• Title/Summary/Keyword: inspection machine

Search Result 603, Processing Time 0.028 seconds

Study on performance improvement of electric-point machine monitoring system (전기선로전환기 모니터링시스템의 성능 향상에 관한 연구)

  • Park, Jae-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.11
    • /
    • pp.4509-4514
    • /
    • 2010
  • In this thesis, the effect of switch maintenance improvement is confirmed after testing and operating the switch monitoring system that were researched and developed originally in order to improve method of electric switch maintenance. However, as in an automatic interlocking station where a ground crew was not placed, repair and inspection could not be carried out until the maintenance person comes in case of switch problems or maintenance. In order to improve this issue, control module was installed in a monitoring system which can communicate through a data radio to a remote computer. Thus, the monitoring device can receive control information which a remote computer commands during the operation of switches. Afterward, it shows information on the real-time status of swith, in particular, anomaly situation through user interface after the switch is operated. By improving performance of the monitoring system in this way which can be managed and controled at a remote place, the prompt countermeasure system in case of disruption will be built and as a result, efficiency and convenience of maintenance improvement will be expected to increase.

Improvement of Thunderstorm Detection Method Using GK2A/AMI, RADAR, Lightning, and Numerical Model Data

  • Yu, Ha-Yeong;Suh, Myoung-Seok;Ryu, Seoung-Oh
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.1
    • /
    • pp.41-55
    • /
    • 2021
  • To detect thunderstorms occurring in Korea, National Meteorological Satellite Center (NMSC) also introduced the rapid-development thunderstorm (RDT) algorithm developed by EUMETSAT. At NMCS, the H-RDT (HR) based on the Himawari-8 satellite and the K-RDT (KR) which combines the GK2A convection initiation output with the RDT were developed. In this study, we optimized the KR (KU) to improve the detection level of thunderstorms occurring in Korea. For this, we used all available data, such as GK2A/AMI, RADAR, lightning, and numerical model data from the recent two years (2019-2020). The machine learning of logistic regression and stepwise variable selection was used to optimize the KU algorithms. For considering the developing stages and duration time of thunderstorms, and data availability of GK2A/AMI, a total of 72 types of detection algorithms were developed. The level of detection of the KR, HR, and KU was evaluated qualitatively and quantitatively using lightning and RADAR data. Visual inspection using the lightning and RADAR data showed that all three algorithms detect thunderstorms that occurred in Korea well. However, the level of detection differs according to the lightning frequency and day/night, and the higher the frequency of lightning, the higher the detection level is. And the level of detection is generally higher at night than day. The quantitative verification of KU using lightning (RADAR) data showed that POD and FAR are 0.70 (0.34) and 0.57 (0.04), respectively. The verification results showed that the detection level of KU is slightly better than that of KR and HR.

A semi-supervised interpretable machine learning framework for sensor fault detection

  • Martakis, Panagiotis;Movsessian, Artur;Reuland, Yves;Pai, Sai G.S.;Quqa, Said;Cava, David Garcia;Tcherniak, Dmitri;Chatzi, Eleni
    • Smart Structures and Systems
    • /
    • v.29 no.1
    • /
    • pp.251-266
    • /
    • 2022
  • Structural Health Monitoring (SHM) of critical infrastructure comprises a major pillar of maintenance management, shielding public safety and economic sustainability. Although SHM is usually associated with data-driven metrics and thresholds, expert judgement is essential, especially in cases where erroneous predictions can bear casualties or substantial economic loss. Considering that visual inspections are time consuming and potentially subjective, artificial-intelligence tools may be leveraged in order to minimize the inspection effort and provide objective outcomes. In this context, timely detection of sensor malfunctioning is crucial in preventing inaccurate assessment and false alarms. The present work introduces a sensor-fault detection and interpretation framework, based on the well-established support-vector machine scheme for anomaly detection, combined with a coalitional game-theory approach. The proposed framework is implemented in two datasets, provided along the 1st International Project Competition for Structural Health Monitoring (IPC-SHM 2020), comprising acceleration and cable-load measurements from two real cable-stayed bridges. The results demonstrate good predictive performance and highlight the potential for seamless adaption of the algorithm to intrinsically different data domains. For the first time, the term "decision trajectories", originating from the field of cognitive sciences, is introduced and applied in the context of SHM. This provides an intuitive and comprehensive illustration of the impact of individual features, along with an elaboration on feature dependencies that drive individual model predictions. Overall, the proposed framework provides an easy-to-train, application-agnostic and interpretable anomaly detector, which can be integrated into the preprocessing part of various SHM and condition-monitoring applications, offering a first screening of the sensor health prior to further analysis.

A Study on Defect Prediction through Real-time Monitoring of Die-Casting Process Equipment (주조공정 설비에 대한 실시간 모니터링을 통한 불량예측에 대한 연구)

  • Chulsoon Park;Heungseob Kim
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.45 no.4
    • /
    • pp.157-166
    • /
    • 2022
  • In the case of a die-casting process, defects that are difficult to confirm by visual inspection, such as shrinkage bubbles, may occur due to an error in maintaining a vacuum state. Since these casting defects are discovered during post-processing operations such as heat treatment or finishing work, they cannot be taken in advance at the casting time, which can cause a large number of defects. In this study, we propose an approach that can predict the occurrence of casting defects by defect type using machine learning technology based on casting parameter data collected from equipment in the die casting process in real time. Die-casting parameter data can basically be collected through the casting equipment controller. In order to perform classification analysis for predicting defects by defect type, labeling of casting parameters must be performed. In this study, first, the defective data set is separated by performing the primary clustering based on the total defect rate obtained during the post-processing. Second, the secondary cluster analysis is performed using the defect rate by type for the separated defect data set, and the labeling task is performed by defect type using the cluster analysis result. Finally, a classification learning model is created by collecting the entire labeled data set, and a real-time monitoring system for defect prediction using LabView and Python was implemented. When a defect is predicted, notification is performed so that the operator can cope with it, such as displaying on the monitoring screen and alarm notification.

Development and Performance Evaluation of Real-Time Wear Measurement System of TBM Disc Cutter (TBM 디스크 커터 실시간 마모계측 시스템 개발 및 성능검증)

  • Min-Seok Ju;Min-Sung Park;Jung-Joo Kim;Seung Woo Song;Seung Chul Do;Hoyoung Jeong
    • Tunnel and Underground Space
    • /
    • v.34 no.2
    • /
    • pp.154-168
    • /
    • 2024
  • The Tunnel Boring Machine (TBM) disc cutter is subjected to wear and damage during the rock excavation process, and the worn disc cutter should be replaced on time. The manual inspection by workers is generally required to determine the disc cutter replacement. In this case, the workers are exposed to dangerous environments, and the measurements are sometimes inaccurate. In this study, we developed a technology that measures the disc cutter wear in real time. From a series of laboratory tests, a magnetic sensor was selected as the wear sensor, and the real-time disc cutter measurement system was developed integrating wireless communication modules, power supply and data processing board. In addition, the measurement system was verified in actual TBM excavation circumstances. As a result, it was confirmed that the accuracy and stability of the system.

The Development of Image Processing System Using Area Camera for Feeding Lumber (영역카메라를 이용한 이송중인 제재목의 화상처리시스템 개발)

  • Kim, Byung Nam;Lee, Hyoung Woo;Kim, Kwang Mo
    • Journal of the Korean Wood Science and Technology
    • /
    • v.37 no.1
    • /
    • pp.37-47
    • /
    • 2009
  • For the inspection of wood, machine vision is the most common automated inspection method used at present. It is required to sort wood products by grade and to locate surface defects prior to cut-up. Many different sensing methods have been applied to inspection of wood including optical, ultrasonic, X-ray sensing in the wood industry. Nowadays the scanning system mainly employs CCD line-scan camera to meet the needs of accurate detection of lumber defects and real-time image processing. But this system needs exact feeding system and low deviation of lumber thickness. In this study low cost CCD area sensor was used for the development of image processing system for lumber being fed. When domestic red pine being fed on the conveyer belt, lumber images of irregular term of captured area were acquired because belt conveyor slipped between belt and roller. To overcome incorrect image merging by the unstable feeding speed of belt conveyor, it was applied template matching algorithm which was a measure of the similarity between the pattern of current image and the next one. Feeding the lumber over 13.8 m/min, general area sensor generates unreadable image pattern by the motion blur. The red channel of RGB filter showed a good performance for removing background of the green conveyor belt from merged image. Threshold value reduction method that was a image-based thresholding algorithm performed well for knot detection.

Study on Anomaly Detection Method of Improper Foods using Import Food Big data (수입식품 빅데이터를 이용한 부적합식품 탐지 시스템에 관한 연구)

  • Cho, Sanggoo;Choi, Gyunghyun
    • The Journal of Bigdata
    • /
    • v.3 no.2
    • /
    • pp.19-33
    • /
    • 2018
  • Owing to the increase of FTA, food trade, and versatile preferences of consumers, food import has increased at tremendous rate every year. While the inspection check of imported food accounts for about 20% of the total food import, the budget and manpower necessary for the government's import inspection control is reaching its limit. The sudden import food accidents can cause enormous social and economic losses. Therefore, predictive system to forecast the compliance of food import with its preemptive measures will greatly improve the efficiency and effectiveness of import safety control management. There has already been a huge data accumulated from the past. The processed foods account for 75% of the total food import in the import food sector. The analysis of big data and the application of analytical techniques are also used to extract meaningful information from a large amount of data. Unfortunately, not many studies have been done regarding analyzing the import food and its implication with understanding the big data of food import. In this context, this study applied a variety of classification algorithms in the field of machine learning and suggested a data preprocessing method through the generation of new derivative variables to improve the accuracy of the model. In addition, the present study compared the performance of the predictive classification algorithms with the general base classifier. The Gaussian Naïve Bayes prediction model among various base classifiers showed the best performance to detect and predict the nonconformity of imported food. In the future, it is expected that the application of the abnormality detection model using the Gaussian Naïve Bayes. The predictive model will reduce the burdens of the inspection of import food and increase the non-conformity rate, which will have a great effect on the efficiency of the food import safety control and the speed of import customs clearance.

KMTNet Supernova Project : Pipeline and Alerting System Development

  • Lee, Jae-Joon;Moon, Dae-Sik;Kim, Sang Chul;Pak, Mina
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.40 no.1
    • /
    • pp.56.2-56.2
    • /
    • 2015
  • The KMTNet Supernovae Project utilizes the large $2^{\circ}{\times}2^{\circ}$ field of view of the three KMTNet telescopes to search and monitor supernovae, especially early ones, and other optical transients. A key component of the project is to build a data pipeline with a descent latency and an early alerting system that can handle the large volume of the data in an efficient and a prompt way, while minimizing false alarms, which casts a significant challenge to the software development. Here we present the current status of their development. The pipeline utilizes a difference image analysis technique to discover candidate transient sources after making correction of image distortion. In the early phase of the program, final selection of transient sources from candidates will mainly rely on multi-filter, multi-epoch and multi-site screening as well as human inspection, and an interactive web-based system is being developed for this purpose. Eventually, machine learning algorithms, based on the training set collected in the early phase, will be used to select true transient sources from candidates.

  • PDF

Institutional Improvement of Construction-Related Laws for Practical Application of 3D Printing (3D 프린팅 실무 적용을 위한 건설 관련법 제도적 개선 방향)

  • Lee, Sung-Min;Park, Sang-Hoon
    • Journal of Korean Association for Spatial Structures
    • /
    • v.19 no.4
    • /
    • pp.85-94
    • /
    • 2019
  • Then 3D printing is used practically at construction sites, there is a serious lack of studies on the conflict with construction-related laws and expected operational problems. Accordingly, the purpose of this study is to present obstacles and directions for improvement in construction-related laws (Building Act, Construction Technology Promotion Act, Housing Act, Construction Machinery Management Act, etc.) for practical operation of 3D printing. The important results are as follows. Amending existing construction-related laws for 3D printing is irrational and inefficient in terms of structure and material. This study proposed a method of satisfying performance required by laws or standards based on the performance design method presented in existing laws and systems through structure and material performance certification procedure. In addition, inclusion of 3D printing equipment in the Construction Machinery Management Act results in various restrictions such as equipment inspection and certification of machine parts. As such restrictions can block vitalization of 3D printing, a long-term and step-wise approach was suggested.

A Designing Method of Digital Forensic Snort Application Model (Snort 침입탐지 구조를 활용한 디지털 Forensic 응용모델 설계방법)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.1-9
    • /
    • 2010
  • Snort is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and approximately 300,000 registered users. Snort identifies network indicators by inspecting network packets in transmission. A process on a host's machine usually generates these network indicators. This means whatever the snort signature matches the packet, that same signature must be in memory for some period (possibly micro seconds) of time. Finally, investigate some security issues that you should consider when running a Snort system. Paper coverage includes: How an IDS Works, Where Snort fits, Snort system requirements, Exploring Snort's features, Using Snort on your network, Snort and your network architecture, security considerations with snort under digital forensic windows environment.