2018
DOI: 10.1109/access.2018.2797247
|View full text |Cite
|
Sign up to set email alerts
|

Sequence Mining Based Alarm Suppression

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 29 publications
0
9
0
Order By: Relevance
“…A well-designed log file is essential for in-depth process analysis tasks . An alarm represents a state of the system where a process variable exceeds the warning or alarm limits . To predict potential alarm escalation scenarios, typical alarm sequence patterns have to be explored.…”
Section: Integrated Sequence Compression and Alignment Methods To Pre...mentioning
confidence: 99%
“…A well-designed log file is essential for in-depth process analysis tasks . An alarm represents a state of the system where a process variable exceeds the warning or alarm limits . To predict potential alarm escalation scenarios, typical alarm sequence patterns have to be explored.…”
Section: Integrated Sequence Compression and Alignment Methods To Pre...mentioning
confidence: 99%
“…A couple of studies in the last decade have tried to address the prioritization problem for alarm management. Naghoosi et al [37] and Foong et al [19] developed a solution with the fuzzy logic method, Kondo et al [38], Dorgo and Abonyi [39] and Niyazmand and Izadi [40] applied data mining to prioritize alarms, Bayesian network modelling like Wunderlich and Niggemann [41], Stief et al [42], Naderpour et al [43]. All the mentioned researchers offer substantial ways to prioritize alarms, but they need sufficient actual operational datasets in all operational modes to increase their accuracy; therefore, it is impossible to apply these methods in the design phase.…”
Section: Alarm Prioritizationmentioning
confidence: 99%
“…Generally speaking, predictable alarms do not contain useful information for the operators. erefore, automation solutions should handle them before they occur, or completely useless alarms should be suppressed before an announcement is made [2]. Future alarm sequences can also be predicted using historical knowledge of the process [3].…”
Section: Introductionmentioning
confidence: 99%
“…First, correlation analysis-based techniques are widespread, where the aim is to find frequently co-occurring alarms over a short period of time, which can be considered redundant [9]. Second, the frequently occurring longer operational patterns can be considered to be the symptoms of the same malfunction and can be revealed by frequent pattern mining algorithms [10], as well as applied in terms of alarm prediction and suppression [2]. It is also advantageous to apply highly efficient data-driven solutions, like deep learning [11] or decision tree-based classifiers [12].…”
Section: Introductionmentioning
confidence: 99%