Hostname: page-component-848d4c4894-4rdrl Total loading time: 0 Render date: 2024-07-01T08:01:55.926Z Has data issue: false hasContentIssue false

Usage Identification of Anomaly Detection in an Industrial Context

Published online by Cambridge University Press:  26 July 2019

Firas Zoghlami*
Affiliation:
University of Applied Sciences Munich;
Philip Kurrek
Affiliation:
University of Applied Sciences Munich;
Mark Jocas
Affiliation:
University of Applied Sciences Munich;
Giovanni Masala
Affiliation:
University of Plymouth
Vahid Salehi
Affiliation:
University of Applied Sciences Munich;
*
Contact: Zoghlami, Firas, Hochschule München, Hochschule München, Germany, [email protected]

Abstract

Core share and HTML view are not available for this content. However, as you have access to this content, a full PDF is available via the ‘Save PDF’ action button.

The use of flexible and autonomous robotics systems is the solution for the automation task of the production and intra-logistics environments. This dynamic context requires the robot to be aware of its surroundings through the whole task, also after accomplishing the gripping action. We present an anomaly detection approach based on unsupervised learning and reconstruction fidelity of image data. We design our method to enhance the dynamic environment perception of robotics systems and apply it in a palletizing robot, in order to perceive and detect changes to its surrounding and process after the gripping step. Our proposed approach achieves the performance targeted by the considered industrial requirements.

Type
Article
Creative Commons
Creative Common License - CCCreative Common License - BYCreative Common License - NCCreative Common License - ND
This is an Open Access article, distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives licence (http://creativecommons.org/licenses/by-nc-nd/4.0/), which permits non-commercial re-use, distribution, and reproduction in any medium, provided the original work is unaltered and is properly cited. The written permission of Cambridge University Press must be obtained for commercial re-use or in order to create a derivative work.
Copyright
© The Author(s) 2019

References

Bose, B., Dutta, J., Ghosh, S., Pramanick, P., and Roy, S. (2018). “D&RSense: Detection of Driving Patterns and Road Anomalies”. 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU), Bhimtal, India, 2018, pp. 17. https://doi.org/10.1109/IoT-SIU.2018.8519861.Google Scholar
Bouindour, S., Hittawe, M.M., Mahfouz, S.; Snoussi, H. (2017), “Abnormal Event Detection Using Convolutional Neural Networks and 1-Class SVM classifier”, IET Conference Proceedings, 2017, pp. 16. https://doi.org/10.1049/ic.2017.0040.Google Scholar
Chalapathy, R., Menon, A.K., and Chawla, S. (2018), “Anomaly Detection using One-Class Neural Networks”, CoRR, abs/1802.06360.Google Scholar
Chandola, V., Banerjee, A. and Kumar, V. (2019), “Anomaly detection: A survey”, ACM Comput. Surv. Vol. 41 No. 3, Article 15. 2009. http://dx.doi.org/10.1145/1541880.1541882.Google Scholar
Echelmeyer, W., Kirchheim, A. and Wellbrock, E. (2008), “Robotics-logistics: Challenges for automation of logistic processes”, IEEE International Conference on Automation and Logistics. https://doi.org/10.1109/ical.2008.4636510.Google Scholar
Goodfellow, I. J., Pouget-Abadie, I., Mirza, M., Xu, B., Warde-Farley, D., Ozair, I., Courville, A., Bengio, Y. (2014). “Generative Adversarial Networks”, Advances in Neural Information Processing Systems 27. arXiv:1406.2661.Google Scholar
Gutoski, M., Ribeiro, M., Aquino, N. M. R., Lazzaretti, A. E., and Lopes, H. S. (2017). “A clustering-based deep autoencoder for one-class image classification”. 2017 IEEE Latin American Conference on Computational Intelligence (LA-CCI), Arequipa, 2017, pp. 16. https://doi.org/10.1109/LA-CCI.2017.8285680.Google Scholar
Han, N., Gao, S., Li, J., Zhang, X. and Guo, J. (2018). “Anomaly Detection in Health Data Based on Deep Learning”. 2018 International Conference on Network Infrastructure and Digital Content (IC-NIDC), Guiyang, China, 2018, pp. 188192. https://doi.org/10.1109/ICNIDC.2018.8525737.Google Scholar
Jun, I., Yoriyuki, Y., Yuqi, C., Christopher, P. M. and Jun, S. (2017). “Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning”. 2017 IEEE International Conference on Data Mining Workshops (ICDMW). http://dx.doi.org/10.1109/icdmw.2017.149.Google Scholar
Ke, M., Lin, C., and Huang, Q. (2017), “Anomaly detection of Logo images in the mobile phone using convolutional autoencoder”, 4th International Conference on Systems and Informatics (ICSAI). http://dx.doi.org/10.1109/icsai.2017.8248461.Google Scholar
Kim, S. H., Kim, H. and Kim, J. (2018). “GAN-Based One-Class Classification for Personalized Image Retrieval”. 2018 IEEE International Conference on Big Data and Smart Computing (BigComp), Shanghai, 2018, pp. 771774. https://doi.org/10.1109/BigComp.2018.00147.Google Scholar
Lile, C. and Yiqun, L. (2017). “Anomaly detection in thermal images using deep neural networks”. 2017 IEEE International Conference on Image Processing (ICIP), Beijing, 2017, pp. 22992303. https://doi.org/10.1109/ICIP.2017.8296692.Google Scholar
Masci, J., Meier, U., Ciresan, D. and Schmidhuber, J. (2011), “Stacked Convolutional Auto-Encoders for Hierarchical Feature Extraction. Artificial Neural Networks and Machine Learning”, ICANN 2011, pp. 5259. http://dx.doi.org/10.1007/978-3-642-21735-7_7.Google Scholar
Pimentel, M. A. F., David, A., Clifton, L. and Tarassenko, L. (2014), “A review of novelty detection”, Signal Process. Vol. 99. pp. 215249. 2014. http://dx.doi.org/10.1016/j.sigpro.2013.12.026.Google Scholar
Romero-Cano, V., Vignard, N., and Laugier, C. (2017). “XDvision: Dense outdoor perception for autonomous vehicles”. 2017 IEEE Intelligent Vehicles Symposium (IV). http://dx.doi.org/10.1109/ivs.2017.7995807.Google Scholar
Saloky, T and Seminsky, J. (2005). “Artificial Intelligence and Machine Learning”.Google Scholar
Schleg, T., Seeboek, P., Waldstein, S. M., Schmidt-Erfurth, U., and Langs, G. (2017), “Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery”, Information Processing in Medical Imaging, pp. 146157. http://dx.doi.org/10.1007/978-3-319-59050-9_12.Google Scholar
Shi, J., He, G. and Liu, X. (2018). “Anomaly Detection for Key Performance Indicators Through Machine Learning”. 2018 International Conference on Network Infrastructure and Digital Content (IC-NIDC), Guiyang, China, 2018, pp. 15. https://doi.org/10.1109/ICNIDC.2018.8525714.Google Scholar
Stoyanov, T., Vaskeviciusz, N., Mueller, C. A., Fromm, T., Krug, R., Tincani, V., Mojtahedzadeh, R., Kunaschk, S., Ernits, R. M., Canelhas, D. R., Bonilla, M., Schwertfeger, S., Bonini, M., Halfar, H., Pathak, K., Rohde, M., Fantoni, G., Bicchi, A., Birk, A., Lilienthal, A. and Echelmeyer, W. (2016, “No More Heavy Lifting: Robotic Solutions to the Container Unloading Problem”, IEEE Robotics & Automation Magazine, Vol. 23 No. 4, pp. 94106. http://dx.doi.org/10.1109/mra.2016.2535098.Google Scholar
Steder, B. (2013), “Feature-Based 3D Perception for Mobile Robots. Albert-Ludwigs-University of Freiburg”, Department of Computer Science.Google Scholar
Uriarte, C., Thamer, H., Freitag, M. and Thoben, K.D. (2016), “Flexible automation of logistics processes by means of modular robotic and material flow systems”. https://doi.org/10.2195/lj_Proc_uriarte_de_201605_01.Google Scholar
Zenati, H., Foo, C. S., Lecouat, B., Manek, G., Chandrasekhar, V. R. (2018), “Efficient GAN-Based Anomaly Detection”, CoRR. abs/1802.06222.Google Scholar