Alarm Rationalization Based on Process Mining Techniques

Article Preview

Abstract:

Industries in general need a reliable system for fault identification and alarm management. The high incidence of alarms can overload the operator, exposing him to conditions that may exceed their ability to perform effective actions, impairing his performance during his workday. In this context, the present paper proposes an approach for alarms rationalization based on process mining techniques. The alarm rationalization is in accordance to the alarm lifecycle management model suggested by ANSI / ISA-18 standard. The aim of this paper is to improve the alarm system through its rationalization, allowing an adequate organization and data layout of the whole set of alarms. Thus, it is expected a better interpretation and understanding of the industrial process. Performance metrics recommended by ANSI / ISA-18 standard are used. Such metrics are used for analyzing a database of alarms coming from an industrial plant. Preliminaries results have demonstrated the feasibility of the present approach. The results show that the use of the process mining technique can provide support on rationalization alarms, standing for a promising method in alarm management domain.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 1061-1062)

Pages:

1258-1265

Citation:

Online since:

December 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] E. Habibi, and B. Hollifield, Alarm systems greatly affect offshore facilities amid high oil process, World Oil Magazine, Vol. 227, No. 9, (2006).

Google Scholar

[2] T. Stauffer, N. P. Sands, and D. G. Dunn, Alarm Management and ISA-18 – A Journey, Not A Destination, Texas A&M Instrumentation Symposium, (2010).

Google Scholar

[3] V. Venkatasubramanian, R. Rengaswamy, K. Yin, and S. N. Kavuri, A review of process fault detection and diagnosis Part I: Quantitative model-based methods, Computers and Chemical Engineering, pp.293-311, (2003).

DOI: 10.1016/s0098-1354(02)00160-6

Google Scholar

[4] ANSI/ISA-18. 00. 02, Management of Alarm Systems for the Process Industries, ISA, Research Triangle Park, (2009).

Google Scholar

[5] D. H. Rothenberg, Alarm Management for Process Control – A Best Practice Guide for Design, Implementation, and Use of Industrial Alarm Systems, Momentum Press, New York, (2009).

Google Scholar

[6] EEMUA, Alarm Systems: A Guide to Design, Management and Procurement, The Engineering Equipment and Materials Users Association, Publication 191, 2nd , London, (2007).

Google Scholar

[7] J. Koene, and H. Vedam, H., Alarm Management and Rationalization, Third International Conference on Loss Prevention, (2000).

Google Scholar

[8] W. M. P. Aalst, and A.J.M.M. Weijters, Process mining: a research agenda, Computers in Industry, Vol. 53, pp.231-244, (2004).

DOI: 10.1016/j.compind.2003.10.001

Google Scholar

[9] S. J. Bailey, From desktop to plant floor, a CRT is the control operators window on the process, Control Engineering, Vol. 31, pp.86-90, (1984).

Google Scholar

[10] M. Song, C. Günther, and W.M.P. Aalst, Trace clustering in process mining, Proceedings of the 4th Workshop on Business Process Intelligence, Milan, Volume 17, pp.109-120, (2009).

Google Scholar

[11] Y. Zhang, J. Zhang, J. Ma, and Z. Wang, Z, Fault Detection Based on Data Mining Theory, IEEE International Workshop on Intelligent Systems and Applications, (2009).

DOI: 10.1109/iwisa.2009.5072864

Google Scholar

[12] W.M.P. Aalst, Process Mining – Discovery, conformance and enhancement of business processes, Springer, (2011).

Google Scholar

[13] W.M.P. Aalst, H.A. Reijers, A.J.M.M. Weijters, B.F. Dongen, A.K.A. Medeiros, M. Song, and H.M.W. Verbeek, Business Process Mining: An Industrial Application, Journal Information Systems, Vol. 32, Issue 5, UK, (2007).

DOI: 10.1016/j.is.2006.05.003

Google Scholar

[14] A. Rozinat, I. S. M. Jong, C. W. Günther, and W. M. P. Aalst, Process Mining Applied to the Test Process of Wafer Steppers in ASML, IEEE Transactions on Systems, Man, and Cybernetics - Part C: Applications and Reviews, Vol. 39, No. 4, p.474–479, (2009).

DOI: 10.1109/tsmcc.2009.2014169

Google Scholar

[15] V. Kannan, W. M. P. Aalst, and M. Voorhoeve, Formal Modeling and Analysis by Simulation of Data Paths in Digital Document Printers, Workshop on the Practical Use of Coloured Petri Nets and CPN Tools, Vol. 588 of DAIMI, pp.27-46, Aarhus, Denmark, (2008).

DOI: 10.7146/dpb.v37i588.7188

Google Scholar

[16] W.M.P. Aalst, M. H. Schonenberg, and M. Song, Time prediction based on process mining, Journal Information Systems, Vol. 36, Issue 2, (2011).

DOI: 10.1016/j.is.2010.09.001

Google Scholar

[17] B. van Dongen, A. K. de Medeiros, H. Verbeek, A. Weijters, and W. van der Aalst, The ProM framework: A new era in process mining tool support, Application and Theory of Petri Nets, LNCS 3536, 444–454, (2005).

DOI: 10.1007/11494744_25

Google Scholar

[18] A.K.A. Medeiros, A. Guzzo, G. Greco, W.M.P. Aalst, A.J.M.M. Weijters, B. Dongen, and D. Saccà, Process Mining Based on Clustering: A Quest for Precision, Proceedings of Business Process Management Workshop, Volume 4928, pp.17-29, Brisbane, Australia, (2008).

DOI: 10.1007/978-3-540-78238-4_4

Google Scholar

[19] G.C. Ruiz and M. Sepúlveda, Discovering potential failures in business processes extending Process Mining techniques. Jornadas Chilenas de Computación, (2011).

Google Scholar

[20] P. Hornix, Performance Analysis of Business Processes through Process Mining. Master's Thesis, Technische Universiteit Eindhoven, Eindhoven, The Netherlands, (2007).

Google Scholar

[21] A. Burattin and A. Sperduti, Heuristics Miner for Time Intervals. ESANN 2010 proceedings, European Symposium on Artificial Neural Networks - Computational Intelligence and Machine Learning. Bruges (Belgium), pp.28-30, (2010).

Google Scholar

[22] M. Jans, N. Lybaert and K. Vanhoof, Internal fraud risk reduction: Results of a data mining case study. International journal of accounting information systems. Elsevier, Vol. 11. 2010, 1, pp.17-41, (2010).

DOI: 10.1016/j.accinf.2009.12.004

Google Scholar

[23] M.S. Saravanan and R.J. Rama Sree. A Role of Heuristics Miner Algorithm in the Business Process System. International Journal of Computer Technology and Applications, Vol. 2 (2), pp.340-344, (2011).

Google Scholar