SlideShare a Scribd company logo
1 of 2
Download to read offline
Quality assurance using vision systems
Automated Surface inspection on products at factory floor using camera systems, is
increasingly gaining momentum. Flaws and defects are detected at the production line.
Automated surface inspection is being widely adopted in factories as a manner of
 Saving man power
 Reducing defect escape rates
 Increasing speed of flaw and defect detection
Problem- System needs to adapt
Traditional surface inspection methods fall short in producing consistent zero false
inspection rates when the following conditions occur in combination or separately.
 Light conditions vary significantly from the conditions that existed under
parameter design and test
 Product surface shininess and color changes form part-to-part or from batch-to-batch
 Product surface background varies
 Defects change appearance and shape
 Defects appear on different surface backgrounds
 Normal artifacts on surfaces resemble defects
 New defect types arise
When that happens, the vision inspection system would require adjustments. Such adjustments often
involve both SW and HW changes including parameter optimization to adapt the system to the changes and
keep low false detection rates. This adaptation process is expensive in terms of system uptime and cost.
The process will also be repeated every time a new condition happens.
Solution- Artificial intelligence
Machine learning provides and easy and cheap method of adaptation to changing
conditions. Extremely smart systems adapt themselves automatically. They learn new
appearances of defects and build robustness against changes in surface backgrounds
and illumination conditions. More realistic systems require intervention from
experienced operators to aid learning new defect types and surface backgrounds. The frequency of needed
operator intervention declines as function of successful trainings as the system learns in a progressive
manner.
Concurrent Vision Developed an intelligent surface inspection Software. The software
is based on a powerful machine learning algorithm and a number of proven efficient feature
detection methods. The feature detection methods have all their strong and weak sides with
respect to a given problem. In system design phase, the feature detection methods are
selected and combined to complement each other in gaining significant features from image
patches. These features do carefully characterize different backgrounds and defects in their
range of variation. A deep neural network uses these features to learn how different defects
or flaws would appear in a wide variety of occurrences. In the training and validation phase,
experienced quality inspection operators monitor false detection rates and use facilities in the
provided graphical user interface to optimize the performance.
The whole method shows to be robust against changes. Systems based on the method are
characterized by
 Long life time
 High system uptime
 Fast and easy adaptation

More Related Content

What's hot

What's hot (20)

ISDD Testing
ISDD TestingISDD Testing
ISDD Testing
 
Appetite For Risk - Continuous Delivery In A Regulated Environment
Appetite For Risk - Continuous Delivery In A Regulated EnvironmentAppetite For Risk - Continuous Delivery In A Regulated Environment
Appetite For Risk - Continuous Delivery In A Regulated Environment
 
Software Testing
Software Testing Software Testing
Software Testing
 
Glimpse and Benefits of Testing
Glimpse and Benefits of TestingGlimpse and Benefits of Testing
Glimpse and Benefits of Testing
 
FUNDAMENTAL TEST PROCESS
FUNDAMENTAL TEST PROCESSFUNDAMENTAL TEST PROCESS
FUNDAMENTAL TEST PROCESS
 
Mobile Application Testing Process
Mobile Application Testing ProcessMobile Application Testing Process
Mobile Application Testing Process
 
Optimizing fault injection in FMI co-simulation through sensitivity partitioning
Optimizing fault injection in FMI co-simulation through sensitivity partitioningOptimizing fault injection in FMI co-simulation through sensitivity partitioning
Optimizing fault injection in FMI co-simulation through sensitivity partitioning
 
Parallel simulation
Parallel simulationParallel simulation
Parallel simulation
 
Software testing companies to monitor programs
Software testing companies to monitor programsSoftware testing companies to monitor programs
Software testing companies to monitor programs
 
Fundamental test process
Fundamental test processFundamental test process
Fundamental test process
 
Fundamental test process
Fundamental test processFundamental test process
Fundamental test process
 
“Elemental elements”
“Elemental elements”“Elemental elements”
“Elemental elements”
 
Fundamentals of testing
Fundamentals of testingFundamentals of testing
Fundamentals of testing
 
Online examination system
Online examination systemOnline examination system
Online examination system
 
Pmt 05
Pmt 05Pmt 05
Pmt 05
 
Test Environment Management KPI
Test Environment Management KPITest Environment Management KPI
Test Environment Management KPI
 
Fundamentals of testing jef (2)
Fundamentals of testing jef (2)Fundamentals of testing jef (2)
Fundamentals of testing jef (2)
 
Navin Latest
Navin LatestNavin Latest
Navin Latest
 
Java performance monitoring
Java performance monitoringJava performance monitoring
Java performance monitoring
 
ALM Value Brief
ALM Value BriefALM Value Brief
ALM Value Brief
 

Similar to Concurrent vision technology

MBT_Installers_Dev_Env
MBT_Installers_Dev_EnvMBT_Installers_Dev_Env
MBT_Installers_Dev_Env
Chris Struble
 
Asp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ AbstractsAsp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ Abstracts
ncct
 
2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport
abhishekroushan
 

Similar to Concurrent vision technology (20)

Leveraging Self-Healing Techniques to Foster Sustainable Automation Scripts.pdf
Leveraging Self-Healing Techniques to Foster Sustainable Automation Scripts.pdfLeveraging Self-Healing Techniques to Foster Sustainable Automation Scripts.pdf
Leveraging Self-Healing Techniques to Foster Sustainable Automation Scripts.pdf
 
Machine Vision: The Key Considerations for Successful Visual Inspection
Machine Vision: The Key Considerations for Successful Visual InspectionMachine Vision: The Key Considerations for Successful Visual Inspection
Machine Vision: The Key Considerations for Successful Visual Inspection
 
A010510109
A010510109A010510109
A010510109
 
Guidelines for Choosing and Implementing a Machine Vision System
Guidelines for Choosing and Implementing a Machine Vision SystemGuidelines for Choosing and Implementing a Machine Vision System
Guidelines for Choosing and Implementing a Machine Vision System
 
Plant Maintenance & Condition Monitoring
Plant Maintenance & Condition MonitoringPlant Maintenance & Condition Monitoring
Plant Maintenance & Condition Monitoring
 
MBT_Installers_Dev_Env
MBT_Installers_Dev_EnvMBT_Installers_Dev_Env
MBT_Installers_Dev_Env
 
Testability
TestabilityTestability
Testability
 
Automated-test-equipment-Blog-Digilogic Systems
Automated-test-equipment-Blog-Digilogic SystemsAutomated-test-equipment-Blog-Digilogic Systems
Automated-test-equipment-Blog-Digilogic Systems
 
Need for automation testing
Need for automation testingNeed for automation testing
Need for automation testing
 
Class17
Class17Class17
Class17
 
Unit 5 st ppt
Unit 5 st pptUnit 5 st ppt
Unit 5 st ppt
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognition
 
Asp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ AbstractsAsp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ Abstracts
 
Modern Formal Methods in Software Engineering.pptx
Modern Formal Methods in Software Engineering.pptxModern Formal Methods in Software Engineering.pptx
Modern Formal Methods in Software Engineering.pptx
 
SE2018_Lec 19_ Software Testing
SE2018_Lec 19_ Software TestingSE2018_Lec 19_ Software Testing
SE2018_Lec 19_ Software Testing
 
Benefits And Challenges of Rapid Automation Testing.pdf
Benefits And Challenges of Rapid Automation Testing.pdfBenefits And Challenges of Rapid Automation Testing.pdf
Benefits And Challenges of Rapid Automation Testing.pdf
 
Testing type
Testing typeTesting type
Testing type
 
Types
TypesTypes
Types
 
2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport
 
Navigating Automated Testing_ Avoiding Common Pitfalls.pdf
Navigating Automated Testing_ Avoiding Common Pitfalls.pdfNavigating Automated Testing_ Avoiding Common Pitfalls.pdf
Navigating Automated Testing_ Avoiding Common Pitfalls.pdf
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 

Concurrent vision technology

  • 1. Quality assurance using vision systems Automated Surface inspection on products at factory floor using camera systems, is increasingly gaining momentum. Flaws and defects are detected at the production line. Automated surface inspection is being widely adopted in factories as a manner of  Saving man power  Reducing defect escape rates  Increasing speed of flaw and defect detection Problem- System needs to adapt Traditional surface inspection methods fall short in producing consistent zero false inspection rates when the following conditions occur in combination or separately.  Light conditions vary significantly from the conditions that existed under parameter design and test  Product surface shininess and color changes form part-to-part or from batch-to-batch  Product surface background varies  Defects change appearance and shape  Defects appear on different surface backgrounds  Normal artifacts on surfaces resemble defects  New defect types arise When that happens, the vision inspection system would require adjustments. Such adjustments often involve both SW and HW changes including parameter optimization to adapt the system to the changes and keep low false detection rates. This adaptation process is expensive in terms of system uptime and cost. The process will also be repeated every time a new condition happens. Solution- Artificial intelligence Machine learning provides and easy and cheap method of adaptation to changing conditions. Extremely smart systems adapt themselves automatically. They learn new appearances of defects and build robustness against changes in surface backgrounds and illumination conditions. More realistic systems require intervention from experienced operators to aid learning new defect types and surface backgrounds. The frequency of needed operator intervention declines as function of successful trainings as the system learns in a progressive manner.
  • 2. Concurrent Vision Developed an intelligent surface inspection Software. The software is based on a powerful machine learning algorithm and a number of proven efficient feature detection methods. The feature detection methods have all their strong and weak sides with respect to a given problem. In system design phase, the feature detection methods are selected and combined to complement each other in gaining significant features from image patches. These features do carefully characterize different backgrounds and defects in their range of variation. A deep neural network uses these features to learn how different defects or flaws would appear in a wide variety of occurrences. In the training and validation phase, experienced quality inspection operators monitor false detection rates and use facilities in the provided graphical user interface to optimize the performance. The whole method shows to be robust against changes. Systems based on the method are characterized by  Long life time  High system uptime  Fast and easy adaptation