Volume 20 No 10 (2022)
 Download PDF
Development of IoT-based Machine Learning Application for Data Anomaly Detection With in a Smart Manufacturing Plant
T.G Kukuni ,E. Markus, B. Kotze, A.M. Abu-Mahfouz
Abstract
The application of machine learning in resolving complex cyber-security challenges in smart manufacturing plant is growing. Network intrusion and anomaly detection is posing high risks in sensory data integrity and optimisation of processes leading to high efficiency and high profits within smart manufacturing plants. This research paper makes use of interquartile range algorithm for the detection of anomalies. The data is collected within a 5- hour period and is transmitted to Google sheets via WiFi connectivity. However, the data transfer requires the user to permit access to the google account for this process to take place. After the addition of errors for every 11th entry, the file is resent back to Raspberry PI for the execution of interquartile range algorithm. Once the results are obtained, the results file is transmitted via WiFi connectivity to the output monitor. This research results demonstrates that if the data collected is higher or lower than the required threshold (11- 14oC for temperature and 45-50% for humidity) the system will automatically detect and flag the anomaly. This paper therefore concludes that the use of interquartile range algorithm for anomaly detection based on sensory data is relevant and efficient for such an investigation.
Keywords
Anomaly, Intrusion Detection System, Machine Learning, Cyber-security, IoT, Sensory Data, Smart Manufacturing Plant
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.