The present description relates to methods and systems for diagnosing and profiling any industrial process based on state-of-the-art data analysis methods.
Controlling and monitoring large-scale industrial assets (e.g., chemical plants, fuel cells, power turbines, nuclear power plants, etc) often generates a huge amount of data. This data characterizes the complex dynamic behaviour of each asset (or component).
Commonly, there are two approaches in model-based diagnosis. The fist attempts to model the faulty behavior of a process. This approach tries to recognize the fault patterns from the available data. However, faulty conditions are rare and it takes a long time to build enough fault patterns to be efficient. The same fault can execute differently and may be not recognized by this method.
Another approach is to model normal behavior and to signal any deviation from this model. Data from normal operation is much easier to get for a process. The drawback of this approach lies in the difficulty in providing a good model that covers the different operating modes that are present during normal execution of a complex industrial process.
Improvements are therefore desired in the control and monitoring of large-scale industrial processes.
The present description will concentrate on the second approach for data acquisition discussed above and describe an original method to model the process and recognize faults.
Typically, a complex industrial process is defined by a combination of dynamic states. It is very difficult to create and deploy a complete model of a process that has a behavior that is variable according to its operating mode. Often, processes have stable operating modes that are easier to model and for which monitoring detection limits can be very tight. Other operating modes may be transient which makes modeling more difficult.
The present description shows, in an aspect, how to overcome the difficulties associated with prior art methods by modeling each process state with elementary predictive models or preprocessing transformations, activated under specific operating conditions.
Instead of building a monolithic model of a complex system, the ADU (Anomaly Detection Unit) model described herein is a building block of small parts of the overall complex behavior.
According to an embodiment, there is provided a method for detecting an anomaly in data originating from a component used in an industrial process. The method comprises: providing predictive models in which at least one of the predictive models corresponds to at least one operating mode from a plurality of operating modes of the component; obtaining operating data from the component, the operating data being indicative of a given operating mode from the operating modes; selecting at least one of the predictive models based on the given operating mode; generating estimated data using the selected at least one predictive model; comparing the operating data with the estimated data; and generating an alarm trigger when the comparison meets a given anomaly criteria thereby constituting the detection of the anomaly.
According to another embodiment, there is provided a system for detecting an anomaly in data originating from a component used in an industrial process. The system comprises: a predictive model builder for providing predictive models in which at least one of the predictive models corresponds to at least one operating mode from a plurality of operating modes of the component; an input for receiving operating data from the component, the operating data being indicative of a given operating mode from the operating modes; a calculation engine for selecting at least one of the predictive models based on the given operating mode; the calculation engine further for generating estimated data using the selected at least one predictive model; and an anomaly recognition engine for comparing the operating data with the estimated data and for generating an alarm trigger when the comparison meets a given anomaly criteria thereby constituting the detection of the anomaly.
An aspect of the present description shows how to ensure optimal asset functionality in any operating mode by achieving the following objectives: early detection and localization of equipment deterioration, improving asset availability by providing better maintenance and production shutdown planning and efficiency (predictive maintenance scheduling), and reducing operating costs by improving asset efficiency.
These and other features and aspects will become better understood with regard to the following description and accompanying drawings wherein:
The method is built on the principle of learning the normal behavior of any asset (also referred to as a component) in a process from pertinent measurements and recognizing subtle abnormal deviations. Asset (or component) behavior is learned by building a predictive model based on reference data acquired during operation. Predictive models are elementary data prediction entities defined by data-driven linear or nonlinear models (neural networks, nonlinear regression, kernel regression etc) associated with signature characterization and abnormal pattern recognition methods.
Building a diagnostic strategy within the context of the description is performed in two phases; the “Learning Phase” and the “Deployment Phase”. A “Validation Phase” can be added to the process. While the Validation Phase is optional it contributes to increase performance.
In the learning phase, subsets of the reference data (i.e., the learning data) are associated with plant expertise 11 to model the normal behavior of the process and detect any deviation from this normal behavior. It is the ADU model builder module 17 that creates an predictive model (also referred herein as “Anomaly Detection Unit Model” or “ADU model”) of a specific behavior for a given asset. The performance of the monitoring methodology is linked to the modularity of the ADU model.
In this context, the ADU model is a predictive model that is linked to a specific operating mode for an asset, or a set of given assets. The ADU model is built from historical data (a.k.a. reference data) and plant knowledge/expertise and represents the normal behavior of the assets. A deviation from this model may be characterized as an anomaly.
Now turning to
The Activation Condition Builder 31 is involved in the choice of a particular ADU model. From the reference data (usually one or many reference control parameters), it checks for states where a given ADU model is appropriate. For instance, an ADU model can be associated with startups, shutdowns, steady states, high or low values, etc. These are examples of modes of operation of an asset. In an embodiment, the Activation Conditions are implemented as filters. These filters are combined to automatically identify operating modes of a process or of an asset. Other implementations can use production rules. The Activation Condition Builder 31 provides an activation condition tag that will be uniquely associated with a particular ADU model, which at run-time, will allow to choose the ADU model specific to the process state. Examples of Activation Conditions of a process are start-up, shut down, load change, transition, steady state, etc.
The Preprocessing Builder 33 allows operators to transform raw data into a more significant form, when needed. Thus, the original reference or learning data are transformed in the Preprocessing Unit to filter irrelevant readings (e.g. smoothing, outlier removal, etc.), to generate numerical variables (e.g. basic numerical operations and customized equations, etc.) and to extract specific features (e.g. time domain analysis, frequency domain analysis, advanced detection operators, etc.).
The Prediction Builder 35 generates a predictive model based on both a set of reference data and filtered data. Any common practice, state-of-the-art approach can be used to provide this model. An embodiment uses a data-driven model based on a learning set of data. The values must represent the normal operating condition that need to be modeled. Within the scope of the present description, a multilayer feed-forward neural network model and linear regression are used to model the relationship between data. Other common and known data driven techniques such as kernel modeling are also well suited to the predictive modeling step. The modeling is performed in an auto-associative fashion (where each variable is modeled with all the others) or in an inferential way (where only some variables are used to model one variable). The Prediction Builder 35 generates the estimated/predicted data and uses them to produce the residuals (i.e., the difference between the reference data and predicted data).
The Characterisation Builder 37 establishes the working boundaries of the ADU model. The reference data (learning set) is used to specify the dynamic range (range of validity) of the predictive model (i.e. the data envelope for which the model was based). The residuals and the calculated data are used to assess the precision limits of the model. Usually, a model is a more or less precise reflection of the real behavior. The characterization step evaluates the acceptable error margin for the model. Any deviation to this characterization will be pointed out as an anomaly. The present embodiment characterizes a data tag with high and low limits, and a time interval inside of which these limits can be exceeded. Other approaches can include the use of the mean, the data distribution, the aging, or other process factors. The output of a Characterisation Builder 37 comprises configuration parameters which can be used to define the ADU model.
An anomaly is the set of deviations recorded for a specific timestamp, for a given characterisation. This set can be associated to an identifier, which we call a signature. The signature is a known reference used to quickly recognize an anomaly. The approach presented herein is to provide an encoding of the deviations. During an industrial process, a specific problem can results in several anomalies generated by different ADU models. Another occurrence of the same problem will produce the same anomalies and, consequently, the same signatures. When a specific problem occurs again, it will be recognized by its unique signature.
Signature definitions and anomaly patterns are created in Validation Unit 27 (see
Each ADU model is associated with an element of the asset's structural organization. When linked to the assets, a problem can be directly localized.
The output of the learning phase is a set of parameters required to completely describe the ADU model. There is also a set of signatures and anomaly patterns. The elements can be stored in a file, a database, or any other usable form.
Now returning to
The real time operating data is taken from the operating process and can come from any source. The present embodiment uses a data server 28. Other implementation could take data from a database or directly from the hardware, etc.
With respect to
Now returning to
The Validation Module 27 is an optional module that optimizes or adjusts the ADU parameters, the signature definitions and anomaly patterns. In an embodiment, data is received from the Historical Database 13 that contains validation data. The validation data is used to test a particular ADU model and depending on the results, the ADU parameters, signature definitions and anomaly patterns are adjusted.
Finally, with respect to
While illustrated in the block diagrams as groups of discrete components communicating with each other via distinct data signal connections, it will be understood by those skilled in the art that the preferred embodiments are provided by a combination of hardware and software components, with some components being implemented by a given function or operation of a hardware or software system, and many of the data paths illustrated being implemented by data communication within a computer application or operating system. The structure illustrated is thus provided for efficiency of teaching the present preferred embodiment.
It should be noted that the present invention can be carried out as a method, can be embodied in a system, a computer readable medium or an electrical or electro-magnetic signal.
The embodiments described above are intended to be exemplary only. The scope of the invention is therefore intended to be limited solely by the scope of the appended claims.
This application claims priority under 35US§119(e) of U.S. provisional patent application 60/764,780, filed on Feb. 3, 2006 and entitled Monitoring System and Method for Building Predictive Models and Detecting Anomalies, the specification of which is hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
6393373 | Duyar et al. | May 2002 | B1 |
6473658 | Brose et al. | Oct 2002 | B1 |
6513025 | Rosen | Jan 2003 | B1 |
6564119 | Vaculik et al. | May 2003 | B1 |
6591146 | Pavlovic et al. | Jul 2003 | B1 |
6731990 | Carter et al. | May 2004 | B1 |
6801810 | Poncet | Oct 2004 | B1 |
6853920 | Hsiung et al. | Feb 2005 | B2 |
6859739 | Wegerich et al. | Feb 2005 | B2 |
6898469 | Bickford | May 2005 | B2 |
6917839 | Bickford | Jul 2005 | B2 |
6917845 | Hsiung et al. | Jul 2005 | B2 |
6920440 | Barson | Jul 2005 | B1 |
6947797 | Dean et al. | Sep 2005 | B2 |
6952657 | Jahns et al. | Oct 2005 | B2 |
6985779 | Hsiung et al. | Jan 2006 | B2 |
7257451 | Carpency et al. | Aug 2007 | B2 |
7317953 | Wojsznis et al. | Jan 2008 | B2 |
7447554 | Cutler | Nov 2008 | B2 |
20020002414 | Hsiung et al. | Jan 2002 | A1 |
20020165842 | Hellerstein et al. | Nov 2002 | A1 |
20030065409 | Raeth et al. | Apr 2003 | A1 |
20050273296 | Zhu et al. | Dec 2005 | A1 |
20060089731 | Kawakatsu et al. | Apr 2006 | A1 |
20060106743 | Horvitz | May 2006 | A1 |
20060173559 | Kirshenbaum et al. | Aug 2006 | A1 |
20070135938 | Subbu et al. | Jun 2007 | A1 |
20070293957 | Tanaka et al. | Dec 2007 | A1 |
Number | Date | Country | |
---|---|---|---|
20070265713 A1 | Nov 2007 | US |
Number | Date | Country | |
---|---|---|---|
60764780 | Feb 2006 | US |