About this Journal Submit a Manuscript Table of Contents
Mathematical Problems in Engineering
Volume 2013 (2013), Article ID 504895, 10 pages
http://dx.doi.org/10.1155/2013/504895
Research Article

Surface Defect Target Identification on Copper Strip Based on Adaptive Genetic Algorithm and Feature Saliency

Computer and Information College, Hohai University, Changzhou 213022, China

Received 22 February 2013; Accepted 21 June 2013

Academic Editor: Yudong Zhang

Copyright © 2013 Xuewu Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

To enhance the stability and robustness of visual inspection system (VIS), a new surface defect target identification method for copper strip based on adaptive genetic algorithm (AGA) and feature saliency is proposed. First, the study uses gray level cooccurrence matrix (GLCM) and HU invariant moments for feature extraction. Then, adaptive genetic algorithm, which is used for feature selection, is evaluated and discussed. In AGA, total error rates and false alarm rates are integrated to calculate the fitness value, and the probability of crossover and mutation is adjusted dynamically according to the fitness value. At last, the selected features are optimized in accordance with feature saliency and are inputted into a support vector machine (SVM). Furthermore, for comparison, we conduct experiments using the selected optimal feature subsequence (OFS) and the total feature sequence (TFS) separately. The experimental results demonstrate that the proposed method can guarantee the correct rates of classification and can lower the false alarm rates.

1. Introduction

With the development of production and processing, the quality requirements of products appearance have become increasingly higher, which caused the manufacturers to ensure nondestructive inspection for providing products. However, due to the variety of conditions in VIS, the size and the shape of the defect targets in detected object are usually indefinite, especially the false targets. For example, the falling iron scraps, the flying moth, the oil droplet, and so forth in copper strip production lines might be classified as true targets. Therefore, an automatic target identification system is necessary to be designed to eliminate the false targets. In this paper, the target identification system has the following stages: feature extraction, feature selection, and feature optimization and classification.

Feature extraction is a key factor for defect inspection. Actually, metal surface defects are mostly similar to texture patterns. Numerous methods have been proposed to extract textural features, and cooccurrence matrix method is one of statistical methods. Huang et al. [1] proposed an inspecting technology using gray level cooccurrence matrix to extract colorific and structural textures for solders of a flexible printed circuit (FPC). The experiments indicated that the defective solder is obviously different from the nondefective solder in several kinds of quantified characters. Zhang et al. [2] developed a vision inspection system for the surface defects of strongly reflected metal. In this system, spectral measure approach based on Fourier spectral is used to compute textures which are inputted into a SVM to detect defects. Moment is a linear characteristic which has translation invariance, scaling invariance, and rotation invariance. Ping et al. [3] used the moment invariants to pick up the characters of typical copper surface defects. Tolba et al. [4] used GLCM and HU invariant moments based on Learning Vector Quantization (LVQ) classifiers to detect defects of textiles, and the correct defect detection rate is 98.64% with an average false acceptance rate of 0.0012.

Feature selection is an important preprocessing step in target identification system (TDS). Selecting an OFS that preserves classification accuracy is a growing important problem because of the increasing size and dimensionality of real data sets. Achieving reduction of the relevant features number without negative effect on classification accuracy is a goal which greatly improves the overall effectiveness of the target identification system. After analyzing the advantages and disadvantages of filtering and wrapping approaches for feature selection, Wang and Zheng proposed a hybrid approach named filtering-wrapping feature selection (FWFS) [5]. This approach uses information gain to evaluate feature's relevance to the target class and mutual information to evaluate redundancies among features. Then, the actual classifier is used as a “black box” to evaluate the fitness value. Rodriguez et al. [6] proposed a feature selection method, named Quadratic Programming Feature Selection (QPFS), which can limit the computational complexity for large data sets. Comparatively speaking, genetic algorithm has strong ability in local search, and the local optimal solution can be avoided in searching process [7], it solves the shortcomings of slow convergence speed and high time complexity. Yang et al. [8] presented an improved genetic algorithm (IGA) to select the optimal feature subset effectively and efficiently from a multicharacter feature set (MCFS). The IGA adopts segmented chromosome management scheme to implement local management of chromosome. A segmented crossover operator and a segmented mutation operator are employed to operate on these segments to avoid invalid chromosomes. The feature selection step of Zhang’s method is based on adaptive simulated annealing genetic algorithm, which can guarantee the correct rate of classification and can improve the efficiency [9].

The proposed method optimizes the OFS judging by the feature saliency (i.e., the contribution degree of feature), which can increase the accuracy rate and robustness of the TDS. Saliency is the human perception of certain quality and quantity which can representatively reflect the difference between targets and other ones. For performance comparison, we do experiments on defects detection using the OFS and the TFS.

The organization of this paper is as follows: in Section 2, the proposed method is explained by three steps, feature extraction, feature selection, and feature optimization; Section 3 shows the experimental results and discusses the performance of the proposed method; conclusions are given in Section 4.

2. Target Identification System Design

Figure 1 shows the target identification process that contains two steps, training step and testing step. In the training step, the identification system firstly extracts the initial features from each image in training set to form the initial feature sequence set, which is then inputted into feature selection to obtain the optimal feature sequence and the weights. In the testing step, the weighted OFS is inputted into SVM classifier to implement the target identification.(1)Feature extraction. This study uses invariant moments and textural features to ensure that the extracted feature sequence can satisfy the requirements of target identification with validity, less computation quantity, and good robustness.(2)Feature selection. Genetic algorithm is a faster global optimizing algorithm with constant feedback correction. Consequently, the paper adopts GA to select the optimal feature sequence.(3)Feature optimization. Generally, each feature in OFS has different contribution to target identification. Therefore, this paper measures the feature saliency as the weights to update the existing identification model, which can guarantee the robustness and can further improve the performance of the identification model.(4)Classification and identification. SVM has been proposed as popular tools for classification problems [10]. After eliminating the features with less contribution in the training step, SVM can identify the target more accurately.

504895.fig.001
Figure 1: Block diagram of target identification.

3. Methodology

3.1. Feature Extraction
3.1.1. HU Invariant Moments

Moments can be used for representation of a two-dimensional image on the basis of the Papoulis uniqueness theorem [11]. Invariant moment theory based on region shape recognition was proposed by Hu [12] at first.

The th-order central moment of digital images is defined as

The normalized central moment is

Hu proposed seven invariant moments which satisfied the conditions of translation invariance, scaling invariance, and rotation invariance. These moments can be written as follows:

The aforementioned seven parameters ~ are used as identification feature.1 to feature.7 in this paper.

3.1.2. Texture Features

Texture features can be used to measure the characteristics of smoothness, roughness, and regularity, and so forth. There are primarily three description methods for texture feature: statistical method, structured method, and spectrum method [13]. GLCM is an excellent statistical method in texture analysis, which can commendably convert gray value into texture information. GLCM is the statistics of probability of a pair of image elements gray value with certain position relationship. The 14 feature parameters inferred from GLCM have all contained texture information. Nevertheless, they could bring about information redundancy when describing texture of surface defect image. This paper chooses the following four parameters with preferable descriptiveness and independence.(1) Angular second-order moment (energy) (2) Entropy (3) Contrast (inertia moment) (4) Relevance where, ,  ,  , and   are, respectively, defined as

This paper uses the mean value and the standard deviation of the aforementioned four parameters (i.e., energy, entropy, contrast, and relevance), total 8 subfeatures as identification feature.8 to feature.15 in this paper.

3.2. Adaptive Genetic Algorithm

Genetic algorithm is an adaptive optimization algorithm simulating biological evolution mechanism [7], which has strong searching capabilities in parallel pattern space and can quickly approach to the global optimal solutions.

(1)  Chromosome Coding and Initial Population Setting. As shown in Figure 2, if the primary feature sequence extracted from training set contains features, define a 0-1 binary code with chromosome length of , where corresponding to the preceding extracted features. If the th chromosome is 1, the corresponding feature is selected, otherwise not selected. Each chromosome corresponds to a feature subsequence.

504895.fig.002
Figure 2: Chromosome coding of feature sequence.

Setting randomly generates chromosomes as initial population. This paper take the in order to ensure the individual diversity of the population.

(2)  Fitness Function Designing. On one hand, the larger the feature numbers in the feature subsequence, the more complicated the identification model, which could decrease the last identification performance with greater computational cost and declining antinoise capability.

On the other hand, the identification accuracy can be determined by the total error number and the false alarm number when the true/false target numbers are already known.

Therefore, the abovementioned three factors must be considered simultaneously when evaluating the feature subsequence from the practical application. The fitness function is defined as where is feature vector corresponding to feature subsequence, is the total features number (i.e., the chromosomes length), is the total training images number, and   is the true defects number.

From (9), we can see that the fewer the selected features, the total errors, and the false alarm numbers, the larger the received fitness value.

(3)  Genetic Operation. The individual evolution is finished by genetic operators in GA. In this paper, the initial crossover operator , and the initial mutation operator . This paper adopts two-point crossover method to adaptively adjust the probability of crossover and mutation in the searching process.

The adaptive crossover operator is defined as

The adaptive mutation operator is defined as where is the larger fitness value of the two crossover individuals and and are the largest fitness value and the average fitness value separately.

(4)  Termination Conditions of AGA. The AGA is terminated when the iteration times of AGA are equal to the maximum iteration times . In this paper, we set to 400.

The algorithm flow chart is shown in Figure 3.

504895.fig.003
Figure 3: The feature selection algorithm flow chart based on GA.

The specific algorithm steps are as follows (where is the iterations):

Population initialization: randomly generating chromosomes with length of ;

while ( or ), do(1)fitness valuation: figure out for each individual in ;(2)adaptive adjustment of and : using two-point crossover method to any two individuals;(3)selection, crossover, mutation;(4)population updating: ;

end

output the OFS from .

3.3. Feature Saliency Measuring

This paper optimizes the selected features by measuring feature saliency in accordance with probabilities of each feature in features space. Suppose that the OFS is after using AGA; then make a certain feature input into SVM for classification. The total accuracy rate is

The target accuracy rate is

The contribution degree of feature is defined as

Then, the normalization is applied to the contribution degree , and the weight of feature is defined as

3.4. Basic Theory of SVM

Support vector machine (SVM) [10] is a learning method, which is based on structural risk minimization (SRM) rules. It means that the indicator function set is decomposed into several subsets function sequence , arranging the subsets according to the VC dimension size. After weighing the subset of the empirical risk and confidence range, we will obtain the smallest actual risk. It combines the theory of maximum interface classifier with the method based on kernel, and it can achieve the globally unique optimum solution. Besides, it has unique advantages in small samples, nonlinear problem, and high-dimensional pattern recognition problem. The basic idea of support vector machine is transforming the input space to a high-dimensional space by nonlinear conversion defined by inner product function firstly. In SVM, the choice of the appropriate kernel functions is an important factor, and different kernel function can form different algorithms, which will directly influence the generalization ability and error control of SVM. Gaussian radial basis kernel, polynomial kernel, B-spline kernel, Fourier kernel, and sigmoid kernel are frequently used kernel functions.

In this paper, the one-versus-one method is chosen to build the SVM classifier, and the polynomial kernel is used as the kernel function.

4. Experimental Results and Discussion

In this section, the authors present the experiment results followed by previous approaches on copper strips that are provided by XINGRONG manufacture corporation in Changzhou, Jiangsu province, China to evaluate the performance of the proposed identification method. As shown in Figure 4, we choose eight typical defect target images that include true defect samples (burr, loophole, perforation, and pit) and false defect samples (moth, inclusion, iron scrap, and paper scrip). To extend the image database, we rotate the image sample and transform it in different resolutions. After that, we randomly choose 214 true defect images and 362 false defect images as the training set; the remaining 153 true defect images and 423 false defect images are used as testing set.

fig4
Figure 4: Defect samples.
4.1. Feature Extraction

Figure 5 shows the spatial distribution map of each extracted feature of the defect images. From the maps, we can see that each feature can reflect the differences between true defects and false defects in a certain degree.

fig5
Figure 5: Spatial distribution maps of features.
4.2. Feature Selection

(1)  Single Feature. Table 1 shows the identification results using single feature. Figure 6 corresponds to Table 1. Table 1 and Figure 6 further illustrate that each of the 15 features extracted in this paper has a certain identification ability for the true and false defects.

tab1
Table 1: Identification accuracy rates using single feature.
504895.fig.006
Figure 6: Identification accuracy rates using single feature.

(2)  Multifeature. As shown in Table 2, the selected OFS using AGA in 10 times is the same, that is . The corresponding fitness value is −9.0103, and the average consuming time is 68.62 s, which interprets that the processing speed of the proposed method is very fast.

tab2
Table 2: Results for AGA in 10 times.

Table 3 shows the experimental results using the selected OFS inputted into SVM. The total error using the OFS for training set is 9, and the false alarm number is 3; thus, the total is 0.9817, and the target correct rate is 0.9939. The total error using the OFS for testing set is merely 5, and the false alarm number is just 1; thus, the total correct rate is 0.9886, and the target correct rate is 0.9903. Compared with the results in Table 1, we can see that the identification accuracy using OFS is higher than using single feature independently.

tab3
Table 3: Identification accuracy of optimal feature subsequence.

Combined with Table 1, the weight of each feature in OFS calculated by (12) to (15) is shown in Table 4.

tab4
Table 4: Weight of each feature in optimal feature subsequence.

In order to compare the performance of the proposed method, we use TFS inputted into SVM classifier under the same condition. And the identification results are shown in Table 5. From Table 5 we can see that the total errors for training set is 10, and the false alarm numbers is 7, thus the total is 0.9796, and the target correct rate is 0.9624. The total error for the testing set is 14, and the false alarm number is 13; thus, the total correct rate is 0.9682, and the target correct rate is 0.8738. By comparing Table 5 with Tables 1 and 3 it is observed that the identification accuracy using TFS for training set is higher than either single feature, but lower than that using OFS. Furthermore, the identification accuracy using TFS for the testing set is far below than using OFS, which further interpreted that the proposed feature selection method increases the identification accuracy rate greatly.

tab5
Table 5: Identification accuracy of total feature sequence.

The neural network has been used in pattern recognition widely. Hundreds of defect images are randomly chosen from the database as the training sample; then we choose the other hundreds of images as the test sample. Table 6 shows the identification results using RBF neural network.

tab6
Table 6: Identification accuracy of RBF neural network.

From Tables 3, 5, and 6, we can see that the identification accuracy of SVM can be as high as 99.03%, and in most instances this number is more than 95%. However, the identification accuracy of RBF neural network is no more than 95%. It is obvious that the performance of the proposed method is better than the RBF neural network.

5. Conclusions

In this study, a new surface defect target identification system for copper strip based on adaptive genetic algorithm and feature saliency was developed. Genetic algorithm has the advantage of fast convergence and can avoid involving into local optimal solution. In the proposed method, the probability of crossover and mutation was adjusted dynamically according to the fitness value, which had been calculated by integrating total error rate and false alarm rate. Furthermore, to evaluate the performance of the proposed method, comparison between the selected feature subsequence and total feature sequence has been implemented. The experimental results demonstrate that the proposed approach increases the correct rate and lowers the false alarm rate. In the proposed method, feature extraction can decrease the dimension of features and can increase the speed of processing. However, crossover and mutation operators in genetic algorithms always work under the condition of a certain probability; it will lead to “degradation” phenomenon inevitably, such as prematurity and species diversity decreasing. Some potential priori knowledge of the actual problem itself cannot be applied in the genetic algorithms. The future work should attempt to verify the robustness and effectiveness of our method in practical application.

Acknowledgment

This paper is supported by the National Natural Sciences Foundation of China (Grant no. 61273170).

References

  1. J.-X. Huang, D. Li, F. Ye, and W. Zhang, “Detection of surface defection of solder on flexible printed circuit,” Optics and Precision Engineering, vol. 18, no. 11, pp. 2443–2453, 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. X.-W. Zhang, Y.-Q. Ding, Y. Lv, A. Shi, and R. Liang, “A vision inspection system for the surface defects of strongly reflected metal based on multi-class SVM,” Expert Systems with Applications, vol. 38, no. 5, pp. 5930–5939, 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. W. Ping, Z. Xuewu, M. Yan, and W. Zhihui, “The copper surface defects inspection system based on computer vision,” in Proceedings of the 4th International Conference on Natural Computation (ICNC '08), pp. 535–539, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  4. A. S. Tolba, H. A. Khan, A. M. Mutawa, and S. M. Alsaleem, “Decision fusion for visual inspection of textiles,” Textile Research Journal, vol. 80, no. 19, pp. 2094–2106, 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. W. Wang and Q.-H. Zheng, “Feature selection for text categorization using filtering and wrapping,” Journal of Computational Information Systems, vol. 2, no. 4, pp. 1333–1342, 2006. View at Scopus
  6. I. Rodriguez-Lujan, R. Huerta, C. Elkan, and C. S. Cruz, “Quadratic programming feature selection,” Journal of Machine Learning Research, vol. 11, pp. 1491–1516, 2010. View at Zentralblatt MATH · View at Scopus
  7. D. E. Goldberg, Genetic Algorithms in Search, Optimization, and Machine Learning, Addison-Wesley, Boston, Mass, USA, 1989.
  8. W.-Z. Yang, D.-I. Li, and L. Zhu, “An improved genetic algorithm for optimal feature subset selection from multi-character feature set,” Expert Systems with Applications, vol. 38, no. 3, pp. 2733–2740, 2011. View at Publisher · View at Google Scholar · View at Scopus
  9. H. Zhang, R. Tao, Z. Li, and H. Du, “A feature selection method based on adaptive simulated annealing genetic algorithm,” Binggong Xuebao/Acta Armamentarii, vol. 30, no. 1, pp. 81–85, 2009. View at Scopus
  10. C. Cortes and V. Vapnik, “Support-vector networks,” Machine Learning, vol. 20, no. 3, pp. 273–297, 1995. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  11. A. Papoulis, Probability, Randam Variables and Stochastic Processes, Mc Graw-Hill Kogakusha, Akita, Japan, 1965.
  12. M. Hu, “Visual pattern recognition by moment invariants,” IRE Transactions on Information Theory, vol. 8, no. 2, pp. 179–187, 2002.
  13. Y. Chiou, C. Lin, and B. Chiou, “The feature extraction and analysis of flaw detection and classification in BGA gold-plating areas,” Expert Systems with Applications, vol. 35, no. 4, pp. 1771–1779, 2008. View at Publisher · View at Google Scholar · View at Scopus