Advertisement

An Event Correlation Based Approach to Predictive Maintenance

  • Meiling Zhu
  • Chen Liu
  • Yanbo Han
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10988)

Abstract

Predictive maintenance aims at enabling proactive scheduling of maintenance, and thus prevent unexpected equipment failures. Most approaches focus on predicting failures occurring within individual sensors. However, a failure is not always isolated. It probably formed by propagation of trivial anomalies, which are widely regarded as events, among sensors and devices. In this paper, we propose an event correlation discovery algorithm to capture correlations among anomalies/failures. Such correlations can show us lots of clues to the propagation paths. We also extend our previous service hyperlink model to encapsulate such correlations and propose a service-based predictive maintenance approach. Moreover, we have made extensive experiments to verify the effectiveness of our approach.

Keywords

Event correlation Sensor data Predictive maintenance Proactive data service Service hyperlink 

Notes

Acknowledgement

Funding: This work was supported by National Natural Science Foundation of China (No. 61672042).

References

  1. 1.
    Qiu, H., Liu, Y., Subrahmanya, N.A., Li, W.: Granger causality for time-series anomaly detection. In: 12th IEEE International Conference on Data Mining, pp. 1074–1079. Institute of Electrical and Electronics Engineers Inc., Brussels (2012)Google Scholar
  2. 2.
    Sipos, R., Fradkin, D., Moerchen, F., Wang, Z.: Log-based predictive maintenance. In: 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1867–1876. Association for Computing Machinery, New York (2014)Google Scholar
  3. 3.
    Yan, Y., Luh, P.B., Pattipati, K.R.: Fault diagnosis of HVAC air-handling systems considering fault propagation impacts among components. IEEE Trans. Autom. Sci. Eng. 14(2), 705–717 (2017)CrossRefGoogle Scholar
  4. 4.
    Ye, R., Li, X.: Collective representation for abnormal event detection. J. Comput. Sci. Technol. 32(3), 470–479 (2017)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Pourmirza, S., Dijkman, R., Grefen, P.: Correlation miner: mining business process models and event correlations without case identifiers. Int. J. Coop. Inf. Syst. 26(2), 1–32 (2017)CrossRefGoogle Scholar
  6. 6.
    Pourmirza, S., Dijkman, R., Grefen, P.: Correlation mining: mining process orchestrations without case identifiers. In: Barros, A., Grigori, D., Narendra, N.C., Dam, H.K. (eds.) ICSOC 2015. LNCS, vol. 9435, pp. 237–252. Springer, Heidelberg (2015).  https://doi.org/10.1007/978-3-662-48616-0_15CrossRefGoogle Scholar
  7. 7.
    Friedberg, I., Skopik, F., Settanni, G., Fiedler, R.: Combating advanced persistent threats: from network event correlation to incident detection. Comput. Secur. 48, 35–57 (2015)CrossRefGoogle Scholar
  8. 8.
    Fu, S., Xu, C.: Quantifying event correlations for proactive failure management in networked computing systems. J. Parallel Distrib. Comput. 70(11), 1100–1109 (2010)CrossRefGoogle Scholar
  9. 9.
    Forkan, A.R.M., Khalil, I.: PEACE-Home: probabilistic estimation of abnormal clinical events using vital sign correlations for reliable home-based monitoring. Pervasive Mob. Comput. 38, 296–311 (2017)CrossRefGoogle Scholar
  10. 10.
    Forkan, A.R.M., Khalil, I.: A probabilistic model for early prediction of abnormal clinical events using vital sign correlations in home-based monitoring. In: 14th IEEE International Conference on Pervasive Computing and Communications, pp. 1–9. Institute of Electrical and Electronics Engineers Inc., SydneyGoogle Scholar
  11. 11.
    Han, Y., Liu, C., Su, S., Zhu, M., Zhang, Z., Zhang, S.: A proactive service model facilitating stream data fusion and correlation. Int. J. Web Serv. Res. 14(3), 1–16 (2017)CrossRefGoogle Scholar
  12. 12.
    Zhu, M., Liu, C., Wang, J., Su, S., Han, Y.: An approach to modeling and discovering event correlation for service collaboration. In: Maximilien, M., Vallecillo, A., Wang, J., Oriol, M. (eds.) ICSOC 2017. LNCS, vol. 10601, pp. 191–205. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-69035-3_13CrossRefGoogle Scholar
  13. 13.
    Domingues, R., Filippone, M., Michiardi, P., Zouaoui, J.: A comparative evaluation of outlier detection algorithms: experiments and analyses. Pattern Recogn. 74, 406–421 (2018)CrossRefGoogle Scholar
  14. 14.
    Yeh, C.M., et al. : Time series joins, motifs, discords and shapelets: a unifying view that exploits the matrix profile. Data Min. Knowl. Discov., 1–41 (2017)Google Scholar
  15. 15.
    Yagci, A.M., Aytekin, T., Gurgen, F.S.: Scalable and adaptive collaborative filtering by mining frequent item co-occurrences in a user feedback stream. Eng. Appl. Artif. Intell. 58, 171–184 (2017)CrossRefGoogle Scholar
  16. 16.
    Yu, Z., Yu, X., Liu, Y., Li, W., Pei, J.: Mining frequent co-occurrence patterns across multiple data streams. In: 18th International Conference on Extending Database Technology, pp. 73–84. OpenProceedings.org, University of Konstanz, University Library, Brussels, Belgium (2015)Google Scholar
  17. 17.
    Song, W., Jacobsen, H.A., Ye, C., Ma, X.: Process discovery from dependence-complete event logs. IEEE Trans. Serv. Comput. 9(5), 714–727 (2016)CrossRefGoogle Scholar
  18. 18.
    Plantevit, M., Robardet, C., Scuturici, V.M.: Graph dependency construction based on interval-event dependencies detection in data streams. Intell. Data Anal. 20(2), 223–256 (2016)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Computer Science and TechnologyTianjin UniversityTianjinChina
  2. 2.Beijing Key Laboratory on Integration and Analysis of Large-Scale Stream DataNorth China University of TechnologyBeijingChina
  3. 3.Cloud Computing Research CenterNorth China University of TechnologyBeijingChina

Personalised recommendations