Professional Documents
Culture Documents
Abstract- An Advanced Alarm System (AAS) of a NPP (Nuclear In this method, we can acquire alarm reduction rules by using
Power Plant) is primarily a digital system employing advanced data mining techniques and these rules can be automatically
alarm process logics and a VDU (Visual Display Unit) based triggered by an active database. And rules are continuously
control and display for the alarms. The role of the AAS is to mined at a desired frequency.
provide the information necessary to safely shutdown the reactor
under all plant conditions, to monitor the plant parameters II. ALARM REDUCTION USING ACTIVE
approaching or exceeding the operating limits and to minimize DATABASE
the number of alarms, and to group and prioritize the alarms.
The secondary function of the alarm system is to serve as an A. Functions of AAS of NPP
alarm and event log. This paper proposes a new approach to an
active alarm processing in a NPP by using active database and An alarm system of a NPP is a basic operator support
data mining techniques. system for managing abnormal situations and it has the
following two functions [2].
Keywords-active database; alarm processing; data mining The primary function of the alarm system is to warn the
operator about a situation that is not normal. Each alarm
I. INTRODUCTION should alert, inform and guide the operator.
The secondary function of the alarm system is to serve as
An AAS (Advanced Alarm System) of NPP(Nuclear an alarm and event log. The log functions supports the
Power Plant) is to assist the operator to monitor the systems operator’s need to analyses the event that have lead to the
and processes and to take the necessary actions required to current or previous process conditions. The alarm log should
preserve the normal operating conditions. The AAS must only be used for:
present meaningful information, and must not flood the
- Analysis of incidents
operator with miscellaneous data that he/she does not have to
- Optimizing plant operation
act upon. So, irrelevant or unnecessary alarms have to be
The alarm log should be flexible and contain also events,
eliminated and less important alarms are suppressed [1]. suppressed alarms and other pieces of information that were
The AAS is a database driven information system. The not presented in main alarm list, but which could be useful for
need for an automated extraction of useful knowledge from offline investigation of incidents. Alarm log information
huge amounts of data has become widely recognized. To should be used for monitoring and improving the alarm
efficiently manage data that varies rapidly over time and system performance. The general structure of AAP(Advanced
process event driven transactions, AAS requires database Alarm Processing) is shown in Fig.1.
systems that support an active rule processing.
The active behavior of a system is generally specified by B. Active Database
means of rules, which describe the situations to be monitored
and the reactions of the system when these situations are Active database technology can, therfore, enable a
encountered. In general form, a rule consists of a rule event, a system to have a reactive processing and autonomous
condition and an action, known as Event-Condition-Action response to an event that occurs inside or outside a system.
rules or ECA rules. Many applications, including classical ones like an inventory
Data mining in databases is the efficient discovery of control, would run much more efficiently. This would free the
previously unknown patterns in large databases and is applications of the need to continously monitor relevant
emerging as a major application area for databases. events and as result, the application code would be less
This paper proposes an active alarm processing method in complex and more manageable and reliable.
a NPP by using active database and data mining techniques.
TABLE III
EVENTS DEFINED FOR A CAUSE-CONSEQUENCE RELATIONSHIP
Event of Interest What Triggers the event Action to be taken
E1 MFW Pump Trigger C1 Trigger C1
Low Suction Flow
E2 Heater Drain Tank Trigger C1
Low Level
C1 E2, followed by Consequence alarm is
E1(sequence) suppressed
C. Adapting Active Rules for AAP With the help of data mining techniques, clear
relationships or general regularities of a dynamic alarm
Alarm processing techniques were developed to support processing system could be discovered and the conditions and
operators in coping with the volume of alarms, to identify actions of rule could be specified at a higher concept level. In
which are significant, and to reduce the need for operators to this paper, data mining is introduced into active rule
infer plant conditions. This section describes the test case extraction for the alarm reduction in NPP. And alarm data is
used to demonstrate the AAP by using the concepts of continuously mined at a desired frequency.
composite events.
A. Rule Extraction using Data Mining
z Equipment-State Dependency
The alarms activated as a consequence of an equipment- Rule extraction is performed during the analysis phase of
state change (e.g., pump tripped) are lowered in priority. (See active alarm processing applications. Rule extraction may
TABLE I) cover requirements analysis and the first steps of a conceptual
database design as well. The results of rule extraction are the
TABLE I rule requirements. Rule extraction consists of a sampling, an
EVNETS DEFINED FOR AN EQUIPMENT STATE DEPENDENCY exploration and a modeling phase.
Event of Interest What Triggers the event Action to be taken A mining system for a rule extraction receives the alarm
E1 Pump Trip Trigger C1 data from a database and establishes useful rules. Association
E2 Low Flow Trigger C1 rule miner can find a correlation among the attributes in a
C1 E1 and E2 Low flow alarm is
record, although a frequent episode miner searches for event
eliminated
patterns in the records.
In addition, a clustering analysis provides a data
z Multi-Setpoint Relationship abstraction from the underlying structure. And it groups data
The lower level alarms are reduced in priority when the objects into clusters such that the objects which belong to the
higher level alarms also are activated. (See TABLE II) same cluster are similar, while those belonging to a different
cluster are dissimilar.
TABLE II
Because we consider the characteristics of the alarm data,
EVENTS DEFINED FOR A MULTI-SETPOINT RELATIONSHIP
we improved the existing data mining algorithms to create
Event of Interest What Triggers the event Action to be taken
candidate item sets that include only the interesting attributes.
E1 PZR Pressure Hi Trigger C1
B. Active Rule Analysis and Rule Update using Data Mining
E2 PZR Press Hi-Hi Trigger C1
C1 E2, followed by Low alarm is
The rule controller analyses input stream data for alarm
E1(sequence) suppressed
based on data mining algorithms, updates ECA rules, and
controls event, condition and action of rules. The rule
z Cause-Consequence Relationship
2
Authorized licensed use limited to: RNS Institute of Technology. Downloaded on February 9, 2009 at 00:39 from IEEE Xplore. Restrictions apply.
controller consists of programs for establishing association Composite
Plant Composite Condition
rules, frequent episodes and a clustering. Association rule Operation Event
Event
Condition
Evaluator
Detector Evaluator
miner can find a correlation among the attributes in a record. Data Detector
episode is defined by a sequence of specific events that occurs Exploration Signal Event
Exploration
frequently, and events composing a sequence are closely External
Association Rule
related with one another. Here, exploring is done to find all Event Clustering Action
Action
Detector Executer
the frequent episodes in a set of time windows of a user- Association Rule
Signal
Event Signal Event Frequent Episode
Executer
defined size. A sequence pattern and an episode are similar in Clustering Rule Controller
that they explore patterns in sequence. ECA
Frequent Episode Rule ECA
Base Execute Application
Modeling
C. Process of the Detection of Event Operation
3
Authorized licensed use limited to: RNS Institute of Technology. Downloaded on February 9, 2009 at 00:39 from IEEE Xplore. Restrictions apply.