2009
DOI: 10.2514/1.42783
|View full text |Cite
|
Sign up to set email alerts
|

Unsupervised Anomaly Detection for Liquid-Fueled Rocket Propulsion Health Monitoring

Abstract: This article describes the results of applying four unsupervised anomaly detection algorithms to data from two rocket propulsion testbeds. The first testbed uses historical data from the Space Shuttle Main Engine. The second testbed uses data from an experimental rocket engine test stand located at NASA Stennis Space Center. The article describes nine anomalies detected by the four algorithms. The four algorithms use four different definitions of anomalousness. Orca uses a nearest-neighbor approach, defining a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 52 publications
(12 citation statements)
references
References 18 publications
0
12
0
Order By: Relevance
“…(quadratic equations to model time series). Later studies apply data mining techniques to detect data anomalies in aerospace systems [4][5][6][7][8][9]. Some adopts the supervised learning methods [7] such as the Inductive Monitoring System (IMS) software which summarizes the data distributions of typical system behaviors from a pre-sanitized training dataset, which is then compared with real-time operational data to detect abnormal behaviors.…”
Section: Introductionmentioning
confidence: 99%
“…(quadratic equations to model time series). Later studies apply data mining techniques to detect data anomalies in aerospace systems [4][5][6][7][8][9]. Some adopts the supervised learning methods [7] such as the Inductive Monitoring System (IMS) software which summarizes the data distributions of typical system behaviors from a pre-sanitized training dataset, which is then compared with real-time operational data to detect abnormal behaviors.…”
Section: Introductionmentioning
confidence: 99%
“…A large number of algorithms for anomaly detection exist in the literature (Schwabacher et al 2009). In Sect.…”
Section: Choice Of Anomaly Detection Algorithmmentioning
confidence: 99%
“…For example, data mining methods have successfully been applied in industrial process control [6], fault detection in power plants [7], water supply network analysis [8], faults detection in semiconductor manufacturing process [9], battery state-of-health monitoring [10], diagnosis of growing cracks in gearboxes or turbine engines [11], and even anomaly detection from temperature sensors on the STS 107 Space Shuttle Columbia after disaster [12]. Most frequently encountered methods for system modeling and fault diagnosis include Principal Component Analysis (PCA), Support Vector Machines (SVM), Nearest Neighbors, Clustering, Bayesian Networks, Decision Trees, Neural Networks, Hidden Markov Models (HMM) or combinations of them, sometimes using COTS softwares [13] [14].…”
Section: B Possible Data-mining Toolsmentioning
confidence: 99%