<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards Adaptive Anomaly Detection and Root Cause Analysis by Automated Extraction of Knowledge from Risk Analyses</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Bram Steenwinckel</string-name>
          <email>bram.steenwinckel@ugent.be</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pieter Heyvaert</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dieter De Paepe</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olivier Janssens</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sander Vanden Hautte</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anastasia Dimou</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Filip De Turck</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sofie Van Hoecke</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Femke Ongenae</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ghent University - imec, IDLab</institution>
          ,
          <addr-line>Ghent</addr-line>
          ,
          <country country="BE">Belgium</country>
        </aff>
      </contrib-group>
      <fpage>17</fpage>
      <lpage>31</lpage>
      <abstract>
        <p>Sensors, inside internet-connected devices, analyse the environment and monitor possible unwanted behaviour or the malfunctioning of the system. Current risk analysis tools, such as Fault Tree Analysis (FTA) and Failure Mode and Effect Analysis (FMEA), provide prior information on these faults together expert-driven insights of the system. Many people are involved in this risk analyses process, resulting in disambiguations and incompleteness. Ontologies could resolve this issue by providing a uniform structure for the failures and their causes. However, domain experts are not always ontology experts, resulting in a lot of human effort to keep the ontologies up to date. In this paper, automated mappings from the FMEA data to a domain-specific ontology and the generation of rules from a constructed FTA were researched to annotate and reason on sensor observations semantically and provide some first steps towards automated, expert-driven fault detection. The approach is demonstrated with a use case to investigate the possible failures and causes of reduced passenger comfort levels inside a train.</p>
      </abstract>
      <kwd-group>
        <kwd>Anomaly detection</kwd>
        <kwd>Root Cause Analysis</kwd>
        <kwd>Risk Analysis</kwd>
        <kwd>Semantics</kwd>
        <kwd>Ontology development</kwd>
        <kwd>Sensor data</kwd>
        <kwd>IoT</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Sensor monitoring systems are transforming the industry, with game-changing
applications in, e.g., transportation [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] and healthcare [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. These systems can
yield valuable insights into company's physical assets and the interaction of these
assets with their environment. However, sensors have limited added value
without data analysis [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. More and more, new methodologies are defined to specify
the correct functioning of the system based on these sensor observations.
Common methodologies for observing unwanted system behaviour with this data are
Anomaly Detection (AD) and Root Cause Analysis (RCA). AD is the
identification process of events or observations, which do not adhere to the expected
pattern or other items inside a dataset [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. RCA guides a problem solver to
deduce and understand the real causes of the anomalies [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Interest in AD &amp;
      </p>
      <p>Sense the
smoke level in
the environment
RCA will continue to grow as more relevant data is generated and tools become
widely accessible that can handle data from diverse operating environments.</p>
      <p>
        However, domain-specific knowledge needs to be leveraged to clearly define
the unwanted behaviour and its causes inside these tools as sensor, or system
behaviour in general, varies wildly between application domains. This knowledge
is often provided by domain experts by using risk analysis, which define all
the possible failures and their (observable) effects on the system. Failure Mode
and Effects Analysis (FMEA) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and Fault Tree Analysis (FTA) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] provide
templates to provide such analyses easily. As shown in Figure 1 (a), FMEA
captures, on multiple levels of the system, the potential failures that can occur
to the components and their underlying causes and effects. FTA analyses the
undesired states of a system using Boolean logic. This combination of low-level
events, leading to system failures, can be visualised using a tree, as exemplified
in Figure 1 (b).
      </p>
      <p>
        Constructing these FMEA and FTA documents is a time-consuming process
when applied thoroughly. A large number of experts are involved, who each have
expertise in other parts of the system and interpret different parts of the risk
analysis differently. Ambiguities, inconsistencies and duplicates are, therefore,
quite common. These disagreements reduce the advantages of these risk analysis
and make it difficult for non-experts to interpret and use these documents.
Sharing, however, a common understanding about the structure of the system and
contextual knowledge amongst the experts could help in separating the domain
knowledge from the operational knowledge about the (mal)functioning of the
system. Ontologies and accompanying inference rules have proven their worth in
providing a common knowledge representation about a domain by defining
common concepts and generalizable rules [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. However, most system experts are not
familiar with ontology design, which makes these approaches difficult to
implement and maintain. Semantic Web experts are required to constantly improve
and update these ontologies and accompanied rules with new domain-specific
knowledge.
      </p>
      <p>In contrast, the effort to enable domain experts to generate ontologies and
rules based on the domain knowledge captured in the FMEA and FTA
documents will lower the barrier to use them in existing data analysis methodologies.
The generated ontologies and rules themselves can be used to annotate and
reason upon incoming sensor observations, to eventually provide some essential
tools for preliminary semantic-based AD and RCA.</p>
      <p>In this paper, we propose an approach to automatically generate the required
ontologies and inference rules from the aforementioned risk analysis outcomes.
The entries from the FMEA table will be used to create a domain-specific
ontology. The fault trees will be used to derive rules to clarify if a particular sensor
observation leads to failure or not. The automation of this approach reduces the
need for the involvement of ontology and rule experts in the risk analysis process
while enabling maintainable, semantic-based AD and RCA. As such, the domain
experts can focus on their primary task, i.e., applying their domain knowledge
to accurately capture the unwanted behaviour of a system and its causes.</p>
      <p>The remainder of the paper is structured as follows. Section 2 situates our
approach with respect to the related work. The designed approach is discussed
in detail in Section 3, while Section 4 details the application of the approach on
a real-life use case, i.e., investigating the possible failures and causes of reduced
passenger comfort levels inside a train. Section 5 highlights the most important
accomplishments and discusses the directions for future work.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related work</title>
      <p>
        As previously mentioned, ontology-based risk analysis methods have been
proposed. Dittmann et al. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] describes a process to capture the results of a FMEA
in an ontology, instead of in a document and highlighted the (dis)advantages.
Rehman et al. [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] and Zhou et al. [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] designed high-level ontologies to model
the main concepts of a FMEA and their relationships. The first applied it to
model the results of a FMEA in the automotive domain. The second used it
to capture the FMEA of wind turbines and developed a reasoning framework
to perform intelligent fault diagnosis using the designed ontology capturing the
domain-specific concepts. Both papers showed how an ontology could be used
to easily trace the relationships between failures and their corresponding causes,
making it easier to interpret the risk analysis. Ontologies to automatically link
the observations made within a particular system to anomalies or faults that
can occur, have also been proposed [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Although high-level concepts have been
defined to model irregularities and link them to system components and effects,
an ontology expert is required to model all the domain-specific anomalies that
can occur and how they link to the sensor observations. None of the proposed
ontologies are publicly available, hindering re-use. Moreover, all the approaches
propose to replace the existing methodologies with a process in which the
results of a FMEA are directly captured in an ontology. This requires extensive
knowledge about ontology design from the system experts as the current FMEA
are performed using standard spreadsheet tools.
      </p>
      <p>
        FTA has the advantage to be a more rigorous approach due to the
step-bystep reasoning. Contrary to FMEA, FTA is a graphical method and already
identifies the interrelations between concepts. As a result, FTA is more interpretable
than FMEA as the latter forces the analyst to decompose the system [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. In an
effort to automate the construction of the FTA trees, Venceslau et al. [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]
defined an ontology to model the system components and failures and constructed
a technique to generate the FTA tree from the constructed ontology
automatically. The use of the ontology solves the issue of inconsistencies and ambiguities
between FTA trees due to the lack of a common knowledge representation and
the automatic generation of the tree ensures human understanding of the result.
However, it again requires ontology design knowledge from the system experts.
      </p>
      <p>
        While an ontology can capture the various concepts occurring within a
domain and their intricate relationships, additional expressivity is required to
derive that a fault has occurred out of the combination of various system
observations. Rule languages, such as RuleML [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and SWRL [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] can define
inference rules, which are used inside a semantic reasoner to derive logical
consequences. Recently, techniques have been designed to extract SWRL rules from
text using NLP [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] or mine Semantic Web Association Rules from RDF data
(SWARM) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. However, there are, to our knowledge, currently no techniques
which allow the automated extraction of rules from risk analyses.
      </p>
      <p>It can be concluded that currently, no approaches exist that allow system
experts to use their traditional risk analysis methodologies, i.e. FMEA tables and
FTA trees, while still providing methods to automatically extract unambiguous
and consistent ontologies and rules from them in a user-friendly manner.
3</p>
      <p>
        User-friendly approach to extract knowledge from risk
analyses
Tools which detect and analyse the unwanted behaviour directly from the
sensor observations, such as AD and RCA, can use the expert knowledge as
input, preferably in a semantic format to operate automatically. Inferring the
failures based on the incoming sensor observations, in combination with a
domainspecific ontology, enable the detection of irregularities and the derivation of their
causes. The generated ontologies and inference rules are the building blocks to
determine this unwanted behaviour and can be incorporated in a
knowledgebased monitoring system to identify anomalies and their causes continuously. For
example, they can be integrated into MASSIF, a data-driven platform for the
semantic annotation of and reasoning on Internet-connected data, allowing
complex decision-making processing [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. When new sensor observations are generated
by the system, MASSIF semantically annotates them using the domain-specific
ontologies. MASSIF then uses a semantic reasoner to process the generated rules
and links defined in the ontologies to determine whether failures are occurring
and what their possible causes are. As such, the sensed data can be combined on
the fly with background knowledge, resulting in enhanced and adaptive
contextaware AD and RCA applications. This full process is visualised in Figure 2. The
next sections will focus mainly on the first part of this approach: the extraction
and combination of sensor data and expert knowledge in the form of FMEA and
FTA.
      </p>
      <sec id="sec-2-1">
        <title>Semantic</title>
      </sec>
      <sec id="sec-2-2">
        <title>Enhancement AD RCA</title>
      </sec>
      <sec id="sec-2-3">
        <title>FMEA/FTA</title>
      </sec>
      <sec id="sec-2-4">
        <title>Sensor data</title>
        <p>To generate these rules and ontologies in a user-friendly manner, we propose
an approach to automatically extract them from FMEA and FTA documents
and trees, as visualised in Figure 3.</p>
        <p>The first part of this automation approach uses declarative mapping rules to
map FMEA documents on domain-specific ontologies describing the components
and their associated anomalies, causes and system effects. Second, predefined
translation scripts are used to extract the inferences rules from the FTA trees. It
is important to state that both the mapping rules and scripts are generic and can
be re-used for every new FMEA table and FTA tree. Only when the structure
or template of the documents changes, additional mappings or changes to the
scripts will have to be provided. Different methodologies to easily provide these
changes with a minimum amount of human effort or knowledge about ontologies
and inference rules are also provided. Both are part of the semantic enhancement
visualises in Figure 2.</p>
        <p>To ease the explanation of the different steps, a running example based on a
smart fire detector will be used in the next sections. The end goal is to
semantically map the observations from this fire detector to possible failures and give
further tools the possibility to derive possible causes. A part of the FMEA is
visualised in Figure 1 (a) and it describes the possible failures of the available
smoke sensor. A false alarm (failure effect) could be generated when dust
accumulates in the device (failure cause), as it hinders the sensor from observing the
environment correctly.
The data inside the FMEA tables can be used to define a domain-specific
ontology, describing the links between several components of the system and their</p>
        <sec id="sec-2-4-1">
          <title>FMEA tables</title>
          <p>+</p>
        </sec>
        <sec id="sec-2-4-2">
          <title>RMLEditor Folio Ontology</title>
          <p>RML rules</p>
        </sec>
        <sec id="sec-2-4-3">
          <title>RML Mapper</title>
        </sec>
        <sec id="sec-2-4-4">
          <title>Python script</title>
        </sec>
        <sec id="sec-2-4-5">
          <title>FTA tree</title>
          <p>Mapping generator
possible failures and related causes. The automated process transforming these
tables to an ontology is visualised in the top part of Figure 3. The FMEA tables,
represented as CSV files, will be used for the mapper as input. The mapper
itself will use rules to convert the data inside the table to ontology concepts with
predefined links between them. Both the description of the rules and the links
between the concepts in the FMEA tables will be explained in this section.
Folio ontology</p>
          <p>
            Before we can specify the methodology to extract knowledge from FMEA &amp;
FTA documents for a specific domain ontology, a definition of the common
concepts within the risk analysis domain should be given. Therefore, we developed
an ontology, called Folio1, which captures all application-independent concepts
that occur within FMEA, FTA and anomaly detection methods. It is based
on the aforementioned ontologies constructed by Zhou, et al. [
            <xref ref-type="bibr" rid="ref24">24</xref>
            ] and Pardo,
et al.[
            <xref ref-type="bibr" rid="ref16">16</xref>
            ]. There are several concepts inside the FMEA template similar in the
anomaly domain. The effects and causes of an anomaly can be related to the
failure causes and effects, while both have detection methods and a degree of
severity. Combining the concepts of both of them enables the derivation of the
possible anomaly causes with the available knowledge inside the FMEA
worksheets.
          </p>
          <p>The Anomaly class defined inside Figure 4 and the directly connected classes
include all the possible anomaly information. These classes were adapted to
ensure applicability in a context of detecting anomalies for Internet-connected
devices and can determine the irregularities in streaming data. The Semantic
1 Folio ontology: https://github.com/IBCNServices/Folio-Ontology/blob/master/Folio.owl
y
t
li
a
trsc
ii
C
a
h
folio:Criticality
y
r
o
g
e
t
a
C
s
a
h
folio:Category
folio:Anomaly
tc
e
ffsE
a
h
folio:Effect
hasEffect</p>
          <p>A
s
i
folio:FailureEffect
n
o
i
ttc
e
e
D
s
a
h
folio:DetectionMethod
A
s
i
folio:LocalEffect
hasLowerEffect
hasNextEffect</p>
          <p>isA hasLowerEffect
folio:IntermediateEffect</p>
          <p>hasNextEffect
A
s
i
isLocalEffect
isInterEffect
folio:FailureCause</p>
          <p>A
s
i
e
s
u
a
C
s
a
h
folio:Cause</p>
          <p>A
s
i
External component
Subclass relation
Specified relation
n
i
a
m
o
D
s
a
h
folio:ConsequenceDomain
sosa:result
t
l
u
s
e
R
s
a
h
:
a
s
o
s
sosa:Observation isA
sosa:makeObservation
sosa:Sensor
sosa:Observes
hasEffect</p>
          <p>folio:FailureMode
ssn:hasSubSystem
sosa:ObservableProperty
happenedAt
ssn:System</p>
          <p>hasCause</p>
          <p>
            Sensor Network (SSN) ontology2 [
            <xref ref-type="bibr" rid="ref10 ref14 ref9">9,14,10</xref>
            ] describes sensors and their
observations for a diverse range of devices and is included in this upper ontology. The
SSN architecture includes a lightweight, but self-contained core ontology called
SOSA (Sensor, Observation, Sample, and Actuator) for its elementary classes
and properties. With their different scope and different degrees of
axiomatization, SSN and SOSA can support a wide range of applications and use cases. By
using SSN &amp; SOSA, the Folio ontology can describe the sensor's observations
that are the basis for analysing the system behaviour. Relationships were defined
in Folio to correlate the SSN classes with possible failures and effects.
          </p>
          <p>The FMEA concepts from Zhou, et al. were extended and related to the
anomaly class inside the Folio ontology. The FailureEffect and FailureCause
classes are subclasses of the anomaly Effect and Cause classes.</p>
          <p>Relations between causes and effects are needed to describe the
corresponding connections between multiple components. A FailureCause defines a
concept with no further hasNextEffect relations. An IntermediateEffect
concept will describe the influence of an intermediate component that is affected
by, but not causing, the detected problem. The whole detection flow can have
multiple Intermediate Effects. The LocalEffect refers to the first detected
effect on the system. A LocalEffect will mostly be related to a faulty sensor
observation itself, describing the current state of the device or system
component. For the fire detector example, the accumulation of the dust will be defined
as a FailureCause because it can be verified as an end effect with no further
hasNextEffect relations. The malfunctioning of the sensors are IntermediateEffects,
2 SSN ontology: https://www.w3.org/TR/vocab-ssn/
and they could even have multiple causes. A LocalEffect could be a value too
high observation, indicating something is wrong with the system.</p>
          <p>Domain knowledge transformation</p>
          <p>The previously described upper ontology Folio can now be used to form a
more domain-specific ontology, using the data from the FMEA tables. As such,
anomaly knowledge can be extracted from the FMEA itself, and the causes of
these anomalies can be derived by following the created semantic links. The
mapping approach from these table entries to Folio concepts is visualised in the
top part of Figure 3 and consists of three different steps. First, the tables itself
must be transformed into a computer-readable format to process the information.
Second, rules must be generated to map the column and header information from
the FMEA table to existing concepts inside the upper ontology. At last a mapping
procedure is required to transform all the rows inside the formatted table to
domain-specific concepts, eventually creating the domain-specific ontology.</p>
          <p>
            More specific, FMEA is usually performed using a spreadsheet program,
transformable to CSV document used for further analysis. The different
possible elements of each record in the FMEA are fixed and defined by the column
headers of the provided FMEA templates. More concrete, every FMEA table
defines minimal the failures, their effects and their causes of a system. To enable
the mapping of the FMEA on the Folio ontology, these column headers should
be mapped on ontological concepts. A mapping language was used to realise
this, which enables the declarative definition of how to generate RDF from
existing data sources through a set of rules. Our approach uses the RML mapping
language [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ].
          </p>
          <p>
            We defined the RML rules following the guidelines of the Folio ontology
via the RMLEditor [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ], which offers a graphical user interface to aid users in
defining rules. The high levels steps we followed are as follows: (i) a sample of
an FMEA table was loaded in the RMLEditor, (ii) the rules were created by an
ontology expert, (iii) the corresponding RDF triples were generated, (iv) if the
triples are not as expected the rules are updated, and (v) the rules are exported3.
Afterwards, the RMLMapper4, a tool to execute RML rules, is used to generate
the ontologies for all FMEA tables. The mappings ensure that for each cell in
the FMEA table, a new class is created in the ontology, which is a subclass of
the class on which the column is mapped according to the rules. For example, if
we consider the 5th cell on the second row of Figure 1 (a), the RMLMapper will
create a new concept DustAccumulation in the ontology, which has as superclass
the FailureCause class.
          </p>
          <p>
            This approach is preferred because mapping languages provide a reusable
solution, while custom software and mapping scripts are limited to a specific
use case or implementation [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ]. Another advantage is the adaptive character
of the mapping rules: when making changes in the representation of the data
updating the mapping rules will suffice to incorporate this extra information
3 RML rules: https://github.com/IBCNServices/Folio-Ontology/blob/master/mapping.rml.ttl
4 RMLMapper: https://github.com/RMLio/RML-Mapper
in the domain-ontology. As such, these mappings can be re-used to translate
any FMEA table that is created according to the standard FMEA structure.
Changing the information inside or adding new information regarding risks and
failures to the FMEA documents do not affect the generation of the domain
ontologies at all. Only if the template changes, e.g. If a new column is added or
for instance, the risk analysts switch to a more advanced Failure Mode, Effect
and Criticality Analysis method, new rules must be defined, which can easily be
created by mapping the columns to the Folio classes by using the RMLEditor.
Due to the frequently used FMEA templates, this will not happen often. In our
fire detector example, this means that updating the FMEA documents, by adding
an additional cause for the unwanted evacuation (for instance a broken test
button), does not affect the domain ontology generation process. The outcome
of our mapping approach is a domain ontology in OWL. In our fire detector
example, this ontology will relate the failures of the temperature and smoke
sensors to the general system effects, using the relationships of the upper Folio
ontology.
3.2
          </p>
          <p>Rule generation approach
While the previous part relates the domain-specific information of failures and
causes together, faulty sensor observations must be mapped to the correct
failures before a semantic-based monitoring system, such as the one describe in
Figure 2 can be operational. Rules are used for specifying the irregularities in
the data through defining patterns or operational ranges. For example, a smoke
detector can be defined as faulty, when it measures impossibly high values of dust
accumulations. This requires experts to define the normal value ranges for these
sensors adequately. The Folio ontology and the previously explained FMEA
mapping approach already allow defining the observations and their resulting values
made by sensors. This section describes how rules can be extracted from the
FTA trees to link these observations to possible faults that occur, by using the
process visualised at the bottom of Figure 3. Similar to the FMEA mapping
approach, three different steps can be defined. First, the trees themselves must
be transformed into a computer-readable format to process the rules. Second,
tree-agnostic knowledge must be mapped to specific rule concepts to perform
the translation between the tree representations and the rule definitions. At last
a mapping procedure is required to transform all the information inside the
formatted trees to domain-specific rules.</p>
          <p>Decision Fault Trees</p>
          <p>While original fault trees describe the relationship between the components
of the system, they usually do not allow to differentiate the observations from
their possible failures. In the case of the fire detector example visualised in
Figure 1 (b), the link between the sensor observations and all the possible failures
shows the interaction of the different system components but does not capture
the difference between the accumulation of dust or, for example, a broken sensor.</p>
          <p>A fault tree created from the FTA restricts the analysis to the relations between
the components inside the system solely. Therefore, a combination of a decision
tree, which is capable of modelling the decision from observations to failure with
the possible consequences, together with the general FTA tree, is used here. This
so-called decision fault tree (DFT) provides tests on the intermediate edges of the
tree, visualising the basic rules for further analysis. Figure 5 gives an example of
such a decision tree, related to our fire detector example. When a certain smoke
observation has a value greater than 50 ppm, the observation can be classified
as a ValuesTooHigh failure.</p>
          <p>Smoke
Observation</p>
          <p>Value&gt;50
Value&lt;=50</p>
          <p>ValuesTooHigh</p>
          <p>Normal behaviour</p>
          <p>A user interface was designed to build such DFTs, as shown further in
Figure 8. In this editor, descriptions of the observation and failure nodes can be
given. These different node concepts should align with the concepts defined in
the FMEA. Tests describing the relations between these observations and
failures can be added or adapted. Several representations are possible for such DFTs.
The user-interface outputs JSON file to describe the nodes and the rule-specific
edges.</p>
          <p>Domain-specific decisions
The constructed DFTs can now be used as input to define the domain-specific
decisions, relating the observations to previously defined failures in the FMEA
procedure. To translate the decision inside the tree to rules, a rule generator
script was designed in Python5 to transform the JSON representation into SWRL
rules. In a first step, the decision and nodes are gathered from the DFT inside a
JSON format. Second, RDF syntax rule definitions are used as mock-ups for the
SWRL rules. These definitions specify all the basic boolean operations, as well
as the logical operators (&lt;; ; ==; ; &gt;). The JSON DFTs are then provided as
input to these definitions, resulting finally in specific SWRL rules. These SWRL
rules can be attached to the FMEA RDF document or can be saved separately. To
give an example, the generated SWRL rule specifying a ValuesTooHigh failure
in the fire detector example of Figure 5 looks as follows:
5 Script: https://github.com/IBCNServices/Folio-Ontology/blob/master/swrl_builder.py
SmokeObservation(?o) ^ hasResult(?o, ?result) ^
hasValue(?result, ?value) ^ swrlb:greaterThan(?value, 50)</p>
          <p>-&gt; ValuesTooHigh(?o)
This rule describes the inference of a ValuesTooHigh failure when an observation
is a SmokeObservation and the result value of this observation is greater than
50.</p>
          <p>Similar to the FMEA mapping procedure, the python mock-ups are defined
once and can operate on all generated DFTs. Changing the information inside or
adding new information regarding risks and failures to the DFTS do not affect
the rule generation process. Only if the DFT components changes, e.g. If new
functional operators are added, a new mock-up must be defined.
4</p>
          <p>
            Use case: Measuring Train Passenger Comfort
The growing requirements for quality of service put new challenges on the
operation and development of trains and railway tracks. Therefore, research on the
passenger comfort levels has reached high interest in the last decade [
            <xref ref-type="bibr" rid="ref15">15</xref>
            ]. As
shown in Figure 6, train bogies are now equipped with accelerometers and
gyroscope sensors, able to detect the shocks and damping effect of the train on the
tracks. Multiple sensor observations of different train cars can be combined on
a server to indicate the passenger comfort inside the train. Maintenance alerts
are given to both the train or track staff to resolve the issues.
          </p>
          <p>The company installing these train monitoring units, i.e. Televic Rail,
performed risk analyses. The resulting FMEA table, visualised in Figure 7, shows
the possible failures of a disallowed comfort level that result in the effect of
multiple falsely generated warnings for the train driver. Two possibilities are
a broken or malfunctioning sensor. The FMEA table shows that the cause of
the latter is varying outdoor temperatures while degradation causes the broken
sensor. Replacing or recalibrating it could solve these issues.</p>
          <p>Component</p>
          <p>Function</p>
          <p>FMEA_temp
Failure Mode Failure Effect</p>
          <p>Failure Cause
Accelerometer Sensor Measures changes in</p>
          <p>gravitational acceleration</p>
          <p>A DFT was also modelled by Televic in the designed web interface, as shown
in Figure 8. This tree describes the relationship between the temperature
observations of the accelerometer unit and the humidity observations of the gyroscope
sensor unit with their possible failure modes. A ValuesTooHigh failure can occur
when the temperature of the accelerometer has a value higher than 125 degrees
Celsius. The value range is this high because the accelerometer module operates
on the wheel axles and these components are influenced by much frictional heat.
A second failure can be derived when the temperature value is lower or equal
than minus 40 degrees Celsius. We will refer to to same ValuesTooHigh failure
for visualization purposes. At last, the same ValuesTooHigh failure can be used
to indicate the humidity of the gyroscope has a value higher than 85%. All other
observations are classified as normal in this simple use case.</p>
          <p>The corresponding JSON file of the DFT and the CSV file of the table can be
given as input to the mapping engine. The RML rules are here already predefined
(same rules as defined in the fire detector example) and map the specific input
fields to an RDF train-specific ontology. A schematic overview of the generated
ontology is given in Figure 9 and visualises the major concepts of Figure 7. The
inferred rules of the DFT, given in Figure 8, are visualised in Listing 1.1. This
listing describes three SWRL rules corresponding to the paths from the sensor
observations to the single failure mode. When an accelerometer temperature
observation reaches the reasoning engine, and its value is greater than to 125
degrees Celsius, the observation will be classified as a ValuesTooHigh failure
and further actions can be taken.</p>
          <p>HumidityObservation (?o) ^
hasResult (?o, ? result ) ^
swrlb : greaterThan (? Value , 0.85) ^
hasValue (? result , ? Value )
-&gt; ValuesTooHigh (?o)
hasResult (?o, ? result ) ^
swrlb : greaterThan (? Value , 50) ^
hasValue (? result , ? Value ) ^
TemperatureObservation (?o) ^
swrlb : greaterThan (? Value , 125)
-&gt; ValuesTooHigh (?o)
swrlb : lessThanOrEqual (? Value , -40) ^
hasResult (?o, ? result ) ^
hasValue (? result , ? Value ) ^
TemperatureObservation (?o) ^
swrlb : lessThanOrEqual (? Value , 50)
-&gt; ValuesTooHigh (?o)</p>
          <p>Listing 1.1: SWRL rules derived from the DFT in Figure 8</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>5 Conclusion and Future work</title>
      <p>In this paper, research is proposed to enable the automatic knowledge extraction
out of risk analyses into domain-specific ontologies and accompanying inference
rules. Mappings were provided to incorporate the knowledge inside FMEA
documents into a domain-specific ontology. An upper ontology was used to relate
the main concepts, making the methods operational for several, different
applications. Inference rules were extracted from DFTs, which were able to express
the link between sensor observations and defined failures. Both methods allow
system experts to use the risk analysis methodologies and tools they are used
too to build a domain-specific ontology with accompanying rules, without the
additional need for ontology experts. These ontologies and accompanying rules
ensure that a common vocabulary and consistency check is maintained and can
be used to enable on the fly detection of anomalies and their causes through
semantic reasoning. It enables the system experts to focus on the risk analysis
task, instead of on a knowledge modelling task for which they do not have the
adequate ontology design expertise. Future research can now use the designed
ontologies, together with accompanying rules to derive or reason on the possible
causes inferred from the failures. Additionally, the DFT editor itself can be
extended with consistency checks to ensure improved rule generation.
Acknowledgment: This research is part of the imec ICON project Dyversify,
co-funded by imec, VLAIO, Renson Ventilation NV, Televic Rail &amp; Cumul.io.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Barati</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , et al.:
          <article-title>Swarm: approach for mining association rules from semantic web data</article-title>
          .
          <source>In: Conference on Artificial Intelligence</source>
          . pp.
          <fpage>30</fpage>
          -
          <lpage>43</lpage>
          . Springer (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Ben-Daya</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Failure mode and effect analysis</article-title>
          .
          <source>In: Handbook of maintenance management and engineering</source>
          , pp.
          <fpage>75</fpage>
          -
          <lpage>90</lpage>
          . Springer (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Boley</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , et al.:
          <article-title>Design rationale of ruleml: A markup language for semantic web rules</article-title>
          .
          <source>In: Proceedings on Semantic Web Working</source>
          . pp.
          <fpage>381</fpage>
          -
          <lpage>401</lpage>
          . CEUR-WS (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Bonte</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , et al.:
          <article-title>The massif platform: a modular and semantic platform for the development of flexible iot services</article-title>
          .
          <source>Knowledge and Information Systems</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Camossi</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          , et al.:
          <article-title>Semantic-based Anomalous Pattern Discovery in Moving Object Trajectories</article-title>
          .
          <source>CoRR abs/1305</source>
          .1 (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Dimou</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , et al.:
          <article-title>Rml: A generic language for integrated rdf mappings of heterogeneous data</article-title>
          .
          <source>In: LDOW</source>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Dittmann</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          , et al.:
          <article-title>Performing fmea using ontologies</article-title>
          .
          <source>In: 18th International Workshop on Qualitative Reasoning. Evanston USA</source>
          . pp.
          <fpage>209</fpage>
          -
          <lpage>216</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Ericson</surname>
            ,
            <given-names>C.A.</given-names>
          </string-name>
          :
          <article-title>Fault tree analysis</article-title>
          .
          <article-title>Hazard analysis techniques for system safety pp</article-title>
          .
          <fpage>183</fpage>
          -
          <lpage>221</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Haller</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Janowicz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cox</surname>
            ,
            <given-names>S.J.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Le Phuoc</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Taylor</surname>
          </string-name>
          , K.,
          <string-name>
            <surname>Lefrançois</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Semantic Sensor Network Ontology. W3C and OGC Recommendation, W3C &amp; OGC (Oct 19</article-title>
          <year>2017</year>
          ), https://www.w3.org/TR/vocab-ssn/
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Haller</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Janowicz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cox</surname>
            ,
            <given-names>S.J.</given-names>
          </string-name>
          , LefranÃğois,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Taylor</surname>
          </string-name>
          , K.,
          <string-name>
            <surname>Le Phuoc</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lieberman</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Garcia-Castro</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Atkinson</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stadler</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>The modular SSN ontology: A joint W3C and OGC standard specifying the semantics of sensors, observations, sampling, and actuation</article-title>
          .
          <source>Semantic Web Journal</source>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Hassanpour</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , et al.:
          <article-title>Framework for the automatic extraction of rules from online text</article-title>
          .
          <source>In: Workshop on Rules and Rule Markup Languages</source>
          . Springer (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Heyvaert</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , et al.:
          <article-title>Rmleditor: a graph-based mapping editor for linked data mappings</article-title>
          .
          <source>In: International Semantic Web Conference</source>
          . pp.
          <fpage>709</fpage>
          -
          <lpage>723</lpage>
          . Springer (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Horrocks</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , et al.:
          <article-title>Swrl: A semantic web rule language combining owl and ruleml</article-title>
          .
          <source>W3C Member submission 21</source>
          ,
          <issue>79</issue>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Janowicz</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Haller</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cox</surname>
            ,
            <given-names>S.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Le Phuoc</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , LefranÃğois,
          <string-name>
            <surname>M.:</surname>
          </string-name>
          <article-title>SOSA: A lightweight ontology for sensors, observations, samples, and actuators</article-title>
          .
          <source>Journal of Web Semantics</source>
          (
          <year>2018</year>
          ). https://doi.org/https://doi.org/10.1016/j.websem.
          <year>2018</year>
          .
          <volume>06</volume>
          .003
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Karimpanal</surname>
            ,
            <given-names>T.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gadhia</surname>
            ,
            <given-names>H.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sukumar</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cabibihan</surname>
          </string-name>
          , J.:
          <article-title>Sensing discomfort of standing passengers in public rail transportation systems using a smart phone</article-title>
          .
          <source>CoRR</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Pardo</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          , et al.:
          <article-title>A framework for anomaly diagnosis in smart homes based on ontology</article-title>
          .
          <source>Procedia Computer Science</source>
          <volume>83</volume>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Peeters</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , et al.:
          <article-title>Improving failure analysis efficiency by combining fta and fmea in a recursive manner</article-title>
          .
          <source>Reliability engineering &amp; system safety 172</source>
          ,
          <fpage>36</fpage>
          -
          <lpage>44</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Rehman</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kifor</surname>
            ,
            <given-names>C.V.</given-names>
          </string-name>
          :
          <article-title>An ontology to support semantic management of fmea knowledge</article-title>
          .
          <source>International Journal of Computers</source>
          ,
          <source>Communications &amp; Control</source>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Solé</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , et al.:
          <article-title>Survey on Models and Techniques for Root-Cause Analysis</article-title>
          .
          <source>Clinical Orthopaedics and Related Research (CoRR)</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Souiden</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , et al.:
          <article-title>A survey on outlier detection in the context of stream mining</article-title>
          .
          <source>In: Advances in Intelligent Systems and Computing</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Venceslau</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , et al.:
          <article-title>Ontology for computer-aided fault tree synthesis</article-title>
          .
          <source>In: Emerging Technology and Factory Automation (ETFA)</source>
          ,
          <year>2014</year>
          IEEE. pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . IEEE (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22. YE:
          <article-title>Big data: Changing the way businesses compete and operate (</article-title>
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Ye</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , et al.:
          <article-title>Semantic web technologies in pervasive computing</article-title>
          .
          <source>Pervasive and Mobile</source>
          Computing pp.
          <fpage>1</fpage>
          -
          <lpage>25</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , et al.:
          <article-title>A research on intelligent fault diagnosis of wind turbines based on ontology and fmeca</article-title>
          .
          <source>Advanced Engineering Informatics</source>
          <volume>29</volume>
          (
          <issue>1</issue>
          ),
          <fpage>115</fpage>
          -
          <lpage>125</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>