Acknowledgement
Supported by : Small and Medium Business Administration, IITP(Institute for Information & communications Technology Promotion, National Research Foundation of Korea(NRF)
References
- Kang, B. H., Kim, Y. S., Chen, Z., and Kim, T.. "Detecting Significant Alarms using Outlier Detection Algorithms," Interdisciplinary Research Theory and Technology (IRRT 2013), 2013.
- Orair, G. H., Teixeira, C. H., Meira Jr, W., Wang, Y., and Parthasarathy, S., "Distance-based outlier detection: consolidation and renewed bearing," Proceedings of the VLDB Endowment, Vol. 3, No. 1-2, pp. 1469-1480, 2010. https://doi.org/10.14778/1920841.1921021
- R. Langone, C. Alzate, A. Bey-Temsamani, and J. Suykens, "Alarm prediction in industrial machines using autoregressive LS-SVM models," Computational Intelligence and Data Mining (CIDM), 2014 IEEE Symposium on, pp. 359-364, 2014.
- Oi. Foong, S. Sulaiman, D. Rambli, and N. Abdullah, "ALAP: Alarm prioritization system for oil refinery," the World Congress on Engineering and Computer Science, Vol. 2, 2009.
- W. Zhao, X. Bai, W. Wang, and J. Ding, "A novel alarm processing and fault diagnosis expert system based on BNF rule," Transmission and Distribution Conference and Exhibition: Asia and Pacific, 2005 IEEE/PES, pp. 1-6, 2005.
- Cheng, Yue, Iman Izadi, and Tongwen Chen, "Optimal alarm signal processing: Filter design and performance analysis," IEEE Transactions on Automation Science and Engineering, Vol. 10, No. 2, pp. 446-451, 2013. https://doi.org/10.1109/TASE.2012.2233472
- Ahmed, K., Izadi, I., Chen, T., Joe, D., and Burton, T., "Similarity analysis of industrial alarm flood data," IEEE Transactions on Automation Science and Engineering, Vol. 10, No. 2, pp. 452-457, 2013. https://doi.org/10.1109/TASE.2012.2230627
- Izadi, I., Shah, S. L., Shook, D. S., Kondaveeti, S. R., and Chen, T., "A framework for optimal design of alarm systems," IFAC Proceedings Volumes, Vol. 42, No. 8, pp. 651-656, 2009.
- Zhu, J., Shu, Y., Zhao, J, and Yang, F., "A dynamic alarm management strategy for chemical process transitions," Journal of Loss Prevention in the Process industries, Vol. 30, pp. 207-218, 2014. https://doi.org/10.1016/j.jlp.2013.07.008
- Sawsaa, A., and Lu, J, "Extracting information science concepts based on jape regular expression," In In: WORLDCOMP'11 The 2011 World Congress in Computer Science, Computer Engineering, and Applied Computing, pp. 18-21, Jul. 2011.
- Mohapatra, Hrushikesh, Siddhanth Jain, and Soumen Chakrabarti, "Joint Bootstrapping of Corpus Annotations and Entity Types," EMNLP, 2013.
- Morwal, S., N. Jahan and D. Chopra, "Named entity recognition using hidden Markov model (HMM)," International Journal on Natural Language Computing (IJNLC), pp. 1.4: 15-23, 2012.
- Ju, Z., J. Wang and F. Zhu, "Named entity recognition from biomedical text using SVM," Bioinformatics and Biomedical Engineering, (iCBBE) 2011 5th International Conference on, IEEE, 2011.
- Santos, Igor, Javier Nieves, and Pablo G. Bringas, "Enhancing fault prediction on automatic foundry processes," World Automation Congress (WAC), 2010, IEEE, 2010.
- Liu, Yutian, and Jingping Jiang, "Fault diagnosis and prediction of hybrid system based on particle filter algorithm," 2008 IEEE International Conference on Automation and Logistics, IEEE, 2008.
- Chen, Bindi, Peter C. Matthews, and Peter J. Tavner, "Automated on-line fault prognosis for wind turbine pitch systems using supervisory control and data acquisition," IET Renewable Power Generation 9.5, pp. 503-513, 2015. https://doi.org/10.1049/iet-rpg.2014.0181