An Evaluation of Methods for Real-Time Anomaly Detection using Force Measurements from the Turning Process

We examined the use of three conventional anomaly detection methods and assess their potential for on-line tool wear monitoring. Through efficient data processing and transformation of the algorithm proposed here, in a real-time environment, these methods were tested for fast evaluation of cutting tools on CNC machines. The three-dimensional force data streams we used were extracted from a turning experiment of 21 runs for which a tool was run until it generally satisfied an end-of-life criterion. Our real-time anomaly detection algorithm was scored and optimised according to how precisely it can predict the progressive wear of the tool flank. Most of our tool wear predictions were accurate and reliable as illustrated in our off-line simulation results. Particularly when the multivariate analysis was applied, the algorithm we develop was found to be very robust across different scenarios and against parameter changes. It shall be reasonably easy to apply our approach elsewhere for real-time tool wear analytics.

[1]  E. Ahearne,et al.  An investigation of force components in orthogonal cutting of medical grade cobalt–chromium alloy (ASTM F1537) , 2017, Proceedings of the Institution of Mechanical Engineers. Part H, Journal of engineering in medicine.

[2]  Lovekesh Vig,et al.  Long Short Term Memory Networks for Anomaly Detection in Time Series , 2015, ESANN.

[3]  Hans-Peter Kriegel,et al.  A survey on unsupervised outlier detection in high‐dimensional numerical data , 2012, Stat. Anal. Data Min..

[4]  Subutai Ahmad,et al.  Unsupervised real-time anomaly detection for streaming data , 2017, Neurocomputing.

[5]  B. Rosner Percentage Points for a Generalized ESD Many-Outlier Procedure , 1983 .

[6]  M. Stephens EDF Statistics for Goodness of Fit and Some Comparisons , 1974 .

[7]  Subutai Ahmad,et al.  Evaluating Real-Time Anomaly Detection Algorithms -- The Numenta Anomaly Benchmark , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).

[8]  Jongwon Kim,et al.  Real-Time Tool Breakage Monitoring for NC Milling Process , 1995 .

[9]  Douglas C. Montgomery,et al.  Introduction to Statistical Quality Control , 1986 .

[10]  Moneer Helu,et al.  Towards a generalized energy prediction model for machine tools. , 2017, Journal of manufacturing science and engineering.

[11]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[12]  W. J. Dixon,et al.  Processing Data for Outliers , 1953 .

[13]  Sung-Hoon Ahn,et al.  Condition monitoring and fault detection of wind turbines and related algorithms: A review , 2009 .

[14]  G. Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[15]  R. Dennis Cook,et al.  Detection of Influential Observation in Linear Regression , 2000, Technometrics.

[16]  Kwang-Ho Ro,et al.  Outlier detection for high-dimensional data , 2015 .

[17]  Jin Zhang Powerful goodness‐of‐fit tests based on the likelihood ratio , 2002 .

[18]  B. Silverman,et al.  Algorithm AS 176: Kernel Density Estimation Using the Fast Fourier Transform , 1982 .

[19]  Douglas C. Montgomery,et al.  An Overview of Six Sigma , 2008 .

[20]  Damien McParland,et al.  Prediction of tool-wear in turning of medical grade cobalt chromium molybdenum alloy (ASTM F75) using non-parametric Bayesian models , 2016, J. Intell. Manuf..

[21]  Adrian E. Raftery,et al.  Prediction under Model Uncertainty Via Dynamic Model Averaging : Application to a Cold Rolling Mill 1 , 2008 .

[22]  John D. Kelleher,et al.  Fundamentals of Machine Learning for Predictive Data Analytics: Algorithms, Worked Examples, and Case Studies , 2015 .

[23]  Hans-Peter Kriegel,et al.  Local outlier detection reconsidered: a generalized view on locality with applications to spatial, video, and network outlier detection , 2012, Data Mining and Knowledge Discovery.

[24]  Roger M. Sauter,et al.  Introduction to Statistical Quality Control (2nd ed.) , 1992 .

[25]  H. Leon Harter,et al.  Tables of Range and Studentized Range , 1960 .

[26]  J. E. Jackson,et al.  Control Procedures for Residuals Associated With Principal Component Analysis , 1979 .

[27]  Romero-Troncoso René de Jesús,et al.  Driver current analysis for sensorless tool breakage monitoring of CNC milling machines , 2003 .

[28]  Ibrahim N. Tansel,et al.  Micro-end-milling—III. Wear estimation and tool breakage detection using acoustic emission signals , 1998 .

[29]  Brigid Mullany,et al.  High Performance Cutting (HPC) in the New Era of Digital Manufacturing – A Roadmap , 2016 .

[30]  Douglas M. Hawkins,et al.  The Detection of Errors in Multivariate Data Using Principal Components , 1974 .

[31]  H. Shao,et al.  A cutting power model for tool wear monitoring in milling , 2004 .

[32]  Tengyao Wang,et al.  High dimensional change point estimation via sparse projection , 2016, 1606.06246.

[33]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[34]  Martin Meckesheimer,et al.  Automatic outlier detection for time series: an application to sensor data , 2007, Knowledge and Information Systems.

[35]  Yusuf Altintas,et al.  In-Process Detection of Tool Failure in Milling Using Cutting Force Models , 1989 .

[36]  Adam G. Rehorn,et al.  State-of-the-art methods and results in tool condition monitoring: a review , 2005 .

[37]  Hongxing He,et al.  Outlier Detection Using Replicator Neural Networks , 2002, DaWaK.

[38]  L. Scrucca,et al.  qcc: An R package for quality control charting and statistical process control , 2004 .

[39]  Lon-Mu Liu,et al.  Joint Estimation of Model Parameters and Outlier Effects in Time Series , 1993 .

[40]  Leonard J. Tashman,et al.  Out-of-sample tests of forecasting accuracy: an analysis and review , 2000 .

[41]  Arun Kejariwal,et al.  A Novel Technique for Long-Term Anomaly Detection in the Cloud , 2014, HotCloud.

[42]  Kien A. Hua,et al.  Decision tree classifier for network intrusion detection with GA-based feature selection , 2005, ACM Southeast Regional Conference.

[43]  Jin Jiang,et al.  Erratum to: State-of-the-art methods and results in tool condition monitoring: a review , 2005 .

[44]  Keith Worden,et al.  DAMAGE DETECTION USING OUTLIER ANALYSIS , 2000 .

[45]  Jon Rigelsford,et al.  Manufacturing Automation: Metal Cutting Mechanics, Machine Tool Vibrations, and CNC Design , 2004 .

[46]  Jacob Anhøj,et al.  qicharts2: Quality Improvement Charts for R , 2018, J. Open Source Softw..

[47]  Hans-Peter Kriegel,et al.  LOF: identifying density-based local outliers , 2000, SIGMOD '00.

[48]  Qiang Chen,et al.  An anomaly detection technique based on a chi‐square statistic for detecting intrusions into information systems , 2001 .

[49]  Xue-wen Chen,et al.  Big Data Deep Learning: Challenges and Perspectives , 2014, IEEE Access.

[50]  Arun Kejariwal,et al.  Automatic Anomaly Detection in the Cloud Via Statistical Learning , 2017, ArXiv.

[51]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[52]  Charu C. Aggarwal,et al.  Outlier Detection for Temporal Data: A Survey , 2014, IEEE Transactions on Knowledge and Data Engineering.

[53]  Hervé Debar,et al.  An application of a recurrent network to an intrusion detection system , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.