scholarly journals Integration of Blockchain, IoT and Machine Learning for Multistage Quality Control and Enhancing Security in Smart Manufacturing

Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1467 ◽  
Author(s):  
Zeinab Shahbazi ◽  
Yung-Cheol Byun

Smart manufacturing systems are growing based on the various requests for predicting the reliability and quality of equipment. Many machine learning techniques are being examined to that end. Another issue which considers an important part of industry is data security and management. To overcome the problems mentioned above, we applied the integrated methods of blockchain and machine learning to secure system transactions and handle a dataset to overcome the fake dataset. To manage and analyze the collected dataset, big data techniques were used. The blockchain system was implemented in the private Hyperledger Fabric platform. Similarly, the fault diagnosis prediction aspect was evaluated based on the hybrid prediction technique. The system’s quality control was evaluated based on non-linear machine learning techniques, which modeled that complex environment and found the true positive rate of the system’s quality control approach.

Materials ◽  
2021 ◽  
Vol 14 (5) ◽  
pp. 1089
Author(s):  
Sung-Hee Kim ◽  
Chanyoung Jeong

This study aims to demonstrate the feasibility of applying eight machine learning algorithms to predict the classification of the surface characteristics of titanium oxide (TiO2) nanostructures with different anodization processes. We produced a total of 100 samples, and we assessed changes in TiO2 nanostructures’ thicknesses by performing anodization. We successfully grew TiO2 films with different thicknesses by one-step anodization in ethylene glycol containing NH4F and H2O at applied voltage differences ranging from 10 V to 100 V at various anodization durations. We found that the thicknesses of TiO2 nanostructures are dependent on anodization voltages under time differences. Therefore, we tested the feasibility of applying machine learning algorithms to predict the deformation of TiO2. As the characteristics of TiO2 changed based on the different experimental conditions, we classified its surface pore structure into two categories and four groups. For the classification based on granularity, we assessed layer creation, roughness, pore creation, and pore height. We applied eight machine learning techniques to predict classification for binary and multiclass classification. For binary classification, random forest and gradient boosting algorithm had relatively high performance. However, all eight algorithms had scores higher than 0.93, which signifies high prediction on estimating the presence of pore. In contrast, decision tree and three ensemble methods had a relatively higher performance for multiclass classification, with an accuracy rate greater than 0.79. The weakest algorithm used was k-nearest neighbors for both binary and multiclass classifications. We believe that these results show that we can apply machine learning techniques to predict surface quality improvement, leading to smart manufacturing technology to better control color appearance, super-hydrophobicity, super-hydrophilicity or batter efficiency.


Electronics ◽  
2021 ◽  
Vol 10 (22) ◽  
pp. 2857
Author(s):  
Laura Vigoya ◽  
Diego Fernandez ◽  
Victor Carneiro ◽  
Francisco Nóvoa

With advancements in engineering and science, the application of smart systems is increasing, generating a faster growth of the IoT network traffic. The limitations due to IoT restricted power and computing devices also raise concerns about security vulnerabilities. Machine learning-based techniques have recently gained credibility in a successful application for the detection of network anomalies, including IoT networks. However, machine learning techniques cannot work without representative data. Given the scarcity of IoT datasets, the DAD emerged as an instrument for knowing the behavior of dedicated IoT-MQTT networks. This paper aims to validate the DAD dataset by applying Logistic Regression, Naive Bayes, Random Forest, AdaBoost, and Support Vector Machine to detect traffic anomalies in IoT. To obtain the best results, techniques for handling unbalanced data, feature selection, and grid search for hyperparameter optimization have been used. The experimental results show that the proposed dataset can achieve a high detection rate in all the experiments, providing the best mean accuracy of 0.99 for the tree-based models, with a low false-positive rate, ensuring effective anomaly detection.


Author(s):  
Zixuan Yang ◽  
Huaiyuan Teng ◽  
Jeremy Goldhawk ◽  
Ilya Kovalenko ◽  
Efe C. Balta ◽  
...  

Abstract Dimensional metrology is an integral part of quality control in manufacturing systems. Most existing manufacturing systems utilize contact-based metrology, which is time consuming and not flexible to design changes. There have been recent applications of computer vision for performing dimensional metrology in manufacturing systems. Existing computer vision metrology techniques need repeated calibration of the system and are not utilized with data analysis methods to improve decision making. In this work, we propose a robust non-contact computer vision metrology pipeline integrated with Computer Aided Design (CAD) that has the capacity to enable control of smart manufacturing systems. The pipeline uses CAD data to extract nominal dimensions and tolerances. The dimensions are compared to the measured ones, computed using camera images and computer vision algorithms. A quality check module evaluates if the measurements are within admissible bounds and informs a central controller. If a part does not meet a tolerance, the central controller changes a program running on a specific machine to ensure that parts meet the necessary specifications. Results from an implementation of the proposed pipeline on a manufacturing research testbed are given at the end.


Computers ◽  
2019 ◽  
Vol 8 (2) ◽  
pp. 35 ◽  
Author(s):  
Xuan Dau Hoang ◽  
Ngoc Tuong Nguyen

Defacement attacks have long been considered one of prime threats to websites and web applications of companies, enterprises, and government organizations. Defacement attacks can bring serious consequences to owners of websites, including immediate interruption of website operations and damage of the owner reputation, which may result in huge financial losses. Many solutions have been researched and deployed for monitoring and detection of website defacement attacks, such as those based on checksum comparison, diff comparison, DOM tree analysis, and complicated algorithms. However, some solutions only work on static websites and others demand extensive computing resources. This paper proposes a hybrid defacement detection model based on the combination of the machine learning-based detection and the signature-based detection. The machine learning-based detection first constructs a detection profile using training data of both normal and defaced web pages. Then, it uses the profile to classify monitored web pages into either normal or attacked. The machine learning-based component can effectively detect defacements for both static pages and dynamic pages. On the other hand, the signature-based detection is used to boost the model’s processing performance for common types of defacements. Extensive experiments show that our model produces an overall accuracy of more than 99.26% and a false positive rate of about 0.27%. Moreover, our model is suitable for implementation of a real-time website defacement monitoring system because it does not demand extensive computing resources.


Author(s):  
Somnath Das

The nature of manufacturing systems faces increasingly complex dynamics to meet the demand for high quality products efficiently. One area, which experienced rapid development in terms not only of promising results but also of usability, is machine learning. New developments in certain domains such as mathematics, computer science, and the availability of easy-to-use tools, often freely available, offer great potential to transform the non-traditional machining domain and its understanding of the increase in manufacturing data. However, the field is very broad and even confusing, which presents a challenge and a barrier that hinders wide application. Here, this chapter helps to present an overview of the available machine learning techniques for improving the non-traditional machining process area. It provides a basis for the subsequent argument that the machine learning is a suitable tool for manufacturers to face these challenges head-on in non-traditional machining processes.


Agriculture ◽  
2021 ◽  
Vol 11 (5) ◽  
pp. 387
Author(s):  
Nahina Islam ◽  
Md Mamunur Rashid ◽  
Santoso Wibowo ◽  
Cheng-Yuan Xu ◽  
Ahsan Morshed ◽  
...  

This paper explores the potential of machine learning algorithms for weed and crop classification from UAV images. The identification of weeds in crops is a challenging task that has been addressed through orthomosaicing of images, feature extraction and labelling of images to train machine learning algorithms. In this paper, the performances of several machine learning algorithms, random forest (RF), support vector machine (SVM) and k-nearest neighbours (KNN), are analysed to detect weeds using UAV images collected from a chilli crop field located in Australia. The evaluation metrics used in the comparison of performance were accuracy, precision, recall, false positive rate and kappa coefficient. MATLAB is used for simulating the machine learning algorithms; and the achieved weed detection accuracies are 96% using RF, 94% using SVM and 63% using KNN. Based on this study, RF and SVM algorithms are efficient and practical to use, and can be implemented easily for detecting weed from UAV images.


MENDEL ◽  
2019 ◽  
Vol 25 (2) ◽  
pp. 1-10 ◽  
Author(s):  
Ivan Zelinka ◽  
Eslam Amer

Current commercial antivirus detection engines still rely on signature-based methods. However, with the huge increase in the number of new malware, current detection methods become not suitable. In this paper, we introduce a malware detection model based on ensemble learning. The model is trained using the minimum number of signification features that are extracted from the file header. Evaluations show that the ensemble models slightly outperform individual classification models. Experimental evaluations show that our model can predict unseen malware with an accuracy rate of 0.998 and with a false positive rate of 0.002. The paper also includes a comparison between the performance of the proposed model and with different machine learning techniques. We are emphasizing the use of machine learning based approaches to replace conventional signature-based methods.


Sign in / Sign up

Export Citation Format

Share Document