Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Research On Visual Inspection Algorithm Of Crimping Appearance Defects For Wiring Harness Terminals, Bingan Yuan, Mingen Zhong, Jingxin Ni May 2022

Research On Visual Inspection Algorithm Of Crimping Appearance Defects For Wiring Harness Terminals, Bingan Yuan, Mingen Zhong, Jingxin Ni

Journal of System Simulation

Abstract: Aiming at the low efficiency and high missing rate of wiring harness terminals, an image detection method based on machine vision is proposed. The characteristic parameters of five typical defects in three main parts of wiring harness terminals are analyzed and defined. Tthe algorithms of extracting positioning datum, segmenting inspected-parts adaptively, extracting the defect features and calculating the characteristic parameters are designed respectively, and the defects criterions are given. The experimental results show that the algorithms are suitable for single defect and multi-class defects, both the miss detection rate and the false positiveness rate are low. The accuracy and …


Image Provenance Analysis, Daniel Moreira, William Theisen, Walter Scheirer, Aparna Bharati, Joel Brogan, Anderson Rocha Apr 2022

Image Provenance Analysis, Daniel Moreira, William Theisen, Walter Scheirer, Aparna Bharati, Joel Brogan, Anderson Rocha

Computer Science: Faculty Publications and Other Works

The literature of multimedia forensics is mainly dedicated to the analysis of single assets (such as sole image or video files), aiming at individually assessing their authenticity. Different from this, image provenance analysis is devoted to the joint examination of multiple assets, intending to ascertain their history of edits, by evaluating pairwise relationships. Each relationship, thus, expresses the probability of one asset giving rise to the other, through either global or local operations, such as data compression, resizing, color-space modifications, content blurring, and content splicing. The principled combination of these relationships unveils the provenance of the assets, also constituting an …