Analysis of Techniques for Verification of Coating Thickness Gauges

被引:0
作者
V. S. Sekatskii
O. A. Gavrilova
N. V. Merzlikina
V. N. Morgun
机构
[1] Sibirian Federal University,State Regional Center for Standardization
[2] Metrology,undefined
[3] and Testing Krasnoyarsk TsSM,undefined
来源
Measurement Techniques | 2019年 / 62卷
关键词
coating thickness gauges; verification; techniques; analysis;
D O I
暂无
中图分类号
学科分类号
摘要
An analysis of the structure and content of verification technique MP 002.D4-14, extends to coating thickness gauges TM-2, TM-3, TM-4, and TM-4T, technique MP 159-261-2016 for verification of SaluTrjn coating thickness gauges, and a technique for verification of coating thickness gauges regulated by GOST 8.502–84 is performed. It is shown that the first two techniques do not take into account the random component of the error, while the third technique does take into account the random component but not correctly. These factors all lead to a high probability of a wrong identification of a model of a thickness gauge that is, in reality, defective to be, instead, a working model or, on the other hand working devices may be incorrectly identified as being defective. To increase the reliability of the results of a verification of coating thickness gauges, recommendations that suggest incorporating them into the content of a verification technique regulated by GOST 8.502–84 are proposed.
引用
收藏
页码:762 / 768
页数:6
相关论文
共 50 条
  • [21] Efficiency of automata in semi-commutation verification techniques
    Cece, Gerard
    Heam, Pierre-Cyrille
    Mainier, Yann
    RAIRO-THEORETICAL INFORMATICS AND APPLICATIONS, 2008, 42 (02): : 197 - 215
  • [22] Validation of clinical techniques for verification of uniform attenuation earplugs
    Portnuff, Cory D. F.
    Price, Drew
    INTERNATIONAL JOURNAL OF AUDIOLOGY, 2019, 58 : S33 - S39
  • [23] Robust verification analysis
    Rider, William
    Witkowski, Walt
    Kamm, James R.
    Wildey, Tim
    JOURNAL OF COMPUTATIONAL PHYSICS, 2016, 307 : 146 - 163
  • [24] Comparison of Safety and Security Analysis Techniques
    Cioroaica, Emilia
    Kar, Smruti Ranjan
    Sorokos, Ioannis
    14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS AND 12TH INTERNATIONAL CONFERENCE ON EUROPEAN TRANSNATIONAL EDUCATIONAL (CISIS 2021 AND ICEUTE 2021), 2022, 1400 : 234 - 242
  • [25] Diary data enhancing rigour: analysis framework and verification tool
    Clayton, AM
    Thorne, T
    JOURNAL OF ADVANCED NURSING, 2000, 32 (06) : 1514 - 1521
  • [26] A Methodology for Analysis and Verification of Power Gated Circuits with Correlated Results
    Sarkar, Aveek
    Lin, Shen
    Wang, Kai
    ISLPED'07: PROCEEDINGS OF THE 2007 INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN, 2007, : 351 - 354
  • [27] Maintaining data consistency of XML Databases using verification techniques
    Islam, Khandoker Asadul
    Watanabe, Yoshimichi
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2006: SECURE SOFTWARE AND RELATED ISSUES, 2007, 4435 : 256 - +
  • [28] Specification and Verification Techniques of Object Oriented Programs using Invariants
    Zafar, Beenish
    Hassan, Zara
    Nasir, Mobashirah
    Naheed, Sidrah
    Abid, Beenish
    Fatima, Umbreen
    Awan, Rimsha
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (08): : 39 - 50
  • [29] Design Verification and Measurement Techniques for UHF RFID Tag IC
    Xu, Kai
    Mao, Luhong
    Wang, Zheng
    Chen, Liying
    Xie, Sheng
    Zhang, Shilin
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [30] Analysis and verification of SMIL documents
    Gaggi, Ombretta
    Bossi, Annalisa
    MULTIMEDIA SYSTEMS, 2011, 17 (06) : 487 - 506