英文文文献 科技类 原文及翻译 (电子 电气 自动化 通信).doc_第1页
英文文文献 科技类 原文及翻译 (电子 电气 自动化 通信).doc_第2页
英文文文献 科技类 原文及翻译 (电子 电气 自动化 通信).doc_第3页
英文文文献 科技类 原文及翻译 (电子 电气 自动化 通信).doc_第4页
英文文文献 科技类 原文及翻译 (电子 电气 自动化 通信).doc_第5页
免费预览已结束,剩余32页可下载查看

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

损害和材料评估的智能化和图像处理方法S.S. Kumar1, F. Taheri2, and M.R. Islam21Graduate Student, 2Professor, Respectively; Dept of Civil Engg, Dalhousie University,Halifax, NS- B3J 1Z1, CanadaE-mail: sskumar, Farid.Taheri, Rafiqul.Islamdal.caArtificial Intelligence and Image Processing Approaches inDamage Assessment and Material EvaluationS.S. Kumar1, F. Taheri2, and M.R. Islam21Graduate Student, 2Professor, Respectively; Dept of Civil Engg, Dalhousie University,Halifax, NS- B3J 1Z1, CanadaE-mail: sskumar, Farid.Taheri, Rafiqul.Islamdal.caAbstractThe Ultrasonic is an inspection technique (UT), which employs high frequency acoustic waves to probe the sample being inspected. As the acoustic wave penetrates the sample, the wave is attenuated and /or reflected as a result of variation in the density (sound velocity) of the material. By observing and post processing the returned signal, be it the reflected signal or the signal emanating from the opposite side of the sample, one can effectively evaluate the materials characteristics such as material microstructures, as well as flaws existing in the material. This paper describes different Artificial Intelligence (AI) and Image Processing methods, which could be utilized to investigate various defects in metals as well as composites. The proposed system is highly robust and effective in situations where a large number of similar samples are to be investigated. The proposed methods utilizes Artificial Neural Networks (ANN), Fuzzy Logic and Image Analysis to recognize various types of defects in a given specimen. Image processing and wavelets techniques are used to determine the details of the damage geometry. The above system is an integral part of a robust damage analysis software under the development. An Adaptive Neuro Fuzzy Inference System is also being developed for composites, suggestive repair mechanicsm. MATLAB language is used in developing a real time automated damage assessment and evaluation prototype system.1. IntroductionUltrasonic technique 1 has been most widely applied to detect cracks, delamination, debonding and defects hidden in solids and material evaluation. Selection of proper transducers, water scan or air scan, pulse echo or through transmission, longitudinal waves or shear waves or plate waves, spike pulse or tone burst signal and reference standards are all key parameters.Appropriate Image Pre processing is a very important step to make images suitable for various purposes. It sharpens the image feature, adjusts contrast, converts RGB image to binary and so forth. In practical situations, noisy input data are inevitable. The Wavelet technique could play an important role in de-noising and compressing of images.The Artificial Neural Networks (ANN) have the capability of constructing an arbitrary nonlinear mapping from multiple input data to multiple output data within the network through learning sample input versus output relations, and estimating appropriate output data, even for unlearned inputoutput relations. Either Perceptron neural networks or Probabilistic neural networks (PNN) can be used for our classification problem 2, where one needs to classify the sample as good or defective based on the pixel values of the C-scan image. The Genetic Algorithm could be used for automatic configuration of neural networks, as well as for weight optimization.Fuzzy c-means (FCM) is a data clustering technique wherein each data point belongs to a cluster to some degree that is specified by a membership grade. FCM groups pixel data points of a C-scan image into a specific number of different clusters as “good” or “defect”.Image Analysis of a C-scan image analysis the distribution of intensities in an indexed image. A binary image histogram plot could be drawn by making 2 equally spaced bins (“good” or “defect”), each representing a range of data values. It then calculates the number of pixels within each range. The Image Viewer provides information about the size of the image, the display range of pixel values, and the value of the pixel in the location of the mouse pointer.In an attempt to mimic the expertise of a human by a computer, this paper also describes an Adaptive Neuro-Fuzzy Expert System (ANFIS) developed for composite repair mechanism, designed to mimic the human decision process. An expert system allows for easy encoding of expert knowledge as a set of rules. The “Fuzziness” of an expert system allows better treatment of the uncertainties of the problem, and simplifying the expert system itself 3.A Graphical User Interface based (GUI), Integrated Software Package is currently being developed using the MATLAB language for automated investigation of flaws in materials and for evaluation of material properties based on ultrasonic testing. This package will include various modules such as a geographic information system, database management system, risk assessment, expert system, digital image processing, medical image processing, neural networks and fuzzy logic for damage assessment to mention a few. The proposed system would be a generalized one, such that it would be capable of treating any type of images obtained by various tools such as optical scanner, MRI scan, CT scan, gyroscopic technology, SSET and other methods.2. Automated Damage Evaluation SystemThe development of the automated damage evaluation system 4 is divided into the following four steps, as schematically shown in Figure 1. Figure 1. Damage evaluation system2.1. Step 1 - C-scan image acquisitionA typical ultrasonic inspection system consists of several functional units, such as the pulser/receiver transducer, and display devices. Ultrasonic data can be collected and displayed in a number of different formats. The C-scan presentation 1 provides a plant-type view of the location and size of test specimen features. The relative signal amplitude or the time-of-flight is displayed as a shade of gray or a color for each of the positions where data was recorded. The C-scan presentation (Figure 2) provides an image of the intensity of the reflected and scattered sound within a graphite-epoxy test specimen. Figure 2. C-scan image of the sample2.2. Step 2 - Image Pre-Processingmage Pre-processing is an important step to make images suitable for various purposes. It sharpens the image feature, adjusts contrast, performs RGB to GRAY scale conversions; also, performs resizing, splitting and de-noising of images 5. De-noising is one of the most important applications of wavelets. Two-Dimensional wavelet analysis 6 is performed repeatedly on the noisy image until we are able to get satisfactory de-noised image. The Haar and sym6 wavelets can be used in succession to remove blocking and ringing effect in an image (see Figures 3 and 4). Figure 3. Noisy c-scan image Figure 4. De-noised c-scan image2.3. Step 3 Damage detection methodologiesAny of the following four methodologies could be used to determine defect in a given sample; one could also visualize the intensity of the defect. Each method has its own advantage as well as disadvantages.2.3.1. Step 3(a) - Perceptron Neural Networks Damage Assessment.Perceptron is one of the simplest single-layer networks whose weights and biases could be trained to produce a correct target vector when presented with the corresponding input vector. The training technique used is called the perceptron learning rule. The perceptron has the ability to generalize from its training vectors and learn from its initially randomly distributed connections. Perceptrons are especially suited for simple problems in pattern classification. A perceptron neuron, which uses the MATLAB is hard-limit transfer function “hardlim”, is shown in Figure 5. Within this procedure, each external input is weighted with an appropriate weight w1j, and the sum of the weighted inputs is sent to the hard-limit transfer function, which also has an input of 1 transmitted to it through the bias. The hardlimit transfer function, which returns a 0 or a 1 is shown in Figure 6.Figure 5. perceptron neuronFigure 6. Transfer functionThe perceptron neuron produces a 1, if the net input into the transfer function is equal to or greater than 0; otherwise, it produces a 0. The hard-limit transfer function gives a perceptron the ability to classify input vectors by dividing the input space into two regions. Specifically, outputs will be 0 if the net input n is less than 0, or 1 otherwise. The input space of a two-input hard limit neuron with the weights w1,1 = -1, w1,2 = 1 and a bias b =1, is shown in Figure 7. Figure 7. Input space of hard limit neuronIn reference to Figure 7, two classification regions 7 are formed by the decision boundary line L at Wp + b = 0. This line is perpendicular to the weight matrix W and is shifted according to the bias b. Input vectors above and to the left of the line L will result in a net input greater than 0; and therefore, cause the hard-limit neuron to output a 1. Input vectors below and to the right of the line L cause the neuron to output 0. The dividing line can be oriented and moved anywhere to classify the input space as desired by picking the weight and bias values. Hard-limit neurons without a bias will always have a classification line going through the origin. Adding a bias allows the neuron to solve problems where the two sets of input vectors are not located on different sides of the origin. The bias allows the decision boundary to be shifted away from the origin as shown in the above plot. The perceptron network consists of a single layer of S perceptron neurons connected to R inputs through a set of weights wi,j as shown in Figure 8 in two forms 7. As before, the network indices i and j indicate that wi,j is the strength of the connection from the jth input to the ith neuron. Figure 8. Perceptron neural network architectureIn supervised learning, the learning rule is provided with a set of examples (the training set) of proper network behavior: p1 , t1 , p2 , t2 , . , pq , tq, where pq is an input to the network, and tq is the corresponding correct (target) output. As the inputs are applied to the network, the network outputs are compared to the targets. The learning rule is then used to adjust the weights and biases of the network in order to move the network outputs closer to the targets. The perceptron learning rule falls in this supervised learning category. Perceptron neural networks can be used for our classification problem 2, where one needs to classify the sample as good or defective based on the pixel values of the C-scan image. Figure 9 shows the two-way classification of our defective test specimen. Figure 9. Perceptron neural networks damage assessment and classification2.3.2. Step 3(b) - Probabilistic Neural Networks Damage Assessment.Probabilistic neural networks (PNN) can be used for our classification problem 2 where one needs to classify the sample as good or defective based on the pixel values of the C-scan image. When an input is presented, the first layer computes distances from the input vector to the training input vectors, and produces a vector whose elements indicate how close the input is to a training input. The second layer sums these contributions, for each class of input, to produce a vector of probabilities as its net output. Finally, MATLAB is compete transfer function on the output of the second layer picks the maximum of these probabilities, and associates a 1 for that class and a 0 for the other classes. A PNN is guaranteed to converge to a Bayesian classifier, provided it is given adequate training data. These networks generalize well, but are slower to operate because they use more computation intensive than the other kinds of networks. The architecture for this system 7 is shown in Figure 10. Figure 10. Probabilistic neural network architectureThe PNN is trained and tested using the reference samples as the target. Our defective sample (Figure 2) shows a specimen with severe defect shown in blue color, mild defect is identified in green and best portion is identified by a red color. After performing the necessary pre-processing of the C-scan image of the samples, the images are fed into the PNN for damage assessment. At this juncture, the PNN is ready to detect the damage by comparing the pixel color values of the samples with the pixel values of the reference healthy speciemn, and thus performing a three-way classification as (i) severe defect, (ii) mild defect and (iii) best, based on pixel intensity values. Figure 11 shows the three-way classification of our defective sample. Figure 11. Probabilistic neural networks damage assessment2.3.3. Step 3(c) -Fuzzy C-Means Clustering Damage Assessment.Clustering of numerical data forms the basis of many classification and system modeling algorithms. The purpose of clustering is to identify natural groupings of data from a large data set to produce a concise representation of a systems behavior. It can be used to classify the sample as good or defective based on the pixel values of the C-scan image. You can use the cluster information to generate a Sugeno-type fuzzy inference system that best models the data behavior, using a minimum number of rules. The rules partition themselves according to the fuzzy qualities associated with each of the data clusters. Fuzzy c-means (FCM) is a data clustering technique 8, wherein each data point belongs to a cluster to some degree that is specified by a membership grade. It provides a method that shows how to group data points that populate some multidimensional space into a specific number of different clusters.MATLAB is command line function “fcm” starts with an initial guess for the cluster centers, intended to mark the mean location of each cluster. The initial guess for these cluster centers, however, is most likely incorrect. Additionally, the fcm assigns every data point of a cluster to a membership grade. By iteratively updating the cluster centers and the membership grades for each data point, the fcm iteratively moves the cluster centers to the right location within a data set. This iteration is based on minimizing an objective function that represents the distance from any given data point to a cluster center weighted by that data points membership grade. The fcm is a command line function whose output is a list of cluster centers and several membership grades for each data point. You can use the information returned by the fcm to help you build a fuzzy inference system by creating membership functions to represent the fuzzy qualities of each cluster. Figure 12. A typical plot based on the fuzzy c-mean clustering damage assessmentSince would not have a clear idea as to the number of the clusters that would be in a given set of data, the “subtractive clustering”, is a fast one-pass algorithm available in the MATLAB for estimating the number of clusters and the clusters centers in a set of data. The cluster estimates obtained through this function 8 could be used to initialize the iterative optimization based clustering methods (fcm) and the model identification methods (such as the anfis). The subclust function finds the clusters by using the subtractive clustering method. Fuzzy C-Means Clustering can be used for our classification problem, where one would need to classify the test sample as good or defective, based on the pixel values of the C-scan image. Figure 12 shows the two-way classification of our defective sample.2.3.4. Step 3(d) Image Analysis for Damage Assessment.In a binary image, each pixel assumes one of only two discrete values. Essentially, these two values correspond to “on” (or good), and “off” (or defective). A binary image is stored as a logical array of 0s (off pixels) and 1s (on pixels). An image histogram is a chart 9 that shows the distribution of the intensities of an indexed, binary or intensity image. The MATLAB image histogram function 5 creates this plot by making “n” equally spaced bins, each representing a range of data values. It then calculates the number of the pixels within each range. The Figures 13 (a) and (b) displays a binary image of our defective test sample is C-scan image with and without color map, and Figure 13(c) shows a histogram based on the two binaries.a) Binary image of our defective sample with color mapb) Binary image of our defective sample (c) Histogram of binary image of our sampleFigure 13. Outcome of binary image analysisUsing MATLABs image viewer and pixel region tool 5 one could obtain information about specific pixels in an image. The pixel region rectangle defines the region of the image that one would desire to examine. The pixel region tool displays a grid of cells where each cell represents a pixel in the region specified by the rectangle. Each cell contains the numeric value of the pixel. For RGB images, each cell contains three numeric values, one for each band of the image. For indexed images, the cell contains the index value and the associated RGB value. The color of the cell represents the color of the pixel. If a defect is present, one could then assess the intensity of the defect by performing pixel by pixel analysis of the Cscan image. Figure 14 shows the pixel by pixel analysis of the defective sample. Figure 14. Pixel by pixel image analysis2.4. Step 4 Neuro-Fuzzy Expert SystemThe basic structure of this type of fuzzy inference system is a model that maps the input characteristics to input membership functions, the input me

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论