{"id":35605,"date":"2025-09-23T10:01:37","date_gmt":"2025-09-23T08:01:37","guid":{"rendered":"https:\/\/risc.web-email.at\/fachbeitraege\/anomaly-detection-in-industrial-image-data\/"},"modified":"2026-03-10T14:23:15","modified_gmt":"2026-03-10T13:23:15","slug":"anomaly-detection-in-industrial-image-data","status":"publish","type":"publication","link":"https:\/\/risc.web-email.at\/en\/technicalarticles\/anomaly-detection-in-industrial-image-data\/","title":{"rendered":"Anomaly detection in industrial image data"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Why standard AI fails in production reality &#8211; and specialized approaches make the difference.<\/h2>\n\n<h2 class=\"wp-block-heading has-medium-font-size\">by Patrick Kraus-F\u00fcreder and Markus Steindl<\/h2>\n\n<p class=\"has-medium-font-size\">AI enables new forms of automated quality assurance &#8211; with enormous potential, but also practical hurdles in terms of data availability, model architecture and system integration.<\/p>\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\"><div class=\"wp-block-media-text__content\">\n<p><strong>Contents<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Between everyday life and industry: why generic AI fails<\/li>\n\n\n\n<li>Image anomalies: Visual conspicuousness vs. semantic error<\/li>\n\n\n\n<li>Supervised or unsupervised?<\/li>\n\n\n\n<li>Labeled data: The bottleneck of practice<\/li>\n\n\n\n<li>Variability as a reality &#8211; and a challenge<\/li>\n\n\n\n<li>Adaptivity as the key to the future<\/li>\n\n\n\n<li>Hardware requirements in live operation<\/li>\n\n\n\n<li>RISC as a solution partner: from model architecture to operational implementation<\/li>\n\n\n\n<li>Conclusion<\/li>\n\n\n\n<li>Six questions that companies should ask themselves before using anomaly detection<\/li>\n\n\n\n<li>Contact us<\/li>\n\n\n\n<li>Authors<\/li>\n\n\n\n<li>Read more<\/li>\n<\/ul>\n<\/div><figure class=\"wp-block-media-text__media\"><img data-dominant-color=\"888889\" data-has-transparency=\"false\" style=\"--dominant-color: #888889;\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung-1024x574.webp\" alt=\"\" class=\"wp-image-34910 size-full not-transparent\" srcset=\"https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung-1024x574.webp 1024w, https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung-300x168.webp 300w, https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung-768x430.webp 768w, https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung.webp 1456w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n<div class=\"wp-block-group-container alignfull \">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading\">Between everyday life and industry: why generic AI fails<\/h3>\n\n\n\n<p>Most pre-trained computer vision models from the open source sector or from research institutions are based on image databases such as ImageNet, COCO or OpenImages. These contain millions of images, but almost exclusively from everyday contexts &#8211; such as cars, people, animals or pieces of furniture. Specific industrial scenarios, such as those that occur in manufacturing, are hardly represented in them, if at all, and can therefore only be depicted inadequately. This data is therefore only of limited use in industrial production.   <\/p>\n\n\n\n<p>As a result, a model that reliably distinguishes between cats and dogs often fails completely when it is supposed to assess the quality of a plug connection or detect fine cracks on a highly reflective metal surface. The visual features that define industrial anomalies are simply different &#8211; often more subtle, specific and context-dependent. <\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img data-dominant-color=\"383e3e\" data-has-transparency=\"true\" style=\"--dominant-color: #383e3e;\" decoding=\"async\" width=\"395\" height=\"394\" sizes=\"(max-width: 395px) 100vw, 395px\" src=\"https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung_pushpin_anomaly_C_RISC_Software.webp\" alt=\"\" class=\"wp-image-34898 has-transparency\" srcset=\"https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung_pushpin_anomaly_C_RISC_Software.webp 395w, https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung_pushpin_anomaly_C_RISC_Software-300x300.webp 300w, https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung_pushpin_anomaly_C_RISC_Software-150x150.webp 150w\" \/><\/figure>\n\n\n\n<p>Figure 1: Examples of industrial anomalies on metallic fasteners (drive-in nuts). Left: Original images, right: marked damaged areas. Such subtle, context-dependent defects cannot be adequately captured by generically pre-trained AI models.  <br\/><\/p>\n<\/div>\n<\/div><div class=\"wp-block-group-container alignfull \">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading\">Image anomalies: Visual conspicuousness vs. semantic error<\/h3>\n\n\n\n<p>Anomalies in industrial image data are not only rare &#8211; they also take many forms. They can be roughly divided into two classes: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Structural anomalies<\/strong>: These are local, usually texture- or pixel-based deviations that are &#8220;new&#8221; in their characteristic patterns compared to the training data. Typical examples are scratches, dents, cracks or soiling on surfaces. Detection is carried out, for example, by comparing sections or feature memory networks that mark unknown textures or shapes as anomalous.  <\/li>\n\n\n\n<li><strong>Logical anomalies<\/strong>: These anomalies violate the semantic or spatial rules that were learned from correct images without individual objects being technically defective. Examples are missing or additional components, incorrect placement, incorrect arrangement or deviating number of expected components. Their detection requires an understanding of global object relationships and counters, for example through autoencoders or hybrid models that check both local and logical constraints.  <\/li>\n<\/ul>\n\n\n\n<p>A robust anomaly detection system must be able to deal with both types of error &#8211; and must not rely on rigid reference images or simple differences. It needs contextual knowledge and the ability to interpret &#8220;meaning&#8221;, not just &#8220;deviation&#8221;. <\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img data-dominant-color=\"524743\" data-has-transparency=\"true\" style=\"--dominant-color: #524743;\" decoding=\"async\" width=\"735\" height=\"370\" sizes=\"(max-width: 735px) 100vw, 735px\" src=\"https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung_Verbinder_Anomalie.webp\" alt=\"\" class=\"wp-image-34900 has-transparency\" srcset=\"https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung_Verbinder_Anomalie.webp 735w, https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung_Verbinder_Anomalie-300x151.webp 300w\" \/><\/figure>\n\n\n\n<p>Figure 2: Example of different classes of industrial anomalies. (a) Structural anomaly: the wire is damaged or broken. (b) Logical anomaly: instead of a single wire, there are two faultlessly laid wires. While the former is visible locally, the latter violates the semantic expectation of the correct component configuration.   <\/p>\n<\/div>\n<\/div><div class=\"wp-block-group-container alignfull \">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading\">Supervised or unsupervised?<\/h3>\n\n\n\n<p>A common assumption: in order to reliably detect anomalies, a model needs as many fault examples as possible. In industrial reality, however, the opposite is the case: errors should occur as rarely as possible &#8211; ideally not at all. And this is precisely why they are usually almost completely absent from the available data sets.  <\/p>\n\n\n\n<p>This is a significant problem for classic supervised procedures. Without sufficient fault examples, they cannot draw any meaningful dividing lines between good and bad. Instead, modern industrial applications rely on <strong>unsupervised or one-class learning methods<\/strong> in which only good images are used for training. The model learns the characteristics of &#8220;normality&#8221; &#8211; and recognizes anything that deviates significantly from this as potentially anomalous.   <\/p>\n\n\n\n<p>Although these procedures do not require explicit error data, they do have other requirements: The definition of what is considered &#8220;normal&#8221; must be clear and consistent. In addition, typical production-related deviations &#8211; such as slight changes in position, surface variations or different exposures &#8211; must <strong>be sufficiently represented<\/strong> in the training data set so that the system does not incorrectly interpret them as defects. <\/p>\n\n\n\n<p>Only if the real variance of everyday production is represented in the &#8220;normal picture&#8221; can the system act robustly in the face of real fluctuations.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img data-dominant-color=\"313232\" data-has-transparency=\"true\" style=\"--dominant-color: #313232;\" decoding=\"async\" width=\"854\" height=\"351\" sizes=\"(max-width: 854px) 100vw, 854px\" src=\"https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung_Wallplug_example.webp\" alt=\"\" class=\"wp-image-34902 has-transparency\" srcset=\"https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung_Wallplug_example.webp 854w, https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung_Wallplug_example-300x123.webp 300w, https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung_Wallplug_example-768x316.webp 768w\" \/><\/figure>\n\n\n\n<p>Figure 3: A complete annotation of all potential production errors is hardly possible in practice. Instead, the &#8220;normal&#8221; can be learned unsupervised and deviations can then be recognized as potential anomalies. <\/p>\n<\/div>\n<\/div><div class=\"wp-block-group-container alignfull \">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading\">Labeled data: The bottleneck of practice<\/h3>\n\n\n\n<p>Even if error images were available, their annotation is expensive and time-consuming. Their targeted generation is often impractical: production lines have to be stopped, errors deliberately provoked and then rectified manually &#8211; a time-consuming and expensive process that is rarely justified. <\/p>\n\n\n\n<p>In addition, <strong>even in very large production data sets, real errors have often simply not yet occurred.<\/strong> This is not a verification problem, but a desirable state &#8211; after all, industrial quality assurance aims to avoid errors at an early stage. For the training of a model, however, this means that there are <strong>no concrete examples of anomalies that must nevertheless be detected in the future.<\/strong> This means that the existing labeled defect data &#8211; if available &#8211; is often incomplete and not representative of the entire range of potential deviations. <\/p>\n\n\n\n<p><strong>Unsupervised methods<\/strong> offer a viable approach here: they do not require explicit fault images, but learn exclusively from fault-free examples. In many industrial scenarios, they are therefore the <strong>only realistic option<\/strong> &#8211; provided that the quality and consistency of the good images is high and the model architecture allows a distinction to be made between tolerable variance and genuine anomalies. <\/p>\n<\/div>\n<\/div><div class=\"wp-block-group-container alignfull \">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading\">Variability as a reality &#8211; and a challenge<\/h3>\n\n\n\n<p>Industrial image data is rarely homogeneous. Even with consistent processes, they are subject to natural variance &#8211; due to: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Variable-position components<\/strong> such as connection cables, hydraulic lines or hoses<\/li>\n\n\n\n<li><strong>Changing lighting conditions<\/strong> due to ambient light, machine shadows or seasonal influences<\/li>\n\n\n\n<li><strong>Scattering on surfaces<\/strong> due to manufacturing tolerances, contamination or assembly marks<\/li>\n<\/ul>\n\n\n\n<p>These factors mean that two &#8220;correct&#8221; images often differ significantly from each other &#8211; even though both are error-free. A system that is too sensitive constantly reports false alarms. A system that is too coarse overlooks real problems. The fine line between sensitivity and robustness is the central challenge of industrial anomaly detection.   <\/p>\n\n\n\n<p>It becomes particularly critical with <strong>high-resolution images<\/strong>: As potential anomalies can occur anywhere, many methods work on 256\u00d7256 pixel sections. To examine a detailed image of 2048\u00d72048 px, for example, hundreds of these sections are required.<\/p>\n\n\n\n<p>The problem is that each section is a separate &#8220;test&#8221;. And the more tests are carried out, the higher the probability of false-positive results &#8211; even with good individual performance. This <strong>statistical accumulation problem<\/strong> is an often underestimated source of errors and frustration in practice.  <\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img data-dominant-color=\"ededf3\" data-has-transparency=\"false\" style=\"--dominant-color: #ededf3;\" decoding=\"async\" width=\"1024\" height=\"640\" sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung_B3b_statistics-1024x640.webp\" alt=\"\" class=\"wp-image-34904 not-transparent\" srcset=\"https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung_B3b_statistics-1024x640.webp 1024w, https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung_B3b_statistics-300x188.webp 300w, https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung_B3b_statistics-768x480.webp 768w, https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung_B3b_statistics-1536x960.webp 1536w, https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung_B3b_statistics-2048x1280.webp 2048w\" \/><\/figure>\n\n\n\n<p>Figure 4: Patch-based anomaly detection requires extremely reliable detection of individual errors. With 500 patches per image, the misclassification rate per patch must not exceed 1 in 10,000 in order not to exceed a false positive rate of 5% per image. <\/p>\n<\/div>\n<\/div><div class=\"wp-block-group-container alignfull \">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading\">Adaptivity as the key to the future<\/h3>\n\n\n\n<p>Even a well-trained, finely tuned system loses its effectiveness when reality changes. New suppliers, modified components, updates to the product design &#8211; they all change the visual appearance of the normal state. <\/p>\n\n\n\n<p>A system that cannot react to this will either report everything as an error &#8211; or nothing at all. Modern anomaly detection must therefore be <strong>adaptive and capable of learning<\/strong>. The aim is to integrate new &#8220;normal states&#8221; with a small amount of sample data without having to completely retrain the model. Methods from the field of <em>few-shot learning<\/em> or <em>continuous learning<\/em> are becoming increasingly relevant here.   <\/p>\n<\/div>\n<\/div><div class=\"wp-block-group-container alignfull \">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading\">Hardware requirements in live operation<\/h3>\n\n\n\n<p>One aspect that is often underestimated is the <strong>technical requirements<\/strong> of an anomaly detection system in live operation.<\/p>\n\n\n\n<p>Although many modern computer vision models are considered comparatively efficient in inference, in practice <strong>specialized hardware resources<\/strong> are required to work reliably and in real time.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Powerful CPUs<\/strong> are necessary for image pre-processing: cropping, color space conversion, contrast adjustment and other processing steps must be carried out for each image &#8211; often under time pressure and parallel to the running line.<\/li>\n\n\n\n<li><strong>Graphics cards (GPUs)<\/strong> offer the decisive speed advantage in the actual image evaluation (i.e. the AI inference step) &#8211; especially with high-resolution images or complex models.<\/li>\n<\/ul>\n\n\n\n<p>Whether the hardware is installed directly on the line (e.g. in an edge device) or operated centrally (e.g. with a camera connection to a computer server) depends on the scenario in question. The important thing is that <strong>these requirements should already be taken into account in the planning phase.<\/strong> <\/p>\n\n\n\n<p>This is the only way to prevent a working prototype from failing later due to excessive response times or system overload.<\/p>\n<\/div>\n<\/div><div class=\"wp-block-group-container alignfull \">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading\">RISC Software as a solution partner: From model architecture to operational implementation<\/h3>\n\n\n\n<p>The implementation of industrial anomaly detection requires more than simply applying ready-made models. Each application scenario has its own requirements: different image qualities, product variants, cycle times or integration environments. Standard models often reach their limits here &#8211; whether in terms of robustness, scalability or dealing with variable reality.  <\/p>\n\n\n\n<p><strong>RISC Software GmbH sees itself as a solution partner<\/strong> that does not shy away from this complexity: we analyze the specific use case, adapt existing model architectures in a targeted manner &#8211; and integrate them into functioning systems. From image acquisition to production-related decisions, we help companies not only to test AI-based quality control, but also to <strong>make<\/strong> it <strong>sustainable and productive<\/strong>. <\/p>\n<\/div>\n<\/div><div class=\"wp-block-group-container alignfull \">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>Anomaly detection is not a finished product, but a continuous process. Anyone who takes the reality of industrial image data seriously &#8211; with its variance, imbalance and permanent change &#8211; can use AI-based quality control sensibly and effectively. This requires suitable models, realistic expectations and an agile concept for operation and further development.  <\/p>\n<\/div>\n<\/div><div class=\"wp-block-group-container alignfull \">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading\">Six questions that companies should ask themselves before using anomaly detection<\/h2>\n\n\n<div class=\"container timeline-block flex flex-col items-start md:items-center\">\n        <span data-aos-duration=\"700\" class=\"time flex flex-col items-center\">\n       <img decoding=\"async\" data-aos=\"zoom-in\"  width=\"40\" height=\"40\" src=\"https:\/\/risc.web-email.at\/app\/themes\/risc-theme\/public\/images\/time-spot.999891.svg\" alt=\"Zeitpunkt\">\n      <span  data-aos=\"zoom-in\" class=\"text-risc-blue my-1\">1<\/span>\n      <img decoding=\"async\" data-aos=\"fade-up\" class=\"timeline-img mb-2 \"  width=\"2\" height=\"104\"  src=\"https:\/\/risc.web-email.at\/app\/themes\/risc-theme\/public\/images\/timeline.f2d74a.svg\" alt=\"Zeitlinie\">\n       <div class=\"text-right \"><p><strong>Werden Bilder in gleichbleibender Qualit\u00e4t erzeugt?<\/strong><br \/>\nAnomalieerkennung lebt von Konsistenz. Unterschiede bei Kameraposition, Beleuchtung oder Hintergrund f\u00fchren schnell zu Fehlalarmen. Nur wenn die Bildaufnahme technisch stabil und wiederholbar ist, kann KI sinnvoll eingesetzt werden.<\/p>\n<\/div>\n     <\/span>\n       <span data-aos-duration=\"700\" class=\"time flex flex-col items-center\">\n       <img decoding=\"async\" data-aos=\"zoom-in\"  width=\"40\" height=\"40\" src=\"https:\/\/risc.web-email.at\/app\/themes\/risc-theme\/public\/images\/time-spot.999891.svg\" alt=\"Zeitpunkt\">\n      <span  data-aos=\"zoom-in\" class=\"text-risc-blue my-1\">2<\/span>\n      <img decoding=\"async\" data-aos=\"fade-up\" class=\"timeline-img mb-2 \"  width=\"2\" height=\"104\"  src=\"https:\/\/risc.web-email.at\/app\/themes\/risc-theme\/public\/images\/timeline.f2d74a.svg\" alt=\"Zeitlinie\">\n       <div class=\"text-left \"><p><strong>Gibt es genug Beispielbilder f\u00fcr den Normalzustand?<\/strong><br \/>\nAuch wenn keine Fehlerdaten vorhanden sind: Ein gutes Anomalieerkennungsmodell braucht viele Bilder von fehlerfreien Produkten. Je gr\u00f6\u00dfer und vielf\u00e4ltiger dieses Set, desto robuster kann das System sp\u00e4ter reagieren.<\/p>\n<\/div>\n     <\/span>\n       <span data-aos-duration=\"700\" class=\"time flex flex-col items-center\">\n       <img decoding=\"async\" data-aos=\"zoom-in\"  width=\"40\" height=\"40\" src=\"https:\/\/risc.web-email.at\/app\/themes\/risc-theme\/public\/images\/time-spot.999891.svg\" alt=\"Zeitpunkt\">\n      <span  data-aos=\"zoom-in\" class=\"text-risc-blue my-1\">3<\/span>\n      <img decoding=\"async\" data-aos=\"fade-up\" class=\"timeline-img mb-2 \"  width=\"2\" height=\"104\"  src=\"https:\/\/risc.web-email.at\/app\/themes\/risc-theme\/public\/images\/timeline.f2d74a.svg\" alt=\"Zeitlinie\">\n       <div class=\"text-right \"><p><strong>Sind bekannte Fehlerarten dokumentiert \u2013 auch mit Bildbeispielen?<\/strong><br \/>\nFehlerbilder m\u00f6gen beim Training teilweise nicht n\u00f6tig sein, sind aber essentiell bei der Bewertung des fertigen Systems. Nur wenn klar ist, welche Anomalien erkannt werden sollen, l\u00e4sst sich die Leistungsf\u00e4higkeit objektiv beurteilen.<\/p>\n<\/div>\n     <\/span>\n       <span data-aos-duration=\"700\" class=\"time flex flex-col items-center\">\n       <img decoding=\"async\" data-aos=\"zoom-in\"  width=\"40\" height=\"40\" src=\"https:\/\/risc.web-email.at\/app\/themes\/risc-theme\/public\/images\/time-spot.999891.svg\" alt=\"Zeitpunkt\">\n      <span  data-aos=\"zoom-in\" class=\"text-risc-blue my-1\">4<\/span>\n      <img decoding=\"async\" data-aos=\"fade-up\" class=\"timeline-img mb-2 \"  width=\"2\" height=\"104\"  src=\"https:\/\/risc.web-email.at\/app\/themes\/risc-theme\/public\/images\/timeline.f2d74a.svg\" alt=\"Zeitlinie\">\n       <div class=\"text-left \"><p><strong>Wie oft \u00e4ndern sich Bauteile, Lieferanten oder Produktvarianten?<\/strong><br \/>\nEin KI-System erkennt, was es kennt. Wenn sich das Aussehen von Bauteilen regelm\u00e4\u00dfig \u00e4ndert, braucht das System die F\u00e4higkeit zur schnellen Anpassung \u2013 und das Projekt muss so konzipiert sein, dass solche Anpassungen eingeplant sind.<\/p>\n<\/div>\n     <\/span>\n       <span data-aos-duration=\"700\" class=\"time flex flex-col items-center\">\n       <img decoding=\"async\" data-aos=\"zoom-in\"  width=\"40\" height=\"40\" src=\"https:\/\/risc.web-email.at\/app\/themes\/risc-theme\/public\/images\/time-spot.999891.svg\" alt=\"Zeitpunkt\">\n      <span  data-aos=\"zoom-in\" class=\"text-risc-blue my-1\">5<\/span>\n      <img decoding=\"async\" data-aos=\"fade-up\" class=\"timeline-img mb-2 \"  width=\"2\" height=\"104\"  src=\"https:\/\/risc.web-email.at\/app\/themes\/risc-theme\/public\/images\/timeline.f2d74a.svg\" alt=\"Zeitlinie\">\n       <div class=\"text-right \"><p><strong>Wer kann im Unternehmen beurteilen, ob ein gemeldeter Fehler tats\u00e4chlich einer ist?<\/strong><br \/>\nKein System ist perfekt. Es wird Grenzf\u00e4lle geben. Wichtig ist, dass intern eine Ansprechperson (z.\u202fB. aus der Qualit\u00e4tssicherung) definiert ist, die R\u00fcckmeldungen geben kann \u2013 damit das System laufend besser wird.<\/p>\n<\/div>\n     <\/span>\n       <span data-aos-duration=\"700\" class=\"time flex flex-col items-center\">\n       <img decoding=\"async\" data-aos=\"zoom-in\"  width=\"40\" height=\"40\" src=\"https:\/\/risc.web-email.at\/app\/themes\/risc-theme\/public\/images\/time-spot.999891.svg\" alt=\"Zeitpunkt\">\n      <span  data-aos=\"zoom-in\" class=\"text-risc-blue my-1\">6<\/span>\n      <img decoding=\"async\" data-aos=\"fade-up\" class=\"timeline-img mb-2 timeline-hidden\"  width=\"2\" height=\"104\"  src=\"https:\/\/risc.web-email.at\/app\/themes\/risc-theme\/public\/images\/timeline.f2d74a.svg\" alt=\"Zeitlinie\">\n       <div class=\"text-left \"><p><strong>Gibt es geeignete Hardware f\u00fcr den Live-Betrieb?<\/strong><br \/>\nF\u00fcr Tests reicht oft der Laptop \u2013 f\u00fcr den produktiven Einsatz braucht es zuverl\u00e4ssige Bildverarbeitung in Echtzeit. Das erfordert leistungsf\u00e4hige CPU-Ressourcen und meist auch eine GPU \u2013 direkt an der Linie oder im Netzwerk.<\/p>\n<\/div>\n     <\/span>\n  <\/div>\n<\/div>\n<\/div>\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Contact us<\/h2>\n\n\n\n<div class=\"wp-block-contact-form-7-contact-form-selector\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f663-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"663\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/publication\/35605#wpcf7-f663-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"663\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f663-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<div class=\"form-row\">\n\t<div class=\"form-input\">\n\t\t<p><label class=\"sr-only\" for=\"your-name\">Your name <\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" id=\"your-name\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"form-input\">\n\t\t<p><label class=\"sr-only\" for=\"your-email\">Your email<\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" id=\"your-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"E-Mail\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n<\/div>\n<div class=\"form-row\">\n\t<div class=\"form-input\">\n\t\t<p><label class=\"sr-only\" for=\"your-company\">Company <\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-company\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" id=\"your-company\" aria-invalid=\"false\" placeholder=\"Unternehmen\" value=\"\" type=\"text\" name=\"your-company\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"form-input\">\n\t\t<p><label class=\"sr-only\" for=\"your-position\">Position<\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-position\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" placeholder=\"Position\" value=\"\" type=\"text\" name=\"your-position\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n<\/div>\n<div class=\"form-row\">\n\t<div class=\"form-input\">\n\t\t<p><label class=\"sr-only\" for=\"your-subject\"> Subject <\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-subject\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" id=\"your-subject\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Thema\" value=\"\" type=\"text\" name=\"your-subject\" \/><\/span>\n\t\t<\/p>\n\t<\/div>\n<\/div>\n<p><span id=\"wpcf7-69de2338780dd-wrapper\" class=\"wpcf7-form-control-wrap phone-95-wrap\" style=\"display:none !important; visibility:hidden !important;\"><label for=\"wpcf7-69de2338780dd-field\" class=\"hp-message\">Please leave this field empty.<\/label><input id=\"wpcf7-69de2338780dd-field\"  class=\"wpcf7-form-control wpcf7-text\" type=\"text\" name=\"phone-95\" value=\"\" size=\"40\" tabindex=\"-1\" autocomplete=\"new-password\" \/><\/span><br \/>\n<label class=\"sr-only\" for=\"your-message\"> Your message (optional)<\/label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" id=\"your-message\" aria-invalid=\"false\" placeholder=\"Ihre Nachricht an uns\" name=\"your-message\"><\/textarea><\/span><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"hcap-cf7\">\t\t<input\n\t\t\t\ttype=\"hidden\"\n\t\t\t\tclass=\"hcaptcha-widget-id\"\n\t\t\t\tname=\"hcaptcha-widget-id\"\n\t\t\t\tvalue=\"eyJzb3VyY2UiOlsiY29udGFjdC1mb3JtLTdcL3dwLWNvbnRhY3QtZm9ybS03LnBocCJdLCJmb3JtX2lkIjo4fQ==-87b48f281889db60dae4720b9dc28d55\">\n\t\t\t\t<span id=\"hcap_cf7-69de2338785a73.09992599\" class=\"wpcf7-form-control h-captcha \"\n\t\t\tdata-sitekey=\"3a6a81c1-2b2e-4b2a-b1eb-d9446bc09afb\"\n\t\t\tdata-theme=\"light\"\n\t\t\tdata-size=\"normal\"\n\t\t\tdata-auto=\"false\"\n\t\t\tdata-ajax=\"false\"\n\t\t\tdata-force=\"false\">\n\t\t<\/span>\n\t\t<input type=\"hidden\" id=\"_wpnonce\" name=\"_wpnonce\" value=\"83fc09d92f\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/en\/wp-json\/wp\/v2\/publication\/35605\" \/><\/span><input class=\"wpcf7-form-control wpcf7-submit has-spinner btn\" type=\"submit\" value=\"Senden\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Authors<\/h2>\n\n\n<div class=\"contact-person\">\n      <picture>\n      \n      \n      \n      \n      <img decoding=\"async\" data-aos=\"fade-zoom-in\"\n           data-aos-offset=\"0\" class=\"w-full\" width=\"212\" height=\"293\"\n           src=\"https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/Portrait_freigestellt_pkrausfu-e1758612522384.webp\"\n           alt=\"\">\n    <\/picture>\n    \n\n<h5 class=\"wp-block-heading\">DI Dr. Patrick Kraus-F\u00fcreder, BSc<\/h5>\n\n\n\n<p>AI Product Manager<\/p>\n\n  <\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer is-style-content-space\"><\/div>\n\n\n<div class=\"contact-person\">\n      <picture>\n      \n      \n      \n      \n      <img decoding=\"async\" data-aos=\"fade-zoom-in\"\n           data-aos-offset=\"0\" class=\"w-full\" width=\"212\" height=\"293\"\n           src=\"https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/msteindl-e1758618780377.webp\"\n           alt=\"\">\n    <\/picture>\n    \n\n<h5 class=\"wp-block-heading\">DI Dr. Markus Steindl<\/h5>\n\n\n\n<p>Senior Data Scientist<\/p>\n\n  <\/div>\n<\/div>\n<\/div>\n\n<h2 class=\"wp-block-heading\">Read more<\/h2>\n<div class=\"posts-slider-block\" data-aos=\"fade-up\" data-aos-offset=\"0\" data-aos-anchor-placement=\"top-bottom\">\n        <section class=\"splide posts-slider\" aria-label=\"Gallery Slides\">\n            <div class=\"splide__arrows\">\n                <button class=\"splide__arrow splide__arrow--prev\">\n                    <span class=\"sr-only\">Previous<\/span>\n                    <img decoding=\"async\" loading=\"lazy\" width=\"25\" height=\"21\" src=\"https:\/\/risc.web-email.at\/app\/themes\/risc-theme\/public\/images\/icon-arrow.35d2ec.svg\"\n                         alt=\"Previous\">\n                <\/button>\n                <button class=\"splide__arrow splide__arrow--next\">\n                    <span class=\"sr-only\">Next<\/span>\n                    <img decoding=\"async\" loading=\"lazy\" width=\"25\" height=\"21\" src=\"https:\/\/risc.web-email.at\/app\/themes\/risc-theme\/public\/images\/icon-arrow.35d2ec.svg\"\n                         alt=\"Next\">\n                <\/button>\n            <\/div>\n            <div class=\"inner\">\n                <div class=\"splide__track\">\n                    <div class=\"splide__list\">\n\n                                                    <a href=\"https:\/\/risc.web-email.at\/en\/technicalarticles\/fachbeitrag-industrial-ai\/\" class=\"splide__slide blog-post-teaser mb-1 lg:mb-3\">\n                                <div class=\"blog-image\">\n                                                                                                                                <picture>\n                                                                                        <img decoding=\"async\" src=\"https:\/\/risc.web-email.at\/app\/uploads\/2023\/09\/Fotolia_64178357_XL-c-industrieblick-Fotolia.com_-360x214.jpg\"\n                                                 alt=\"Industrial AI: From raw data to a more efficient production landscape\">\n                                        <\/picture>\n                                                                    <\/div>\n                                <div class=\"blog-content px-2 py-3 xl:px-4 xl:py-5\">\n                                    <h3>Industrial AI: From raw data to a more efficient production landscape<\/h3>\n                                    <div class=\"blog-post-excerpt mt-2\">\n                                        The industrial sector, like other areas, is currently going through a phase of digital transformation. This means that manufacturing companies are involved in various digitalization activities [1]. Within this context, industrial data and the way in which it is processed, visualized and used play a key role.\n                                    <\/div>\n                                    <span class=\"inline-block mt-2 more\">mehr erfahren <span class=\"ml-1 icon-more\"><\/span><\/span>\n\n                                <\/div>\n                            <\/a>\n                                                    <a href=\"https:\/\/risc.web-email.at\/en\/technicalarticles\/detection-of-worn-flame-cutting-nozzles\/\" class=\"splide__slide blog-post-teaser mb-1 lg:mb-3\">\n                                <div class=\"blog-image\">\n                                                                                                                                <picture>\n                                                                                        <img decoding=\"async\" src=\"https:\/\/risc.web-email.at\/app\/uploads\/2025\/01\/cstaub_Flame_cutting_systems_for_the_steel_industry_-ar_11_-_e83fe40a-ef77-4b75-bf58-73f6b949b112_2-360x214.png\"\n                                                 alt=\"Detection of worn flame-cutting nozzles\">\n                                        <\/picture>\n                                                                    <\/div>\n                                <div class=\"blog-content px-2 py-3 xl:px-4 xl:py-5\">\n                                    <h3>Detection of worn flame-cutting nozzles<\/h3>\n                                    <div class=\"blog-post-excerpt mt-2\">\n                                        How machine learning and structure-borne sound data help to monitor the wear of flame cutting nozzles and increase the efficiency of flame cutting.\n                                    <\/div>\n                                    <span class=\"inline-block mt-2 more\">mehr erfahren <span class=\"ml-1 icon-more\"><\/span><\/span>\n\n                                <\/div>\n                            <\/a>\n                                            <\/div>\n                <\/div>\n            <\/div>\n        <\/section>\n    <\/div>\n","protected":false},"excerpt":{"rendered":"<p>AI enables new forms of automated quality assurance &#8211; with enormous potential, but also practical hurdles in terms of data availability, model architecture and system integration.<\/p>\n","protected":false},"featured_media":34911,"template":"","publication-category":[],"class_list":["post-35605","publication","type-publication","status-publish","has-post-thumbnail","hentry"],"acf":[],"portrait_thumb_url":"https:\/\/risc.web-email.at\/app\/uploads\/2025\/09\/2025-09-23-Fachbeitrag-Anomalieerkennung-360x214.webp","_links":{"self":[{"href":"https:\/\/risc.web-email.at\/en\/wp-json\/wp\/v2\/publication\/35605","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/risc.web-email.at\/en\/wp-json\/wp\/v2\/publication"}],"about":[{"href":"https:\/\/risc.web-email.at\/en\/wp-json\/wp\/v2\/types\/publication"}],"version-history":[{"count":1,"href":"https:\/\/risc.web-email.at\/en\/wp-json\/wp\/v2\/publication\/35605\/revisions"}],"predecessor-version":[{"id":35606,"href":"https:\/\/risc.web-email.at\/en\/wp-json\/wp\/v2\/publication\/35605\/revisions\/35606"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/risc.web-email.at\/en\/wp-json\/wp\/v2\/media\/34911"}],"wp:attachment":[{"href":"https:\/\/risc.web-email.at\/en\/wp-json\/wp\/v2\/media?parent=35605"}],"wp:term":[{"taxonomy":"publication-category","embeddable":true,"href":"https:\/\/risc.web-email.at\/en\/wp-json\/wp\/v2\/publication-category?post=35605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}