ABSTRACT
The current maintenance of aerospace equipment generally uses regular maintenance, scheduled maintenance, seasonal maintenance, after-the-fact maintenance, and replacement maintenance. These methods are ill-timed, time-consuming, and wasteful of materials. Monitoring the reliability and healthy operating status of each embedded computer electronic component is essential, and maintenance staff will benefit greatly from a data-driven approach to anomaly detection. It can be altered from "repair afterward" to "repair as necessary" and from " repair regularly" to "repair at any time" to solve the practical problems arising from maintenance. The Variational Autoencoder (VAE), which is based on the component storage aging acceleration data, is used in this paper to model the component's normal operating status and perform anomaly detection. The precision and recall of this anomaly detection method are 0.950 and 0.977. This method evaluates the operating status and reliability of each component, improves the reliability and service life of the computer, and establishes the technological framework for the next generation of computer Prognostics and Health Management (PHM) systems.
- CHAI Bo. 2018.“Full life cycle reliability design assurance technology for military embedded computer” Beijing: China Aerospace publishing house.Google Scholar
- Maxion, R.A., and K.M.C. Tan. 2002. “Anomaly Detection in Embedded Systems.” IEEE Transactions on Computers 51 (2): 108–20. https://doi.org/10.1109/12.980003.Google ScholarDigital Library
- Zhang, Ying, and Krishnendu Chakrabarty. 2003. “Fault Recovery Based on Checkpointing for Hard Real-Time Embedded Systems.” In Proceedings 18th IEEE Symposium on Defect and Fault Tolerance in VLSI Systems, 320–27. https://doi.org/10.1109/DFTVS.2003.1250127.Google ScholarCross Ref
- Peti, P., R. Obermaisser, and H. Kopetz. 2005. “Out-of-Norm Assertions [Diagnostic Mechanism].” In 11th IEEE Real Time and Embedded Technology and Applications Symposium, 280–91. https://doi.org/10.1109/RTAS.2005.38.Google ScholarDigital Library
- Zandrahimi, Mahroo, Alireza Zarei, and Hamid R. Zarandi. 2010. “A Probabilistic Method to Detect Anomalies in Embedded Systems.” In 2010 IEEE 25th International Symposium on Defect and Fault Tolerance in VLSI Systems, 152–59. https://doi.org/10.1109/DFT.2010.25.Google ScholarDigital Library
- Mojarad, Roghayeh, Hossain Kordestani, and Hamid R. Zarandi. 2016. “A Cluster-Based Method to Detect and Correct Anomalies in Sensor Data of Embedded Systems.” In 2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP), 240–47. https://doi.org/10.1109/PDP.2016.104.Google ScholarCross Ref
- Mojarad, Roghayeh, and Hamid R. Zarandi. 2015. “Two Effective Anomaly Correction Methods in Embedded Systems.” In 2015 CSI Symposium on Real-Time and Embedded Systems and Technologies (RTEST), 1–6. https://doi.org/10.1109/RTEST.2015.7369849.Google ScholarCross Ref
- Mojarad, Roghayeh, and Hamid R. Zarandi. 2017. “Comparison and Analysis of Three Anomaly Correction Methods in Embedded Systems.” Scientia Iranica 24 (6): 3087–3100. https://doi.org/10.24200/sci.2017.4579.Google ScholarCross Ref
- Wang, Yun, Bo Jing, Yifeng Huang, Xiaoxuan Jiao, Shenglong Wang, and Qinglin Liu. 2019. “Research of Equipment Fault Diagnosis Based on PHM High Performance Computing Platform.” In 2019 Prognostics and System Health Management Conference (PHM-Qingdao), 1–6. https://doi.org/10.1109/PHM-Qingdao46334.2019.8942892.Google ScholarCross Ref
- Sandborn, P. 2005. “A Decision Support Model for Determining the Applicability of Prognostic Health Management (PHM) Approaches to Electronic Systems.” In Annual Reliability and Maintainability Symposium, 2005. Proceedings., 422–27. https://doi.org/10.1109/RAMS.2005.1408399.Google ScholarCross Ref
- Lall, Pradeep, Madhura Hande, Chandan Bhat, and Jay Lee. 2011. “Prognostics Health Monitoring (PHM) for Prior Damage Assessment in Electronics Equipment Under Thermo-Mechanical Loads.” IEEE Transactions on Components, Packaging and Manufacturing Technology 1 (11): 1774–89. https://doi.org/10.1109/TCPMT.2011.2160542.Google ScholarCross Ref
- Kingma, Diederik P., and Max Welling. 2014. “Auto-Encoding Variational Bayes.” arXiv. https://doi.org/10.48550/arXiv.1312.6114.Google ScholarCross Ref
- Xu, Haowen, Wenxiao Chen, Nengwen Zhao, Zeyan Li, Jiahao Bu, Zhihan Li, Ying Liu, 2018. “Unsupervised Anomaly Detection via Variational Auto-Encoder for Seasonal KPIs in Web Applications.” In Proceedings of the 2018 World Wide Web Conference, 187–96. WWW ’18. Republic and Canton of Geneva, CHE: International World Wide Web Conferences Steering Committee. https://doi.org/10.1145/3178876.3185996.Google ScholarDigital Library
- Chen, Wenxiao, Haowen Xu, Zeyan Li, Dan Pei, Jie Chen, Honglin Qiao, Yang Feng, and Zhaogang Wang. 2019. “Unsupervised Anomaly Detection for Intricate KPIs via Adversarial Training of VAE.” In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, 1891–99. https://doi.org/10.1109/INFOCOM.2019.8737430.Google ScholarDigital Library
- Kawachi, Yuta, Yuma Koizumi, and Noboru Harada. 2018. “Complementary Set Variational Autoencoder for Supervised Anomaly Detection.” In 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2366–70. https://doi.org/10.1109/ICASSP.2018.8462181.Google ScholarDigital Library
- Lin, Shuyu, Ronald Clark, Robert Birke, Sandro Schönborn, Niki Trigoni, and Stephen Roberts. 2020. “Anomaly Detection for Time Series Using VAE-LSTM Hybrid Model.” In ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 4322–26. https://doi.org/10.1109/ICASSP40776.2020.9053558.Google ScholarCross Ref
- Akbari, Mohammad, and Jie Liang. 2018. “Semi-Recurrent CNN-Based VAE-GAN for Sequential Data Generation,” June. https://doi.org/10.48550/arXiv.1806.00509.Google ScholarCross Ref
- Liu, Yunxiao, Youfang Lin, QinFeng Xiao, Ganghui Hu, and Jing Wang. 2021. “Self-Adversarial Variational Autoencoder with Spectral Residual for Time Series Anomaly Detection.” Neurocomputing 458 (October): 349–63. https://doi.org/10.1016/j.neucom.2021.06.030.Google ScholarDigital Library
- Cheng-gang Wang, Xiao-dong Zhou, and Xue-wei Wang. 2010. “Testability Analysis for Complex Circuit Board Based on Fault Simulation and Rough Set.” Microelectronics & Compute 27 (1): 131–34.Google Scholar
- YIN Zong-run, LI Jun-shan, SU Dong. 2014. “A Novelty Method for Bayesian Reliability Assessment of Electronic Equipment”. Microelectronics & Computer, 2014, 31(6): 107-110.Google Scholar
Index Terms
- VAE-based anomaly detection for embedded computer electronic components
Recommendations
VAE-based Deep SVDD for anomaly detection
AbstractAnomaly detection is an essential task for different fields in the real world. The imbalanced data and lack of labels make the task challenging. Deep learning models based on autoencoder (AE) have been applied to address the above ...
Unsupervised Anomaly Detection on Microservice Traces through Graph VAE
WWW '23: Proceedings of the ACM Web Conference 2023The microservice architecture is widely employed in large Internet systems. For each user request, a few of the microservices are called, and a trace is formed to record the tree-like call dependencies among microservices and the time consumption at ...
Anomaly Detection in Embedded Systems
Special issue on fault-tolerant embedded systemsBy employing fault tolerance, embedded systems can withstand both intentional and unintentional faults. Many fault-tolerance mechanisms are invoked only after a fault has been detected by whatever fault-detection mechanism is used, hence, the process of ...
Comments