EEMUA. Alarm Systems: A Guide to Design, Management, and Procurement [M]. 2nd ed. London, UK: EEMUA, 2007
[2]
Rothenberg D H. Alarm Management for Process Control [M]. New York: Momentum Press, 2009
[3]
ISA. Management of Alarm Systems for the Process Industries [R]. Technical Report ANSI/ISA-18.2-2009, 2009
[4]
Ghaoui C. Encyclopedia of Human Computer Interaction [M]. IGI Global, 2006
[5]
Kondaveeti S R, Izadi I, Shah S L, et al. Graphical tools for routine assessment of industrial alarm systems[J]. Computers & Chemical Engineering, 2012, 46: 39-47
[6]
Akatsukaa S, Nodab M. Similarity analysis of sequential alarms in plant operation data by using Levenshtein distance//Proceedings of the 6th International Conference on Process Systems Engineering (PSE ASIA) [C]. 2013, 25: 27
[7]
Yang F, Shah S L, Xiao D, et al. Improved correlation analysis and visualization of industrial alarm data [J]. ISA Transactions, 2012, 51 (4): 499-506
[8]
Chen Y, Lee J. Autonomous mining for alarm correlation patterns based on time-shift similarity clustering in manufacturing system//Prognostics and Health Management (PHM), 2011 IEEE Conference on [C]. IEEE, 2011: 1-8
[9]
Ahmed K, Izadi I, Chen T, et al. Similarity analysis of industrial alarm flood data [J]. Automation Science and Engineering, IEEE Transactions on, 2013, 10 (2): 452-457
[10]
Larsson T, Hestetun K, Hovland E, et al. Self-optimizing control of a large-scale plant: the Tennessee Eastman process [J]. Industrial & Engineering Chemistry Research, 2001, 40 (22): 4889-4901
[11]
Yang F, Shah S L, Xiao D. SDG (Signed Directed Graph) based process description and fault propagation analysis for a tailings pumping process//Proceedings of the 13th IFAC Symposium on Automation in Mining, Mineral and Metal Processing [C]. Cape Town, South Africa, 2010: 50-55
[12]
Dahlstrand F. Consequence analysis theory for alarm analysis[J]. Knowledge-Based Systems, 2002, 15 (1): 27-36
[13]
Schleburg M, Christiansen L, Thornhill N F, et al. A combined analysis of plant connectivity and alarm logs to reduce the number of alerts in an automation system [J]. Journal of Process Control, 2013, 23 (6): 839-851
[14]
Bauer M, Cox J W, Caveness M H, et al. Finding the direction of disturbance propagation in a chemical process using transfer entropy [J]. Control Systems Technology, IEEE Transactions on, 2007, 15 (1): 12-21
[15]
Dey S, Stori J A. A Bayesian network approach to root cause diagnosis of process variations [J]. International Journal of Machine Tools and Manufacture, 2005, 45 (1): 75-91
[16]
Ansari M F, Kharb R K, Luthra S, et al. Analysis of barriers to implement solar power installations in India using interpretive structural modeling technique [J]. Renewable and Sustainable Energy Reviews, 2013, 27: 163-174
[17]
Zhu Q X, Geng Z Q. A new fuzzy clustering-ranking algorithm and its application in process alarm management [J]. Chinese Journal of Chemical Engineering, 2005, 13 (4): 477-483
[18]
Geng Z, Zhu Q, Gu X. A fuzzy clustering-ranking algorithm and its application for alarm operating optimization in chemical processing [J]. Process Safety Progress, 2005, 24 (1): 66-75
[19]
Chang Y, Khan F, Ahmed S. A risk-based approach to design warning system for processing facilities [J]. Process Safety and Environmental Protection, 2011, 89 (5): 310-316
[20]
Ahmed S, Gabbar H A, Chang Y, et al. Risk based alarm design: a systems approach//Advanced Control of Industrial Processes (ADCONIP), 2011 International Symposium on [C]. IEEE, 2011: 42-47
[21]
Downs J J, Vogel E F. A plant-wide industrial process control problem [J]. Computers & Chemical Engineering, 1993, 17 (3): 245-255
[22]
Stauffer T, Clarke P. Using alarms as a layer of protection//AIChE 8th Global Congress on Process Safety [C]. Houston, TX, 2012
[23]
Zhu Qunxiong (朱群雄), Gao Huihui (高慧慧), Liu Feifei (刘菲菲), et al. Research progress of alarm systems in the process industries [J]. Computers and Applied Chemistry (计算机与应用化学), 2014, 31 (2): 129-134
[24]
Hollifield B R, Habibi E. The Alarm Management Handbook: A Comprehensive Guide [M]. Huston, Texas: PAS, 2006