首页 > 最新文献

Journal of Computing and Information Science in Engineering最新文献

英文 中文
Formal Qualitative Physics-Based Reasoning for Functional Decomposition of Engineered Systems 工程系统功能分解的形式化定性物理推理
IF 3.1 3区 工程技术 Q1 Computer Science Pub Date : 2023-06-16 DOI: 10.1115/1.4062748
Xiaoyang Mao, Chiradeep Sen
Functional decomposition is an important task in early systems engineering and design, where the overall function of the system is resolved into the functions of its components or subassemblies. Conventionally, this task is performed manually, because of the possibility of multiple solution paths and the need for understanding the physics phenomena that could realize the desired effects. To this end, this paper presents a formal method for functional decomposition using physics-based qualitative reasoning. The formal representation includes three parts: (1) a natural language lexicon that can be used to detect the changes of physical states of material and energy flows, (2) a set of causation tables that abstracts the knowledge of qualitative physics by capturing the causal relations between the various quantities involved in a physical phenomenon or process, and (3) a process-to-subgraph mapping that translate the physical processes to function structure constructs. The algorithms use the above three representations and some additional topological reasoning to synthesize and assemble function structure graphs that are decompositions of a given black box model. The paper presents the formal representations and reasoning algorithms, and illustrates this method using an example function model of an air-heating device. It also presents the software implementation of the representations and the algorithms and uses it to validate the method’s ability to generate multiple decompositions from a black box function model.
在早期的系统工程和设计中,功能分解是一项重要的任务,其中系统的整体功能被分解为其组件或子组件的功能。通常,这项任务是手动执行的,因为可能存在多种解决路径,并且需要了解可以实现预期效果的物理现象。为此,本文提出了一种使用基于物理的定性推理进行功能分解的形式化方法。正式表示包括三个部分:(1)可用于检测物质和能量流的物理状态变化的自然语言词汇;(2)一组因果表,通过捕获物理现象或过程中涉及的各种量之间的因果关系,抽象出定性物理知识;(3)将物理过程转化为功能结构结构的过程到子图映射。该算法使用上述三种表示和一些额外的拓扑推理来合成和组装功能结构图,这些图是给定黑箱模型的分解。本文给出了该方法的形式化表示和推理算法,并以空气加热装置的函数模型为例进行了说明。它还介绍了表示和算法的软件实现,并使用它来验证该方法从黑盒函数模型生成多个分解的能力。
{"title":"Formal Qualitative Physics-Based Reasoning for Functional Decomposition of Engineered Systems","authors":"Xiaoyang Mao, Chiradeep Sen","doi":"10.1115/1.4062748","DOIUrl":"https://doi.org/10.1115/1.4062748","url":null,"abstract":"\u0000 Functional decomposition is an important task in early systems engineering and design, where the overall function of the system is resolved into the functions of its components or subassemblies. Conventionally, this task is performed manually, because of the possibility of multiple solution paths and the need for understanding the physics phenomena that could realize the desired effects. To this end, this paper presents a formal method for functional decomposition using physics-based qualitative reasoning. The formal representation includes three parts: (1) a natural language lexicon that can be used to detect the changes of physical states of material and energy flows, (2) a set of causation tables that abstracts the knowledge of qualitative physics by capturing the causal relations between the various quantities involved in a physical phenomenon or process, and (3) a process-to-subgraph mapping that translate the physical processes to function structure constructs. The algorithms use the above three representations and some additional topological reasoning to synthesize and assemble function structure graphs that are decompositions of a given black box model. The paper presents the formal representations and reasoning algorithms, and illustrates this method using an example function model of an air-heating device. It also presents the software implementation of the representations and the algorithms and uses it to validate the method’s ability to generate multiple decompositions from a black box function model.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82563559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised Domain Deep Transfer Learning Approach for Rolling Bearing Remaining Useful Life Estimation 滚动轴承剩余使用寿命估计的无监督域深度迁移学习方法
IF 3.1 3区 工程技术 Q1 Computer Science Pub Date : 2023-06-12 DOI: 10.1115/1.4062731
M. Rathore, S. Harsha
Accurate estimation of remaining useful life (RUL) becomes a crucial task when bearing operates under dynamic working conditions. The environmental noise, different operating conditions, and multiple fault modes result in the existence of considerable distribution and feature shifts between different domains. To address these issues, a novel framework TSBiLSTM is proposed that utilizes 1DCNN, SBiLSTM, and AM synergically to extract highly abstract feature representation, and domain adaptation is realized using the MK-MMD (multi-kernel maximum mean discrepancy) metric and domain confusion layer. One-dimensional CNN (1DCNN) and stacked bi-directional LSTM (SBiLSTM) are utilized to take advantage of spatio-temporal features with attention mechanism (AM) to selectively process the influential degradation information. MK-MMD provides effective kernel selection along with a domain confusion layer to effectively extract domain invariant features. Both experimentation and comparison studies are conducted to verify the effectiveness and feasibility of the proposed TSBiLSTM model. The generalized performance is demonstrated using IEEE PHM datasets based on RMSE, MAE, absolute percent mean error, and percentage mean error. The promising RUL prediction results validate the superiority and usability of the proposed TSBiLSTM model as a promising prognostic tool for dynamic operating conditions.
轴承在动态工况下运行时,准确估计剩余使用寿命(RUL)是一项至关重要的任务。由于环境噪声、不同的工作条件和多种故障模式,导致不同域之间存在较大的分布和特征偏移。为了解决这些问题,提出了一种新的框架TSBiLSTM,该框架利用1DCNN、SBiLSTM和AM协同提取高度抽象的特征表示,并利用MK-MMD(多核最大平均差异)度量和域混淆层实现域自适应。采用一维CNN (1DCNN)和堆叠双向LSTM (SBiLSTM),利用具有注意机制的时空特征对有影响的退化信息进行选择性处理。MK-MMD提供了有效的核选择和域混淆层,以有效地提取域不变特征。通过实验和对比研究验证了所提出的TSBiLSTM模型的有效性和可行性。使用基于RMSE、MAE、绝对平均误差百分比和平均误差百分比的IEEE PHM数据集验证了该算法的广义性能。有希望的RUL预测结果验证了TSBiLSTM模型作为动态运行条件预测工具的优越性和可用性。
{"title":"Unsupervised Domain Deep Transfer Learning Approach for Rolling Bearing Remaining Useful Life Estimation","authors":"M. Rathore, S. Harsha","doi":"10.1115/1.4062731","DOIUrl":"https://doi.org/10.1115/1.4062731","url":null,"abstract":"\u0000 Accurate estimation of remaining useful life (RUL) becomes a crucial task when bearing operates under dynamic working conditions. The environmental noise, different operating conditions, and multiple fault modes result in the existence of considerable distribution and feature shifts between different domains. To address these issues, a novel framework TSBiLSTM is proposed that utilizes 1DCNN, SBiLSTM, and AM synergically to extract highly abstract feature representation, and domain adaptation is realized using the MK-MMD (multi-kernel maximum mean discrepancy) metric and domain confusion layer. One-dimensional CNN (1DCNN) and stacked bi-directional LSTM (SBiLSTM) are utilized to take advantage of spatio-temporal features with attention mechanism (AM) to selectively process the influential degradation information. MK-MMD provides effective kernel selection along with a domain confusion layer to effectively extract domain invariant features. Both experimentation and comparison studies are conducted to verify the effectiveness and feasibility of the proposed TSBiLSTM model. The generalized performance is demonstrated using IEEE PHM datasets based on RMSE, MAE, absolute percent mean error, and percentage mean error. The promising RUL prediction results validate the superiority and usability of the proposed TSBiLSTM model as a promising prognostic tool for dynamic operating conditions.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77440187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence Aided Design (AIAD) of Hull Form of Unmanned Underwater Vehicles (UUVs) for Minimization of Energy Consumption 面向能耗最小化的无人潜航器船体形态人工智能辅助设计(AIAD)
IF 3.1 3区 工程技术 Q1 Computer Science Pub Date : 2023-06-02 DOI: 10.1115/1.4062661
Yu Ao, Jian Xu, Dapeng Zhang, Shaofan Li
Designing an excellent hull to reduce the path energy consumption of UUV sailing is crucial to improving UUV energy endurance. However, due to the relative velocity and attack angle between the UUV and the ocean current will frequently change during the entire path, realizing a path energy consumption-based UUV hull design will result in a tremendous amount of calculation. In this work, based on the idea of articial intelligence-aided design (AIAD), we have successfully developed a data-driven design methodology for UUV hull design. Specically, we first developed and implemented deep learning (DL) algorithm for predicting the resis- tance of the UUV with different hull shapes under different velocities and attack angles. By mixing the proposed DL algorithm and introducing the particle swarm optimization (PSO) algorithm into the UUV hull design, we proposed a data-driven AIAD methodology. A path energy consumption-based experiment has been conducted based on the proposed method- ology, where the design results showed that the proposed design methodology maintains eciency and reliability while overcoming the high design workload.
设计优良的船体以降低UUV航行的路径能量消耗是提高UUV能量续航能力的关键。然而,由于UUV与海流之间的相对速度和攻角在整个路径中会频繁变化,实现基于路径能耗的UUV船体设计将导致巨大的计算量。在这项工作中,基于人工智能辅助设计(AIAD)的思想,我们成功地开发了一种用于UUV船体设计的数据驱动设计方法。具体而言,我们首先开发并实现了深度学习(DL)算法,用于预测不同船体形状的UUV在不同速度和攻角下的阻抗。通过混合DL算法并将粒子群优化(PSO)算法引入到UUV船体设计中,提出了一种数据驱动的AIAD方法。在此基础上进行了基于路径能耗的实验,设计结果表明,该设计方法在克服高设计工作量的同时保持了效率和可靠性。
{"title":"Artificial Intelligence Aided Design (AIAD) of Hull Form of Unmanned Underwater Vehicles (UUVs) for Minimization of Energy Consumption","authors":"Yu Ao, Jian Xu, Dapeng Zhang, Shaofan Li","doi":"10.1115/1.4062661","DOIUrl":"https://doi.org/10.1115/1.4062661","url":null,"abstract":"\u0000 Designing an excellent hull to reduce the path energy consumption of UUV sailing is crucial to improving UUV energy endurance. However, due to the relative velocity and attack angle between the UUV and the ocean current will frequently change during the entire path, realizing a path energy consumption-based UUV hull design will result in a tremendous amount of calculation. In this work, based on the idea of articial intelligence-aided design (AIAD), we have successfully developed a data-driven design methodology for UUV hull design. Specically, we first developed and implemented deep learning (DL) algorithm for predicting the resis- tance of the UUV with different hull shapes under different velocities and attack angles. By mixing the proposed DL algorithm and introducing the particle swarm optimization (PSO) algorithm into the UUV hull design, we proposed a data-driven AIAD methodology. A path energy consumption-based experiment has been conducted based on the proposed method- ology, where the design results showed that the proposed design methodology maintains eciency and reliability while overcoming the high design workload.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77990398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
“I can see your password”: A case study about cybersecurity risks in mid-air interactions of mixed reality-based smart manufacturing applications “我能看到你的密码”:基于混合现实的智能制造应用空中交互网络安全风险案例研究
IF 3.1 3区 工程技术 Q1 Computer Science Pub Date : 2023-06-01 DOI: 10.1115/1.4062658
Wenhao Yang, Xiwen Dengxiong, Xueting Wang, Yidan Hu, Yunbo Zhang
This paper aims to present a potential cybersecurity risk existing in Mixed Reality (MR)-based smart manufacturing applications that decipher digital passwords through a single RGB camera to capture the user's mid-air gestures. We first created a testbed, which is an MR-based smart factory management system consisting of mid-air gesture-based user interfaces (UIs) on a video see-through MR head-mounted display (HMD). To interact with UIs and input information, the user's hand movements and gestures are tracked by the MR system. We set up the experiment to be the estimation of the password input by users through mid-air hand gestures on a virtual numeric keypad. To achieve this goal, we developed a lightweight machine learning-based hand position tracking and gesture recognition method. This method takes either video streaming or recorded video clips (taken by a single RGB camera in front of the user) as input, where the videos record the users' hand movements and gestures but not the virtual UIs. With the assumption of the known size, position, and layout of the keypad, the machine learning method estimates the password through hand gesture recognition and finger position detection. The evaluation result indicates the effectiveness of the proposed method, with a high accuracy of 97.03%, 94.06%, and 83.83% for 2-digit, 4-digit, and 6-digit passwords, respectively, using real-time video streaming as input.
本文旨在介绍基于混合现实(MR)的智能制造应用中存在的潜在网络安全风险,该应用通过单个RGB相机破译数字密码以捕捉用户的半空中手势。我们首先创建了一个试验台,这是一个基于核磁共振的智能工厂管理系统,由基于空中手势的用户界面(ui)组成,该界面位于视频透明的核磁共振头戴式显示器(HMD)上。为了与ui和输入信息进行交互,用户的手部动作和手势由MR系统跟踪。我们将实验设置为用户通过虚拟数字键盘上的空中手势输入密码的估计。为了实现这一目标,我们开发了一种轻量级的基于机器学习的手部位置跟踪和手势识别方法。这种方法采用视频流或录制的视频片段(由用户面前的单个RGB摄像头拍摄)作为输入,其中视频记录用户的手部动作和手势,但不记录虚拟ui。假设键盘的大小、位置和布局已知,机器学习方法通过手势识别和手指位置检测来估计密码。评价结果表明了该方法的有效性,使用实时视频流作为输入,对2位、4位和6位密码的识别率分别为97.03%、94.06%和83.83%。
{"title":"“I can see your password”: A case study about cybersecurity risks in mid-air interactions of mixed reality-based smart manufacturing applications","authors":"Wenhao Yang, Xiwen Dengxiong, Xueting Wang, Yidan Hu, Yunbo Zhang","doi":"10.1115/1.4062658","DOIUrl":"https://doi.org/10.1115/1.4062658","url":null,"abstract":"\u0000 This paper aims to present a potential cybersecurity risk existing in Mixed Reality (MR)-based smart manufacturing applications that decipher digital passwords through a single RGB camera to capture the user's mid-air gestures. We first created a testbed, which is an MR-based smart factory management system consisting of mid-air gesture-based user interfaces (UIs) on a video see-through MR head-mounted display (HMD). To interact with UIs and input information, the user's hand movements and gestures are tracked by the MR system. We set up the experiment to be the estimation of the password input by users through mid-air hand gestures on a virtual numeric keypad. To achieve this goal, we developed a lightweight machine learning-based hand position tracking and gesture recognition method. This method takes either video streaming or recorded video clips (taken by a single RGB camera in front of the user) as input, where the videos record the users' hand movements and gestures but not the virtual UIs. With the assumption of the known size, position, and layout of the keypad, the machine learning method estimates the password through hand gesture recognition and finger position detection. The evaluation result indicates the effectiveness of the proposed method, with a high accuracy of 97.03%, 94.06%, and 83.83% for 2-digit, 4-digit, and 6-digit passwords, respectively, using real-time video streaming as input.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43716343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges and Opportunities for Machine Learning in Multiscale Computational Modeling 机器学习在多尺度计算建模中的挑战与机遇
3区 工程技术 Q1 Computer Science Pub Date : 2023-05-25 DOI: 10.1115/1.4062495
Phong Nguyen, Joseph Choi, H.S. Udaykumar, Stephen Baek
Abstract Many mechanical engineering applications call for multiscale computational modeling and simulation. However, solving for complex multiscale systems remains computationally onerous due to the high dimensionality of the solution space. Recently, machine learning (ML) has emerged as a promising solution that can either serve as a surrogate for, accelerate or augment traditional numerical methods. Pioneering work has demonstrated that ML provides solutions to governing systems of equations with comparable accuracy to those obtained using direct numerical methods, but with significantly faster computational speed. These high-speed, high-fidelity estimations can facilitate the solving of complex multiscale systems by providing a better initial solution to traditional solvers. This paper provides a perspective on the opportunities and challenges of using ML for complex multiscale modeling and simulation. We first outline the current state-of-the-art ML approaches for simulating multiscale systems and highlight some of the landmark developments. Next, we discuss current challenges for ML in multiscale computational modeling, such as the data and discretization dependence, interpretability, and data sharing and collaborative platform development. Finally, we suggest several potential research directions for the future.
许多机械工程应用需要多尺度计算建模和仿真。然而,由于解空间的高维性,求解复杂的多尺度系统仍然需要大量的计算。最近,机器学习(ML)已经成为一种很有前途的解决方案,可以替代、加速或增强传统的数值方法。开创性的工作已经证明,ML提供的方程控制系统的解决方案与使用直接数值方法获得的解决方案具有相当的精度,但计算速度要快得多。这些高速、高保真的估计可以通过为传统求解器提供更好的初始解来促进复杂多尺度系统的求解。本文提供了使用机器学习进行复杂的多尺度建模和仿真的机遇和挑战的观点。我们首先概述了当前用于模拟多尺度系统的最先进的ML方法,并强调了一些具有里程碑意义的发展。接下来,我们讨论了当前ML在多尺度计算建模中的挑战,如数据和离散化依赖、可解释性、数据共享和协作平台开发。最后,提出了未来可能的研究方向。
{"title":"Challenges and Opportunities for Machine Learning in Multiscale Computational Modeling","authors":"Phong Nguyen, Joseph Choi, H.S. Udaykumar, Stephen Baek","doi":"10.1115/1.4062495","DOIUrl":"https://doi.org/10.1115/1.4062495","url":null,"abstract":"Abstract Many mechanical engineering applications call for multiscale computational modeling and simulation. However, solving for complex multiscale systems remains computationally onerous due to the high dimensionality of the solution space. Recently, machine learning (ML) has emerged as a promising solution that can either serve as a surrogate for, accelerate or augment traditional numerical methods. Pioneering work has demonstrated that ML provides solutions to governing systems of equations with comparable accuracy to those obtained using direct numerical methods, but with significantly faster computational speed. These high-speed, high-fidelity estimations can facilitate the solving of complex multiscale systems by providing a better initial solution to traditional solvers. This paper provides a perspective on the opportunities and challenges of using ML for complex multiscale modeling and simulation. We first outline the current state-of-the-art ML approaches for simulating multiscale systems and highlight some of the landmark developments. Next, we discuss current challenges for ML in multiscale computational modeling, such as the data and discretization dependence, interpretability, and data sharing and collaborative platform development. Finally, we suggest several potential research directions for the future.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134974636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Information Embedding for Secure Manufacturing: Challenges and Research Opportunities 面向安全制造的信息嵌入:挑战与研究机遇
IF 3.1 3区 工程技术 Q1 Computer Science Pub Date : 2023-05-23 DOI: 10.1115/1.4062600
K. Elsayed, Adam Dachowicz, M. Atallah, Jitesh H. Panchal
The digitization of manufacturing has transformed the product realization process across many industries, from aerospace and automotive to medicine and healthcare. While this progress has accelerated product development cycles and enabled designers to create products with previously unachievable complexity and precision, it has also opened the door to a broad array of unique security concerns, from theft of intellectual property to supply chain attacks and counterfeiting. To address these concerns, information embedding (e.g., watermarks and fingerprints) has emerged as a promising solution that enhances product security and traceability. Information embedding techniques involve storing unique and secure information within parts, making these parts easier to track and to verify for authenticity. However, a successful information embedding scheme requires information to be transmitted in physical parts both securely and in a way that is accessible to end users. Ensuring these qualities introduces unique computational and engineering challenges. For instance, these qualities require the embedding scheme designer to have an accurate model of the cyber-physical processes needed to embed information during manufacturing and read that information later in the product life cycle, as well as models of the cyber-physical, economic, and/or industrial processes that may degrade that information through natural wear-and-tear, or through intentional attacks by determined adversaries. This paper discusses challenges and research opportunities for the engineering design and manufacturing community in developing methods for efficient information embedding in manufactured products.
制造业的数字化已经改变了许多行业的产品实现过程,从航空航天和汽车到医药和医疗保健。虽然这一进步加快了产品开发周期,使设计师能够创造出以前无法实现的复杂性和精度的产品,但它也为一系列独特的安全问题打开了大门,从知识产权盗窃到供应链攻击和假冒。为了解决这些问题,信息嵌入(例如,水印和指纹)已经成为一种有前途的解决方案,可以提高产品的安全性和可追溯性。信息嵌入技术涉及在零件中存储唯一和安全的信息,使这些零件更容易跟踪和验证真实性。然而,一个成功的信息嵌入方案要求信息在物理部件中以安全的方式传输,并以最终用户可访问的方式传输。确保这些品质引入了独特的计算和工程挑战。例如,这些品质要求嵌入方案设计者拥有在制造过程中嵌入信息所需的网络物理过程的精确模型,以及在产品生命周期后期读取该信息所需的网络物理、经济和/或工业过程的模型,这些模型可能会通过自然磨损或通过有决心的对手的故意攻击而降低该信息。本文讨论了工程设计和制造界在开发制造产品中有效信息嵌入方法方面面临的挑战和研究机遇。
{"title":"Information Embedding for Secure Manufacturing: Challenges and Research Opportunities","authors":"K. Elsayed, Adam Dachowicz, M. Atallah, Jitesh H. Panchal","doi":"10.1115/1.4062600","DOIUrl":"https://doi.org/10.1115/1.4062600","url":null,"abstract":"\u0000 The digitization of manufacturing has transformed the product realization process across many industries, from aerospace and automotive to medicine and healthcare. While this progress has accelerated product development cycles and enabled designers to create products with previously unachievable complexity and precision, it has also opened the door to a broad array of unique security concerns, from theft of intellectual property to supply chain attacks and counterfeiting. To address these concerns, information embedding (e.g., watermarks and fingerprints) has emerged as a promising solution that enhances product security and traceability. Information embedding techniques involve storing unique and secure information within parts, making these parts easier to track and to verify for authenticity. However, a successful information embedding scheme requires information to be transmitted in physical parts both securely and in a way that is accessible to end users. Ensuring these qualities introduces unique computational and engineering challenges. For instance, these qualities require the embedding scheme designer to have an accurate model of the cyber-physical processes needed to embed information during manufacturing and read that information later in the product life cycle, as well as models of the cyber-physical, economic, and/or industrial processes that may degrade that information through natural wear-and-tear, or through intentional attacks by determined adversaries. This paper discusses challenges and research opportunities for the engineering design and manufacturing community in developing methods for efficient information embedding in manufactured products.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87204870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Zero-Trust for the System Design Lifecycle 零信任的系统设计生命周期
IF 3.1 3区 工程技术 Q1 Computer Science Pub Date : 2023-05-23 DOI: 10.1115/1.4062597
Douglas L. Van Bossuyt, Britta Hale, R. Arlitt, N. Papakonstantinou
In an age of worsening global threat landscape and accelerating uncertainty, the design and manufacture of systems must increase resilience and robustness across both the system itself and the entire systems design process. We generally trust our colleagues after initial clearance/background checks; and systems to function as intended and within operating parameters after safety engineering review, verification, validation, and/or system qualification testing. This approach has led to increased insider threat impacts; thus we suggest moving to the “trust, but verify” approach embodied by the Zero-Trust paradigm. Zero-Trust is increasingly adopted for network security but has not seen wide adoption in systems design and operation. Achieving the goal of Zero-Trust throughout the systems lifecycle will help to ensure that no single bad actor -- whether human or machine learning / artificial intelligence (ML/AI) -- can induce failure anywhere in a system's lifecycle. Additionally, while ML/AI and their associated risks are already entrenched within the operations phase of many systems' lifecycles, ML/AI is gaining traction during the design phase. For example, generative design algorithms are increasingly popular but there is less understanding of potential risks. Adopting the Zero-Trust philosophy helps ensure robust and resilient design, manufacture, operations, maintenance, upgrade, and disposal of systems. We outline the rewards and challenges of implementing Zero-Trust and propose the Framework for Zero-Trust for the System Design Lifecycle. The paper highlights several areas of ongoing research with focus on high priority areas where the community should focus efforts.
在全球威胁形势恶化和不确定性加剧的时代,系统的设计和制造必须在系统本身和整个系统设计过程中增加弹性和稳健性。经过初步的背景调查后,我们通常会信任我们的同事;经过安全工程审查、验证、确认和/或系统资格测试后,系统按预期和在操作参数内运行。这种方法导致内部威胁的影响增加;因此,我们建议转向零信任范式所体现的“信任,但要验证”的方法。零信任在网络安全方面的应用越来越广泛,但在系统设计和操作方面还没有得到广泛的应用。在整个系统生命周期中实现零信任的目标将有助于确保没有任何一个不良行为者——无论是人类还是机器学习/人工智能(ML/AI)——可以在系统生命周期的任何地方引发故障。此外,虽然ML/AI及其相关风险在许多系统生命周期的操作阶段已经根深蒂固,但ML/AI在设计阶段正在获得牵引力。例如,生成设计算法越来越受欢迎,但对潜在风险的了解却很少。采用零信任理念有助于确保系统的稳健和弹性设计、制造、运营、维护、升级和处置。我们概述了实现零信任的回报和挑战,并提出了系统设计生命周期的零信任框架。本文强调了几个正在进行的研究领域,重点是社区应该集中精力的高优先级领域。
{"title":"Zero-Trust for the System Design Lifecycle","authors":"Douglas L. Van Bossuyt, Britta Hale, R. Arlitt, N. Papakonstantinou","doi":"10.1115/1.4062597","DOIUrl":"https://doi.org/10.1115/1.4062597","url":null,"abstract":"\u0000 In an age of worsening global threat landscape and accelerating uncertainty, the design and manufacture of systems must increase resilience and robustness across both the system itself and the entire systems design process. We generally trust our colleagues after initial clearance/background checks; and systems to function as intended and within operating parameters after safety engineering review, verification, validation, and/or system qualification testing. This approach has led to increased insider threat impacts; thus we suggest moving to the “trust, but verify” approach embodied by the Zero-Trust paradigm. Zero-Trust is increasingly adopted for network security but has not seen wide adoption in systems design and operation. Achieving the goal of Zero-Trust throughout the systems lifecycle will help to ensure that no single bad actor -- whether human or machine learning / artificial intelligence (ML/AI) -- can induce failure anywhere in a system's lifecycle. Additionally, while ML/AI and their associated risks are already entrenched within the operations phase of many systems' lifecycles, ML/AI is gaining traction during the design phase. For example, generative design algorithms are increasingly popular but there is less understanding of potential risks. Adopting the Zero-Trust philosophy helps ensure robust and resilient design, manufacture, operations, maintenance, upgrade, and disposal of systems. We outline the rewards and challenges of implementing Zero-Trust and propose the Framework for Zero-Trust for the System Design Lifecycle. The paper highlights several areas of ongoing research with focus on high priority areas where the community should focus efforts.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72485877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Feature Extraction Based on Self-Supervised Learning for Remaining Useful Life Prediction 基于自监督学习的剩余使用寿命预测特征提取
IF 3.1 3区 工程技术 Q1 Computer Science Pub Date : 2023-05-23 DOI: 10.1115/1.4062599
Zhenjun Yu, Ningbo Lei, Yu Mo, Xin Xu, Xiu Li, Biqing Huang
The prediction of the remaining useful life (RUL) is of great significance to ensure the safe operation of industrial equipment and to reduce the cost of regular preventive maintenance. However, the complex operating conditions and various fault modes make it difficult to extract features containing more degradation information with existing prediction methods. We propose a self-supervised learning method based on variational automatic encoder (VAE) to extract features of data's operating conditions and fault modes. Then the clustering algorithm is applied to the extracted features to divide data from different failure modes into different categories and reduce the impact of complex working conditions on the estimation accuracy. In order to verify the effectiveness of the proposed method, we conduct experiments with different network structures on the C-MAPSS dataset, and the results verified that our method can effectively improve the feature extraction capability of the model. In addition, the experimental results further demonstrate the superiority and necessity of using hidden features for clustering rather than raw data.
剩余使用寿命(RUL)的预测对于保证工业设备的安全运行和降低定期预防性维护的成本具有重要意义。然而,复杂的运行条件和多种故障模式使得现有的预测方法难以提取包含更多退化信息的特征。提出了一种基于变分自动编码器(VAE)的自监督学习方法来提取数据运行状态和故障模式的特征。然后对提取的特征应用聚类算法,将不同失效模式下的数据进行分类,降低复杂工况对估计精度的影响。为了验证所提方法的有效性,我们在C-MAPSS数据集上进行了不同网络结构的实验,结果验证了我们的方法可以有效地提高模型的特征提取能力。此外,实验结果进一步证明了使用隐藏特征而不是原始数据进行聚类的优越性和必要性。
{"title":"Feature Extraction Based on Self-Supervised Learning for Remaining Useful Life Prediction","authors":"Zhenjun Yu, Ningbo Lei, Yu Mo, Xin Xu, Xiu Li, Biqing Huang","doi":"10.1115/1.4062599","DOIUrl":"https://doi.org/10.1115/1.4062599","url":null,"abstract":"\u0000 The prediction of the remaining useful life (RUL) is of great significance to ensure the safe operation of industrial equipment and to reduce the cost of regular preventive maintenance. However, the complex operating conditions and various fault modes make it difficult to extract features containing more degradation information with existing prediction methods. We propose a self-supervised learning method based on variational automatic encoder (VAE) to extract features of data's operating conditions and fault modes. Then the clustering algorithm is applied to the extracted features to divide data from different failure modes into different categories and reduce the impact of complex working conditions on the estimation accuracy. In order to verify the effectiveness of the proposed method, we conduct experiments with different network structures on the C-MAPSS dataset, and the results verified that our method can effectively improve the feature extraction capability of the model. In addition, the experimental results further demonstrate the superiority and necessity of using hidden features for clustering rather than raw data.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79114346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual Footwear Try-on in Augmented Reality using Deep Learning Models 使用深度学习模型的增强现实虚拟鞋类试穿
IF 3.1 3区 工程技术 Q1 Computer Science Pub Date : 2023-05-23 DOI: 10.1115/1.4062596
Chih-Hsing Chu, Ting-Yang Chou, S. Liu
Customization is an increasing trend in fashion product industry to reflect individual lifestyles. Previous studies have examined the idea of virtual footwear try-on in augmented reality (AR) using a depth camera. However, the depth camera restricts the deployment of this technology in practice. This research proposes to estimate the 6-DoF pose of a human foot from a color image using deep learning models to solve the problem. We construct a training dataset consisting of synthetic and real foot images that are automatically annotated. Three convolutional neural network models (DOPE, DOPE2, and YOLO6d) are trained with the dataset to predict the foot pose in real-time. The model performances are evaluated using metrics for accuracy, computational efficiency, and training time. A prototyping system implementing the best model demonstrates the feasibility of virtual footwear try-on using a RGB camera. Test results also indicate the necessity of real training data to bridge the reality gap in estimating the human foot pose.
个性化定制是反映个人生活方式的时尚产品行业日益增长的趋势。之前的研究已经使用深度相机检验了在增强现实(AR)中虚拟试穿鞋子的想法。然而,深度相机限制了该技术在实践中的应用。本研究提出利用深度学习模型从彩色图像中估计人类足部的六自由度姿态来解决这一问题。我们构建了一个训练数据集,包括自动注释的合成和真实脚图像。利用该数据集训练三个卷积神经网络模型(DOPE、DOPE2和YOLO6d),实时预测足部姿态。使用准确性、计算效率和训练时间来评估模型的性能。实现最佳模型的原型系统演示了使用RGB相机虚拟试穿鞋子的可行性。测试结果也表明,需要真实的训练数据来弥补人体足部姿态估计的现实差距。
{"title":"Virtual Footwear Try-on in Augmented Reality using Deep Learning Models","authors":"Chih-Hsing Chu, Ting-Yang Chou, S. Liu","doi":"10.1115/1.4062596","DOIUrl":"https://doi.org/10.1115/1.4062596","url":null,"abstract":"\u0000 Customization is an increasing trend in fashion product industry to reflect individual lifestyles. Previous studies have examined the idea of virtual footwear try-on in augmented reality (AR) using a depth camera. However, the depth camera restricts the deployment of this technology in practice. This research proposes to estimate the 6-DoF pose of a human foot from a color image using deep learning models to solve the problem. We construct a training dataset consisting of synthetic and real foot images that are automatically annotated. Three convolutional neural network models (DOPE, DOPE2, and YOLO6d) are trained with the dataset to predict the foot pose in real-time. The model performances are evaluated using metrics for accuracy, computational efficiency, and training time. A prototyping system implementing the best model demonstrates the feasibility of virtual footwear try-on using a RGB camera. Test results also indicate the necessity of real training data to bridge the reality gap in estimating the human foot pose.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48862810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research Issues in the Generative Design of Cyber-Physical-Human Systems 信息-物理-人系统生成设计研究问题
IF 3.1 3区 工程技术 Q1 Computer Science Pub Date : 2023-05-23 DOI: 10.1115/1.4062598
D. Rosen, C. Choi
Cyber-physical-human systems (CPHS) are smart products and systems that offer services to their customers, supported by back-end systems (e.g., information, finance) and other infrastructure. In this paper, initial concepts and research issues are presented regarding the computational design of CPHS, CPHS families, and generations of these families. Significant research gaps are identified that should drive future research directions. The approach proposed here is a novel combination of generative and configuration design methods with product family design methodology and an explicit consideration of usability across all human stakeholders. With this approach, a wide variety of CPHS, including customized CPHS, can be developed quickly by sharing technologies and modules across CPHS family members, while ensuring user acceptance. The domain of assistive technology is used in this paper to provide an example field of practice that could benefit from a systematic design methodology and opportunities to leverage technology solutions.
网络-物理-人类系统(CPHS)是一种智能产品和系统,由后端系统(如信息、金融)和其他基础设施提供支持,为客户提供服务。本文提出了CPHS、CPHS族及其世代的计算设计的初步概念和研究问题。发现了重要的研究空白,应该推动未来的研究方向。这里提出的方法是生成和配置设计方法与产品族设计方法的新颖结合,并明确考虑了所有人类利益相关者的可用性。通过这种方法,可以通过在CPHS家族成员之间共享技术和模块来快速开发各种CPHS,包括定制的CPHS,同时确保用户接受。本文中使用的辅助技术领域提供了一个可以从系统设计方法和利用技术解决方案的机会中受益的实践示例领域。
{"title":"Research Issues in the Generative Design of Cyber-Physical-Human Systems","authors":"D. Rosen, C. Choi","doi":"10.1115/1.4062598","DOIUrl":"https://doi.org/10.1115/1.4062598","url":null,"abstract":"\u0000 Cyber-physical-human systems (CPHS) are smart products and systems that offer services to their customers, supported by back-end systems (e.g., information, finance) and other infrastructure. In this paper, initial concepts and research issues are presented regarding the computational design of CPHS, CPHS families, and generations of these families. Significant research gaps are identified that should drive future research directions. The approach proposed here is a novel combination of generative and configuration design methods with product family design methodology and an explicit consideration of usability across all human stakeholders. With this approach, a wide variety of CPHS, including customized CPHS, can be developed quickly by sharing technologies and modules across CPHS family members, while ensuring user acceptance. The domain of assistive technology is used in this paper to provide an example field of practice that could benefit from a systematic design methodology and opportunities to leverage technology solutions.","PeriodicalId":54856,"journal":{"name":"Journal of Computing and Information Science in Engineering","volume":null,"pages":null},"PeriodicalIF":3.1,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78249118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computing and Information Science in Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1