Abstract:
System and method for robust machine learning (ML) includes an attack detector comprising one or more deep neural networks trained using adversarial examples generated from a generative adversarial network (GAN), producing an alertness score based on a likelihood of an input being adversarial. A dynamic ensemble of individually robust ML models of various types and sizes and all being trained to perform an ML-based prediction is dynamically adapted by types and sizes of ML models to be deployed during the inference stage of operation. The adaptive ensemble is responsive to the alertness score received from the attack detector. A data protector module with interpretable neural network models is configured to prescreen training data for the ensemble to detect potential data poisoning or backdoor triggers in initial training data.
Abstract:
A method for identifying underperforming agents in a multi-agent cooperative system includes receiving information relating to the performance of each agent in the multi-agent system, calculating an estimated extracted resource value of each agent based on the received information, comparing the estimated extracted resource value of each agent to a threshold value, calculating a performance index based on the comparison and identifying an agent as an under-performing agent based on the performance index. A system for identifying under-performing agents in a plurality of agents in a multi-agent cooperative system includes a performance analyzing processor, a communications port for receiving state information for each agent and control information for each agent, a classifier for identifying a subset of agents in the plurality of agents that are performance comparable and an optimizer configured to identify an under-performing agent of performance comparable agents and generate updated control information for the identified under-performing agent.
Abstract:
System and method are disclosed for approximating unknown safety constraints during reinforcement learning of an autonomous agent. A controller for directing the autonomous agent includes a reinforcement learning (RL) algorithm configured to define a policy for behavior of the autonomous agent, and a control barrier function (CBF) algorithm configured to calculate a corrected policy that relocates policy states to an edge of a safety region. Iterations of the RL algorithm safely learn an optimal policy where exploration remains within the safety region. CBF algorithm uses standard least squares to derive estimates of coefficients for linear constraints of the safe region. This overcomes inaccurate estimation of safety region constraints caused by one or more noisy observations of constraints received by sensors.
Abstract:
A system for verification of the output of a sensor includes an industrial system comprising a plurality of sensors, one of the plurality of sensors being a target sensor, a plurality of machine learning networks, each machine learning network connecting a plurality of driving sensors associated with the target sensor and trained using simulation data. a selected machine learning network from the plurality of machine learning networks having an output representative of the target sensor, the selected machine learning network being trained with real-time data from the industrial plant and a processor for comparing an output of the selected machine learning network to a real output of the target sensor. Based on the comparison, the real sensor output is provided as final output when the values match, and the estimated value is output when the values do not match and the sensor output is flagged as an error.
Abstract:
A method for increasing a meantime between service visits in an industrial system includes receiving event information from at least one information source, building an event network from the received event information, identifying a sequence of events indicative of a fault, and determining a cost-minimizing resolution to address the fault, wherein the event network is configured to identify a sequence of events that do not occur in direct chronological sequence. A services diagnostic engine may be configured to receive the event information, extract features of each event in the event information, identify a relationship between a first event and a second event and create a logical connection between the first and second event. The cost minimizing recommendation includes a remote operation to reset a component, for example remotely resetting a circuit breaker. The cost minimizing recommendation may be carried out automatically or presented to a user for consideration.
Abstract:
A method for predicting failure modes in a machine includes learning (31) a multivariate Gaussian distribution for each of a source machine and a target machine from data samples from one or more independent sensors of the source machine and the target machine, learning (32) a multivariate Gaussian conditional distribution for each of the source machine and the target machine from data samples from one or more dependent sensors of the source machine and the target machine using the multivariate Gaussian distribution for the independent sensors, transforming (33) data samples for the independent sensors from the source machine to the target machine using the multivariate Gaussian distributions for the source machine and the target machine, and transforming (34) data samples for the dependent sensors from the source machine to the target machine using the transformed independent sensor data samples and the conditional Gaussian distributions for the source machine and the target machine.
Abstract:
A method for solar forecasting includes receiving a plurality of solar energy data as a function of time of day at a first time, forecasting (620) from the solar energy data a mode, where the mode is a sunny day, a cloudy day, or an overcast day, and the forecast predicts the mode for a next solar energy datum, receiving (622) the next solar energy datum, updating a probability distribution function (pdf) of the next solar energy datum given the mode, updating a pdf of the mode for the next solar energy datum from the updated pdf of the new solar energy datum given the mode, forecasting (624, 626) a plurality of future unobserved solar energy data from the updated pdf of the mode, where the plurality of future unobserved solar energy data and the plurality of solar energy data have a Gaussian distribution for a given mode determined from training data.
Abstract:
A method for monitoring a condition of a system or process includes acquiring sensor data from a plurality of sensors disposed within the system (S41 and S44). The acquired sensor data is streamed in real-time to a computer system (S42 and S44). A discriminative framework is applied to the streaming sensor data using the computer system (S43 and S45). The discriminative framework provides a probability value representing a probability that the sensor data is indicative of an anomaly within the system. The discriminative framework is an integration of a Kalman filter with a logistical function (S41).
Abstract:
A method for reducing an amount of power consumed includes reading loads from meters of customers, predicting a future total load from the read loads, determining whether the future total load exceeds a threshold value, sending a request message including terms to at least one of the customers when the future total load exceeds the threshold value, and adjusting an electric bill of a corresponding one of the customers for a period of time based on whether the customer adhered to the terms.
Abstract:
A computer-implemented method of scheduling jobs for an industrial process includes receiving jobs to be executed on machines within a manufacturing facility. A job schedule is generated based on an optimization function that minimizes total energy cost for all the machines during a time horizon based on a summation of energy cost at each time step between a start time and an end time. The energy cost at each time step is a summation of (a) a first energy cost associated with each machine in sleeping mode during the time step, (b) a second energy cost associated with each machine in stand-by mode during the time step, and (c) a third energy cost associated with each machine in processing mode during the time step. The jobs are executed on the machines based on the job schedule.