Fuzzy Welding Flaw Detection

download Fuzzy Welding Flaw Detection

of 14

Transcript of Fuzzy Welding Flaw Detection

  • 8/2/2019 Fuzzy Welding Flaw Detection

    1/14

    Fuzzy Sets and Systems 108 (1999) 145}158

    Detection of welding #aws from radiographic images

    with fuzzy clustering methods

    T.W. Liao,* D.-M. Li, Y.-M. Li

    Industrial and Manufacturing Systems Engineering Department, Louisiana State University, Baton Rouge, LA 70803, USA

    Computer Science Department, Louisiana State University, Baton Rouge, LA 70803, USA

    Received December 1996; received in revised form May 1997

    Abstract

    Manual interpretation of radiographic weld images is subjective, inconsistent, labor intensive, and sometimes biased.

    This paper presents a welding #aw detection methodology based on fuzzy clustering methods. The methodology

    processes each weld image line by line. For each line, 25 features are selected. The performance of two fuzzy clustering

    methods, i.e. fuzzy k nearest neighbors (K-NN) and fuzzy c-means, are studied and compared. It is found that the fuzzy

    K-NN classi"er outperforms the fuzzy c-means classi"er with the best results of 6.01% missing rate and 18.68% false

    alarm rate. Issues related to the selection of features and training examples are also discussed. 1999 Elsevier Science

    B.V. All rights reserved.

    Keywords: Welding #aw; Radiographic NDT technique; Feature extraction; Fuzzy clustering

    1. Introduction

    Welding is one of the major joining processes.

    Poor weld quality could be caused by inadequate

    or careless application of established welding tech-

    nologies or substandard operator training. Major

    welding #aws include porosity, slag inclusions, lack

    of fusion, lack of penetration, cracks, under"tting,

    undercutting, residual stresses, etc. Most of these

    #aws are subsurface and have to be tested nondes-

    tructively. Nondestructive testing (NDT) tech-

    niques for welded joints usually consist of visual,

    * Corresponding author. Tel.: #1-504-388-5365; fax: #1-

    504-388-5990; e-mail: [email protected].

    radiographic, magnetic particle, liquid penetrant,

    and ultrasonic testing methods [7]. NDT testing is

    particularly important for critical applications

    where weld failure can be catastrophic, such as in

    pressure vessels, load-bearing structural members,

    and power plants. Radiography and ultrasonic

    testing are two most principal NDT methods to

    examine welds for subsurface #aws. Radiography is

    particularly e!ective in detecting volumetric defects

    which contain either extra mass or missing mass.

    This study focuses on the radiographic technique.

    Conventionally, a radiographic weld image is

    produced by permitting X-ray or gamma-ray

    source to penetrate the welded component andexpose a photographic "lm, which is then inspected

    by a certi"ed inspector using a view box. This

    0165-0114/99/$ } see front matter 1999 Elsevier Science B.V. All rights reserved.

    PII: S 0 1 6 5 - 0 1 1 4 ( 9 7 ) 0 0 3 0 7 - 2

  • 8/2/2019 Fuzzy Welding Flaw Detection

    2/14

    manual interpretation process is subjective, incon-

    sistent, labor intensive, and sometimes biased.

    Therefore, a few attempts have been made to devel-

    op algorithms for identifying anomalies in welds.

    Some of these works are reviewed below. Daumet al. [4] used a segmentation algorithm to detect

    the defects, after subtracting a background imagefrom the original radiograph. The background

    image was derived by a spline approximation.

    A similar approach was adopted by Eckelt et al.

    [6], except that they obtained the background

    image by using various low-pass "lters. Gayer

    et al. [8] developed a two-step method for the

    automatic inspection of welding defects from real-

    time radiography. The "rst step is a fast search for

    defective regions achieved by two di!erent algo-

    rithms based on the relative irregular behavior of

    a defect. The second step is the "ne identi"cation

    and location of defects achieved by a sequential

    similarity detection algorithm or a thresholding

    algorithm. The advanced Quality Technology

    Group of Lockheed Martin Manned Space Sys-

    tems has been interested in the computer-aided

    interpretation of the Space Shuttle External Tank

    welds. In one research project utilizing the Geomet-

    ric Arithmetic Parallel Processor (GAPP), an over-all detection performance of 66.5% for #aws

    ranging from 0.01 to '2.5 was reported. Thedetection method was a weak gradient detection

    algorithm followed by a weld detector [3]. Liao

    and Li [12] developed a welding #aw detection

    methodology that processes each weld image line

    by line. Each line pro"le is "tted before processed.

    The methodology consists of four parts: prepro-

    cessing, curve "tting, pro"le-anomaly detection,

    and postprocessing.

    This paper presents a welding #aw detection

    methodology based on fuzzy clustering methods.

    The test results of fuzzy K-NN and fuzzy c-means

    algorithms are compared. The weld images must be

    in digital form to be processed by the computer.

    This can be achieved either by using a real-time

    radiography system directly or by digitizing "lms

    using a high resolution digitizer. The later ap-

    proach is taken in this study. But the same method

    can be applied to data taken directly from a real-time radiography system. Rather than directly

    processing the raw data, features with discrimina-

    tion power are extracted upon which the classi"er

    bases its determination of the class of the observed

    object.

    The remainder of this paper is organized as fol-

    lows. In the next section, image acquisition proced-ure is detailed. Section 3 describes the methodology

    including extraction of features, the fuzzy K-NNalgorithm, the fuzzy c-means algorithm, and the

    post processing procedure. The test results are pre-

    sented in Section 4, followed by discussion. The

    conclusions are given in the last section.

    2. Image acquisition

    X-ray "lm strips of about 3.5 in wide by 17 in

    long were digitized four at a time using the NDT

    SCAN II digitizer [9]. Four strips were laid on the

    digitizer with the scan direction orthogonal to the

    long axis of the strips. The strips were digitized at

    70 m resolutions (about 7 lp/mm) to produce a5000-pixel by 6000-line image, which is eventually

    processed to "nd anomalies in the welds. Along

    with each 5000-pixel by 6000-line image, a deci-

    mated image of 20 times smaller (250-pixel by 300-

    line) was also produced. Each pixel has 12 bits. Thedigitized images were all stored in the VICOM "le

    format. Every image contains reference objects toidentify positions in the welds or to calibrate the

    X-ray. These objects include rulers, penatrometers,

    densitometers, identi"cation letters, space between

    weld strips, etc. Only the items within the weld are

    of interest.

    Twenty-"ve probability-of-detection (POD)

    tapes, originally prepared for the project conducted

    by Lockheed Martin Electronics, Information

    and Missile Group for Lockheed Martin Manned

    Space Systems, are used in this study. Each POD

    tape consists of a full-size image and a decimated

    image. The POD test was designed to produce

    the data from which a probability-of-detection

    curve as a function of the object's size can be

    produced. It is intended to give a measure of the

    con"dence that objects of a particular size could

    be found.

    Prior to welding #aw detection, the 250-pixelby 300-line decimated image is "rst processed by

    a weld extraction methodology [13] to "nd the

    146 T.W. Liao et al. / Fuzzy Sets and Systems 108 (1999) 145}158

  • 8/2/2019 Fuzzy Welding Flaw Detection

    3/14

    locations of welds. Processing the decimated image

    reduces the amount of data needed to be processed,

    thus shorten the processing time. Based on the

    location information, the welds are then extracted

    from the full size image and used for welding #awdetection.

    3. Welding 6aw detection methodology

    3.1. Feature extraction

    Rather than directly using the raw data, some

    measures or descriptors are often selected uponwhich the classi"er bases its determination of the

    classes of the observed objects. These measures,

    commonly called features, form the feature spacethat is generally of a much lower dimension

    than the data space. The process of searching for

    internal structure in data items, that is, for fea-

    tures or properties of the data is called feature

    extraction. Extraction of desirable features is an

    extremely di$cult task and very much problem

    dependent.

    In this study, a trial-and-error procedure was

    used to extract a total of 25 features from each

    line image (or pro"le) of the weld image. Both

    the original pro"le and its "tted pro"le, obtainedusing the cubic B-spline approach, are used to

    extract these features. The e!ectiveness of these

    features are illustrated by comparing a good pro"le

    with a bad pro"le, as shown in Fig. 1. Fig. 2 plots

    the normalized values of selected features for

    both pro"les. Before describing the extracted fea-tures, the curve "tting procedure is "rst explained

    below.

    3.1.1. Curve xtting

    The spline curve "tting algorithm introduced in

    [5] serves as the noise reduction technique to

    smooth the image. The smoothness of the "tted

    curve can be controlled by changing the smoothing

    factor. In this study, the smoothing factor is dy-

    namically adjusted based on the &&roughness'' of the

    test pro"le. Therefore, the implemented curve "t-ting algorithm can be deemed as an adaptive noise

    reduction technique.

    Fig. 1. Sample &&good'' and &&bad'' pro"les.

    The spline curve "tting technique is brie#y de-

    scribed below. Given a set of data points (xP, y

    P),

    r"1, 2,2 ,m, with a)xP(x

    P>)b and a cor-

    responding set of weights wP, the technique can be

    applied to determine a spline s (x) o n [a, b], of

    a speci"ed degree k with knots a"

    ,

    ,2 , E ,E>"b such that s (x) satis"es the following

    constraints of the smoothness of "tting and the

    T.W. Liao et al. / Fuzzy Sets and Systems 108 (1999) 145}158 147

  • 8/2/2019 Fuzzy Welding Flaw Detection

    4/14

    Fig. 2. Plot of normalized feature values of the pro"les shown in

    Fig. 1.

    tightness of"tting :

    "EG

    (sI (G#)!sI(

    G!)), (1)

    "KP

    (wP

    (yP!s (x

    P))))S, (2)

    where g is the number of knots; sI (x) is the kth

    derivative of the s(x); S is the smoothing factor

    which determines the extent of smoothing.

    The spline function s(x) constructed as linearly

    independent B-splines of degree k has the following

    expression:

    s(x)"E

    G\I

    cGN

    GI>(x), (3)

    NGI>

    (x)"(G>I>!

    G)I>H

    (G>H!x)I

    >I>l"0, lOj (G>H!

    G>J

    ),

    (4)

    (G>H!x)I

    >"

    (G>H!x)I,

    0,

    x)G>H

    ,

    x'G>H

    ,(5)

    where cG

    is the B-spline coe$cient of s (x); k is the

    degree of the spline function; and G

    are the knots.

    To impose that all B-splines vanish outside of the

    interval [a, b], it is chosen that

    \I"

    \I>"2"

    "

    "a,

    (6)

    b"E>"E>"2"E>I"E>I> .

    The constraints a!ects the spline s (x) in the fol-

    lowing way. If S is large, the residuals, yP!s(x

    P),

    may be large. But s(x) can be expected to be

    smooth. On the other hand, if S is small, the spline

    will "t the data closely as required by small resid-uals at the cost of smoothness. An appropriately

    chosen S allows a good compromise between the

    closeness of "t and the smoothness. The values of

    S depend on the weights wP. S is recommended to

    be in the range ofm$'2m if the weights are takenas 1/y

    Pwith y

    Pan estimate of the standard devi-

    ation ofyP

    . If nothing is known about the statistical

    error in yP, each w

    Pcan be set equal to one and S is

    determined by trial and error. In this research, the

    later approach is taken.

    It is a challenge to "nd a single smoothing factorS that works for all weld images, which are known

    to have widely di!erent intensity levels and widths.

    Therefore, it is desirable to have a smoothing factor

    adaptive to each weld image to be tested. Accord-ingly, the concept of &&roughness'' is introduced

    to indicate the noisiness of the original pro"le.

    The &&roughness'' denoted by R is calculated as

    follows:

    R"N

    G

    (IG!I

    G), (7)

    where N

    is the total number of#uctuation cycles

    in the pro"le; IG

    is the peak graylevel of the ith

    #uctuation cycle; and IG

    is the trough graylevel of

    the ith #uctuation cycle. Each pair of peak and

    trough constitutes a #uctuation cycle. One hundred

    line pro"les were selected. For each pro"le, theR value was calculated and the appropriate S value

    was found by trial and error. The speci"c smooth-

    ing factor, de"ned as smoothing factor over width

    =, is found to be a linear function of R. That is,S/="177#3.54R.

    Note that the #uctuation cycles caused by

    welding #aws should be excluded in calculating R.

    148 T.W. Liao et al. / Fuzzy Sets and Systems 108 (1999) 145}158

  • 8/2/2019 Fuzzy Welding Flaw Detection

    5/14

    Generally, the magnitude of the #uctuation cycle

    (IG!I

    G) caused by a #aw is considerably larger

    than those caused by noises within a particular

    pro"le. A recursive procedure is applied to detect

    such outstanding values until the remaining valuesare closely clustered.

    The FITPACK package, which is available [email protected], was used for curve "tting in this

    study.

    3.1.2. Features reyecting the symmetricity

    ofxtted proxle

    It is observed that the "tted pro"le generally is

    symmetrical if there exists no defects in the line

    image. The B-spline coe$cients cG

    are used to com-pute the symmetricity. If we have n coe$cients c

    Gin

    one "tted pro"le which has no defects, the coe$c-ient c

    will equal or almost equal to c

    Land c

    will

    equal or almost equal to cL\

    , and so on. Therefore,

    the sum of di!erence between these corresponding

    terms re#ects the degree of symmetricity (DOS) of

    the "tted pro"le. In the case that n is an odd

    number, the middle value cL>

    is ignored. DOS

    is selected as the "rst feature for welding #aw detec-

    tion. A good pro"le tends to have a smaller DOS

    value than a bad pro"le, as shown in Fig. 2 (0.41 vs.

    0.72 shown as feature number 0).

    Since a #aw usually covers more than one lines,

    a pro"le defect is usually preceded and/or followed

    by a similar pro"le anomaly. For each line image

    to be tested, the preceding and subsequent two

    lines are also considered to "nd the median DOS

    as the second feature, designated as M}DOS. This

    feature tells that if one line is &&bad'' but its sev-

    eral neighbor lines are &&good'', then this line isprobably a noise. This feature is used to prevent

    identifying a noise as a defect to decrease the false

    alarm rate.

    3.1.3. Goodness of proxle xtting

    As shown in Fig. 1, a good pro"le is generally

    &&smooth'' and its "tted pro"le tends to deviate from

    the original pro"le uniformly. On the other hand,

    a bad pro"le is always distorted in some form and

    its "tted pro"le tends to have a large di!erence withthe original pro"le at the #aw boundary. Based on

    this observation, the di!erence of the correspond-

    ing point between the original pro"le and its "tted

    pro"le is calculated. The range between the max-

    imum di!erence and the minimum di!erence

    divided by the average di!erence is used as the

    feature to re#ect the goodness of "tting (GOF).GOF is selected as the third feature for welding

    #aw detection.Based on the same argument used to derive the

    second feature, the fourth feature is derived from

    GOF and denoted as M}GOF.

    3.1.4. Correlation between the template proxles and

    the test proxle

    Five representative good pro"les (original not

    "tted) are selected as the template pro"les, as

    shown in Fig. 3. Note that some of them look bad.

    The following equation is used to calculate thecorrelation between the test pro"le and each of

    these "ve template pro"les:

    Corr(t, I)" tG*

    IG/( t

    G *I

    G, (8)

    where tG

    and IG

    are the intensity of the ith pixel for

    the template pro"le and the test pro"le, respective-ly. The largest of these "ve values is selected as the

    "fth feature. A high correlation is expected if the

    test pro"le is a good one. For the good and bad

    pro"les in Fig. 1, the values are 0.996 and 0.990,respectively. The di!erence between these two

    values is negligible. This indicates that this feature

    alone cannot tell a good pro"le from a bad one.

    This feature is kept because it reduces the overall

    false alarm rate, as shown in Table 1 (25-feature vs.

    24-feature).

    Note that the test pro"le must be registered with

    the template pro"le before calculation. The peak

    intensity location is used to achieve that. If the test

    pro"le has a di!erent width with the template pro-"le, the smaller width is used.

    3.1.5. Zoning features

    Zoning features are extracted from "tted pro"les.

    Each "tted pro"le to be tested is evenly divided into

    four zones with each zone has one quarter of pro"le

    width. Five primitives are de"ned as shown inFig. 4 with primitives a, b, c, d, and e covering

    0$22.53, 45$22.53, [67.53, 903], [!67.53,

    T.W. Liao et al. / Fuzzy Sets and Systems 108 (1999) 145}158 149

  • 8/2/2019 Fuzzy Welding Flaw Detection

    6/14

    Fig. 3. Five template pro"les used to calculate correlation.

    !903], and !45$22.53, respectively. Tracing

    the pro"le from left to right pixel by pixel, thenumber of each primitive in each zone is sum-

    marized. To account for varying width, the speci"c

    number of each primitive is actually used, which is

    computed as the total number of that primitivedivided by the zone width. If only primitive b exist

    in zones 1 and 2, it is safe to say that no defects exist

    150 T.W. Liao et al. / Fuzzy Sets and Systems 108 (1999) 145}158

  • 8/2/2019 Fuzzy Welding Flaw Detection

    7/14

    Table 1

    The results of feature selection

    Number of features 4 20 21 24 25

    False alarm rate % 32.90 27.49 49.00 23.11 22.99

    Missing rate % 31.30 13.14 19.00 10.70 10.70

    Total successful rate % 67.30 74.58 51.50 78.69 78.78

    Fig. 4. Five primitives used to derive zoning features.

    in these zones. In other words, it is highly possible

    that there is defect of some sort in the line image if

    primitives a, d, or e exist in zones 1 and 2. Similarly,

    if only primitives d and e show up in zones 3

    and 4, we can say that no defects exist in this

    section. Otherwise, there is an indication of

    defect.

    To take the information of neighboring pro"les

    into account, three pro"les (one to be tested, one

    preceding it, and one following it) are processed at

    one time and the average values is used as the

    features for the test pro"le. Each test pro"le has

    four zones and the number of each "ve primitives is

    calculated for each zone. Therefore, we have 20

    features with the "rst "ve corresponding to the "ve

    primitives in zone 1, the next "ve corresponding tothe "ve primitives in zone 2, and so on. Fig. 2 shows

    that primitives d and e exist in the second zone (the

    14th and 15th features) of the bad pro"le shown in

    Fig. 1, indicating the #aw.

    3.2. Fuzzy k-NN algorithm

    Bezdek suggested that interesting and useful al-

    gorithms could result from the allocation of fuzzyclass membership to the input vector thus a!ording

    fuzzy decisions based on fuzzy labels [16]. The

    fuzzy K-NN algorithm [10] is one such algorithms

    been developed utilizing fuzzy class memberships of

    the sample sets and thus producing a fuzzy classi-

    "cation rule.

    Under the condition that the value di!erence

    among the feature data is not too big, the fuzzy

    K-NN algorithm requires no preprocessing of the

    labeled sample set prior to use. The algorithm as-

    signs class membership to a sample vector rather

    than assigning the vector to a particular class. The

    advantage is that no arbitrary assignments are

    made by the algorithm. But, if the value di!erence

    among the features is large enough, we should

    normalize the data prior to use to get a much better

    result.

    Given a set of sample vectors, +x1 , x2 ,2 ,xn,a fuzzy c partition of these vectors speci"es thedegree of membership of each vector in each of

    c classes. It is denoted by the c by n matrix U, whereuGH"u

    G(x

    H) is the degree of membership ofxj in class

    i, for i"1, 2,2 , c, and j"1, 2,2 , n. The follow-

    ing properties must be true for U to be a fuzzyc partition.

    AG

    uGH"1, (9)

    0(LH

    uGH(n, (10)

    uGH3[0, 1]. (11)

    The basis of the algorithm is to assign member-

    ship as a function of the vector's distance from itsK nearest neighbors and those neighbors' member-

    ships in the possible classes. Let ="+x1 ,x2 ,2 ,xn, be the set of n labeled samples, also letuGH

    , or uG(xj), be the membership in the ith class of

    the jth vector of the labeled sample set. The algo-

    rithm is as follows [11]:

    T.W. Liao et al. / Fuzzy Sets and Systems 108 (1999) 145}158 151

  • 8/2/2019 Fuzzy Welding Flaw Detection

    8/14

    BEGIN

    Input x, of unknown classi"cation.

    Set K, 1)K)n.

    Initialize i"1.

    DO UNTIL (K nearest neighbors to x found)Compute distance from x to xi .

    IF (i)K) THENInclude xi in the set of K nearest neighbors

    ELSE IF (xi closer to x than any previous nearest neighbor)

    THEN Delete the farthest of the K nearest neighbors,

    Include xi in the set of K nearest neighbors.

    END IF

    END DO UNTIL

    Initialize i"1.

    DO UNTIL (xassigned memberships in all classes)

    Compute uG(x) using Eq. (12).

    Increment i.

    END DO UNTIL

    END

    Here, the assigned memberships are given as fol-

    lows:

    uG(x)"

    )H

    uGH

    (1/#x!xH#K\)

    )H

    (1/#x!xH#K\)

    . (12)

    According to Eq. (12), the assigned memberships

    of x are in#uenced by the inverse of the distances

    from the nearest neighbors and their class member-ships uGH

    . The variable m determines how heavily

    the distance is weighted when calculating each

    neighbor's contribution to the membership value. Ifm"2, then the contribution of each neighboring

    point is weighted by the reciprocal of its distance

    from the point being classi"ed. As m increases, the

    neighbors are more evenly weighted, and their rela-

    tive distance from the point being classi"ed have

    less e!ect. As m approaches one, the closer neigh-

    bors are weighted far more heavily than those

    farther away. The commonly used m is 2. #*#denotes the Euclidean distance.

    The membership assignment to the ith class for

    the labeled data xj (say in class j ) is computed

    according to the following equation:

    uGH"

    0.51#(nG/K) ) 0.49

    (nG/K) ) 0.49

    if i"j,

    if iOj .(13)

    The value nG

    is the number of the neighbors

    found which belong to the ith class. This method

    attempts to fuzzify the memberships of the labeled

    samples, which are in the intersecting class regions

    of the sample space, and leaves the samples that are

    well away from this area with complete member-

    ship in the known class. As a result, an unknown

    sample lying in this intersecting region will be in-

    #uenced to a less extent by the labeled samples that

    are in the fuzzy area of the class boundary. Obvi-

    ously, the memberships calculated by Eq. (13)

    satisfy Eqs. (9)}(11).

    3.3. Fuzzy c-means algorithm

    Fuzzy c-means algorithm, also called fuzzy

    ISODATA, was "rst presented by Bezdek [2]. It is

    considered that all samples in the universe belong

    to a certain class but all with a di!erent member-

    ship.

    The purpose of clustering is to determine the

    cluster centers which are the representative values

    of features corresponding to the classi"ed catego-

    ries. Let X"+x1 , x2 ,2 ,xp,3RQ , x"(x

    , x

    ,

    2 , xQ) be a feature vector, and x

    GHis the jth feature

    of individual xi . For each integer c, 2)c(n, letVAL

    be the vector space of real (c;n) matrices and letuGH

    denote the ijth element of any U3VAL

    . The res-ultant function u

    G: XP[0, 1] becomes a member-

    ship function, and uG

    is called a fuzzy subset or fuzzy

    152 T.W. Liao et al. / Fuzzy Sets and Systems 108 (1999) 145}158

  • 8/2/2019 Fuzzy Welding Flaw Detection

    9/14

    cluster in X. Here uGH"u

    G(xj ) is called the grade of

    membership ofxj in the fuzzy set uG. In the space of

    samples, assuming that there are n samples which

    can be divided into c classes. Consider the following

    subset ofVcn :

    Mfc"+U3Vcn "uGH3[0, 1] i , j,. (14)

    Each U3MDA

    is called a fuzzy c-partition of X;M

    DAis the fuzzy c-partition space associated with X.

    For any real number m3 (1,R), de"ne the real

    value function JK

    :Mfc;LcPR by

    JK

    (;,

  • 8/2/2019 Fuzzy Welding Flaw Detection

    10/14

    Fig. 5. Histograms of the distance values between (a) positive and (b) negative examples and their means.

    154 T.W. Liao et al. / Fuzzy Sets and Systems 108 (1999) 145}158

  • 8/2/2019 Fuzzy Welding Flaw Detection

    11/14

    frequency is selected. Accordingly, 75 pairs of

    examples with 75 each in the &&good'' and &&bad''

    classes are selected initially as the training data.

    The e!ectiveness of"ve di!erent sets of features

    are studied. The "rst set consists of four features:DOS, M}DOS, GOF, M}GOF. The second fea-

    ture set uses only the 20 zoning features. The thirdset comprises 21 features: zoning features plus cor-

    relation. The fourth set consists of 24 features:

    DOS, M}DOS, GOF, M}GOF and zoning fea-

    tures. The "fth set includes all 25 features: DOS,

    M}DOS, GOF, M}GOF, correlation, and zoning

    features. The test results are provided in Table 1.

    The missing rate indicates the percentage of bad

    lines misclassi"ed as good. The false alarm rate is

    the percentage of good lines misclassi"ed as bad.

    The total successful rate is computed as the number

    of correct classi"cations over total lines tested. The

    best feature set is the set with all 25 features with

    10.70% missing rate, 22.99% false alarm rate, and

    78.78% total successful detection rate. Therefore,

    all 25 features are applied in identifying welding

    #aws.

    To further reduce the missing rate and false

    alarm rate, the training data are expanded by in-

    cluding some examples which were misclassi"edpreviously. The performance of three expanded sets

    of examples with 91, 108, and 141 pairs, respective-ly, are studied. The results are shown in Table 2.

    From this table it can be seen that the best case is

    the training data set containing 108 pairs of exam-

    ples with false alarm rate of 18.67%, missing rate of

    6.01%, and total successful rate of 83.15%. This

    results is, though not perfect, considered to be very

    good when compared with past studies. The results

    also imply that more examples do not always pro-

    duce better performance. More examples are good

    if they reinforce the classi"cation capability. Other-

    Table 2

    The results of di!erent training data sets

    The number of training data 78 91 108 141

    (pairs of good and bad examples)

    False alarm rate % 22.99 2 2.18 18.68 26.51

    Missing rate % 10.90 8.52 6.01 34.48

    Total successful rate % 78.78 79.79 83.15 72.34

    wise, the classi"er will get confused and yield

    a worse result, as in the case of the training data set

    of 141 pairs of examples. In this particular case,

    both the false alarm and missing rates increase.

    The classi"cation results serve as the inputs tothe postprocessing operation which draws a rectan-

    gular box around the image area where the classi-"er classi"ed as defect. Fig. 6 shows sample weld

    images in which inclusions are detected. One clear

    Fig. 6. Sample detection results of &&inclusion'' type welding

    #aws.

    T.W. Liao et al. / Fuzzy Sets and Systems 108 (1999) 145}158 155

  • 8/2/2019 Fuzzy Welding Flaw Detection

    12/14

    Fig. 7. Sample detection results of &&crack'' type welding #aws.

    miss is noted. Fig. 7 shows sample weld images in

    which cracks are successfully detected. Fig. 8 shows

    the detection of a lack of penetration defect. Theimages were processed for contrast enhancement

    by using the tools provided in the Khoros software

    package [11] before presented.

    4.2. Based on fuzzy c-means

    The fuzzy c-means classi"er is a unsupervised

    one. It does not require training data. Using all 25features, the fuzzy c-means classi"er is also applied

    to the same test data set to determine its perfor-

    Fig. 8. Sample detection results of &&lack of penetration'' type

    welding #aws.

    mance in welding #aw detection. The missing rate is8.50% while the false alarm rate is 33.19%. Com-

    pared with those results obtained by the fuzzy

    K-NN classi"er, the missing rate is 3.45% higher

    and the false alarm rate is 15.52% higher.

    5. Discussion

    The success of an automated pattern classi"ca-

    tion system depends both on the classi"er and the

    156 T.W. Liao et al. / Fuzzy Sets and Systems 108 (1999) 145}158

  • 8/2/2019 Fuzzy Welding Flaw Detection

    13/14

    features the classi"er operates on. Automated iden-

    ti"cation of welding #aws from radiographic im-

    ages is no exception. This study demonstrates that

    a higher successful rate can be achieved by using

    the fuzzy K-NN classi"er versus the fuzzy c-meansclassi"er. A higher successful rate is also achieved if

    all 25 features are used compared with other sub-sets of features tested.

    It is well known that a solution to a pattern

    recognition task is highly problem dependent.

    A good solution to one task might not be

    good for another. For any pattern recognition

    task, there might exist an optimal solution. But

    the optimal solution is usually unknown. To "nd

    the optimal feature set, two streams of feature

    selection methods can be generally distinguished.

    The "rst relies on searching an optimal trans-

    formation T to reduce the dimension of the orig-

    inal feature space [14]. Suppose that the original

    features are z

    through zK

    and the selected fea-

    tures are f

    through fL

    , n(m. Hence, in matrix

    notation, f"Tz. The second approach to feature

    selection is concentrated on searching an optimal

    subset of the feature set using a search procedure

    based on an appropriate measure of e!ectiveness

    [15].In selecting features for the subject application,

    a trial and error procedure was followed. A featureis "rst generated based on our knowledge of the

    problem domain and then tested to determine its

    e!ectiveness. The feature is selected if it is proved

    e!ective. Otherwise, it is discarded. The 25 features

    selected might not form the best feature set. There

    might be a better feature which actually exists but

    not generated. But if there is a better feature, we do

    not know what it is. This is one area where im-

    provement could be made. Although unlikely, there

    might also exist a better feature subset because we

    did not test all possible subsets of 25 selected fea-

    tures, either.

    As far as the classi"er is concerned, many classi-

    "ers other than the two fuzzy clustering methods

    utilized in this study could also be used. Bayes

    classi"er and multilayer perceptron neural network

    are just two established examples. Not to mention

    other newly developed algorithms such as thevalidity-guided (re)clustering algorithm [1]. The

    open question is &&Is there a better classi"er than

    the fuzzy K-NN classi"er for the subject applica-

    tion?'' This is another area needed to be further

    investigated in the future.

    The unknown is how much room is left for

    improvement. Trying not to be too pessimistic,but our experience tells us that it is impossible

    to achieve 0% missing and false alarm rates. Due tothe nature of the radiographic image data, an

    attempt to decrease the missing rate will most

    likely incur higher false alarm rate also. Therefore,

    in our opinion, a more reasonable goal is to

    achieve 0% missing rate at minimum false alarm

    rate. Such a system can then be trusted to perform

    NDT inspections for a critical application. Of

    course, it will still require a human expert to verify

    the detection results to "lter out the false alarms.

    Nevertheless, with such a system available the ef-

    fort required from the human expert will be greatly

    reduced.

    6. Conclusions

    We have presented a fuzzy clustering based

    methodology for detecting welding #aws from

    radiographic images. The methodology processeseach image line by line. For each line, 25 features

    are selected. The fuzzy K-NN classi"er is found togive lower missing rate and lower false alarm rate

    than the fuzzy c-means classi"er. Detailed dis-

    cussions were also given related to the selection of

    training data and feature set. Five di!erent sets of

    features were tested. It was found that the set with

    all 25 features is the best.

    Currently, the system at best can achieve 6.01%

    missing rate and 18.68% false alarm rate. To im-

    prove the system performance, future research will

    devote to "nding better features and classi"ers.

    Ideally, a 0% missing rate at minimum false alarm

    rate should be attained.

    Acknowledgement

    This work is supported jointly by Lockheed

    Martin Manned Space Systems, New Orleans andthe Board of Regents, Louisiana through the

    LEQSF(1994-96) RD-B-06 grant.

    T.W. Liao et al. / Fuzzy Sets and Systems 108 (1999) 145}158 157

  • 8/2/2019 Fuzzy Welding Flaw Detection

    14/14

    References

    [1] A.M. Bensaid, L.O. Hall, J.C. Bezdek, L.P. Clarke, M.L.

    Silbiger, J.A. Arrington, R.F. Murtagh, Validity-guided

    (re)clustering with applications to image segmentation,

    IEEE rans. Fuzzy Systems 4 (2) (1996) 112}123.

    [2] J. Bezdek, Pattern Recognition with Fuzzy Objective Func-

    tion Algorithms, Plenum Press, New York, 1981.[3] E. Cloud, K. Fraser, S. Krywick, Automated examination

    of X-ray welds, Final Report to ockheed Martin MSS,

    Lockheed Martin Electronics, Information and Missiles

    Group, Orlando, Florida, 1992.

    [4] W. Daum, P. Rose, H. Heidt, J. H. Builtjes, Automatic

    recognition of weld defects in X-ray inspection, Brit. J.

    ND 29(2) (1987) 79}82.

    [5] P. Dierckx, Curve and Surface Fitting with Splines, Claren-

    don Press, Oxford, 1993.

    [6] B. Eckelt, N. Meyendorf, W. Morgner, U. Richter, Use of

    automatic image processing for monitoring of welding

    process and weld inspection, Proc. 12th =orld Conf. on

    ND, 1989, pp. 37}41.[7] G.R. Edward, Inspection of welded joints, in: ASM Hand-

    book, vol. 6,=elding, Brazing and Soldering, ASM Interna-

    tional, Materials Park, Ohio, 1993, pp. 1081}1088.

    [8] A. Gayer, A. Saya, A. Shiloh, Automatic recognition of

    welding defects in real-time radiography, ND Interna-

    tional 23 (3) (1990) 131}136.

    [9] W.A. Graeme, Jr., A.C. Eizember, J. Douglass, Digital

    image analysis of nondestructive testing radiographs, Ma-

    terials Evaluation (Feb. 1990) 117}120.

    [10] J.M. Keller, M.R. Gray, J.A. Gigens Jr., A fuzzy k-nearest

    neighbor algorithm, IEEE rans. System Man Cybernet.SMC-15 (1985) 580}585.

    [11] K. Konstantinides, J.R. Rasure, The Khoros software de-

    velopment environment for image and signal processing,

    IEEE rans. Image Processing 3 (3) (1994) 243}252.

    [12] T.W. Liao, Y.-M. Li, An automated radiographic NDT

    system for weld inspection: Part II, Flaw detection, ND

    & E International 31 (3) (1998) 183}192.

    [13] T.W. Liao, J.-W. Ni, An automated radiographic NDT

    system for weld inspection: Part I, Weld extraction, ND

    & E Int. 29 (3) (1996) 157}162.

    [14] W.S. Meisel, Computer-Oriented Approaches to Pattern

    Recognition, Academic Press, New York, 1972.

    [15] W. Siedlecki, J. Sklansky, On automatic feature selec-tion, Int. J. Pattern Recognition Artif. Intell. 2 (1988)

    197}220.

    [16] L. Zadeh, Fuzzy sets, Inform. and Control 8 (1965) 338}353.

    158 T.W. Liao et al. / Fuzzy Sets and Systems 108 (1999) 145}158