This disclosure relates generally to monitoring systems and, more particularly, to methods and systems for monitoring health of a gas turbine compressor blade.
Rotating blades are used in many devices such as compressors, turbines, and engines. An axial compressor, for example, has a series of stages with each stage comprising a row of rotor blades followed by a row of stator blades. Various factors may adversely affect rotor blade health and lead to fatigue, stress, and, ultimately, damage. These factors may put a device, such as a turbine compressor, at risk of causing permanent damage to rotating and/or stationary blades, sometimes even resulting in catastrophic failures (e.g. rotor blade liberation). To prevent failures, vibration and performance data systems may be used. However, the vibration and performance data systems provide little or no sensitivity to blade damage in case of material cracking or minor material loss.
The present disclosure relates to methods and systems for blade health monitoring. According to one embodiment of the disclosure, a method is provided. The method may include continuously receiving blade passing signal data associated with a clearance of a blade from an extraction module. The blade passing signal data may be pre-processed by the extraction module. The method may further include extracting blade clearance feature data from the blade passing signal data, normalizing the blade clearance feature data, detecting a shift in the clearance of the blade based on the blade clearance feature data, evaluating the shift in the clearance of the blade, and determining an abnormality of the blade based on the shift exceeding a predetermined shift threshold.
In another embodiment of the disclosure, a system is provided. The system may include a feature extraction module and an anomaly detection module in communication with the extraction module. The feature extraction module may be configured to continuously receive blade passing signal data associated with a clearance of a blade, and pre-process the blade passing signal data. Blade clearance feature data may be extracted from the blade passing signal data prior to transmission to the anomaly detection module. The anomaly detection module may be configured to normalize the blade clearance feature data received from the extraction module, analyze the blade clearance feature data to detect a shift in the clearance of the blade, and determine an abnormality of the blade based on the shift exceeding a predetermined shift threshold.
In yet another embodiment of the disclosure, a further system is provided. The system may include a gas turbine compressor including a plurality of blades, a plurality of magnetic sensors to sense blade passing signals from the plurality of blades, an extraction module, and an anomaly detection module in communication with the extraction module. The extraction module may be configured to continuously receive blade passing signal data associated with a clearance of the blades, and, pre-process the blade passing signal data. Blade clearance feature data may be extracted from the blade passing signal data prior to transmission to the anomaly detection module. The anomaly detection module may be configured to normalize the blade clearance feature data received from the extraction module, analyze the blade clearance feature data to detect a shift in the clearance of the blade, determine an abnormality of the blade based on the shift exceeding a predetermined shift threshold, assess a confidence level of the shift, and selectively declare an alarm condition based on the confidence level.
Other embodiments and aspects will become apparent from the following description taken in conjunction with the following drawings.
The following detailed description includes references to the accompanying drawings, which form part of the detailed description. The drawings depict illustrations, in accordance with example embodiments. These example embodiments, which are also referred to herein as “examples,” are described in enough detail to enable those skilled in the art to practice the present subject matter. The example embodiments may be combined, other embodiments may be utilized, or structural, logical, and electrical changes may be made, without departing from the scope of the claimed subject matter. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope is defined by the appended claims and their equivalents.
The embodiments described herein relate to methods and systems for blade health monitoring. Certain embodiments can provide for blade health monitoring by detecting a shift in clearance of a blade of a turbine compressor, thus detecting an abnormality that may be associated with blade damage. In compressors, rotating blades are relatively important components working in adverse environments. Various events, such as damage due to foreign objects, rubbing, crack induced tip clearance shifting, and the like, may cause blade material loss or blade deformation that may lead to blade failure. Blade clearance may be monitored in order to detect blade damage and prevent blade failures. Blade clearance data may be used to detect shifts in blade clearance and declare an alarm for detected shifts in the blade clearance.
However, some detected shifts may be associated with minor blade damage that does not present a failure hazard. To eliminate or otherwise minimize declaring alarms for such minor damages, various statistical and evaluation processes may be applied. Such processes may include determining that a shift exceeds a predetermined threshold, evaluating repeated shift events, assessing a shift confidence level, and so forth.
A system for blade health monitoring may have a distributed architecture to reduce the cost of the system and improve blade detection. Whereas blade clearance may be monitored directly with some pre-processing of the monitoring data, further processing of the data and applying statistical and evaluation processes to detect anomalies may be performed centrally, for example, by a stand-alone device that may be coupled to a turbine controller, or by the turbine controller itself.
The technical effects of certain embodiments of the disclosure may include improving detection of blade abnormalities, thus improving prevention of compressor failures. Further technical effects include reduction in costs for transferring high frequency signal data due to a distributed architecture (a local extraction module and a central anomaly detection module). The local module may pre-process the signal data and extract data related to step changes in the signal data, so that the volume of data transferred to the central anomaly detection module is reduced. Yet further technical effects are due to statistical processing and confidence evaluation of detected step changes that may reduce false alarm rates and provide for overall improvement of prevention and/or minimization of compressor failures.
The following provides the detailed description of various example embodiments related to systems and methods for blade health monitoring.
Referring now to
The magnetic sensor 120 may be coupled to the gas turbine 110. For example, the magnetic sensor 120 may be installed in a wall of a compressor of the gas turbine 110. The magnetic sensor 120 may continuously sense blade passing signals that are indicative of clearance of the blade. Tip clearance may be approximated based on the peak voltage of each blade passing signal. The blade passing signal may be continuously received by the local extraction module 130, which may extract the blade feature data from the blade passing signal. In some embodiments, raw blade passing signals may be smoothed using a low pass filter.
The local extraction module 130 may then transmit the extracted blade feature data to the central anomaly detection module 140, which may normalize the blade feature data to further improve signal to noise ratio. Thereafter, the data may be analyzed to detect a shift in the clearance of the blade. A shift exceeding a certain predetermined threshold may be declared an abnormality of the blade, such as a blade cracking, a blade deformation, a blade rubbing, blade liberation, a blade material loss, and the like. In some embodiments, determination of abnormalities may trigger an alarm. In other embodiments, alarms may be triggered when certain conditions are met. One such condition may be a confidence level associated with the detected shifts. The confidence level may be assessed, for example, based on a two sample T-Test applied to data sets before and after the shift. Alarms may be triggered only for shifts with a confidence level exceeding a predetermined value.
Additionally, the determined abnormalities may be further analyzed for persistence. For example, a number of times the abnormality is repeated may be analyzed, and alarm triggering may be omitted for non-recurring abnormalities. Furthermore, to avoid repetitive declarations of alarms, the central anomaly detection module 140 may suppress triggering an alarm for the same abnormality for a predetermined period of time after the alarm was first triggered.
Referring now back to
As shown in
At operation 210, the local extraction module may pre-process the blade passing signal data by means of extracting blade clearance feature data from the blade passing signal data. Additionally, the local extraction module may smooth the blade passing signal data using a low pass filter. At operation 215, the extracted blade clearance feature data may be normalized, for example, to increase a signal-to-noise ratio. At operation 220, the normalized blade clearance feature data may be processed to detect a shift in the clearance of the blade. One of the ways to detect a shift may be step change detection.
In some embodiments, when detecting a shift, a predefined threshold may be set. Thus, deviations below the predetermined threshold may be ignored and omitted in shift detection.
At operation 225, the detected shift may be evaluated based on various criteria, such as confidence, persistence, and so forth. In some embodiments, a confidence level of the shift may be assessed. To this end, a two sample test may be applied to data sets related to shifts before and after the detected shift. Using this approach, the shifts exceeding a predetermined confidence level may be assessed as to whether to trigger an alarm.
At operation 230, abnormalities of the blade may be determined based on the results of the evaluation. In various embodiments, abnormalities may be determined based on the shifts exceeding certain predetermined thresholds, such as the confidence threshold, on a number of times the abnormality is detected, and so forth.
An abnormality may be related to blade damage, such as a blade cracking, a blade deformation, a blade rubbing, blade liberation, a blade material loss, and so forth. The predetermined thresholds may be used to refine abnormality detection and eliminate minor or non-recurrent shifts.
In some embodiments, when an abnormality is determined, an alarm condition may be declared. An alarm may be declared through various means, including visual, audio, and other signals and notifications.
The method 300 may commence with monitoring a blade passing signal at operation 305. The blade passing signal may be monitored using a magnetic sensor to sense the signal from the blades of a gas turbine. The magnetic sensor may be installed, for example, in a wall of a turbine compressor. Based on the signal, clearance of a compressor blade may be determined In some embodiments, the clearance of the blade may be determined from a peak voltage in the blade passing signal. The clearance of the blade may be associated with the time of arrival of the blade at a predetermined location.
At operation 310, the raw signal may be smoothed using a low pass filter and pre-processed by means of extracting blade clearance feature data from the blade passing signal data. The resulting lower frequency feature data may be transferred to the central anomaly detection module at operation 315.
The central anomaly detection module may normalize the signal data frequency data to increase a signal-to-noise ratio at operation 320, and detect step changes at operation 325. Detected step changes may be associated with a blade abnormality, such as a blade cracking, a blade deformation, a blade rubbing, blade liberation, a blade material loss, and so forth.
When no step change is detected at operation 330, alarm declaring may be suppressed at operation 335, and the method may continue from operation 305. However, when a step change (referred to as a shift) is detected at operation 330, it may be further processed to confirm the existence and/or severity of blade damage. For example, a confidence level of the shift may be assessed at operation 340. For this evaluation, data sets from the shifts before and after the detected shift may be analyzed using a two sample T-Test.
The resulting confidence level may be used to determine whether to declare an alarm for a shift at operation 345. When a confidence level of a shift is lower than a predetermined threshold, no alarm is declared at operation 335, and the method may continue with operation 305.
In some embodiments, the shifts with a high confidence level may be further processed to determine their persistency and latched alarms. At operation 350, a persistency of a shift may be detected. Only the shifts that have recurred for more than a predetermined number of times (operation 355) may be considered eligible for declaring an alarm, whereas the shifts that have recurred for a fewer number of times may be omitted in alarm declaring.
Furthermore, at operation 360, latched alarms may be detected. This allows avoiding declaring multiple alarms for the same abnormalities. Thus, when a latched alarm is detected at operation 365, no alarm is declared. However, when there are no latched alarms at operation 365, an alarm is declared at operation 370.
Therefore, the raw data 400 of the blade passing signal may represent blade clearance in relation to time. A step change 410 demonstrated by the blade passing signal data may be associated with a blade abnormality, such as a foreign object damage abnormality.
References are made to block diagrams of systems, methods, apparatuses, and computer program products according to example embodiments. It will be understood that at least some of the blocks of the block diagrams, and combinations of blocks in the block diagrams, may be implemented at least partially by computer program instructions. These computer program instructions may be loaded onto a general purpose computer, special purpose computer, special purpose hardware-based computer, or other programmable data processing apparatus to produce a machine, such that the instructions which execute on the computer or other programmable data processing apparatus create means for implementing the functionality of at least some of the blocks of the block diagrams, or combinations of blocks in the block diagrams discussed.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means that implement the function specified in the block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions that execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the block or blocks.
One or more components of the systems and one or more elements of the methods described herein may be implemented through an application program running on an operating system of a computer. They also may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor based or programmable consumer electronics, mini-computers, mainframe computers, and the like.
Application programs that are components of the systems and methods described herein may include routines, programs, components, data structures, and so forth that implement certain abstract data types and perform certain tasks or actions. In a distributed computing environment, the application program (in whole or in part) may be located in local memory or in other storage. In addition, or alternatively, the application program (in whole or in part) may be located in remote memory or in storage to allow for circumstances where tasks are performed by remote processing devices linked through a communications network.
Many modifications and other embodiments of the example descriptions set forth herein to which these descriptions pertain will come to mind having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Thus, it will be appreciated the disclosure may be embodied in many forms and should not be limited to the example embodiments described above. Therefore, it is to be understood that the disclosure is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.