Flooding of alarms is a very crucial problem in process industries. An alarm flood makes an operator ineffective of taking necessary actions, and often risking an emergency shutdown or a major upset. In this work, the flooding of alarms is discussed based on the standards presented in ISA 18.2. A new analysis method is proposed to investigate similar alarm floods from the historic alarm data and group them on the basis of the patterns of alarm occurrences. A case study on real industrial alarm data is also presented to demonstrate the utility of the proposed analysis.Note to Practitioners-In an industrial plant, alarms are designed to inform the operator about any fault or abnormality in the operation. However, alarm systems are not always designed, implemented, and maintained properly. This usually results in an excessive number of enunciated alarms, most of which are false or nuisance. Specifically, during a plant upset, operators receive far more alarms that they can handle (hundreds or even thousands of alarms in a short period of time). This is known as an alarm flood or alarm shower. Our study shows that in some cases, alarm floods follow similar patterns. As a result by studying and classifying flood patterns, it is possible to find the root cause of an abnormality based on the history of the plant and previous similar floods. This allows the operator to react to a plant upset at the early stages of or even before an alarm flood.
There is a high demand for skilled cybersecurity professionals, however, entry-level employees and college graduates often lack the hands-on and real-world experience they need to be successful in the cybersecurity industry. This high demand has led educators to pursue innovative and smart application technologies as a way for students to gain hands-on skills and to practice those skills in a safe and fun environment. Cybergames are now being used by educational institutions and in private and public industry sectors. One popular game in the cybersecurity space is called Capture the Flag (CTF). This study investigates Facebook's CTF platform as a cost-effective learning and assessment tool for undergraduate and graduate cybersecurity adult students for an online university.
Women are underrepresented in information technology (IT) fields. This study aims to understand faculty gender's impacts on female IT student retention in introductory courses in an online university's undergraduate IT program. Univariate and multivariate statistical models indicate that faculty gender does not moderate the retention of female students in this context. However, the retention rates of women are encouraging, suggesting that an online format may be conducive to the retention of female students.
There is a high demand for skilled cybersecurity professionals, however, entry-level employees and college graduates often lack the hands-on and real-world experience they need to be successful in the cybersecurity industry. This high demand has led educators to pursue innovative and smart application technologies as a way for students to gain hands-on skills and to practice those skills in a safe and fun environment. Cybergames are now being used by educational institutions and in private and public industry sectors. One popular game in the cybersecurity space is called Capture the Flag (CTF). This study investigates Facebook's CTF platform as a cost-effective learning and assessment tool for undergraduate and graduate cybersecurity adult students for an online university.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.