Site and alarm prioritization system

Information

  • Patent Grant
  • 8890675
  • Patent Number
    8,890,675
  • Date Filed
    Wednesday, June 2, 2010
    14 years ago
  • Date Issued
    Tuesday, November 18, 2014
    10 years ago
Abstract
An approach for site prioritization and then a review and prioritization of the alarms at the site. A feature may to first find the site most in need of attention and then check the alarms of that site. A rule algorithm may determine a prioritization of site according to primitive rules which can be customized and modified nearly at any time making site priority a dynamic determination. At the site, the alarms may be ordered by criticality.
Description
BACKGROUND

The invention pertains to alarms and particularly to alarm management. More particularly, the invention pertains to prioritization as it relates to alarm management


SUMMARY

The invention is an approach for site prioritization and then a review and prioritization of the alarms at the site. A feature may be to first find the site most in need of attention and then check the alarms at the site. A rule algorithm may determine a prioritization of site according to primitive rules which can be customized and modified nearly at any time making site priority a dynamic determination. The alarms may be ordered by criticality at the site.





BRIEF DESCRIPTION OF THE DRAWING


FIG. 1 is a diagram of a basis for primitive rules for a priority determination;



FIG. 2 is a block diagram of the present approach;



FIG. 3 is a diagram of a screen shot of display showing a site list and alarm statistics; and



FIG. 4 is a block diagram showing a site based alarm management workflow.





DESCRIPTION

The present approach may stem from a need to manage and control the site portfolio and increase or decrease the priority of the site based on service level agreements. Some alarm management systems may concentrate deeply on prioritization of alarms, but fail to do the same with respect to the site and the actual system topology. Such systems may lack the ability to decipher and bring attention to the most critical site that needs immediate attention. A small site with few alarms and few modules may require faster attention and more importance then a large site with one item in alarm.


An objective of the present approach may be finding the site most in need of attention, not the highest priority, most persistent, or most ignored individual alarm. There appears to be a demanding need for a rule-based algorithm that is highly flexible and configurable to prioritize the site based on site level data, attributes and the alarm statistics. The algorithm may also need to be based on the continuous alarm patterns for defining the site priority and help in site diagnostics, continuous service, and monitoring and predicting equipment failures at the site. This approach may be regarded as smart site prioritization algorithm for dynamically enhancing the criticality and urgency level of a site, based on site attributes and alarm statistics.


A goal of the present approach is to avoid catastrophic failures at the site through prompt execution of the remedial actions, and to improve the overall operation of the facility, by categorizing the site based on criticality and presenting a site-based alarm management view for immediate and efficient action.


The present approach may relate to an algorithm for using information about alarm statistics at the site, a pattern of alarms at the site, and the site attributes to define and configure priority rules to raise or decrease the level of urgency at the site. A store criticality and urgency may be dependent on numerous attributes, and the varying nature of these attributes may make a site priority dynamic (e.g., a gift store may become a critical site during holidays, otherwise it can be of low priority). A rule algorithm should consider these dynamics at the site, and be aimed at providing efficient filtering options which can meet these demanding natures.


The rules may be customized and modified at any point of time with the changing alarm pattern and some times even due to the changing service level agreement. A service level agreement may sometimes indicate which sites need the most attention.


A rule algorithm may be based on key primitive rules which can be predefined. The system may accommodate adding new primitive rules or attributes at run time for creating the prioritization rules, but would necessarily be limited to those items. As illustrated with a diagram of an example in FIG. 1, the basis 40 of key primitive rules may be site level attributes 41, alarm statistics 42, equipment type and statistics 43, alarm pattern 44, date and time information 45; a service level agreement 46; and urgency.


Site level attributes 41 may involve site location, weather data at the site, site area, site type, and site occupied versus non-occupied time.


Alarm statistics 42 may incorporate the number of unacknowledged alarms, the number of acknowledged alarms, the number of unresolved alarms, the number of escalated alarms, the number of high priority alarms, the number of medium priority alarms, the number of low priority alarms, the last critical alarm, and the latest occurred time of an alarm.


Equipment type and statistics 43 may incorporate a number of modules at the site; the type of equipment at the site (e.g., HVAC/lighting/refrigeration), and health of the equipment.


An alarm pattern 44 may incorporate a number of critical alarms in the past 1 week/1 month, a number of nuisance alarms in the past 1 week/1 month, and a number of alarms grouped by modules at the site in the past 1 week/1 month.


Date and time information 45 may incorporate the day of the week (weekend/week days), the holiday season versus the non-holiday season, and the season (i.e., summer, fall, winter, or spring).


Based on the above attributes, a monitoring group may create rules which can prioritize the sites across the enterprises of a system.


The present approach may set the priority of the site coupled with a site list view of the filters and the routing group may display the ordered list of sites in the operator's console with a site needing most immediate attention at the top of the list. The system may then allow the operator to configure a default ordering of the site list view, and prioritize the work based on its own ease and use cases. This may vastly improve the operator's alarm management statistics.


The present approach may provide a quick inherent display of the current alarm statistics at various sites across the globe, which could assist the operator in making a logical decision for the alarm mitigation and management activities. The present approach may help foster ties between the alarm and the site, which combined with the site list order, augmented with default site ordering to place the most important and critical site at the top of the list, would vastly improve operator statistics and the cycle time.


The present approach may take alarm management to a higher level, where rather than prioritizing each and every alarm and event, an algorithm may prioritize a facility or site as a whole.


The present approach may be different from other approaches in that the algorithm can do all the analyses for the operator and direct the operator to the site which needs immediate attention, which would vastly reduce the cycle time of alarm management and give the operator ample time to be online with the site and monitor the health of the site.


The following definitions may be used in the present description. An “alarm group” may refer to an organization of alarms into a logical set. “Alarm routing” may involve using pre-determined algorithms and information about the current system state (i.e., responsibility, logged-in operators, workload, escalation conditions, and so forth) and automatically assign an alarm or alarms to a specific operator or group of operators for follow-through. A “rule engine” may be an intuitive user interface, for creating rules for alarm management and system configuration. An “enterprise model” may be a comprehensive specification of information that describes the entities in a typical and monitored enterprise in a hierarchical structure representing the scope of control. A “filter” may incorporate a set of parameters that define the items of interest from a larger set of items, by specifying terms to include or to exclude from a specified set of data points. Filters may affect the display of alarm records to the end user. “Nuisance alarms” may be alarms that are perceived to have no value in the overall management of a facility, based on criteria to be set and managed by operations personnel, including administrators and alarm console operators.


The details of the present approach may incorporate the following items as shown in FIG. 2. A privileged user with rights to create site priority rule logs into the system at symbol 51; 2) A user navigating to the screen for creating site priority rules at symbol 52; 3) A privileged user creating the priority rule using friendly and easy to use rule wizard based on the predefined primitive rules at symbol 53; 4) A privileged user assigning priority to all the sites across all the enterprises in the system at symbol 54; 5) An overlapping priority at the sites being handled by the algorithm which will assign the maximum priority to a site at symbol 55; 6) A privileged operator logging into the system with the right to view alarms and the site list at symbol 56; 7) An operator selecting filters from a routing group or ad hoc filters at symbol 57; and 8) An operator's console getting filled by all the sites and the alarm statistics at the sites scoped by the filter or the routing group that the operator has selected at symbol 58.


The present approach may further incorporate the following items: 9) Sites ordered based on the level of urgency and criticality of the site, which can be handled by a default sort ordering algorithm at symbol 59; 10) A quick inherent display of the site at the top of list, helping an operator in making a quick choice about which site needs to be dialed in at symbol 60; 11) A operator silencing the alarm at the site by taking appropriate action, including action on the alarm in the alarm management system as well at symbol 61; 12) The background thread re-evaluating the priority of the site by re-evaluating the site priority rules at symbol 62; 13) Re-evaluating priority rules that pull the last acted upon site from the top of the list and ideally with that site going to the bottom at the list at symbol 63; 14) This evaluation in turn bringing the next most critical and urgent site to the top of the list at symbol 64; and 15) The system providing a mechanism for modifying priority rules, and copying priority across a customer at symbol 65.


The following view details how the alarm information may be presented in a more condensed way by summarizing the alarm statistics and displaying the site-based alarm view. The view may allow the operator to take immediate action for the alarm which is at the top of the list for the respective site, as the site prioritization algorithm has already evaluated the criticality of all the sites across enterprises, and placed the site which needs immediate attention at the top of the list.



FIG. 3 is a diagram showing a screen shot 11 of a site list of groups/filters. A list 12 of sites in alarms may be ordered by criticality of the alarms at the respective site. On screen shot 11, alarm statistics at the site may be ordered by criticality at the site. Column 14 shows the locations of the various sites. Column 15 shows the site number of the respective location. These sites may be, for example, various stores of a large national chain. Screen shot 11 shows a site list of a last one day alarm and shows an alarm view of each site with such an alarm.


A flowchart may show the various steps involved in a site based alarm management strategy. FIG. 4 is a diagram of a site based alarm management workflow system. The items of the system are indicated in symbols labeled generally in a numerical order. After a start 21 and a privileged operator logging in the system and navigating to the alarm console at symbol 22, the operator may select a routing role (group) or filters from a filter list at symbol 23. At symbol 24, a site list view of the group or the filters may be displayed. The operator may select a most critical site from the list based on alarm statistics and urgency at symbol 25. All the alarms from the site may be displayed in a user view ordered by priority and a logged time stamp at symbol 26. The site may be added to the operator's recently visited site filter for future references at symbol 27. At symbol 28, the operator may acknowledge all the alarms at the site. The operator may get online with the site at symbol 29. The operator may evaluate all the alarms at the site and clear the alarms at symbol 30. A question at symbol 31 may be whether there is any critical alarm open at the site. If the answer is “yes”, then the operator may evaluate all the alarms at the site and clear the critical alarm at symbol 30. If the answer is “no”, then the operator may resolve all the alarms at the site with proper resolution and diagnosis at symbol 32. At symbol 33, the operator may select a switch to a previous filter. At symbol 34, the operator may go back to the site view of the group or filter that the operator has previously selected. A question, whether there are any sites in an alarm status, may be asked at symbol 35. If the answer is “yes”, then the actions at symbols 25-34 may be repeated. If the answer is “no”, then the workflow may stop at symbol 36.


In the present specification, some of the matter may be of a hypothetical or prophetic nature although stated in another manner or tense.


Although the present system has been described with respect to at least one illustrative example, many variations and modifications will become apparent to those skilled in the art upon reading the specification. It is therefore the intention that the appended claims be interpreted as broadly as possible in view of the prior art to include all such variations and modifications.

Claims
  • 1. A method of prioritizing alarms received from two or more sites located at different geographical locations, the method comprising: providing a filter having a priority scenario, the priority scenario is based at least in part on one or more site level attributes, wherein the sites are located at two or more different geographical locations;applying the filter to a system of sites to arrange the sites into a list according to the priority scenario applying an order of priority for the sites, where a site having a highest priority is at a top of the list;doing an alarm review of the site at the top of the list to order the alarms at the site by criticality of the alarms based on ease and uses cases of the particular site and select out any existing active alarm or alarms of the site;silencing the existing active alarm or alarms by taking appropriate action; andre-evaluating a priority of the site having the active alarm or alarms which were silenced; andwherein:re-evaluating the priority pulls the last acted upon site having no longer an active alarm from the top of the list and places the site lower in the list; andthe order of priority for the sites is according to a level of urgency and criticality associated with a particular site.
  • 2. The method of claim 1, further comprising doing an alarm review of another site at the top of the list.
  • 3. The method of claim 1, wherein the priority scenario is created from predefined primitive rules.
  • 4. The method of claim 1, wherein the order of priority is provided by a sort-ordering algorithm.
  • 5. The method of claim 1, wherein the filter is selected from a routing group or ad hoc filters.
  • 6. The method of claim 3, wherein a background thread re-evaluates the priority of a site having the alarm or alarms silenced, by re-evaluating the predefined primitive rules.
  • 7. The method of claim 3, wherein an overlapping priority of numerous sites in the list is resolved by a priority algorithm which selects and assigns a maximum priority to just one of the numerous sites.
  • 8. The method of claim 3, wherein the predefined primitive rules are based on: alarm statistics;alarm patterns;equipment data;date and time information;a service level agreement; and/orurgency.
  • 9. The method of claim 1, wherein site level attributes comprise: site location;site weather data;site area;site type; and/orsite occupied versus non-occupied time.
  • 10. The method of claim 8, wherein alarm statistics comprise: a number of unacknowledged alarms;a number of acknowledged alarms;a number of unresolved alarms;a number of escalated alarmsa number of high priority alarms;a number of medium priority alarms;a number of low priority alarms;a last critical alarm; and/ora latest occurred time of an alarm.
  • 11. The method of claim 8, wherein equipment data comprise: a number of equipment modules at a site;a type of equipment at the site; and/orhealth of the equipment.
  • 12. The method of claim 8, wherein alarm patterns comprise: a number of critical alarms in a given past period of time;a number of nuisance alarms in a given past period of time; and/ora number of alarms grouped by modules at a site in a given past period of time.
  • 13. The method of claim 8, wherein date and time information comprise: a day in a week;a holiday season or non-holiday season;a spring, summer, fall or winter season; and/ora time of day.
  • 14. A site and alarm management system comprising: a display displaying site prioritization and alarm prioritization information on at least one screen, the site prioritization and alarm prioritization information including:a routing group or filter selected from a list of groups and filters, by a first selection algorithm;a site list resulting from application of the routing group or filter to a portfolio of sites;a most critical site at top of the site list, wherein the most critical site is selected by a second selection algorithm; andalarms from the most critical site, listed in an order by a third selection algorithm, are evaluated and active alarms are cleared, resulting in the most critical site being no longer the most critical site on the site list andwherein:the second selection algorithm selects the most critical site according to alarm statistics and urgency;the third selection algorithm lists the alarms from the most critical site in the order according to a priority and logged time stamp; andthe active alarms are cleared with diagnosis and resolution.
  • 15. The system of claim 14, further comprising another most critical site on the site list treated in a similar manner as a previous most critical site.
  • 16. A site prioritization system comprising: a computer based system configured to display site prioritization on a display, the computer based system including a memory storing:a filter;a prioritized site list resulting from an application of the filter to sites in a system;a most critical site placed at a top of the site list is selected according to primitive rules;alarms from the most critical site are listed according to an order based at least in part on an alarm priority and a timestamp, wherein active alarms of the site are cleared, resulting in the most critical site being no longer the most critical site being at the top of the site list;any subsequent most critical site selected from the top of the site list; andalarms from the any subsequent most critical site are tasted according to an order, wherein active alarms of the site are cleared, resulting in the any subsequent most critical site being no longer the most critical site being at the top of the site list.
  • 17. The system of claim 16, wherein: primitive rules are based on: site level attributes;alarm statistics;alarm patterns;equipment data;date and time information;a service level agreement; and/orurgency;the order is based on priority and a logged time stamp; andactive alarms are cleared with diagnosis and resolution.
US Referenced Citations (82)
Number Name Date Kind
4375637 Desjardins Mar 1983 A
4816208 Woods et al. Mar 1989 A
5042265 Baldwin et al. Aug 1991 A
5161387 Metcalfe et al. Nov 1992 A
5385297 Rein et al. Jan 1995 A
5390206 Rein et al. Feb 1995 A
5708195 Kurisu et al. Jan 1998 A
5768119 Havekost et al. Jun 1998 A
5929761 Van der Laan et al. Jul 1999 A
5946303 Watson et al. Aug 1999 A
5955946 Beheshti et al. Sep 1999 A
6124790 Golov et al. Sep 2000 A
6178362 Woolard et al. Jan 2001 B1
6185483 Drees Feb 2001 B1
6223544 Seem May 2001 B1
6295526 McCormack et al. Sep 2001 B1
6295527 McCormack et al. Sep 2001 B1
6314328 Powell Nov 2001 B1
6351213 Hirsch Feb 2002 B1
6356282 Roytman et al. Mar 2002 B2
6420968 Hirsch Jul 2002 B1
6430712 Lewis Aug 2002 B2
6473407 Ditmer et al. Oct 2002 B1
6492901 Ridolfo Dec 2002 B1
6529137 Roe Mar 2003 B1
6535122 Bristol Mar 2003 B1
6549135 Singh et al. Apr 2003 B2
6675591 Singh et al. Jan 2004 B2
6681156 Weiss Jan 2004 B1
6690980 Powell Feb 2004 B2
6813587 McIntyre et al. Nov 2004 B2
6816811 Seem Nov 2004 B2
6870141 Damrath et al. Mar 2005 B2
6879253 Thuillard Apr 2005 B1
6892546 Singh et al. May 2005 B2
6919809 Blunn et al. Jul 2005 B2
6947972 Chun Sep 2005 B2
6955302 Erdman, Jr. Oct 2005 B2
6973627 Appling Dec 2005 B1
6990821 Singh et al. Jan 2006 B2
7024283 Bicknell Apr 2006 B2
7062389 Johnson et al. Jun 2006 B2
7068931 Tokunaga Jun 2006 B2
7069181 Jerg et al. Jun 2006 B2
7085674 Iwasawa Aug 2006 B2
7113085 Havekost Sep 2006 B2
7171287 Weiss Jan 2007 B2
7178109 Hewson et al. Feb 2007 B2
7243044 McCalla Jul 2007 B2
7250856 Havekost et al. Jul 2007 B2
7277018 Reyes et al. Oct 2007 B2
7345580 Akamatsu et al. Mar 2008 B2
7457869 Kernan Nov 2008 B2
7460020 Reyes et al. Dec 2008 B2
7596613 Silverthorne et al. Sep 2009 B2
7653459 Pouchak et al. Jan 2010 B2
7819334 Pouchak et al. Oct 2010 B2
7826929 Wacker Nov 2010 B2
20020070972 Windl et al. Jun 2002 A1
20020163427 Eryurek et al. Nov 2002 A1
20030101009 Seem May 2003 A1
20030171851 Brickfield et al. Sep 2003 A1
20040143510 Haeberle et al. Jul 2004 A1
20050038571 Brickfield et al. Feb 2005 A1
20050043862 Brickfield et al. Feb 2005 A1
20050193285 Jeon Sep 2005 A1
20050203490 Simonson Sep 2005 A1
20060136558 Sheehan et al. Jun 2006 A1
20060168013 Wilson et al. Jul 2006 A1
20060253205 Gardiner Nov 2006 A1
20080010049 Pouchak et al. Jan 2008 A1
20080016493 Pouchak et al. Jan 2008 A1
20080115153 Brindle May 2008 A1
20080125914 Wacker May 2008 A1
20090113037 Pouchak Apr 2009 A1
20100100583 Pouchak Apr 2010 A1
20100106543 Marti Apr 2010 A1
20100131653 Dharwada et al. May 2010 A1
20100131877 Dharwada et al. May 2010 A1
20100156654 Bullemer et al. Jun 2010 A1
20100287130 Guralnik et al. Nov 2010 A1
20110010654 Raymond et al. Jan 2011 A1
Foreign Referenced Citations (12)
Number Date Country
WO 0197146 Dec 2001 WO
WO 02052432 Jul 2002 WO
WO 03090038 Oct 2003 WO
WO 2004053772 Jun 2004 WO
WO 2004055608 Jul 2004 WO
WO 2004070999 Aug 2004 WO
WO 2005020167 Mar 2005 WO
WO 2006048397 May 2006 WO
WO 2007024622 Mar 2007 WO
WO 2007024623 Mar 2007 WO
WO 2007027685 Mar 2007 WO
WO 2007082204 Jul 2007 WO
Non-Patent Literature Citations (17)
Entry
Honeywell, “Excel Building Supervisor-Integrated R7044 and FS90 Ver. 2.0,” Operator Manual, 70 pages, Apr. 1995.
Trane, “System Programming, Tracer Summit Version 14, BMTW-SVP01D-EN,” 623 pages, 2002.
Adobe Acrobat 6.0 Standard, Version 6.0.2, Screenshots, 2 pages, May 18, 2004.
U.S. Appl. No. 12/643,865, filed Dec. 21, 2009.
U.S. Appl. No. 12/703,476, filed Feb. 10, 2010.
U.S. Appl. No. 12/722,364, filed Mar. 11, 2010.
U.S. Appl. No. 12/822,997, filed Jun. 24, 2010.
U.S. Appl. No. 12/977,701, filed Dec. 23, 2010.
Honeywell Spyder Bacnet User's Guide, 242 pages, Revised Jul. 2009.
Honeywell Spyder User's Guide 202 pages, Released Jul. 2007.
http://blogs.msdn.com/b/khen1234/archive/2005/05/11/416392.aspx, “Regular Expressions in T-SQL,” 4 pages, May 11, 2005.
http://en.wikipedia.org/wiki/JAR—(file—format), “JAR (file format)—Wikipedia, the Free Encyclopedia,” 3 pages, printed Dec. 26, 2009.
http://www.google.com/maps, “Google Maps, Pin Location,” 1 page, prior to Nov. 21, 2008.
Microsoft Word Screen Shots, 2 pages, prior to Nov. 21, 2008.
Siemens, BACnet for DESIGO 27 Pages, prior to Dec. 30, 2009.
Tridium, “NiagaraAX Product Model Overview,” 7 pages, 2005.
Tridium, “Tridium & Niatara Framework Overview,” 9 pages, prior to Oct. 28, 2008.
Related Publications (1)
Number Date Country
20110298608 A1 Dec 2011 US