CN110309612B - Power system fault processing method based on fuzzy fault Petri network - Google Patents

Power system fault processing method based on fuzzy fault Petri network Download PDF

Info

Publication number
CN110309612B
CN110309612B CN201910614152.3A CN201910614152A CN110309612B CN 110309612 B CN110309612 B CN 110309612B CN 201910614152 A CN201910614152 A CN 201910614152A CN 110309612 B CN110309612 B CN 110309612B
Authority
CN
China
Prior art keywords
fault
transition
library
confidence
event
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910614152.3A
Other languages
Chinese (zh)
Other versions
CN110309612A (en
Inventor
李明
刘一龙
田绍华
孙闯
陈雪峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CN201910614152.3A priority Critical patent/CN110309612B/en
Publication of CN110309612A publication Critical patent/CN110309612A/en
Application granted granted Critical
Publication of CN110309612B publication Critical patent/CN110309612B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/20Design optimisation, verification or simulation
    • G06F30/22Design optimisation, verification or simulation using Petri net models

Abstract

The invention discloses a power system fault processing method based on a fuzzy fault Petri network, which comprises the following steps: establishing an incidence relation between a component and a system fault based on a fault type of a power system, establishing a fuzzy fault Petri network and a modeling rule, wherein the fuzzy fault Petri network continuously changes the state of the system according to a transition enabling rule and an occurrence rule, describes the dynamic characteristic of the system, and obtains a fault event confidence coefficient, transition ignition and an event fault inference process based on a forward inference algorithm so as to obtain a basic event confidence coefficient, a transition ignition sequence and a fault propagation path; obtaining a search path of the fault based on a reverse reasoning algorithm to obtain a rapid diagnosis strategy of the fault; and (4) realizing the processing of system-level faults based on a forward and backward reasoning diagnosis algorithm.

Description

Power system fault processing method based on fuzzy fault Petri network
Technical Field
The invention belongs to the field of fault detection, and particularly relates to a power system fault processing method based on a fuzzy fault Petri network.
Background
Armored vehicles are major army warfare weaponry for ground assault and counterassault, and the reliability of tasks is an important index of the operational performance of armored vehicles. The actual use environment of the device is complex, and the device is often in a severe environment with high speed, large load and strong vibration impact, so that the failure frequency is caused, and the maintenance cost reaches more than 72 percent of the total life cost of the device according to statistics. The power system is a multi-fault component, and the fault frequency of the power system accounts for about 51 percent of the total fault number of the whole vehicle. Due to the fact that the structure is complex, the load is variable, and the information uncertainty is strong, the failure prediction and the quick repair difficulty are increased. With the wide application of high and new technologies, the tactical performance of modern armor equipment is continuously improved, the system composition structure is increasingly complex, and the use and guarantee cost is increasingly huge. Therefore, the fault prediction and diagnosis of the armored vehicle is important work for researching the reliability, maintainability and supportability of equipment, and the accurate fault prediction and diagnosis has important theoretical and practical significance for guiding the maintenance and the guarantee of the armored vehicle, avoiding unnecessary harm caused by blind disassembly, shortening the fault identification time and the like. The power system of the armored vehicle plays an important role in playing the maneuvering performance of the vehicle, and the power system is a complex system mainly composed of 11 subsystems such as a crank link mechanism, a linkage mechanism, a gas distribution mechanism, a turbocharger, a cooling system, a lubricating system, an air supply system, a fuel supply system, a heating system, an exhaust system and a starting system. Due to the fact that the system is complex in structure, severe in use environment, variable in load and strong in information uncertainty, the failure generation mechanism of the power system is more complex, the failure rate of the power system is high, and the failure prediction and rapid repair difficulty is increased. Most of the traditional fault monitoring and diagnosis aims at a certain device or subsystem, the possible faults are deduced through the correlation analysis of a large number of alarms, the fault diagnosis only carried out on a certain device or a certain link cannot realize the high reliability and the high maintainability of the whole system from the system level, the normal operation of the system can be influenced, and the occurrence of catastrophic accidents is caused.
The above information disclosed in this background section is only for enhancement of understanding of the background of the invention and therefore it may contain information that does not form the prior art that is already known in this country to a person of ordinary skill in the art.
Disclosure of Invention
The invention aims to realize the purpose through the following technical scheme, and the power system fault processing method based on the fuzzy fault Petri network comprises the following steps:
in the first step, the incidence relation between the components and the system faults is established based on the fault type of the power system,
in the second step, a fuzzy fault Petri net and a modeling rule are established, the fuzzy fault Petri net continuously changes the state of the system according to the transition enabling rule and the occurrence rule and describes the dynamic characteristic of the system, wherein the fuzzy fault Petri net is defined as a 12-tuple (P, T, I, O, K, T)t,M,w,f,α,λ,Uμ) Wherein: p ═ P1,p2,…,pmIs a collection of non-empty finite libraries representing a collection of system failure events, T ═ T1,t2,…tnThe method is characterized in that the method is a non-empty finite transition set, represents state change or behavior action of a simulated system, and reflects propagation evolution of internal faults of the system, and I: p × T is an input matrix, representing Pi→tjIn the middle ofDirected arc of (i.e. transition t)jIs input arc of, and piTo transition tjI ═ 1, 2, …, m; j is 1, 2, …, n; o: t × P is the output matrix, representing the output from Tj→piDirected arcs existing between, i.e. transitions tjIs output arc of, and piTo transition tjI is 1, 2, …, m; j is 1, 2, …, n; k: p → [0, 1]Is the capacity function of the fault Petri net; t ist: triggered transition vector with initial value of T0 t=(0,0,…,0)TThe element is set to 1 after the same fault occurs, which means that the element cannot occur again before being repaired; m ═ M1,m2,…,mm)TDistribution vectors, m, identified for the libraryiIdentify its corresponding depot piState of (1), m0Is the initial vector identification of the library, and represents the initial state of the simulated system; w ═ w (w)1,w2,…,wn)TIs a library site fault event weight vector, reflects the input library site pkDegree of influence on transition t, wherein
Figure BDA0002121996740000021
pkIs e.g. I and
Figure BDA0002121996740000022
f=(f1,f2,…,fm)Tis a fuzzy probability threshold vector of the fault event of the library, and the confidence coefficient alpha of the fault eventi>fiA fault event may be considered true, otherwise it is false; α ═ α (α)1,α2,…,αm)TFor fault event confidence vectors, including αdefault’αINAnd alphaOUT’αdefaultObtaining a default fault event confidence coefficient vector according to fault statistics, wherein the default fault event confidence coefficient vector comprises all the libraries; alpha is alphaINFor inputting a confidence coefficient vector of a fault event, performing component fault diagnosis according to sensor monitoring data and acquiring the component fault after the component fault diagnosis, wherein the element is an initial library;αOUTObtaining a confidence coefficient vector of the output fault event according to a forward reasoning algorithm, wherein elements are all the libraries except the initial library; λ ═ λ1,λ2,…,λn)TA confidence threshold representing that a lower-level fault causes a higher-level fault; u shapeμ=diag(μ1,μ2,…,μn) Denotes a transition confidence matrix, μjRepresents a transition tjReliability of, muj∈[0,1]1, 2, …, N, defining a vector Nμ=(μ1,μ2,…,μn)TRepresenting a transition confidence vector;
in the third step, a fault event confidence coefficient, transition ignition and an event fault reasoning process are obtained based on a forward reasoning algorithm so as to obtain a basic event confidence coefficient, a transition ignition sequence and a fault propagation path; obtaining a search path of the fault based on a reverse reasoning algorithm to obtain a rapid diagnosis strategy of the fault; and diagnosing the system-level fault based on a forward and backward reasoning diagnosis algorithm.
In the method, in the first step, the power system is an armored vehicle power plant which comprises the following components: the system comprises a crank connecting rod mechanism, a linkage mechanism, a gas distribution mechanism, a turbocharger, a cooling system, a lubricating system, an air supply system, a fuel supply system, a heating system, an exhaust system and a starting system, wherein the correlation relation is obtained according to the hierarchy and the relativity, the hierarchy is the longitudinal direction of faults, high-level faults can be caused by low-level faults, and the low-level faults can certainly cause the high-level faults; the correlation is the "transversal" of the fault, and is a system composed of a plurality of interconnected subsystems, and the fault of the subsystem is caused by the fault propagation of the subsystem related to the fault or the next-stage subsystem.
In the method, in the second step, when p is1Then p2Occurrence of t·={p2Denotes if library p1Reach a repository p only through a unique transition t2And the last set of transitions t is only { p }2The transition enables to satisfy α1W μ > λ, i.e. librariesTo p is1The actual confidence of the rule is greater than the threshold required for transition triggering, and the confidence of the fault event after triggering is alpha2=α1wμ。
In the method, the second step, when p is1And p2… and pnGeneration, pkOccurrence of t·={pk}, library site p1The actual credibility of the rule is larger than the threshold value required by the transition trigger, and the transition enable meets min (alpha)1w1μ,α2w2μ,…,αnwnMu) > lambda, i.e. library p1,p2,…,pnThe minimum of the actual confidence levels for the rules is greater than the threshold required for transition triggering, and the confidence level alpha of the fault event after triggering is triggeredk=min(α1w1μ,α2w2μ,…αnwnμ)。
In the method, the second step, when p isjP after occurrence1And p2… and pnOccurrence of t·={p1,p2,…,pnDenotes if library p1,p2,…,pnAll can reach the library site p simultaneously through the transition t1,p2,…,pnAnd the last set of transitions t is only { p }1,p2,…,pnThe transition enables to satisfy αjW μ > λ is triggered, i.e. library p1,p2,…,pnThe minimum of the actual confidence levels for the rules is greater than the threshold required for transition triggering, and the confidence level alpha of the fault event after triggering is triggered1=α2=…=αn=αj*w*μ。
In the method, the second step, when p is1And p2… and pnP after occurrencekThe occurrence of this is that,
Figure BDA0002121996740000041
i.e. depot p1,p2,…,pnActual confidence in rulesThe minimum is larger than the threshold required for triggering the transition, if the transition can satisfy max (alpha)1w1μ1,α2w2μ2,…,αnwnμn) λ, i.e. library p1,p2,…,pnThe maximum actual reliability of the rule is triggered as long as the maximum actual reliability is larger than the threshold required by the transition trigger, and the confidence alpha of the fault event after the triggerk=max(α1w1μ1,α2w2μ2,…,αnwnμn)。
In the method, the second step, when p isj1And pj2… and pjmP after occurrencek1And pk2… and pknOccurrence of t·={pk1,pk2,…,pknDenotes if library pj1,pj2,…,pjnAll can reach the library site p through transition tk1,pk2,…,pknAnd the last set of transitions t is only { p }k1,pk2,…,pknIf the transition is enabled to satisfy min (alpha)j1w1μ,αj2w2μ,…,αjmwmMu) > lambda, i.e. library p1,p2,…,pnThe minimum actual confidence of the rules is larger than the threshold value required by transition triggering, and the confidence alpha of the fault event after triggering is triggeredk1=αk2=…=αkn=min(αj1w1μ,αj2w2μ,…αjmwmμ)。
In the third step, the method adopts MYCIN confidence matrix reasoning method to gradually deduce and obtain all state quantities of system components, and defines 3 operators: operator for taking large value
Figure BDA0002121996740000042
A, B and C are all m × n matrix, then Cij=max(αij,bij) I 1, 2, …, m, j 1, 2, …, n, multiplicationOperator
Figure BDA0002121996740000043
Figure BDA0002121996740000044
A, B and C are the matrix of m × q, q × n and m × n respectively, then
Figure BDA0002121996740000045
Direct multiplier operator: c is A, B, C is m-dimensional vector, then Ci=ai·bi,i=1,2,…,m
The confidence inference formula for an event is:
Figure BDA0002121996740000051
in the formula, alphak+1And alphakThe confidence degrees of the event at the k-th inference and the k + 1-th inference are respectively; o is an output matrix representing the output from tj→piDirected arcs existing between, i.e. transitions tjIs output arc of, and piTo transition tjI is 1, 2, …, m; j is 1, 2, …, n; u shapeμRepresenting a transition confidence matrix, element mujRepresents a transition tjReliability of, muj∈[0,1],j=1,2,…,n;ITFor input matrix, representing from pi→tjDirected arcs existing between, i.e. transitions tjIs input arc of, and piTo transition tjI ═ 1, 2, …, m; j is 1, 2, …, n; w is the weight vector of the failure event in the library, which reflects the p input into the librarykDegree of influence on transition t, wherein
Figure BDA0002121996740000058
pkIs e.g. I and
Figure BDA0002121996740000057
Figure BDA00021219967400000510
is an m-dimensional vector, describes the confidence that the rule is true,
the reasoning process is as follows:
the first step is as follows: initializing parameters;
the second step is that: k is 0;
the third step: from alphakCalculating to obtain alphak+1
The fourth step: if α isk+1≠αkRepeating the third step; if α isk+1=αkAnd the reasoning is finished.
In the method, in the third step, the reasoning process of transition ignition is as follows:
the first step is as follows: initializing parameters;
the second step is that: according to
Figure BDA0002121996740000053
Calculating the transition support, wherein Dk+1,DkRespectively identifying the potential enabling transition support degree of the event at the kth time and the kth +1 time; n is a radical ofμ=(μ1,μ2,…,μn)TRepresenting a transition confidence vector; alpha is alphakThe confidence of the k-th inference for the event; i isTFor input matrix, representing from pi→tjDirected arcs existing between, i.e. transitions tjIs input arc of, and piTo transition tjI ═ 1, 2, …, m; j is 1, 2, …, n; w is the weight vector of the failure event in the library, which reflects the p input into the librarykDegree of influence on transition t, wherein
Figure BDA0002121996740000059
pkIs e.g. I and
Figure BDA0002121996740000054
Figure BDA0002121996740000055
is an m-dimensional vector describing the confidence that the rule is true;
the third step: according to
Figure BDA0002121996740000056
Calculating the triggered transition vector TtIn the formula, Tk+1 t,Tk tRespectively identifying triggered transition vectors at the kth time and the kth +1 time; dkIdentifying a support for the event at the kth potential enabling transition; λ ═ λ1,λ2,…,λn)TA confidence threshold representing that a lower-level fault causes a higher-level fault; alpha is alphakThe confidence of the k-th inference for the event; i isTFor input matrix, representing from pi→tjDirected arcs existing between, i.e. transitions tjIs input arc of, and piTo transition tjI ═ 1, 2, …, m; j is 1, 2, …, n; f. ofkIs a fuzzy probability threshold vector of the fault event of the kth inference bank;
the fourth step: according to
Figure BDA0002121996740000061
Calculating a fault event vector M, where Mk+1,MkFault event vectors for the kth and the (k + 1) th times, respectively; t isk tIdentifying the triggered transition vector for the kth time; o is an output matrix representing the output from tj→piDirected arcs existing between, i.e. transitions tjIs output arc of, and piTo transition tjI is 1, 2, …, m; j is 1, 2, …, n;
the fifth step: if M isk+1≠MkRepeating the second step; if M isk+1=MkAnd the reasoning is finished.
In said method, taIs a transition, pi,pj,pkThree libraries if pi·ta,pj∈ta ·Then p isiIs referred to as pjTo go back to the associated repository, pjIs referred to as piIf p is an immediate look-ahead associative base ofiIs pjTo go back to the associated repository, pjIs pkThe immediate backtracking of the associated library is called piIs pkIf p is a backtracking relationship ofi·taAnd p isk·taThen is called piAnd pkTo transition taThe adjacent library of (1) contains piThe set of immediate backtracking associative banks is called piIs collected as IHS (p)i) (ii) a Comprising piThe set of backtracking associative libraries is called piIs collected as HS (p)i) And the reverse reasoning process:
the first step is as follows: initializing parameters;
the second step is that: finding a terminating node pjIt is used as the initial target repository (p)j,IHS(pj) Whereinsaid: p is a radical ofjIs the place of the target library,·pj=tj,IHS(pj) Is the target depot pjTo compute an initial target library IHS (p)j) Failure incidence of all elements;
the third step: searching a library p corresponding to the maximum fault susceptibility in all unsearched pathskIt is used as the initial target repository (p)k,IHS(pk) If IHS (p)k) If the node is an empty set, the node is a termination node, the node returns to the immediate look-ahead association library, the third step is repeated, and otherwise the next step is carried out;
the fourth step: if IHS (p)k) And if not, proceeding downwards according to the method of the third step until all the libraries are traversed.
Compared with the prior art, the invention has the following advantages:
the method is simple and easy to implement, breaks through the nondeterministic fault propagation modeling technology of complex equipment, and solves the difficult problems of characterization and description of a fault model.
Drawings
Various other advantages and benefits of the present invention will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. It is obvious that the drawings described below are only some embodiments of the invention, and that for a person skilled in the art, other drawings can be derived from them without inventive effort. Also, like parts are designated by like reference numerals throughout the drawings.
In the drawings:
FIG. 1 is a schematic diagram of the steps of the power system fault processing method based on the fuzzy fault Petri net;
FIG. 2 is a schematic structural hierarchy diagram of a power device of an armored vehicle based on the fuzzy fault Petri net power system fault processing method;
3(a) -3 (b) are schematic diagrams of the type of 'one-in-one-result' of the fuzzy fault Petri net based power system fault handling method of the invention;
4(a) -4 (b) are schematic diagrams of the type of "multi-factor one-fruit" of the fuzzy fault Petri net based power system fault handling method of the invention;
5(a) -5 (b) are schematic diagrams of the type of "one-cause-many-effect" of the fuzzy fault Petri net based power system fault handling method of the invention;
6(a) -6 (b) are schematic diagrams of the type of "competition mode" of the fuzzy fault Petri net based power system fault handling method of the invention;
7(a) -7 (b) are schematic diagrams of the type of "multi-factor and multi-effect" of the fuzzy fault Petri net based power system fault handling method of the invention;
FIG. 8 is a schematic diagram of an event confidence reasoning process of the fuzzy fault Petri net based power system fault processing method;
FIG. 9 is a schematic diagram of an intelligent diagnosis reasoning process of the fuzzy fault Petri net based power system fault processing method;
FIG. 10 is a schematic diagram of a fuzzy fault Petri network for engine oil temperature overhigh in the power system fault processing method based on the fuzzy fault Petri network.
The invention is further explained below with reference to the figures and examples.
Detailed Description
Specific embodiments of the present invention will be described in more detail below with reference to the accompanying drawings, fig. 1-10. While specific embodiments of the invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
It should be noted that certain terms are used throughout the description and claims to refer to particular components. As one skilled in the art will appreciate, various names may be used to refer to a component. This specification and claims do not intend to distinguish between components that differ in name but not function. In the following description and in the claims, the terms "include" and "comprise" are used in an open-ended fashion, and thus should be interpreted to mean "include, but not limited to. The description which follows is a preferred embodiment of the invention, but is made for the purpose of illustrating the general principles of the invention and not for the purpose of limiting the scope of the invention. The scope of the present invention is defined by the appended claims.
For the purpose of facilitating understanding of the embodiments of the present invention, the following description will be made by taking specific embodiments as examples with reference to the accompanying drawings, and the drawings are not to be construed as limiting the embodiments of the present invention.
For better understanding, fig. 1 is a schematic flow chart of a power system fault handling method based on a fuzzy fault Petri net according to an embodiment of the invention, and as shown in fig. 1, the power system fault handling method based on the fuzzy fault Petri net comprises the following steps:
in a first step S100, an association relationship between a component and a system fault is established based on the fault type of the power system,
in a second step S200, a fuzzy fault Petri net and a modeling rule are established, the fuzzy fault Petri net continuously changes the state of the system according to a transition enabling rule and a generating rule, and describes the dynamic characteristics of the system, wherein,
the fuzzy fault Petri net is defined as 12 tuples (P, T, I, O, K, T)t,M,w,f,α,λ,Uμ) Wherein: p ═ P1,p2,…,pmIs a collection of non-empty finite libraries representing a collection of system failure events, T ═ T1,t2,…tnThe method is characterized in that the method is a non-empty finite transition set, represents state change or behavior action of a simulated system, and reflects propagation evolution of internal faults of the system, and I: p × T is an input matrix, representing Pi→tjDirected arcs existing between, i.e. transitions tjIs input arc of, and piTo transition tjI ═ 1, 2, …, m; j is 1, 2, …, n; o: t × P is the output matrix, representing the output from Tj→piDirected arcs existing between, i.e. transitions tjIs output arc of, and piTo transition tjI is 1, 2, …, m; j is 1, 2, …, n; k: p → [0, 1]Is the capacity function of the fault Petri net; t ist: triggered transition vector with initial value of T0 t=(0,0,…,0)TThe element is set to 1 after the same fault occurs, which means that the element cannot occur again before being repaired; m ═ M1,m2,…,mm)TDistribution vectors, m, identified for the libraryiIdentify its corresponding depot piState of (1), m0Is the initial vector identification of the library, and represents the initial state of the simulated system; w ═ w (w)1,w2,…,wn)TIs a library site fault event weight vector, reflects the input library site pkDegree of influence on transition t, wherein
Figure BDA0002121996740000091
pkIs e.g. I and
Figure BDA0002121996740000092
f=(f1,f2,…,fm)Tis a fuzzy probability threshold vector of the fault event of the library, and the confidence coefficient alpha of the fault eventi>fiA fault event may be considered true, otherwise it is false; α ═ α (α)1,α2,…,αm)TFor fault event confidence vectors, including αdefault,αINAnd alphaOUT,αdefaultObtaining a default fault event confidence coefficient vector according to fault statistics, wherein the default fault event confidence coefficient vector comprises all the libraries; alpha is alphaINObtaining a component fault diagnosis according to sensor monitoring data after inputting a fault event confidence coefficient vector, wherein the element is an initial library; alpha is alphaOUTObtaining a confidence coefficient vector of the output fault event according to a forward reasoning algorithm, wherein elements are all the libraries except the initial library; λ ═ λ1,λ2,…,λn)TA confidence threshold representing that a lower-level fault causes a higher-level fault; u shapeμ=diag(μ1,μ2,…,μn) Denotes a transition confidence matrix, μjRepresents a transition tjReliability of, muj∈[0,1]J 1, 2, …, N, defining a vector Nμ=(μ1,μ2,…,μn)TRepresenting a transition confidence vector;
in the third step S300, a fault event confidence, a transition firing sequence and a fault propagation path are obtained based on a forward reasoning algorithm to obtain a basic event confidence, a transition firing sequence and a fault propagation path; obtaining a search path of the fault based on a reverse reasoning algorithm to obtain a rapid diagnosis strategy of the fault; and diagnosing the system-level fault based on a forward and backward reasoning diagnosis algorithm.
The invention is particularly suitable for fault treatment of a power device of an armored vehicle, and in the embodiment, the fault treatment method of the power system based on the fuzzy fault Petri network comprises the following steps:
1) analyzing different fault types of the armored vehicle power device, determining the incidence relation between key components and system faults, describing the relation among systems, subsystems and equipment from a system level, and analyzing the fault mode and the fault level of the armored vehicle power device by considering the relation among the whole system, parts, structures and levels.
2) Defining a fuzzy fault Petri net and determining a modeling rule.
3) A forward reasoning algorithm is proposed to obtain a fault event confidence coefficient, a transition ignition and a reasoning process of event faults, and a basic event confidence coefficient, a transition ignition sequence and a fault propagation path are obtained; a reverse reasoning algorithm is proposed to obtain a search path of the fault and obtain a rapid diagnosis strategy of the fault; and a forward and backward reasoning intelligent diagnosis algorithm is provided to realize the diagnosis of system-level faults.
The step 1) comprises the following specific steps:
firstly, analyzing the structure of the power device of the armored vehicle to obtain 11 subsystem structures which comprise a crank link mechanism, a linkage mechanism, a gas distribution mechanism, a turbocharger, a cooling system, a lubricating system, an air supply system, a fuel supply system, a heating system, an exhaust system, a starting system and the like and are mutually influenced, and then analyzing the hierarchy and the relevance of the faults of the power system of the armored vehicle. Hierarchical, i.e., "longitudinal" to failure, a high level failure may be caused by a low level failure that must cause a high level failure; the correlation, namely the 'transversal' of the fault, is a system composed of a plurality of interconnected subsystems, and the fault of some subsystems is often caused by the fault propagation of the related subsystem or the next-level subsystem, thereby showing the correlation. Finally, the fault level of the armored vehicle power device is obtained, and the figure 2 is shown. The failure modes of the power device are counted and analyzed, and common failure modes are obtained and are shown in the table 1.
TABLE 1 common faults of power system of armored car
Figure BDA0002121996740000101
Figure BDA0002121996740000111
The failure modes from the complete machine to each subsystem to each component unit node are shown in table 2.
TABLE 2 failure modes of various subsystems of the power system of an armored vehicle
(a) Crank connecting rod mechanism
Figure BDA0002121996740000112
Figure BDA0002121996740000121
(b) Transmission mechanism
Serial number Numbering Failure mode Hazard classification
1. f201 Broken tooth of transmission gear II
2. f202 Abnormal wear of tooth surface of transmission gear II
3. f203 Fatigue crack of transmission case III
4. f204 Bearing wear III
5. f205 Bending or breaking of shafts II
(c) Valve train
Serial number Numbering Failure mode Hazard classification
1. f301 Peach-shaped abrasion of distribution camshaft II
2. f302 Abnormal wear of rocker roller II
3. f303 Breaking of rocker arm II
4. f304 Valve spring damage II
5. f305 Valve seat ring wear II
6. f306 Valve wear II
7. f307 Valve damage II
(d) Supercharging intake and exhaust system
Serial number Numbering Failure mode Hazard classification
1. f401 Compressor wheel blade fracture or damage I
2. f402 Loosening of back plate of compressor II
3. f403 Turbine wheel breakage or damage I
4. f404 Loosening of compressor impeller II
5. f405 Abnormal wear of rotor shaft system parts III
6. f406 Intermediate leakage engine oil III
7. f407 Cracking and air leakage of exhaust pipe III
8. f408 Leakage of the exhaust gasket III
9. f409 Bellows rupture III
10. f410 Clamp fracture III
(e) Cooling system
Serial number Numbering Failure mode Hazard classification
1. f501 Damage of water pump impeller II
2. f502 Water leakage of water pump III
3. f503 The impeller of the water pump can not rotate III
4. f504 Cavitation of water pump III
5. f505 Intercooling efficiency drop III
6. f506 Intercooler reveals III
(f) Lubrication system
Serial number Numbering Failure mode Hazard classification
1. f601 Pump cavity or gear damage of engine oil pump II
2. f602 Engine oil heat exchanger III
3. f603 Reduction in heat dissipation efficiency of engine oil heat exchanger III
4. f604 Clogging or breakdown of oil filter element III
(g) Electric control system
Serial number Numbering Failure mode Hazards, etcStage
1. f701 Sensor failure III
2. f702 Pedal potentiometer failure III
3. f703 ECU failure, failure of speed regulation II
4. f704 Virtual, open or short-circuit of cables III
5. f705 Oil pressure sensor failure III
6. f706 Water temperature sensor failure III
7. f707 Exhaust temperature sensor failure III
(h) Fuel supply system
Serial number Numbering Failure mode Hazard classification
1. f801 Low pressure pump failure III
2. f802 High pressure pump failure III
3. f803 High pressure pump temperature overshoot III
4. f804 Untight seal of fuel filter III
5. f805 Fuel filter element blockage III
6. f806 Fuel injector not being able to open III
7. f807 Fuel injector failing to close II
8. f808 Excessive oil return of oil injector III
9. f809 The pressure regulating valve is normally open or blocked III
10. f810 Leakage at sealing joint of high-pressure oil pipe III
11. f811 Fracture of high pressure oil pipe III
The step 2) is specifically as follows:
firstly, defining the fuzzy fault Petri net. Aiming at the characteristics of multilevel, multi-relevance, uncertainty and the like of the armored vehicle power system fault, the fuzzy fault Petri network definition is provided by taking a fuzzy theory and a Petri network theory as cores.
The fuzzy fault Petri net (FFPetri net) is defined as a 12-tuple (P, T, I, O, K, T)t,M,w,f,α,λ,Uμ):
Wherein: (1) p ═ P1,p2,…,pmThe set of non-empty finite libraries represents the set of system failure events.
(2)T={t1,t2,…tnAnd the finite transition set is a non-empty finite transition set, represents the state change or behavior action of the simulated system, and reflects the propagation evolution of the internal fault of the system.
(3) I: p × T is an input matrix, representing Pi→tjDirected arcs existing between, i.e. transitions tjIs input arc of, and piTo transition tjThe input library of (1). i is 1, 2, …, m; j is 1, 2, …, n.
(4) O: t × P is the output matrix, representing the output from Tj→piDirected arcs existing between, i.e. transitions tjIs output arc of, and piTo transition tjThe output depot. i is 1, 2, …, m; j is 1, 2, …, n.
(5) K: p → [0, 1] is the capacity content of the faulty Petri net.
(6)Tt: triggered transition vector with initial value of T0 t=(0,0,…,0)TAnd the propagation path is used for identifying the fault and preventing the transition from occurring repeatedly, namely after the same fault occurs, the element is set to be 1, which means that the element cannot occur again before being repaired.
(7)M=(m1,m2,…,mm)TDistribution vectors, m, identified for the libraryiIdentify its corresponding depot piThe state of (1). m is0Is the initial vector identification of the library, representing the initial state of the system being simulated.
(8)w=(w1,w2,…,wn)TIs a library site fault event weight vector, reflects the input library site pkDegree of influence on transition t, wherein
Figure BDA0002121996740000141
pkIs e.g. I and
Figure BDA0002121996740000142
(9)f=(f1,f2,…,fm)Tis a fuzzy probability threshold vector of the fault event of the library, and the confidence coefficient alpha of the fault eventi>fiA fault event may be considered true, otherwise it is false.
(10)α=(α1,α2,…,αm)TIs a fault event confidence vector. Comprising alphadefault,αINAnd alphaOUT。αdefaultObtaining a default fault event confidence coefficient vector according to fault statistics, wherein the default fault event confidence coefficient vector comprises all the libraries; alpha is alphaINObtaining a component fault diagnosis according to sensor monitoring data after inputting a fault event confidence coefficient vector, wherein the element is an initial library; alpha is alphaOUTAnd acquiring elements of all the libraries except the initial library according to a forward reasoning algorithm for outputting the confidence coefficient vector of the fault event.
(11)λ=(λ1,λ2,…,λn)TA confidence threshold representing that a lower level fault causes a higher level fault.
(12)Uμ=diag(μ1,μ2,…,μn) Denotes a transition confidence matrix, μjRepresents a transition tjReliability of, muj∈[0,1]J is 1, 2, …, n. Definition vector Nμ=(μ1,μ2,…,μn)TA transition confidence vector is represented.
And the fuzzy fault Petri network continuously changes the state of the system according to the transition enabling rule and the occurrence rule and describes the dynamic characteristic of the system.
Definition 1: transition enable (enabled). At the current markUnder M recognition, transition tjIs enabled if and only if:
Figure BDA0002121996740000151
Figure BDA0002121996740000152
equation (1) indicates that the actual confidence level of the rule for the library p should be greater than or equal to the threshold required for transition triggering. Equation (2) requires that the transition does not belong to the triggered set of transitions, i.e., transition tjHas not yet been triggered.
Definition 2: the consequence of the transition is. In the Petri network theory, the triggering of the transition only changes the state of a library associated with the transition, and in the fault propagation process, the fault does not eliminate the fault reason. Therefore, the occurrence consequence of the transition of the fuzzy fault Petri net only changes the post-repository of the transition, and T is used for changing the post-repository of the transition after the transition occurst=Tt+{tj}。
Definition 3: failure is easy to occur. The product of the confidence of a fault event and the fault rate of the event is referred to as the fault susceptibility f (p)i)。
And finally establishing a modeling rule according to the fault propagation mode. Because there are one-cause, one-cause multiple-effect, competition mode and multi-cause multiple-effect fault propagation modes in the fault propagation process, the corresponding transition occurrence result can be related to the synthetic fuzzy generation rule, that is, the precondition or conclusion part in the fuzzy generation rule contains the conjunction word "and", "or". The invention adopts an inaccurate reasoning method based on credibility in a MYCIN system, and has the main idea that the truth value of a fuzzy proposition combination formula takes the minimum value of each sub-formula truth value, the truth value of a fuzzy proposition analysis formula takes the maximum value of each sub-formula truth value, and the total number of the fuzzy proposition analysis formula is 5 types.
(1) Type "one in one fruit": IF p1 Then p2,t·={p2The transition enables to satisfy α1W μ > λ, is triggered and the confidence of the fault event after triggering, α2=α1w μ, as shown in fig. 3(a) -3 (b), where w is 1. Failure incidence rate f (p)1)=α1μ。
(2) Type "multi-cause one fruit": IF p1 AND p2 AND…AND pn THEN pk,t·={pkThe transition enables to satisfy min (alpha)1w1μ,α2w2μ,…,αnwnμ) > λ, is triggered and a post-trigger fault event confidence αk=min(α1w1μ,α2w2μ,…αnwnMu), which is also called "condition and" mode, as shown in FIGS. 4(a) -4 (b), wherein
Figure BDA0002121996740000153
Failure incidence rate f (p)1,2,...n)=min(α1μ,α2μ,…αnμ)。
(3) Type "one-cause-more-fruits": IF pj THEN p1 AND p2 AND…AND pn,t·={p1,p2,…,pnp1,p2,...,pnThe transition enables to satisfy αjW μ > λ is triggered and the confidence of the fault event after triggering α1=α2=…=αn=αjW μ, this type is also called "conclusion and" pattern, as shown in fig. 5(a) -5 (b), where w is 1. Failure incidence rate f (p)j)=αjμ。
(4) The "contention mode" type: IF p1 AND p2 AND…AND pn THEN pk
Figure BDA0002121996740000161
If the transition enable satisfies max (alpha)1w1μ1,α2w2μ2,…,αnwnμn) Is triggered if lambda is greater than lambda, namely the confidence of fault event alpha after triggeringk=max(α1w1μ1,α2w2μ2,…,αnwnμn) This type is also called "condition or" mode ", as shown in FIGS. 6(a) -6 (b), where w1=w2=…=wn1. Failure incidence rate f (p)1)=α1μ1,f(p2)=α2μ2,…,f(pn)=αnμn
(5) Type "multifactorial and multifruit": IF pj1 AND pj2 AND…AND pjm THEN pk1 AND pk2 AND…AND pknIf the transition enable satisfies min (. alpha.)j1w1μ,αj2w2μ,…,αjmwmMu) > lambda is triggered, i.e. the confidence of the fault event after triggering, alphak1=αk2=…=αkn=min(αj1w1μ,αj2w2μ,…αjmwmμ). Failure incidence rate f (p)j1,j2,...jm)=min(αj1μ,αj2μ,…,αjmμ) as shown in fig. 7(a) to 7 (b).
According to the characteristics of fault propagation, fault information flows in the fault Petri network, and after the transition occurs, the number of the Tokens in the library does not change, but a new Token is generated in the output library of the transition. In this case, according to the conventional Petri net theory, the transition will occur endlessly and repeatedly, which violates the propagation characteristics of the fault. For this purpose, in a failure Perti network, a set of transition states T is introducedtWhen a transition occurs, the corresponding element value is set to 1, which indicates that the fault has propagated along the path, so the transition should not occur any more.
The Petri net has the hierarchical characteristic, and the hierarchical problem of the fault can be well solved by utilizing the hierarchical characteristic. For an armored vehicle power plant, the system can be divided into a plurality of subsystems according to a hierarchical concept, and each subsystem is modeled by utilizing a fault Petri network. And then, the target library of the low-level fault Petri net is used as an input library of the high-level fault Petri net, so that the problem of the hierarchy of the complex system is solved. For delayed nature of the failure, the transition or library may be associated with a function of time.
The step 3) is specifically as follows:
firstly, a fault propagation process is described through reasoning on event confidence coefficient and reasoning on transition ignition and fault events, forward reasoning is completed, and the fault state is evaluated.
(1) Inference of event confidence
As shown in fig. 8, through a modeling rule, a MYCIN confidence matrix reasoning method is adopted to obtain all state quantities of system elements through stepwise reasoning, and for convenience of reasoning, a weight element corresponding to a target library is particularly specified to be 1.
3 special operators are defined:
operator for taking large value
Figure BDA0002121996740000171
A, B and C are all m × n matrix, then Cij=max(αij,bij) I is 1, 2, …, m, j is 1, 2, …, n. Namely, it is
Figure BDA0002121996740000172
Multiplication operator
Figure BDA0002121996740000173
A, B and C are the matrix of m × q, q × n and m × n respectively, then
Figure BDA0002121996740000174
i=1,2,…,m,j=1,2,…,n。
Figure BDA0002121996740000175
Direct multiplier operator: c is A, B, C is m-dimensional vector, then Ci=ai·bi,i=1,2,…,m。
Figure BDA0002121996740000181
Thus, the confidence inference formula for an event can be derived as:
Figure BDA0002121996740000182
the reasoning process is as follows:
the first step is as follows: initializing parameters;
the second step is that: k is 0;
the third step: according to formula (4) from alphakCalculating to obtain alphak+1
The fourth step: if α isk+1≠αkRepeating the third step; if α isk+1=αkAnd the reasoning is finished.
(2) Transition firing and fault event reasoning
The inference formula of the transition support degree is as follows according to the modeling rule
Figure BDA0002121996740000183
By definition, when
Figure BDA0002121996740000184
When the temperature of the water is higher than the set temperature,
Figure BDA0002121996740000185
Figure BDA00021219967400001813
time of flighti
Figure BDA0002121996740000186
The transition-enabled conditions include:
condition 1:
Figure BDA0002121996740000187
middle element
Figure BDA0002121996740000188
Confidence threshold vector element λ greater than corresponding lower-level fault causing higher-level faultj
Condition 2:
Figure BDA0002121996740000189
greater than fi
By definition, Tk+1 t=F(Dk,λ,Mk)
Figure BDA00021219967400001810
Wherein, { miIs as·TjMinimal cut set { piIdentification of failure events.
Define 1 special operator:
comparison operator [ ]: c ═ A ^ B, A, B, C are m-dimensional vectors, then
Figure BDA00021219967400001811
Figure BDA00021219967400001812
For the race type, if a transition is enabled, to prevent repetitive firing, other transitions that are in race with it are considered enabled at the next inference whether or not conditions are met.
Triggered transition vector TtHas the following reasoning formula
Figure BDA0002121996740000191
The inference formula of the fault event vector M is
Figure BDA0002121996740000192
Event confidence after ignition for forward propagation is
Figure BDA0002121996740000193
Wherein alpha isfire 0=α0
Therefore, the inference process of transition firing is:
the first step is as follows: initializing parameters;
the second step is that: calculating the transition support degree according to the formula (7);
the third step: calculating the triggered transition vector T according to equation (9)t
The fourth step: calculating a fault event vector M according to equation (10);
the fifth step: if M isk+1≠MkRepeating the second step; if M isk+1=MkAnd the reasoning is finished.
Then, the fault mode/phenomenon of a certain system level is observed/monitored to explore the root cause of the fault, namely, a minimal cut set causing the fault phenomenon is found, reverse reasoning is completed, and the reasoning path is determined by the fault susceptibility.
Definition 4: let taIs a transition, pi,pj,pkThree libraries if pi·ta,pj∈ta ·Then p isiIs referred to as pjTo go back to the associated repository, pjIs referred to as piTo the immediate look-ahead associative base. If p isiIs pjTo go back to the associated repository, pjIs pkThe immediate backtracking of the associated library is called piIs pkThe backtracking associated library. If p isi·taAnd p isk·taThen is called piAnd pkTo transition taAdjacent to the library. Comprising piImmediate backtracking association ofThe set of libraries is called piIs collected as IHS (p)i) (ii) a Comprising piThe set of backtracking associative libraries is called piIs collected as HS (p)i)。
And (3) reverse reasoning process:
the first step is as follows: initializing parameters;
the second step is that: finding a terminating node pjIt is used as the initial target repository (p)j,IHS(pj) Whereinsaid: p is a radical ofjIs the place of the target library,·pj=tj,IHS(pj) Is the target depot pjTo compute an initial target library IHS (p)j) Failure incidence of all elements;
the third step: searching a library p corresponding to the maximum fault susceptibility in all unsearched pathskIt is used as the initial target repository (p)k,IHS(pk)). If IHS (p)k) If the node is an empty set, the node is a termination node, the node returns to the immediate look-ahead association library, the third step is repeated, and otherwise the next step is carried out;
the fourth step: if IHS (p)k) And if not, proceeding downwards according to the method of the third step until all the libraries are traversed.
And finally, combining reverse reasoning and forward reasoning to realize an intelligent diagnosis process.
The core idea of the forward and reverse reasoning intelligent diagnosis process is that the reverse reasoning is utilized to obtain an optimal search path, then the fault confidence coefficient of a bottom event is updated through sensing monitoring data, transition ignition judgment is carried out through the forward reasoning, and finally a fault propagation path is obtained. If the propagation path of the target event is obtained, reasoning is finished, and the bottom layer fault is considered to be the cause of the target fault; if the propagation path is not connected, the reverse reasoning is continued until the propagation path is found, and the flow is shown as 9.
Forward and reverse reasoning intelligent diagnosis process:
the first step is as follows: initializing parameters;
the second step is that: starting from a target library, obtaining a first path to a termination node through reverse reasoning;
the third step: and judging whether the path minimum cut set can be transmitted to the target library or not according to the transition ignition condition through forward transmission. If the path can reach, the fault source is found, namely the path minimal cut set is obtained; otherwise, the step goes to the second step until the fault source is found.
According to the invention, a system-level fault model is established according to the hierarchy and the correlation of the fault. And then, aiming at the characteristics of multi-level, multi-relevance, uncertainty and the like of the armored vehicle diesel engine fault, defining a fuzzy fault Petri network by taking a fuzzy theory and a Petri network theory as cores, determining a modeling rule and carrying out Petri network modeling on the armored vehicle power device. Finally, a forward reasoning algorithm is proposed to obtain the confidence coefficient of the basic event, the transition ignition sequence and the fault propagation path; a reverse reasoning algorithm is proposed to obtain a search path of the fault; and a forward and backward reasoning intelligent diagnosis algorithm is provided to realize the diagnosis of system-level faults. The method is simple and easy to implement, breaks through the non-deterministic fault propagation modeling technology of complex equipment, and solves the difficult problems of characterization and description of a fault model.
In a preferred embodiment of the method of the invention, in a first step (S100), the power system is an armored vehicle power plant comprising the following components: the system comprises a crank connecting rod mechanism, a linkage mechanism, a gas distribution mechanism, a turbocharger, a cooling system, a lubricating system, an air supply system, a fuel supply system, a heating system, an exhaust system and a starting system, wherein the correlation relation is obtained according to the hierarchy and the relativity, the hierarchy is the longitudinal direction of faults, high-level faults can be caused by low-level faults, and the low-level faults can certainly cause the high-level faults; the correlation is the "transversal" of the fault, and is a system composed of a plurality of interconnected subsystems, and the fault of the subsystem is caused by the fault propagation of the subsystem related to the fault or the next-stage subsystem.
In a preferred embodiment of the method according to the invention, in the second step (S200), when p is1Then p2Occurrence of t·={p2The transition enables to satisfy α1W μ > λ, is triggered and after triggering is thereforeConfidence of barrier event alpha2=α1wμ。
In a preferred embodiment of the method according to the invention, in the second step (S200), when p is1And p2… and pnGeneration, pkOccurrence of t·={pkThe transition enables to satisfy min (alpha)1w1μ,α2w2μ,…,αnwnμ) > λ, is triggered and a post-trigger fault event confidence αk=min(α1w1μ,α2w2μ,…αnwnμ)。
In a preferred embodiment of the method according to the invention, in the second step (S200), when p isjP after occurrence1And p2… and pnOccurrence of t·={p1,p2,…,pnThe transition enables to satisfy αjW μ > λ is triggered and the confidence of the fault event after triggering α1=α2=…=αn=αj*w*μ。
In a preferred embodiment of the method according to the invention, in the second step (S200), when p is1And p2… and pnP after occurrencekThe occurrence of this is that,
Figure BDA0002121996740000211
if the transition enable satisfies max (alpha)1w1μ1,α2w2μ2,…,αnwnμn) Is triggered if lambda is greater than lambda, namely the confidence of fault event alpha after triggeringk=max(α1w1μ1,α2w2μ2,…,αnwnμn)。
In a preferred embodiment of the method according to the invention, in the second step (S200), when p isj1And pj2… and pjmP after occurrencek1And pk2… and pknOccurs if the transition enables min (alpha)j1w1μ,αj2w2μ,…,αjmwmMu) > lambda is triggered, i.e. the confidence of the fault event after triggering, alphak1=αk2=…=αkn=min(αj1w1μ,αj2w2μ,…αjmwmμ)。
In the preferred embodiment of the method of the present invention, in the third step (S300), a MYCIN confidence matrix reasoning method is adopted to gradually infer all state quantities of system elements, and 3 special operators are defined: operator for taking large value
Figure BDA0002121996740000212
A, B and C are all m × n matrix, then Cij=max(aij,bij) I 1, 2, …, m, j 1, 2, …, n, multiplier
Figure BDA0002121996740000213
A, B and C are the matrix of m × q, q × n and m × n respectively, then
Figure BDA0002121996740000214
Direct multiplier operator: c is A, B, C is m-dimensional vector, then Ci=αi·bi,i=1,2,…,m
The confidence inference formula for an event is:
Figure BDA0002121996740000221
the reasoning process is as follows:
the first step is as follows: initializing parameters;
the second step is that: k is 0;
the third step: from alphakCalculating to obtain alphak+1
The fourth step: if α isk+1≠αkRepeating the third step; if α isk+1=αkAnd the reasoning is finished.
In a preferred embodiment of the method according to the present invention, in the third step (S300), the inference process of transition firing is:
the first step is as follows: initializing parameters;
the second step is that: according to
Figure BDA0002121996740000222
Calculating the transition support degree;
the third step: according to
Figure BDA0002121996740000223
Calculating the triggered transition vector Tt
The fourth step: according to
Figure BDA0002121996740000224
Calculating a fault event vector M;
the fifth step: if M isk+1≠MkRepeating the second step; if M isk+1=MkAnd the reasoning is finished.
In a preferred embodiment of the process according to the invention, taIs a transition, pi,pj,pkThree libraries if pi·ta,pj∈ta ·Then p isiIs referred to as pjTo go back to the associated repository, pjIs referred to as piIf p is an immediate look-ahead associative base ofiIs pjTo go back to the associated repository, pjIs pkThe immediate backtracking of the associated library is called piIs pkIf p is a backtracking relationship ofi·taAnd p isk·taThen is called piAnd pkTo transition taThe adjacent library of (1) contains piThe set of immediate backtracking associative banks is called piIs collected as IHS (p)i) (ii) a Comprising piThe set of backtracking associative libraries is called piIs collected as HS (p)i) And the reverse reasoning process:
the first step is as follows: initializing parameters;
the second step is that: finding a terminating node pjIt is used as the initial target repository (p)j,IHS(pj) Whereinsaid: p is a radical ofjIs the place of the target library,·pj=tj,IHS(pj) Is the target depot pjTo compute an initial target library IHS (p)j) Failure incidence of all elements;
the third step: searching a library p corresponding to the maximum fault susceptibility in all unsearched pathskIt is used as the initial target repository (p)k,IHS(pk) If IHS (p)k) If the node is an empty set, the node is a termination node, the node returns to the immediate look-ahead association library, the third step is repeated, and otherwise the next step is carried out;
the fourth step: if IHS (p)k) And if not, proceeding downwards according to the method of the third step until all the libraries are traversed.
For further understanding of the present invention, the use of the present invention is illustrated in the diagnostic example of excessive oil temperature.
Firstly, according to the step 1), collecting and counting failure modes of subsystems or components causing the failure of overhigh engine oil temperature, and obtaining a failure level of a component-subsystem-system level by combining the subsystem structure of the armored vehicle power device obtained by analysis in the step one.
Then according to step 2), establishing a fuzzy fault Petri net model according to the definition of the fuzzy fault Petri net and the modeling rule, such as
As shown in the figure. The failure events in the model are shown in table 3.
TABLE 3 Engine oil over-temperature fault event data sheet
Serial number Storehouse Event name
1. p008 Excessive engine oil temperature
2. p100 Crank-link mechanism failure
3. p500 Cooling system failure
4. p600 Lubrication system failure
5. p610 Oil pump
6. p620 Fault of engine oil heat exchanger
7. p630 Fault of engine oil filter
8. p611 Pump cavity or gear damage of engine oil pump
9. p621 Engine oilLeakage of heat exchanger
10. p622 Reduction in heat dissipation efficiency of engine oil heat exchanger
11. p631 Clogging or breakdown of oil filter element
12. p510 Water pump failure
13. p511 Damage of water pump impeller
14. p513 The impeller of the water pump can not rotate
15. p130 Piston assembly failure
16. p131 Piston top cracking and cylinder drawing
17. p133 Piston ablation
And finally, respectively carrying out forward reasoning, reverse reasoning and forward and reverse reasoning.
The method comprises the following specific steps:
1) forward reasoning
Setting the confidence of the fault input by the initial library:
αIN611=0.2;αIN621=0.21;αIN622=0.23;αIN631=0.25;αIN131=0.98;αIN133=0.65;αIN511=0.14;αIN513=0.24;
default fault confidence:
αdefault100=0.05;αdefault500=0.07;αdefault600=0.06;αdefault130=0.05;αdefault131=0.04;αdefault133=0.08;αdefault510=0.07;αdefault511=0.08;αdefault513=0.07;αdefault610=0.06;αdefault620=0.05;αdefault630=0.04;αdefault611=0.07;αdefault621=0.06;αdefault622=0.05;αdefault631=0.04;
migration rule confidence
μ100=0.98;μ500=0.96;μ600=0.95;μ610=1;μ620=1;μ630=1;μ611=0.98;μ621=0.98;μ622=0.97;μ631=0.98;μ130=1;μ131=0.99;μ133=0.98;μ511=0.98;μ513=0.98;μ510=1;
Confidence threshold for lower layer faults causing higher layer faults
λ100=0.6;λ500=0.6;λ600=0.5;λ610=0.5;λ620=0;λ630=0;λ611=0.4;λ621=0.5;λ622=0.4;λ631=0.4;λ130=0;λ131=0.5;λ133=0.4;λ511=0.5;λ513=0.5;λ510=0;
Fuzzy probability threshold of library fault event
f100=0.4;f500=0.5;f600=0.5;f130=0.5;f131=0.5;f133=0.5;f510=0.5;f511=0.5;f513=0.5;f610=0.6;f620=0.5;f630=0.4;f611=0.5;f621=0.6;f622=0.5;f631=0.5;f008=0.7
An inference of an event confidence vector can be obtained using equation (6):
first propagation:
α611=0.2;α621=0.21;α622=0.23;α631=0.25;α131=0.98;α133=0.65;α511=0.14;α513=0.24;α610=0.196;α620=0.2231;α630=0.245;α130=0.9702;α510=0.2352;α600=0;α100=0;α500=0;α008=0
and (3) second propagation:
α611=0.2;α621=0.21;α622=0.23;α631=0.25;α131=0.98;α133=0.65;α511=0.14;α513=0.24;α610=0.196;α620=0.2231;α630=0.245;α130=0.9702;α510=0.2352;α600=0.245;α100=0.9702;α500=0.2352;α008=0
and (3) third propagation:
α611=0.2;α621=0.21;α622=0.23;α631=0.25;α131=0.98;α133=0.65;α511=0.14;α513=0.24;α610=0.196;α620=0.2231;α630=0.245;α130=0.9702;α510=0.2352;α600=0.245;α100=0.9702;α500=0.2352;α008=0.9508
fourth propagation:
α611=0.2;α621=0.21;α622=0.23;α631=0.25;α131=0.98;α133=0.65;α511=0.14;α513=0.24;α610=0.196;α620=0.2231;α630=0.245;α130=0.9702;α510=0.2352;α600=0.245;α100=0.9702;α500=0.2352;α008=0.9508
and the third and fourth reasoning results are the same, and the reasoning is finished.
The inference of the triggered transition vector can be obtained by using equation (9):
first propagation:
Tt611_610=0;Tt621_620=0;Tt622-620=0;Tt631-630=0;Tt131-130=1;Tt133-130=1;Tt511-510=0;Tt513-510=0;Tt610-600=0;Tt620-600=0;Tt630-600=0;Tt130-100=0;Tt510-500=0;Tt600-008=0;Tt100-008=0;Tt500-008=0
and (3) second propagation:
Tt611_610=0;Tt621_620=0;Tt622-620=0;Tt631-630=0;Tt131-130=1;Tt133-130=1;Tt511-510=0;Tt513-510=0;Tt610-600=0;Tt620-600=0;Tt630-600=0;Tt130-100=1;Tt510-500=0;Tt600-008=0;Tt100-008=0;Tt500-008=0
and (3) third propagation:
Tt611_610=0;Tt621_620=0;Tt622-620=0;Tt631-630=0;Tt131-130=1;Tt133-130=1;Tt511-510=0;Tt513-510=0;Tt610-600=0;Tt620-600=0;Tt630-600=0;Tt130-100=1;Tt510-500=0;Tt600-008=0;Tt100-008=1;Tt500-008=0
fourth propagation:
Tt611_610=0;Tt621_620=0;Tt622-620=0;Tt631-630=0;Tt131-130=1;Tt133-130=1;Tt511-510=0;Tt513-510=0;Tt610-600=0;Tt620-600=0;Tt630-600=0;Tt130-100=1;Tt510-500=0;Tt600-008=1;Tt100-008=1;Tt500-008=1
fifth propagation:
Tt611_610=0;Tt621_620=0;Tt622-620=0;Tt631-630=0;Tt131-130=1;Tt133-130=1;Tt511-510=0;Tt513-510=0;Tt610-600=0;Tt620-600=0;Tt630-600=0;Tt130-100=1;Tt510-500=0;Tt600-008=1;Tt100-008=1;Tt500-008=1
and the fourth and fifth reasoning results are the same, and the reasoning is finished.
The inference of the fault event vector can be obtained using equation (10):
first propagation:
M611=0;M621=0;M622=0;M631=0;M131=1;M133=0;M511=0;M513=0;M610=0;M620=0;M630=0;M130=1;M510=0;M600=0;M100=0;M500=0;M008=0
and (3) second propagation:
M611=0;M621=0;M622=0;M631=0;M131=1;M133=0;M511=0;M513=0;M610=0;M620=0;M630=0;M130=1;M510=0;M600=0;M100=1;M500=0;M008=0
and (3) third propagation:
M611=0;M621=0;M622=0;M631=0;M131=1;M133=0;M511=0;M513=0;M610=0;M620=0;M630=0;M130=1;M510=0;M600=0;M100=1;M500=0;M008=1
fourth propagation:
M611=0;M621=0;M622=0;M631=0;M131=1;M133=0;M511=0;M513=0;M610=0;M620=0;M630=0;M130=1;M510=0;M600=0;M100=1;M500=0;M008=1
and the third and fourth reasoning results are the same, and the reasoning is finished.
The inference of the firing event confidence vector can be obtained using equation (11):
first propagation:
αfire611=0.2;αfire621=0.21;αfire622=0.23;αfire631=0.25;αfire131=0.98;αfire133=0.65;αfire511=0.14;αfire513=0.24;αfire610=0;αfire620=0;αfire630=0;αfire130=0.9702;αfire510=0;αfire600=0;αfire100=0;αfire500=0;αfire008=0
and (3) second propagation:
αfire611=0.2;αfire621=0.21;αfire622=0.23;αfire631=0.25;αfire131=0.98;αfire133=0.65;αfire511=0.14;αfire513=0.24;αfire610=0;αfire620=0;αfire630=0;αfire130=0.9702;αfire510=0;αfire600=0;αfire100=0.9702;αfire500=0;αfire008=0
and (3) third propagation:
αfire611=0.2;αfire621=0.21;αfire622=0.23;αfire631=0.25;αfire131=0.98;αfire133=0.65;αfire511=0.14;αfire513=0.24;αfire610=0;αfire620=0;αfire630=0;αfire130=0.9702;αfire510=0;αfire600=0;αfire100=0.9702;αfire500=0;αfire0080.9508 fourth transmission:
αfire611=0.2;αfire621=0.21;αfire622=0.23;αfire631=0.25;αfire131=0.98;αfire133=0.65;αfire511=0.14;αfire513=0.24;αfire610=0;αfire620=0;αfire630=0;αfire130=0.9702;αfire510=0;αfire600=0;αfire100=0.9702;αfire500=0;αfire008=0.9508
and the third and fourth reasoning results are the same, and the reasoning is finished.
2) Reverse reasoning
Setting the failure incidence rate of the library:
αk100=0.05;αk500=0.07;αk600=0.06;αk130=0.05;αk131=0.04;αk133=0.08;αk510=0.07;αk511=0.08;αk513=0.07;αk610=0.06;αk620=0.05;αk630=0.04;αk611=0.07;αk621=0.06;αk622=0.05;αk631=0.04;
from the initial target repository P008From this, it immediately traces back the IHS (p) aggregated by the associative base008) Is { P100,P500,P600Due to failure incidence rate alphak500>αk600>αk100Searching the path to P in reverse500. Then it is used as the initial target library and its immediate backtracking associated library set IHS (p)500) Is { P510Reverse search path to P510. Then it is used as the initial target library and its immediate backtracking associated library set IHS (p)500) Is { P510}. Then it is used as the initial target library and its immediate backtracking associated library set IHS (p)510) Is { P511,P513Due to failure incidence rate alphak511>αk513Searching the path to P in reverse511. Due to IHS (p)511) For an empty set, the node is said to be a termination node, completing the first path (P)008→P500→P510→P511) To search for (1). Then, return its immediate look-ahead associative base P510Searching again to obtain a second path (P)008→P500→P510→P513) To search for (1). And the rest is done by analogy to finish all searching paths.
3) Forward and reverse reasoning
According to the initialization conditions, a first search path (P) is first obtained by reverse reasoning008→P500→P510→P511). Then follows the forward reasoning process, following path (P)511→P510→P500→P008) Obtaining a transition firing sequence M510=0;M500=0;M008If 1, indicating the failure of ignition, the search is reversed until the ignition path is found (P)131→P130→P100→P008),M131=1;M130=1;M100=1;M008The ignition condition is satisfied at 1. Therefore, the failure sources of piston top cracking and cylinder pulling are found.
Although the embodiments of the present invention have been described above with reference to the accompanying drawings, the present invention is not limited to the above-described embodiments and application fields, and the above-described embodiments are illustrative, instructive, and not restrictive. Those skilled in the art, having the benefit of this disclosure, may effect numerous modifications thereto without departing from the scope of the invention as defined by the appended claims.

Claims (8)

1. A power system fault processing method based on a fuzzy fault Petri net comprises the following steps:
in the first step (S100), the association relationship between the components and the faults is established based on the fault type of the power system,
in a second step (S200), a fuzzy fault Petri net and a modeling rule are established, the fuzzy fault Petri net continuously changes the state of the system to describe the dynamic characteristics of the power system according to a transition enabling rule and an occurrence rule, wherein,
the fuzzy fault Petri net is defined as 12 tuples (P, T, I, O, K, T)t,M,w,f,α,λ,Uu) Wherein: p ═ P1,p2,…,pmIs a collection of non-empty finite libraries representing a collection of system failure events, T ═ T1,t2,…tnThe method is characterized in that the method is a non-empty finite transition set, represents state change or behavior action of a simulated system, and reflects propagation evolution of internal faults of the system, and I: p × T is an input matrix, representing Pi→tjThe existence of the directional arc between the two,namely transition TjIs input arc of, and piTo transition tjI ═ 1, 2, …, m; j is 1, 2, …, n; o: t × P is an output matrix representing the output from Tj→piDirected arcs existing between, i.e. transitions tjIs output arc of, and piTo transition tjI is 1, 2, …, m; j is 1, 2, …, n; k: p → [0, 1]Is the capacity function of the fault Petri net; t ist: triggered transition vector with initial value of T0=(0,0,…,0)TThe element is set to 1 after the same fault occurs, which means that the element cannot occur again before being repaired; m ═ M1,m2,…,mm)TDistribution vectors, m, identified for the libraryiIdentify its corresponding depot piState of (1), m1Is the initial vector identification of the library, and represents the initial state of the simulated system; w ═ w (w)1,w2,…,wn)TIs a library site fault event weight vector, reflects the input library site pkDegree of influence on transition t, wherein
Figure FDA0002749355540000012
pkIs e.g. I and
Figure FDA0002749355540000011
f=(f1,f2,…,fm)Tis a fuzzy probability threshold vector of the fault event of the library, and the confidence coefficient alpha of the fault eventi>fiIf the fault event is true, otherwise, the fault event is false; α ═ α (α)1,α2,…,αm)TFor fault event confidence vectors, including αdefault,αINAnd alphaOUT,αdefaultObtaining a default fault event confidence coefficient vector according to fault statistics, wherein the default fault event confidence coefficient vector comprises all the libraries; alpha is alphaINObtaining a component fault diagnosis according to sensor monitoring data after inputting a fault event confidence coefficient vector, wherein the element is an initial library; alpha is alphaOUTObtaining a confidence coefficient vector of the output fault event according to a forward reasoning algorithm, wherein elements are all the libraries except the initial library; λ ═ λ1,λ2,…,λn)TA confidence threshold representing that a lower-level fault causes a higher-level fault; u shapeμ=diag(μ1,μ2,…,μn) Denotes a transition confidence matrix, μjRepresents a transition tjReliability of, muj∈[0,1]J 1, 2, …, N, defining a vector Nμ=(μ1,μ2,…,μn)TRepresents a transition confidence vector when p1Generation then p2Occurrence of t·={p2Denotes if library p1Reach a repository p only through a unique transition t2And the last set of transitions t is only { p }2The transition enables to satisfy α1W μ > λ, i.e. library p1The actual confidence of the rule is greater than the threshold required for transition triggering, and the confidence of the fault event after triggering is alpha2=α1wμ;
In the third step (S300), a fault event confidence coefficient, transition ignition and an event fault reasoning process are obtained based on a forward reasoning algorithm so as to obtain a basic event confidence coefficient, a transition ignition sequence and a fault propagation path; obtaining a search path of the fault based on a reverse reasoning algorithm to obtain a rapid diagnosis strategy of the fault; and diagnosing the system-level fault based on a forward and backward reasoning diagnosis algorithm.
2. The method of claim 1, wherein in a first step (S100), the power system is an armored vehicle power plant comprising the following components: the system comprises a crank connecting rod mechanism, a linkage mechanism, a gas distribution mechanism, a turbocharger, a cooling system, a lubricating system, an air supply system, a fuel supply system, a heating system, an exhaust system and a starting system, wherein the correlation relation is obtained according to the hierarchy and the relativity, the hierarchy is the longitudinal direction of faults, high-level faults can be caused by low-level faults, and the low-level faults can certainly cause the high-level faults; the correlation is the "transversal" of the fault, and is a system composed of a plurality of interconnected subsystems, and the fault of the subsystem is caused by the fault propagation of the subsystem related to the fault or the next-stage subsystem.
3. The method according to claim 1, wherein, in a second step (S200), when p is1And p2… and pnGeneration, pkOccurrence of t·={pk}, library site p1The actual credibility of the rule is larger than the threshold value required by the transition trigger, and the transition enable meets min (alpha)1w1μ,α2w2μ,…,αnwnMu) > lambda, i.e. library p1,p2,…,pnThe minimum of the actual confidence levels for the rules is greater than the threshold required for transition triggering, and the confidence level alpha of the fault event after triggering is triggeredk=min(α1w1μ,α2w2μ,…αnwnμ)。
4. The method according to claim 1, wherein, in a second step (S200), when p isjP after occurrence1And p2… and pnOccurrence of t·={p1,p2,…,pnDenotes if library p1,p2,…,pnAll can reach the library site p simultaneously through the transition t1,p2,…,pnAnd the last set of transitions t is only { p }1,p2,…,pnThe transition enables to satisfy αjW μ > λ is triggered, i.e. library p1,p2,…,pnThe minimum of the actual confidence levels for the rules is greater than the threshold required for transition triggering, and the confidence level alpha of the fault event after triggering is triggered1=α2=…=αn=αj*w*μ。
5. The method according to claim 1, wherein, in a second step (S200), when p is1And p2… and pnP after occurrencekThe occurrence of this is that,
Figure FDA00027493555400000210
i.e. depot p1,p2,…,pnThe minimum of the actual confidence in the rule is greater than the threshold required for transition triggering, and the rule is triggered if the transition enable satisfies max (alpha)1w1μ1,α2w2μ2,…,αnwnμn) λ, i.e. library p1,p2,…,pnThe maximum actual reliability of the rule is triggered as long as the maximum actual reliability is larger than the threshold required by the transition trigger, and the confidence alpha of the fault event after the triggerk=max(α1w1μ1,α2w2μ2,…,αnwnμn)。
6. The method according to claim 1, wherein in the third step (S300), the MYCIN confidence matrix reasoning method is used to deduce all state quantities of system components step by step, and 3 operators are defined: operator for taking large value
Figure FDA0002749355540000021
Figure FDA0002749355540000022
A, B and C are all m × n matrix, then Cij=max(aij,bij) I 1, 2, …, m, j 1, 2, …, n, multiplier
Figure FDA0002749355540000023
Figure FDA0002749355540000024
A, B and C are the matrix of m × q, q × n and m × n respectively, then
Figure FDA0002749355540000025
Direct multiplier operator: c is A, B, C is m-dimensional vector, then Ci=ai·bi,i=1,2,…,m
The confidence inference formula for an event is:
Figure FDA0002749355540000026
in the formula, alphak+1And alphakThe confidence degrees of the event at the k-th inference and the k + 1-th inference are respectively; o is an output matrix representing the output from tj→piDirected arcs existing between, i.e. transitions tjIs output arc of, and piTo transition tjI is 1, 2, …, m; j is 1, 2, …, n; u shapeμRepresenting a transition confidence matrix, element mujRepresents a transition tjReliability of, muj∈[0,1],j=1,2,…,n;ITFor input matrix, representing from pi→tjDirected arcs existing between, i.e. transitions tjIs input arc of, and piTo transition tjI ═ 1, 2, …, m; j is 1, 2, …, n; w is the weight vector of the failure event in the library, which reflects the p input into the librarykDegree of influence on transition t, wherein
Figure FDA0002749355540000027
pkIs e.g. I and
Figure FDA0002749355540000028
Figure FDA0002749355540000029
is an m-dimensional vector, describes the confidence that the rule is true,
the reasoning process is as follows:
the first step is as follows: initializing parameters;
the second step is that: k is 0;
the third step: from alphakCalculating to obtain alphak+1
The fourth step: if α isk+1≠αkRepeating the third step; if α isk+1=αkAnd the reasoning is finished.
7. The method of claim 1, wherein in the third step (S300), the inference process of transition firing is:
the first step is as follows: initializing parameters;
the second step is that: according to
Figure FDA0002749355540000031
Calculating the transition support, wherein Dk+1,DkRespectively identifying the potential enabling transition support degree of the event at the kth time and the kth +1 time; n is a radical ofμ=(μ1,μ2,…,μn)TRepresenting a transition confidence vector; alpha is alphakThe confidence of the k-th inference for the event; i isTFor input matrix, representing from pi→tjDirected arcs existing between, i.e. transitions tjIs input arc of, and piTo transition tjI ═ 1, 2, …, m; j is 1, 2, …, n; w is the weight vector of the failure event in the library, which reflects the p input into the librarykThe degree of influence on the transition t,
Figure FDA0002749355540000034
in the formula, Tk+1 t,Tk tRespectively identifying triggered transition vectors at the kth time and the kth +1 time; dkIdentifying a support for the event at the kth potential enabling transition; λ ═ λ1,λ2,…,λn)TA confidence threshold representing that a lower-level fault causes a higher-level fault; alpha is alphakThe confidence of the k-th inference for the event; i isTFor input matrix, representing from pi→tjDirected arcs existing between, i.e. transitions tjIs input arc of, and piTo transition tjI ═ 1, 2, …, m; j is 1, 2, …, n; f. ofkIs a fuzzy probability threshold vector of the fault event of the kth inference bank;
the fourth step: according to
Figure FDA0002749355540000033
Calculating a fault event vector M, where Mk+1,MkFault event vectors for the kth and the (k + 1) th times, respectively; t isk tIdentifying the triggered transition vector for the kth time; o is an output matrix representing the slave Tj→piDirected arcs existing between, i.e. transitions tjIs output arc of, and piTo transition tjI is 1, 2, …, m; j is 1, 2, …, n;
the fifth step: if M isk+1≠MkRepeating the second step; if M isk+1=MkAnd the reasoning is finished.
8. The method of claim 1, wherein t isaIs a transition, pi,pj,pkThree libraries if pi·ta,pj∈ta ·Then p isiIs referred to as pjTo go back to the associated repository, pjIs referred to as piIf p is an immediate look-ahead associative base ofiIs pjTo go back to the associated repository, pjIs pkThe immediate backtracking of the associated library is called piIs pkIf p is a backtracking relationship ofi·taAnd p isk·taThen is called piAnd pkTo transition taThe adjacent library of (1) contains piThe set of immediate backtracking associative banks is called piIs collected as IHS (p)i) (ii) a Comprising piThe set of backtracking associative libraries is called piIs collected as HS (p)i) And the reverse reasoning process:
the first step is as follows: initializing parameters;
the second step is that: finding a terminating node pjIt is used as the initial target repository (p)j,IHS(pj) Whereinsaid: p is a radical ofjIs the place of the target library,·pj=tj,IHS(pj) Is the target depot pjTo compute an initial target library IHS (p)j) Failure incidence of all elements;
the third step: searching a library p corresponding to the maximum fault susceptibility in all unsearched pathskIt is used as the initial target repository (p)k,IHS(pk) If IHS (p)k) If the node is an empty set, the node is a termination node, the node returns to the immediate look-ahead association library, the third step is repeated, and otherwise the next step is carried out;
the fourth step: if IHS (p)k) And if not, proceeding downwards according to the method of the third step until all the libraries are traversed.
CN201910614152.3A 2019-07-08 2019-07-08 Power system fault processing method based on fuzzy fault Petri network Active CN110309612B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910614152.3A CN110309612B (en) 2019-07-08 2019-07-08 Power system fault processing method based on fuzzy fault Petri network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910614152.3A CN110309612B (en) 2019-07-08 2019-07-08 Power system fault processing method based on fuzzy fault Petri network

Publications (2)

Publication Number Publication Date
CN110309612A CN110309612A (en) 2019-10-08
CN110309612B true CN110309612B (en) 2021-07-06

Family

ID=68079339

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910614152.3A Active CN110309612B (en) 2019-07-08 2019-07-08 Power system fault processing method based on fuzzy fault Petri network

Country Status (1)

Country Link
CN (1) CN110309612B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116611670B (en) * 2023-07-17 2023-10-20 无锡安鑫卓越智能科技有限公司 Fault diagnosis method and system for semiconductor device manufacturing production line

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107203202A (en) * 2017-07-03 2017-09-26 贵州大学 Systems reliability analysis and method for diagnosing faults based on Fuzzy Petri Net

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110125302A1 (en) * 2009-10-23 2011-05-26 Gm Global Technology Operations, Inc. Method and system for formal safety verification of manufacturing automation systems
CN102175460A (en) * 2011-01-28 2011-09-07 中国人民解放军海军工程大学 Gas path fault diagnostic method for marine gas turbine based on fuzzy Petri net (FPN)
CN103177473B (en) * 2013-03-11 2015-08-19 南京大学 A kind of large scale scene synthetic method of Case-based Reasoning
US20150039279A1 (en) * 2013-08-02 2015-02-05 Vitali Volovoi Systems and methods for modeling a complex system using abridged petri nets
CN105005644B (en) * 2015-06-29 2019-03-01 山东科技大学 A method of detection threephase asynchronous failure
CN105244839B (en) * 2015-10-20 2017-11-14 河南理工大学 Mining high-voltage electric-network earth leakage protective synchronizing calculation method based on Petri network
CN106055789B (en) * 2016-05-31 2020-04-03 西北工业大学 Autonomous unmanned aerial vehicle formalized inference method based on weighted fuzzy Petri net
CN109039739A (en) * 2018-08-01 2018-12-18 南瑞集团有限公司 A kind of power communication field failure diagnostic method improving fuzzy Petri

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107203202A (en) * 2017-07-03 2017-09-26 贵州大学 Systems reliability analysis and method for diagnosing faults based on Fuzzy Petri Net

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于粗糙集的适应型Petri网故障诊断模型研究;王建元等;《继电器》;20071210;第35卷(第23期);第14-18页 *

Also Published As

Publication number Publication date
CN110309612A (en) 2019-10-08

Similar Documents

Publication Publication Date Title
Jaw Recent advancements in aircraft engine health management (EHM) technologies and recommendations for the next step
Ogaji et al. Gas-turbine fault diagnostics: a fuzzy-logic approach
De Giorgi et al. A diagnostics tool for aero-engines health monitoring using machine learning technique
Kanelopoulos et al. Incorporating neural networks into gas turbine performance diagnostics
DE102011113169A1 (en) System for diagnosing fault conditions of a gas flow control system for turbocharged engines
CN110309612B (en) Power system fault processing method based on fuzzy fault Petri network
Rajabi-Vandechali et al. Development of a prediction model for estimating tractor engine torque based on soft computing and low cost sensors
Sampath et al. Fault diagnostics using genetic algorithm for advanced cycle gas turbine
Amare et al. Two-shaft stationary gas turbine engine gas path diagnostics using fuzzy logic
DePold et al. The application of expert systems and neural networks to gas turbine prognostics and diagnostics
Gharib et al. Development of a new expert system for diagnosing marine diesel engines based on real-time diagnostic parameters
Sampath et al. Fault diagnosis of a two spool turbo-fan engine using transient data: A genetic algorithm approach
CN117421633A (en) Intelligent and credible rotary machine hierarchy fault diagnosis method
CN109840563B (en) Fan fault diagnosis method based on three-dimensional membership function fuzzy logic system
CN116187196A (en) Neural network-based full-process working condition turbine disk cavity temperature estimation and regulation method
Nnaji et al. Evaluating the reliability of a marine diesel engine using the Weibull distribution
CN112036079B (en) Diesel engine multi-information fusion diagnosis method based on ANFIS
Brzozowska et al. An application of artificial neural network to diesel engine modelling
De Giorgi et al. Development of a combined Artificial Neural Network and Principal Component Analysis technique for Engine Health Monitoring
Wang Fault diagnosis and fault-tolerant control for Manifold Absolute Pressure sensor (MAP) of Diesel engine based on Elman network observer
Roemer et al. Real-time health monitoring and diagnostics for gas turbine engines
CN113283004A (en) Aero-engine degradation state fault diagnosis method based on transfer learning
CN115114785B (en) Engine performance index parameterization rapid prediction method
Kong et al. A Study on Multi Fault Diagnostics of Smart Unmanned Aerial Vehicle Propulsion System Using Data Sorting and Neural Networks
Coelho et al. Monitoring the operational condition of a diesel engine by evaluating the parameters of its thermodynamic operation cycle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant