CN113299052A - Method and device for suppressing nuisance alarm - Google Patents

Method and device for suppressing nuisance alarm Download PDF

Info

Publication number
CN113299052A
CN113299052A CN202010112387.5A CN202010112387A CN113299052A CN 113299052 A CN113299052 A CN 113299052A CN 202010112387 A CN202010112387 A CN 202010112387A CN 113299052 A CN113299052 A CN 113299052A
Authority
CN
China
Prior art keywords
alarm
type
suppression
alarms
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010112387.5A
Other languages
Chinese (zh)
Inventor
丁辉
张东明
刘乐
安凤栓
杜伟
王鹏飞
王兆丰
张贵娟
霍海宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Guodian Zhishen Control Technology Co ltd
Original Assignee
Beijing Guodian Zhishen Control Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Guodian Zhishen Control Technology Co ltd filed Critical Beijing Guodian Zhishen Control Technology Co ltd
Priority to CN202010112387.5A priority Critical patent/CN113299052A/en
Publication of CN113299052A publication Critical patent/CN113299052A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/18Prevention or correction of operating errors
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/18Prevention or correction of operating errors
    • G08B29/20Calibration, including self-calibrating arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

The application discloses a method and a device for suppressing nuisance alarm, wherein the method comprises the following steps: acquiring first alarm information of a first alarm to be generated, and determining whether the first alarm belongs to a first type alarm or not according to the first alarm information; the first type alarm comprises an A type alarm which can be associated to cause one or more sub-alarms, a B type alarm which repeatedly appears in a first preset time length, a C type alarm which is judged to be invalid alarm and a D type alarm of which the appearance frequency is more than or equal to a preset frequency threshold value in a second preset time length; when the first alarm belongs to the A-type alarm, executing the first alarm and determining a sub-alarm corresponding to the first alarm from an alarm suppression configuration table as a nuisance alarm for suppression; and when the first alarm is determined to belong to a B-type alarm, a C-type alarm or a D-type alarm, directly taking the first alarm as a nuisance alarm to suppress. The scheme of the embodiment realizes effective suppression of nuisance alarm, strengthens the warning effect of alarm and ensures the safe and stable operation of the unit.

Description

Method and device for suppressing nuisance alarm
Technical Field
The present invention relates to production alarm technology, and is especially one kind of jamming alarm inhibiting method and device.
Background
In the normal production operation (such as power generation operation) process, the alarm of each system of the unit is pushed to operators through the alarm light-character plate, when the alarm appears, the alarm light-character plate is popped up to prompt the operators, so that the operators can find and handle problems in time, the occurrence of serious accidents such as equipment damage and even unit shutdown is prevented, and the safe operation of the unit is ensured.
But can cause nuisance alarms in production alarms due to various reasons in the production process. When a large number of alarms exist, the alarm device can not only play the role of alarming for operators, but also be invalid, and the alarm is repeatedly popped up, so that the interference is caused to the normal operation of the operators, and the safe operation of the production process is not facilitated.
Disclosure of Invention
The application provides a method and a device for restraining nuisance alarms, which can effectively restrain nuisance alarms occurring in the production process, so that only meaningful and valuable alarms are pushed to operators, the warning effect of alarms is enhanced, and the safe and stable operation of a unit is ensured.
The application provides a method for suppressing nuisance alarms, which can comprise the following steps:
acquiring first alarm information of a first alarm to be generated currently, and determining whether the first alarm belongs to a first type alarm or not according to the first alarm information; the first type of alarm comprises: the method comprises the following steps of associating A-type alarm causing one or more sub-alarms, B-type alarm repeatedly appearing within a first preset time length, C-type alarm judged as invalid alarm and D-type alarm with the appearance frequency greater than or equal to a preset frequency threshold within a second preset time length;
when the first alarm is determined to belong to the A-type alarm in the first-type alarms, executing the first alarm, and determining a second alarm to be suppressed corresponding to the first alarm from a preset alarm suppression configuration table; wherein the second alarm is one or more sub-alarms caused by the first alarm association; suppressing the second alarm as a nuisance alarm;
and when the first alarm is determined to belong to B-type alarm, C-type alarm or D-type alarm in the first type of alarm, directly using the first alarm as a nuisance alarm to suppress.
In an exemplary embodiment of the present application, the determining whether the first alarm belongs to a first type of alarm based on the first alarm information may include:
determining an alarm triggering condition of the first alarm, inquiring an alarm type identification bit of the first alarm from a preset alarm information table according to the alarm triggering condition, and determining whether the first alarm belongs to an A-type alarm according to the identification of the alarm type identification bit; when the identifier of the alarm type identifier bit is a first identifier, determining that the first alarm belongs to an A-type alarm;
comparing the first alarm information with the alarm information of the alarm once appearing in the first preset time, and determining that the first alarm belongs to a B-type alarm when the first alarm information is matched with any one alarm information of the alarm once appearing in the first preset time;
determining an alarm triggering condition of the first alarm, detecting whether the alarm triggering condition accords with a normal operation condition, and determining that the first alarm is an invalid alarm and belongs to a C-type alarm when the alarm triggering condition accords with the normal operation condition;
and detecting the occurrence frequency of the first alarm within the second preset time, and determining that the first alarm belongs to a D-type alarm when the occurrence frequency is greater than or equal to the frequency threshold.
In an exemplary embodiment of the present application, the method may further include:
determining whether each alarm belongs to A-type alarms or not according to alarm triggering conditions corresponding to all alarms in the production process and association relations among all alarms stored in an alarm association knowledge base in advance, setting an alarm type identification bit for each alarm, setting the alarm type identification bit for the A-type alarms as a first identification, and setting the alarm type identification bit for the non-A-type alarms as a second identification; and writing the identifiers of the alarm condition and the alarm type identifier bit contained in each alarm message into the alarm message table.
In an exemplary embodiment of the present application, the method may further include: and coding alarm triggering conditions of different alarms in advance, and correspondingly writing the codes into the alarm information table so as to search different alarm triggering conditions according to the codes.
In an exemplary embodiment of the present application, the method may further include: setting the alarm suppression configuration table in advance according to an alarm association knowledge base;
wherein, the alarm suppression configuration table at least comprises the following configuration items: a suppression item, a suppression cause item and a suppression parameter item; the inhibition reason item comprises one or more A-type alarms; the inhibition item comprises one or more pieces of sub-alarm information corresponding to each A-type alarm; and the inhibition parameter item comprises an inhibition parameter corresponding to each A-type alarm.
In an exemplary embodiment of the present application, the setting the alarm suppression configuration table according to the alarm association knowledge base in advance may include:
determining whether each alarm can be associated to cause one or more sub-alarms or not according to alarm information corresponding to all alarms in the production process and association relations among the alarms stored in an alarm association knowledge base in advance;
when any one alarm can be associated with one or more sub-alarms caused, taking the alarm as the A-type alarm; filling the alarm information of the alarm into the inhibition reason item, and filling the alarm information of one or more sub-alarms corresponding to the alarm into the inhibition item corresponding to the inhibition reason item;
when any alarm cannot be associated with any of the sub-alarm information caused, the alarm is ignored.
In an exemplary embodiment of the present application, the method may further include: after the disturbance alarm suppression is finished, marking the suppressed disturbance alarm information in the alarm suppression configuration table and/or generating a new disturbance alarm information suppression list; the disturbance alarm information suppression list comprises disturbance alarm information which is all suppressed within a preset time period;
wherein, the nuisance alarm information suppression list at least comprises the following configuration items: a suppression time information item, a disturbance suppression item and a disturbance suppression cause item; the disturbance inhibition item comprises one or more disturbance alarm information; the disturbance suppression reason item comprises first type alarm information corresponding to the one or more disturbance alarm information; and the suppression time information item comprises a suppression moment or a suppression period corresponding to each piece of disturbance alarm information.
In an exemplary embodiment of the present application, the method may further include: when the current first alarm is detected to belong to the A-type alarm and a preset specific alarm in the A-type alarm, sending out a reminding message for manual disturbance suppression;
the alarm triggering condition of the specific alarm may include: the equipment is damaged.
In an exemplary embodiment of the present application, the method may further include: and respectively setting different alarm suppression configuration tables and alarm information tables according to different load states of the equipment and/or the unit.
The present application further provides a nuisance alarm suppression device, which may include a processor and a computer-readable storage medium having stored therein instructions that, when executed by the processor, implement a nuisance alarm suppression method according to any of the preceding claims.
Compared with the related art, the method and the device for alarming the first type of alarm can comprise the steps of obtaining first alarm information of a first alarm to be generated currently, and determining whether the first alarm belongs to a first type of alarm or not according to the first alarm information; the first type of alarm comprises: the method comprises the following steps of associating A-type alarm causing one or more sub-alarms, B-type alarm repeatedly appearing within a first preset time length, C-type alarm judged as invalid alarm and D-type alarm with the appearance frequency greater than or equal to a preset frequency threshold within a second preset time length; when the first alarm is determined to belong to the A-type alarm in the first-type alarms, executing the first alarm, and determining a second alarm to be suppressed corresponding to the first alarm from a preset alarm suppression configuration table; wherein the second alarm is one or more sub-alarms caused by the first alarm association; suppressing the second alarm as a nuisance alarm; and when the first alarm is determined to belong to B-type alarm, C-type alarm or D-type alarm in the first type of alarm, directly using the first alarm as a nuisance alarm to suppress. Through the scheme of the embodiment, the nuisance alarm in the production process is effectively inhibited, so that the nuisance alarm is only pushed to operators to give a meaningful and valuable alarm, the warning effect of the alarm is enhanced, and the safe and stable operation of the unit is ensured.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the application. Other advantages of the present application may be realized and attained by the instrumentalities and combinations particularly pointed out in the specification and the drawings.
Drawings
The accompanying drawings are included to provide an understanding of the present disclosure and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the examples serve to explain the principles of the disclosure and not to limit the disclosure.
FIG. 1 is a flow chart of a nuisance alarm suppression method according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a nuisance alarm information suppression list according to an embodiment of the present application;
FIG. 3 is a schematic diagram of the identification of suppressed alarms in the light word alarm of an embodiment of the present application;
FIG. 4 is a schematic diagram of a manual suppression method according to an embodiment of the present application;
fig. 5 is a block diagram of a nuisance alarm suppression device according to an embodiment of the present application.
Detailed Description
The present application describes embodiments, but the description is illustrative rather than limiting and it will be apparent to those of ordinary skill in the art that many more embodiments and implementations are possible within the scope of the embodiments described herein. Although many possible combinations of features are shown in the drawings and discussed in the detailed description, many other combinations of the disclosed features are possible. Any feature or element of any embodiment may be used in combination with or instead of any other feature or element in any other embodiment, unless expressly limited otherwise.
The present application includes and contemplates combinations of features and elements known to those of ordinary skill in the art. The embodiments, features and elements disclosed in this application may also be combined with any conventional features or elements to form a unique inventive concept as defined by the claims. Any feature or element of any embodiment may also be combined with features or elements from other inventive aspects to form yet another unique inventive aspect, as defined by the claims. Thus, it should be understood that any of the features shown and/or discussed in this application may be implemented alone or in any suitable combination. Accordingly, the embodiments are not limited except as by the appended claims and their equivalents. Furthermore, various modifications and changes may be made within the scope of the appended claims.
Further, in describing representative embodiments, the specification may have presented the method and/or process as a particular sequence of steps. However, to the extent that the method or process does not rely on the particular order of steps set forth herein, the method or process should not be limited to the particular sequence of steps described. Other orders of steps are possible as will be understood by those of ordinary skill in the art. Therefore, the particular order of the steps set forth in the specification should not be construed as limitations on the claims. Further, the claims directed to the method and/or process should not be limited to the performance of their steps in the order written, and one skilled in the art can readily appreciate that the sequences may be varied and still remain within the spirit and scope of the embodiments of the present application.
The application provides a nuisance alarm suppression method, as shown in fig. 1, the method may include steps S101-S103:
s101, acquiring first alarm information of a first alarm to be generated currently, and determining whether the first alarm belongs to a first type alarm or not according to the first alarm information; the first type of alarm comprises: the method can associate A-type alarm causing one or more sub-alarms, B-type alarm repeatedly appearing within a first preset time period, C-type alarm judged as invalid alarm, and D-type alarm with the frequency of appearance being greater than or equal to a preset frequency threshold within a second preset time period.
At present, in various industrial productions (for example, in the process of power generation operation), a plurality of alarms are caused because abnormal states can be propagated from an alarm source to a relevant link, or a process variable oscillates near an alarm limit value due to random disturbance to cause high-frequency alarm or invalid alarm, or the alarm of a certain parameter repeatedly appears due to factors such as damage of a device measuring point, unreasonable alarm parameter setting and the like, and a great amount of alarms are caused by the phenomena, which are called nuisance alarms.
In the exemplary embodiment of the present application, it can be known from the above analysis that nuisance alarms may include multiple types, such as invalid alarms, repeat alarms, high-frequency alarms, and association alarms, and in the production process, when one alarm is about to occur, a current alarm may be first determined to determine whether the current alarm is a nuisance alarm or an alarm that can cause nuisance alarms, and these alarms may be collectively referred to as a first type alarm.
In exemplary embodiments of the present application, nuisance alarms in the first type of alarm may include, but are not limited to:
1. an alarm that can be associated to cause one or more sub-alarms, can be called a-type alarm; for example, when an M alarm causes O, P, N and the like, the O, P, N alarm is a sub-alarm of the M alarm, because the M station has already alarmed, the O, P, N alarm is suppressed as a nuisance alarm;
2. within a certain time period, for example, within a first preset time period, the alarm which repeatedly appears may be called a repeat alarm or a B-type alarm;
3. the false alarm under the condition that the running states are normal can be called as invalid alarm or C-type alarm;
4. within a certain time period, for example, within a second preset time period, an alarm with a frequency greater than or equal to a preset frequency threshold occurs, which may be referred to as a high frequency alarm or a D-type alarm.
In the exemplary embodiment of the present application, in order to effectively suppress various nuisance alarms, after the alarm server obtains an alarm signal, before implementing an alarm, the alarm may be first determined to determine whether the alarm belongs to the first type of alarm, so that when the alarm belongs to the first type of alarm, the alarm may be directly suppressed under the condition that the current alarm is a nuisance alarm; and under the condition that the current alarm can cause nuisance alarm, acquiring nuisance alarm corresponding to the alarm and inhibiting the nuisance alarm.
In the exemplary embodiment of the present application, suppressing the nuisance alarm means not implementing the nuisance alarm, for example, not transmitting various warning information such as sound, light, electricity, etc. corresponding to the alarm.
In the exemplary embodiment of the present application, whether the current alarm is the first type alarm or not may be determined according to respective attribute characteristics of an a-type alarm, a B-type alarm, a C-type alarm, and a D-type alarm.
In an exemplary embodiment of the present application, the determining whether the first alarm belongs to a first type of alarm based on the first alarm information may include:
determining an alarm triggering condition of the first alarm, inquiring an alarm type identification bit of the first alarm from a preset alarm information table according to the alarm triggering condition, and determining whether the first alarm belongs to an A-type alarm according to the identification of the alarm type identification bit; when the identifier of the alarm type identifier bit is a first identifier, determining that the first alarm belongs to an A-type alarm;
comparing the first alarm information with the alarm information of the alarm once appearing in the first preset time, and determining that the first alarm belongs to a B-type alarm when the first alarm information is matched with any one alarm information of the alarm once appearing in the first preset time;
determining an alarm triggering condition of the first alarm, detecting whether the alarm triggering condition accords with a normal operation condition, and determining that the first alarm is an invalid alarm and belongs to a C-type alarm when the alarm triggering condition accords with the normal operation condition;
and detecting the occurrence frequency of the first alarm within the second preset time, and determining that the first alarm belongs to a D-type alarm when the occurrence frequency is greater than or equal to the frequency threshold.
In an exemplary embodiment of the present application, for a current alarm, it may be determined first whether the alarm is a nuisance alarm, for example, it may be determined first whether the alarm belongs to a B-type alarm, a C-type alarm, and a D-type alarm; so that the alarm can be directly inhibited when the current alarm is judged to be a nuisance alarm, and the judgment of the A-type alarm is omitted. When it is determined that the alarm is not a nuisance alarm, it may be determined whether the alarm can cause a nuisance alarm, for example, to further determine whether the alarm is an a-type alarm.
In the exemplary embodiment of the application, because the a-type alarm itself is not a nuisance alarm, but an alarm that can cause nuisance alarms, it is also possible to determine whether the alarm belongs to the a-type alarm directly according to the association relationship between the alarms stored in the alarm association knowledge base for the judgment of such alarms, however, the scheme needs to temporarily calculate various data in the association knowledge base, increases the amount of calculation, and reduces the judgment efficiency, so that some settings may be made in advance for the judgment of whether the alarm belongs to the a-type alarm, for example, setting an alarm information table, etc., so as to directly query the alarm information table when it is necessary to judge whether an alarm belongs to the a-type alarm, thereby improving the judgment efficiency.
In an exemplary embodiment of the present application, the method may include:
determining whether each alarm belongs to A-type alarms or not according to alarm triggering conditions corresponding to all alarms in the production process and association relations among all alarms stored in an alarm association knowledge base in advance, setting an alarm type identification bit for each alarm, setting the alarm type identification bit for the A-type alarms as a first identification, and setting the alarm type identification bit for the non-A-type alarms as a second identification; and writing the identifiers of the alarm condition and the alarm type identifier bit contained in each alarm message into the alarm message table.
In an exemplary embodiment of the present application, the method may further include: and coding alarm triggering conditions of different alarms in advance, and correspondingly writing the codes into the alarm information table so as to search different alarm triggering conditions according to the codes.
In exemplary embodiments of the present application, for ease of description, and to improve the efficiency of finding, comparing information, alarm trigger conditions (e.g., low feedwater pump outlet pressure) for different alarms may be encoded (e.g., MKACT139) to directly compare the corresponding codes when comparing alarm trigger conditions. In particular, different devices and groups, and/or different alarm conditions of the same device and group, may be coded differently in advance.
S102, when the first alarm is determined to belong to an A-type alarm in the first-type alarms, executing the first alarm, and determining a second alarm needing to be suppressed corresponding to the first alarm from a preset alarm suppression configuration table; wherein the second alarm is one or more sub-alarms caused by the first alarm association; and using the second alarm as a nuisance alarm to suppress.
In an exemplary embodiment of the present application, when it is determined that the current alarm is an a-type alarm, one or more sub-alarms caused by the alarm association may be first found out so that the sub-alarms are all suppressed as nuisance alarms.
In an exemplary embodiment of the present application, in order to facilitate obtaining one or more sub-alarms caused by one a-type alarm association, an alarm suppression configuration table may be preset, and nuisance alarms respectively corresponding to one or more a-type alarms are listed in the alarm suppression configuration table. When a nuisance alarm corresponding to an a-type alarm is obtained, the position of a-type alarm information matched with the current a-type alarm can be found from the alarm suppression configuration table, and one or more sub-alarms (nuisance alarms) stored corresponding to the position can be obtained according to the position.
In an exemplary embodiment of the present application, the method may further include: setting the alarm suppression configuration table in advance according to an alarm association knowledge base;
wherein, the alarm suppression configuration table at least comprises the following configuration items: a suppression item, a suppression cause item and a suppression parameter item; the inhibition reason item comprises one or more A-type alarms; the inhibition item comprises one or more pieces of sub-alarm information corresponding to each A-type alarm; and the inhibition parameter item comprises an inhibition parameter corresponding to each A-type alarm.
In an exemplary embodiment of the present application, the alarm suppression configuration table may be as shown in table 1: the first column may be a suppression cause term, e.g., a current alarm name (or code), etc., the second column may be a suppression term, e.g., a name (or code) of a nuisance alarm caused by the current alarm association, etc., and the third column may be a suppression parameter term, e.g., when the parameter is 0: suppress low alarm (0 alarm), when parameter is 1: inhibit high alarm (1 alarm), when the parameter is 2: suppressing any type of alarm.
TABLE 1
MKACT139 MKACT139YZ 0
MKACT140 MKACT140YZ 1
MKACT141 MKACT141YZ 2
In an exemplary embodiment of the present application, when the system detects that the value assigned to the first column of the alarm suppression configuration table is 1, the alarm data of the nuisance alarms of the second column may be suppressed according to the suppression parameters of the third column.
In an exemplary embodiment of the present application, the setting the alarm suppression configuration table according to the alarm association knowledge base in advance may include:
determining whether each alarm can be associated to cause one or more sub-alarms or not according to alarm information corresponding to all alarms in the production process and association relations among the alarms stored in an alarm association knowledge base in advance;
when any one alarm can be associated with one or more sub-alarms caused, taking the alarm as the A-type alarm; filling the alarm information of the alarm into the inhibition reason item, and filling the alarm information of one or more sub-alarms corresponding to the alarm into the inhibition item corresponding to the inhibition reason item;
when any one alarm cannot be associated with any one of the sub-alarm information that is caused, the alarm can be ignored.
In an exemplary embodiment of the present application, the alarm association knowledge base may be used for analyzing all alarm parameters in a system of relevant technicians, workers, and the like according to a production process of a process, so as to determine all alarm information that may occur in the production process and an association relationship between the alarms, where the association relationship includes an operation state in which each alarm may be associated with a trigger alarm.
In the exemplary embodiment of the application, after a nuisance alarm which can be caused by an A-type alarm is determined by the scheme, the nuisance alarms can be suppressed after the alarm signal of the A-type alarm is initiated in the subsequent production.
In an exemplary embodiment of the present application, nuisance alarms corresponding to type a alarms may be associated with the operational status of the equipment, and when the equipment is shut down, the alarms associated with the equipment are suppressed; only when the device is running, the relevant alarm can be executed. For example: in the water supply system, there are alarm signals such as low outlet pressure and low inlet flow rate of the water supply pump, but when the water supply pump is in a shutdown state (which can be regarded as an a-type alarm), the outlet pressure and the inlet flow rate of the water supply pump are inevitably low, and at this time, the alarm is regarded as a nuisance alarm, so that it is possible to establish a condition of the association suppression of low outlet pressure and low inlet flow rate of the water supply pump as that of the shutdown of the water supply pump, that is, when the water supply pump is in a shutdown state, the alarm signals of low outlet pressure and low outlet flow rate of the water supply pump are automatically suppressed.
In an exemplary embodiment of the present application, the alarm suppression configuration table may be described by taking an alarm signal indicating that the outlet pressure of the feed water pump is low as an example: the table may fill in a feed pump shutdown signal in the first column, a low feed pump outlet pressure alarm signal in the second column, and a low alarm signal in the third column, which may be 0, representing suppression of the low alarm signal.
S103, when the first alarm is determined to belong to a B-type alarm, a C-type alarm or a D-type alarm in the first type of alarms, directly using the first alarm as a nuisance alarm to suppress.
In an exemplary embodiment of the present application, the alarm server may directly suppress the alarm when it is determined that the current alarm is a nuisance alarm.
In an exemplary embodiment of the present application, the method may further include: after the disturbance alarm suppression is finished, marking the suppressed disturbance alarm information in the alarm suppression configuration table and/or generating a new disturbance alarm information suppression list; the disturbance alarm information suppression list comprises disturbance alarm information which is all suppressed within a preset time period;
wherein, the nuisance alarm information suppression list at least comprises the following configuration items: a suppression time information item, a disturbance suppression item and a disturbance suppression cause item; the disturbance inhibition item comprises one or more disturbance alarm information; the disturbance suppression reason item comprises first type alarm information corresponding to the one or more disturbance alarm information; and the suppression time information item comprises a suppression moment or a suppression period corresponding to each piece of disturbance alarm information.
In an exemplary embodiment of the present application, an embodiment of a nuisance alert information suppression list may be as shown in fig. 2.
In an exemplary embodiment of the present application, as shown in fig. 3, in the optical word alarm, the alarm to be suppressed may be provided with a suppression flag, for example, the flag set to "S" indicates that the measuring point is suppressed, so that the processing personnel can conveniently inquire the reason why the alarm is suppressed.
In an exemplary embodiment of the present application, the method may further include: when the current first alarm is detected to belong to the A-type alarm and a preset specific alarm in the A-type alarm, sending out a reminding message for manual disturbance suppression;
the alarm triggering condition of the specific alarm may include: the equipment is damaged.
In an exemplary embodiment of the present application, in addition to the automatic suppression scheme for nuisance alarms in the foregoing scheme, it may be provided to implement a manual suppression scheme for certain nuisance alarms, as shown in fig. 4.
In an exemplary embodiment of the present application, manual inhibition may be an operation that is primarily directed to equipment damage, such as sensor device failure, resulting in point misbehavior. The processor can manually suppress the alarm in the optical character alarm manager, and write the reason for suppressing, and prescribe the time length for limiting the suppression so as to process the dead pixel, so that other people can conveniently see the reason and the suppression of the alarm.
In the exemplary embodiment of the present application, when the dead-end processing is completed, the suppression of the alarm may be manually released or may be automatically released when a prescribed suppression time is reached.
In an exemplary embodiment of the present application, the method may further include: and respectively setting different alarm suppression configuration tables and alarm information tables according to different load states of the equipment and/or the unit.
In the exemplary embodiment of the application, different nuisance alarms can be associated with the operation conditions of the unit when being suppressed, and different alarms can be suppressed according to actual requirements when the unit operates at different stages of low load, medium load, high load and the like. Specifically, for the a-type alarm, different alarm suppression configuration tables and alarm information tables may be set in advance according to different load states of the device and/or the unit.
In the exemplary embodiment of the application, a suppression scheme is provided for nuisance alarms in the production process (such as the production process of a thermal power plant), based on an alarm association knowledge base, a large number of nuisance alarms are suppressed, the occurrence of the condition of multiple alarm information is avoided, the unit shields repeated and invalid alarms in the normal operation process, only meaningful and valuable alarms are pushed to operators, the alarms can play a role in prompting and warning, the operators pay attention to the alarms, the operators can timely handle potential problems or hidden dangers, and the safe and stable operation of the unit is guaranteed.
The present application further provides a nuisance alarm suppression device 1, as shown in fig. 5, which may include a processor 11 and a computer-readable storage medium 12, wherein the computer-readable storage medium 12 stores instructions, and when the instructions are executed by the processor 11, the nuisance alarm suppression method according to any one of the preceding claims is implemented.
In an exemplary embodiment of the present application, the nuisance alarm suppression device 1 may be an alarm server.
It will be understood by those of ordinary skill in the art that all or some of the steps of the methods, systems, functional modules/units in the devices disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the components may be implemented as software executed by a processor, such as a digital signal processor or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.

Claims (10)

1. A method of suppressing nuisance alarms, the method comprising:
acquiring first alarm information of a first alarm to be generated currently, and determining whether the first alarm belongs to a first type alarm or not according to the first alarm information; the first type of alarm comprises: the method comprises the following steps of associating A-type alarm causing one or more sub-alarms, B-type alarm repeatedly appearing within a first preset time length, C-type alarm judged as invalid alarm and D-type alarm with the appearance frequency greater than or equal to a preset frequency threshold within a second preset time length;
when the first alarm is determined to belong to the A-type alarm in the first-type alarms, executing the first alarm, and determining a second alarm to be suppressed corresponding to the first alarm from a preset alarm suppression configuration table; wherein the second alarm is one or more sub-alarms caused by the first alarm association; suppressing the second alarm as a nuisance alarm;
and when the first alarm is determined to belong to B-type alarm, C-type alarm or D-type alarm in the first type of alarm, directly using the first alarm as a nuisance alarm to suppress.
2. The nuisance alarm suppression method of claim 1, wherein said determining from the first alarm information whether the first alarm belongs to a first type of alarm comprises:
determining an alarm triggering condition of the first alarm, inquiring an alarm type identification bit of the first alarm from a preset alarm information table according to the alarm triggering condition, and determining whether the first alarm belongs to an A-type alarm according to the identification of the alarm type identification bit; when the identifier of the alarm type identifier bit is a first identifier, determining that the first alarm belongs to an A-type alarm;
comparing the first alarm information with the alarm information of the alarm once appearing in the first preset time, and determining that the first alarm belongs to a B-type alarm when the first alarm information is matched with any one alarm information of the alarm once appearing in the first preset time;
determining an alarm triggering condition of the first alarm, detecting whether the alarm triggering condition accords with a normal operation condition, and determining that the first alarm is an invalid alarm and belongs to a C-type alarm when the alarm triggering condition accords with the normal operation condition;
and detecting the occurrence frequency of the first alarm within the second preset time, and determining that the first alarm belongs to a D-type alarm when the occurrence frequency is greater than or equal to the frequency threshold.
3. The method of suppressing nuisance alerts of claim 2, further comprising:
determining whether each alarm belongs to A-type alarms or not according to alarm triggering conditions corresponding to all alarms in the production process and association relations among all alarms stored in an alarm association knowledge base in advance, setting an alarm type identification bit for each alarm, setting the alarm type identification bit for the A-type alarms as a first identification, and setting the alarm type identification bit for the non-A-type alarms as a second identification; and writing the identifiers of the alarm condition and the alarm type identifier bit contained in each alarm message into the alarm message table.
4. The method of suppressing nuisance alerts of claim 2, further comprising: and coding alarm triggering conditions of different alarms in advance, and correspondingly writing the codes into the alarm information table so as to search different alarm triggering conditions according to the codes.
5. The method of suppressing nuisance alerts of claim 1, further comprising: setting the alarm suppression configuration table in advance according to an alarm association knowledge base;
wherein, the alarm suppression configuration table at least comprises the following configuration items: a suppression item, a suppression cause item and a suppression parameter item; the inhibition reason item comprises one or more A-type alarms; the inhibition item comprises one or more pieces of sub-alarm information corresponding to each A-type alarm; and the inhibition parameter item comprises an inhibition parameter corresponding to each A-type alarm.
6. The nuisance alarm suppression method of claim 5, wherein said pre-setting the alarm suppression configuration table according to an alarm association knowledge base comprises:
determining whether each alarm can be associated to cause one or more sub-alarms or not according to alarm information corresponding to all alarms in the production process and association relations among the alarms stored in an alarm association knowledge base in advance;
when any one alarm can be associated with one or more sub-alarms caused, taking the alarm as the A-type alarm; filling the alarm information of the alarm into the inhibition reason item, and filling the alarm information of one or more sub-alarms corresponding to the alarm into the inhibition item corresponding to the inhibition reason item;
when any alarm cannot be associated with any of the sub-alarm information caused, the alarm is ignored.
7. The method of suppressing nuisance alerts of claim 1, further comprising: after the disturbance alarm suppression is finished, marking the suppressed disturbance alarm information in the alarm suppression configuration table and/or generating a new disturbance alarm information suppression list; the disturbance alarm information suppression list comprises disturbance alarm information which is all suppressed within a preset time period;
wherein, the nuisance alarm information suppression list at least comprises the following configuration items: a suppression time information item, a disturbance suppression item and a disturbance suppression cause item; the disturbance inhibition item comprises one or more disturbance alarm information; the disturbance suppression reason item comprises first type alarm information corresponding to the one or more disturbance alarm information; and the suppression time information item comprises a suppression moment or a suppression period corresponding to each piece of disturbance alarm information.
8. The method of suppressing nuisance alerts of claim 1, further comprising: when the current first alarm is detected to belong to the A-type alarm and a preset specific alarm in the A-type alarm, sending out a reminding message for manual disturbance suppression;
the alarm triggering conditions of the specific alarm comprise: the equipment is damaged.
9. The method of suppressing nuisance alerts of claim 2, further comprising: and respectively setting different alarm suppression configuration tables and alarm information tables according to different load states of the equipment and/or the unit.
10. A nuisance alarm suppression device comprising a processor and a computer-readable storage medium having instructions stored thereon, wherein the instructions, when executed by the processor, implement a nuisance alarm suppression method according to any of claims 1-9.
CN202010112387.5A 2020-02-24 2020-02-24 Method and device for suppressing nuisance alarm Pending CN113299052A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010112387.5A CN113299052A (en) 2020-02-24 2020-02-24 Method and device for suppressing nuisance alarm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010112387.5A CN113299052A (en) 2020-02-24 2020-02-24 Method and device for suppressing nuisance alarm

Publications (1)

Publication Number Publication Date
CN113299052A true CN113299052A (en) 2021-08-24

Family

ID=77318514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010112387.5A Pending CN113299052A (en) 2020-02-24 2020-02-24 Method and device for suppressing nuisance alarm

Country Status (1)

Country Link
CN (1) CN113299052A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117133109A (en) * 2023-10-26 2023-11-28 广州瑞港消防设备有限公司 Automatic alarm suppression system for energy storage container

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103440892A (en) * 2013-07-16 2013-12-11 中国核电工程有限公司 Digitization alarm optimization design method of nuclear power plant
CN104618154A (en) * 2015-01-20 2015-05-13 迈普通信技术股份有限公司 Network element alarming inhibiting method and system
US20160379480A1 (en) * 2015-06-29 2016-12-29 Vmware, Inc. Alerting with duplicate suppression
CN110096410A (en) * 2019-03-15 2019-08-06 中国平安人寿保险股份有限公司 Alarm information processing method, system, computer installation and readable storage medium storing program for executing
CN110365522A (en) * 2019-06-19 2019-10-22 国电南瑞科技股份有限公司 A kind of alarm direct transfers the processing method and system of false positive signal of taking place frequently
CN110399405A (en) * 2019-07-26 2019-11-01 广州虎牙科技有限公司 Log alarming method, apparatus, system and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103440892A (en) * 2013-07-16 2013-12-11 中国核电工程有限公司 Digitization alarm optimization design method of nuclear power plant
CN104618154A (en) * 2015-01-20 2015-05-13 迈普通信技术股份有限公司 Network element alarming inhibiting method and system
US20160379480A1 (en) * 2015-06-29 2016-12-29 Vmware, Inc. Alerting with duplicate suppression
CN110096410A (en) * 2019-03-15 2019-08-06 中国平安人寿保险股份有限公司 Alarm information processing method, system, computer installation and readable storage medium storing program for executing
CN110365522A (en) * 2019-06-19 2019-10-22 国电南瑞科技股份有限公司 A kind of alarm direct transfers the processing method and system of false positive signal of taking place frequently
CN110399405A (en) * 2019-07-26 2019-11-01 广州虎牙科技有限公司 Log alarming method, apparatus, system and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117133109A (en) * 2023-10-26 2023-11-28 广州瑞港消防设备有限公司 Automatic alarm suppression system for energy storage container
CN117133109B (en) * 2023-10-26 2024-02-13 广州瑞港消防设备有限公司 Automatic alarm suppression system for energy storage container

Similar Documents

Publication Publication Date Title
CN110661659B (en) Alarm method, device and system and electronic equipment
CN110995482B (en) Alarm analysis method and device, computer equipment and computer readable storage medium
CN105095056B (en) A kind of method of data warehouse data monitoring
WO2020011191A1 (en) Monitoring method for unusual digital currency transaction, device, and system
CN107766533B (en) Automatic detection method and system for telephone traffic abnormality, storage medium and electronic equipment
CN112598205A (en) Alarm information processing method and device, storage medium and electronic equipment
CN110727533A (en) Alarm method, device, equipment and medium
CN113299052A (en) Method and device for suppressing nuisance alarm
CN116106618A (en) Alarm method and device of electric equipment and alarm system of Internet of things
CN111130867B (en) Intelligent household equipment alarm method and device based on Internet of things
CN113297042A (en) Method, device and equipment for processing alarm message
CN116010220A (en) Alarm diagnosis method, device, equipment and storage medium
CN111046068B (en) Method and device for displaying alarm generation process
CN115328733A (en) Alarm method and device applied to business system, electronic equipment and storage medium
CN112333168B (en) Attack identification method, device, equipment and computer readable storage medium
CN113806045A (en) Task allocation method, system, device and medium
CN111062503B (en) Power grid monitoring alarm processing method, system, terminal and storage medium
WO2016141007A1 (en) Alarm management using hiding rules
CN107124290B (en) alarm threshold value generation method and device
CN111935202A (en) Device and method for pushing mobile terminal through real-time alarm of cross-power safety zone
CN116416764A (en) Alarm threshold generation method and device, electronic equipment and storage medium
CN114124758B (en) Flow monitoring method and device
CN114138620B (en) Cloud platform log explosion detection method, device, equipment and storage medium
CN113659568B (en) Overrun and reset notification short message generation method
CN112054913B (en) Data monitoring system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210824

RJ01 Rejection of invention patent application after publication