The invention pertains to alarms and particularly to alarm management. More particularly, the invention pertains to prioritization as it relates to alarm management
The invention is an approach for site prioritization and then a review and prioritization of the alarms at the site. A feature may be to first find the site most in need of attention and then check the alarms at the site. A rule algorithm may determine a prioritization of site according to primitive rules which can be customized and modified nearly at any time making site priority a dynamic determination. The alarms may be ordered by criticality at the site.
The present approach may stem from a need to manage and control the site portfolio and increase or decrease the priority of the site based on service level agreements. Some alarm management systems may concentrate deeply on prioritization of alarms, but fail to do the same with respect to the site and the actual system topology. Such systems may lack the ability to decipher and bring attention to the most critical site that needs immediate attention. A small site with few alarms and few modules may require faster attention and more importance then a large site with one item in alarm.
An objective of the present approach may be finding the site most in need of attention, not the highest priority, most persistent, or most ignored individual alarm. There appears to be a demanding need for a rule-based algorithm that is highly flexible and configurable to prioritize the site based on site level data, attributes and the alarm statistics. The algorithm may also need to be based on the continuous alarm patterns for defining the site priority and help in site diagnostics, continuous service, and monitoring and predicting equipment failures at the site. This approach may be regarded as smart site prioritization algorithm for dynamically enhancing the criticality and urgency level of a site, based on site attributes and alarm statistics.
A goal of the present approach is to avoid catastrophic failures at the site through prompt execution of the remedial actions, and to improve the overall operation of the facility, by categorizing the site based on criticality and presenting a site-based alarm management view for immediate and efficient action.
The present approach may relate to an algorithm for using information about alarm statistics at the site, a pattern of alarms at the site, and the site attributes to define and configure priority rules to raise or decrease the level of urgency at the site. A store criticality and urgency may be dependent on numerous attributes, and the varying nature of these attributes may make a site priority dynamic (e.g., a gift store may become a critical site during holidays, otherwise it can be of low priority). A rule algorithm should consider these dynamics at the site, and be aimed at providing efficient filtering options which can meet these demanding natures.
The rules may be customized and modified at any point of time with the changing alarm pattern and some times even due to the changing service level agreement. A service level agreement may sometimes indicate which sites need the most attention.
A rule algorithm may be based on key primitive rules which can be predefined. The system may accommodate adding new primitive rules or attributes at run time for creating the prioritization rules, but would necessarily be limited to those items. As illustrated with a diagram of an example in
Site level attributes 41 may involve site location, weather data at the site, site area, site type, and site occupied versus non-occupied time.
Alarm statistics 42 may incorporate the number of unacknowledged alarms, the number of acknowledged alarms, the number of unresolved alarms, the number of escalated alarms, the number of high priority alarms, the number of medium priority alarms, the number of low priority alarms, the last critical alarm, and the latest occurred time of an alarm.
Equipment type and statistics 43 may incorporate a number of modules at the site; the type of equipment at the site (e.g., HVAC/lighting/refrigeration), and health of the equipment.
An alarm pattern 44 may incorporate a number of critical alarms in the past 1 week/1 month, a number of nuisance alarms in the past 1 week/1 month, and a number of alarms grouped by modules at the site in the past 1 week/1 month.
Date and time information 45 may incorporate the day of the week (weekend/week days), the holiday season versus the non-holiday season, and the season (i.e., summer, fall, winter, or spring).
Based on the above attributes, a monitoring group may create rules which can prioritize the sites across the enterprises of a system.
The present approach may set the priority of the site coupled with a site list view of the filters and the routing group may display the ordered list of sites in the operator's console with a site needing most immediate attention at the top of the list. The system may then allow the operator to configure a default ordering of the site list view, and prioritize the work based on its own ease and use cases. This may vastly improve the operator's alarm management statistics.
The present approach may provide a quick inherent display of the current alarm statistics at various sites across the globe, which could assist the operator in making a logical decision for the alarm mitigation and management activities. The present approach may help foster ties between the alarm and the site, which combined with the site list order, augmented with default site ordering to place the most important and critical site at the top of the list, would vastly improve operator statistics and the cycle time.
The present approach may take alarm management to a higher level, where rather than prioritizing each and every alarm and event, an algorithm may prioritize a facility or site as a whole.
The present approach may be different from other approaches in that the algorithm can do all the analyses for the operator and direct the operator to the site which needs immediate attention, which would vastly reduce the cycle time of alarm management and give the operator ample time to be online with the site and monitor the health of the site.
The following definitions may be used in the present description. An “alarm group” may refer to an organization of alarms into a logical set. “Alarm routing” may involve using pre-determined algorithms and information about the current system state (i.e., responsibility, logged-in operators, workload, escalation conditions, and so forth) and automatically assign an alarm or alarms to a specific operator or group of operators for follow-through. A “rule engine” may be an intuitive user interface, for creating rules for alarm management and system configuration. An “enterprise model” may be a comprehensive specification of information that describes the entities in a typical and monitored enterprise in a hierarchical structure representing the scope of control. A “filter” may incorporate a set of parameters that define the items of interest from a larger set of items, by specifying terms to include or to exclude from a specified set of data points. Filters may affect the display of alarm records to the end user. “Nuisance alarms” may be alarms that are perceived to have no value in the overall management of a facility, based on criteria to be set and managed by operations personnel, including administrators and alarm console operators.
The details of the present approach may incorporate the following items as shown in
The present approach may further incorporate the following items: 9) Sites ordered based on the level of urgency and criticality of the site, which can be handled by a default sort ordering algorithm at symbol 59; 10) A quick inherent display of the site at the top of list, helping an operator in making a quick choice about which site needs to be dialed in at symbol 60; 11) A operator silencing the alarm at the site by taking appropriate action, including action on the alarm in the alarm management system as well at symbol 61; 12) The background thread re-evaluating the priority of the site by re-evaluating the site priority rules at symbol 62; 13) Re-evaluating priority rules that pull the last acted upon site from the top of the list and ideally with that site going to the bottom at the list at symbol 63; 14) This evaluation in turn bringing the next most critical and urgent site to the top of the list at symbol 64; and 15) The system providing a mechanism for modifying priority rules, and copying priority across a customer at symbol 65.
The following view details how the alarm information may be presented in a more condensed way by summarizing the alarm statistics and displaying the site-based alarm view. The view may allow the operator to take immediate action for the alarm which is at the top of the list for the respective site, as the site prioritization algorithm has already evaluated the criticality of all the sites across enterprises, and placed the site which needs immediate attention at the top of the list.
A flowchart may show the various steps involved in a site based alarm management strategy.
In the present specification, some of the matter may be of a hypothetical or prophetic nature although stated in another manner or tense.
Although the present system has been described with respect to at least one illustrative example, many variations and modifications will become apparent to those skilled in the art upon reading the specification. It is therefore the intention that the appended claims be interpreted as broadly as possible in view of the prior art to include all such variations and modifications.
Number | Name | Date | Kind |
---|---|---|---|
4375637 | Desjardins | Mar 1983 | A |
4816208 | Woods et al. | Mar 1989 | A |
5042265 | Baldwin et al. | Aug 1991 | A |
5161387 | Metcalfe et al. | Nov 1992 | A |
5385297 | Rein et al. | Jan 1995 | A |
5390206 | Rein et al. | Feb 1995 | A |
5708195 | Kurisu et al. | Jan 1998 | A |
5768119 | Havekost et al. | Jun 1998 | A |
5929761 | Van der Laan et al. | Jul 1999 | A |
5946303 | Watson et al. | Aug 1999 | A |
5955946 | Beheshti et al. | Sep 1999 | A |
6124790 | Golov et al. | Sep 2000 | A |
6178362 | Woolard et al. | Jan 2001 | B1 |
6185483 | Drees | Feb 2001 | B1 |
6223544 | Seem | May 2001 | B1 |
6295526 | McCormack et al. | Sep 2001 | B1 |
6295527 | McCormack et al. | Sep 2001 | B1 |
6314328 | Powell | Nov 2001 | B1 |
6351213 | Hirsch | Feb 2002 | B1 |
6356282 | Roytman et al. | Mar 2002 | B2 |
6420968 | Hirsch | Jul 2002 | B1 |
6430712 | Lewis | Aug 2002 | B2 |
6473407 | Ditmer et al. | Oct 2002 | B1 |
6492901 | Ridolfo | Dec 2002 | B1 |
6529137 | Roe | Mar 2003 | B1 |
6535122 | Bristol | Mar 2003 | B1 |
6549135 | Singh et al. | Apr 2003 | B2 |
6675591 | Singh et al. | Jan 2004 | B2 |
6681156 | Weiss | Jan 2004 | B1 |
6690980 | Powell | Feb 2004 | B2 |
6813587 | McIntyre et al. | Nov 2004 | B2 |
6816811 | Seem | Nov 2004 | B2 |
6870141 | Damrath et al. | Mar 2005 | B2 |
6879253 | Thuillard | Apr 2005 | B1 |
6892546 | Singh et al. | May 2005 | B2 |
6919809 | Blunn et al. | Jul 2005 | B2 |
6947972 | Chun | Sep 2005 | B2 |
6955302 | Erdman, Jr. | Oct 2005 | B2 |
6973627 | Appling | Dec 2005 | B1 |
6990821 | Singh et al. | Jan 2006 | B2 |
7024283 | Bicknell | Apr 2006 | B2 |
7062389 | Johnson et al. | Jun 2006 | B2 |
7068931 | Tokunaga | Jun 2006 | B2 |
7069181 | Jerg et al. | Jun 2006 | B2 |
7085674 | Iwasawa | Aug 2006 | B2 |
7113085 | Havekost | Sep 2006 | B2 |
7171287 | Weiss | Jan 2007 | B2 |
7178109 | Hewson et al. | Feb 2007 | B2 |
7243044 | McCalla | Jul 2007 | B2 |
7250856 | Havekost et al. | Jul 2007 | B2 |
7277018 | Reyes et al. | Oct 2007 | B2 |
7345580 | Akamatsu et al. | Mar 2008 | B2 |
7457869 | Kernan | Nov 2008 | B2 |
7460020 | Reyes et al. | Dec 2008 | B2 |
7596613 | Silverthorne et al. | Sep 2009 | B2 |
7653459 | Pouchak et al. | Jan 2010 | B2 |
7819334 | Pouchak et al. | Oct 2010 | B2 |
7826929 | Wacker | Nov 2010 | B2 |
20020070972 | Windl et al. | Jun 2002 | A1 |
20020163427 | Eryurek et al. | Nov 2002 | A1 |
20030101009 | Seem | May 2003 | A1 |
20030171851 | Brickfield et al. | Sep 2003 | A1 |
20040143510 | Haeberle et al. | Jul 2004 | A1 |
20050038571 | Brickfield et al. | Feb 2005 | A1 |
20050043862 | Brickfield et al. | Feb 2005 | A1 |
20050193285 | Jeon | Sep 2005 | A1 |
20050203490 | Simonson | Sep 2005 | A1 |
20060136558 | Sheehan et al. | Jun 2006 | A1 |
20060168013 | Wilson et al. | Jul 2006 | A1 |
20060253205 | Gardiner | Nov 2006 | A1 |
20080010049 | Pouchak et al. | Jan 2008 | A1 |
20080016493 | Pouchak et al. | Jan 2008 | A1 |
20080115153 | Brindle | May 2008 | A1 |
20080125914 | Wacker | May 2008 | A1 |
20090113037 | Pouchak | Apr 2009 | A1 |
20100100583 | Pouchak | Apr 2010 | A1 |
20100106543 | Marti | Apr 2010 | A1 |
20100131653 | Dharwada et al. | May 2010 | A1 |
20100131877 | Dharwada et al. | May 2010 | A1 |
20100156654 | Bullemer et al. | Jun 2010 | A1 |
20100287130 | Guralnik et al. | Nov 2010 | A1 |
20110010654 | Raymond et al. | Jan 2011 | A1 |
Number | Date | Country |
---|---|---|
WO 0197146 | Dec 2001 | WO |
WO 02052432 | Jul 2002 | WO |
WO 03090038 | Oct 2003 | WO |
WO 2004053772 | Jun 2004 | WO |
WO 2004055608 | Jul 2004 | WO |
WO 2004070999 | Aug 2004 | WO |
WO 2005020167 | Mar 2005 | WO |
WO 2006048397 | May 2006 | WO |
WO 2007024622 | Mar 2007 | WO |
WO 2007024623 | Mar 2007 | WO |
WO 2007027685 | Mar 2007 | WO |
WO 2007082204 | Jul 2007 | WO |
Entry |
---|
Honeywell, “Excel Building Supervisor-Integrated R7044 and FS90 Ver. 2.0,” Operator Manual, 70 pages, Apr. 1995. |
Trane, “System Programming, Tracer Summit Version 14, BMTW-SVP01D-EN,” 623 pages, 2002. |
Adobe Acrobat 6.0 Standard, Version 6.0.2, Screenshots, 2 pages, May 18, 2004. |
U.S. Appl. No. 12/643,865, filed Dec. 21, 2009. |
U.S. Appl. No. 12/703,476, filed Feb. 10, 2010. |
U.S. Appl. No. 12/722,364, filed Mar. 11, 2010. |
U.S. Appl. No. 12/822,997, filed Jun. 24, 2010. |
U.S. Appl. No. 12/977,701, filed Dec. 23, 2010. |
Honeywell Spyder Bacnet User's Guide, 242 pages, Revised Jul. 2009. |
Honeywell Spyder User's Guide 202 pages, Released Jul. 2007. |
http://blogs.msdn.com/b/khen1234/archive/2005/05/11/416392.aspx, “Regular Expressions in T-SQL,” 4 pages, May 11, 2005. |
http://en.wikipedia.org/wiki/JAR—(file—format), “JAR (file format)—Wikipedia, the Free Encyclopedia,” 3 pages, printed Dec. 26, 2009. |
http://www.google.com/maps, “Google Maps, Pin Location,” 1 page, prior to Nov. 21, 2008. |
Microsoft Word Screen Shots, 2 pages, prior to Nov. 21, 2008. |
Siemens, BACnet for DESIGO 27 Pages, prior to Dec. 30, 2009. |
Tridium, “NiagaraAX Product Model Overview,” 7 pages, 2005. |
Tridium, “Tridium & Niatara Framework Overview,” 9 pages, prior to Oct. 28, 2008. |
Number | Date | Country | |
---|---|---|---|
20110298608 A1 | Dec 2011 | US |