Predicting Target Events in Industrial Domains

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10358)


In industrial environments, machine faults have a high impact on productivity due to the high costs it can cause. Machine generated event logs are a abundant source of information for understanding the causes and events that led to a critical event in the machine. In this work, we present a Sequence-Mining based technique to automatically extract sequential patterns of events from machine log data for understanding and predicting machine critical events. By experiments using real data with millions of log entries from over 150 industrial computer numerical control (CNC) cutting machines, we show how our technique can be successfully used for understanding the root causes of certain critical events, as well as for building monitors for predicting them long before they happen, outperforming existing techniques.


Target Event Applying Sequence Mining Prediction Lead Time Online Failure Prediction Vilalta 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Raman, S., De Silva, C.W.: Sensor-fault tolerant condition monitoring of an industrial machine. Int. J. Inf. Acquis. 9(01), 1350001 (2013)CrossRefGoogle Scholar
  2. 2.
    Salfner, F., Tschirpke, S.: Error log processing for accurate failure prediction. In: WASL (2008)Google Scholar
  3. 3.
    Salfner, F., Lenk, M., Malek, M.: A survey of online failure prediction methods. ACM Comput. Surv. 42(3), 1–42 (2010)CrossRefGoogle Scholar
  4. 4.
    Vilalta, R., Ma, S.: Predicting rare events in temporal domains. In: Proceedings of the 2002 IEEE International Conference on Data Mining, 2002. ICDM 2003, pp. 474–481. IEEE (2002)Google Scholar
  5. 5.
    Tsao, M.M., Siewiorek, D.P.: Trend analysis on system error files. In: Proceedings of the 13th International Symposium on Fault-Tolerant Computing, Milano, vol. 116119 (1983)Google Scholar
  6. 6.
    Hansen, J.P., Siewiorek, D.P.: Models for time coalescence in event logs. In: Twenty-Second International Symposium on Fault-Tolerant Computing, FTCS-22. Digest of Papers, pp. 221–227. IEEE (1992)Google Scholar
  7. 7.
    Lal, R., Choi, G.: Error and failure analysis of a unix server. In: Proceedings of the Third IEEE International on High-Assurance Systems Engineering Symposium, pp. 232–239. IEEE (1998)Google Scholar
  8. 8.
    Zaki, M.: SPADE: an efficient algorithm for mining frequent sequences. Mach. Learn. 42(1–2), 31–60 (2001)CrossRefzbMATHGoogle Scholar
  9. 9.
    Zhao, Q., Bhowmick, S.S.: Sequential pattern mining: a survey, ITechnical report CAIS Nayang Technological University Singapore, pp. 1–26 (2003)Google Scholar
  10. 10.
    Slimani, T., Lazzez, A.: Sequential mining: patterns and algorithms analysis. arXiv preprint arXiv:1311.0350 (2013)
  11. 11.
    Bergstra, J., Bengio, Y.: Random search for hyper-parameter optimization. J. Mach. Learn. Res. 13, 281–305 (2012)MathSciNetzbMATHGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.TECOKarlsruhe Institute of Technology (KIT)KarlsruheGermany
  2. 2.TRUMPF Werkzeugmaschinen GmbH + Co. KGDitzingenGermany

Personalised recommendations