Imaging algorithms Sample Clauses

Imaging algorithms. The aim of this part of questionnaire was to identify data acquisition set-ups, reference imaging techniques and assessment parameters for quantification of newly proposed algorithm. The same set-ups should be used for reference imaging techniques and the ones proposed throughout “Advise” project. In all cases measurements are performed by using phased array techniques. According to the samples under investigation, several measurement set-ups are appreciated between the partners: contact, wedge and TRL. The majority of respondents appreciate angle beam measurement set-up with wedge (5 resp.) and TRL (3 resp.) for the coarse grained stainless steel mock-up D522-TG. The proposed data acquisition methods in this case are FMC (4 resp.) and PWE (3 resp.). For the case of the nickel based alloy (Inconel 600) mock-up 1618-B359-B1 most of respondents ( 6 resp.) noticed the direct contact method as more suitable. The appreciated data acquisition methods are FMC (7 resp.) and PWE (4 resp.) The majority of respondents noticed that contact measurement method without wedge ( 7 resp.) and TRL (3 resp.) are more appropriate for the sample 1517-T105EE-2G-GA (shielded metal). The data acquisition methods are FMC (7 resp.) and PWE (4 resp.). Weld cladding repair mock-up 1774-T248A should be investigated by phased array with wedge (7 resp.) and TRL (4 resp.). The dominant data acquisition method in this case is FMC (9 resp.). The parameters of the appreciated inspection techniques (frequency, angle, scaning type, position of the array) are selected personally by the partners. It depends on sample under investigation (weld, cast, coarse grained and etc.) and positions of defects. It was identified that the parameters, which should be used for quantification of imaging algorithm are (Fig. 3.2): − detectability of defects (12 resp.); − defect sizing (11 resp.); − defect positioning (10 resp.); − SNR (8 resp.); − coverage area (7 resp.). SNR Inspection depth Coverage area Detectability Defect sizing Defect positioning Data processing time Other Figure 3.2: Quantification metrics for imaging algorithm assessment (responses of the partners) These parameters will be used to evaluate the performance of newly proposed imaging techniques. The same metrics will be applied to reference imaging method (TFM) and to the technique under quantification.
AutoNDA by SimpleDocs

Related to Imaging algorithms

  • Processes Any employer, employee, trade union or employer’s association may at any point in time apply for an exemption from any of the provisions of this Collective Agreement. The applicant is required to complete and submit in writing with the relevant office of the Council, a fully and properly completed prescribed application for exemption form, accompanied by all relevant supporting documentation.

  • Formats Formats for records must be satisfactory to FTA and include, but are not limited to, electronic records, including any emails related to the Award, records on paper, and records created in other formats.

  • Firmware The Contractor shall deliver firmware required for production acceptance testing in accordance with CDRL A009 Contractor’s Supplier Configuration Management Plan. The Contractor shall use Government furnished software for testing. Deliverable Data Item (See DD-1423): CDRL A009: “Contractor’s Supplier Configuration Management Plan”

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Software Title and ownership to Existing Software Product(s) delivered by Contractor under the Contract that is normally commercially distributed on a license basis by the Contractor or other independent software vendor proprietary owner (“Existing Licensed Product”), embedded in the Custom Products, shall remain with Contractor or the proprietary owner of other independent software vendor(s) (ISV). Effective upon acceptance, such Product shall be licensed to Authorized User in accordance with the Contractor or ISV owner’s standard license agreement, provided, however, that such standard license, must, at a minimum: (a) grant Authorized User a non-exclusive, perpetual license to use, execute, reproduce, display, perform, adapt (unless Contractor advises Authorized User as part of Contractor’s proposal that adaptation will violate existing agreements or statutes and Contractor demonstrates such to the Authorized User’s satisfaction) and distribute Existing Licensed Product to the Authorized User up to the license capacity stated in the Purchase Order or work order with all license rights necessary to fully effect the general business purpose(s) stated in the Bid or Authorized User’s Purchase Order or work order, including the financing assignment rights set forth in paragraph (c) below; and (b) recognize the State of New York as the licensee where the Authorized User is a state agency, department, board, commission, office or institution. Where these rights are not otherwise covered by the ISV’s owner’s standard license agreement, the Contractor shall be responsible for obtaining these rights at its sole cost and expense. The Authorized User shall reproduce all copyright notices and any other legend of ownership on any copies authorized under this clause. Open source software is developed independently of Contractor and may be governed by a separate license (“open source software”). If the open source software is governed by a separate License and provided under this Contract, Contractor shall provide a copy of that license in the applicable Documentation and the Authorized User's license rights and obligations with respect to that open source software shall be defined by those separate license terms and subject to the conditions, if any, therein. Nothing in this Contract shall restrict, limit, or otherwise affect any rights or obligations the Authorized User may have, or conditions to which the Authorized User may be subject, under such separate open source license terms.

  • Architecture The Private Improvements shall have architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory screening walls or fences, if necessary, shall use similar primary material, color, and detailing as on the Private Improvements.

  • Diagnostic procedures to aid the Provider in determining required dental treatment.

  • Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.

  • Interfaces Bellcore’s GR-446-CORE defines the interface between the administration system and LIDB including specific message formats. (Bellcore’s TR-NWP-000029, Section 10)

  • Technology Upgrades Notwithstanding any other provision of this Agreement, Verizon shall have the right to deploy, upgrade, migrate and maintain its network at its discretion. The Parties acknowledge that Verizon, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate PNG’s ability to provide service using certain technologies. Nothing in this Agreement shall limit Verizon's ability to modify its network through the incorporation of new equipment or software or otherwise. PNG shall be solely responsible for the cost and activities associated with accommodating such changes in its own network.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!