitag , emap ) =
max({SI(sitag , e)}) e ∈ Σ, SISW (sitag , emap ) ≥ λmap
According to assumption (2) in Section 2, sequences be- 2 Add pair [sitag , emap ] to M apsi→e and [emap , sitag ] to M ape→si
longing to the same cluster stem from the same process

725
IFAC DYCOPS-CAB, 2016
June 6-8, 2016. NTNU, Trondheim, Norway

Fig. 3. P&ID of the cracking and quenching section of the ethylene plant

2.5 Isolate the causal alarm the plant is explored using a graph-search algorithm on
a graph capturing the connections between assets in the
The first alarm with respect to the time of occurrence plant. The depth first search algorithm is employed in
cannot be considered as the causal alarm since the time this work (Yang et al., 2010). The assets suggested as
at which an alarm triggers is highly dependent on the set- root-causes from the data-driven analysis are taken as
tings of the alarm limits. Moreover, the time between the starting points of the disturbance propagation path while
occurrence of a process abnormality and the corresponding the remaining assets are taken as secondary disturbed
alarm triggering is probabilistic. As the causal relation- elements. All feasible propagation paths between the sug-
ships between signals can be captured, the process data gested root-cause and each of the secondary disturbed
associated to these alarms should be analyzed instead. assets are explored. If no feasible path is found, the root-
cause hypothesis is discarded.
The method used for this purpose is transfer entropy
(Bauer et al., 2007). Transfer entropy uses transition prob- Once the spurious results of the data-driven analysis have
abilities to estimate the amount of information transferred been filtered out and one of the root-cause suggestions has
from one signal x to another signal y and reads: been validated with plant connectivity, the causal alarm is
X p(xi+h |yi , xi ) taken as the alarm associated to the root-cause asset (see
t(x|y) = p(xi+h , yi , xi ) · log (2) Alg. 3).
p(xi+h |xi )
The causality is obtained by comparing the amount of Alg. 3: Isolate the causal alarm
input : Clusters {Ck } and fault templates {Tk }
information transferred from signal x to signal y with the output: A causal alarm akc for each fautl template Tk
amount information transferred from signal y to signal x. 1 For each cluster Ck , choose a sequence Ai : Ai ∈ Ck
If tx→y is positive, more information is transferred from x 2 {sip } = M ape→si ({ep : ep ∈ Tk })
3 Perform process-data causal analysis on signals {sip } to obtain
to y, and therefore x caused y. If tx→y is negative, y caused suggested root-cause signals {siksg } : q ∈ N
x. If it has a value close to 0, then the causality cannot be 4 {ask k k
sg } = M apsi→as ({sisg,q }) and {assd } = M ape→as ({ep })
deduced. 5 If ( ∃ask k
sg,q with feasible propagation paths to all assd )
tx→y = t(y|x) − t(x|y) (3) ak k
c = M apas→e (assg,q )

This method may give rise to spurious results (Bauer


et al., 2007). In order to reduce their number, the ob-
tained results are validated against the plant connectiv- 3. INDUSTRIAL CASE STUDY
ity information contained in the topology model of the
plant (Thambirajah et al., 2009). CAEX (Computer Aided The proposed method determining the causal alarm in
Engineering eXchange) is a vendor independent object- alarm flood sequence is illustrated by an analysis con-
oriented data exchange format based on the XML schema ducted on the cracking and quenching section of an ethy-
that has been used in the past years for structuring plant lene plant located in Austria.
topology models in a flexible and expandable way (see e.g.:
Schleburg et al., 2013). The alarm management system of the plant has more than
3800 alarms configured in the monitoring system. The
The topology based validation of the data-driven analysis analysis is performed using eight months of collected alarm
starts with the identification of the assets corresponding data, during which more than 48000 alarms occurred. The
to the alarms in the fault template. The connectivity of process data is presented in an excel file with a one-second

726
IFAC DYCOPS-CAB, 2016
June 6-8, 2016. NTNU, Trondheim, Norway

sampling period data set. A CAEX file containing the


topology model of the plant is used. The P&ID of the plant
section is shown in Fig. 3. The data are analyzed using
a developed prototype software tool that guides the user
through the steps of the proposed method. The parameters
for the alarm analysis are set by the user. The threshold
number of alarms (τ ) (see Section 2.2) is set to a value
of six. Since operators of the ethylene plant control more
than one area, the threshold number of alarms is set to
a value smaller than 10 alarms per 10 min. Additionally,
the value of 0.4 is chosen for the clustering threshold as
well as for the prefiltering threshold (see Subsection 2.3).
The parameter σ 2 from the MSW algorithm (Cheng et al.,
2013) is set to 5000, allowing alarms with a time delay of
around 3.5min to be matched.

Fig. 5. Alarms (red) from the abnormality template of


Cluster 1 mapped to their corresponding signals
(blue) and assets (green)

Fig. 4. Clustering results: (a) Clusters (b) Abnormality


template of Cluster1

After loading the alarm log to the software tool and per-
forming the steps Remove chattering alarms and Identify
alarm flood periods, 23 alarm flood periods are identified. Fig. 6. Time trends of the signals included in the analysis
Results obtained from the Cluster alarm flood sequences
step are depicted in Fig. 4 (a). Three clusters are obtained.
From the 23 alarm sequences analyzed, four do not belong
to any cluster and 19 are clustered under one of the three
groups. Each one of these clusters containing similar alarm
flood sequences represents a different process abnormality.
Only the process abnormality from Cluster1 is further
analyzed. The template of this abnormality is displayed
in Fig. 4 (b).
To perform the data-driven and connectivity analysis, the
signals and assets associated to the alarms included in the
template are identified. After loading the process data and
the topology model of the plant, the automatic mapping
using the Smith-Waterman algorithm is performed. The
results are displayed in Fig. 5. Tags in red represent alarms, Fig. 7. Transfer entropy values tx→y
tags in blue signals and tags in green assets. For instance,
the valve G02 has an associated signal G02.Y and two suggests that the root-cause is the signal PC11.XAY.
alarms G02/010 and G02/011. GI01.Y, PC12.XAY, PI15.Y, PI14.Y, PI13.Y, PI16.Y and
GI02.Y are considered secondary disturbed signals (see
The process signals appearing in the mapping tree of Fig. 5 Fig. 7).
are considered for the analysis. These signals are displayed
in Fig. 6. The results of the process-data analysis are Finally, the result of the process-data analysis is validated
shown in a bubble chart representing the transfer entropy using the process connectivity. The process connectivity
based causality matrix (Bauer et al., 2007). The analysis analysis found feasible propagation paths starting from

727
IFAC DYCOPS-CAB, 2016
June 6-8, 2016. NTNU, Trondheim, Norway

propagation in a chemical process using transfer entropy.


IEEE Transactions on Control Systems Technology.
Beebe, D., Ferrer, S., and Logerot, D. (2007). Alarm floods
and plant incidents. ProSys.
Bouchair, N., Gayet, P., and Charbonnier, S. (2013). Fault
isolation by comparison of event lists using a weighted
distance. IEEE Internation Conference on Systems,
Man and Cybernetics.
Bransby, M.L. and Jenkinson, J. (1998). The management
of alarm systems: a review of best practice in the
procurement, design and management of alarm systems
in the chemical and power industries. HSE Research
Report CRR 166.
Cheng, Y., Chen, T., and Izadi, I. (2013). Pattern
Fig. 8. Propagation paths found by the connectivity anal- matching of alarm flood sequences by a modified smith-
ysis waterman algorithm. Chemical Engineering Research
and Design.
the suggested root-cause to all secondary disturbed points. Fan, Y. and Deyun, X. (2012). Progress in root cause
Fig. 8 depicts the obtained propagation paths. The process and fault propagation analysis of large-scale industrial
connectivity analysis suggests that the abnormality spread processes. Journal of Control Science & Engineering.
from the pressure controller PC11 S to the valves G01 Henningsen, A. and Kemmerer, J.P. (1995). Intelligent
and G02 via the information connection between this alarm handling in cement plants. IEEE Industry Appli-
controller and the valves. From valve G01, the disturbance cations Magazine.
spread to the pressure controller PC12 S. Simultaneously, Higuchi, F., Yamamoto, I., Takai, T., Noda, M., and
the disturbance reached Cracking Zone A, Cracking Zone Nishitani, H. (2009). Use of event correlation analysis
B, Cracking Zone C and Cracking Zone D via the heat to reduce number of alarms. Computer Aided Chemical
exchangers LQE 1, LQE 2, LQE 3 and LQE 4. Sensors Engineering.
PI13 S, PI14 S, PI15 S and PI16 S were also affected Hollender, M. and Beuthel, C. (2007). Intelligent alarming.
by the propagating disturbance since they are located ABB Review 1/2007.
in the coils of the different cracking zones. The root- Hollifield, B. and Habibi, E. (2011). Alarm Management:
cause suggestion from the data-driven analysis is therefore A Comprehensive Guide, Second Edition. Isa.
validated by the plant connectivity analysis. An alarm IEC-62682 (2014). Management of alarm systems for the
associated to PC11 S is the given causal alarm suggestion, process industries.
i.e. alarm PC11 CO 4. All the alarms in the template will Kabir, A., Iyadi, I., Chen, T., Joe, D., and T., B. (2013).
be grouped under it. Similarity analysis of industrial alarm flood data. IEEE
After discussion with site engineers the obtained results Transactions on automation science and engineering.
were confirmed. The analysed abnormal situation corre- Lai, S. and Chen, T. (2015). Methodology and application
sponds to a shift in the operating mode between cracking- of pattern mining in multiple alarm flood sequences.
decoking. The transition between these two operating IFAC-PapersOnLine.
modes triggers a characteristic alarm flood sequence. The Schleburg, M., Christiansen, L., Fay, A., and Thornhill,
site crew mentioned that pressure controller PC11 is per- N. (2013). A combined analysis of plant connectivity
forming the opening and closing of both valve G01 and and alarm logs to reduce the number of alerts in an
valve G02 during the change of operation mode and is automation system. Journal of Process Control.
therefore the origin of the alarm flood. Smith, T. and Waterman, M. (1981). Identification of
common molecular subsequences. Journal of Molecular
4. CONCLUSIONS Biology.
Thambirajah, J., Thornhill, N., Benabbas, L., and Bauer,
This paper proposed an innovative way to reduce alarm M. (2009). Cause-and-effect analysis in chemical pro-
flooding by using a combination of data from different cesses utilizing xml, plant connectivity and quantitative
information sources. Combining alarm log, historical pro- process history. Computers and Chemical Engineering.
cess data and process connectivity analysis allowed to not Wang, J., Yang, F., Chen, T., and Shah, S. (2015). An
only group consequence alarms, but also to determine overview of industrial alarm systems: Main causes for
the causal alarm of an alarm flood sequence. The pro- alarm overloading, research status, and open problems.
posed method was tested on actual data collected from Automation Science and Engineering, IEEE Transac-
an ethylene plant. The proposed approach was able to tions on.
group related alarms triggered during an alarm flood and Yang, F., Shah, S., Xiao, D., and Chen, T. (2012). Im-
to identify their causal alarm. proved correlation analysis and visualization of indus-
trial alarm data. ISA Transactions.
REFERENCES Yang, F., Shah, S.L., and Xiao, D. (2010). Signed directed
graph modeling of industrial processes and their valida-
ANSI/ISA-18.2 (2009). Management of alarm systems for tion by data-based methods. Control and Fault-Tolerant
the process industries. Systems (SysTol).
Bauer, M., Thornhill, N., Cox, J., Caveness, M., and
Downs, J. (2007). Finding the direction of disturbance

728

You might also like