777 research outputs found

    Development of non-invasive monitoring approach to diagnose leaks in liquid pipelines

    Get PDF
    This paper presents a novel non-invasive monitoring method, based on a Liénard-type model (LTM) to diagnose single and sequential leaks in liquid pipelines. The LTM describes the fluid behavior in a pipeline and is given only in terms of the flow rate. Our method was conceived to be applied in pipelines mono-instrumented with flowmeters or in conjunction with pressure sensors that are temporarily unavailable. The approach conception starts with the discretization of the LTM spatial domain into a prescribed number of sections. Such discretization is performed to obtain a lumped model capable of providing a solution (an internal flow rate) for every section. From this lumped model, a set of algebraic equations (known as residuals) are deduced as the difference between the internal discrete flows and the nominal flow (the mean of the flow rate calculated before the leak). Once the residuals are calculated a principal component analysis (PCA) is carried out to detect a leak occurrence. In the presence of a leak, the residual closest to zero will indicate the section where a leak is occurring. Some simulation-based tests in PipelineStudio® and experimental tests in a lab-pipeline illustrating the suitability of our method are shown at the end of this article

    Task-space dynamic control of underwater robots

    Get PDF
    This thesis is concerned with the control aspects for underwater tasks performed by marine robots. The mathematical models of an underwater vehicle and an underwater vehicle with an onboard manipulator are discussed together with their associated properties. The task-space regulation problem for an underwater vehicle is addressed where the desired target is commonly specified as a point. A new control technique is proposed where the multiple targets are defined as sub-regions. A fuzzy technique is used to handle these multiple sub-region criteria effectively. Due to the unknown gravitational and buoyancy forces, an adaptive term is adopted in the proposed controller. An extension to a region boundary-based control law is then proposed for an underwater vehicle to illustrate the flexibility of the region reaching concept. In this novel controller, a desired target is defined as a boundary instead of a point or region. For a mapping of the uncertain restoring forces, a least-squares estimation algorithm and the inverse Jacobian matrix are utilised in the adaptive control law. To realise a new tracking control concept for a kinematically redundant robot, subregion tracking control schemes with a sub-tasks objective are developed for a UVMS. In this concept, the desired objective is specified as a moving sub-region instead of a trajectory. In addition, due to the system being kinematically redundant, the controller also enables the use of self-motion of the system to perform sub-tasks (drag minimisation, obstacle avoidance, manipulability and avoidance of mechanical joint limits)

    Liquid Transport Pipeline Monitoring Architecture Based on State Estimators for Leak Detection and Location

    Get PDF
    This research presents the implementation of optimization algorithms to build auxiliary signals that can be injected as inputs into a pipeline in order to estimate —by using state observers—physical parameters such as the friction or the velocity of sound in the fluid. For the state estimator design, the parameters to be estimated are incorporated into the state vector of a Liénard-type model of a pipeline such that the observer is constructed from the augmented model. A prescribed observability degree of the augmented model is guaranteed by optimization algorithms by building an optimal input for the identification. The minimization of the input energy is used to define the optimality of the input, whereas the observability Gramian is used to verify the observability. Besides optimization algorithms, a novel method, based on a Liénard-type model, to diagnose single and sequential leaks in pipelines is proposed. In this case, the Liénard-type model that describes the fluid behavior in a pipeline is given only in terms of the flow rate. This method was conceived to be applied in pipelines solely instrumented with flowmeters or in conjunction with pressure sensors that are temporarily out of service. The design approach starts with the discretization of the Liénard-type model spatial domain into a prescribed number of sections. Such discretization is performed to obtain a lumped model capable of providing a solution (an internal flow rate) for every section. From this lumped model, a set of algebraic equations (known as residuals) are deduced as the difference between the internal discrete flows and the nominal flow (the mean of the flow rate calculated prior to the leak). The residual closest to zero will indicate the section where a leak is occurring. The main contribution of our method is that it only requires flow measurements at the pipeline ends, which leads to cost reductions. Some simulation-based tes

    Control Engineering

    Get PDF
    Control means a speci?c action to reach the desired behavior of a system. In the control of industrial processes generally technological processes, are considered, but control is highly required to keep any physical, chemical, biological, communication, economic, or social process functioning in a desired manner

    Integrated Application of Active Controls (IAAC) technology to an advanced subsonic transport project: Current and advanced act control system definition study. Volume 2: Appendices

    Get PDF
    The current status of the Active Controls Technology (ACT) for the advanced subsonic transport project is investigated through analysis of the systems technical data. Control systems technologies under examination include computerized reliability analysis, pitch axis fly by wire actuator, flaperon actuation system design trade study, control law synthesis and analysis, flutter mode control and gust load alleviation analysis, and implementation of alternative ACT systems. Extensive analysis of the computer techniques involved in each system is included

    Underwater Vehicles

    Get PDF
    For the latest twenty to thirty years, a significant number of AUVs has been created for the solving of wide spectrum of scientific and applied tasks of ocean development and research. For the short time period the AUVs have shown the efficiency at performance of complex search and inspection works and opened a number of new important applications. Initially the information about AUVs had mainly review-advertising character but now more attention is paid to practical achievements, problems and systems technologies. AUVs are losing their prototype status and have become a fully operational, reliable and effective tool and modern multi-purpose AUVs represent the new class of underwater robotic objects with inherent tasks and practical applications, particular features of technology, systems structure and functional properties

    MEMS Accelerometers

    Get PDF
    Micro-electro-mechanical system (MEMS) devices are widely used for inertia, pressure, and ultrasound sensing applications. Research on integrated MEMS technology has undergone extensive development driven by the requirements of a compact footprint, low cost, and increased functionality. Accelerometers are among the most widely used sensors implemented in MEMS technology. MEMS accelerometers are showing a growing presence in almost all industries ranging from automotive to medical. A traditional MEMS accelerometer employs a proof mass suspended to springs, which displaces in response to an external acceleration. A single proof mass can be used for one- or multi-axis sensing. A variety of transduction mechanisms have been used to detect the displacement. They include capacitive, piezoelectric, thermal, tunneling, and optical mechanisms. Capacitive accelerometers are widely used due to their DC measurement interface, thermal stability, reliability, and low cost. However, they are sensitive to electromagnetic field interferences and have poor performance for high-end applications (e.g., precise attitude control for the satellite). Over the past three decades, steady progress has been made in the area of optical accelerometers for high-performance and high-sensitivity applications but several challenges are still to be tackled by researchers and engineers to fully realize opto-mechanical accelerometers, such as chip-scale integration, scaling, low bandwidth, etc

    Neuromorphic Learning Systems for Supervised and Unsupervised Applications

    Get PDF
    The advancements in high performance computing (HPC) have enabled the large-scale implementation of neuromorphic learning models and pushed the research on computational intelligence into a new era. Those bio-inspired models are constructed on top of unified building blocks, i.e. neurons, and have revealed potentials for learning of complex information. Two major challenges remain in neuromorphic computing. Firstly, sophisticated structuring methods are needed to determine the connectivity of the neurons in order to model various problems accurately. Secondly, the models need to adapt to non-traditional architectures for improved computation speed and energy efficiency. In this thesis, we address these two problems and apply our techniques to different cognitive applications. This thesis first presents the self-structured confabulation network for anomaly detection. Among the machine learning applications, unsupervised detection of the anomalous streams is especially challenging because it requires both detection accuracy and real-time performance. Designing a computing framework that harnesses the growing computing power of the multicore systems while maintaining high sensitivity and specificity to the anomalies is an urgent research need. We present AnRAD (Anomaly Recognition And Detection), a bio-inspired detection framework that performs probabilistic inferences. We leverage the mutual information between the features and develop a self-structuring procedure that learns a succinct confabulation network from the unlabeled data. This network is capable of fast incremental learning, which continuously refines the knowledge base from the data streams. Compared to several existing anomaly detection methods, the proposed approach provides competitive detection accuracy as well as the insight to reason the decision making. Furthermore, we exploit the massive parallel structure of the AnRAD framework. Our implementation of the recall algorithms on the graphic processing unit (GPU) and the Xeon Phi co-processor both obtain substantial speedups over the sequential implementation on general-purpose microprocessor (GPP). The implementation enables real-time service to concurrent data streams with diversified contexts, and can be applied to large problems with multiple local patterns. Experimental results demonstrate high computing performance and memory efficiency. For vehicle abnormal behavior detection, the framework is able to monitor up to 16000 vehicles and their interactions in real-time with a single commodity co-processor, and uses less than 0.2ms for each testing subject. While adapting our streaming anomaly detection model to mobile devices or unmanned systems, the key challenge is to deliver required performance under the stringent power constraint. To address the paradox between performance and power consumption, brain-inspired hardware, such as the IBM Neurosynaptic System, has been developed to enable low power implementation of neural models. As a follow-up to the AnRAD framework, we proposed to port the detection network to the TrueNorth architecture. Implementing inference based anomaly detection on a neurosynaptic processor is not straightforward due to hardware limitations. A design flow and the supporting component library are developed to flexibly map the learned detection networks to the neurosynaptic cores. Instead of the popular rate code, burst code is adopted in the design, which represents numerical value using the phase of a burst of spike trains. This does not only reduce the hardware complexity, but also increases the result\u27s accuracy. A Corelet library, NeoInfer-TN, is implemented for basic operations in burst code and two-phase pipelines are constructed based on the library components. The design can be configured for different tradeoffs between detection accuracy, hardware resource consumptions, throughput and energy. We evaluate the system using network intrusion detection data streams. The results show higher detection rate than some conventional approaches and real-time performance, with only 50mW power consumption. Overall, it achieves 10^8 operations per Joule. In addition to the modeling and implementation of unsupervised anomaly detection, we also investigate a supervised learning model based on neural networks and deep fragment embedding and apply it to text-image retrieval. The study aims at bridging the gap between image and natural language. It continues to improve the bidirectional retrieval performance across the modalities. Unlike existing works that target at single sentence densely describing the image objects, we elevate the topic to associating deep image representations with noisy texts that are only loosely correlated. Based on text-image fragment embedding, our model employs a sequential configuration, connects two embedding stages together. The first stage learns the relevancy of the text fragments, and the second stage uses the filtered output from the first one to improve the matching results. The model also integrates multiple convolutional neural networks (CNN) to construct the image fragments, in which rich context information such as human faces can be extracted to increase the alignment accuracy. The proposed method is evaluated with both synthetic dataset and real-world dataset collected from picture news website. The results show up to 50% ranking performance improvement over the comparison models
    corecore