{"title":"Event-triggered-based subspace identification fault detection with an optimized moving window","authors":"Qi Zhang, Shenquan Wang, Wenchengyu Ji","doi":"10.1109/DDCLS58216.2023.10166698","DOIUrl":null,"url":null,"abstract":"In this paper, a fault detection (FD) method with moving window subspace identification method (MW-SIM) is proposed for the problem of difficult detection of incipient faults. Since the size of the window length has a direct relationship with the fault detection rate, the optimal window length is found by the sparrow search algorithm (SSA) to obtain the maximum fault detection rate. Furthermore, applying event-triggered strategy to subspace identification algorithms can effectively reduce data transmission. Finally, the effectiveness of the designed strategy is verified by the Tennessee Eastman (TE) process simulation.","PeriodicalId":415532,"journal":{"name":"2023 IEEE 12th Data Driven Control and Learning Systems Conference (DDCLS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE 12th Data Driven Control and Learning Systems Conference (DDCLS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DDCLS58216.2023.10166698","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, a fault detection (FD) method with moving window subspace identification method (MW-SIM) is proposed for the problem of difficult detection of incipient faults. Since the size of the window length has a direct relationship with the fault detection rate, the optimal window length is found by the sparrow search algorithm (SSA) to obtain the maximum fault detection rate. Furthermore, applying event-triggered strategy to subspace identification algorithms can effectively reduce data transmission. Finally, the effectiveness of the designed strategy is verified by the Tennessee Eastman (TE) process simulation.