Christoph Garth’s research while affiliated with Rheinland-Pfälzische Technische Universität Kaiserslautern-Landau and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (9)


PEN: Process Estimator neural Network for root cause analysis using graph convolution
  • Article

November 2021

·

52 Reads

·

10 Citations

Journal of Manufacturing Systems

Viktor Leonhardt

·

·

Christoph Garth

Root cause analysis in modern multistage assembly lines is a challenging, yet widely used technique to increase the product quality. Improvements – due to Industry 4.0 – aim for near-zero-defects manufacturing. Thus, we propose a novel root cause analysis: the Process Estimator neural Network (PEN) to solve the sparse, nonlinear problem of the state-space model empowering a graph convolution neural network. The contributions of this paper are: (1) study a novel problem of utilizing nonlinear deep neural networks to solve the state-space model; (2) elaborating the use of a graph convolution neural network to scope with the current limitations of linear approaches, which cannot process dense 3D point cloud data of the outer skin of the product; (3) how to analyze the trained network for fine tuning. We showed through a realistic experiment how PEN performs on huge 3D point clouds (188.000 points or higher) in form of meshed CAD models of first-order shell elements. These experiments set an example on how to overcome the fundamental performance limitations of current linear approaches.


Investigating particle track topology for range telescopes in particle radiography using convolutional neural networks

July 2021

·

117 Reads

·

14 Citations

Acta oncologica (Stockholm, Sweden)

·

Max Aehle

·

Johan Alme

·

[...]

·

Dieter Röhrich

Background Proton computed tomography (pCT) and radiography (pRad) are proposed modalities for improved treatment plan accuracy and in situ treatment validation in proton therapy. The pCT system of the Bergen pCT collaboration is able to handle very high particle intensities by means of track reconstruction. However, incorrectly reconstructed and secondary tracks degrade the image quality. We have investigated whether a convolutional neural network (CNN)-based filter is able to improve the image quality. Material and methods The CNN was trained by simulation and reconstruction of tens of millions of proton and helium tracks. The CNN filter was then compared to simple energy loss threshold methods using the Area Under the Receiver Operating Characteristics curve (AUROC), and by comparing the image quality and Water Equivalent Path Length (WEPL) error of proton and helium radiographs filtered with the same methods. Results The CNN method led to a considerable improvement of the AUROC, from 74.3% to 97.5% with protons and from 94.2% to 99.5% with helium. The CNN filtering reduced the WEPL error in the helium radiograph from 1.03 mm to 0.93 mm while no improvement was seen in the CNN filtered pRads. Conclusion The CNN improved the filtering of proton and helium tracks. Only in the helium radiograph did this lead to improved image quality.


Fig. 3. Exemplary join tree computation on the height function on a manifold, deliberately made comparable to an example in [14]. In (a) local minima and thus join tree leaves are found according to 4.1. In (b) independent sweeps grow a region around each local minimum following arbitrary monotone paths in parallel. In (c) sweeps terminate at non-exclusively monotone reachable vertices, namely boundary sets according to 4.2. The smallest valued boundary vertices are identified and prepared for their own sweep according to 4.3. Additionally, according to 4.6, swept vertices are split at the saddle value to retrieve the augmentation. In (d) prepared saddles continue their own sweeps in the same manner, constructing the entire join tree.
Data set overview including runtimes on an ideal number of nodes and dimensionality for all involved data sets.
Unordered Task-Parallel Augmented Merge Tree Construction
  • Article
  • Full-text available

April 2021

·

46 Reads

·

5 Citations

IEEE Transactions on Visualization and Computer Graphics

Contemporary scientific data sets require fast and scalable topological analysis to enable visualization, simplification and interaction. Within this field, parallel merge tree construction has seen abundant recent contributions, with a trend of decentralized, task-parallel or SMP-oriented algorithms dominating in terms of total runtime. However, none of these recent approaches computed complete merge trees on distributed systems, leaving this field to traditional divide and conquer approaches. This paper introduces a scalable, parallel and distributed algorithm for merge tree construction outperforming the previously fastest distributed solution by a factor of around three. This is achieved by a task-parallel identification of individual merge tree arcs by growing regions around critical points in the data, without any need for ordered progression or global data structures, based on a novel insight introducing a sufficient local boundary for region growth.

Download

Topological Subdivision Graphs for Comparative and Multifield Visualization

December 2020

·

13 Reads

We propose that a topological model of a real-valued function can be employed to define a spatial subdivision of the function’s domain. When multiple topologically-induced subdivisions for the same or different functions on the same domain are combined, a finer spatial subdivision arises: the topological subdivision complex. The topological subdivision graph then gives adjacency relations among the d-cells of the subdivision complex and can be used to describe similarities among topological models. We apply this idea to give new topological models for multiple real-valued functions (multifields), extending contour trees and Morse-Smale complexes to these problem settings, and we illustrate our idea for piecewise-linear functions. We also discuss how our work relates to joint contour nets.


The Approximation of Pareto Sets Using Directed Joint Contour Nets

December 2020

·

7 Reads

This paper presents the theoretical foundation to approximate the Pareto set and its affiliated reachability graph through the Joint Contour Net (JCN). The theory works for multivariate scalar fields with arbitrary numbers of domain dimensions and functions. This allows us to visualize critical regions, connected component inside the Pareto set, and their connections using the efficient and noise robust JCN algorithm. With visualization application in mind, we demonstrate the feasibility of our approach on 2D examples.


Virtual topography measurement with transfer functions derived by fitted time series models

January 2020

·

93 Reads

·

4 Citations

The deviations between the actual geometry of a workpiece and the measured geometry are defined by the transfer function of the surface topography measuring instrument used. When the transfer characteristics of a measuring instrument are known, they can, for example, be used for the estimation of measuring results by performing virtual measurements and can subsequently be applied for the estimation of the measurement uncertainty. A technique that has been increasingly applied for the determination of the transfer function of topography measuring devices is the approach based on physical modeling. Here, mathematical models apply simplifications of the complex physical relationships to describe the transfer characteristics of measuring devices. Another method used in practice is the application of material measures for the direct measurement of transfer properties. Within this paper, an alternative approach developed by the authors that applies the ARMA model is further investigated and optimized with regard to its practical applicability. This model was described in a previous publication (Keksel et al 2018 Meas. Sci. Technol. 29 095012) and combines the advantages of theoretical modeling and the experimental determination of transfer characteristics. Within the present work, the approach is further optimized and it is demonstrated that the description of measuring devices by the ARMA model delivers reasonable results for various measuring principles that can be used for a precise virtual prediction of measurement results.


Security in Process: Detecting Attacks in Industrial Process Data

November 2019

·

58 Reads

·

16 Citations

Due to the fourth industrial revolution, industrial applications make use of the progress in communication and embedded devices. This allows industrial users to increase efficiency and manageability while reducing cost and effort. Furthermore, the fourth industrial revolution, creating the so-called Industry 4.0, opens a variety of novel use and business cases in the industrial environment. However, this progress comes at the cost of an enlarged attack surface of industrial companies. Operational networks that have previously been phyiscally separated from public networks are now connected in order to make use of new communication capabilites. This motivates the need for industrial intrusion detection solutions that are compatible to the long-term operation machines in industry as well as the heterogeneous and fast-changing networks. In this work, process data is analysed. The data is created and monitored on real-world hardware. After a set up phase, attacks are introduced into the systems that influence the process behaviour. A time series-based anomaly detection approach, the Matrix Profiles, are adapted to the specific needs and applied to the intrusion detection. The results indicate an applicability of these methods to detect attacks in the process behaviour. Furthermore, they are easily integrated into existing process environments. Additionally, one-class classifiers One-Class Support Vector Machines and Isolation Forest are applied to the data without a notion of timing. While Matrix Profiles perform well in terms of creating and visualising results, the one-class classifiers perform poorly.


Mathematical Foundations in Visualization

September 2019

·

329 Reads

Mathematical concepts and tools have shaped the field of visualization in fundamental ways and played a key role in the development of a large variety of visualization techniques. In this chapter, we sample the visualization literature to provide a taxonomy of the usage of mathematics in visualization, and to identify a fundamental set of mathematics that should be taught to students as part of an introduction to contemporary visualization research. Within the scope of this chapter, we are unable to provide a full review of all mathematical foundations of visualization; rather, we identify a number of concepts that are useful in visualization, explain their significance, and provide references for further reading.


Security in Process: Detecting Attacks in Industrial Process Data

September 2019

·

90 Reads

Due to the fourth industrial revolution, industrial applications make use of the progress in communication and embedded devices. This allows industrial users to increase efficiency and manageability while reducing cost and effort. Furthermore, the fourth industrial revolution, creating the so-called Industry 4.0, opens a variety of novel use and business cases in the industrial environment. However, this progress comes at the cost of an enlarged attack surface of industrial companies. Operational networks that have previously been phyiscally separated from public networks are now connected in order to make use of new communication capabilites. This motivates the need for industrial intrusion detection solutions that are compatible to the long-term operation machines in industry as well as the heterogeneous and fast-changing networks. In this work, process data is analysed. The data is created and monitored on real-world hardware. After a set up phase, attacks are introduced into the systems that influence the process behaviour. A time series-based anomaly detection approach, the Matrix Profiles, are adapted to the specific needs and applied to the intrusion detection. The results indicate an applicability of these methods to detect attacks in the process behaviour. Furthermore, they are easily integrated into existing process environments. Additionally, one-class classifiers One-Class Support Vector Machines and Isolation Forest are applied to the data without a notion of timing. While Matrix Profiles perform well in terms of creating and visualising results, the one-class classifiers perform poorly.

Citations (5)


... Anomaly detection (AD) approaches are commonly employed in industrial monitoring systems to capture anomalies that require attention to improve efficiency, safety, and reliability while reducing maintenance expenses [1,2]. Discovering causality from a broader range of sensors, including variables not monitored by pre-trained AD models, for captured anomalies is essential to facilitate fault diagnostics through root cause discovery and analysis. ...

Reference:

Scalable Temporal Anomaly Causality Discovery in Large Systems: Achieving Computational Efficiency with Binary Anomaly Flag Data
PEN: Process Estimator neural Network for root cause analysis using graph convolution
  • Citing Article
  • November 2021

Journal of Manufacturing Systems

... As an alternative track discrimination method, convolutional neural network (CNN) is implemented in the range telescope inspired by the work in Ref. [28]. The CNN is constructed using TensorFlow [29] with the following specifications: ...

Investigating particle track topology for range telescopes in particle radiography using convolutional neural networks
  • Citing Article
  • July 2021

Acta oncologica (Stockholm, Sweden)

... In the past few decades, contour trees and merge trees have been used in various applications such as excess topology removal from isosurfaces [73], image analysis [45], topology controlled volume rendering [67], flexible isosurface generation [14], seed selection for segmentation [39], high-dimensional data analysis [48], uncertainty data exploration [74], cavity identification in biomolecules [5], symmetry detection [65], segmentation of volumetric data [7], and analysis of astronomical data [53]. Multiple methods exist to compute contour trees/merge trees in both serial and parallel; see [2,13,15,16,[31][32][33]68]. ...

Unordered Task-Parallel Augmented Merge Tree Construction

IEEE Transactions on Visualization and Computer Graphics

... Then the input and output surface of the measuring instrument are processed with an auto-regressive moving average model that is fitted to describe the transfer function of the instrument [15]. This model is a good approximation of the transfer behavior for various measuring principles [16]. ...

Virtual topography measurement with transfer functions derived by fitted time series models

... For example, authors in [40] combine onedimensional convolution neural networks and the Dempster-Shafer decision fusion method to detect and classify some specific failures types, and authors in [120] use a robust multi-cascaded convolutional neural networks (CNN) classification approach to distinguish between Sybil and DoS attacks. The deep neural network architecture developed by [66] incorporates inherent convolutional neural networks, [88] Decision tree and gradient boosting Attacks ✓* ✗ Network Local server [108] Detect data distribution change in time and train the new model All ✗ ✗ Device - (Rousopoulou, 2022) [37]Generic platform for anomaly detection Failures ✗ ✗ Device Cloud (Su, 2022) [72] Machine-learning tree-based methods Attacks ✗ ✗ Network - (Rey, 2022) [73] Autoencoder in federated learning Attacks ✗ ✗ Device Edge (Kumar, 2022) [75] Botnet detection using network-edge traffic Attacks ✗ ✗ Network Edge (Garmaroodi, 2020) [36] Data mining Failures ✗ ✗ Device Edge (Cui, 2021) [63] Margin synthetic minority oversampling technique for unbalanced data Attacks ✗ ✗ Network Edge (Elnour, 2021) [67] data-driven attack detection using Isolation Forest Attacks ✗ ✗ Device -(Yang, 2020) [92] Secure vector homomorphic encryption scheme All ✗ ✗ Device Cloud (Razzak, 2020) [94] Randomized nonlinear one-class support vector machine All ✗ ✗ Device -(Bodo, 2020) [97] Feature selection method based on hierarchical feature ranking All ✗ ✓ Device -(He, 2020) [98] Decision triggered data transmission and collection protocol All ✗ ✗ Device -(Garg, 2020) [56] Density-Based Spatial Clustering of Applications with Noise (DBSCAN) Attacks ✗ ✗ Network -(Zhang, 2020) [62] Maximum correlation minimum redundancy feature selection algorithm Attacks ✗ ✗ Network -(Anton, 2019) [42] Matrix Profiles detect attacks that occur multiple times Attacks ✗ ✗ Network -(Raposo, 2019) [91] Use on-node metrics available in hardware All ✗ ✓ Device -(Raposo, 2018) [43] One Class Support Vector Machine Attacks ✗ ✓ Network Edge (Shi, 2019) [51] Extract statistical and spectral features Attacks ✗ ✓ Network -(Ouyang, 2018) [30] Multi-view learning based ensemble learning solution Events ✗ ✗ Device Cloud ...

Security in Process: Detecting Attacks in Industrial Process Data
  • Citing Conference Paper
  • November 2019