期刊文献+

燃气SCADA报警设置点再评估研究

Research on Reassessment of Alarm Set Points in Gas SCADA
下载PDF
导出
摘要 以某天然气门站为例,介绍了报警点设置的目的,建立了报警设置点再评估工作流程。采用头脑风暴与专家评审相结合的方法,梳理了每一个报警设置点产生的原因、可能造成的后果以及报警响应动作与时间,并对因果联锁报警和重复设置报警点进行了识别,经评审后报警设置点总量减少了23。17%,为改善燃气数据采集与监控系统(SCADA)报警泛滥提供了目标报警点。 Taking a certain natural gas station as an example,the setting aim of alarm points is introduced.A workflow for reassessing alarm set points is established.A combination of brainstorming and expert review is used to sort out the causes,possible consequences,alarm response actions and time for each alarm set point.Causal interlocking alarms and duplicate alarm points are identified.Total number of alarm set points is reduced by 23.17% after review.Target alarm points have been provided for improving the alarm overflow of gas supervisory control and data acquisition(SCADA).
作者 彭超龙 陈媛秀 杨秀平 Peng Chaoong;Chen Yuanxiu;Yang Xiuping(Shenzhen Gas Group Co.Ltd.,Shenzhen,518049,China)
出处 《石油化工自动化》 CAS 2023年第4期27-32,共6页 Automation in Petro-chemical Industry
关键词 天燃气 数据采集与监控系统 报警设置点 再评估 报警泛滥 natural gas supervisory control and data acquisition alarm set point reassessment alarm overflow
  • 相关文献

参考文献5

二级参考文献21

  • 1顾祥柏,朱群雄,耿志强.现代化工流程报警系统分析及管理策略[J].化工进展,2004,23(12):1348-1352. 被引量:12
  • 2Izadi I, Shah S L, Shook D S, et al. An introduction to a- larm analysis and design [C]//Proc of the 7th IFAC Sympo- sium on Fault Detection, Supervision and Safety of Technical Processes, 2009 : 645-650.
  • 3Izadi I, Shah S L, Shook D S, et al. A framework for opti- mal design of alarm systems [C] //Proc of the 7th IFAC Fault Detection, Supervision and Safety of Technical Proces- ses, 2009:651- 656.
  • 4Kondaveeti SR, Shah SI., Izadi 1. Application ot: multivariate statistics for efficient alarm generation [C] ffProe of the 7th IFAC Symposium on Fault Detection, Supervision and Safety o1" Technical Processes, 2009:657-662.
  • 5Lesot M J, Rifqi M, Benhadda H. Similarity measures for binary and numerical data:a survey [J]. International Jour- nal of Knowledge Engineering and Soft Data Paradigms, 2009, 1(1):63- 94.
  • 6Choi S, Oha S, Tappert C C. A survey of binary similarity and distance measures [J]. Journal of Systemics, Cybernet- ics and Informaties, 2010, 8(1):43-48.
  • 7Yang F, Shah S L, Xiao D-Y. Correlation analysis of alarm data and alarm limit design for industrial processes[C]//Proc of 2010 American Control Conference, 2010:5850-5855.
  • 8Nishiguchi J, Takai T. IPL2 and 3 performance improvement method for process safety using event correlation analysis [J]. Computers and Chemical Engineering, 2010, 34 (12) : 2007 -2013.
  • 9Yang F, Shah S L, Xiao D, et al. Improved correlation anal- ysis and visualization of industrial alarm data [J ]. ISA Transactions, 2012, 51 (4) :499-506.
  • 10Smith S M, Miller K L, Salimi-Khorshidi, et al. Network modeling methods for FMRI [J]. NeuroImage, 2011, 54: 875 -891.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部