Professional Documents
Culture Documents
Lu 2018
Lu 2018
Lu 2018
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2018.2828811, IEEE
Transactions on Industrial Informatics
Abstract—In most current nondestructive testing systems, methods mainly include information transformation, extrac-
Magnetic flux leakage (MFL) method is widely used in various tion, classification and construction of mapping, etc. For the
industry fields, where the structural integrity of specimens is of practical industrial applications, the defect size can be used to
vital importance. The estimation of defect size in specimen from
the MFL measurements is a key and difficult problem. The tra- guide maintenance and the calculation of defect size is faster
ditional methods have low precision, because feature extraction than the calculation of defect profiles. Therefore, the accurate
procedure relies on prior knowledge and the ability of designer. estimation of defect size is the primary objective of solving
Inspired by the idea of convolutional neural network (CNN), a industrial fault diagnosis. In addition, the accurate defect size
novel visual transformation convolutional neural network (VT- can be used as an initial iterative value to further calculate the
CNN) is proposed in this paper to overcome the limitation of
traditional method in feature extraction procedure. By adding defect profiles [7], [8]. Two major research directions have
a visual transformation layer according to the characteristics of been proposed to address this issue, including model based
MFL measurements, the VT-CNN can distinguish defect feature and model free.
with different sizes more accurately. Moreover, since the VT- Model based methods usually apply physical model to
CNN method is designed based on deep learning theory, more obtain MFL simulation values of assumed defect. The physical
industrial big data with accurate label should be used to train the
network. Due to the difficulty of making real industrial big data, model can be analytical model [9], numerical model such as
a novel mesher magnetic dipole model is designed to simulate the finite-element method (FEM) [10], neural networks [11],
this industrial process. A large simulated MFL measurements [12], and so on. Compared the difference between simulation
of irregular defects produced by this model can increase the values and original measurements, the assumed defect size is
number of training samples and improve the robustness of the modified iteratively in order to approach the real size. Many
network. Experiments to estimate natural corrosion defects on
real industrial pipelines are performed to validate the proposed optimization algorithms are applied to the comparing process,
framework. The experimental results are illustrated in detail, such as space mapping optimization [9], Gauss-Newton opti-
which highlights the superiority of the proposed method in mization [10], combination of gradient descent and simulated
industrial applications. annealing [11], cuckoo search optimization [4], and so on.
Index Terms—Fault detection, Magnetic flux leakage, Convo- Model based methods are accurate and quite suitable for
lutional neural network, Visual transformation, Mesher magnetic handling the defects with complex shape, but they are difficult
dipole, Intelligence fault diagnosis. to use in industrial applications. Due to the complexity of
industrial conditions, the physical parameters of the model
I. I NTRODUCTION can hardly be obtained. The errors of the physical model will
decrease the precision rate of final results. Furthermore, it is
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2018.2828811, IEEE
Transactions on Industrial Informatics
low accuracy is that much useful information hidden within a threshold, the signal has two peaks. On the contrary, if the
the measurements will be lost during the feature extraction defect length is less than the threshold, the signal has only
process, because the feature extraction methods depend on one peak.
most of the prior knowledge [21], and it is often artificially-
designed [22], [23]. Therefore, how to solve the problems of
information extraction and processing are the key to obtain 160
high-precision defect size. signal area
MFL Responce(Gs)
140
To overcome the problems above and improve the estimated peak-to-valley
flux density
120
accuracy, a precise estimation method of defect size from
MFL measurements using visual transformation convolutional 100
neural network (VT-CNN) has been proposed in this paper. 80 valley-to-valley distance 60
40
Inspired from the traditional convolutional neural network 20 40 60
20
(CNN) [24], a novel layer called visual transformation layer Axi. distance(mm) Cir. distance(mm)
has been involved in the CNN to highlight the characteristic (a) (b)
information of defect MFL measurements. The visual trans-
Fig. 1. (a) MFL measurements of the defect collected from the detector.
formation layer can transform the original MFL measurements (Axi. represents axial and Cir. represents circumferential) (b) Gray image
to a three-dimensional image at any angle of view. These after converting
transformed images can better describe the contour of defect
measurements in three-dimensional space. It can improve the
identity of input sample set, and increase the accuracy of the Establish
training network. Since the CNN method is designed based Acquire Extract
Basic Information Information
Useful Information
on deep learning theory, large number of training samples Relationship
are needed [25]. Therefore, a novel mesher magnetic dipole MFL Inversion
Abnormal area
model is designed to produce training samples. Compared measurement relationship
detection
with typical magnetic dipole model, this new model can not collection modeling
only establish rectangular defect model, but also can establish
irregular defect model by meshing the defect to a small Data Signal feature Defect size
rectangle element. A huge number of MFL data with accurate preprocessing extraction estimation
labels of defect size simulated by the mesher magnetic dipole
model can be used as training samples for VT-CNN and Fig. 2. Flow chart of MFL testing in industrial applications for estimating
improve the robustness of VT-CNN. This method can not only defect size.
reduce the demand of prior knowledge, but also improve the
estimated accuracy of defect size and make it more adaptive The flow chart of MFL testing in industrial applications
in industrial systems. for estimating defect size can be represented as Fig. 2. It
The paper is organized as follows. In Section II, the includes 3 information processing procedures: basic informa-
principle of MFL testing and the problem presentation are tion acquisition, useful information extraction and informa-
introduced. The architecture of the proposed VT-CNN for tion relationship establishment. Firstly, MFL measurements
estimating defect size is presented in Section III. Then, in obtained from industrial field need to be preprocessed. It
Section IV, the sample set including experimental data and usually includes data correction, compensation and filtering,
simulation data is described. In Section V, the training proce- and data preprocessing can improve signal to noise ratio.
dure and simulation results are illustrated in detail. The results Secondly, the abnormal areas of MFL measurements need to
of different methods are compared and discussed in Section be detected [26], and the signal features need to be extract
VI. At last, concluding remarks are provided in Section VII. [17]. Signal features are designed by artificial based on the
prior knowledge, and a feature extractor is also designed to
calculated the measurement features. The features generally
II. PRINCIPLE OF MFL TESTING AND PROBLEM
include peak-to-valley flux density (the maximum absolute
PRESENTATION
differences of field density in MFL region), valley-to-valley
The basic principle of the MFL testing is that a powerful distance (the effective length of MFL region), signal area (the
magnet is used to magnetize the ferromagnetic metal. At areas magnetic field energy of the defect in MFL region) [19], [20],
where there is a defect, a high fraction of magnetic field leaks and so on as shown in Fig. 1(a). Thirdly, an estimation model
from the wall of the defect into the air. This flux leakage is is designed as a nonlinear equation or an intelligent network
measured by a Hall sensor and used to estimate the defect [13]. The training or fitting process of the model needs a set
size. Fig. 1(a) shows the MFL measurements collected from of samples with known defect size and signal features well
the detector. The MFL measurements are the intensity of the calculated. Finally, the results of defect size are estimated
magnetic field, and the unit is Gauss. The data type of MFL by inputting signal features into the model. The size of the
measurements is floating-point, and the sampling sensitivity defect consists of three dimensions which are length, width
is 0.1Gs. The defect signals on each sensor have two valleys and depth, in industrial applications. For an irregular defect
and one or two peaks. When the defect length is greater than (the shape of the defect is not a cube), the length, width and
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2018.2828811, IEEE
Transactions on Industrial Informatics
depth of the outer cube of the defect geometry represent the into gray value. It can be seen that the brightness of the image
size of the irregular defect. indicates the signal amplitude. Some signal features such as
There are two factors that affect the precision of defect size the amplitude variation trend are hard to recognize from the
estimation. One is the structure of the estimation model. In image. If this image is entered directly into the CNN, the CNN
traditional methods, signal features are the input variables of is difficult to extract useful features and estimates accurate
the model, and most of these features are artificially designed. defect size.
This structure is likely to lose the important information of In order to solve the above problems, a new VT-CNN archi-
signals reducing the identifiability of the defect size. By com- tecture is proposed in this paper. A novel visual transformation
paring the results estimated by different features, the following layer is added in the original CNN architecture to highlight
conclusions can be given. (1) The estimation accuracy is quite signal features. The architecture of VT-CNN consists of visual
different by choosing different features to estimate the defect transformation layer, convolutional layer, pooling layer, and
size. (2) If the selection of features is not reasonable, the fully connected layer as illustrated in Fig. 3.
estimated size will have a large deviation compared with
the real size. For example, if the feature vectors are short
of a feature that can significantly reflect the defect length A. Visual transformation layer
(like ‘valley-to-valley distance’), the estimation error of the The visual transformation layer is a novel layer proposed
defect length will be greatly increased. (3) If the feature in this paper for solving the issue of inconspicuous feature
such as the max frequency (the maximum value of signal in of raw MFL images. As described in [29], gray values of
frequency domain, which has little relationship with MFL) the raw MFL image are obtained by linear transformation of
is considered, the estimation accuracy will not be increased, MFL measurements. And then a two-dimensional(2D) matrix
but will be reduced. It shows that feature selection is a key of gray values is arranged by spatial distribution of sampling
problem, especially for the problem of estimating defect size points. The raw MFL image is shown in Fig. 1(b).
in industrial pipelines. The main idea of visual transformation layer is to convert
Another key factor is the number of samples. In industrial plane images into stereograms. The positions of sampling
applications, the samples are built by imitating a series of points are considered as X value and Y value of the stere-
representative defects in specimens. Due to the high cost of ogram, and the field intensity value of MFL measurements is
processing, the number of samples is limited. The lack of considered as Z value. The stereogram of MFL image can
samples will greatly affect the estimated accuracy. From the be drawn in different 3D visual angle as shown in Fig. 5
comparison experiment that different numbers of samples are by using the plotting method (function ‘surf ’) in MATLAB
used to train the estimation model, the estimated accuracy software. The visual angle (θvisual (Az, El)) is represented
is improved with the increasing of the number of samples. by two angle values azimuth angle and elevation angle. The
The main reason for improving the accuracy is that a large mapping relation of the visual transformation layer is nonlinear
number of training samples can improve the robustness of the function as shown in Eq. 1 and 2. The main idea of the
estimation model effectively. nonlinear function is to get a transformation plane based on
From the above analysis, the traditional method combined the visual angle and then make the original measurements
feature extraction with modeling is not satisfactory in indus- projected to this plane.
trial pipelines with the development of industrial technology.
Z( b Yb ) = kV (X,
b X, b Yb )k2 (1)
A new method should be find to solve the above key problems
and improve the estimated accuracy. (
b Yb ) 6= f (X, Y, Z, θ);
b Yb ) = 0,
V (X,
(X,
(2)
Z(X, Y ), (X,
b Yb ) = f (X, Y, Z, θ).
III. A RCHITECTURE OF THE P ROPOSED M ODEL
The traditional CNN has been mainly influenced by Hubel where V (X, b Yb ) represents the projection vector of the original
and Wiesels early work on the vision cortex working mecha- measured value Z(X, Y ) in the new (X, b Yb ) coordinate. If
nisms of mammalian brain [27]. It has been used successfully there is no point transformed on the coordinate, there is no
in many different applications such as the recognition of projection in this coordinate, and the projection vector of the
handwriting, printed character, face recognition, and so on. coordinate is equal to 0. X and Y represent the x-y position
Instead of human-designed features, CNN can automatically of the input matrix. Z(X, Y ) represents the value of the input
mine and generate deep features of input data [28]. So, it is matrix in the position of (X, Y ). X b and Yb represent the x-y
one of the most effective models in settling the estimation position of the output matrix. Z(X, Yb ) represents the value of
b b
problem of defect size. the output matrix in the position of (X, b Yb ). k · k2 represents
However, the simple application of CNN can’t get higher the solution of 2-norm, and the function f represents rotation
accuracy and satisfy the industry requirements. The main equation of x-y coordinates.
reason is that MFL signal is different from the recognizable Firstly, the original point needs to be projected onto the
image. The magnetic field intensity of each sampling point corresponding coordinate plane as shown in Fig. 4. Secondly,
in test specimen is measured by Hall sensor array and stored the coordinate (X,Y ) is rotated on the x-y plane, and the
as MFL signal. So, the MFL signal can be converted into an rotation angle is θAz . Thirdly, the coordinate Y is rotated on
image, as shown in Fig. 1, by converting the measured value the y-z plane, and the rotation angle is θEl and the coordinate
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2018.2828811, IEEE
Transactions on Industrial Informatics
Fig. 3. The architecture of the proposed visual transformation convolutional neural network.
z y z
New
Original I Az IV El
IV Y Z
III
Y II Z III
x
II
I
x y
y X X Y Y
(a) (b) (c)
(a) (b) (c)
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2018.2828811, IEEE
Transactions on Industrial Informatics
C. Pooling layer
As another important concept of CNNs, pooling is a form of Inlet
non-linear down-sampling [32], [33]. The pooling layer with
filters of size (p×p) is applied to discard (100−100/(p×p))%
of the activations. There are several non-linear functions to im-
plement pooling among which max and mean pooling are the
most common. Every p × p segment is represented by its max
or mean value. The advantage of pooling operation is down-
sampling the convolutional output, thus reducing the spatial Outlet
size of the representation and the amount of computation in
the network, and also control overfitting.
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2018.2828811, IEEE
Transactions on Industrial Informatics
to the outlet under the pressure of the fluid. And then, the dipoles generate a magnetic field outside the metal, which is
detector is taken out from the outlet. Finally, the data stored equivalent to a leakage magnetic field. The magnetic field
in the recording module is exported as the experimental data. dH generated at a distance r by each element of charge
1000 experimental samples with some uncertainties and noises dp=σs dydz is given by Eq. 8.
including testing velocity, sensor liftoff, and shape irregularity dp
are collected. A picture of an artificial defect on the outside dH(x, y, z) = ·r (8)
4πr3
surface of a pipe is shown in Fig. 9(a). The MFL curves,
σms
raw MFL image and transformed MFL image are shown in x (x, y, z)= 4π ×
H
Fig. 9(b)-(d). These 1000 MFL data can’t be directly used to √ z(x+l)
train the deep learning network based on model free method. arctan (y−w) (x+l)2 +(y−w)2 +z2
The number of samples usually need to be increased by
− arctan √ z(x+l)
2 2 2
generalizing the existing data. This generalization method can (y+w) (x+l) +(y+w) +z
satisfy the requirements of the number of training samples, but
+ arctan √ (z+d)(x+l)
2 2 2
the trained network is difficult to satisfy the estimated accuracy (y+w) (x+l) +(y+w) +(z+d)
of defect size in industrial applications. Therefore, a novel
− arctan √ (z+d)(x−l)
mesher magnetic dipole model is proposed in the following to
(y+w) (x−l)2 +(y+w)2 +(z+d)2
(9)
generate simulation data and increase the number of sample
+ arctan √ z(x−l)
2 2 2
set. (y+w) (x−l) +(y+w) +z
√ z(x−l)
− arctan
(y−w) (x−l)2 +(y−w)2 +z 2
(z+d)(x−l)
120
+ arctan √
W=20mm
D=3mm 2 2 2
MFL Responce(Gs)
The electromagnetic phenomena underlying MFL systems where n and m represent the size of the mesh. The intensity
comply with Maxwells equations in a nonlinear permanent of the leakage field in a given point is approximated by a sum
magnet. This leads to Eq. 7. of the leakage fields of the corresponding set of rectangular
defects.
1
∇× ∇ × A = Js (7) The calculated MFL response of the defect with the profiles
µ in Fig. 10(a) is describe by curves, raw image and transformed
where µ, Js and A are the permeability of vacuum, the current image in Fig. 10(b). The more detailed the mesh is, the higher
density, and the magnetic vector potential, respectively. The accuracy of the simulation MFL response is. In this paper, the
magnetic flux density B = ∇ × A, and the function enforces size of the mesh is set to 1mm*1mm and the sampling interval
the Coulomb gauge ∇·A = 0, which ensures a unique solution is set to 2mm. The defect model is generated by initializing the
of equation. defect length L(from 0mm to 40mm), the defect width W(from
In analytical approaches, the magnetic leakage flux is for- 0mm to 40mm), and the defect depth D(from 0mm to the
mulated mathematically by a dipole model. These magnetic maximum of wall thickness) randomly. Next, draw a matrix M
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2018.2828811, IEEE
Transactions on Industrial Informatics
circumference distance (y-direction)(mm) 5 the whole samples do not have exactly the same sample (the
110
5 4 same input data and the same output dimension). Then the
MFL Responce(Gs)
100
3
CNN is trained according to the following several steps:
10 90 Step 1: Initialize the visual angles, convolution kernels,
2
80 weights and bias with random numbers. Select a learning rate
15
1 70 η = 0.8.
60
20 0 60 20
40 Step 2: Choose a training sample from the training set
5 10 15 20 10 20 30 40 50 60
axial distance (x-direction) (mm) Axi. distance(mm) Cir. distance(mm) randomly.
(a) (b) Step 3: Draw the transformed image V1 in the view of
θvisual by MATLAB software as shown in Fig. 11, according
to the raw training MFL image.
Step 4: Calculate the output of each convolutional and
pooling layers C2 , P3 , C4 , P5 as shown in Fig. 11.
Step 5: Calculate the output of fully connecting layer F6 .
Step 6: Calculate the output of output layer, which can be
written by Eq. 11.
XM
O = f( Fi w0 (i) + b0 ) (11)
i=1
(c) (d) where w0 and b0 represent the connection weights between the
feature layer and the output layer and the bias of the output
Fig. 10. MFL response of a simulated defect and images before and after layer, respectively. Function f is f (x) = max(0, min(1, x))
visual transformed. (a) Thermodynamic diagram of the defect depth. (b) MFL
response. (c) 2D image before visual transformed. (d) 3D image after visual which represents the activation function of output layer.
transformed. Step 7: Choose another training sample and go to Step 3
until all the samples in the training set have been trained.
Step 8: Calculate the training error, and it can be written by
with depth value in the range of L and W, and the maximum Eq. 12.
of the matrix is D. Finally, calculate the MFL response by n n
the depth matrix by using Eq. 9 and 10. 29000 simulation 1X 2 1 X 2
E= e(k) = O (k) − y(k) (12)
defects with arbitrary profiles are produced randomly and their n n
k=1 k=1
MFL responses are calculated to build the simulation data set.
Combined experiment data set with simulation data set, thirty Step 9: Update the visual angle, weights and bias by the
thousand sample data are made into the sample set to train gradient descent method in (13).
and test the proposed network. ∂E
P =P −η (13)
∂P
V. T RAINING P ROCEDURE AND S IMULATION R ESULTS where P represents the parameters that need to be updated,
The specific architecture of VT-CNN applied in this paper and it includes θvisual , wr , br , w0 and b0 .
is illustrated in Fig. 3. The pixel size of a raw input MFL Step 10: Increase the iteration number. If the iteration
image is 40*40, and the pixel size of the transformed image number is equal to the maximum value which is set previously,
is 32*32. The kernel depth and size of each convolution layer terminate the algorithm. Otherwise, go to Step 2.
are represented by dc2 = 6, dc4 = 12, kc2 = 5 and kc4 =
5. The pooling size of each pooling layer is represented by
p3 = 2 and p5 = 2. ReLU and max pooling are employed
as the nonlinear activation function and pooling function. The
specific parameters for each layer are shown in Table. I.
TABLE I
S PECIFIC PARAMETERS FOR EACH L AYER OF VT-CNN
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2018.2828811, IEEE
Transactions on Industrial Informatics
40 40
70
60
Defect length(mm)
30 30
Defect width(mm)
Defect depth(%)
50
20 20 40
30
10 real size 10 real size
20 real size
10-fold results 10-fold results 10-fold results
5-fold results 5-fold results 10 5-fold results
0 0
0 1 2 3 0 1 2 3 0 1 2 3
Test sample number #105 Test sample number #105 Test sample number #105
Fig. 12. Comparison results of estimated value and practical measuring. (a) Defect length. (b) Defect width. (c) Defect depth (the percentage of pipe wall
thickness).
each layer calculated from a particular test sample are shown VI. C OMPARISON AND D ISCUSSION
in Fig. 11. In order to reduce the chanciness of simulation To demonstrate the performance of the proposed method
results, 10 times 10-fold cross validation and 10 times 5-fold in MFL testing of industrial pipelines, several comparative
cross validation have been done to verify the effectiveness of experiments have been designed and the experimental results
the proposed method. These results are sorted according to have been analyzed in detail. First, the effectiveness of the
ascending order of the real size and plotted as curves shown proposed visual transformation layer has been verified by
in Fig. 12. comparing the training results of CNN and VT-CNN. Second,
The defects to be estimated include 290000 simulation de- the practicability of generating simulation data in the process
fects and 10000 real defects. The mean errors of the estimated of setting up data sets has been proved by training and testing
size are listed in Table. II. From this table, the following VT-CNN using different data sets. Third, higher accuracy
conclusions can be given. 1) The proposed VT-CNN can better can be obtained in industrial applications by comparing the
solve the estimation problem for both simulation defects and estimated results of the proposed method with other traditional
real defects. 2) For real defects, the mean estimation errors of methods.
length and width are less than 5mm, and the mean estimation
error of depth is less than 5%. The estimated accuracy satisfies
the requirements of defect detection in industrial applications. A. VT-CNN vs CNN
After a series of simulations and experiments, the projection In order to illustrate the advantages of the proposed net-
plane of θvisual is almost parallel to the direction of the work architecture, a comparison experiment of VT-CNN and
estimated dimension of defects. In practical applications, there typical CNN has been done. For typical CNN, the 2D grey
may exist a little deviation angle between the projection plane image converted from MFL measurement is considered as the
and the direction of the estimated dimension. network input and the defect size is the output. The data sets
In this view of θvisual , the original measurements can be used for training and testing are 30000 samples described in
transformed to an image. The image will be inputted into the section IV. 10 times 10-fold cross validation have been done
VT-CNN and then the VT-CNN will get better features than and the mean estimation errors of each test are shown in Fig.
traditional features. Compared with the traditional features 13.
which can only be extracted by the amplitude change of
10 25
measurements, the features of the image in the view of θvisual length of VT-CNN depth of VT-CNN
length of CNN depth of CNN
will be more conducive to estimate the defect size. The 8 width of VT-CNN
width of CNN
20
Error(%)
15
6
extraction process cannot be observed in different views. 10
4
5
TABLE II 2
M EAN E RROR OF THE E STIMATED S IZE 0
2 4 6 8 10 2 4 6 8 10
Test times Test times
Validation Defects Length(mm) Width(mm) Depth(%)
(a) (b)
Simulation 2.0 3.2 2.5
10-fold Real 3.3 4.2 4.7
Fig. 13. Mean errors of 10-fold cross validation for estimating sample defects.
All 2.1 3.3 2.6
(a) Length and width errors. (b) Depth errors.
Simulation 3.0 3.6 2.8
5-fold Real 3.8 4.7 4.9
All 3.1 3.8 2.9 The next comparison experiment on account of the real
defect has been done to test whether VT-CNN can be better
applied to the actual industrial systems. 300 samples of
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2018.2828811, IEEE
Transactions on Industrial Informatics
100
real defects are selected randomly as test samples, and the TS3
remaining 29700 samples are used as training samples. This 80 TS2
Test numbers
TS1
test has been done for 10 times, and the mean estimation errors 60
of each test are shown in Fig. 14
40
25 20
14 length of VT-CNN depth of VT-CNN
length of CNN 20 depth of CNN 0
12 width of VT-CNN 1 2 3 4 5 6 7 8 9 10
width of CNN
Length error(mm)
Error(mm)
10
Error(%)
15
8
10 (a)
6
5
4
60 TS3
2 0 TS2
Test numbers
2 4 6 8 10 2 4 6 8 10 TS1
Test times Test times 40
(a) (b)
20
Fig. 14. Mean error of each test for estimating real defects. (a) Length and
width errors. (b) Depth errors.
0
1 2 3 4 5 6 7 8 9 10 11 12
In Fig. 13 and 14 the estimation errors of VT-CNN is lower Width error(mm)
than the typical CNN, especially the estimation error of depth. (b)
In industrial applications, the accuracy of depth is the most 100
important. Therefore, the proposed VT-CNN is more suitable 80
TS3
TS2
for solving industrial complex problems.
Test numbers 60
TS1
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2018.2828811, IEEE
Transactions on Industrial Informatics
10
[36]. The kernel function of SVM is radial basis function operators forum (POF) [38], the error in confidence level of
(RBF), and the grid search algorithm is chosen to obtain 80% can be considered as the error reference of a method.
the optimal solution of SVM parameters. The training set The following conclusions can be given from these tables.
of Method B is the remaining 700 real defect samples. The (1) For traditional methods, the number of training sample
intelligent algorithm of Method C is back-propagation neural affects the estimated accuracy of defect. By adding some
network (BPNN) [37]. It consists of three layers of neural simulation samples to the original experimental samples, the
networks, and the number of neurons in the hidden layer is estimated results can be significantly improved. (2) Compared
6. The transfer function of the hidden layer is tan-sigmoid with other methods, the method proposed in this paper can
function, and the learning strategy is Levenberg-Marquardt. reduce the error in estimating the length, width and depth
The training set of Method C is the remaining 700 real defect of defects. (3) The VT-CNN has high accuracy in solving
samples. The intelligent algorithm of Method D is the same estimated problem of defect depth, and can greatly satisfy
SVM with method B. The training set of Method D consists of the industrial demands, even if the measurements have some
29000 simulation samples and the remaining 700 real defect uncertainties and noises.
samples. The intelligent algorithm of Method E is the same
BPNN with method C. The training set of Method E consists D. Discussion about estimation problem of defects
of 29000 simulation samples and the remaining 700 real defect
In the industrial pipeline, most of large defects (larger than
samples.
40mm*40mm) can be split into a number of small defects
TABLE III (smaller than 40mm*40mm) [39], and these large defects can
E STIMATION E RRORS OF D EFECT L ENGTH BY D IFFERENT M ETHODS be called defect clusters. Each small defect can be calculated
Confidence Method separately by the proposed method, and then the large defect
Level A B C D E clusters can be combined with these small defects, according
100% (mm) 5.9 9.2 10.2 8.6 8.5 to the calculation rules of defect clusters in POF.
90% (mm) 5.2 8.0 9.0 7.7 7.5 Changing the following parameters can solve the estimation
80% (mm) 4.6 7.7 8.4 6.3 6.9 problem of large defects, which are hard to be split into small
70% (mm) 4.0 6.6 7.4 6.0 6.4
60% (mm) 3.6 5.6 6.7 5.2 5.8 defects. 1) Increase the size of the input image; 2) Adjust the
50% (mm) 3.4 5.4 6.1 4.9 5.1 VT-CNN parameters to adapt to the input image; 3) Modify
the simulation parameters W and L, and regenerate simulation
samples of large defect size.
From the simulation results as shown in Table. VI (for
TABLE IV
E STIMATION E RRORS OF D EFECT W IDTH BY D IFFERENT M ETHODS defects within 60mm*60mm and 100mm*100mm), the VT-
CNN can still get high accuracy in handling the estimation
Confidence Method
Level A B C D E
problem of large defects. The specific parameters of VT-CNN
are listed in Table VII.
100% (mm) 7.8 11.7 12.6 10.7 11.3
90% (mm) 6.6 11.1 11.7 8.7 9.2 TABLE VI
80% (mm) 5.9 9.4 9.4 8.1 8.4 E STIMATION E RRORS OF L ARGE D EFECTS
70% (mm) 5.2 8.7 9.0 7.7 8.1
60% (mm) 4.9 8.0 8.2 7.3 7.5 Confidence 60mm*60mm 100mm*100mm
50% (mm) 4.3 7.7 7.9 6.4 6.9 Level L-mm W-mm D-% L-mm W-mm D-%
100% 7.1 8.7 8.0 7.9 9.4 8.1
80% 5.8 7.4 7.1 6.1 7.7 6.8
60% 4.1 5.8 5.0 4.5 6.0 4.9
TABLE V
E STIMATION E RRORS OF D EFECT D EPTH BY D IFFERENT M ETHODS
Confidence Method
Level A B C D E TABLE VII
PARAMETERS OF VT-CNN FOR DEFECTS OF 60 MM *60 MM AND
100% (%) 8.6 22.7 23.2 18.7 17.5 100 MM *100 MM
90% (%) 7.7 17.6 18.4 15.4 15.0
80% (%) 7.2 14.0 15.5 10.8 11.1 60mm*60mm 100mm*100mm
70% (%) 6.4 13.1 12.9 9.6 10.1 Parameters Value Parameters Value
60% (%) 5.6 11.6 12.0 9.0 9.5 Input 1@50×50 Input 1@70×70
50% (%) 4.6 10.8 11.5 7.6 8.2 V1 1@42×42 V1 1@60×60
dc2 , dc4 6, 12 dc2 , dc4 6, 12
kc2 , kc4 7, 7 kc2 , kc4 7, 7
The estimation errors of defect size are listed in Table. III, p3 , p5 2, 2 p3 , p 5 3, 3
IV and V, according to the different confidence level. The error
result in confidence level of 100% is the maximum error of all
the results. The error result in confidence level of 60% is the
maximum error of the remaining results after removing 40% VII. C ONCLUSION
largest errors. According to specifications and requirements The method proposed in this paper effectively solves the
for intelligent pig inspection of pipelines written by pipeline estimation problem of defect size in the field of information
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2018.2828811, IEEE
Transactions on Industrial Informatics
11
theory. A new framework (VT-CNN) has been presented for [8] J. Feng, S. Lu, J. Liu, and F. Li, “A sensor liftoff modification method
estimating defect size in industrial pipeline. Benefit from the of magnetic flux leakage signal for defect profile estimation,” IEEE
Transactions on Magnetics, vol. 53, pp. 1–13, July 2017.
visual transforming operation turned raw MFL measurements [9] M. Ravan, R. K. Amineh, S. Koziel, N. K. Nikolova, and J. P.
into 3D image in visual transformation layer (V1), the VT- Reilly, “Sizing of 3-D arbitrary defects using magnetic flux leakage
CNN not only keeps the advantages of CNN, but also solves measurements,” IEEE Transactions on Magnetics, vol. 46, pp. 1024–
1033, April 2010.
the inapplicability of CNN for MFL information. In addition, [10] R. H. Priewald, C. Magele, P. D. Ledger, N. R. Pearson, and J. S. D.
a novel mesher magnetic dipole model for generating training Mason, “Fast magnetic flux leakage signal inversion for the reconstruc-
samples is proposed in this paper. On the basis of a certain tion of arbitrary defect profiles in steel using finite elements,” IEEE
Transactions on Magnetics, vol. 49, pp. 506–516, Jan 2013.
amount of measured samples, adding some simulation samples
[11] J. Chen, S. Huang, and W. Zhao, “Three-dimensional defect inversion
can satisfy the training requirements of the deep learning from magnetic flux leakage signals using iterative neural network,” IET
network, and increase the robustness of the network. Through Science, Measurement Technology, vol. 9, no. 4, pp. 418–426, 2015.
the comparison experiment, it can improve the estimated [12] J. Feng, F. Li, S. Lu, and J. Liu, “Fast reconstruction of defect
profiles from magnetic flux leakage measurements using a rbfnn based
accuracy of length of 26.9%, width of 27.1% and depth of error adjustment methodology,” IET Science, Measurement Technology,
33.3% at least. By using this method to estimate the defect vol. 11, no. 3, pp. 262–269, 2017.
size from MFL information in axial component, the estimation [13] Y. Shi, C. Zhang, R. Li, M. Cai, and G. Jia, “Theory and application
of magnetic flux leakage pipeline detection,” Sensors, vol. 15, no. 12,
error can be reduced to length of 4.6mm, width of 5.9mm and pp. 31036–31055, 2015.
depth of 7.2%. [14] W. Dehui, S. Lingxin, W. Xiaohong, and L. Zhitian, “A novel non-
The limitations of two aspects need to be considered before destructive testing method by measuring the change rate of magnetic
flux leakage,” Journal of Nondestructive Evaluation, vol. 36, p. 24, Mar
using the method proposed in this paper. (1) The length and 2017.
width of the defect that need to be detected cannot exceed [15] S. A. Abbas, Q. Sun, and H. Foroosh, “An exact and fast computa-
the range of length and width of the maximum defect in the tion of discrete fourier transform for polar and spherical grid,” IEEE
training sample. (2) The spatial distribution information of Transactions on Signal Processing, vol. 65, pp. 2033–2048, April 2017.
[16] R. Yan, R. X. Gao, and X. Chen, “Wavelets for fault diagnosis of rotary
magnetic flux leakage needs to be extracted accurately. machines: A review with applications,” Signal Processing, vol. 96, no. 5,
In general, the magnetic field information has radial and pp. 1–15, 2014.
circumferential component, in addition to the axial component. [17] S. Saha, S. Mukhopadhyay, U. Mahapatra, S. Bhattacharya, and G. P.
Srivastava, “Empirical structure for characterizing metal loss defects
How to use the three component information together to fur- from radial magnetic flux leakage signal,” NDT & E International,
ther improve the estimated accuracy of defect is the direction vol. 43, no. 6, pp. 507–512, 2010.
of future research. [18] M. R. Kandroodi, F. Shirani, B. N. Araabi, M. N. Ahmadabadi, and
M. M. Bassiri, “Defect detection and width estimation in natural gas
pipelines using MFL signals,” in 2013 9th Asian Control Conference
ACKNOWLEDGMENT (ASCC), pp. 1–6, June 2013.
[19] D. Mukherjee, S. Saha, and S. Mukhopadhyay, “Inverse mapping of
This work was supported by National Key R&D Program of magnetic flux leakage signal for defect characterization,” NDT & E
China (2017YFF0108800) and National Natural Science Foun- International, vol. 54, no. 3, pp. 198–208, 2013.
[20] H. M. Kim and G. S. Park, “A study on the estimation of the shapes of
dation of China (61673093, 61473069, 61627809, 61433004 axially oriented cracks in CMFL type NDT system,” IEEE Transactions
and 61703087). on Magnetics, vol. 50, pp. 109–112, Feb 2014.
[21] Y. Ma and B. Huang, “Bayesian learning for dynamic feature extraction
with application in soft sensing,” IEEE Transactions on Industrial
R EFERENCES Electronics, vol. 64, pp. 7171–7180, Sept 2017.
[22] C. H. Chan, M. A. Tahir, J. Kittler, and M. Pietikainen, “Multiscale local
[1] H. Hu, B. Tang, X. Gong, W. Wei, and H. Wang, “Intelligent fault phase quantization for robust component-based face recognition using
diagnosis of the high-speed train with big data based on deep neu- kernel fusion of multiple descriptors,” IEEE Transactions on Pattern
ral networks,” IEEE Transactions on Industrial Informatics, vol. 13, Analysis and Machine Intelligence, vol. 35, pp. 1164–1177, May 2013.
pp. 2106–2116, Aug 2017.
[23] O. Abdel-Hamid, A. r. Mohamed, H. Jiang, L. Deng, G. Penn, and D. Yu,
[2] W. Sun, R. Zhao, R. Yan, S. Shao, and X. Chen, “Convolutional
“Convolutional neural networks for speech recognition,” IEEE/ACM
discriminative feature learning for induction motor fault diagnosis,”
Transactions on Audio, Speech, and Language Processing, vol. 22,
IEEE Transactions on Industrial Informatics, vol. 13, pp. 1350–1359,
pp. 1533–1545, Oct 2014.
June 2017.
[3] M. R. Kandroodi, B. N. Araabi, M. M. Bassiri, and M. N. Ahmadabadi, [24] Y. Lecun, L. Bottou, Y. Bengio, and P. Haffner, “Gradient-based learning
“Estimation of depth and length of defects from magnetic flux leakage applied to document recognition,” Proceedings of the IEEE, vol. 86,
measurements: Verification with simulations, experiments, and pigging pp. 2278–2324, Nov 1998.
data,” IEEE Transactions on Magnetics, vol. 53, pp. 1–10, March 2017. [25] Y. Lecun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521,
[4] W. Han, J. Xu, M. Zhou, G. Tian, P. Wang, X. Shen, and E. Hou, no. 7553, pp. 436–444, 2015.
“Cuckoo search and particle filter-based inversing approach to estimat- [26] M. R. Kandroodi, B. N. Araabi, M. N. Ahmadabadi, F. Shirani, and
ing defects via magnetic flux leakage signals,” IEEE Transactions on M. M. Bassiri, “Detection of natural gas pipeline defects using magnetic
Magnetics, vol. 52, pp. 1–11, April 2016. flux leakage measurements,” in Electrical Engineering, pp. 1–6, 2013.
[5] Y. Sun, J. Wu, B. Feng, and Y. Kang, “An opening electric-MFL detector [27] D. H. Hubel and T. N. Wiesel, “Receptive fields and functional archi-
for the NDT of in-service mine hoist wire,” IEEE Sensors Journal, tecture of monkey striate cortex,” Journal of Physiology, vol. 195, no. 1,
vol. 14, pp. 2042–2047, June 2014. p. 215, 1968.
[6] W. Cheng, “Nondestructive testing of back-side local wall-thinning by [28] Y. L. Cun, B. Boser, J. S. Denker, R. E. Howard, W. Habbard, L. D.
means of low strength magnetization and highly sensitive magneto- Jackel, and D. Henderson, “Handwritten digit recognition with a back-
impedance sensors,” IEEE Sensors Journal, vol. 16, pp. 5548–5556, propagation network,” in Advances in Neural Information Processing
July 2016. Systems, pp. 396–404, 1990.
[7] S. Lu, J. Feng, F. Li, and J. Liu, “Precise inversion for the reconstruction [29] J. Feng, F. Li, S. Lu, J. Liu, and D. Ma, “Injurious or noninjurious
of arbitrary defect profiles considering velocity effect in magnetic flux defect identification from MFL images in pipeline inspection using
leakage testing,” IEEE Transactions on Magnetics, vol. 53, pp. 1–12, convolutional neural network,” IEEE Transactions on Instrumentation
April 2017. and Measurement, vol. 66, pp. 1883–1892, July 2017.
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TII.2018.2828811, IEEE
Transactions on Industrial Informatics
12
[30] J. Fan, W. Xu, Y. Wu, and Y. Gong, “Human tracking using convolu- Huaguang Zhang (M’03, SM’04, F’14) received
tional neural networks,” IEEE Transactions on Neural Networks, vol. 21, the B.S. degree and the M.S. degree in control engi-
pp. 1610–1623, Oct 2010. neering from Northeast Dianli University of China,
[31] H. Zhang, X. Cao, J. K. L. Ho, and T. W. S. Chow, “Object-level Jilin City, China, in 1982 and 1985, respectively.
video advertising: An optimization framework,” IEEE Transactions on He received the Ph.D. degree in thermal power en-
Industrial Informatics, vol. 13, pp. 520–531, April 2017. gineering and automation from Southeast University,
[32] X. Glorot, A. Bordes, and Y. Bengio, “Deep sparse rectifier neural Nanjing, China, in 1991.
networks,” in International Conference on Artificial Intelligence and He joined the Department of Automatic Control,
Statistics, 2012. Northeastern University, Shenyang, China, in 1992,
[33] V. Nair and G. E. Hinton, “Rectified linear units improve restricted as a Postdoctoral Fellow for two years. Since 1994,
boltzmann machines,” in International Conference on International he has been a Professor and Head of the Institute
Conference on Machine Learning, pp. 807–814, 2010. of Electric Automation, School of Information Science and Engineering,
[34] A. Khodayari-Rostamabad, J. P. Reilly, N. K. Nikolova, J. R. Hare, and Northeastern University, Shenyang, China. His main research interests are
S. Pasha, “Machine learning techniques for the analysis of magnetic flux fuzzy control, stochastic system control, neural networks based control,
leakage images in pipeline inspection,” IEEE Transactions on Magnetics, nonlinear control, and their applications. He has authored and coauthored
vol. 45, pp. 3073–3084, Aug 2009. over 280 journal and conference papers, six monographs and co-invented 90
[35] G. A. Susto, A. Schirru, S. Pampuri, and S. McLoone, “Supervised patents.
aggregative feature extraction for big data time series regression,” IEEE Dr. Zhang is the fellow of IEEE, the E-letter Chair of IEEE CIS Society,
Transactions on Industrial Informatics, vol. 12, pp. 1243–1252, June the former Chair of the Adaptive Dynamic Programming & Reinforcement
2016. Learning Technical Committee on IEEE Computational Intelligence Society.
[36] A. Bernieri, L. Ferrigno, M. Laracca, and M. Molinara, “Crack shape He is an Associate Editor of AUTOMATICA , IEEE TRANSACTIONS ON
reconstruction in eddy current testing using machine learning systems for NEURAL NETWORKS, IEEE TRANSACTIONS ON CYBERNETICS, and
regression,” IEEE Transactions on Instrumentation and Measurement, NEUROCOMPUTING, respectively. He was an Associate Editor of IEEE
vol. 57, pp. 1958–1968, Sept 2008. TRANSACTIONS ON FUZZY SYSTEMS (2008-2013). He was awarded
[37] C. Xu, C. Wang, F. Ji, and X. Yuan, “Finite-element neural network- the Outstanding Youth Science Foundation Award from the National Natural
based solving 3-D differential equations in MFL,” IEEE Transactions Science Foundation Committee of China in 2003. He was named the Cheung
on Magnetics, vol. 48, pp. 4747–4756, Dec 2012. Kong Scholar by the Education Ministry of China in 2005. He is a recipient of
[38] POF, “Specification and requirements for the intelligent pig inspection the IEEE Transactions on Neural Networks 2012 Outstanding Paper Award.
of pipelines, version 2009,” p. 30, 2009.
[39] J. Liu, M. Fu, F. Liu, J. Feng, and K. Cui, “Window feature-based two-
stage defect identification using magnetic flux leakage measurements,”
IEEE Transactions on Instrumentation and Measurement, vol. 67, p-
p. 12–23, Jan 2018.
1551-3203 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.