Abstract:
A flutter control system for a turbine includes a processor. The processor is configured to detect blade flutter of a turbine. The blade flutter indicates that blades of the turbine are in a deflected position different from a nominal operating position. The processor is configured to control operational parameters of the turbine that reduce or eliminate the blade flutter to improve the reliability and efficiency of the turbine.
Abstract:
A method includes selecting a first desired parameter of a machinery configured to produce power, a first surrogate parameter related to the desired parameter, and a first model configured to generate the desired parameter based on a first relationship between the first surrogate parameter and the first desired parameter. The method also includes receiving data related to the first surrogate parameter from a plurality of sensors coupled to the machinery and generating the first desired parameter using the data and the first model. Further, the method includes deriving a first set of empirical data relating the first surrogate parameter to the desired parameter and adjusting the first model based on the data, the first surrogate parameter, and the first set of empirical data, wherein the adjustment to the first model occurs in real-time.
Abstract:
A control system for an adaptive-power thermal management system of an aircraft having at least one adaptive cycle gas turbine engine includes a real time optimization solver that utilizes a plurality of models of systems to be controlled, the plurality of models each being defined by algorithms configured to predict changes to each system caused by current changes in input to each system. The real time optimization solver is configured to solve an open-loop optimal control problem on-line at each of a plurality of sampling times, to provide a series of optimal control actions as a solution to the open-loop optimal control problem. The real time optimization solver implements a first control action in a sequence of control actions and at a next sampling time the open-loop optimal control problem is re-posed and re-solved.
Abstract:
A method for providing backup control for a supervisory controller of at least one wind turbine includes observing, via a learning-based backup controller of the at least one wind turbine, at least one operating parameter of the supervisory controller under normal operation. The method also includes learning, via the learning-based backup controller, one or more control actions of the at least one wind turbine based on the operating parameter(s). Further, the method includes receiving, via the learning-based backup controller, an indication that the supervisory controller is unavailable to continue the normal operation. Upon receipt of the indication, the method includes controlling, via the learning-based backup controller, the wind turbine(s) using the learned one or more control actions until the supervisory controller becomes available again. Moreover, the control action(s) defines a delta that one or more setpoints of the wind turbine(s) should be adjusted by to achieve a desired outcome.
Abstract:
According to some embodiments, a system, method and non-transitory computer-readable medium are provided to protect a cyber-physical system having a plurality of monitoring nodes comprising: a normal space data source storing, for each of the plurality of monitoring nodes, a series of normal monitoring node values over time that represent normal operation of the cyber-physical system; a situational awareness module including an abnormal data generation platform, wherein the abnormal data generation platform is operative to generate abnormal data to represent abnormal operation of the cyber-physical system using values in the normal space data source and a generative model; a memory for storing program instructions; and a situational awareness processor, coupled to the memory, and in communication with the situational awareness module and operative to execute the program instructions to: receive a data signal, wherein the received data signal is an aggregation of data signals received from one or more of the plurality of monitoring nodes, wherein the data signal includes at least one real-time stream of data source signal values that represent a current operation of the cyber-physical system; determine, via a trained classifier, whether the received data signal is a normal signal or an abnormal signal, wherein the trained classifier is trained with the generated abnormal data and normal data; localize an origin of an anomaly when it is determined the received data signal is the abnormal signal; receive the determination and localization at a resilient estimator module; execute the resilient estimator module to generate a state estimation for the cyber-physical system. Numerous other aspects are provided.
Abstract:
An industrial asset may have monitoring nodes that generate current monitoring node values. A dynamic, resilient estimator may split a temporal monitoring node space into normal and one or more abnormal subspaces associated with different kinds of attack vectors. According to some embodiments, a neutralization model is constructed and trained for each attack vector using supervised learning and the associated abnormal subspace. In other embodiments, a single model is created using out-of-range values for abnormal monitoring nodes. Responsive to an indication of a particular abnormal monitoring node or nodes, the system may automatically invoke the appropriate neutralization model to determine estimated values of the particular abnormal monitoring node or nodes (e.g., by selecting the correct model or using out-of-range values). The series of current monitoring node values from the abnormal monitoring node or nodes may then be replaced with the estimated values.
Abstract:
According to some embodiments, a system, method and non-transitory computer-readable medium are provided to protect a cyber-physical system having a plurality of monitoring nodes comprising: a normal space data source storing, for each of the plurality of monitoring nodes, a series of normal monitoring node values over time that represent normal operation of the cyber-physical system; a situational awareness module including an abnormal data generation platform, wherein the abnormal data generation platform is operative to generate abnormal data to represent abnormal operation of the cyber-physical system using values in the normal space data source and a generative model; a memory for storing program instructions; and a situational awareness processor, coupled to the memory, and in communication with the situational awareness module and operative to execute the program instructions to: receive a data signal, wherein the received data signal is an aggregation of data signals received from one or more of the plurality of monitoring nodes, wherein the data signal includes at least one real-time stream of data source signal values that represent a current operation of the cyber-physical system; determine, via a trained classifier, whether the received data signal is a normal signal or an abnormal signal, wherein the trained classifier is trained with the generated abnormal data and normal data; localize an origin of an anomaly when it is determined the received data signal is the abnormal signal; receive the determination and localization at a resilient estimator module; execute the resilient estimator module to generate a state estimation for the cyber-physical system. Numerous other aspects are provided.
Abstract:
Systems and methods are provided for the control of an industrial asset, such as a power generating asset. Accordingly, a cyber-attack model predicts a plurality of operational impacts on the industrial asset resulting from a plurality of potential cyber-attacks. The cyber-attack model also predicts a corresponding plurality of potential mitigation responses. In operation, a cyber-attack impacting at least one component of the industrial asset is detected via the cyber-attack neutralization module and a protected operational impact of the cyber-attack is identified based on the cyber-attack model. The cyber-attack neutralization module selects at least one mitigation response of the plurality of mitigation responses based on the predicted operational impact and an operating state of the industrial asset is altered based on the selected mitigation response.
Abstract:
An industrial asset may have monitoring nodes (e.g., sensor or actuator nodes) that generate current monitoring node values. An abnormality detection and localization computer may receive the series of current monitoring node values and output an indication of at least one abnormal monitoring node that is currently being attacked or experiencing a fault. An actor-critic platform may tune a dynamic, resilient state estimator for a sensor node and output tuning parameters for a controller that improve operation of the industrial asset during the current attack or fault. The actor-critic platform may include, for example, a dynamic, resilient state estimator, an actor model, and a critic model. According to some embodiments, a value function of the critic model is updated for each action of the actor model and each action of the actor model is evaluated by the critic model to update a policy of the actor-critic platform.
Abstract:
A method of operating a waste water treatment plant (WWTP) having at least one of an aerobic digester (AD) and a membrane bioreactor (MBR) is described. The method of operating AD is comprised of monitoring and controlling AD in real-time using an online extended Kalman filter (EKF) having a online dynamic model of AD. The EKF uses real-time AD measured data, and online dynamic model of AD to update adapted model parameters and estimate model based inferred variables for AD, which are used for AD control by AD control system having supervisory and low-level control layers. The method of operating MBR is similar to that of AD. The supervisory control ensures the WWTP satisfying the effluent quality requirement while minimize the operation cost. A WWTP having at least one of an AD or MBR is disclosed. The method of operating a WWTP can be implemented using a computer.