SlideShare a Scribd company logo
Massimo Talia
Electronic Engineer
Web address: http://www.taliawebs.com
Summary
The observers and system engineering
The observers and safety engineering
Observation and artificial intelligence
Observation vs data minig
The observers and system engineering
The Observers are a gray box strategy for estimating a part
or the whole system dynamics from the I/O
(Inputs/Outputs) or for isolating the faults FDI (fault
detection isolation). An Observer can be linear or
nonlinear: it’s linear if its internal structure is a linear
system; it’s nonlinear if it replicates nonlinear dynamics.
It’s deteministic if the process is deterministic, it’s
stochastic if the process is stochastic.
In the pratical applications the observer functions are
implemented in firmware or hardware or in the industrial
supervision systems.
The observers and safety engineering
The observers make an hardware system to look the
eventual faults ahead before having errors and failures (no
system availability).
they minimize the possibility of mistakes or trap mistakes
before the introduction of system faults (Fault Avoidance);
they increase the probability of detecting and correcting
errors before the system goes into service(Fault Detection);
They are used to ensure the system faults do not result in
system errors and/or the system errors do not lead to the
system failure (Fault tolerance).
Observation and artificial intelligence
The techniques of fault avoidance, fault detection,
fault tolerance make the observers to extract
knowledge from the industrial processes, complex
systems and external physical sources . In a generic
schema an observer is used as estimator and another
one as fault detector, but in the real case there are
more complex schemas and redundancy. When the
redundancy increases, the algorithm model or the
hardware become more complex. The observation is
an application of artificial intelligence system-
oriented.
Observation vs data mining
The observation is a technique for extracting
knowledge and information from complex physical
systems as: industrial plants, electronic boards,
mechanical or electromechanical systems, chemical
and nuclear processes and so on.
Data minig is a technique of knowledge discovery and
artificial intelligence, which is based on the extraction
of one o more data set from a Datawarehouse , in order
to improve the business processes as: the sales, the
supply chain, the human resources, the production
and so on.

More Related Content

What's hot

Building an effective permit to work system
Building an effective permit to work systemBuilding an effective permit to work system
Building an effective permit to work system
complianceonline123
 
Why should you invest in a Lab Information Management System?
Why should you invest in a Lab Information Management System?Why should you invest in a Lab Information Management System?
Why should you invest in a Lab Information Management System?
MocDoc
 
MIS 22 Disaster Management
MIS 22 Disaster ManagementMIS 22 Disaster Management
MIS 22 Disaster Management
Tushar B Kute
 
Laboratory information management system (LIMS)
Laboratory information management system (LIMS)Laboratory information management system (LIMS)
Laboratory information management system (LIMS)
JYOTIRMOY ROY
 
IRJET- Web-based Application to Detect Heart Attack using Machine Learning
IRJET- Web-based Application to Detect Heart Attack using Machine LearningIRJET- Web-based Application to Detect Heart Attack using Machine Learning
IRJET- Web-based Application to Detect Heart Attack using Machine Learning
IRJET Journal
 
Unlock the Power of Your IoT Security Platform
Unlock the Power of Your IoT Security PlatformUnlock the Power of Your IoT Security Platform
Unlock the Power of Your IoT Security Platform
Medigate
 
Software safety in embedded systems & software safety why, what, and how
Software safety in embedded systems & software safety   why, what, and how Software safety in embedded systems & software safety   why, what, and how
Software safety in embedded systems & software safety why, what, and how
bdemchak
 
Xybion Webinar - Rumors, Risks and Realities of spreadsheet validation
Xybion Webinar - Rumors, Risks and Realities of spreadsheet validationXybion Webinar - Rumors, Risks and Realities of spreadsheet validation
Xybion Webinar - Rumors, Risks and Realities of spreadsheet validation
Xybion Corporation
 
Simplifying Medical Device Lifecycle Management
Simplifying Medical Device Lifecycle ManagementSimplifying Medical Device Lifecycle Management
Simplifying Medical Device Lifecycle Management
Medigate
 
First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]
Phil Huggins FBCS CITP
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Donald E. Hester
 
Validation of excel spreadsheets
Validation of excel spreadsheetsValidation of excel spreadsheets
Validation of excel spreadsheets
Digital-360
 

What's hot (12)

Building an effective permit to work system
Building an effective permit to work systemBuilding an effective permit to work system
Building an effective permit to work system
 
Why should you invest in a Lab Information Management System?
Why should you invest in a Lab Information Management System?Why should you invest in a Lab Information Management System?
Why should you invest in a Lab Information Management System?
 
MIS 22 Disaster Management
MIS 22 Disaster ManagementMIS 22 Disaster Management
MIS 22 Disaster Management
 
Laboratory information management system (LIMS)
Laboratory information management system (LIMS)Laboratory information management system (LIMS)
Laboratory information management system (LIMS)
 
IRJET- Web-based Application to Detect Heart Attack using Machine Learning
IRJET- Web-based Application to Detect Heart Attack using Machine LearningIRJET- Web-based Application to Detect Heart Attack using Machine Learning
IRJET- Web-based Application to Detect Heart Attack using Machine Learning
 
Unlock the Power of Your IoT Security Platform
Unlock the Power of Your IoT Security PlatformUnlock the Power of Your IoT Security Platform
Unlock the Power of Your IoT Security Platform
 
Software safety in embedded systems & software safety why, what, and how
Software safety in embedded systems & software safety   why, what, and how Software safety in embedded systems & software safety   why, what, and how
Software safety in embedded systems & software safety why, what, and how
 
Xybion Webinar - Rumors, Risks and Realities of spreadsheet validation
Xybion Webinar - Rumors, Risks and Realities of spreadsheet validationXybion Webinar - Rumors, Risks and Realities of spreadsheet validation
Xybion Webinar - Rumors, Risks and Realities of spreadsheet validation
 
Simplifying Medical Device Lifecycle Management
Simplifying Medical Device Lifecycle ManagementSimplifying Medical Device Lifecycle Management
Simplifying Medical Device Lifecycle Management
 
First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]First Response - Session 11 - Incident Response [2004]
First Response - Session 11 - Incident Response [2004]
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
 
Validation of excel spreadsheets
Validation of excel spreadsheetsValidation of excel spreadsheets
Validation of excel spreadsheets
 

Similar to Nonlinear observers: a system approach for the knowledge discovery.

A robust algorithm based on a failure sensitive matrix for fault diagnosis of...
A robust algorithm based on a failure sensitive matrix for fault diagnosis of...A robust algorithm based on a failure sensitive matrix for fault diagnosis of...
A robust algorithm based on a failure sensitive matrix for fault diagnosis of...
IJMER
 
Proposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsProposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance Applications
Editor IJCATR
 
IRJET- Early Detection of Sensors Failure using IoT
IRJET- Early Detection of Sensors Failure using IoTIRJET- Early Detection of Sensors Failure using IoT
IRJET- Early Detection of Sensors Failure using IoT
IRJET Journal
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET Journal
 
Detecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data AnalysisDetecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data Analysis
Editor IJMTER
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
 
Monitoring Distributed Systems
Monitoring Distributed SystemsMonitoring Distributed Systems
Monitoring Distributed Systems
Aleksandr Tavgen
 
A Survey On Genetic Algorithm For Intrusion Detection System
A Survey On Genetic Algorithm For Intrusion Detection SystemA Survey On Genetic Algorithm For Intrusion Detection System
A Survey On Genetic Algorithm For Intrusion Detection System
IJARIIE JOURNAL
 
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
IJARIIE JOURNAL
 
A Survey On Intrusion Detection Systems
A Survey On Intrusion Detection SystemsA Survey On Intrusion Detection Systems
A Survey On Intrusion Detection Systems
Mary Calkins
 
Operationalizing the IoT with Mtell and Apache Spark
Operationalizing the IoT with Mtell and Apache SparkOperationalizing the IoT with Mtell and Apache Spark
Operationalizing the IoT with Mtell and Apache Spark
Julius Remigio, CBIP
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
Raja Ram
 
Application of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion RecognitionApplication of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion Recognition
IOSR Journals
 
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Hai Nguyen
 
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Hai Nguyen
 
Blue eyes seminar report
Blue eyes seminar reportBlue eyes seminar report
Blue eyes seminar report
Devineni Naga Srinivasarao
 
IRJET- Genetic Algorithm based Intrusion Detection-Survey
IRJET- Genetic Algorithm based Intrusion Detection-SurveyIRJET- Genetic Algorithm based Intrusion Detection-Survey
IRJET- Genetic Algorithm based Intrusion Detection-Survey
IRJET Journal
 
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
IRJET Journal
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET Journal
 

Similar to Nonlinear observers: a system approach for the knowledge discovery. (20)

A robust algorithm based on a failure sensitive matrix for fault diagnosis of...
A robust algorithm based on a failure sensitive matrix for fault diagnosis of...A robust algorithm based on a failure sensitive matrix for fault diagnosis of...
A robust algorithm based on a failure sensitive matrix for fault diagnosis of...
 
Proposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsProposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance Applications
 
IRJET- Early Detection of Sensors Failure using IoT
IRJET- Early Detection of Sensors Failure using IoTIRJET- Early Detection of Sensors Failure using IoT
IRJET- Early Detection of Sensors Failure using IoT
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
 
Detecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data AnalysisDetecting Unknown Attacks Using Big Data Analysis
Detecting Unknown Attacks Using Big Data Analysis
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Monitoring Distributed Systems
Monitoring Distributed SystemsMonitoring Distributed Systems
Monitoring Distributed Systems
 
A Survey On Genetic Algorithm For Intrusion Detection System
A Survey On Genetic Algorithm For Intrusion Detection SystemA Survey On Genetic Algorithm For Intrusion Detection System
A Survey On Genetic Algorithm For Intrusion Detection System
 
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
Synthesis of Polyurethane Solution (Castor oil based polyol for polyurethane)
 
A Survey On Intrusion Detection Systems
A Survey On Intrusion Detection SystemsA Survey On Intrusion Detection Systems
A Survey On Intrusion Detection Systems
 
Operationalizing the IoT with Mtell and Apache Spark
Operationalizing the IoT with Mtell and Apache SparkOperationalizing the IoT with Mtell and Apache Spark
Operationalizing the IoT with Mtell and Apache Spark
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
 
Application of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion RecognitionApplication of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion Recognition
 
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
 
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
Guiomar corral memoriatesi_2009_07_13.pdf.txt;jsessionid=49bfb8b510baef6cc9ec...
 
Blue eyes seminar report
Blue eyes seminar reportBlue eyes seminar report
Blue eyes seminar report
 
IRJET- Genetic Algorithm based Intrusion Detection-Survey
IRJET- Genetic Algorithm based Intrusion Detection-SurveyIRJET- Genetic Algorithm based Intrusion Detection-Survey
IRJET- Genetic Algorithm based Intrusion Detection-Survey
 
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...IRJET-  	  A Review on Application of Data Mining Techniques for Intrusion De...
IRJET- A Review on Application of Data Mining Techniques for Intrusion De...
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
 

More from Massimo Talia

Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
BPMN tutorial by Draw Libre Office
BPMN  tutorial by Draw Libre OfficeBPMN  tutorial by Draw Libre Office
BPMN tutorial by Draw Libre Office
Massimo Talia
 
Dynamical systems simulation in Python for science and engineering
Dynamical systems simulation in Python for science and engineeringDynamical systems simulation in Python for science and engineering
Dynamical systems simulation in Python for science and engineering
Massimo Talia
 
Dlgs 165/2001 e dlgs 75/2017-Ordinamento del lavoro nelle PA e successive int...
Dlgs 165/2001 e dlgs 75/2017-Ordinamento del lavoro nelle PA e successive int...Dlgs 165/2001 e dlgs 75/2017-Ordinamento del lavoro nelle PA e successive int...
Dlgs 165/2001 e dlgs 75/2017-Ordinamento del lavoro nelle PA e successive int...
Massimo Talia
 
A Framework of Knowledge, Skills and Attitudes Conductive to High Performanc...
A Framework of Knowledge, Skills and Attitudes  Conductive to High Performanc...A Framework of Knowledge, Skills and Attitudes  Conductive to High Performanc...
A Framework of Knowledge, Skills and Attitudes Conductive to High Performanc...
Massimo Talia
 
Progettazione ed installazione impianti d'antenna
Progettazione ed installazione impianti d'antenna Progettazione ed installazione impianti d'antenna
Progettazione ed installazione impianti d'antenna
Massimo Talia
 
Report 2030 Digital Decade
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital Decade
Massimo Talia
 
Artificial Intelligence The Future of Humankind
Artificial Intelligence The Future of HumankindArtificial Intelligence The Future of Humankind
Artificial Intelligence The Future of Humankind
Massimo Talia
 
Intro to embedded systems programming
Intro to embedded systems programming Intro to embedded systems programming
Intro to embedded systems programming
Massimo Talia
 
Implementing-Value-Based-Healthcare-In-Europe-EIT-Summit-2019
Implementing-Value-Based-Healthcare-In-Europe-EIT-Summit-2019Implementing-Value-Based-Healthcare-In-Europe-EIT-Summit-2019
Implementing-Value-Based-Healthcare-In-Europe-EIT-Summit-2019
Massimo Talia
 
Codice-ATECO-ISTAT-62.0
Codice-ATECO-ISTAT-62.0Codice-ATECO-ISTAT-62.0
Codice-ATECO-ISTAT-62.0
Massimo Talia
 
Auriga-DiProgess MAX2-Misuratore-di-campo-TV-Fibra-Ottica
Auriga-DiProgess MAX2-Misuratore-di-campo-TV-Fibra-OtticaAuriga-DiProgess MAX2-Misuratore-di-campo-TV-Fibra-Ottica
Auriga-DiProgess MAX2-Misuratore-di-campo-TV-Fibra-Ottica
Massimo Talia
 
Guida SW Compilazione Fattura Elettronica_guida_.pdf
Guida SW Compilazione Fattura Elettronica_guida_.pdfGuida SW Compilazione Fattura Elettronica_guida_.pdf
Guida SW Compilazione Fattura Elettronica_guida_.pdf
Massimo Talia
 
Python Control library
Python Control libraryPython Control library
Python Control library
Massimo Talia
 
Specifiche Tecniche Fatturazione Europea v2.3_15052023
Specifiche Tecniche Fatturazione Europea v2.3_15052023Specifiche Tecniche Fatturazione Europea v2.3_15052023
Specifiche Tecniche Fatturazione Europea v2.3_15052023
Massimo Talia
 
le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001
le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001
le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001
Massimo Talia
 
ARINC-429-DATA-MANAGEMENT-ENGINE
ARINC-429-DATA-MANAGEMENT-ENGINEARINC-429-DATA-MANAGEMENT-ENGINE
ARINC-429-DATA-MANAGEMENT-ENGINE
Massimo Talia
 
CEIm-magazine-Novembre-Dicembre-2022
CEIm-magazine-Novembre-Dicembre-2022CEIm-magazine-Novembre-Dicembre-2022
CEIm-magazine-Novembre-Dicembre-2022
Massimo Talia
 
Linee-guida-iscrizione-CTU-tribunale
Linee-guida-iscrizione-CTU-tribunaleLinee-guida-iscrizione-CTU-tribunale
Linee-guida-iscrizione-CTU-tribunale
Massimo Talia
 

More from Massimo Talia (20)

Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
BPMN tutorial by Draw Libre Office
BPMN  tutorial by Draw Libre OfficeBPMN  tutorial by Draw Libre Office
BPMN tutorial by Draw Libre Office
 
Dynamical systems simulation in Python for science and engineering
Dynamical systems simulation in Python for science and engineeringDynamical systems simulation in Python for science and engineering
Dynamical systems simulation in Python for science and engineering
 
Dlgs 165/2001 e dlgs 75/2017-Ordinamento del lavoro nelle PA e successive int...
Dlgs 165/2001 e dlgs 75/2017-Ordinamento del lavoro nelle PA e successive int...Dlgs 165/2001 e dlgs 75/2017-Ordinamento del lavoro nelle PA e successive int...
Dlgs 165/2001 e dlgs 75/2017-Ordinamento del lavoro nelle PA e successive int...
 
A Framework of Knowledge, Skills and Attitudes Conductive to High Performanc...
A Framework of Knowledge, Skills and Attitudes  Conductive to High Performanc...A Framework of Knowledge, Skills and Attitudes  Conductive to High Performanc...
A Framework of Knowledge, Skills and Attitudes Conductive to High Performanc...
 
Progettazione ed installazione impianti d'antenna
Progettazione ed installazione impianti d'antenna Progettazione ed installazione impianti d'antenna
Progettazione ed installazione impianti d'antenna
 
Report 2030 Digital Decade
Report 2030 Digital DecadeReport 2030 Digital Decade
Report 2030 Digital Decade
 
Artificial Intelligence The Future of Humankind
Artificial Intelligence The Future of HumankindArtificial Intelligence The Future of Humankind
Artificial Intelligence The Future of Humankind
 
Intro to embedded systems programming
Intro to embedded systems programming Intro to embedded systems programming
Intro to embedded systems programming
 
Implementing-Value-Based-Healthcare-In-Europe-EIT-Summit-2019
Implementing-Value-Based-Healthcare-In-Europe-EIT-Summit-2019Implementing-Value-Based-Healthcare-In-Europe-EIT-Summit-2019
Implementing-Value-Based-Healthcare-In-Europe-EIT-Summit-2019
 
Codice-ATECO-ISTAT-62.0
Codice-ATECO-ISTAT-62.0Codice-ATECO-ISTAT-62.0
Codice-ATECO-ISTAT-62.0
 
Auriga-DiProgess MAX2-Misuratore-di-campo-TV-Fibra-Ottica
Auriga-DiProgess MAX2-Misuratore-di-campo-TV-Fibra-OtticaAuriga-DiProgess MAX2-Misuratore-di-campo-TV-Fibra-Ottica
Auriga-DiProgess MAX2-Misuratore-di-campo-TV-Fibra-Ottica
 
Guida SW Compilazione Fattura Elettronica_guida_.pdf
Guida SW Compilazione Fattura Elettronica_guida_.pdfGuida SW Compilazione Fattura Elettronica_guida_.pdf
Guida SW Compilazione Fattura Elettronica_guida_.pdf
 
Python Control library
Python Control libraryPython Control library
Python Control library
 
Specifiche Tecniche Fatturazione Europea v2.3_15052023
Specifiche Tecniche Fatturazione Europea v2.3_15052023Specifiche Tecniche Fatturazione Europea v2.3_15052023
Specifiche Tecniche Fatturazione Europea v2.3_15052023
 
le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001
le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001
le-competenze-professionali-degli-ingegneri-secondo-il-dpr-328-2001
 
ARINC-429-DATA-MANAGEMENT-ENGINE
ARINC-429-DATA-MANAGEMENT-ENGINEARINC-429-DATA-MANAGEMENT-ENGINE
ARINC-429-DATA-MANAGEMENT-ENGINE
 
CEIm-magazine-Novembre-Dicembre-2022
CEIm-magazine-Novembre-Dicembre-2022CEIm-magazine-Novembre-Dicembre-2022
CEIm-magazine-Novembre-Dicembre-2022
 
Linee-guida-iscrizione-CTU-tribunale
Linee-guida-iscrizione-CTU-tribunaleLinee-guida-iscrizione-CTU-tribunale
Linee-guida-iscrizione-CTU-tribunale
 

Recently uploaded

Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 

Recently uploaded (20)

Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 

Nonlinear observers: a system approach for the knowledge discovery.

  • 1. Massimo Talia Electronic Engineer Web address: http://www.taliawebs.com
  • 2. Summary The observers and system engineering The observers and safety engineering Observation and artificial intelligence Observation vs data minig
  • 3. The observers and system engineering The Observers are a gray box strategy for estimating a part or the whole system dynamics from the I/O (Inputs/Outputs) or for isolating the faults FDI (fault detection isolation). An Observer can be linear or nonlinear: it’s linear if its internal structure is a linear system; it’s nonlinear if it replicates nonlinear dynamics. It’s deteministic if the process is deterministic, it’s stochastic if the process is stochastic. In the pratical applications the observer functions are implemented in firmware or hardware or in the industrial supervision systems.
  • 4. The observers and safety engineering The observers make an hardware system to look the eventual faults ahead before having errors and failures (no system availability). they minimize the possibility of mistakes or trap mistakes before the introduction of system faults (Fault Avoidance); they increase the probability of detecting and correcting errors before the system goes into service(Fault Detection); They are used to ensure the system faults do not result in system errors and/or the system errors do not lead to the system failure (Fault tolerance).
  • 5. Observation and artificial intelligence The techniques of fault avoidance, fault detection, fault tolerance make the observers to extract knowledge from the industrial processes, complex systems and external physical sources . In a generic schema an observer is used as estimator and another one as fault detector, but in the real case there are more complex schemas and redundancy. When the redundancy increases, the algorithm model or the hardware become more complex. The observation is an application of artificial intelligence system- oriented.
  • 6. Observation vs data mining The observation is a technique for extracting knowledge and information from complex physical systems as: industrial plants, electronic boards, mechanical or electromechanical systems, chemical and nuclear processes and so on. Data minig is a technique of knowledge discovery and artificial intelligence, which is based on the extraction of one o more data set from a Datawarehouse , in order to improve the business processes as: the sales, the supply chain, the human resources, the production and so on.