2016
DOI: 10.1016/j.jmapro.2016.03.009
|View full text |Cite
|
Sign up to set email alerts
|

Classification and identification of surface defects in friction stir welding: An image processing approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 93 publications
(25 citation statements)
references
References 21 publications
0
24
0
1
Order By: Relevance
“…Ranjan et al 2016 [12] have studied for defect-free weld and mainly focused on surface defects during the FSW process. They have used digital image processing techniques to identify suraface defect using image pyramid and image reconstruction algorithms.…”
Section: Surface Defectsmentioning
confidence: 99%
“…Ranjan et al 2016 [12] have studied for defect-free weld and mainly focused on surface defects during the FSW process. They have used digital image processing techniques to identify suraface defect using image pyramid and image reconstruction algorithms.…”
Section: Surface Defectsmentioning
confidence: 99%
“…Welds with a pitch of over 0.8 tend to have internal defects such as worm-holes, voids, and incomplete welds. More detail on defect classification and detections is available from [49][50][51][52][53]. Inspection of the response surface suggests that the optimal process parameters that will minimize the defects will be located at the apex of the surface.…”
Section: Optimal Process Parametersmentioning
confidence: 99%
“…Moreover, with an inconsistent concentration of the micro-size particle in relatively high tag area (in a few square centimetres), numerous tags can be printed with a very low probability of reproducing the same particle positioning again. The particle distribution on the secured tag is located using image-processing tools that are frequently used in surface classification and identification technologies (one such example can be found in [46]). Further, two distinct features (strong particle clusters and empty areas location, further explained in the 'Methodology' section) were extracted using particle locations and encoded to form the secure code.…”
Section: Designmentioning
confidence: 99%