Abstract: Extraction of the image of human body in unconstrained still images is challenging due to several factors, including shading, image noise, occlusions, background clutter, the high degree of human body deformability, and the unrestricted positions due to in and out of the image plane rotations. we propose a bottom-up approach for human body segmentation in static images. We decompose the problem into three sequential problems: Face detection, upper body extraction, and lower body extraction, since there is a direct pair wise correlation among them. Index Terms: Skin segmentation, Torso, Face recognition, Thresholding, Ethnicity, Morphology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICESijcsit
Different methods have been experimented for processing and detecting forgery in digital images. Image forgery involves various activities like copy-move forgery, image slicing, retouching, morphing etc. In copy-move forgery a portion within the image is copied and pasted on another part of the same image,generally to conceal or enhance certain portions of the image. This paper proposes a copy-move forgery detection using local fractal dimension and structural similarity indices. The image is classified into different texture regions based on the local fractal dimension. Forgery checking is thus confined to be among the portions within a region. Structural similarity index measure is applied to each block pair in each region to localize the forged portion. Experimental results prove that this hybrid method can effectively detect such kind of image tampering with minimum false positives.
Survey on Brain MRI Segmentation TechniquesEditor IJMTER
Image segmentation is aimed at cutting out, a ROI (Region of Interest) from an image. For
medical images, segmentation is done for: studying the anatomical structure, identifying ROI ie tumor
or any other abnormalities, identifying the increase in tissue volume in a region, treatment planning.
Currently there are many different algorithms available for image segmentation. This paper lists and
compares some of them. Each has their own advantages and limitations.
Multitude Regional Texture Extraction for Efficient Medical Image Segmentationinventionjournals
Image processing plays a major role in evaluation of images in many concerns. Manual interpretation of the image is time consuming process and it is susceptible to human errors. Computer assisted approaches for analyzing the images have increased in latest evolution of image processing. Also it has highlighted its performance more in the field of medical sciences. Many techniques are available for the involvement in processing of images, evaluation, extraction etc. The main goal of image segmentation is cluster pixeling the regions corresponding to individual surfaces, objects, or natural parts of objects and to simplify and/or change the representation of an image into something that is more meaningful and easier to analyze. The proposed method is to conquer segmentation and texture extraction with Regional and Multitude and techniques involved in it. Ultrasound (US) is increasingly considered as a viable alternative imaging modality in computer-assisted brain segmentation and disease diagnosis applications.First for ultra sound we present region based segmentation.Homogeneous regions depends on image granularity features. Second a local threshold based multitude texture regional seed segmentation for medical image segmentation is proposed. Here extraction is done with dimensions comparable to the speckle size are to be extracted. The algorithm provides a less medical metrics awareness in a minimum user interaction environment. The shape and size of the growing regions depend on look up table entries.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Segmentation of Brain MR Images for Tumor Extraction by Combining Kmeans Clus...CSCJournals
Segmentation of images holds an important position in the area of image processing. It becomes more important while typically dealing with medical images where pre-surgery and post surgery decisions are required for the purpose of initiating and speeding up the recovery process [5] Computer aided detection of abnormal growth of tissues is primarily motivated by the necessity of achieving maximum possible accuracy. Manual segmentation of these abnormal tissues cannot be compared with modern day’s high speed computing machines which enable us to visually observe the volume and location of unwanted tissues. A well known segmentation problem within MRI is the task of labeling voxels according to their tissue type which include White Matter (WM), Grey Matter (GM) , Cerebrospinal Fluid (CSF) and sometimes pathological tissues like tumor etc. This paper describes an efficient method for automatic brain tumor segmentation for the extraction of tumor tissues from MR images. It combines Perona and Malik anisotropic diffusion model for image enhancement and Kmeans clustering technique for grouping tissues belonging to a specific group. The proposed method uses T1, T2 and PD weighted gray level intensity images. The proposed technique produced appreciative results
ABSTRACT
The multimedia applications are rapidly increasing. It is essential to ensure the authenticity of multimedia
components. The image is one of the integrated components of the multimedia. In this paper ,we desing a
model based on customized filter mask to ensure the authenticity of image that means the image forgery
detection based on customized filter mask. We have satisfactory results for our dataset.
Literature Survey on Image Deblurring TechniquesEditor IJCATR
Image restoration and recognition has been of great importance nowadays. Face recognition becomes difficult when it comes
to blurred and poorly illuminated images and it is here face recognition and restoration come to picture. There have been many
methods that were proposed in this regard and in this paper we will examine different methods and technologies discussed so far. The
merits and demerits of different methods are discussed in this concern
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A HYBRID COPY-MOVE FORGERY DETECTION TECHNIQUE USING REGIONAL SIMILARITY INDICESijcsit
Different methods have been experimented for processing and detecting forgery in digital images. Image forgery involves various activities like copy-move forgery, image slicing, retouching, morphing etc. In copy-move forgery a portion within the image is copied and pasted on another part of the same image,generally to conceal or enhance certain portions of the image. This paper proposes a copy-move forgery detection using local fractal dimension and structural similarity indices. The image is classified into different texture regions based on the local fractal dimension. Forgery checking is thus confined to be among the portions within a region. Structural similarity index measure is applied to each block pair in each region to localize the forged portion. Experimental results prove that this hybrid method can effectively detect such kind of image tampering with minimum false positives.
Survey on Brain MRI Segmentation TechniquesEditor IJMTER
Image segmentation is aimed at cutting out, a ROI (Region of Interest) from an image. For
medical images, segmentation is done for: studying the anatomical structure, identifying ROI ie tumor
or any other abnormalities, identifying the increase in tissue volume in a region, treatment planning.
Currently there are many different algorithms available for image segmentation. This paper lists and
compares some of them. Each has their own advantages and limitations.
Multitude Regional Texture Extraction for Efficient Medical Image Segmentationinventionjournals
Image processing plays a major role in evaluation of images in many concerns. Manual interpretation of the image is time consuming process and it is susceptible to human errors. Computer assisted approaches for analyzing the images have increased in latest evolution of image processing. Also it has highlighted its performance more in the field of medical sciences. Many techniques are available for the involvement in processing of images, evaluation, extraction etc. The main goal of image segmentation is cluster pixeling the regions corresponding to individual surfaces, objects, or natural parts of objects and to simplify and/or change the representation of an image into something that is more meaningful and easier to analyze. The proposed method is to conquer segmentation and texture extraction with Regional and Multitude and techniques involved in it. Ultrasound (US) is increasingly considered as a viable alternative imaging modality in computer-assisted brain segmentation and disease diagnosis applications.First for ultra sound we present region based segmentation.Homogeneous regions depends on image granularity features. Second a local threshold based multitude texture regional seed segmentation for medical image segmentation is proposed. Here extraction is done with dimensions comparable to the speckle size are to be extracted. The algorithm provides a less medical metrics awareness in a minimum user interaction environment. The shape and size of the growing regions depend on look up table entries.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Segmentation of Brain MR Images for Tumor Extraction by Combining Kmeans Clus...CSCJournals
Segmentation of images holds an important position in the area of image processing. It becomes more important while typically dealing with medical images where pre-surgery and post surgery decisions are required for the purpose of initiating and speeding up the recovery process [5] Computer aided detection of abnormal growth of tissues is primarily motivated by the necessity of achieving maximum possible accuracy. Manual segmentation of these abnormal tissues cannot be compared with modern day’s high speed computing machines which enable us to visually observe the volume and location of unwanted tissues. A well known segmentation problem within MRI is the task of labeling voxels according to their tissue type which include White Matter (WM), Grey Matter (GM) , Cerebrospinal Fluid (CSF) and sometimes pathological tissues like tumor etc. This paper describes an efficient method for automatic brain tumor segmentation for the extraction of tumor tissues from MR images. It combines Perona and Malik anisotropic diffusion model for image enhancement and Kmeans clustering technique for grouping tissues belonging to a specific group. The proposed method uses T1, T2 and PD weighted gray level intensity images. The proposed technique produced appreciative results
ABSTRACT
The multimedia applications are rapidly increasing. It is essential to ensure the authenticity of multimedia
components. The image is one of the integrated components of the multimedia. In this paper ,we desing a
model based on customized filter mask to ensure the authenticity of image that means the image forgery
detection based on customized filter mask. We have satisfactory results for our dataset.
Literature Survey on Image Deblurring TechniquesEditor IJCATR
Image restoration and recognition has been of great importance nowadays. Face recognition becomes difficult when it comes
to blurred and poorly illuminated images and it is here face recognition and restoration come to picture. There have been many
methods that were proposed in this regard and in this paper we will examine different methods and technologies discussed so far. The
merits and demerits of different methods are discussed in this concern
Color Image Segmentation Technique Using “Natural Grouping” of PixelsCSCJournals
This paper focuses on the problem Image Segmentation which aims at sub dividing a given image into its constituent objects. Here an unsupervised method for color image segmentation is proposed where we first perform a Minimum Spanning Tree (MST) based “natural grouping” of the image pixels to find out the clusters of the pixels having RGB values within a certain range present in the image. Then the pixels nearest to the centers of those clusters are found out and marked as the seeds. They are then used for region growing based image segmentation purpose. After that a region merging based segmentation method having a suitable threshold is performed to eliminate the effect of over segmentation that may still persist after the region growing method. This proposed method is unsupervised as it does not require any prior information about the number of regions present in a given image. The experimental results show that the proposed method can find homogeneous regions present in a given image efficiently.
A NOVEL IMAGE SEGMENTATION ENHANCEMENT TECHNIQUE BASED ON ACTIVE CONTOUR AND...acijjournal
Topological alignments and snakes are used in image processing, particularly in locating object
boundaries. Both of them have their own advantages and limitations. To improve the overall image
boundary detection system, we focused on developing a novel algorithm for image processing. The
algorithm we propose to develop will based on the active contour method in conjunction with topological
alignments method to enhance the image detection approach. The algorithm presents novel technique to
incorporate the advantages of both Topological Alignments and snakes. Where the initial segmentation
by Topological Alignments is firstly transformed into the input of the snake model and begins its
evolvement to the interested object boundary. The results show that the algorithm can deal with low
contrast images and shape cells, demonstrate the segmentation accuracy under weak image boundaries,
which responsible for lacking accuracy in image detecting techniques. We have achieved better
segmentation and boundary detecting for the image, also the ability of the system to improve the low
contrast and deal with over and under segmentation.
Segmentation of Tumor Region in MRI Images of Brain using Mathematical Morpho...CSCJournals
This paper introduces an efficient detection of brain tumor from cerebral MRI images. The methodology consists of two steps: enhancement and segmentation. To improve the quality of images and limit the risk of distinct regions fusion in the segmentation phase an enhancement process is applied. We applied mathematical morphology to increase the contrast in MRI images and to segment MRI images. Some of experimental results on brain images show the feasibility and the performance of the proposed approach.
Face Detection in Digital Image: A Technical ReviewIJERA Editor
Face detection is the method of focusing faces in input image is an important part of any face processing system. In Face detection, segmentation plays the major role to detect the face. There are many contests for effective and efficient face detection. The aim of this paper is to present a review on several algorithms and methods used for face detection. We read the various surveys and related various techniques according to how they extract features and what learning algorithms are adopted for. Face detection system has two major phases, first to segment skin region from an image and second to decide these regions cover human face or not. There are number of algorithms used in face detection namely Genetic, Hausdorff Distance etc.
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
In this paper, we propose an efficient method to provide personal identification using fingerprint to get better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding minutia pairings, has been in use for a long time, which is not very efficient for recognizing the low quality fingerprints. To overcome this problem, correlation technique is used. The correlation-based fingerprint verification system is capable of dealing with low quality images from which no minutiae can be extracted reliably and with fingerprints that suffer from non-uniform shape distortions, also in case of damaged and partial images. Orientation Field Methodology (OFM) has been used as a preprocessing module, and it converts the images into a field pattern based on the direction of the ridges, loops and bifurcations in the image of a fingerprint. The input image is then Cross Correlated (CC) with all the images in the cluster and the highest correlated image is taken as the output. The result gives a good recognition rate, as the proposed scheme uses Cross Correlation of Field Orientation (CCFO = OFM + CC) for fingerprint identification.
Extended Fuzzy Hyperline Segment Neural Network for Fingerprint RecognitionCSCJournals
In this paper we have proposed Extended Fuzzy Hyperline Segment Neural Network (EFHLSNN) and its learning algorithm which is an extension of Fuzzy Hyperline Segment Neural Network (FHLSNN). The fuzzy set hyperline segment is an n-dimensional hyperline segment defined by two end points with a corresponding extended membership function. The fingerprint feature extraction process is based on FingerCode feature extraction technique. The performance of EFHLSNN is verified using POLY U HRF fingerprint database. The EFHLSNN is found superior compared to FHLSNN in generalization, training and recall time.
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONSijma
Nowadays, image alteration in the mainstream media has become common. The degree of manipulation is
facilitated by image editing software. In the past two decades the number indicating manipulation of
images rapidly grows. Hence, there are many outstanding images which have no provenance information
or certainty of authenticity. Therefore, constructing a scientific and automatic way for evaluating image
authenticity is an important task, which is the aim of this paper. In spite of having outstanding
performance, all the image forensics schemes developed so far have not provided verifiable information
about source of tampering. This paper aims to propose a different kind of scheme, by exploiting a group of
similar images, to verify the source of tampering. First, we define our definition with regard to tampered
image. The distinctive features are obtained by exploiting Scale- Invariant Feature Transform (SIFT)
technique. We then proposed clustering technique to identify the tampered region based on distinctive
keypoints. In contrast to k-means algorithm, our technique does not require the initialization of k value. The
experimental results over and beyond the dataset indicate the efficacy of our proposed scheme
Literature survey for 3 d reconstruction of brain mri imageseSAT Journals
Abstract
Since Doctors had only the 2D Image Data to visualize the tumors in the MRI images, which never gave the actual feel of how the tumor would exactly look like . The doctors were deprived from the exact visualization of the tumor the amount of the tumor to be removed by operation was not known, which caused a lot of deformation in the faces and structure of the patients face or skull. The diversity and complexity of tumor cells makes it very challenging to visualize tumor present in magnetic resonance image (MRI) data. Hence to visualize the tumor properly 2D MRI image has to be converted to 3D image. With the development of computer image processing technology, three-dimensional (3D) visualization has become an important method of the medical diagnose, it offers abundant and accurate information for medical experts. Three-dimensional (3-D) reconstruction of medical images is widely applied to tumor localization; surgical planning and brain electromagnetic field computation etc. The brain MR images have unique characteristics, i.e., very complicated changes of the gray-scales and highly irregular boundaries. Traditional 3-D reconstruction algorithms are challenged in solving this problem. Many reconstruction algorithms, such as marching cubes and dividing cubes, need to establish the topological relationship between the slices of images. The results of these traditional approaches vary depending on the number of input sections, their positions, the shape of the original body and the applied interpolation technique. These make the task tedious and time-consuming. Moreover, satisfied reconstruction result may not even be obtained when the highly irregular objects such as the encephalic tissues are considered. Due to complexity and irregularity of each encephalic tissue boundary, three-dimensional (3D) reconstruction for MRI image is necessary. A Literature survey is done to study different methods of 3D reconstruction of brain images from MRI images. Keywords: 3-D reconstruction, region growing, segmentation method, immune algorithm (IA), one class support vector machine (OCSVM) and sphere shaped support vector machine (SSSVM).
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An evaluation approach for detection of contours with 4 d images a revieweSAT Journals
Abstract Abstract This paper presents a survey of contour detection and the actual use of contour in image processing. Image processing is
an enhanced area in computer science. Contour detection is the part of image processing. Contours are highly depends on quality
of an image. Contour is nothing but the simple boundaries or outlines in an image. Contour detection is nearly related with image
segmentation, classification and recognition of any object in an image. With help of contour detection we can achieve the high
accuracy of the results. Object recognition image retrieval uses the concept of contour detection to achieve the high accuracy in
the results, so it’s an enhanced and popular method in image processing. Active contour model is also one of the main techniques
in contour detection. Active contour is one of the successful models in image processing. This is a modified method of contour
detection. It consists of evolving an image with help of boundaries. Active contour model is also called as snake. Contour
detection plays an important role in recognition.
Keywords: 4D images, Contour Detection, Image Segmentation, Image Classification etc…
Human Re-identification with Global and Local Siamese Convolution Neural NetworkTELKOMNIKA JOURNAL
Human re-identification is an important task in surveillance system to determine whether the same human re-appears in multiple cameras with disjoint views. Mostly, appearance based approaches are used to perform human re-identification task because they are less constrained than biometric based approaches. Most of the research works apply hand-crafted feature extractors and then simple matching methods are used. However, designing a robust and stable feature requires expert knowledge and takes time to tune the features. In this paper, we propose a global and local structure of Siamese Convolution Neural Network which automatically extracts features from input images to perform human re-identification task. Besides, most of the current human re-identification tasks in single-shot approaches do not consider occlusion issue due to lack of tracking information. Therefore, we apply a decision fusion technique to combine global and local features for occlusion cases in single-shot approaches.
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVMsipij
The biometric is used to identify a person effectively and employ in almost all applications of day to day
activities. In this paper, we propose compression based face recognition using Discrete Wavelet Transform
(DWT) and Support Vector Machine (SVM). The novel concept of converting many images of single person
into one image using averaging technique is introduced to reduce execution time and memory. The DWT is
applied on averaged face image to obtain approximation (LL) and detailed bands. The LL band coefficients
are given as input to SVM to obtain Support vectors (SV’s). The LL coefficients of DWT and SV’s are fused
based on arithmetic addition to extract final features. The Euclidean Distance (ED) is used to compare test
image features with database image features to compute performance parameters. It is observed that, the
proposed algorithm is better in terms of performance compared to existing algorithms.
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...ijitjournal
Human pose estimation is one of the key problems in computer visionthat has been studied in the recent
years. The significance of human pose estimation is in the higher level tasks of understanding human
actions applications such as recognition of anomalous actions present in videos and many other related
applications. The human poses can be estimated by extracting silhouettes of humans as silhouettes are
robust to variations and it gives the shape information of the human body. Some common challenges
include illumination changes, variation in environments, and variation in human appearances. Thus there
is a need for a robust method for human pose estimation. This paper presents a study and analysis of
approaches existing for silhouette extraction and proposes a robust technique for extracting human
silhouettes in video sequences. Gaussian Mixture Model (GMM) A statistical approach is combined with
HSV (Hue, Saturation and Value) color space model for a robust background model that is used for
background subtraction to produce foreground blobs, called human silhouettes. Morphological operations
are then performed on foreground blobs from background subtraction. The silhouettes obtained from this
work can be used in further tasks associated with human action interpretation and activity processes like
human action classification, human pose estimation and action recognition or action interpretation.
Fully Automatic Method for 3D T1-Weighted Brain Magnetic Resonance Images Seg...CSCJournals
In the domain of medical imaging, accurate segmentation of brain MR images is of interest for many brain disorders. However, due to several factors such noise, imaging artefacts, intrinsic tissue variation and partial volume effects, tissue segmentation remains a challenging task. So, in this paper, a full automatic method for segmentation of brain MR images is presented. The method consists of four steps segmentation procedure. First, noise removing by median filtering is done; second segmentation of brain/non-brain tissue is performed by using a Threshold Morphologic Brain Extraction method (TMBE). Then initial centroids estimation by gray level histogram analysis based is executed. Finally, Fuzzy C-means Algorithm is used for MRI tissue segmentation. The efficiency of the proposed method is demonstrated by extensive segmentation experiments using simulated and real MR images.
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...sipij
The physiological biometric trait face images are used to identify a person effectively. In this paper, we
propose compression based face recognition using transform domain features fused at matching level. The
2D images are converted into 1-D vectors using mean to compress number of pixels. The Fast Fourier
Transform (FFT) and Discrete Wavelet Transform (DWT) are used to extract features. The low and high
frequency coefficients of DWT are concatenated to obtained final DWT features. The performance
parameters are computed by comparing database and test image features of FFT and DWT using Euclidian
Distance (ED). The performance parameters of FFT and DWT are fused at matching level to obtain better
results. It is observed that the performance of proposed method is better than the existing methods.
In recent days, skin cancer is seen as one of the most Hazardous form of the cancer found in Humans. Skin Cancer is a malignant tumor that grows in the skin cells. It can be affected mostly by the reason of skin burn caused by sunlight. Early detection and treatment of Skin cancer can significantly improve patient outcome. Automatic detection is one of the most challenging research areas that can be used for early detection of such vital cancer. A person’s in which they have inadequate amount of melanoma will be exposed to the risk of sun burns and the ultra violet rays from the sun will be affected that body. Malignant melanomas is a type of melanoma that has irregular borders, color variations so analyze the shape, color and texture of the skin lesion is important for the early detection. It can have the components of an automated image analysis module, which contains image acquisition, hair detection and exclusion, lesion segmentation, feature extraction and finally classification. Finally the result show that the system is efficient achieving classification of the lesion as either melanoma or Non melanoma causes.
Color Image Segmentation Technique Using “Natural Grouping” of PixelsCSCJournals
This paper focuses on the problem Image Segmentation which aims at sub dividing a given image into its constituent objects. Here an unsupervised method for color image segmentation is proposed where we first perform a Minimum Spanning Tree (MST) based “natural grouping” of the image pixels to find out the clusters of the pixels having RGB values within a certain range present in the image. Then the pixels nearest to the centers of those clusters are found out and marked as the seeds. They are then used for region growing based image segmentation purpose. After that a region merging based segmentation method having a suitable threshold is performed to eliminate the effect of over segmentation that may still persist after the region growing method. This proposed method is unsupervised as it does not require any prior information about the number of regions present in a given image. The experimental results show that the proposed method can find homogeneous regions present in a given image efficiently.
A NOVEL IMAGE SEGMENTATION ENHANCEMENT TECHNIQUE BASED ON ACTIVE CONTOUR AND...acijjournal
Topological alignments and snakes are used in image processing, particularly in locating object
boundaries. Both of them have their own advantages and limitations. To improve the overall image
boundary detection system, we focused on developing a novel algorithm for image processing. The
algorithm we propose to develop will based on the active contour method in conjunction with topological
alignments method to enhance the image detection approach. The algorithm presents novel technique to
incorporate the advantages of both Topological Alignments and snakes. Where the initial segmentation
by Topological Alignments is firstly transformed into the input of the snake model and begins its
evolvement to the interested object boundary. The results show that the algorithm can deal with low
contrast images and shape cells, demonstrate the segmentation accuracy under weak image boundaries,
which responsible for lacking accuracy in image detecting techniques. We have achieved better
segmentation and boundary detecting for the image, also the ability of the system to improve the low
contrast and deal with over and under segmentation.
Segmentation of Tumor Region in MRI Images of Brain using Mathematical Morpho...CSCJournals
This paper introduces an efficient detection of brain tumor from cerebral MRI images. The methodology consists of two steps: enhancement and segmentation. To improve the quality of images and limit the risk of distinct regions fusion in the segmentation phase an enhancement process is applied. We applied mathematical morphology to increase the contrast in MRI images and to segment MRI images. Some of experimental results on brain images show the feasibility and the performance of the proposed approach.
Face Detection in Digital Image: A Technical ReviewIJERA Editor
Face detection is the method of focusing faces in input image is an important part of any face processing system. In Face detection, segmentation plays the major role to detect the face. There are many contests for effective and efficient face detection. The aim of this paper is to present a review on several algorithms and methods used for face detection. We read the various surveys and related various techniques according to how they extract features and what learning algorithms are adopted for. Face detection system has two major phases, first to segment skin region from an image and second to decide these regions cover human face or not. There are number of algorithms used in face detection namely Genetic, Hausdorff Distance etc.
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
In this paper, we propose an efficient method to provide personal identification using fingerprint to get better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding minutia pairings, has been in use for a long time, which is not very efficient for recognizing the low quality fingerprints. To overcome this problem, correlation technique is used. The correlation-based fingerprint verification system is capable of dealing with low quality images from which no minutiae can be extracted reliably and with fingerprints that suffer from non-uniform shape distortions, also in case of damaged and partial images. Orientation Field Methodology (OFM) has been used as a preprocessing module, and it converts the images into a field pattern based on the direction of the ridges, loops and bifurcations in the image of a fingerprint. The input image is then Cross Correlated (CC) with all the images in the cluster and the highest correlated image is taken as the output. The result gives a good recognition rate, as the proposed scheme uses Cross Correlation of Field Orientation (CCFO = OFM + CC) for fingerprint identification.
Extended Fuzzy Hyperline Segment Neural Network for Fingerprint RecognitionCSCJournals
In this paper we have proposed Extended Fuzzy Hyperline Segment Neural Network (EFHLSNN) and its learning algorithm which is an extension of Fuzzy Hyperline Segment Neural Network (FHLSNN). The fuzzy set hyperline segment is an n-dimensional hyperline segment defined by two end points with a corresponding extended membership function. The fingerprint feature extraction process is based on FingerCode feature extraction technique. The performance of EFHLSNN is verified using POLY U HRF fingerprint database. The EFHLSNN is found superior compared to FHLSNN in generalization, training and recall time.
EXPLOITING REFERENCE IMAGES IN EXPOSING GEOMETRICAL DISTORTIONSijma
Nowadays, image alteration in the mainstream media has become common. The degree of manipulation is
facilitated by image editing software. In the past two decades the number indicating manipulation of
images rapidly grows. Hence, there are many outstanding images which have no provenance information
or certainty of authenticity. Therefore, constructing a scientific and automatic way for evaluating image
authenticity is an important task, which is the aim of this paper. In spite of having outstanding
performance, all the image forensics schemes developed so far have not provided verifiable information
about source of tampering. This paper aims to propose a different kind of scheme, by exploiting a group of
similar images, to verify the source of tampering. First, we define our definition with regard to tampered
image. The distinctive features are obtained by exploiting Scale- Invariant Feature Transform (SIFT)
technique. We then proposed clustering technique to identify the tampered region based on distinctive
keypoints. In contrast to k-means algorithm, our technique does not require the initialization of k value. The
experimental results over and beyond the dataset indicate the efficacy of our proposed scheme
Literature survey for 3 d reconstruction of brain mri imageseSAT Journals
Abstract
Since Doctors had only the 2D Image Data to visualize the tumors in the MRI images, which never gave the actual feel of how the tumor would exactly look like . The doctors were deprived from the exact visualization of the tumor the amount of the tumor to be removed by operation was not known, which caused a lot of deformation in the faces and structure of the patients face or skull. The diversity and complexity of tumor cells makes it very challenging to visualize tumor present in magnetic resonance image (MRI) data. Hence to visualize the tumor properly 2D MRI image has to be converted to 3D image. With the development of computer image processing technology, three-dimensional (3D) visualization has become an important method of the medical diagnose, it offers abundant and accurate information for medical experts. Three-dimensional (3-D) reconstruction of medical images is widely applied to tumor localization; surgical planning and brain electromagnetic field computation etc. The brain MR images have unique characteristics, i.e., very complicated changes of the gray-scales and highly irregular boundaries. Traditional 3-D reconstruction algorithms are challenged in solving this problem. Many reconstruction algorithms, such as marching cubes and dividing cubes, need to establish the topological relationship between the slices of images. The results of these traditional approaches vary depending on the number of input sections, their positions, the shape of the original body and the applied interpolation technique. These make the task tedious and time-consuming. Moreover, satisfied reconstruction result may not even be obtained when the highly irregular objects such as the encephalic tissues are considered. Due to complexity and irregularity of each encephalic tissue boundary, three-dimensional (3D) reconstruction for MRI image is necessary. A Literature survey is done to study different methods of 3D reconstruction of brain images from MRI images. Keywords: 3-D reconstruction, region growing, segmentation method, immune algorithm (IA), one class support vector machine (OCSVM) and sphere shaped support vector machine (SSSVM).
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An evaluation approach for detection of contours with 4 d images a revieweSAT Journals
Abstract Abstract This paper presents a survey of contour detection and the actual use of contour in image processing. Image processing is
an enhanced area in computer science. Contour detection is the part of image processing. Contours are highly depends on quality
of an image. Contour is nothing but the simple boundaries or outlines in an image. Contour detection is nearly related with image
segmentation, classification and recognition of any object in an image. With help of contour detection we can achieve the high
accuracy of the results. Object recognition image retrieval uses the concept of contour detection to achieve the high accuracy in
the results, so it’s an enhanced and popular method in image processing. Active contour model is also one of the main techniques
in contour detection. Active contour is one of the successful models in image processing. This is a modified method of contour
detection. It consists of evolving an image with help of boundaries. Active contour model is also called as snake. Contour
detection plays an important role in recognition.
Keywords: 4D images, Contour Detection, Image Segmentation, Image Classification etc…
Human Re-identification with Global and Local Siamese Convolution Neural NetworkTELKOMNIKA JOURNAL
Human re-identification is an important task in surveillance system to determine whether the same human re-appears in multiple cameras with disjoint views. Mostly, appearance based approaches are used to perform human re-identification task because they are less constrained than biometric based approaches. Most of the research works apply hand-crafted feature extractors and then simple matching methods are used. However, designing a robust and stable feature requires expert knowledge and takes time to tune the features. In this paper, we propose a global and local structure of Siamese Convolution Neural Network which automatically extracts features from input images to perform human re-identification task. Besides, most of the current human re-identification tasks in single-shot approaches do not consider occlusion issue due to lack of tracking information. Therefore, we apply a decision fusion technique to combine global and local features for occlusion cases in single-shot approaches.
COMPRESSION BASED FACE RECOGNITION USING DWT AND SVMsipij
The biometric is used to identify a person effectively and employ in almost all applications of day to day
activities. In this paper, we propose compression based face recognition using Discrete Wavelet Transform
(DWT) and Support Vector Machine (SVM). The novel concept of converting many images of single person
into one image using averaging technique is introduced to reduce execution time and memory. The DWT is
applied on averaged face image to obtain approximation (LL) and detailed bands. The LL band coefficients
are given as input to SVM to obtain Support vectors (SV’s). The LL coefficients of DWT and SV’s are fused
based on arithmetic addition to extract final features. The Euclidean Distance (ED) is used to compare test
image features with database image features to compute performance parameters. It is observed that, the
proposed algorithm is better in terms of performance compared to existing algorithms.
ROBUST STATISTICAL APPROACH FOR EXTRACTION OF MOVING HUMAN SILHOUETTES FROM V...ijitjournal
Human pose estimation is one of the key problems in computer visionthat has been studied in the recent
years. The significance of human pose estimation is in the higher level tasks of understanding human
actions applications such as recognition of anomalous actions present in videos and many other related
applications. The human poses can be estimated by extracting silhouettes of humans as silhouettes are
robust to variations and it gives the shape information of the human body. Some common challenges
include illumination changes, variation in environments, and variation in human appearances. Thus there
is a need for a robust method for human pose estimation. This paper presents a study and analysis of
approaches existing for silhouette extraction and proposes a robust technique for extracting human
silhouettes in video sequences. Gaussian Mixture Model (GMM) A statistical approach is combined with
HSV (Hue, Saturation and Value) color space model for a robust background model that is used for
background subtraction to produce foreground blobs, called human silhouettes. Morphological operations
are then performed on foreground blobs from background subtraction. The silhouettes obtained from this
work can be used in further tasks associated with human action interpretation and activity processes like
human action classification, human pose estimation and action recognition or action interpretation.
Fully Automatic Method for 3D T1-Weighted Brain Magnetic Resonance Images Seg...CSCJournals
In the domain of medical imaging, accurate segmentation of brain MR images is of interest for many brain disorders. However, due to several factors such noise, imaging artefacts, intrinsic tissue variation and partial volume effects, tissue segmentation remains a challenging task. So, in this paper, a full automatic method for segmentation of brain MR images is presented. The method consists of four steps segmentation procedure. First, noise removing by median filtering is done; second segmentation of brain/non-brain tissue is performed by using a Threshold Morphologic Brain Extraction method (TMBE). Then initial centroids estimation by gray level histogram analysis based is executed. Finally, Fuzzy C-means Algorithm is used for MRI tissue segmentation. The efficiency of the proposed method is demonstrated by extensive segmentation experiments using simulated and real MR images.
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...sipij
The physiological biometric trait face images are used to identify a person effectively. In this paper, we
propose compression based face recognition using transform domain features fused at matching level. The
2D images are converted into 1-D vectors using mean to compress number of pixels. The Fast Fourier
Transform (FFT) and Discrete Wavelet Transform (DWT) are used to extract features. The low and high
frequency coefficients of DWT are concatenated to obtained final DWT features. The performance
parameters are computed by comparing database and test image features of FFT and DWT using Euclidian
Distance (ED). The performance parameters of FFT and DWT are fused at matching level to obtain better
results. It is observed that the performance of proposed method is better than the existing methods.
In recent days, skin cancer is seen as one of the most Hazardous form of the cancer found in Humans. Skin Cancer is a malignant tumor that grows in the skin cells. It can be affected mostly by the reason of skin burn caused by sunlight. Early detection and treatment of Skin cancer can significantly improve patient outcome. Automatic detection is one of the most challenging research areas that can be used for early detection of such vital cancer. A person’s in which they have inadequate amount of melanoma will be exposed to the risk of sun burns and the ultra violet rays from the sun will be affected that body. Malignant melanomas is a type of melanoma that has irregular borders, color variations so analyze the shape, color and texture of the skin lesion is important for the early detection. It can have the components of an automated image analysis module, which contains image acquisition, hair detection and exclusion, lesion segmentation, feature extraction and finally classification. Finally the result show that the system is efficient achieving classification of the lesion as either melanoma or Non melanoma causes.
Review of Image Segmentation Techniques based on Region Merging ApproachEditor IJMTER
Image segmentation is an important task in computer vision and object recognition. Since
fully automatic image segmentation is usually very hard for natural images, interactive schemes with a
few simple user inputs are good solutions. In image segmentation the image is dividing into various
segments for processing images. The complexity of image content is a bigger challenge for carrying out
automatic image segmentation. On regions based scheme, the images are merged based on the similarity
criteria depending upon comparing the mean values of both the regions to be merged. So, the similar
regions are then merged and the dissimilar regions are merged together.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Computational Engineering Research(IJCER) ijceronline
nternational Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Review on Image Segmentation using Clustering and Swarm Optimization Techni...IJSRD
The process of dividing an image into multiple regions (set of pixels) is known as Image segmentation. It will make an image easy and smooth to evaluate. Image segmentation objective is to generate image more simple and meaningful. In this paper present a survey on image segmentation general segmentation techniques, clustering algorithms and optimization methods. Also a study of different research also been presented. The latest research in each of image segmentation methods is presented in this study. This paper presents the recent research in biologically inspired swarm optimization techniques, including ant colony optimization algorithm, particle swarm optimization algorithm, artificial bee colony algorithm and their hybridizations, which are applied in several fields.
Image Segmentation Based Survey on the Lung Cancer MRI ImagesIIRindia
Educational data mining (EDM) creates high impact in the field of academic domain. The methods used in this topic are playing a major advanced key role in increasing knowledge among students. EDM explores and gives ideas in understanding behavioral patterns of students to choose a correct path for choosing their carrier. This survey focuses on such category and it discusses on various techniques involved in making educational data mining for their knowledge improvement. Also, it discusses about different types of EDM tools and techniques in this article. Among the different tools and techniques, best categories are suggested for real world usage.
Medical Image segmentation using Image Mining conceptsEditor IJMTER
Image differencing is usually done by subtracting the low-level skin texture like strength
in images that are already associated. This paper extracts high-level skin texture in order to find out
an efficient image differencing method for the analysis of Brain Tumor. On the other hand, this
produces sets of skin texture that are both spatial. We demonstrate a technique that avoids arbitrary
spatial constraints and is robust in the presence of sound, outliers, and imaging artifact, while
outperforming even profitable products in the analysis of Brain Tumor images. First, the landmark
are establish, and then the top entrant are sorted into a end set. Second, the top sets of the two
descriptions are then differenced through a cluster judgment. The symmetry of the human body is
utilized to increase the accuracy of the finding. We imitate this technique in an effort to understand
and ultimately capture the judgment of the radiologist. The image differencing with clustered
contrast process determines the being there of Brain Tumor. Using the most favorable features
extracted from normal and tumor regions of MRI by using arithmetical features, classifiers are used
to categorize and segment the tumor portion in irregular images. Both the difficult and preparation
phase gives the proportion of accuracy on each parameter in neural networks, which gives the idea to
decide the best one to be used in supplementary works. The results showed outperformance of
algorithm when compared with classification accuracy which works as shows potential tool for
classification and requires extension in brain tumor analysis.
Gesture Recognition Review: A Survey of Various Gesture Recognition AlgorithmsIJRES Journal
This paper presents simple as well as effective methods to realize hand gesture recognition. Gesture recognition is mainly apprehensive on analysing the functionality of human Intelligence. The main aim of gesture detection and recognition is to design an efficient system which is able to recognize particular human gestures and use these detected gestures to transfer information or for controlling devices. Hand gestures enable a vivid complementary modal to communicate with speech for expressing ones thought of idea. The information which is associated with hand gestures detection in a conversation is extent or degree, detection discourse structure, spatial and temporal design structure. Based on the above given points the paper discusses various models of gesture detection and recognition.
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONVLSICS Design
Segmentation of tissues and structures from medical images is the first step in many image analysis applications developed for medical diagnosis. With the growing research on medical image segmentation, it is essential to categorize the research outcomes and provide researchers with an overview of the existing segmentation techniques in medical images. In this paper, different image segmentation methods applied on magnetic resonance brain images are reviewed. The selection of methods includes sources from image processing journals, conferences, books, dissertations and thesis. The conceptual details of the methods are explained and mathematical details are avoided for simplicity. Both broad and detailed categorizations of reviewed segmentation techniques are provided. The state of art research is provided with emphasis on developed techniques and image properties used by them. The methods defined are not always mutually independent. Hence, their inter relationships are also stated. Finally, conclusions are drawn summarizing commonly used techniques and their complexities in application.
MRI Image Segmentation Using Level Set Method and Implement an Medical Diagno...CSEIJJournal
Image segmentation plays a vital role in image processing over the last few years. The goal of image
segmentation is to cluster the pixels into salient image regions i.e., regions corresponding to individual
surfaces, objects, or natural parts of objects. In this paper, we propose a medical diagnosis system by using
level set method for segmenting the MRI image which investigates a new variational level set algorithm
without re- initialization to segment the MRI image and to implement a competent medical diagnosis
system by using MATLAB. Here we have used the speed function and the signed distance function of the
image in segmentation algorithm. This system consists of thresholding technique, curve evolution technique
and an eroding technique. Our proposed system was tested on some MRI Brain images, giving promising
results by detecting the normal or abnormal condition specially the existence of tumers. This system will be
applied to both simulated and real images with promising results.
MRIIMAGE SEGMENTATION USING LEVEL SET METHOD AND IMPLEMENT AN MEDICAL DIAGNOS...cseij
Image segmentation plays a vital role in image processing over the last few years. The goal of image segmentation is to cluster the pixels into salient image regions i.e., regions corresponding to individual surfaces, objects, or natural parts of objects. In this paper, we propose a medical diagnosis system by using level set method for segmenting the MRI image which investigates a new variational level set algorithm without re- initialization to segment the MRI image and to implement a competent medical diagnosis system by using MATLAB. Here we have used the speed function and the signed distance function of the image in segmentation algorithm. This system consists of thresholding technique, curve evolution technique and an eroding technique. Our proposed system was tested on some MRI Brain images, giving promising results by detecting the normal or abnormal condition specially the existence of tumers. This system will be applied to both simulated and real images with promising results
A Face Recognition Using Linear-Diagonal Binary Graph Pattern Feature Extract...ijfcstjournal
Face recognition is one the most interesting topic in the field in computer vision and image processing.
Face recognition is a processing system that recognizes and identifies individuals human by their faces.
Automatic face recognition is powerful way to provide, authorized access to control their system. Face
recognition has many challenging problems (like face pose, face expression variation, illumination
variation, face orientation and noise) in the field of image analysis and computer vision. This method is
work on feature extraction part of face recognition. New way to extract face feature using LD-BGP code
operator it is like LGS and LBP feature extraction operator. In our LD-BGP-code operator work in two
direction first linear then diagonal. In both direction, its create eight digits code to every pixel of image.
Means of these two directional are taken so that is cover all neighbor of center pixel. First linear direction,
only horizontal and vertical pixel are taken. Second diagonal direction only diagonal pixels taken. In
matching phase, we use Euclidean distance to match a face image. We perform the Linear and diagonal
directional operator method on face database ORL. We get accuracy 95.3 %. LD-BGP method also works
on different type image like illuminated and expression variation image.
Similar to A Methodology for Extracting Standing Human Bodies from Single Images (20)
The effect of functionalized carbon nanotubes on thermalmechanical performanc...journal ijrtem
The new approaches for preparing nanocomposite coating by modificated carbon nanonotubes
(CNTs) and epoxy resin was done in the study. thermal-mechanical performance of nanocomposite coating was
investigated and the results were reported in this paper. The physic-chemical techniques such as Differential
scanning calorimetry (DSC) and Thermal gravimetric analysis (TGA) were used to characterize the thermal
performance of Epoxy nanocomposite coating. The test techniques for mechanical properties of paint coating as
adhesion, hardness, impact resistance and bending strength were employed in the work. The results indicated
that CNTs were dispersed in epoxy coating with only ratio of 0.1 wt% enhanced the Glass Transition
Temperature (Tg), decomposition temperature of epoxy coating and improved mechanical properties
significantly. Also functionalized CNTs can be reinforced thermal-mechanical of the epoxy coating better than
neat CNTs.
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...journal ijrtem
: The study venture on the developing issues and problems of selected agency in the province of
Sorsogon with an end-view of identifying solution towards achieving effective delivery of services to the
public. The agencies covered by the study are the employers of the students enrolled in Public Administration
512 subject in the graduate school program of the Sorsogon State College 1st semester SY 2016. Guided by a
structured matrix questionnaire and checklist, the class spearheaded by the assigned focal person per
identified respondent-agency conducted a focus group discussion covering sequentially the issues and
problems besetting the organization. It likewise pursued how does it affects the management & performance of
the office and ultimately identifying possible solutions out of the issues and problems. Result revealed that
most pressing problems and issues of the selected agency in the province of Sorsogon covers; (a) understaffed,
(b) poor communication, (c) poor implementation of the policy, and (d) poor performance feedback
mechanism in the system
Positive and negative solutions of a boundary value problem for a fractional ...journal ijrtem
: In this work, we study a boundary value problem for a fractional
q, -difference equation. By
using the monotone iterative technique and lower-upper solution method, we get the existence of positive or
negative solutions under the nonlinear term is local continuity and local monotonicity. The results show that we
can construct two iterative sequences for approximating the solutions
Organic foods refer to products that are grown naturally or produced by methods that comply
with the standards of organic farming. They are not only environmentally friendly, they are also healthy. Many
people believe organic foods are healthier than conventional food. Today, organic foods have become very
popular and everyone wants to know about their benefits. This paper provides a brief introduction on organic
foods and their pros and cons.
Molecular computers are systems in which molecules or macromolecules individually mediate
information processing functions. Molecular computing provides an alternative to computing using silicon
integrated circuits. It aims at developing intelligent computers using biological molecules as computational
devices. It is a promising means of unconventional computation owing to its capability for massive parallelism.
It offers to augment digital computing with biology-like capabilities. This paper provides a brief introduction to
molecular computing.
Industry 4.0 refers to the current trend of automation and deployment of Internet technologies
in manufacturing. This includes using machine-to-machine and Internet of Things (IoT) deployments to help
manufacturers implement increased automation, improved communication and process monitoring. This trend
of Industry 4.0 (sometimes referred to as the 4th Industrial Revolution) affects most processes and people
throughout society. This paper provides a brief introduction to Industry 4.0.
With mounting concerns over the state of our planet, there is continuing demand that chemists
and chemical engineers should develop greener chemical processes and products. In the 1990s, with the
growing awareness of the hazardous impacts of the chemical industry, the green chemistry revolution was
launched by American chemists Paul T. Anastas and John Warner. Green chemistry is the kind of chemistry that
seeks to minimize pollution, conserve energy, and promote environmentally friendly production. This paper
provides a brief introduction to green chemistry
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...journal ijrtem
Food security is the foremost need of every human society. It is a fundamental right and
government responsibility but still food insecurity is prevalent in rural areas of least developed nations. To cope
with food insecurity, undertaking diverse income generating activities is common as well as key strategy adopted
by rural people. The objective of this study is to assess rural livelihood and food security status of a remote island
named Srilanka Tapu of Sunsari district. A random sampling technique was used to collect primary data from 40
rural household heads using semi-structured questionnaire. Descriptive methods were used for analyzing. The
findings revealed that the food security situation of the Tapu is insecure. Most basic infrastructures and social
services needed for people livelihood such as road, electricity sufficient food availability, education, healthcare,
sanitation, etc. were found to be extremely poor. Most of the households are small scale farmers involving
themselves in diverse livelihood activities which are mostly temporary, low-skilled and low paying. However,
people are fulfilling their food needs at every cost but are highly vulnerable to food insecurity. Also, their lives
security is equally vulnerable because of disastrous Koshi River flooding which occurs every year in the Tapu.
The findings therefore critically suggest that food security of remote and vulnerable human settlements should be
at top priority in policy formulation and implementation level. The study also recommends a need for an in-depth
research for making evidence based policy interventions for improvement of diversify rural livelihood along with
sustainable environment
Augmented Tourism: Definitions and Design Principlesjournal ijrtem
After designing and implementing several iterations of implantations of augmented reality(AR) in
tourism, this paper takes a deep look into design principles and implementation strategies of using AR at
destination tourism settings. The study looks to define augmented tourism from past implementations as well as
several cases uses designed and implemented for tourism. The discussion leads to formation of frameworks and
best practices for AR as well as virtual reality(VR) to be used in tourism settings. Some main affordances include
guest autonomy, customized experiences, visitor data collection and increased electronic word-of-mouth
generation for promotion purposes. Some challenges found include the need for high levels of technology
infrastructure, low adoption rates or ‘buy-in’ rates, high levels of calibration and customization, and the need for
maintenance and support services. Some suggestions are given as to how to leverage the affordances and meet
the challenges to implementing AR for tourism
A study on financial aspect of supply chain management journal ijrtem
The more common approaches used in the SCM consider only the physical logistic operations
and ignore the financial aspects of the supply chain. The main objective to incorporate financial aspects in
supply chain management is to strengthen managerial decisions concerning financial flows in supply chains,
while empirical knowledge about financial supply chain management (FSCM) is in its early stages. This paper
presents a model for FSCM which financial planning in addition to operation planning is decided in it. The
main contribution of this paper is to define two approaches for Financial Supply Chain Management and to
compare them. This financial approaches are: Traditional financial approach and new financial approach.
Traditional financial approach integrates physical goods flows and financial flows. New financial approach
considers in making decisions other financial indicators such as market to book value, liquidity ratios, capital
structure ratios, and return on equity, sales margin, turnover ratios and stock security ratios, among others.
Moreover, the new approach applies the change in equity instead of the traditional approach measures of profit
as the objective function to be maximized in the presented model. To show the attributes of the presented
approaches, the results of the new approach and the traditional approach is compared. The findings indicate
that the traditional approach leads to lower change in equity compared to the financial approach. Also, the
results clearly reveal the better improvement of using the new approach over the traditional approach, and
convince the decision makers to take advantage of the new approach
Existence results for fractional q-differential equations with integral and m...journal ijrtem
This paper concerns a new kind of fractional q-differential equation of arbitrary order by
combining a multi-point boundary condition with an integral boundary condition. By solving the equation which
is equivalent to the problem we are going to investigate, the Green’s functions are obtained. By defining a
continuous operator on a Banach space and taking advantage of the cone theory and some fixed-point theorems,
the existence of multiple positive solutions for the BVPs is proved based on some properties of Green’s functions
and under the circumstance that the continuous functions f satisfy certain hypothesis. Finally, examples are
provided to illustrate the results.
The following Project shows the benefits of a research established into a multi-products
warehouse belongs to an automotive industry supplier. The main goal was applied a tool recognizing the rules
for distribution and material storage. Once the research was completed, the benefits were, the idle times
reduction per hours/week by the two initial processes. The politics for storage assignment and location, propose
a system to improve the space into this areain order to avoid material management and flow issues. It is
important to mention, the system proposed could be applied into warehouses with storage size and space
restricted by sorting area, also different material types, production settings and physical specifications for
which set warehouses with traditional management of distribution without slack, involves lack of materials,
pieces without records, incorrect location assigned, stock error.
Study of desalination processes of seawater from the desalination plant of La...journal ijrtem
: The use of water for food purposes requires excellent physicochemical quality. To contribute to
the control of water quality. Water treated by reverse osmosis is aggressive and demineralize can not be used
directly as a source of drinking water. The objective of this work is to study, physics-chemical analyzes of raw
water, pretreated osmosis and treated (permeate) and produced water (reservoir) at the desalination plant of
seawater Laayoune (SDL), located in southern Morocco. For this, we have followed several qualitative
parameters such as pH, conductivity, turbidity.
Effect of Cash Management on The Financial Performance of Cooperative Banks i...journal ijrtem
This paper analyses the effect of cash management on the financial performance of cooperatives
banks in Rwanda. A descriptive research design was used. The population comprised of 148 employees of ZIGMA
CSS from which a sample of 108 employees was determined using Solvirn and Yemen’s formula. Data was
collected from both primary and secondary sources using questionnaires and document analysis. Data was
presented using frequency tables from which analysis was made. A multi regression analysis was used to analyse
relationship between the variables. The results from the survey revealed that ZIGMA CSS uses various cash
management techniques in the cash management. The results further revealed a strong relationship between cash
management and financial performance of ZIGMA CSS. The study concludes that cash management is a key tool
in the financial management of the banks since cash forms the biggest asset of the bank. Cooperatives banks
should ensure that they develop policies in effective cash management.
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...journal ijrtem
The article concerns the case of the damage to the Mitsubishi Pajero Sport engine and the
methodology a technical expert applied to identify a direct cause of failure. The engine failure occurred while a
vehicle was being repaired to eliminate air conditioning malfunction and engine overheating. When repairing, it
was necessary to replace a cylinder head and the pistons were checked removing the pully from a crank shaft.
After the repair had been completed and after 16-day vehicle operation, engine timing belts got damaged. To
eliminate this malfunction, damaged belts were replaced. Thirty (30) days after the vehicle had been put into
operation, emergency engine failure occurred, and a technical expert was called upon to assess the quality of the
repairs having been performed. The article describes the procedures and methodology a technical expert applied.
In the conclusion, the findings are stated. To determine the cause, a vehicle was on the car service station
premises, where a technical expert was present and according to his instructions, diagnostic and subsequent
disassembly works have been done. The procedure of evaluating the key characteristics on individual parts, their
display, and the resulting evaluation are described.
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
Recently, numerous approaches have been proposed for designing medium access control (MAC)
in underwater acoustic networks (UANs). Some of those works tried to adapt MAC protocols proposed for
terrestrial networks. However, unique environmental characteristics of UANs make the MAC protocols hard to be
used in the UANs and degrade network performance. In order to improve network performance, COD-TS MAC
protocol was proposed. COD-TS focuses on both single hop and multi-hop mode and utilizes CDMA for
exchanging schedule information between cluster heads. COD-TS has shortcomings such as collisions, additional
energy consumption by exchanging schedule information and near-far effect of CDMA. To overcome above
shortcomings, we propose a clustering-based time slot assignment protocol. In the proposed protocol, nodes are
clustered, and each cluster head performs two-hop neighbor cluster discovery operation. And then, a cluster head
obtains its own relative position information. Finally, the cluster head assigns its own time slot for data
transmission based on the information. Simulation results show that the proposed protocol has always better
performance compared to the COD-TS.
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
Smart phones have become part of our daily life. People using smart phones have increased
rapidly. The proposed paper is to provide a security system that combines the functions of smart phone and home
network system. It enables the users to check the image of the visitor who is present at the door. It also saves all
the images in their drive. We send an alert message to the Owner whenever the doorbell is pressed. Furthermore,
the owner can call to the visitor with the help of our app. We are also providing a link in the SMS sent so that it
redirects the user to the app
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...journal ijrtem
Sidi Boughaba Lake, part of a wetland complex of Morocco (Ramsar site in 1980) is located on
the Atlantic coast of northwestern Morocco, oriented NNE - SSW and located in an interdunal depression. The
existence of this body of water is due to the fact that the topographic surface is at a lower cost than that of the
piezometric surface of the coastal water table, rainwater and runoff water. The objective of this study is to
determine the physical and chemical characteristics of the waters of this lake. Thus, several water samples were
taken monthly in the period 2016-2017. Parameters such as: temperature, pH, electrical conductivity (EC),
chloride (Cl-
), turbidity (NTU), calcium (Ca2+) and magnesium (Mg2+). The results obtained show that the
distribution of the analyzed elements in Lake waters is quite variable between seasons, as well as between stations.
However, the analysis showed that the studied waters are very mineralized, with an EC between 7 g/l and 14.8
g/l. This mineralization is essentially evaporitic and is controlled by various processes, such as evaporation and
marine influence by aerosol.
The case of a cyclist and tractor traffic accident journal ijrtem
When assessing the cause of a traffic accident, it is also necessary for the technical expert to
take into account the real influences that affect individual participants. This is especially important for accidents
in which one of the participants is cyclist. Technical expert must consider all the circumstances necessary to
assess the cyclist´s behavior. Negligible is not even the age of a cyclist, since in the case of a child or an old man
the driver overtaking bicycle should take this into consideration. The article deals with case of traffic accident
between tractor with the trailer and a bicycle which was riding by cyclist at the age of 80. Apart from the described
procedure by expert in the calculations, the influences on participants' behavior are also discussed
: This paper is aimed at designing a density based dynamic traffic signal system where the timing
of signal will change automatically on sensing the traffic density at any junction using the IoT technology. Traffic
congestion is a severe problem in most cities across the world and therefore it is time to shift more manual mode
or fixed timer mode to an automated system with decision making capabilities. To optimize this problem, we have
made a framework for an intelligent traffic control system. Sometimes higher traffic density at one side of the
junction demands longer green time as compared to standard allotted time. We therefore propose here a
mechanism in which the time period of green light and red light is assigned on the basis of the density of the
traffic present at the time. This is achieved by using LIDAR sensors.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
A Methodology for Extracting Standing Human Bodies from Single Images
1. Invention Journal of Research Technology in Engineering & Management (IJRTEM) ISSN: 2455-3689
www.ijrtem.com ǁ Volume 1 ǁ Issue 8 ǁ
| Volume 1 | Issue 8 | www.ijrtem.com | 10 |
A Methodology for Extracting Standing Human Bodies from Single Images
Dr. Y. Raghavender Rao1
, N. Devadas Naik2
1
Head ECE JNTUHCEJ Jagtityal
2
Asst professor Sri Chaitanya engineering college
Abstract: Extraction of the image of human body in unconstrained still images is challenging due to several factors, including
shading, image noise, occlusions, background clutter, the high degree of human body deformability, and the unrestricted positions due
to in and out of the image plane rotations. we propose a bottom-up approach for human body segmentation in static images. We
decompose the problem into three sequential problems: Face detection, upper body extraction, and lower body extraction, since there
is a direct pair wise correlation among them.
Index Terms: Skin segmentation, Torso, Face recognition, Thresholding, Ethnicity, Morphology.
INTRODUCTION
In this study, we propose a bottom-up approach for human body segmentation in static images. We decompose the problem into three
sequential problems: Face detection, upper body extraction, and lower body extraction, since there is a direct pair wise correlation
among them. Face detection provides a strong indication about the presence of humans in an image, greatly reduces the search space
for the upper body, and provides information about skin color. Face dimensions also aid in determining the dimensions of the rest of
the body, according to anthropometric constraints. This information guides the search for the upper body, which in turns leads the
search for the lower body. Moreover, upper body extraction provides additional information about the position of the hands, the
detection of which is very important for several applications. The basic units upon which calculations are performed are super pixels
from multiple levels of image segmentation. The benefit of this approach is twofold. First, different perceptual groupings reveal more
meaningful relations among pixels and a higher, however, abstract semantic representation. Second, a noise at the pixel level is
suppressed and the region statistics allow for more efficient and robust computations. Instead of relying on pose estimation as an
initial step or making strict pose assumptions, we enforce soft anthropometric constraints to both search a generic pose space and
guide the body segmentation process. An important principle is that body regions should be comprised by segments that appear
strongly inside the hypothesized body regions and weakly in the corresponding background. Without making any assumptions about
the foreground and background, except for the assumptions that sleeves are of similar color to the torso region, and the lower part of
the pants is similar to the upper part of the pants, we structure our searching and extraction algorithm based on the premise that colors
in body regions.
We classify approaches for human body segmentation into the following categories. The first includes interactive methods that expect
user input in order to discriminate the foreground and background. Interactive segmentation methods are useful for generic
applications, and have the potential to produce very accurate results in complex cases. The second category includes top-down
approaches, which are based upon a priori knowledge, and use the image content to further refine an initial model. Top-down
approaches have been proposed as solutions to the problem of segmenting human bodies from static images. The main characteristic
of these approaches is that they require high-level knowledge about the foreground, which in the case of humans is their pose. One
method for object recognition and pose estimation is the pictorial structures (PS) model and its variations. In general, human body
segmentation approaches based on PS models can deal with various poses, but they rely on high-level models that might fail in
complex scenarios, restricting the success of the end results. Besides, high-level inference is time consuming and, thus, these methods
usually are computationally expensive. The object segmentations, where each pixel is labelled with the identifier of a particular object,
were used to create class segmentations, where each pixel is assigned a class label. These were provided to encourage participation
from class-based methods, which output a class label per pixel but which do not output an object identifier, e.g. do not segment
adjacent objects of the same class. Participants’ results were submitted in the form of class segmentations, where the aim is to predict
the correct class label for every pixel not labelled in the ground truth as “void”.
PROPOSED METHOD
2.1 In Thresholding: Pixels are allocated to categories according to the range of values in which a pixel lies. shows boundaries which
were obtained by thresholding the muscle fibres image. Pixels with values less than 128 have been placed in one category, and the rest
have been placed in the other category. The boundaries between adjacent pixels in different categories have been superimposed in
white on the original image. It can be seen that the threshold has successfully segmented the image into the two predominant fiber
types.
2.2 In edge-based segmentation: An edge filter is applied to the image, pixels are classified as edge or non-edge depending on the
filter output, and pixels which are not separated by an edge are allocated to the same category. Fig shows the boundaries of connected
2. A Methodology for Extracting Standing Human Bodies from Single Images
| Volume 1 | Issue 8 | www.ijrtem.com | 11 |
regions after applying Prewitt’s filter and eliminating all non-border segments containing fewer than 500 pixels. (More details will be
given).
2.3 region-based segmentation: Algorithms operate iteratively by grouping together pixels which are neighbors and have similar
values and splitting groups of pixels which are dissimilar in value. The boundaries produced by one such algorithm, based on the
concept of watersheds.
2.3 Skin Color Segmentation: Among various low facial features such as edge, shape, skin color and texture; skin color is prominent
tool for extracting face region due to its fast processing and ease of implementation. Although color processing is advantageous but
sensitive to following conditions which are discussed by Ukil Yan et al.and Nidhi Tiwari et al.:
2.3.1 Illumination conditions: A change in the spectral distribution and the illumination level of light source (indoor, outdoor,
highlights, shadows, color temperature of lights)
2.3.2 Camera characteristics: The color reproduced by a CCD camera is dependent on not only the illumination conditions but also
the spectral sensitivities of a camera sensor.
2.3.3 Ethnicity: Skin color varies according to ethnic groups.
2.3.4 Individual characteristics: Individual characteristics such as age, sex and body parts affect the skin color.
Flow of Proposed Work
The first step of dissertation is to take RGB image as input to system. This image is pre-processed by converting from RGB to
appropriate color models. After this conversion, we have segmented image in two parts as skin region and non skin region by applying
thresholds for each channel of model. The threshold values come from experimentation of histograms. Thus skin region is segmented.
For smooth skin area, morphological operations such as erosion and dilation are used.
The 4-point and 8-point connectivity is checked on white pixels to segment face region from image. To bound face in image with
rectangle, height to width ratio is applied. This ratio avoids false detections. At last, image of face with bounding box is displayed.
Fig. Flow of proposed work
Integration of Color Models Different combinations of chrominance components of most popular color models and their threshold
values which are used for skin segmentation, shown in Table -1 These threshold values are calculated from histogram processing.
3. A Methodology for Extracting Standing Human Bodies from Single Images
| Volume 1 | Issue 8 | www.ijrtem.com | 12 |
3.1 Categories of Segmentation Techniques: Two technique used namely Edge-Based and Region Based Segmentation. Both can be
based on following
3.1.2 Discontinuity: It means to partition an image based on immediate changes in intensity, this includes image segmentation
algorithms like edge detection.
3.1.2 Similarity: It means to partition an image into regions that are similar according to a set of predefined criterion. This includes
image segmentation algorithms like thresholding, region growing, region splitting and merging.
3.2 Edge-Based Segmentation: An edge is a set of connected pixels that is lying on the boundary between two regions that differ in
grey value. The pixels on the edge are called edge point. Edge-Based segmentation is also called as a Boundary based methods. It is
used for finding discontinuities in gray level images. It is the best approach for detecting meaningful discontinuities in the gray level.
Two types of Edge-Based Segmentation may use namely following.
3.2.1 Parallel Edge Detection: In parallel edge detection technique decide of whether or not a set of points are on an edge is
independent. There are different types of parallel differential operators such as first difference operators and the second difference
operator. The key difference between these operators is the weights allocated to each element of the mask.
3.2.2 Sequential Edge Detection: In Sequential edge detection technique, the result at a point is dependent on the result of the before
examined points. The act of a sequential edge detection algorithm will depend on the choice of a good initial point, and it is not easy
to define termination criteria.
3.3 Region-based Segmentation: Region based segmentation techniques split the entire image into sub regions depending on some
rules. Rules like all the pixels must have the same gray level. Region-based segmentation methods attempt to group regions allowing
to common image properties. Edge based methods partition an image based on rapid changes in intensity nearby edges whereas region
based methods, partition an image into regions that are related according to a set of predefined criteria.
3.3.1 Region Growing: Region growing is a procedure that group’s pixels in whole image into sub regions based on predefined
standard. Region Growing is used to group a collection of pixels with related properties form a region.
Fig 3.3 Example of images for a region growing
BLOCK DIAGRAM
We overview the method here for the upper-body case, where there are 6 parts: head, torso, and upper/lower right/left arms. The
method is also applicable to full bodies, as demonstrated.
A recent and successful approach to 2D human tracking in video has been to detect in every frame, so that tracking reduces to
associating the detections. We adopt this approach where detection in each frame proceeds in three stages, followed by a final stage of
transfer and integration of models across frames.
In our case, the task of pose detection is to estimate the parameters of a 2D articulated body model. These parameters are the (x, y)
location of each body part, its orientation θ, and its scale. Assuming a single scale factor for the whole person, shared by all body
parts, the search space has 6 × 3 + 1 = 19 dimensions. Even after taking into account kinematic constraints (e.g. the head must be
connected to the torso), there are still a huge number of possible configurations.
4. A Methodology for Extracting Standing Human Bodies from Single Images
| Volume 1 | Issue 8 | www.ijrtem.com | 13 |
Fig.1 Overview of the methodology
Face detection guides estimation of anthropometric constraints and appearance of skin, while image segmentation provides the
image’s structural blocks. The regions with the best probability of belonging to the upper body are selected and the ones that belong to
the lower body follow.
Approach overview: Since at the beginning we know nothing about the person’s pose, clothing appearance, location and scale in the
image, directly searching the whole space is a time consuming and very fragile operation (there are too many image patches that could
be an arm or a torso!). Therefore, in our approach the first two stages use a weak model of a person obtained through an upper-body
detector generic over pose and appearance. This weak model only determines the approximate location and scale of the person, and
roughly where the torso and head should lie. However, it knows nothing about the arms, and therefore very little about pose. The
purpose of the weak model is to progressively reduce the search space for body parts. The next two stages then switch to a stronger
model, i.e. a pictorial structure describing the spatial configuration of all body parts and their appearance. In the reduced search space,
this stronger model has much better chances of inferring detailed body part positions.
Skin Detection: Among the most prominent obstacles to detecting skin regions in images and video are the skin tone variations due to
illumination and ethnicity, skin-like regions and the fact that limbs often do not contain enough contextual information to discriminate
them easily. In this study, we propose combining the global detection technique with an appearance model created for each face, to
better adapt to the corresponding human’s skin color (Fig. 6.2). The appearance model provides strong discrimination between skin
and skin-like pixels, and segmentation cues are used to create regions of uncertainty. Regions of certainty and uncertainty comprise a
map that guides the Grab Cut algorithm, which in turn outputs the final skin regions. False positives are eliminated using
anthropometric constraints and body connectivity
Fig. Skin detection examples
The adaptive model in general focuses on achieving a high score of true positive cases. However, most of the time it is too “strict” and
suppresses the values of many skin and skin-like pixels that deviate from the true values according to the derived probability
distribution. At this point, we find that an influence of the skin global detection algorithm is beneficial because it aids in recovering
the uncertain areas. Another reason we choose to extend the skin detection process is that relying solely on an appropriate color space
to detect skin pixels is often not sufficient for real-world applications.
5. A Methodology for Extracting Standing Human Bodies from Single Images
| Volume 1 | Issue 8 | www.ijrtem.com | 14 |
Fig. Skin detection algorithm
Fig. Thresholding of the aggregated potential torso images and final upper body mask. Note that the masks in the top row are
discarded.
The obvious step is to threshold the aggregated potential torso images in order to retrieve the upper body mask. In most cases, hands
or arms’ skin is not sampled enough during the torso searching process, especially in the cases, where arms are outstretched. Thus, we
use the skin masks estimated during the skin detection process, which are more accurate than in the case they were retrieved during
this process, since they were calculated using the face’s skin color, in a color space more appropriate for skin and segments created at
a finer level of segmentation. These segments are superimposed on the aggregated potential torso images and receive the highest
potential.
Fig. Example of similarity images for random segments
6. A Methodology for Extracting Standing Human Bodies from Single Images
| Volume 1 | Issue 8 | www.ijrtem.com | 15 |
Fig. Masks used for torso localization
Fig.6.6. Segments with potential of belonging to torso. (a), (b) For segmentation level 1 and 2 and torso mask at 0 ◦. (c), (d) For
segmentation level 1 and 2 and torso mask at 30 ◦. (e) (f) For segmentation level 1 and 2 and torso mask at −30 ◦.
Fig. Example legs mask for φright = 0 and φleft = 0
Fig. Example of foreground/background certainty maps and segmentations for (a) and (b) Grab Cut and (c) and (d) Grow Cut.
7. A Methodology for Extracting Standing Human Bodies from Single Images
| Volume 1 | Issue 8 | www.ijrtem.com | 16 |
SOFTWARE SPECIFICATIONS AND FRAMEWORK
Software Specifications
Operating System : Linux
MAT LAB, C, FORTRAN
RESULTS
Instead of using a simple or even adaptive thresholding, we use a multiple level thresholding to recover the regions with strong
potential according to the method described, but at the same time comply with the following criteria:
1) they form a region size close to the expected torso size (actually bigger in order to allow for the case, where arms are outstretched),
and
2) the outer perimeter of this region overlaps with sufficiently high gradients. The distance of the selected region at threshold t
(Region) to the expected upper body size (Exp Upper Body Size) is calculated as follows:
−| − |
ScoreSize =
where Exp Upper Body Size = 11 × PL2 . The score for the second criterion is calculated by averaging the gradient image (Grad Im)
responses for the pixels that belong to the perimeter (Region) of Region as results. Specifically, we set a final threshold, which allows
only regions that have survived more than 20% of the accumulation process in the final mask for the UBR. This process is performed
for every initial torso hypothesis; therefore, in the end, there are three corresponding aggregate masks, out of which the one that
overlaps the most with the initial torso mask and obtains the highest aggregation score is selected. The aggregation score shows how
many times each pixel has appeared in the accumulation process, implicitly implying its potential of belonging to the true upper body
segment.
CONCLUSION
We presented a novel methodology for extracting human bodies from single images. It is a bottom-up approach that combines
information from multiple levels of segmentation in order to discover salient regions with high potential of belonging to the human
body. The main component of the system is the face detection step, where we estimate the rough location of the body, construct a
rough anthropometric model, and model the skin’s color. Soft anthropometric constraints guide an efficient search for the most visible
body parts, namely the upper and lower body, avoiding the need for strong prior knowledge, such as the pose of the body.
ScoreGrad =
REFERENCES
[1] Solomon, C.J.; Breckon, T.P. Thresholding starts with zero and becomes increasingly stricter at small steps (0.02). In each
thresholding level, the largest connected component is rated, and the masks with Score Grad > 0.05 and Score Size > 0.6 are accumulated to a
refined potential image (see in Fig. 6.8). Incorporation of this a priori knowledge to the thresholding process aids the accentuation of the true
upper body regions (UBR). Accumulation of surviving masks starts when Score Size > 0.6 and resulting masks after this point will keep
getting closer monotonically to the expected region size. Accumulation ends when Score Size drops below 0.6. The rationale behind this
process is to both restrict and define the thresholding range and focus the interest to segments with high potential of forming the upper body
segment. The aggregate mask (Aggregate Mask) can now be processed easily and produce more meaningful (2010). Fundamentals of Digital
Image Processing: A Practical Approach with Examples in Matlab. Wiley-Blackwell. doi: 10.1002/9780470689776. ISBN 0470844736.
[2] Rafael C. Gonzalez; Richard E. Woods; Steven L. Eddins (2004). Digital Image Processing using MATLAB. Pearson Education. ISBN
978-81-7758-898-9.
[3] V. Ferrari, M. Marin-Jimenez, and A. Zisserman, “Progressive search space reduction for human pose estimation,” in Proc. IEEE Conf.
Comput. Vis. Pattern Recog., 2008, pp. 1–8.
[4] M. P. Kumar, A. Zisserman, and P. H. Torr, “Efficient discriminative learning of parts-based models,” in Proc. IEEE 12th Int. Conf.
Comput. Vis., 2009, pp. 552–559.
[5] V. Delaitre, I. Laptev, and J. Sivic, “Recognizing human actions in still images: A study of bag-of-features and part-based representations,” in
Proc. IEEE Brit. Mach. Vis. Conf., 2010.
[6] A. Gupta, A. Kembhavi, and L. S. Davis, “Observing human-object interactions: Using spatial and functional compatibility for recognition,”
IEEE Trans. Pattern Anal. Mach. Intell., vol. 31, no. 10, pp. 1775–1789, Oct. 2009.
[7] B. Yao and L. Fei-Fei, “Grouplet: A structured image representation for recognizing human and object interactions,” in Proc. IEEE Conf.
Comput. Vis. Pattern Recog., 2010, pp. 9–16.
[8] P. Buehler, M. Everingham, D. P. Huttenlocher, and A. Zisserman, “Long term arm and hand tracking for continuous sign language TV
broadcasts,” in Proc. 19th Brit. Mach. Vis. Conf., 2008, pp. 1105–1114.
[9] A. Farhadi and D. Forsyth, “Aligning ASL for statistical translation using a discriminative word model,” in Proc. IEEE Comput. Soc. Conf.
Comput. Vis. Pattern Recog., 2006, pp. 1471– 1476.
[10] L. Zhao and L. S. Davis, “Iterative figure-ground discrimination,” in Proc. 17th Int. Conf. Pattern Recog., 2004, pp. 67–70.
[11] L. Grady, “Random walks for image segmentation,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 11, pp. 1768–1783, Nov. 2006.
[12] C. Rother, V. Kolmogorov, and A. Blake, “Grabcut: Interactive foreground extraction using iterated graph cuts,” ACM Trans. Graph., vol.
23, no. 3, pp. 309–314, Aug. 2004.
8. A Methodology for Extracting Standing Human Bodies from Single Images
| Volume 1 | Issue 8 | www.ijrtem.com | 17 |
[13] V. Gulshan, C. Rother, A. Criminisi, A. Blake, and A. Zisserman, “Geodesic star convexity for interactive image segmentation,” in Proc.
IEEE Conf. Comput. Vis. Pattern Recog., 2010, pp. 3129–3136.
[14] Y. Y. Boykov and M.-P. Jolly, “Interactive graph cuts for optimal boundary & region segmentation of objects in ND images,” in Proc. IEEE
8th Int. Conf. Comput. Vis., 2001, pp. 105–112.
[15] M. P. Kumar, P. H. S. Ton, and A. Zisserman, “Obj cut,” in Proc. IEEE Comput. Soci. Conf. Comput. Vision Pattern Recog., 2005, pp. 18–
25.
[16] S. Li, H. Lu, and L. Zhang, “Arbitrary body segmentation in static images,” Pattern Recog., vol. 45, no. 9, pp. 3402–3413, 2012.
[17] L. Huang, S. Tang, Y. Zhang, S. Lian, and S. Lin, “Robust human body segmentation based on part appearance and spatial constraint,”
Neurocomputing, vol. 118, pp. 191–202, 2013.
[18] P. F. Felzenszwalb and D. P. Huttenlocher, “Pictorial structures for object recognition,” Int. J. Comput. Vis., vol. 61, no. 1, pp. 55–79, 2005.
[19] D. Ramanan, “Learning to parse images of articulated bodies,” Adv. Neur. Inf. Process. Sys., pp. 1129–1136, 2006.
[20] M. Eichner and V. Ferrari, “Better appearance models for pictorial structures,” in Proc. Brit. Mach. Vis. Conf., 2009.
[21] Y. Bo and C. C. Fowlkes, “Shape-based pedestrian parsing,” in Proc. IEEE Int. Conf. Comput. Vis. Pattern Recog., 2011, pp. 2265– 2272.
[22] Z. Hu, G. Wang, X. Lin, and H. Yan, “Recovery of upper body poses in static images based on joints detection,” Pattern Recog. Lett., vol. 30,
no. 5, pp. 503–512, 2009.
[23] J. Malik, S. Belongie, T. Leung, and J. Shi, “Contour and texture analysis for image segmentation,” Int. J. Comput. Vis., vol. 43, no. 1, pp.
7–27, 2001.
[24] M. Yao and H. Lu, “Human body segmentation in a static image with multiscale superpixels,” in Proc. 3rd Int. Conf. Awareness Sci.
Technol., 2011, pp. 32–35.
[25] Y. Hu, “Human body region extraction from photos,” in Proc. Mach. Vis. Appl., 2007, pp. 473–476.