scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Graphical Representation of Industrial Alarm Data

01 Jan 2010-Vol. 43, Iss: 13, pp 181-186
TL;DR: This work demonstrates some novel visualization tools that can be used for assessing the performance of alarm systems in terms of effectively identifying nuisance alarms and their utility is illustrated using real industrial alarm data.
Abstract: Alarms are important for safe and reliable operation of a process Ideally, every alarm that is presented to the operator requires an action Owing to the ease in implementing alarms, many modern day process plants have a large number of alarms configured in their alarm system Many of these alarms are set without proper rationalization resulting in the generation of nuisance alarms During process upsets, the volume of alarms presented to the operator is often too large to facilitate appropriate and timely actions This work demonstrates some novel visualization tools that can be used for assessing the performance of alarm systems in terms of effectively identifying nuisance alarms The utility of the developed tools is illustrated using real industrial alarm data
Citations
More filters
Journal ArticleDOI
TL;DR: The Gaussian kernel method is applied to generate pseudo continuous time series from the original binary alarm data to reduce the influence of missed, false, and chattering alarms.
Abstract: The problem of multivariate alarm analysis and rationalization is complex and important in the area of smart alarm management due to the interrelationships between variables. The technique of capturing and visualizing the correlation information, especially from historical alarm data directly, is beneficial for further analysis. In this paper, the Gaussian kernel method is applied to generate pseudo continuous time series from the original binary alarm data. This can reduce the influence of missed, false, and chattering alarms. By taking into account time lags between alarm variables, a correlation color map of the transformed or pseudo data is used to show clusters of correlated variables with the alarm tags reordered to better group the correlated alarms. Thereafter correlation and redundancy information can be easily found and used to improve the alarm settings; and statistical methods such as singular value decomposition techniques can be applied within each cluster to help design multivariate alarm strategies. Industrial case studies are given to illustrate the practicality and efficacy of the proposed method. This improved method is shown to be better than the alarm similarity color map when applied in the analysis of industrial alarm data.

127 citations


Cites methods from "Graphical Representation of Industr..."

  • ...If we use the method proposed in (Kondaveeti et al., 2010), the ASCM obtained is shown in Fig....

    [...]

  • ...The alarm similarity color map (ASCM), which is specially designed for alarm data analysis (Kondaveeti et al., 2010), has proved to be an effective method for visualization....

    [...]

  • ...There are two ways to capture correlation from alarm data: one is to employ Pearson’s correlation coefficients as done for continuous data (Yang et al., 2010a); the other is to introduce similarity measures based on binary data (Kondaveeti, 2010)....

    [...]

  • ...This process has been illustrated in (Kondaveeti et al., 2010)....

    [...]

  • ...There are many similarity measures available for binary data (Choi et al., 2010); hence if we compute the similarity measures based on original alarm data, we can choose one of them, for example Kondaveeti et al. (2010) have used the Jaccard similarity measure....

    [...]

Journal ArticleDOI
TL;DR: A new analysis method is proposed to investigate similar alarm floods from the historic alarm data and group them on the basis of the patterns of alarm occurrences, and a case study on real industrial alarm data is presented to demonstrate the utility of the proposed analysis.
Abstract: Flooding of alarms is a very crucial problem in process industries. An alarm flood makes an operator ineffective of taking necessary actions, and often risking an emergency shutdown or a major upset. In this work, the flooding of alarms is discussed based on the standards presented in ISA 18.2. A new analysis method is proposed to investigate similar alarm floods from the historic alarm data and group them on the basis of the patterns of alarm occurrences. A case study on real industrial alarm data is also presented to demonstrate the utility of the proposed analysis.

108 citations

Journal ArticleDOI
TL;DR: A modified Smith–Waterman algorithm considering the time stamp information is proposed to calculate a similarity index of alarm floods, helpful for root cause analysis of historical floods and for incoming flood prediction.
Abstract: Alarm flooding is one of the main problems in alarm management. Alarm flood pattern analysis is helpful for root cause analysis of historical floods and for incoming flood prediction. This paper deals with a data driven method for alarm flood pattern matching. An alarm flood is represented by a time-stamped alarm sequence. A modified Smith–Waterman algorithm considering the time stamp information is proposed to calculate a similarity index of alarm floods. The effectiveness of the algorithm is validated by a case study on actual chemical process alarm data.

107 citations


Cites methods from "Graphical Representation of Industr..."

  • ...This clustering method is also applied in alarm data correlation analysis to cluster related types of alarms (Kondaveeti et al., 2010; Yang et al., 2011)....

    [...]

Journal ArticleDOI
TL;DR: A method to estimate the chattering index based on statistical properties of the process variable as well as alarm parameters can be used for developing analytical methods to optimally design alarm parameters for minimal chattering.

63 citations

Journal ArticleDOI
TL;DR: An approach is proposed, which allows automatic identification of alarm floods by using criteria-based search strategies and historical notification logs of real industrial aPS are analyzed, regarding its ability to identify causally dependent notifications.

57 citations

References
More filters
Journal Article
J. Noyes1

210 citations


"Graphical Representation of Industr..." refers methods in this paper

  • ...More information about the classification is available in standard manuals (EEMUA [2007] and ISA [2009])....

    [...]

  • ...According to these standards (EEMUA [2007] and ISA [2009]), in the steady state operation of a plant, the operator should not receive more than one alarm in a 10 minute interval....

    [...]

Journal ArticleDOI
TL;DR: The diverse forms similarity measures can take are examined, as well as their relationships and respective properties, and their semantic differences are highlighted and numerical tools to quantify these differences are proposed.
Abstract: Similarity measures aim at quantifying the extent to which objects resemble each other. Many techniques in data mining, data analysis or information retrieval require a similarity measure, and selecting an appropriate measure for a given problem is a difficult task. In this paper, the diverse forms similarity measures can take are examined, as well as their relationships and respective properties. Their semantic differences are highlighted and numerical tools to quantify these differences are proposed, considering several points of view and including global and local comparisons, order-based and value-based comparisons, and mathematical properties such as derivability. The paper studies similarity measures for two types of data: binary and numerical data, i.e., set data represented by the presence or absence of characteristics and data represented by real vectors.

144 citations


"Graphical Representation of Industr..." refers background in this paper

  • ...These properties are explained in more detail in Lesot et al. [2009]. The Jaccard similarity factor lies between 0 and 1 and a high value of Sjac(X, Y ) indicates that the two alarms are closely related....

    [...]

  • ...Informally, similarity measures are functions that quantify the extent to which objects resemble one another (Lesot et al. [2009])....

    [...]

  • ...Several handbooks (Rothenberg [2009], Hollifield and Habibi [2007]) are available as ready references for maintaining an efficient alarm system....

    [...]

  • ...Informally, similarity measures are functions that quantify the extent to which objects resemble one another (Lesot et al. [2009]). Considering the properties of the binary sequences, Jaccard similarity measure (Lesot et al. [2009]) becomes an obvious choice for calculating the similarity between two unique alarms....

    [...]

Journal ArticleDOI
TL;DR: In this paper, an overview on alarm analysis and design is given Some of the reasons for false and nuisance alarms are discussed and a few solutions to reduce them are studied False alarm rate, missed alarm rate and detection delay trade-offs in alarm design are also discussed

121 citations

Journal ArticleDOI
TL;DR: GAP is a Java-designed exploratory data analysis (EDA) software for matrix visualization (MV) and clustering of high-dimensional data sets and provides direct visual perception for exploring structures of a given data matrix and its corresponding proximity matrices, for variables and subjects.

112 citations


"Graphical Representation of Industr..." refers methods in this paper

  • ...GAP (Wu et al. [2010]) is a very useful tool for visualizing data matrices and similarity matrices in particular....

    [...]

Journal ArticleDOI
TL;DR: This work demonstrates the advantages of monitoring the PCA based T 2 and Q statistic over individual process variables overindividual process variables to reduce the false alarm and missed alarm rates and reduces the detection latency which is one of the main drawbacks of monitoring a filtered variable.

32 citations