{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T11:29:12Z","timestamp":1761996552856,"version":"build-2065373602"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/icarcv.2016.7838817","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T21:25:47Z","timestamp":1486502747000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["An alarm flood pattern matching algorithm based on modified BLAST with leveshtein distance"],"prefix":"10.1109","author":[{"given":"Yifan","family":"Xu","sequence":"first","affiliation":[]},{"given":"Wen","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Tingshun","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cherd.2012.11.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2009.03.001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(81)90087-5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.235"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1824795.1824798"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316135228"},{"key":"ref16","first-page":"8","article-title":"Binary codes capable of correcting spurious insertions and deletions of ones","volume":"1","author":"levenshtein","year":"1965","journal-title":"Problems Inform Transm"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1126\/science.2983426"},{"key":"ref4","first-page":"651","article-title":"A Framework for Optimal Design of Alarm Systems","author":"izadi","year":"2009","journal-title":"Proceedings of the 7th IFAC Fault Detection Supervision and Safety of Technical Processes"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/2943.407079"},{"key":"ref6","first-page":"3","article-title":"Mining sequential patterns: generalizations and performance improvements","author":"srikant","year":"1996","journal-title":"Proceedings of the 5th International Conference on Extending Database Technology"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0009-2509(80)85051-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21619-0_38"},{"key":"ref7","article-title":"Alarm rationalization support via correlation analysis of alarm history","author":"hostalkova","year":"2010","journal-title":"19th International Congress of Chemical and Process Engineering"},{"journal-title":"ANSI\/ISA-18 2 Management of Alarm Systems for the Process Industries","article-title":"ISA","year":"2009","key":"ref2"},{"key":"ref1","article-title":"EEMUA","volume":"191","year":"2007","journal-title":"Alarm Systems A Guide to Design Management and Procurement EEMUA Publication"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SSD.2012.6198008"}],"event":{"name":"2016 14th International Conference on Control, Automation, Robotics and Vision (ICARCV)","start":{"date-parts":[[2016,11,13]]},"location":"Phuket, Thailand","end":{"date-parts":[[2016,11,15]]}},"container-title":["2016 14th International Conference on Control, Automation, Robotics and Vision (ICARCV)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7823366\/7838559\/07838817.pdf?arnumber=7838817","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T20:20:01Z","timestamp":1513196401000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7838817\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icarcv.2016.7838817","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}