Real-time Alarm Management System for Wide-Area Monitoring

Chumki Basu, Jagabondhu Hazra, Kaushik Das*, Deva P. Seetharam

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

Control center alarms for power systems usually arrive with low latency, quickly overwhelming operators. Previous approaches to dealing with alarm ordering include logical grouping (suppression and filtering) of alarms according to pre-defined rules and presentation of the resulting alarms to the operator. Knowledge-based approaches for alarm handling allow us to incorporate operator experience into the decision making process. However, there are limitations that impede their use in real-time systems. In this paper, we approach these limitations from two perspectives. First, we propose a mapping from knowledge representations such as network models (i.e., of a power system) and ontologies to the design of stream computing applications for efficient alarm processing. Secondly, we propose a new class of experiential, knowledge-based algorithms for ranking alarms and introduce a contextual ranking algorithm in this class. We also present initial evaluation results of this algorithm using a simulation-based metric.
Original languageEnglish
Title of host publicationProceedings of the 3rd IEEE Innovative Smart Grid Technologies Asia Conference (ISGT Asia)
Number of pages6
PublisherIEEE
Publication date2013
ISBN (Electronic)978-1-4799-1347-3
DOIs
Publication statusPublished - 2013
Event3rd IEEE Innovative Smart Grid Technologies Asia Conference - Bangalore, India
Duration: 10 Nov 201913 Nov 2019

Conference

Conference3rd IEEE Innovative Smart Grid Technologies Asia Conference
Country/TerritoryIndia
CityBangalore
Period10/11/201913/11/2019

Keywords

  • wide-area monitoring
  • analysis and simulation
  • real-time control
  • intelligent alarm processing
  • protection systems

Fingerprint

Dive into the research topics of 'Real-time Alarm Management System for Wide-Area Monitoring'. Together they form a unique fingerprint.

Cite this