This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Introduction
With the rapid development of digitalization and networking in the industrial field, the industrial Internet of Things (IIoT), which relies on IoT technology for information sharing and intelligence, has come into being [1]. The IIoT fully integrates various information collection sensors and controllers with monitoring and sensing capabilities, as well as 5G, big data analysis, and artificial intelligence technologies to achieve ubiquitous sensing of all aspects of industrial production, resulting in a wide range of efficiency improvements in industrial manufacturing, significant decreases in the number of defective products, and large reductions in product resource consumption [2]. Finally, the traditional industry will be elevated to a new level. Smart devices and smart production have a positive impact on people's daily life, and the combination of IoT technology and the traditional design and manufacturing model of the smart industry also plays a positive role in industrial production, which is also called the industrial Internet of Things [3]. Compared with the traditional manufacturing model, real-time monitoring systems in the smart era continue to develop, which not only can promote the progress of production methods and production efficiency, but also effectively reduce the number of safety issues. Monitoring systems in intelligent machine vision nondestructive testing greenhouse have made corresponding development, but to avoid unnecessary waste of resources and casualties, monitoring systems in the industrial field have very broad application prospects [4].
To keep pace with the development of the times, it is obvious that the production methods of traditional manufacturing industries cannot meet the current market demand. While using information technology to improve the production methods, the management measures and safety facilities of factories should also be scientifically improved; otherwise, safety problems will occur [5]. Whether it is the working environment, the manufacturing equipment, or the specific operation of the employees in the factory, there are safety hazards in each link; in addition, whether the safety management department can find and investigate the safety hazards in time is a great test for them. Despite the advanced technology today, the monitoring system has entered daily life, but the shortcomings such as poor data integration, lack of system maintenance, and incomplete data records have seriously affected the normal operation of the monitoring system. In this situation, it is especially important to design and develop a complete digital monitoring system. The combination of industrial IoT and labor-intensive agroindustry is setting off a new revolution in machine vision NDT technology [6]. The notice issued by the State Council on the development plan of a new generation of artificial intelligence also clearly points out that, under the impetus of socioeconomic development and new technology theories, cross-border integration in various fields is needed to accelerate the intelligent upgrading of industries, in which the demand for establishing an integrated application of machine vision nondestructive intelligent supply chain is put forward in intelligent machine vision nondestructive testing. Industrial Internet of Things, as a branch of artificial intelligence, has obvious advantages in the application of vision, and applying industrial Internet of Things to machine vision nondestructive testing is a trend to improve the development of machine vision nondestructive testing in recent years [7]. In highly polluting industries such as chemical industry and light industry, it is necessary to support the establishment and improvement of an intelligent sewage monitoring system. It is necessary to realize the integrated application of intelligent sewage automatic monitoring devices, water quality data monitoring devices, and water quality parameter detectors and other equipment and implement key enterprises for sewage monitoring. Real-time monitoring, automatic alarming, and remote closure of sewage outlets are required to prevent the occurrence of sudden environmental pollution accidents.
This paper mainly takes the application of industrial Internet of Things (IoT) as the research background, combines industrial IoT and machine vision nondestructive testing technology by using the convenience of the mobile terminal, and proposes a set of mobile interactive system design schemes for controllable and displayable equipment data monitoring and machine vision nondestructive testing display [8]. The scheme combines the advantages of IoT intelligent technology and advanced machine vision technology and integrates them with the data collection monitoring and NDT system of industrial equipment, constituting a real-time, stable, convenient, and efficient mobile interactive system. In Section 1, the main work is to explain the research background of the paper and the significance of the development of machine vision NDT technology and to arrange the main contents of the paper. Section 2 aims to understand and introduce the status of relevant domestic and international research on industrial IoT and machine vision nondestructive monitoring. Section 3 describes the functional requirements and performance requirements of the machine vision nondestructive inspection system based on the industrial IoT. Based on these requirements, the overall scheme of the machine vision nondestructive inspection system is designed; a joint perception probability model that is more in line with the actual situation is adopted for the optimization of the IoT coverage of the mixed deployment of dynamic and static nodes and the dynamic node movement path; a joint perception probability model based on the industrial IoT is proposed; and a supervisory mechanism of machine vision nondestructive detection algorithm is used for IoT network node random deployment and mobile path optimization scheme, which not only utilizes the mobility of dynamic nodes to repair coverage voids but also achieves some results for dynamic nodes' mobile path optimization. Section 4 conducts experiments on the designed machine vision nondestructive inspection system based on the industrial IoT supervision mechanism, analyzes the experimental results, and compares them with the simulation conclusions. Section 5 first summarizes this paper, then analyzes the shortcomings of the existing system, points out the improvement direction, and lays the foundation for the subsequent research.
2. Key Technology
In the traditional industrial IoT, sensor devices are no longer able to meet the needs of the emerging industry under the high demand of society for industrial production and paradigm updates [9]. With the development of miniaturization and information intelligence in IoT, sensor development also tends to be more and more intelligent, which promotes the development of data acquisition technology in industrial IoT [10]. Dhiman B et al. [11] designed a multifrequency machine vision nondestructive MWM array sensor, and experiments showed that the sensor has good detection capability for fatigue damage of steel [11]. Khan S et al. designed a CODFCI sensor, which combined a detection coil with a high-resolution charge-coupled device to make a probe. The experiments showed that the probe has a good detection effect on various alloy surface defects [12]. Sahu C K et al. used wireless sensors to conduct some research on natural disasters of landslides and constructed a wireless sensor network for remote monitoring of landslides [13]. Once there is a possibility of landslides, the network will generate early warnings, which can make the lives of residents safe. To be guaranteed, a system that can remotely monitor the state of the machine is proposed, which contributes to the safety and reliability of the machine. From the status quo, we can know that both the industrial Internet of Things and the remote monitoring technology of equipment have penetrated the actual production and human daily life unconsciously [14]. Regardless of the different monitoring technologies, their ultimate goal is to achieve network interoperability, make plans for the industrialization construction of key technologies and important development areas that need to be broken through in the field of the Internet of Things, and provide financial support for industrialization projects that meet the requirements. The technologies supported by the Internet of Things industry research and development include network transmission equipment and information processing products, including wireless sensor network equipment, communication modules based on TD-SCDMA technology, and massive information analysis and processing.
With the continuous development of semiconductor integrated circuits, microprocessor-based embedded devices will continue to develop in the direction of high speed, high reliability, and low cost, and their hardware resources are gradually enriched. Embedded machine vision system benefits from its advantages of small system scale and high integration and is widely used in application fields with high research value [15]. The execution efficiency of vision algorithms to a certain extent restricts the efficiency of many current machine vision systems, resulting in some computationally intensive vision systems that do not have high execution efficiency [16]. Sun Q et al. propose an anonymous aggregated encryption scheme that encrypts several different messages into a single ciphertext and sends them to multiple end users, each of whom decrypts the message using the decryption key they have to obtain the corresponding plaintext message, which effectively reduces the computational overhead in industrial IoT systems [17]. Tripathi M K et al. proposed elliptic curve-based privacy-preserving industrial IoT user authentication machine vision nondestructive testing considering the limited resources of smart device nodes in industrial IoT systems [18]. The scheme exploits the nature of elliptic curves to ensure the security of messages while effectively reducing the computational cost associated with authentication [19]. Wu C et al. proposed an efficient edge computing-based message authentication scheme to address the overhead problem of message authentication in industrial IoT [20]. In the process from the production of the product in industrial manufacturing to the sale of the product, it is usually necessary to track the product to deal with the recall of the product. For example, food manufacturing, as an application in the industrial Internet of Things, often needs to be aware of expiration dates.
The food in question is recalled. However, the use of cloud servers is not conducive to deployment in the production chain and sales chain of food. The framework based on edge computing can be applied in the food manufacturing industry. In their proposed scheme, the production and sales process of food is recorded by methods such as QR codes, so that the production and supply chain of products can be identified and tracked.
Fully dynamic nodes are deployed with high mobility, and coverage voids have more possibilities of being effectively covered. The scheme of dynamic nodes moving toward the center point of the void can effectively improve the coverage rate, and the neighboring nodes below the distance threshold move in the direction away from the center point of the void, which improves the redundant coverage problem of the nodes; however, the cost and difficulty of laying the Industrial Internet of Things with fully mobile nodes is high the overall energy consumption of the industrial IoT is too large, and there will be the problem of mobile path interference of dynamic nodes. The expansion model of industrial IoT machine vision nondestructive detection based on genetic algorithm designs the fitness function based on machine vision nondestructive detection response data, selects the good individuals among the new samples generated by crossover and mutation operations, finally expands the high-quality machine vision nondestructive detection samples after several evolutions, and uses the expanded high-quality machine vision nondestructive detection samples to train the hidden Markov-based machine. The parameters of the expanded high-quality machine vision NDT model are used to train the hidden Markov-based machine vision NDT detection model, which improves the accuracy of IIoT machine vision NDT detection. Finally, a highly automated and accurate IIoT sparse machine vision NDT inspection system is designed based on comparing the effect of the two models on IIoT machine vision NDT inspection, and the effect of other machine vision NDT inspection models on IIoT machine vision NDT inspection is experimentally compared to verify that the system has better detection effect on IIoT machine vision NDT inspection. The target detection algorithm based on deep learning is a nondestructive detection method. Based on the self-collected data set, an industrial Internet of Things supervision and detection algorithm model is constructed to detect the damage and nondestructive conditions of the appearance of apples. This paper summarizes the factors that can improve the accuracy of the network model through experiments and finally improves the accuracy of target detection by modifying the model parameters, expanding the data set, and using excellent feature extraction network model methods.
3. Research on Machine Vision Nondestructive Inspection System Based on Industrial IoT Supervision Mechanism
3.1. Industrial IoT Supervisory Detection Model Construction
The model in this paper mainly involves the coil in the probe, the model of the metal specimen to be measured, and the observation line. The center of the observation line is considered as the location of the giant magnetoresistance (GMR) sensor, and the change in the output signal of the sensor can be obtained by calculating and analyzing the change in the magnitude of the magnetic induction on the observation line. First, a 3D simulation project is created, and the solution type is set to eddy current; then, the model to be simulated is determined. Since this paper is concerned with the detection of defects on the surface of an aircraft, the target is identified as the detection of defects and cracks on the surface of an aluminum plate. A rectangular specimen of 50 cm ×
[figure(s) omitted; refer to PDF]
Select the excitation coil model, and profile it in direction to obtain two rectangles of the excitation coil cross section. Separate the two rectangles, keeping only one of the faces, and add current excitation to this face. Since the excitation coils wound with multiple layers of wires are modeled as equivalent to copper rings, the excitation is added by applying an equivalent current through the single wire current multiplied by the size of the coil turns. The observation line is added to the simulation results to obtain the magnetic induction intensity in a certain direction on the observation line. Place the observation line 1 mm above the monitoring object, allowing it to pass through the center of the coil and be perpendicular to the defect. Use the Field Calculator settings to solve for the magnetic induction distribution in the direction normal to the surface of the monitored object.
The excitation probe selected in this paper is a multi-turn placement coil, and the next analysis is calculated using (1) to obtain the magnitude of the magnetic field generated by the coil. The wavelength of the electromagnetic wave is shown in (1), where
The instantaneous value of the electromagnetic field is calculated using the static field calculation method. According to law, the magnetic induction generated by a single-turn wire on its axis is shown in (2) where
The magnetic field of an excitation coil at a point on the perimeter line can be considered as the superposition of the magnetic inductance strength of multiple single-turn coils at that point. Let the number of turns of the excitation coil be M. Then, the current density on the excitation coil is as follows:
The magnitude of magnetic induction intensity at any point on the central axis of the excitation coil is shown in (4). From (4), it can be seen that the magnitude of magnetic induction at any point on the axis of the eddy current detection probe is related to the frequency and size of the excitation signal and the inner and outer diameter, and the number of turns and thickness of the excitation coil; the greater the excitation current, the greater the magnetic induction; the more the turns of the coil, the greater the magnetic induction. Therefore, in the simulation design, the above parameters should be modified so that the designed excitation coil can produce the maximum magnetic induction strength under the same conditions.
The number of turns of a coil can be considered as the quotient of the total volume of a multi-turn coil and the volume of a single-turn coil as shown in (5), where M(x) is the number of turns of the coil; n is the width of the coil, numerically equal to the difference between the inner and outer radius of the coil; m is the height of the coil; and d is the diameter of the coil. Since the diameter of the enameled wire D is fixed, it can be found from (5) that the coil height m and width n are inversely proportional when the number of turns of the coil is constant.
3.2. Machine Vision NDT Algorithm Optimization
In this paper, the fitness function is used to evaluate the merit of machine vision nondestructive inspection data. In each iteration, the updated data is sent to the industrial IoT test network, the response results are recorded, and the min and max are updated; then, the value of the fitness function is calculated, and the individual optimum of the particle and the global optimum of the whole population are updated according to their values so that the particles of the population are approximated to the most. After several iterations, we finally obtain a certain number of normal returns. In the data expansion model, the fitness function is not known; combined with the actual application scenario, the fitness function is designed as the distance between the machine vision nondestructive detection field and the current minimum value
The maximum likelihood probability estimation of the hidden state sequence in the machine vision NDT inspection model designed in this paper represents the best prediction of the observed sequence, so our goal is to find the state sequence with the maximum likelihood probability, and the genetic-based Viterbi algorithm is used in this paper to estimate the state sequence with the maximum likelihood probability. In this paper, we introduce the parameters J and K and define the probability maximum in all individual paths
The recurrence equation for the variables can be obtained as follows:
The previous state is
The device does not return a response to the request, and no response includes request format errors and so on. Finally, based on the returned response, the adaptation function is designed with the following equation:
In this paper, the responses returned by machine vision nondestructive testing are divided into three different levels (the level represents the quality of machine vision nondestructive testing samples; the higher the level, the higher the quality of machine vision nondestructive testing samples). The levels are X, Y, and Z in descending order, which represent the fitness value of the test sample when a normal response is returned, when an abnormal response is returned, and when no response is returned. The specific values of the parameters depend on their quality and efficiency for the expansion of machine vision nondestructive testing and are constants;
For practical physical problems, parallel computing is adopted to divide the physical problems into computational tasks and carry out the abstraction of the computational model. The parallel program is implemented in a computer language. The specific algorithm flow is shown in Figure 2. The core idea of parallel computing is to decompose a more complex computing problem into small computing units, then publish these computing units to run on a virtual parallel computer, and finally summarize the computing results. These computing tasks are generally performed by a computing program process of a computer on the network, the program processes can share information, and such a process can become a computing node. Computational tasks can be performed on the same computer in physical space or distributed among multiple computers.
[figure(s) omitted; refer to PDF]
3.3. Machine Vision Nondestructive Inspection System Design and Implementation
The website of the machine vision NDT system designed in this paper is divided into four functions: system login, data query, device management, and background management. To prevent the information and data in the system from being deleted or even being unrecoverable due to some mistakes, access to the background management module will not be opened to ordinary users. For the machine vision NDT system designed in this paper, real-time monitoring of data and historical query of data are the most basic functions. Data real-time detection can be intuitively seen in the designed real-time data monitoring interface of machine vision nondestructive temperature, speed, torque, pressure, and other data; users can query the past equipment data through the history query function. Firstly, set the period of the query, and then select the required equipment and data; you can get the data that the user needs. For example, if a new data stream is needed, the system user can add the corresponding industrial equipment to the equipment list; if a data stream no longer needs to be monitored, the system user can delete the corresponding equipment from the equipment list.
For visual inspection systems, to reduce the communication load caused by image transmission, a parallel computing structure of distributed storage can be used. Each computing node independently manages its computing, IO resources, etc., and each node is relatively independent and locally autonomous. The computing node only communicates with the master node and does not communicate with nodes. The work of computing nodes in the online visual inspection system is concentrated in two parts: image processing calculation and result feedback. To reduce the impact of communication on computing, the use of asynchronous communication can improve the operating efficiency of parallel systems to a certain extent. According to the division of inspection tasks, determine the number of cameras, industrial control machines, encoders, and other hardware required for inspection, as well as parameters, both parallel ratio and serial ratio. The software connects the detection link to the site's detection environment and links the detection tasks to the corresponding hardware to determine the flow of image processing. After the configuration is completed, the system inspection tasks are executed. To realize the software reconfiguration for product inspection tasks, this paper combines the image processing and evaluation processes into a chain structure, and the flow of the offline configuration and online work of the image inspection chain is shown in Figure 3.
[figure(s) omitted; refer to PDF]
In the system designed in this paper, the calculation nodes communicate directly with the PLC controller, which realizes the local autonomy of the detection function and can effectively minimize the impact of the main program failure. For each computation node error, the main program performs the survival check of the computation node program through the heartbeat mechanism. The main program sends heartbeat packets to the computation node by timing, and the detection program confirms and gives feedback. In this way, the monitoring and alarm of the compute node operation can be realized. Because there are many uncontrollable factors in the factory, on-site equipment and pipelines will bring difficulties to the manual deployment of sensor nodes, so the random deployment of dynamic and static nodes is adopted. The coverage after random deployment and the moving distance of dynamic nodes are two necessary research parameters. To improve the initial coverage and optimize the moving path of dynamic nodes, this paper proposes a mobile deployment optimization scheme based on a probability-aware model. By improving the genetic mutation rules, the ergodicity of the quantum genetic algorithm is improved, thereby improving the initial deployment of the network; the nondestructive testing algorithm is used to optimize the movement path of the dynamic node to the target position.
4. Analysis of Results
4.1. Quantitative Analysis of Detection Models
The effect of the excitation current frequency on the sensitivity of the probe is studied using the probe with the above-determined coil parameters. The current frequency applied to the excitation coil probe is modified during the simulation to obtain and analyze the simulation results. In this simulation, the excitation coil radius is 4 cm, the excitation coil width is 1 cm, the height is 1 cm, the excitation current is 220A, the excitation current frequency is selected from 200 Hz to 5000 Hz, the reference frequency is selected in steps of 100 Hz, a defect of 1 mm in width and 1 mm in depth is detected, and the magnetic induction intensity at the center of the probe is observed. The magnetic induction at the center of the excitation coil with defects is compared with that without defects, the simulation data is extracted, and the sensitivity is calculated in steps of 800 Hz. The obtained data is imported into Origin to obtain the graph of the relationship between excitation current frequency and probe sensitivity as shown in Figure 4. From the graph, it can be inferred that when there are defects on the surface of the aluminum plate, the higher the excitation frequency, the greater the magnetic induction at the center of the observation line, and the greater the sensitivity of the probe. The non-defect detection varies from 0.05 to 0.106, and the defect detection varies from −0.76 to 0.59, which proves that the variation of non-defect detection is more flexible.
[figure(s) omitted; refer to PDF]
The effect of the excitation current level on the sensitivity of the probe is investigated using the probe with the above-determined coil parameters. In the simulation process, current 1 applied to the excitation coil probe is modified to obtain and analyze the simulation results. From Figure 5, it can be seen that in the range of 100–2500 A, the larger the excitation current, the larger the excitation magnetic field, and the larger the eddy current loss in the aluminum plate, so that the magnetic field strength without defects is increasing, the difference between the magnetic induction strength with and without defects is larger, and the sensitivity of the probe is larger. However, in the actual measurement, the equivalent current in the coil cannot be increased indefinitely due to the number of turns of the coil, the input current, and the range of the GMR sensor. In the design of the corresponding eddy current NDT system, the amplitude of the output signal needs to be set with adjustable gain.
[figure(s) omitted; refer to PDF]
4.2. NDT Algorithm Performance Analysis
To verify the optimization performance of the QGA-2 exchange algorithm for node coverage and movement path of hybrid WSNs, MATLAB R2019 software is selected for simulation. Different numbers of dynamic and static hybrid nodes are randomly deployed in a rectangular monitoring area of 400 m × 400 m to measure the optimal number of hybrid nodes to be deployed. The experimental parameters were set as shown in Table 1.
Table 1
Parameter settings.
Parameter number | Parameter name | Parameter notation | Parameter value |
1 | Geographic range | P(S) | 400 m × 400 m |
2 | Grid points | N(p) | 400 × 400 |
3 | Total number of nodes | T(p) | (60, 80, 100) |
4 | Monitoring radius | R | 40 |
5 | Sensing error | E(s) | 8 |
6 | Number of iterations | N(iteration) | 500 |
Figure 6 shows the effect of the different numbers of dynamic nodes on coverage improvement for the total number of hybrid nodes of 60, 80, and 100. In the monitoring area, when the number of dynamic nodes is 0, the coverage is improved with the increase of the total number of nodes, and the highest coverage is achieved when 70 hybrid nodes are deployed, with a coverage rate of about 87.15%. 60 hybrid nodes are deployed with an overall lower coverage rate, which cannot meet the coverage requirements. When the total number of hybrid nodes is 80, with 15 to 25 dynamic nodes, the coverage is 95.67%, which is an improvement of about 16.14% compared to the deployment without dynamic nodes. As the number of dynamic nodes increases, the coverage provided by 80 and 100 hybrid nodes is similar and saves network node resources.
[figure(s) omitted; refer to PDF]
With 50 static nodes and 10, 20, and 30 dynamic nodes deployed in a specific monitoring area, the coverage of the QGA-2 exchange algorithm is about 8.62%∼12.91% higher than that of the cellular structure-based dynamic node optimization in the average moving distance range of 1–50 m, as shown in Figure 7. The dynamic node optimization based on the cellular structure is based on global information processing, which is not easy to fall into the local optimum. After detecting the cavity, the optimal motion path is found, and the increase of dynamic nodes makes the coverage rate improve while the average movement distance decreases. The QGA-2 exchange algorithm optimizes the initial coverage and then exchanges the mobile paths of all dynamic nodes, which further reduces the mobile distance of dynamic nodes.
[figure(s) omitted; refer to PDF]
4.3. Machine Vision NDT System Analysis
The machine vision nondestructive testing of three different array images based on the number of target object images is carried out for the system. The test records of local NDT and machine vision NDT systems were conducted separately to explore the connection between the number of pictures and the efficiency of NDT and further optimize the efficiency of machine vision NDT to improve the efficiency of data acquisition. The specific data are shown in Figure 8(a). The relationship between the number of pictures and the accuracy of NDT was further explored. The specific test results are shown in Figure 8(b).
[figure(s) omitted; refer to PDF]
As can be seen in Figure 8(a), with the increasing number of equipment subjects, the nondestructive detection efficiency of the cloud-based image nondestructive inspection system is higher, with a nondestructive detection rate of about 0.12 s. This is due to the use of EasyAR's CRS module in the design implementation of the machine vision nondestructive inspection system to process the images of the target objects. In the CRS module, a brief and efficient API interface is used to retrieve and track the target images, which enables more accurate and fast finding of the target objects in the real environment. As can be seen from Figure 8(b), the NDT accuracy of the conventional NDT system tends to decrease with the increasing number of NDT objects, while the NDT accuracy of the machine vision NDT system remains at about 99.45%. This shows that the overall stability of the machine vision NDT system in terms of NDT accuracy is good, with little fluctuation.
On the one hand, the machine vision NDT system uses a simple and efficient picture processing interface in the cloud NDT processing module to track and locate the target pictures of the equipment. On the other hand, as the number of NDT pictures increases, the storage space of mobile devices is affected to a certain extent, which increases the burden of the equipment. The machine vision NDT system uploads the image of the target object to the cloud server, reducing the burden on the equipment. Therefore, the above test results prove that the design and development of the machine vision NDT system can further optimize the nondestructive detection rate of image NDT, improve the efficiency and accuracy of obtaining data information in the industrial IoT, and meet the accuracy requirements of data in manufacturing industry.
5. Conclusion
The paper designs and implements a machine vision nondestructive inspection system based on industrial IoT technology, combining supervision mechanisms, wireless communication technology, communication nondestructive inspection, and cloud server database. The system is not only capable of real-time sensing of industry and data aggregation but also capable of storing data in the cloud server database and presenting it on the display side by calling the data in the database. In response to the coverage voids and incomplete sensing information caused by the random deployment of wireless sensor networks, a hybrid random deployment scheme of dynamic and static nodes is adopted, and the coverage and the movement path of dynamic nodes are optimized using an improved machine vision nondestructive detection algorithm. A sparse NDT model based on a genetic algorithm is designed, which is a hybrid detection model constructed by binary particle swarm algorithm and hidden Markov model; the sparse NDT sample problem is effectively solved by the quality NDT samples expanded by binary particle swarm algorithm; and the quality NDT samples obtained from the expansion are used to estimate the parameters of the hidden Markov-based NDT model. It improves IoT NDT by comparing and analyzing the impact of two NDT models and uses the design of front-end and back-end applications to realize a highly automated and high-precision IoT sparse NDT system. By comparing the detection effect of IoT nondestructive testing through experiments, it is verified that the system has a good detection effect for sparse nondestructive testing of industrial Internet of Things. The big data technology can be applied to the system designed in this paper, and the collected data can be further mined and processed, so that the managers can better grasp the status of the equipment and adjust the production plan at any time to improve the production efficiency and product quality of the enterprise.
Acknowledgments
This work was supported by the Department of Control Technology, Wuxi Institute of Technology.
[1] M. Elbadawi, L. E. McCoubrey, F. K. H. Gavins, J. J. Ong, A. Goyanes, S. Gaisford, A. W. Basit, "Disrupting 3D printing of medicines with machine learning," Trends in Pharmacological Sciences, vol. 42 no. 9, pp. 745-757, DOI: 10.1016/j.tips.2021.06.002, 2021.
[2] C. C. Cheah, T. Bock, J. Cao, T. Linner, Y.-H. Liu, A. Yamashita, L. Yang, "Guest editorial introduction to the focused section on mechatronics and automation for constructions," IEEE, vol. 26 no. 6, pp. 2819-2825, DOI: 10.1109/tmech.2021.3127237, 2021.
[3] A. Ghosh, T. Sengupta, "Intello labs: non-destructive digital commodity grading," Emerging Economies Cases Journal, vol. 3 no. 1, pp. 51-57, DOI: 10.1177/25166042211031372, 2021.
[4] D. Rodriguez, M. A. Saed, C. Li, "A WPT/NFC-based sensing approach for beverage freshness detection using supervised machine learning," IEEE Sensors Journal, vol. 21 no. 1, pp. 733-742, DOI: 10.1109/JSEN.2020.3013506, 2020.
[5] X. Zhu, A. Mohsin, W. Q. Zaman, Z. Liu, Z. Wang, Z. Yu, X. Tian, Y. Zhuang, M. Guo, J. Chu, "Development of a novel noninvasive quantitative method to monitor Siraitia grosvenorii cell growth and browning degree using an integrated computer‐aided vision technology and machine learning," Biotechnology and Bioengineering, vol. 118 no. 10, pp. 4092-4104, DOI: 10.1002/bit.27886, 2021.
[6] S. F. Wirtz, N. Beganovic, D. Söffker, "Investigation of damage detectability in composites using frequency-based classification of acoustic emission measurements," Structural Health Monitoring, vol. 18 no. 4, pp. 1207-1218, DOI: 10.1177/1475921718791894, 2019.
[7] M. S. Hossain, H. Taheri, "In-situ process monitoring for metal additive manufacturing through acoustic techniques using wavelet and convolutional neural network (CNN)," International Journal of Advanced Manufacturing Technology, vol. 116 no. 11, pp. 3473-3488, DOI: 10.1007/s00170-021-07721-z, 2021.
[8] J. T. C. Liu, A. K. Glaser, K. Bera, L. D. True, N. P. Reder, K. W. Eliceiri, A. Madabhushi, "Harnessing non-destructive 3D pathology," Nature Biomedical Engineering, vol. 5 no. 3, pp. 203-218, DOI: 10.1038/s41551-020-00681-x, 2021.
[9] H. Ding, R. X. Gao, A. J. Isaksson, R. G. Landers, T. Parisini, Y. Yuan, "State of AI-based monitoring in smart manufacturing and introduction to focused section," IEEE, vol. 25 no. 5, pp. 2143-2154, DOI: 10.1109/tmech.2020.3022983, 2020.
[10] L. Chen, X. Yao, P. Xu, S. K. Moon, G. Bi, "Rapid surface defect identification for additive manufacturing with in-situ point cloud processing and machine learning," Virtual and Physical Prototyping, vol. 16 no. 1, pp. 50-67, DOI: 10.1080/17452759.2020.1832695, 2021.
[11] B. Dhiman, Y. Kumar, Y.-C. Hu, "A general purpose multi-fruit system for assessing the quality of fruits with the application of recurrent neural network," Soft Computing, vol. 25 no. 14, pp. 9255-9272, DOI: 10.1007/s00500-021-05867-2, 2021.
[12] S. Khan, Z. Xiaobo, M. Ilyas, K. U. Rahman, R. D. Khan, K. Shahid, A. Ahmad, H. Akbar, T. Ahmad, M. Irfan, Z. Zafar, "Fraud food and food spoilage detection by non-destructive technologies," Annals of the Romanian Society for Cell Biology, vol. 25 no. 7, pp. 1389-1405, 2021.
[13] C. K. Sahu, C. Young, R. Rai, "Artificial intelligence (AI) in augmented reality (AR)-assisted manufacturing applications: a review," International Journal of Production Research, vol. 59 no. 16, pp. 4903-4959, DOI: 10.1080/00207543.2020.1859636, 2021.
[14] L. Liu, H. Mei, C. Guo, Y. Tu, L. Wang, "Pixel-level classification of pollution severity on insulators using photothermal radiometry and multiclass semisupervised support vector machine," IEEE Transactions on Industrial Informatics, vol. 17 no. 1, pp. 441-449, DOI: 10.1109/TII.2020.2984642, 2020.
[15] Z. Zhang, X. Liang, W. Zhao, L. Xing, "Noise2Context: c," Medical Physics, vol. 48 no. 10, pp. 5794-5803, DOI: 10.1002/mp.15119, 2021.
[16] D. V. K. Le, Z. Chen, R. Rajkumar, "Multi-sensors in-line inspection robot for pipe flaws detection," IET Science, Measurement & Technology, vol. 14 no. 1, pp. 71-82, 2019.
[17] Q. Sun, M. Zhang, A. S. Mujumdar, "Recent developments of artificial intelligence in drying of fresh food: a review," Critical Reviews in Food Science and Nutrition, vol. 59 no. 14, pp. 2258-2275, DOI: 10.1080/10408398.2018.1446900, 2019.
[18] M. K. Tripathi, D. D. Maktedar, "A role of computer vision in fruits and vegetables among various horticulture products of agriculture fields: a survey," Information Processing in Agriculture, vol. 7 no. 2, pp. 183-203, DOI: 10.1016/j.inpa.2019.07.003, 2020.
[19] A. S. Robles, A. D. J. B. Garcia, J. A. D. D. L. Peña, E. R. Mancera, N. S. Robles, "The insertion of low-cost additive manufacturing into engineering teaching: a case in central Mexico," International Journal of Materials and Product Technology, vol. 59 no. 3, pp. 270-287, DOI: 10.1504/ijmpt.2019.102944, 2019.
[20] C. Wu, P. Wu, J. Wang, R. Jiang, M. Chen, X. Wang, "Critical review of data-driven decision-making in bridge operation and maintenance," Structure and Infrastructure Engineering, vol. 18 no. 1, pp. 47-70, DOI: 10.1080/15732479.2020.1833946, 2021.
[21] R. Fotohi, H. Pakdel, "A lightweight and scalable physical layer attack detection mechanism for the internet of things (IoT) using hybrid security schema," Wireless Personal Communications, vol. 119 no. 4, pp. 3089-3106, DOI: 10.1007/s11277-021-08388-1, 2021.
[22] M. L. Adekanbi, "Optimization and digitization of wind farms using internet of things : a review," International Journal of Energy Research, vol. 45 no. 11, pp. 15832-15838, DOI: 10.1002/er.6942, 2021.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2022 Hairong Wang et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/
Abstract
This paper introduces the development status of machine vision nondestructive testing technology and industrial IoT supervision mechanism. The study designs and implements a machine vision nondestructive testing system from two aspects: construction of industrial IoT supervision and detection model, and optimization of machine vision nondestructive testing algorithm. In this paper, the random deployment of dynamic and static nodes is adopted. The coverage rate after random deployment and the moving distance of dynamic nodes are two necessary research parameters. To improve the initial coverage and optimize the mobile path of dynamic nodes, this paper proposes a mobile deployment optimization scheme based on the supervisory mechanism model of industrial IoT, which improves the traversal of the quantum genetic algorithm by improving the genetic variation rules, thus improving the initial deployment of the network. The optimized machine vision nondestructive detection algorithm is used for mobile path optimization from dynamic nodes to target locations. Simulation results show that a random deployment of 100 static nodes and 20 dynamic nodes in a 400 m × 400 m factory area works best with a coverage rate of 6.719% and an average movement distance of 23.47 m, and the movement path avoids the obstacle area. The average accuracy of the modified machine vision nondestructive testing system is 1.59% higher than that before the modification, and the average detection accuracy of the final experiment reaches 95.46%. Not only is the coverage rate better than that of the cellular structure-based dynamic node optimization scheme, but also the monitoring range of the plant tends to be more comprehensive in the actual deployment environment. Through the analysis of test results, the system achieves the monitoring and display of data on the one hand and provides a natural information access and interaction experience for IoT managers on the other hand, which meets the requirements of real time, accuracy, and stability of industrial IoT information data to a certain extent.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer