Academia.eduAcademia.edu

Figure 6.9: Example ACMs for an alarm log with three entries. Colors illustrate the alarms belonging to the same alarm group  Once the analyzed log has been initially filtered, a search algorithm computes potential paths between every pair of alarms by considering graph connectivity and predefined stop criteria, as well as by applying penalization and filtering strategies (> [6.5.3.3] . Search results are stored in form of an alarm connectivity matrix (ACM) describing the directional causality among inspected alarms. If the algorithm finds a feasible propagation path connecting one alarm to another, this result is stored as a “1” in a specific row and column of the ACM, meaning the alarm associated with that  row was found to cause the alarm associated with the respective column.

Figure 6 9: Example ACMs for an alarm log with three entries. Colors illustrate the alarms belonging to the same alarm group Once the analyzed log has been initially filtered, a search algorithm computes potential paths between every pair of alarms by considering graph connectivity and predefined stop criteria, as well as by applying penalization and filtering strategies (> [6.5.3.3] . Search results are stored in form of an alarm connectivity matrix (ACM) describing the directional causality among inspected alarms. If the algorithm finds a feasible propagation path connecting one alarm to another, this result is stored as a “1” in a specific row and column of the ACM, meaning the alarm associated with that row was found to cause the alarm associated with the respective column.