SlideShare a Scribd company logo
1 of 7
Download to read offline
Journal of Physics: Conference Series
PAPER β€’ OPEN ACCESS
Mobile Application Detection of Road Damage using Canny Algorithm
To cite this article: G Gunawan et al 2018 J. Phys.: Conf. Ser. 1019 012035
View the article online for updates and enhancements.
This content was downloaded from IP address 36.68.108.25 on 27/06/2018 at 13:15
1
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution
of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
Published under licence by IOP Publishing Ltd
1234567890 β€˜β€™β€œβ€
1st International Conference on Green and Sustainable Computing (ICoGeS) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1019 (2018) 012035 doi:10.1088/1742-6596/1019/1/012035
Mobile Application Detection of Road Damage using Canny
Algorithm
G Gunawan1
, Heri Nuriyanto2
, S Sriadhi3
, Achmad Fauzi4
, Ari Usman5
, F
Fadlina6
, Haida Dafitri5
, Janner Simarmata7
, Andysah Putera Utama
Siahaan8,9
and Robbi Rahim8*
1
Department of Computer Engineering and Informatics, Politeknik Negeri Medan,
Indonesia
2
Department of Informatics, STMIK Dharma Wacana, Indonesia
3
Department of Electrical Engineering, Universitas Negeri Medan, Indonesia
4
Department of Computer Engineering, STMIK Kaputama, Indonesia
5
Department of Informatics, Universitas Harapan Medan, Indonesia
6
Department of Informatics Management, AMIK STIEKOM Sumatera Utara,
Indonesia
7
Universitas Negeri Medan, Indonesia
8
School of Computer and Communication Engineering, Universiti Malaysia Perlis,
Malaysia
9
Faculty of Computer Science, Universitas Pembangunan Panca Budi, Indonesia
*usurobbi85@zoho.com
Abstract. Edge detection is one of the most frequent processes in digital image processing for
various purposes, one of which is detecting road damage based on crack paths that can be
checked using a Canny algorithm. This paper proposed a mobile application to detect cracks in
the road and with customized threshold function in the requests to produce useful and accurate
edge detection. The experimental results show that the use of threshold function in a canny
algorithm can detect better damage in the road.
1. Introduction
One of the image processing techniques used is edge detection [1]. Edge detection is standard in
digital image processing because it is one of the first steps in segmenting the image, which aims to
present the objects contained in the picture [1] [2] [3] [4]. Edge detection serves to identify the
boundary of an object over an overlapping image. So that if the edge line in the picture could
accurately identify, all objects could found and the fundamental properties such as area, shape, and
size of the object can be measured [5] [6]. Image edge is the position where the pixel intensity of the
picture changes from low value to high value or vice versa [1] [5]. Currently, several algorithms could
use for edge detection, for example, Sobel [7], Canny [7], Prewitt [7], frei-chen [7] and Laplacian
algorithms [8]. In this research taken canny algorithm, Edge is a change of intensity value of gray
degree quickly or suddenly in a short distance [5] [8]. The purpose of detecting the edges themselves
is to group the objects in the image, and also be used to analyze the picture further [9] [10] [11] [12].
2
1234567890 β€˜β€™β€œβ€
1st International Conference on Green and Sustainable Computing (ICoGeS) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1019 (2018) 012035 doi:10.1088/1742-6596/1019/1/012035
In addition to the use of canny algorithm, this research also uses threshold function in application
which is a parameter to determine the level of image clarity of edge detection results done, the crack
examination on the road is very important to detect the condition of the road that is used because of
the effect on the safety of the street drivers, fracture on roads could be taken seriously by repairing the
road.
Chitra [4] applies the gradient calculation of magnitude and gradient of direction to improve edge
detection in the image, then Biswas [13] enhances edge detection by applying fuzzy sets to reduce
non-noise in the picture so that the accuracy level is higher, in principle improvisation edge detection
canny algorithm is possible done, only by using the threshold function applied to the mobile
application contained in the experimental results in this paper.
2. Methodology
The canny algorithm is an algorithm that performs the examination with the minimum error rate to
produce the optimum edge image, but the canny algorithm process is not sufficient to reduce the
picture that has many edges or strokes which is really an edge or not, for that canny algorithm in
Improvised by adding a threshold function so that edge detection errors on the image can be reduced
well by providing the minimum and maximum values at the time of edge detection processing.
Results of this research was conducted to detect cracks in the road which is the beginning of
damage to the road, to facilitate the process of detecting road cracks directly designed a mobile-based
applications to detect road damage with processors using canny algorithms and threshold functions,
with applications designed policy makers can take a direct solution to fix the road or just do
maintenance only.
The selection of canny algorithm as edge detection process because ease of implementation in the
language of various programming language especially Java besides also easy to be developed by
applying various function especially threshold function.
There are some of the most optimum edge detection criteria that can be met by canny algorithm [3]
[10] [11]:
1. Detect well, Ability to put and mark all existing edges under the selection of convolution
parameters performed. It also provides very high flexibility regarding determining the level of
edge thickness detection as desired.
2. Localize well with Canny; it is possible to produce a minimum distance between the edges
detected with the original edge.
3. The response is clear, there is only one response to each edge so easily detected and does not
cause confusion on subsequent image processing.
There is five step in performing canny edge detection [5] [7] [14]:
1. Eliminate the noise present in the picture by implementing the Gaussian filter. This process will
produce an image that looks a bit blurry, and this is intended to get the edge of the actual picture.
If not performed then fine lines will also be detected as an edge. Here is one example of a
Gaussian filter with Οƒ = 1.4.
24542
491294
51215125
491294
24542
159
1
2. Perform edge detection by searching horizontally (Gx) and vertically (Gy).
3. Determining the edge direction found using the following formula.
Gx
Gy
arctan=ΞΈ
3
1234567890 β€˜β€™β€œβ€
1st International Conference on Green and Sustainable Computing (ICoGeS) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1019 (2018) 012035 doi:10.1088/1742-6596/1019/1/012035
Next, divide into four colors so that the lines with different directions and have different colors.
The division is 0 - 22.5 and 157.5 - 180 degrees yellow, 22.5 - 67.5 are green, and degrees 67.5 -
157.5 are red
4. Minimizes the edge line that appears by applying non-maximum suppression to produce a slimmer
edge line.
5. The final step is binary by applying two thresholds, the following figure will show the image
shape before processing (a) and after processing (b). The image used is a grayscale image with
threshold value 0.05.
Thresholding is used to adjust the amount of gray degree present in the picture. By using
Thresholding the gray degree can be changed as desired, e.g. desired using the level of gray 16, then
live to divide the value of a gray degree with 16. The process of Thresholding is a process of changing
the quantization of the image, so to do Thresholding with the gray degree can be used the formula:
Where:
W is the gray degree value before Thresholding
B is the desired number of degrees of gray
X is the gray degree value after Thresholding
Figure 1. Before and After Edge Detection
The results of this research is a smartphone application that can be used to detect cracks in roads with
canny algorithms and threshold functions, apps designed using Android Studio and Android API 24
SDK
3. Result and Discussion
The Canny algorithm is one of the operators used for edge detection, and this operator is like a Sobel
operator. Convolution canny algorithm involving canny kernel and convolution is perform with pixel
value of the image that to be processed, figure 2 below will be test for edge detection.
4
1234567890 β€˜β€™β€œβ€
1st International Conference on Green and Sustainable Computing (ICoGeS) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1019 (2018) 012035 doi:10.1088/1742-6596/1019/1/012035
Figure 2. Crack damage in the road
For the process of detecting cracks in the road could be seen in the following pseudo code, the code is:
public void setLowThreshold(float threshold) {
if (threshold < 0) throw new IllegalArgumentException(); lowThreshold = threshold;
}
public float getHighThreshold() {return highThreshold;}
public void setHighThreshold(float threshold) {
if (threshold < 0) throw new IllegalArgumentException();
highThreshold = threshold; }
Arrays.fill(data, 0);
int offset = 0;
for (int y = 0; y < height; y++) {
for (int x = 0; x < width; x++) {
if (data[offset] == 0 && magnitude[offset] >= high) {
follow(x, y, offset, low);
}
offset++;
} }
private void follow(int x1, int y1, int i1, int threshold) {
int x0 = x1 == 0 - x1 : x1 - 1;
int x2 = x1 == width – 1 - x1 : x1 + 1;
int y0 = y1 == 0 - y1 : y1 - 1;
int y2 = y1 == height - 1 - y1 : y1 + 1;
data[i1] = magnitude[i1];
for (int x = x0; x <= x2; x++) {
for (int y = y0; y <= y2; y++) {
int i2 = x + y * width;
if ((y != y1 || x != x1)
&& data[i2] == 0
&& magnitude[i2] >= threshold) {
follow(x, y, i2, threshold);
return;} } }
}
5
1234567890 β€˜β€™β€œβ€
1st International Conference on Green and Sustainable Computing (ICoGeS) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1019 (2018) 012035 doi:10.1088/1742-6596/1019/1/012035
The above pseudo code are some critical processes for detecting crack paths with canny algorithms
and threshold functions. The result of edge detection process from the figure 2 by using the canny
algorithm could be seen in figure 3 below:
Figure 3. Edge Detection Result
Based on the process of the canny algorithm that has been described and implement in mobile based
edge detection application, the results can see in figure 4 below:
Figure 4. Edge Detection Result in Mobile Application
In Figure 4 there are some results of the edge detection process with the same object but have different
results when the threshold value is replaced, so it can be concluded that the edge detection results in
the image with the canny algorithm can affect when the threshold value on the picture is change, and
this process also affects the time of edge detection process.
The Result of detection road damage by using canny algorithm and threshold function produce fast
enough when using application because every object of image changed into grayscale image, and then
by determining the minimum and maximum threshold values can reduce the detection error against
objects that are not part of the road damage.
4. Conclusion
The Canny algorithm applied to a mobile application can be used to detect damage on the road very
well with accurate results, but also by adding threshold function to the image can know the cracks in
6
1234567890 β€˜β€™β€œβ€
1st International Conference on Green and Sustainable Computing (ICoGeS) 2017 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1019 (2018) 012035 doi:10.1088/1742-6596/1019/1/012035
the image more precisely because it will eliminate the smaller edge of pixel intensity of the edge pixel
image that had crack.
5. References
[1] D. Apdilah, M. Y. Simargolang and R. Rahim, "A Study of Frei-Chen Approach for Edge
Detection," International Journal of Scientific Research in Science, Engineering and Technology,
vol. 3, no. 1, pp. 59-62, 2017.
[2] R. Rahim, T. Afriliansyah, H. Winata, D. Nofriansyah, Ratnadewi, and S. Aryza, β€œResearch of
Face Recognition with Fisher Linear Discriminant,” IOP Conf. Ser. Mater. Sci. Eng., vol. 300, p.
012037, 2018.
[3] H. Banouni, B. Faiz, D. I. E. H. Ouacha, M. Boutaib and M. Derra, "The Canny Edge Detection
Method vs. the Radius of Curvature Method for Determining the Time of Flight on Ultrasound,"
International Journal of Signal System Control and Engineering Application, vol. 9, no. 3, pp. 48-
54, 2016.
[4] A. D. Chitra and P. Ponmuthuramalingam, "An Approach for Canny Edge Detection Algorithm for
Face Recognition," International Journal of Science and Research (IJSR), vol. 4, no. 11, pp. 24-
27, 2015.
[5] S. Vijayarani and M. Vinupriya, "Performance Analysis of Canny and Sobel Edge Detection
Algorithms in Image Mining," International Journal of Innovative Research in Computer and
Communication Engineering, vol. 1, no. 8, pp. 1760-1767, 2013.
[6] V. Saini and R. Garg, "A Comparative Analysis on Edge Detection Techniques Used in Image
Processing," IOSR Journal of Electronics and Communication Engineering (IOSRJECE), vol. 1,
no. 2, pp. 56-59, 2012.
[7] S. Bhardwaj and A. Mittal, "A Survey on Various Edge Detector Techniques," Procedia
Technology, vol. 4, pp. 220-226, 2012.
[8] R. Muthukrishnan and M. Radha, "EDGE DETECTION TECHNIQUES FOR IMAGE
SEGMENTATION," International Journal of Computer Science & Information Technology
(IJCSIT), vol. 3, no. 6, pp. 259-265, 2011.
[9] Y. Ramadevi, T. Sridevi, B. Poornima and B. Kalyani, "SEGMENTATION AND OBJECT
RECOGNITION USING EDGE DETECTION TECHNIQUES," International Journal of
Computer Science & Information Technology (IJCSIT), vol. 2, no. 6, pp. 153-161, 2010.
[10] A. Abbaszadeh and S. Daneshvar, "A Review Of Different Type," JOURNAL OF CURRENT
RESEARCH IN SCIENCE, vol. 1, pp. 871-875, 2016.
[11] N. Ahmadi and G. Akbarizadeh, "Iris Recognition System based on Canny and LoG Edge
Detection Methods," Journal of Soft Computing and Decision Support Systems, vol. 2, no. 4, pp.
26-30, 2015.
[12] D. Nofriansyah et al., β€œA New Image Encryption Technique Combining Hill Cipher Method,
Morse Code and Least Significant Bit Algorithm,” J. Phys. Conf. Ser., vol. 954, no. 1, p. 012003,
2018.
[13] R. Biswas and J. Sil, "An Improved Canny Edge Detection Algorithm Based on Type-2 Fuzzy
Sets," in 2nd International Conference on Computer, Communication, Control and Information
Technology, India, 2012.
[14] G. Yang and F. Xu, "Research and analysis of Image edge detection algorithm Based on the
MATLAB," Procedia Engineering, vol. 15, pp. 1313-1318, 2011.

More Related Content

What's hot

IRJET- Digit Identification in Natural Images
IRJET- Digit Identification in Natural ImagesIRJET- Digit Identification in Natural Images
IRJET- Digit Identification in Natural ImagesIRJET Journal
Β 
An Efficient Filtering Technique for Denoising Colour Images
An Efficient Filtering Technique for Denoising Colour Images An Efficient Filtering Technique for Denoising Colour Images
An Efficient Filtering Technique for Denoising Colour Images IJECEIAES
Β 
Multiexposure Image Fusion
Multiexposure Image FusionMultiexposure Image Fusion
Multiexposure Image FusionIJMER
Β 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologiesijsrd.com
Β 
Corner Detection Using Mutual Information
Corner Detection Using Mutual InformationCorner Detection Using Mutual Information
Corner Detection Using Mutual InformationCSCJournals
Β 
Evaluate Combined Sobel-Canny Edge Detector for Image Procssing
Evaluate Combined Sobel-Canny Edge Detector for Image ProcssingEvaluate Combined Sobel-Canny Edge Detector for Image Procssing
Evaluate Combined Sobel-Canny Edge Detector for Image Procssingidescitation
Β 
Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...ijcsa
Β 
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...IOSR Journals
Β 
Modified clahe an adaptive algorithm for contrast enhancement of aerial medi...
Modified clahe an adaptive algorithm for contrast enhancement of aerial  medi...Modified clahe an adaptive algorithm for contrast enhancement of aerial  medi...
Modified clahe an adaptive algorithm for contrast enhancement of aerial medi...IAEME Publication
Β 
Image Inpainting
Image InpaintingImage Inpainting
Image InpaintingIJERA Editor
Β 
Blind detection of image manipulation @ PoliMi
Blind detection of image manipulation @ PoliMiBlind detection of image manipulation @ PoliMi
Blind detection of image manipulation @ PoliMiGiorgio Sironi
Β 
Geometric wavelet transform for optical flow estimation algorithm
Geometric wavelet transform for optical flow estimation algorithmGeometric wavelet transform for optical flow estimation algorithm
Geometric wavelet transform for optical flow estimation algorithmijcga
Β 
Multiple Ant Colony Optimizations for Stereo Matching
Multiple Ant Colony Optimizations for Stereo MatchingMultiple Ant Colony Optimizations for Stereo Matching
Multiple Ant Colony Optimizations for Stereo MatchingCSCJournals
Β 
Fast Segmentation of Sub-cellular Organelles
Fast Segmentation of Sub-cellular OrganellesFast Segmentation of Sub-cellular Organelles
Fast Segmentation of Sub-cellular OrganellesCSCJournals
Β 
Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...
Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...
Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...IJCSIS Research Publications
Β 
Regenerating face images from multi-spectral palm images using multiple fusio...
Regenerating face images from multi-spectral palm images using multiple fusio...Regenerating face images from multi-spectral palm images using multiple fusio...
Regenerating face images from multi-spectral palm images using multiple fusio...TELKOMNIKA JOURNAL
Β 
IRJET- A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
IRJET-  	  A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...IRJET-  	  A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
IRJET- A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...IRJET Journal
Β 
An Edge Detection Method for Hexagonal Images
An Edge Detection Method for Hexagonal ImagesAn Edge Detection Method for Hexagonal Images
An Edge Detection Method for Hexagonal ImagesCSCJournals
Β 
Image inpainting
Image inpaintingImage inpainting
Image inpaintingPulkit Goyal
Β 
Color Constancy For Improving Skin Detection
Color Constancy For Improving Skin DetectionColor Constancy For Improving Skin Detection
Color Constancy For Improving Skin DetectionCSCJournals
Β 

What's hot (20)

IRJET- Digit Identification in Natural Images
IRJET- Digit Identification in Natural ImagesIRJET- Digit Identification in Natural Images
IRJET- Digit Identification in Natural Images
Β 
An Efficient Filtering Technique for Denoising Colour Images
An Efficient Filtering Technique for Denoising Colour Images An Efficient Filtering Technique for Denoising Colour Images
An Efficient Filtering Technique for Denoising Colour Images
Β 
Multiexposure Image Fusion
Multiexposure Image FusionMultiexposure Image Fusion
Multiexposure Image Fusion
Β 
Analysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery MethodologiesAnalysis and Detection of Image Forgery Methodologies
Analysis and Detection of Image Forgery Methodologies
Β 
Corner Detection Using Mutual Information
Corner Detection Using Mutual InformationCorner Detection Using Mutual Information
Corner Detection Using Mutual Information
Β 
Evaluate Combined Sobel-Canny Edge Detector for Image Procssing
Evaluate Combined Sobel-Canny Edge Detector for Image ProcssingEvaluate Combined Sobel-Canny Edge Detector for Image Procssing
Evaluate Combined Sobel-Canny Edge Detector for Image Procssing
Β 
Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...
Β 
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
Β 
Modified clahe an adaptive algorithm for contrast enhancement of aerial medi...
Modified clahe an adaptive algorithm for contrast enhancement of aerial  medi...Modified clahe an adaptive algorithm for contrast enhancement of aerial  medi...
Modified clahe an adaptive algorithm for contrast enhancement of aerial medi...
Β 
Image Inpainting
Image InpaintingImage Inpainting
Image Inpainting
Β 
Blind detection of image manipulation @ PoliMi
Blind detection of image manipulation @ PoliMiBlind detection of image manipulation @ PoliMi
Blind detection of image manipulation @ PoliMi
Β 
Geometric wavelet transform for optical flow estimation algorithm
Geometric wavelet transform for optical flow estimation algorithmGeometric wavelet transform for optical flow estimation algorithm
Geometric wavelet transform for optical flow estimation algorithm
Β 
Multiple Ant Colony Optimizations for Stereo Matching
Multiple Ant Colony Optimizations for Stereo MatchingMultiple Ant Colony Optimizations for Stereo Matching
Multiple Ant Colony Optimizations for Stereo Matching
Β 
Fast Segmentation of Sub-cellular Organelles
Fast Segmentation of Sub-cellular OrganellesFast Segmentation of Sub-cellular Organelles
Fast Segmentation of Sub-cellular Organelles
Β 
Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...
Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...
Image Stitching Algorithm: An Optimization between Correlation-Based and Feat...
Β 
Regenerating face images from multi-spectral palm images using multiple fusio...
Regenerating face images from multi-spectral palm images using multiple fusio...Regenerating face images from multi-spectral palm images using multiple fusio...
Regenerating face images from multi-spectral palm images using multiple fusio...
Β 
IRJET- A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
IRJET-  	  A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...IRJET-  	  A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
IRJET- A Comprehensive Analysis of Edge Detectors in SD-OCT Images for Gl...
Β 
An Edge Detection Method for Hexagonal Images
An Edge Detection Method for Hexagonal ImagesAn Edge Detection Method for Hexagonal Images
An Edge Detection Method for Hexagonal Images
Β 
Image inpainting
Image inpaintingImage inpainting
Image inpainting
Β 
Color Constancy For Improving Skin Detection
Color Constancy For Improving Skin DetectionColor Constancy For Improving Skin Detection
Color Constancy For Improving Skin Detection
Β 

Similar to Mobile Application Detection of Road Damage using Canny Algorithm

Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...ijcisjournal
Β 
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...ijcsit
Β 
IMPROVED EDGE DETECTION USING VARIABLE THRESHOLDING TECHNIQUE AND CONVOLUTION...
IMPROVED EDGE DETECTION USING VARIABLE THRESHOLDING TECHNIQUE AND CONVOLUTION...IMPROVED EDGE DETECTION USING VARIABLE THRESHOLDING TECHNIQUE AND CONVOLUTION...
IMPROVED EDGE DETECTION USING VARIABLE THRESHOLDING TECHNIQUE AND CONVOLUTION...sipij
Β 
Improved Edge Detection using Variable Thresholding Technique and Convolution...
Improved Edge Detection using Variable Thresholding Technique and Convolution...Improved Edge Detection using Variable Thresholding Technique and Convolution...
Improved Edge Detection using Variable Thresholding Technique and Convolution...sipij
Β 
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGA
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGAReal Time Implementation of Ede Detection Technique for Angiogram Images on FPGA
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGAIRJET Journal
Β 
LANE DETECTION USING IMAGE PROCESSING IN PYTHON
LANE DETECTION USING IMAGE PROCESSING IN PYTHONLANE DETECTION USING IMAGE PROCESSING IN PYTHON
LANE DETECTION USING IMAGE PROCESSING IN PYTHONIRJET Journal
Β 
An Efficient Algorithm for Edge Detection of Corroded Surface
An Efficient Algorithm for Edge Detection of Corroded SurfaceAn Efficient Algorithm for Edge Detection of Corroded Surface
An Efficient Algorithm for Edge Detection of Corroded SurfaceIJERA Editor
Β 
Identify Defects in Gears Using Digital Image Processing
Identify Defects in Gears Using Digital Image ProcessingIdentify Defects in Gears Using Digital Image Processing
Identify Defects in Gears Using Digital Image ProcessingIJERD Editor
Β 
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING sipij
Β 
Road crack detection using adaptive multi resolution thresholding techniques
Road crack detection using adaptive multi resolution thresholding techniquesRoad crack detection using adaptive multi resolution thresholding techniques
Road crack detection using adaptive multi resolution thresholding techniquesTELKOMNIKA JOURNAL
Β 
Edge detection by using lookup table
Edge detection by using lookup tableEdge detection by using lookup table
Edge detection by using lookup tableeSAT Journals
Β 
IRJET - Traffic Density Estimation by Counting Vehicles using Aggregate Chann...
IRJET - Traffic Density Estimation by Counting Vehicles using Aggregate Chann...IRJET - Traffic Density Estimation by Counting Vehicles using Aggregate Chann...
IRJET - Traffic Density Estimation by Counting Vehicles using Aggregate Chann...IRJET Journal
Β 
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKINGA PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKINGIRJET Journal
Β 
Hardware software co simulation of edge detection for image processing system...
Hardware software co simulation of edge detection for image processing system...Hardware software co simulation of edge detection for image processing system...
Hardware software co simulation of edge detection for image processing system...eSAT Publishing House
Β 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
Β 
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...ijcsa
Β 
AN OPTIMAL SOLUTION FOR IMAGE EDGE DETECTION PROBLEM USING SIMPLIFIED GABOR W...
AN OPTIMAL SOLUTION FOR IMAGE EDGE DETECTION PROBLEM USING SIMPLIFIED GABOR W...AN OPTIMAL SOLUTION FOR IMAGE EDGE DETECTION PROBLEM USING SIMPLIFIED GABOR W...
AN OPTIMAL SOLUTION FOR IMAGE EDGE DETECTION PROBLEM USING SIMPLIFIED GABOR W...IJCSEIT Journal
Β 
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...ijcsit
Β 

Similar to Mobile Application Detection of Road Damage using Canny Algorithm (20)

Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Β 
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
Β 
IMPROVED EDGE DETECTION USING VARIABLE THRESHOLDING TECHNIQUE AND CONVOLUTION...
IMPROVED EDGE DETECTION USING VARIABLE THRESHOLDING TECHNIQUE AND CONVOLUTION...IMPROVED EDGE DETECTION USING VARIABLE THRESHOLDING TECHNIQUE AND CONVOLUTION...
IMPROVED EDGE DETECTION USING VARIABLE THRESHOLDING TECHNIQUE AND CONVOLUTION...
Β 
Improved Edge Detection using Variable Thresholding Technique and Convolution...
Improved Edge Detection using Variable Thresholding Technique and Convolution...Improved Edge Detection using Variable Thresholding Technique and Convolution...
Improved Edge Detection using Variable Thresholding Technique and Convolution...
Β 
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGA
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGAReal Time Implementation of Ede Detection Technique for Angiogram Images on FPGA
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGA
Β 
LANE DETECTION USING IMAGE PROCESSING IN PYTHON
LANE DETECTION USING IMAGE PROCESSING IN PYTHONLANE DETECTION USING IMAGE PROCESSING IN PYTHON
LANE DETECTION USING IMAGE PROCESSING IN PYTHON
Β 
An Efficient Algorithm for Edge Detection of Corroded Surface
An Efficient Algorithm for Edge Detection of Corroded SurfaceAn Efficient Algorithm for Edge Detection of Corroded Surface
An Efficient Algorithm for Edge Detection of Corroded Surface
Β 
Identify Defects in Gears Using Digital Image Processing
Identify Defects in Gears Using Digital Image ProcessingIdentify Defects in Gears Using Digital Image Processing
Identify Defects in Gears Using Digital Image Processing
Β 
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
Β 
Road crack detection using adaptive multi resolution thresholding techniques
Road crack detection using adaptive multi resolution thresholding techniquesRoad crack detection using adaptive multi resolution thresholding techniques
Road crack detection using adaptive multi resolution thresholding techniques
Β 
Edge detection by using lookup table
Edge detection by using lookup tableEdge detection by using lookup table
Edge detection by using lookup table
Β 
13
1313
13
Β 
IRJET - Traffic Density Estimation by Counting Vehicles using Aggregate Chann...
IRJET - Traffic Density Estimation by Counting Vehicles using Aggregate Chann...IRJET - Traffic Density Estimation by Counting Vehicles using Aggregate Chann...
IRJET - Traffic Density Estimation by Counting Vehicles using Aggregate Chann...
Β 
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKINGA PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
A PROJECT REPORT ON REMOVAL OF UNNECESSARY OBJECTS FROM PHOTOS USING MASKING
Β 
Hardware software co simulation of edge detection for image processing system...
Hardware software co simulation of edge detection for image processing system...Hardware software co simulation of edge detection for image processing system...
Hardware software co simulation of edge detection for image processing system...
Β 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Β 
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
Β 
E017443136
E017443136E017443136
E017443136
Β 
AN OPTIMAL SOLUTION FOR IMAGE EDGE DETECTION PROBLEM USING SIMPLIFIED GABOR W...
AN OPTIMAL SOLUTION FOR IMAGE EDGE DETECTION PROBLEM USING SIMPLIFIED GABOR W...AN OPTIMAL SOLUTION FOR IMAGE EDGE DETECTION PROBLEM USING SIMPLIFIED GABOR W...
AN OPTIMAL SOLUTION FOR IMAGE EDGE DETECTION PROBLEM USING SIMPLIFIED GABOR W...
Β 
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...
AUTOMATED MANAGEMENT OF POTHOLE RELATED DISASTERS USING IMAGE PROCESSING AND ...
Β 

More from Universitas Pembangunan Panca Budi

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Universitas Pembangunan Panca Budi
Β 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa Universitas Pembangunan Panca Budi
Β 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Universitas Pembangunan Panca Budi
Β 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityUniversitas Pembangunan Panca Budi
Β 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphUniversitas Pembangunan Panca Budi
Β 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionUniversitas Pembangunan Panca Budi
Β 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmUniversitas Pembangunan Panca Budi
Β 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Universitas Pembangunan Panca Budi
Β 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishUniversitas Pembangunan Panca Budi
Β 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...Universitas Pembangunan Panca Budi
Β 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Universitas Pembangunan Panca Budi
Β 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
Β 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Universitas Pembangunan Panca Budi
Β 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningUniversitas Pembangunan Panca Budi
Β 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
Β 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodUniversitas Pembangunan Panca Budi
Β 
Examination of Document Similarity Using Rabin-Karp Algorithm
Examination of Document Similarity Using Rabin-Karp AlgorithmExamination of Document Similarity Using Rabin-Karp Algorithm
Examination of Document Similarity Using Rabin-Karp AlgorithmUniversitas Pembangunan Panca Budi
Β 

More from Universitas Pembangunan Panca Budi (20)

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Β 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
Β 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Β 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Β 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
Β 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Β 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Β 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Β 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Β 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
Β 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
Β 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Β 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Β 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Β 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Β 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
Β 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
Β 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
Β 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Β 
Examination of Document Similarity Using Rabin-Karp Algorithm
Examination of Document Similarity Using Rabin-Karp AlgorithmExamination of Document Similarity Using Rabin-Karp Algorithm
Examination of Document Similarity Using Rabin-Karp Algorithm
Β 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
Β 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
Β 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
Β 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
Β 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
Β 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
Β 
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈcall girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ9953056974 Low Rate Call Girls In Saket, Delhi NCR
Β 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
Β 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
Β 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
Β 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
Β 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
Β 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
Β 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
Β 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
Β 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
Β 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
Β 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
Β 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
Β 
Model Call Girl in Bikash Puri Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Bikash Puri  Delhi reach out to us at πŸ”9953056974πŸ”Model Call Girl in Bikash Puri  Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Bikash Puri Delhi reach out to us at πŸ”9953056974πŸ”
Β 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
Β 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
Β 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
Β 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
Β 
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈcall girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
Β 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
Β 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
Β 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
Β 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
Β 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
Β 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
Β 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
Β 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
Β 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
Β 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Β 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
Β 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
Β 

Mobile Application Detection of Road Damage using Canny Algorithm

  • 1. Journal of Physics: Conference Series PAPER β€’ OPEN ACCESS Mobile Application Detection of Road Damage using Canny Algorithm To cite this article: G Gunawan et al 2018 J. Phys.: Conf. Ser. 1019 012035 View the article online for updates and enhancements. This content was downloaded from IP address 36.68.108.25 on 27/06/2018 at 13:15
  • 2. 1 Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI. Published under licence by IOP Publishing Ltd 1234567890 β€˜β€™β€œβ€ 1st International Conference on Green and Sustainable Computing (ICoGeS) 2017 IOP Publishing IOP Conf. Series: Journal of Physics: Conf. Series 1019 (2018) 012035 doi:10.1088/1742-6596/1019/1/012035 Mobile Application Detection of Road Damage using Canny Algorithm G Gunawan1 , Heri Nuriyanto2 , S Sriadhi3 , Achmad Fauzi4 , Ari Usman5 , F Fadlina6 , Haida Dafitri5 , Janner Simarmata7 , Andysah Putera Utama Siahaan8,9 and Robbi Rahim8* 1 Department of Computer Engineering and Informatics, Politeknik Negeri Medan, Indonesia 2 Department of Informatics, STMIK Dharma Wacana, Indonesia 3 Department of Electrical Engineering, Universitas Negeri Medan, Indonesia 4 Department of Computer Engineering, STMIK Kaputama, Indonesia 5 Department of Informatics, Universitas Harapan Medan, Indonesia 6 Department of Informatics Management, AMIK STIEKOM Sumatera Utara, Indonesia 7 Universitas Negeri Medan, Indonesia 8 School of Computer and Communication Engineering, Universiti Malaysia Perlis, Malaysia 9 Faculty of Computer Science, Universitas Pembangunan Panca Budi, Indonesia *usurobbi85@zoho.com Abstract. Edge detection is one of the most frequent processes in digital image processing for various purposes, one of which is detecting road damage based on crack paths that can be checked using a Canny algorithm. This paper proposed a mobile application to detect cracks in the road and with customized threshold function in the requests to produce useful and accurate edge detection. The experimental results show that the use of threshold function in a canny algorithm can detect better damage in the road. 1. Introduction One of the image processing techniques used is edge detection [1]. Edge detection is standard in digital image processing because it is one of the first steps in segmenting the image, which aims to present the objects contained in the picture [1] [2] [3] [4]. Edge detection serves to identify the boundary of an object over an overlapping image. So that if the edge line in the picture could accurately identify, all objects could found and the fundamental properties such as area, shape, and size of the object can be measured [5] [6]. Image edge is the position where the pixel intensity of the picture changes from low value to high value or vice versa [1] [5]. Currently, several algorithms could use for edge detection, for example, Sobel [7], Canny [7], Prewitt [7], frei-chen [7] and Laplacian algorithms [8]. In this research taken canny algorithm, Edge is a change of intensity value of gray degree quickly or suddenly in a short distance [5] [8]. The purpose of detecting the edges themselves is to group the objects in the image, and also be used to analyze the picture further [9] [10] [11] [12].
  • 3. 2 1234567890 β€˜β€™β€œβ€ 1st International Conference on Green and Sustainable Computing (ICoGeS) 2017 IOP Publishing IOP Conf. Series: Journal of Physics: Conf. Series 1019 (2018) 012035 doi:10.1088/1742-6596/1019/1/012035 In addition to the use of canny algorithm, this research also uses threshold function in application which is a parameter to determine the level of image clarity of edge detection results done, the crack examination on the road is very important to detect the condition of the road that is used because of the effect on the safety of the street drivers, fracture on roads could be taken seriously by repairing the road. Chitra [4] applies the gradient calculation of magnitude and gradient of direction to improve edge detection in the image, then Biswas [13] enhances edge detection by applying fuzzy sets to reduce non-noise in the picture so that the accuracy level is higher, in principle improvisation edge detection canny algorithm is possible done, only by using the threshold function applied to the mobile application contained in the experimental results in this paper. 2. Methodology The canny algorithm is an algorithm that performs the examination with the minimum error rate to produce the optimum edge image, but the canny algorithm process is not sufficient to reduce the picture that has many edges or strokes which is really an edge or not, for that canny algorithm in Improvised by adding a threshold function so that edge detection errors on the image can be reduced well by providing the minimum and maximum values at the time of edge detection processing. Results of this research was conducted to detect cracks in the road which is the beginning of damage to the road, to facilitate the process of detecting road cracks directly designed a mobile-based applications to detect road damage with processors using canny algorithms and threshold functions, with applications designed policy makers can take a direct solution to fix the road or just do maintenance only. The selection of canny algorithm as edge detection process because ease of implementation in the language of various programming language especially Java besides also easy to be developed by applying various function especially threshold function. There are some of the most optimum edge detection criteria that can be met by canny algorithm [3] [10] [11]: 1. Detect well, Ability to put and mark all existing edges under the selection of convolution parameters performed. It also provides very high flexibility regarding determining the level of edge thickness detection as desired. 2. Localize well with Canny; it is possible to produce a minimum distance between the edges detected with the original edge. 3. The response is clear, there is only one response to each edge so easily detected and does not cause confusion on subsequent image processing. There is five step in performing canny edge detection [5] [7] [14]: 1. Eliminate the noise present in the picture by implementing the Gaussian filter. This process will produce an image that looks a bit blurry, and this is intended to get the edge of the actual picture. If not performed then fine lines will also be detected as an edge. Here is one example of a Gaussian filter with Οƒ = 1.4. 24542 491294 51215125 491294 24542 159 1 2. Perform edge detection by searching horizontally (Gx) and vertically (Gy). 3. Determining the edge direction found using the following formula. Gx Gy arctan=ΞΈ
  • 4. 3 1234567890 β€˜β€™β€œβ€ 1st International Conference on Green and Sustainable Computing (ICoGeS) 2017 IOP Publishing IOP Conf. Series: Journal of Physics: Conf. Series 1019 (2018) 012035 doi:10.1088/1742-6596/1019/1/012035 Next, divide into four colors so that the lines with different directions and have different colors. The division is 0 - 22.5 and 157.5 - 180 degrees yellow, 22.5 - 67.5 are green, and degrees 67.5 - 157.5 are red 4. Minimizes the edge line that appears by applying non-maximum suppression to produce a slimmer edge line. 5. The final step is binary by applying two thresholds, the following figure will show the image shape before processing (a) and after processing (b). The image used is a grayscale image with threshold value 0.05. Thresholding is used to adjust the amount of gray degree present in the picture. By using Thresholding the gray degree can be changed as desired, e.g. desired using the level of gray 16, then live to divide the value of a gray degree with 16. The process of Thresholding is a process of changing the quantization of the image, so to do Thresholding with the gray degree can be used the formula: Where: W is the gray degree value before Thresholding B is the desired number of degrees of gray X is the gray degree value after Thresholding Figure 1. Before and After Edge Detection The results of this research is a smartphone application that can be used to detect cracks in roads with canny algorithms and threshold functions, apps designed using Android Studio and Android API 24 SDK 3. Result and Discussion The Canny algorithm is one of the operators used for edge detection, and this operator is like a Sobel operator. Convolution canny algorithm involving canny kernel and convolution is perform with pixel value of the image that to be processed, figure 2 below will be test for edge detection.
  • 5. 4 1234567890 β€˜β€™β€œβ€ 1st International Conference on Green and Sustainable Computing (ICoGeS) 2017 IOP Publishing IOP Conf. Series: Journal of Physics: Conf. Series 1019 (2018) 012035 doi:10.1088/1742-6596/1019/1/012035 Figure 2. Crack damage in the road For the process of detecting cracks in the road could be seen in the following pseudo code, the code is: public void setLowThreshold(float threshold) { if (threshold < 0) throw new IllegalArgumentException(); lowThreshold = threshold; } public float getHighThreshold() {return highThreshold;} public void setHighThreshold(float threshold) { if (threshold < 0) throw new IllegalArgumentException(); highThreshold = threshold; } Arrays.fill(data, 0); int offset = 0; for (int y = 0; y < height; y++) { for (int x = 0; x < width; x++) { if (data[offset] == 0 && magnitude[offset] >= high) { follow(x, y, offset, low); } offset++; } } private void follow(int x1, int y1, int i1, int threshold) { int x0 = x1 == 0 - x1 : x1 - 1; int x2 = x1 == width – 1 - x1 : x1 + 1; int y0 = y1 == 0 - y1 : y1 - 1; int y2 = y1 == height - 1 - y1 : y1 + 1; data[i1] = magnitude[i1]; for (int x = x0; x <= x2; x++) { for (int y = y0; y <= y2; y++) { int i2 = x + y * width; if ((y != y1 || x != x1) && data[i2] == 0 && magnitude[i2] >= threshold) { follow(x, y, i2, threshold); return;} } } }
  • 6. 5 1234567890 β€˜β€™β€œβ€ 1st International Conference on Green and Sustainable Computing (ICoGeS) 2017 IOP Publishing IOP Conf. Series: Journal of Physics: Conf. Series 1019 (2018) 012035 doi:10.1088/1742-6596/1019/1/012035 The above pseudo code are some critical processes for detecting crack paths with canny algorithms and threshold functions. The result of edge detection process from the figure 2 by using the canny algorithm could be seen in figure 3 below: Figure 3. Edge Detection Result Based on the process of the canny algorithm that has been described and implement in mobile based edge detection application, the results can see in figure 4 below: Figure 4. Edge Detection Result in Mobile Application In Figure 4 there are some results of the edge detection process with the same object but have different results when the threshold value is replaced, so it can be concluded that the edge detection results in the image with the canny algorithm can affect when the threshold value on the picture is change, and this process also affects the time of edge detection process. The Result of detection road damage by using canny algorithm and threshold function produce fast enough when using application because every object of image changed into grayscale image, and then by determining the minimum and maximum threshold values can reduce the detection error against objects that are not part of the road damage. 4. Conclusion The Canny algorithm applied to a mobile application can be used to detect damage on the road very well with accurate results, but also by adding threshold function to the image can know the cracks in
  • 7. 6 1234567890 β€˜β€™β€œβ€ 1st International Conference on Green and Sustainable Computing (ICoGeS) 2017 IOP Publishing IOP Conf. Series: Journal of Physics: Conf. Series 1019 (2018) 012035 doi:10.1088/1742-6596/1019/1/012035 the image more precisely because it will eliminate the smaller edge of pixel intensity of the edge pixel image that had crack. 5. References [1] D. Apdilah, M. Y. Simargolang and R. Rahim, "A Study of Frei-Chen Approach for Edge Detection," International Journal of Scientific Research in Science, Engineering and Technology, vol. 3, no. 1, pp. 59-62, 2017. [2] R. Rahim, T. Afriliansyah, H. Winata, D. Nofriansyah, Ratnadewi, and S. Aryza, β€œResearch of Face Recognition with Fisher Linear Discriminant,” IOP Conf. Ser. Mater. Sci. Eng., vol. 300, p. 012037, 2018. [3] H. Banouni, B. Faiz, D. I. E. H. Ouacha, M. Boutaib and M. Derra, "The Canny Edge Detection Method vs. the Radius of Curvature Method for Determining the Time of Flight on Ultrasound," International Journal of Signal System Control and Engineering Application, vol. 9, no. 3, pp. 48- 54, 2016. [4] A. D. Chitra and P. Ponmuthuramalingam, "An Approach for Canny Edge Detection Algorithm for Face Recognition," International Journal of Science and Research (IJSR), vol. 4, no. 11, pp. 24- 27, 2015. [5] S. Vijayarani and M. Vinupriya, "Performance Analysis of Canny and Sobel Edge Detection Algorithms in Image Mining," International Journal of Innovative Research in Computer and Communication Engineering, vol. 1, no. 8, pp. 1760-1767, 2013. [6] V. Saini and R. Garg, "A Comparative Analysis on Edge Detection Techniques Used in Image Processing," IOSR Journal of Electronics and Communication Engineering (IOSRJECE), vol. 1, no. 2, pp. 56-59, 2012. [7] S. Bhardwaj and A. Mittal, "A Survey on Various Edge Detector Techniques," Procedia Technology, vol. 4, pp. 220-226, 2012. [8] R. Muthukrishnan and M. Radha, "EDGE DETECTION TECHNIQUES FOR IMAGE SEGMENTATION," International Journal of Computer Science & Information Technology (IJCSIT), vol. 3, no. 6, pp. 259-265, 2011. [9] Y. Ramadevi, T. Sridevi, B. Poornima and B. Kalyani, "SEGMENTATION AND OBJECT RECOGNITION USING EDGE DETECTION TECHNIQUES," International Journal of Computer Science & Information Technology (IJCSIT), vol. 2, no. 6, pp. 153-161, 2010. [10] A. Abbaszadeh and S. Daneshvar, "A Review Of Different Type," JOURNAL OF CURRENT RESEARCH IN SCIENCE, vol. 1, pp. 871-875, 2016. [11] N. Ahmadi and G. Akbarizadeh, "Iris Recognition System based on Canny and LoG Edge Detection Methods," Journal of Soft Computing and Decision Support Systems, vol. 2, no. 4, pp. 26-30, 2015. [12] D. Nofriansyah et al., β€œA New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm,” J. Phys. Conf. Ser., vol. 954, no. 1, p. 012003, 2018. [13] R. Biswas and J. Sil, "An Improved Canny Edge Detection Algorithm Based on Type-2 Fuzzy Sets," in 2nd International Conference on Computer, Communication, Control and Information Technology, India, 2012. [14] G. Yang and F. Xu, "Research and analysis of Image edge detection algorithm Based on the MATLAB," Procedia Engineering, vol. 15, pp. 1313-1318, 2011.