An end-to-end computer vision methodology for quantitative metallography

被引:5
|
作者
Rusanovsky, Matan [1 ,2 ]
Beeri, Ofer [3 ]
Oren, Gal [1 ,4 ]
机构
[1] Nucl Res Ctr Negev, Sci Comp Ctr, Beer Sheva, Israel
[2] Nucl Res Ctr Negev, Dept Phys, Beer Sheva, Israel
[3] Nucl Res Ctr Negev, Dept Mat, Beer Sheva, Israel
[4] Technion Israel Inst Technol, Dept Comp Sci, Haifa, Israel
关键词
GRAIN-SIZE DETERMINATION; HALL-PETCH BEHAVIOR; MECHANICAL-PROPERTIES; ELECTRICAL-RESISTIVITY; NEURAL-NETWORKS; LANDING GEAR; MICROSTRUCTURE; STEEL; PARTICLES; IMPACT;
D O I
10.1038/s41598-022-08651-w
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Metallography is crucial for a proper assessment of material properties. It mainly involves investigating the spatial distribution of grains and the occurrence and characteristics of inclusions or precipitates. This work presents a holistic few-shot artificial intelligence model for Quantitative Metallography, including Anomaly Detection, that automatically quantifies the degree of the anomaly of impurities in alloys. We suggest the following examination process: (1) deep semantic segmentation is performed on the inclusions (based on a suitable metallographic dataset of alloys and corresponding tags of inclusions), producing inclusions masks that are saved into a separated dataset. (2) Deep image inpainting is performed to fill the removed inclusions parts, resulting in 'clean' metallographic images, which contain the background of grains. (3) Grains' boundaries are marked using deep semantic segmentation (based on another metallographic dataset of alloys), producing boundaries that are ready for further inspection on the distribution of grains' size. (4) Deep anomaly detection and pattern recognition is performed on the inclusions masks to determine spatial, shape, and area anomaly detection of the inclusions. Finally, the end-to-end model recommends an expert on areas of interest for further examination. The physical result can re-tune the model according to the specific material at hand. Although the techniques presented here were developed for metallography analysis, most of them can be generalized to a broader set of microscopy problems that require automation. All sourcecodes as well as the datasets that were created for this work, are publicly available at https://github.com/Scientific-Computing-Lab-NRCN/MLography.
引用
收藏
页数:27
相关论文
共 50 条
  • [21] Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers
    Cojocar, Lucian
    Kim, Jeremie
    Patel, Minesh
    Tsai, Lillian
    Saroiu, Stefan
    Wolman, Alec
    Mutlu, Onur
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 712 - 728
  • [22] TASSA Methodology: End-to-End Testing of Web Service Compositions
    Manova, Denits A.
    Petrova-Antonova, Dessislava
    Ilieva, Sylvia
    2018 11TH INTERNATIONAL CONFERENCE ON THE QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY (QUATIC), 2018, : 264 - 267
  • [23] A Benchmark Methodology For End-to-End Delay of Reactive Mobile Networks
    Laner, Markus
    Svoboda, Philipp
    Rupp, Markus
    2013 IFIP WIRELESS DAYS (WD), 2013,
  • [24] End-to-End Approach for Autonomous Driving: A Supervised Learning Method Using Computer Vision Algorithms for Dataset Creation
    Ribeiro, Ines A.
    Ribeiro, Tiago
    Lopes, Gil
    Ribeiro, A. Fernando
    ALGORITHMS, 2023, 16 (09)
  • [25] The end of end-to-end?
    Garfinkel, S
    TECHNOLOGY REVIEW, 2003, 106 (06) : 30 - 30
  • [26] End-to-end consensus using end-to-end channels
    Wiesmann, Matthias
    Defago, Xavier
    12TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2006, : 341 - +
  • [27] Enhancement of end-to-end communication dependability of mobile computer network
    Shen, Qingguo
    Cheng, Shixin
    Jisuanji Xuebao/Chinese Journal of Computers, 21 (07): : 663 - 668
  • [28] END-TO-END PROBABILITY OF UNDETECTED ERROR IN COMPUTER NETWORKS.
    Lai, Wai Sum
    IEEE Transactions on Communications, 1986, COM-34 (03): : 291 - 293
  • [30] End-to-End Adversarial Learning for Intrusion Detection in Computer Networks
    Mohammadi, Bahram
    Sabokrou, Mohammad
    PROCEEDINGS OF THE IEEE LCN: 2019 44TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2019), 2019, : 270 - 273