CN116244714A - Nondestructive screening and distinguishing method combining graph and figure - Google Patents

Nondestructive screening and distinguishing method combining graph and figure Download PDF

Info

Publication number
CN116244714A
CN116244714A CN202211540266.6A CN202211540266A CN116244714A CN 116244714 A CN116244714 A CN 116244714A CN 202211540266 A CN202211540266 A CN 202211540266A CN 116244714 A CN116244714 A CN 116244714A
Authority
CN
China
Prior art keywords
data
triangular
slice data
triangle
slice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211540266.6A
Other languages
Chinese (zh)
Inventor
王征
唐锦江
王滢
郑伟军
吴炳照
杜斌
屠晓栋
周旻
钱伟杰
刘维亮
刘海林
金从友
缪宁杰
储建新
钱厚池
李豹
盛银波
操晨润
郭歆怡
周弘毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Innovation And Entrepreneurship Center Of State Grid Zhejiang Electric Power Co ltd
Jiaxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Innovation And Entrepreneurship Center Of State Grid Zhejiang Electric Power Co ltd
Jiaxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Innovation And Entrepreneurship Center Of State Grid Zhejiang Electric Power Co ltd, Jiaxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical Innovation And Entrepreneurship Center Of State Grid Zhejiang Electric Power Co ltd
Priority to CN202211540266.6A priority Critical patent/CN116244714A/en
Publication of CN116244714A publication Critical patent/CN116244714A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N23/00Investigating or analysing materials by the use of wave or particle radiation, e.g. X-rays or neutrons, not covered by groups G01N3/00 – G01N17/00, G01N21/00 or G01N22/00
    • G01N23/02Investigating or analysing materials by the use of wave or particle radiation, e.g. X-rays or neutrons, not covered by groups G01N3/00 – G01N17/00, G01N21/00 or G01N22/00 by transmitting the radiation through the material
    • G01N23/04Investigating or analysing materials by the use of wave or particle radiation, e.g. X-rays or neutrons, not covered by groups G01N3/00 – G01N17/00, G01N21/00 or G01N22/00 by transmitting the radiation through the material and forming images of the material
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T17/00Three dimensional [3D] modelling, e.g. data description of 3D objects
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N2223/00Investigating materials by wave or particle radiation
    • G01N2223/03Investigating materials by wave or particle radiation by transmission
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N2223/00Investigating materials by wave or particle radiation
    • G01N2223/10Different kinds of radiation or particles
    • G01N2223/101Different kinds of radiation or particles electromagnetic radiation
    • G01N2223/1016X-ray
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Computer Graphics (AREA)
  • Geometry (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Chemical & Material Sciences (AREA)
  • Analytical Chemistry (AREA)
  • Biochemistry (AREA)
  • Immunology (AREA)
  • Pathology (AREA)
  • Analysing Materials By The Use Of Radiation (AREA)

Abstract

The invention discloses a nondestructive screening distinguishing method combining graphs and numbers. The invention comprises the following steps: s1: collecting image data of a detected object at multiple angles by using X-ray flaw detection equipment, and constructing a three-dimensional image; s2: dividing the three-dimensional image into a plurality of parts, and respectively storing each part in the form of a plurality of triangular slices containing attribute information; s3: randomly sequencing the triangular slices at the same position, and encrypting the next triangular slice data by the triangular slice data according to the sequence number; s4: the user accounts are randomly sequenced, the user selects the part of the measured object to be checked, the triangular slice data of the corresponding serial number is called according to the serial number of the user account, the triangular slice data of the part are sequentially decrypted, and the decrypted triangular slice data are combined to obtain the three-dimensional image and the attribute information of the corresponding part. And (3) slicing the images of all parts of the detection result, encrypting the images in a chain, decrypting the slices of the parts requiring to view the data, combining the data with the images of the view parts, and thus, the result is visual and the data reliability is high.

Description

Nondestructive screening and distinguishing method combining graph and figure
Technical Field
The invention relates to the field of nondestructive testing, in particular to a nondestructive screening distinguishing method combining graphs and numbers.
Background
The nondestructive testing refers to a method for checking and testing the structure, state and type, quantity, shape, property, position, size, distribution and variation of defects in a test piece by using a physical or chemical method as a means and by means of modern technology and equipment under the premise that the use performance of a detected object is not damaged or affected in a mechanical material and the internal tissue of the detected object is not damaged by utilizing the variation of reactions such as heat, sound, light, electricity, magnetism and the like caused by the abnormality or the defect of the internal structure of the material. Nondestructive testing is an indispensable effective tool for industrial development, reflects the industrial development level of a country to a certain extent, and the importance of nondestructive testing is well recognized.
Along with the widespread development of X-ray digital flaw detection of power lines, an X-ray flaw detection technology carried by an unmanned aerial vehicle combined with unmanned aerial vehicle inspection is expected due to the fact that the X-ray flaw detection technology has more advantages than manual tower climbing flaw detection. The detection of cables and distribution network materials is carried out by laboratory sampling and warehouse pre-screening, and a certain bottleneck exists at present. For example, a "nondestructive testing system and method for power cable and joint based on X-ray real-time imaging technology" disclosed in chinese patent literature, its bulletin number CN107941828A, the testing system includes a detection system, a detection platform and a support system, the detection system is connected with the detection platform, the detection system includes an X-ray source and a detector box, the detector box is connected with the X-ray source, the steps of the testing method are that the receiving, splicing and fusion of the internal structure images of cable and joint are completed first, then gray scale processing is performed on the integral images of cable and joint, then significant edge points are obtained by using edge detection technology, then the internal structure images of cable and joint after edge detection are layered and colored, finally differential calculation is performed on the internal structure images of standard cable and joint stored in a joint database, and then detection judgment is made according to the result of image distinction. The scheme can realize visual real-time diagnosis of the internal structures of the cable and the connector, rapidly and accurately judge the running state of the cable and the connector according to the internal structures of the cable and the connector, effectively reduce fault accidents caused by internal defects of the cable and the connector, and ensure safe and reliable running of the cable and the connector. However, the detection result of the scheme is not visual and is easy to tamper, and the requirement on operators is high.
Disclosure of Invention
The invention mainly solves the problems of the prior art that the experimental result is not visual, the data is easy to tamper, and the requirement on operators is high; the nondestructive screening distinguishing method combining the images and the numbers is provided, the images of all parts of the detection result are cut into the chain and encrypted, the parts requiring to check the data are decrypted and cut, the data are combined with the images of the checked parts, the result is visual, and the data reliability is high.
The technical problems of the invention are mainly solved by the following technical proposal:
a non-destructive screening distinguishing method combining figures comprises the following steps:
s1: collecting image data of a detected object at multiple angles by using X-ray flaw detection equipment, and constructing a three-dimensional image;
s2: dividing the three-dimensional image into a plurality of parts, and respectively storing each part in the form of a plurality of triangular slices containing attribute information;
s3: randomly sequencing the triangular slices at the same position, and encrypting the next triangular slice data by the triangular slice data according to the sequence number;
s4: the user accounts are randomly sequenced, the user selects the part of the measured object to be checked, the triangular slice data of the corresponding serial number is called according to the serial number of the user account, the triangular slice data of the part are sequentially decrypted, and the decrypted triangular slice data are combined to obtain the three-dimensional image and the attribute information of the corresponding part.
Each part of the measured object is stored locally in an encrypted triangle slice, so that the data is prevented from being tampered, and the reliability of the data is high. Each slice stores attribute information of a corresponding position, the detection result is accurately decomposed, the result is more visual, positioning is easier, and the required position is accurately found. The slices are encrypted in a chain, the association among the slices is enhanced, and the slice data is used as a secret key for decryption, so that the tamper resistance is enhanced.
Preferably, the data of the triangular slice sequentially comprises a plane normal vector, a first vertex coordinate, a second vertex coordinate, a third vertex coordinate and attribute information.
The attribute information comprises wire diameter thickness and insulating layer flaws; wall thickness, concentricity, diameter and ovality measurements of the high voltage cable; the outer diameter, wall thickness and eccentricity of the finished cable are measured.
Preferably, the triangle slice data is stored locally in binary form of rated byte number.
Each triangular patch occupies 50 fixed bytes and is sequentially 3 floating point numbers (normal vector of the triangular patch) with 4 bytes; 3 4 byte floating point numbers (coordinates of 1 vertex); 3 4 byte floating point numbers (coordinates of 2 vertices); 3 4-byte floating point numbers (coordinates of 3 vertices); the last 2 bytes of the triangular patch are used to describe attribute information of the triangular patch.
Preferably, the encryption process of the triangle slice comprises:
sequencing the triangle slice data according to the sequence numbers and then aligning the triangle slice data;
taking the data of the plane normal vector, the first vertex coordinate, the second vertex coordinate and the third vertex coordinate, and carrying out the same or processing on the corresponding positions of the triangle slice data of the previous serial number and the triangle slice data of the next serial number, wherein the obtained data are used as the encrypted plane normal vector, the first vertex coordinate, the second vertex coordinate and the third vertex coordinate data of the triangle slice;
taking attribute information, and inverting the triangle slice data of the next serial number at the corresponding position when the triangle slice data of the previous serial number is 1; when the triangle slice data of the last sequence number is 0, the triangle slice data of the next sequence number at the corresponding position is kept unchanged.
Preferably, the original data and serial numbers of the triangle slices of each part are respectively uploaded to the cloud end for backup storage. The method can be used as a backup storage of data and a key, and can decrypt encrypted data when the data is requested to be acquired locally.
Preferably, the step S4 includes the following steps:
s401: the method comprises the steps that a sequence number is randomly obtained when a user account is registered, and the sequence number does not exceed the sequence number of a triangular slice;
s402: the user selects the part of the measured object to be checked, and all triangular slices corresponding to the part are acquired;
s403: acquiring triangle slice original data of the part corresponding to the serial number from the cloud according to the serial number of the user account;
s404: sequentially and reversely decrypting all the encrypted triangle slice data by taking the obtained triangle slice raw data as a secret key according to an encryption rule; respectively acquiring decrypted triangle slice data;
s405: the decrypted triangle slice data is used as a secret key to reversely decrypt the encrypted triangle slice data with the next sequence number according to an encryption rule, and the decrypted triangle slice data with the next sequence number is obtained;
s406: repeating the step S405 until the decryption closed loop is completed; obtaining a plurality of groups of decrypted triangle slice data;
s407: and combining the same group of triangular slices, removing the error image, and obtaining the selected image data of the part of the tested object.
And reversely decrypting to obtain the original data.
Preferably, the error image is rejected according to the continuity and integrity of the combined image. The correct image is selected among the plurality of interference items.
Preferably, the X-ray flaw detection device comprises a ray source assembly and a corresponding DR detector, wherein the ray source assembly and the DR detector are perpendicular to each other, the ray source assembly scans an object to be detected, and the DR detector generates a scanning image.
And acquiring X-ray images through scanning in two orthogonal directions, and generating three-dimensional images through an RTK three-dimensional reconstruction algorithm. By adopting two high-speed scanners, the medium-voltage, high-voltage and ultra-high-voltage cables can be accurately and reliably detected, and the cables are not affected even under the condition of severe shaking of the cables. The multiple sensor technique can produce multiple measurement values per scan cycle. The application of the technology can lead the measurement to be more accurate and reliable; the internal defect inspection of common materials listed in the mesh is oriented, the digital X-ray imaging is adopted to realize the planar imaging of the inspected object and the high-quality digital image generation of the internal structure after the multi-angle planar imaging.
The beneficial effects of the invention are as follows:
1. each part of the measured object is stored locally in an encrypted triangle slice, so that the data is prevented from being tampered, and the reliability of the data is high.
2. Each slice stores attribute information of a corresponding position, the detection result is accurately decomposed, the result is more visual, positioning is easier, and the required position is accurately found.
3. The slices are encrypted in a chain, the association among the slices is enhanced, and the slice data is used as a secret key for decryption, so that the tamper resistance is enhanced.
Drawings
FIG. 1 is a flow chart of a non-destructive screening discrimination method of the present invention.
Detailed Description
The technical scheme of the invention is further specifically described below through examples and with reference to the accompanying drawings.
Examples:
the non-destructive screening and distinguishing method combining figures in this embodiment, as shown in fig. 1, includes the following steps:
s1: and acquiring image data of the tested object at multiple angles by using X-ray flaw detection equipment, and constructing a three-dimensional image.
The X-ray flaw detection equipment comprises a conveying mechanism, a ray scanning mechanism and a shielding cover, wherein the conveying mechanism and the ray scanning mechanism are both arranged in the shielding cover.
The shielding cover is provided with a first inlet and a first outlet opposite to the first inlet, a feeding buffer conveyor belt, a scanning conveyor belt and a discharging buffer conveyor belt are sequentially arranged between the first inlet and the first outlet on the inner side of the shielding cover, and the ray scanning mechanism is arranged right above the scanning conveyor belt.
Lead curtains are hung on the first inlet and the first outlet, and the shielding cover has the effect of shielding the rays on the inner side, so that the rays on the inner side of the shielding cover are prevented from leaking to the outer side. The upper surfaces of the feeding buffer conveyor belt, the scanning conveyor belt and the discharging buffer conveyor belt are flush and not lower than the lower edges of the first outlet and the first inlet, the tested object is fed in through the first inlet by adopting the conveyor belt, conveyed onto the scanning conveyor belt through the feeding buffer conveyor belt, and placed in the scanning range of the ray scanning mechanism by adjusting the scanning conveyor belt, and conveyed out from the first outlet through the discharging buffer conveyor belt after scanning. The full-detection requirement of the material pre-screening detection is met on the basis of avoiding the risk of damage of the material during detection, so that the quality of the network access equipment is improved.
The ray scanning mechanism comprises a ray source assembly and a corresponding DR detector, wherein the ray source assembly is perpendicular to each other, the ray source assembly scans a measured object, and the DR detector generates a scanning image.
And acquiring X-ray images through scanning in two orthogonal directions, and generating three-dimensional images through an RTK three-dimensional reconstruction algorithm. By adopting two high-speed scanners, the medium-voltage, high-voltage and ultra-high-voltage cables can be accurately and reliably detected, and the cables are not affected even under the condition of severe shaking of the cables. The multiple sensor technique can produce multiple measurement values per scan cycle. The application of the technology can lead the measurement to be more accurate and reliable; the internal defect inspection of common materials listed in the mesh is oriented, the digital X-ray imaging is adopted to realize the planar imaging of the inspected object and the high-quality digital image generation of the internal structure after the multi-angle planar imaging.
S2: the three-dimensional image is divided into a plurality of parts, and each part is stored in the form of a plurality of triangular slices containing attribute information.
The 3D image represented by the EXCEL table and the STL is generated by adopting an XML top-level index management technology, daily file data recorded by a daily report of the EXCEL table and a 3D real-time reconstruction result represented by a STL binary file format.
STL is the standard file type applied by most fast 3D model systems. STL (document) describes the original unstructured triangle surface format of triangle unit normals and vertices (ordered by right hand rule). STL is a simple and composite material that approximates a CAD model to a set of triangles, converting splines (e.g., spline curves, p-lines, arcs, extrusions and sweeps) to triangles.
The data of the triangular slice sequentially comprises a plane normal vector, a first vertex coordinate, a second vertex coordinate, a third vertex coordinate and attribute information. Each slice stores attribute information of a corresponding position, the detection result is accurately decomposed, the result is more visual, positioning is easier, and the required position is accurately found.
The attribute information comprises wire diameter thickness and insulating layer flaws; wall thickness, concentricity, diameter and ovality measurements of the high voltage cable; the outer diameter, wall thickness and eccentricity of the finished cable are measured.
The triangle slice data is stored locally in binary form of the nominal byte count. In this embodiment, each triangular patch occupies a fixed 50 bytes, in turn 3 4 byte floating point numbers (normal vector of the triangular patch); 3 4 byte floating point numbers (coordinates of the first vertex); 3 4 byte floating point numbers (coordinates of the second vertex); 3 4-byte floating point numbers (coordinates of the third vertex); the last 2 bytes of the triangular patch are used to describe attribute information of the triangular patch.
Each part of the measured object is stored locally in an encrypted triangle slice, so that the data is prevented from being tampered, and the reliability of the data is high.
S3: and randomly sequencing the triangular slices of the same part, and encrypting the next triangular slice data according to the sequence number by using the triangular slice data.
The triangular slices are randomly ordered, and the data of the triangular slice with the previous sequence number is directed to the triangular slice with the next sequence number for encryption. For example, a certain part has n triangular slices, the triangular slice with the sequence number 1 encrypts the triangular slice with the sequence number 2, the triangular slice with the sequence number 2 encrypts the triangular slice with the sequence number 3, and so on, the triangular slice with the sequence number n-1 encrypts the triangular slice with the sequence number n, and the triangular slice with the sequence number n encrypts the triangular slice with the sequence number 1 to form a closed loop. The slices are encrypted in a chain, the association among the slices is enhanced, and the slice data is used as a secret key for decryption, so that the tamper resistance is enhanced.
The encryption process of the triangle slice comprises the following steps:
1) And sequencing the triangle slice data according to the sequence numbers and aligning.
2) And taking the data of the plane normal vector, the first vertex coordinate, the second vertex coordinate and the third vertex coordinate, and carrying out the same or processing on the corresponding positions of the triangle slice data of the previous serial number and the triangle slice data of the next serial number, wherein the obtained data are used as the encrypted plane normal vector, the first vertex coordinate, the second vertex coordinate and the third vertex coordinate data of the triangle slice.
Taking 2 bytes of data as an example, if the original 2 bytes of data of the previous sequence number is 1101001001001101; the original 2-byte data of the latter sequence number is 0101110001101011; the 2-byte data encrypted by the latter sequence number is 0111000111011001. The latter data is encrypted with the original data.
3) Taking attribute information, and inverting the triangle slice data of the next serial number at the corresponding position when the triangle slice data of the previous serial number is 1; when the triangle slice data of the last sequence number is 0, the triangle slice data of the next sequence number at the corresponding position is kept unchanged.
Taking 2 bytes of data as an example, if the original 2 bytes of data of the previous sequence number is 1101001001001101; the original 2-byte data of the latter sequence number is 0101110001101011; the 2-byte data encrypted by the latter sequence number is 1000111000100110. The latter data is encrypted with the original data.
The positioning data and the attribute data are encrypted in different encryption modes, so that encrypted parts are distinguished, the complexity of encryption logic is enhanced, and reverse cracking is not easy.
S4: the user accounts are randomly sequenced, the user selects the part of the measured object to be checked, the triangular slice data of the corresponding serial number is called according to the serial number of the user account, the triangular slice data of the part are sequentially decrypted, and the decrypted triangular slice data are combined to obtain the three-dimensional image and the attribute information of the corresponding part.
And uploading the original data of the triangular slices of each part and the serial numbers of the original data to the cloud backup storage. The method can be used as a backup storage of data and a key, and can decrypt encrypted data when the data is requested to be acquired locally.
Step S4 includes the following procedure:
s401: and randomly acquiring a serial number when the user account is registered, wherein the serial number does not exceed the serial number of the triangular slice. The serial number does not exceed the minimum value of the total serial numbers of the triangular slices, so that the triangular slices of all parts can be restored, and the tracing of the tampered data can be conveniently found.
S402: and the user selects the part of the measured object to be checked, and all the triangular slices corresponding to the part are acquired. All encrypted triangle slice data is obtained locally.
S403: and acquiring the triangle slice original data of the part corresponding to the serial number from the cloud according to the serial number of the user account. The triangle slice original data is used as a secret key for decryption, and because the secret key forms a closed loop during encryption, one secret key can complete all decryption.
S404: sequentially and reversely decrypting all the encrypted triangle slice data by taking the obtained triangle slice raw data as a secret key according to an encryption rule; and respectively acquiring decrypted triangle slice data.
S405: and reversely decrypting the decrypted triangle slice data serving as a key to the encrypted triangle slice data of the next sequence number according to an encryption rule to obtain the decrypted triangle slice data of the next sequence number.
S406: repeating the step S405 until the decryption closed loop is completed; several sets of decrypted triangle slice data are obtained. And obtaining triangular slices of which the number is equal to the total number of the sequence numbers, and adding interference items.
S407: and combining the same group of triangular slices, removing the error image, and obtaining the selected image data of the part of the tested object.
And eliminating the error image according to the continuity and the integrity of the combined image. The correct image is selected among the plurality of interference items.
According to the scheme of the embodiment, all parts of the tested object are stored locally in the form of encrypted triangular slices, so that data is prevented from being tampered, and the reliability of the data is high. Each slice stores attribute information of a corresponding position, the detection result is accurately decomposed, the result is more visual, positioning is easier, and the required position is accurately found. The slices are encrypted in a chain, the association among the slices is enhanced, and the slice data is used as a secret key for decryption, so that the tamper resistance is enhanced.
It should be understood that the examples are only for illustrating the present invention and are not intended to limit the scope of the present invention. Further, it is understood that various changes and modifications may be made by those skilled in the art after reading the teachings of the present invention, and such equivalents are intended to fall within the scope of the claims appended hereto.

Claims (8)

1. The nondestructive screening distinguishing method combining the figures is characterized by comprising the following steps of:
s1: collecting image data of a detected object at multiple angles by using X-ray flaw detection equipment, and constructing a three-dimensional image;
s2: dividing the three-dimensional image into a plurality of parts, and respectively storing each part in the form of a plurality of triangular slices containing attribute information;
s3: randomly sequencing the triangular slices at the same position, and encrypting the next triangular slice data by the triangular slice data according to the sequence number;
s4: the user accounts are randomly sequenced, the user selects the part of the measured object to be checked, the triangular slice data of the corresponding serial number is called according to the serial number of the user account, the triangular slice data of the part are sequentially decrypted, and the decrypted triangular slice data are combined to obtain the three-dimensional image and the attribute information of the corresponding part.
2. The method for judging whether the triangle slice is a non-destructive screening or not according to claim 1, wherein the triangle slice data comprises a plane normal vector, a first vertex coordinate, a second vertex coordinate, a third vertex coordinate and attribute information in sequence.
3. A method of combining graphics and non-destructive screening and distinguishing according to claim 1 or 2, wherein the delta data is stored locally in binary form of nominal byte numbers.
4. A method of image-number-combined non-destructive screening and distinguishing according to claim 3, wherein the encryption of the triangular slices comprises:
sequencing the triangle slice data according to the sequence numbers and then aligning the triangle slice data;
taking the data of the plane normal vector, the first vertex coordinate, the second vertex coordinate and the third vertex coordinate, and carrying out the same or processing on the corresponding positions of the triangle slice data of the previous serial number and the triangle slice data of the next serial number, wherein the obtained data are used as the encrypted plane normal vector, the first vertex coordinate, the second vertex coordinate and the third vertex coordinate data of the triangle slice;
taking attribute information, and inverting the triangle slice data of the next serial number at the corresponding position when the triangle slice data of the previous serial number is 1; when the triangle slice data of the last sequence number is 0, the triangle slice data of the next sequence number at the corresponding position is kept unchanged.
5. The method for judging whether the images are combined or not according to claim 1, 2 or 4, wherein the original data of the triangle slice of each part and the serial number thereof are uploaded to the cloud end for backup storage respectively.
6. The method for discriminating between pictures and numbers according to claim 5 wherein said step S4 includes the steps of:
s401: the method comprises the steps that a sequence number is randomly obtained when a user account is registered, and the sequence number does not exceed the sequence number of a triangular slice;
s402: the user selects the part of the measured object to be checked, and all triangular slices corresponding to the part are acquired;
s403: acquiring triangle slice original data of the part corresponding to the serial number from the cloud according to the serial number of the user account;
s404: sequentially and reversely decrypting all the encrypted triangle slice data by taking the obtained triangle slice raw data as a secret key according to an encryption rule; respectively acquiring decrypted triangle slice data;
s405: the decrypted triangle slice data is used as a secret key to reversely decrypt the encrypted triangle slice data with the next sequence number according to an encryption rule, and the decrypted triangle slice data with the next sequence number is obtained;
s406: repeating the step S405 until the decryption closed loop is completed; obtaining a plurality of groups of decrypted triangle slice data;
s407: and combining the same group of triangular slices, removing the error image, and obtaining the selected image data of the part of the tested object.
7. The method of claim 6, wherein the erroneous image is removed based on continuity and integrity of the combined image.
8. The method for discriminating between non-destructive screening and image-combining according to claim 1 wherein said X-ray inspection apparatus comprises a source assembly and a corresponding DR detector perpendicular to each other, said source assembly scanning an object to be inspected, said DR detector generating a scanned image.
CN202211540266.6A 2022-12-02 2022-12-02 Nondestructive screening and distinguishing method combining graph and figure Pending CN116244714A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211540266.6A CN116244714A (en) 2022-12-02 2022-12-02 Nondestructive screening and distinguishing method combining graph and figure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211540266.6A CN116244714A (en) 2022-12-02 2022-12-02 Nondestructive screening and distinguishing method combining graph and figure

Publications (1)

Publication Number Publication Date
CN116244714A true CN116244714A (en) 2023-06-09

Family

ID=86624898

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211540266.6A Pending CN116244714A (en) 2022-12-02 2022-12-02 Nondestructive screening and distinguishing method combining graph and figure

Country Status (1)

Country Link
CN (1) CN116244714A (en)

Similar Documents

Publication Publication Date Title
CN101936927B (en) Method to inspect a blade
Naeimi et al. Reconstruction of the rolling contact fatigue cracks in rails using X-ray computed tomography
GB2222356A (en) Method of using a priori information in computerized tomography
EP3980790A1 (en) Automated inspection method for a manufactured article and system for performing same
JP2019219267A (en) In-line internal defect inspection method and system
CN111272624A (en) Porosity detection method
CN114240854A (en) Product detection method and detection device
CN116244714A (en) Nondestructive screening and distinguishing method combining graph and figure
West et al. Improved visual inspection of advanced gas-cooled reactor fuel channels
Wulfsohn et al. Volume estimation from projections
JP5799107B2 (en) Method and evaluation apparatus for determining the position of a structure located within an inspection object by means of an X-ray computed tomograph
EP3722793B1 (en) Method for inspecting components using computed tomography
JP2006189349A (en) Nondestructive defect inspection system
Contin et al. Analysis of 3D Computed Tomographic Imaging of Ground-wall Insulation for AC rotating machines
Simon et al. Quality control of light metal castings by 3D computed tomography
Hazra et al. Inspection of reground drill point geometry using three silhouette images
Carmignato et al. CT techniques for reconstructing 3D geometrical models of complex parts: an approach for traceability establishment and uncertainty evaluation
JP7051847B2 (en) X-ray in-line inspection method and equipment
Schick Metrology CT technology and its applications in the precision engineering industry
Bein et al. Utilization of gamma ray inspection system for tomographic imaging and dimensional analysis of complete model magnet cold masses and collared coil sections
Warczek et al. The assessment of the technical condition of a tire belt using computed tomography.
Feiste et al. Three dimensional analysis of growing casting effects
Cheng et al. Industrial computed tomography based intelligent non-destructive testing method for power capacitor
Contin et al. Inspection of ground-wall insulation for AC rotating machines using X-ray tomography
Villarraga-Gómez et al. Extending the measurement capabilities of 3D X-ray microscopy to dimensional metrology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination