Next Article in Journal
Investigating Empirical Mode Decomposition in the Parameter Estimation of a Three-Section Winding Model
Next Article in Special Issue
Prediction of NOx Emission Based on Data of LHD On-Board Monitoring System in a Deep Underground Mine
Previous Article in Journal
Optimal Energy Management System of Isolated Multi-Microgrids with Local Energy Transactive Market with Indigenous PV-, Wind-, and Biomass-Based Resources
Previous Article in Special Issue
Minimizing Internal Leaks of a Powered Roof Support’s Hydraulic Prop Based on Double Block with Charging
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Detection of Blockages of the Belt Conveyor Transfer Point Using an RGB Camera and CNN Autoencoder

1
Department of Mining, Faculty of Geoengineering, Mining and Geology, Wrocław University of Science and Technology, Na Grobli 15, 50-421 Wrocław, Poland
2
VSB—Department of Machine and Industrial Design, Technical University of Ostrava, 17 Listopadu 2172/15, 708 00 Ostrava, Czech Republic
3
Institute of Logistics and Transport, Faculty BERG, Technical University of Košice, Park Komenského 14, 043 84 Košice, Slovakia
*
Author to whom correspondence should be addressed.
Energies 2023, 16(4), 1666; https://doi.org/10.3390/en16041666
Submission received: 14 January 2023 / Revised: 3 February 2023 / Accepted: 5 February 2023 / Published: 7 February 2023
(This article belongs to the Special Issue Mining Technologies Innovative Development II)

Abstract

:
In the material transfer area, the belt is exposed to considerable damage, the energy of falling material is lost, and there is significant dust and noise. One of the most common causes of failure is transfer chute blockage, when the flow of material in the free fall or loading zone is disturbed by oversized rock parts or other objects, e.g., rock bolts. The failure of a single transfer point may cause the entire transport route to be excluded from work and associated with costly breakdowns. For this reason, those places require continuous monitoring and special surveillance measures. The number of methods for monitoring this type of blockage is limited. The article presents the research results on the possibility of visual monitoring of the transfer operating status on an object in an underground copper ore mine. A standard industrial RGB camera was used to obtain the video material from the transfer point area, and the recorded frames were processed by a detection algorithm based on a neural network. The CNN autoencoder was taught to reconstruct the image of regular transfer operating conditions. A data set with the recorded transfer blockage state was used for validation.

1. Introduction

A belt conveyor allows bulk materials to be moved over long distances [1,2] while providing optimal electricity consumption [3,4] and reliability [5] indicators. For this reason, belt conveyors are one of the most popular means of transport in industry and mining [6]. The length of the belt conveyor route is limited by the permissible belt stresses in the upper belt [7], resulting from the resistance to movement along the length of the route [8]. As a standard, it is assumed that the operating stresses should be 10% of the nominal belt strength [9]. Intermediate drives are a solution that extends the length of the route [10], but their use is not always possible or cost effective [11]. In such cases, it is necessary to use parallel transfer chutes, which allows the material to be reloaded from the feed conveyor to the receiving conveyor in the transport line [12]. In a situation where it is required to feed the material to the conveyor at a significant angle and change the flow direction, angular chutes are used [13].
Transfer chutes are crucial infrastructure elements that connect conveyors that are part of complex transport systems [14]. Proper operation of transfers determines the continuity of production. Blockage causes production shutdown and, consequently, losses related to downtime and removal of failures [15]. In addition, at the transfer points, there are significant energy losses [16] associated with additional resistance to accelerating the loaded material to the speed of the receiving belt [17] and friction against skirt boards [18]. The appropriate shape of the transfer chute structure allows for feeding the material steadily and at the right speed tangential to the receiving belt. Thanks to this, the resistance to movement is reduced, as well as the wear of the belt. Statistical studies and a review of available failure analyses show that transfer points are where the conveyor belt most often fails [19]. Due to the described issues, transfer chute projects are subject to increased supervision compared to other route elements. The design of modern transfer points is supported by numerical methods [20,21], thanks to which it is possible to optimize new [22] and already working structures [23,24]. There is also considerable dust [25,26] and noise [27] at the transfer points.
A well-designed transfer chute increases production capacity by controlling dust and noise [28], reducing belt wear [28] and mistracking [29], and eliminating potential blockages of the loading zone [30]. Blockages occurring is one of the most dangerous failures of chutes, the conveyor belt may be completely cut or broken, and significant damage to the steel structure of the route may occur [30,31]. Blockages are caused by the appearance of oversized or foreign bodies in the transported material or the feeding of too much material that the conveyor cannot receive [32]. At the moment of blockage, the loading space is gradually filled until it is filled. In this case, the receiving conveyor stops due to a significant increase in resistance or damage or a breakng of the blocked belt [33].
Most standard monitoring methods and non-contact blockage detection are adapted only to chutes with a gutter in the free fall zone and loading zone [34]. The most basic solution is proximity sensors, emitting a beam in the infrared band [35]. Information on the status of regular operation and blockage is sent with the detected movement of material. RF sensors are less and less used due to numerous operation problems in conditions of extreme dust and vibration, which generate false failure states. Over time, radiometric detectors have replaced RF sensors, which are considered one of the most effective solutions [36]. However, the sensor’s construction requires using radioactive isotopes to detect the presence of a blockage in the hopper. The radiation source must be shielded and placed in the direction of the material flow in a chute, and the detected radiation level on the opposite side allows for blockage state determination [37]. The measurement method’s most significant disadvantage is the cost, safety, and environmental impact. The use of radiometric sensors requires increased supervision of external services that allow the device to work and numerous training of service employees. The most popular solution is microwave sensors, consisting of a low-power microwave emitter and a receiver [38]. This device is relatively cheap compared to radiometric detectors, does not require additional training and safety regulations, and is not sensitive to vibration and dust. Among the contact methods, the most popular are limit switches signaling the status of the chute blockage at the moment of contact with the material at a safety level.
Many transfer points are structures without a chute in the zone of free fall of material; therefore, the measurement methods mentioned in the previous paragraph cannot be used. The article presents the research results on monitoring the transfer operation in an underground copper ore mine using images from an industrial RGB camera. The anomaly detection was based on the CNN autoencoder, which was taught the parameters of regular transfer operation. The detection effectiveness was validated based on collected data frames illustrating the actual lock states. The results of the neural network operation were illustrated based on the network learning loss function, the algorithm’s effectiveness, and the error matrix was determined. Anomalous operating states were visualized using color maps superimposed on the anomalous test dataset.

2. Related Works

Vision methods in industry and mining are widely used in production quality supervision [39,40] and condition monitoring [41,42]. One of the most developed areas is detecting damage to idlers [43], pulleys, and conveyor belt drives based on anomalies in the image of the thermal imaging camera [44,45]. Increasingly, monitoring using thermal imaging methods is carried out using robots [46,47] and automated diagnostic platforms [48]. The thermal image can also be used to identify people [49]. The RGB image is also used for diagnostic purposes to determine rollers’ anomalous operating states [50] and estimate the rotational speed [51]. In the case of conveyor belts, vision algorithms are used to detect surface damage [52,53,54]. Industrial cameras are used to detect the type of machines and vehicles [55] and to monitor the state of their operation. It is also possible to forecast performance and plan production in real-time based on parameters read from the image [56]. Another area of application is assessing grain size composition [57] based on images from drones [58], industrial cameras on conveyors [59], or cyclic transport vehicles [60]. Cameras installed on machines are used to monitor the wear status of components [61,62,63]. The issue most similar to the subject discussed in the article is the monitoring of crusher blockages based on the image from the chute [64,65]. Monitoring based on CNN is very often used to evaluate images when supervising production quality [66], monitoring the condition of structures [67], medicine [68] or nanotechnologies [69]. Many of the presented works are limited only to laboratory conditions. This article focuses on the practical use of industrial cameras and artificial intelligence in image processing to detect blockages under operating conditions.

3. Materials and Methods

3.1. Research Object

The research was carried out on a perpendicular, angular transfer (approx. 90°) in an underground copper ore mine (Figure 1). The nominal capacity of the feeding conveyor is 600 t / h , while the capacity of the receiving conveyor is 1700 t / h . The increased efficiency of the receiving conveyor is because several transfer chutes are located along its route. The receiving conveyor collects material from three feeding conveyors from several branches in the mine. The analyzed transfer is the first construction along the route of the receiving conveyor. The belt speed of the conveyor is 2 m / s , and the speed of the receiving conveyor is 2.7 m / s . The density of the transported material is approx. 1.7 t / m 3 .
The transfer is a Rock-Box construction, where the material going into the box loses its kinetic energy and then slides onto the conveyor belt. At the moment of contact of the material with the belt, its acceleration occurs. The zone where the material is accelerated has been built with skirt boards, preventing material spillage and guiding material in the acceleration zone.
The selected transfer station is a construction with a tendency to blockades. Transported material moves the phase of preliminary grinding and separation on the grate [70], but this stage does not allow for maintaining a balanced grain size distribution of the ore stream. For this reason, many elongated lumps of rock in the material can cause blockage of the transfer point. In addition, there are often wastes in the stream that are the remnants of exploitation, such as rock bolts. The object also has a disadvantage in its design, as the falling stream of material hits the chute plate directly and does not slide freely down the side chute plate onto the receiving conveyor belt in the loading zone.

3.2. Measuring Equipment

Images were captured with an AXIS P1354-E standard industrial RGB camera (Figure 2). The camera is a regular part of the mine monitoring infrastructure, used to monitor the transfer space by the mine dispatcher. The article also tested the recorded image regarding the possibility of automatic detection of transfer blockages and unwanted foreign bodies in material drop and loading areas. The recorded images were in the mine’s internal data acquisition system, while the processing was already performed in external software. The Ethernet protocol carried out power, communication, and data transmission. The camera was placed under the roof of the excavation at a distance of approx. 6 m from the transfer point. The camera is resistant to dust, vibrations, and climatic conditions, which is important due to the constantly deteriorating micro climate [71] and temperature above 30 °C. For this reason, no additional cooling of the apparatus was required. The camera has been able to record images with a frame rate of 10 FPS . The data rate was 13,197 kb / s . The video image is distributed into data frames measuring 1920 × 1080 px , 96 dpi resolutions in two directions, and 24 bits deep.

3.3. Methodology

Data acquisition was the first stage of the work. Data frames in video materials divided over individual frames were collected for different periods of transfer chute operation so that the training data set contained all the characteristic features of the regular operating state. The training set consisted of 1078 photos. To validate the model, 205 images were used, on which there were various types of blockages in the form of oversized lumps and foreign bodies blocking the free flow of material. Figure 3 shows sample images later used to create training and test collections.
The original images were processed in the second stage to isolate distinctive features and reduce interference. Through subsequent trials with different image processing methods and subsequent iterations of algorithm learning, the best results were obtained by degrading the complexity of the input images. The data frames were cropped and resized to represent the area of free fall and loading of material onto the receiving conveyor. Frequency domain filtering is used to reduce noise and image features while preserving all edges of objects. Then, using threshold operators and morphology, the elements of the transfer chute and the flowing material were separated from the background.
The last, third stage included neural network learning in order to obtain the best results of the reconstruction of the input image. A previously trained convolutional neural network VGG16 [72] was used, which was additionally modified for the purposes of the article. The network consists of six blocks. Each block contained convolutional layers and a pooling layer (MaxPooling). Some layers were preserved in a learned state, and the remaining layers were trained. After the section of subsequent blocks, one more layer of pooling (Global Average Pooling) was added. The last layer defined the class of the object being analyzed. Multi-class classification was used for two predicted states with Softmax activation. The autoencoder was validated against a test data set containing anomalous operating states. The loss of image reconstruction and the performance metrics of the prediction model were determined. The results were visualized using modified code [73] that allowed the density of outliers in images classified as abnormal to be determined using a color scale. Figure 4 presents the algorithm of conduct and subsequent tasks discussed in the article.

3.4. Image Processing

3.4.1. Crop

In the first stage of processing, the recorded data frames were cut only to the area where the transfer box was visible, and therefore the moment of free fall of the material and loading on the receiving belt was analyzed. Images from the original size were cropped to 1000 × 1000 for network training, and the input image size was further reduced to 225 × 225 without changing the aspect ratio. Figure 5 shows what an example image of regular (Figure 5a) and failure working state (Figure 5b) looks like after cropping and resizing.

3.4.2. Smoothing

The Gaussian averaging operator was chosen as the most optimal way to smooth the image. Using Gaussian blur is the same as combining an image with Gauss. Thanks to this filter, it is possible to reduce components from high-frequency images (low-pass filter), which allows limiting interferences recorded in underground camera conditions. It is a type of image blur filter that uses the Gaussian function to determine the normal distribution in statistical issues to calculate transformations for each pixel of the image being processed. The Gaussian function g for a one-dimensional system with a coordinate x, controlled by the variance of the σ 2 , is [74]:
g ( x , σ ) = 1 2 π σ 2 e x 2 2 σ 2
Image processing requires the use of the Gaussian function g for a two-dimensional system with coordinates x , y , which is described by the equation:
g ( x , y , σ ) = 1 2 π σ 2 e x 2 + y 2 2 σ 2
Equation (2) allows the calculation of the Gaussian template, which is then entangled with the image. For processing, use a 7 × 7 template that reduces many image features. Once entangled, each pixel has a new weighted average neighborhood value for that pixel. The original pixel has the highest weight value, and the weight of adjacent pixels is based on the distance from the original pixel. Thanks to this, the image obtains blurring and reduces many components and distortions, while maintaining the most important feature, which is the objects’ edges and boundaries [74]. Figure 6 shows the picture of regular transfer operation and its spectrum before and after filtration.

3.4.3. Thresholding

In the next stage, to distinguish the characteristic features of the images, a threshold was used, where the pixels above the designated level received white and below the black color [74]. Thanks to this procedure, it is possible to separate the background elements of the transfer from its construction and excavation, which isolates objects of interest from the monitoring point of view. In this case, binary thresholding combined with the Otsu method [75] and color inversion was used. The Otsu method allows the determination of the optimal value of the threshold of pixel separation and separation of the object from the background based on the difference in intensity. The research shows that the Otsu method maximizes the probability that the threshold will be chosen to divide the image between the object and its background [76,77,78]. This is achieved by selecting a threshold that provides the best class separation for all pixels in the image. This method uses a standardized histogram in which the number of each level point is divided by the total number of image points. Therefore, this represents the probability distribution for intensity levels as [74]:
p ( l ) = N ( l ) N 2
The formula is used to calculate the cumulative moments of the zero and first-order normalized histogram to the k-th level as:
ω ( k ) = l = 1 k p ( l )
μ ( k ) = l = 1 k l · p ( l )
The total average image level is:
μ T = l = 1 N mat l · p ( l )
The variance of class separation then has the form:
σ B 2 ( k ) = ( μ T · ω ( k ) μ ( k ) ) 2 ω ( k ) ( 1 ω ( k ) ) k 1 , N max
The optimal threshold is the level at which the variance of class separability is maximum. That is, the optimal threshold is one where the variance is:
σ B 2 T opt = max 1 k < N max σ B 2 ( k )
The threshold results are shown in Figure 7 on the example of an image for a normal operating state and blockage.

3.4.4. Morphology

The operators used in mathematical morphology were developed based on set [79]. Thanks to them, we process images according to shape, treating both of these elements as separate sets of points [80]. Local transformations defined that changing the value of the pixels represented as sets. Changing pixel values is strictly formalized by a miss-and-hit transformation. The object is represented as a X set and tested by a structural element represented by the B set. The transformation is defined as the operator point [74]:
X B = x B x 1 X B x 2 X c
In Equation (9), x represents one pixel in the image, which is one element from the set of X. X c is the complement of X, that is, the set of pixels of the image that are not in the set X. Dement structuring B is represented by two parts B 1 and B 2 , which apply to the set of X or its complement X c . The structural element is the shape, which is how mathematical morphological operations process images according to the properties of the shape. An operation B 1 on a set of X is a hit transformation, and B 2 on a X is a miss. The lower index indicates that the structuring element has moved to the position of the x element. The B dement defines the window that is moved through the image [74]. In image processing, the simplest forms of morphological operators, i.e., erosion and extension, were used. Erosion, otherwise known as reduction, occurs when B 1 is empty:
X B = x B x 1 X
In the erosion operator, the hit or miss transformation determines whether a pixel x belongs to the set. It is possible when each point of the element B 1 transferred to x is in the set of X. Since all points in B 1 must be in X, this operator removes pixels on the boundaries of objects in the X set. Thus, it erodes or shrinks the collection. The operator was used to remove noise from images after thresholding. The erosion operator sometimes causes the loss of valuable edges, so the image has been corrected using dilation, otherwise known as increase, which occurs when B 2 is empty [74]:
X B = x B x 2 X c
The results of image processing using morphological operators are shown in Figure 8.

3.5. CNN Autoencoder Structure

An autoencoder based on a convolutional neural network was used to detect anomalies on subsequent frames from the video material. This algorithm was taught to reconstruct the input data. Autoencoders are taught to encode data in an unsupervised manner, which is important in the case of binary classification of anomalous events at the transfer point. Preparing a dataset containing regular- and anomalous-state labels is difficult. Blockages and other anomalous events are rare, so it is difficult to prepare a proper database. In addition, anomalous events in the case of transfer are so diverse that detection and manual labeling of all possible cases are practically impossible [81].
Autoencoders consist of three main parts. The first part, an encoder, compresses the input into an encoded representation. The size of the encoded representation is usually several times smaller than the size of the input data. The second part, called the bottleneck, is the latent space where the encoded representation of the input in a compressed form is stored. The last, third part, called the decoder, is used to reconstruct compressed data. The reconstruction data are then compared with the input data, and a reconstruction error is determined [82]. Figure 9 shows a diagram of a typical autoencoder used to reconstruct an input image.
Iterative neural network learning involves specifying a loss function that determines the error of the decoder reconstruction relative to the input image. The autoencoder loss function can be written as [83]:
L o s s = x d ϕ ( z ) 2 = x d ϕ e θ ( x ) 2
The proposed neural network model determines the probability of anomalies in the studied image. For this reason, categorical cross-entropy was chosen as the parameter characterizing the autoencoder loss function. The categorical cross-entropy function can be used for two-class or multi-class classification. It allows for calculating the average difference between the actual value and the predicted probability distributions for all classes in the analyzed classification problem. In subsequent iterations, the result is minimized, and the ideal cross-entropy value is 0 [84]. The equation can describe the cross-entropy for a class problem:
L o s s = i = 1 N t i · log p i
where t i is the truth label and p i is the Softmax probability for each class i from the class set N.

4. Results

Figure 10 shows how the autoencoder loss function changed during subsequent iterations of neural network learning. For the first 10 iterations of the model for training data, the cross-entropy value varies quite a lot from 0.58 to 0.01. After this learning stage, the loss function’s course is smoothed and stabilized at an average level of 0.002. The loss for validation data is less than 0.01 in a complete iterative cycle, and for the waveform stabilization range, it is only 0.001 on average. The model was trained until the cross-entropy value was approximately 0, which occurred in about 50 iterations.
As an indicator of the quality of the prediction model, a parameter called accuracy was chosen, which allows the determination of how often the predictions were equal to the actual labels defining the class of the analyzed image. Figure 11 shows how the accuracy value changed during subsequent iterations of model learning. As with the loss function, the most significant changes were recorded in the first 10 iterations. After this stage, the mileage for test and training data stabilized. For iterations, when the autoencoder loss function was 0, the forecast accuracy was 1.
The results of the prediction algorithm were visualized using a matrix of errors (Figure 12). The error matrix is used for assessing the quality of binary classification, where there were regular and anomalous transfer chute operation classes. Data labeled positive and negative are classified as either a predicted positive class or a predicted negative class. A given originally marked as positive may be mistakenly classified as negative. Due to the effectiveness of network detection equal to unity, there are only two classes in the error table: truly positive (TP) and truly negative (TN). The TP class accounted for 72.45% of the forecasted data, while the TN 27.55%.
The prediction algorithm allows the determination of the location of anomalous pixels on reconstructed images. Heatmaps were plotted based on their location and using the function of detecting maximum values on forecasted images, where colors show the density of outlier pixels. Figure 13 shows the detected anomaly caused by the blockage of an oversized rock block in the zone of free fall of material. Figure 14 shows the detected foreign body as a rock bolt stuck between the transfer box and the feed conveyor structure. The last example (Figure 15) shows the detected complete blockage. Each of the presented cases was positively classified as an anomaly, and the additional marking in the form of a field with a red border indicates only the area of the detected most significant number of outlier pixels.

5. Conclusions

The article presents the possibility of detecting blockages of the conveyor transfer point using the proposed detection algorithm. The best results were obtained by filtering the images with a Gaussian filter and reducing complexity by thresholding and transforming using morphology operators. By pointing out, the image examples used for validation turned out to be a trivial problem for the trained autoencoder algorithm. The effectiveness and loss of learning validation data were more beneficial than training data because the anomalous images contained typical examples of blockages and the presence of solids in the zone of fall and loading of material. The real anomalous states vary widely, and it is impossible to record them all for model validation. The algorithm managed to detect the blockage of transfer through an oversized rock fragment and a rock bolt. Blocks caused by these objects are the most common reason for reduced capacity and can be considered the beginning of a potential blockage.
At this stage, the possibility of using the method proposed in industrial conditions should be considered. Since this method is in the initial stage of development, the detection algorithm should provide a security alert before the state of total blockage occurs. The tested model also detected total blockages when the receiving conveyor loading space was filled with excavated material, causing material spillage. The following stages of research will focus on validating the algorithm based on real-time image processing. In much more diverse operating conditions, there will undoubtedly be a decrease in detection efficiency and the occurrence of false alarm states. The presented algorithm will require modification and taking into account other parameters, e.g., information about the movement of the material.

Author Contributions

Conceptualization, P.B., H.G., R.K., D.M. and M.O.; methodology, P.B and M.O.; software, P.B. and M.O.; validation, H.G., R.K. and D.M.; formal analysis, R.K.; investigation, P.B., R.K. and M.O.; resources, R.K.; data curation, P.B.; writing—original draft preparation, P.B. and M.O.; writing—review and editing, H.G., R.K. and D.M.; visualization, P.B.; supervision, H.G., R.K. and D.M.; project administration, R.K.; funding acquisition, R.K. All authors have read and agreed to the published version of the manuscript.

Funding

The research work was funded with the research subsidy from the Polish Ministry of Science and Higher Education granted for 2023.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Alspaugh, M. Latest developments in belt conveyor technology. In Proceedings of the MINExpo 2004, Las Vegas, NV, USA, 27 September 2004. [Google Scholar]
  2. Woodcock, C.; Mason, J. Bulk Solids Handling: An Introduction to the Practice and Technology; Springer Science & Business Media: Berlin/Heidelberg, Germany, 1988. [Google Scholar]
  3. Mathaba, T.; Xia, X. Optimal and energy efficient operation of conveyor belt systems with downhill conveyors. Energy Effic. 2017, 10, 405–417. [Google Scholar] [CrossRef]
  4. Bajda, M.; Hardygóra, M. Analysis of the Influence of the Type of Belt on the Energy Consumption of Transport Processes in a Belt Conveyor. Energies 2021, 14, 6180. [Google Scholar] [CrossRef]
  5. Mazurkiewicz, D. Computer-aided maintenance and reliability management systems for conveyor belts. Eksploat. I Niezawodn. 2014, 16, 377–382. [Google Scholar]
  6. Bajda, M.; Hardygóra, M.; Marasová, D. Energy Efficiency of Conveyor Belts in Raw Materials Industry. Energies 2022, 15, 3080. [Google Scholar] [CrossRef]
  7. Hou, Y.F.; Meng, Q.R. Dynamic characteristics of conveyor belts. J. China Univ. Min. Technol. 2008, 18, 629–633. [Google Scholar] [CrossRef]
  8. Hager, M.; Hintz, A. The energy-saving design of belts for long conveyor systems. Bulk Solids Handl. 1993, 13, 749–758. [Google Scholar]
  9. Woźniak, D.; Hardygóra, M. Aspects of Selecting Appropriate Conveyor Belt Strength. Energies 2021, 14, 6018. [Google Scholar] [CrossRef]
  10. Bortnowski, P.; Gładysiewicz, A.; Gładysiewicz, L.; Król, R.; Ozdoba, M. Conveyor Intermediate TT Drive with Power Transmission at the Return Belt. Energies 2022, 15, 6062. [Google Scholar] [CrossRef]
  11. Masaki, M.S.; Zhang, L.; Xia, X. A comparative study on the cost-effective belt conveyors for bulk material handling. Energy Procedia 2017, 142, 2754–2760. [Google Scholar] [CrossRef]
  12. Wensrich, C.M. Evolutionary optimisation in chute design. Powder Technol. 2003, 138, 118–123. [Google Scholar] [CrossRef]
  13. Ilic, D.; Roberts, A.; Wheeler, C.; Katterfeld, A. Modelling bulk solid flow interactions in transfer chutes: Shearing flow. Powder Technol. 2019, 354, 30–44. [Google Scholar] [CrossRef]
  14. Grincova, A.; Andrejiova, M.; Marasova, D. Failure analysis of conveyor belt in terms of impact loading by means of the damping coefficient. Eng. Fail. Anal. 2016, 68, 210–221. [Google Scholar] [CrossRef]
  15. Gerard, B.; O’Rourke, L. Optimisation of overland conveyor performance. Aust. Bulk. Handl. Rev. 2009, 26–36. Available online: https://cemanet.org/wp-content/uploads/2019/09/Optimisation-of-overland-conveyor-performance.pdf (accessed on 13 January 2023).
  16. Molnár, V.; Fedorko, G.; Husáková, N.; Král’, J., Jr.; Ferdynus, M. Energy calculation model of an outgoing conveyor with application of a transfer chute with the damping plate. Mech. Sci. 2016, 7, 167–177. [Google Scholar] [CrossRef]
  17. Roberts, A. Design and Application of Feeders for the Controlled Loading of Bulk Solids onto Conveyor Belts. Available online: https://www2.hcmuaf.edu.vn/data/dangnh/file/DESIGN%20AND%20APPLICATION%20OF%20FEEDERS%20FOR.pdf (accessed on 13 January 2023).
  18. Zhang, S.; Xia, X. A new energy calculation model of belt conveyor. In Proceedings of the AFRICON 2009, Nairobi, Kenya, 23–25 September 2009; pp. 1–6. [Google Scholar]
  19. Bortnowski, P.; Kawalec, W.; Król, R.; Ozdoba, M. Types and causes of damage to the conveyor belt-review, classification and mutual relations. Eng. Fail. Anal. 2022, 140, 106520. [Google Scholar] [CrossRef]
  20. Rossow, J.; Coetzee, C. Discrete element modelling of a chevron patterned conveyor belt and a transfer chute. Powder Technol. 2021, 391, 77–96. [Google Scholar] [CrossRef]
  21. Ilic, D.; Roberts, A.; Wheeler, C. Modelling bulk solid interactions in transfer chutes: Accelerated flow. Chem. Eng. Sci. 2019, 209, 115197. [Google Scholar] [CrossRef]
  22. Doroszuk, B.; Krol, R. Analysis of conveyor belt wear caused by material acceleration in transfer stations. Min. Sci. 2019, 26, 189–201. [Google Scholar]
  23. Hustrulid, A.I.; Mustoe, G.G. Engineering Analysis of Transfer Points Using Discrete Element Analysis; Geomechanics Research Center, Colorado School of Mines: Golden, CO, USA, 1996. [Google Scholar]
  24. Doroszuk, B.; Król, R.; Wajs, J. Simple Design Solution for Harsh Operating Conditions: Redesign of Conveyor Transfer Station with Reverse Engineering and DEM Simulations. Energies 2021, 14, 4008. [Google Scholar] [CrossRef]
  25. Seibel, R.J. Dust Control at a Transfer Point Using Foam and Water Sprays; US Department of the Interior, Bureau of Mines: Washington, DC, USA, 1976; Volume 97. [Google Scholar]
  26. Gao, G.; Shen, J.; Liang, Q. Study of dust diffusion at transfer point of belt conveyor based on FLUENT. J. Phys. Conf. Ser. 2018, 1064, 012016. [Google Scholar] [CrossRef]
  27. Mandal, B.B.; Bhattacharya, S.; Manwar, V.D.; Hussain, S.A. Health risk of exposure to noise in coal preparation and mineral processing plants. In Innovative Exploration Methods for Minerals, Oil, Gas, and Groundwater for Sustainable Development; Elsevier: Amsterdam, The Netherlands, 2022; pp. 139–157. [Google Scholar]
  28. Kesler, F.; Prener, M. DEM: Simulation of conveyor transfer chutes. FME Trans. 2009, 37, 185–192. [Google Scholar]
  29. Scott, O.; Choules, P. The use of impact plates in conveyor transfers. Tribol. Int. 1993, 26, 353–359. [Google Scholar] [CrossRef]
  30. Rudolf, L.; Durna, A.; Hapla, T. The issue of the transfer points on belt conveyors. Int. Multidiscip. Sci. Geoconference SGEM 2018, 18, 989–996. [Google Scholar]
  31. Cleary, P.; Sinnott, M.; McBride, W. Prediction of particle flows and blockage problems in realistic 3D transfer chutes. In Proceedings of the World Congress on Chemical Engineering, Edinburgh, UK, 1–4 July 2005; p. 10. [Google Scholar]
  32. Hastie, D.B.; Wypych, P. Experimental validation of particle flow through conveyor transfer hoods via continuum and discrete element methods. Mech. Mater. 2010, 42, 383–394. [Google Scholar] [CrossRef]
  33. De-Song, B.; Xun-Sheng, Z.; Guang-Lei, X.; Zheng-Quan, P.; Xiao-Wei, T.; Kun-Quan, L. Critical phenomenon of granular flow on a conveyor belt. Phys. Rev. E 2003, 67, 062301. [Google Scholar] [CrossRef]
  34. Owen, P. Condition monitoring for conveyors. In Proceedings of the 9th International Materials Handling Conference, Johannesburg, South Africa, 1997. [Google Scholar]
  35. Norgia, M.; Svelto, C. RF-capacitive proximity sensor for safety applications. In Proceedings of the 2007 IEEE Instrumentation & Measurement Technology Conference IMTC 2007, Warsaw, Poland, 1–3 May 2007; pp. 1–4. [Google Scholar]
  36. Jaafar, A. Nucleonic Gauging and Instrumentation. 2005. Available online: https://www.osti.gov/etdeweb/biblio/20756985 (accessed on 13 January 2023).
  37. Byrne, B. Nucleonic Instrumentation. Meas. Control 1985, 18, 166. [Google Scholar] [CrossRef]
  38. Kulp, M. Enhanced Technology for Blocked Chute Detection. Eng. Min. J. 2012, 213, 158. [Google Scholar]
  39. Progorowicz, J.; Skoczylas, A.; Anufriiev, S.; Dudzik, M.; Stefaniak, P. Estimation of Final Product Concentration in Metalic Ores Using Convolutional Neural Networks. Minerals 2022, 12, 1480. [Google Scholar] [CrossRef]
  40. Kuzba, B.; Pawlos, W.; Konieczny, A.; Krzeminska, M. Optimisation Platform for copper ore processing at the Division of Concentrator of KGHM Polska Miedz SA. E3S Web Conf. 2016, 8, 01037. [Google Scholar] [CrossRef]
  41. Cao, W.; Zhang, H.; Wang, N.; Wang, H.W.; Peng, Z.X. The gearbox wears state monitoring and evaluation based on on-line wear debris features. Wear 2019, 426, 1719–1728. [Google Scholar] [CrossRef]
  42. Castejón, M.; Alegre, E.; Barreiro, J.; Hernández, L. On-line tool wear monitoring using geometric descriptors from digital images. Int. J. Mach. Tools Manuf. 2007, 47, 1847–1853. [Google Scholar] [CrossRef]
  43. Barszcz, T.; Siami, M.; Wodecki, J.; Zimroz, R. Automated IR Image Segmentation for Identification of Overheated Idlers in Belt Conveyor Systems Based on Outlier-Detection Method. Sensors 2022, 22, 10004. [Google Scholar] [CrossRef]
  44. Szurgacz, D.; Zhironkin, S.; Vöth, S.; Pokornỳ, J.; Spearing, A.; Cehlár, M.; Stempniak, M.; Sobik, L. Thermal imaging study to determine the operational condition of a conveyor belt drive system structure. Energies 2021, 14, 3258. [Google Scholar] [CrossRef]
  45. Jia, Z.; Liu, Z.; Vong, C.M.; Pecht, M. A rotating machinery fault diagnosis method based on feature learning of thermal images. IEEE Access 2019, 7, 12348–12359. [Google Scholar] [CrossRef]
  46. Dabek, P.; Szrek, J.; Zimroz, R.; Wodecki, J. An Automatic Procedure for Overheated Idler Detection in Belt Conveyors Using Fusion of Infrared and RGB Images Acquired during UGV Robot Inspection. Energies 2022, 15, 601. [Google Scholar] [CrossRef]
  47. Szrek, J.; Wodecki, J.; Błażej, R.; Zimroz, R. An inspection robot for belt conveyor maintenance in underground mine—Infrared thermography for overheated idlers detection. Appl. Sci. 2020, 10, 4984. [Google Scholar] [CrossRef]
  48. Carvalho, R.; Nascimento, R.; D’Angelo, T.; Delabrida, S.; GC Bianchi, A.; Oliveira, R.A.; Azpúrua, H.; Uzeda Garcia, L.G. A UAV-based framework for semi-automated thermographic inspection of belt conveyors in the mining industry. Sensors 2020, 20, 2243. [Google Scholar] [CrossRef] [Green Version]
  49. Uth, F.; Polnik, B.; Kurpiel, W.; Kriegsch, P.; Baltes, R.; Clausen, E. An innovative person detection system based on thermal imaging cameras dedicate for underground belt conveyors. Min. Sci. 2019, 26, 275–288. [Google Scholar] [CrossRef]
  50. Hongmei, J.; Changbin, H.; Zhanli, L.; Pengfei, S. Video-based roller abnormality detection. In Proceedings of the 2021 International Conference on Computer Engineering and Application (ICCEA), Kunming, China, 25–27 June 2021; pp. 380–385. [Google Scholar]
  51. Dąbek, P.; Krot, P.; Wodecki, J.; Zimroz, P.; Szrek, J.; Zimroz, R. Measurement of idlers rotation speed in belt conveyors based on image data analysis for diagnostic purposes. Measurement 2022, 202, 111869. [Google Scholar] [CrossRef]
  52. Trybała, P.; Blachowski, J.; Błażej, R.; Zimroz, R. Damage detection based on 3d point cloud data processing from laser scanning of conveyor belt surface. Remote Sens. 2020, 13, 55. [Google Scholar] [CrossRef]
  53. Zhang, M.; Shi, H.; Zhang, Y.; Yu, Y.; Zhou, M. Deep learning-based damage detection of mining conveyor belt. Measurement 2021, 175, 109130. [Google Scholar] [CrossRef]
  54. Zhang, M.; Zhang, Y.; Zhou, M.; Jiang, K.; Shi, H.; Yu, Y.; Hao, N. Application of Lightweight Convolutional Neural Network for Damage Detection of Conveyor Belt. Appl. Sci. 2021, 11, 7282. [Google Scholar] [CrossRef]
  55. Kim, J.; Chi, S. Multi-camera vision-based productivity monitoring of earthmoving operations. Autom. Constr. 2020, 112, 103121. [Google Scholar] [CrossRef]
  56. Kim, J.; Hwang, J.; Chi, S.; Seo, J. Towards database-free vision-based monitoring on construction sites: A deep active learning approach. Autom. Constr. 2020, 120, 103376. [Google Scholar] [CrossRef]
  57. Nefis, M.; Talhi, K. A model study to measure fragmentation by blasting. Min. Sci. 2016, 23, 91–104. [Google Scholar]
  58. Bamford, T.; Esmaeili, K.; Schoellig, A.P. A real-time analysis of post-blast rock fragmentation using UAV technology. Int. J. Min. Reclam. Environ. 2017, 31, 439–456. [Google Scholar] [CrossRef]
  59. Al-Thyabat, S.; Miles, N.; Koh, T. Estimation of the size distribution of particles moving on a conveyor belt. Miner. Eng. 2007, 20, 72–83. [Google Scholar] [CrossRef]
  60. Maerz, N.H. Image sampling techniques and requirements for automated image analysis of rock fragmentation. In Measurement of Blast Fragmentation; Routledge: London, UK, 2018; pp. 115–120. [Google Scholar]
  61. Shariati, H.; Yeraliyev, A.; Terai, B.; Tafazoli, S.; Ramezani, M. Towards autonomous mining via intelligent excavators. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, Long Beach, CA, USA, 16–17 June 2019; pp. 26–32. [Google Scholar]
  62. Lim, S.N.; Zhou, N.; Soares, J.V.B. System and Method for Detecting Missing Tooth in Mining Shovel. US Patent 9,886,754, 6 February 2018. [Google Scholar]
  63. Bilandi, S.T.; Ramezani, M.; Suzani, A.; Parnian, N.; Baumann, M.A.; Nouranian, S.; Hamzei, N.; Sameti, M.; Karimifard, S. Method and Apparatus for Locating a Wear Part in an Image of an Operating Implement. US Patent 10,339,667, 19 September 2019. [Google Scholar]
  64. Kim, H.; Choi, Y. Lab Scale Model Experiment of Smart Hopper System to Remove Blockages Using Machine Vision and Collaborative Robot. Appl. Sci. 2022, 12, 579. [Google Scholar] [CrossRef]
  65. Yao, J.; Wang, Z.; Liu, C.; Huang, G.; Yuan, Q.; Xu, K.; Zhang, W. Detection Method of Crushing Mouth Loose Material Blockage Based on SSD Algorithm. Sustainability 2022, 14, 14386. [Google Scholar] [CrossRef]
  66. Staar, B.; Lütjen, M.; Freitag, M. Anomaly detection with convolutional neural networks for industrial surface inspection. Procedia CIRP 2019, 79, 484–489. [Google Scholar] [CrossRef]
  67. Tang, Z.; Chen, Z.; Bao, Y.; Li, H. Convolutional neural network-based data anomaly detection method using multiple information for structural health monitoring. Struct. Control Health Monit. 2019, 26, e2296. [Google Scholar] [CrossRef]
  68. Jain, S.; Seal, A.; Ojha, A.; Yazidi, A.; Bures, J.; Tacheci, I.; Krejcar, O. A deep CNN model for anomaly detection and localization in wireless capsule endoscopy images. Comput. Biol. Med. 2021, 137, 104789. [Google Scholar] [CrossRef]
  69. Napoletano, P.; Piccoli, F.; Schettini, R. Anomaly detection in nanofibrous materials by CNN-based self-similarity. Sensors 2018, 18, 209. [Google Scholar] [CrossRef]
  70. Krauze, K.; Rączka, W.; Sibielak, M.; Konieczny, J.; Kubiak, D.; Culer, H.; Bajus, D. Automated transfer point URB/ZS-3. Min.–Inform. Autom. Electr. Eng. 2017, 2, 80–91. [Google Scholar] [CrossRef]
  71. Wróblewski, A.; Banasiewicz, A.; Gola, S. Heat Balance Determination Methods for Mining Areas in Underground Mines-A Review. Iop Conf. Ser. Earth Environ. Sci. 2021, 942, 012011. [Google Scholar] [CrossRef]
  72. Chen, L.C.; Papandreou, G.; Kokkinos, I.; Murphy, K.; Yuille, A.L. Semantic image segmentation with deep convolutional nets and fully connected crfs. arXiv 2014, arXiv:1412.7062. [Google Scholar]
  73. Bhattiprolu, S. Localizing Anomalies in Images. 2022. Available online: https://github.com/bnsreenu/python_for_microscopists; https://www.youtube.com/watch?v=P9NdQG_vIvo (accessed on 13 January 2023).
  74. Nixon, M.; Aguado, A. Feature Extraction and Image Processing for Computer Vision; Academic Press: Cambridge, MA, USA, 2019. [Google Scholar]
  75. Otsu, N. A threshold selection method from gray-level histograms. IEEE Trans. Syst. Man Cybern. 1979, 9, 62–66. [Google Scholar] [CrossRef]
  76. Sahoo, P.K.; Soltani, S.; Wong, A.K. A survey of thresholding techniques. Comput. Vis. Graph. Image Process. 1988, 41, 233–260. [Google Scholar] [CrossRef]
  77. Lee, S.U.; Chung, S.Y.; Park, R.H. A comparative performance study of several global thresholding techniques for segmentation. Comput. Vis. Graph. Image Process. 1990, 52, 171–190. [Google Scholar] [CrossRef]
  78. Glasbey, C.A. An analysis of histogram-based thresholding algorithms. CVGIP Graph. Models Image Process. 1993, 55, 532–537. [Google Scholar] [CrossRef]
  79. Serra, J. Introduction to mathematical morphology. Comput. Vis. Graph. Image Process. 1986, 35, 283–305. [Google Scholar] [CrossRef]
  80. Serra, J.; Soille, P. Mathematical Morphology and Its Applications to Image Processing; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2012; Volume 2. [Google Scholar]
  81. Mehrotra, K.G.; Mohan, C.K.; Huang, H. Anomaly Detection Principles and Algorithms; Springer: Berlin/Heidelberg, Germany, 2017; Volume 1. [Google Scholar]
  82. Jana, D.; Patil, J.; Herkal, S.; Nagarajaiah, S.; Duenas-Osorio, L. CNN and Convolutional Autoencoder (CAE) based real-time sensor fault detection, localization, and correction. Mech. Syst. Signal Process. 2022, 169, 108723. [Google Scholar] [CrossRef]
  83. Khare, N.; Thakur, P.S.; Khanna, P.; Ojha, A. Analysis of Loss Functions for Image Reconstruction Using Convolutional Autoencoder. In Proceedings of the International Conference on Computer Vision and Image Processing, Rupnagar, India, 3–5 December 2021; Springer: Cham, Switzerland, 2022; pp. 338–349. [Google Scholar]
  84. Koidl, K. Loss Functions in Classification Tasks. School of Computer Science and Statistic Trinity College Dublin. 2013. Available online: https://www.scss.tcd.ie/~koidlk/cs4062/Loss-Functions.pdf (accessed on 13 January 2023).
Figure 1. Research object—perpendicular, angular transfer point in an underground copper ore mine.
Figure 1. Research object—perpendicular, angular transfer point in an underground copper ore mine.
Energies 16 01666 g001
Figure 2. Measuring equipment—RGB camera to monitor the working conditions of the transfer point.
Figure 2. Measuring equipment—RGB camera to monitor the working conditions of the transfer point.
Energies 16 01666 g002
Figure 3. Recorded original data frames: (a) normal operation of the transfer point—free flow of bulk material; (b) normal operation of the transfer point—no flow; (c) anomalous operating state of the transfer point—blockage.
Figure 3. Recorded original data frames: (a) normal operation of the transfer point—free flow of bulk material; (b) normal operation of the transfer point—no flow; (c) anomalous operating state of the transfer point—blockage.
Energies 16 01666 g003
Figure 4. Procedure algorithm.
Figure 4. Procedure algorithm.
Energies 16 01666 g004
Figure 5. Original images after cropping and resizing: (a) normal working condition; (b) blockage state.
Figure 5. Original images after cropping and resizing: (a) normal working condition; (b) blockage state.
Energies 16 01666 g005
Figure 6. Filtering with the use of Gaussian blur of the image of the normal operation of the transfer point: (a) normal conditions; (b) normal conditions spectrum; (c) normal conditions filtered out; (d) normal conditions filtered out spectrum.
Figure 6. Filtering with the use of Gaussian blur of the image of the normal operation of the transfer point: (a) normal conditions; (b) normal conditions spectrum; (c) normal conditions filtered out; (d) normal conditions filtered out spectrum.
Energies 16 01666 g006aEnergies 16 01666 g006b
Figure 7. Thresholding results: (a) normal condition; (b) blockage state.
Figure 7. Thresholding results: (a) normal condition; (b) blockage state.
Energies 16 01666 g007
Figure 8. Morphology operators results: (a) normal condition; (b) blockage state.
Figure 8. Morphology operators results: (a) normal condition; (b) blockage state.
Energies 16 01666 g008
Figure 9. Autoencoder structure of a convolutional neural network.
Figure 9. Autoencoder structure of a convolutional neural network.
Energies 16 01666 g009
Figure 10. Autoencoder network learning loss—categorical crossentropy.
Figure 10. Autoencoder network learning loss—categorical crossentropy.
Energies 16 01666 g010
Figure 11. Autoencoder network training metric—accuracy.
Figure 11. Autoencoder network training metric—accuracy.
Energies 16 01666 g011
Figure 12. Confusion matrix.
Figure 12. Confusion matrix.
Energies 16 01666 g012
Figure 13. The result of the autoencoder network operation: (a) original image of blockage—oversized rock; (b) location of the anomaly most clearly.
Figure 13. The result of the autoencoder network operation: (a) original image of blockage—oversized rock; (b) location of the anomaly most clearly.
Energies 16 01666 g013
Figure 14. The result of the autoencoder network operation: (a) original image of blockage—foreign body mining anchor; (b) location of the anomaly most clearly.
Figure 14. The result of the autoencoder network operation: (a) original image of blockage—foreign body mining anchor; (b) location of the anomaly most clearly.
Energies 16 01666 g014
Figure 15. The result of the autoencoder network operation: (a) original image of blockage—full blockage; (b) location of the anomaly most clearly.
Figure 15. The result of the autoencoder network operation: (a) original image of blockage—full blockage; (b) location of the anomaly most clearly.
Energies 16 01666 g015
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Bortnowski, P.; Gondek, H.; Król, R.; Marasova, D.; Ozdoba, M. Detection of Blockages of the Belt Conveyor Transfer Point Using an RGB Camera and CNN Autoencoder. Energies 2023, 16, 1666. https://doi.org/10.3390/en16041666

AMA Style

Bortnowski P, Gondek H, Król R, Marasova D, Ozdoba M. Detection of Blockages of the Belt Conveyor Transfer Point Using an RGB Camera and CNN Autoencoder. Energies. 2023; 16(4):1666. https://doi.org/10.3390/en16041666

Chicago/Turabian Style

Bortnowski, Piotr, Horst Gondek, Robert Król, Daniela Marasova, and Maksymilian Ozdoba. 2023. "Detection of Blockages of the Belt Conveyor Transfer Point Using an RGB Camera and CNN Autoencoder" Energies 16, no. 4: 1666. https://doi.org/10.3390/en16041666

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop