Advanced Diagnostic Automation Techniques for Resilient AI Hardware in Fragmented Supply Chains
DOI:
https://doi.org/10.56830/IJSIE202601Keywords:
Diagnostic Automation, Federated Anomaly-Detection, AI Hardware, Supply-Chain Resilience, Digital Twin, Edge Telemetry, Blockchain Traceability, Self-Healing Firmware, Component Obsolescence, MTTR ReductionAbstract
The supply chain fragmentation, geopolitical limitations and the fast rates of component obsolescence in the contemporary AI-hardware ecosystem require the strong diagnostic automation structures. This paper outlines a new architecture to integrate in-line hardware diagnostics, federated anomaly detection and automated remedial workflows to augment resilience of AI-specific hardware assets (e.g. neural-accelerator boards, memory modules) in the context of distributed supply chains. The suggested system leverages embedded sensors and telemetry based on board-level power/thermal/failure-event logs (instrumented through the use of IoT gateways) and consolidated through the use of secure edge-cloud pipelines. The federated learning module is used to train localized anomaly-detection models (e.g., variational autoencoders) at all nodes of the supply chain without losing data sovereignty. On the occurrence of a diagnostic signature, e.g. an increase in leakage current, non-standard thermal gradient across AI accelerator units, or failure during repeated operation in a stack, the system initiates automated correction measures: dynamically re-routed hardware units, non-standard scoring of suppliers through blockchain-based traceability. Simulations of supply chains in the form of digital twins are used to execute what-if risks of disruption of components and hardware diagnostics to focus on risk mitigation plans. The diagnostic system combines a real-time repair-automation code (e.g., firmware rollback, self-healing microcontrollers) with procurement procedures to minimize the mean time to detect
(MTTD) and mean time to recover (MTTR). A synthetic supply-chain testbed evaluation demonstrates a 45 percent reduction in defect isolation time and a 30 percent decrease in hardware lead-time upheavals in a multi-tier supplier failure condition. The study paves the way towards the intersection of AI hardware diagnostics, supply-chain automation, and resilience engineering, which offers operators of distributed manufacturing networks a blueprint of integrating autonomous diagnostic loops into fragmented supply-chain settings.
References
A. Chandrachood. (2023). “Optimizing Resource Allocation through Telemetry-Based Performance Monitoring,”. North American Journal of Engineering Research, vol. 4, no. 4. Available: http://najer.org/najer/article/view/57.
A. Gunuganti. (2023). “Zero Trust Network Segmentation,”. Int. J. Sci. Res. (IJSR), vol. DOI: https://doi.org/10.21275/SR24709190859
12, no. 4, pp. 1936–1940. [Online]. Available:
https://www.researchgate.net/profile/Anvesh-Gunuganti-
3/publication/382811938_Zero_Trust_Network_Segmentation/links/67a932.
A. J. Lowe et al.,. (2024). “Reconstructing terrestrial paleoclimate and paleoecology with fossil leaves using digital leaf physiognomy and leaf mass per area,”. J. Vis. Exp., no. 212. [Online]. Available: https://par.nsf.gov/biblio/10567882. DOI: https://doi.org/10.3791/66838
Alharbe, N., & Almalki, M. (2025). “IoT-enabled healthcare transformation leveraging deep learning for advanced patient monitoring and diagnosis,”. Multimedia Tools and Applications, vol. 84, no. 19, pp. 21331–21344, 2025. Available: https://alkindipublishers.org/index.php/jcsts/article/view/10851. Ayad, J., Qaddoori, N., & H. Maytham. (2025). “Enhanced Audio Encryption Scheme: Integrating Blowfish, HMAC-SHA256, and MD5 for Secure Communication,” . Mesopotamian J. CyberSecurity, vol. 5, no. 1, pp. 178–186, . DOI: https://doi.org/10.58496/MJCS/2025/012
B. M. T. Martins. (2025). Machine Learning Denoising. Doctoral dissertation, Universidade de Coimbra,, [Online]. Available: https://estudogeral.uc.pt/retrieve/282634/bernardo_tesefinal.pdf.
Bartoli, N., & S. Benedetto. (2022). “Driven by notifications–exploring the effects of badge notifications on user experience,”. PLoS One, vol. 17, no. 6, p. e0270888. [Online]. Available: https://journals.plos.org/plosone/article?id=10.1371/journal.pone.027. DOI: https://doi.org/10.1371/journal.pone.0270888
Bartolini, D., Bellezza, M., Palma, A., Frosini, A., & V. Pelletier. (2025). “Remembering like a Brain: A Bio-Inspired Associative Memory Model integrating Hodgkin- DOI: https://doi.org/10.21203/rs.3.rs-7903733/v1
Huxley Dynamics and Modular Network Architecture,”. Available: https://www.researchsquare.com/article/rs-7903733/latest.
C. Martinella. (2021). Single-event radiation effects in silicon carbide power MOSFETs. JYU Dissertations, [Online]. Available: https://jyx.jyu.fi/jyx/Record/jyx_123456789_76476.
Campos, E. M., Gonzalez-Vidal, A., Hernandez-Ramos, J. L., & A. Skarmeta. (2025). “Federated learning for misbehaviour detection with variational autoencoders and DOI: https://doi.org/10.1007/s10207-025-01000-8
Gaussian mixture models,”. International Journal of Information Security, vol. 24, no. 2, pp. 1–16, [Online]. Available: https://link.springer.com/article/10.1007/s10207-025-01000-8.
D. Anny. (2025). Self-Healing Cloud Systems: Integrating AI for Automated Recovery.
[Online]. Available: https://www.researchgate.net/profile/Dave-
Anny/publication/391424429_Self-
Healing_Cloud_Systems_Integrating_AI_for_Automated_Recovery/links/6816013 bdf0e.
D. Xue. (2023). Supply Chain Network Under Disruption Propagation: Prediction, Mitigation, and Remediation. Doctoral dissertation, Rutgers The State University of New Jersey, [Online]. Available: https://search.proquest.com/openview/1b4c9361ea8b80d52cec1277.
E. Vildjiounaite et al.,. (2023). “Challenges of learning human digital twin: Case study of mental wellbeing: Using sensor data and machine learning to create HDT,”. in DOI: https://doi.org/10.1145/3594806.3596538
Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments, pp. 574–583. Available: https://dl.acm.org/doi/abs/10.1145/3594806.3596538.
El-Hajj, M., & T. K. Gebremariam. (2024). Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0. [Online]. Available: DOI: https://doi.org/10.20944/preprints202407.0963.v1
https://docs.google.com/document/d/1SuJc6Kyj4o-
IIxF_vXDUrZBCFAPdiyjE2NcYFrXyFMk/edit?tab=t.0.
F. Tapia Lara. (2023). A Conceptual Framework for Simulating Feedback Loops in Engineering Design. Doctoral dissertation, Univ. of Leeds, , Online. Available at https://www.cambridge.org/core/journals/proceedings-of-the-designsociety/article/simulation-of-fe.
G. Kumar et al.,. (2025). “Robust LFSR-based Scrambling to Mitigate Stencil Attack on Main Memory,”. ACM Transactions on Embedded Computing Systems, vol. 24, no. 5s, pp. 1–22. Available: https://era.ed.ac.uk/handle/1842/40951. DOI: https://doi.org/10.1145/3758321
G. Raveendran Nair. (2025). Design of high-efficiency accelerators for diverse AI workloads,. [Online]. Available: https://conservancy.umn.edu/items/a6e51d22f473-43ea-b609-2665d4141a3a.
Grandviewresearch. (2025). “Artificial Intelligence In Diagnostics Market Report, 2020–
2027,” . Available: https://www.grandviewresearch.com/industryanalysis/artificial-intelligence-diagnostics-market.
Husam, R., Lahza, S. B., Fareed, H., & J. Shreyas. (2024). “Adaptive Multi-Objective Resource Allocation for Edge-Cloud Workflow Optimization Using Deep Reinforcement Learning,”. Modelling—International Open Access Journal of Modelling in Engineering Science,, vol. 5, no. 3, pp. 1298–1313, 2024. [Online]. Available: https://www.mdpi.com/2673-3951/5/3/67. DOI: https://doi.org/10.3390/modelling5030067
Ihirwe, F., Indamutsa, A., Ruscio, D. D., Mazzini, S., & A. Pierantonio. (2021). “Cloudbased modeling in IoT domain: a survey, open challenges and opportunities,”. in Proc. 2021 ACM/IEEE Int. Conf. Model Driven Eng. Lang. Syst. Companion (MODELS-C), pp. 73–82. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9643698/. DOI: https://doi.org/10.1109/MODELS-C53483.2021.00018
Innoaiot. (2025). “What Is ECC Memory and How Does It Work in Industrial Computing,”. [Online]. Available: https://www.innoaiot.com/what-is-ecc-memoryand-how-does-it-work-in-industrial-computing/.
J. Joo et al.,. (2023). “SPICE-Compatible Behavior Model of Multiphase Voltage
Regulator Module for End-to-End Power Integrity Simulation,” . in Proc. IEC DesignCon Conf., [Online]. Available: https://www.mapyourshow.com/mys_shared/dcon23/handouts/PAPER_T.
Khan, F. A., & S. S. Iyer. (2025). The Role of Digital Twin Technology in Enhancing Supply Chain Resilience and Predictive Risk Management.
Kim, Y., Oh, S., & G. Kim. (2025). “Convergence of Integrated Sensing and Communication (ISAC) and Digital-Twin Technologies in Healthcare Systems: A Comprehensive Review,” . Signals, , vol. 6, no. 4, p. 51. Available: https://www.mdpi.com/2624-6120/6/4/51. DOI: https://doi.org/10.3390/signals6040051
Liu, K., & S. Deshmukh. (2021). The Evolution of the Multi-tier Supply Chains in the EU Automotive Industry Driven by Covid-19—A Case Study at a Large Automotive OEM,. [Online]. Available: https://odr.chalmers.se/items/38f43b43-eef8-464ebf2c-9b0c8cd00d48.
Lu, S., Lu, J., An, K., Wang, X., & Q. He. (2023). “Edge computing on IoT for machine signal processing and fault diagnosis: A review,” . IEEE Internet of Things Journal, vol. 10, no. 13, pp. 11093–11116. Available: https://ieeexplore.ieee.org/abstract/document. DOI: https://doi.org/10.1109/JIOT.2023.3239944
Luna, J., Tan, I., Xie, X., & L. Jiang. (2024). “Navigating governance paradigms: A crossregional comparative study of generative AI governance processes & principles,”. in Proc. AAAI/ACM Conf. AI, Ethics, Soc., vol. 7, Oct. pp. 917–931. . DOI: https://doi.org/10.1609/aies.v7i1.31692
M. Rieth et al.,. (2021). “Technological aspects in blanket design: Effects of microalloying and thermo-mechanical treatments of EUROFER97 type steels after neutron irradiation,”. Fusion Engineering and Design, vol. 168, p. 112645. DOI: https://doi.org/10.1016/j.fusengdes.2021.112645
Ma, H., Yi, C., & C. Wu. (2021). “Review and outlook on durability of engineered cementitious composite (ECC),” . Constr. Build. Mater., vol. 287, p. 122719, [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0950061821004797. DOI: https://doi.org/10.1016/j.conbuildmat.2021.122719
Mahmud, S. A., Islam, N., Islam, Z., Rahman, Z., & Sk. T. Mehedi. (2024). “Privacy-
Preserving Federated Learning-Based Intrusion Detection Technique for CyberPhysical Systems,”. Mathematics, vol. 12, no. 20, p. 3194. [Online]. Available: https://www.mdpi.com. DOI: https://doi.org/10.3390/math12203194
Mazzucato, M., & T. Whitfill. (2022). “Expanding DARPA’s model of innovation for biopharma: A proposed Advanced Research Projects Agency for Health,”. Available: https://discovery.ucl.ac.uk/id/eprint/10196078/1/Mazzucato_mazzucato_m._and_w hitfill_t._2022._expanding_darpas_model_of_innovation_for_biopharma_a_propos ed_advanced_research_projects_agency_for_health.pdf. Methfessel, P., Beckmann, T., Rein, P., Ramson, S., & R. Hirschfeld. (2024). “MµSE: Supporting Exploration of Software-Hardware Interactions Through Examples,”. in Proc. 2024 CHI Conf. Human Factors Comput. Syst.,, pp. 1–16. DOI: https://doi.org/10.1145/3613904.3642186
Murphy, J., Ward, J. E., & B. Mac Namee. (2023). “An overview of machine learning techniques for onboard anomaly detection in satellite telemetry,” . in 2023 European Data Handling & Data Processing Conference (EDHPC),, pp. 1–6. DOI: https://doi.org/10.23919/EDHPC59100.2023.10396403
Murthy, M. Y., Koteswararao, A., & M. S. Babu. (2022). “Adaptive fuzzy deformable fusion and optimized CNN with ensemble classification for automated brain tumor diagnosis,” . Biomedical Engineering Letters, vol. 12, no. 1, pp. 37–58. DOI: https://doi.org/10.1007/s13534-021-00209-5
N. D. Anfinogenova et al.,. (2024). “Community-Based View on Diagnostic Imaging at the
End of COVID-19 Pandemic: Online Survey-Assisted Study,” . Diagnostics, vol.
14, no. 12, pp. 1269–1269, Available: https://www.mdpi.com/2075-
4418/14/12/1269 .
N. Peladarinos et al.,. (2023). “Enhancing Smart Agriculture by Implementing Digital DOI: https://doi.org/10.3390/s23167128
Twins: A Comprehensive Review,”. Sensors, vol. 23, no. 16, p. 7128. [Online]. Available: https://www.mdpi.com/2673-8732/4/3/13.
R. Babaloo. (2023). Technical Innovations in Gradient Array Systems for MRI Applications. Doctoral dissertation, Bilkent Universitesi (Turkey), [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9495790/.
R. P. Reddy. (2025). “Zero Trust Architectures in Modern Enterprises: Principles, Implementation Challenges, and Best Practices,”. Int. J. Comput. Trends Technol., vol. 73, no. 6, pp. 48–57, [Online]. Available: https://www.researchgate.net/profile/Mahammad-. DOI: https://doi.org/10.14445/22312803/IJCTT-V73I6P107
R. Zhong et al.,. (2021). “A simplified method for extracting parasitic inductances of MOSFET-based half-bridge circuit,”. IEEE Access, vol. 9, pp. 14122–14129, [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9330505/. DOI: https://doi.org/10.1109/ACCESS.2021.3052100
Ramanujam, M., Madhyastha, H. V., & R. Netravali. (2021). “Marauder: synergized caching and prefetching for low-risk mobile app acceleration,”. in Proc. 19th Annu. Int. Conf. Mobile Systems, Applications, and Services, pp. 350–362. DOI: https://doi.org/10.1145/3458864.3466866
Rashid, S., Bashir, F., Khanday, F. A., Beigh, M. R., & F. A. Hussin. (2021). “2-D design of double gate Schottky tunnel MOSFET for high-performance use in analog/RF applications,” . IEEE Access, vol. 9, pp. 80158–80169. [Online]. Available: https://ieeexplore. DOI: https://doi.org/10.1109/ACCESS.2021.3083929
Rhoads, J., & A. Smith. (2024). Effectiveness of Continuous Verification and MicroSegmentation in Enhancing Cybersecurity through Zero Trust Architecture. [Online]. Available: https://www.researchgate.net/profile/Austin-Smith42/publication/387948985_Effec.
S. Mappouras et al.,. (2025). “A toolkit for ambulance dispatch and routing optimization using AI and GIS,” in Proc. Eleventh Int. Conf. Remote Sensing and Geoinformation of the Environment (RSCy2025), , vol. 13816, Sep. 2025, pp. 361– 367. DOI: https://doi.org/10.1117/12.3075502
S. Xie et al.,. (2024). “TVDiag: A Task-oriented and View-invariant Failure Diagnosis Framework with Multimodal Data,”. arXiv preprint arXiv:2407.19711, 2024. Available: https://arxiv.org/abs/2407.19711.
Sharma, P., Jindal, R., & M. D. Borah. (2022). “A Review of Blockchain-Based
Applications and Challenges,”. [Online]. Available:
Song, A., Seo, E., & H. Kim. (2023). “Anomaly VAE-transformer: A deep learning approach for anomaly detection in decentralized finance,”. IEEE Access, vol. 11, pp. 98115–98131. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/10244206/. DOI: https://doi.org/10.1109/ACCESS.2023.3313448
Swain, R., Paul, A., & M. D. Behera. (2024). “Spatio-temporal fusion methods for spectral remote sensing: A comprehensive technical review and comparative analysis,” . Tropical Ecology, vol. 65, no. 3, pp. 356–375. Available: https://link.springer.com/article. DOI: https://doi.org/10.1007/s42965-023-00318-5
Sytch, M., Kim, Y., & S. Page. (2022). “Supplier-selection practices for robust global supply chain networks: A simulation of the global auto industry,” . California Management Review, vol. 64, no. 2, pp. 119–142. [Online]. Available: https://journals.sagepub. DOI: https://doi.org/10.1177/00081256211070335
T. Banet et al.,. (2024). “Toward improved image‐based root phenotyping: handling temporal and cross‐site domain shifts in crop root segmentation models,”. The Plant Phenome Journal, vol. 7, no. 1, p. e20094. Available: https://acsess.onlinelibrary.wiley.com/. DOI: https://doi.org/10.1002/ppj2.20094
Tabassum, M., Islam, M. I., Bristy, I. J., & M. Rokibuzzaman. (2025). “Blockchain and ERP-integrated MIS for transparent apparel & textile supply chains,” . Saudi Journal of Engineering and Technology (SJEAT), vol. 10, no. 9, pp. 447–456, . DOI: https://doi.org/10.36348/sjet.2025.v10i09.008
Tamim, I., Saci, A., Jammal, M., & A. Shami. (2021). “Downtime-aware o-ran vnf deployment strategy for optimized self-healing in the o-cloud,” . in Proc. 2021 IEEE Global Commun. Conf. (GLOBECOM), pp. 1–6. [Online]. Available: https://ieeexplore.ieee.org/. DOI: https://doi.org/10.1109/GLOBECOM46510.2021.9685775
Tao, F., Akhtar, M. S., & Z. Jiayuan. (2021). “The future of artificial intelligence in cybersecurity: A comprehensive survey,” . EAI Endorsed Transactions on Creative Technologies, vol. 8, no. 28. Available: https://pdfs.semanticscholar.org/01f0/4fd69cba1239. DOI: https://doi.org/10.4108/eai.7-7-2021.170285
U. Zurutuza. (2024). Leveraging Digital Twins and SIEM Integration for Incident Response in OT Environments. [Online]. Available: https://www.divaportal.org/smash/record.jsf?pid=diva2:1589698.
Uriawan, W., Ramadita, R., Putra, R. D., Siregar, R. I., & R. Addiva. (2024).
“Authenticate and Verification Source Files using SHA256 and HMAC Algorithms,”. [Online]. Available: https://www.preprints.org/manuscript/202407.0075/download/final_file.
Valence, R., & M. F. Magada. (2025). “Supply Chain Activities and Challenges of Construction Hardware Enterprises,” . Journal of Interdisciplinary Perspectives, vol. 3, no. 7, pp. 202–216, 2025. Available: https://www.jippublication.com/index.php/jip/article/view/4. DOI: https://doi.org/10.69569/jip.2025.295
Y. Han et al.,. (2024). “A Novel Efficient Crash Consistency Solution Enabling Rollback
Recovery for Secure NVM in Low-Power Energy Harvesting Systems,”. IEEE Trans. Dependable Secure Comput, [Online]. Available: https://ieeexplore.ieee.org/abstract/document.
Zhu, P., Hu, J., Li, X., & Q. Zhu. (2021). “Using blockchain technology to enhance the traceability of original achievements,” . IEEE Trans. Eng. Manag., vol. 70, no. 5, pp. 1693–1707, [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9405372/. DOI: https://doi.org/10.1109/TEM.2021.3066090






