基于时空分解的受损增材制造系统分析

Sakthi Kumar Arul Prakash, Tobias Mahan, Glen Williams, Christopher McComb, Jessica Menold, Conrad S. Tucker
{"title":"基于时空分解的受损增材制造系统分析","authors":"Sakthi Kumar Arul Prakash, Tobias Mahan, Glen Williams, Christopher McComb, Jessica Menold, Conrad S. Tucker","doi":"10.1115/detc2019-97732","DOIUrl":null,"url":null,"abstract":"\n 3D printing systems have expanded the access to low cost, rapid methods for attaining physical prototypes or products. However, a cyber attack, system error, or operator error on a 3D printing system may result in catastrophic situations, ranging from complete product failure, to small types of defects which weaken the structural integrity of the product, making it unreliable for its intended use. Such defects can be introduced early-on via solid models or through G-codes for printer movements at a later stage. Previous works have studied the use of image classifiers to predict defects in real-time as a print is in progress and also by studying the printed entity once the print is complete. However, a major restriction in the functionality of these methods is the availability of a dataset capturing diverse attacks on printed entities or the printing process. This paper introduces a visual inspection technique that analyzes the amplitude and phase variations of the print head platform arising through induced system manipulations. The method uses an image sequence of a 3D printing process captured via an off the shelf camera to perform an offline multi-scale, multi-orientation decomposition to amplify imperceptible system movements attributable to a change in system parameters. The authors hypothesize that a change in the amplitude envelope and instantaneous phase response as a result of a change in the end effector translational instructions, to be correlated with an AM system compromise. A case study is presented that tests the hypothesis and provides statistical validity in support of the method. The method has the potential to enhance the robustness of cyber-physical systems such as 3D printers that rely on secure, high quality hardware and software to perform optimally.","PeriodicalId":198662,"journal":{"name":"Volume 2B: 45th Design Automation Conference","volume":"101 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On the Analysis of a Compromised Additive Manufacturing System Using Spatio-Temporal Decomposition\",\"authors\":\"Sakthi Kumar Arul Prakash, Tobias Mahan, Glen Williams, Christopher McComb, Jessica Menold, Conrad S. Tucker\",\"doi\":\"10.1115/detc2019-97732\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\n 3D printing systems have expanded the access to low cost, rapid methods for attaining physical prototypes or products. However, a cyber attack, system error, or operator error on a 3D printing system may result in catastrophic situations, ranging from complete product failure, to small types of defects which weaken the structural integrity of the product, making it unreliable for its intended use. Such defects can be introduced early-on via solid models or through G-codes for printer movements at a later stage. Previous works have studied the use of image classifiers to predict defects in real-time as a print is in progress and also by studying the printed entity once the print is complete. However, a major restriction in the functionality of these methods is the availability of a dataset capturing diverse attacks on printed entities or the printing process. This paper introduces a visual inspection technique that analyzes the amplitude and phase variations of the print head platform arising through induced system manipulations. The method uses an image sequence of a 3D printing process captured via an off the shelf camera to perform an offline multi-scale, multi-orientation decomposition to amplify imperceptible system movements attributable to a change in system parameters. The authors hypothesize that a change in the amplitude envelope and instantaneous phase response as a result of a change in the end effector translational instructions, to be correlated with an AM system compromise. A case study is presented that tests the hypothesis and provides statistical validity in support of the method. The method has the potential to enhance the robustness of cyber-physical systems such as 3D printers that rely on secure, high quality hardware and software to perform optimally.\",\"PeriodicalId\":198662,\"journal\":{\"name\":\"Volume 2B: 45th Design Automation Conference\",\"volume\":\"101 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Volume 2B: 45th Design Automation Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1115/detc2019-97732\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Volume 2B: 45th Design Automation Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1115/detc2019-97732","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

3D打印系统已经扩展了获得物理原型或产品的低成本,快速方法。然而,3D打印系统上的网络攻击、系统错误或操作错误可能导致灾难性的情况,从完全的产品故障到削弱产品结构完整性的小型缺陷,使其无法正常使用。这些缺陷可以在早期通过实体模型引入,或者在后期通过打印机运动的g代码引入。以前的工作研究了使用图像分类器在打印过程中实时预测缺陷,以及在打印完成后研究打印实体。然而,这些方法在功能上的一个主要限制是数据集的可用性,这些数据集捕获了对打印实体或打印过程的各种攻击。本文介绍了一种视觉检测技术,该技术分析了打印头平台由诱导系统操作引起的幅度和相位变化。该方法使用通过现成的相机捕获的3D打印过程的图像序列来执行离线多尺度,多方向分解,以放大由于系统参数变化而引起的难以察觉的系统运动。作者假设,由于末端执行器平移指令的变化,振幅包络线和瞬时相位响应的变化与AM系统的折衷有关。提出了一个案例研究来检验假设,并提供了支持该方法的统计有效性。该方法有可能增强网络物理系统(如3D打印机)的稳健性,这些系统依赖于安全、高质量的硬件和软件来实现最佳性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
On the Analysis of a Compromised Additive Manufacturing System Using Spatio-Temporal Decomposition
3D printing systems have expanded the access to low cost, rapid methods for attaining physical prototypes or products. However, a cyber attack, system error, or operator error on a 3D printing system may result in catastrophic situations, ranging from complete product failure, to small types of defects which weaken the structural integrity of the product, making it unreliable for its intended use. Such defects can be introduced early-on via solid models or through G-codes for printer movements at a later stage. Previous works have studied the use of image classifiers to predict defects in real-time as a print is in progress and also by studying the printed entity once the print is complete. However, a major restriction in the functionality of these methods is the availability of a dataset capturing diverse attacks on printed entities or the printing process. This paper introduces a visual inspection technique that analyzes the amplitude and phase variations of the print head platform arising through induced system manipulations. The method uses an image sequence of a 3D printing process captured via an off the shelf camera to perform an offline multi-scale, multi-orientation decomposition to amplify imperceptible system movements attributable to a change in system parameters. The authors hypothesize that a change in the amplitude envelope and instantaneous phase response as a result of a change in the end effector translational instructions, to be correlated with an AM system compromise. A case study is presented that tests the hypothesis and provides statistical validity in support of the method. The method has the potential to enhance the robustness of cyber-physical systems such as 3D printers that rely on secure, high quality hardware and software to perform optimally.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信