Data augmentation for numerical data from manufacturing processes: an overview of techniques and assessment of when which techniques work

被引:0
|
作者
Henry Ekwaro-Osire [1 ]
Sai Lalitha Ponugupati [2 ]
Abdullah Al Noman [3 ]
Dennis Bode [1 ]
Klaus-Dieter Thoben [2 ]
机构
[1] BIBA—Bremer Institut für Produktion und Logistik GmbH,Faculty of Production Engineering, Institute for Integrated Product Development (BIK)
[2] University of Bremen,Faculty of Electrical Engineering
[3] University of Bremen,undefined
来源
关键词
Data augmentation; Manufacturing; Process modelling; Machine learning;
D O I
10.1007/s44244-024-00021-x
中图分类号
学科分类号
摘要
Over the past two decades, machine learning (ML) has transformed manufacturing, particularly in optimizing production and quality control. A significant challenge in ML applications is obtaining sufficient training data, which data augmentation aims to address. While widely applied to image, text, and sound data, data augmentation for numerical data in manufacturing has seen limited investigation. This paper empirically compares three data augmentation techniques—generative adversarial networks, variational auto-encoders mixed with long-short-term memory, and warping—on four manufacturing datasets. It also provides a literature review, highlighting that generative models are the most common technique for numerical manufacturing data. Preliminary findings suggest that generative adversarial networks are effective for non-time-series numerical data, especially with datasets featuring many correlated model features, multiple machines, and sufficient instances and labels. This research enhances the understanding of data augmentation in manufacturing ML applications, emphasizing the need for tailored strategies.
引用
收藏
相关论文
共 50 条
  • [41] Data mining techniques: Which one is your favorite?
    Changpetch, Pannapa
    Reid, Moya
    JOURNAL OF EDUCATION FOR BUSINESS, 2021, 96 (03) : 143 - 148
  • [42] An overview of steganography techniques applied to the protection of biometric data
    Mandy Douglas
    Karen Bailey
    Mark Leeney
    Kevin Curran
    Multimedia Tools and Applications, 2018, 77 : 17333 - 17373
  • [43] Overview of Data Storing Techniques in Citizen Science Applications
    Musto, Jiri
    Dahanayake, Ajantha
    NEW TRENDS IN DATABASES AND INFORMATION SYSTEMS, ADBIS 2018, 2018, 909 : 231 - 241
  • [44] Computational Intelligence Techniques for Biological Data Mining: An Overview
    Faye, Ibrahima
    Iqbal, Muhammad Javed
    Said, Abas Md
    Samir, Brahim Belhaouari
    3RD INTERNATIONAL CONFERENCE ON FUNDAMENTAL AND APPLIED SCIENCES (ICFAS 2014): INNOVATIVE RESEARCH IN APPLIED SCIENCES FOR A SUSTAINABLE FUTURE, 2014, 1621 : 132 - 139
  • [45] Business Intelligence Techniques Using Data Analytics: An Overview
    Mallam, Pooja
    Ashu, Ashu
    Singh, Baljeet
    2021 INTERNATIONAL CONFERENCE ON COMPUTING SCIENCES (ICCS 2021), 2021, : 265 - 267
  • [46] An Overview of Intrusion Detection Based on Data Mining Techniques
    Wankhade, Kapil
    Patka, Sadia
    Thool, Ravinrda
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 626 - 629
  • [47] An Overview of Techniques for Confirming Big Data Property Rights
    Cheng, Susu
    Zhao, Haijun
    2018 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION TECHNOLOGY (ICIIT 2018), 2018, : 59 - 64
  • [48] An Overview on Image Segmentation Techniques for Reversible Data Hiding
    Gupta, Rasika
    INTERNATIONAL JOURNAL OF MATHEMATICAL ENGINEERING AND MANAGEMENT SCIENCES, 2024, 9 (05) : 1163 - 1184
  • [49] OVERVIEW OF ONLINE DATA-BASES AND RETRIEVAL TECHNIQUES
    MILNE, GWA
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1984, 187 (APR): : 18 - PHYS
  • [50] An overview of steganography techniques applied to the protection of biometric data
    Douglas, Mandy
    Bailey, Karen
    Leeney, Mark
    Curran, Kevin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (13) : 17333 - 17373