共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
This paper presents the limitations of the helium leak test when applied to typical MEMS packages. A novel closed-form expression
is presented which allows the determination of the minimum cavity volume package that can be accurately tested using the helium
leak test method in conjunction with a standard gross leak test. This expression can be used to find optimum test parameters
for packages with cavity volumes greater than 2.6 × 10−3 cm3. Hermeticity testing using FTIR and Raman spectroscopy are considered as potential methods to overcome the limitations of
the helium leak test method. 相似文献
3.
《Control Engineering Practice》2001,9(6):673-682
A multi-leak detection system for pipelines is designed and tested. The multi-leak detection problem is solved using only sensors of flow and pressure at the extremes of the duct, and using the analytical redundancy given of these measurements. The leak detection design is based on a distributed pipeline model that is discretized in space and assumes a set of leaks distributed through the duct. Leak location is accomplished by evaluating the residuals of a bank of unknown input observers that are robust against one leak and sensitive to the rest. Simulation and experimental results are reported to demonstrate the effectiveness of the proposed approach when two leaks appear simultaneously. 相似文献
4.
Dong-Hyuk Lee Hyungpil Moon Ja Choon Koo Hyouk Ryeol Choi 《International Journal of Control, Automation and Systems》2013,11(1):127-135
This paper presents a map building method for an in-pipe robot to navigate inside urban gas pipelines autonomously, whose configuration is unknown or partially known. In the first, we explain the reason why the navigation in the pipeline is difficult and then, present a method for obtaining a robot’s posture by using a pipeline’s unique geometrical features. The robot can obtain its heading direction by detecting the standardized geometries of pipe elements. Based on the method, we propose a robot controller consisting of discrete and continuous controllers. The discrete controller is activated by pre-defined events and generates appropriate paths for exploration. The continuous controller receives the desired path and physically moves the robot to the desired path. The method is implemented in an in-pipe robot, called MRINSPECT-V and its effectiveness is validated. 相似文献
5.
6.
Water companies require quick methods of identifying leakage from rural subterranean aqueducts over large areas. This research assessed the possibility of locating water leaks using airborne remotely sensed data and thus considered if such leaks expressed unique and identifiable features. Analysis of soil moisture and vegetation biomass inferred using Airborne Thematic Mapper imagery enabled two known leaks to be highlighted as distinct from their immediate surroundings on the Vyrnwy Aqueduct, North West England. 相似文献
7.
基于负压波法的输油管道泄漏检测定位系统 总被引:6,自引:0,他引:6
为实现对石油管道的泄漏进行检测并定位,简要分析了国内外输油管道泄漏检测定位方法及其应用现状,重点研究了负压波泄漏检测与定位算法在实际中的应用.尤其对负压波定位公式中需要的首、末站压力拐点的时间差,即各站压力下降的拐点寻找进行了比较深入的研究与分析.在此基础上设计了一套基于ADAM5510的泄漏检测系统,给出了系统的总体组成结构、各部分功能及软件设计思想.现场试验表明设计的泄漏检测与定位方法具有实用价值. 相似文献
8.
Xuan-Yin Wang Chang-Wei Wu Ke Xiang Sen-Wei Xiang Wen Chen 《Machine Vision and Applications》2018,29(4):677-687
Recently, many superpixels detection methods have been proposed and used in various applications. We are interested in which method is more suitable for the application of contour detection. In this paper, superpixels are evaluated on BSDS500 dataset in two different aspects. On the one hand, contours are directly provided by the boundaries of superpixels and experiments show that better results could be achieved by the superpixels with irregular shapes than those with regular shapes and similar sizes. On the other hand, contours are further detected from those candidate positions which are confirmed by the boundaries of superpixels through the operation of dilation. In this situation, experiments show that competitive results could also be achieved by some superpixels with regular shapes and similar sizes. Besides, we propose a superpixels detection method called watershed-based graph (WG), by which superpixels with irregular shapes could be produced. Firstly, a graph is constructed from an over-segmented map which is achieved through a watershed algorithm. Then, to get the desired superpixels, the graph is segmented by merging neighbor segments in an order of decreasing similarity. Experiments show that higher efficiency could be achieved by WG with a moderate worse contour quality than its original graph-based method. 相似文献
9.
10.
Graph regularization methods for Web spam detection 总被引:1,自引:0,他引:1
We present an algorithm, witch, that learns to detect spam hosts or pages on the Web. Unlike most other approaches, it simultaneously exploits the structure of the Web graph as well as page contents and features. The method is efficient, scalable, and provides
state-of-the-art accuracy on a standard Web spam benchmark. 相似文献
11.
Evaluating deadlock detection methods for concurrent software 总被引:1,自引:0,他引:1
Static analysis of concurrent programs has been hindered by the well-known state explosion problem. Although many different techniques have been proposed to combat this state explosion, there is little empirical data comparing the performance of the methods. This information is essential for assessing the practical value of a technique and for choosing the best method for a particular problem. In this paper, we carry out an evaluation of three techniques for combating the state explosion problem in deadlock detection: reachability searching with a partial-order state-space reduction, symbolic model checking and inequality-necessary conditions. We justify the method used for the comparison, and carefully analyze several sources of potential bias. The results of our evaluation provide valuable data on the kinds of programs to which each technique might best be applied. Furthermore, we believe that the methodological issues we discuss are of general significance in comparison of analysis techniques 相似文献
12.
13.
14.
An application of a multiple model nonlinear filtering technique is discussed for the detection of leaks in a heat-exchanger process. The results of simulation study and an experimental study on a laboratory heat-exchanger process are presented. A simple decision logic scheme (threshold crossing) is used to process the outputs of the leak-detection algorithm to indicate the status of the process, i.e. whether or not there is a leak. The results of the study provide preliminary indication of the feasibility of the proposed diagnostic technique to detect small leaks in an experimental heat-exchanger process. The study also indicates that the technique is robust in the midst of significant flow disturbances on the inlet water flow, using only simple models for processing of the outlet temperature data, but is sensitive to the aggregate heat transfer parameter used in the detection algorithm 相似文献
15.
Evaluation of methods for ridge and valley detection 总被引:1,自引:0,他引:1
Lopez A.M. Lumbreras F. Serrat J. Villanueva J.J. 《IEEE transactions on pattern analysis and machine intelligence》1999,21(4):327-335
Ridges and valleys are useful geometric features for image analysis. Different characterizations have been proposed to formalize the intuitive notion of ridge/valley. In this paper, we review their principal characterizations and propose a new one. Subsequently, we evaluate these characterizations with respect to a list of desirable properties and their purpose in the context of representative image analysis tasks 相似文献
16.
The iteratively reweighted multivariate alteration detection (IR-MAD) algorithm may be used both for unsupervised change detection in multi- and hyperspectral remote sensing imagery and for automatic radiometric normalization of multitemporal image sequences. Principal components analysis (PCA), as well as maximum autocorrelation factor (MAF) and minimum noise fraction (MNF) analyses of IR-MAD images, both linear and kernel-based (nonlinear), may further enhance change signals relative to no-change background. IDL (Interactive Data Language) implementations of IR-MAD, automatic radiometric normalization, and kernel PCA/MAF/MNF transformations are presented that function as transparent and fully integrated extensions of the ENVI remote sensing image analysis environment. The train/test approach to kernel PCA is evaluated against a Hebbian learning procedure. Matlab code is also available that allows fast data exploration and experimentation with smaller datasets. New, multiresolution versions of IR-MAD that accelerate convergence and that further reduce no-change background noise are introduced. Computationally expensive matrix diagonalization and kernel image projections are programmed to run on massively parallel CUDA-enabled graphics processors, when available, giving an order of magnitude enhancement in computational speed. The software is available from the authors' Web sites. 相似文献
17.
In this paper, leak detection and localization in water distribution networks will be reviewed. In particular, the paper presents the evolution of the methods from model-based towards data-based approaches, listing, describing and comparing the main and/or most recent methods of both categories. Besides, the practical applicability in real water utilities of different existing methods is discussed, outlining the advantages and limitations of model-based and data-driven methods for this task. A well-known case study is used to compare some of the more promising methods and illustrate their performances. Perspectives of the future evolution of the current existing methods are also provided. 相似文献
18.
19.
20.
内存泄漏是软件系统中常见的一种错误,会持续消耗内存,致使系统运行效率下降,甚至导致系统崩溃。内存泄漏的检测工具主要可以分为两类:一类是使用基于程序扫描分析技术的静态工具;另一类则是监视实时内存分配状态进行判别的动态工具。如何评估工具检测内存泄漏的能力,相关的标准并不明确。通过对内存泄漏的认识与了解,对相关工具能力进行了调研与分析,提出了一个内存泄漏工具的评估标准。 相似文献