SlideShare a Scribd company logo
1 of 7
Download to read offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 6, Ver. III (Nov - Dec .2015), PP 44-50
www.iosrjournals.org
DOI: 10.9790/2834-10634450 www.iosrjournals.org 44 | Page
Performance of Efficient Closed-Form Solution to Comprehensive Frontier
Exposure
Y.Anusha,2
K.V.V.Kumar
M.Tech, Stude1
1
M.Tech, Student,2
Asst. Professor
1,2
Rise Krishna Sai Prakasam Group of Institutionsnt
Abstract:Boundary detection is essential for a variety of computer vision tasks such as segmentation and
recognition. We propose a unified formulation for boundary detection, with closed-form solution, which is
applicable to the localization of different types of boundaries, such as intensity edges and occlusion boundaries
from video and RGB-D cameras. Our algorithm simultaneously combines low- and mid-level image
representations, in a single eigenvalue problem, and we solve over an infinite set of putative boundary
orientations. Moreover, our method achieves state of the art results at a significantly lower computational cost
than current methods. We also propose a novel method for soft-segmentation that can be used in conjunction
with our boundary detection algorithm and improve its accuracy at a negligible extra computational cost.
Keywords:boubdary, edges, localization, segmentation
I. Introduction
The field of image processing is broad and contains many interesting applications. Some ofthe common
image processing areas are image restoration, compression, and segmentation.Many times, the size of the raw
data for the images can require gigabytes of data storage.Researchers have developed routines to compress an
image into a reversible form to savestorage space. In this area, there are methods for the compression via
wavelets,using general compression schemes that are applicable to any type of file, and methods whichallow
some loss of data.
The area of segmentation distinguishes objects from the background in an image. This is particular
useful for satellite imagery from an intelligence standpoint. It isalso useful for identification purpose by using
facial imagery in a database. Segmentation isused in robotics, where it is important to locate the correct objects
to move or manipulate.Another area of image processing is image restoration. In image restoration, a
distortedimage is restored to its’ original form. This distortion is typically caused by noise in transmission, lens
calibration, motion of the camera, or age of the original source of the image.We focus on image restoration in
this dissertation.
II. Methodology
Boundary detection is a fundamental computer vision problem that is essential for a variety of tasks,
such as contour and region segmentation, symmetry detection and object recognition and categorization. We
propose a generalized formulation for boundary detection, with closed-form solution, applicable to the
localization of different types of boundaries, such as object edges in natural images and occlusion boundaries
from video. Our generalized boundary detection method (Gb) simultaneously combines low-level and mid-level
image representations in a single eigenvalue problem and solves for the optimal continuous boundary
orientation and strength. The closed-form solution to boundary detection enables our algorithm to achieve state
of the art results at a significantly lower computational cost than current methods. We also propose two
complementary novel components that can seamlessly be combined with Gb: first, we introduce a soft-
segmentation procedure that provides region input layers to our boundary detection algorithm for a significant
improvement in accuracy, at negligible computational cost; second, we present an efficient method for contour
grouping and reasoning, which when applied as a final post-processing stage, further increases the boundary
detection performance.
Following are the areas of application of segmentation and recognition in images:
1. Digital library: For maintenance of images in large database.
2. Image modification: Useful under modification of information’s in images.
3. Cinematographic applications: For enhancing the image information in movievideo clips.
Our proposed step/ramp boundary model can be seen in different layers of real-world images. Left: A step
is often visible in the low-level color channels. Middle: In some cases, no step is visible in the color channels
yet the edge is clearly present in the output of a soft segmentation method. Right: In video, moving boundaries
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
DOI: 10.9790/2834-10634450 www.iosrjournals.org 45 | Page
are often seen in the optical flow layer. More generally, a strong perceptual boundary at a given location may be
visible in several layers, with consistent orientation across layers. Our multi-layer ramp model covers all these
cases.
The first category is connected component-based method, which can locate image quickly but have
difficulties when image is embedded in complex background or touches other graphical objects.
The second category is texture-based, which is hard to find accurate boundaries of image areas and
usually yields many false alarms in “image-like” background texture areas.
The third category is edge-based method. Generally, analyzing the projection profiles of edge intensity
maps can decompose regions and can efficiently predict the image from a given video image clip.
Image region usually have a special texture because they consist of identical character components.
These components contrast the background and have a periodic horizontal intensity variation due to the
horizontal alignment of many characters. As a result, text regions can be segmented using texture feature.
III. Edge Detection For Images
Edges are boundaries between different textures. Edge also can be defined as discontinuities in image
intensity from one pixel to another. The edges for an image are always the important characteristics that offer an
indication for a higher frequency. Detection of edges for an image may help for image segmentation, data
compression, and also help for well matching, such as image reconstruction and so on.
There are many methods to make edge detection. The most common method for edge detection is to
calculate the differentiation of an image. The first-order derivatives in an image are computed using the
gradient, and the second-order derivatives are obtained using the Laplacian. Another method for edge detection
uses Hilbert Transform. And we have proposed a new method called short response Hilbert transform (SRHLT)
that combines the differentiation method and the Hilbert transform method.
However, SRHLT improved the differentiation method and HLT, it still cannot fulfil our request. We
can view SRHLT as the medium between the differentiation operation and the Hilbert transform (HLT) for edge
detection. Now, we will introduce improved harris’ algorithm and new corner detection algorithm. A more
accurate algorithm for corner and edge detections that is the improved form of the well-known Harris’ algorithm
is introduced. First, instead of approximating |L [m+x, n+y]–L [m, n]|2 just in terms of x2, xy, and y2, we will
approximate |L[m+x, n+y]–L[m, n]|(L[m+x, n+y]–L[m, n]) by the linear combination of x2, xy, y2, x, y, and 1.
There are 6 basis different from 3 basis. We can observe the sign of variation with this modification. It can
avoid misjudging the pixel at the wrong location and is also helpful for increasing the robustness to noise.
Moreover, we also use orthogonal polynomial expansion and table looking up and define the cornet as the
“integration” of the quadratic function to further improve the performance. From simulations, our algorithm is
effective both for corner detection and edge detection.
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
DOI: 10.9790/2834-10634450 www.iosrjournals.org 46 | Page
Fist-Order Derivative Edge Detection
(1)
An important quantity in edge detection is the magnitude of this vector, denoted ∇f, Where
(2)
Another important quantity is the direction of the gradient vector. That is,
1
angle of tan y
x
G
G
  
   
 
f (3)
Computation of the gradient of an image is based on obtaining the partial derivatives of ∂f/∂x and ∂f/∂y at every
pixel location.
Represent the gray levels in a neighbourhood of an image. One of the simplest ways to implement a first-order
partial derivative at point z5 is to use the following Roberts
Cross-gradient operators:
(4)
and
(5)
These derivatives can be implemented for an entire image by using the masks with the procedure of
convolution.
Another approach using masks of size 3×3 which is given by
(6)
and
(7)
A slight variation of these two equations uses a weight of 2 in the centre coefficient:
(8)
3 6 9 1 4 7( ) ( )yG z z z z z z      (9)
A weight value of 2 is used to achieve some smoothing by giving more importance to the centre point
Sobel operators, are used to implement these two equations.
Fig. 1.1: A 3×3 Area of an Image.
Fig. 1.2: The Roberts Operators.
z1 z2 z3
z4 z5 z6
z7 z8 z9
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
DOI: 10.9790/2834-10634450 www.iosrjournals.org 47 | Page
Fig. 1.3: The Prewitt Operators.
IV. Outputs
We presentthe output of Gb using only the first 3 dimensions ofour soft-segmentations as input layers
(no color information was used). We came to the following conclusions:
1) while soft-segmentations do not separate the image intodisjoint regions (as hard-segmentation does),
their boundaries are correlated especially with occlusionsand wholeobject boundaries (as also
confirmed by our results onCMU Motion Dataset [46]);
2) soft-segmentations cannotcapture the fine details of objects or texture, but, in combination with raw
color layers, they can significantly improveGb’s performance on detecting general boundaries in
staticnatural images.
Fig. 1.4:Input Image
Fig. 1.5:GB Luminanace Image
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
DOI: 10.9790/2834-10634450 www.iosrjournals.org 48 | Page
Fig. 1.6:GB Image Color Canny
Fig. 1.7:Input Image
Fig. 1.8:Soft Segmented Gradient
Fig. 1.9:Shadoe Shading Inverse Image
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
DOI: 10.9790/2834-10634450 www.iosrjournals.org 49 | Page
Fig. 1.10:Specular Segmented Image
Fig. 1.11:Complete Specular Shadow Image
Fig. 1.12:Genaralized Boundary Presentation of Image
V. Conclusion
We have presented Gb, a novel model and algorithm forgeneralized boundary detection. Gb effectively
combinesmultiple low- and mid-level interpretation layers of animage in a principled manner, and resolves their
constraintsjointly, in closed-form, in order to compute the exact boundary strength and orientation.
Consequently, Gb achievesstate of the art results on published datasets at a significantly lower computational
cost than current methods.For mid-level inference, we present two efficient methodsfor soft-segmentation, and
contour grouping and reasoning, which significantly improve the boundary detectionperformance at negligible
computational cost. Gb’s broadreal-world applicability is demonstrated through quantitative and qualitative
results on the detection of boundariesin natural images and the identification of occlusion boundaries in video.
References
[1] C. Fowlkes, D. Martin, and J. Malik, “Learning Affinity Functionsfor Image Segmentation: Combining Patch-Based and Gradient-
Based Approaches,” Proc. IEEE CS Conf. ComputerPattern Recognition, vol. 2, pp. 54-61, June 2003.
[2] M.P. Kumar, P. Torr, and A. Zisserman, “Objcut: EfficientSegmentation Using Top-Down and Bottom-Up Cues,” IEEETrans.
Pattern Analysis and Machine Intelligence, vol. 32, no. 3,pp. 530-545, Mar. 2010.
[3] S.E. Palmer, Vision Science:Photons to Phenomenology. The MITPress, 1999.
[4] S. Osher and J.A. Sethian, “Fronts Propagation with CurvatureDependent Speed: Algorithms Based on Hamilton-Jacobi For-
mulations,” J. Computational Physics, vol. 79, pp. 12-49, 1988.
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
DOI: 10.9790/2834-10634450 www.iosrjournals.org 50 | Page
[5] S. Rao, H. Mobahi, A. Yang, S. Sastry, and Y. Ma, “Natural ImageSegmentation with Adaptive Texture and Boundary
Encoding,”Proc. Asian Conf. Computer Vision, 2009.
[6] Y. Li, J. Sun, C.-K. Tang, and H.-Y. Shum, “Lazy Snapping,” ACMTrans. Graphics, vol. 23, pp. 303-308, 2004.
[7] M.D. Heath, S. Sarkar, T. Sanocki, and K.W. Bowyer, aA RobustVisual Method for Assessing the Relative Performance of Edge-
Detection Algorithms,o IEEE Trans. Pattern Analysis MachineIntelligence, vol. 19, pp. 1338-1359, 1997.
[8] J.G. Proakis, Digital Communications, third ed., McGraw-Hill, 1995.

More Related Content

What's hot

Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentCSCJournals
 
Image segmentation ajal
Image segmentation ajalImage segmentation ajal
Image segmentation ajalAJAL A J
 
IMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGES
IMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGESIMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGES
IMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGEScseij
 
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...Pinaki Ranjan Sarkar
 
Image segmentation
Image segmentationImage segmentation
Image segmentationRania H
 
Comparative Study and Analysis of Image Inpainting Techniques
Comparative Study and Analysis of Image Inpainting TechniquesComparative Study and Analysis of Image Inpainting Techniques
Comparative Study and Analysis of Image Inpainting TechniquesIOSR Journals
 
A New Approach for Segmentation of Fused Images using Cluster based Thresholding
A New Approach for Segmentation of Fused Images using Cluster based ThresholdingA New Approach for Segmentation of Fused Images using Cluster based Thresholding
A New Approach for Segmentation of Fused Images using Cluster based ThresholdingIDES Editor
 
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUEScscpconf
 
Improving Performance of Texture Based Face Recognition Systems by Segmenting...
Improving Performance of Texture Based Face Recognition Systems by Segmenting...Improving Performance of Texture Based Face Recognition Systems by Segmenting...
Improving Performance of Texture Based Face Recognition Systems by Segmenting...IDES Editor
 
ROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTION
ROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTIONROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTION
ROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTIONsipij
 
Remote sensing image fusion using contourlet transform with sharp frequency l...
Remote sensing image fusion using contourlet transform with sharp frequency l...Remote sensing image fusion using contourlet transform with sharp frequency l...
Remote sensing image fusion using contourlet transform with sharp frequency l...Zac Darcy
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Object based image enhancement
Object based image enhancementObject based image enhancement
Object based image enhancementijait
 
Study of Image Inpainting Technique Based on TV Model
Study of Image Inpainting Technique Based on TV ModelStudy of Image Inpainting Technique Based on TV Model
Study of Image Inpainting Technique Based on TV Modelijsrd.com
 

What's hot (19)

Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
 
Image segmentation ajal
Image segmentation ajalImage segmentation ajal
Image segmentation ajal
 
IMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGES
IMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGESIMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGES
IMAGE SEGMENTATION BY USING THRESHOLDING TECHNIQUES FOR MEDICAL IMAGES
 
I0154957
I0154957I0154957
I0154957
 
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...
Comparison of Segmentation Algorithms and Estimation of Optimal Segmentation ...
 
B42020710
B42020710B42020710
B42020710
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Comparative Study and Analysis of Image Inpainting Techniques
Comparative Study and Analysis of Image Inpainting TechniquesComparative Study and Analysis of Image Inpainting Techniques
Comparative Study and Analysis of Image Inpainting Techniques
 
A New Approach for Segmentation of Fused Images using Cluster based Thresholding
A New Approach for Segmentation of Fused Images using Cluster based ThresholdingA New Approach for Segmentation of Fused Images using Cluster based Thresholding
A New Approach for Segmentation of Fused Images using Cluster based Thresholding
 
Ijetr011917
Ijetr011917Ijetr011917
Ijetr011917
 
F43053237
F43053237F43053237
F43053237
 
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
 
H017416670
H017416670H017416670
H017416670
 
Improving Performance of Texture Based Face Recognition Systems by Segmenting...
Improving Performance of Texture Based Face Recognition Systems by Segmenting...Improving Performance of Texture Based Face Recognition Systems by Segmenting...
Improving Performance of Texture Based Face Recognition Systems by Segmenting...
 
ROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTION
ROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTIONROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTION
ROLE OF HYBRID LEVEL SET IN FETAL CONTOUR EXTRACTION
 
Remote sensing image fusion using contourlet transform with sharp frequency l...
Remote sensing image fusion using contourlet transform with sharp frequency l...Remote sensing image fusion using contourlet transform with sharp frequency l...
Remote sensing image fusion using contourlet transform with sharp frequency l...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Object based image enhancement
Object based image enhancementObject based image enhancement
Object based image enhancement
 
Study of Image Inpainting Technique Based on TV Model
Study of Image Inpainting Technique Based on TV ModelStudy of Image Inpainting Technique Based on TV Model
Study of Image Inpainting Technique Based on TV Model
 

Similar to Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure

Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0Kapil Tiwari
 
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...ijcisjournal
 
An efficient image segmentation approach through enhanced watershed algorithm
An efficient image segmentation approach through enhanced watershed algorithmAn efficient image segmentation approach through enhanced watershed algorithm
An efficient image segmentation approach through enhanced watershed algorithmAlexander Decker
 
Image Segmentation Using Pairwise Correlation Clustering
Image Segmentation Using Pairwise Correlation ClusteringImage Segmentation Using Pairwise Correlation Clustering
Image Segmentation Using Pairwise Correlation ClusteringIJERA Editor
 
Importance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing SegmentationImportance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing SegmentationIOSR Journals
 
Edge detection by using lookup table
Edge detection by using lookup tableEdge detection by using lookup table
Edge detection by using lookup tableeSAT Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Denoising and Edge Detection Using Sobelmethod
Denoising and Edge Detection Using SobelmethodDenoising and Edge Detection Using Sobelmethod
Denoising and Edge Detection Using SobelmethodIJMER
 
Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Editor IJARCET
 
Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Editor IJARCET
 
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...IJECEIAES
 
A Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisA Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisIOSR Journals
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...eSAT Journals
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...eSAT Publishing House
 
Image Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesImage Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesIIRindia
 
Rigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy SystemRigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy Systeminventy
 

Similar to Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure (20)

Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
 
Vol2no2 17
Vol2no2 17Vol2no2 17
Vol2no2 17
 
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
 
Ed34785790
Ed34785790Ed34785790
Ed34785790
 
An efficient image segmentation approach through enhanced watershed algorithm
An efficient image segmentation approach through enhanced watershed algorithmAn efficient image segmentation approach through enhanced watershed algorithm
An efficient image segmentation approach through enhanced watershed algorithm
 
Image Segmentation Using Pairwise Correlation Clustering
Image Segmentation Using Pairwise Correlation ClusteringImage Segmentation Using Pairwise Correlation Clustering
Image Segmentation Using Pairwise Correlation Clustering
 
Importance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing SegmentationImportance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing Segmentation
 
Edge detection by using lookup table
Edge detection by using lookup tableEdge detection by using lookup table
Edge detection by using lookup table
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Denoising and Edge Detection Using Sobelmethod
Denoising and Edge Detection Using SobelmethodDenoising and Edge Detection Using Sobelmethod
Denoising and Edge Detection Using Sobelmethod
 
Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251
 
Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251
 
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
 
A Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisA Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and Analysis
 
Image segmentation using wvlt trnsfrmtn and fuzzy logic. ppt
Image segmentation using wvlt trnsfrmtn and fuzzy logic. pptImage segmentation using wvlt trnsfrmtn and fuzzy logic. ppt
Image segmentation using wvlt trnsfrmtn and fuzzy logic. ppt
 
U4408108113
U4408108113U4408108113
U4408108113
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
 
Image Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesImage Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI Images
 
Rigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy SystemRigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy System
 

More from iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 

More from iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Recently uploaded

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 6, Ver. III (Nov - Dec .2015), PP 44-50 www.iosrjournals.org DOI: 10.9790/2834-10634450 www.iosrjournals.org 44 | Page Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure Y.Anusha,2 K.V.V.Kumar M.Tech, Stude1 1 M.Tech, Student,2 Asst. Professor 1,2 Rise Krishna Sai Prakasam Group of Institutionsnt Abstract:Boundary detection is essential for a variety of computer vision tasks such as segmentation and recognition. We propose a unified formulation for boundary detection, with closed-form solution, which is applicable to the localization of different types of boundaries, such as intensity edges and occlusion boundaries from video and RGB-D cameras. Our algorithm simultaneously combines low- and mid-level image representations, in a single eigenvalue problem, and we solve over an infinite set of putative boundary orientations. Moreover, our method achieves state of the art results at a significantly lower computational cost than current methods. We also propose a novel method for soft-segmentation that can be used in conjunction with our boundary detection algorithm and improve its accuracy at a negligible extra computational cost. Keywords:boubdary, edges, localization, segmentation I. Introduction The field of image processing is broad and contains many interesting applications. Some ofthe common image processing areas are image restoration, compression, and segmentation.Many times, the size of the raw data for the images can require gigabytes of data storage.Researchers have developed routines to compress an image into a reversible form to savestorage space. In this area, there are methods for the compression via wavelets,using general compression schemes that are applicable to any type of file, and methods whichallow some loss of data. The area of segmentation distinguishes objects from the background in an image. This is particular useful for satellite imagery from an intelligence standpoint. It isalso useful for identification purpose by using facial imagery in a database. Segmentation isused in robotics, where it is important to locate the correct objects to move or manipulate.Another area of image processing is image restoration. In image restoration, a distortedimage is restored to its’ original form. This distortion is typically caused by noise in transmission, lens calibration, motion of the camera, or age of the original source of the image.We focus on image restoration in this dissertation. II. Methodology Boundary detection is a fundamental computer vision problem that is essential for a variety of tasks, such as contour and region segmentation, symmetry detection and object recognition and categorization. We propose a generalized formulation for boundary detection, with closed-form solution, applicable to the localization of different types of boundaries, such as object edges in natural images and occlusion boundaries from video. Our generalized boundary detection method (Gb) simultaneously combines low-level and mid-level image representations in a single eigenvalue problem and solves for the optimal continuous boundary orientation and strength. The closed-form solution to boundary detection enables our algorithm to achieve state of the art results at a significantly lower computational cost than current methods. We also propose two complementary novel components that can seamlessly be combined with Gb: first, we introduce a soft- segmentation procedure that provides region input layers to our boundary detection algorithm for a significant improvement in accuracy, at negligible computational cost; second, we present an efficient method for contour grouping and reasoning, which when applied as a final post-processing stage, further increases the boundary detection performance. Following are the areas of application of segmentation and recognition in images: 1. Digital library: For maintenance of images in large database. 2. Image modification: Useful under modification of information’s in images. 3. Cinematographic applications: For enhancing the image information in movievideo clips. Our proposed step/ramp boundary model can be seen in different layers of real-world images. Left: A step is often visible in the low-level color channels. Middle: In some cases, no step is visible in the color channels yet the edge is clearly present in the output of a soft segmentation method. Right: In video, moving boundaries
  • 2. Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure DOI: 10.9790/2834-10634450 www.iosrjournals.org 45 | Page are often seen in the optical flow layer. More generally, a strong perceptual boundary at a given location may be visible in several layers, with consistent orientation across layers. Our multi-layer ramp model covers all these cases. The first category is connected component-based method, which can locate image quickly but have difficulties when image is embedded in complex background or touches other graphical objects. The second category is texture-based, which is hard to find accurate boundaries of image areas and usually yields many false alarms in “image-like” background texture areas. The third category is edge-based method. Generally, analyzing the projection profiles of edge intensity maps can decompose regions and can efficiently predict the image from a given video image clip. Image region usually have a special texture because they consist of identical character components. These components contrast the background and have a periodic horizontal intensity variation due to the horizontal alignment of many characters. As a result, text regions can be segmented using texture feature. III. Edge Detection For Images Edges are boundaries between different textures. Edge also can be defined as discontinuities in image intensity from one pixel to another. The edges for an image are always the important characteristics that offer an indication for a higher frequency. Detection of edges for an image may help for image segmentation, data compression, and also help for well matching, such as image reconstruction and so on. There are many methods to make edge detection. The most common method for edge detection is to calculate the differentiation of an image. The first-order derivatives in an image are computed using the gradient, and the second-order derivatives are obtained using the Laplacian. Another method for edge detection uses Hilbert Transform. And we have proposed a new method called short response Hilbert transform (SRHLT) that combines the differentiation method and the Hilbert transform method. However, SRHLT improved the differentiation method and HLT, it still cannot fulfil our request. We can view SRHLT as the medium between the differentiation operation and the Hilbert transform (HLT) for edge detection. Now, we will introduce improved harris’ algorithm and new corner detection algorithm. A more accurate algorithm for corner and edge detections that is the improved form of the well-known Harris’ algorithm is introduced. First, instead of approximating |L [m+x, n+y]–L [m, n]|2 just in terms of x2, xy, and y2, we will approximate |L[m+x, n+y]–L[m, n]|(L[m+x, n+y]–L[m, n]) by the linear combination of x2, xy, y2, x, y, and 1. There are 6 basis different from 3 basis. We can observe the sign of variation with this modification. It can avoid misjudging the pixel at the wrong location and is also helpful for increasing the robustness to noise. Moreover, we also use orthogonal polynomial expansion and table looking up and define the cornet as the “integration” of the quadratic function to further improve the performance. From simulations, our algorithm is effective both for corner detection and edge detection.
  • 3. Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure DOI: 10.9790/2834-10634450 www.iosrjournals.org 46 | Page Fist-Order Derivative Edge Detection (1) An important quantity in edge detection is the magnitude of this vector, denoted ∇f, Where (2) Another important quantity is the direction of the gradient vector. That is, 1 angle of tan y x G G          f (3) Computation of the gradient of an image is based on obtaining the partial derivatives of ∂f/∂x and ∂f/∂y at every pixel location. Represent the gray levels in a neighbourhood of an image. One of the simplest ways to implement a first-order partial derivative at point z5 is to use the following Roberts Cross-gradient operators: (4) and (5) These derivatives can be implemented for an entire image by using the masks with the procedure of convolution. Another approach using masks of size 3×3 which is given by (6) and (7) A slight variation of these two equations uses a weight of 2 in the centre coefficient: (8) 3 6 9 1 4 7( ) ( )yG z z z z z z      (9) A weight value of 2 is used to achieve some smoothing by giving more importance to the centre point Sobel operators, are used to implement these two equations. Fig. 1.1: A 3×3 Area of an Image. Fig. 1.2: The Roberts Operators. z1 z2 z3 z4 z5 z6 z7 z8 z9
  • 4. Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure DOI: 10.9790/2834-10634450 www.iosrjournals.org 47 | Page Fig. 1.3: The Prewitt Operators. IV. Outputs We presentthe output of Gb using only the first 3 dimensions ofour soft-segmentations as input layers (no color information was used). We came to the following conclusions: 1) while soft-segmentations do not separate the image intodisjoint regions (as hard-segmentation does), their boundaries are correlated especially with occlusionsand wholeobject boundaries (as also confirmed by our results onCMU Motion Dataset [46]); 2) soft-segmentations cannotcapture the fine details of objects or texture, but, in combination with raw color layers, they can significantly improveGb’s performance on detecting general boundaries in staticnatural images. Fig. 1.4:Input Image Fig. 1.5:GB Luminanace Image
  • 5. Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure DOI: 10.9790/2834-10634450 www.iosrjournals.org 48 | Page Fig. 1.6:GB Image Color Canny Fig. 1.7:Input Image Fig. 1.8:Soft Segmented Gradient Fig. 1.9:Shadoe Shading Inverse Image
  • 6. Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure DOI: 10.9790/2834-10634450 www.iosrjournals.org 49 | Page Fig. 1.10:Specular Segmented Image Fig. 1.11:Complete Specular Shadow Image Fig. 1.12:Genaralized Boundary Presentation of Image V. Conclusion We have presented Gb, a novel model and algorithm forgeneralized boundary detection. Gb effectively combinesmultiple low- and mid-level interpretation layers of animage in a principled manner, and resolves their constraintsjointly, in closed-form, in order to compute the exact boundary strength and orientation. Consequently, Gb achievesstate of the art results on published datasets at a significantly lower computational cost than current methods.For mid-level inference, we present two efficient methodsfor soft-segmentation, and contour grouping and reasoning, which significantly improve the boundary detectionperformance at negligible computational cost. Gb’s broadreal-world applicability is demonstrated through quantitative and qualitative results on the detection of boundariesin natural images and the identification of occlusion boundaries in video. References [1] C. Fowlkes, D. Martin, and J. Malik, “Learning Affinity Functionsfor Image Segmentation: Combining Patch-Based and Gradient- Based Approaches,” Proc. IEEE CS Conf. ComputerPattern Recognition, vol. 2, pp. 54-61, June 2003. [2] M.P. Kumar, P. Torr, and A. Zisserman, “Objcut: EfficientSegmentation Using Top-Down and Bottom-Up Cues,” IEEETrans. Pattern Analysis and Machine Intelligence, vol. 32, no. 3,pp. 530-545, Mar. 2010. [3] S.E. Palmer, Vision Science:Photons to Phenomenology. The MITPress, 1999. [4] S. Osher and J.A. Sethian, “Fronts Propagation with CurvatureDependent Speed: Algorithms Based on Hamilton-Jacobi For- mulations,” J. Computational Physics, vol. 79, pp. 12-49, 1988.
  • 7. Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure DOI: 10.9790/2834-10634450 www.iosrjournals.org 50 | Page [5] S. Rao, H. Mobahi, A. Yang, S. Sastry, and Y. Ma, “Natural ImageSegmentation with Adaptive Texture and Boundary Encoding,”Proc. Asian Conf. Computer Vision, 2009. [6] Y. Li, J. Sun, C.-K. Tang, and H.-Y. Shum, “Lazy Snapping,” ACMTrans. Graphics, vol. 23, pp. 303-308, 2004. [7] M.D. Heath, S. Sarkar, T. Sanocki, and K.W. Bowyer, aA RobustVisual Method for Assessing the Relative Performance of Edge- Detection Algorithms,o IEEE Trans. Pattern Analysis MachineIntelligence, vol. 19, pp. 1338-1359, 1997. [8] J.G. Proakis, Digital Communications, third ed., McGraw-Hill, 1995.