Privacy

News

HomeHome / News / Privacy

Feb 09, 2024

Privacy

Scientific Reports volume 12, Article number: 10733 (2022) Cite this article 662 Accesses Metrics details Hydraulic equipment, as a typical mechanical product, has been wildly used in various fields.

Scientific Reports volume 12, Article number: 10733 (2022) Cite this article

662 Accesses

Metrics details

Hydraulic equipment, as a typical mechanical product, has been wildly used in various fields. Accurate acquisition and secure transmission of assembly deviation data are the most critical issues for hydraulic equipment manufacturer in the PLM-oriented value chain collaboration. Existing deviation prediction methods are mainly used for assembly quality control, which concentrate in the product design and assembly stage. However, the actual assembly deviations generated in the service stage can be used to guide the equipment maintenance and tolerance design. In this paper, a high-fidelity prediction and privacy-preserving method is proposed based on the observable assembly deviations. A hierarchical graph attention network (HGAT) is established to predict the assembly feature deviations. The hierarchical generalized representation and differential privacy reconstruction techniques are also introduced to generate the graph attention network model for assembly deviation privacy-preserving. A derivation gradient matrix is established to calculate the defined modified necessary index of assembly parts. Two privacy-preserving strategies are designed to protect the assembly privacy of node representation and adjacent relationship. The effectiveness and superiority of the proposed method are demonstrated by a case study with a four-column hydraulic press.

The PLM (Product-Lifecycle-Management)-oriented value chain collaboration1,2 has become the latest way of improving competitiveness in the economy globalization. Intelligent diagnosis and maintenance of mechanical products is one of the most important part. Hydraulic equipment plays a significant role in the manufacturing industry3. After a long-time usage, the deviations of each part can be very different from the theoretical values due to the deformation away from ideal position4. The existing maintenance methods are almost blind, time-consuming, and laborious. Because the measurable deviations are limited in the complex assemblies. Complete deviations provide a wealth of guidance information for the assembly maintenance. Hence, the graph models5, a new branch of machine learning method, are proposed to predict the unknown deviations based on the feature graph6,7. Here, this research focuses on the privacy-preserving for the assembly deviation prediction. Data privacy8 is vital, because the deviations are sensitive and it is necessary to avoid the equipment information leakage derived from the graph models. The existing research focus on deviation allocation in the product design9,10,11 and assembly stage12,13,14. For example, Stefan et al.15 proposed a method for tolerance evaluation in product conceptual design stage. It allows designers to evaluate tolerances before the final geometry is defined. Zhou et al.16 proposed an assembly sequence deviation propagation model based on the assembly-feature adjacency matrix and geometrical-feature tolerance matrix. The influence of cumulative deviations of different assembly sequences on product assembly quality can be accurately and effectively evaluated. Besides, Liu et al.17 proposed a fluctuation evaluation and identification method based on a machining error propagation network. The sources of fluctuations in the machining process of the workpiece can be identified. However, the existing deviation prediction methods are mainly used for assembly quality control. Most studies focus on the design stage, and not consider the geometrical feature deviations during usage. Disregarding deformations, these studies fall within the category of rigid body assembly. Besides, the deviations generated in the service stage are not used to guide the product maintenance or improve the tolerance allocation18.

Furthermore, a mechanical assembly can be regard as a feature graph19,20,21. As the development of artificial intelligence, there is a promising branch to generalize the machine learning algorithms22,23 to graph domain24,25,26. And the missing deviations in the assembly are expected to be predicted based on its feature graph. In this paper, a hierarchical graph attention network (HGAT)27,28,29 was proposed to predict the unknown assembly deviations of the hydraulic equipment, and a derivation gradient matrix is defined for equipment maintenance. On the one hand, the hierarchical mechanism of proposed HGAT method is beneficial for utilizating graph structure information. On the other hand, the weights of adjacent nodes further improve the accuracy of the deviation prediction.

The deviation prediction process contains two stages. The first is the training stage, where the training data are imported into the algorithm. To reduce the loss on the validation set, the training parameters and hyperparameters are optimized based on backpropagation. The second stage is prediction stage, using the target model to predict the deviations on the test set. Therefore, the potential privacy threats could happen in these two stages30 as shown in Fig. 1a. Specifically, during the training stage, it mainly faces the threat of data theft. During the prediction stage, there may be more threats such as model inversion, membership inference, and data theft. A high-performance model depends on both rich features and complete edge information in the graph. Surprisingly, there is very little research on privacy protection of high-performance graph neural network models31,32,33.

(a) Major privacy threats in the machine learning process, (b) the model inversion in privacy threats, (c) the membership inference in privacy threats.

The data theft means the raw data have the risk of being stolen. Especially, in the application of a large-scale machine learning algorithm, it is necessary to train the algorithm on the server by the cooperation of many users. The cloud transmission of data increases the possibility of being attacked. Given that the attacker has some access to the target model, model inversion techniques aim to infer the class representation, as shown in Fig. 1b. 34. The attacker needs to provide some auxiliary, which could be some experience or human knowledge. The concept of model inversion is introduced by Fredrikson et al.35. They showed how the adversary using the outputs from a classifier to infer the sensitive features used as inputs. These techniques are sometimes described as violating the privacy of the training data, even though the inferred features are characterized by the entire class. The membership inference attack means infer whether a given data point belongs to the training dataset as shown in Fig. 1c. For example, if the heath records are used to train a classifier, discovering a specific record that was used to train will cause sensitive information leak of the individual.

In the present work, firstly, the graph model used to predict the deviations is proposed. The nodes the edges in the graph are defined according to the assembly relationship. Secondly, two privacy-preserving strategies are designed to protect the privacy of node representation and relationship in the graph. Compared with the related works in recent years, it has three contributions.

The hierarchical graph attention network (HGAT) is established to predict the unknown deviations of the assembly.

The derivation gradient matrix is processed based on the completed deviation data to calculate the defined modified necessary index (MNI).

A hierarchical generalized representation and a differential privacy reconstruction are designed to protect the node representation and adjacent matrix, respectively.

The following sections are organized as follows. The graph model used in the graph neural network is given in “Graph model establishment”. The methodologies employed for deviations prediction and privacies protection are described in “Methodology”. To verify the extensiveness and effectiveness of the proposed method a case study is discussed in “Case study”. The conclusion is summarized in “Conclusion”.

A complex hydraulic equipment36 is composed of many parts as shown in Fig. 2. In fact, the assembly relationships can be represented by a feature graph. The definition of nodes and edges in the graph are introduced in this section. The establishment of the graph model is the basis of the graph neural network algorithm for the deviation prediction.

The exploded view of a hydraulic equipment.

The unspoken details of the part features need to be clarified before defining the nodes. Taking the conical surface37 as an example, as shown in Fig. 3. The nominal feature is the conical surface on the nominal geometric model. Its axis is the nominal derivative feature. The so-called deviation means that the axis is derived from the conical surface. The real surface corresponding to the nominal feature obtained from the actual processing is the real feature. However, in the actual inspection process, only a limited number of these features were sampled. These are called extracted features. Then the ideal surface matched to the extracted point is called the associative feature. The derived elements of the association are derived from the associated elements. We define each node has up to two circles. The solid circle represents the real feature, and the associated derived feature is expressed as a dashed circle around the solid circle.

Four different features of a conical surface.

The node representation is used to train the network, which should contain as much information of the node as possible. Here we define the node representation n as:

where (u, v, w, α, β, γ) are the measured deviations that along and around the global coordinate system. (x, y, z) is the coordinate point of the local feature. m is the number of nodes in the shortest path between the part feature and the reference feature.

The node label is defined by a comprehensive indicator lc. It is defined as:

where w1, w2, w3, w4, w5, and w6 \(({\mathrm{p}}_{1},{\mathrm{p}}_{2},{\mathrm{p}}_{3},{\mathrm{p}}_{4},{\mathrm{p}}_{5},{\mathrm{p}}_{6})\) are the weights corresponding to each element. Then the node label is determined by discretizing the value of lc.

The edge is determined by the tolerance mode. Specifically, the self-reference tolerance is the edge that links the solid circle and the dashed circle of the same node. The cross-reference tolerance is the edge that links two dashed circles that corresponding to the same part. The fit tolerance is the edge that links two solid circles that corresponding to different parts. For example, the feature graph of one component is showed in Fig. 4. The assembly consists of two parts, parts 1 and 2. The surface of 1a has a perpendicularity tolerance with 1b, 1b has a fit tolerance with 2a, 2a and 2b have a perpendicularity relationship. Finally, there is a positioning relationship between 2b and 1a. The final feature graph is shown in Fig. 4b.

Toy example of feature graph in one component.

This section describes assembly deviation prediction and identifies the feature surfaces that have the greatest impact on the functional requirements of in-service complex mechanical assemblies. The assembly deviation prediction focuses on the difference between the surface of the part in service and its ideal position. Large discrepancies lead to assembly failures. The PLM-oriented value chain collaboration aims to improve the enterprise's core competitiveness, which combined the manufacturing system data with artificial intelligence, big data and other technologies to make the best decisions. This paper focuses on the collection and processing of product data, manufacturing data and process data in the manufacturing systems. Based on the background of PLM-oriented value chain collaboration, a framework of deviation prediction for complex mechanical assemblies is presented. As shown in Fig. 5, a closed-loop feedback of measured deviations is introduced to the design framework, which helps to extend the service life of the products.

The framework of deviation prediction.

The process of the assembly deviation prediction includes four stages. The first stage is the product design stage. The design engineers build a three-dimensional model of the assembly and make detailed two-dimensional drawings based on design experience, including the overall dimensions of each part and detailed tolerances. The second stage is the product service stage. Workers in the manufacturing department process mechanical products according to the requirements of the drawings. After the quality inspection, the assembled products can be put into service. The third stage is the deviation perception stage. When the assembly functions no longer meet the design requirements, the deviation information collected by each sensor is used to prepare for product maintenance and product upgrade. The fourth stage is deviation tracing. Based on a small sample of measured deviations, all the unmeasured deviations are calculated by the machine learning method. The deviations are traced through the deviation gradient matrix. And further judge whether the deviations are caused by the structure deformation or the unreasonable tolerance design. If it is caused by the structure deformation, repair or replace the product. If it is caused by an unreasonable tolerance design, a tolerance reallocation design is necessary. Deviation tracing in this study aims to find unreasonable tolerance allocations in the design process or feature surfaces that no longer satisfy the precision requirements due to product service. This research only focuses on the situation in which the actual position of the surface deviates from the ideal position. Define the necessary modify index MNIij based on the node label l as

where i and j are the node subscripts.

In the process of the deviation prediction, a certain amount of data is input to support the training of neural network. Generally, the more the number of markers, the higher the accuracy of the prediction. However, if there is insufficient deviation data for testing, all the input deviation data generated by the simulation can be used to debug the hyperparameters of the HGAT model. This study assumes that the deviations obey a normal distribution. Once the interval of FRs is known, the mean and the variance values of deviations can be calculated using the 3σ criterion38. Then the unknown labels can be obtained by importing the measured data into the HGAT model. We can take the value if there is more than one set of test data. After all the node labels are obtained, it is important to identify the tolerance values that need to be redesigned. The recognition process is based on the value of MNIij. The larger the MNIij value, the more likely the error source is. And a higher accuracy of this tolerance should be prioritized to avoid the deviation transmission. The accuracy grade of adjustment is related to the processing cost, which is not considered in this research. Replace the corresponding elements in the adjacency matrix with MNIij to obtain the deviation gradient matrix S. The calculation of S can be carried out by the following formula:

where abs() is the absolute value function, * is the dot product operation, A is the adjacency matrix of the feature graph, and D is the deviation vector composed of all nodes in the feature graph. It is a node label composed of one-dimensional vector. It should be pointed out that S can only help engineers propose strategies for tolerance improvement, it cannot directly indicate what specific value should be increased.

The proposed HGAT framework can be divided into three parts: input layer, hierarchical layer and prediction layer. A GAT algorithm was used in the input layer and a multi-head mechanism was used to stabilize the learning process. The input of the input layer is the initial graph N0 and the output node representation N1 can be calculated as follows39:

where \(I\) is the number of head, \(T^{i}\) is the transformation matrix, \(\sigma \left( {} \right)\) is the nonlinear ELU activation function, and \(\alpha^{i}\) is the regularized graph attention coefficient matrix.

There are l layers in the hierarchical layer. Each layer consists of two types of symmetrical operations, called coarse calculation and refined calculation. Inspired by k-way partitioning scheme40, the connection strength between node \(v_{j}\) and node \(v_{k}\) is defined as:

where \(A_{i}\) and \(D_{i}\) are the adjacency matrix and the degree matrix of graph \(G_{i}\).

The coarse calculation of the graph is a kind of contraction operation which captures global structure and ignores details. Based on the contraction set, the contraction matrix \(M_{i} \left( {r,h} \right)\) is defined as

where \(V_{i}^{r}\) denotes the contraction set of graph \(G_{i}\). Thus, the node representation and the adjacency matrix of graph \(G_{i + 1}\) can be calculated as follows;

The refined calculation is introduced to restore the graph structure reduced by the coarse calculation. Based on the refined calculation, the node representation is defined as

The detailed process of hierarchical layer calculation is described as follows.

At last, a softmax classifier is added in prediction layer to predict the one-hot encoded node labels, which reflecting the magnitude of the deviation.

The error traceability process is shown in Fig. 6. According to the node labels, the tolerance represented by the outliers in S is selected for the actual test. When the design requirements are not met, it means that the tolerance constraints are no longer satisfied due to wear or force. The corresponding parts should be processed again or replaced directly. If it is within the design range, the accuracy grade of the design scheme needs to be improved. Finally, output the improvement scheme.

Error traceability process.

The purpose of this section is to increase the privacy-preserving ability of the graph neural network algorithm. More specifically, we focus on the preservation of node representation and relationships in the graph.

To protect the node representation, a hierarchical generalized representation is proposed as shown in Fig. 7a We train the graph neural network model in the local server. Thus, it is not accessible by the adversary. In the application of the HGAT model, the node representation faces a hazard of being attacked. We employ the coarsening procedure to calculate the node representation in different coarsening levels. Then we refine the graph to have the representation of each original node. Afterward, we use the aggregation method to synthesis new node representation. Thus, the new node representation contains classified information of the original one, even if it is attacked, it will not leak the node privacy directly.

Overall of preserving approach: (a) node representation, (b) adjacent matrix.

To protect the adjacent matrix, a differential privacy reconstruction is proposed as shown in Fig. 7b Similarly, we classify the process accessible by the adversary (red dotted box in Fig. 7b) and not accessible by the adversary (green dotted box in Fig. 7b). We start with the raw graph with rich adjacent information. Noises are added by depressing and adding the edges randomly. To reduce its negative effects on the subsequent training process, a graph learning layer is added to remodify its adjacent matrix. Then the node representation is calculated according to the adjacent matrix. Therefore, the raw graph is protected by the proposed methodology.

The four-column hydraulic equipment shown in Fig. 8a consists of many parts. But not every part is essential for feature graph molding. To simplify, the key parts of hydraulic equipment have been selected, such as the worktable (1), the slider (2), the piston rod (3), the columns (4, 5, 6 and 7), the beam (8), and the cylinder (9). Due to the frequent reciprocating movement of the slider, the accumulated deviation is the largest when the piston rod reaches the maximum position and the slider moves to the lowest point at the same time. Therefore, this study chooses this position to establish the feature graph. The simplified three-dimensional hydraulic equipment assembly and detailed definition of the nodes are shown in Fig. 8c. The feature graph of four-column hydraulic equipment is shown in Fig. 8b. There are 31 nodes and 47 edges in the feature graph, and the adjacency relationship of nodes are shown in Table 1.

Case study: (a) Schematic diagram of the four-column hydraulic press to be repaired and the deviation collection on site, (b) feature graph of four-column hydraulic equipment, (c) simplified three-dimensional hydraulic equipment assembly and node definition, (d) all node labels of four-column hydraulic press represented in 5 colors.

The 31 nodes in the feature graph are divided into three types of data sets, as shown in Table 2. The ratio of the test set to the verification set is the same as that of the standard data set. The training set is used to train the neural network, which including all the nodes with labels. The validation set is used to select hyperparameters. The test set is used to test the accuracy of the algorithm. The labels of all the nodes are used to debug the proposed model.

Next, calculate the deviation gradient matrix based on the test data. Based on the simulation data, the main hyperparameters obtained by debugging are as follows: the classification level is 1, the weight decay is set to be 0.01, and there is no dropout. The input layer contains 8 attention headers. The deviations are shown in Table 3. The labels are defined according to their lc values. The on-site measurement process of physical objects and deviations of the hydraulic press to be repaired are shown in Fig. 8a. Limited by the conditions, a micrometer tool with a special measuring tool are used for measurement. The inverse trigonometric function formula is used to convert the measured distance data into angle data. For the feature surfaces that are difficult to test, the deviations are assumed to obey a normal distribution in the FR interval, and the deviation data are generated by the Monte Carlo simulation method.

The nodes 1a-8b in Table 3 represent the upper surface of the worktable (1), the upper surface of the slider (2), the lower surface of the slider (2), the outer surface of the piston rod (3), the outer cylindrical surface of the column (4), the outer cylindrical surface of the column (5), the outer cylindrical surface of the column (6), the outer cylindrical surface of the column (7), the lower surface of the upper beam (8), and the upper surface of the upper beam (8), respectively. Before calculating the deviation gradient matrix S, the HGAT model is used to predict the missing labels by minimizing the cross-entropy loss of the data in Table 3. As shown in Fig. 8d, a color map (Table 4) is used on the graph to represent all node labels. These predicted values can provide a reference for maintenance. The slider (2) and one side of the piston rod (3) connected to the slider are deformed greatly due to the deformation of the column (6). The deviation of the connection side between the upper beam (8) and the column (4) is large. Therefore, according to actual production experience, replacing the column (6) and adjusting the upper and lower bolts ms1 and ms2 to make the upper beam level is the best maintenance strategy.

The tolerance values that need to be improved are determined according to the deviation gradient matrix S. The values of S are shown in Table 5, and the values not listed in the table are all 0. The first four maximums in S represent edges 6a–6b, 2c–5d, 2d–5e, and 2d–5f, respectively. The values are 4, 3, 3, and 3 respectively. It is assumed that the actual tolerances are still within the design range at this time. To improve the tolerances, the verticality of the outer surface and the step of the column, the position tolerance of the four holes on the slider, and the verticality of the four holes on the slider to its lower surface should give a higher accuracy value.

Machine learning models provide new possibilities to gain high-fidelity prediction based on existing observable assembly deviations during usage. These deviations are useful for product redesigns and repairs throughout the product life cycle. In this paper, a novel privacy-preserving method for assembly deviation prediction was proposed based on the HGAT algorithm. The HGAT is established based on the defined feature graph to predict the unknown deviations of the assembly. Afterwards, to-be-improved deviations are identified based on the deviation gradient matrix. Then, two strategies are introduced to protect the privacy of deviations. The hierarchical generalized representation and the differential privacy reconstruction are constructed based on the HGAT algorithm to protect the privacy of node representation and the adjacent matrix, respectively. Finally, a four-column hydraulic press is selected to verify the feasibility and superiority of the proposed method. The proposed method is effective and has the advantage of predicting assembly deviations caused by unknown deformation derivations during usage. The prediction accuracy of assembly deviations is guaranteed by assigning different weights to adjacent nods, while the HGAT guarantees the efficiency of the whole method. Also, it can be widely used to handle the other data issues under PLM-oriented value chain collaboration. Such as visual relationship detection and stock movement prediction.

However, there are also some limitations and disadvantages. The node representation is relatively simple that only consists of tolerance chain information and node location information. The proposed method is based on some assumptions that may not be satisfied in the actual situation. For example, the derivations obey a normal distribution. The priority of accuracy improvement is proposed, but the quantitative analysis is missing.

Thus, the future directions can be concluded as follows. The machine learning model is in development and may lead to an improved node representation with sufficient graph information. The qualitative analysis is limited in deviation degree as well as maintenance location, suggesting quantitative analysis to determine the critical values of to-be-improved deviations. With respect to tolerance allocation, the multi-objective optimization model should be established with the consideration of actual manufacturing cost for different accuracy levers.

The datasets used and/or analyzed during the current study are available from the corresponding author on reasonable request.

Stark, J. Product Lifecycle Management (PLM)[M]//Product lifecycle management (Volume 1) 1–33 (Springer, 2020).

Book Google Scholar

Chiang, T. A. & Trappey, A. J. C. Development of value chain collaborative model for product lifecycle management and its LCD industry adoption. Int. J. Prod. Econ. 109(1–2), 90–104. https://doi.org/10.1016/j.ijpe.2006.11.005 (2007).

Article Google Scholar

Arditi, D., Kale, S. & Tangkar, M. Innovation in construction equipment and its flow into the construction industry. J. Constr. Eng. Manag. 123(4), 371–378. https://doi.org/10.1061/(ASCE)0733-9364(1997)123:4(371) (1997).

Article Google Scholar

Ghie, W., Laperrière, L. & Desrochers, A. Statistical tolerance analysis using the unified Jacobian-Torsor model. Int. J. Prod. Res. 48(15), 4609–4630. https://doi.org/10.1080/00207540902824982 (2010).

Article MATH Google Scholar

Stivala, A., Robins, G. & Lomi, A. Exponential random graph model parameter estimation for very large directed networks. PLoS ONE 15(1), e0227804. https://doi.org/10.1371/journal.pone.0227804 (2020).

Article CAS PubMed PubMed Central Google Scholar

Gao, C. et al. The optimal control of assembly deviation for large thin-walled structures based on basic deviation patterns. Proc. Inst. Mech. Eng. Part B J. Eng. Manuf. 236(3), 204–218. https://doi.org/10.1177/09544054211024565 (2022).

Article Google Scholar

Sun, Q. et al. Assembling deviation estimation based on the real mating status of assembly. Comput. Aided Des. 115, 244–255. https://doi.org/10.1016/j.cad.2019.06.001 (2019).

Article Google Scholar

Isaak, J. & Hanna, M. J. User data privacy: Facebook, Cambridge analytica, and privacy protection. Computer 51(8), 56–59. https://doi.org/10.1109/MC.2018.3191268 (2018).

Article Google Scholar

Akrichi, S. et al. Roundness and positioning deviation prediction in single point incremental forming using deep learning approaches. Adv. Mech. Eng. 11(7), 1687814019864465. https://doi.org/10.1177/1687814019864465 (2019).

Article Google Scholar

Zhu, Z., Anwer, N. & Mathieu, L. Statistical modal analysis for out-of-plane deviation prediction in additive manufacturing based on finite element simulation. J. Manuf. Sci. Eng. https://doi.org/10.1115/1.4044837 (2019).

Article Google Scholar

Wu, X. et al. SOC prediction method based on battery pack aging and consistency deviation of thermoelectric characteristics. Energy Rep. 8, 2262–2272. https://doi.org/10.1016/j.egyr.2022.01.056 (2022).

Article Google Scholar

Dantan, J. Y., Anwer, N. & Mathieu, L. Integrated tolerancing process for conceptual design. CIRP Ann. 52(1), 135–138. https://doi.org/10.1016/S0007-8506(07)60549-6 (2003).

Article Google Scholar

Zhang, J. et al. Recurrent neural network for motion trajectory prediction in human-robot collaborative assembly. CIRP Ann. 69(1), 9–12. https://doi.org/10.1016/j.cirp.2020.04.077 (2020).

Article Google Scholar

Sun, X. et al. A digital twin-driven approach for the assembly-commissioning of high precision products. Robot. Comput.-Integr. Manufac. 61, 101839. https://doi.org/10.1016/j.rcim.2019.101839 (2020).

Article Google Scholar

Goetz, S., Schleich, B. & Wartzack, S. A new approach to first tolerance evaluations in the conceptual design stage based on tolerance graphs. Proc. CIRP 75, 167–172. https://doi.org/10.1016/j.procir.2018.04.030 (2018).

Article Google Scholar

Zhou, S., Liu, Z. & Tan, J. Deviation propagation model of assembly sequence and quality evaluation approach based on degree of dimensional variation. Chin. J. Mech. Eng. 47(2), 1–8 (2011).

Article ADS Google Scholar

Liu, D. & Jiang, P. Fluctuation analysis of process flow based on error propagation network. Chin. J. Mech. Eng. 46(2), 14–21 (2010).

Article CAS Google Scholar

Han, X. et al. Remaining useful life prediction and predictive maintenance strategies for multi-state manufacturing systems considering functional dependence. Reliab. Eng. Syst. Saf. 210, 107560. https://doi.org/10.1016/j.ress.2021.107560 (2021).

Article Google Scholar

Asante, J. N. A small displacement torsor model for tolerance analysis in a workpiece-fixture assembly. Proc. Inst. Mech. Eng. Part B J. Eng. Manufac. 223(8), 1005–1020. https://doi.org/10.1243/09544054JEM1337 (2009).

Article Google Scholar

Dantan, J. Y., Mathieu, L., Ballu, A. & Martin, P. Tolerance synthesis: Quantifier notion and virtual boundary. Comput. Aided Des. 37(2), 231–240. https://doi.org/10.1016/j.cad.2004.06.008 (2005).

Article Google Scholar

Mu, X. et al. 3D tolerance modeling and geometric precision analysis of plane features for flexible parts. Eng. Comput. https://doi.org/10.1108/EC-10-2017-0388 (2018).

Article Google Scholar

Vabalas, A. et al. Machine learning algorithm validation with a limited sample size. PLoS ONE 14(11), e0224365. https://doi.org/10.1371/journal.pone.0224365 (2019).

Article CAS PubMed PubMed Central Google Scholar

Raschka, S. Model evaluation, model selection, and algorithm selection in machine learning. arXiv preprint arXiv: 1811.12808, 2018. https://doi.org/10.1016/j.earscirev.2020.103225

Ying, R., He, R., Chen, K., Eksombatchai, P., Hamilton, W.L., Leskovec, J. Graph convolutional neural networks for web-scale recommender systems. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining , 974–983 (2018, July). https://doi.org/10.1145/3219819.3219890

Gilmer, J., Schoenholz, S.S., Riley, P.F., Vinyals, O., Dahl, G.E. Neural message passing for quantum chemistry. In International conference on machine learning 1263–1272 PMLR

Kipf, T.N., Welling, M. (2016). Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2017, July). https://arxiv.org/abs/1609.02907

Wang, X., Ji, H., Shi, C., et al. Heterogeneous graph attention network[C]//The world wide web conference. 2019. https://doi.org/10.1145/3308558.3313562

Mi, L., Chen, Z. Hierarchical graph attention network for visual relationship detection[C]//Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2020: 13886–13895.

Kim, R., So, C.H., Jeong, M., et al. Hats: A hierarchical graph attention network for stock movement prediction[J]. arXiv preprint arXiv:1908.07999, 2019. https://doi.org/10.48550/arXiv.1908.07999

Wang, X., Li, J., Kuang, X., Tan, Y. A. & Li, J. The security of machine learning in an adversarial setting: A survey. J. Parallel Distrib. Comput. 130, 12–23. https://doi.org/10.1016/j.jpdc.2019.03.003 (2019).

Article Google Scholar

Zhou, J., Chen, C., Zheng, L., Zheng, X., Wu, B., Liu, Z., Wang, L. Privacy-preserving graph neural network for node classification. arXiv e-prints, arXiv-2005 (2020).

Bernabe, J. B. et al. Privacy-preserving solutions for blockchain: Review and challenges. IEEE Access 7, 164908–164940. https://doi.org/10.1109/ACCESS.2019.2950872 (2019).

Article Google Scholar

Boulemtafes, A., Derhab, A. & Challal, Y. A review of privacy-preserving techniques for deep learning. Neurocomputing 384, 21–45. https://doi.org/10.1016/j.neucom.2019.11.041 (2020).

Article Google Scholar

De, C.E. An overview of privacy in machine learning.arXiv preprint arXiv:2005.08679 (2020).

Fredrikson, M., Jha, S., Ristenpart, T. Model inversion attacks that exploit confidence information and basic countermeasures. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security 1322–1333 (2015, October). https://doi.org/10.1145/2810103.2813677

Zemenkova, M. Y., Shipovalov, A. N. & Zemenkov, Y. D. Mathematic modeling of complex hydraulic machinery systems when evaluating reliability using graph theory[C]//IOP Conference Series: Materials Science and Engineering. IOP Publishing 127(1), 012056 (2016).

Google Scholar

Srinivasan, V. An integrated view of geometrical product specification and verification. In Geometric Product Specification and Verification Integration of Functionality 1–11 (Springer, 2003). https://doi.org/10.1007/978-94-017-1691-8_1.

Chapter Google Scholar

Liu, X. et al. Multi-objective robust optimization for a dual-flux-modulator coaxial magnetic gear. IEEE Trans. Magn. 55, 1–8. https://doi.org/10.1109/TMAG.2018.2887273 (2019).

Article Google Scholar

Xu K, Li C, Tian Y, et al. Representation learning on graphs with jumping knowledge networks[J]. arXiv preprint arXiv:1806.03536, 2018.

Karypis, G. & Kumar, V. Multilevel k-way partitioning scheme for irregular graphs. J. Parallel Distrib. Comput. 48(1), 96–129 (1998).

Article Google Scholar

Download references

This work was supported by the National Key Research and Development Program of China (No. 2020YFB1711700) and the National Natural Science Foundation of China (Nos. 52075479 and 52105281). Sincere appreciation is extended to the reviewers of this paper for their helpful comments.

State Key Laboratory of Fluid Power and Mechatronic Systems, Zhejiang University, Hangzhou, 310027, People’s Republic of China

Hao Qiu, Yixiong Feng, Zhaoxi Hong & Jianrong Tan

Engineering Research Center for Design Engineering and Digital Twin of Zhejiang Province, Zhejiang University, Hangzhou, 310027, People’s Republic of China

Hao Qiu, Yixiong Feng, Zhaoxi Hong, Kangjie Li & Jianrong Tan

Department of Mechanical and Aerospace Engineering, The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong

Kangjie Li

You can also search for this author in PubMed Google Scholar

You can also search for this author in PubMed Google Scholar

You can also search for this author in PubMed Google Scholar

You can also search for this author in PubMed Google Scholar

You can also search for this author in PubMed Google Scholar

H.Q.: conceptualization, methodology, writing-review & editing. Y.F.: conceptualization, supervision, writing-review & editing. Z.H.: Writing-review & editing, K.L.: software, validation. J.T.: supervision.

Correspondence to Zhaoxi Hong.

The authors declare no competing interests.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and Permissions

Qiu, H., Feng, Y., Hong, Z. et al. Privacy-preserving for assembly deviation prediction in a machine learning model of hydraulic equipment under value chain collaboration. Sci Rep 12, 10733 (2022). https://doi.org/10.1038/s41598-022-14835-1

Download citation

Received: 18 February 2022

Accepted: 13 May 2022

Published: 24 June 2022

DOI: https://doi.org/10.1038/s41598-022-14835-1

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.