Machine and equipment assets are engineered to perform particular tasks as part of a business process. For example, assets can include, among other things and without limitation, industrial manufacturing equipment on a production line, drilling equipment for use in mining operations, wind turbines that generate electricity on a wind farm, transportation vehicles, and the like. As another example, assets may include devices that aid in diagnosing patients such as imaging devices (e.g., X-ray or MRI systems), monitoring equipment, and the like. The design and implementation of these assets often takes into account both the physics of the task at hand, as well as the environment in which such assets are configured to operate.
Low-level software and hardware-based controllers have long been used to drive machine and equipment assets. However, the rise of inexpensive cloud computing, increasing sensor capabilities, and decreasing sensor costs, as well as the proliferation of mobile technologies, have created opportunities for creating novel industrial and healthcare based assets with improved sensing technology and which are capable of transmitting data that can then be distributed throughout a network. As a consequence, there are new opportunities to enhance the business value of some assets through the use of novel industrial-focused hardware and software.
Data science has become an important component of enterprise data management. Data science algorithms are often developed, for example, for analysis purposes and deployed at scale, allowing for rapid increase in insights for enterprises. Typically, algorithms are developed to analyze a variety of industrial use cases, such as detecting events, processes, and states of industrial equipment. As data volumes continue to grow and deep learning drives the creation of increasingly complex algorithms, extracting valuable intelligence and knowledge becomes increasingly challenging.
Conventionally, in the industrial context, generating ground truth data to test algorithm accuracy for unlabeled datasets often require secondary measurements. Examples of secondary measurements include using a measurement device to label the data generated or visually inspecting raw data to identify and manually label the data. For example, a person could be on-site when a sample of data is being collected and can keep track of the events, processes, or states that the algorithm should be detecting, or the person could use more accurate measurement devices (e.g., sensors or controllers), that would precisely measure the event, process, or state of the asset being analyzed. Both of these methods would be expensive to implement, especially at scale in industry. Alternatively, a person could manually visualize the data being collected with plots or charts, and inspect the data to determine where events are occurring. This visual inspection is rather time-consuming, labor intensive, and not feasible to implement at scale.
What is needed is system and method capable of providing a streamlined, automated method to develop ground truth results for algorithm development and testing at scale.
Embodiments described herein improve upon the prior art by providing systems and methods which enable the automated generation of ground truth for determining algorithm accuracy at scale.
The disclosed embodiments relate to a ground truth generation framework for determination of algorithm accuracy at scale. The disclosed embodiments include generating ground truth results by performing pre-processing on raw data from a data source, applying various models to the pre-processed raw data, and performing multi-dimensional validation using the output from the various models. The disclosed embodiments further include compiling and comparing the ground truth results to timestamps of results of an original source algorithm being developed and performing an accuracy determination.
A technical advantage of the ground truth generation framework is improved efficiency of accuracy checking during algorithm development. By virtue of a strategy that compares algorithm results to the ground truth that the disclosed process generates, users (e.g., developers) are able to pinpoint strengths and weaknesses of each algorithm. Also, in addition to providing structure as to how to verify an algorithm, the disclosed process provides flexibility for customization of the framework to utilize other types of algorithms.
A commercial advantage of the ground truth generation framework is that testing at scale becomes feasible and reliable. Rather than manually detecting ground truth, automating it through this described approach reduces the time spent in testing and verification, and ultimately allows a product to be brought to market faster. In addition, the described approach to generate ground truth results allows for flexibility to follow the market. For example, if another algorithm is developed for the product, the disclosed process may need to be adjusted to the specificities of the new algorithm. Advantageously, through the described approach, costly new equipment would not need to be installed to verify the new algorithm's accuracy. Ultimately, this acceleration of productization allows for flexibility to meet customer needs while simultaneously saving time and money for both the developers of the algorithm and the customer.
Other features and aspects may be apparent from the following detailed description taken in conjunction with the drawings and the claims.
Features and advantages of the example embodiments, and the manner in which the same are accomplished, will become more readily apparent with reference to the following detailed description taken in conjunction with the accompanying drawings.
Throughout the drawings and the detailed description, unless otherwise described, the same drawing reference numerals will be understood to refer to the same elements, features, and structures. The relative size and depiction of these elements may be exaggerated or adjusted for clarity, illustration, and/or convenience.
In the following description, specific details are set forth in order to provide a thorough understanding of the various example embodiments. It should be appreciated that various modifications to the embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the disclosure. Moreover, in the following description, numerous details are set forth for the purpose of explanation. However, one of ordinary skill in the art should understand that embodiments may be practiced without the use of these specific details. In other instances, well-known structures and processes are not shown or described in order not to obscure the description with unnecessary detail. Thus, the present disclosure is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.
The disclosed embodiments utilize, among others, data exploration, data pre-processing, machine learning, signal processing, and multi-dimensional validation/verification techniques to provide an outline to produce ground truth results. For the purposes of this disclosure, “ground truth” data refers to information that can be used as a reference to compare an algorithm result to.
The data transmitted by the assets 110 and received by the cloud platform 120 may include data that is being input to hardware and/or software deployed on or in association with the assets 110, raw time-series data output as a result of the operation of the assets 110, and the like. Data that is stored and processed by the cloud platform 120 may be output in some meaningful way to user devices 130. In the example of
It should be appreciated that the system 100 is merely an example and may include additional devices and/or one of the devices shown may be omitted.
According to various aspects, software applications that can be used to enhance or otherwise modify the operating performance of an asset 110 may be hosted by the cloud platform 120 and may operate on the asset 110. For example, software applications may be used to optimize a performance of the assets 110 or data coming in from the asset 110. As another example, the software applications may analyze, control, manage, or otherwise interact with the asset 110 and components (software and hardware) thereof A user device 130 may receive views of data or other information about the asset 110 as the data is processed via one or more applications hosted by the cloud platform 120. For example, the user device 130 may receive graph-based results, diagrams, charts, warnings, measurements, power levels, and the like.
In this example, an asset management platform (AMP) can reside within or be connected to the cloud platform 120, in a local or sandboxed environment, or can be distributed across multiple locations or devices and can be used to interact with the assets 110. The AMP can be configured to perform functions such as data acquisition, data analysis, data exchange, and the like, with local or remote assets 110, or with other task-specific processing devices. For example, the assets 110 may be an asset community (e.g., turbines, healthcare, power, industrial, manufacturing, mining, oil and gas, elevators, etc.) which may be communicatively coupled to the cloud platform 120 via one or more intermediate devices such as a stream data transfer platform, database, or the like.
Information from the assets 110 may be communicated to the cloud platform 120. For example, external sensors can be used to sense information about a function of an asset, or to sense information about an environment condition at or around an asset, a worker, a downtime, a machine or equipment maintenance, and the like. The external sensor can be configured for data communication with the cloud platform 120 which can be configured to store the raw sensor information and transfer the raw sensor information to the user devices 130 where it can be accessed by users, applications, systems, and the like, for further processing. Furthermore, an operation of the assets 110 may be enhanced or otherwise controlled by a user inputting commands though an application hosted by the cloud platform 120 or other remote host platform such as a web server. The data provided from the assets 110 may include time-series data or other types of data associated with the operations being performed by the assets 110.
In some embodiments, the cloud platform 120 may include a local, system, enterprise, or global computing infrastructure that can be optimized for industrial data workloads, secure data communication, and compliance with regulatory requirements. The cloud platform 120 may include a database management system (DBMS) for creating, monitoring, and controlling access to data in a database coupled to or included within the cloud platform 120. The cloud platform 120 can also include services that developers can use to build or test industrial or manufacturing-based applications and services to implement IIoT applications that interact with assets 110.
For example, the cloud platform 120 may host an industrial application marketplace where developers can publish their distinctly developed applications and/or retrieve applications from third parties. In addition, the cloud platform 120 can host a development framework for communicating with various available services or modules. The development framework can offer developers a consistent contextual user experience in web or mobile applications. Developers can add and make accessible their applications (services, data, analytics, etc.) via the cloud platform 120. Also, analytic software may analyze data from or about a manufacturing process and provide insight, predictions, and early warning fault detection.
Reference is now made to
Turning to
Once an inventory of viable data sources is established, ground truth generation may begin. Ground truth data is generated by ground truth generation module 230. In an example embodiment shown in
Turning also to
Once the data has been pre-processed, the next step at 5320 is to analyze which machine learning model(s) would be the best fit for validation (cross-check) in a specific problem. In one example, machine learning module 234 may apply a K-means algorithm as a checking algorithm to check against an original algorithm 220 (e.g., a Hidden Markov Model (HMM) algorithm), and if the results of the algorithms matched or were in agreement with each other, a marked event is determined to be accurate (e.g., “true positive” result).
The chosen model(s) may not be entirely accurate, and therefore, in some embodiments, other methods (e.g., additional models) may be included at 5320.
Multi-dimensional validation is performed at 5330 (e.g., by multi-dimensional validation module 238) to generate ground truth results. In the use case of multi-dimensional validation shown in
As can be seen from graph 430, the data does not surpass threshold 435. Therefore, the first event 440 detected in Method A is determined to be inaccurate (e.g., “false positive” result) and should not be included in the final ground truth results. In some embodiments, the threshold may be determined by taking the value of an extreme quantile (e.g., 99.5%).
In this way, thresholding module 236 may further verify whether a marked event by a first model (e.g., first event marked by Method A) is actually correct. In addition, thresholding may be used to raise flags when it appears that an event is occurring, but no event was marked (e.g., “false negative” result). In one example, thresholding module 236 may use rolling averages and root mean square (RMS) to analyze the data. As can be seen in
In turn, at S340, analysis module 240 compiles the results (e.g., ground truth results) from machine learning module 243, thresholding module 236, and optionally, other additional models from modules not specifically shown, and compares the result with the timestamps of the results of the original working algorithm 220 being developed (e.g., specific events occurring at particular instances in time). In some embodiments, analysis module 240 identifies “true positive”, “false positive”, and “false negative” results. From this information, output module 250 determines the accuracy of original algorithm 220 being developed, and the accuracy determination is output at S350. In some embodiments, an Fi score (also F-score or F-measure, which measures accuracy) is determined by pooling all the true positive, false positive, and false negative results from analysis module 240.
As used herein, the term “true positive” refers to a result which classifies an occurrence of an event correctly as an event that has occurred (e.g., original algorithm detects an event and ground truth indicates that the event occurred). As used herein, the term “false positive” refers to a result which classifies an occurrence of an event incorrectly as an event that has occurred (e.g., original algorithm detects an event and ground truth indicates that the event did not occur). Likewise, a “false negative” refers to a result which classifies an occurrence of an event incorrectly as an event that has not occurred (e.g., original algorithm detects no event and ground truth indicates that an event occurred).
It will be appreciated by those skilled in the art that other suitable data science models may be used by ground truth generation module 230, and the disclosed embodiments are not limited to any particular model or algorithm, and may vary as necessary or desired.
Further, it is contemplated that actual/known ground truth information (e.g., reality, also referred to as “ultimate ground truth”) may become available. In such embodiments, ground truth generated by generation module 230 may be replaced by the ultimate ground truth, and the remaining process for accuracy checks (e.g., S340-S350) would occur as described above. For example, a controller on an asset recording actual events outputs actual ground truth information, and this output information (e.g., controller data) may be used in place of the ground truth information generated by generation module 230.
The network interface 510 may transmit and receive data over a network such as the Internet, a private network, a public network, and the like. The network interface 510 may be a wireless interface, a wired interface, or a combination thereof. The processor 520 may include one or more processing devices each including one or more processing cores. In some examples, the processor 520 is a multicore processor or a plurality of multicore processors. Also, the processor 520 may be fixed or it may be reconfigurable. The output 530 may output data to an embedded display of the computing system 500, an externally connected display, a display connected to the cloud, another device, and the like. The storage device 540 is not limited to a particular storage device and may include any known memory device such as RAM, ROM, hard disk, and the like, and may or may not be included within the cloud environment. The storage 540 may store software modules or other instructions which can be executed by the processor 520 to perform the methods described herein. Also, the storage 540 may store software programs and applications which can be downloaded and installed by a user. Furthermore, the storage 540 may store and the processor 520 may execute an application marketplace that makes the software programs and applications available to users that connect to the computing system 500.
As will be appreciated based on the foregoing specification, the above-described examples of the disclosure may be implemented using computer programming or engineering techniques including computer software, firmware, hardware or any combination or subset thereof Any such resulting program, having computer-readable code, may be embodied or provided within one or more non-transitory computer-readable media, thereby making a computer program product, i.e., an article of manufacture, according to the discussed examples of the disclosure. For example, the non-transitory computer-readable media may be, but is not limited to, a fixed drive, diskette, optical disk, magnetic tape, flash memory, semiconductor memory such as read-only memory (ROM), and/or any transmitting/receiving medium such as the Internet, cloud storage, the internet of things, or other communication network or link. The article of manufacture containing the computer code may be made and/or used by executing the code directly from one medium, by copying the code from one medium to another medium, or by transmitting the code over a network.
The computer programs (also referred to as programs, software, software applications, “apps”, or code) may include machine instructions for a programmable processor, and may be implemented in a high-level procedural and/or object-oriented programming language, and/or in assembly/machine language. As used herein, the terms “machine-readable medium” and “computer-readable medium” refer to any computer program product, apparatus, cloud storage, internet of things, and/or device (e.g., magnetic discs, optical disks, memory, programmable logic devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The “machine-readable medium” and “computer-readable medium,” however, do not include transitory signals. The term “machine-readable signal” refers to any signal that may be used to provide machine instructions and/or any other kind of data to a programmable processor.
The above descriptions and illustrations of processes herein should not be considered to imply a fixed order for performing the process steps. Rather, the process steps may be performed in any order that is practicable, including simultaneous performance of at least some steps. Although the disclosure has been described in connection with specific examples, it should be understood that various changes, substitutions, and alterations apparent to those skilled in the art can be made to the disclosed embodiments without departing from the spirit and scope of the disclosure as set forth in the appended claims.