[1]Yang F, Xiao D. Research topics of intelligent alarm management [J]. Computers and Applied Chemistry, 2011, 28(12):14851491.(in Chinese)
[2]Izadi I, Shah S L, Shook D S, et al. An introduction to alarm analysis and design [C] ∥Proc of the 7th IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes, 2009:645650.
[3]Izadi I, Shah S L, Shook D S, et al. A framework for optimal design of alarm systems [C] ∥Proc of the 7th IFAC Fault Detection, Supervision and Safety of Technical Processes, 2009:651656.
[4]Kondaveeti SR, Shah SL, Izadi I. Application of multivariate statistics for efficient alarm generation [C] ∥Proc of the 7th IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes, 2009:657662.
[5]Lesot M J, Rifqi M, Benhadda H. Similarity measures for binary and numerical data:a survey [J]. International Journal of Knowledge Engineering and Soft Data Paradigms, 2009, 1(1):6394.
[6]Choi S, Cha S, Tappert C C. A survey of binary similarity and distance measures [J]. Journal of Systemics, Cybernetics and Informatics, 2010, 8(1):4348.
[7]Yang F,Shah S L,Xiao DY.Correlation analysis of alarm data and alarm limit design for industrial processes[C]∥Proc of 2010 American Control Conference, 2010:58505855.
[8]Nishiguchi J, Takai T. IPL2 and 3 performance improvement method for process safety using event correlation analysis [J]. Computers and Chemical Engineering, 2010, 34(12):20072013.
[9]Yang F, Shah S L, Xiao D, et al. Improved correlation analysis and visualization of industrial alarm data [J]. ISA Transactions, 2012, 51(4):499506.
[10]Smith S M, Miller K L, SalimiKhorshidi, et al. Network modeling methods for FMRI [J]. NeuroImage, 2011, 54:875891.
[11]Bauer M, Thornhill N F. A practical method for identifying the propagation path of plantwide disturbances [J]. Journal of Process Control, 2008, 18(78):707719.
[12]Bauer M, Cox J W, Caveness M H, et al. Finding the direction of disturbance propagation in a chemical process using transfer entropy [J]. IEEE Transactions on Control Systems Technology, 2007, 15(1):1221.
[13]Duan P, Yang F, Shah S L, Chen T. Direct Causality Detection via the Transfer Entropy Approach [J]. IEEE Transactions on Control Systems Technology, 2013, 21(6):20522066.
[14]Izadi I, Shah S L, Chen T. Effective resource utilization for alarm management [C]∥Proc of the 49th IEEE Conference on Decision and Control, 2010:68036808.
[15]Yang F, Shah S L, Xiao DY. Signed directed graph modeling and validation of industrial processes by process knowledge and process data [J]. International Journal of Applied Mathematics and Computer Science, 2011, 22 (1):4153.
附中文参考文献:
[1]杨帆,萧德云.智能报警管理若干研究问题[J].计算机与应用化学,2011,28(12):14851491. |