14,443 research outputs found

    Model based fault diagnosis for hybrid systems : application on chemical processes

    Get PDF
    The complexity and the size of the industrial chemical processes induce the monitoring of a growing number of process variables. Their knowledge is generally based on the measurements of system variables and on the physico-chemical models of the process. Nevertheless, this information is imprecise because of process and measurement noise. So the research ways aim at developing new and more powerful techniques for the detection of process fault. In this work, we present a method for the fault detection based on the comparison between the real system and the reference model evolution generated by the extended Kalman filter. The reference model is simulated by the dynamic hybrid simulator, PrODHyS. It is a general object-oriented environment which provides common and reusable components designed for the development and the management of dynamic simulation of industrial systems. The use of this method is illustrated through a didactic example relating to the field of Chemical Process System Engineering

    Formal Design of Asynchronous Fault Detection and Identification Components using Temporal Epistemic Logic

    Get PDF
    Autonomous critical systems, such as satellites and space rovers, must be able to detect the occurrence of faults in order to ensure correct operation. This task is carried out by Fault Detection and Identification (FDI) components, that are embedded in those systems and are in charge of detecting faults in an automated and timely manner by reading data from sensors and triggering predefined alarms. The design of effective FDI components is an extremely hard problem, also due to the lack of a complete theoretical foundation, and of precise specification and validation techniques. In this paper, we present the first formal approach to the design of FDI components for discrete event systems, both in a synchronous and asynchronous setting. We propose a logical language for the specification of FDI requirements that accounts for a wide class of practical cases, and includes novel aspects such as maximality and trace-diagnosability. The language is equipped with a clear semantics based on temporal epistemic logic, and is proved to enjoy suitable properties. We discuss how to validate the requirements and how to verify that a given FDI component satisfies them. We propose an algorithm for the synthesis of correct-by-construction FDI components, and report on the applicability of the design approach on an industrial case-study coming from aerospace.Comment: 33 pages, 20 figure

    Dynamic state reconciliation and model-based fault detection for chemical processes

    Get PDF
    In this paper, we present a method for the fault detection based on the residual generation. The main idea is to reconstruct the outputs of the system from the measurements using the extended Kalman filter. The estimations are compared to the values of the reference model and so, deviations are interpreted as possible faults. The reference model is simulated by the dynamic hybrid simulator, PrODHyS. The use of this method is illustrated through an application in the field of chemical processe

    A Markovian jump system approach for the estimation and adaptive diagnosis of decreased power generation in wind farms

    Get PDF
    In this study, a Markovian jump model of the power generation system of a wind turbine is proposed and the authors present a closed-loop model-based observer to estimate the faults related to energy losses. The observer is designed through an H∞-based optimisation problem that optimally fixes the trade-off between the observer fault sensitivity and robustness. The fault estimates are then used in data-based decision mechanisms for achieving fault detection and isolation. The performance of the strategy is then ameliorated in a wind farm (WF) level scheme that uses a bank of the aforementioned observers and decision mechanisms. Finally, the proposed approach is tested using a well-known benchmark in the context of WF fault diagnosis

    Design methodology for smart actuator services for machine tool and machining control and monitoring

    Get PDF
    This paper presents a methodology to design the services of smart actuators for machine tools. The smart actuators aim at replacing the traditional drives (spindles and feed-drives) and enable to add data processing abilities to implement monitoring and control tasks. Their data processing abilities are also exploited in order to create a new decision level at the machine level. The aim of this decision level is to react to disturbances that the monitoring tasks detect. The cooperation between the computational objects (the smart spindle, the smart feed-drives and the CNC unit) enables to carry out functions for accommodating or adapting to the disturbances. This leads to the extension of the notion of smart actuator with the notion of agent. In order to implement the services of the smart drives, a general design is presented describing the services as well as the behavior of the smart drive according to the object oriented approach. Requirements about the CNC unit are detailed. Eventually, an implementation of the smart drive services that involves a virtual lathe and a virtual turning operation is described. This description is part of the design methodology. Experimental results obtained thanks to the virtual machine are then presented

    A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks

    Get PDF
    In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior of the attacker has been identified. The main advantage brought by this technique is that the existing components in the control system can be maintained without need of retuning them, since the virtual actuator will perform a reconfiguration of the plant, hiding the attack from the controller point of view. Using Lyapunov-based results that take into account the possible behavior of the attacker, design conditions for calculating the virtual actuators gains are obtained. A numerical example is used to illustrate the proposed secure control strategy.Peer ReviewedPostprint (author's final draft
    corecore