Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
GENERALIZED PATTERN RECOGNITION FOR FAULT DIAGNOSIS IN MACHINE CONDITION MONITORING
Document Type and Number:
WIPO Patent Application WO/2013/188145
Kind Code:
A1
Abstract:
A generalized pattern recognition is used to identify faults in machine condition monitoring. Pattern clusters are identified in operating data. A classifier is trained using the pattern clusters in addition to annotated training data. The operating data is also used to cluster the signals in the operating data into signal clusters. Monitored data samples are then classified by evaluating confidence vectors that include substitutions of signals contained in the training data by signals in the same signal clusters as the signals contained in the training data.

Inventors:
YUAN CHAO (US)
CHAKRABORTY AMIT (US)
WIEBKING LEIF (DE)
HACKSTEIN HOLGER (DE)
Application Number:
PCT/US2013/043854
Publication Date:
December 19, 2013
Filing Date:
June 03, 2013
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
SIEMENS AG (DE)
YUAN CHAO (US)
CHAKRABORTY AMIT (US)
WIEBKING LEIF (DE)
HACKSTEIN HOLGER (DE)
International Classes:
G05B23/02; G06N20/00
Foreign References:
US20120041575A12012-02-16
US20100138368A12010-06-03
Other References:
GABRYS B ET AL: "Combining labelled and unlabelled data in the design of pattern classification systems", INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, ELSEVIER SCIENCE, NEW YORK, NY, US, vol. 35, no. 3, 1 March 2004 (2004-03-01), pages 251 - 273, XP007901506, ISSN: 0888-613X, DOI: 10.1016/J.IJAR.2003.08.005
FOUED THELJANI ET AL: "New approach for systems monitoring based on semi-supervised classification", COMMUNICATIONS, COMPUTING AND CONTROL APPLICATIONS (CCCA), 2011 INTERNATIONAL CONFERENCE ON, IEEE, 3 March 2011 (2011-03-03), pages 1 - 6, XP031968065, ISBN: 978-1-4244-9795-9, DOI: 10.1109/CCCA.2011.6031224
Attorney, Agent or Firm:
CONOVER, Michele, L. et al. (170 Wood Avenue SouthIselin, NJ, US)
Download PDF:
Claims:
Claims

What is claimed is:

1. A method of machine condition monitoring, comprising:

receiving, by a computer, historic operating data including data from O signals over time;

extracting / patterns x from data from individual signals in the operating data; clustering the / patterns into /Γ pattern clusters c¾. based on similarities;

clustering the O signals into R signal clusters based on correlations among the O signals;

receiving an annotated training data sample containing data from N signals selected from the O signals and having at least one marked failure time period;

creating af x jV confidence vector containing K confidence values for each of the N signals, each confidence value representing a confidence that a pattern x extracted from data in the marked failure time period of a signal belongs to one of the K pattern clusters; training a classifier using the K * N confidence vector;

receiving, by a computer, a monitored data sample including data from the O signals; and

classifying, by a computer, the monitored data sample as indicating a failure based on at least one of the O signals not among the / signals being in a same signal cluster as one of the / signals and further based on a determination that the at least one of the O signals has confidence values similar to confidence values of the one of the / signals contained in the K x N confidence vector.

2. A method as in claim 1 , wherein extracting / patterns from the individual signals in the operating data comprises using a sliding time window of fixed length.

3. A method as in claim 1 , wherein clustering the / patterns into K pattern clusters and clustering the O signals into R signal clusters further comprises:

for each of the / patterns, extracting scalar features describing the pattern; and using the scalar features to cluster the patterns and the signals.

4. A method as in claim 1 , wherein clustering the / patterns into K pattern clusters is performed across all O signals.

5. A method as in claim 1 , wherein clustering the / patterns into K pattern clusters is performed across signals in a same signal cluster.

6. A method as in claim 1 , wherein clustering the / patterns into K pattern clusters comprises applying K-mean clustering to form the clusters.

7. A method as in claim 1 , wherein clustering the O signals into R signal clusters further comprises:

calculating pair-wise signal correlation based on the historic operating data; and clustering the signals using hierarchical clustering.

8. A method as in claim 1 , wherein each confidence value representing a confidence that pattern x belongs to pattern cluster c¾. is defined by:

pkexp(-dist(f(x , μ^)

= 1 Pj-exp (-dist(f(x), μ;·)) wherein pk is a weight of cluster <¾, and dist f(x), μ^) is a distance between a pattern feature vector / (x) describing the pattern x and a mean μ¾ of the cluster c¾..

9. A method as in claim 1 , wherein one of the K confidence values for a particular signal equals 1, and the remaining of the K confidence values equal zero.

10. A method as in claim 1 , wherein, for each of the N signals, a sum of the K confidence values equals 1.

1 1. A method as in claim 1 , wherein classifying the monitored data sample comprises:

evaluating confidence vectors for sub-combinations of the monitored data sample signals O in which each of the annotated data training signals N is either included in the sub-combination or is represented in the sub-combination by a monitored data sample signal in the same signal cluster c¾. as the represented annotated data training signal.

12. A method as in claim 1 1, wherein classifying the monitored data sample further comprises:

applying a greedy algorithm to identify a dominant confidence vector; and determining whether an evaluation function value for the dominant confidence vector exceeds a threshold.

13. A non-transitory computer-usable medium having computer readable instructions stored thereon for execution by a processor to perform a method of machine condition monitoring, the method comprising:

receiving historic operating data including data from O signals over time;

extracting / patterns x from data from individual signals in the operating data; clustering the / patterns into ^ pattern clusters <¾ based on similarities;

clustering the O signals into R signal clusters based on correlations among the O signals;

receiving an annotated training data sample containing data from N signals selected from the O signals and having at least one marked failure time period;

creating al x iV confidence vector containing K confidence values for each of the N signals, each confidence value representing a confidence that a pattern x extracted from data in the marked failure time period of a signal belongs to one of the ^pattern clusters; training a classifier using the K * N confidence vector;

receiving a monitored data sample including data from the O signals; and classifying the monitored data sample as indicating a failure based on at least one of the O signals not among the / signals being in a same signal cluster as one of the / signals and further based on a determination that the at least one of the O signals has confidence values similar to confidence values of the one of the / signals contained in the K x N confidence vector.

14. A non-transitory computer-usable medium as in claim 13, wherein extracting / patterns from the individual signals in the operating data comprises using a sliding time window of fixed length.

15. A non-transitory computer-usable medium as in claim 13, wherein clustering the / patterns into K pattern clusters and clustering the O signals into R signal clusters further comprises:

for each of the / patterns, extracting scalar features describing the pattern; and using the scalar features to cluster the patterns and the signals.

16. A non-transitory computer-usable medium as in claim 13, wherein clustering the / patterns into K pattern clusters is performed across all O signals.

17. A non-transitory computer-usable medium as in claim 13, wherein clustering the / patterns into K pattern clusters is performed across signals in a same signal cluster.

18. A non-transitory computer-usable medium as in claim 13, wherein clustering the / patterns into K pattern clusters comprises applying K-mean clustering to form the clusters.

19. A non-transitory computer-usable medium as in claim 13, wherein clustering the O signals into R signal clusters further comprises:

calculating pair-wise signal correlation based on the historic operating data; and clustering the signals using hierarchical clustering.

20. A non-transitory computer-usable medium as in claim 13, wherein each confidence value representing a confidence that pattern x belongs to pattern cluster c¾. is defined by:

pkexp(-dist(f(x)^k)) wherein pk is a weight of cluster C^, and dist(f(x), is a distance between a pattern feature vector / (x) describing the pattern x and a mean μ¾ of the cluster <¾.

21. A non-transitory computer-usable medium as in claim 13, wherein one of the K confidence values for a particular signal equals 1 , and the remaining of the K confidence values equal zero.

22. A non-transitory computer-usable medium as in claim 13, wherein, for each of the N signals, a sum of the K confidence values equals 1.

23. A non-transitory computer-usable medium as in claim 13, wherein classifying the monitored data sample comprises:

evaluating confidence vectors for sub-combinations of the monitored data sample signals O in which each of the annotated data training signals N is either included in the sub-combination or is represented in the sub-combination by a monitored data sample signal in the same signal cluster c¾. as the represented annotated data training signal.

24. A non-transitory computer-usable medium as in claim 23, wherein classifying the monitored data sample further comprises:

applying a greedy algorithm to identify a dominant confidence vector; and determining whether an evaluation function value for the dominant confidence vector exceeds a threshold.

Description:
GENERALIZED PATTERN RECOGNITION FOR FAULT DIAGNOSIS IN MACHINE CONDITION MONITORING

Field of the Invention

[1] This invention relates generally to machine condition monitoring, and more particularly to methods, systems and computer readable media for detecting machine failures from limited training data using supervised pattern-recognition-based techniques.

Background of the Invention

[2] The task of machine condition monitoring is to detect machine failures at an early stage such that maintenance can be carried out in a timely manner. In the case of failure, it is very important to know the cause of this failure so that corresponding localized, and thus more efficient, maintenance can be applied.

[3] Rule-based systems are perhaps the most widely used condition monitoring approaches. The general format of a rule is "if a condition, then a fault type." Rules are defined by experts who possess the knowledge of the underlying system model; however, designing accurate rules is a very deliberate and time consuming process, especially for complex systems with many sensors and fault types. For example, it required 80 man years to develop one commercially successful condition monitoring rule base.

Summary of the Invention

[4] The present invention addresses the needs described above by providing a method for machine condition monitoring. Historic operating data including data from O signals over time is received by a computer. / patterns x are extracted from data from individual signals in the operating data. The / patterns are clustered into K pattern clusters c k based on similarities, and the O signals are clustered into R signal clusters based on correlations among the O signals.

[5] An annotated training data sample is received, containing data from N signals selected from the O signals and having at least one marked failure time period. A K x N confidence vector is created containing K confidence values for each of the N signals, each confidence value representing a confidence that a pattern x extracted from data in the marked failure time period of a signal belongs to one of the ^pattern clusters. A classifier is trained using the N confidence vector.

[6] A monitored data sample is then received including data from the O signals. The monitored data sample is classified as indicating a failure based on at least one of the O signals not among the / signals being in a same signal cluster as one of the / signals and further based on a determination that the at least one of the O signals has confidence values similar to confidence values of the one of the / signals contained in the K x N confidence vector.

[7] In another aspect of the invention, a non-transitory computer-usable medium is provided having computer readable instructions stored thereon for execution by a processor to perform methods for machine condition monitoring as described above.

Brief Description of the Drawings

[8] FIG. 1 is a schematic illustration of a machine condition monitoring tool in accordance with one embodiment of the invention.

[9] FIG. 2 is an example table showing confidence levels for various signal classifications in accordance with one embodiment of the invention.

[10] FIG. 3 is a schematic diagram showing a computer system for instantiating a tool in accordance with one embodiment of the invention.

Description of the Invention

[11] The present disclosure focuses on an approach for using machine learning, and specifically, supervised pattern-recognition-based techniques. Machine learning models are data-driven: they are learned from training data automatically. That can be done very fast (for example, in minutes). If properly trained, machine learning models can describe complex fault conditions better than what is possible using rule bases.

[12] Because machine learning techniques are data-driven, they require adequate training data to achieve the desired accuracy. The training data should represent both normal operation and failure modes. This requirement, however, is very difficult to meet. It is easy to obtain training data representing the normal condition because a machine should be operating normally during most of its lifespan. Obtaining training data representing a fault type, however, is rather challenging because certain types of faults may only occur rarely (even if we consider a collection of similar machines). Even for those few instances, the user is unlikely to spend time annotating all of them. It is thus very likely that only one training sample representing a failure is available, which makes the fault rather difficult to learn. In addition, during monitoring, the same failure type may be shown on different set of signals from the signals specified during training. It is therefore almost impossible to classify new failure patterns if a traditional classification approach is followed.

[13] A diagram 100 shown in FIG. 1 provides an overview of the presently proposed technique. The technique comprises two parts: a training part 120 and a monitoring part 150. The training part 120 additionally includes two sub-parts. In the first sub-part, operating data 131 are used. Features are extracted from the operating data at 132 and are used for signal clustering 133 and pattern clustering 134. In a second subpart of the training 120, user-annotated data 141 undergo feature extraction 142 and are transformed into confidence vectors 143, which are used to train the classifier at 144.

[14] During monitoring, the results from signal clustering and pattern clustering of extracted features 151 are used to compute a confidence value table 152 for test patterns. Candidate hypotheses are then created at 153 from the confidence value table. The most possible candidate hypothesis is classified at 154 to make the final decision ("yes" means that there is a failure and "no" means that the patterns are normal).

[15] The presently described technique generalizes from limited training samples to fault signatures that may be expected during future monitoring. Two schemes of generalization, pattern clustering 134 and signal clustering 133 (FIG. 1) are proposed below to extract useful information from operating data of the machine or similar machines. Such operating data are readily available. The operating data may include user-annotated training data and un-annotated data, and may contain known or unknown failures.

[16] In the pattern clustering scheme, patterns are generalized by clustering all patterns in the operating data. Each cluster can be viewed as a symptom. All patterns within the same cluster as the annotated pattern are similar and can be viewed as possible variations of the annotated patterns. The confidence of a pattern showing a symptom is also calculated to allow soft clustering.

[17] In the signal clustering scheme, signals are generalized by clustering all signals using the operating data. The assumption is that similar symptoms for the same failure type may only occur on similar signals in future. During monitoring, instead of checking only the signals specified by annotation, all possible signals similar to the annotated signals are checked. Each possible candidate forms a hypothesis and the dominant hypothesis is used for making the final decision.

[18] Problem definition

[19] During training, the user selects N signals, s 1 , s 2 , ... , s N from a total of O available and meaningful signals. Those selected N signals may be original sensors (e.g., measuring temperature, pressures). They may also be results from previous data processing, such as calculated values (e.g., average of several original sensors) or residuals (deviation of a sensor value from its ideal value). In addition, the user marks the time period T between t 0 — T + 1 and t 0 when a failure occurred. Data annotation is illustrated by block 141 of FIG. 1.

[20] The goal of the above annotation is to indicate what the failure looks like and when it occurred. The user can annotate L such instances of this failure. Ideally, only signals related to this failure should be selected. Similarly, only time stamps when the failure occurs should be marked. Let x, a Γ-dimensional vector, denote the pattern of a signal s such that

x = [s t 0 - T + l), s(t 0 — T + 2 s (t 0 )] T . All N patterns may be put into a TN-dimensional combined pattern vector X

Alternatively, a rule may be used to describe the failure. Let

s ~ x

indicate that signal s shows pattern x. Using the above terminology, it may be said that the failure occurs if each signal shows the corresponding pattern such that

i ~ x i

¾ ~ X 2 w ~ x w

[21] If different failure instances have different data resolution or time duration

T, they may be normalized by up-sampling or down-sampling the signals. From now on, it is assumed that all patterns are within the same time duration T and that they have the same resolution. T also indicates the number of data points for each pattern.

[22] In addition to the annotation of the failure, the user may annotate normal operation of the machine. This normal operating time is usually much larger and is shown in multiple time ranges. It indicates what the signals look like when the machine is normal. A sliding window with a length of T is used to extract patterns from these annotated normal data to represent normal behavior. Suppose that there are M such examples.

[23] The aim is to train a classifier based on the above annotated data. During monitoring, at every time stamp t, this trained classifier will be applied to the data of the N selected signals and make a decision about whether the failure occurs or not at t.

[24] Feature extraction

[25] Pattern x is represented by the original signal values. It may not directly yield the most relevant information about the failure. Thus, it is useful to extract information or features / (x) from the original pattern x such that

fix) = [Λ(χ), / 2 (χ) f D (x)] T . Each feature f d (x) can be viewed as a transformation from the Γ-dimensional pattern x to a scalar, where d = 1 , 2, ... , D.

[26] Possible features include but are not limited to the following

- Original signal values. / (x) = x.

- Subspace projection, x is projected to a lower subspace such as a space

spanned by principal components. The projections are used as features.

- Fourier transform (if pattern x is usually stationary).

- Wavelet transform (if pattern x is usually non-stationary).

- Histogram. All possible values of a data point in x are divided into bins. The percentage of the count in each bin is used as a feature.

[27] The final/(x) can be a combination of above features. In any case, (x) extracted from a pattern x is generally a vector with a dimension of D. For example, if / is the Fourier transform and T contains 256 data points, then D = 256. Different patterns from different signals can have different types of features. For simplicity, it is assumed that a common feature function / is shared by all patterns from all signals.

[28] In the presently disclosed technique, feature extraction is performed on several groups of signals, including annotated data (block 142 of FIG. 1), operating data (block 132) and monitoring data (block 151).

Generalization

After feature extraction, the classification problem may be represented using extracted features. A training sample is represented by (F, y), where the DN- dimensional combined feature vector is defined by

F = [ (X 1 ) T , (X 2 ) T f(x N rr.

y is the class label: y = 1 if the training sample represents the failure and y = -1 if the training sample represents a normal sample. There are a total of M normal training samples (Fj, y^), (F 2 , 3 2 ),■■■ , (F ¾ , Υ ~ Μ an d L failure training samples

(F M+1 , y M+1 ), (? M +2 > yM+2) > - > (? M+L , y M+L ). Note that M ean be zero if the user does not annotate any normal training data, and L is usually very small, for example, L = 1. The task of classification is to learn a continuous evaluation function h (F) from the above M + L training samples such that a binary decision q (F) (1 for failure mode and - 1 for normal data) can be made as follows

[31] Standard classifiers will not work well if they are simply trained with the training examples created so far because of the following challenges:

- The number of training samples is extremely small for the failure case, such as

L = 1. That is far from enough to capture variations of patterns.

- During monitoring, the same type of failure may be shown on different signals other than the signals s 1 , s 2 , ... , s N selected by the user.

[32] Two generalization techniques are proposed below, one to address each of the two issues noted above. One objective is to extract useful information from all operating data of the machine or similar machines even if they are not annotated (as failure or normal data) by the user.

[33] Pattern generalization

[34] Although the annotated data cannot show how the pattern may vary in the future, it is likely that variations of a pattern appeared before in all operating data of the same machine or in operating data of other similar machines because such data is usually plentiful. Therefore, it is possible to search the operating data for such variations of a training pattern which are different but should still be similar to the training pattern.

[35] In the presently described pattern generalization technique, patterns from all operating data are clustered (block 134 of FIG. 1). This clustering can be done independently of signals (or across all O signals) or can be done across similar signals (in the same signal cluster as described under signal generalization below). Only the first case is discussed here. Suppose that there is operating data for O signals for the last H time (for example, H = five years). A sliding window with a length of T may be used to extract pattern x from each of the O signals and for all H time. There will be a total of / patterns extracted. If / is too large, patterns may be randomly skipped to make / computationally manageable. The same feature extraction method / described above is applied to each of the / patterns. Finally, a standard clustering method such as K-mean is applied to these / pattern feature vectors / (x) to form K clusters. The number K can be specified by the user or by the algorithm automatically.

[36] Intuitively, each cluster represents an alphabet that in turn is used to represent normal and faulty patterns (or pattern feature vectors). For example, one cluster may represent the drifting-up patterns and another cluster may represent the drifting-down patterns. Note that this clustering is done only once for all signals.

[37] All / patterns have thus been clustered into K clusters. Each pattern cluster c k is now referred to as a symptom, where k = 1, 2, ..., K. A symptom c k is a high-level descriptor, as opposed to the low-level pattern x (or feature vector / (x) of a pattern x). The confidence P(c k |x) of a pattern x belonging to symptom c k is also computed:

where dist(f(x), μ^) is the distance between the pattern feature vector / (x) and the cluster (symptom) mean μ 1{ . dist(f(x), μ ¾ .) can be a Euclidean distance or a

Mahalanobis distance. p k indicates the weight of cluster C k ; it is usually proportional to the number of training patterns in this cluster and i + 2 + " ' + PK = 1 · Intuitively, the closer a pattern feature vector / (x) is to the cluster center μ 1{ , the smaller the distance dist(f (x) , μ^) and the higher the confidence of x (or / (x)) belonging to cluster c k .

[38] Once the pattern clustering is complete, the annotated training examples may be re- interpreted. Let

s ~ P(c k \x)

denote that signal s shows symptom c k with a confidence of P(c fc |x). The concept of symptom generalizes better than the original pattern s ~ x discussed above because now many similar patterns within the same cluster will have similar influences in making the final classification decision if they have similar confidences of belonging to the same cluster (or their distances from the cluster center μ are close). It may be said that a failure occurs if

s 1 ~P(c 1 \x 1 ), Si~P(c 2 |xi), ... , s 1 ~P(c K \x 1 ), s 2 ~P(c 1 \x 2 ), s 2 ~P(c 2 \x 2 ), ... , s 2 ~P(¾|x 2 ),

S j v-PCqlxjv), s N ~P(c 2 \x N ), ... , s N ~P(c K \x N ).

[39] In other words, the pattern for each of the N signals is now represented by

K confidence values, each value indicating the confidence of the pattern showing a symptom. The sum of these K values is equal to 1. If the user prefers a hard clustering decision wherein x is assigned to the most confident cluster c k , then only one confidence P(c fc |x) = 1 and all others are zero.

[40] Now a N-dimensional confidence vector P is defined for a training sample

P

= [P(q | Xl ), P(c 2 | Xl ) P(c K | Xl ) P( \x N , P(c 2 \x N P(c K \x N ] T .

The original 77V-dimensional combined pattern vector X = [χ^,χ^, ...,x^] T has been transformed to a ZW-dimensional combined feature vector

F = an d finally to the N-dimensional confidence vector P.

[41] Signal generalization

[42] The same type of failure can involve different monitored signals from the signals selected by the user during training. For example, in the blade path component of a gas turbine, multiple temperature sensors are usually installed at different locations. Because they are all measuring the temperature nearby, they are highly correlated.

During a blade path component failure such as a crack on the wall, some temperature sensors may drift down. In another such event, similar symptoms may occur on some other temperature sensors depending on the location of the failure. Therefore, there is a need to identify the same type of failure even when it is shown on a different set of signals. [43] The presently disclosed technique addresses this problem by clustering signals based on their correlation (block 133 of FIG. 1). First, a pair-wise signal correlation is calculated based on the operating data. Both linear and nonlinear correlation algorithms may be used. Second, signals are clustered using methods such as hierarchical clustering. To ensure that this signal generalization makes sense, this clustering is required to be very selective: signals are grouped only if they are really similar. This can be achieved by a very high similarity threshold in the hierarchical clustering. Suppose a total of R clusters are found and let r (s) denote the signal cluster for signal s, where r (s) = 1 , 2, ... , R.

[44] g (s) is used to indicate any signal from the same cluster to which the signal s belongs:

g(s = s' s. t. r(s') = r(s) .

[45] A new and final interpretation of a training sample is now possible, yielding the following confidence vector represented by block 143 of FIG. 1. A failure occurs if g(s 2 ) ~ ( i |x 2 ), g(s 2 ) ~ P(c 2 |x 2 ), ~ P(¾ |x 2 ), g(s N ~ s. t. g(s )≠ g(s 2 )≠ ···≠ g(s N ).

[46] The last term ensures that a signal is only used once in describing the failure. The major difference between defining a failure with g (s) and defining a failure with s is the following. In using s, only the signals specified by the user will be checked against the failure. However, by using g (s), because there are multiple combinations of signals besides the combination set by the user, satisfying the failure definition, all of them will be checked against the failure. For example, suppose that signal s 1 and s 2 are in the same signal cluster 1 and that signal cluster 1 has three signals including s 1 and s 2 During monitoring, every two-signal combination from this three-signal cluster must be be evaluated against this type of failure. If the number of signal clusters R is equal to O, the total number of signals, each signal forms its own cluster and thus g (s) = s.

Therefore, the above interpretation may also include the case where no signal clustering is performed.

[47] Note that the user can also interact with the signal clustering results by manually moving signals between clusters or removing or adding clusters. The signal generalization can be easily switched off so every signal forms its own cluster.

[48] Two-class classification

[49] During the training stage, shown as block 144 of FIG. 1 , each training sample is represented by (P, y), where P is the N-dimensional confidence vector defined above, y is the class label: 1 for a failure and -1 for a normal sample. In particular, the following classifiers are considered in different cases:

- If there is no normal training sample (M = 0) and there are more than one failure training samples (L > 1), a one-class support vector classifier is used.

- If there is no normal training sample (M = 0) and there are only one failure training sample (L = 1), a Naive Bayes classifier is used because a one- class support vector machine does not have an advantage in this case.

- If there are some normal training samples (M > 0), a standard two-class

support vector machine or AdaBoost classifier is used.

[50] After training, a continuous evaluation function h (P) is obtained for a confidence vector P. The classifier q (P) is defined as follows.

1 if h(P) > 0,

(- l if h(P) < 0.

If h (P) > 0, P and its associated pattern is classified as a failure; otherwise, it is classified as normal. Note that the higher the value h (P) is, the more likely it is a failure.

[51] During the monitoring stage, at every data point t, a pattern is extracted from every signal based on the past Ttime window from t. A confidence of that pattern belonging to a symptom is then calculated at block 152 of FIG. 1. The results are arranged in a table similar to table 200 shown in FIG. 2. [52] Suppose that the user selects signals s l 5 s 2 and s 4 to represent the failure.

In table 200, s , s 2 and s 3 belong to the same signal cluster 1; s 4 and s 5 belong to the same signal cluster 2. During monitoring, s l 7 s 2 can be replaced by any two signals from signal cluster 1, and there are three possibilities. s 4 may be replaced by any signal from signal cluster 2, and there are two possibilities. So there are a total of 3 x 2 = 6 possibilities or hypotheses. Each of the 6 hypotheses will form its corresponding confidence vector P from table 200. The dominant hypothesis with the largest evaluation function value h (P), represented by block 153 of FIG. 1, will be used to make the final classification decision 154.

[53] The above method may become computationally very expensive if there are a large number of signal clusters and the average number of signals per cluster is large. Thus, the following greedy algorithm may be used. First, a hypothesis is formed by either using the user-specified signals during training or randomly selected signals. Each signal in this hypothesis is then replaced by another unused signal within the same signal cluster that achieves the highest h (P). Such replacement is done only in one scan of all signals used in the hypothesis.

[54] Multi-class classification

[55] So far, the focus has been on how to make a decision between a failure y = 1 and normal data y =— 1. In practice, there are usually B > 1 number of possible failures. Therefore, it is necessary to train an evaluation function h b (P) for failure b, where b = 1 , 2, ... , B. Training h b (P) is very similar to that described previously, except that now the normal training samples and training samples from other B — 1 failures are treated as a combined negative training sample set (where label y = — 1). The goal is to discriminate failure b (where label y = 1) from the combined negative training samples. Following the same procedure, the evaluation function h b P) is obtained for every b. The final decision is made differently in the following different two cases.

[56] Multi-label classification: in this case, it is assumed that different failures can happen at the same time. Therefore, the same test sample can be classified into multiple failures. In this case, there is a binary classifier q b (P) for each failure b and the decision of P belonging to failure b is made independently

1 if h b (P) > 0,

(-l if /i 6 (P) < 0.

[57] Single-label classification: in this case, it is assumed that only one failure can happen at one time. Therefore, the most possible failure for a test sample must be selected. There is a single classifier q(P) that makes a single decision from failure label 1 , 2, ... , B or normal data label - 1 based on the maximum h b (P) :

b * = argMax b h b (P) if Max b h b (P) > 0,

q^ 1-1 if Max b h b (P) < 0.

[58] System

[59] The elements of the methodology as described above may be implemented in a computer system comprising a single unit or a plurality of units linked by a network or a bus. An exemplary system 300 is shown in FIG. 3.

[60] A system server 330 may be a mainframe computer, a desktop or laptop computer or any other device capable of processing data. The system server 330 receives data from any number of data sources that may be connected to the computer, including a wide area data network (WAN) 320. For example, the system server 330 may receive signals from the sensors 310, or may receive input from a user 312 through the WAN 320.

[61] The system server 330 includes a central processing unit (CPU) 334 and a memory 332. The server may be connected to an input and/or output device 350. The input may be a mouse, network interface, touch screen, etc., and the output may be a liquid crystal display (LCD), cathode ray tube (CRT) display, printer, etc. Alternatively, commands containing input/output data may be passed via the network 320. The server 330 can be configured to operate and display information by using, e.g., the input and output devices 350 to execute certain tasks. [62] The CPU 334, when configured using software according to the present disclosure, includes modules that are configured for performing one or more methods for machine condition monitoring as discussed herein.

[63] The memory 332 may include a random access memory (RAM) and a read-only memory (ROM). The memory may also include removable media such as a disk drive, tape drive, memory card, etc., or a combination thereof. The RAM functions as a data memory that stores data used during execution of programs in the CPU 334; the RAM is also used as a work area. The ROM functions as a program memory for storing a program executed in the CPU 334. The program may reside on the ROM or on any other tangible or non-volatile computer-usable medium as computer readable instructions stored thereon for execution by the CPU or another processor to perform the methods of the invention. The ROM may also contain data for use by the program or other programs.

[64] The above-described method may be implemented by program modules that are executed by a computer, as described above. Generally, program modules include routines, objects, components, data structures and the like that perform particular tasks or implement particular abstract data types. The term "program" as used herein may connote a single program module or multiple program modules acting in concert. The disclosure may be implemented on a variety of types of computers, including personal computers (PCs), hand-held devices, multi-processor systems, microprocessor- based programmable consumer electronics, network PCs, mini-computers, mainframe computers and the like. The disclosure may also be employed in distributed computing environments, where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, modules may be located in both local and remote memory storage devices.

[65] An exemplary processing module for implementing the methodology above may be hardwired or stored in a separate memory that is read into a main memory of a processor or a plurality of processors from a computer readable medium such as a ROM or other type of hard magnetic drive, optical storage, tape or flash memory. In the case of a program stored in a memory media, execution of sequences of instructions in the module causes the processor to perform the process steps described herein. The embodiments of the present disclosure are not limited to any specific combination of hardware and software and the computer program code required to implement the foregoing can be developed by a person of ordinary skill in the art.

[66] The term "computer-readable medium" as employed herein refers to any tangible machine-encoded medium that provides or participates in providing instructions to one or more processors. For example, a computer-readable medium may be one or more optical or magnetic memory disks, flash drives and cards, a read-only memory or a random access memory such as a DRAM, which typically constitutes the main memory. Such media excludes propagated signals, which are not tangible. Cached information is considered to be stored on a computer-readable medium. Common expedients of computer-readable media are well-known in the art and need not be described in detail here.

[67] The foregoing detailed description is to be understood as being in every respect illustrative and exemplary, but not restrictive, and the scope of the disclosure herein is not to be determined from the description, but rather from the claims as interpreted according to the full breadth permitted by the patent laws. It is to be understood that various modifications will be implemented by those skilled in the art, without departing from the scope and spirit of the disclosure.