Skip to main content
Log in

On mining frequent chronicles for machine failure prediction

  • Published:
Journal of Intelligent Manufacturing Aims and scope Submit manuscript

Abstract

In industry 4.0, machines generate a lot of data about several kinds of events that occur in the production process. This huge quantity of information contains valuable patterns that allow prediction of important events in the appropriate instant. In this paper, we are interested in mining frequent chronicles in the context of industrial data. We introduce a general approach to preprocess, mine, and use frequent chronicles to predict a special event; the failure of a machine. Our approach aims not only to predict the failure, but also the time of its appearance. Our approach is validated through a set of experiments performed on the chronicle mining phase as well as the prediction phase. Experiments were achieved on synthetic data in addition to a real industrial data set.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. In this paper, we mean by “breakdown” a failure.

  2. In this paper, we mean by “instant” a given unit of time.

References

  • Agrawal, R., Imieliski, T., & Swami, A. (1993). Mining association rules between sets of items in large databases. In Proceedings of the ACM SIGMOD international conference on management of data, Washington, DC, USA—May 25–28 (pp. 207–216).

  • Agrawal, R., & Srikant, R. (1995). Mining sequential patterns. In Proceedings of the international conference on data engineering, Taipei, Taiwan, March 06–10 (pp. 3–14).

  • Antonio, G., Manuel, C., Roque, M., & Bart, G. (2013). Clasp: An efficient algorithm for mining frequent closed sequences. In Proceedings of the Pacific-Asia conference on advances in knowledge discovery and data mining, Gold Coast, Australia, April 14–17 (pp. 50–61).

  • Borgelt, C. (2012). Frequent itemset mining. WIREs Data Mining Knowledge Discovery, 2, 437–456. https://doi.org/10.1002/widm.1074.

    Article  Google Scholar 

  • Carrault, G., Cordier, M. O., Quiniou, R., & Wang, F. (2003). Temporal abstraction and inductive logic programming for arrhythmia recognition from electrocardiograms. Artificial Intelligence in Medicine, 28, 231–263.

    Article  Google Scholar 

  • Cho, S., May, G., Tourkogiorgis, I., Perez, R., Lazaro, O., de la Maza, B., et al. (2018). A hybrid machine learning approach for predictive maintenance in smart factories of the future. In I. Moon, G. M. Lee, J. Park, D. Kiritsis, & G. von Cieminski (Eds.), Advances in production management systems. Smart manufacturing for industry 4.0 (pp. 311–317). Cham: Springer.

    Chapter  Google Scholar 

  • Cram, D., Mathern, B., & Mille, A. (2011). A complete chronicle discovery approach: Application to activity analysis. Expert Systems, 29, 321–346.

    Article  Google Scholar 

  • D’Addona, D. M., Ullah, A. M. M. S., & Matarazzo, D. (2017). Tool-wear prediction and pattern-recognition using artificial neural network and DNA-based computing. Journal of Intelligent Manufacturing, 28(6), 1285–1301.

    Article  Google Scholar 

  • Dauxais, Y., Gross-Amblard, D., Guyet, T., & Happe, A. (2015). Chronicles mining in a database of drugs exposures. In: Proceedings of the ECML doctoral consortium, Porto, Portugal, September 7–11.

  • Dauxais, Y., Guyet, T., Gross-Amblard, D., & Happe, A. (2017). Discriminant chronicles mining: Application to care pathways analytics. In: Proceedings of the conference on artificial intelligence in medicine, Vienna, Austria, June 21–24.

  • Davis, J., & Goadrich, M. (2006). The relationship between precision-recall and ROC curves. In Proceedings of the international conference on machine learning, Pittsburgh, Pennsylvania, USA—June 25–29 (pp. 233–240).

  • Dousson, C., & Duong, T. V. (1999). Discovering chronicles with numerical time constraints from alarm logs for monitoring dynamic systems. In Proceedings of the international joint conference on artificial intelligence, San Francisco, CA, USA, July 31–August 06 (pp. 620–626).

  • Dousson, C., Gaborit, P., & Ghallab, M. (1993). Situation recognition: Representation and algorithms. In Proceedings of the international joint conference on artificial intelligence. Chambry, France, August 28–September 3 (pp. 166–174).

  • Fournier-Viger, P., Gueniche, T., & Tseng, V. S. (2012). Using partially-ordered sequential rules to generate more accurate sequence prediction. In Proceedings of the international conference on advanced data mining and applications, Nanjing, China, December 15–18 (pp. 431–442).

  • Fradkin, D., & Mörchen, F. (2015). Mining sequential patterns for classification. Knowledge and Information Systems, 45, 731–749.

    Article  Google Scholar 

  • Goethals, B. (2003). Survey on frequent pattern mining. Helsinki: University of Helsinki.

    Google Scholar 

  • Hashemian, H. M., & Bean, W. C. (2011). State-of-the-art predictive maintenance techniques. IEEE Transactions on Instrumentation and Measurement, 60(10), 3480–3492.

    Article  Google Scholar 

  • Huang, Z., Lu, X., & Duan, H. (2012). On mining clinical pathway patterns from medical behaviors. Artificial Intelligence in Medicine, 56, 35–50.

    Article  Google Scholar 

  • Lasi, H., Fettke, P., Kemper, H. G., Feld, T., & Hoffmann, M. (2014). Industry 4.0. Business & Information Systems Engineering, 6, 239–242.

    Article  Google Scholar 

  • Laxman, S., & Sastry, P. S. (2006). A survey of temporal data mining. Sadhana, 31(2), 173–198.

    Article  Google Scholar 

  • Malhotra, P., Vig, L., Shroff, G., & Agarwal, P. (2015). Long short term memory networks for anomaly detection in time series. In ESANN.

  • Mannila, H., Toivonen, H., & Verkamo, A. I. (1997). Discovery of frequent episodes in event sequences. Data Mining and Knowledge Discovery, 1, 259–289.

    Article  Google Scholar 

  • Masseglia, F., Teisseire, M., & Poncelet, P. (2005). Sequential pattern mining: A survey on issues and approaches. In Encyclopedia of data warehousing and mining (pp. 3–29).

  • McCann, M., Li, Y., Maguire, L., & Johnston, A. (2008). Causality challenge: Benchmarking relevant signal components for effective monitoring and process control. In Proceedings of the international conference on causality: objectives and assessment, Whistler, Canada (pp. 277–288).

  • Mobley, R. K. (1990). An introduction to predictive maintenance. Amsterdam: Elsevier Science.

    Google Scholar 

  • Oztemel, E., & Gursev, S. (2018). Literature review of industry 4.0 and related technologies. Journal of Intelligent Manufacturing. https://doi.org/10.1007/s10845-018-1433-8.

  • Pei, J., Han, J., Mortazavi-asl, B., Pinto, H., Chen, Q., Dayal, U., & Hsu, Mc. (2001). Prefixspan: Mining sequential patterns efficiently by prefix-projected pattern growth. In Proceedings of the international conference on data engineering—Heidelberg, Germany, April 2–6 (pp. 215–224).

  • Rivera Torres, P. J., Serrano Mercado, E. I., Llanes Santiago, O., & Anido Rifón, L. (2018). Modeling preventive maintenance of manufacturing processes with probabilistic Boolean networks with interventions. Journal of Intelligent Manufacturing, 29(8), 1941–1952. https://doi.org/10.1007/s10845-016-1226-x.

    Article  Google Scholar 

  • Sellami, C., Samet, A., & Bach Tobji, MA. (2018). Frequent chronicle mining: Application on predictive maintenance. In Proceedings of the IEEE international conference on machine learning and applications, Orlando, Florida, USA, December 17–20.

  • Srikant, R., & Agrawal, R. (1995). Mining sequential patterns. In Proceedings of the international conference on data engineering, Taipei, Taiwan, March 6–10 (pp. 3–14).

  • Srikant, R., & Agrawal, R. (1996). Mining sequential patterns: Generalizations and performance improvements. In Proceedings of the international conference on extending database technology, Avignon, France, March 25–29 (pp. 3–17).

  • Stone, M. (1974). Cross-validatory choice and assessment of statistical predictions. Journal of the Royal Statistical Society Series B (Methodological), 36, 111–147.

    Article  Google Scholar 

  • Vautier, A., Cordier, MO., & Quiniou, R. (2005). An inductive database for mining temporal patterns in event sequences. In Proceedings of the international joint conference on artificial intelligence, Edinburgh, Scotland, July 30–August 05 (pp. 1640–1641).

  • Xia, F., Yang, L. T., Wang, L., & Vinel, A. (2012). Internet of things. International Journal of Communication Systems, 25, 1101–1102.

    Article  Google Scholar 

  • Yan, X., Han, J., & Afshar, R. (2003), Clospan: Mining closed sequential patterns in large datasets. In Proceedings of the SIAM international conference on data mining, San Francisco, CA, USA, May 1–3 (pp. 166–177).

  • Yin, J., Zheng, Z., & Cao, L. (2012). Uspan: An efficient algorithm for mining high utility sequential patterns. In Proceedings of the ACM SIGKDD international conference on Knowledge discovery and data mining, Beijing, China, August 12–16 (pp. 660–668).

  • Zaki, M. J. (2001). Spade: An efficient algorithm for mining frequent sequences. Machine Learning, 42, 31–60.

    Article  Google Scholar 

  • Zerin, S. F., & Jeong, B. S. (2011). A fast contiguous sequential pattern mining technique in DNA data sequences using position information. IETE Technical Review, 28, 511–519.

    Article  Google Scholar 

  • Zhao, Q., & Bhowmick, SS. (2003). Sequential pattern mining: A survey. In Communications of The Ais—CAIS.

Download references

Acknowledgements

This work has received funding from INTERREG Upper Rhine (European Regional Development Fund) and the Ministries for Research of Baden- Wrttemberg, Rheinland-Pfalz (Germany) and from the Grand Est French Region in the framework of the Science Offensive Upper Rhine HALFBACK project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chayma Sellami.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Reviewers are invited to visit this site https://sites.google.com/view/frequent-chronicle-mining/accueil for more information on the development and results of the approach.

Appendices

Appendix A Proofs

Proof of Lemma 1

Let us prove \({{\,\mathrm{supp}\,}}(s') \le {{\,\mathrm{supp}\,}}(s)\) and \({{\,\mathrm{supp}\,}}(s') \ge {{\,\mathrm{supp}\,}}(s)\):

  • Since s is contained within \(s'\), any sequence containing \(s'\) also contains s. Thus, \({{\,\mathrm{supp}\,}}(s') \le {{\,\mathrm{supp}\,}}(s)\).

  • We are to prove that concatenation with \(\omega \) as a suffix does not reduce the support of a given sequence in \(FS_\omega \), i.e. \({{\,\mathrm{supp}\,}}(s') \ge {{\,\mathrm{supp}\,}}(s)\).

    Let \(\gamma = \left\{ \gamma _1, \gamma _2, \ldots , \gamma _{{{\,\mathrm{supp}\,}}(s)} \right\} \) be the set of sequences of \(D_\omega \) containing s. Then, we can write any \(\gamma _i\) as follows:

    $$\begin{aligned} \gamma _k = \alpha _1 \mathbin {\Diamond }_i \langle s_1 \rangle \mathbin {\Diamond }_i \alpha _2 \mathbin {\Diamond }_i \cdots \mathbin {\Diamond }_i \langle s_p \rangle \mathbin {\Diamond }_i \alpha _{p+1} \mathbin {\Diamond }_i \omega \end{aligned}$$

    where \(\alpha _i, i \in \llbracket 1, p+1 \rrbracket \) are the remaining sequences needed to build \(\gamma _k\).

    One can easily notice that \(s'\) is contained within \(\gamma _k\). Thus, \(\forall k \in \llbracket 1, {{\,\mathrm{supp}\,}}(s) \rrbracket , s' \subseteq \gamma _k\). Ultimately, \({{\,\mathrm{supp}\,}}(s') \ge {{\,\mathrm{supp}\,}}(s)\).

\(\square \)

Proof of proposition 1

Let us prove \(\mathcal {CS}_\omega \subseteq \left\{ s \mathbin {\Diamond }_s \omega \vert s \in \mathcal {CS}\right\} \) and \(\left\{ s \mathbin {\Diamond }_s \omega \vert s \in \mathcal {CS}\right\} \subseteq \mathcal {CS}_\omega \).

  • Let us use a reduction ad absurd argument.

    Assume \(\exists s_\omega \in \mathcal {CS}_\omega , \not \exists s \in \mathcal {CS}, s_\omega = s \mathbin {\Diamond }\omega \). Let \(s_\omega = \langle s_{\omega ,1}, s_{\omega ,2}, \ldots , s_{\omega ,p} \rangle \). Let us consider \(\gamma = \left\{ \gamma _i \right\} _{i=1}^{{{\,\mathrm{supp}\,}}(s_\omega )}\) the set of sequences of \(D_\omega \) containing \(s_\omega \). Then, as \(\forall i \in \llbracket 1, {{\,\mathrm{supp}\,}}(s_\omega ) \rrbracket , \gamma _i \in D_\omega \), we can write \(\gamma _i\) as follows:

    $$\begin{aligned} \gamma _i = \alpha _1 \mathbin {\Diamond }\langle s_1 \rangle \mathbin {\Diamond }\alpha _2 \mathbin {\Diamond }\ldots \mathbin {\Diamond }\langle s_p \rangle \mathbin {\Diamond }\alpha _{p+1} \mathbin {\Diamond }\omega \end{aligned}$$

    where \(\alpha _i, i \in \llbracket 1, p+1 \rrbracket \) are the remaining sequences needed to build \(\gamma _i\).

    Then, let \(s_\omega ' = s_\omega \mathbin {\Diamond }\omega \). This sequence contains \(s_\omega \), i.e. \(s_\omega '\) is a super-sequence of \(s_\omega \). Moreover, as per Lemma 1, \({{\,\mathrm{supp}\,}}(s_\omega ) = {{\,\mathrm{supp}\,}}(s_\omega \mathbin {\Diamond }\omega )\). Thus, \(s_\omega \) is not closed, so \(s_\omega \not \in \mathcal {CS}_\omega \), which is absurd. Therefore, \(\forall s_\omega \in \mathcal {CS}_\omega , \exists s \in \mathcal {CS}, s_\omega = s \mathbin {\Diamond }\omega \).

  • Let us consider \(s_\omega = s \mathbin {\Diamond }\omega \) with \(s \in \mathcal {CS}\). Let us show that \(s_\omega \in \mathcal {CS}_\omega \).

    • \(s \in \mathcal {CS}\Rightarrow s \in \mathcal {FS}\), so from lemma 1, \({{\,\mathrm{supp}\,}}(s_\omega ) = {{\,\mathrm{supp}\,}}(s)\). Moreover, let \(\{ \gamma _i \}\) be the sequences of D where s occurs, then \(s_\omega \) occurs in every sequence of \(\{ \gamma _i \mathbin {\Diamond }\omega \} \subseteq D_\omega \). So \(s_\omega \in \mathcal {FS}_\omega \).

    • Let us use a reductio ad absurdum argument. Let us assume \(\exists \beta _\omega \in \mathcal {FS}_\omega , {{\,\mathrm{supp}\,}}(s_\omega ) = {{\,\mathrm{supp}\,}}(\beta _\omega ) \wedge s_\omega \subseteq \beta _\omega \). Let \(\beta _\omega \) be of the form \(\beta \mathbin {\Diamond }_s \omega \), so \(\beta \in \mathcal {FS}\), without loss of generality. Lemma 1 gives us that \({{\,\mathrm{supp}\,}}(s_\omega ) = {{\,\mathrm{supp}\,}}(s)\) and \({{\,\mathrm{supp}\,}}(\beta _\omega ) = {{\,\mathrm{supp}\,}}(\beta )\), so \({{\,\mathrm{supp}\,}}(s) = {{\,\mathrm{supp}\,}}(\beta )\). In addition, we have \(s \subseteq \beta \). Therefore, \(s \not \in \mathcal {CS}\), which is absurd. Hence, there exist no \(\beta _\omega \) in \(\mathcal {FS}_\omega \) with same support as and which contains \(s_\omega \). \(\square \)

Appendix B Suffix database with i-concatenation

In Table 15, we consider a version of the suffix database presented in Table 3 but with i-concatenation.

Table 15 Sample suffix database with i-concatenation: P is the failure event, s-append at the end of each sequence

Let us recall the motivation to build a suffix database is to always extract the last event of a sequence (corresponding to a failure in our application), so that we do not have to re-check the database to extract such event or do case-based approaches for each sequence. Moreover, we would like to keep the same number of closed frequent sequences, as this number is an important part of their discrimination role.

The problem with i-concatenation is that the resulting suffix database can produce a closed frequent sequences set with P missing from some patterns, and can eventually produce more sequences. Using the i-concatenation suffix database, and still considering a relative threshold of 0.8, we can see that \(\langle A, A, A, B \rangle \) is closed (support of 0.8). It is contained within \(\langle A, A, A, \{ B, P \} \rangle \) (support of 0.6) and \(\langle A, A, A, \{ A, P \} \rangle \) (support of 0.2), but support of both of these sequences fall short to the one of \(\langle A, A, A, B \rangle \). Thus, equality of Proposition 1 does not hold, and one cannot ensure we will have the same number of closed frequent sequences, nor that the failure event will be contained within every extracted pattern.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sellami, C., Miranda, C., Samet, A. et al. On mining frequent chronicles for machine failure prediction. J Intell Manuf 31, 1019–1035 (2020). https://doi.org/10.1007/s10845-019-01492-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10845-019-01492-x

Keywords

Navigation