PCB Defect Detection Using Image Enhancement
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 8
Abstract
Printed circuit board (PCB) mechanically supports and electrically connects electronic components using conductive tracks. Using PCB chances of miswriting or short circuited wiring are minimized .The location of electronic parts is fixed and inspection time reduced. Defects in PCB are in the form like missing hole, breaking lines, wrong hole size etc. Image Enhancement Technique is used for PCB defect detection and classification of defects. The main goals in Image Enhancement Technique are achieving high performance or efficiency and obtaining highly accurate results. This is to ensure a high quality PCB that translates to reliable and quality digital end products. To enhance this work, we are going to propose a printed circuit board (PCB) is the board base for physically supporting and wiring the surface mounted and socket components in most electronics. This paper proposes a PCB defect detection and classification system. Image enhancement techniques have been widely used in many applications of image processing where the subjective quality of images is important for human interpretation. It is sub area of image processing.
Authors and Affiliations
Miss. Gagandeep Kaur , Mrs. Rupinder Kaur
ATTACKS ON SECURITY PROTOCOLS USING AVISPA
Now a days, Use of Internet is increased day by day. Both Technical and non technical people use the Internet very frequently but only technical user can understand the aspects working behind Internet. There are differen...
EQUALITY IN BETWEEN ITERATIVE SOFT DILATION AND ITERATIVE SOFT CLOSE IN MULTI SCALE ENVIRONMENT
In this paper, equality is established and discussed in between soft dilation and soft close in multi scale environment as well as in iterative environment. Soft erosion and soft dilation will exist for various threshold...
A Review of C-TREND Using Complete-Link Clustering for Transactional Data
Data mining has made broad and significant progress since its early beginnings. Today data mining is used in a vast array of areas, and numerous commercial data mining system that are available. There are many data minin...
Secure Authentication Protocol to Detect Sybil Attacks in MANETs
Mobile ad-hoc networks (MANETs) are well known to be susceptible to various attacks, due to features such as lack of centralized control, dynamic topology, limited physical security and energy constrained operations. In...