Next Article in Journal
Fast Conflict Detection for Multi-Dimensional Packet Filters
Next Article in Special Issue
Defuzzify Imprecise Numbers Using the Mellin Transform and the Trade-Off between the Mean and Spread
Previous Article in Journal
Adversarial Training Methods for Deep Learning: A Systematic Review
Previous Article in Special Issue
Intuitionistic and Interval-Valued Fuzzy Set Representations for Data Mining
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Vibration Based Automatic Fault Detection Scheme for Drilling Process Using Type-2 Fuzzy Logic

1
Gas Turbine and Transmission Research Centre, Faculty of Engineering, University of Nottingham, Nottingham NG7 2RD, UK
2
Department of Applied Physics and Electronics, Umeå Universitet, 90187 Umeå, Sweden
3
School of Science and Technology, Orebro University, 70182 Orebro, Sweden
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Algorithms 2022, 15(8), 284; https://doi.org/10.3390/a15080284
Submission received: 6 April 2022 / Revised: 26 July 2022 / Accepted: 2 August 2022 / Published: 12 August 2022

Abstract

:
The fault detection system using automated concepts is a crucial aspect of the industrial process. The automated system can contribute efficiently in minimizing equipment downtime therefore improving the production process cost. This paper highlights a novel model based fault detection (FD) approach combined with an interval type-2 (IT2) Takagi–Sugeno (T–S) fuzzy system for fault detection in the drilling process. The system uncertainty is considered prevailing during the process, and type-2 fuzzy methodology is utilized to deal with these uncertainties in an effective way. Two theorems are developed; Theorem 1, which proves the stability of the fuzzy modeling, and Theorem 2, which establishes the fault detector algorithm stability. A Lyapunov stabilty analysis is implemented for validating the stability criterion for Theorem 1 and Theorem 2. In order to validate the effective implementation of the complex theoretical approach, a numerical analysis is carried out at the end. The proposed methodology can be implemented in real time to detect faults in the drilling tool maintaining the stability of the proposed fault detection estimator. This is critical for increasing the productivity and quality of the machining process, and it also helps improve the surface finish of the work piece satisfying the customer needs and expectations.

1. Introduction

Superior progress in the field of production process involves implementation of the automatic fault detection scheme as it contributes significantly in an industrial sector by lowering devices downtime as well as maintenance costs. Fault detection and notification to the operator in real time associated with a complex system is the main intention of automated fault detection system [1]. For the assurance of safety and superior performances of nonlinear complex systems, the methodology of fault detection has been considered to be very popular among the scientific researcher and is applied widely particularly concentrating on the approaches of state observers [2,3]. The fault detection technique can subdivided into [4,5,6,7]:
(a)
signal-based method;
(b)
data-driven method;
(c)
model-based method;
The analysis of spectrum components associated with the measured signals is the main concept behind the signal-based fault detection methodology. The knowledge-based methodology incorporates intelligent techniques like neural networks for the detection of faults. In the model-based methodology, there is a requirement of an exact model of the system in order to simulate the process actual behaviour [8]. The various approaches associated with model-based fault diagnosis methodology are observer embedded techniques, parity space techniques and the methodology of parameter estimation [9,10,11]. The availability of the mathematical model associated with practical system is very crucial in the model-based methodology. This is achievable by implementing a system identification technique or by implementing the physical principles aspects. A model-based approach is implemented effectively in the development of fault detection mechanism [12]. An innovative methodology on the basis of model based technique is applied for the detection of fault in mobile robots [13]. Kommuri et al. [14] proposed a novel observer relied fault detection technique associated with electric vehicles. For dealing with the faults in the nonlinear systems, Li et al. [15] illustrated a Type-1 Takagi–Sugeno (T–S) fuzzy logic system based observer.
In the current era involving advanced manufacturing technology, there is a suitable growth in automated and unattended machining techniques. Thus, there is a requirement of suitable online condition monitoring technology for the minimization of error and wastage of work material. These mechanical failures are the root cause of 79.6% machining tool downtime in modern industries [16]. Hence, it is very important to detect the fault early for the improvement of the product quality and to to cut short the machining downtime [17]. During the machining operation, the factors like cutting tools, various workpieces, several types of cutting parameters, etc. affect the working conditions [18]. Ref. [19] proposed a virtual sensor for the online detection of the fault in multi-toothed tools on the basis of Bayesian classifier. In the work by Kumar et al. [20], a blended mechanism involving Support Vector Machine (SVM), Artificial Neural Network (ANN), and Bayes classifier is presented for the detection and classification of faults. In any manufacturing process, the machine generates vibration, which results in degradation of machine tools, thus inducing failures of some subsystems or the machine itself. The analysis of the vibrations signatures can be implemented for the detection of the nature and extent of incorporated damage in machines. A detailed review on devices utilized for vibration computation as well as signal processing methodologies in order to monitor conditions of machine tools associated with manufacturing operations was illustrated in the work by Goyal et al. [21]. A detailed analysis on the methodology of tool condition monitoring associated with drilling, turning, milling, and grinding was presented by Roth et al. [22]. Pimenov et al. created models for predicting the machined surfaces roughness in a complex correlation between tool wear, machining time, and cutting power utilizing AI, keeping the intention of combining AI algorithms with online monitoring of automated manufacturing [23]. In the work by Kuntoğlu et al., the importance of sensor data is highlighted and also stated that computer assisted electronic and mechanical systems with tool condition monitoring technology clears the path for machining industry and the prospect and development of Industry 4.0 [24]. Fan et al. proposed an innovative data-driven system in order to detect faults and diagnose status variable identification (SVID) data in semiconductor manufacturing.The experimental outcomes reveal that the suggested data driven system can provide quality fault detection performances and supply important information associated with the critical SVIDs and conjugate processing time for fault diagnostics [25]. For early failure identification of the CNC machine tool under time-varying settings, a unique data mining method was proposed by Luo et al. [26].
A technique of reasoning and computation known as fuzzy logic uses classes with ambiguous (fuzzy) boundaries as its objects. Everything, including degrees, is allowed to be, or is, a matter of degree in fuzzy logic. Fuzzy logic is primarily employed in its broad sense today. In particular, fuzzy logic in its broad sense is what is used in practically all applications of fuzzy logic [27]. For more than 40 years, type-1 fuzzy sets have served as the cornerstone of an effective method for simulating uncertainty, ambiguity, and imprecision [28]. A compelling case is made for the use of fuzzy logic to influence perceptions by Zadeh [29]. His claim is that fuzzy logic is better appropriate for modelling perceptions than standard mathematical methods since perceptions of size, safety, health, and comfort, for example, cannot be modelled using these methods. The debate about perception modelling is fresh and fascinating. It is evident that type-2 fuzzy sets, which have membership functions that are not crisp, can model these perceptions better than type-1 fuzzy sets, whose membership grades are crisp [30]. A type-2 fuzzy set smears out the point value of the membership grade of a type-1 fuzzy set to model uncertainty about that value by extending Zadeh’s original fuzzy set, now commonly referred to as a Type-1 Fuzzy Set, from a fuzzy set whose membership grade is a single (point) value to a fuzzy set whose membership grade is a function [31]. In the real world, most of the physical systems involve nonlinearities. The T–S fuzzy model has the capability to provide effective design technique associated with nonlinear systems utilizing effective control methodologies as well as techniques in linear systems [32]. Exhaustive investigation reveals that the T–S fuzzy concept has been applied vastly for fault detection problems [33]. An extra degree of freedom (DOF) known as the uncertainty footprint is included in the type-2 fuzzy logic system. This is why the type-2 fuzzy technique demonstrates more effective performance when compared to the type-1 fuzzy technique. system [34,35]. The concept and methodology of type-2 fuzzy logic system was stated elaborately by Liang et al. [36]. Sepulveda et al. [37] demonstrated that the type-2 fuzzy logic system can handle uncertainties in a better way than type-1 fuzzy logic systems due its characteristics of having more parameters as well as more design DOF. Lam et al. [38] conducted research that validates that a type-2 fuzzy technique has superior capabilities and is implemented in the application associated with a robotic arm. In the work by Román-Flores et al. [39], a new method of defuzzification for type-2 fuzzy intervals utilizing the Aumann integral was proposed. The continuity of this new defuzzification process was demonstrated utilising several well-known Hausdorff metric properties, Aumann integration, and the continuity of the Lebesgue measure on the class of compact-convex subsets. Defuzzification processes are well-known as important tools in control systems with uncertainty. From a practical standpoint, the following characteristics are arguably the most crucial for a defuzzification procedure: consistency and computing efficiency. Biglarbegian et al. [40], in their work, developed a new IT2 FLS, called an m–n IT2 FLS, that is a simplified version of the WM UB IT2 FLS.The m–n IT2 FLS has allowed for rigorous evaluations of IT2 fuzzy controllers, has lately been deployed in a number of applications, and has shown tremendous potential as a viable IT2 FLS that is not confined to control. They use a limits technique to quantitatively study the structure of the m–n IT2 FLS and identify the conditions under which the m–n IT2 FLS approaches the WM UB. These circumstances will also serve as guidance for the m–n IT2 FLS design parameters, which will aid designers in selecting these parameters for their applications. Castillo et al. [41] presented an overview of the uses of interval type-2 fuzzy logic in intelligent control. The paper’s main focus is on the underlying reasons for employing type-2 fuzzy controllers in various applications. Bio-inspired algorithms have recently emerged as effective optimization algorithms for handling complicated issues. The use of bio-inspired optimization approaches in the design of type-2 fuzzy controllers for specific applications has aided in the difficult work of determining the suitable parameter values and fuzzy system topology. The associated cutting forces in this work have nonlinearities embedded in the drilling process, which is an important aspect and should be dealt with in an efficient manner using fuzzy techniques.
A combination of PD and PID with Type-2 fuzzy logic system for the chatter control in milling process was proposed by Paul et al. [42]. An innovative model-based fault detection (FD) system in combination with an interval type-2 (IT2) Takagi–Sugeno (T–S) fuzzy system for detecting faults in downhole drilling systems was proposed by Paul et al. [43]. A novel fault detection methodology for interval type-2 (IT2) Takagi–Sugeno (T–S) fuzzy systems with sensor fault on the basis of novel fuzzy observer was illustrated by Li et al. [44]. In their study, Montazeri-Gh and Yazdani pioneer the use of Interval Type-2 Fuzzy Logic Systems (IT2FLSs) for gas turbine problem diagnostics. A bank of IT2FLSs trained for state detection and health assessment of an industrial gas turbine under varied operating conditions makes up the proposed FDI system. In order to achieve this, train and test data are produced by adding mechanical fault signs to the mathematical model of the gas turbine. The Interval Type-2 Fuzzy C-Means (IT2FCM) clustering method is then used to construct a fuzzy rule base, and a metaheuristic approach is used to optimise the parameters of the IT2FLSs [45]. In order to enhance decision-making in fault detection, Maged and Xie suggested a method for leveraging the prediction uncertainty information produced by Bayesian deep learning models. Automatic Differentiation Variational Inference (ADVI) is used for inference, and the resulting prediction uncertainty information is used to improve defect identification. An actual case study on vertical continuous plating (VCP) of printed circuit boards is used to test the proposed methodology [46]. An innovative method for rotating machinery defect diagnosis and detection was presented by Jalayer et al. Fast Fourier Transform (FFT), Continuous Wavelet Transform (CWT), and statistical features of raw signals were combined to create a novel feature engineering paradigm [47].
An automatic fault detection technique with model based methodology is depicted in this paper. The novel concept presented can be implemented effectively for the fault detection in the drilling tool. The paper is organised as follows: In Section 2, the modeling of drilling process involving tool movement is carried out using a type-2 fuzzy technique. In this work, a type-2 fuzzy model is preferred over a type-1 fuzzy model because of its capability to deal with nonlinearities with more degrees of freedom. In Section 3, two theorems are developed. Theorem 1 proves the stability of the fuzzy modeling and Theorem 2 validates the stability of the fault detection estimator. In both theorems, the Lyapunov stability candidate is implemented for proving the stability criteria. For the detection of faults in the drilling process while maintaining stability, a novel fault detection methodology is presented. In Section 4, a numerical analysis is performed to validate the effective implementation of the sophisticated theoretical method. Finally Section 5 summarizes the conclusion of this work.

2. Type-2 Fuzzy Logic Modeling Technique

The vibration in the drilling tool system can be resolved along three components (4 DOF), which is shown in Figure 1.
The lateral vibrations along two components ( x , y ), axial vibration (z) as well as torsional vibration ( θ ) associated with the drilling tool are modeled as [48,49]:
M d r X ¨ + C d r X ˙ + K d r X = F c t
here, the vibration is represented by X, and the cutting force is illustrated by F c t , stated as:
X = x y z θ T F c t = F x d F y d F z d F θ d T
In addition,
M d r = m x x 0 0 0 0 m y y 0 0 0 0 m z z m z θ 0 0 m θ z m θ θ C d r = c x x 0 0 0 0 c y y 0 0 0 0 c z z c z θ 0 0 c θ z c θ θ + 2 ψ 0 m x x 0 0 m y y 0 0 0 0 0 0 0 0 0 0 0 K d r = K ¯ x x 0 0 0 0 K ¯ y y 0 0 0 0 K ¯ z z K ¯ z θ 0 0 K ¯ θ z K ¯ θ θ + ψ 0 c x x 0 0 c y y 0 0 0 0 0 0 0 0 0 0 0
In addition, K ¯ x x = k x x m x x 2 ψ 2 , K ¯ y y = k y y m y y 2 ψ 2 , K ¯ z z = k z z m z z 2 ψ 2 , K ¯ z θ = k z θ m z θ 2 ψ 2 , K ¯ θ z = k θ z m θ z 2 ψ 2 h and K ¯ θ θ = k θ θ m θ θ 2 ψ 2 . Again, mass = M d r , damping matrix = C d r , stiffness matrix = K d r , and spindle speed dependent = ψ . Again, ( m x x , m y y ), ( k x x , k y y ) and ( c x x , c y y ) are the modal masses, stiffness and damping constants of the most flexible mode along two main components (x,y) of the drill bit, respectively. The vector associated with the cutting force can be represented as follows:
F c t = F x d F y d F z d F θ d = G ¯ X ( t ) + G ¯ T X ( t T ) + G ¯ P X ˙ ( t )
In addition,
G ¯ = j c = 1 2 j e = 1 N e T φ G e G ¯ T = j c = 1 2 j e = 1 N e T φ G T e G ¯ P = j c = 1 2 j e = 1 N e T φ G P e
The diagonal coefficient matrices are G ¯ , G ¯ T , and G ¯ P [50]. The nonlinear nature of the cutting forces is an important factor and has to be handled in an appropriate manner. The governing equation associated with the drilling process can be achieved as follows using Equations (1) and (4):
M d r X ¨ ( t ) + C d r X ˙ ( t ) + K d r X ( t ) = G ¯ X ( t ) + G ¯ T X ( t T ) + G ¯ P X ˙ ( t )
Here, time delay is signified by T. A controller is used to generate the control forces required to control the drilling operation. Discretizing Equation (6) with a control force is:
M d r X ¨ ( t ) + C d r X ˙ ( t ) + K d r X ( t ) = G ¯ X ( t ) + G ¯ T X ( t T ) + G ¯ P X ˙ ( t ) + U c t r l ( t )
and the control is illustrated as U c t r l = u x d u y d u z d u θ d . The state space form of Equation (7) is illustrated as:
z ˙ ( t ) = A i z ( t ) + B i U c t r l ( t ) + D i v ( t )
where
z = X T X ˙ T T , v ( t ) z ( t T ) A i = 0 I M d r 1 G ¯ M d r 1 K d r M d r 1 G ¯ P M d r 1 C d r D i = 0 0 M d r 1 G ¯ T 0
where z represents vibration state vector associated with vibration at time interval t. In addition, A i , B i and D i are constants. The identity matrices are 0 and I, respectively. B i represents the constant input matrix to define the controller. Now the continuous-time model is transformed into discrete-model by keeping both the control force and cutting forces constant during the sampling period T s ,
U c t r l ( t ) = U c t r l ( k T s ) , v ( t ) = v ( k T s ) , k T s t ( k + 1 ) T s
The time model in the discrete domain is represented using Equations (8) and (10) as:
Z d i s ( k + 1 ) = A d Z d i s ( k ) + B d U c t r l ( k ) + D d v ( k )
Now, the state vector is illustrated as Z d i s ( k ) , the state matrix is A d = e A i T , and the input vector is B d = e A i τ i d τ B i . In addition, u c ( k ) is the scalar input. The associated nonlinearity is embedded in the cutting forces represented by v( k ) . In addition, D d represents the matrix to define the cutting force.

Type-2 Takagi–Sugeno(IT2 T–S) Fuzzy System

Fuzzy Technique description: For example, if A 1 i , A 6 i , B 1 i , B 3 i , B 3 i are type-2 fuzzy sets, then the type-2 fuzzy set A with the membership function G A is defined as
A = { ( x , ς ) , G A ( x , ς ) x ϵ R , ς ϵ M x [ 0 , 1 ] }
where ς is an auxiliary variable, 0 G A ( x , ς ) 1 , M x is the primary membership function. For the type-2 fuzzy set A,
A = x ϵ X ς ϵ M x G A ( x , ς ) / ( x , ς )
The integral ∫ of the classical fuzzy set becomes the sum ∑.
The upper and lower membership functions are defined as G A u ( x 1 , ς ) and G A l ( x , ς ) . They describe the upper and lower bounds of the uncertainties. For i-th rule and the point x 1 , the crisp input is fuzzified in the interval of [ f i l ( x 1 ) , f i u ( x 1 ) ] ,
f i u ( x 1 ) = G A 1 i u ( x 1 , ς ) G A 2 i u ( x 1 , ς ) G A 3 i u ( x 1 , ς ) f i l ( x 1 ) = G A 1 i l ( x 1 , ς ) G A 2 i l ( x 1 , ς ) G A 3 i l ( x 1 , ς )
where ∗ denotes the t-norm operator, it can be the minimization.
For all l rules, type-2 fuzzy inference engine aggregates with the fuzzified inputs and infers another type-2 fuzzy set,
G O ( y ) = x ϵ X [ G A ( x ) G B ( x , y ) ]
where G O ( y ) represents the membership function of the fired rule, which is expressed by extended sup-star composition. For details on it, please refer to [51].
We use the type-reduction method to convert G O ( y ) into a type-1 fuzzy set. This technique captures more information about rule uncertainties than does the defuzzified value (a crisp number), and seems to be as fundamental to the design of fuzzy logic systems that include linguistic uncertainties (that translate into rule uncertainties) as variance is to the mean in case of probabilistic uncertainties. The centroids associated with type-2 fuzzy sets are calculated. For the i-th rule, the centroid of j-the output fuzzy rule is y j i = [ y l j i , y r j i ] , y l j i and y r j i are the most left and right points. The type-2 fuzzy sets are reduced to the type-1 fuzzy set with the interval [ y l j i , y r j i ] . The most popular technique for type-reducing an interval type-2 fuzzy set is the Karnik–Mendel (KM) iterative procedure. The outcome of type-reduction of an interval type-2 fuzzy set is an interval type-1 set considering the criteria that the centroid is placed between the two endpoints. The iterative methodology is a superior technique in order to find these endpoints. The centroid of the type-1 set is considered to be the centre of this interval.
For all p rules,
y l j = i = 1 p f l i y l j i i = 1 p f l i , y r j = i = 1 p f r i y r j i i = 1 p f r i
where f l i and f r i are the firing strengths associated with y l j i and y r j i of i-th rule. By the minimization and maximization operation, y l j and y r j can be expressed as
y l j = i = 1 p f l j i y l j + i = 1 p f r j i y l k i = 1 q f r i + i = 1 q f l i , y r j = i = 1 p f l j i y r j + i = 1 p f r j i y r k i = 1 q f r i + i = 1 q f l i
where q l j i = f l i i = 1 q f r i + i = 1 q f l i , q r j i = f r i i = 1 q f r i + i = 1 q f l i . By singleton fuzzifier, the jth output of the fuzzy logic system can be expressed as
f ^ j = y r j + y l j 2 = 1 2 ( ϕ r j T ( z ) w r j ( z ) + ϕ l T ( z ) w l j ( z )
where j = 1 , 2 , 3 . w r j is the point at which μ B r j = 1 , w l j is the point at which μ B l j = 1 .
The plant dynamics which is nonlinear in nature can be described by employing a p-rule IT2 T–S fuzzy model [36,38]. The rule is formulated in such a manner that the antecedent has IT2 fuzzy sets, whereas the consequent is represented by a linear dynamical system as follows:
R u l e j : I F ϝ 1 ( z ( k ) ) i s V ¯ 1 j A N D . . . ϝ Ψ ( z ( k ) ) i s V ¯ Ψ j T H E N ϝ Ψ = A z ( k ) + B u c ( k )
Here, V ¯ α j is termed as an IT2 fuzzy logic set having a rule which is j corresponding to the function ϝ α ( z ( k ) ) , α = 1 , 2 , 3 . . . Ψ , also j = 1 , 2 , , p ; Ψ is a positive integer. The illustration of the state vector associated with the system is represented by z ( k ) R n . Again, A R n × n and B R n × m are the unknown system and unknown input matrices, respectively. The input vector is illustrated as u c ( k ) R m . The pattern of type-2 fuzzy set is [52]:
y ( z ( k ) ) = y r k + y l k 2 = 1 2 ( ξ r k T r k + ξ l k T l k ) = 1 2 [ ξ r k T ξ l k T ] r k l k = ξ T
where y l k and y r k represents the numerical illustration of left and right most points, respectively, as:
y l k = 1 z = 1 L f l z z = 1 L f l z y l k s y r k = 1 z = 1 L f r z z = 1 L f r z y r k s
y l k = e = 1 L q l k l o _ e y l k + d = L + 1 Q q u p _ d y l k = [ Q l k l o Q l k u p ] y l k l o y l k u p = ξ l k T l k
also, ξ T = 1 2 [ ξ r k T ξ l k T ] and T = [ r k T l k T ] and f l z , f r z termed as firing strengths of y l k s and y r k s of rule p . The discrete-time nonlinear system represented by Equation (11) along with fault dynamics can be represented by an IT2 T–S fuzzy model with r rules as:
The Rule in Details:
If δ 1 ( Z ( k ) ) is N ˜ 1 i AND……AND δ p ( Z ( k ) ) is N ˜ p i THEN, the discretized state space system with output will be:
Z d i s ( k + 1 ) = A d Z d i s ( k ) + B d u c ( k ) + D d v ( k ) + f t ( y d i s , Φ ) , y d i s ( k ) = C d Z d i s ( k )
where N ˜ a i stated as an interval type-2 fuzzy set having rule i associated with the function δ a ( Z ( k ) ) , i = 1 , 2 , r , r = the number of IF-THEN rules. Again, a = 1 , 2 , p , with p considered to be positive integer. In addition, Z d i s ( k ) R n is the systems state vector, y d i s ( k ) R q is the output, u c ( k ) R m is the system input, and v ( k ) is the unknown bounded system uncertainty. The concept of firing strength having the i t h rule is of the following interval sets:
W i ( k ) = ω l ( k ) , ω u ( k ) , i = 1 , 2 , , p
where
ω l ( k ) = 1 2 α = 1 Ψ μ ( l ) M ˜ α i ( f α ( k ) ) 0 ω u ( k ) = 1 2 α = 1 Ψ μ ( u ) M ˜ α i ( f α ( k ) ) 0 μ ( l ) M ˜ α i ( f α ( k ) ) μ ( u ) M ˜ α i ( f α ( k ) ) 0 ω l ( k ) ω u ( k ) 0 , i
in which ω l ( x ( t ) ) , ω u ( x ( t ) ) , μ ( l ) M ˜ α i ( f α ( x ( t ) ) ) and μ ( u ) M ˜ α i ( f α ( x ( t ) ) illustrates the lower grade of membership, upper grade of membership, lower membership function, and upper membership function, respectively. The IT2 T–S fuzzy model [1,53] can be illustrated as follows:
Z d i s ( k + 1 ) = i = 1 p ω ˜ k ( Z d i s ( k ) ) A d Z ( k ) + i = 1 p ω ˜ m ( Z d i s ( k ) ) + i = 1 p ω ˜ j ( Z d i s ( k ) ) [ f t ( y d i s ( k ) , Φ ( k ) ) + B d u c ( k ) ] y d i s ( k ) = i = 1 p ω ˜ j ( Z d i s ( k ) ) C i Z d i s ( k )
where i = 1 p ω ˜ i ( Z d i s ( k ) ) = A d and i = 1 p ω ˜ m ( Z d i s ( k ) ) = D d v ( k ) . Relying on the stated Equation (20), the weighting functions associated with the type-2 fuzzy are:
i = 1 p ω ˜ k ( Z d i s ( k ) ) A d Z d i s ( k ) = 1 2 ω l i ( k ) α l i T ( Z d i s ( k ) ) + 1 2 ω u i ( k ) α u i T ( Z d i s ( k ) ) 0 , i i = 1 p ω ˜ m ( Z d i s ( k ) ) = 1 2 ω l m ( k ) α l m T ( Z d i s ( k ) ) + 1 2 ω u m ( k ) α u m T ( Z d i s ( k ) ) 0 , m i = 1 p ω ˜ j ( Z d i s ( k ) ) = 1 2 ω l j ( k ) α l j T ( Z d i s ( k ) ) + 1 2 ω u j ( k ) α u j T ( Z d i s ( k ) ) 0 , j
In this stage, it is important to prove that the identification error is bounded; therefore, the fault dynamics are considered to be constant and therefore:
i = 1 p ω ˜ j ( Z d i s ( k ) ) f t ( y d i s ( k ) , Φ ( k ) ) = Ω
where Ω is the positive definite matrix. Thus, using Equations (27) and (28) in Equation (26),
Z d i s ( k + 1 ) = i = 1 p ω ˜ i ( Z d i s ( k ) ) + m = 1 p ω ˜ m ( Z d i s ( k ) ) + j = 1 p ω ˜ j ( Z d i s ( k ) ) B d u c ( k ) + Ω
In addition, the weighting functions satisfy the convex sum property depicted as:
i = 1 p ω ˜ i ( Z d i s ( k ) ) = 1 , m = 1 p ω ˜ m ( Z d i s ( k ) ) = 1 , j = 1 p ω ˜ j ( Z d i s ( k ) ) = 1 0 α l i T ( Z d i s ( k ) ) 1 , 0 α u i T ( Z d i s ( k ) ) 1 , i 0 α l m T ( Z d i s ( k ) ) 1 , 0 α u m T ( Z d i s ( k ) ) 1 , i 0 α l j T ( Z d i s ( k ) ) 1 , 0 α u j T ( Z d i s ( k ) ) 1 , i
in which α l i ( Z d i s ( k ) ) , α u i ( Z d i s ( k ) ) , α l m ( Z d i s ( k ) ) ,   α u m ( Z d i s ( k ) ) , α l j ( Z d i s ( k ) ) and α u j ( Z d i s ( k ) ) are nonlinear functions, ω ˜ i ( Z d i s ( k ) ) , ω ˜ m ( Z d i s ( k ) ) and ω ˜ j ( Z d i s ( k ) ) are the concerned membership functions. In addition, Equation (27) states the type reduction.
In addition, ω l i ( k ) , ω u i ( k ) , ω l m ( k ) , ω u m ( k ) , ω l j ( k ) and ω u j ( k ) are the fuzzy weighting functions. For (27), the implementation of the learning laws takes place in the following manner:
ω l i ( k + 1 ) ω l i ( k ) = Ψ 1 ( k ) e mod ( k ) α l i T ( Z d i s ( k ) ) ω u i ( k + 1 ) ω u i ( k ) = Ψ 2 ( k ) e mod ( k ) α u i T ( Z d i s ( k ) ) ω l m ( k + 1 ) ω l m ( k ) = Ψ 1 ( k ) e mod ( k ) α l m T ( Z d i s ( k ) ) ω u m ( k + 1 ) ω u m ( k ) = Ψ 2 ( k ) e mod ( k ) α u m T ( Z d i s ( k ) ) ω l j ( k + 1 ) ω l j ( k ) = Ψ 1 ( k ) B d u c ( k ) e mod ( k ) α l j T ( Z d i s ( k ) ) ω u j ( k + 1 ) ω u j ( k ) = Ψ 2 ( k ) B d u c ( k ) e mod ( k ) α u j T ( Z d i s ( k ) )
Ψ 1 ( k ) and Ψ 2 ( k ) are stated by the equations mentioned below:
Ψ 1 ( k ) = Ψ 1 ( k ) 1 + π 1 ( k ) if e i ( k + 1 ) > 1 σ 1 e i ( k ) 0 if e i ( k + 1 ) < 1 σ 1 e i ( k ) Ψ 2 ( k ) = Ψ 2 ( k ) 1 + π 2 ( k ) if e i ( k + 1 ) > 1 σ 2 e i ( k ) 0 if e i ( k + 1 ) < 1 σ 2 e i ( k )
also 0 < Ψ 1 ( k ) 1 and 0 < Ψ 2 ( k ) 1 , The dead-zone parameter is represented by σ 1 and σ 2 . Again, π 1 ( k ) and π 2 ( k ) are represented by:
π 1 ( k ) = α l i T ( Z d i s ( k ) ) 2 + α l m T ( Z d i s ( k ) ) 2 + α l j T ( Z d i s ( k ) ) B d u c ( k ) 2 π 2 ( k ) = α u i T ( Z d i s ( k ) ) 2 + α u m T ( Z d i s ( k ) ) 2 + α u j T ( Z d i s ( k ) ) B d u c ( k ) 2
The modeling error e mod ( k ) satisfies the equation below:
e mod ( k ) = Z ^ d i s ( k ) Z d i s ( k )
Z ^ d i s ( k ) is the state of the fuzzy model, also from Equation (29):
( σ 1 + σ 2 ) Z ^ d i s ( k + 1 ) = i = 1 p ω ˜ i ( Z d i s ( k ) ) + i = 1 p ω ˜ m ( Z d i s ( k ) ) + i = 1 p ω ˜ j ( Z d i s ( k ) ) B d u c ( k ) + Ω
where σ 1 and σ 2 are positive constants, and σ 1 , σ 2 > 1 are design parameters.
In order to analyze the stability of the training algorithm (31), the dynamics of the modeling error e mod ( k ) are required. Thus, (35) can be expressed as:
( σ 1 + σ 2 ) Z d i s ( k + 1 ) = i = 1 p ω i * ( Z d i s ( k ) ) + i = 1 p ω m * ( Z d i s ( k ) ) + i = 1 p ω j * ( Z d i s ( k ) ) B d u c ( k ) + Ω
( σ 1 + σ 2 ) Z d i s ( k + 1 ) = 1 2 ω l i * ( k ) α l i T ( Z d i s ( k ) ) + 1 2 ω u i * ( k ) α u i T ( Z d i s ( k ) ) + 1 2 ω l m * ( k ) α l m T ( Z d i s ( k ) ) + 1 2 ω u m * ( k ) α u m T ( Z d i s ( k ) ) + 1 2 ω l j * ( k ) α l j T ( Z d i s ( k ) ) B d u c ( k ) + 1 2 ω u j * ( k ) α u j T ( Z d i s ( k ) ) B d u c ( k ) + ( ϵ l i + ϵ u i ) + ( ϵ l m + ϵ u m ) + ( ϵ l j + ϵ u j ) B d u c ( k ) + Ω
where ω l i * ( k ) , ω u i * ( k ) , ω l m * ( k ) , ω u m * ( k ) , ω l j * ( k ) and ω u j * ( k ) are unknown optimal weights, ϵ l i , ϵ u i , ϵ l m , ϵ u m , ϵ l j and ϵ u j are approximation errors, such as i = 1 p ω i * ( Z d i s ( k ) ) = 1 2 ω l i * ( k ) α l i T ( Z d i s ( k ) )
+ 1 2 ω u i * ( k ) α u i T ( Z d i s ( k ) ) + ( ϵ l i + ϵ u i ) ,
i = 1 p ω m * ( Z d i s ( k ) ) = 1 2 ω l m * ( k ) α l m T ( Z d i s ( k ) )
+ 1 2 ω u m * ( k ) α u m T ( Z d i s ( k ) ) + ( ϵ l m + ϵ u m ) ,
i = 1 p ω ˜ j ( Z d i s ( k ) ) = 1 2 ω l j * ( k ) α l j T ( Z d i s ( k ) )
+ 1 2 ω u j * ( k ) α u j T ( Z d i s ( k ) ) + ( ϵ l j + ϵ u j ) .
The error dynamics are from (35) and (37),
( σ 1 + σ 2 ) e mod ( k + 1 ) = i = 1 p ω ¯ i ( Z d i s ( k ) ) + i = 1 p ω ¯ m ( Z d i s ( k ) ) + i = 1 p ω ¯ j ( Z d i s ( k ) ) B d u c ( k )
( σ 1 + σ 2 ) e mod ( k + 1 ) = 1 2 ω ¯ l i ( k ) α l i T ( Z d i s ( k ) ) + 1 2 ω ¯ u i ( k ) α u i T ( Z d i s ( k ) ) + 1 2 ω ¯ l m ( k ) α l m T ( Z d i s ( k ) ) + 1 2 ω ¯ u m ( k ) α u m T ( Z d i s ( k ) ) + 1 2 ω ¯ l j ( k ) α l j T ( Z d i s ( k ) ) B d u c ( k ) + 1 2 ω ¯ u j ( k ) α u j T ( Z d i s ( k ) ) B d u c ( k ) + ξ i + ξ m + ξ j B d u c ( k )
where ω ¯ l i ( k ) = ω ˜ l i ( k ) ω l i * ( k ) , ω ¯ u i ( k ) = ω ˜ u i ( k ) ω u i * ( k ) , ω ¯ l m ( k ) = ω ˜ l m ( k ) ω l m * ( k ) ,   ω ¯ u m ( k ) = ω ˜ u m ( k ) ω u m * ( k ) , ω ¯ l j ( k ) = ω ˜ l j ( k ) ω l j * ( k ) , ω ¯ u j ( k ) = ω ˜ u j ( k ) ω u j * ( k ) ,   ξ i = ϵ l i + ϵ u i + R i , ξ m = ϵ l m + ϵ u m + R m and ξ j = ϵ l j + ϵ u j + R j ,   R i , R m and R j are the remainders of the Taylor formula for i = 1 p ω ˜ i ( Z d i s ( k ) ) ,   i = 1 p ω ˜ m ( Z d i s ( k ) ) and i = 1 p ω ˜ j ( Z d i s ( k ) ) , respectively.
The next theorem provides proof of the stability of the fuzzy modeling. It is for the identification of the nonlinear system using Type 2 fuzzy thus validating that identification error e mod ( k ) is bounded.
Theorem1. 
If the nonlinear system (26) is compensated using the fuzzy model (35) by utilizing the updating laws (31), then the modeling error e mod ( k ) should be
lim k e mod ( k ) 2 = 2 η ( k ) ξ ˜ π 1 ( k ) + π 2 ( k )
satisfying the condition ( σ 1 + σ 2 ) e mod ( k + 1 ) > e mod ( k ) .
Proof. 
The candidate L P ( k ) for Lyapunov analysis is chosen as follows:
L P ( k ) = 1 2 ω ¯ l i ( k ) 2 + 1 2 ω ¯ u i ( k ) 2 + 1 2 ω ¯ l m ( k ) 2 + 1 2 ω ¯ u m ( k ) 2 + 1 2 ω ¯ l j ( k ) 2 + 1 2 ω ¯ u j ( k ) 2 L P ( k ) = 1 2 t r ω ¯ l i T ( k ) ) ω ¯ l i ( k ) + 1 2 t r ω ¯ u i T ( k ) ω ¯ u i ( k ) + 1 2 t r ω ¯ l m T ( k ) ) ω ¯ l m ( k ) + 1 2 t r ω ¯ u m T ( k ) ω ¯ u m ( k ) + 1 2 t r ω ¯ l j T ( k ) ω ¯ l j ( k ) + 1 2 t r ω ¯ u j T ( k ) ω ¯ u j ( k )
In addition, the following relation is valid Δ L P ( k ) = L P ( k + 1 ) L P ( k ) , so:
Δ L P ( k ) = 1 2 [ ω ¯ l i ( k + 1 ) 2 ω ¯ l i ( k ) 2 ] + 1 2 [ ω ¯ u i ( k + 1 ) 2 ω ¯ u i ( k ) 2 ] + 1 2 [ ω ¯ l m ( k + 1 ) 2 ω ¯ l m ( k ) 2 ] + 1 2 [ ω ¯ u m ( k + 1 ) 2 ω ¯ u m ( k ) 2 ] + 1 2 [ ω ¯ l j ( k + 1 ) 2 ω ¯ l j ( k ) 2 ] + 1 2 [ ω ¯ u j ( k + 1 ) 2 ω ¯ u j ( k ) 2 ]
From the updating law (31),
Δ L P ( k ) = 1 2 [ ω ¯ l i ( k ) Ψ 1 ( k ) e mod ( k ) α l i T ( Z d i s ( k ) ) 2 ω ¯ l i ( k ) 2 ] + 1 2 [ ω ¯ u i ( k ) Ψ 2 ( k ) e mod ( k ) α u i T ( Z d i s ( k ) ) 2 ω ¯ u i ( k ) 2 ] + 1 2 [ ω ¯ l m ( k ) Ψ 1 ( k ) e mod ( k ) α l m T ( Z d i s ( k ) ) 2 ω ¯ l m ( k ) 2 ] + 1 2 [ ω ¯ u m ( k ) Ψ 2 ( k ) e mod ( k ) α u m T ( Z d i s ( k ) ) 2 ω ¯ u m ( k ) 2 ] + 1 2 [ ω ¯ l j ( k ) Ψ 1 ( k ) B d u c ( k ) e mod ( k ) α l j T ( Z d i s ( k ) ) 2 ω ¯ l j ( k ) 2 ] + 1 2 [ ω ¯ u j ( k ) Ψ 2 ( k ) B d u c ( k ) e mod ( k ) α u j T ( Z d i s ( k ) ) 2 ω ¯ u j ( k ) 2 ]
Δ L P ( k ) = 1 2 Ψ 1 2 ( k ) e mod ( k ) 2 [ α l i T ( Z d i s ( k ) ) 2 Ψ 1 ( k ) e mod ( k ) [ ω ¯ l i ( k ) α l i T ( Z d i s ( k ) ) + 1 2 Ψ 2 2 ( k ) e mod ( k ) 2 [ α u i T ( Z d i s ( k ) ) 2 Ψ 2 ( k ) e mod ( k ) [ ω ¯ u i ( k ) α u i T ( Z d i s ( k ) ) ] + 1 2 Ψ 1 2 ( k ) e mod ( k ) 2 [ α l m T ( Z d i s ( k ) ) 2 Ψ 1 ( k ) e mod ( k ) [ ω ¯ l m ( k ) α l m T ( Z d i s ( k ) ) + 1 2 Ψ 2 2 ( k ) e mod ( k ) 2 [ α u m T ( Z d i s ( k ) ) 2 Ψ 2 ( k ) e mod ( k ) [ ω ¯ u m ( k ) α u m T ( Z ( k ) ) ] + 1 2 Ψ 1 2 ( k ) e mod ( k ) 2 [ α l j T ( Z d i s ( k ) ) B d u c ( k ) ) 2 Ψ 1 ( k ) e mod ( k ) [ ω ¯ l j ( k ) α l j T ( Z d i s ( k ) ) B d u c ( k ) + 1 2 Ψ 2 2 ( k ) e mod ( k ) 2 [ α u j T ( Z d i s ( k ) ) B d u c ( k ) 2 Ψ 2 ( k ) e mod ( k ) [ ω ¯ u j ( k ) α u j T ( Z d i s ( k ) ) B d u c ( k )
Using the error dynamics (39), also Ψ 1 ( k ) = Ψ 2 ( k ) = η ( k )
Δ L P ( k ) = 1 2 η 2 ( k ) e mod ( k ) 2 [ α l i T ( Z d i s ( k ) ) 2 + α l m T ( Z d i s ( k ) ) 2 + α l j T ( Z d i s ( k ) ) B d u c ( k ) 2 ] + 1 2 η 2 ( k ) e mod ( k ) 2 [ α u i T ( Z d i s ( k ) ) 2 + α u m T ( Z d i s ( k ) ) 2 + α u j T ( Z d i s ( k ) ) B d u c ( k ) 2 ] 2 η ( k ) e mod T ( k ) × [ ( σ 1 + σ 2 ) e mod ( k + 1 ) ξ i ξ m ξ j B d u c ( k ) ]
Δ L P ( k ) = 1 2 η 2 ( k ) e mod ( k ) 2 [ α l i T ( Z d i s ( k ) ) 2 + α l m T ( Z d i s ( k ) ) 2 + α l j T ( Z d i s ( k ) ) B d u c ( k ) 2 ] + 1 2 η 2 ( k ) e mod ( k ) 2 [ α u i T ( Z d i s ( k ) ) 2 + α u m T ( Z d i s ( k ) ) 2 + α u j T ( Z d i s ( k ) ) B d u c ( k ) 2 ] 2 η ( k ) e mod ( k ) ( σ 1 + σ 2 ) e mod ( k + 1 ) + 2 η ( k ) e mod ( k ) [ ξ i + ξ m + ξ j B d u c ( k ) ]
Using the definition (32), (33) and ( σ 1 + σ 2 ) e mod ( k + 1 ) > e mod ( k ) and ξ ( k ) = ξ i + ξ m + ξ j B d u c ( k ) , then:
Δ L P ( k ) 2 η ( k ) e mod ( k ) 2 + 1 2 η 2 ( k ) e mod ( k ) 2 ( π 1 ( k ) + π 2 ( k ) ) + 2 η ( k ) e mod ( k ) ξ ( k ) η ( k ) e mod ( k ) 2 + 1 2 η 2 ( k ) e mod ( k ) 2 ( π 1 ( k ) + π 2 ( k ) ) + η ( k ) ξ ( k ) 2 η ( k ) { 1 η ( k ) 2 ( π 1 ( k ) + π 2 ( k ) } e mod ( k ) 2 + η ( k ) ξ ( k ) 2
Since the modeling error ξ ( k ) is bounded as
ξ ( k ) 2 ξ ˜
in order that Δ L P ( k ) 0 ,
η ( k ) 2 ( π 1 ( k ) + π 2 ( k ) } e mod ( k ) 2 η ( k ) ξ ˜ e mod ( k ) 2 2 η ( k ) ξ ˜ π 1 ( k ) + π 2 ( k )
Therefore, it is proved that L P ( k ) is bounded. In addition, if Ψ 1 ( k ) , Ψ 2 ( k ) = 0 , then, from (31), it is evident that the weights do not change and hence they are bounded. In addition, in this stage, it is assumed that the fault dynamics are not changing due to the non occurrence of faults. This theorem validates that the fuzzy modeling approach can be implemented with assured stability. The next stage is the fault detection scheme where an innovative observer will be developed to detect faults in the drilling bit with respect to the vibration measurements. □

3. The Technique of Fault Detection

A general fault dynamics equation is illustrated as [1]:
f t ( y d i s , Φ ) = Γ ( k k 0 ) Φ T Δ i ( k ) .
In the above equation, the unknown fault magnitude is depicted by Φ R p × n . The fault dynamics time profile is represented by Γ ( k k 0 ) . The intention of using time profile factor is for extracting general occurring fault dynamics associated with the nonlinear system. The fault basis function, which is a known quantity, is stated as Δ i ( k ) R p . The time profile [54] is illustrated as:
Γ ( τ ) = 0 , i f τ < 0 ( 1 e k ¯ i τ ) , i f τ 0 , i = 1 , 2 , N
The rate of growth of fault is given by k ¯ i > 0 . The relation depicting abrupt faults is given by:
Γ ( τ ) = 0 , i f τ < 0 1 , i f τ 0 , i = 1 , 2 , N
where τ is the time of fault occurrence, τ = f ( k k 0 ) . For the purpose of monitoring the system represented by Equation (26), a fault detection observer is chosen as:
Z ^ d i s ( k + 1 ) = i = 1 p ω ˜ k ( Z d i s ( k ) A d Z ^ d i s ( k ) + i = 1 p ω ˜ j ( Z d i s ( k ) ) f ^ t ( y d i s ( k ) , Φ ^ ( k ) ) + B d u c ( k ) + k f y d i s ( k ) y ^ d i s ( k ) y ^ d i s ( k ) = i = 1 p ω ˜ j ( Z ( k ) ) C d Z ^ d i s ( k )
the representation of the system state is done in this manner Z ^ d i s ( k ) R n , y ^ d i s ( k ) R q is the calculated output, and k f illustrates the observer gain. In addition,
e z ( k ) = Z d i s ( k ) Z ^ d i s ( k ) e y ( k ) = y d i s ( k ) y ^ d i s ( k )
represents the state residual and the output residual, respectively. Now, the error dynamics before the fault commencement are:
e z ( k + 1 ) = i = 1 p ω ˜ k ( Z d i s ( k ) ) A d e z ( k ) + i = 1 p ω ˜ m ( Z d i s ( k ) ) i = 1 p ω ˜ j ( Z d i s ( k ) ) k f C d e z ( k ) e y ( k ) = i = 1 p ω ˜ j ( Z ( k ) ) C d e z ( k )
In addition, the state and output residuals after the detection of the fault:
e z ( k + 1 ) = i = 1 p ω ˜ k ( Z d i s ( k ) ) A d e z ( k ) + i = 1 p ω ˜ m ( Z d i s ( k ) ) i = 1 p ( ω ˜ j ( Z d i s ( k ) ) k f C d e z ( k ) Φ ˜ T Δ i ( k ) ) e y ( k ) = i = 1 p ω ˜ j ( Z d i s ( k ) ) C d e z ( k )
where the parameter estimation error is signified by Φ ˜ = Φ Φ ^ . In addition, Φ ˜ T Δ i ( k ) = discrete time approximation (ADT). Using the concept of Z-transform applied by Zheng et al. [55], the FD residual can be expressed as:
r ( z ) = ( m 1 + m 2 ) y d i s ( z ) y ^ d i s ( z ) = ( m 1 + m 2 ) e y ( z ) = ( m 1 + m 2 ) i = 1 p ω ˜ j ( Z d i s ( k ) ) C d e z ( z )
r ( z ) = ( m 1 + m 2 ) i = 1 p ω ˜ j ( Z d i s ( k ) ) C d × Z d i s I i = 1 p ω ˜ k ( Z d i s ( k ) ) A d + i = 1 p ( ω ˜ j ( Z d i s ( k ) ) k f C d 1 × i = 1 p ω ˜ m ( Z d i s ( k ) )
where m 1 and m 2 are constant design matrix. The involved nonlinearity is represented by i = 1 p ω ˜ m ( Z d i s ( k ) ) . If the below mentioned conditions are satisfied, then it can be separated from the FD residual.
Condition 1
i = 1 p ω ˜ j ( Z d i s ( k ) ) C d = 0 and i = 1 p ω ˜ j ( Z d i s ( k ) ) C d × i = 1 p ω ˜ k ( Z d i s ( k ) ) A d + i = 1 p ( ω ˜ j ( Z d i s ( k ) ) k f C d ) = 0
Condition 2
i = 1 p ω ˜ j ( Z d i s ( k ) ) C d = 0 and i = 1 p ω ˜ k ( Z d i s ( k ) ) A d + i = 1 p ω ˜ j ( Z d i s ( k ) ) k f C d = 0
The conditions Equations (58) and (59) are utilized to extract the values of observer gains. Now, we propose that ω ˜ j ( Z d i s ( k ) ) = μ ω ˜ k ( Z d i s ( k ) ) . In addition, Φ ˜ T Δ i ( k ) = Π and A d μ k f C d = A d ¯ . Using Equation (55):
e z ( k + 1 ) = i = 1 p ω ˜ k ( Z d i s ( k ) ) A d ¯ e z ( k ) + i = 1 p ω ˜ m ( Z d i s ( k ) ) + i = 1 p ω ˜ j ( Z d i s ( k ) ) Π e y ( k ) = i = 1 p ω ˜ j ( Z d i s ( k ) ) C d e z ( k )
The following updated laws will be used to verify that the state residual and parameter estimate error are uniformly bounded, which also confirms that the output residual is uniformly bounded:
Φ ^ l ( k + 1 ) = 1 2 ( Φ ^ l ( k ) + Φ ^ u ( k ) ) 1 2 R θ i = 1 p ω ˜ j ( Z d i s ( k ) ) Δ i ( k ) e y T ( k ) B θ 1 2 γ i = 1 p ω ˜ j ( Z d i s ( k ) ) ( Φ ^ l ( k ) + Φ ^ u ( k ) ) ( I R θ Δ i ( k ) Δ i T ( k ) )
Φ ^ u ( k + 1 ) = 1 2 ( Φ ^ u ( k ) + Φ ^ l ( k ) ) 1 2 R θ i = 1 p ω ˜ j ( Z d i s ( k ) ) Δ i ( k ) e y T ( k ) B θ 1 2 γ i = 1 p ω ˜ j ( Z d i s ( k ) ) ( Φ ^ u ( k ) + Φ ^ l ( k ) ) ( I R θ Δ i ( k ) Δ i T ( k ) )
Theorem2. 
The boundary condition of the output residual e y ( k ) and the parameter estimation error Φ ˜ will be validated if the conditions stated below are satisfied:
e z ( k ) 2 ( ϕ 1 2 + ϕ 2 2 ) ( 1 A d ¯ max 2 1 4 R θ 2 B θ 2 Δ max 2 C d max 2 )
Φ ˜ l ( k ) + Φ ˜ u ( k ) ( Ψ d + + ω 1 2 + L max 2 + 2 ϕ 3 2 ) 1 4 + γ 2 i = 1 p ω ˜ j ( Z d i s ( k ) ) 2 I R θ Δ i ( k ) Δ i T ( k ) 2 ]
when a discrete time observer is used to monitor a nonlinear system that has been updated with new laws. Equations (61) and (62) are utilized for the unknown parameter tuning process linked to ADT
Proof. 
Consider Lyapunov candidate function as:
L P ( k ) = e z T ( k ) e z ( k ) 1 2 t r Φ ˜ l T ( k ) Φ ˜ l ( k ) + 1 2 t r Φ ˜ u T ( k ) Φ ˜ u ( k )
The first difference of the Equation (63) is given by:
Δ L P ( k ) = e z T ( k + 1 ) e z ( k + 1 ) e z T ( k ) e z ( k ) + 1 2 t r Φ ˜ l T ( k + 1 ) Φ ˜ l ( k + 1 ) Φ ˜ l T ( k ) Φ ˜ l ( k ) + 1 2 t r Φ ˜ u T ( k + 1 ) Φ ˜ u ( k + 1 ) Φ ˜ u T ( k ) Φ ˜ u ( k )
Now, let
Δ L P 1 ( k ) = e z T ( k + 1 ) e z ( k + 1 ) e z T ( k ) e z ( k ) Δ L P 2 ( k ) = 1 2 t r Φ ˜ l T ( k + 1 ) Φ ˜ l ( k + 1 ) Φ ˜ l T ( k ) Φ ˜ l ( k ) + 1 2 t r Φ ˜ u T ( k + 1 ) Φ ˜ u ( k + 1 ) Φ ˜ u T ( k ) Φ ˜ u ( k )
Now, Δ L P 1 ( k ) will be expanded. Using Equation (60):
Δ L P 1 ( k ) = i = 1 p ω ˜ k ( Z d i s ( k ) ) A d ¯ e z ( k ) T + i = 1 p ω ˜ m ( Z d i s ( k ) ) + i = 1 p ω ˜ j ( Z d i s ( k ) ) Π T × i = 1 p ω ˜ k ( Z d i s ( k ) ) A d ¯ e z ( k ) + + i = 1 p ω ˜ m ( Z d i s ( k ) ) + i = 1 p ω ˜ j ( Z d i s ( k ) ) Π e z T ( k ) e z ( k )
Δ L P 1 ( k ) = i = 1 p ω ˜ k ( Z d i s ( k ) ) A d ¯ T e z T ( k ) × i = 1 p ω ˜ k ( Z d i s ( k ) ) A d ¯ e z ( k ) + i = 1 p ω ˜ k ( Z d i s ( k ) ) A d ¯ T e z T ( k ) i = 1 p ω ˜ m ( Z d i s ( k ) ) + i = 1 p ω ˜ k ( Z d i s ( k ) ) A d ¯ T e z T ( k ) i = 1 p ω ˜ j ( Z d i s ( k ) ) Π + i = 1 p ω ˜ m ( Z d i s ( k ) ) i = 1 p ω ˜ k ( Z d i s ( k ) ) A d ¯ e z ( k ) + i = 1 p ω ˜ m ( Z d i s ( k ) ) i = 1 p ω ˜ m ( Z d i s ( k ) ) + i = 1 p ω ˜ m ( Z d i s ( k ) ) i = 1 p ω ˜ j ( Z d i s ( k ) ) Π i = 1 p ω ˜ j ( Z d i s ( k ) ) Π T i = 1 p ω ˜ k ( Z d i s ( k ) ) A d ¯ e z ( k ) + i = 1 p ω ˜ j ( Z d i s ( k ) ) Π T i = 1 p ω ˜ m ( Z d i s ( k ) ) + i = 1 p ω ˜ j ( Z d i s ( k ) ) Π T i = 1 p ω ˜ j ( Z d i s ( k ) ) Π e z T ( k ) e z ( k )
Re-arranging the terms in Equation (67) and
Δ L P 1 ( k ) = i = 1 p ω ˜ k ( Z d i s ( k ) ) 2 A d ¯ 2 e z ( k ) 2 + i = 1 p ω ˜ m ( Z d i s ( k ) ) 2 + i = 1 p ω ˜ j ( Z d i s ( k ) ) 2 Π 2 + 2 i = 1 p ω ˜ k ( Z d i s ( k ) ) i = 1 p ω ˜ m ( Z d i s ( k ) ) A d ¯ T e z T ( k ) + 2 i = 1 p ω ˜ k ( Z d i s ( k ) ) i = 1 p ω ˜ j ( Z d i s ( k ) ) A d ¯ T e z T ( k ) Π + 2 i = 1 p ω ˜ m ( Z d i s ( k ) ) i = 1 p ω ˜ j ( Z d i s ( k ) ) Π e z T ( k ) e z ( k )
Now, considering i = 1 p ω ˜ k ( Z d i s ( k ) ) i = 1 p ω ˜ m ( Z d i s ( k ) ) A d ¯ T e z T ( k ) ϕ 1 2 e z ( k ) ,
i = 1 p ω ˜ k ( Z d i s ( k ) ) i = 1 p ω ˜ j ( Z d i s ( k ) ) A d ¯ T e z T ( k ) Π ϕ 2 2 e z ( k ) ,
i = 1 p ω ˜ m ( Z d i s ( k ) ) i = 1 p ω ˜ j ( Z d i s ( k ) ) Π ϕ 3 2
Δ L P 1 ( k ) i = 1 p ω ˜ k ( Z d i s ( k ) ) 2 A d ¯ 2 e z ( k ) 2 + i = 1 p ω ˜ m ( Z d i s ( k ) ) 2 + i = 1 p ω ˜ j ( Z d i s ( k ) ) 2 Π 2 + 2 ϕ 1 2 e z ( k ) + 2 ϕ 2 2 e z ( k ) + 2 ϕ 3 2 e z ( k ) 2
where ϕ 1 2 , ϕ 2 2 and ϕ 3 2 are positive definite matrices. Now, Δ L P 2 ( k ) will be expanded. Using Equation (61):
Δ L P 2 ( k ) = 1 2 t r { [ 1 2 ( Φ ˜ l ( k ) + Φ ˜ u ( k ) ) 1 2 R θ i = 1 p ω ˜ j ( Z d i s ( k ) ) Δ i ( k ) e y T ( k ) B θ 1 2 γ i = 1 p ω ˜ j ( Z d i s ( k ) ) ( Φ ^ l ( k ) + Φ ^ u ( k ) ) ( I R θ Δ i ( k ) Δ i T ( k ) ) ] T × [ 1 2 ( Φ ˜ l ( k ) + Φ ˜ u ( k ) ) 1 2 R θ i = 1 p ω ˜ j ( Z d i s ( k ) ) Δ i ( k ) e y T ( k ) B θ 1 2 γ i = 1 p ω ˜ j ( Z d i s ( k ) ) ( Φ ^ l ( k ) + Φ ^ u ( k ) ) ( I R θ Δ i ( k ) Δ i T ( k ) ) ] Φ ˜ l T ( k ) Φ ˜ l ( k ) } + 1 2 t r { [ 1 2 ( Φ ˜ u ( k ) + Φ ˜ l ( k ) ) 1 2 R θ i = 1 p ω ˜ j ( Z d i s ( k ) ) Δ i ( k ) e y T ( k ) B θ 1 2 γ i = 1 p ω ˜ j ( Z d i s ( k ) ) ( Φ ^ u ( k ) + Φ ^ l ( k ) ) ( I R θ Δ i ( k ) Δ i T ( k ) ) ] T × [ 1 2 ( Φ ˜ u ( k ) + Φ ˜ l ( k ) ) 1 2 R θ i = 1 p ω ˜ j ( Z d i s ( k ) ) Δ i ( k ) e y T ( k ) B θ 1 2 γ i = 1 p ω ˜ j ( Z d i s ( k ) ) ( Φ ^ u ( k ) + Φ ^ l ( k ) ) ( I R θ Δ i ( k ) Δ i T ( k ) ) ] Φ ˜ u T ( k ) Φ ˜ u ( k ) }
Re-arrange the terms in Equation (70). In addition, using Φ ˜ = Φ Φ ^ and Equation (27):
Δ L P 2 ( k ) = t r { { [ ( 1 2 I γ I i = 1 p ω ˜ j ( Z d i s ( k ) ) × ( I R θ Δ i ( k ) Δ i T ( k ) ) ) ( Φ ˜ l T ( k ) + Φ ˜ u T ( k ) ) 1 2 R θ B θ T e y ( k ) i = 1 p ω ˜ j ( Z d i s ( k ) ) Δ i ( k ) + γ ( i = 1 p ω ˜ j ( Z d i s ( k ) ) ( I R θ Δ i ( k ) Δ i T ( k ) ) ) × ( Φ l T ( k ) + Φ u T ( k ) ) ) ] × [ ( 1 2 I γ I i = 1 p ω ˜ j ( Z d i s ( k ) ) ( I R θ Δ i ( k ) Δ i T ( k ) ) ) × ( Φ ˜ l ( k ) + Φ ˜ u ( k ) ) 1 2 R θ B θ e y T ( k ) i = 1 p ω ˜ j ( Z d i s ( k ) ) Δ i ( k ) + γ ( i = 1 p ω ˜ j ( Z d i s ( k ) ) ( I R θ Δ i ( k ) Δ i T ( k ) ) ) ( Φ l ( k ) + Φ u ( k ) ) ) ] } 1 2 t r Φ ˜ l T ( k ) Φ ˜ l ( k ) } 1 2 t r Φ ˜ u T ( k ) Φ ˜ u ( k )
Δ L P 2 ( k ) = t r { { [ ( 1 2 I γ I i = 1 p ω ˜ j ( Z d i s ( k ) ) × ( I R θ Δ i ( k ) Δ i T ( k ) ) ) 2 Φ ˜ l ( k ) + Φ ˜ u ( k ) 2 R θ B θ T e y ( k ) i = 1 p ω ˜ j ( Z d i s ( k ) ) Δ i ( k ) ( 1 2 I γ I i = 1 p ω ˜ j ( Z d i s ( k ) ) × ( I R θ Δ i ( k ) Δ i T ( k ) ) ) ( Φ ˜ l ( k ) + Φ ˜ u ( k ) ) + 2 γ ( i = 1 p ω ˜ j ( Z d i s ( k ) ) ( I R θ Δ i ( k ) Δ i T ( k ) ) ) × ( 1 2 I γ I i = 1 p ω ˜ j ( Z d i s ( k ) ) ( I R θ Δ i ( k ) Δ i T ( k ) ) ) × Φ ˜ l ( k ) + Φ ˜ u ( k ) 2 + 1 4 R θ 2 B θ 2 e y ( k ) 2 × i = 1 p ω ˜ j ( Z d i s ( k ) ) Δ i ( k ) 2 1 2 R θ B θ T e y ( k ) γ i = 1 p ω ˜ j ( Z d i s ( k ) ) 2 Δ i ( k ) × ( I R θ Δ i ( k ) Δ i T ( k ) ) ) ( Φ l ( k ) + Φ u ( k ) ) ) + γ 2 i = 1 p ω ˜ j ( Z d i s ( k ) ) 2 ( I R θ Δ i ( k ) Δ i T ( k ) ) 2 × ( Φ l ( k ) + Φ u ( k ) ) 2 1 2 t r Φ ˜ l T ( k ) Φ ˜ l ( k ) } 1 2 t r Φ ˜ u T ( k ) Φ ˜ u ( k ) }
Arranging Equation (72) and applying Cauchy–Schwarz inequality criteria:
Δ L P 2 ( k ) t r { { [ ( 1 4 I 2 ( γ I i = 1 p ω ˜ j ( Z d i s ( k ) ) × ( I R θ Δ i ( k ) Δ i T ( k ) ) ) 2 ) Φ ˜ l ( k ) + Φ ˜ u ( k ) 2 + 1 4 R θ 2 B θ 2 e y ( k ) 2 i = 1 p ω ˜ j ( Z d i s ( k ) ) Δ i ( k ) 2 + γ 2 i = 1 p ω ˜ j ( Z d i s ( k ) ) 2 ( I R θ Δ i ( k ) Δ i T ( k ) ) 2 × ( Φ l ( k ) + Φ u ( k ) ) 2 1 2 t r Φ ˜ l T ( k ) Φ ˜ l ( k ) } 1 2 t r Φ ˜ u T ( k ) Φ ˜ u ( k ) }
Combining Equations (69) and (73) and using e y ( k ) = i = 1 p ω ˜ j ( Z d i s ( k ) ) C d e z ( k ) , the following equation is extracted below:
Δ L P ( k ) i = 1 p ω ˜ k ( Z d i s ( k ) ) 2 A d ¯ 2 × e z ( k ) 2 + i = 1 p ω ˜ m ( Z d i s ( k ) ) 2 + i = 1 p ω ˜ j ( Z d i s ( k ) ) 2 Π 2 + 2 ϕ 1 2 e z ( k ) + 2 ϕ 2 2 e z ( k ) + 2 ϕ 3 2 e z ( k ) 2 + t r { { 1 4 Φ ˜ l ( k ) + Φ ˜ u ( k ) 2 γ 2 i = 1 p ω ˜ j ( Z d i s ( k ) ) 2 I R θ Δ i ( k ) Δ i T ( k ) 2 × Φ ˜ l ( k ) + Φ ˜ u ( k ) 2 + 1 4 R θ 2 B θ 2 i = 1 p ω ˜ j ( Z d i s ( k ) ) 2 × i = 1 p ω ˜ j ( Z d i s ( k ) ) C d 2 e z ( k ) 2 + γ 2 i = 1 p ω ˜ j ( Z d i s ( k ) ) 2 I R θ Δ i ( k ) Δ i T ( k ) 2 × ( Φ l ( k ) + Φ u ( k ) ) 2 1 2 t r Φ ˜ l T ( k ) Φ ˜ l ( k ) } 1 2 t r Φ ˜ u T ( k ) Φ ˜ u ( k ) }
Now, the boundary conditions for the following terms can be set:
i = 1 p ω ˜ m ( Z d i s ( k ) ) 2 ω 1 2 , i = 1 p ω ˜ k ( Z d i s ( k ) ) 2 A d ¯ 2 A d ¯ max , 2 γ 2 i = 1 p ω ˜ j ( Z d i s ( k ) ) 2 I R θ Δ i ( k ) Δ i T ( k ) 2 × ( Φ l ( k ) + Φ u ( k ) ) 2 Ψ d , i = 1 p ω ˜ j ( Z d i s ( k ) ) 2 Π 2 L max 2 , i = 1 p ω ˜ j ( Z d i s ( k ) ) 2 Δ i ( k ) 2 Δ max 2 , i = 1 p ω ˜ j ( Z d i s ( k ) ) 2 C d 2 C d max 2
using Equation (74) and conditions (75), also Φ ˜ l ( k ) + Φ ˜ u ( k ) 2 Φ ˜ l ( k ) 2 + Φ ˜ u ( k ) 2
Δ L P ( k ) A d ¯ max 2 e z ( k ) 2 + ω 1 2 + L max 2 + 2 ϕ 1 2 e z ( k ) + 2 ϕ 2 2 e z ( k ) + 2 ϕ 3 2 e z ( k ) 2 t r [ 1 4 + γ 2 i = 1 p ω ˜ j ( Z d i s ( k ) ) 2 × I R θ Δ i ( k ) Δ i T ( k ) 2 ] Φ ˜ l ( k ) + Φ ˜ u ( k ) 2 + 1 4 R θ 2 B θ 2 Δ max 2 C d max 2 e z ( k ) 2
Δ L P ( k ) ( 1 A d ¯ max 2 1 4 R θ 2 B θ 2 Δ max 2 C d max 2 ) × e z ( k ) 2 + 2 ( ϕ 1 2 + ϕ 2 2 ) e z ( k ) t r [ 1 4 + γ 2 i = 1 p ω ˜ j ( Z d i s ( k ) ) 2 × I R θ Δ i ( k ) Δ i T ( k ) 2 ] Φ ˜ l ( k ) + Φ ˜ u ( k ) 2 + Ψ d + + ω 1 2 + L max 2 + 2 ϕ 3 2
Now, Δ L P ( k ) 0 , if and only if
(1)
( 1 A d ¯ max 2 1 4 R θ 2 B θ 2 Δ max 2 C d max 2 ) e z ( k ) 2 2 ( ϕ 1 2 + ϕ 2 2 ) e z ( k )
and (2)
[ 1 4 + γ 2 i = 1 p ω ˜ j ( Z d i s ( k ) ) 2 I R θ Δ i ( k ) Δ i T ( k ) 2 ] ( Ψ d + + ω 1 2 + L max 2 + 2 ϕ 3 2 )
which yields
e z ( k ) 2 ( ϕ 1 2 + ϕ 2 2 ) ( 1 A d ¯ max 2 1 4 R θ 2 B θ 2 Δ max 2 C d max 2 )
Φ ˜ l ( k ) + Φ ˜ u ( k ) ( Ψ d + + ω 1 2 + L max 2 + 2 ϕ 3 2 ) 1 4 + γ 2 i = 1 p ω ˜ j ( Z d i s ( k ) ) 2 I R θ Δ i ( k ) Δ i T ( k ) 2 ]
It is now proved by the theorem that the system states are bounded, which is very important from a stability concern of the fault detector system. If during any point the system states are not stable, the fault detector will generate unstable results, thus decreasing the effectiveness of the entire process. It also validates that the fault detection estimator is reliable with precise online learning of the fault magnitude. □

4. Validation and Results

The drilling process parameters illustrated in [48] were implemented for drilling process simulation to verify the efficacy of the created theory and to confirm the notion of the new fault detection technique. The parameters are shown in Table 1:

Simulation of the Drilling Process for Verification

Equation (7) can be represented along x , y , z and θ components as follows:
x ¨ = F x m x x + u x m x x c x x m x x x ˙ k x x m x x ψ 2 m x x x + 2 ψ y ˙ + ψ c x x m x x y y ¨ = F y m y y + u y m y y c y y m y y y ˙ k y y m y y ψ 2 m y y x 2 ψ x ˙ ψ c y y m y y x z ¨ = F z m z z + u z m z z c z z m z z z ˙ k z z m z z ψ 2 m z z z m z θ m z z θ ¨ c z θ m z z θ ˙ k z θ m z θ ψ 2 m z z θ θ ¨ = F θ m θ θ + u θ m θ θ c θ θ m θ θ θ ˙ k θ θ m θ θ ψ 2 m θ θ θ m θ z m θ θ z ¨ c θ z m θ θ z ˙ k θ z m θ z ψ 2 m θ θ z
where x ¨ , y ¨ , z ¨ and θ ¨ are the accelerations along x , y , z and the θ component. In Figure 2 and Figure 3, the block diagrams depict the simulation of the drilling process without and with faults, respectively. By utilizing Equation (78), the acceleration signals along x, y, z, and θ directions are obtained. These accelerations are then fed to the numerical integrator for the generation of velocity and position signals. These signals are used for the vibration analysis of the drill bit. The vibration signals along x, y, z, and θ directions will vary in the events of the fault in the drill tool. For simplicity, the analysis results along x and y directions are demonstrated. The nonlinear cutting forces implemented for the simulation process along x and y directions are given by [56]:
F x = + N 2 π { ζ 1 Δ x 3 + η 1 Δ y 3 + ζ 2 Δ x 2 + η 2 Δ y 2 + ζ 3 Δ x + η 3 Δ y + 3 γ 1 Δ x 2 Δ y + 3 γ 2 Δ x Δ y 2 + 2 γ 3 Δ x Δ y + γ 4 } F y = N 2 π { ζ 1 * Δ x 3 + η 1 * Δ y 3 + ζ 2 * Δ x 2 + η 2 * Δ y 2 + ζ 3 * Δ x + η 3 * Δ y + 3 γ 1 * Δ x 2 Δ y + 3 γ 2 * Δ x Δ y 2 + 2 γ 3 * Δ x Δ y + γ 4 * }
Equation (79) is utilized to generate the cutting forces for the drilling process. The cutting forces for a period of 2s along the components x and y and are represented using Figure 4 and Figure 5, respectively.
The accelerations in case of the real process can be calculated by installing accelerometer sensors on the drilling machine. Types of sensors which can be used for the process can be categorized as:
(a)
Bidirectional sensor—For the computation of x and y components of accelerations;
(b)
Axial sensor in order to calculate the acceleration along z direction;
(c)
Rotational sensor in order to calculate the acceleration along the θ direction.
The entire drilling mechanism is simulated using the software platform Matlab/Simulink. The events of faults demonstrated using simulation are presented and consequently validated the fault detector scheme for successful detection of faults. For the drilling process model, two subsystem Simulink blocks are used. One block with the defect and the second block without the fault are used to compare the findings. Control signals and cutting forces are the process model’s inputs. The simulation time was set for a period of 120 s. The IT2-FLS toolbox designed by Taskin et al. [57] is implemented in order to actuate the simulation process. The important features of the IT2-FLS toolbox are the main editor, membership function editor, rule editor as well as the surface viewer. The membership functions considered for the entire process are the Gaussian functions. Designing the type-2 fuzzy system, we first use the type-2 fuzzy logic system toolkit [57]. The computing cost of calculating the type-2 fuzzy system output is high due to its iterative nature [58]. To deal with these conditions, many TR approaches for decreasing the computational cost of the type-2 fuzzy inference mechanism have been presented. In the fuzzy logic theory, the Karnik–Mendel (KM) algorithms are iterative techniques.They are known to converge monotonically and super exponentially quickly; however, convergence requires several (typically two to six) iterations [59]. The TR methods were divided into two categories by Wu: Enhancements to the KMs, which reduced the KM’s computational cost, and Alternative TR approaches, which are closed-form approximations to the KM algorithm [60]. Because of its novelty and adaptability, the KM approach is the most popular [61]. A type-2 fuzzy logic system toolbox supports type reduction and defuzzification procedures: (1) Karnik–Mendel Algorithm (KM); (2) Enhanced KM Algorithm (EKM); (3) Iterative Algorithm with Stop Condition (IASC); (4) Enhanced IASC (EIASC); (5) Enhanced Opposite Direction Searching Algorithm (EODS); (6)Wu–Mendel Uncertainty Bound Method (WM); (7) Nie–Tan Method (NT); and (8) Begian–Melek–Mendel Method (BMM). It is possible to state the antecedent MFs using the MF types that currently exist in the Matlab Fuzzy Logic Toolbox in the type-2 fuzzy logic system toolbox. As a result, the LMF and UMF Matlab functions can be implemented in the same style. However, each type of MF has an additional parameter that represents the height of the related MF. A triangle MF, for example, is defined by the parameters A2, B2, C2, and H2, which specify the MF’s left point, centre point, right point, and height, respectively. In type-2 fuzzy systems, especially type-2 fuzzy controller design, the parameter H2 is commonly used to produce FOU. Gaussian functions are used for the membership functions. Gaussian membership functions have the advantage of being easier to design since they are easier to express and optimise, they are always continuous, and they are faster for small rule bases. When the same number of MFs and the same type-reduction and defuzzification approach are utilised, Gaussian type-2 fuzzy logic systems are faster than trapezoidal type-2 fuzzy logic systems. Because small rule bases are commonly employed in practise, Gaussian type-2 fuzzy logic systems appear to be more cost-effective. The type-2 fuzzy system is defuzzified by implementing the technique proposed in [36]. The fuzzy laws are chosen on the basis of Theorem 1 concentrating on the condition lim k e i ( k ) 2 = 2 η ( k ) ξ ˜ π 1 ( k ) + π 2 ( k ) . The learning rate used for the fuzzy laws is Ψ 1 = Ψ 2 = 0.85 . The conditions extracted from Theorem 2 for the fault detector estimator are R θ = 0.99 and γ = 0.01 . In Figure 6 and Figure 7, the drill tool’s vibration is plotted on the x and y axes. For better clarity of the plot representation, a 20-s interval is shown. These vibration graphs show the pattern of vibration in the absence of induced flaws. At 45 s following the commencement of the drilling process, an artificial fault is induced along the x and y axes to the drilling operation simulation. The vibration of the drill tool with the induced flaws is represented by Figure 8 and Figure 9. These plots show how plots with chatter change after 45 s, proving the fluctuation of vibration caused by induced faults. The period between 40 s and 90 s is illustrated for the clarity of the charts.The induced fault is a self generated sinusoidal signal. The defect detection in the drill tool is shown in Figure 10 and Figure 11 along x and y components. The charts show that there is no change in the signal until 45 s, when it displays zero. At the instant of the detection of fault, the change in vibration signal is detected instantly along x and y components. From the vibration plots with induced faults (Figure 8 and Figure 9), it is clear that the intensity of the faults increases after a period of 65 s. However, from the fault detection estimator, the variation of the plots is noticed instantly with the fault starting up, thus raising an alarm and preventing the damage of drill tool. Hence, it is validated that the interval type-2 (IT2) Takagi–Sugeno (T–S) fuzzy based observer fault detection algorithm is successful as a fault detector mechanism by the sounding alarm after a period of 45 s. The future work is intended towards the investigation of faults along z and θ directions and comparing the results with x and y directions, thus predicting remaining useful life (RUL) of the drilling process system.

5. Conclusions

This work shows how to find faults in the drilling process using an interval type-2 (IT2) Takagi–Sugeno (T–S) fuzzy-based observer fault detection system. In the face of system uncertainty, the stability of the system using the fault detection estimator is validated. This system uncertainty is tackled using the type-2 fuzzy logic system. Theorem 1 is developed to validate the stability of Type-2 fuzzy modeling. The system states of the process are proved to be bounded, which also validates the stability of the fault detection estimator using Theorem 2. The stability requirements of Theorem 1 and Theorem 2 are fulfilled using the Lyapunov stability candidate. The defect detection system’s effectiveness is verified using numerical analysis, which also establishes theoretical features. The main intention of this paper is to develop a control-based fault algorithm to detect an induced fault at the correct instant with assured stability of the system. This type of unique way for detecting a flaw in a drilling system has never been used before. The effective methodology can be implemented in real-time for detecting faults during drilling operations. This is critical for increasing the productivity and quality of the machining process, and it also helps improve the surface finish of the work piece satisfying the customer needs and expectations. Future work is intended towards the computation of Remaining Useful Life (RUL) of the drilling devices.

Author Contributions

Conceptualization, S.P., R.T. and D.K.; Methodology, S.P., R.T. and D.K.; Software, S.P.; Validation, M.L. and S.P.; Investigation, S.P., R.T. and D.K.; Writing—original draft preparation, S.P., R.T. and D.K.; Writing—review and editing, S.P.; Supervision, M.L.; Project administration, M.L.; Funding acquisition, M.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not Applicable.

Data Availability Statement

Study did not report any data.

Acknowledgments

Magnus Löfstrand gratefully acknowledges VINNOVA research funding in the project A digital twin to support sustainable and available production as a service and Swedish Mining Innovation funding in the project. A general digital twin driving mining innovation through statistical and logical modelling.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Thumati, B.T.; Feinstein, M.A.; Jagannathan, S. A Model-Based Fault Detection and Prognostics Scheme for Takagi–Sugeno Fuzzy Systems. IEEE Trans. Fuzzy Syst. 2014, 22, 736–748. [Google Scholar] [CrossRef]
  2. Patton, R.J.; Frank, P.M.; Clark, R.N. Issues of Fault Diagnosis for Dynamic Systems; Springer: London, UK, 2000. [Google Scholar]
  3. Blanke, M.; Kinnaert, M.; Lunze, J.; Staroswiecki, M. Diagnosis and Fault-Tolerant Control, 2nd ed.; Springer: Berlin/Heidelberg, Germany, 2006. [Google Scholar]
  4. Youssef, T.; Chadli, M.; Karimi, H.R.; Wang, R. Actuator and sensor faults estimation based on proportional integral observer for TS fuzzy model. J. Frankl. Inst. 2017, 354, 2524–2542. [Google Scholar] [CrossRef]
  5. Benbouzid, M.E.H.; Vieira, M.; Theys, C. Induction motors’ faults detection and localization using stator current advanced signal processing techniques. IEEE Trans. Power Electron. 1999, 14, 14–22. [Google Scholar] [CrossRef]
  6. Widodo, A.; Yang, B.S.; Gu, D.S.; Choi, B.K. Intelligent fault diagnosis system of induction motor based on transient current signal. Mechatronics 2009, 19, 680–689. [Google Scholar] [CrossRef]
  7. Isermann, R. Model-based fault-detection and diagnosis—Status and applications. Annu. Rev. Control 2005, 29, 71–85. [Google Scholar] [CrossRef]
  8. Zarei, J.; Tajeddini, M.A.; Karimi, H.R. Vibration analysis for bearing fault detection and classification using an intelligent filter. Mechatronics 2014, 24, 151–157. [Google Scholar] [CrossRef]
  9. Gertler, J. Survey of model-based failure detection and isolation in complex plants. IEEE Control Syst. Mag. 1988, 8, 3–11. [Google Scholar] [CrossRef]
  10. Frank, P. Fault diagnosis in dynamic systems using analytical and knowledge-based redundancy—A survey and some new results. Automatica 1990, 26, 459–474. [Google Scholar] [CrossRef]
  11. Garcia, E.; Frank, P. Deterministic nonlinear observer-based approaches to fault diagnosis: A survey. Control Eng. Pract. 1997, 5, 663–670. [Google Scholar] [CrossRef]
  12. Gao, Z.; Cecati, C.; Ding, S.X. A Survey of Fault Diagnosis and Fault-Tolerant Techniques—Part I: Fault Diagnosis With Model-Based and Signal-Based Approaches. IEEE Trans. Ind. Electron. 2015, 62, 3757–3767. [Google Scholar] [CrossRef]
  13. Kuestenmacher, A.; Plöger, P.G. Model-Based Fault Diagnosis Techniques for Mobile Robots**This work was sponsored by the B-IT foundation and the Strukturfond des Landes Nordrhein-Westfalen for the female PhD students. IFAC-PapersOnLine 2016, 49, 50–56. [Google Scholar] [CrossRef]
  14. Kommuri, S.K.; Defoort, M.; Karimi, H.R.; Veluvolu, K.C. A Robust Observer-Based Sensor Fault-Tolerant Control for PMSM in Electric Vehicles. IEEE Trans. Ind. Electron. 2016, 63, 7671–7681. [Google Scholar] [CrossRef]
  15. Li, L.; Ding, S.X.; Qiu, J.; Yang, Y.; Xu, D. Fuzzy Observer-Based Fault Detection Design Approach for Nonlinear Processes. IEEE Trans. Syst. Man Cybern. Syst. 2017, 47, 1941–1952. [Google Scholar] [CrossRef]
  16. Teti, R.; Jemielniak, K.; O’Donnell, G.; Dornfeld, D. Advanced monitoring of machining operations. CIRP Ann. Manuf. Technol. 2010, 59, 717–739. [Google Scholar] [CrossRef]
  17. Canizo, M.; Onieva, E.; Conde, A.; Charramendieta, S.; Trujillo, S. Real-time predictive maintenance for wind turbines using Big Data frameworks. In Proceedings of the 2017 IEEE International Conference on Prognostics and Health Management (ICPHM), Dallas, TX, USA, 19–21 June 2017; pp. 70–77. [Google Scholar]
  18. Quintana, G.; Ciurana, J. Chatter in machining processes: A review. Int. J. Mach. Tools Manuf. 2011, 51, 363–376. [Google Scholar] [CrossRef]
  19. Bustillo, A.; Correa, M.; Reñones, A. A Virtual Sensor for Online Fault Detection of Multitooth-Tools. Sensors 2011, 11, 2773–2795. [Google Scholar] [CrossRef] [PubMed]
  20. Kumar, A.; Ramkumar, J.; Verma, N.K.; Dixit, S. Detection and classification for faults in drilling process using vibration analysis. In Proceedings of the 2014 International Conference on Prognostics and Health Management, Cheney, WA, USA, 22–25 June 2014; pp. 1–6. [Google Scholar]
  21. Goyal, D.; Pabla, B.S. Condition based maintenance of machine tools—A review. CIRP J. Manuf. Sci. Technol. 2015, 10, 24–35. [Google Scholar] [CrossRef]
  22. Roth, J.T.; Djurdjanovic, D.; Yang, X.; Mears, L.; Kurfess, T. Quality and Inspection of Machining Operations: Tool Condition Monitoring. ASME J. Manuf. Sci. Eng. 2010, 132, 041015. [Google Scholar] [CrossRef]
  23. Pimenov, D.Y.; Bustillo, A.; Mikolajczyk, T. Artificial intelligence for automatic prediction of required surface roughness by monitoring wear on face mill teeth. J. Intell. Manuf. 2018, 29, 1045–1061. [Google Scholar] [CrossRef]
  24. Kuntoğlu, M.; Aslan, A.; Pimenov, D.Y.; Usca, Ü.A.; Salur, E.; Gupta, M.K.; Mikolajczyk, T.; Giasin, K.; Kapłonek, W.; Sharma, S. A Review of Indirect Tool Condition Monitoring Systems and Decision-Making Methods in Turning: Critical Analysis and Trends. Sensors 2021, 21, 108. [Google Scholar] [CrossRef] [PubMed]
  25. Fan, S.-K.S.; Hsu, C.-Y.; Tsai, D.-M.; He, F.; Cheng, C.-C. Data-Driven Approach for Fault Detection and Diagnostic in Semiconductor Manufacturing. IEEE Trans. Autom. Sci. Eng. 2020, 17, 1925–1936. [Google Scholar] [CrossRef]
  26. Luo, B.; Wang, H.; Liu, H.; Li, B.; Peng, F. Early Fault Detection of Machine Tools Based on Deep Learning and Dynamic Identification. IEEE Trans. Ind. Electron. 2019, 66, 509–518. [Google Scholar] [CrossRef]
  27. Zadeh, L.A. Fuzzy sets as a basis for a theory of possibility. Fuzzy Sets Syst. 1978, 1, 3–28. [Google Scholar] [CrossRef]
  28. Zadeh, L.A. Fuzzy Sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef]
  29. Zadeh, L.A. From computing with numbers to computing with words—From manipulation of measure-ments to manipulation of perceptions. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 1999, 45, 105–119. [Google Scholar] [CrossRef]
  30. John, R.; Coupl, S. Type-2 fuzzy logic: A historical view. IEEE Comput. Intell. Mag. 2007, 2, 57–62. [Google Scholar] [CrossRef]
  31. Mendel, J.M. Type-2 Fuzzy Sets as Well as Computing with Words. IEEE Comput. Intell. Mag. 2019, 14, 82–95. [Google Scholar] [CrossRef]
  32. Takagi, T.; Sugeno, M. Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst. Man Cybern. 1985, 15, 116–132. [Google Scholar] [CrossRef]
  33. Nguang, S.K.; Shi, P.; Ding, S. Fault detection for uncertain fuzzy systems: An LMI approach. IEEE Trans. Fuzzy Syst. 2007, 15, 1251–1262. [Google Scholar] [CrossRef]
  34. Barnes, M.R. Neuro-Fuzzy Clustering of Radiographictibia Image Data Using Type-2 Fuzzy Sets. Inf. Sci. 2000, 125, 65–82. [Google Scholar]
  35. Mendel, J.M. Uncertain Rule-Based Fuzzy Logic Systems: Introduction and New Directions; Prentice Hall PTR: Upper Saddle River, NJ, USA, 2001. [Google Scholar]
  36. Liang, Q.; Mendel, J.M. Interval Type-2 Fuzzy Logic Systems: Theory and Design. IEEE Trans. Fuzzy Syst. 2002, 8, 535–550. [Google Scholar] [CrossRef]
  37. Sepúlveda, R.; Castillo, O.; Melin, P.; Rodríguez-Díaz, A.; Montiel, O. Experimental Study of Intelligent Controllers Under Uncertainty using Type-1 and Type-2 Fuzzy Logic. Inf. Sci. 2007, 177, 2023–2048. [Google Scholar] [CrossRef]
  38. Lam, H.K.; Li, H.; Deters, C.; Wuerdemann, H.A.; Secco, E.; Althoefer, K. Control design for interval type-2 fuzzy systems under imperfect premise matching. IEEE Trans. Ind. Electron. 2014, 61, 956–968. [Google Scholar] [CrossRef]
  39. Román-Flores, H.; Chalco-Cano, Y.; Figueroa-García, J.C. A note on defuzzification of type-2 fuzzy intervals. Fuzzy Sets Syst. 2020, 399, 133–145. [Google Scholar] [CrossRef]
  40. Biglarbegian, M.; Mendel, J.M. On the Justification to Use a Novel Simplified Interval Type-2 Fuzzy Logic System. J. Intell. Fuzzy Syst. 2015, 28, 1071–1079. [Google Scholar] [CrossRef]
  41. Castillo, O.; Melin, P. A review on interval type-2 fuzzy logic applications in intelligent control. Inf. Sci. 2014, 279, 615–631. [Google Scholar] [CrossRef]
  42. Paul, S.; Morales-Menendez, R. Active Control of Chatter in Milling Process Using Intelligent PD/PID Control. IEEE Access 2018, 6, 72698–72713. [Google Scholar] [CrossRef]
  43. Paul, S.; Lofstrand, M. Intelligent Fault Detection Scheme for Drilling Process. In Proceedings of the 2019 7th International Conference on Control, Mechatronics and Automation (ICCMA), Delft, The Netherlands, 6–8 November 2019; pp. 347–351. [Google Scholar]
  44. Li, H.; Gao, Y.; Shi, P.; Lam, H. Observer-Based Fault Detection for Nonlinear Systems With Sensor Fault and Limited Communication Capacity. IEEE Trans. Autom. Control 2016, 61, 2745–2751. [Google Scholar] [CrossRef]
  45. Montazeri-Gh, M.; Yazdani, S. Application of interval type-2 fuzzy logic systems to gas turbine fault diagnosis. Appl. Soft Comput. 2020, 96, 106703. [Google Scholar] [CrossRef]
  46. Maged, A.; Xie, M. Uncertainty utilization in fault detection using Bayesian deep learning. J. Manuf. Syst. 2022, 64, 316–329. [Google Scholar] [CrossRef]
  47. Jalayer, M.; Orsenigo, C.; Vercellis, C. Fault detection and diagnosis for rotating machinery: A model based on convolutional LSTM, Fast Fourier and continuous wavelet transforms. Comput. Ind. 2021, 125, 103378. [Google Scholar] [CrossRef]
  48. Ahmadi, K.; Altintas, Y. Stability of lateral, torsional and axial vibrations in drilling. Int. J. Mach. Tools Manuf. 2013, 68, 63–74. [Google Scholar] [CrossRef]
  49. Eynian, M.; Altintas, Y. Chatter stability of general turning operations with process damping. J. Manuf. Sci. Eng. 2009, 131, 1005–1010. [Google Scholar] [CrossRef]
  50. Altintas, Y. Manufacturing Automation: Metal Cutting Mechanics, Machine Tool Vibrations, and CNC Design; Cambridge University Press: New York, NY, USA, 2011. [Google Scholar]
  51. Karnik, N.-N.; Mendel, J.-M. An Introduction to Type-2 Fuzzy Logic Systems; USC Report; 1998; Available online: http://sipi.usc.edu/~mendel/report (accessed on 14 October 2021).
  52. Lin, T.C.; Liu, H.L.; Kuo, M.J. Direct Adaptive Interval Type-2 Fuzzy Control of Multivariable Nonlinear Systems. Eng. Appl. Artif. Intell. 2009, 22, 420–430. [Google Scholar] [CrossRef]
  53. Lam, H.K.; Seneviratne, L.D. Stability analysis of interval type-2 fuzzy-model-based control systems. IEEE Trans. Syst. Man Cybern. B Cybern. 2008, 38, 617–628. [Google Scholar] [CrossRef]
  54. Thumati, B.T.; Jagannathan, S. A Model-Based Fault-Detection and Prediction Scheme for Nonlinear Multivariable Discrete-Time Systems With Asymptotic Stability Guarantees. IEEE Trans. Neural Netw. 2010, 21, 404–423. [Google Scholar] [CrossRef]
  55. Zheng, Y.; Fang, H.; Wang, H.O. Takagi-sugeno fuzzy-model-based fault detection for networked control systems with Markov delays. IEEE Trans. Syst. Man Cybern. Part B Cybern. 2006, 36, 924–929. [Google Scholar] [CrossRef]
  56. Moradi, H.; Bakhtiari-Nejad, F.; Movahhedy, M.R.; Vossoughi, G. Stability improvement and regenerative chatter suppression in nonlinear milling process via tunable vibration absorber. J. Sound Vibrat. 2012, 331, 4668–4690. [Google Scholar] [CrossRef]
  57. Taskin, A.; Kumbasar, T. An Open Source Matlab/Simulink Toolbox for Interval Type-2 Fuzzy Logic Systems. In Proceedings of the 2015 IEEE Symposium Series on Computational Intelligence, Cape Town, South Africa, 7–10 December 2015. [Google Scholar]
  58. Wu, D.; Nie, M. Comparison and practical implementation of type reduction algorithms for type-2 fuzzy sets and systems. In Proceedings of the 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011), Taipei, Taiwan, 27–30 June 2011. [Google Scholar]
  59. Wu, D.; Mendel, J.M. Enhanced Karnik-Mendel algorithms. IEEE Trans. Fuzzy Syst. 2009, 17, 923–934. [Google Scholar]
  60. Wu, D. Approaches for reducing the computational cost of interval type-2 fuzzy logic systems: Overview and comparisons. IEEE Trans. Fuzzy Syst. 2013, 21, 80–99. [Google Scholar]
  61. Wu, D. On the Fundamental Differences between Type-1 and Interval Type-2 Fuzzy Logic Controllers. IEEE Trans. Fuzzy Syst. 2012, 10, 832–848. [Google Scholar] [CrossRef]
Figure 1. Three modes of vibration (4 DOF) in drilling tools.
Figure 1. Three modes of vibration (4 DOF) in drilling tools.
Algorithms 15 00284 g001
Figure 2. Block diagram of drilling simulation without fault.
Figure 2. Block diagram of drilling simulation without fault.
Algorithms 15 00284 g002
Figure 3. Block diagram of drilling simulation with induced fault.
Figure 3. Block diagram of drilling simulation with induced fault.
Algorithms 15 00284 g003
Figure 4. x-axis representation of cutting force.
Figure 4. x-axis representation of cutting force.
Algorithms 15 00284 g004
Figure 5. y-axis representation of cutting force.
Figure 5. y-axis representation of cutting force.
Algorithms 15 00284 g005
Figure 6. Drilling Tool vibration along the x-direction.
Figure 6. Drilling Tool vibration along the x-direction.
Algorithms 15 00284 g006
Figure 7. Drill Tool vibration along the y-direction.
Figure 7. Drill Tool vibration along the y-direction.
Algorithms 15 00284 g007
Figure 8. Drilling Tool vibration along the x-direction with the induced fault.
Figure 8. Drilling Tool vibration along the x-direction with the induced fault.
Algorithms 15 00284 g008
Figure 9. Drilling Tool vibration along the y-direction with induced fault.
Figure 9. Drilling Tool vibration along the y-direction with induced fault.
Algorithms 15 00284 g009
Figure 10. Fault detection scheme along the x-axis.
Figure 10. Fault detection scheme along the x-axis.
Algorithms 15 00284 g010
Figure 11. Fault detection scheme along the y-axis.
Figure 11. Fault detection scheme along the y-axis.
Algorithms 15 00284 g011
Table 1. Parameters.
Table 1. Parameters.
ParameterValueUnits
m x x 27kg
m z z 172kg
m θ θ 0.13 kgm2
k y y 1.3 × 10 6 N/m
k z θ 1.2 × 10 12 N/rad
c x x 2500Ns/m
c z z 5000Ns/m
c θ θ 5000Nms/rad
m y y 28.7 kg
m z θ 2.6 kgm
k x x 1.4 × 10 6 N/m
k z z 7.69 × 10 8 N/m
k θ θ 5.79 × 10 9 Nm/rad
c y y 2500Ns/m
c z θ 5000Ns/rad
ψ 200rad/s
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Paul, S.; Turnbull, R.; Khodadad, D.; Löfstrand, M. A Vibration Based Automatic Fault Detection Scheme for Drilling Process Using Type-2 Fuzzy Logic. Algorithms 2022, 15, 284. https://doi.org/10.3390/a15080284

AMA Style

Paul S, Turnbull R, Khodadad D, Löfstrand M. A Vibration Based Automatic Fault Detection Scheme for Drilling Process Using Type-2 Fuzzy Logic. Algorithms. 2022; 15(8):284. https://doi.org/10.3390/a15080284

Chicago/Turabian Style

Paul, Satyam, Rob Turnbull, Davood Khodadad, and Magnus Löfstrand. 2022. "A Vibration Based Automatic Fault Detection Scheme for Drilling Process Using Type-2 Fuzzy Logic" Algorithms 15, no. 8: 284. https://doi.org/10.3390/a15080284

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop