2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2016
DOI: 10.1109/smc.2016.7844838
|View full text |Cite
|
Sign up to set email alerts
|

Multi-temporal sequential pattern mining based improvement of alarm management systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 20 publications
0
9
0
Order By: Relevance
“…Hu et al [11] held that static alarm analysis was not enough to realize alarm location and used time sequence alarm information and corresponding dynamic time matrix to realize alarm correlation analysis, so as to complete alarm location. Karoly and Abonyi [12] took multiperiod alarm sequences to mine alarm data and complete the compression of alarm data. However, the above research studies have not focused on the network management data, especially when the types of terminal nodes are increasing and the alarm messages are massive and sparse, the redundancy of the algorithm mining results is high, and the alarm transmission analysis is difficult.…”
Section: Related Work E Intrusion Detection System Was First Proposed Bymentioning
confidence: 99%
“…Hu et al [11] held that static alarm analysis was not enough to realize alarm location and used time sequence alarm information and corresponding dynamic time matrix to realize alarm correlation analysis, so as to complete alarm location. Karoly and Abonyi [12] took multiperiod alarm sequences to mine alarm data and complete the compression of alarm data. However, the above research studies have not focused on the network management data, especially when the types of terminal nodes are increasing and the alarm messages are massive and sparse, the redundancy of the algorithm mining results is high, and the alarm transmission analysis is difficult.…”
Section: Related Work E Intrusion Detection System Was First Proposed Bymentioning
confidence: 99%
“…The original MATLAB model of the simulator (published in Chen et al) contained 5 disturbances: (1) step change in the composition of C 2 H 6 in the fresh C 2 H 4 feed stream from 0.001 to 0.003 mole fraction, (2) loss of column feed for 5 minutes, (3) loss of fresh HAc feed stream for 5 minutes, (4) loss of fresh O 2 feed stream, and (5) an analyser is off‐line (except the O 2 analyser), while Károly and Abonyi studied the effects of 3 malfunctions (1) loss of HAc feed, (2) loss of O 2 feed, and (3) loss of column feed and studied the effect of product changes with the use of the so‐called Operating State Matrix, containing the randomly generated values of the following manipulated variables: Operating state start time (min) Operating state end time (min) Set point of the reactor output temperature (150−165° C ) H 2 O composition in the column's bottom (9−18 % ) Vaporiser feed (2.2−2.6 kmolmin) Change of the C 2 H 6 concentration of the C 2 H 4 feed from 0.1% to 0.3% (not range based, only 2 states) …”
Section: Case Studymentioning
confidence: 99%
“…Cheng et al [6] use a modified Smith-Waterman algorithm to calculate a similarity index of alarm floods by considering the time stamp information. Karoly and Abonyi [19] propose a multi-temporal sequence mining concept to extract patterns and formulate rules for alarm suppression. Xu et al [30] introduce a data driven method for alarm flood pattern matching.…”
Section: Related Workmentioning
confidence: 99%