PlumX Metrics
Embed PlumX Metrics

Penetration recognition based on machine learning in arc welding: a review

International Journal of Advanced Manufacturing Technology, ISSN: 1433-3015, Vol: 125, Issue: 9-10, Page: 3899-3923
2023
  • 13
    Citations
  • 0
    Usage
  • 22
    Captures
  • 1
    Mentions
  • 0
    Social Media
Metric Options:   Counts1 Year3 Year

Metrics Details

  • Citations
    13
  • Captures
    22
  • Mentions
    1
    • News Mentions
      1
      • News
        1

Most Recent News

Reports from South China University of Technology Advance Knowledge in Machine Learning (Penetration Recognition Based On Machine Learning In Arc Welding: a Review)

2023 MAR 23 (NewsRx) -- By a News Reporter-Staff News Editor at Robotics & Machine Learning Daily News Daily News -- Investigators publish new report

Review Description

Penetration recognition is the critical technology to improve manufacturing quality and automation level in arc welding. In this paper, recent research advances concerning penetration recognition based on machine learning are comprehensively reviewed, focused on signals feature extraction and application of machine learning in this field. Three types of signals originating from arc welding, namely, weld pool image, arc sound, and arc voltage, are used to analyze the correlation with the penetration state and extract effective features. Next, the following contents briefly introduce some machine learning methods including conventional machine learning and deep learning, and emphatically summarize their application and performance in penetration recognition. Notably, the deep learning method possesses higher classification accuracy and better generalization ability in penetration recognition due to its deeper architecture and effective learning capacity. In the end, some challenges and tendencies, involving multi-sensor information fusion, data-driven recognition, model development incorporating attention mechanism, lightweight model deployment, and real-time control, are presented for further research. This paper is an attempt to provide a reference source and some guidance for researchers who use machine learning methods for penetration monitoring.

Bibliographic Details

Provide Feedback

Have ideas for a new metric? Would you like to see something else here?Let us know