Next Article in Journal
Network Structure Identification Based on Measured Output Data Using Koopman Operators
Next Article in Special Issue
Optimal Selection of Stock Portfolios Using Multi-Criteria Decision-Making Methods
Previous Article in Journal
Advances in Financial Leasing Mechanism Designs
Previous Article in Special Issue
A Liquid Launch Vehicle Safety Assessment Model Based on Semi-Quantitative Interval Belief Rule Base
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Data-Driven Process Monitoring Approach Based on Evidence Reasoning Rule Considering Interval-Valued Reliability

1
School of Automation (School of Artificial Intelligence), Hangzhou Dianzi University, Hangzhou 310018, China
2
China-Austria Belt and Road Joint Laboratory on Artificial Intelligence and Advanced Manufacturing, Hangzhou Dianzi University, Hangzhou 310018, China
3
School of Accounting, Zhejiang University of Finance and Economics, Hangzhou 310018, China
4
Maschinen-Umwelttechnik-Transportanlagen Gmbh, Schießstattgasse 49, 2000 Stockerau, Austria
5
TU Wien, Institute for Energy Systems and Thermodynamics, Getreidemarkt 9, 1060 Vienna, Austria
6
Salzburg University of Applied Sciences, Urstein Süd 1, A-5412 Puch/Salzburg, Austria
7
Novapecc GmbH, Hildebrandgasse 28, 1180 Wien, Austria
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(1), 88; https://doi.org/10.3390/math11010088
Submission received: 9 November 2022 / Revised: 20 December 2022 / Accepted: 21 December 2022 / Published: 26 December 2022
(This article belongs to the Special Issue Data-Driven Decision Making: Models, Methods and Applications)

Abstract

:
In the process industry, an alarm system is one of the important ways of condition monitoring. Due to the complexity and irregularity of process information in condition monitoring, there are too many false alarms in the current alarm system. In order to solve the problem of designing an alarm system, this paper proposes a multivariate alarm design method based on the evidence reasoning (ER) rule, considering interval-valued reliability, which can make full use of process information to make accurate alarm decisions. Firstly, the referential evidence matrixes (REMs) are constructed based on the training samples of process variables, and the real-time samples of the process variables are converted into alarm evidence by activating the REMs. Alarm evidence is then fused by the ER rule. In this fusion process, in order to better describe the uncertainty of the process information, the reliability of the alarm evidence is characterized by random variables with certain probability distributions, and it can be adjusted in dynamic intervals according to the real-time change of alarm evidence. Finally, the reactor fault case is implemented in the Tennessee Eastman (TE) process, which shows that the adjustment of interval-valued reliability can adapt to the irregular change of process information and obtains consistent alarm results to further improve the accuracy of alarm decisions.

1. Introduction

With the rapid development of the process industry and the wide application of intelligent information technology, condition monitoring has become a critical part of ensuring the stable, efficient, and safe operation of the process industry [1]. Condition monitoring alerts operators to take appropriate actions to handle possible or potential faults by alarms [2]. Owing to the speedy growth of software and hardware technologies, it is no longer difficult to obtain the sample data of process variables in the process industry, so condition monitoring has become simpler and quicker [3]. However, due to the uncertainty of the industrial environment and the inappropriate design of the condition monitoring system, it will be inevitable to generate a large number of false alarms and missed alarms, so that operators hardly determine the true state of the industrial process ultimately [4]. Therefore, it is very important to design an appropriate alarm method for condition monitoring.
In the traditional condition monitoring method, the alarm threshold is an important parameter, i.e., an alarm is issued based on whether the sampled value of the process variable exceeds the alarm threshold [5]. The higher alarm threshold reduces the number of false alarms, but this may miss critical process state information, resulting in untimely alarms and a large number of missed alarms; the lower alarm threshold triggers more false alarms [6]. Obviously, in practical applications, the alarm design method based on threshold may not be effective in reducing the number of false alarms and missed alarms [7].
In a univariate industrial process, the conventional alarm design methods based on alarm threshold include a time delay method, a filtering method, a deadband method, and so on [8]. Specifically, the time delay method issues an alarm when the sampled value of the process variable exceeds the alarm threshold several times in a row [9]; the filtering method processes the sampled value by the moving variance strategy and then compares the filtered value with the alarm threshold [10]. The deadband method sets high and low alarm thresholds to issue and clear the alarm, and then an alarm is issued when the sampled value is above the high alarm threshold, and an alarm is cleared when the sample value falls below the low alarm threshold [11]. These alarm design methods have improved the alarm thresholds and have achieved some effects in univariate condition monitoring.
In fact, due to the increasing complexity of the industrial process, the multivariate industrial process is gradually replacing the univariate industrial process [12]. The above proposed univariate alarm design methods have some limitations in multivariate industrial processes, such as the inconsistency of alarm results for each variable and the inability to address the complexity of process information. Correspondingly, the multivariable alarm design methods have become a research hotspot in the field of alarm systems, but there is relatively less research on multivariable alarm methods [13]. For example, ref. [14] established objective functions based on the false alarm rate and missed alarm rate of any two process variables and obtained optimal alarm thresholds, respectively, and then designed the alarm system and achieved certain effects compared with univariate alarm systems. In essence, this method only preliminarily extends the idea of univariate threshold optimization to multivariate process, i.e., threshold optimization is performed for multivariate processes, and then the univariate alarm systems are still adopted separately for any one variable [15]. When the number of the process variables are more than two, the order of optimization also needs to be identified. In addition, the alarm results of each variable may be inconsistent or even contradictory, which is a challenge to a certain extent in real application.
In recent years, information fusion theory (IFT) integrates the process information of the multiple variables from various sources to formulate more accurate and consistent decision results though data-driven analysis and has been widely implemented in the domain of pattern recognition, expert systems, and fault diagnosis [16,17]. In IFT, the Dempster-Shafer (DS) theory and evidence reasoning (ER) rule are representative methods [18,19]. Specifically, DS theory translates the data of process variables into corresponding evidence and obtains accurate fusion results through the process of evidence fusion, which reduces the uncertainty of the process information [20,21]. Yang proposed the ER rule based on the DS theory, which further improves the rationality of the evidence fusion process by assigning reliability and weight to evidence [22]. The reliability reflects the inherent property of evidence and is objective, while the weight reflects the importance of the evidence relative to other evidence and is subjective. Since the introduction of reliability, a series of calculation methods for reliability have been proposed, which all describe reliability as a fixed value [23]. On the one hand, reliability reflects the inherent change of the evidence, so it is usually difficult for the fixed value form to describe the uncertainty of the evidence. On the other hand, due to various known or unknown factors, the reliability should change randomly with certain regularity. Therefore, this may be a better way that the reliability can be modeled, in the form of random variables within some uncertain interval.
In view of the above-proposed problems and analysis, this paper proposes an alarm design method via ER rule considering interval-valued reliability, which mainly includes the referential evidence matrix (REM) and is constructed based on the data of training samples, which achieves the transformation of the process variable to the referential alarm evidence, and the real-time sample data activates the REM to obtain alarm evidence. The corresponding interval-valued ER rule is then proposed, which can fuse alarm evidence to get the integrated alarm evidence. Among that, in order to accommodate the change of process variables, the interval-valued ER rule describes the reliability as a random variable and adjusts the changing interval of reliability according to evidence variation. Therefore, the interval-valued reliability adjustment can achieve the efficient integration of the process information. Finally, the accurate alarm decision is made based on integrated alarm evidence.
This paper is organized as follows: Section 2 introduces the theoretical basis of the ER rule; Section 3 presents the alarm design method based on the interval-valued ER rule; Section 4 demonstrates the effectiveness of the proposed method through an example of reactor fault in the TE process; finally, this study is concluded in Section 5.

2. Theoretical Basis

2.1. Theoretical Basis of Dempster-Shafer (DS) Theory

In DS theory, discernment framework Θ = {H1, H2, …, Hn} is a set with mutually exclusive propositions, and a power set of Θ, denoted as P(Θ) = 2Θ = {Ø, H1, …, Hn, {H1, H2}, …, Θ}.
Definition 2.1 
([24]). The mapping m : P ( Θ ) [ 0 , 1 ] is a basic belief assignment function (BBA) on Θ, which satisfies m(Ø) = 0 and θ P ( Θ ) p ( θ ) = 1 .
m(θ) denotes the belief assigned to the proposition θ. In general, the BBA is also referred to as a piece of evidence.
Definition 2.2 
([25]). The Jousselme evidence distance between m1 and m2 can be defined by the following equation
D J ( m 1 , m 2 ) = ( m 1 m 2 ) T G _ _ ( m 1 m 2 ) 2
here G _ _ is a n × n matrix, where n is the number of non-empty set elements in P(Θ), its elements D ( A , B ) = | A B | / | A B | , A , B 2 Θ , called the Jaccard coefficient. When DJ (m1, m2) = 0, the two pieces of evidence are exactly same. On the contrary, when DJ (m1, m2) = 1, the two pieces of evidence are completely different. Obviously, the value range of the Jousselme evidence distance is [0, 1].

2.2. Theoretical Basis of Evidence Reasoning (ER) Rule

In ER rule, a piece of evidence e is noted as [26]:
e = { ( θ , p ( θ ) ) | θ Θ , θ Θ p ( θ ) = 1 }
where the number pair (θ, p(θ)) indicates that belief p(θ) is the degree of support for the proposition θ, and proposition θ can be any element except the empty set in P(Θ). Obviously, here the basic belief assignment function m in DS theory is expressed as evidence e with the form of numbers of pairs in the ER rule.
In the ER rule, evidence is associated with a reliability r and, a weight w, and r [0, 1], w [0, 1]. The r denotes the ability of evidence e that provides an accurate judgment to a given question and depends only on the source of evidence. It follows that reliability r is an inherent property of the evidence itself, and it is objective; the w denotes the relative importance of the evidence compared with other evidence, and it is subjective. The w depends on the specific circumstances in which the evidence is used, the users, and the individuals involved in the fusion of evidence. The evidence e ˜ with reliability r and weight w is defined as follows
e ˜ = { ( θ , m ˜ ( θ ) ) | θ Θ ; ( P ( Θ ) , m ˜ ( P ( Θ ) ) ) }
where belief m ˜ ( θ ) indicates the degree of support for θ from the evidence e ˜ with reliability and weight, and is defined as follows
m ˜ ( θ ) = { 0   c r w m ( θ ) c r w ( 1 r ) θ = θ Θ , θ θ = P ( Θ )
where m(θ) = wp(θ), crw is the normalization factor and is denoted as
c r w = w 1 + w r
For the mutually independent evidence, e1 and e2, they can be fused through the ER rule, as follows:
m ( θ ) e ( 2 ) = [ m 1 m 2 ] ( θ ) = { 0 , θ = m ^ ( θ ) e ( 2 ) D Θ m ^ ( D ) e ( 2 ) , θ Θ , θ m ^ ( θ ) e ( 2 ) = [ ( 1 r 2 ) m ( θ ) 1 + ( 1 r 1 ) m ( θ ) 2 ] + B C = θ m ( B ) 1 m ( C ) 2 , θ Θ
It can be used recursively to combine multiple pieces of evidence in any order.

3. The Multivariate Alarm Design Method via the Interval-Valued ER Rule

Here, Section 3.1 first introduces the acquisition of alarm evidence, i.e., the referential evidence matrix (REM) is constructed by casting points that are operation-based on the training set of the process variable, and a real-time sample is transformed into alarm evidence by activating the corresponding REM. Furthermore, in Section 3.2, the interval-valued reliability is adjusted with the change of alarm evidence, and the importance weight of alarm evidence is optimized. In Section 3.3, the interval-valued ER rule fuses alarm evidence coming from multiple process variables and obtains the integrated alarm evidence. Finally, in Section 3.4, the alarm result is obtained based on the integrated alarm evidence. The whole process of the designed multivariate alarm method is shown in Figure 1.
Step 1 (The construction of REM): The referential evidence matrix (REM) is constructed by casting points operation based on the training set of process variables, which achieves the accurate transformation of process variable data into referential alarm evidence. More details can be found in Section 3.1.1.
Step 2 (The transformation of process variables to alarm evidence): The real-time sample of the process variable is transformed into alarm evidence by activating the corresponding REM. More details can be found in Section 3.1.2.
Step 3 (The calculation of interval-valued reliability and the optimization of weight): Before using the interval-valued ER rule to fuse alarm evidence, it is important to adjust the reliability intervals and the weights of the corresponding alarm evidence. Therefore, the interval-valued ER rule catering for interval-valued reliability is proposed. Wherein, the reliability of alarm evidence is inscribed by random variables with certain probability distribution characteristics on the interval, and the interval of reliability is adaptively adjusted according to the change of the real-time sample of the process variable, which improves the reasonability of the fusion process. More details are presented in Section 3.2.
Step 4 (The fusion of alarm evidence based on the interval-valued ER rule): On the basis of step 3, this step extends the original ER rule to the interval-valued ER rule, which can fuse alarm evidence to get integrated alarm evidence. More details can be found in Section 3.3.
Step 5 (Alarm-decision making based on integrated alarm evidence): Based on alarm-decision criteria, the alarm decision is made through integrated alarm evidence. More details are shown in Section 3.4.

3.1. The Acquisition of Alarm Evidence

3.1.1. The Construction of REM

Step 1.1: In the context of the alarm system, the discernment framework is defined as Θ = {NA, A}, where “NA” stands for the proposition “no alarm” and “A” represents the proposition “alarm”. Let the set of training samples be V = [xi(k), y(k)], i = 1, 2, …, I, k = 1, 2, 3, …, K, where I is the number of the process variable, the process variable xi(k) is the input of the alarm system, and y(k) is the output of the alarm system. Let the reference value set of the input xi as Oi = { O n i i |ni = 1, 2…, Ni}, Ni is the number of reference values of xi(k), which can be defined based on expert knowledge. The reference value set of the output y(k) is Z = {Ze, e = 1, 2}, where Z1 = NA = 0 and Z2 = A = 1. Therefore, the relationship between the input xi(k) and the output y(k) can be represented by the corresponding relationship between the input reference values and the output reference values.
Step 1.2: The similarity distribution of xi(k) in V = [xi(k), y(k)] relative to the reference values set Oi is calculated by the following information transformation method:
Q O i ( x i ( k ) ) = { ( O n i i , β n i i ) | n i = 1 , 2 , , N i }
β n i i = ( O n i + 1 i x i ( k ) ) O n i + 1 i O n i i , β n i + 1 i = 1 β n i i , O n i i x i ( k ) O n i + 1 i
β n i i = 0 n i = 1 , 2 , , N i , n i n i , n i + 1
where β n i i represents the similarity of xi(k) matching input reference value O n i i .
The similarity distribution of y(k) in V = [xi(k), y(k)] matching the reference value Ze is Q(y) = {(Ze, γ e )|e = 1, 2}, among them:
γ e = { 1 , y ( k ) = N A 0 , y ( k ) = A
γ e + 1 = 1 γ e
where, γ e represents the similarity of y(k) matching the output reference value Ze.
Therefore, each sample [xi(k), y(k)] in V is transformed into a similarity distribution with the form ( β n i i γ e , β n i + 1 i γ e , β n i i γ e + 1 , β n i + 1 i γ e + 1 ) , where β n i i γ e represents the joint similarity of xi(k) matching O n i i and y(k) matching Ze, and the sample cast point table shown in Table 1 is constructed. δ e , n i i represents the sum of the similarity of all samples whose input xi(k) matches O n i i and output y(k) matches Ze. ψ e i = n i = 1 N i δ e , n i i represents the sum of the joint similarity of all output y(k) matching Ze. φ n i i = e = 1 2 δ e , n i i represents the sum of the joint similarity of all input xi(k) matching O n i i . Obviously, there is e = 1 2 ψ e i = n i = 1 N i φ n i i = K .
Step 1.3: According to the sample cast point table, when the value of the process variable xi(k) is relative to the input reference value O n i i , the belief that the output y(k) is relative to the output reference value Ze can be calculate by
λ e , n i i = δ e , n i i / ψ e i e = 1 2 ( δ e , n i i / ψ e i )
and e = 1 2 λ e , n i i = 1 , then the alarm evidence corresponding to the input reference value O n i i can be defined as
T n i i = [ λ 1 , n i i , λ 2 , n i i ]
Therefore, the referential evidence matrix (REM) table as shown in Table 2 can be constructed to describe the relationship between the input xi(k) and the output y(k).

3.1.2. The Transformation of Process Variables to Alarm Evidence

Step 2: For the real-time sample xi(t), t = 1, 2, 3, …, it necessarily falls into the interval [ O n i i , O n i + 1 i ] composed of two reference values, O n i i and O n i + 1 i , and the referential alarm evidence, T n i i and T n i + 1 i , corresponding to these two reference values, are activated, and then the alarm evidence a t i corresponding to the real-time sample xi(t) can be obtained by the weighted sum form of T n i i and T n i + 1 i . a t i , which is represented as follows:
a t i = { ( Z e , β n i i λ e , n i i + β n i + 1 i λ e , n i + 1 i ) , e = 1 , 2 }
For ease of understanding, this alarm evidence can be rewritten as follows:
a t i = [ a t i ( N A ) , a t i ( A ) , a t i ( Θ ) ] a t i ( N A ) = β n i i λ 1 , n i i + β n i + 1 i λ 1 , n i + 1 i a t i ( A ) = β n i i λ 2 , n i i + β n i + 1 i λ 2 , n i + 1 i a t i ( Θ ) = 0
where a t i ( N A ) and a t i ( A ) denote the belief of “No alarm (NA)” and “alarm (A)” respectively, and a t i ( N A ) + a t i ( A ) = 1.

3.2. The Calculation of Interval-Valued Reliability and the Optimization of Weight

In the original ER rule, the reliability and weight of alarm evidence are generally expressed in the form of a fixed value based on expert knowledge [22,23]. However, since the process variables are constantly changing, the corresponding alarm evidence also changes accordingly. This single fixed reliability and weight in the fusion process may make the fusion results unreasonable. Furthermore, in the original ER rule, the reliability r is defined as the ability of evidence to provide correct results for a particular question and is the objective nature of evidence. On the contrary, the weight w is the importance of the current evidence relative to other evidence and is the subjective nature of evidence. Therefore, reliability is an inherent property which is not affected by other pieces of evidence. In addition, the alarm evidence changes irregularly at each moment, which makes it impossible to calculate the accurate value of the reliability by a functional relationship, so it is a more efficient way to express the reliability of alarm evidence in the form of an interval value. Unlike reliability, the weight of some evidence (a certain process variable) represents the relative importance when it is combined with other evidence (other process variables), hence it can be set as a single value and optimized according to decision objectives.
Through the above analysis for the reliability factor r and the importance weight w, this section designs the interval-valued ER rule catering for interval-type reliability, in which the reliability of each piece of alarm evidence can be adaptively adjusted on a certain interval, and the weight can be obtained by classical optimization algorithms, such as gradient descent algorithm and evolutionary algorithm. This mechanism can ensure the accuracy of the fusion process and improve the efficiency of fusion process.
Step 3: The reliability of alarm evidence is described by a continuous random variable with uniform distribution characteristics on an interval, as shown in the following form
r i U ( r i , r i + )
ri represents the interval-valued reliability of alarm evidence. r i and r i + can be calculated by the following equation
r i = r i α i , r i + = r i + α i
where r i is the optimal reliability obtained by training set. Namely, the sample data of the process variable is defined as the training set and transformed into the alarm evidence a t i . r i and wi as the optimal reliability and weight, respectively, are obtained by optimizing distance between the fusion alarm evidence mt and the standardized evidence {fNA = (1,0,0), fA = (0,1,0)}. Specially, mt is obtained by Equation (6). The optimization process can be realized by genetic optimization algorithms. It should be noted that r i is an optimal fixed value reliability through the training set, and the wi is used for the entire fusion process. The optimization model based on genetic algorithm is constructed as follows:
min P ζ ( P ) = i ˜ = 1 I ˜ d E ( m t , f i ˜ )   s . t . 0 w i 1 , i = 1 , 2 , 3 s . t . 0 r i 1 , i = 1 , 2 , 3
where ζ(P) represents the optimization objective function, P = {(wi, r i ) | i =1,2,3} represents the parameter set to be optimized, and the value range of wi and r i is [0, 1]. The dE indicates the fusion result, that is, the evidence distance between the integrated alarm evidence Mt and the standardized evidence {fNA = (1, 0, 0), fA = (0, 1, 0)}. This optimization process can be done through the optimization toolbox in Matlab. Finally, the performance of the model is gradually optimized due to the change of the optimized parameter set.
In Equation (17), αi is a reliability adjustment factor based on the similarity between pieces of alarm evidence, calculated by the following equation:
α i = 1 d i i = 1 I ( 1 d i ) , i = 1 , 2 , , I I 2
where di is the distance defined in Equation (1) between the alarm evidence a t i and the normalized evidence fNA, fA in the discernment framework, shown as follows:
d i = { ( ( a t i f N A ) G ( a t i f N A ) T ) 1 2 2 2 , a t i ( N A ) > a t i ( A ) ( ( a t i f A ) G ( a t i f A ) T ) 1 2 2 2 , a t i ( N A ) a t i ( A )
where the alarm evidence can be represented by a t i = [ a t i ( N A ) , a t i ( A ) , a t i ( Θ ) ] in Section 2. Thus, the order of G is 3, that is:
G = [ 1 0 0.5 0 1 0.5 0.5 0.5 1 ]
di represents the adjustment of interval-valued reliability according to dynamical changing of process variable information. Thus, the interval-valued reliability ri is a precise description to the statistical property of the alarm evidence in real time.
Remark 1. 
In this section, according to the analysis of reliability described as interval-valued form, interval-valued reliability does not mean that the reliability is chosen as a fixed value or a specific part of interval. The purpose of interval-valued reliability is to portray the variation of reliability with the input information by taking equal probability values in a specific interval. Therefore, among the common probability distributions of continuous random variables, the uniform distribution is more suitable for describing interval-valued reliability due to its characteristic of equal probability distribution.

3.3. The Fusion of Alarm Evidence Based on the Interval-Valued ER Rule

This section extends the original ER rule in Equation (5) to the interval-valued ER rule. According to the interval-valued ER rule, the pieces of alarm evidence a t i = [ a t i ( N A ) , a t i ( A ) , a t i ( Θ ) ] from the real-time samples are fused to obtain the integrated alarm evidence Mt = (Mt (NA), Mt(A), Mt(Θ)). The specific process is shown as follows.
Step 4.1: First, the interval-valued ER rule is shown as follows:
L t = i = 1 I ( w i a t i ( θ ) 1 + w i r i + 1 r i 1 + w i r i ) i = 1 I ( 1 r i 1 + w i r i ) n = 1 2 i = 1 I ( w i a t i ( θ ) 1 + w i r i + 1 r 1 + w i r ) θ Θ , θ 0
where the interval-valued reliability ri and weight wi of a t i can be obtained in Section 3.2. According to the proposed interval-valued ER rule, Lt is the fusion result by fusing alarm evidence. Obviously, Lt is an interval whose optimization model is established as follows:
max / min L t = i = 1 I ( w i a t i ( θ ) 1 + w i r i + 1 r i 1 + w i r i ) i = 1 I ( 1 r i 1 + w i r i ) n = 1 2 i = 1 I ( w i a t i ( θ ) 1 + w i r i + 1 r 1 + w i r ) s t : r i ~ U ( r i , r i + )
The extreme value of Lt is calculated by optimizing the above model.
Step 4.2: For making alarm result conveniently, according to mathematical principle, the integrated alarm evidence Mt = (Mt (NA), Mt(A), Mt(Θ)) is obtained by means of mathematical expectations for fusion results Lt.
M t = E ( L t )
E ( L t ) = Ω L t i = 1 I 1 r i + r i d r 1 d r I i = 1 , 2 , , I , I 2
where E(Lt) represents the mathematical expectation of Lt and Ω is an area determined by ri.
In addition, the proof of the following theorems can verify the interval-valued ER rule proposed in this paper.
Theorem 1. 
Expectation and variance of Lt always exist.
Proof of Theorem 1. 
Assuming i = 2, Equation (25) can be considered as a double integral of r1 and r2. According to the property of the double integral, it can be concluded that the integral must exist as long as the integrand is continuous over the definition domain. Obviously, the integrand is a continuous binary elementary function in the equation. Therefore, the expectation and variance of Lt always exist. By analogy, the theorem still applies when i 3 .□
Theorem 2. 
The original ER rule is a special case of the interval-valued ER rule.
Proof of Theorem 2. 
Supposing i = 2, r i and r i + of intervals tend to a quantitative value, shown as follows
{ r 1 = r 1 + = r 11 r 2 = r 2 + = r 22
From Equation (22), the fusion equation is expressed as follows
L t = ( 1 r 2 ) w 1 a t 1 ( θ ) + ( 1 r 1 ) w 2 a t 2 ( θ ) + w 1 w 2 a t 1 ( θ ) a t 2 ( θ ) ( 1 r 2 ) w 1 + ( 1 r 1 ) w 2 + w 1 w 2 γ θ a t 1 ( γ ) a t 2 ( γ ) , θ Θ , θ 0 = a 1 r 1 + b 1 r 2 + c 1 a 2 r 1 + b 2 r 2 + c 2 = U
{ a 1 = w 2 a t 2 ( θ ) ; b 1 = w 1 a t 1 ( θ ) ; c 1 = w 1 a t 1 ( θ ) + w 2 a t 2 ( θ ) + w 1 w 2 a t 1 ( θ ) a t 2 ( θ ) a 2 = w 2 ; b 2 = w 1 ; c 2 = w 1 + w 2 + w 1 w 2 γ θ a t 1 ( γ ) a t 2 ( γ )
In the original ER rule, the fusion result is shown as follows
U = a 1 r 11 + b 1 r 22 + c 1 a 2 r 11 + b 2 r 22 + c 2
Actually, the expectation of Lt can be further calculated by
E ( U ) = D a 1 r 1 + b 1 r 2 + c 1 a 2 r 1 + b 2 r 2 + c 2 d r 2 d r 1
E ( U ) = Ω a 1 a 2 ( a 2 r 1 + b 2 r 2 + c 2 ) a 1 b 2 a 2 r 2 a 1 a 2 c 2 + b 1 r 2 + c 1 a 2 r 1 + b 2 r 2 + c 2 d r 1 d r 2
where Ω is the region defined by r1 and r2.
E ( U ) = Ω a 1 a 2 d r 1 d r 2 + Ω a 1 b 2 a 2 r 2 a 1 a 2 c 2 + b 1 r 2 + c 1 a 2 r 1 + b 2 r 2 + c 2 d r 1 d r 2
E ( U ) = a 1 a 2 + 1 ( r 1 + r 1 ) ( r 2 + r 2 ) r 2 r 2 + ( r 1 r 1 + ( a 1 b 2 a 2 + b 1 ) r 2 a 1 a 2 c 2 + c 1 a 2 r 1 + b 2 r 2 + c 2 d r 1 ) d r 2
Equation (33) is simplified as follows
E ( U ) = a 1 a 2 + r 2 r 2 + ( ( a 2 b 1 a 1 b 2 ) r 2 + a 2 c 1 a 1 c 2 ) ln a 2 r 1 + + b 2 r 2 + c 2 a 2 r 1 + b 2 r 2 + c 2 d r 2 a 2 2 ( r 1 + r 1 ) ( r 2 + r 2 )
According to L’hospital law, Equation (34) can be further calculated by the following equation
E ( U ) = a 1 a 2 + lim r 1 + r 1 ( r 2 r 2 + ( ( a 2 b 1 a 1 b 2 ) r 2 + a 2 c 1 a 1 c 2 ) ln a 2 r 1 + + b 2 r 2 + c 2 a 2 r 1 + b 2 r 2 + c 2 d r 2 ) r 2 + a 2 2 ( r 1 + r 1 ) ( r 2 + r 2 ) r 2 +
E ( U ) = a 1 a 2 + lim r 1 + r 1 ( ( a 2 b 1 a 1 b 2 ) r 2 + + a 2 c 1 a 1 c 2 ) ln a 2 r 1 + + b 2 r 2 + + c 2 a 2 r 1 + b 2 r 2 + + c 2 a 2 2 ( r 1 + r 1 )
Actually, we have
ln a 2 r 1 + + b 2 r 2 + + c 2 a 2 r 1 + b 2 r 2 + + c 2 = ln ( 1 + a 2 ( r 1 + r 1 ) a 2 r 1 + b 2 r 2 + + c 2 )
When r 1 + r 1 , a 2 ( r 1 + r 1 ) a 2 r 1 + b 2 r 2 + + c 2 approaches to 0. Therefore, we have
ln ( 1 + a 2 ( r 1 + r 1 ) a 2 r 1 + b 2 r 2 + + c 2 ) a 2 ( r 1 + r 1 ) a 2 r 1 + b 2 r 2 + + c 2
Finally, we have
E ( U ) = a 1 a 2 + 1 a 2 a 2 b 1 r 2 + + a 2 c 1 a 1 b 2 r 2 + a 1 c 2 a 2 r 1 + b 2 r 2 + + c 2 = a 1 r 11 + b 1 r 22 + c 1 a 2 r 11 + b 2 r 22 + c 2 = U
Obviously, when r i and r i + of interval tend to the quantitative value, E ( U ) = U . It shows that the original ER rule is a special case of the interval-valued ER rule.
Similarly, when i > 2, the theorem still holds.□
Theorem 3. 
In Equation (22), Lt is a probability function about (r1, r2, …, rI). Taking two pieces of evidence as an example, there exists at least one point ( r ρ 1 , r ρ 2 ) satisfying the following equation.
E ( U ) = G ( r ρ 1 , r ρ 2 ) s t : r ρ i Ω
Proof of Theorem 3. 
Suppose c1 and C1 denote the upper and lower bounds of L t ( r 1 , r 2 ) , respectively, which can be calculated by the following optimization model:
max / min L t ( r 1 , r 2 ) s t : ( r 1 , r 2 ) Ω
When ( r 1 + r 1 ) ( r 2 + r 2 ) is considered as greater than 0, the following inequality can be obtained:
c 1 ( r 1 + r 1 ) ( r 2 + r 2 ) L t ( r 1 , r 2 ) ( r 1 + r 1 ) ( r 2 + r 2 ) C 1 ( r 1 + r 1 ) ( r 2 + r 2 )
Based on the property of the double integral, we have
Ω c 1 ( r 1 + r 1 ) ( r 2 + r 2 ) d r 1 d r 2 Ω L t ( r 1 , r 2 ) ( r 1 + r 1 ) ( r 2 + r 2 ) d r 1 d r 2 Ω L t ( r 1 , r 2 ) ( r 1 + r 1 ) ( r 2 + r 2 ) d r 1 d r 2 Ω C 1 ( r 1 + r 1 ) ( r 2 + r 2 ) d r 1 d r 2
and
Ω c 1 ( r 1 + r 1 ) ( r 2 + r 2 ) d r 1 d r 2 = c 1 Ω C 1 ( r 1 + r 1 ) ( r 2 + r 2 ) d r 1 d r 2 = C 1 1 ( r 1 + r 1 ) ( r 2 + r 2 ) Ω L t ( r 1 , r 2 ) d r 1 d r 2 = E ( U )
From the above equations, we have
c 1 E ( U ) C 1
From Equation (45), E(U) is a determined value between c1 and C1. Obviously, Lt (r1, r2) is a continuous function. According to the intermediate theorem of continuous functions on the closed regions, there is at least one point ( r ρ 1 , r ρ 2 ) on Ω that makes L t ( r ρ 1 , r ρ 2 ) equal to E(U). Based on the above derivation, the theorem can be extended to the fusing situation with more than two pieces of evidence.□

3.4. Making Alarm-Decision Based on Integrated Alarm Evidence

Step 5: Through the fusion method in Section 3.3, the integrated alarm evidence Mt = (Mt (NA), Mt(A), Mt(Θ)) can be obtained. The alarm decision is made, according to the following alarm-decision criteria: if Mt (NA) ≥ Mt(A), output yt(k) = 0, no alarm; if Mt (NA) < Mt(A), output yt(k) = 1, alarm.

4. Comparative Analysis of Experiment

This section demonstrates the design process of the multivariate alarm method based on the interval-valued ER rule through the following experiment. The Tennessee Eastman (TE) process as a chemical benchmark simulation model as shown in Figure 2, provides a display environment for evaluating process control and monitoring methods and has been widely used as a research platform for continuous process monitoring, regulation, and diagnosis [27]. According to http://web.mit.edu/braatzgroup/links.html (accessed on 13 August 2022), its experimental data can be downloaded. The TE process has 53 process variables and 21 different fault types [28]. The process variables include 12 operational variables and 41 measured variables (22 continuous, 19 component variables). In this benchmark set, each fault in the training set contains 480 samples, and each fault in the test set contains 960 samples, where the fault corresponding to the 161st sample are introduced from the eighth hour, with a sampling interval of 3 min. To address the problem of less training data in the dataset, according to the principle of the TE process and its data characteristics, this experiment combines the original training set with the first 160 samples in the test set under normal conditions to form a new training set. This section takes the reactor fault in the TE process as an alarm example and selects the flow rates of process variables material A, B, and C as input variables x1(k), x2(k) and x3(k), shown as Figure 3, Figure 4 and Figure 5, and the effectiveness of the proposed method is verified by comparison of other traditional alarm design methods and the original ER rule method.
Step 1 (The construction of REM): Firstly, for the three input variables xi(k), i = 1, 2, 3, this newly composed 640 samples of each sequence are considered as training samples. According to expert knowledge, the reference value sets of the input variable xi(k) are O1 = {14, 15.2, 16.4, 17.6, 18.8, 20, 21.2, 22.4, 23.6, 24.8, 26}, O2 = {51, 52.4, 53.8, 55.2, 56.6, 58, 59.4, 60.8, 62.2, 63.6, 65}, O3 = {13.1, 13.2, 13.3, 13.4, 13.5, 13.6, 13.7, 13.8, 13.9, 14.0, 14.1}, and the reference value set of the output y(k) is {0,1}. According to Section 3.1.1, the referential evidence matrixes (REMs) are established by Equations (7)–(13), as shown in Table 3, Table 4 and Table 5, and the alarm evidence a t i corresponding real-time sample is obtained by activating the corresponding REM. According to Section 3.2, the optimal reliabilities and weights of the alarm evidence are obtained, i.e., r 1 = 0.74, r 2 = 0.70, r 3 = 0.60 and w1 = 0.92, w2 = 0.86, w3 = 0.90.
Meanwhile, based on the above training set, some traditional alarm design methods are selected as comparison methods to obtain the optimal alarm threshold, such as the 3σ method commonly used in industry, the filtering method, the time delay method, the FAP-MAP method based on multivariate alarm threshold optimization [29]. Among the traditional alarm design method, the FAP-MAP method constructs the objective function min x 0 , y 0 { w 1 ( P x , f + P y , f ) + w 2 ( P x , m + P y , m ) } , where Px,f and Py,f are the false alarm rate (FAR) for variables x and y, respectively; Px,m and Py,m are the missed alarm rate (MAR) of variables x and y respectively; w1 and w2 are the weight factors, generally w1 = w2 = 0.5; x0 and y0 are the optimal thresholds [14]. In each traditional alarm design method, the optimal thresholds of corresponding variable are shown in Table 6.
Step 2 (The transformation of process variables to alarm evidence): Next, the alarm system based on the interval-valued ER rule is designed. According to the simulation platform http://depts.washington.edu/control/LARRY/TE/download.html (accessed on 13 August 2022), the test set of input variable xi(k) is randomly generated, including 900 samples. The first step is to obtain the alarm evidence at each moment. The reference values of input and output are obtained in the training experiment. According to the REM shown in Table 3, Table 4 and Table 5, the real-time samples are transformed into corresponding alarm evidence.
Step 3 (The calculation of interval-valued reliability and the optimization of weight): Furthermore, the optimal reliabilities and weights of alarm evidence are obtained by Equation (18) in the training experiment, and the reliability adjustment factor αi corresponding to alarm evidence at each moment is calculated by Equations (19)–(21), and the interval of ri is obtained combining Equation (17).
Step 4 (The fusion of alarm evidence based on the interval-valued ER rule): According to Section 3.3, the original ER rule Equation (6) is extended to the interval-valued ER rule Equation (22), which can fuse the alarm evidence a t i (i = 3) to get integrated alarm evidence Lt. Lt is an interval, whose optimization model is established by Equation (23). The extreme value of Lt is calculated by optimizing the model. For making alarm results conveniently, according to mathematical principle, the integrated alarm evidence Mt = (Mt (NA), Mt(A), Mt(Θ)) is obtained by Equations (24) and (25). Mt is obtained based on the interval-valued ER rule.
Step 5 (Alarm-decision making based on integrated alarm evidence): Finally, based on the alarm-decision criteria of Section 3.4, the alarm decision is made through Mt = (Mt (NA), Mt(A), Mt(Θ)), and missed alarm number (m(MA)) is 31 and false alarm number (m(FA)) is 1. In addition, another alarm system based on the original ER rule is designed as a comparative experiment. Repeat the above experimental steps, when using Equation (23) to fuse the alarm evidence a t i , the optimal fusion weights {w1 = 0.92, w2 = 0.86, w3 = 0.90} and optimal reliabilities { r 1 = 0.74, r 2 = 0.70, r 3 = 0.60} are obtained according to the training set, and the results are m(MA) = 79 and m(FA) = 9 respectively.
Table 7 shows a part of the interval-valued reliability under the interval-valued ER rule. As can be shown in Table 7, the interval-valued reliability ri dynamically changes according to the input information in real-time. It is obvious that this is more in line with the actual change of the input variable. On the contrary, whether the optimal values of reliability are obtained based on expert knowledge or based on optimization of the training set, reliabilities of the original ER rule are quantitative values in each fusion, which limits the performance of designing alarm system based on the ER rule to a certain extent.
In order to show the effectiveness of the proposed method, use the above proposed simulation platform to randomly generate 100 test sets, and each test set includes 900 samples. Repeat the above experimental steps and perform multiple test experiment. Calculate the average of m(MA) and m(FA) for each variable, shown in Figure 5 and Figure 6.
As shown in Figure 6 and Figure 7, under the 3σ method, m(MA) = 604.3 and m(FA) = 2.5 for x1, m(MA) = 356.1 and m(FA) = 3.6 for x2, m(MA) = 180.7 and m(FA) = 3.8 for x3; all results are higher than the interval-valued ER rule method, especially the m(MA) of x1 is very high, so the 3σ method is inappropriate in practical applications, while m(MA) = 30.1 and m(FA) = 0.6 under the interval-valued ER rule method, which is far below the 3σ method. Under the filtering method, m(MA) = 542.5 and m(FA) = 2.5 for x1, m(MA) = 302.4 and m(FA) = 3.2 for x2, m(MA) = 123.7 and m(FA) = 3.9 for x3. The filtering method has some advantages over the 3σ method, but m(MA) and m(FA) of the filtering method is still relatively high compared with the interval-valued ER rule method. Under the time delay method, m(MA) = 529.2 and m(FA) = 2.4 for x1, m(MA) = 311.3 and m(FA) = 3.2 for x2, m(MA) = 141.4 and m(FA) = 3.4 for x3. The performance of the time delay method is similar to that of the filtering method. Under the FAP-MAP method, m(MA) = 506.3 and m(FA) = 3.1 for x1, m(MA) = 281.6 and m(FA) = 3.3 for x2, m(MA) = 130.7 and m(FA) = 3.7 for x3. The performance of the FAP-MAP method is the best among the traditional methods, but it also has a certain gap with the interval-valued ER rule method. According to the above results, traditional alarm design methods expose the limitations in multivariate industrial processes, i.e., traditional alarm design methods only consider the alarm results of univariate and lack the ability to handle multivariable alarms simultaneously, which makes the alarm result lack consistency. On the contrary, the interval-valued ER rule method obtains consistent results compared with traditional alarm design methods for multivariate alarm system. It can be seen from Figure 6 and Figure 7 that m(MA) and m(FA) under the interval-valued ER rule method are the lowest compared with traditional alarm design methods, and they are 30.1 and 0.6 respectively. In the interval-valued ER rule method, the alarm evidence is obtained through the data-driven REM, which can be considered as a lossless conversion from process variables to alarm evidence and accurately describes the statistical characteristics of the sample data, so this can significantly reduce m(FA) and m(MA).
In addition, as shown in Figure 6 and Figure 7, the m(MA) = 80.2 and m(FA) = 2.5 for the original ER rule method, and the m(MA) and m(FA) under the interval-valued ER rule method are reduced of 50.1 and 1.9 respectively compared with the original ER rule method. On the one hand, because fixed reliability lacks the ability to handle objective uncertainty, the effectiveness of the original ER rule method is certainly not as good as the interval-valued ER rule method. On the other hand, the interval-valued ER rule can accurately describe process variables by the adjustment of interval-valued reliability. The reliability of alarm evidence is described by the form of random variables, which makes the interval-valued ER rule possess the ability to maximize the process of input information. In summary, the alarm design method based on the interval-valued ER rule can greatly reduce both m(MA) and m(FA).
However, the alarm design method based on the interval-valued ER rule also has certain weaknesses. Due to the limitation of ER algorithm, when the dimensionality of process variables increases, the computational difficulty also rises correspondingly. To address the above weaknesses, in future work, we consider introducing dimensionality reduction methods as well as vectorization methods to reduce the dimensionality of process variables and filter out the appropriate process variables, which can reduce the computational difficulty and obtain the most rational alarm result.

5. Conclusions and Discussion

In view of the accurate transformation from process variable to alarm evidence and the reasonability of alarm result, this paper proposes an alarm design method based on the interval-valued ER rule. Its main contributions are as follows: (1) The REM is constructed based on training sample data of multiple process variables, and the real-time sample of the process variable activates REM to obtain the alarm evidence respectively, which achieves the accurate transformation of process variable data into alarm evidence. (2) The interval-valued ER rule is proposed, which fuses alarm evidence corresponding to process variable data, and obtains the integrated alarm evidence. Among that, the reliability of alarm evidence is inscribed by random variables with certain probability distribution characteristics on the interval, and the interval of reliability is adaptively adjusted according to the change of real-time sample of the process variable, which improves the reasonability of the fusion process. (3) The case study shows that the alarm design method based on the interval-valued ER rule can make full use of the contradictory, redundant, and complementary information of each process variable, and obtain more accurate and consistent alarm results compared with the traditional alarm design method in practical applications.

Author Contributions

Conceptualization, S.L.; methodology, X.W.; software, S.Y. and S.L.; validation, S.L. and X.W.; investigation, S.L., X.W., X.X., Z.Z., F.L. and F.S.; writing—original draft preparation, S.L.; supervision, X.X. and F.L.; project administration, X.X., F.L. and G.B.; funding acquisition, X.X. and F.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by “the Zhejiang Province Outstanding Youth Fund (X.X., LR21F030001)”, “the National key R&D project (X.X., 2022YFE0210700)”, “the Zhejiang Province Key R&D projects (X.X., 2021C03015)”, “the NSFC (X.X., 61903108, 52171352, 62103121, 71904168)”, “the Natural Science Foundation of Zhejiang Province, China (LY21F030011)”, “the Humanities and Social Sciences Foundation of the Ministry of Education of China (F.L., 19YJC630101)”, “the Zhejiang Province Public Welfare Technology Application Research Project (X.X., LGF21F020013, LGG22F020023)” and “the Zhejiang Province Key R&D projects (X.X., 2021C03142)”.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

The datasets used in this paper can be found on http://web.mit.edu/braatzgroup/links.html (accessed on 13 August 2022).

Acknowledgments

We acknowledge financial support from the Zhejiang Province Outstanding Youth Fund (LR21F030001), the National key R&D project (2022YFE0210700), the Zhejiang Province Key R&D projects (2021C03015,), the NSFC (61903108, 52171352, 62103121, 71904168), the Natural Science Foundation of Zhejiang Province, China (LY21F030011), the Humanities and Social Sciences Foundation of the Ministry of Education of China (19YJC630101), the Zhejiang Province Public Welfare Technology Application Research Project (LGF21F020013, LGG22F020023), the Zhejiang Province Key R&D projects (2021C03142).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Hu, W.K.; Chen, T.; Shah, S.L. Discovering association rules of mode-dependent alarms from alarm and event logs. IEEE Trans. Control Syst. Technol. 2017, 26, 971–983. [Google Scholar] [CrossRef]
  2. Wang, J.D.; Yang, F.; Chen, T.W. An overview of industrial alarm systems: Main causes for alarm overloading, research, and open problems. IEEE Trans. Autom. Sci. Eng. 2015, 13, 1045–1061. [Google Scholar] [CrossRef]
  3. Parsa, K.; Hassal, M.; Naderpour, M. Process alarm modeling using graph theory: Alarm design review and rationalization. IEEE Syst. J. 2021, 15, 2257–2268. [Google Scholar] [CrossRef]
  4. Yu, W.K.; Zhao, C.H. Broad Convolutional neural network based industrial process fault diagnosis with incremental learning capability. IEEE Trans. Ind. Electron. 2020, 67, 5081–5091. [Google Scholar] [CrossRef]
  5. Gao, H.H.; Liu, F.F.; Zhu, Q.X. A correlation consistency based multivariate alarm thresholds optimization approach. ISA Trans. 2016, 65, 37–43. [Google Scholar] [CrossRef]
  6. Zhao, Y.; Zhao, C.H. Dynamic multivariate threshold optimization and alarming for nonstationary processes subject to varying conditions. Control Eng. Pract. 2022, 124, 105180. [Google Scholar] [CrossRef]
  7. Aslansefat, K.; Gogani, M.B.; Yari, M. Performance evaluation and design for variable threshold alarm systems through semi-Markov process. ISA Trans. 2020, 97, 282–295. [Google Scholar] [CrossRef]
  8. Xiong, W.Q.; Wang, J.D.; Chen, K. Multivariate alarm systems for time-varying processes using Bayesian filters with applications to electrical pumps. IEEE Trans. Ind. Inform. 2018, 14, 504–513. [Google Scholar] [CrossRef]
  9. Tulsyan, A.; Alrowaie, F.; Gopaluni, B. Design and assessment of delay timer alarm systems for nonlinear chemical processes. AIChE J. 2018, 64, 77–90. [Google Scholar] [CrossRef]
  10. Roohi, M.H.; Chen, T.W. Generalized moving variance filters for industrial alarm systems. J. Process Control 2020, 95, 75–85. [Google Scholar] [CrossRef]
  11. Afzal, M.S.; Chen, T.; Bandehkhoda, A.; Izadi, I. Analysis and design of time-deadbands for univariate alarm systems. Control Eng. Pract. 2018, 71, 96–107. [Google Scholar] [CrossRef]
  12. Bracale, A.; Caramia, P.; De Falco, P. A multivariate approach to probabilistic industrial load forecasting. Electr. Power Syst. Res. 2020, 187, 106430. [Google Scholar] [CrossRef]
  13. Du, W.Y.; Zhang, Y.W.; Zhou, W. Modified non-Gaussian multivariate statistical process monitoring based on the Gaussian distribution transformation. J. Process Control 2020, 85, 1–14. [Google Scholar] [CrossRef]
  14. Han, L.; Gao, H.H.; Xu, Y. Combining FAP, MAP and correlation analysis for multivariate alarm thresholds optimization in industrial process. J. Loss Prev. Process Ind. 2016, 40, 471–478. [Google Scholar] [CrossRef]
  15. Yu, Y.; Wang, J.D.; Yang, Z.J. Design of alarm trippoints for univariate analog process variables based on alarm probability plots. IEEE Trans. Ind. Electron. 2017, 64, 6494–6505. [Google Scholar] [CrossRef]
  16. Sun, Y.N.; Qin, W.; Xu, H.W. A multiphase information fusion strategy for data-driven quality prediction of industrial batch process. Inf. Sci. 2022, 608, 81–95. [Google Scholar] [CrossRef]
  17. Roman, R.C.; Precup, R.E.; Petriu, E.M. Hybrid data-driven fuzzy active disturbance rejection control for tower crane systems. Eur. J. Control 2021, 58, 373–387. [Google Scholar] [CrossRef]
  18. Ning, P.Y.; Zhou, Z.J.; Cao, Y. A Concurrent Fault Diagnosis Model via the Evidential Reasoning Rule. IEEE Trans. Instrum. Meas. 2022, 71, 1–16. [Google Scholar] [CrossRef]
  19. Chi, R.; Li, H.; Shen, D.; Hou, Z. Enhanced P-type Control: Indirect Adaptive Learning from Set-point Updates. IEEE Trans. Autom. Control 2022. [Google Scholar] [CrossRef]
  20. Zhao, K.Y.; Li, L.; Chen, Z.Q. A survey: Optimization and applications of evidence fusion algorithm based on Dempster-Shafer theory. Appl. Soft Comput. 2022, 124, 109075. [Google Scholar] [CrossRef]
  21. Yaghoubi, V.; Cheng, L.L.; Van Paepegem, W. A novel muti-classifier information fusion based on Dempster-Shafer theory: Application to vibration-based fault detection. Struct. Health Monit. 2022, 21, 596–612. [Google Scholar] [CrossRef]
  22. Ren, M.L.; He, P.; Zhou, J.J. Decision fusion of two sensors object classification based on the evidential reasoning rule. Expert Syst. Appl. 2022, 210, 118620. [Google Scholar] [CrossRef]
  23. Wang, J.; Zhou, Z.J.; Hu, C.H. A fusion approach based on evidential reasoning rule considering the reliability of digital quantities. Inf. Sci. 2022, 612, 107–131. [Google Scholar] [CrossRef]
  24. Luo, Z.Y.; Deng, Y. A matrix method of basic belief assignment’s negation in Dempster-Shafer theory. IEEE Trans. Fuzzy Syst. 2020, 28, 2270–2276. [Google Scholar] [CrossRef]
  25. Cheng, C.P.; Xiao, F.Y. A new distance measure of belief function in evidence theory. IEEE Access 2019, 57, 98–104. [Google Scholar] [CrossRef]
  26. Zhou, M.; Liu, X.B.; Yang, J.B. Evidential reasoning approach with multiple kinds of attributes and entropy-based weight assignment. Knowl.-Based Syst. 2019, 163, 358–375. [Google Scholar] [CrossRef]
  27. Zou, W.D.; Xia, Y.Q.; Li, H.F. Fault diagnosis of Tennessee-Eastman process using orthogonal incremental extreme learning machine based on driving amount. IEEE Trans. Cybern. 2018, 48, 3403–3410. [Google Scholar] [CrossRef]
  28. Lomov, I.; Lyubimov, M.; Makarov, I. Fault detection in Tennessee Eastman process with temporal deep learning models. J. Ind. Inf. Integr. 2021, 23, 100216. [Google Scholar] [CrossRef]
  29. Zhou, Z.J.; Liu, T.Y.; Hu, G.Y. Fault-alarm-threshold optimization method based on interval evidence reasoning. Sci. China Inf. Sci. 2019, 62, 89202. [Google Scholar] [CrossRef] [Green Version]
Figure 1. The flowchart of the designed multivariate alarm method.
Figure 1. The flowchart of the designed multivariate alarm method.
Mathematics 11 00088 g001
Figure 2. Flow chart of TE process.
Figure 2. Flow chart of TE process.
Mathematics 11 00088 g002
Figure 3. The sample sequence of process variable x1(k).
Figure 3. The sample sequence of process variable x1(k).
Mathematics 11 00088 g003
Figure 4. The sample sequence of process variable x2(k).
Figure 4. The sample sequence of process variable x2(k).
Mathematics 11 00088 g004
Figure 5. The sample sequence of process variable x3(k).
Figure 5. The sample sequence of process variable x3(k).
Mathematics 11 00088 g005
Figure 6. The missed alarm number (m(MA)) for each method.
Figure 6. The missed alarm number (m(MA)) for each method.
Mathematics 11 00088 g006
Figure 7. The false alarm number (m(FA)) for each method.
Figure 7. The false alarm number (m(FA)) for each method.
Mathematics 11 00088 g007
Table 1. The sample cast point table of [xi(k), y(k)].
Table 1. The sample cast point table of [xi(k), y(k)].
xi(k) O 1 i O 2 i O 3 i O N i i Total
y(k)
Z1 δ 1 , 1 i δ 1 , 2 i δ 1 , 3 i δ 1 , N i i ψ 1 i
Z2 δ 2 , 1 i δ 2 , 2 i δ 2 , 3 i δ 2 , N i i ψ 2 i
Total φ 1 i φ 2 i φ 3 i φ N i i K
Table 2. The referential evidence matrix table of input xi(k).
Table 2. The referential evidence matrix table of input xi(k).
xi(k) T 1 i T 2 i T 3 i T N i i
y(k) O 1 i O 2 i O 3 i O N i i
Z1 λ 1 , 1 i λ 1 , 2 i λ 1 , 3 i λ 1 , N i i
Z2 λ 2 , 1 i λ 2 , 2 i λ 2 , 3 i λ 2 , N i i
Table 3. Table of referential evidence matrix (REM) for variable x1(k).
Table 3. Table of referential evidence matrix (REM) for variable x1(k).
y(k)x1(k)
1415.216.417.618.82021.222.423.624.826
NA0.84670.97380.96580.88400.69900.33560.16300.06290.035600
A0.15330.02620.03420.11600.30100.66440.83700.93710.964411
Table 4. Table of referential evidence matrix (REM) for variable x2(k).
Table 4. Table of referential evidence matrix (REM) for variable x2(k).
y(k)x2(k)
5152.453.855.255.65859.460.862.263.665
NA00000.00690.06400.47550.86340.94540.96371
A11110.99310.93600.52450.13660.05460.03630
Table 5. Table of referential evidence matrix (REM) for variable x3(k).
Table 5. Table of referential evidence matrix (REM) for variable x3(k).
y(k)x3(k)
13.113.213.313.413.513.613.713.813.914.014.1
NA00000.00110.08690.64420.94890.97240.97050.9966
A11110.99890.91310.35580.05110.02760.02950.0034
Table 6. Optimal threshold values of each variable.
Table 6. Optimal threshold values of each variable.
VariableThe 3σ MethodThe Filtering MethodThe Time Delay MethodThe FAP-MAP Method
122.8522.6422.6022.43
257.5057.6157.5957.62
313.5813.6213.5913.65
Table 7. A part of interval-valued reliability under the interval-valued ER rule.
Table 7. A part of interval-valued reliability under the interval-valued ER rule.
Parameterk
123898899900
Interval reliabilityr1[0.489,0.997][0.472,1.00][0.475,1.00][0.463,1.00][0.555,0.932][0.490,0.997]
r2[0.439,0.961][0.448,0.952][0.439,0.961][0.362,1.00][0.381,1.00][0.418,0.982]
r3[0.331,0.870][0.332,0.869][0.343,0.858][0.423,0.778][0.290,0.911][0.325,0.876]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yu, S.; Liu, S.; Weng, X.; Xu, X.; Zhang, Z.; Liu, F.; Steyskal, F.; Brunauer, G. A Data-Driven Process Monitoring Approach Based on Evidence Reasoning Rule Considering Interval-Valued Reliability. Mathematics 2023, 11, 88. https://doi.org/10.3390/math11010088

AMA Style

Yu S, Liu S, Weng X, Xu X, Zhang Z, Liu F, Steyskal F, Brunauer G. A Data-Driven Process Monitoring Approach Based on Evidence Reasoning Rule Considering Interval-Valued Reliability. Mathematics. 2023; 11(1):88. https://doi.org/10.3390/math11010088

Chicago/Turabian Style

Yu, Shanen, Saijun Liu, Xu Weng, Xiaobin Xu, Zhenjie Zhang, Fang Liu, Felix Steyskal, and Georg Brunauer. 2023. "A Data-Driven Process Monitoring Approach Based on Evidence Reasoning Rule Considering Interval-Valued Reliability" Mathematics 11, no. 1: 88. https://doi.org/10.3390/math11010088

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop