Diese Abschlussarbeit befasst sich mit der Anwendung von adversarialer Multi-Agent-Verstärkungslernens in der modellbasierten Systemtechnik für die Entwicklung fehlertoleranter Designs. Das Ziel der Forschung ist es, die Vor- und Nachteile dieser Ansätze und verschiedener Eingangsmodelle zu untersuchen. Die Arbeit umfasst sowohl Literaturrecherche als auch Implementierung in Python. Die Abschlussarbeit eignet sich für Studierende, die versiert in Python sind und die Anwendbarkeit künstlicher Intelligenz im Engineering-Prozess untersuchen möchten.
Die genauen Aufgaben sind Gegenstand der Diskussion und hängen vom Umfang der Abschlussarbeit ab, aber die meisten Abschlussarbeiten sollten einige Programmieraufgaben in Python beinhalten. Hier sind einige Beispiele für Aufgaben:
Aufgabe 1: Auswahl von Eingangsmodellen
- Identifizieren Sie ein oder mehrere Eingangsmodelle, die verwendet werden sollen.
Aufgabe 2: Parsen und Erstellen von System- und Spielobjekten
- Erstellen Sie einen Parser, um relevante Parameter aus den Eingangsmodellen zu extrahieren.
- Entwickeln Sie Spielobjekte, die in Verbindung mit der PettingZoo-Trainingsumgebung verwendet werden können.
- Automatisieren Sie das Spieldesign, um die Erstellung neuer Umgebungen und Spielobjekte zu optimieren.
Aufgabe 3: Auswahl und Implementierung eines Trainingsalgorithmus
- Wählen Sie einen Verstärkungslernalgorithmus, der für die Aufgabe geeignet ist.
- Implementieren Sie den Algorithmus.
- Trainieren Sie den Algorithmus mithilfe der erstellten Umgebungen.
Aufgabe 4: Bewertung der Ergebnisse
- Bewertung der Leistung der trainierten Modelle.
- Analysieren Sie die Ergebnisse, um die Effektivität zu bestimmen.
Aufgabe 5: Spezialisierung
- Wählen Sie eine Spezialisierung aus, die näher untersucht werden soll.
Aufgabe 6: Literaturrecherche
- Führen Sie eine umfassende Literaturrecherche zu Verstärkungslernen, Spielumgebungen und allen relevanten Themen durch.
Python, objektorientierte Programmierung.
Solide mathematische Grundlagen.
Erfahrung mit Systemmodellierung bevorzugt.
Versiert in Englisch.
Joachim Grimstad
♦
Following the increasing popularity of Deep Learning (DL) methods, many experts are investigating the applicability of DL techniques for anomaly detection.
However, in most cases, these techniques are applied in a rather brute-force manner.
They ignore essential and, in many cases, apriori known information about the system structure and behavior.
Especially, they assume to take every possible connecting point into consideration, which is not efficient while modern cyber-physical systems could have thousands of potential assess points to be connected to.
The student will investigate several Simulink models as examples, and research a general solution for getting the best optimized access points given existing models.
The expected deliverable is a program that takes simulation models as input, analyzes the system architecture, and outputs the identification of suitable access points for anomaly detection.
The result can be verified with fault injection experiments.
1. literature research of related mbsa methods, such as dynamic fault trees, bayesian network, reachability analysis, importance metrics
2. Scenario study, get familiar with different case study models and corresponding simulations.
3. Test different approaches to the models
4. Compare the results of different approaches
Matlab/Simulink
Sheng Ding
♦
Following the increasing popularity of Deep Learning (DL) methods, many experts are investigating the applicability of DL techniques for anomaly detection.
However, in most cases, these techniques are applied in a rather brute-force manner.
They ignore essential and, in many cases, apriori known information about the system structure and behavior.
Especially, they assume to take every possible connecting point into consideration, which is not efficient while modern cyber-physical systems could have thousands of potential assess points to be connected to.
The student will investigate several Simulink models as examples, and research a general solution for getting the best optimized access points given existing models.
The expected deliverable is a program that takes simulation models as input, analyzes the system architecture, and outputs the identification of suitable access points for anomaly detection.
The result can be verified with fault injection experiments.
1. literature research of related mbsa methods, such as dynamic fault trees, bayesian network, reachability analysis, importance metrics
2. Scenario study, get familiar with different case study models and corresponding simulations.
3. Test different approaches to the models
4. Compare the results of different approaches
Matlab/Simulink
Sheng Ding
♦
Deep learning performs remarkably well on many time series analysis tasks recently. The superior performance of deep neural networks relies heavily on a large number of training data to avoid overfitting. However, the labeled data of real-world time series applications may be limited, especially anomaly detection. As an effective way to enhance the size and quality of the training data, data augmentation is crucial to the successful application of deep learning models on time series data. In this thesis, the student will systematically review different data augmentation methods for time series anomaly detection.
The student will implement data augmentation on different CPS anomaly detection datasets and evaluate the results.
1) Literature research of existing anomaly detection datasets in Cyber-Physical Systems.
2) Literature research of state-of-the-art data augmentation method.
3) Categorization of the datasets according to the application field and characteristics.
4) Extract normal and abnormal patterns from real-world data.
5) Transform the extracted patterns into synthetic data.
6) Evaluation of the augmented dataset.
python
Sheng Ding
♦
Nowadays, deep-learning-based methods for anomaly detection and diagnosis are attracting more and more attention. To make research results into the application, a good way of demonstration is to develop a service for a certain kind of task. In this thesis, the student will train neural networks on multivariate time series data from CPS systems for anomaly detection using existing code. The highlighted part is to deploy it as a containerized REST API. The use case is where externally collected sensor data is streamed to the API for near real-time anomaly detection analysis.
1) Train different models for the dataset using existing code.
2) Put the existing code for processing data in a REST API using the Flask framework.
3) Visualization of the data and detection.
4) Deploy it within a Docker container.
5) Optional: Use Kubernetes for exposing the API as a service.
python
Sheng Ding
♦