SlideShare a Scribd company logo
1 of 6
Massimo Talia
Electronic Engineer
Web address: http://www.taliawebs.com
Summary
The observers and system engineering
The observers and safety engineering
Observation and artificial intelligence
Observation vs data minig
The observers and system engineering
The Observers are a gray box strategy for estimating a part
or the whole system dynamics from the I/O
(Inputs/Outputs) or for isolating the faults FDI (fault
detection isolation). An Observer can be linear or
nonlinear: it’s linear if its internal structure is a linear
system; it’s nonlinear if it replicates nonlinear dynamics.
It’s deteministic if the process is deterministic, it’s
stochastic if the process is stochastic.
In the pratical applications the observer functions are
implemented in firmware or hardware or in the industrial
supervision systems.
The observers and safety engineering
The observers make an hardware system to look the
eventual faults ahead before having errors and failures (no
system availability).
they minimize the possibility of mistakes or trap mistakes
before the introduction of system faults (Fault Avoidance);
they increase the probability of detecting and correcting
errors before the system goes into service(Fault Detection);
They are used to ensure the system faults do not result in
system errors and/or the system errors do not lead to the
system failure (Fault tolerance).
Observation and artificial intelligence
The techniques of fault avoidance, fault detection,
fault tolerance make the observers to extract
knowledge from the industrial processes, complex
systems and external physical sources . In a generic
schema an observer is used as estimator and another
one as fault detector, but in the real case there are
more complex schemas and redundancy. When the
redundancy increases, the algorithm model or the
hardware become more complex. The observation is
an application of artificial intelligence system-
oriented.
Observation vs data mining
The observation is a technique for extracting
knowledge and information from complex physical
systems as: industrial plants, electronic boards,
mechanical or electromechanical systems, chemical
and nuclear processes and so on.
Data minig is a technique of knowledge discovery and
artificial intelligence, which is based on the extraction
of one o more data set from a Datawarehouse , in order
to improve the business processes as: the sales, the
supply chain, the human resources, the production
and so on.

More Related Content

What's hot

Building an effective permit to work system
Building an effective permit to work systemBuilding an effective permit to work system
Building an effective permit to work systemcomplianceonline123
 
Why should you invest in a Lab Information Management System?
Why should you invest in a Lab Information Management System?Why should you invest in a Lab Information Management System?
Why should you invest in a Lab Information Management System?MocDoc
 
MIS 22 Disaster Management
MIS 22 Disaster ManagementMIS 22 Disaster Management
MIS 22 Disaster ManagementTushar B Kute
 
Laboratory information management system (LIMS)
Laboratory information management system (LIMS)Laboratory information management system (LIMS)
Laboratory information management system (LIMS)JYOTIRMOY ROY
 
IRJET- Web-based Application to Detect Heart Attack using Machine Learning
IRJET- Web-based Application to Detect Heart Attack using Machine LearningIRJET- Web-based Application to Detect Heart Attack using Machine Learning
IRJET- Web-based Application to Detect Heart Attack using Machine LearningIRJET Journal
 
Unlock the Power of Your IoT Security Platform
Unlock the Power of Your IoT Security PlatformUnlock the Power of Your IoT Security Platform
Unlock the Power of Your IoT Security PlatformMedigate
 
Software safety in embedded systems & software safety why, what, and how
Software safety in embedded systems & software safety   why, what, and how Software safety in embedded systems & software safety   why, what, and how
Software safety in embedded systems & software safety why, what, and how bdemchak
 
Xybion Webinar - Rumors, Risks and Realities of spreadsheet validation
Xybion Webinar - Rumors, Risks and Realities of spreadsheet validationXybion Webinar - Rumors, Risks and Realities of spreadsheet validation
Xybion Webinar - Rumors, Risks and Realities of spreadsheet validationXybion Corporation
 
Simplifying Medical Device Lifecycle Management
Simplifying Medical Device Lifecycle ManagementSimplifying Medical Device Lifecycle Management
Simplifying Medical Device Lifecycle ManagementMedigate
 
First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]Phil Huggins FBCS CITP
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...Donald E. Hester
 
Validation of excel spreadsheets
Validation of excel spreadsheetsValidation of excel spreadsheets
Validation of excel spreadsheetsDigital-360
 

What's hot (12)

Building an effective permit to work system
Building an effective permit to work systemBuilding an effective permit to work system
Building an effective permit to work system
 
Why should you invest in a Lab Information Management System?
Why should you invest in a Lab Information Management System?Why should you invest in a Lab Information Management System?
Why should you invest in a Lab Information Management System?
 
MIS 22 Disaster Management
MIS 22 Disaster ManagementMIS 22 Disaster Management
MIS 22 Disaster Management
 
Laboratory information management system (LIMS)
Laboratory information management system (LIMS)Laboratory information management system (LIMS)
Laboratory information management system (LIMS)
 
IRJET- Web-based Application to Detect Heart Attack using Machine Learning
IRJET- Web-based Application to Detect Heart Attack using Machine LearningIRJET- Web-based Application to Detect Heart Attack using Machine Learning
IRJET- Web-based Application to Detect Heart Attack using Machine Learning
 
Unlock the Power of Your IoT Security Platform
Unlock the Power of Your IoT Security PlatformUnlock the Power of Your IoT Security Platform
Unlock the Power of Your IoT Security Platform
 
Software safety in embedded systems & software safety why, what, and how
Software safety in embedded systems & software safety   why, what, and how Software safety in embedded systems & software safety   why, what, and how
Software safety in embedded systems & software safety why, what, and how
 
Xybion Webinar - Rumors, Risks and Realities of spreadsheet validation
Xybion Webinar - Rumors, Risks and Realities of spreadsheet validationXybion Webinar - Rumors, Risks and Realities of spreadsheet validation
Xybion Webinar - Rumors, Risks and Realities of spreadsheet validation
 
Simplifying Medical Device Lifecycle Management
Simplifying Medical Device Lifecycle ManagementSimplifying Medical Device Lifecycle Management
Simplifying Medical Device Lifecycle Management
 
First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
 
Validation of excel spreadsheets
Validation of excel spreadsheetsValidation of excel spreadsheets
Validation of excel spreadsheets
 

Similar to Nonlinear observers: a system approach for the knowledge discovery.

A robust algorithm based on a failure sensitive matrix for fault diagnosis of...
A robust algorithm based on a failure sensitive matrix for fault diagnosis of...A robust algorithm based on a failure sensitive matrix for fault diagnosis of...
A robust algorithm based on a failure sensitive matrix for fault diagnosis of...IJMER
 
Proposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsProposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsEditor IJCATR
 
IRJET- Early Detection of Sensors Failure using IoT
IRJET- Early Detection of Sensors Failure using IoTIRJET- Early Detection of Sensors Failure using IoT
IRJET- Early Detection of Sensors Failure using IoTIRJET Journal
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET Journal
 
Detecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data AnalysisDetecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data AnalysisEditor IJMTER
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Monitoring Distributed Systems
Monitoring Distributed SystemsMonitoring Distributed Systems
Monitoring Distributed SystemsAleksandr Tavgen
 
A Survey On Genetic Algorithm For Intrusion Detection System
A Survey On Genetic Algorithm For Intrusion Detection SystemA Survey On Genetic Algorithm For Intrusion Detection System
A Survey On Genetic Algorithm For Intrusion Detection SystemIJARIIE JOURNAL
 
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)IJARIIE JOURNAL
 
A Survey On Intrusion Detection Systems
A Survey On Intrusion Detection SystemsA Survey On Intrusion Detection Systems
A Survey On Intrusion Detection SystemsMary Calkins
 
Operationalizing the IoT with Mtell and Apache Spark
Operationalizing the IoT with Mtell and Apache SparkOperationalizing the IoT with Mtell and Apache Spark
Operationalizing the IoT with Mtell and Apache SparkJulius Remigio, CBIP
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesRaja Ram
 
Application of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion RecognitionApplication of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion RecognitionIOSR Journals
 
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...Hai Nguyen
 
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...Hai Nguyen
 
IRJET- Genetic Algorithm based Intrusion Detection-Survey
IRJET- Genetic Algorithm based Intrusion Detection-SurveyIRJET- Genetic Algorithm based Intrusion Detection-Survey
IRJET- Genetic Algorithm based Intrusion Detection-SurveyIRJET Journal
 
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...IRJET Journal
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET Journal
 

Similar to Nonlinear observers: a system approach for the knowledge discovery. (20)

A robust algorithm based on a failure sensitive matrix for fault diagnosis of...
A robust algorithm based on a failure sensitive matrix for fault diagnosis of...A robust algorithm based on a failure sensitive matrix for fault diagnosis of...
A robust algorithm based on a failure sensitive matrix for fault diagnosis of...
 
Proposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsProposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance Applications
 
IRJET- Early Detection of Sensors Failure using IoT
IRJET- Early Detection of Sensors Failure using IoTIRJET- Early Detection of Sensors Failure using IoT
IRJET- Early Detection of Sensors Failure using IoT
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
 
Detecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data AnalysisDetecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data Analysis
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Monitoring Distributed Systems
Monitoring Distributed SystemsMonitoring Distributed Systems
Monitoring Distributed Systems
 
A Survey On Genetic Algorithm For Intrusion Detection System
A Survey On Genetic Algorithm For Intrusion Detection SystemA Survey On Genetic Algorithm For Intrusion Detection System
A Survey On Genetic Algorithm For Intrusion Detection System
 
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
 
A Survey On Intrusion Detection Systems
A Survey On Intrusion Detection SystemsA Survey On Intrusion Detection Systems
A Survey On Intrusion Detection Systems
 
Operationalizing the IoT with Mtell and Apache Spark
Operationalizing the IoT with Mtell and Apache SparkOperationalizing the IoT with Mtell and Apache Spark
Operationalizing the IoT with Mtell and Apache Spark
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
 
Application of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion RecognitionApplication of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion Recognition
 
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
 
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
 
Blue eyes seminar report
Blue eyes seminar reportBlue eyes seminar report
Blue eyes seminar report
 
IRJET- Genetic Algorithm based Intrusion Detection-Survey
IRJET- Genetic Algorithm based Intrusion Detection-SurveyIRJET- Genetic Algorithm based Intrusion Detection-Survey
IRJET- Genetic Algorithm based Intrusion Detection-Survey
 
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
 

More from Massimo Talia

BPMN tutorial by Draw Libre Office
BPMN  tutorial by Draw Libre OfficeBPMN  tutorial by Draw Libre Office
BPMN tutorial by Draw Libre OfficeMassimo Talia
 
Dynamical systems simulation in Python for science and engineering
Dynamical systems simulation in Python for science and engineeringDynamical systems simulation in Python for science and engineering
Dynamical systems simulation in Python for science and engineeringMassimo Talia
 
Dlgs 165/2001 e dlgs 75/2017-Ordinamento del lavoro nelle PA e successive int...
Dlgs 165/2001 e dlgs 75/2017-Ordinamento del lavoro nelle PA e successive int...Dlgs 165/2001 e dlgs 75/2017-Ordinamento del lavoro nelle PA e successive int...
Dlgs 165/2001 e dlgs 75/2017-Ordinamento del lavoro nelle PA e successive int...Massimo Talia
 
A Framework of Knowledge, Skills and Attitudes Conductive to High Performanc...
A Framework of Knowledge, Skills and Attitudes  Conductive to High Performanc...A Framework of Knowledge, Skills and Attitudes  Conductive to High Performanc...
A Framework of Knowledge, Skills and Attitudes Conductive to High Performanc...Massimo Talia
 
Progettazione ed installazione impianti d'antenna
Progettazione ed installazione impianti d'antenna Progettazione ed installazione impianti d'antenna
Progettazione ed installazione impianti d'antenna Massimo Talia
 
Report 2030 Digital Decade
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital DecadeMassimo Talia
 
Artificial Intelligence The Future of Humankind
Artificial Intelligence The Future of HumankindArtificial Intelligence The Future of Humankind
Artificial Intelligence The Future of HumankindMassimo Talia
 
Intro to embedded systems programming
Intro to embedded systems programming Intro to embedded systems programming
Intro to embedded systems programming Massimo Talia
 
Implementing-Value-Based-Healthcare-In-Europe-EIT-Summit-2019
Implementing-Value-Based-Healthcare-In-Europe-EIT-Summit-2019Implementing-Value-Based-Healthcare-In-Europe-EIT-Summit-2019
Implementing-Value-Based-Healthcare-In-Europe-EIT-Summit-2019Massimo Talia
 
Codice-ATECO-ISTAT-62.0
Codice-ATECO-ISTAT-62.0Codice-ATECO-ISTAT-62.0
Codice-ATECO-ISTAT-62.0Massimo Talia
 
Auriga-DiProgess MAX2-Misuratore-di-campo-TV-Fibra-Ottica
Auriga-DiProgess MAX2-Misuratore-di-campo-TV-Fibra-OtticaAuriga-DiProgess MAX2-Misuratore-di-campo-TV-Fibra-Ottica
Auriga-DiProgess MAX2-Misuratore-di-campo-TV-Fibra-OtticaMassimo Talia
 
Guida SW Compilazione Fattura Elettronica_guida_.pdf
Guida SW Compilazione Fattura Elettronica_guida_.pdfGuida SW Compilazione Fattura Elettronica_guida_.pdf
Guida SW Compilazione Fattura Elettronica_guida_.pdfMassimo Talia
 
Python Control library
Python Control libraryPython Control library
Python Control libraryMassimo Talia
 
Specifiche Tecniche Fatturazione Europea v2.3_15052023
Specifiche Tecniche Fatturazione Europea v2.3_15052023Specifiche Tecniche Fatturazione Europea v2.3_15052023
Specifiche Tecniche Fatturazione Europea v2.3_15052023Massimo Talia
 
le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001
le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001
le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001Massimo Talia
 
ARINC-429-DATA-MANAGEMENT-ENGINE
ARINC-429-DATA-MANAGEMENT-ENGINEARINC-429-DATA-MANAGEMENT-ENGINE
ARINC-429-DATA-MANAGEMENT-ENGINEMassimo Talia
 
CEIm-magazine-Novembre-Dicembre-2022
CEIm-magazine-Novembre-Dicembre-2022CEIm-magazine-Novembre-Dicembre-2022
CEIm-magazine-Novembre-Dicembre-2022Massimo Talia
 
Linee-guida-iscrizione-CTU-tribunale
Linee-guida-iscrizione-CTU-tribunaleLinee-guida-iscrizione-CTU-tribunale
Linee-guida-iscrizione-CTU-tribunaleMassimo Talia
 
Energia e Dintorni - Settembre 2022
Energia e Dintorni - Settembre 2022Energia e Dintorni - Settembre 2022
Energia e Dintorni - Settembre 2022Massimo Talia
 
Impianto elettrico sicuro CNI
Impianto elettrico sicuro CNIImpianto elettrico sicuro CNI
Impianto elettrico sicuro CNIMassimo Talia
 

More from Massimo Talia (20)

BPMN tutorial by Draw Libre Office
BPMN  tutorial by Draw Libre OfficeBPMN  tutorial by Draw Libre Office
BPMN tutorial by Draw Libre Office
 
Dynamical systems simulation in Python for science and engineering
Dynamical systems simulation in Python for science and engineeringDynamical systems simulation in Python for science and engineering
Dynamical systems simulation in Python for science and engineering
 
Dlgs 165/2001 e dlgs 75/2017-Ordinamento del lavoro nelle PA e successive int...
Dlgs 165/2001 e dlgs 75/2017-Ordinamento del lavoro nelle PA e successive int...Dlgs 165/2001 e dlgs 75/2017-Ordinamento del lavoro nelle PA e successive int...
Dlgs 165/2001 e dlgs 75/2017-Ordinamento del lavoro nelle PA e successive int...
 
A Framework of Knowledge, Skills and Attitudes Conductive to High Performanc...
A Framework of Knowledge, Skills and Attitudes  Conductive to High Performanc...A Framework of Knowledge, Skills and Attitudes  Conductive to High Performanc...
A Framework of Knowledge, Skills and Attitudes Conductive to High Performanc...
 
Progettazione ed installazione impianti d'antenna
Progettazione ed installazione impianti d'antenna Progettazione ed installazione impianti d'antenna
Progettazione ed installazione impianti d'antenna
 
Report 2030 Digital Decade
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital Decade
 
Artificial Intelligence The Future of Humankind
Artificial Intelligence The Future of HumankindArtificial Intelligence The Future of Humankind
Artificial Intelligence The Future of Humankind
 
Intro to embedded systems programming
Intro to embedded systems programming Intro to embedded systems programming
Intro to embedded systems programming
 
Implementing-Value-Based-Healthcare-In-Europe-EIT-Summit-2019
Implementing-Value-Based-Healthcare-In-Europe-EIT-Summit-2019Implementing-Value-Based-Healthcare-In-Europe-EIT-Summit-2019
Implementing-Value-Based-Healthcare-In-Europe-EIT-Summit-2019
 
Codice-ATECO-ISTAT-62.0
Codice-ATECO-ISTAT-62.0Codice-ATECO-ISTAT-62.0
Codice-ATECO-ISTAT-62.0
 
Auriga-DiProgess MAX2-Misuratore-di-campo-TV-Fibra-Ottica
Auriga-DiProgess MAX2-Misuratore-di-campo-TV-Fibra-OtticaAuriga-DiProgess MAX2-Misuratore-di-campo-TV-Fibra-Ottica
Auriga-DiProgess MAX2-Misuratore-di-campo-TV-Fibra-Ottica
 
Guida SW Compilazione Fattura Elettronica_guida_.pdf
Guida SW Compilazione Fattura Elettronica_guida_.pdfGuida SW Compilazione Fattura Elettronica_guida_.pdf
Guida SW Compilazione Fattura Elettronica_guida_.pdf
 
Python Control library
Python Control libraryPython Control library
Python Control library
 
Specifiche Tecniche Fatturazione Europea v2.3_15052023
Specifiche Tecniche Fatturazione Europea v2.3_15052023Specifiche Tecniche Fatturazione Europea v2.3_15052023
Specifiche Tecniche Fatturazione Europea v2.3_15052023
 
le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001
le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001
le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001
 
ARINC-429-DATA-MANAGEMENT-ENGINE
ARINC-429-DATA-MANAGEMENT-ENGINEARINC-429-DATA-MANAGEMENT-ENGINE
ARINC-429-DATA-MANAGEMENT-ENGINE
 
CEIm-magazine-Novembre-Dicembre-2022
CEIm-magazine-Novembre-Dicembre-2022CEIm-magazine-Novembre-Dicembre-2022
CEIm-magazine-Novembre-Dicembre-2022
 
Linee-guida-iscrizione-CTU-tribunale
Linee-guida-iscrizione-CTU-tribunaleLinee-guida-iscrizione-CTU-tribunale
Linee-guida-iscrizione-CTU-tribunale
 
Energia e Dintorni - Settembre 2022
Energia e Dintorni - Settembre 2022Energia e Dintorni - Settembre 2022
Energia e Dintorni - Settembre 2022
 
Impianto elettrico sicuro CNI
Impianto elettrico sicuro CNIImpianto elettrico sicuro CNI
Impianto elettrico sicuro CNI
 

Recently uploaded

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 

Nonlinear observers: a system approach for the knowledge discovery.

  • 1. Massimo Talia Electronic Engineer Web address: http://www.taliawebs.com
  • 2. Summary The observers and system engineering The observers and safety engineering Observation and artificial intelligence Observation vs data minig
  • 3. The observers and system engineering The Observers are a gray box strategy for estimating a part or the whole system dynamics from the I/O (Inputs/Outputs) or for isolating the faults FDI (fault detection isolation). An Observer can be linear or nonlinear: it’s linear if its internal structure is a linear system; it’s nonlinear if it replicates nonlinear dynamics. It’s deteministic if the process is deterministic, it’s stochastic if the process is stochastic. In the pratical applications the observer functions are implemented in firmware or hardware or in the industrial supervision systems.
  • 4. The observers and safety engineering The observers make an hardware system to look the eventual faults ahead before having errors and failures (no system availability). they minimize the possibility of mistakes or trap mistakes before the introduction of system faults (Fault Avoidance); they increase the probability of detecting and correcting errors before the system goes into service(Fault Detection); They are used to ensure the system faults do not result in system errors and/or the system errors do not lead to the system failure (Fault tolerance).
  • 5. Observation and artificial intelligence The techniques of fault avoidance, fault detection, fault tolerance make the observers to extract knowledge from the industrial processes, complex systems and external physical sources . In a generic schema an observer is used as estimator and another one as fault detector, but in the real case there are more complex schemas and redundancy. When the redundancy increases, the algorithm model or the hardware become more complex. The observation is an application of artificial intelligence system- oriented.
  • 6. Observation vs data mining The observation is a technique for extracting knowledge and information from complex physical systems as: industrial plants, electronic boards, mechanical or electromechanical systems, chemical and nuclear processes and so on. Data minig is a technique of knowledge discovery and artificial intelligence, which is based on the extraction of one o more data set from a Datawarehouse , in order to improve the business processes as: the sales, the supply chain, the human resources, the production and so on.