Reduction of alerts in automated systems based on a combined analysis of process connectivity and alarm logs

Similar documents
Effective Alarm Management for Dynamic and Vessel Control Systems

Methodology and Application of Pattern Mining in Multiple Alarm Flood Sequences

DeltaV Analyze. Introduction. Benefits. Continuous automated DeltaV System alarm system performance monitoring

Chapter 1 Introduction

Computers and Chemical Engineering

Detection of Temporal Dependencies in Alarm Time Series of Industrial Plants

2012 Honeywell Pacific Users Group. Sus tain.ability.

A Generalized Delay-timer for Alarm Triggering

PERFORMANCE HUMAN NEXT-GENERATION SCADA HIGH. MACHINE INTERFACES Configuring HMIs to Display Operator-centric Information

SIL DETERMINATION AND PROBLEMS WITH THE APPLICATION OF LOPA

Alarm Management Standards Are You Taking Them Seriously?

To appear in the IEEE/IFIP 1996 Network Operations and Management. Symposium (NOMS'96), Kyoto, Japan, April TASA: Telecommunication

PM-ANALYZE. Overview 1. System Configuration 2. Operation 3. Analysis of Alarms and process values. User Interface 4

An Overview of Applicable ISA Standards to the Water and Wastewater Sectors

Exaquantum/ARA Alarm Reporting and Analysis

Enhance Alarm Management

INTERNATIONAL STANDARD

Fire Risks of Loviisa NPP During Shutdown States

Available online at ScienceDirect. Physics Procedia 67 (2015 )

USER APPROVAL OF SAFETY INSTRUMENTED SYSTEM DEVICES

SCADA ALARM MANAGEMENT. Tim Okely. GWMWater

Economic and Effective Alarm Management

HAZARDS EQUAL TRIPS OR ALARMS OR BOTH

Q&A Session from Alarm Management Workflow Webinar (Apr.24/2013)

Meeting PHMSA Alarm Management Requirements: How TiPS Can Help

NFPA 85 COMPLIANCES OF BMS: A CASE STUDY OF BOILER CONTROL AT SBM OFFSHORE MALAYSIA COMPANY 1. AHMED ABOUELRISH 2 Universiti Teknologi Petronas

The agri-motive safety performance integrity level Or how do you call it?

doi: / _57(

EXPORTING ALARM SETPOINTS IN SIEMENS PCS7

INTERNATIONAL STANDARD

Unifying Alarms and Operating Envelopes for the Achievement of KPI s and Business Objectives

ADIPEC 2013 Technical Conference Manuscript

Fin-Fan Control System

Design of Humidity Monitoring System Based on Virtual Instrument

Proxemic Interactions in Ubiquitous Computing Ecologies

Avigilon Control Center 5 System Integration Guide

Technical Publications. FactoryTalk Alarms and Events System Configuration Guide

Product introduction Layers of Protection Layer 3: Safety System Instrumented & Mechanical. Layer 2: Alarms Manual action needed

TECHNICAL SPECIFICATION

Alarm Management Reflections

An Alarm Correlation Algorithm for Network Management Based on Root Cause Analysis

LPG GAS LEAKAGE DETECTION, MONITORING AND CONTROL USING LabVIEW

Official Journal of the European Union. (Non-legislative acts) REGULATIONS

DeltaV Analyze. DeltaV Analyze. Introduction. DeltaV Product Data Sheet. Continuous automated DeltaV System alarm system performance monitoring

LineGuard 2300 Program User Manual (FloBoss 107)

IEC61511 Standard Overview

Alarm Management for SCADA control rooms

Intelligent alarm management

InstrumentationTools.com

INTERNATIONAL STANDARD

Too Many Alarms: Where Do I Begin?

Design and Development of General Purpose Alarm Generator for Automated System

Alarm Correlation Research and Implementation Based on Similar Data Sources

Dynamic Simulation of Double Pipe Heat Exchanger using MATLAB simulink

Knowledge Based Expert System Computer Aided Climate Responsive Integrated Approach to Architectural Design

RAMSES: THE LHC RADIATION MONITORING SYSTEM FOR THE ENVIRONMENT AND SAFETY

ABB Ability System 800xA Alarm Management

FUNCTIONAL SAFETY IN FIRE PROTECTION SYSTEM E-BOOK

Statistical cluster analysis and visualisation for alarm management configuration. Butters, T D and Güttel, S and Shapiro, J L and Sharpe, T J

Design and Development of Industrial Pollution Monitoring System using LabVIEW and GSM

Architectural and Engineering Specification for a Fiber Optic Perimeter Intrusion Detection System. FiberPatrol FP1150

Alarm Analysis with Fuzzy Logic and Multilevel Flow Models

DynAMo Alarm & Operations Management

Interactive Fire Control Panel IFS7002 four signal loops Instruction Manual

excellence in Dependable Automation ALARM MANAGEMENT

INTERNATIONAL STANDARD

JOVY SYSTEMS RE User Manual Rev. 1.00

Ovation Alarm Management System

Session Number: 3 Making the Most of Alarms as a Layer of Protection

2012 Honeywell Users Group EMEA Tyron Vardy A Guide to Effective Alarm Management

DEFECTOVISION IR. Non-Destructive Testing of Steel Billets and Tubes

ON-LINE SENSOR CALIBRATION MONITORING AND FAULT DETECTION FOR CHEMICAL PROCESSES

KELTRON LS 7000 ALARM MANAGEMENT SYSTEM Keltron Alarm Monitoring, Dispatch, and Reporting Software

Architectural and Engineering Specification for a Fence-Mounted Perimeter Intrusion Detection System. FlexZone

"A Case Study of Three Drum Parameter Control in Boiler Using Discrete PID Controller Based on Simulation"

INTERNATIONAL STANDARD

An Overview of Industrial Alarm Systems: Main Causes for Alarm Overloading, Research Status, and Open Problems

Diagnostics with fieldbus

IndigoVision. GAI-Tronics Integration Module. Administrator's Guide

Is your current safety system compliant to today's safety standard?

Architectural and Engineering Specification for a Fiber Optic Perimeter Intrusion Detection System. FiberPatrol FP1100X

Compression of Fins pipe and simple Heat pipe Using CFD

English version. Railway applications Systematic allocation of safety integrity requirements

The Development of Fire Risk Assessment Method for Heritage Building

INTERNATIONAL STANDARD

Implementation of Auto Car Washing System Using Two Robotic Arms

An improved Algorithm of Generating Network Intrusion Detector Li Ma 1, a, Yan Chen 1, b

INTERNATIONAL STANDARD

Experimental study of hybrid loop heat pipe using pump assistance for high heat flux system

[Patil* et al., 5(7): July, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Sustain.Ability. Alarm Management: Be Pro-active, not Re-active Honeywell Users Group Europe, Middle East and Africa. Tyron Vardy, Honeywell

Samsung SDS BMS Ver.2.0. Technical Specification

Sustainable Design of Alpine Infrastructures

Australian Standard. Functional safety Safety instrumented systems for the process industry sector

A Study on Landscape Design Paradigm from the Perspective of Visual Impact and Experience

DATA SHEET BENEFITS CURRENT CHALLENGES SSM INFOTECH S X-FORCE AMS - THE IDEAL SOLUTION

Alarm and Event Analysis for Batch Process Improvement

Safety Instrumented Systems

CFD Analysis of a 24 Hour Operating Solar Refrigeration Absorption Technology

Modeling and Simulation of Axial Fan Using CFD Hemant Kumawat

Transcription:

Ian David Lockhart Bogle and Michael Fairweather (Editors), Proceedings of the 22nd European Symposium on Computer Aided Process Engineering, 17-20 June 2012, London. 2012 Elsevier B.V. All rights reserved. Reduction of alerts in automated systems based on a combined analysis of process connectivity and alarm logs Markus Schleburg a,b, Lars Christiansen a, Alexander Fay a, Nina F. Thornhill b a Institut für Automatisierungstechnik, Helmut-Schmidt-Universität / Universität der Bundeswehr Hamburg b Centre for Process System Engineering (CPSE), Imperial College London Abstract Process alarm management systems alert the operator when normal operation limits are exceeded. Single disturbances can lead to an abundance of consequent alarm messages, and the alarm messages may overload the user by presenting many redundant alarms. This unwanted situation is called an alarm flood. The aim of the work presented in the paper is to reduce the number of alerts presented to the operator. If alarms are related to one another, those alarms should be presented as one alarm problem. For the realization of the ideas, a software prototype is developed to perform this reduction automatically. The analysis process starts with the alarm history which is a log containing all alarm messages. This is combined with the process topology of the controlled system and a rule framework describing interrelations between those alarm messages. The combination of these three parts gives an effective alarm management strategy that will help users to comply with standards for alarm management such as ANSI/ISA 18.2 (2009) and EEMUA 191 (2007) which set limits on the number of alarms per unit time for an operator. Keywords: alarm flood, alarm management, ISA 18.2, EEMUA 191, rule-based system, IEC 62424. 1. Introduction From their conception, large chemical, refining, power generation, and other processing plants require the use of a control system to keep the process operating successfully within the boundaries specified by the process designers. Exceeding these boundaries might endanger the quality of the product, the stability of the process, or even the safety of the plant. Therefore, the operators in the control room are notified by alarm messages when certain alarm limits are violated, and they are expected to take appropriate action. In the case of a plant disturbance, usually several process variables (such as pressure, level, flow, temperature) are affected simultaneously and the operator is confronted with several alarm messages within a short time interval, and might not be able to act correctly. Therefore, alarm management concepts are under development which aim at reducing the number of alarms shown to the operator, in order to improve the operator s capability to react properly. One approach is to determine which alarms originate from a common root cause. For example, a low level of cooling water (level low alarm) might result in a higher temperature in a reactor (high temperature alarm) and thus a higher pressure in the same reactor (high pressure alarm). They stem from a single cause and should be dealt with in a single operator action. Preferably, these alarms should not be displayed as individual

2 A. Firstauthor et al. alarms to the operator but in combination, thus reducing the number of alarms without suppressing valid information. The manual analysis of the interrelations between physical variables in a plant can take time and be prone to error, hence there is a motivation for an automated, computerbased analysis. This requires (i) a computer-accessible representation of the physical structure of the plant, and (ii) knowledge about causal dependencies of process variables. This article shows how the conditions (i) and (ii) can be fulfilled in an automated system and reports a pilot project where the concepts have been implemented and applied to real plant data. The novel feature of the work compared to state-of-the art industrial systems is the use of computer-readable process topology information in the analysis. The work fits into an overall context of industrial and academic activity in alarm management. Basic alarm design is broadly established in the Standards ANSI/ISA 18.2 (2009) and EEMUA 191 (2007), and best practice is captured in text books such as Hollifield and Habibi (2006). Techniques of real-time alarm management include deadbands, delay-timers, and filtering to reduce false, chattering or nuisance alarms (Izadi et. al., 2009; Adnan et al, 2011), and data-driven methods including correlation analysis (e.g. Yang et al, 2010a). Signal analysis extends to determination of cause-effect relationships and the use of signed digraphs (Yang et al, 2010b), or hybrids of data-driven and rule-based systems (Aizpuria et. al, 2009). 2. Methods The components of the alarm analysis system are illustrated in Fig 1. They comprise a process alarm log, a description of plant topology in the form of a process schematic or P&ID, and a set of rules which specify when alarms can be grouped 2.1. Plant topology models and alarm logs. Object-oriented representations of processes and plants are becoming widely available with modern CAD tools. P&IDs can now be exported into a vendor independent and XML-based data format, giving a portable text file that describes all relevant equipments, their properties and the connections between them. One standard for plant topology models is described in IEC 62424 (2008) which specifies an XML schema for information exchange called CAEX (Computer Aided Engineering Exchange). CAEX describes items of equipment in the plant such as tanks, pipes, valves and instruments and how they are linked together physically and/or through electronic control signals. The alarm system in a typical plant control system creates an alarm log. It is a machine-readable text file showing timing and location information about the alarm and the nature of the alarm (too high, too low). Figure 1. Components of the alarm analysis system. Top: The alarm log. Middle: The P&ID, Bottom: Alarm rule library

Type the title of your paper 3 Importantly for this analysis, the CAEX file contains the tag names (the unique identifiers for process variables) which are also used in the alarm system. Every alarm which occurs in the plant can thus be related to an object such as a sensor or an actuator in the plant topology model. The idea is to analyze the topology model to determine whether there is a link between the locations of two alarms either through the process or via electronic signals. The aim is to impose some structure into the alarm log to make it easier to understand the causes of the alarms. The algorithm must analyze the plant topology model for a connection between a pair of alarms which is done by searching for directional paths in the topology. It can be done several ways and the details are not the main focus of the work. In previous work (e.g. Thambirajah et al, 2009) the XML was parsed to create a connectivity matrix which could be used to find paths between plant items. In this case, connectivity was detected by direct parsing of the XML text to build up information about paths through the plant. 2.2. Rules to relate alarms in plants Fig. 2 illustrates the rules. They include (i) the elapsed time between alarms, (ii) the types of alarms that can be grouped, (iii) the type of connection (e.g. a process product line or a signal connection), and (iv) the number and types of items of equipment in the process that can be in between the locations of the alarms. Rules about the types of alarms that can be grouped are based on process knowledge and understanding. Other aspects such as the allowed items between the alarms locations are tuneable parameters which affect the extent of the alarm grouping. The analysis examines any pair of two alarm messages to determine whether there is interrelation between them. For illustration, two pressure alarms probably have the same cause if they also comply with some further conditions such as occurring in a short time interval and having a physical process path connecting them. Some excluded items are not allowed on this path. For example a pump may not be allowed between two pressure alarms as this could indicate different alarm causes. If two alarms trigger the rule then they can be assigned to one collective alarm problem. Altogether, 18 rules have been collected which relate a sensor process variable alarm either with another sensor process variable alarm or with an actuator process variable alarm. An example for the latter is a valve alarm (i.e. a stuck valve) in combination with a pressure alarm. The rules have been stored using a pre-defined XML schema. Thus, they are available for the computer-based analysis algorithm and can easily be modified by the user. A rule editor has also been developed which allows users to modify existing and/or to add new rules (Fig. 3). Figure 2. Illustration of the components of the alarm-grouping rules. Figure 3. The rule editor interface

4 A. Firstauthor et al. 2.3. Analysis algorithms The complete algorithm is depicted in Figure 5. It shows the loading of the required information followed by loops to do systematic checking against the18 rules. There are decisions about matching of the type of the alarms and whether the time frames are close enough to consider the alarms as related. If two alarms are grouped then other alarms are checked to see if they also belong to the group. The final outcome is a structured alarm log which contains all the information of the original log but showing the groups detected by the analysis. Figure 3. The analysis algorithm Figure 4. The alarm log after analysis. It contains the same alarms as the original but now structured according to the groupings detected by the new alarm analysis algorithm. 3. Prototype and case study The analysis algorithm has been implemented in a software tool that is realized in the object oriented programming language C# within the Microsoft.NET Framework. This platform enabled the reuse of single software parts and includes interfaces to Microsoft Excel and XML. The developed tools were applied on an alarm log from a turbine section of a gas storage facility. Fig 1 shows the P&I diagram of this plant which was encoded as a CAEX file to make it available for the computerized analysis. Several alarm log files from this plant were analyzed by the computer-based algorithm. The structured alarm log in Figure 4 showed a 74% reduction in the original alarms by grouping the alarms. The flat operator alarm log list has been converted to a tree structure. The alarms which occurred first and last are in bold font. Other related alarms in the same group can be observed by clicking on the first alarm, these are shown in a lighter grey font. 4. Discussion and summary This paper has presented practical tools for grouping alarms in an industrial process control system. Potential uses include: Offline mode using alarm logs to find alarms which have (most probably) common causes. These findings can be used to optimize the configuration of the alarm system to reduce the number of nuisance alarms for the operator of this plant in future. Online mode in the operator station. Whenever a new alarm arises, it is analyzed in combination with all previous alarms to identify if this alarm has a common cause

Type the title of your paper 5 with an earlier alarm or alarm group. Use of groups of related alarms will present the operator with a more compact problem to solve and should reduce overload during alarm floods. Key features presented which have the potential to achieve the above uses are: A combined analysis of alarm logs and plant topology to manage alarm messages. The connection between all available data is described by interrelation rules. These rules allow the grouping of individual alarm messages into fewer groups that give a more comprehensive insight into alarm problems. Interrelation rules specify the search criteria for alarms likely to have the same cause. The rules consider temporal connection, type of the alarm and spatial and functional structure which can be found in the plant topology. The concept has been implemented in a software prototype which manages the alarm log, plant model and interrelation rules. The software analyses the resources and presents them in an interactive alarm display. The result is a compact alarm display with fewer alarm messages but a higher information density. A rule editor is also provided to create and capture new rules. The finished analyzer has been used to evaluate industrial case studies (Schleburg, 2011), one of which is reported in this article. The reduction of alarms after analysis was significant. References Adnan, NA; Izadi, I; and Chen, TW., 2011, On expected detection delays for alarm systems with deadbands and delay-timers, Jornal of Process Control, 21, 1318-1331. Aizpurúa, O., Caballero, R., Galán, R. & Jiménez, A., 2009), A new methodology for massive alarm management system in electrical power administration. Proceesdings of 7th Latin American and Caribbean Conference for Engineering and Technology June 2009, Cancun Mexico, 6-11. American National Standards Institute, 2009, ANSI/ISA -18.2-2009: Management of Alarm Systems for the Process Industries, Location, New York: ANSI. Engineering Equipment and Materials Users Association, 2007, EEMUA 191: Alarm Systems A Guide to Design, Management and Procurement. London: EEMUA. Hollifield, B.R., and Habibi, E., 2006, The Alarm Management Handbook A Comprehensive Guide. Kalamazoo, MI: Fidlar Doubleday. International Electrotechnical Commission, 2008, IEC 62424. Representation of process control engineering - Requests in P&I diagrams and data exchange between P&ID tools and PCE- CAE tools, Geneva: IEC. Izadi, I., Shah, S. L., Shook, D. S., Kondaveeti, S. R. & Chen, T. (2009). A framework for optimal design of alarm systems. Proceedings of the 7th IFAC Safeprocess, Barcelona, 2009. Schleburg, M., 2011, Reduction of alerts in automated systems based on a combined analysis of CAEX plant models and associated alarm logs, Masters Thesis, Institut für Automatisierungstechnik, Helmut-Schmidt-Universität, Hamburg. Thambirajah, J., Benabbas, L., Bauer, M. & Thornhill, N. F., 2009, Cause-and-effect analysis in chemical processes utilizing XML, plant connectivity and quantitative process history. Computers and Chemical Engineering, 33, 503 512.. Yang, F., Shah, SL., and Xiao, DY., 2010a, Correlation analysis of alarm data and alarm limit design for industrial processes, Proceedings of the American Control Conference, Baltimore, June 2010, 5850-5855. Yang, F., Shah S.L., and Xiao, D., 2010b, Signed directed graph modeling of industrial processes and their validation by data-based methods. Proceedings of IEEE conference on Control and Fault-Tolerant Systems (SysTol), Oct 2010, 387-392.