Browsing by Keyword "Anomaly detection"
Now showing 1 - 3 of 3
Results Per Page
Sort Options
Item Implementation of a Large-Scale Platform for Cyber-Physical System Real-Time Monitoring(2019) Canizo, Mikel; Conde, Angel; Charramendieta, Santiago; Minon, Raul; Cid-Fuentes, Raul G.; Onieva, Enrique; HPAThe emergence of Industry 4.0 and the Internet of Things (IoT) has meant that the manufacturing industry has evolved from embedded systems to cyber-physical systems (CPSs). This transformation has provided manufacturers with the ability to measure the performance of industrial equipment by means of data gathered from on-board sensors. This allows the status of industrial systems to be monitored and can detect anomalies. However, the increased amount of measured data has prompted many companies to investigate innovative ways to manage these volumes of data. In recent years, cloud computing and big data technologies have emerged among the scientific communities as key enabling technologies to address the current needs of CPSs. This paper presents a large-scale platform for CPS real-time monitoring based on big data technologies, which aims to perform real-time analysis that targets the monitoring of industrial machines in a real work environment. This paper is validated by implementing the proposed solution on a real industrial use case that includes several industrial press machines. The formal experiments in a real scenario are conducted to demonstrate the effectiveness of this solution and also its adequacy and scalability for future demand requirements. As a result of the implantation of this solution, the overall equipment effectiveness has been improved.Item A novel approach for the detection of anomalous energy consumption patterns in industrial cyber-physical systems(2024-02) Mendia, Izaskun; Gil-Lopez, Sergio; Grau, Iñaki; Del Ser, Javier; Gil‐Lopez, Sergio; Tecnalia Research & Innovation; IAMost scenarios emerging from the Industry 4.0 paradigm rely on the concept of cyber-physical production systems (CPPS), which allow them to synergistically connect physical to digital setups so as to integrate them over all stages of product development. Unfortunately, endowing CPPS with AI-based functionalities poses its own challenges: although advances in the performance of AI models keep blossoming in the community, their penetration in real-world industrial solutions has not so far developed at the same pace. Currently, 90% of AI-based models never reach production due to a manifold of assorted reasons not only related to complexity and performance: decisions issued by AI-based systems must be explained, understood and trusted by their end users. This study elaborates on a novel tool designed to characterize, in a non-supervised, human-understandable fashion, the nominal performance of a factory in terms of production and energy consumption. The traceability and analysis of energy consumption data traces and the monitoring of the factory's production permit to detect anomalies and inefficiencies in the working regime of the overall factory. By virtue of the transparency of the detection process, the proposed approach elicits understandable information about the root cause from the perspective of the production line, process and/or machine that generates the identified inefficiency. This methodology allows for the identification of the machines and/or processes that cause energy inefficiencies in the manufacturing system, and enables significant energy consumption savings by acting on these elements. We assess the performance of our designed method over a real-world case study from the automotive sector, comparing it to an extensive benchmark comprising state-of-the-art unsupervised and semi-supervised anomaly detection algorithms, from classical algorithms to modern generative neural counterparts. The superior quantitative results attained by our proposal complements its better interpretability with respect to the rest of algorithms in the comparison, which emphasizes the utmost relevance of considering the available domain knowledge and the target audience when design AI-based industrial solutions of practical value. Finally, the work described in this paper has been successfully deployed on a large scale in several industrial factories with significant international projection.Item Optimization and Prediction Techniques for Self-Healing and Self-Learning Applications in a Trustworthy Cloud Continuum(2021-07-30) Alonso, Juncal; Orue-Echevarria, Leire; Osaba, Eneko; López Lobo, Jesús; Martinez, Iñigo; Diaz de Arcaya, Josu; Etxaniz, Iñaki; Tecnalia Research & Innovation; HPA; Quantum; IAThe current IT market is more and more dominated by the “cloud continuum”. In the “traditional” cloud, computing resources are typically homogeneous in order to facilitate economies of scale. In contrast, in edge computing, computational resources are widely diverse, commonly with scarce capacities and must be managed very efficiently due to battery constraints or other limitations. A combination of resources and services at the edge (edge computing), in the core (cloud computing), and along the data path (fog computing) is needed through a trusted cloud continuum. This requires novel solutions for the creation, optimization, management, and automatic operation of such infrastructure through new approaches such as infrastructure as code (IaC). In this paper, we analyze how artificial intelligence (AI)-based techniques and tools can enhance the operation of complex applications to support the broad and multi-stage heterogeneity of the infrastructural layer in the “computing continuum” through the enhancement of IaC optimization, IaC self-learning, and IaC self-healing. To this extent, the presented work proposes a set of tools, methods, and techniques for applications’ operators to seamlessly select, combine, configure, and adapt computation resources all along the data path and support the complete service lifecycle covering: (1) optimized distributed application deployment over heterogeneous computing resources; (2) monitoring of execution platforms in real time including continuous control and trust of the infrastructural services; (3) application deployment and adaptation while optimizing the execution; and (4) application self-recovery to avoid compromising situations that may lead to an unexpected failure.