skip to main content
10.1145/3577530.3577536acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaiConference Proceedingsconference-collections
research-article

VAE-based anomaly detection for embedded computer electronic components

Published:30 March 2023Publication History

ABSTRACT

The current maintenance of aerospace equipment generally uses regular maintenance, scheduled maintenance, seasonal maintenance, after-the-fact maintenance, and replacement maintenance. These methods are ill-timed, time-consuming, and wasteful of materials. Monitoring the reliability and healthy operating status of each embedded computer electronic component is essential, and maintenance staff will benefit greatly from a data-driven approach to anomaly detection. It can be altered from "repair afterward" to "repair as necessary" and from " repair regularly" to "repair at any time" to solve the practical problems arising from maintenance. The Variational Autoencoder (VAE), which is based on the component storage aging acceleration data, is used in this paper to model the component's normal operating status and perform anomaly detection. The precision and recall of this anomaly detection method are 0.950 and 0.977. This method evaluates the operating status and reliability of each component, improves the reliability and service life of the computer, and establishes the technological framework for the next generation of computer Prognostics and Health Management (PHM) systems.

References

  1. CHAI Bo. 2018.“Full life cycle reliability design assurance technology for military embedded computer” Beijing: China Aerospace publishing house.Google ScholarGoogle Scholar
  2. Maxion, R.A., and K.M.C. Tan. 2002. “Anomaly Detection in Embedded Systems.” IEEE Transactions on Computers 51 (2): 108–20. https://doi.org/10.1109/12.980003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Zhang, Ying, and Krishnendu Chakrabarty. 2003. “Fault Recovery Based on Checkpointing for Hard Real-Time Embedded Systems.” In Proceedings 18th IEEE Symposium on Defect and Fault Tolerance in VLSI Systems, 320–27. https://doi.org/10.1109/DFTVS.2003.1250127.Google ScholarGoogle ScholarCross RefCross Ref
  4. Peti, P., R. Obermaisser, and H. Kopetz. 2005. “Out-of-Norm Assertions [Diagnostic Mechanism].” In 11th IEEE Real Time and Embedded Technology and Applications Symposium, 280–91. https://doi.org/10.1109/RTAS.2005.38.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Zandrahimi, Mahroo, Alireza Zarei, and Hamid R. Zarandi. 2010. “A Probabilistic Method to Detect Anomalies in Embedded Systems.” In 2010 IEEE 25th International Symposium on Defect and Fault Tolerance in VLSI Systems, 152–59. https://doi.org/10.1109/DFT.2010.25.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Mojarad, Roghayeh, Hossain Kordestani, and Hamid R. Zarandi. 2016. “A Cluster-Based Method to Detect and Correct Anomalies in Sensor Data of Embedded Systems.” In 2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP), 240–47. https://doi.org/10.1109/PDP.2016.104.Google ScholarGoogle ScholarCross RefCross Ref
  7. Mojarad, Roghayeh, and Hamid R. Zarandi. 2015. “Two Effective Anomaly Correction Methods in Embedded Systems.” In 2015 CSI Symposium on Real-Time and Embedded Systems and Technologies (RTEST), 1–6. https://doi.org/10.1109/RTEST.2015.7369849.Google ScholarGoogle ScholarCross RefCross Ref
  8. Mojarad, Roghayeh, and Hamid R. Zarandi. 2017. “Comparison and Analysis of Three Anomaly Correction Methods in Embedded Systems.” Scientia Iranica 24 (6): 3087–3100. https://doi.org/10.24200/sci.2017.4579.Google ScholarGoogle ScholarCross RefCross Ref
  9. Wang, Yun, Bo Jing, Yifeng Huang, Xiaoxuan Jiao, Shenglong Wang, and Qinglin Liu. 2019. “Research of Equipment Fault Diagnosis Based on PHM High Performance Computing Platform.” In 2019 Prognostics and System Health Management Conference (PHM-Qingdao), 1–6. https://doi.org/10.1109/PHM-Qingdao46334.2019.8942892.Google ScholarGoogle ScholarCross RefCross Ref
  10. Sandborn, P. 2005. “A Decision Support Model for Determining the Applicability of Prognostic Health Management (PHM) Approaches to Electronic Systems.” In Annual Reliability and Maintainability Symposium, 2005. Proceedings., 422–27. https://doi.org/10.1109/RAMS.2005.1408399.Google ScholarGoogle ScholarCross RefCross Ref
  11. Lall, Pradeep, Madhura Hande, Chandan Bhat, and Jay Lee. 2011. “Prognostics Health Monitoring (PHM) for Prior Damage Assessment in Electronics Equipment Under Thermo-Mechanical Loads.” IEEE Transactions on Components, Packaging and Manufacturing Technology 1 (11): 1774–89. https://doi.org/10.1109/TCPMT.2011.2160542.Google ScholarGoogle ScholarCross RefCross Ref
  12. Kingma, Diederik P., and Max Welling. 2014. “Auto-Encoding Variational Bayes.” arXiv. https://doi.org/10.48550/arXiv.1312.6114.Google ScholarGoogle ScholarCross RefCross Ref
  13. Xu, Haowen, Wenxiao Chen, Nengwen Zhao, Zeyan Li, Jiahao Bu, Zhihan Li, Ying Liu, 2018. “Unsupervised Anomaly Detection via Variational Auto-Encoder for Seasonal KPIs in Web Applications.” In Proceedings of the 2018 World Wide Web Conference, 187–96. WWW ’18. Republic and Canton of Geneva, CHE: International World Wide Web Conferences Steering Committee. https://doi.org/10.1145/3178876.3185996.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Chen, Wenxiao, Haowen Xu, Zeyan Li, Dan Pei, Jie Chen, Honglin Qiao, Yang Feng, and Zhaogang Wang. 2019. “Unsupervised Anomaly Detection for Intricate KPIs via Adversarial Training of VAE.” In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, 1891–99. https://doi.org/10.1109/INFOCOM.2019.8737430.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Kawachi, Yuta, Yuma Koizumi, and Noboru Harada. 2018. “Complementary Set Variational Autoencoder for Supervised Anomaly Detection.” In 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2366–70. https://doi.org/10.1109/ICASSP.2018.8462181.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Lin, Shuyu, Ronald Clark, Robert Birke, Sandro Schönborn, Niki Trigoni, and Stephen Roberts. 2020. “Anomaly Detection for Time Series Using VAE-LSTM Hybrid Model.” In ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 4322–26. https://doi.org/10.1109/ICASSP40776.2020.9053558.Google ScholarGoogle ScholarCross RefCross Ref
  17. Akbari, Mohammad, and Jie Liang. 2018. “Semi-Recurrent CNN-Based VAE-GAN for Sequential Data Generation,” June. https://doi.org/10.48550/arXiv.1806.00509.Google ScholarGoogle ScholarCross RefCross Ref
  18. Liu, Yunxiao, Youfang Lin, QinFeng Xiao, Ganghui Hu, and Jing Wang. 2021. “Self-Adversarial Variational Autoencoder with Spectral Residual for Time Series Anomaly Detection.” Neurocomputing 458 (October): 349–63. https://doi.org/10.1016/j.neucom.2021.06.030.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Cheng-gang Wang, Xiao-dong Zhou, and Xue-wei Wang. 2010. “Testability Analysis for Complex Circuit Board Based on Fault Simulation and Rough Set.” Microelectronics & Compute 27 (1): 131–34.Google ScholarGoogle Scholar
  20. YIN Zong-run, LI Jun-shan, SU Dong. 2014. “A Novelty Method for Bayesian Reliability Assessment of Electronic Equipment”.  Microelectronics & Computer, 2014, 31(6): 107-110.Google ScholarGoogle Scholar

Index Terms

  1. VAE-based anomaly detection for embedded computer electronic components

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        CSAI '22: Proceedings of the 2022 6th International Conference on Computer Science and Artificial Intelligence
        December 2022
        341 pages
        ISBN:9781450397773
        DOI:10.1145/3577530

        Copyright © 2022 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 30 March 2023

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)28
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format