<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Comparison of Machine Learning Algorithms and Tools in Prognostic Predictive Maintenance: a Focus on Siamese Neural Network Models?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Lazzarinetti Giorgio</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Massarenti Ni</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>ntisi St</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>sso Ono</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Noovle S.p.A</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Milan</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Italy https://www.noovle.com/en/</string-name>
        </contrib>
      </contrib-group>
      <abstract>
        <p>With the advent of Industry 4.0, predictive maintenance techniques have largely spread throughout companies. However, it is still di cult to understand how to implement a predictive maintenance strategy to get satisfactory results. In this research we propose a methodology to de ne a benchmark in terms of performance of machine learning algorithms in the context of prognostic predictive maintenance from a classi cation perspective. In de ning such a benchmark we use three target datasets publicly available over which to compare di erent preprocessing and feature engineering techniques and di erent machine learning algorithms and auto learning tools. Our benchmark shows that it is possible, by following the guidelines delineated in this paper, to select the proper combination of preprocessing, feature engineering and algorithms/tools to get an average F1-score of 98%. Moreover, we propose an innovative approach based on siamese neural networks that shows comparable results with respect to the benchmark de ned, thus showing that also this kind of algorithm has to be tested to be sure to reach the best possible results.</p>
      </abstract>
      <kwd-group>
        <kwd>Predictive Maintenance</kwd>
        <kwd>Benchmark De nition</kwd>
        <kwd>Siamese Neural Network</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Thanks to the advent of Industry 4.0 and the enhancements in machine
learning techniques, in recent years predictive maintenance (PdM) applications have
largely spread throughout companies. Since PdM is an active area of research,
there are thousands of papers published on the topic, however among all the
possibilities of implementing a PdM system, it is still di cult to identify a
speci c strategy to get satisfactory results. On the shake of this, this research aims
at de ning a technical benchmark to measure the performance of di erent fault
prognosis algorithms and auto-learning tools in the context of prognostic PdM.
More precisely, this research is driven by the business need of a partner company
that produces vertical cutting machines and aims at creating a PdM system to
predict breakage events, thus reducing related costs by avoiding them. One of
the main issues of the partner company is that they have scarse connectivity
throughout the production line, so they cannot stream data in real-time to the
nal system that will be cloud-based. In this context, the nal goal is to produce
a system capable of monitoring in semi-real-time through sensors some
operating parameters of the machines in order to be able to predict their remaining
useful life (RUL). Generally, the RUL is a continuous variable that requires a
regression problem to predict it. However, the semi-real-time scenario poses the
issue of interacting with the machine at discrete time intervals sending a batch
of the collected data every hour. Thus, since in the real case scenario we will get
data in batch with a certain time delay, in this research we focus on the context
of PdM from the classi cation point of view, i.e. we aim at predicting the class
of breakage of the last observations collected. Thus, we designed a methodology
to compute a benchmark for prognostic PdM based on the main state-of-the-art
machine learning algorithms and the available auto learning tools to provide
the partner company with a precise methodology to select the best algorithm
and determine how it performs with respect to the benchmark. Moreover we
compare the results with an innovative approach based on Siamese Neural
Network (SNN), which is an algorithm never used in this context. Computing this
benchmark will allow the partner company to de ne the best PdM strategy by
following the guidelines de ned in this paper and to check whether the results
they are obtaining by implementing the PdM system are competitive with the
state-of-the-art results. The rest of this paper is organized as follows. In chapter
2 a comprehensive analysis of the state of the art for PdM is presented. Then in
chapter 3 the methodology for the creation of the benchmark is de ned together
with the innovative approach based on SNN. In this chapter also the dataset
used for the computation are described. In chapter 4 the results obtained are
shown with a focus on the comparison of the benchmark with the innovative
approach and, nally, in chapter 5 some conclusive remarks.
2</p>
    </sec>
    <sec id="sec-2">
      <title>State of the Art</title>
      <p>
        Predictive maintenance (PdM) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], which is the analysis of industrial
machinery's operating parameters in order to predict breakage events [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], is an active
area of research that has found the right space for application only recently
thanks to the fact that industry is currently moving towards the so called
industry 4.0 [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Indeed, new technologies from industry 4.0, such as the Internet
of things (IoT) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], cloud computing and sensors and advances in arti cial
intelligence from software [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] and hardware [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] perspectives, allow the integration of
people, machines and products, thus making possible a fast exchange of
information and the generation of even more data [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], enabling e cient and e ective
PdM for companies [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. There are several approaches to PdM. In particular,
the taxonomy of the approaches di ers in three macro aspects: the architecture
of the system (OSA CBM, supported by the cloud or based on industry 4.0
technologies), the objective (minimization of costs, maximization of reliability
and availability or multi-objective) and the type of algorithms used [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In this
research we focus on fault prognosis and diagnosis algorithms, in the context
of industry 4.0 with the goal of maximizing the reliability and availability of
the system, which can be carried out with two macro typologies of approaches:
knowledge based and data driven. Knowledge based methods make use of expert
knowledge of the monitored systems and can be divided into 3 categories:
ontology based, rule based and model based. Ontology based approaches allow for
the creation of knowledge bases for di erent systems and machinery [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. In the
context of PdM, several ontologies have been built [10{13], however these
approaches must be used together with other reasoning techniques to be e ective.
Rule based approaches are based on the evaluation of data with a set of xed
IF-THEN-ELSE rules determined by domain experts, which has the advantage
of including a-priori knowledge in the system [14{17]. These approaches are very
e ective, but clearly not scalable. Model based approaches are based on the
implementation of mathematical models of the physical processes which have an
impact on the health of the system components [18{22]. These approaches are
applicable only when the underlying physical process can be perfectly described
by a mathematical model without adopting too stringent assumptions or
constraints and this rarely happens [23{25]. Data driven approaches, on the other
end, are approaches that use historical data to learn a model of the system's
behavior with machine learning techniques [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. From the literature perspective,
the task of predicting failures can be reduced to three main types of problems:
binary classi cation, multi-class classi cation and regression. Binary classi
cation is used in PdM with the goal of estimating the probability that after a
certain number of machine cycles the machine will break down. Similarly for
multi-class classi cation, where each class represents the probability that a
machine will break down in the following N cycles, with N possibly di erent for each
class. Regression models, on the other hand, are used to estimate the number
of life cycles remaining (RUL). Some traditional machine learning algorithms
used in this eld are: Arti cial Neural Network (ANN) [27{30], Decision Tree
(DT) and Random Forest (RF) [31{33], Support Vector Machine (SVM) [
        <xref ref-type="bibr" rid="ref34 ref35">34,
35</xref>
        ] and K-nearest Neighbor (KNN) [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ]. However, in recent times, research has
moved towards Deep Learning algorithms that have proven to somehow
outperform many of these more traditional models [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Speci cally, the main algorithms
used in the context of PdM are: Convolutional Neural Network (CNN),
Recurrent Neural Network (RNN) and Generative Adversarial Network (GAN). In
this context, CNNs have shown enormous ability to extract useful and robust
features to perform fault diagnosis [37{39]. Experiments have shown that, with
proper hyperparameters tuning, models can achieve 99% accuracy levels. CNNs
are also often used to predict the RUL, as in [
        <xref ref-type="bibr" rid="ref40 ref41">40, 41</xref>
        ]. Also RNNs have often
been used as a fault diagnosis tool in recent times as their consolidated ability
to model time sequences has guaranteed these algorithms superior performance
compared to other types of networks [42{44]. Moreover, thanks to the ability
of Long Short Term Memory (LSTM) and Gate Recurrent Unit (GRU) cells
to handle long and time-dependent time series, many studies have been carried
out on the prediction of the RUL via these networks [45{47]. In the context of
PdM also GANs have been proposed to identify the type of machine failure [
        <xref ref-type="bibr" rid="ref48 ref49">48,
49</xref>
        ] or to predict the RUL [
        <xref ref-type="bibr" rid="ref50">50</xref>
        ] by modeling the trend of the health indicators
of a machinery. The advantage of these networks is that the health indicator
trend model becomes more accurate as more data is collected. In recent times,
also Siamese Neural Networks (SNNs) have emerged among deep learning
algorithms [
        <xref ref-type="bibr" rid="ref51">51</xref>
        ]. SNNs are models composed of two parallel identical sub-networks,
which process two di erents input data in order to create an embedding to be
compared. The two sub-networks are trained to produce an embedding so that
the similarity measure between the embedding produced is minimized in case the
two embedded inputs are of di erent classes and maximized otherwise [
        <xref ref-type="bibr" rid="ref52">52</xref>
        ]. This
type of learning is known as one-shot-learning. These approaches have proven
to be extremely useful also in the context of time series analysis. An example is
found in [
        <xref ref-type="bibr" rid="ref53">53</xref>
        ], where a system is proposed to measure the similarity between time
series using SNN with two twin subnets consisting of RNNs. The application of
these algorithms in the eld of PdM is still little explored today [
        <xref ref-type="bibr" rid="ref54">54</xref>
        ].
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Benchmark de nition</title>
      <p>
        The goal of this research is to de ne a benchmark in terms of performance of the
data driven PdM algorithms for fault prediction and compare the results with
an innovative approach based on SNNs. As explained in Chapter 1, given that
in the partner company's scenario data are send to the PdM model in batch
with a certain delay, we focus on the case of multi-class classi cation, where the
aim is that of determining, given a time series of variables, the breakage class.
For the de nition of the benchmark, not only custom algorithms are used, but
also some auto-learning tools such as Google Cloud AutoML [
        <xref ref-type="bibr" rid="ref55">55</xref>
        ] and Google
Cloud BigQuery ML [
        <xref ref-type="bibr" rid="ref56">56</xref>
        ] (BQ-ML). In order to de ne this benchmark we use
three widely used public datasets and calculate the performance for each of
them, comparing di erent preprocessing and feature engineering approaches.
In the following we provide all the details of each step necessary to compute
the benchmark. We also de ne also the implementation and evaluation of the
algorithm based on SNN and the calculation of the positioning of the SNN based
approach with respect to the benchmark on public datasets.
3.1
      </p>
      <sec id="sec-3-1">
        <title>Datasets description</title>
        <p>
          Three di erent public datasets have been identi ed for the de nition of the
benchmark.
Zenodo predictive maintenance dataset The dataset published by
Zenodo [
          <xref ref-type="bibr" rid="ref57">57</xref>
          ] consists of a series of IoT sensors for predictive maintenance in the
elevator industry. The collected data can be used for predictive maintenance of
elevator doors in order to reduce unscheduled stops and optimize maintenance
interventions.The dataset contains operational data in the form of time series
sampled at a frequency of 4Hz. In particular, for each lift there are
electromechanical sensors, physical sensors and environmental sensors. In the following we
will refer to this dataset as OML.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>NASA Turbofan Engine Degradation dataset The dataset published by</title>
        <p>
          NASA's Prognostic CoE [
          <xref ref-type="bibr" rid="ref58">58</xref>
          ] concerns the degradation of aeration engines and
is constructed using C-MPASS. The dataset is simulated under di erent
combinations of operating conditions and for di erent types of faults and contains
several variables that describe the characteristics of the evolution of the fault.
In the following we will refer to this dataset as Aircraft.
        </p>
        <p>
          XJTU-SY Bearing Datasets The XJTU-SY dataset [
          <xref ref-type="bibr" rid="ref59">59</xref>
          ] was published by
the Institute of Design Science and Basic Components at Xi'an Jiaotong
University, China for the predictive maintenance of rotating elements. The dataset
contains multivariate time series of 15 rolling bearings from start to failure,
acquired by conducting several accelerated degradation experiments. In the
following we will refer to this dataset as XJTU-SY.
3.2
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>Preprocessing and Feature engineering</title>
        <p>In order to de ne a precise benchmark, we decided not only to compare
different machine learning algorithms but also di erent preprocessing techniques
and di erent feature engineering approaches. In this case, three distinct feature
engineering modes have been de ned that share a common preprocessing phase.
Preprocessing Firstly data is normalized and the features that have zero
variance are eliminated. The target variable is then de ned as RUL, i.e. number of
cycles missing from the fault. Since the benchmark to be determined refers to a
multi-class classi cation problem we need to convert the RUL from a
continuous variable to a discrete variable. Thus, we de ne a methodology to divide the
dataset into 3 classes: one containing the cases of RUL between 0 and N, one
containing the cases of RUL between N and M with M&gt;N and one with the cases
of RUL greater than M. In this way the three classes represent a case of failure
in the short term (RUL&lt;N), a case of failure in the medium term (N&lt;RUL&lt;M)
and a case of good functioning (RUL&gt;M). The method of selecting the
parameters N and M depends both on the use case, i.e. on how long the cycles last and
in how many cycles on average a failure case occurs, and on the performance of
the models, i.e. on the accuracy of the models in the short, medium and long
term. Starting from a given N (the minimum number of cycles that ensure the
operator room to maneuver), a series of machine learning models is trained for
larger values of N. For each model trained, the performance are calculated and
the performance trend is studied as N varies. The idea is to select N as large as
possible (to ensure that the prediction occurs in time, guaranteeing the operator
room to maneuver) but with the aim of maintaining good performance. A limit
deviation of 5% from the maximum performance value is therefore considered.
Once parameter N has been selected, M is selected in the same way.
Feature Cycle (FC) The rst feature engineering approach consists in using
the preprocessed dataset and in creating for each feature and for each pair of
features the corresponding second degree feature crosses (for example, given the
features x and y, a dataset containing x; y is considered, xy; x2y2). This is a
standard feature engineering technique that has to be tested in order to nd
the best solution possible. Once the features are generated, since some datasets
contain many sensors and the size of the features may explode, the features are
reduced through Principal Component Analysis (PCA) , in order to represent the
features through an embedding vector. The vector is constructed by taking only
the k principal components that describe at least 95% of the variance present in
the data.</p>
        <p>Feature Rolling (FR) A second method of feature engineering consists in
using the preprocessed dataset enriched with the calculation of the second degree
feature crosses as described above, then adding a level of temporal aggregation
to also take into account the overall trend of the series. In this case, for each
detection xi the sequence of the t values preceding xi; (xi t; :::; xi) is taken and it
is replaced with the average of the values of the sequence of length t. This allows
to engineer historical information and include them in the features, letting some
algorithms (which otherwise would not be able to consider historical information)
take these historical correlation into account. To determine the optimal value of
t, an approach based on the analysis of the performance of the models generated
by considering di erent values of t is adopted. In this case we start from a
minimum value of t = 2 and proceed by increasing t by 1. For each increment,
a classi er is trained and the performance are measured. The choice of t must
be made taking into consideration the peak point of the performance trend, but
always considering that too large t implies the need to have a certain number of
measurements before being able to make the prediction, therefore we take into
account the average life cycle of a machine and select t as the minimum value
between the peak point and 13 of the maximum number of life cycles. Also in
this case follows the reduction of the dimensionality based on PCA and on the
principle of 95% of the variance explained.</p>
        <p>Feature Rolling Enriched (FRE) The third and last approach of feature
engineering starts from the pre-processed database enriched with second degree
feature crosses over which FR is performed as described above but, for each batch
the features are enriched by calculating statistical indices as the mean value, the
median, the minimum, the maximum, the skew, the standard deviation and the
kurtosis index. This allows to enrich the dataset with statistically signi cant
features that could help in modeling particular relations between variables. Also
in this case follows the reduction of the dimensionality based on PCA and on
the principle of 95% of the variance explained.
3.3</p>
      </sec>
      <sec id="sec-3-4">
        <title>Algorithms and auto-learning tools</title>
        <p>
          Once the datasets have been prepared, di erent machine learning algorithms are
trained for each of the datasets described above which, according to the state of
the art, are widely used. Speci cally, the algorithms chosen for the creation of
the benchmark are: Logistic Regression (LR) as baseline algorithm, RF, ANN
and KNN since they are the main used algorithms in this context according to
the state of the art (from which we excluded SVM due to their scalability issues
with large datasets) and LSTM classi er which, among the DL techniques, is
the most consolidated in sequence learning problems [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. The aforementioned
models are trained using Google Cloud Vertex AI [
          <xref ref-type="bibr" rid="ref60">60</xref>
          ], in order to keep track of
models and versions and taking advantage of the hyper parameter optimization
provided by Google. This optimizer called hypertune is based on Google Vizier
and is a black box optimization service released in 2017 [
          <xref ref-type="bibr" rid="ref61">61</xref>
          ], based on Bayesan
optimization. In addition to training the models described above, we train other
models using the auto-learning tools provided by Google. Speci cally: Google
Cloud AutoML Tables, Google Cloud BQ-ML LR. For these tools of the Google
suite it is not necessary to perform tuning of the hyperparameters because these
are carried out automatically. For both the algorithms and the auto-learning
tools the F1 score is calculated. The training of the algorithms is conducted in a
systematic way. Each algorithm or tool is trained using the three di erent types
of datasets.
3.4
        </p>
      </sec>
      <sec id="sec-3-5">
        <title>Benchmark computation</title>
        <p>Once all the algorithms and tools have been trained, the benchmark is computed
by averaging the maximum performance obtained in terms of F1 score for each
algorithm and for each feature engineering technique applied. More formally,
given a set of datasets D : fd1; :::; dDg, algorithms A : fa1; :::; aAg and feature
d
engineering techniques F : ff1; :::; fF g and considered F 1a;f as the F1-score
associated to the ath algorithm, the f th feature engineering and the dth dataset,
the benchmark is computed as</p>
        <p>PD max
d=1 fa2A;f2F g</p>
        <p>F 1da;f
jDj
(1)
Thus, this benchmark represents an average result which can be pursued by
applying the correct feature engineering technique and the correct algorithm to
a speci c dataset.</p>
        <p>Guidelines for benchmark computation and evaluation To summarize,
given a set of dataset D, to compute the benchmark the following steps need to
be performed for each dataset:
{ De ne the minimum number of cycles N to let the operator intervene.
{ Preprocess the data and de ne the optimal value of N and M with the
methodology de ned in paragraph 3.2-Preprocessing.
{ Over the preprocessed data run the feature engineering technique de ned
as FC, FR and FRE, de ning the optimal parameter t for the FR feature
engineering technique with the methodology described in 3.2-Feature Rolling
(FC).
{ Divide the data in train and test with an 80/20 split and train the LR,
RF, ANN and KNN algorithms with the training data using Google Cloud
vertex AI leveraging the HyperTune algorithm to run cross validation and
hyperparameters tuning and Google auto-learning tools that automatically
perform all the optimizations.
{ Test each algorithm trained with the test data and measure the F1-score.
{ Compute the benchmark as described in paragraph 3.4 by considering the
best F1-score for each algorithm trained and feature engineering technique
applied.</p>
        <p>The benchmark thus obtained represents an average a ordable result. Moreover,
by following the same steps over a real dataset, it is possible also to identify the
best algorithm for the speci c case and compare the performance over that
dataset with respect to a prede ned benchmark.
3.5</p>
      </sec>
      <sec id="sec-3-6">
        <title>SNN based algorithm</title>
        <p>
          In addition to the state-of-the-art algorithms we decided to study the
performance of an innovative approach based on SNN [
          <xref ref-type="bibr" rid="ref51">51</xref>
          ]. In particular, we design
an SNN composed of two twin layers of LSTM neural networks. The objective
of this network is to take as input distinct time series associated with machine
operation that correspond to series that do not end in a fault and series that end
in a fault, sampled at di erent distances from the fault event itself. Each series
will have a class set according to the parameters N and M selected as described
in section 3.2. The assignment criterion is determined by the distance of the last
value of the series from the failure event in terms of cycles. On the basis of this
input, the network is trained by considering distinct pairs of time series, some of
the same class and some of di erent classes. The LSTM-based embedding layers
allow to build an embedding of these series taking into account temporal
dependencies. The network is trained to understand how to create these embedding so
that the selected distance metric considers more similar series of the same class
and more dissimilar series of di erent classes. The model is trained using Google
Cloud Vertex AI and leveraging hypertune for learning rate, epochs and batch
size. In order to make predictions, this kind of model, for each input series, must
build the embedding and compare it with the embeddings of a certain number of
previously collected series for which the class is known. The prediction class for
the input series is selected based on the majority voting of the classes assigned
by distance from each previously collected series. It is evident, however, that
the choice of the comparison series has an impact on the performance of the
classi er. Thus, we design a methodology to select the best comparison series.
Given a dataset of K classes C : fC1; C2; :::; CK g and N instances X1; :::; XN
such that each instance is a tensor of F features and T subsequent time instants
(namely a multivariate time series) so that each component of the instance Xn
f
is represented by xn;t with t 2 f1; : : : ; T g and f 2 f1; : : : ; F g
0x1n;1 x1n;T 1
        </p>
        <p>Bx2n;1 x2n;T C
Xn = @BB ... . . . ... ACC ; 8n 2 f1; : : : ; N g
xnF;1
xnF;T
(2)</p>
        <p>For each feature f and for each time instant t, the centroid k of the class k
with the components fk;t are computed as</p>
        <p>0 11 1T 1
k = B@ ... . . . ... CA ; fk;t =</p>
        <p>F F
1 T
1</p>
        <p>X
jCkj Xj2Ck
xjf;t; 8k 2 f1; : : : ; Kg
(3)</p>
        <p>Starting from the centroids of each class, we propose to use an approach
based on KNN to get the S multivariate time series closest to each centroid and
use these as comparison samples to detect the nal class by majority voting.
In this way we assure to use as a comparison sample just the series that are
more descriptive of each class. The size of S will be determined on the basis
of performance, starting from a minimum value of 1, which correspond to an
n-way one shot learning, and increasing incrementally. The drivers for the choice
of S will be both the performance of the models and the prediction times: since
the system must be industrialized it will be necessary that these times remain
relatively low, approximately in the order of seconds. Furthermore, since this is
a classi cation model, the same metrics used to evaluate the other models that
contribute to the de nition of the benchmark are used to evaluate and compare
the performance of this innovative approach with the benchmark.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Experimental results</title>
      <p>In the following the experimental results obtained are shown. In particular, rstly
the results obtained in running the methodology for N, M and t selection, as
explained in Paragraph 3.2. Then, the actual results of the di erent models and
tools trained to compute a benchmark and a comparison between the benchmark
and the SNN algorithm are presented.
4.1</p>
      <sec id="sec-4-1">
        <title>Preprocessing and Feature engineering</title>
        <p>The rst step for the de nition of the benchmark is that related to the
preprocessing and feature engineering step. It is, indeed, important to de ne the
parameters N, M and t as described in section 3.2-Preprocessing, in order to get
the best results by keeping the model useful from a business perspective (i.e., the
parameters N and M do not have to be too small, otherwise the operator does
not have time to stop the machine and avoid breakage event and, similarly, the
t parameter does not have to be too large, otherwise it is necessary to have a lot
of values in the past to be able to perform a prediction). In order to determine
the parameters N and M we train several RF classi ers rstly for subsequent
values of N and then, once N has been de ned, of M, keeping N xed. In
Figure 1 the results for di erent values of N and M for the Aircraft dataset are
shown. Clearly, the selection of N and M varies according to the dataset used.
As an example, for the XJTU-SY dataset and the OML dataset, the breakage
events happen after thousands of cycles, thus N and M are of the order of 50 to
100 thousands, while for the Aircraft dataset the breakage events happen after
hundreds of cycles, thus N and M are of the order of 10 to 100 cycles. After
looking at the results, and considering a limit deviation of 5% from the maximum
performance value to keep N and M as large as possible, the selected parameters
are de ned in Table 1.</p>
        <p>Analogous considerations hold for the selection of t. A RF classi er has been
trained for subsequent values of t, starting from t=2. Also in this case, the
frequency of the breakage events impact the selection of t. In Figure 2 it is
shown the trend of the scores register for the Aircraft dataset varying t. In
Table 1 we can see the best selected t considering a limit deviation of 5% from
the maximum performance value to keep t as small as possible. The selected
parameters are those used to train the di erent models and tools.</p>
      </sec>
      <sec id="sec-4-2">
        <title>General results: benchmark de nition</title>
        <p>To train and test each model and tools we applied an 80-20 split of training and
test data, performing a strati ed sampling. All the models have been trained on
Google Cloud Vertex AI, exploiting the hyperparameters optimization module.
As far as the auto learning tools are concerned, they automatically perform the
hyperparameters optimization. In order to compare the results and evaluate the
performance of each algorithm, we used the F1 score. In Table 2 a comparison of
the results obtained is shown. By analyzing the results we can see that generally
the performance over the OML dataset are better than the other and the ones
over the XJTU-SY dataset are worse. On average, the RF algorithm reaches the
best performance over all datasets (with all the feature engineering techniques
applied), with an 85.5% of F1 score. Moreover, we can state that the FRE
feature engineering technique, in most cases extremely improves the results of
the algorithms. This can be seen especially in the case of Aircraft and
XJTUSY, where the performance over the other feature engineering techniques are
de nitely worse, but also in the case of OML, even though the performance are
good also in the other cases. Finally, by considering the best results for each
dataset over all the feature engineering techniques and over all the algorithms
tested, on average we can state that it is possible to reach a 98% of F1-score, with
a 1.7% of standard deviation. This is the benchmark computed as in Equation
1, which describes the target result that one can achieves by properly selecting
the algorithm and the feature engineering technique for his own speci c dataset.
4.3</p>
      </sec>
      <sec id="sec-4-3">
        <title>SNN results</title>
        <p>In order to de ne the performance of the SNN algorithm, rstly we need to de ne
the optimal number S of comparison series. To de ne the optimal number S, we
follow the methodology proposed in Paragraph 3.5. We compute di erent F1
score based on a varying number of comparison series from 1 to 15. We compare
the results over each feature engineering and select the smallest S corresponding
to the best result. The best results obtained are S = 4 for FC, S = 5 for FR
and S = 5 for FRE. Given the benchmark de ned previously, we can compare
the results of the SNN based algorithms. In Table 2 the results, in terms of F1
score are shown. To compute the predictions, we get the top S series closest
to the centroid, de ned as in Equation 3. To get the top S series we use the
approach based on KNN described in Paragraph 3.5. As we can see, also in this
case, the best results are obtained with the FRE feature engineering technique.
Very good results are obtained for the Aircraft and the OML dataset, while
acceptable results are obtained for the XJTU-SY dataset. Computing the average
of the best results also for this algorithm, we have an average F1-score of 95.3%.
This is slightly under the benchmark previously de ned, however results are
comparable, meaning that also this kind of algorithm can be adopted in the
context of PdM.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusion and future works</title>
      <p>In this research we present a methodology for the de nition of a benchmark in
terms of performance in the context of prognostic predictive maintenance from
the classi cation perspective. In de ning the benchmark we consider di erent
preprocessing and feature engineering techniques and di erent machine learning
algorithms and auto-learning tools and we compute the benchmark over di erent
public datasets. We also de ne some approaches to automate parameters
selection that contribute to reach the best performance. In conclusion, we show that,
despite the input dataset, it is possible to select the proper feature engineering
technique and the proper machine learning algorithm or tool to reach an average
F1-score of 98%. Moreover we test an innovative approach based on SNN and
we show that it is competitive with the benchmark computed. To enhance the
research, it could be interesting to expand the de nition of the benchmark also
to real datasets, to understand whether the results obtained with public dataset
(some of which are synthetic) can be compared with the results obtained with
real dataset.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Yongyi</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xiaoxia</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pengfeng</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yonggang</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ruilong</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>A Survey of Predictive Maintenance: Systems, Purposes and Approaches</article-title>
          . ArXiv preprint, arXiv:
          <year>1912</year>
          .
          <volume>07383</volume>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Paolanti</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Romeo</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Felicetti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mancini</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Frontoni</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Loncarski</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <article-title>: Machine Learning approach for Predictive Maintenance in Industry 4.0</article-title>
          .
          <source>In: Proceedings of the 14th IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications (MESA)</source>
          . IEEE, Oulu, Finland (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Borgi</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hidri</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Neef</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naceur</surname>
            ,
            <given-names>M. S.</given-names>
          </string-name>
          :
          <article-title>Data analytics for predictive maintenance of industrial robots</article-title>
          .
          <source>In: International conference on advanced systems and electric technologies (IC ASET)</source>
          , pp.
          <volume>412</volume>
          {
          <issue>417</issue>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Rauch</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Linder</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dallasega</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Anthropocentric Perspective of Production before and within Industry 4.0</article-title>
          .
          <string-name>
            <surname>Computers</surname>
          </string-name>
          &amp; Industrial Engineering.
          <volume>139</volume>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Carvalho</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Soares</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vita</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , Francisco, R.,
          <string-name>
            <surname>Basto</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>A systematic literature review of machine learning methods applied to predictive maintenance</article-title>
          .
          <source>Computers &amp; Industrial Engineering</source>
          <volume>137</volume>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Nguyen</surname>
            ,
            <given-names>K. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Do</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grall</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>: Multi-level predictive maintenance for multicomponent systems</article-title>
          .
          <source>Reliability Engineering System Safety</source>
          <volume>144</volume>
          ,
          <issue>83</issue>
          {
          <fpage>94</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Habib</surname>
            ,
            <given-names>U. R. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ahmed</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yaqoob</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hashem</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ahmad</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Imran</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Big Data Analytics in Industrial IoT Using a Concentric Computing Model</article-title>
          .
          <source>IEEE Communications Magazine</source>
          <volume>56</volume>
          ,
          <issue>37</issue>
          {
          <fpage>43</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Peng</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wansen</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ruobing</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shengen</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yonggang</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Optimizing Network Performance for Distributed DNN Training on GPU Clusters: ImageNet/AlexNet Training in 1.5 Minutes. IEEE Transactions on Big Data (</article-title>
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Konys</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>An Ontology-Based Knowledge Modelling for a Sustainability Assessment Domain</article-title>
          .
          <source>Sustainability</source>
          <volume>10</volume>
          (
          <issue>2</issue>
          ) (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Schmidt</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Galar</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Semantic Framework for Predictive Maintenance in a Cloud Environment</article-title>
          . In: Teti,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Doriana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Addona</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          <source>(eds) 10th CIRP Conference on Intelligent Computation in Manufacturing Engineering - CIRP ICME 16, LNCS</source>
          , vol.
          <volume>62</volume>
          , pp
          <fpage>583</fpage>
          -
          <lpage>588</lpage>
          . Elsevier
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Lira</surname>
            ,
            <given-names>N. D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borsato</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>OntoProg: An ontology-based model for implementing Prognostics Health Management in mechanical machines</article-title>
          .
          <source>Advanced Engineering Informatics</source>
          <volume>38</volume>
          ,
          <issue>746</issue>
          {
          <fpage>759</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cao</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Ontology-Based Method for Fault Diagnosis of Loaders</article-title>
          .
          <source>Sensors</source>
          <volume>18</volume>
          (
          <issue>3</issue>
          ) (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Cao</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Giustozzi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zanni</surname>
            ,
            <given-names>M. C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De</surname>
            ,
            <given-names>B. F.</given-names>
          </string-name>
          , Reich, C.:
          <article-title>Smart Condition Monitoring for Industry 4.0 Manufacturing Processes: An Ontology-Based Approach</article-title>
          .
          <source>Cybernetics and Systems</source>
          <volume>50</volume>
          , 1{
          <fpage>15</fpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Evgeny</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gulnar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ognjen</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guohui</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Elem</surname>
            ,
            <given-names>G. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mikhail</surname>
          </string-name>
          , R.:
          <article-title>Semantically-enhanced rule-based diagnostics for industrial Internet of Things: The SDRL language and case study for Siemens trains and turbines</article-title>
          .
          <source>Journal of Web Semantics</source>
          <volume>56</volume>
          ,
          <issue>11</issue>
          {
          <fpage>29</fpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <article-title>Tou k, B</article-title>
          .,
          <string-name>
            <surname>Benidir</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Bearing faults diagnosis using fuzzy expert system relying on an Improved Range Overlaps and Similarity method</article-title>
          .
          <source>Expert Systems with Applications</source>
          <volume>108</volume>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Antomarioni</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pisacane</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potena</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bevilacqua</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ciarapica</surname>
            ,
            <given-names>F. E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Diamantini</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>A predictive association rule-based maintenance policy to minimize the probability of breakages: application to an oil re nery</article-title>
          .
          <source>The International Journal of Advanced Manufacturing Technology</source>
          <volume>105</volume>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Bernard</surname>
          </string-name>
          , G.:
          <article-title>Rule mining in maintenance: Analysing large knowledge bases</article-title>
          .
          <source>Computers &amp; Industrial Engineering</source>
          <volume>139</volume>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhongqiang</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sun</surname>
          </string-name>
          , C. Y.:
          <article-title>Remaining Useful Life Prediction for Lithium-Ion Batteries Based on Exponential Model and Particle Filter</article-title>
          . IEEE Access (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Sevegnani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calder</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Stochastic Model Checking for Predicting Component Failures and Service Availability</article-title>
          .
          <source>IEEE Transactions on Dependable and Secure Computing</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Aizpurua</surname>
          </string-name>
          , U. J.,
          <string-name>
            <surname>Catterson</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abdulhadi</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Segovia</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A Model-Based Hybrid Approach for Circuit Breaker Prognostics Encompassing Dynamic Reliability and Uncertainty</article-title>
          .
          <source>IEEE Transactions on Systems, Man, and Cybernetics: Systems</source>
          <volume>48</volume>
          (
          <issue>9</issue>
          ),
          <volume>1</volume>
          {
          <fpage>12</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Nan</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhi</surname>
            ,
            <given-names>S. Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yisha</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Linmiao</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Condition-based maintenance using the inverse Gaussian degradation model</article-title>
          .
          <source>European Journal of Operational Research</source>
          <volume>243</volume>
          (
          <issue>1</issue>
          ),
          <volume>190</volume>
          {
          <fpage>199</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Donghui</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jia</surname>
            ,
            <given-names>B. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jinde</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Remaining useful life estimation using an inverse Gaussian degradation model</article-title>
          .
          <source>Neurocomputing</source>
          <volume>185</volume>
          ,
          <issue>64</issue>
          {
          <fpage>72</fpage>
          . (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Vianna</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yoneyama</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Predictive Maintenance Optimization for Aircraft Redundant Systems Subjected to Multiple Wear Pro les</article-title>
          .
          <source>IEEE Systems Journal</source>
          <volume>12</volume>
          (
          <issue>2</issue>
          ),
          <volume>1</volume>
          {
          <fpage>12</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Nathalie</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aless</surname>
          </string-name>
          , ,
          <string-name>
            <surname>Ro</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Model-based predictive maintenance in building automation systems with user discomfort</article-title>
          .
          <source>Energy</source>
          <volume>138</volume>
          ,
          <issue>306</issue>
          {
          <fpage>315</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Keizer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Flapper</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Teunter</surname>
          </string-name>
          , R.:
          <article-title>Condition-based maintenance policies for systems with multiple dependent components: A review</article-title>
          .
          <source>European Journal of Operational Research</source>
          <volume>261</volume>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Wuest</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weimer</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Irgens</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thoben</surname>
            ,
            <given-names>K. D.</given-names>
          </string-name>
          <article-title>: Machine learning in manufacturing: Advantages, challenges, and applications</article-title>
          .
          <source>Production &amp; Manufacturing Research</source>
          <volume>4</volume>
          ,
          <issue>23</issue>
          {
          <fpage>45</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Teng</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ma</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Prognosis of the Remaining Useful Life of Bearings in a Wind Turbine Gearbox</article-title>
          .
          <source>Energies</source>
          <volume>10</volume>
          (
          <issue>32</issue>
          ) (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Karmacharya</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gokaraju</surname>
          </string-name>
          , R.:
          <article-title>Fault Location in Ungrounded Photovoltaic System Using Wavelets and ANN</article-title>
          .
          <source>IEEE Transactions on Power Delivery</source>
          <volume>33</volume>
          (
          <issue>2</issue>
          ),
          <volume>549</volume>
          {
          <fpage>559</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Netam</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yadav</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Fault Detection, Classi cation and Section Identi cation in Distribution network with D-STATCOM using ANN</article-title>
          .
          <source>International Journal of Advanced Technology and Engineering Exploration</source>
          <volume>4</volume>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Chine</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mellit</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lughi</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Malek</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sulligoi</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Massi</surname>
            ,
            <given-names>P. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ro</surname>
          </string-name>
          , :
          <article-title>A novel fault diagnosis technique for photovoltaic systems based on arti cial neural networks</article-title>
          .
          <source>Renewable Energy</source>
          <volume>90</volume>
          ,
          <issue>501</issue>
          {
          <fpage>512</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Abdallah</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dertimanis</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mylonas</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tatsis</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chatzi</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dervilis</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Worden</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maguire</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Fault diagnosis of wind turbine structures using decision tree learning algorithms with big data. Safety and Reliability - Safe Societies in a Changing World (</article-title>
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Rabah</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Samir</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Fault detection and diagnosis based on C4.5 decision tree algorithm for grid connected PV system</article-title>
          .
          <source>Solar Energy</source>
          <volume>173</volume>
          ,
          <issue>610</issue>
          {
          <fpage>634</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Sangram</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , V,
          <string-name>
            <surname>M. P.</surname>
          </string-name>
          :
          <article-title>Fault Detection of Anti-friction Bearing using Ensemble Machine Learning Methods</article-title>
          .
          <source>International Journal of Engineering, Transactions B: Applications</source>
          <volume>31</volume>
          ,
          <year>1972</year>
          {
          <year>1981</year>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34. Han,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Cui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            ,
            <surname>Fan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Qing</surname>
          </string-name>
          , H.:
          <article-title>Least squares support vector machine (LSSVM)-based chiller fault diagnosis using fault indicative features</article-title>
          .
          <source>Applied Thermal Engineering</source>
          <volume>154</volume>
          , 540{
          <fpage>547</fpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Zhu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xiong</surname>
          </string-name>
          , J.:
          <source>Fault Diagnosis of Rotation Machinery Based on Support Vector Machine Optimized by Quantum Genetic Algorithm. IEEE Access 6</source>
          ,
          <issue>33583</issue>
          {
          <fpage>33588</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mei</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zeng</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          :
          <article-title>Remaining useful life estimation of insulated gate biploar transistors (igbts) based on a novel volterra k-nearest neighbor optimally pruned extreme learning machine (vkopp) model using degradation data</article-title>
          .
          <source>Sensors</source>
          ,
          <volume>7</volume>
          (
          <issue>11</issue>
          )
          <fpage>2524</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Qin</surname>
          </string-name>
          , H.,
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ren</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Rolling Bearings Fault Diagnosis via 1D Convolution Networks</article-title>
          .
          <source>In: 2019 IEEE 4th International Conference on Signal and Image Processing (ICSIP)</source>
          , pp.
          <volume>617</volume>
          {
          <fpage>621</fpage>
          . IEEE, Wuxi, China (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shen</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          :
          <article-title>Real-time Fault Diagnosis of Rotating Machinery Using 1-D Convolutional Neural Network</article-title>
          .
          <source>In: 2018 5th International Conference on Soft Computing &amp; Machine Intelligence (ISCMI)</source>
          , pp.
          <fpage>104</fpage>
          -
          <lpage>108</lpage>
          . IEEE, Nairobi, Kenya (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          39.
          <string-name>
            <surname>Kiranyaz</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gastli</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ben</surname>
            ,
            <given-names>B. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alemadi</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gabbouj</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Real-Time Fault Detection and Identi cation for MMC Using 1</article-title>
          -
          <string-name>
            <given-names>D</given-names>
            <surname>Convolutional Neural</surname>
          </string-name>
          <article-title>Networks</article-title>
          .
          <source>IEEE Transactions on Industrial Electronics</source>
          <volume>66</volume>
          (
          <issue>11</issue>
          ),
          <volume>8760</volume>
          {
          <fpage>8771</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          40.
          <string-name>
            <surname>Ren</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sun</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , Zhang, L.:
          <article-title>Prediction of Bearing Remaining Useful Life With Deep Convolution Neural Network</article-title>
          .
          <source>IEEE Access 6</source>
          ,
          <fpage>13041</fpage>
          -
          <lpage>13049</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          41.
          <string-name>
            <surname>Babu</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          :
          <article-title>Deep Convolutional Neural Network Based Regression Approach for Estimation of Remaining Useful Life</article-title>
          . In: Navathe,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            ,
            <surname>Shekhar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Du</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            ,
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            ,
            <surname>Xiong</surname>
          </string-name>
          , H. (
          <article-title>eds) Database Systems for Advanced Applications</article-title>
          .
          <source>DASFAA 2016. LNCS</source>
          , vol
          <volume>9642</volume>
          . Springer, Cham. https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -32
          <lpage>0</lpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          42.
          <string-name>
            <surname>Xingqiu</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jiang</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xiong</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          :
          <article-title>Intelligent Fault Diagnosis of Rotating Machinery Based on Deep Recurrent Neural Network</article-title>
          . In: 2018 International Conference on Sensing,Diagnostics, Prognostics, and
          <string-name>
            <surname>Control</surname>
          </string-name>
          (SDPC), pp.
          <volume>67</volume>
          {
          <fpage>72</fpage>
          . IEEE,
          <string-name>
            <surname>Xi</surname>
          </string-name>
          'an,
          <string-name>
            <surname>China</surname>
          </string-name>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          43.
          <string-name>
            <surname>Yuan</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tian</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>An Intelligent Fault Diagnosis Method Using GRU Neural Network towards Sequential Data in Dynamic Processes</article-title>
          .
          <source>Processes</source>
          <volume>7</volume>
          (
          <issue>3</issue>
          ) (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          44.
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lu</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhong</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Rotating Machinery Fault Diagnosis Using Long-short-term Memory Recurrent Neural Network</article-title>
          . IFAC-PapersOnLine
          <volume>51</volume>
          ,
          <fpage>228</fpage>
          -
          <lpage>232</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          45.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jing</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Q.:</given-names>
          </string-name>
          <article-title>Gated Recurrent Unit Based Recurrent Neural Network for Remaining Useful Life Prediction of Nonlinear Deterioration Process</article-title>
          .
          <source>Reliability Engineering &amp; System Safety</source>
          <volume>185</volume>
          ,
          <issue>372</issue>
          {
          <fpage>382</fpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          46.
          <string-name>
            <surname>Hong</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yao</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Fault prognosis of battery system based on accurate voltage abnormity prognosis using long short-term memory neural networks</article-title>
          .
          <source>Applied Energy</source>
          <volume>251</volume>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          47.
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ding</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Approach for fault prognosis using recurrent neural network</article-title>
          .
          <source>Journal of Intelligent Manufacturing</source>
          <volume>31</volume>
          (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          48.
          <string-name>
            <surname>Akcay</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Atapour</surname>
            ,
            <given-names>A. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Breckon</surname>
          </string-name>
          , T.:
          <article-title>GANomaly: Semi-supervised Anomaly Detection via Adversarial Training</article-title>
          . In: Jawahar C.,
          <string-name>
            <surname>Li</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mori</surname>
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schindler</surname>
            <given-names>K</given-names>
          </string-name>
          . (eds) Computer Vision { ACCV
          <year>2018</year>
          .
          <article-title>ACCV 2018</article-title>
          .
          <article-title>LNCS</article-title>
          , vol
          <volume>11363</volume>
          . Springer, Cham. https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -20893-6
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          49.
          <string-name>
            <surname>Jiang</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hong</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhou</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>He</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          , Cheng, C.:
          <article-title>A GAN-Based Anomaly Detection Approach for Imbalanced Industrial Time Series</article-title>
          .
          <source>IEEE Access 7</source>
          ,
          <issue>143608</issue>
          {
          <fpage>143619</fpage>
          (
          <year>2019</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          50.
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prosvirin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Er</surname>
          </string-name>
          , ,
          <string-name>
            <surname>Kim</surname>
          </string-name>
          , J.:
          <article-title>Towards Bearing Health Prognosis using Generative Adversarial Networks: Modeling Bearing Degradation</article-title>
          .
          <source>In: 2018 International Conference on Advancements in Computational Sciences (ICACS)</source>
          . IEEE, Lahore, Pakistan (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          51.
          <string-name>
            <surname>Chicco</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Siamese Neural Networks: An Overview</article-title>
          . n: Cartwright H. (eds) Arti - cial
          <source>Neural Networks. Methods in Molecular Biology</source>
          , vol
          <volume>2190</volume>
          .
          <string-name>
            <surname>Humana</surname>
          </string-name>
          , New York, NY.
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          52.
          <string-name>
            <surname>Gregory</surname>
            ,
            <given-names>R. K.</given-names>
          </string-name>
          :
          <article-title>Siamese Neural Networks for One-Shot Image Recognition</article-title>
          .
          <source>ICML deep learning workshop 2</source>
          , (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          53.
          <string-name>
            <surname>Pei</surname>
          </string-name>
          , W. and T.,
          <string-name>
            <surname>Van Der Maaten</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          and
          <string-name>
            <surname>L.</surname>
          </string-name>
          :
          <article-title>Modeling Time Series Similarity with Siamese Recurrent Networks</article-title>
          .
          <source>ArXiv preprint. arXiv:1603</source>
          .
          <fpage>04713</fpage>
          . (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          54.
          <string-name>
            <surname>Klein</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weingarz</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bergmann</surname>
          </string-name>
          , R.:
          <article-title>Enhancing Siamese Neural Networks through Expert Knowledge for Predictive Maintenance</article-title>
          . In: Gama J. et al. (
          <article-title>eds) IoT Streams for Data-Driven Predictive Maintenance and IoT, Edge, and Mobile for Embedded Machine Learning</article-title>
          .
          <source>ITEM</source>
          <year>2020</year>
          ,
          <article-title>IoT Streams 2020</article-title>
          .
          <source>Communications in Computer and Information Science</source>
          , vol
          <volume>1325</volume>
          . Springer, Cham. https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -
          <fpage>66770</fpage>
          - (
          <year>2020</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          55.
          <string-name>
            <surname>Google Cloud AutoML Tables Documentation</surname>
          </string-name>
          , https://cloud.google.com/automltables/docs.
          <source>Last Accessed 22 September 2021</source>
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          56.
          <string-name>
            <surname>Google Cloud BigQuery ML Documentation</surname>
          </string-name>
          , https://cloud.google.com/bigqueryml/docs.
          <source>Last accessed 22 September 2021</source>
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          57. Zenodo - predictive maintenance dataset, https://doi.org/10.5281/zenodo.3653909.
          <source>Last accessed 21 September 2021</source>
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          58.
          <string-name>
            <surname>Arias</surname>
            ,
            <given-names>C. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kulkarni</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goebel</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fink</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Aircraft Engine Run-to-Failure Dataset under Real Flight Conditions for Prognostics and Diagnostics</article-title>
          .
          <source>NASA Ames Prognostics Data Repository, NASA Ames Research Center</source>
          <volume>6</volume>
          (
          <issue>5</issue>
          ) (
          <year>2021</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          59.
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lei</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          :
          <article-title>A Hybrid Prognostics Approach for Estimating Remaining Useful Life of Rolling Element Bearings</article-title>
          .
          <source>IEEE Transactions on Reliability 69</source>
          ,
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>
          60.
          <string-name>
            <surname>Google Cloud Vertex</surname>
            <given-names>AI</given-names>
          </string-name>
          , https://cloud.google.com/vertex-ai.
          <source>Last accessed 22 September 2021</source>
        </mixed-citation>
      </ref>
      <ref id="ref61">
        <mixed-citation>
          61.
          <string-name>
            <surname>Golovin</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Solnik</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moitra</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kochanski</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karro</surname>
          </string-name>
          , J.:
          <article-title>Google Vizier: A Service for Black-Box Optimization</article-title>
          .
          <source>In: proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 17)</source>
          , pp.
          <volume>1487</volume>
          {
          <fpage>1495</fpage>
          .
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>