HomePage >> Journals >> Transactions on Computer Science and Technology

Transactions on Computer Science and Technology

Transactions on Computer Science and Technology is an international comprehensive professional academic journal of Ivy Publisher, concerning the development of computer science theory and technology application on the combination of computer science and modern industrial technology. The main focus of the journal is the academic papers and comments of latest power electronics theoretical and technical research improvement in the fields of nature s... [More] Transactions on Computer Science and Technology is an international comprehensive professional academic journal of Ivy Publisher, concerning the development of computer science theory and technology application on the combination of computer science and modern industrial technology. The main focus of the journal is the academic papers and comments of latest power electronics theoretical and technical research improvement in the fields of nature science, engineering technology, economy and science, report of latest research result, aiming at providing a good communication platform to transfer, share and discuss the theoretical and technical development of computer science theory and technology development for professionals, scholars and researchers in this field, reflecting the academic front level, promote academic change and foster the rapid expansion of computer science theory and application technology.

The journal receives manuscripts written in Chinese or English. As for Chinese papers, the following items in English are indispensible parts of the paper: paper title, author(s), author(s)'affiliation(s), abstract and keywords. If this is the first time you contribute an article to the journal, please format your manuscript as per the sample paper and then submit it into the online submission system. Accepted papers will immediately appear online followed by printed hard copies by Ivy Publisher globally. Therefore, the contributions should not be related to secret. The author takes sole responsibility for his views.

ISSN Print:2327-090X

ISSN Online:2327-0918

Email:cst@ivypub.org

Website: http://www.ivypub.org/cst/

  0
  0

Paper Infomation

A Comprehensive Configuration for Industrial Alarm System Based on Deadbands and Delay-timers

Full Text(PDF, 670KB)

Author: Zhiyong Zeng

Abstract: In process industry, alarms are configured to notify operators of equipment malfunctions, process deviations, or any other abnormalities in the plant. However, unsophisticated alarm configuration may result in numerous of false alarm and nuisance alarm or even alarm floods for operators and reduce its performance as a safeguard for plant operations. In the past, many catastrophic incidents happened due to poor performance of alarm systems. Motivated by this, we first propose a new techniques which considered deadbands and delay-timers sufficiently configured in univariate alarm system. Extensive simulations are conducted to verify the analytical results and illustrate the advantages.

Keywords: Alarm Management, Deadbands, Delay-Timer, Industrial Process

References:

[1] Izadi I, Shah S L, Shook D S, et al. An Introduction to Alarm Analysis and Design[C]. IFAC Proceedings Volumes, 2009: 645-650.

[2] Rothenberg D H. Alarm Management for Process Control: A Best-practice Guide for Design, Implementation, and Use of Industrial Alarm Systems[M]. 2009.

[3] Xu J, Wang J, Izadi I, et al. Performance Assessment and Design for Univariate Alarm Systems Based on FAR, MAR, and AAD[J], 2012, 9(2): 296-307.

[4] Zeng Z, Tan W, Zhou R. An alternative method to compute the expected detection delay for deadbands and delay-timers[C]. IEEE International Conference on Control and Automation, 2016: 149-154.

[5] Adnan N A, Izadi I, Chen T. On expected detection delays for alarm systems with deadbands and delay-timers[J]. Journal of Process Control, 2011, 21(9): 1318-1331.

[6] Ahnlund J, Bergquist T, Spaanenburg L. Rule-based reduction of alarm signals in industrial control[M]. IOS Press, 2003: 73-84.

[7] Izadi I, Shah S L, Chen T. Effective resource utilization for Alarm Management[C]. Decision & Control, 2010.

[8] Naghoosi E, Izadi I, Chen T. A study on the relation between alarm deadbands and optimal alarm limits[C]. American Control Conference, 2011.

[9] Adnan N A, Cheng Y, Izadi I, et al. Study of generalized delay-timers in alarm configuration[J]. Journal of Process Control, 2013, 23(3): 382-395.

[10] Zeng Z, Tan W, Zhou R. Computation of performance indices for generalized delay-timers[C]. 2017 American Control Conference (ACC), 2017: 4803-4808.

[11] EEMUA. Alarm Systems:A Guide to Design, Management, and Procurement,: EEMUA 191, 2007.

Privacy Policy | Copyright © 2011-2024 Ivy Publisher. All Rights Reserved.

Contact: customer@ivypub.org