{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:27:04Z","timestamp":1774628824712,"version":"3.50.1"},"reference-count":129,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2016,4,1]],"date-time":"2016-04-01T00:00:00Z","timestamp":1459468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61433001"],"award-info":[{"award-number":["61433001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["CRDPJ-446412-12"],"award-info":[{"award-number":["CRDPJ-446412-12"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Automat. Sci. Eng."],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1109\/tase.2015.2464234","type":"journal-article","created":{"date-parts":[[2015,9,16]],"date-time":"2015-09-16T20:34:35Z","timestamp":1442435675000},"page":"1045-1061","source":"Crossref","is-referenced-by-count":240,"title":["An Overview of Industrial Alarm Systems: Main Causes for Alarm Overloading, Research Status, and Open Problems"],"prefix":"10.1109","volume":"13","author":[{"given":"Jiandong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Fan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Tongwen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Sirish L.","family":"Shah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/aic.14391"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2012.2233476"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/61.686982"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7439(02)00140-5"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/23.199483"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cherd.2012.11.001"},{"key":"ref37","article-title":"Advanced logic for alarm and event processing: Methods to reduce cognitive load for control room operators","author":"dubois","year":"2010","journal-title":"Proc 11th IFAC Symp Anal Des Eval Human-Mach Syst"},{"key":"ref36","article-title":"Merging process models and plant topology","author":"di geronimo gil","year":"2011","journal-title":"Proc Adv Control Ind Process (ADCONIP?11)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-7051(01)00118-6"},{"key":"ref34","first-page":"815","article-title":"Alarm allocation for event-based process alarm systems","author":"dalapatu","year":"2013","journal-title":"Proc 10th IFAC Symp Dyn and Control of Proc Sys"},{"key":"ref28","first-page":"7085","article-title":"Fault isolation by comparing alarm lists using a symbolic sequence matching algorithm","author":"charbonnier","year":"2014","journal-title":"Proc 19th IFAC World Congr"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2012.03.010"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2012.2233472"},{"key":"ref20","article-title":"Alarm management experience in BP oil","author":"brown","year":"1998","journal-title":"IEE Colloquium on Best Practices in Alarm Management"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/ic:19970751"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1177\/002029400303600403"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2014.06.007"},{"key":"ref23","first-page":"139","article-title":"Monitoring and alarm interpretation in industrial environments","volume":"11","author":"cauvin","year":"1998","journal-title":"AI Commun"},{"key":"ref101","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1049\/cp:19990191","article-title":"A methodology for alarm classification and prioritization","author":"timms","year":"1999","journal-title":"Proc Int Conf Human Interfaces in Control Rooms Cockpits and Command Centers"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2004.08.023"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2004.839570"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.psep.2011.06.003"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/2943.407079"},{"key":"ref51","first-page":"20","article-title":"Intelligent alarming","author":"hollender","year":"2007","journal-title":"ABB Review"},{"key":"ref59","year":"2011","journal-title":"Fault-Diagnosis Applications Model-Based Condition Monitoring"},{"key":"ref58","year":"2009","journal-title":"ANSI\/ISA-18 2 Management of Alarm Systems for the Process Industries"},{"key":"ref57","year":"2014","journal-title":"IEC-68682 Management of Alarm Systems for the Process Industries"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.nucengdes.2008.07.011"},{"key":"ref55","article-title":"Estimation of alarm deadbands","author":"hugo","year":"2009","journal-title":"Proc 7th IFAC Symp Fault Detection Supevision Safety Tech Process"},{"key":"ref54","year":"2008","journal-title":"The Final Report of the Major Incident Investigation Board"},{"key":"ref53","year":"1997","journal-title":"The Explosion and Fires at the Texaco Refinery Milford Haven 24 July 1994 A Report of the Investigation by the Health and Safety Executive into the Explosion and Fires on the Pembroke Cracking Company Plant at the Texaco Refinery Milford Haven on 24 July 1994"},{"key":"ref52","author":"hollifield","year":"2010","journal-title":"The Alarm Management Handbook"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2014.2345095"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2012.2230627"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2012.12.013"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WCICA.2014.7052759"},{"key":"ref5","first-page":"73","article-title":"Rule-based reduction of alarm signals in industrial control","volume":"14","author":"ahnlund","year":"2003","journal-title":"J Intell Fuzzy Syst"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"75","DOI":"10.3329\/jce.v26i1.10189","article-title":"An alternative approach of risk analysis for multivariable alarm system","volume":"26","author":"arifin","year":"2011","journal-title":"J Chem Eng"},{"key":"ref7","year":"2010","journal-title":"API-1167 Pipeline SCADA Alarm Management"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1021\/ie3035042"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2011.5968506"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/prs.10060"},{"key":"ref45","first-page":"1802","article-title":"Detection of temporal dependencies in alarm time series of industrial plants","author":"folmer","year":"2014","journal-title":"Proc 19th IFAC World Congr"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2009.2032054"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s00422-010-0386-6"},{"key":"ref42","year":"2005","journal-title":"EPRI-1010076 Advanced Control Room Alarm System Requirements and Implementation Guidance"},{"key":"ref41","year":"2013","journal-title":"EEMUA 191 Alarm Systems A Guide to Design Management and Procurement"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SSD.2012.6198008"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21619-0_38"},{"key":"ref127","first-page":"477","article-title":"A new fuzzy clustering-ranking algorithm and its application in process alarm management","volume":"13","author":"zhu","year":"2005","journal-title":"Chinese Journal of Chemical Engineering"},{"key":"ref126","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1002\/prs.11658","article-title":"Optimization of process alarm thresholds: A multidimensional kernel density estimation approach","volume":"33","author":"zang","year":"2014","journal-title":"Process Safety Progress"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-0578(07)60095-0"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2013.11.009"},{"key":"ref73","first-page":"711","article-title":"A revival of the alarm system: Making the alarm list useful during incidents","author":"larsson","year":"2006","journal-title":"Proc 5th Int Topical Meeting on Nuclear Plant Instrumentation Controls and Human Machine Interface Technol"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2014.09.017"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.ergon.2013.11.008"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/WCICA.2014.7052757"},{"key":"ref70","first-page":"267","article-title":"Using event-intervals to analyze alarm sequences in a chemical plant","volume":"3","author":"kordic","year":"2009","journal-title":"Journal of Frontiers of Computer Science and Technology"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2013.07.008"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2009.11.017"},{"key":"ref77","author":"macdonald","year":"2004","journal-title":"Practical Hazops Trips and Alarms"},{"key":"ref74","first-page":"594","article-title":"Computer-based alarm processing and presentation methods in nuclear power plants","volume":"41","author":"lee","year":"2010","journal-title":"World Acad Sci Eng Technol"},{"key":"ref75","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MS.2003.1184170","article-title":"The intelligent alarm management system","volume":"20","author":"liu","year":"2003","journal-title":"IEEE Softw"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1021\/ie020644a"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/S0263-8762(07)73181-7"},{"key":"ref60","first-page":"645","article-title":"An introduction to alarm analysis and design","author":"izadi","year":"2009","journal-title":"Proc 7th IFAC Symp Fault Detection Supervision Safety Tech Process"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40361-3_29"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.anucene.2012.07.035"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2009.04.013"},{"key":"ref64","first-page":"1","article-title":"Intelligent alarm processing: From data intensive to information rich","author":"kezunovic","year":"2009","journal-title":"Proc 42nd Hawaii Int Conf Syst Sci"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/0951-8320(94)90019-1"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/5.137221"},{"key":"ref67","first-page":"657","article-title":"Application of multivariate statistics for efficient alarm generation","author":"kondaveeti","year":"2009","journal-title":"Proc 7th IFAC Symp Fault Detection Supervision Safety Tech Process"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.cherd.2013.02.028"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2012.06.042"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2011.06.019"},{"key":"ref1","first-page":"1843","article-title":"Combining knowledge modeling and machine learning for alarm root cause analysis","author":"abele","year":"2013","journal-title":"Proc 7th IFAC Conf Manuf Model Manag Control"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15390-7_39"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1049\/ip-gtd:19970716"},{"key":"ref94","article-title":"Using alarms as a layer of protection","author":"stauffer","year":"2012","journal-title":"Proc 8th Global Congr Process Safety"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2015.03.005"},{"key":"ref93","first-page":"47","article-title":"Intelligent alarm management in a petroleum refinery","volume":"11","author":"srinivasan","year":"2004","journal-title":"Hydrocarbon Process"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/WCICA.2014.7052758"},{"key":"ref92","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1109\/TPWRD.2003.823205","article-title":"Alarm processing in electrical power systems through a neuro-fuzzy approach","volume":"19","author":"souza","year":"2004","journal-title":"IEEE Trans Power Delivery"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2014.03.018"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2010.09.005"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2013.03.025"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2013.03.010"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1021\/ie9005222"},{"key":"ref103","first-page":"44","article-title":"Fundamental principles of alarm design","volume":"2","author":"tolga","year":"2011","journal-title":"Nuclear Safety and Simulation"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.psep.2008.07.003"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2011.2117445"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2011.2176490"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1080\/07313569808955807"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2008.10.002"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/S0967-0661(03)00108-4"},{"key":"ref96","article-title":"A method of designing plant alarm system based on first alarm alternative signals for each assumed plant malfunction","author":"takeda","year":"2013","journal-title":"Proc 6th Int Conf Process Syst Eng (PSE ASIA)"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/IS.2012.6335124"},{"key":"ref10","year":"2009","journal-title":"ASM Consortium Guideline Effective Alarm Management Practice"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IREP.2013.6629374"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2013.6695338"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2006.883234"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2007.11.007"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/prs.11539"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2011.07.015"},{"key":"ref16","first-page":"232","article-title":"Real-time risk estimation for better situational awareness","author":"blaauwgeers","year":"2013","journal-title":"Proc 12th IFAC Symp Anal Des Eval Human-Mach Syst V"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2012.03.005"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/59.535703"},{"key":"ref17","author":"bransby","year":"1998","journal-title":"The Management of Alarm Systems"},{"key":"ref117","first-page":"5850","article-title":"Correlation analysis of alarm data and alarm limit design for industrial processes","author":"yang","year":"2010","journal-title":"Proc Amer Control Conf"},{"key":"ref84","article-title":"The development and usability test of a state based alarm system for a nuclear power plant simulator","author":"nihlwing","year":"2012","journal-title":"Proc NPIC HMIT"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-0578(00)00004-5"},{"key":"ref83","year":"2003","journal-title":"NAMUR-NA-102 Alarm Management"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jhazmat.2004.05.040"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.2478\/v10006-012-0003-z"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/S0098-1354(97)00119-1"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1021\/ie4014953"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/59.207347"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.3390\/s91108579"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1252\/jcej.07WE074"},{"key":"ref89","author":"rothenberg","year":"2009","journal-title":"Alarm Management for Process Control"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2013.2248000"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05380-6"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2006.05.004"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1049\/ip-c.1992.0061"},{"key":"ref85","first-page":"28","article-title":"Rescue your plant from alarm overload","author":"nimmo","year":"2005","journal-title":"Proc Chem"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1002\/apj.575"},{"key":"ref87","year":"2000","journal-title":"NUREG\/CR-61056684 Advanced Alarm Systems Revision of Guidance and Its Technical Basis"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1021\/ie9019648"}],"container-title":["IEEE Transactions on Automation Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8856\/7447676\/7270356.pdf?arnumber=7270356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:34:23Z","timestamp":1633919663000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7270356\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4]]},"references-count":129,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tase.2015.2464234","relation":{},"ISSN":["1545-5955","1558-3783"],"issn-type":[{"value":"1545-5955","type":"print"},{"value":"1558-3783","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4]]}}}