WO2023070154A1 - Computer assisted inspection and modelling of fibre-reinforced plastic bicycle frames - Google Patents

Computer assisted inspection and modelling of fibre-reinforced plastic bicycle frames Download PDF

Info

Publication number
WO2023070154A1
WO2023070154A1 PCT/AU2022/051284 AU2022051284W WO2023070154A1 WO 2023070154 A1 WO2023070154 A1 WO 2023070154A1 AU 2022051284 W AU2022051284 W AU 2022051284W WO 2023070154 A1 WO2023070154 A1 WO 2023070154A1
Authority
WO
WIPO (PCT)
Prior art keywords
bicycle
damage
inspection
factors
potential
Prior art date
Application number
PCT/AU2022/051284
Other languages
French (fr)
Inventor
Andrew Roman NOVAK
Michael Robert BRIGGS
Original Assignee
Cycle Inspect Services Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2021903430A external-priority patent/AU2021903430A0/en
Application filed by Cycle Inspect Services Pty Ltd filed Critical Cycle Inspect Services Pty Ltd
Publication of WO2023070154A1 publication Critical patent/WO2023070154A1/en

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01MTESTING STATIC OR DYNAMIC BALANCE OF MACHINES OR STRUCTURES; TESTING OF STRUCTURES OR APPARATUS, NOT OTHERWISE PROVIDED FOR
    • G01M17/00Testing of vehicles
    • G01M17/007Wheeled or endless-tracked vehicles
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B62LAND VEHICLES FOR TRAVELLING OTHERWISE THAN ON RAILS
    • B62JCYCLE SADDLES OR SEATS; AUXILIARY DEVICES OR ACCESSORIES SPECIALLY ADAPTED TO CYCLES AND NOT OTHERWISE PROVIDED FOR, e.g. ARTICLE CARRIERS OR CYCLE PROTECTORS
    • B62J50/00Arrangements specially adapted for use on cycles not provided for in main groups B62J1/00 - B62J45/00
    • B62J50/20Information-providing devices
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B62LAND VEHICLES FOR TRAVELLING OTHERWISE THAN ON RAILS
    • B62KCYCLES; CYCLE FRAMES; CYCLE STEERING DEVICES; RIDER-OPERATED TERMINAL CONTROLS SPECIALLY ADAPTED FOR CYCLES; CYCLE AXLE SUSPENSIONS; CYCLE SIDE-CARS, FORECARS, OR THE LIKE
    • B62K19/00Cycle frames
    • B62K19/02Cycle frames characterised by material or cross-section of frame members
    • B62K19/16Cycle frames characterised by material or cross-section of frame members the material being wholly or mainly of plastics
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/20Administration of product repair or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/30Administration of product recycling or disposal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/01Customer relationship services
    • G06Q30/015Providing customer assistance, e.g. assisting a customer within a business location or via helpdesk
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0278Product appraisal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • G06Q50/40
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/0002Inspection of images, e.g. flaw detection
    • G06T7/0004Industrial image inspection
    • G06T7/0008Industrial image inspection checking presence/absence
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning
    • G06N20/20Ensemble learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/01Dynamic search techniques; Heuristics; Dynamic trees; Branch-and-bound
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/02Knowledge representation; Symbolic representation
    • G06N5/022Knowledge engineering; Knowledge acquisition
    • G06N5/025Extracting rules from data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/10Image acquisition modality
    • G06T2207/10116X-ray image

Definitions

  • the present disclosure relates to a method and system of modelling and inspecting components of a bicycle.
  • this includes computer modelling and inspection of fibre-reinforced plastic bicycle frames for damage using non-destructive testing techniques.
  • Carbon fibre bicycle frames and components can experience catastrophic failures resulting in severe injury or death. This can result from contextual factors such as inappropriate usage of the bicycle and/or reduced integrity due to damage. Damage is not always visible to the naked eye due to size or type of damage, or it may be on the interior of the frame or component. It can be caused via physical impacts such as crashes, or can even be present due to manufacturing defects such as delamination and resin-rich areas. Damage is also difficult to quantify - e.g. what size, type of damage and location of damage will substantially increases risk of catastrophic failures? Damage to carbon fibre bicycle frames and components can result in sudden, unexpected failure (in contrast to failure modes from metals and metal alloys).
  • an inspection method comprising:
  • an indication of the roadworthiness of the bicycle may also include listing contextual and damage factors of concern, suggesting suitable repair options, and indicating likely costs of repair.
  • Examples of the present disclosure can be used for safety inspections of carbon fibre bicycle frames and components using non-destructive testing (NDT) techniques. This may include the identification and assessment of damage and/or defects uncovered during the inspection process. In some examples, this may include providing a risk assessment.
  • NDT non-destructive testing
  • the inspection method further comprises determining potential corrective action based on the comparison.
  • the method also includes displaying an indication of the potential corrective action for the bicycle.
  • the method further includes updating the pre-existing data set based on comparing the pre-existing data set with the plurality of contextual factors and the plurality of damage factors of the bicycle.
  • a system comprising: a scanner to scan a bicycle for potential damage; at least one processing device to perform the inspection method described above; and a display for outputting the indication of roadworthiness and/or potential corrective action.
  • FIG. 1 illustrates a system to model and inspect a bicycle
  • Fig. 2 is a flow diagram of a method of inspecting a bicycle
  • FIG. 3 illustrate the concept of modelling and inspecting a bicycle
  • FIG. 4 is a screenshot of a computer application for inspecting a bicycle
  • Fig. 5 illustrates a user interface of the application to enter contextual factors
  • Fig. 6 illustrates a user interface showing detected bicycle damage and respective damage factors
  • Fig. 7 illustrates a user interface showing an indication of roadworthiness and corrective action
  • Fig. 8 is a visualisation at a user interface of the bicycle and detected damage in an interactive window
  • Fig. 9 is an example table of contextual factors and the relationship with roadworthiness as part of pre-existing data
  • Fig. 10 is an example table of damage factors for a bicycle frame and the relationship with roadworthiness as part of pre-existing data
  • Fig. 11 is an example table of damage factors for bicycle components and the relationship with roadworthiness as part of pre-existing data
  • Fig. 12 is a table showing risk ratings based on risk score
  • FIG. 13 is an alternative screenshot of a computer application for inspecting a bicycle
  • Fig. 14 illustrates an user interface showing detected bicycle damage and respective damage factors:
  • Fig. 15 is a schematic example of a processing device. Description of Embodiments
  • Fig. 1 illustrates an example of a system 2 to model and inspect a bicycle 1.
  • This includes a scanner 51 to scan a plurality of sites (5) at the bicycle to detect potential damage 3.
  • the scanner 51 may include non-destructive scanners such as optical cameras, ultrasonic sensors, X-ray scanning systems, tap hammers etc.
  • the system 2 also includes at least one computing device 53 that includes at least one processor 55, and a user interface such as a display 57.
  • the display 57 outputs an indication of roadworthiness and/or potential corrective action determined by the method described below.
  • the computing device 53 is a computer (including desktop computer, laptop computer, tablet computer, mobile communication device, smartphone, specific purpose computing device etc.).
  • the computing device 53 is also in communication with at least one other computing device 61, 63, and data storage 16. This can include direct communication, or over a communications network 59.
  • the method 100 includes receiving 110 a plurality of contextual factors based on usage and history of a bicycle 1. This will be discussed in further detail below and may include contextual factors such as type of use, age of components of the bicycle, rider weight, time between servicing, etc.
  • the method also includes scanning 120 the bicycle 1 to detect potential damage 3 at a plurality of sites 5 at the bicycle 1. This may include scanning 120 for damage such as cracks, delamination, deformation, etc..
  • the method 100 further includes categorising the potential damage 3 (if found at the plurality of sites 5) to generate a respective plurality of damage factors 13. Categorisation may include categorizing the size, type, age, and other characteristics of the damage 3. This enables categorization and generation of damage factors that can be used as objective measures for the model to compare and assess the state of the bicycle 1.
  • the method further includes comparing 140 the plurality of contextual factors 11 and plurality of damage factors 13 with a pre-existing data set 15 from a database 16.
  • the preexisting data set 15 may include data to model the performance, lifespan, wear and fatigue, maintenance, and other characteristics of the bicycle 1 and bicycle components. As described in further detail below, the pre-existing data set 15 and model may be updated with machinelearning models.
  • the method 100 further includes determining 150 roadworthiness 19 of the bicycle 1 based on the comparison. An indication of the roadworthiness 19 of the bicycle is then displayed 160 at a user interface 21 for a user.
  • the method 100 also includes determining 151 potential corrective action 25 based on the comparison 17. This can include replacement, repair, maintain, inspect, or other action. This may also include providing information on qualified repairers, suppliers, manufacturers, replacement or substitute parts, etc.
  • Examples of the system 2 and method 100 aims to provide standardised nondestructive testing for the cycling industry, particularly for CFRP components. This includes applications that apply statistical models that in conjunction with contextual factors 11 and damage factors 13, provide an effective and objective report on the state of the bicycle. Importantly, such reports can be produced objectively with results that are standardised and comparable with reports generated by other technicians using the system 2 and method 100. This above described process and concept 71 is also illustrated in Fig. 3.
  • the bicycle 1 includes a frame 7 that can be made of carbon reinforced plastic (CFRP), a mix of carbon fibre and other fibres reinforced with plastic, or other fibre embedded in plastics in a composite structure.
  • CFRP carbon reinforced plastic
  • portions of the frame 7 are made of CFRP with other component materials embedded or joined therein.
  • mounts, fastener receiving portions, or other high-wear portions, made of metals or metal alloys may be molded in the frame 7.
  • the frame 7 can include various portions (such as sites 5), such as:
  • One or more of these sites 5 of the frame 7 may advantageously be formed of composite materials such as CFRP for high strength to weight ratio.
  • the bicycle may also include other components that are not part of the frame 7, but also made of composite materials. This may include one or more of: fork; steerer; wheel rim;
  • scanning is performed by, or aided with, a scanner 51 configured to detect damage 3.
  • the scanner 51 utilises non-destructive testing techniques to detect damage.
  • this may include an optical scanner (e.g. camera) or other measurement device to determine the size, location, and other characteristics, of visible damage such as cracks, delamination, breakages, etc. This may include optical or digital magnification to obtain clarity on the visible damage.
  • this can include measurement means, to aid in determining the size of the damage.
  • Such measurement means may include an optical rangefinder, laser rangefinder (including LiDAR), gyroscopes, magnetometers, accelerometers, to provide information to enable determination of the size of damage.
  • the scanner 51 may be coupled with light sources to provide contrast and clarity on any potential damage. This can include using particular wavelengths of light (including visible and invisible wavelengths).
  • scanning 120 of the bicycle includes a technician’s input in operating the scanner 51, and/or interpreting the results, images, or other data from the scanner 51 to determine the nature of the damage.
  • the scanner 51 includes an X-ray system to obtain one or more X- ray images of the bicycle. This may be particularly advantageous in detecting damage beneath the surface of the frame.
  • the damage may be internal, shielded by other opaque components and/or under paint or other coating on the bicycle.
  • the scanner 51 includes an ultrasonic sensor system to perform ultrasonic inspection. This utilizes sound waves to determine inconsistencies in the material that are indicative of damage to the bicycle. Additional scanners operating with nondestructive techniques may be used, such as: thermography inspection; liquid-penetrant; radiographic testing; electromagnetic testing; eddy current testing; vibrational analysis, acoustic testing using a hammer, etc.
  • the computer 53 may be a desktop computer, laptop computer, single purpose computing device, tablet computer, computer terminal, smart phone or other communication device. This can include a processing device 55, display 57, and a data store/memory.
  • the computer 53 may perform, at least in part, the method 100 described herein.
  • the computer and associated data store contains a computer program (i.e. application) to perform the method 100.
  • the application is a web application hosted on the server 63, whereby the computer 53 acts as a terminal to provide a user interface with the technician.
  • the computer 53 is in wired or wireless communication with the scanner 51 to receive scans, or associated scanner data.
  • the technician may assist in communicating data between the scanner 51 and the computer 53.
  • the technician may physically take a memory card, print-out, or other storage medium from the scanner 51 and transfer this to the computer 53.
  • the technician may read data from the scanner 51 and manually input the data to the computer 53.
  • the computer 53 and application may be operative to send inspection reports or other information to a client’s computer 61. This may include email, short message service, application based messages/notification, etc.
  • the server 63 includes a processing device and associated data store 16.
  • the server may be operated by an entity to provide subscription service to technicians at the computers 53.
  • An advantage is that the entity may receive data from multiple sources (i.e. different technicians), which can provide a larger data set for training and the machine learning model.
  • the server 63 is associated with a data store 16 that can hold historical records, pre-existing data sets and machine learning models 15. In some examples, the data store 16 also stores the computer program to perform the method 100.
  • the server 63 performs the role of providing the computers 53 with pre-existing data sets. This may include sending updates of the pre-existing data sets. Thus the server may also receive data from actual inspections from the computers that can be used fortraining and updating the data sets. This may include the server 63 performing at least part of the machine-learning functions (described in further detail below).
  • the server 63 runs the application to perform the method 100 and communicates with the computers 53 that act as terminals.
  • the server 63 may be a distributed server and/or a cloudbased server, and that the server may be either physical, virtual, or containerised. This may include providing the application as a web-based application to perform the method.
  • FIG. 4 illustrates a screenshot 75 of an application user interface 21 (at the display of the computer) from an application performing the method 100 on the computer 53 (as a computer-implemented method). The steps of performing the method 100 of this example will be described in detail below.
  • the application includes a model in which inspection inputs can be provided, and an estimate of overall risk of issues can be provided, along with some recommendations.
  • various inputs about the level of risk associated with various types of contextual factors related to bicycle damage are received. These relate to contextual factors, that can include: - bicycle manufacturer;
  • the damage factors 13 are further objective inputs that can be derived from potential damage 3 that are scanned by the scanner 51.
  • a scanner may scan multiple images of the bicycle at various locations (e.g. sites 5 of the bicycle noted above). These multiple images are then assessed to identify any potential damage 3 that is then categorised to the type of damage, as well as particular characteristics such as size of the damage.
  • the damage factors may include objective inputs from a technician.
  • the objective inputs from a technician may be performed by the human eye with, or without, the aid of a scanner.
  • FIG. 6 An example of potential damage 3 that has been categorised to damage factors 13 for the application and method is illustrated in Fig. 6. This can range from “none” (i.e. no damage 14) to cosmetic, delamination 18, crack, as an illustrative example.
  • the categorisation also includes the size 22 (length, depth, width) of that respective damage.
  • Examples of damage may refer to any irregularity in the carbon fibre reinforced plastic material and is likely not intended to be present by the original manufacturer e.g. cosmetic damage (including scratches and chips), cracks, visible impacts, delamination, disbands, fibre breakages, fibre misalignments, improper fibre splicing, inclusions, porosity, resin micro-cracking, resin-rich areas, unbonds, and voids.
  • the damage factors are relevant to the model as these factors have an effect and/or otherwise related to the assessment of roadworthiness and further steps to rectify and correct issues with the bicycle 1. This relationship is included as part of the model in the pre-existing data set 15 in the database 16.
  • a simplified example of damage factors 13 on the frame 7 of the bicycle and interrelationship with roadworthiness is shown in Table 2 in Fig. 10.
  • a simplified example of damage factors 13 on other (non-frame) components of the bicycle 1 and inter-relationship with roadworthiness is shown in Table 3 in Fig. 11.
  • this relationship of damage factors 13 in the pre-existing data set may be trained and further developed by machine-learning methods.
  • the method further includes comparing 140 the contextual factors 11 and damage factors 13 with pre-existing data set(2) 15 from the database 16.
  • the preexisting data set 15 includes an association between the factors 11, 13 and a corresponding individual risk aspect.
  • the contextual factor “Usage type” can includes “Roads & Cycleways: Serious or Racing” which is associated with pre-existing data that there should be “Caution” and has a risk score of “1”.
  • An alternative “Usage type” includes “Off-road: Casual” that is associated with “Typical risk” and a risk score of “0”.
  • the damage factor “Head Tube” that has “Crack or impact greater than 5mm” is associated with pre-existing data that is should be an “Extreme risk” and has a risk score of “10”.
  • An alternative damage factor for the “Head Tube” that has “No damage” is associated with a risk aspect of “Typical risk” and with a risk score of “0”.
  • the plurality of contextual factors 11 and damage factors 13 are compared with the pre-existing data set (such as the pre-existing data in the simplified example in Tables 1 to 3 in Figs. 9 to 11).
  • the method further includes determining 150 roadworthiness 19 of the bicycle based on the comparison.
  • the comparison 17 includes the set of risk scores associated with each of the contextual factors 11 and damage factors 13.
  • determining 150 roadworthiness 19 includes a summation of the risk scores in the comparison.
  • the sum of the risk scores may then be compared to risk ratings 73.
  • risk ratings may involve bands of total risk scores with an associated total risk that is indicative of roadworthiness 19.
  • the method 100 further includes displaying 160 an indication 27 of the roadworthiness 19 of the bicycle 1.
  • This can include presenting the indication 27 of roadworthiness at a user interface 21 as illustrated in Fig. 7 which is a screenshot from a display.
  • this is generated in a report that can be sent to the technician, user of the bicycle, owner of the bicycle, manufacturer, insurance company, etc. This can include sending the report, comparison, and/or roadworthiness to the computer 53, 61, and/or server 63.
  • the method further includes determining corrective action 25 based on the comparison. This includes determining 151 potential corrective action 25 based on the comparison 17.
  • the corrective action 25 can also be displayed 160 and form part of a report as noted above.
  • Determining 151 the potential corrective action 25 may involve comparison with the pre-existing data set.
  • the pre-existing data set 15 may include association of the type, size or location of damage with the type of corrective action that can resolve such damage. In one simple example, this may include a data set where “crack damage” under “5mm” in size is associated with “repairable damage”.
  • This can further include suggested repair type and/or method. Such specifics of the repair can include, specifying the size and type of carbon fibre fabric required for the repair, the amount of epoxy, repair technique, time, and other resources.
  • the suggested repair type and/or method may comprise a plurality of option for the suggested repair type/or method.
  • the method further includes an indication of respective resource requirements for those options. This enables the technician and/or user the choice to select from the options that suits their needs and situation.
  • potential corrective action can take other forms.
  • this may include replacement 31 of one or more components of the bicycle.
  • the pre-existing data may specify that the damage is non-repairable and the component must be replaced for the bicycle to be roadworthy.
  • the potential corrective action includes information for a qualified repairer, supplier, specialist, manufacturer, etc. to facilitate repair, replacement, or servicing of components.
  • potential corrective action may include particular maintenance, or prescribing a maintenance schedule based on the contextual and damage factors.
  • potential corrective action may include additional or specific inspection, or inspection schedule for the bicycle as discussed in further detail below. [0087] Additional inspection
  • the result of the comparison includes additional inspection. For example, there may be a common causation (and/or correlation) between a damage type at a site that is related to potential damage at another site (that has not yet been detected).
  • the method 100 includes determining 153 one or more areas of the bicycle for further inspection based on the comparison.
  • the pre-existing data set includes a relationship between a type of damage at the fork which increases the likelihood of corresponding additional damage at the steerer of the bicycle 1.
  • the method further includes determining 153 that if there is that type of damage at the fork, identifying those related areas that may have higher risk of damage and proposing additional inspections. It is to be appreciated that the related additional damage may be on the same component or other component of the bicycle.
  • the method includes displaying 161 an indication of the one or more areas for further inspection. This aids the system, and technician, to further scan 163 the one or more areas as a further inspection to detect additional potential damage.
  • This can include, further scanning, review at a higher resolution, another scanning or inspection method, or different inspection schedule.
  • the method then includes categorising 165 the additional potential damage at the one or more areas 43 to generate an updated plurality of damage factors 13.
  • the method further includes comparing the plurality of contextual factors 11 and the updated plurality of damage factors to form an updated comparison for determining roadworthiness 19, potential corrective action, and/or further inspection.
  • the method includes providing a visualisation to the technician, user at a graphical user interface.
  • This may include an interactive report to illustrate damage at components of the bicycle.
  • this can include visualisation to assist identification of the locations of the damage, and guide further scanning, inspection, repair, and/or replacement.
  • An example of an application that contains an interactive visualisation 77 at a graphical user interface is shown in Fig. 8.
  • the visualisation includes a 3D graphical representation of the bicycle 1 with an overlay indicating locations of potential damage 3.
  • this includes further data and information 79 relating to delamination damage that was detected at part of the bicycle.
  • the technician will be able to supplement this inspection data by selecting an area of the 3D bicycle model visualised within the application, and attaching/tagging the data obtained from the scanner or other instrument to this specific location.
  • an initial pre-existing data set may be used.
  • Data from initial inspections are obtained and provided to subject matter experts in non-destructive testing, bicycle mechanics/repair, and carbon fibre repair. These experts will:
  • Each of these represents an expert assessment/classification/label, which will be recorded to provide initial pre-existing data sets.
  • training data from each inspection may be used to develop supervised machine-learning models that predict the classification of each of these categories from contextual and damage factors recorded by technicians in future inspections.
  • the pre-existing data set 15 is trained and may be continuously updated from learning patterns from received contextual factors, scans, and determined damage factors. This training can improve the model and performance of the inspection method to be more accurate and, potentially, predict weaknesses and recommend preventative measures. This includes improving the risk rating, the repair type, the repair cost, the potential risk posed if factors are modified, suggested maintenance schedule, and suggested follow-up inspection schedule.
  • potential damage detected at the sites and/or the comparison (along with associated information such as contextual factors and other damage) is recorded and stored in a database 16.
  • This may include storing the information at the computer or at the server 63.
  • This can include an operator of the database and machine learning system. This forms historical records that may be used as training data to update the models.
  • the information is de-identified to preserve privacy of the users and owners of the bicycles.
  • the pre-existing data set 15 is updated 170 based on comparing the pre-existing data set 15 with the received plurality of contextual factors 11 and plurality of damage factor 13. In further examples, this is achieved by comparing with a plurality of previous inspections and includes comparing the historical records (of the plurality of contextual factors and/or damage factors). This can be done, for example, at the computer and/or server. In some further examples, updating the pre-existing data set is continuously, whilst in other examples, this is done periodically.
  • Updating the pre-existing data set can be important to improve the model based on usage and other factors.
  • the original pre-existing data set may provide an inspection assessment with a particular roadworthiness 19 or prescribed corrective action 25.
  • certain improvements such as improvement in manufacture
  • the bicycle is more resilient or reliable even with such damage.
  • a particular type of damage/crack at a site does not actually affect overall risk over longer term use and the model will downgrade the risk score for that particular type of damage.
  • a particular model of bicycle may be more durable than others, and the risk score may require adjustment.
  • Machine -learning includes a broad range of models, of which categories are supervised and unsupervised. Both supervised and unsupervised modelling approaches are described herein and may be used with the method and system.
  • supervised learning techniques such as regression, decision trees and random forests will be used to learn associations between inputs (contextual and damage factors recorded during inspections) and outputs (risk and repair classifications provided by subject matter experts). These models will then be used to produce predictions on future data. For example, when a technician inspects future bicycles and records various contextual and damage factors, the data will be processed by the ML algorithm(s), and the appropriate outputs/predictions will be automatically generated. Ultimately, this technical solution will enable technicians to produce high quality inspection reports informed by machine learning.
  • supervised learning techniques will be used to predict the change in risk if specific factors were modified. For example, if the rider weight is reduced or the bicycle usage is changed to a different usage type, then an array of potential decisions can be provided to the client along with the potential changes in risk that would be expected if those changes were made.
  • updating the pre-existing data set 15 may further comprise sending, to a user display: at least part of the pre-existing data set; a representation, or summary, of the historical plurality of contextual factors and/or plurality of damage factors; and at least one or more proposed updates to the pre-existing data set.
  • Unsupervised learning models such as Apriori algorithm will be used to identify clusters of data and association rules, primarily from the inspection data of actual bicycle. That is, not being reliant on the classifications or input from the subject matter experts. These models will be used to learn patterns of factors that occur concurrently, so that maintenance and subsequent inspection schedules can be suggested.
  • unsupervised learning models can identify combinations of factors that frequently occur together (clusters) such as a specific damage type, damage size and damage location that frequently occurs in conjunction with a specific bicycle model and when the rider is above a certain weight (to clarify, perhaps there is a specific bicycle model that tends to exhibit fibre breakages near the bottom bracket when the bicycle is used for serious racing by riders above 100 kg).
  • clusters such as a specific damage type, damage size and damage location that frequently occurs in conjunction with a specific bicycle model and when the rider is above a certain weight (to clarify, perhaps there is a specific bicycle model that tends to exhibit fibre breakages near the bottom bracket when the bicycle is used for serious racing by riders above 100 kg).
  • the model
  • machine-learning models will be dynamic. Specifically, as more inspections are completed, the new data will be added to the pre-existing data set and database, and will be processed in the same manner as above to develop more accurate predictions over time.
  • each bicycle can be tracked longitudinally through subsequent inspections (e.g. using the bicycle’s serial number) to monitor whether predictions made by the system were ultimately successful or unsuccessful, as well as whether any maintenance or repair solution was successful or unsuccessful.
  • These outcomes can be implemented as aspects of reinforcement learning in future i.e. to penalise the model when it performs poorly and stimulate further improvements.
  • laboratory testing can help improve the modelling process with objective data.
  • a bicycle frame can have specific damage types applied at various points and then be tested to failure in a laboratory setting.
  • We can test the difference in load tolerance between two identical frames, each with different damage types. This may help to refine the current model and ML aspects and the pre-existing data set.
  • Figs. 13 and 14 illustrate a variation of the computer application and user interface described above.
  • potential damage and the plurality of sites 5 of the bicycle 1 can be selected or deselected using check boxes 81.
  • the sites “head tube”, “seat tube”, and “steerer” have been selected at the check boxes 81.
  • Details of potential damage 3 for the selected sites 5 are shown at the user interface.
  • the potential damage 3 is categorised in more detail compared to the example of Fig. 6 discussed earlier. This includes, for example the: part that is damaged, type of damage, location of the damage (e.g. side and/or area), the length of damage, the width of damage, and depth of damage.
  • This also include an interface showing multiple damage on the same site 5 (e.g. both the head tube and seat tube have two separate potential damage).
  • Fig. 15 illustrates an example of a processing device 55 than may be associated with a computer 53, server 63, and portable communication device 61.
  • the processing device includes a processor 1510, a memory 1520 and an interface device 1540 that communicate with each other via a bus 1530.
  • the memory 1520 stores instructions and data for implementing one or more of the methods 100 described above, and the processor 1510 performs the instructions (such as a computer program) from the memory 1520 to implement the methods 100.
  • the interface device 1540 may include a communications module that facilitates communication with the communications network 59 and, in some examples, with the user interface and peripherals such as data store 16 or a display.
  • the processing device may be independent network elements, the processing device may also be part of another network element. Further, some functions performed by the processing device may be distributed between multiple network elements.
  • the server 63 may be associated with multiple processing devices and steps of the method 100 may be performed, and distributed, across more than one of these devices.

Abstract

An inspection method (100) comprising: receiving (110) a plurality of contextual factors (11) based on usage and history of a bicycle (1); scanning (120) the bicycle (1) to detect potential damage (3) at a plurality of sites (5) at the bicycle (1); categorising (130) the potential damage (3), at each of the plurality of sites (5), to generate a plurality of damage factors (13); comparing (140) the plurality of contextual factors (11) and plurality of damage factors (13) with a pre-existing data set (15) from a database (16) to form a comparison (17); determining (150) roadworthiness (19) of the bicycle (1) based on the comparison (17); and displaying (160), at a user interface (21), an indication (23) of the roadworthiness (19) of the bicycle (1) potential corrective actions, maintenance schedules and inspection schedules. There is also disclosed a system (2) to inspect a bicycle (1).

Description

"Computer assisted inspection and modelling of fibre-reinforced plastic bicycle frames"
Cross-Reference to Related Applications
[0001] The present application claims priority from Australian Provisional Patent Application No 2021903430 filed on 26 October 2021, the contents of which are incorporated herein by reference in their entirety.
Technical Field
[0002] The present disclosure relates to a method and system of modelling and inspecting components of a bicycle. In some particular applications, this includes computer modelling and inspection of fibre-reinforced plastic bicycle frames for damage using non-destructive testing techniques.
Background
[0003] Carbon fibre bicycle frames and components can experience catastrophic failures resulting in severe injury or death. This can result from contextual factors such as inappropriate usage of the bicycle and/or reduced integrity due to damage. Damage is not always visible to the naked eye due to size or type of damage, or it may be on the interior of the frame or component. It can be caused via physical impacts such as crashes, or can even be present due to manufacturing defects such as delamination and resin-rich areas. Damage is also difficult to quantify - e.g. what size, type of damage and location of damage will substantially increases risk of catastrophic failures? Damage to carbon fibre bicycle frames and components can result in sudden, unexpected failure (in contrast to failure modes from metals and metal alloys).
[0004] Damage identification and interpretation of non-metal materials such as carbon fibre reinforced polymers (CFRP) is a highly technical process requiring appropriate training, technology, and experience. Non-destructive testing (NDT) of composite materials is heavily regulated within the defence and aerospace sectors. However, no such regulation exists within the bicycle industry. [0005] The bicycle inspection process, as is currently offered, lacks a standardised inspection method/s or any governance and oversight of the application of such method/s. Whether formally or informally, businesses or professionals at any level within the industry who offer advice relating to the severity of damage/defects expose themselves, their business, their customers and stakeholders through a lack of inspection rigour, quality control and diagnostic intelligence.
[0006] It is desirable to have a standardised technical method and system to inspect and assess the condition of one or more components of a bicycle and provide an objective output of roadworthiness and actionable items to improve roadworthiness if necessary (e.g. suitable repair options) and to monitor damage with follow-up inspection schedules. This is important for safety of the rider as well as management of servicing and repair of the bicycle to provide longevity for the components.
[0007] Any discussion of documents, acts, materials, devices, articles or the like which has been included in the present specification is not to be taken as an admission that any or all of these matters form part of the prior art base or were common general knowledge in the field relevant to the present disclosure as it existed before the priority date of each claim of this application.
[0008] Throughout this specification the word "comprise", or variations such as "comprises" or "comprising", will be understood to imply the inclusion of a stated element, integer or step, or group of elements, integers or steps, but not the exclusion of any other element, integer or step, or group of elements, integers or steps.
Summary
[0009] There is disclosed an inspection method comprising:
- receiving a plurality of contextual factors based on usage and history of a bicycle;
- scanning the bicycle (e.g. visually and via NDT methods) to detect potential damage at a plurality of sites at the bicycle; - categorising and sizing the potential damage, at each of the plurality of sites, to generate a plurality of damage factors;
- comparing the plurality of contextual factors and plurality of damage factors with a pre-existing data set from a database to form a comparison;
- determining roadworthiness of the bicycle based on the comparison; and
- displaying, at a user interface, an indication of the roadworthiness of the bicycle. This may also include listing contextual and damage factors of concern, suggesting suitable repair options, and indicating likely costs of repair.
[0010] Examples of the present disclosure can be used for safety inspections of carbon fibre bicycle frames and components using non-destructive testing (NDT) techniques. This may include the identification and assessment of damage and/or defects uncovered during the inspection process. In some examples, this may include providing a risk assessment.
[0011] In some examples, the inspection method further comprises determining potential corrective action based on the comparison. The method also includes displaying an indication of the potential corrective action for the bicycle.
[0012] In some examples, the method further includes updating the pre-existing data set based on comparing the pre-existing data set with the plurality of contextual factors and the plurality of damage factors of the bicycle.
[0013] There is also disclosed a computer program that, when executed by a computer, causes the computer to perform the computer-implemented method described above.
[0014] There is also disclosed a system comprising: a scanner to scan a bicycle for potential damage; at least one processing device to perform the inspection method described above; and a display for outputting the indication of roadworthiness and/or potential corrective action.
Brief Description of Drawings
[0015] Fig. 1 illustrates a system to model and inspect a bicycle; [0016] Fig. 2 is a flow diagram of a method of inspecting a bicycle;
[0017] Fig. 3 illustrate the concept of modelling and inspecting a bicycle;
[0018] Fig. 4 is a screenshot of a computer application for inspecting a bicycle;
[0019] Fig. 5 illustrates a user interface of the application to enter contextual factors;
[0020] Fig. 6 illustrates a user interface showing detected bicycle damage and respective damage factors;
[0021] Fig. 7 illustrates a user interface showing an indication of roadworthiness and corrective action;
[0022] Fig. 8 is a visualisation at a user interface of the bicycle and detected damage in an interactive window;
[0023] Fig. 9 is an example table of contextual factors and the relationship with roadworthiness as part of pre-existing data;
[0024] Fig. 10 is an example table of damage factors for a bicycle frame and the relationship with roadworthiness as part of pre-existing data;
[0025] Fig. 11 is an example table of damage factors for bicycle components and the relationship with roadworthiness as part of pre-existing data;
[0026] Fig. 12 is a table showing risk ratings based on risk score;
[0027] Fig. 13 is an alternative screenshot of a computer application for inspecting a bicycle;
[0028] Fig. 14 illustrates an user interface showing detected bicycle damage and respective damage factors: and
[0029] Fig. 15 is a schematic example of a processing device. Description of Embodiments
[0030] Overview of the system
[0031] Fig. 1 illustrates an example of a system 2 to model and inspect a bicycle 1. This includes a scanner 51 to scan a plurality of sites (5) at the bicycle to detect potential damage 3. The scanner 51 may include non-destructive scanners such as optical cameras, ultrasonic sensors, X-ray scanning systems, tap hammers etc.
[0032] The system 2 also includes at least one computing device 53 that includes at least one processor 55, and a user interface such as a display 57. The display 57 outputs an indication of roadworthiness and/or potential corrective action determined by the method described below. In some examples, the computing device 53 is a computer (including desktop computer, laptop computer, tablet computer, mobile communication device, smartphone, specific purpose computing device etc.). In some examples, the computing device 53 is also in communication with at least one other computing device 61, 63, and data storage 16. This can include direct communication, or over a communications network 59.
[0033] Overview of the method
[0034] An example of an inspection method 100 performed by the system 2 will now be described generally with reference to Fig. 2. The method 100 includes receiving 110 a plurality of contextual factors based on usage and history of a bicycle 1. This will be discussed in further detail below and may include contextual factors such as type of use, age of components of the bicycle, rider weight, time between servicing, etc.
[0035] The method also includes scanning 120 the bicycle 1 to detect potential damage 3 at a plurality of sites 5 at the bicycle 1. This may include scanning 120 for damage such as cracks, delamination, deformation, etc..
[0036] The method 100 further includes categorising the potential damage 3 (if found at the plurality of sites 5) to generate a respective plurality of damage factors 13. Categorisation may include categorizing the size, type, age, and other characteristics of the damage 3. This enables categorization and generation of damage factors that can be used as objective measures for the model to compare and assess the state of the bicycle 1. [0037] The method further includes comparing 140 the plurality of contextual factors 11 and plurality of damage factors 13 with a pre-existing data set 15 from a database 16. The preexisting data set 15 may include data to model the performance, lifespan, wear and fatigue, maintenance, and other characteristics of the bicycle 1 and bicycle components. As described in further detail below, the pre-existing data set 15 and model may be updated with machinelearning models.
[0038] The method 100 further includes determining 150 roadworthiness 19 of the bicycle 1 based on the comparison. An indication of the roadworthiness 19 of the bicycle is then displayed 160 at a user interface 21 for a user.
[0039] In some examples, the method 100 also includes determining 151 potential corrective action 25 based on the comparison 17. This can include replacement, repair, maintain, inspect, or other action. This may also include providing information on qualified repairers, suppliers, manufacturers, replacement or substitute parts, etc.
[0040] Examples of the system 2 and method 100 aims to provide standardised nondestructive testing for the cycling industry, particularly for CFRP components. This includes applications that apply statistical models that in conjunction with contextual factors 11 and damage factors 13, provide an effective and objective report on the state of the bicycle. Importantly, such reports can be produced objectively with results that are standardised and comparable with reports generated by other technicians using the system 2 and method 100. This above described process and concept 71 is also illustrated in Fig. 3.
[0041] Additional details of the system will be described in further detail followed by an example of the method 100 implemented, at least in part, on an application running on the computer 53.
[0042] The bicycle components and context of the problems
[0043] Current customer-centric approaches to carbon fibre bicycle and component inspection focus primarily on the identification and assessment of observable (visual) damage only - and often by inexperienced and unqualified bicycle mechanics. Relatively few practitioners (mechanics, repairers etc.) in Australia adopt NDT techniques that help identify underlying/invisible damage or defects. Outside of NDT, no solution currently exists that incorporates contextual information related to the owner, bike history, usage and care/maintenance. Such contextual factors may only present an elevated risk of failure when combined with other objective/contextual factors or when a certain threshold is reached.
[0044] The bicycle 1 includes a frame 7 that can be made of carbon reinforced plastic (CFRP), a mix of carbon fibre and other fibres reinforced with plastic, or other fibre embedded in plastics in a composite structure. In some examples, portions of the frame 7 are made of CFRP with other component materials embedded or joined therein. For example, mounts, fastener receiving portions, or other high-wear portions, made of metals or metal alloys may be molded in the frame 7.
[0045] The frame 7 can include various portions (such as sites 5), such as:
- head tube;
- top tube;
- down tube;
- seat tube;
- seat stay;
- suspension linkages; and
- chain stay.
[0046] One or more of these sites 5 of the frame 7 may advantageously be formed of composite materials such as CFRP for high strength to weight ratio.
[0047] The bicycle may also include other components that are not part of the frame 7, but also made of composite materials. This may include one or more of: fork; steerer; wheel rim;
- wheel hub;
- handlebar; crank; chainring; seatpost; and stem.
[0048] Scanner 51
[0049] In some examples scanning is performed by, or aided with, a scanner 51 configured to detect damage 3. Preferably, the scanner 51 utilises non-destructive testing techniques to detect damage. In one example, this may include an optical scanner (e.g. camera) or other measurement device to determine the size, location, and other characteristics, of visible damage such as cracks, delamination, breakages, etc. This may include optical or digital magnification to obtain clarity on the visible damage. In some examples, this can include measurement means, to aid in determining the size of the damage. Such measurement means may include an optical rangefinder, laser rangefinder (including LiDAR), gyroscopes, magnetometers, accelerometers, to provide information to enable determination of the size of damage. In some examples, the scanner 51 may be coupled with light sources to provide contrast and clarity on any potential damage. This can include using particular wavelengths of light (including visible and invisible wavelengths). In some examples, scanning 120 of the bicycle includes a technician’s input in operating the scanner 51, and/or interpreting the results, images, or other data from the scanner 51 to determine the nature of the damage.
[0050] In some examples, the scanner 51 includes an X-ray system to obtain one or more X- ray images of the bicycle. This may be particularly advantageous in detecting damage beneath the surface of the frame. For example, the damage may be internal, shielded by other opaque components and/or under paint or other coating on the bicycle.
[0051] In some examples, the scanner 51 includes an ultrasonic sensor system to perform ultrasonic inspection. This utilizes sound waves to determine inconsistencies in the material that are indicative of damage to the bicycle. Additional scanners operating with nondestructive techniques may be used, such as: thermography inspection; liquid-penetrant; radiographic testing; electromagnetic testing; eddy current testing; vibrational analysis, acoustic testing using a hammer, etc.
[0052] Computer 53, 61
[0053] The computer 53 may be a desktop computer, laptop computer, single purpose computing device, tablet computer, computer terminal, smart phone or other communication device. This can include a processing device 55, display 57, and a data store/memory. The computer 53 may perform, at least in part, the method 100 described herein. In some examples, the computer and associated data store contains a computer program (i.e. application) to perform the method 100. In other examples, the application is a web application hosted on the server 63, whereby the computer 53 acts as a terminal to provide a user interface with the technician.
[0054] In some examples, the computer 53 is in wired or wireless communication with the scanner 51 to receive scans, or associated scanner data. In further examples, the technician may assist in communicating data between the scanner 51 and the computer 53. For example, the technician may physically take a memory card, print-out, or other storage medium from the scanner 51 and transfer this to the computer 53. In other examples, the technician may read data from the scanner 51 and manually input the data to the computer 53.
[0055] In some examples, the computer 53 and application may be operative to send inspection reports or other information to a client’s computer 61. This may include email, short message service, application based messages/notification, etc.
[0056] Server and associated database [0057] The server 63 includes a processing device and associated data store 16. The server may be operated by an entity to provide subscription service to technicians at the computers 53. An advantage is that the entity may receive data from multiple sources (i.e. different technicians), which can provide a larger data set for training and the machine learning model. The server 63 is associated with a data store 16 that can hold historical records, pre-existing data sets and machine learning models 15. In some examples, the data store 16 also stores the computer program to perform the method 100.
[0058] In some examples, the server 63 performs the role of providing the computers 53 with pre-existing data sets. This may include sending updates of the pre-existing data sets. Thus the server may also receive data from actual inspections from the computers that can be used fortraining and updating the data sets. This may include the server 63 performing at least part of the machine-learning functions (described in further detail below).
[0059] In other examples, as noted above, the server 63 runs the application to perform the method 100 and communicates with the computers 53 that act as terminals.
[0060] It is to be appreciated that the server 63 may be a distributed server and/or a cloudbased server, and that the server may be either physical, virtual, or containerised. This may include providing the application as a web-based application to perform the method.
[0061] Example of an application performing an example of the method 100
[0062] Fig. 4 illustrates a screenshot 75 of an application user interface 21 (at the display of the computer) from an application performing the method 100 on the computer 53 (as a computer-implemented method). The steps of performing the method 100 of this example will be described in detail below.
[0063] Contextual factors 11
[0064] The application includes a model in which inspection inputs can be provided, and an estimate of overall risk of issues can be provided, along with some recommendations. In some examples of this model, various inputs about the level of risk associated with various types of contextual factors related to bicycle damage are received. These relate to contextual factors, that can include: - bicycle manufacturer;
- bicycle model;
- bicycle type (e.g. Casual or Serious/Racing on roads, cycleways, off-road, downhill mountain biking, enduro or jumping);
- bicycle usage type (e.g. Casual or Serious/Racing on roads, cycleways, off-road, downhill mountain biking, enduro or jumping);
- usage appropriateness (is the bicycle being used for its intended purpose);
- bicycle age (difference in years between the current year and the model year of the bicycle);
- rider weight;
- period since last bicycle service; and
- history, or unknown history, and duration of history of the bicycle.
[0065] These contextual factors may be entered into the user interface of the application as illustrated in Fig. 5.
[0066] These contextual factors will be entered into the model where it can be determined whether these factors can have an effect and/or are otherwise correlated with roadworthiness, damage and associated rectification steps. This relationship is included as part of the model in the pre-existing data set 15 in the database 16.
[0067] A simplified example of contextual factors 11 and inter-relationship with roadworthiness is shown in Table 1 in Fig. 9. As will be discussed in other examples below, the relationship may be trained and developed by machine -learning methods.
[0068] Damage factors 13 [0069] The damage factors 13 are further objective inputs that can be derived from potential damage 3 that are scanned by the scanner 51. For example, a scanner may scan multiple images of the bicycle at various locations (e.g. sites 5 of the bicycle noted above). These multiple images are then assessed to identify any potential damage 3 that is then categorised to the type of damage, as well as particular characteristics such as size of the damage. In some examples, the damage factors may include objective inputs from a technician. In some alternatives, the objective inputs from a technician may be performed by the human eye with, or without, the aid of a scanner.
[0070] An example of potential damage 3 that has been categorised to damage factors 13 for the application and method is illustrated in Fig. 6. This can range from “none” (i.e. no damage 14) to cosmetic, delamination 18, crack, as an illustrative example. The categorisation also includes the size 22 (length, depth, width) of that respective damage.
[0071] Examples of damage may refer to any irregularity in the carbon fibre reinforced plastic material and is likely not intended to be present by the original manufacturer e.g. cosmetic damage (including scratches and chips), cracks, visible impacts, delamination, disbands, fibre breakages, fibre misalignments, improper fibre splicing, inclusions, porosity, resin micro-cracking, resin-rich areas, unbonds, and voids.
[0072] The damage factors are relevant to the model as these factors have an effect and/or otherwise related to the assessment of roadworthiness and further steps to rectify and correct issues with the bicycle 1. This relationship is included as part of the model in the pre-existing data set 15 in the database 16.
[0073] A simplified example of damage factors 13 on the frame 7 of the bicycle and interrelationship with roadworthiness is shown in Table 2 in Fig. 10. A simplified example of damage factors 13 on other (non-frame) components of the bicycle 1 and inter-relationship with roadworthiness is shown in Table 3 in Fig. 11. Like contextual factors, this relationship of damage factors 13 in the pre-existing data set may be trained and further developed by machine-learning methods.
[0074] Comparing the factors with pre-existing data set and determining roadworthiness [0075] The method further includes comparing 140 the contextual factors 11 and damage factors 13 with pre-existing data set(2) 15 from the database 16. In one example, the preexisting data set 15 includes an association between the factors 11, 13 and a corresponding individual risk aspect.
[0076] Referring to Fig. 9, the contextual factor “Usage type” can includes “Roads & Cycleways: Serious or Racing” which is associated with pre-existing data that there should be “Caution” and has a risk score of “1”. An alternative “Usage type” includes “Off-road: Casual” that is associated with “Typical risk” and a risk score of “0”.
[0077] Referring to Fig. 10, the damage factor “Head Tube” that has “Crack or impact greater than 5mm” is associated with pre-existing data that is should be an “Extreme risk” and has a risk score of “10”. An alternative damage factor for the “Head Tube” that has “No damage” is associated with a risk aspect of “Typical risk” and with a risk score of “0”.
[0078] The plurality of contextual factors 11 and damage factors 13 are compared with the pre-existing data set (such as the pre-existing data in the simplified example in Tables 1 to 3 in Figs. 9 to 11).
[0079] The method further includes determining 150 roadworthiness 19 of the bicycle based on the comparison. In one example, the comparison 17 includes the set of risk scores associated with each of the contextual factors 11 and damage factors 13. Thus determining 150 roadworthiness 19 includes a summation of the risk scores in the comparison. The sum of the risk scores (total risk score) may then be compared to risk ratings 73. As illustrated in Fig. 12, risk ratings may involve bands of total risk scores with an associated total risk that is indicative of roadworthiness 19.
[0080] The method 100 further includes displaying 160 an indication 27 of the roadworthiness 19 of the bicycle 1. This can include presenting the indication 27 of roadworthiness at a user interface 21 as illustrated in Fig. 7 which is a screenshot from a display. In some examples, this is generated in a report that can be sent to the technician, user of the bicycle, owner of the bicycle, manufacturer, insurance company, etc. This can include sending the report, comparison, and/or roadworthiness to the computer 53, 61, and/or server 63. [0081] Corrective action 25
[0082] In some examples, the method further includes determining corrective action 25 based on the comparison. This includes determining 151 potential corrective action 25 based on the comparison 17. The corrective action 25 can also be displayed 160 and form part of a report as noted above.
[0083] Determining 151 the potential corrective action 25 may involve comparison with the pre-existing data set. The pre-existing data set 15 may include association of the type, size or location of damage with the type of corrective action that can resolve such damage. In one simple example, this may include a data set where “crack damage” under “5mm” in size is associated with “repairable damage”. This can further include suggested repair type and/or method. Such specifics of the repair can include, specifying the size and type of carbon fibre fabric required for the repair, the amount of epoxy, repair technique, time, and other resources. In some examples, the suggested repair type and/or method may comprise a plurality of option for the suggested repair type/or method. In some examples, the method further includes an indication of respective resource requirements for those options. This enables the technician and/or user the choice to select from the options that suits their needs and situation.
[0084] It is to be appreciated that potential corrective action can take other forms. In some examples, this may include replacement 31 of one or more components of the bicycle. For example, if the damage is too severe, the pre-existing data may specify that the damage is non-repairable and the component must be replaced for the bicycle to be roadworthy.
[0085] In some examples, the potential corrective action includes information for a qualified repairer, supplier, specialist, manufacturer, etc. to facilitate repair, replacement, or servicing of components.
[0086] In another example, potential corrective action may include particular maintenance, or prescribing a maintenance schedule based on the contextual and damage factors. In further examples, potential corrective action may include additional or specific inspection, or inspection schedule for the bicycle as discussed in further detail below. [0087] Additional inspection
[0088] In some examples of the method, the result of the comparison includes additional inspection. For example, there may be a common causation (and/or correlation) between a damage type at a site that is related to potential damage at another site (that has not yet been detected). Thus in some examples, the method 100 includes determining 153 one or more areas of the bicycle for further inspection based on the comparison.
[0089] In one illustrative example, the pre-existing data set includes a relationship between a type of damage at the fork which increases the likelihood of corresponding additional damage at the steerer of the bicycle 1. In such cases, the method further includes determining 153 that if there is that type of damage at the fork, identifying those related areas that may have higher risk of damage and proposing additional inspections. It is to be appreciated that the related additional damage may be on the same component or other component of the bicycle.
[0090] To that end, the method includes displaying 161 an indication of the one or more areas for further inspection. This aids the system, and technician, to further scan 163 the one or more areas as a further inspection to detect additional potential damage. This can include, further scanning, review at a higher resolution, another scanning or inspection method, or different inspection schedule.
[0091] The method then includes categorising 165 the additional potential damage at the one or more areas 43 to generate an updated plurality of damage factors 13. The method further includes comparing the plurality of contextual factors 11 and the updated plurality of damage factors to form an updated comparison for determining roadworthiness 19, potential corrective action, and/or further inspection. F
[0092] Visualisation
[0093] In some examples, the method includes providing a visualisation to the technician, user at a graphical user interface. This may include an interactive report to illustrate damage at components of the bicycle. In some examples, this can include visualisation to assist identification of the locations of the damage, and guide further scanning, inspection, repair, and/or replacement. [0094] An example of an application that contains an interactive visualisation 77 at a graphical user interface is shown in Fig. 8. In this example, the visualisation includes a 3D graphical representation of the bicycle 1 with an overlay indicating locations of potential damage 3. When the technician wishes to scan a specific part of the bicycle (e.g. after they find some visible impact damage), they will be able to click the appropriate location on the 3D model, perform a scan on the real-world bicycle in that location, the data will be passed through to the application, and finally, a 3D visualisation will be created from that data and will be stored/tagged at that location. This may indicate areas of the bicycle that may need further corrective action. In addition, the user interface may be interactive to enable the technician or user to obtain further details, such as the results of the scan. In Fig. 8, this includes further data and information 79 relating to delamination damage that was detected at part of the bicycle.
[0095] In some examples of the application, the technician will be able to supplement this inspection data by selecting an area of the 3D bicycle model visualised within the application, and attaching/tagging the data obtained from the scanner or other instrument to this specific location.
[0096] The data obtained from contextual factors and scans (that may include detected damage and/or damage factors) could be used to produce risk visualisation(s).
[0097] Where large areas need to be scanned such as an entire downtube, the technician will be able to select the entire downtube, this will "unwrap" the image of the downtube into various segments (to conceptualise unwrapping, think about how a surface of a cube can be cut and laid out flat), the scan can be performed on each segment, and finally, the segments can be re-wrapped onto the original 3D model.
[0098] Further iterations of this could include some automated visualisation of stress on the bicycle when the data visualisation shows areas of concern. For example, a scan performed at the bottom of the down-tube that has areas of concern, might result in a visualisation of increased stress on closely connected areas such as around the bottom bracket and bottom of the seat tube. [0099] Initial model and pre-existing data set
[0100] To implement the model (as well us updates to the model using machine-learning), an initial pre-existing data set may be used. Data from initial inspections are obtained and provided to subject matter experts in non-destructive testing, bicycle mechanics/repair, and carbon fibre repair. These experts will:
- Assess the risk posed by each combination of contextual and damage factors observed in each inspection and provide a risk rating
- Assess the damage type(s) and suggest appropriate repair and/or maintenance options
- Assess the damage type(s) and suggest appropriate repair costs
[0101] Each of these represents an expert assessment/classification/label, which will be recorded to provide initial pre-existing data sets. In time, training data from each inspection (discussed below) may be used to develop supervised machine-learning models that predict the classification of each of these categories from contextual and damage factors recorded by technicians in future inspections.
[0102] Training
[0103] In some examples the pre-existing data set 15 is trained and may be continuously updated from learning patterns from received contextual factors, scans, and determined damage factors. This training can improve the model and performance of the inspection method to be more accurate and, potentially, predict weaknesses and recommend preventative measures. This includes improving the risk rating, the repair type, the repair cost, the potential risk posed if factors are modified, suggested maintenance schedule, and suggested follow-up inspection schedule.
[0104] In some examples, potential damage detected at the sites and/or the comparison (along with associated information such as contextual factors and other damage) is recorded and stored in a database 16. This may include storing the information at the computer or at the server 63. This can include an operator of the database and machine learning system. This forms historical records that may be used as training data to update the models. In some examples, the information is de-identified to preserve privacy of the users and owners of the bicycles.
[0105] In some examples, the pre-existing data set 15 is updated 170 based on comparing the pre-existing data set 15 with the received plurality of contextual factors 11 and plurality of damage factor 13. In further examples, this is achieved by comparing with a plurality of previous inspections and includes comparing the historical records (of the plurality of contextual factors and/or damage factors). This can be done, for example, at the computer and/or server. In some further examples, updating the pre-existing data set is continuously, whilst in other examples, this is done periodically.
[0106] Updating the pre-existing data set can be important to improve the model based on usage and other factors. For example, the original pre-existing data set may provide an inspection assessment with a particular roadworthiness 19 or prescribed corrective action 25. However, overtime there may be certain improvements (such as improvement in manufacture) than means the bicycle is more resilient or reliable even with such damage. Thus after a while (and with multiple inspections) it is evident that a particular type of damage/crack at a site does not actually affect overall risk over longer term use and the model will downgrade the risk score for that particular type of damage. In other examples, a particular model of bicycle (contextual factor) may be more durable than others, and the risk score may require adjustment.
[0107] Machine learning
[0108] Machine -learning includes a broad range of models, of which categories are supervised and unsupervised. Both supervised and unsupervised modelling approaches are described herein and may be used with the method and system.
[0109] First, supervised learning techniques such as regression, decision trees and random forests will be used to learn associations between inputs (contextual and damage factors recorded during inspections) and outputs (risk and repair classifications provided by subject matter experts). These models will then be used to produce predictions on future data. For example, when a technician inspects future bicycles and records various contextual and damage factors, the data will be processed by the ML algorithm(s), and the appropriate outputs/predictions will be automatically generated. Ultimately, this technical solution will enable technicians to produce high quality inspection reports informed by machine learning.
[0110] Second, supervised learning techniques will be used to predict the change in risk if specific factors were modified. For example, if the rider weight is reduced or the bicycle usage is changed to a different usage type, then an array of potential decisions can be provided to the client along with the potential changes in risk that would be expected if those changes were made.
[0111] Thus with supervised learning, updating the pre-existing data set 15 may further comprise sending, to a user display: at least part of the pre-existing data set; a representation, or summary, of the historical plurality of contextual factors and/or plurality of damage factors; and at least one or more proposed updates to the pre-existing data set.
[0112] This enables the subject matter expert to review the proposed updates and consider the historical data. In response, the subject matter expert can provide an acceptance, modification, or rejection to one or more of the proposed updates to the pre-existing data set 15.
[0113] Unsupervised learning models such as Apriori algorithm will be used to identify clusters of data and association rules, primarily from the inspection data of actual bicycle. That is, not being reliant on the classifications or input from the subject matter experts. These models will be used to learn patterns of factors that occur concurrently, so that maintenance and subsequent inspection schedules can be suggested. For example, unsupervised learning models can identify combinations of factors that frequently occur together (clusters) such as a specific damage type, damage size and damage location that frequently occurs in conjunction with a specific bicycle model and when the rider is above a certain weight (to clarify, perhaps there is a specific bicycle model that tends to exhibit fibre breakages near the bottom bracket when the bicycle is used for serious racing by riders above 100 kg). In future inspections where similar factors are recorded by a technician, the model can suggest a targeted strategy of subsequent inspections and maintenance to monitor for the damage type/size/location associated with these factors.
[0114] It is intended that the machine-learning models will be dynamic. Specifically, as more inspections are completed, the new data will be added to the pre-existing data set and database, and will be processed in the same manner as above to develop more accurate predictions over time.
[0115] Additionally, each bicycle can be tracked longitudinally through subsequent inspections (e.g. using the bicycle’s serial number) to monitor whether predictions made by the system were ultimately successful or unsuccessful, as well as whether any maintenance or repair solution was successful or unsuccessful. These outcomes can be implemented as aspects of reinforcement learning in future i.e. to penalise the model when it performs poorly and stimulate further improvements.
[0116] Additional data for the models
[0117] In addition, laboratory testing can help improve the modelling process with objective data. For example, a bicycle frame can have specific damage types applied at various points and then be tested to failure in a laboratory setting. We can test the difference in load tolerance between two identical frames, each with different damage types. This may help to refine the current model and ML aspects and the pre-existing data set.
[0118] If customer decisions are collected over time (e.g. did the customer replace or repair the frame or component as suggested), then a model of customer decision-making can also be developed. This may help to predict customer behaviours and propose better/altemative solutions. For example, if a customer is unlikely to replace a frame due to predicted cost, then perhaps alternative solutions can be provided, along with the expected risk of that alternative solution.
[0119] Variation of a computer application and user interface
[0120] Figs. 13 and 14 illustrate a variation of the computer application and user interface described above. In this example, potential damage and the plurality of sites 5 of the bicycle 1 can be selected or deselected using check boxes 81. As illustrated in Fig. 14, the sites “head tube”, “seat tube”, and “steerer” have been selected at the check boxes 81. Details of potential damage 3 for the selected sites 5 are shown at the user interface. In this example, the potential damage 3 is categorised in more detail compared to the example of Fig. 6 discussed earlier. This includes, for example the: part that is damaged, type of damage, location of the damage (e.g. side and/or area), the length of damage, the width of damage, and depth of damage. This also include an interface showing multiple damage on the same site 5 (e.g. both the head tube and seat tube have two separate potential damage).
[0121] Processing device
[0122] Fig. 15 illustrates an example of a processing device 55 than may be associated with a computer 53, server 63, and portable communication device 61. The processing device includes a processor 1510, a memory 1520 and an interface device 1540 that communicate with each other via a bus 1530. The memory 1520 stores instructions and data for implementing one or more of the methods 100 described above, and the processor 1510 performs the instructions (such as a computer program) from the memory 1520 to implement the methods 100. The interface device 1540 may include a communications module that facilitates communication with the communications network 59 and, in some examples, with the user interface and peripherals such as data store 16 or a display. It should be noted that although the processing device may be independent network elements, the processing device may also be part of another network element. Further, some functions performed by the processing device may be distributed between multiple network elements. For example, the server 63 may be associated with multiple processing devices and steps of the method 100 may be performed, and distributed, across more than one of these devices.
[0123] It will be appreciated by persons skilled in the art that numerous variations and/or modifications may be made to the above-described embodiments, without departing from the broad general scope of the present disclosure. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive.

Claims

22 CLAIMS:
1. An inspection method (100) comprising:
- receiving (110) a plurality of contextual factors (11) based on usage and history of a bicycle (1);
- scanning (120) the bicycle (1) to detect potential damage (3) at a plurality of sites (5) at the bicycle (1);
- categorising (130) the potential damage (3), at each of the plurality of sites (5), to generate a plurality of damage factors (13);
- comparing (140) the plurality of contextual factors (11) and plurality of damage factors (13) with a pre-existing data set (15) from a database (16) to form a comparison (17);
- determining (150) roadworthiness (19) of the bicycle (1) based on the comparison (17); and
- displaying (160), at a user interface (21), an indication (23) of the roadworthiness (19) of the bicycle (1).
2. An inspection method (100) according to claim 1, further comprising;
- determining (151) potential corrective action (25) based on the comparison (17); and wherein displaying (160) further comprises an indication (27) of the potential corrective action (25) for the bicycle (1).
3. An inspection method (100) according to claim 2, wherein the potential corrective action (25) comprises one or more of:
- replacement (31) of one or more components of the bicycle (1); - repair (33) of one or more components of the bicycle (1);
- maintenance (35), or a maintenance schedule, for the bicycle (1);
- inspection (37), or inspection schedule, for the bicycle (1); and
- details of, and potential referral to, qualified repairer/s.
4. An inspection method (100) according to claim 2 or 3, wherein the potential corrective action (25) further comprises:
- a suggested repair type (39) and/or method for one or more components of the bicycle (1).
5. An inspection method (100) according to claim 4, wherein the suggested repair type (39) and/or method comprises a plurality of options for the suggested repair type and/or method, and further comprises an indication (40) of respective resource requirements (41).
6. A method according to any one of the preceding claims, wherein the potential damage (3) at each of the plurality of sites (5) and/or comparison (17) is recorded and stored in the database (16), or another database to form historical records and/or training data.
7. An inspection method (100) according to any one of the preceding claims, further comprising:
- updating (170) the pre-existing data set (15) based on comparing the pre-existing data set (15) with the plurality of contextual factors (11) and the plurality of damage factors (13) of the bicycle (1).
8. An inspection method (100) according to claim 7, wherein updating the pre-existing data set (15) is further based on previous inspections and includes comparison with historical plurality of contextual factors (11) and/or historical plurality of damage factors (13) of the bicycle (1).
9. An inspection method (100) according to either claim 7 or 9, wherein updating the pre-existing data set (15) comprises one or more of: regression, decision trees, random forests, machine-learning, statistical and other pattern recognition techniques.
10. An inspection method (100) according to either claim 8 or 9, wherein updating the pre-existing data set (15) further comprises:
- sending to a user display:
- at least part of the pre-existing data set;
- a representation, or summary, of the historical plurality of contextual factors (11) and/ or plurality of damage factors (13); and
- at least one or more proposed updates to the pre-existing data set (15);
- receiving from a user interface:
- acceptance, modification, or rejection to one or more proposed updates to the pre-existing data set (15).
11. An inspection method (100) according to any one of the preceding claims, wherein the method further comprises:
- determining (153) one or more areas (43) of the bicycle (1) for further inspection based on the comparison (17);
- displaying (161) an indication (45) of the one or more areas (43) for further inspection;
- scanning (163) the one or more areas (43) for further inspection to detect additional potential damage (47);
- categorising (165) the additional potential damage (47) at the one or more areas (43) to generate an updated plurality of damage factors (13); 25
- compare (167) the plurality of contextual factors (11) and the updated plurality of damage factors (13) to form an updated comparison (49) for determining roadworthiness (19), potential corrective action (25), and/or further inspection.
12. An inspection method (100) according to any one of the preceding claims, wherein displaying (160) further comprises a visualisation (77) of one or more of:
- one or more of the potential damage from the scan;
- an overlay of one or more of the potential damage to a graphical representation of the bicycle (1);
- an indication of areas of the bicycle requiring repair, maintenance, and/or inspection with respect to a graphical representation of at least part of the bicycle; and
- method or technique to repair, maintain, or inspect the bicycle with respect to a graphical representation of at least part of the bicycle.
13. A method according to any one of the preceding claims wherein scanning (120) comprises one or more of:
- an optical inspection with an optical camera;
- an ultrasound inspection with an ultrasonic sensor;
- an X-ray image from an X-ray system;
- thermography inspection;
- liquid Penetrant inspection;
- radiographic testing;
- electromagnetic testing; 26
- eddy current testing;
- vibrational analysis; and
- [acoustic testing using a tap hammer.
14. A method according to any one of the preceding claims wherein the bicycle (1) comprises a frame (7) of carbon fibre reinforced plastic.
15. An inspection method (100) according to any one of the preceding claims wherein the contextual factors comprise one or more of:
- bicycle manufacturer;
- bicycle model;
- bicycle type;
- bicycle usage type;
- usage appropriateness;
- bicycle age;
- rider weight;
- period since last bicycle service; and
- history, or unknown history, and duration of history of the bicycle.
16. An inspection method (100) according to any one of the preceding claims wherein the plurality of sites (5) comprise one or more of:
- head tube;
- top tube; 27
- down tube;
- seat tube;
- seat stay;
- suspension linkage;
- chain stay;
- fork;
- steerer;
- wheel rim;
- wheel hub;
- handlebar;
- crank;
- chainring;
- seatpost; and
- stem.
17. A system (2) comprising:
- a scanner (51) to scan a bicycle (1) for potential damage (3);
- at least one processing device (55) to perform the method according to any one of claims 1 to 16; and 28
- a display (57) for outputting the indication of roadworthiness and/or potential corrective action.
18. A computer program that, when executed by a computer, causes the computer to perform the computer-implemented method of any one of claims 1 to 16.
PCT/AU2022/051284 2021-10-26 2022-10-26 Computer assisted inspection and modelling of fibre-reinforced plastic bicycle frames WO2023070154A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2021903430 2021-10-26
AU2021903430A AU2021903430A0 (en) 2021-10-26 Computer assisted inspection and modelling of fibre-reinforced plastic bicycle frames

Publications (1)

Publication Number Publication Date
WO2023070154A1 true WO2023070154A1 (en) 2023-05-04

Family

ID=86160230

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2022/051284 WO2023070154A1 (en) 2021-10-26 2022-10-26 Computer assisted inspection and modelling of fibre-reinforced plastic bicycle frames

Country Status (1)

Country Link
WO (1) WO2023070154A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140309805A1 (en) * 2012-03-14 2014-10-16 Flextronics Ap, Llc Vehicle damage detection and indication
WO2016102034A1 (en) * 2014-12-22 2016-06-30 Rehau Ag + Co Method for checking the integrity of a bicycle frame
US20170147991A1 (en) * 2015-11-23 2017-05-25 CSI Holdings I LLC Vehicle damage report
US20180293664A1 (en) * 2017-04-11 2018-10-11 Alibaba Group Holding Limited Image-based vehicle damage determining method and apparatus, and electronic device
KR20190071927A (en) * 2017-12-15 2019-06-25 이이엘씨이이주식회사 Monitoring system for bike
US10573012B1 (en) * 2015-10-14 2020-02-25 Allstate Insurance Company Three dimensional image scan for vehicle

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140309805A1 (en) * 2012-03-14 2014-10-16 Flextronics Ap, Llc Vehicle damage detection and indication
WO2016102034A1 (en) * 2014-12-22 2016-06-30 Rehau Ag + Co Method for checking the integrity of a bicycle frame
US10573012B1 (en) * 2015-10-14 2020-02-25 Allstate Insurance Company Three dimensional image scan for vehicle
US20170147991A1 (en) * 2015-11-23 2017-05-25 CSI Holdings I LLC Vehicle damage report
US20180293664A1 (en) * 2017-04-11 2018-10-11 Alibaba Group Holding Limited Image-based vehicle damage determining method and apparatus, and electronic device
KR20190071927A (en) * 2017-12-15 2019-06-25 이이엘씨이이주식회사 Monitoring system for bike

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
LUESCHER TEKNIK: "Cyclitech 2016 Presentation - Ultrasonic inspection of in service composite bicycles and components.", YOUTUBE, 10 April 2020 (2020-04-10), XP093066666, Retrieved from the Internet <URL:https://www.youtube.com/watch?v=rjbJ47A0fcs> [retrieved on 20230724] *
USAMENTIAGA RUBÉN ET AL: "Nondestructive Evaluation of Carbon Fiber Bicycle Frames Using Infrared Thermography", SENSORS, ARTICLE 2679, vol. 17, no. 11, pages 1 - 16, XP093066664, DOI: 10.3390/s17112679 *

Similar Documents

Publication Publication Date Title
Świderski et al. Operational quality measures of vehicles applied for the transport services evaluation using artificial neural networks
Schlüter et al. AI-enhanced identification, inspection and sorting for reverse logistics in remanufacturing
Lindström et al. Towards intelligent and sustainable production: combining and integrating online predictive maintenance and continuous quality control
JP7444439B2 (en) Defect detection classification system and defect judgment training system
CN109934341A (en) The model of training, verifying and monitoring artificial intelligence and machine learning
Fontana et al. Circular economy strategies for equipment lifetime extension: A systematic review
Afum et al. Reverse logistics, stakeholder influence and supply chain performance in Ghanaian manufacturing sector
CN115825115B (en) Bicycle nondestructive inspection device, method and computer readable storage medium
JP4764490B2 (en) User evaluation device according to hardware usage
US20230281722A1 (en) Smart estimatics methods and systems
Prashar Towards digitalisation of quality management: conceptual framework and case study of auto-component manufacturer
WO2023070154A1 (en) Computer assisted inspection and modelling of fibre-reinforced plastic bicycle frames
CN117574201A (en) Model training method, device, equipment and storage medium based on multi-industry model
Brierley et al. Advances in the UK Toward NDE 4.0
Frick et al. Quality 5.0: A Paradigm Shift Towards Proactive Quality Control in Industry 5.0
Harishyam et al. Visual inspection of mechanical components using visual imaging and machine learning
US20050203758A1 (en) Method for remote evaluation and management of vehicular parts
CN114387089A (en) Client credit risk assessment method, device, equipment and storage medium
Singh et al. Developing operation measurement strategy during Six Sigma implementation: a foundry case study
CN114139589A (en) Fault diagnosis method, device, equipment and computer readable storage medium
JP5159919B2 (en) User evaluation device according to hardware usage
US11790270B2 (en) User-generated visual guide for the classification of images
CN117350745B (en) After-sales processing method, device, equipment and medium for e-commerce platform
Schimanek et al. Data fusion for improved circularity through higher quality of prediction and increased reliability of inspection
Jawed et al. AI and Data-Driven Mobility at Volkswagen Financial Services AG

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22884789

Country of ref document: EP

Kind code of ref document: A1