Effect of Correlating ImageThreshold Values with Image Gradient Field on Damage Detection in Composite Structures
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 4
Abstract
Effect of image threshold level variation is studied and proved to be a critical factor in damage detection and characterization of impacted composite Reaction Injection Molding ((RIM) structures. The variation of threshold is used as an input to both gradient field algorithm and segmentation algorithm. The choice of optimum threshold for a tested composite type is achieved as a result of correlation between the resulted gradient field images and segmented images. Type and extent of damage is also analyzed using detailed pixel distribution as a function of both impact energy and threshold level variation. The demonstrated cascading based technique is shown to be promising for an accurate testing and classification of damage in composite structures in many critical areas such as medical, aerospace and automotive.
Authors and Affiliations
Mahmoud Zaki Iskandarani
Developing Agriculture Land Mapping using Rapid Application Development (RAD): A Case Study from Indonesia
The use of Information and Communication Technology (ICT) in agriculture has become one of the steps to improve agricultural efficiency, effectiveness, productivity, and also expected to encourage the creation of Precisi...
Transforming Higher educational institution administration through ICT
The rapid development in Indian higher education sector has increased the focus on reforms in higher educational institution administration. Efficiency and accountability have become important elements, and the integrati...
An Adaptive Hybrid Controller for DBMS Performance Tuning
Performance tuning process of database management system (DBMS) is an expensive, complex and time consuming process to be handled by human experts. A proposed adaptive controller is developed that utilizes a hybrid model...
Sentiment Classification of Twitter Data Belonging to Saudi Arabian Telecommunication Companies
Twitter has attracted the attention of many re-searchers owing to the fact that every tweet is, by default, public in nature which is not the case with Facebook. In this paper, we present sentiment analysis of tweets wri...
A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture
The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in t...