<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0122-5383</journal-id>
<journal-title><![CDATA[CT&F - Ciencia, Tecnología y Futuro]]></journal-title>
<abbrev-journal-title><![CDATA[C.T.F Cienc. Tecnol. Futuro]]></abbrev-journal-title>
<issn>0122-5383</issn>
<publisher>
<publisher-name><![CDATA[Instituto Colombiano del Petróleo (ICP) - ECOPETROL S.A.]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0122-53832020000100045</article-id>
<article-id pub-id-type="doi">10.29047/01225383.168</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[AN ADDITIONAL LAYER OF PROTECTION THROUGH SUPERALARMS WITH DIAGNOSIS CAPABILITY]]></article-title>
<article-title xml:lang="es"><![CDATA[UNA NUEVA CAPA DE PROTECCIÓN A TRAVÉS DE SÚPER ALARMAS CON CAPACIDAD DE DIAGNÓSTICO]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Vásquez-Capacho]]></surname>
<given-names><![CDATA[John-William]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Perez-Zuñiga]]></surname>
<given-names><![CDATA[Gustavo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Muñoz]]></surname>
<given-names><![CDATA[Yecid]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ospino]]></surname>
<given-names><![CDATA[Adalberto]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad de Investigación y Desarrollo - UDI Grupo de investigación GPS ]]></institution>
<addr-line><![CDATA[Bucaramanga ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Pontificia Universidad Católica del Perú - PUCP Grupo de investigación GECA ]]></institution>
<addr-line><![CDATA[Lima ]]></addr-line>
<country>Peru</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad Autónoma de Bucaramanga - UNAB Grupo de investigación GIRES ]]></institution>
<addr-line><![CDATA[Bucaramanga ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af4">
<institution><![CDATA[,Universidad de la Costa - CUC Grupo de investigación ]]></institution>
<addr-line><![CDATA[Barranquilla ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2020</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2020</year>
</pub-date>
<volume>10</volume>
<numero>1</numero>
<fpage>45</fpage>
<lpage>66</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S0122-53832020000100045&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S0122-53832020000100045&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S0122-53832020000100045&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT An alarm management methodology can be proposed as a discrete event sequence recognition problem where time patterns are used to identify the process safe condition, especially in the start-up and shutdown stages. Industrial plants, particularly in the petrochemical, energy, and chemical sectors, require a combined approach of all the events that can result in a catastrophic accident. This document introduces a new layer of protection (super-alarm) for industrial processes based on a diagnostic stage. Alarms and actions of the standard operating procedure are considered discrete events involved in sequences, where the diagnostic stage corresponds to the recognition of a special situation when these sequences occur. This is meant to provide operators with pertinent information regarding the normal or abnormal situations induced by the flow of alarms. Chronicles Based Alarm Management (CBAM) is the methodology used to build the chronicles that will permit to generate the super-alarms furthermore, a case study of the petrochemical sector using CBAM is presented to build the chronicles of the normal startup, abnormal start-up, and normal shutdown scenarios. Finally, the scenario validation is performed for an abnormal start-up, showing how a super-alarm is generated.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN Se puede formular una metodología de gestión de alarmas como un problema de reconocimiento de secuencia de eventos discretos en el que se utilizan patrones de tiempo para identificar la condición segura del proceso, especialmente en las etapas de arranque y parada de planta. Las plantas industriales, particularmente en las industrias petroquímica, energética y química, requieren una administración combinada de todos los eventos que pueden producir un accidente catastrófico. En este documento, se introduce una nueva capa de protección (súper alarma) a los procesos industriales basados en una etapa de diagnóstico. Las alarmas y las acciones estándar del procedimiento operativo son asumidas como eventos discretos involucrados en las secuencias, luego la etapa de diagnóstico corresponde al reconocimiento de la situación cuando ocurren estas secuencias. Esto proporciona a los operadores información pertinente sobre las situaciones normales o anormales inducidas por el flujo de alarmas. La gestión de alarmas basadas en crónicas (CBAM) es la metodología utilizada en este artículo para construir las crónicas que permitirán generar las super alarmas, además, se presenta un caso de estudio del sector petroquímico que usa CBAM para construir las crónicas de los escenarios de un arranque normal, un arranque anormal y un apagado normal. Finalmente, la validación del escenario se realiza para un arranque anormal, mostrando cómo se genera una súper alarma.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Alarm management]]></kwd>
<kwd lng="en"><![CDATA[Protection layers]]></kwd>
<kwd lng="en"><![CDATA[Safe process]]></kwd>
<kwd lng="en"><![CDATA[Diagnosis]]></kwd>
<kwd lng="en"><![CDATA[Super-alarm]]></kwd>
<kwd lng="es"><![CDATA[Gestión de alarmas]]></kwd>
<kwd lng="es"><![CDATA[Capas de protección]]></kwd>
<kwd lng="es"><![CDATA[Procesos de seguridad]]></kwd>
<kwd lng="es"><![CDATA[Diagnóstico]]></kwd>
<kwd lng="es"><![CDATA[Super-alarma]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>[1]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brennan]]></surname>
<given-names><![CDATA[R. W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Toward real-time distributed intelligent control: A survey of research themes and applications, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)]]></source>
<year>2007</year>
<volume>37</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>744-65</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>[2]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khalgui]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Mosbahi]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Hanisch]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Reconfiguration of distributed embedded-control systems, IEEE/ ASME Transactions on Mechatronics]]></source>
<year>2011</year>
<volume>16</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>684-94</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>[3]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Reifer]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Software failure modes and effects analysis, IEEE Transactions on Reliability R-28]]></source>
<year>1979</year>
<numero>3</numero>
<issue>3</issue>
<page-range>247-9</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>[4]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mehrabi]]></surname>
<given-names><![CDATA[M. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Ulsoy]]></surname>
<given-names><![CDATA[A. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Koren]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reconfigurable manufacturing systems: Key to future manufacturing]]></article-title>
<source><![CDATA[Journal of Intelligent Manufacturing]]></source>
<year>2000</year>
<volume>11</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>403-19</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>[5]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodrigo]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Chioua]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hagglund]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Hollender]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Causal analysis for alarm flood reduction, IFAC-PapersOnLine]]></source>
<year>2016</year>
<volume>49</volume>
<numero>7</numero>
<conf-name><![CDATA[ 11thIFAC Symposium on Dynamics and Control of Process SystemsIncluding Biosystems DYCOPS-CAB]]></conf-name>
<conf-date>2016</conf-date>
<conf-loc> </conf-loc>
<issue>7</issue>
<page-range>723-8</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>[6]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bodsberg]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Hokstad]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Alarm and shutdown frequencies in offshore production]]></source>
<year>1988</year>
<volume>21</volume>
<conf-name><![CDATA[ Ifac Workshop on Industrial Process Control Systems]]></conf-name>
<conf-loc>Belgium </conf-loc>
<page-range>19-25</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>[7]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Anglada]]></surname>
<given-names><![CDATA[F. Morant]]></given-names>
</name>
<name>
<surname><![CDATA[Cucarella]]></surname>
<given-names><![CDATA[E. Quiles]]></given-names>
</name>
<name>
<surname><![CDATA[Moreno]]></surname>
<given-names><![CDATA[E. Garca]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Secuencias de alarmas para detección y diagnóstico de fallos]]></article-title>
<source><![CDATA[Revista Colombiana de Computación]]></source>
<year>2011</year>
<volume>12</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>31-44</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>[8]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Agudelo]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Integración de técnicas y las secuencias de alarmas para la detección y el diagnostico de fallos]]></source>
<year>2016</year>
<publisher-name><![CDATA[Universidad Politecnica de Valencia]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<label>[9]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Capacho]]></surname>
<given-names><![CDATA[J. W. Vásquez]]></given-names>
</name>
</person-group>
<source><![CDATA[Chronicle Based Alarm Management, These, INSA Toulouse]]></source>
<year>2017</year>
<publisher-loc><![CDATA[Colombie ]]></publisher-loc>
<publisher-name><![CDATA[l'Universidad de los Andes]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<label>[10]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Magni]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Scattolini]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Rossi]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[A fault detection and isolation method for complex industrial systems, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans]]></source>
<year>2000</year>
<volume>30</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>860-5</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>[11]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hollender]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Skovholt]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Evans]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Holistic alarm management throughout the plant lifecycle]]></source>
<year>2016</year>
<conf-name><![CDATA[ Petroleum and Chemical Industry Conference Europe (PCIC Europe)]]></conf-name>
<conf-date>2016</conf-date>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>[12]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Patton]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Observer-based fault detection and isolation: Robustness and applications, Control Engineering Practice]]></source>
<year>1997</year>
<volume>5</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>671-82</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>[13]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vries]]></surname>
<given-names><![CDATA[R. C. de]]></given-names>
</name>
</person-group>
<source><![CDATA[An automated methodology for generating a fault tree, IEEE Transactions on Reliability]]></source>
<year>1990</year>
<volume>39</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>76-86</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>[14]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Xiao]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Progress in root cause and fault propagation analysis of large-scale industrial processes]]></article-title>
<source><![CDATA[Journal of Control Science and Engineering]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B15">
<label>[15]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sarmiento]]></surname>
<given-names><![CDATA[M. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Isaza]]></surname>
<given-names><![CDATA[N. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Identification and estimation of functional states in drinking water plant based on fuzzy clustering]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Bogle]]></surname>
<given-names><![CDATA[I. D. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Fairweather]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[22nd European Symposium on Computer Aided Process Engineering, Vol. 30 of Computer Aided Chemical Engineering, Elsevier]]></source>
<year>2012</year>
<page-range>1317-21</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>[16]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Autonomous mining for alarm correlation patterns based on time-shift similarity clustering in manufacturing system]]></source>
<year>2011</year>
<conf-name><![CDATA[ IEEE Conference on Prognostics and Health Management]]></conf-name>
<conf-date>2011</conf-date>
<conf-loc> </conf-loc>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>[17]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zolghadri]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Cieslak]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Efimov]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Henry]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Goupil]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Dayre]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Gheorghe]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Leberre]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Signal and model-based fault detection for aircraft systems, IFAC-PapersOnLine]]></source>
<year>2015</year>
<volume>48</volume>
<numero>21</numero>
<conf-name><![CDATA[ 9thIFAC Symposium on Fault Detection, Super vision and Safety for Technical Processes SAFEPROCESS]]></conf-name>
<conf-date>2015</conf-date>
<conf-loc> </conf-loc>
<issue>21</issue>
<page-range>1096-101</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>[18]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[John]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Jorge]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Carlos]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Jos]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Analysis of alarm management in startups and shutdowns for oil refining processes]]></source>
<year>2013</year>
<conf-name><![CDATA[ IIInternational Congress of Engineering Mechatronics and Automation (CIIMA)]]></conf-name>
<conf-date>2013</conf-date>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>[19]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mishra]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Samartha]]></surname>
<given-names><![CDATA[D. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Pathak]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Jain]]></surname>
<given-names><![CDATA[S. K]]></given-names>
</name>
<name>
<surname><![CDATA[Banerjee]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Maudar]]></surname>
<given-names><![CDATA[K. K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bhopal gas tragedy: Review of clinical and experimental findings after 25 years]]></article-title>
<source><![CDATA[International journal of occupational medicine and environmental health 22]]></source>
<year>2009</year>
<page-range>193-202</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>[20]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hokstad]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Corneliussen]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Loss of safety assessment and the iec 61508 standard, Reliability Engineering System Safety]]></source>
<year>2004</year>
<volume>83</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>111-20</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>[21]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brooks]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Thorpe]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Wilson]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[A new method for defining and managing process alarms and for correcting process operation when an alarm occurs, Journal of Hazardous Materials]]></source>
<year>2004</year>
<volume>115</volume>
<numero>1</numero>
<conf-name><![CDATA[ Collection of Papers Presented at the Annual Symposium of the Mary Kay O'Connor Process Safety Centre]]></conf-name>
<conf-loc>TX, United States </conf-loc>
<issue>1</issue>
<page-range>169-74</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>[22]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Izadi]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Shah]]></surname>
<given-names><![CDATA[S. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Shook]]></surname>
<given-names><![CDATA[D. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[An introduction to alarm analysis and design, IFAC Proceedings Volumes]]></source>
<year>2009</year>
<volume>42</volume>
<numero>8</numero>
<conf-name><![CDATA[ 7thIFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes]]></conf-name>
<conf-loc> </conf-loc>
<issue>8</issue>
<page-range>645-50</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>[23]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kondaveeti]]></surname>
<given-names><![CDATA[S. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Izadi]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Shah]]></surname>
<given-names><![CDATA[S. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Shook]]></surname>
<given-names><![CDATA[D. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kadali]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Quantification of alarm chatter based on run length distributions, Chemical Engineering Research and Design]]></source>
<year>2013</year>
<volume>91</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>2550-8</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>[24]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Urban]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Landryov]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Identification and evaluation of alarm logs from the alarm management system]]></source>
<year>2016</year>
<conf-name><![CDATA[ 17thInternational Carpathian Control Conference (ICCC)]]></conf-name>
<conf-date>2016</conf-date>
<conf-loc> </conf-loc>
<page-range>769-74</page-range></nlm-citation>
</ref>
<ref id="B25">
<label>[25]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Treville]]></surname>
<given-names><![CDATA[S. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Antonakis]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Edelson]]></surname>
<given-names><![CDATA[N. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Can standard operating procedures be motivating? reconciling process variability issues and behavioural outcomes]]></article-title>
<source><![CDATA[Total Quality Management &amp; Business Excellence]]></source>
<year>2005</year>
<volume>16</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>231241</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>[26]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sklet]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Safety barriers: Definition, classification, and performance]]></article-title>
<source><![CDATA[Journal of Loss Prevention in the Process Industries]]></source>
<year>2006</year>
<volume>19</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>494-506</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>[27]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dowell III]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Layer of protection analysis and inherently safer processes, Process Safety Progress]]></source>
<year></year>
<volume>18</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>214-20</page-range></nlm-citation>
</ref>
<ref id="B28">
<label>[28]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Koscielny]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bartys]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[The requirements for a new layer in the industrial safety systems, IFAC-PapersOnLine]]></source>
<year>2015</year>
<volume>48</volume>
<numero>21</numero>
<conf-name><![CDATA[ 9thIFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes SAFEPROCESS]]></conf-name>
<conf-date>2015</conf-date>
<conf-loc> </conf-loc>
<issue>21</issue>
<page-range>1333-8</page-range></nlm-citation>
</ref>
<ref id="B29">
<label>[29]</label><nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Model-based fault-detection and diagnosis status and applications]]></article-title>
<source><![CDATA[Annual Reviews in Control]]></source>
<year>2005</year>
<volume>29</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>71-85</page-range></nlm-citation>
</ref>
<ref id="B30">
<label>[30]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Isermann]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[On the applicability of model-based fault detection for technical processes]]></article-title>
<source><![CDATA[Control Engineering Practice]]></source>
<year>1994</year>
<numero>2</numero>
<issue>2</issue>
<page-range>439-50</page-range></nlm-citation>
</ref>
<ref id="B31">
<label>[31]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bayoudh]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Trav'e-Massuy~es]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Olive]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<source><![CDATA[Hybrid systems diagnosis by coupling continuous and discrete event techniques, IFAC Proceedings Volumes]]></source>
<year>2008</year>
<volume>41</volume>
<numero>2</numero>
<conf-name><![CDATA[ 17thIFAC World Congress]]></conf-name>
<conf-loc> </conf-loc>
<issue>2</issue>
<page-range>7265-70</page-range></nlm-citation>
</ref>
<ref id="B32">
<label>[32]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Cecati]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Ding]]></surname>
<given-names><![CDATA[S. X.]]></given-names>
</name>
</person-group>
<source><![CDATA[A survey of fault diagnosis and fault tolerant techniquespart i: Fault diagnosis with model-based and signal based approaches, IEEE Transactions on Industrial Electronics]]></source>
<year>2015</year>
<volume>62</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>3757-67</page-range></nlm-citation>
</ref>
<ref id="B33">
<label>[33]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Subias]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Travé-Massuyès]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Corronc]]></surname>
<given-names><![CDATA[E. L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Learning chronicles signing multiple scenario instances, IFAC Proceedings Volumes]]></source>
<year>2014</year>
<volume>47</volume>
<numero>3</numero>
<conf-name><![CDATA[ 19thIFAC World Congress]]></conf-name>
<conf-loc> </conf-loc>
<issue>3</issue>
<page-range>10397-402</page-range></nlm-citation>
</ref>
<ref id="B34">
<label>[34]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beebe]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Ferrer]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Logerot]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The connection of peak alarm rates to plant incidents and what you can do to minimize]]></article-title>
<source><![CDATA[Process Safety Progress]]></source>
<year></year>
<volume>32</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>72-7</page-range></nlm-citation>
</ref>
<ref id="B35">
<label>[35]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Shu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A dynamic alarm management strategy for chemical process transitions]]></article-title>
<source><![CDATA[Journal of Loss Prevention in the Process Industries]]></source>
<year>2014</year>
<numero>30</numero>
<issue>30</issue>
<page-range>207-18</page-range></nlm-citation>
</ref>
<ref id="B36">
<label>[36]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vásquez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Subias]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Travé-Massuyès]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Jimenez]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Alarm management via temporal pattern learning]]></article-title>
<source><![CDATA[Engineering Applications of Artificial Intelligence]]></source>
<year>2017</year>
<numero>65</numero>
<issue>65</issue>
<page-range>506-16</page-range></nlm-citation>
</ref>
<ref id="B37">
<label>[37]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vásquez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Travé-Massuyès]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Subias]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Jimenez]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Enhanced chronicle learning for process supervision, IFAC-PapersOnLine]]></source>
<year>2017</year>
<volume>50</volume>
<numero>1</numero>
<conf-name><![CDATA[ 20thIFAC World Congress]]></conf-name>
<conf-loc> </conf-loc>
<issue>1</issue>
<page-range>5035-40</page-range></nlm-citation>
</ref>
<ref id="B38">
<label>[38]</label><nlm-citation citation-type="confpro">
<source><![CDATA[Chronicle based alarm management in startup and shutdown stages]]></source>
<year>2015</year>
<conf-name><![CDATA[ 26thInternational Workshop on Principles of Diagnosis]]></conf-name>
<conf-loc>Paris, France </conf-loc>
<page-range>277-80</page-range></nlm-citation>
</ref>
<ref id="B39">
<label>[39]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vásquez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Travé-Massuyès]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Subias]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Jimenez]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Agudelo]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Alarm management based on diagnosis, IFAC PapersOnLine]]></source>
<year>2016</year>
<volume>49</volume>
<numero>5</numero>
<conf-name><![CDATA[ 4thIFAC Conference on Intelligent Control and Automation SciencesICONS 2016]]></conf-name>
<conf-loc> </conf-loc>
<issue>5</issue>
<page-range>126-31</page-range></nlm-citation>
</ref>
<ref id="B40">
<label>[40]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cordier]]></surname>
<given-names><![CDATA[M. odile]]></given-names>
</name>
<name>
<surname><![CDATA[Dousson]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Alarm driven monitoring based on chronicles, IFAC Proceedings Volumes]]></source>
<year>2000</year>
<volume>33</volume>
<numero>11</numero>
<conf-name><![CDATA[ 4thIFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes]]></conf-name>
<conf-date>2000</conf-date>
<conf-loc>Budapest, Hungary </conf-loc>
<issue>11</issue>
</nlm-citation>
</ref>
<ref id="B41">
<label>[41]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pons]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Subias]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Travé-Massuyes]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[terative hybrid causal model based diagnosis: Application to automotive embedded functions]]></article-title>
<source><![CDATA[Engineering Applications of Artificial Intelligence]]></source>
<year>2015</year>
<numero>37</numero>
<issue>37</issue>
<page-range>319-3335</page-range></nlm-citation>
</ref>
<ref id="B42">
<label>[42]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schleburg]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Christiansen]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Thornhill]]></surname>
<given-names><![CDATA[N. F]]></given-names>
</name>
<name>
<surname><![CDATA[Fay]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A combined analysis of plant connectivity and alarm logs to reduce the number of alerts in an automation system]]></article-title>
<source><![CDATA[Journal of Process Control]]></source>
<year>2014</year>
<volume>23</volume>
<page-range>839-51</page-range></nlm-citation>
</ref>
<ref id="B43">
<label>[43]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sandeep]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Kondaveeti]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Izadi]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Shaha]]></surname>
<given-names><![CDATA[S. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Black]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Graphical tools for routine assessment of industrial alarm systems]]></article-title>
<source><![CDATA[Computers &amp; Chemical Engineering]]></source>
<year>2014</year>
<volume>46</volume>
<page-range>39-47</page-range></nlm-citation>
</ref>
<ref id="B44">
<label>[44]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Higuchi]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Yamamoto]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[T. Takai]]></surname>
<given-names><![CDATA[M. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Nishitani]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Use of event correlation analysis to reduce number of alarms]]></article-title>
<source><![CDATA[Computers &amp; Chemical Engineering]]></source>
<year>2014</year>
<volume>27</volume>
<page-range>1521-6</page-range></nlm-citation>
</ref>
<ref id="B45">
<label>[45]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ge]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Song]]></surname>
<given-names><![CDATA[Z]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Multimode process monitoring based on Bayesian method]]></article-title>
<source><![CDATA[Journal of Chemometrics]]></source>
<year>2009</year>
<volume>23</volume>
<page-range>636-50</page-range></nlm-citation>
</ref>
<ref id="B46">
<label>[46]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Noda]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Nishitani]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evaluation of plant alarm systems by behavior simulation using a virtual subject]]></article-title>
<source><![CDATA[Computers &amp; Chemical Engineering]]></source>
<year>2010</year>
<volume>34</volume>
<page-range>374-86</page-range></nlm-citation>
</ref>
<ref id="B47">
<label>[47]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Shah]]></surname>
<given-names><![CDATA[S. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Xiao]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<source><![CDATA[Improved correlation analysis and visualization of industrial alarm data]]></source>
<year>2011</year>
<conf-name><![CDATA[ 18thIFAC World Congress Milano]]></conf-name>
<conf-loc>Italy </conf-loc>
</nlm-citation>
</ref>
<ref id="B48">
<label>[48]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Izadi]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[S.L. Shah]]></surname>
<given-names><![CDATA[a. D. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kondaveeti]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<source><![CDATA[A framework for optimal design of alarm systems]]></source>
<year>2009</year>
<conf-name><![CDATA[ 7thIFAC Symposium on fault detection, supervision and safety of technical processes]]></conf-name>
<conf-loc>Barcelona, Spain </conf-loc>
</nlm-citation>
</ref>
<ref id="B49">
<label>[49]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pariyani]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Seider]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Oktem]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Soroush]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Dynamic risk analysis using alarm databases to improve process safety and product quality: Part ii bayesian analysis]]></article-title>
<source><![CDATA[AIChE Journal]]></source>
<year>2012</year>
<volume>58</volume>
<page-range>826-41</page-range></nlm-citation>
</ref>
<ref id="B50">
<label>[50]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Non stationary fault detection and diagnosis for multimode processes]]></article-title>
<source><![CDATA[AIChE Journal]]></source>
<year>2010</year>
<volume>56</volume>
<page-range>207-19</page-range></nlm-citation>
</ref>
<ref id="B51">
<label>[51]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Shu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A dynamic alarm management strategy for chemical process transitions]]></article-title>
<source><![CDATA[Journal of Loss Prevention in the Process Industries]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B52">
<label>[52]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jing]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Boang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Hao]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<source><![CDATA[Fault diagnosis strategy for startup process based on standard operating procedures]]></source>
<year>2013</year>
<conf-name><![CDATA[ 25thChinese Control and Decision Conference (CCDC)]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B53">
<label>[53]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Duan]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Shah.]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Direct causality detection via the transfer entropy approach]]></article-title>
<source><![CDATA[IEEE Transactions of control system technology]]></source>
<year>2013</year>
<volume>21</volume>
<numero>6</numero>
<issue>6</issue>
</nlm-citation>
</ref>
<ref id="B54">
<label>[54]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Xiao]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Progress in root cause and fault propagation analysis of large scale industrial processes]]></article-title>
<source><![CDATA[Journal of Control Science and Engineering]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B55">
<label>[55]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Srinivasan]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Viswanathan]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Vedam]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Nochur]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A framework for managing transitions in chemical plants.]]></article-title>
<source><![CDATA[Computers &amp; Chemical Engineering]]></source>
<year>2005</year>
<volume>29</volume>
<page-range>305-22</page-range></nlm-citation>
</ref>
<ref id="B56">
<label>[56]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Adhitya]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Srinivasan]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Hybrid model-based framework for alarm anticipation]]></article-title>
<source><![CDATA[Industrial &amp; Engineering Chemistry Research]]></source>
<year>2013</year>
<volume>53</volume>
<page-range>5182-93</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
