Professional Documents
Culture Documents
M.G. Pecht
14.1 Introduction
W.D. van Driel and X.J. Fan (eds.), Solid State Lighting Reliability: 373
Components to Systems, Solid State Lighting Technology and Application Series 1,
DOI 10.1007/978-1-4614-3067-4_14, # Springer Science+Business Media, LLC 2013
374 M.G. Pecht
functional elements. Canary solder joints can be designed to have lower height than
normal ones to attain faster degradation rates. Canaries for electrochemical migra-
tion are designed with closer spacing to increase degradation rates.
• Material error-seeding: the composition and microstructure of canary can be
tailored to alter material properties. The material properties include dielectric
constants, dielectric strength, glass-transition temperature, diffusivity,
creep resistance, ductility, and fracture toughness. Preliminary concepts are
being explored for tin whisker canaries using compositional gradient libraries
deposited on glass substrates.
• Load error-seeding: the canary will be subjected to higher load levels than
functional elements. Canaries for conductive filament formation in metal traces
will be subjected to higher voltage gradients than normal. Electromigration
canaries in solder and die metallization will be subjected to higher current
densities than normal. Microvia fatigue canaries will be subjected to higher
current swings.
Design steps of expendable canaries include the following:
• Identify the failure mechanisms of host systems.
• Find out what governing parameters or equations (material properties, physical
size, usage, and environmental conditions) can affect these failure mechanisms.
• Design canaries with adjusted governing parameters.
• Determine the appropriate equipment for (a) measuring these governing
parameters and (b) applying accelerated or real-situ loading stress.
• To conduct experiments and find out the coefficients in governing equations.
• To develop a model which correlates the failure of canaries with that of host
systems so that RUL can be quantified based on the health state of canaries.
Sensory canaries are inspired by biological system focusing on self-cognizant
systems with in situ canary capabilities to look, listen, smell, and feel for signs
of degradation and impending failure. Guidelines of sensory canaries are being
developed to make the canary approach generic for both new and legacy informa-
tion systems.
• Infrared canaries are to look for degradation in microprocessors based on
changes in the thermal dissipation
• Impedance spectroscopy and time domain reflectometry are to listen for defects
in signal traces and wiring harnesses.
• Acoustic sensors are to listen for delamination and cracking
• MEMS-based chemical canaries are to smell for out-gassing products.
• Piezoelectric or piezoresistive canaries are to touch and feel for sign of
delamination.
Conjugate-stress canaries can be developed to provide prognostic assessments
based on simultaneous identification of conjugate-stress pairs (e.g., stress & strain;
temperature gradient & heat flux; voltage and charge flux density; and magnetic
14 Prognostics and Health Management 377
field and magnetic induction), using novel dual-field detector pair concepts. These
canaries provide model-based fusion prognostic assessments of RUL by:
• Providing stress histories for damage accumulation models
• Monitoring intrinsic changes in material properties due to damage (e.g., stiff-
ness, thermal/electrical conductivity, and dielectric constants)
• Monitoring other damage metrics; e.g., hysteretic energy dissipation at failure site
Interconnect canaries built in one same system can be connected together to
form a built-in canary network by using wireless or wired network, or optical fiber
communication systems. The canary network has advantages over an individual
canary because it can cover a much wider area of communication and provide
distributed early warnings of failures.
In summary of canaries, PHM is attracting more attention from industry due to
the increasing demand for reliable products from both consumers and critical
applications such as military, aerospace, and nuclear power plants. As an approach
of PHM, canary has an intrinsic capability of providing advance warning of host
system failure and prediction of its health state, by accelerating the degradation
rates within the canary and providing more information about the actual life cycle
stresses at potential failure sites. Canaries should degrade faster than their host
systems under the same loading conditions.
identify departures from such normal structures [4]. Diagnosis step is useful to
recognize where the fault is identified and isolated. Prognosis step predicts a failure.
The prediction can be based on a comparison of the current state of the system and
the expected normal state, in addition to the continued tendency of the system to
deviate from the expected normal state.
Statistical methods are composed of parametric methods and nonparametric
methods [5]. Parametric methods assume that the data are drawn from a certain
distribution (for example, the Gaussian distribution) and that the parameters
(such as the mean and the standard deviation) of the distribution are calculated
from the data. Nonparametric methods do not make any assumptions regarding the
underlying distribution of data. These methods draw their strength from the data
and its inherent features (e.g., Mahalanobis distance).
Machine learning (ML) algorithms recognize patterns in data and make
decisions on the state of the system based on the data [6]. General procedures for
learning algorithms are shown in Fig. 14.3. Three types of learning algorithms are
supervised, semi-supervised, and unsupervised techniques.
The translation from raw data to meaningful information may be achieved by
using techniques like classification, clustering, regression, and ranking. ML based
on statistical methods is suited for PHM because it is capable of actively learning
about the system and its dynamics, faults, and failures. ML techniques can handle the
increasing complexity of system information. ML is useful for real time analysis.
14 Prognostics and Health Management 379
anomalous compared to the rest of the data shown in Fig. 14.8. Contextual
anomalies are that data instance is anomalous only in a particular context shown
in Fig. 14.9. High temperature in the month of January is anomalous although the
high temperature in the month of July is not anomalous. Collective anomalies are
that collection of related data instances is anomalous in Fig. 14.10. The individual
data instances may not be anomalous by themselves.
Machine learning techniques can be divided into supervised, semi-supervised,
and unsupervised algorithms [6]. Supervised learning techniques require training
data set that has labeled data for normal as well as anomaly classes. Semi-
supervised learning techniques can use training data that has labeled instances
384 M.G. Pecht
only for the normal class. Unsupervised learning techniques may not require
training data. They assume that normal instances are more frequent than anomalies.
Machine learning techniques can handle the increasing complexity of system
information. In other words, machine learning for PHM can actively learn the
system and its dynamics, faults, and failures.
Techniques for point anomaly detection include classification based techniques,
nearest neighbor, clustering, statistical (e.g., hypothesis test), and spectral
techniques [4]. Input data can be collected by building matrix. Columns contain
variables and rows contain instances. Example is temperature as a junction of
acceleration for some system shown in Fig. 14.11.
14 Prognostics and Health Management 385
Classification based techniques require labeled training data for both normal and
anomaly classes [8]. Nearest neighbor and clustering based techniques suffer when
number of dimensions is high. When identifying a good distance measure is
difficult, classification based and statistical techniques are better. Statistical
techniques are effective with low dimensional data and when the statistical
assumptions hold true. Spectral techniques are good only if anomalies are separable
from normal states in the projected subspaces.
Previous techniques primarily focus on detecting point anomalies. Contextual
anomaly detection works where data instances tend to be similar within a context.
390 M.G. Pecht
Contextual anomaly detection techniques are able to detect anomalies that might
not be detected by point anomaly detection techniques that take global view of the
data. It is applicable only when a context can be defined. Two methods of handling
contextual anomalies: conversion to point anomaly detection problem and utiliza-
tion of the structure of the data.
• Conversion to point anomaly problem:
– Splits data into different contexts or attributes.
– Uses point anomaly detection techniques on each of the attributes within a
context.
• Utilization of structure of the data:
– Used when data cannot be split into contexts
– A model is learned from the training data, which can predict the expected
behavior with respect to a given context.
– Anomaly is declared if the expected behavior is significantly different from
observed behavior.
Collective anomalies are subset of instances that occur together as a collection
[4]. Handling collective anomalies are more challenging than point and contextual
anomaly detection. Data is presented as a set of sequences. Primary requirement is
the presence of relationship between data instances. Collective anomalies are
detected mostly by building models using sequential training data. Sequential
anomaly detection detects anomalous sequences or subsequences in a database of
sequences. To handle collective anomalies, the sequences are transformed to a finite
feature space. Sequences may or may not be of the same length. Sequential rules are
generated from a set of normal sequences. The test sequence is compared to the
14 Prognostics and Health Management 391
rules, and anomaly is declared if it contains patterns for which no rules have been
generated. For long sequences, one can assume that the normal behavior follows a
defined pattern. If a subsequence within the long sequence does not conform to the
pattern, it declares anomalous.
Challenges in anomaly detections are:
• It is difficult in defining a normal (healthy) operating region that encompasses
every possible normal behavior of the system.
• The boundary between normal and anomalous behavior is often not precise.
• Normal behavior changes with time.
• The definition of an anomaly is application specific (e.g., fluctuations in body
temperature).
• Uncertainties make data analysis difficult if there is noise in data.
• Availability of labeled data for training/validation of models used by anomaly
detection techniques is usually a major issue.
The PoF-based prognostics involve the usage of representative models that allow
estimation of damage and degradation in critical components as a function of the
life cycle loads. The PoF approach utilizes knowledge of a product’s life cycle
loading conditions and material properties to identify critical failure mechanisms
and estimate RUL. Advantages and limitations of PoF-based prognostics are:
• Advantages:
– Provide estimate of damage and RUL for given loading conditions and failure
modes or mechanisms (in operating and nonoperating state).
– Identify critical components and parameters to be monitored.
– Provide information regarding failure modes and mechanisms that are useful
for root cause analysis.
• Limitations:
– Development of models of the degradation process in a complex system may
be practically infeasible.
– System specific knowledge is necessary to create and use the system models
which may not always be available.
– It is hard for PoF models to detect intermittent failures.
The data-driven approach derives features from product performance data using
statistical and machine learning techniques to estimate deviations of the product
from its healthy state. Advantages and limitations of data-driven prognostics are:
• Advantages:
– Do not require system specific knowledge (i.e., material properties, geometry,
or failure mechanisms).
392 M.G. Pecht
References
1. Pecht MG (2008) Prognostics and health management of electronics, chap. 1. Wiley, Hoboken,
NJ, pp 3–4
2. Pecht MG (2008) Prognostics and health management of electronics, chap. 4. Wiley, Hoboken,
NJ, pp 73–84
3. Pecht MG (2008) Prognostics and health management of electronics, chap. 3. Wiley, Hoboken,
NJ, pp 47–72
4. Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41
(3) Article 15: 15:1–15:58
5. Markou M, Singh S (2003) Novelty detection: a review-part 1: statistical approaches. Signal
Process 83:2481–2497
6. Nilsson NJ. Introduction to machine learning. http://ai.stanford.edu/~nilsson/mlbook.html
7. Tran TN, Wehrens R, Buydens LMC (2006) KNN-kernel density-based clustering for high-
dimensional multivariate data. Comput Stat Data Anal 51(2):513–525
8. Xu R (2005) Survey of clustering algorithms. IEEE Trans Neural Network 16(3):645–678