End-to-End Methodology for Predictive Maintenance Based on Fingerprint Routines and Anomaly Detection for Machine Tool Rotary Components
Abstract
:1. Introduction
- The anomaly detection algorithm is initialized using very little data.
- The thresholds are dynamically adjusted based on the evolution of the data over time.
- The algorithm also detects changepoints and automatically resets the threshold definitions.
- The failure-specific features that are extracted from the FRs support the interpretability of the results, and the causality of the anomalies can be analyzed.
- All tasks are performed in an online manner, ensuring real-time adaptability and responsiveness.
2. Theoretical Background for Feature Extraction
2.1. Fingerprint Routines
- Spin the rotary component without holding any tool or performing any machining operation,
- For a predefined time interval, and
- At a constant, predefined rotational speed.
2.2. Vibration
2.3. Characteristic Fault Frequencies in Bearings
2.4. Kinematic Chains
- The main speed (MS) of a kinematic chain is the speed rotation by which the rest of the speed rotations are computed. Take, for instance, a system where motor A transmits its rotation to spindle B with a 1.5 rate. Then, if the motor speed is 1000 RPM, the spindle speed is 1500 RPM. The MS of the system would be 1000 RPM, and the other speed is computed from it.
- The main frequency (MF) is defined as the MS in Hz; that is, MS/60 if MS is given in RPM.
- A transmission component (TC) is a machine component that has a rotating speed and might transmit it to another TC.
- The relative speed (RS) of a TC is the speed that the TC rotates as a multiplier of the MS.
- A TC is the child of a parent (another TC) if its RS is computed as a multiple of the RS of its parent.
- For any parent–child tuple, the transmission rate (TR) from parent to child is the ratio between the RS of the parent and the child.
- If a TC is not the child of any other TC, then it is called the main component (MC), and its speed is computed as a multiple of the MS (generally with an RS of 1).
- A potentially faulty element (PFE) is a component that spins with a TC. Each PFE is associated with one, and only one, TC. Their transmission rate with respect to its parent TC is usually 1.
- A fault is a property associated with a PFE. Each fault is defined by its name and its relative fault frequency (RFF) with respect to the rotation speed of the PFE (which, in the case of bearings, it is the FFF). The names of the faults, in the case of bearings, will be the ones introduced in the correspondent section (BPFI, BPFO, etc.), and their RFFs will be the relative frequencies with respect to their rotation that are excited when those faults take place.
- The specific fault frequency (SFF) of a fault type for a specific PFE is the frequency that will be excited in case a fault happens. It is computed as the RFF of the fault times the RS of the bearing times the MF.
3. Methodology
- FR execution: The FR is executed.
- Data gathering: The accelerometer data are stored.
- Data processing: Data undergo a series of transformation steps.
- Anomaly detection: Detection and notification of relevant events.
3.1. Data Processing
3.1.1. Preprocessing
3.1.2. Feature Extraction Considering Kinematic Chains
- TCs: Each TC is defined by its TR and its parent (if they have one).
- PFEs: Each PFE is defined by its TR and the TC they are attached to.
- Faults: Each fault is defined by its FFF and the PFE they are related to.
- Iterate through all the faults in Faults. For each of them:
- Multiply its FFF by the TR of the PFE it is attached to.
- Multiply the result by the TR of the TC the PFE is attached to.
- If the Parent_TC of that TC is null, stop. If it is not, look for the table row for which TC_name is equal to the Parent_TC of the current TC. Multiply our previous product for the TR of this new TC. Repeat this step until Parent_TC is null. The result, for each fault, is their RFF.
3.1.3. Severity Computations
3.2. Anomaly Detection and Changepoint Detection
- detect anomalies,
- detect concept drifts,
- to determine when to notify.
- : Critical severity.
- : Density threshold.
- : Buffer size.
- : Minimal amount of points in the buffer before considering anomalies or changes.
- : Average factor.
- : Critical severity for average factor.
- : Incoming and ordered values of the series.
- : Accumulated mean of the series at the i-th point.
- : Accumulated mean of the squared series at the i-th point.
- : Accumulated standard deviation of the series at the i-th point: .
- : Number of values used for the mean and cumulative value at the i-th point.
- : Anomaly score of the series at the i-th point.
- : Buffer at the i-th point.
- : Anomaly buffer at the i-th point.
- If there is not a minimal number of values in the buffer (), then no change is evaluated.
- If , it means that no change of scenario happens.
- If , then a change of scenario happens via the accumulation of anomalous values. This happens when the added value is anomalous, and the proportion of anomalous values in the buffer exceeds the parameters .
- If , then a change of scenario happens through deviation from the mean value . This happens when the mean of the values in the buffer that are not anomalous under the threshold deviate from the previous mean value , in proportion, more than ; that is, when the last values are not necessarily anomalous, but on average, they deviate too much from what was established as the average scenario.
Algorithm 1 Anomaly and change detection algorithm |
|
- The execution is anomalous and above the cumulative mean (). The anomaly score is signed, so it is positive if the incoming value is above the cumulative mean and negative if it is below.
- A changepoint is detected based on drift in cumulative mean ( = ChangeAvg) and the mean value after if it is greater than the mean value before (.
Algorithm 2 |
|
4. Results and Discussion
4.1. Artificially Generated Dataset
4.2. Real Experimental Data
4.3. Real Use Case
4.3.1. FR Definition and Data Gathering
4.3.2. FFT Signal Transformations
4.3.3. Visual Exploration
4.3.4. Algorithm Tuning and Anomaly Detection
5. Conclusions
- In this work, we assume the kinematic chains to be linear. Using data extraction to solve cases with more complex chains is an open line of work.
- Within the field of production engineering, the proposed methodology could be applied using data gathered from repetitive manufacturing processes [29].
- It is essential to have more public datasets available in order to conduct effective benchmarking studies.
- Developing advanced techniques that integrate anomaly detection and concept drift detection is crucial.
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Zonta, T.; da Costa, C.A.; da Rosa Righi, R.; de Lima, M.J.; da Trindade, E.S.; Li, G.P. Predictive maintenance in the Industry 4.0: A systematic literature review. Comput. Ind. Eng. 2020, 150, 106889. [Google Scholar] [CrossRef]
- Vollert, S.; Atzmueller, M.; Theissler, A. Interpretable Machine Learning: A brief survey from the predictive maintenance perspective. In Proceedings of the 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Vasteras, Sweden, 7–10 September 2021; pp. 1–8. [Google Scholar] [CrossRef]
- Serradilla, O.; Zugasti, E.; Rodriguez, J.; Zurutuza, U. Deep learning models for predictive maintenance: A survey, comparison, challenges and prospects. Appl. Intell. 2022, 52, 10934–10964. [Google Scholar] [CrossRef]
- Wen, Y.; Rahman, M.F.; Xu, H.; Tseng, T.L.B. Recent advances and trends of predictive maintenance from data-driven machine prognostics perspective. Measurement 2022, 187, 110276. [Google Scholar] [CrossRef]
- Corporation, M. Introduction to Predictive Maintenance in Manufacturing—Azure Architecture Center. Available online: https://learn.microsoft.com/en-us/azure/architecture/ (accessed on 23 December 2024).
- Scaife, A.D. Improve predictive maintenance through the application of artificial intelligence: A systematic review. Results Eng. 2023, 21, 101645. [Google Scholar] [CrossRef]
- Hundman, K.; Constantinou, V.; Laporte, C.; Colwell, I.; Soderstrom, T. Detecting spacecraft anomalies using lstms and nonparametric dynamic thresholding. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, London, UK, 19–23 August 2018; pp. 387–395. [Google Scholar] [CrossRef]
- Munir, M.; Siddiqui, S.A.; Dengel, A.; Ahmed, S. DeepAnT: A deep learning approach for unsupervised anomaly detection in time series. IEEE Access 2018, 7, 1991–2005. [Google Scholar] [CrossRef]
- Zhang, C.; Song, D.; Chen, Y.; Feng, X.; Lumezanu, C.; Cheng, W.; Ni, J.; Zong, B.; Chen, H.; Chawla, N.V. A deep neural network for unsupervised anomaly detection and diagnosis in multivariate time series data. In Proceedings of the AAAI Conference on Artificial Intelligence, Honolulu, HI, USA, 27 January–1 February 2019; Volume 33, pp. 1409–1416. [Google Scholar] [CrossRef]
- Moens, P.; Vanden Hautte, S.; De Paepe, D.; Steenwinckel, B.; Verstichel, S.; Vandekerckhove, S.; Ongenae, F.; Van Hoecke, S. Event-Driven Dashboarding and Feedback for Improved Event Detection in Predictive Maintenance Applications. Appl. Sci. 2021, 11, 10371. [Google Scholar] [CrossRef]
- da Silva Arantes, J.; da Silva Arantes, M.; Fröhlich, H.B.; Siret, L.; Bonnard, R. A novel unsupervised method for anomaly detection in time series based on statistical features for industrial predictive maintenance. Int. J. Data Sci. Anal. 2021, 12, 383–404. [Google Scholar] [CrossRef]
- Giannoulidis, A.; Gounaris, A.; Nikolaidis, N.; Naskos, A.; Caljouw, D. Investigating thresholding techniques in a real predictive maintenance scenario. ACM Sigkdd Explor. Newsl. 2022, 24, 86–95. [Google Scholar] [CrossRef]
- Rögnvaldsson, T.; Nowaczyk, S.; Byttner, S.; Prytz, R.; Svensson, M. Self-monitoring for maintenance of vehicle fleets. Data Min. Knowl. Discov. 2018, 32, 344–384. [Google Scholar] [CrossRef]
- Lu, J.; Liu, A.; Dong, F.; Gu, F.; Gama, J.; Zhang, G. Learning under Concept Drift: A Review. IEEE Trans. Knowl. Data Eng. 2019, 31, 2346–2363. [Google Scholar] [CrossRef]
- Giada, C.V.; Rossella, P. Barriers to Predictive Maintenance implementation in the Italian machinery industry. IFAC-PapersOnLine 2021, 54, 1266–1271. [Google Scholar] [CrossRef]
- Truong, C.; Oudre, L.; Vayatis, N. Selective review of offline change point detection methods. Signal Process. 2020, 167, 107299. [Google Scholar] [CrossRef]
- Fogliazza, G.; Arvedi, C.; Spoto, C.; Trappa, L.; Garghetti, F.; Grasso, M.; Colosimo, B.M. Fingerprint analysis for machine tool health condition monitoring. IFAC-PapersOnLine 2021, 54, 1212–1217. [Google Scholar] [CrossRef]
- D’Amato, E.; Rissone, P. Using the envelope method to monitor rolling bearings. In Proceedings of the 1st International Machinery Monitoring and Diagnostic Conference, Las Vegas, NV, USA, 11–14 September 1998; pp. 560–566. [Google Scholar]
- Kallappa, P.; Byington, C.S.; Kalgren, P.W.; DeChristopher, M.; Amin, S. High Frequency Incipient Fault Detection for Engine Bearing Components. In Proceedings of the Turbo Expo: Power for Land, Sea, and Air, Reno, NV, USA, 6–9 June 2005; Volume 47276: Turbo Expo 2005, pp. 413–427. [Google Scholar] [CrossRef]
- Bediaga, I.; Mendizabal, X.; Arnaiz, A.; Munoa, J. Ball bearing damage detection using traditional signal processing algorithms. IEEE Instrum. Meas. Mag. 2013, 16, 20–25. [Google Scholar] [CrossRef]
- Bringham, E.O. Fast Fourier Transform and Its Applications; Prentice Hall: Hoboken, NJ, USA, 1988. [Google Scholar]
- Pacheco-Chérrez, J.; Fortoul-Díaz, J.A.; Cortés-Santacruz, F.; Aloso-Valerdi, L.M.; Ibarra-Zarate, D.I. Bearing fault detection with vibration and acoustic signals: Comparison among different machine leaning classification methods. Eng. Fail. Anal. 2022, 139, 106515. [Google Scholar] [CrossRef]
- SKF, A. NN 3030 K/SPW33—Cylindrical Roller Bearings, Double Row, Super-Precision|SKF. 2022. Available online: https://www.skf.com/sg/industries/machine-tools/products-and-solutions/super-precision-double-row-cylindrical-bearings (accessed on 23 December 2024).
- Hernandez, M.J. Database Design for Mere Mortals: A Hands-on Guide to Relational Database Design; Addision-Wesley: Reading, MA, USA, 1997. [Google Scholar]
- Angelov, P.P. Anomaly detection based on eccentricity analysis. In Proceedings of the 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS), Orlando, FL, USA, 9–12 December 2014; pp. 1–8. [Google Scholar]
- Gama, J. Knowledge Discovery from Data Streams; Chapman and Hall/CRC: London, UK, 2010. [Google Scholar]
- Qiu, H.; Lee, J.; Lin, J.; Yu, G. Wavelet filter-based weak signature detection method and its application on rolling element bearing prognostics. J. Sound Vib. 2006, 289, 1066–1090. [Google Scholar] [CrossRef]
- ISO 17243-1:2014; ISO Central Secretary. Machine Tool Spindles—Evaluation of Machine Tool Spindle Vibrations by Measurements on Spindle Housing—Part 1: Spindles with Rolling Element Bearings and Integral Drives Operating at Speeds Between 600 min−1 and 30000 min−1. Technical Report; International Organization for Standardization: Geneva, Switzerland, 2014.
- Arregi, A.; Inza, I.; Bediaga, I. Vibration analysis for rotatory elements wear detection in paper mill machine. In Proceedings of the International Workshop on Applied Research, Technology Transfer and Knowledge Exchange in Software and Data Sciences, Vienna, Austria, 22–24 August 2022. [Google Scholar]
cs | dt | bs | Nmin | af | csa |
---|---|---|---|---|---|
2 | 0.5 | 10 | 8 | 0.2 | 4 |
Window Based | Bottom-Up | Binary Segmentation | Kernel Based |
---|---|---|---|
model = ’l2’ | model = ’l2’ | model = ’l2’ | kernel = ’rbf’ |
min_size = 6 | min_size = 6 | min_size = 6 | min_size = 6 |
window_size = 4 | gamma = 100 |
cs | dt | bs | Nmin | af | csa |
---|---|---|---|---|---|
1 | 0.5 | 6 | 4 | 0.2 | 4 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Arregi, A.; Barrutia, A.; Bediaga, I. End-to-End Methodology for Predictive Maintenance Based on Fingerprint Routines and Anomaly Detection for Machine Tool Rotary Components. J. Manuf. Mater. Process. 2025, 9, 12. https://doi.org/10.3390/jmmp9010012
Arregi A, Barrutia A, Bediaga I. End-to-End Methodology for Predictive Maintenance Based on Fingerprint Routines and Anomaly Detection for Machine Tool Rotary Components. Journal of Manufacturing and Materials Processing. 2025; 9(1):12. https://doi.org/10.3390/jmmp9010012
Chicago/Turabian StyleArregi, Amaia, Aitor Barrutia, and Iñigo Bediaga. 2025. "End-to-End Methodology for Predictive Maintenance Based on Fingerprint Routines and Anomaly Detection for Machine Tool Rotary Components" Journal of Manufacturing and Materials Processing 9, no. 1: 12. https://doi.org/10.3390/jmmp9010012
APA StyleArregi, A., Barrutia, A., & Bediaga, I. (2025). End-to-End Methodology for Predictive Maintenance Based on Fingerprint Routines and Anomaly Detection for Machine Tool Rotary Components. Journal of Manufacturing and Materials Processing, 9(1), 12. https://doi.org/10.3390/jmmp9010012