Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Figure 6 9: Example ACMs for an alarm log with three entries. Colors illustrate the alarms belonging to the same alarm group Once the analyzed log has been initially filtered, a search algorithm computes potential paths between every pair of alarms by considering graph connectivity and predefined stop criteria, as well as by applying penalization and filtering strategies (> [6.5.3.3] . Search results are stored in form of an alarm connectivity matrix (ACM) describing the directional causality among inspected alarms. If the algorithm finds a feasible propagation path connecting one alarm to another, this result is stored as a “1” in a specific row and column of the ACM, meaning the alarm associated with that row was found to cause the alarm associated with the respective column.
Discover breakthrough research and expand your academic network
Join for free