DeepAI AI Chat
Log In Sign Up

An Evaluation of Methods for Real-Time Anomaly Detection using Force Measurements from the Turning Process

by   Yuanzhi Huang, et al.

We examined the use of three conventional anomaly detection methods and assess their potential for on-line tool wear monitoring. Through efficient data processing and transformation of the algorithm proposed here, in a real-time environment, these methods were tested for fast evaluation of cutting tools on CNC machines. The three-dimensional force data streams we used were extracted from a turning experiment of 21 runs for which a tool was run until it generally satisfied an end-of-life criterion. Our real-time anomaly detection algorithm was scored and optimised according to how precisely it can predict the progressive wear of the tool flank. Most of our tool wear predictions were accurate and reliable as illustrated in our off-line simulation results. Particularly when the multivariate analysis was applied, the algorithm we develop was found to be very robust across different scenarios and against parameter changes. It shall be reasonably easy to apply our approach elsewhere for real-time tool wear analytics.


page 9

page 11

page 12


Real-time Anomaly Detection for Multivariate Data Streams

We present a real-time multivariate anomaly detection algorithm for data...

Real-Time Outlier Detection with Dynamic Process Limits

Anomaly detection methods are part of the systems where rare events may ...

On the Runtime-Efficacy Trade-off of Anomaly Detection Techniques for Real-Time Streaming Data

Ever growing volume and velocity of data coupled with decreasing attenti...

Distributed Online Anomaly Detection for Virtualized Network Slicing Environment

As the network slicing is one of the critical enablers in communication ...

Exploration Of The Dendritic Cell Algorithm Using The Duration Calculus

As one of the newest members in Artificial Immune Systems (AIS), the Den...

Sequential Anomaly Detection using Inverse Reinforcement Learning

One of the most interesting application scenarios in anomaly detection i...