356 research outputs found

    Integrated Immunity-based Methodology for UAV Monitoring and Control

    Get PDF
    A general integrated and comprehensive health management framework based on the artificial immune system (AIS) paradigm is formulated and an automated system is developed and tested through simulation for the detection, identification, evaluation, and accommodation (DIEA) of abnormal conditions (ACs) on an unmanned aerial vehicle (UAV). The proposed methodology involves the establishment of a body of data to represent the function of the vehicle under nominal conditions, called the self, and differentiating this operation from that of the vehicle under an abnormal condition, referred to as the non-self. Data collected from simulations of the selected UAV autonomously flying a set of prescribed trajectories were used to develop and test novel schemes that are capable of addressing the AC-DIEA of sensor and actuator faults on a UAV. While the specific dynamic system used here is a UAV, the proposed framework and methodology is general enough to be adapted and applied to any complex dynamic system. The ACs considered within this effort included aerodynamic control surface locks and damage and angular rate sensor biases. The general framework for the comprehensive health management system comprises a novel complete integration of the AC-DIEA process with focus on the transition between the four different phases. The hierarchical multiself (HMS) strategy is used in conjunction with several biomimetic mechanisms to address the various steps in each phase. The partition of the universe approach is used as the basis of the AIS generation and the binary detection phase. The HMS approach is augmented by a mechanism inspired by the antigen presenting cells of the adaptive immune system for performing AC identification. The evaluation and accommodation phases are the most challenging phases of the AC-DIEA process due to the complexity and diversity of the ACs and the multidimensionality of the AIS. Therefore, the evaluation phase is divided into three separate steps: the qualitative evaluation, direct quantitative evaluation, and the indirect quantitative evaluation, where the type, severity, and effects of the AC are determined, respectively. The integration of the accommodation phase is based on a modular process, namely the strategic decision making, tactical decision marking, and execution modules. These modules are designed by the testing of several approaches for integrating the accommodation phase, which are specialized based on the type of AC being addressed. These approaches include redefining of the mission, adjustment or shifting of the control laws, or adjusting the sensor outputs. Adjustments of the mission include redefining of the trajectory to remove maneuvers which are no longer possible, while adjusting of the control laws includes modifying gains involved in determination of commanded control surface deflections. Analysis of the transition between phases includes a discussion of results for integrated example cases where the proposed AC-DIEA process is applied. The cases considered show the validity of the integrated AC-DIEA system and specific accommodation approaches by an improvement in flight performance through metrics that capture trajectory tracking errors and control activity differences between nominal, abnormal, and accommodated cases

    Fault Detection and Isolation of Wind Turbines using Immune System Inspired Algorithms

    Get PDF
    Recently, the research focus on renewable sources of energy has been growing intensively. This is mainly due to potential depletion of fossil fuels and its associated environmental concerns, such as pollution and greenhouse gas emissions. Wind energy is one of the fastest growing sources of renewable energy, and policy makers in both developing and developed countries have built their vision on future energy supply based on and by emphasizing the wind power. The increase in the number of wind turbines, as well as their size, have led to undeniable care and attention to health and condition monitoring as well as fault diagnosis of wind turbine systems and their components. In this thesis, two main immune inspired algorithms are used to perform Fault Detection and Isolation (FDI) of a Wind Turbine (WT), namely the Negative Selection Algorithm (NSA) as well as the Dendritic Cell Algorithm (DCA). First, an NSA-based fault diagnosis methodology is proposed in which a hierarchical bank of NSAs is used to detect and isolate both individual as well as simultaneously occurring faults common to the wind turbines. A smoothing moving window filter is then utilized to further improve the reliability and performance of the proposed FDI scheme. Moreover, the performance of the proposed scheme is compared with the state-of-the-art data-driven technique, namely Support Vector Machine (SVM) to demonstrate and illustrate the superiority and advantages of the proposed NSA-based FDI scheme. Finally, a nonparametric statistical comparison test is implemented to evaluate the proposed methodology with that of the SVM under various fault severities. In the second part, another immune inspired methodology, namely the Dendritic Cell Algorithm (DCA) is used to perform online sensor fault FDI. A noise filter is also designed to attenuate the measurement noise, resulting in better FDI results. The proposed DCA-based FDI scheme is then compared with the previously developed NSA-based FDI scheme, and a nonparametric statistical comparison test is also performed. Both of the proposed immune inspired frameworks are applied to a well-known wind turbine benchmark model in order to validate the effectiveness of the proposed methodologies

    Monitoring and Control Framework for Advanced Power Plant Systems Using Artificial Intelligence Techniques

    Get PDF
    This dissertation presents the design, development, and simulation testing of a monitoring and control framework for dynamic systems using artificial intelligence techniques. A comprehensive monitoring and control system capable of detecting, identifying, evaluating, and accommodating various subsystem failures and upset conditions is presented. The system is developed by synergistically merging concepts inspired from the biological immune system with evolutionary optimization algorithms and adaptive control techniques.;The proposed methodology provides the tools for addressing the complexity and multi-dimensionality of the modern power plants in a comprehensive and integrated manner that classical approaches cannot achieve. Current approaches typically address abnormal condition (AC) detection of isolated subsystems of low complexity, affected by specific AC involving few features with limited identification capability. They do not attempt AC evaluation and mostly rely on control system robustness for accommodation. Addressing the problem of power plant monitoring and control under AC at this level of completeness has not yet been attempted.;Within the proposed framework, a novel algorithm, namely the partition of the universe, was developed for building the artificial immune system self. As compared to the clustering approach, the proposed approach is less computationally intensive and facilitates the use of full-dimensional self for system AC detection, identification, and evaluation. The approach is implemented in conjunction with a modified and improved dendritic cell algorithm. It allows for identifying the failed subsystems without previous training and is extended to address the AC evaluation using a novel approach.;The adaptive control laws are designed to augment the performance and robustness of baseline control laws under normal and abnormal operating conditions. Artificial neural network-based and artificial immune system-based approaches are developed and investigated for an advanced power plant through numerical simulation.;This dissertation also presents the development of an interactive computational environment for the optimization of power plant control system using evolutionary techniques with immunity-inspired enhancements. Several algorithms mimicking mechanisms of the immune system of superior organisms, such as cloning, affinity-based selection, seeding, and vaccination are used. These algorithms are expected to enhance the computational effectiveness, improve convergence, and be more efficient in handling multiple local extrema, through an adequate balance between exploration and exploitation.;The monitoring and control framework formulated in this dissertation applies to a wide range of technical problems. The proposed methodology is demonstrated with promising results using a high validity DynsimRTM model of the acid gas removal unit that is part of the integrated gasification combined cycle power plant available at West Virginia University AVESTAR Center. The obtained results show that the proposed system is an efficient and valuable technique to be applied to a real world application. The implementation of this methodology can potentially have significant impacts on the operational safety of many complex systems

    Immunity-Based Accommodation of Aircraft Subsystem Failures

    Get PDF
    This thesis presents the design, development, and flight-simulation testing of an artificial immune system (AIS) based approach for accommodation of different aircraft subsystem failures.;Failure accommodation is considered as part of a complex integrated AIS scheme that contains four major components: failure detection, identification, evaluation, and accommodation. The accommodation part consists of providing compensatory commands to the aircraft under specific abnormal conditions based on previous experience. In this research effort, the possibility of building an AIS allowing the extraction of pilot commands is investigated.;The proposed approach is based on structuring the self (nominal conditions) and the non-self (abnormal conditions) within the AIS paradigm, as sets of artificial memory cells (mimicking behavior of T-cells, B-cells, and antibodies) consisting of measurement strings, over pre-defined time windows. Each string is a set of features values at each sample time of the flight including pilot inputs, system states, and other variables. The accommodation algorithm relies on identifying the memory cell that is the most similar to the in-coming measurements. Once the best match is found, control commands corresponding to this match will be extracted from the memory and used for control purposes.;The proposed methodology is illustrated through simulation of simple maneuvers at nominal flight conditions, different actuators, and sensor failure conditions. Data for development and demonstration have been collected from West Virginia University 6-degrees-of-freedom motion-based flight simulator. The aircraft model used for this research represents a supersonic fighter which includes model following adaptive control laws based on non-linear dynamic inversion and artificial neural network augmentation.;The simulation results demonstrate the possibility of extracting pilot compensatory commands from the self/non-self structure and the capability of the AIS paradigm to address the problem of accommodating actuator and sensor malfunctions as a part of a comprehensive and integrated framework along with abnormal condition detection, identification, and evaluation

    The suitability of the dendritic cell algorithm for robotic security applications

    Get PDF
    The implementation and running of physical security systems is costly and potentially hazardous for those employed to patrol areas of interest. From a technial perspective, the physical security problem can be seen as minimising the probability that intruders and other anomalous events will occur unobserved. A robotic solution is proposed using an artificial immune system, traditionally applied to software security, to identify threats and hazards: the dendritic cell algorithm. It is demonstrated that the migration from the software world to the hardware world is achievable for this algorithm and key properties of the resulting system are explored empirically and theoretically. It is found that the algorithm has a hitherto unknown frequency-dependent component, making it ideal for filtering out sensor noise. Weaknesses of the algorithm are also discovered, by mathematically phrasing the signal processing phase as a collection of linear classifiers. It is concluded that traditional machine learning approaches are likely to outperform the implemented system in its current form. However, it is also observed that the algorithm’s inherent filtering characteristics make modification, rather than rejection, the most beneficial course of action. Hybridising the dendritic cell algorithm with more traditional machine learning techniques, through the introduction of a training phase and using a non-linear classification phase is suggested as a possible future direction

    A flow-based multi-agent data exfiltration detection architecture for ultra-low latency networks

    Get PDF
    This is an accepted manuscript of an article published by ACM in ACM Transactions on Internet Technology on 16/07/2021, available online: https://dl.acm.org/doi/10.1145/3419103 The accepted version of the publication may differ from the final published version.Modern network infrastructures host converged applications that demand rapid elasticity of services, increased security and ultra-fast reaction times. The Tactile Internet promises to facilitate the delivery of these services while enabling new economies of scale for high-fdelity of machine-to-machine and human-to-machine interactions. Unavoidably, critical mission systems served by the Tactile Internet manifest high-demands not only for high speed and reliable communications but equally, the ability to rapidly identify and mitigate threats and vulnerabilities. This paper proposes a novel Multi-Agent Data Exfltration Detector Architecture (MADEX) inspired by the mechanisms and features present in the human immune system. MADEX seeks to identify data exfltration activities performed by evasive and stealthy malware that hides malicious trafc from an infected host in low-latency networks. Our approach uses cross-network trafc information collected by agents to efectively identify unknown illicit connections by an operating system subverted. MADEX does not require prior knowledge of the characteristics or behaviour of the malicious code or a dedicated access to a knowledge repository. We tested the performance of MADEX in terms of its capacity to handle real-time data and the sensitivity of our algorithm’s classifcation when exposed to malicious trafc. Experimental evaluation results show that MADEX achieved 99.97% sensitivity, 98.78% accuracy and an error rate of 1.21% when compared to its best rivals. We created a second version of MADEX, called MADEX level 2 that further improves its overall performance with a slight increase in computational complexity. We argue for the suitability of MADEX level 1 in non-critical environments, while MADEX level 2 can be used to avoid data exfltration in critical mission systems. To the best of our knowledge, this is the frst article in the literature that addresses the detection of rootkits real-time in an agnostic way using an artifcial immune system approach while it satisfes strict latency requirements
    • …
    corecore