You are on page 1of 2

Review of Status

A literature survey has been conducted to analyse the different types of controller-
detector techniques for nonlinear processes for the past developments in the field of process
control. The previous works on controller-detector and fault diagnosis on various nonlinear
process are discussed.

i. International Status of Technology:

Extensive research efforts continue to focus on various domains, such as the creation
of machine learning-based cyberattack detectors (Huang et al., 2007; Omar et al., 2013;
Agrawal and Agrawal, 2015; Wu et al., 2018), the design of backup controllers in a two-tier
safety performance control architecture (Chen et al., 2020), the recovery of process states
following a cyberattack (Wu et al.,2020), the development of cyberattack-resilient controllers
(Durand, 2018; Durand and Wegener, 2020), and encrypted control (Suryavanshi et al.,
2023).
Yash A. Kadakia et.al (2024) the integration of some of these approaches, particularly
machine-learning based cyberattack detection in a two-tier encrypted control architecture, to
create a robust and cyber-secure control scheme applicable to nonlinear processes have
addressed by Yash A. Kadakia et.al (2024).
H. Karimipour and H. Leung (2020) have addressed the Relaxation-based anomaly
detection in cyber-physical systems using ensemble Kalman Filter. In this, Kalman filter
based anomaly detector using a relaxation-based solution is obtained. Performance of this
method is tested with Chi-Square detector and Largest Normalised Residual test.
A reinforcement learning approach with a critic action architecture is proposed to
overcome this challenge by designing an online learning fault-tolerant controller so that the
faulty system can approximate the performance index of the fault-free system. Different from
the traditional Hebb enhancement rules in the reinforcement learning, the training process is
speeded up by introducing a supervisory learning on the basis of the training dataset which is
built with the states and the virtual optimal control acquired by particle swarm optimization,
have been proposed by Dapeng Zhang; Zhiwei Gao (2020).
Lucas Costa Brito et al., (2022) have presented two kinds of unsupervised machine
learning methods, One-Class Support Vector Machine and Depth-based Isolation Forest
Feature Importance, to detect and diagnosis faults in a chemical process. By combining two
different fault explanation methodologies, accuracy and reliability of the fault diagnosis
results can be achieved by the validation in a simulated continuous stirred tank reactor.
Dongyue Chen and Ruonan Liu (2021) have proposed Interaction-Aware Graph Neural
Networks for Fault Diagnosis of Complex Industrial Processes in which The sensor signals are
transformed into a heterogeneous graph with multiple edge types, and the edge weights are
learned by the attention mechanism, adaptively. Then, multiple independent graph neural
network (GNN) blocks are employed to extract the fault feature for each subgraph with one
edge type. Finally, each subgraph feature is concatenated or fused by a weighted summation
function to generate the final graph embedding.
Unique systematic method of formulating the RL problem incorporating domain-
specific knowledge about process constraints and objectives, reducing dimensionality and
modifying the exploration process, applicable to any model free RL algorithm supporting
continuous states and actions, to enhance safety, speed and explainability of online RL
implementation without requiring a simulation model. The approach is successfully
implemented on two multivariable processes using the Deep Deterministic Policy Gradient
(DDPG) algorithm was explained by Kalpesh M Patel (2022).
ii. National Status of Technology
A dual deep neural network (DDNN) based cyber-attack detection and correction
method for direct current microgrids (DCMG) are proposed by Koduru Sriranga Suprabhath
et. al., in which . The injection of false data packets in the cyber layer can disrupt the control
objectives, leading to voltage instability and load sharing patterns. Therefore, detection and
correction of malicious data is essential for the DC microgrid stability. DDNN is designed
with prediction and correction networks. The prediction network composed with one input
layer, two hidden layers and one output layer. This network predicts the converter’s duty by
considering the input features as DC bus voltage and the reference voltage. The correction
network also composed with one input layer, two hidden layers and one output layer. This
network provides the duty corresponding to the attack by considering the input features as
DC bus voltage, battery voltage and reference voltage.

You might also like