Nowadays, large databases of ornaments of the hand-press period are available and need efficient retrieval tools
for history specialists and general users. This article deals with document images analysis. The purpose of our
work is to automatically determine the letter represented in an ornamental letter image. Our process is divided
into two parts: Wavelet transformation: Segmentation of the ornamental letter followed by a recognition step.
The segmentation process uses multi-resolution analysis to filter background decorations followed by
binarisation and morphologic reconstruction of the expected letter.
Keywords - segmentation, multiresolution analysis, ornemental lettres, Wavelet transform
Image similarity using symbolic representation and its variationssipij
This paper proposes a new method for image/object retrieval. A pre-processing technique is applied to
describe the object, in one dimensional representation, as a pseudo time series. The proposed algorithm
develops the modified versions of the SAX representation: applies an approach called Extended SAX
(ESAX) in order to realize efficient and accurate discovering of important patterns, necessary for retrieving
the most plausible similar objects. Our approach depends upon a table contains the break-points that
divide a Gaussian distribution in an arbitrary number of equiprobable regions. Each breakpoint has more
than one cardinality. A distance measure is used to decide the most plausible matching between strings of
symbolic words. The experimental results have shown that our approach improves detection accuracy.
A comparative analysis of retrieval techniques in content based image retrievalcsandit
Basic group of visual techniques such as color, shape, texture are used in Content Based Image
Retrievals (CBIR) to retrieve query image or sub region of image to find similar images in
image database. To improve query result, relevance feedback is used many times in CBIR to
help user to express their preference and improve query results. In this paper, a new approach
for image retrieval is proposed which is based on the features such as Color Histogram, Eigen
Values and Match Point. Images from various types of database are first identified by using
edge detection techniques .Once the image is identified, then the image is searched in the
particular database, then all related images are displayed. This will save the retrieval time.
Further to retrieve the precise query image, any of the three techniques are used and
comparison is done w.r.t. average retrieval time. Eigen value technique found to be the best as
compared with other two techniques.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
SubGraD- An Approach for Subgraph Detection cscpconf
A new approach of graph matching is introduced in this paper, which efficiently solves the
problem of graph isomorphism and subgraph isomorphism. In this paper we are introducing a
new approach called SubGraD, for query graph detection in source graph. Firstly consider the model graph (query graph) and make the possible sets called model sets starting from the chosen initial node or starter. Similarly, for the source graph (reference graph), all the possible sets called reference sets could be made. Our aim is to make the reference set on the basis of the model set. If it is possible to make the reference set, then it is said that query graph has been detected in the source graph.
Principal Component Analysis (PCA) and LDA PPT SlidesAbhishekKumar4995
Machine learning (ML) technique use for Dimension reduction, feature extraction and analyzing huge amount of data are Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) are easily and interactively explained with scatter plot graph , 2D and 3D projection of Principal components(PCs) for better understanding.
Image similarity using symbolic representation and its variationssipij
This paper proposes a new method for image/object retrieval. A pre-processing technique is applied to
describe the object, in one dimensional representation, as a pseudo time series. The proposed algorithm
develops the modified versions of the SAX representation: applies an approach called Extended SAX
(ESAX) in order to realize efficient and accurate discovering of important patterns, necessary for retrieving
the most plausible similar objects. Our approach depends upon a table contains the break-points that
divide a Gaussian distribution in an arbitrary number of equiprobable regions. Each breakpoint has more
than one cardinality. A distance measure is used to decide the most plausible matching between strings of
symbolic words. The experimental results have shown that our approach improves detection accuracy.
A comparative analysis of retrieval techniques in content based image retrievalcsandit
Basic group of visual techniques such as color, shape, texture are used in Content Based Image
Retrievals (CBIR) to retrieve query image or sub region of image to find similar images in
image database. To improve query result, relevance feedback is used many times in CBIR to
help user to express their preference and improve query results. In this paper, a new approach
for image retrieval is proposed which is based on the features such as Color Histogram, Eigen
Values and Match Point. Images from various types of database are first identified by using
edge detection techniques .Once the image is identified, then the image is searched in the
particular database, then all related images are displayed. This will save the retrieval time.
Further to retrieve the precise query image, any of the three techniques are used and
comparison is done w.r.t. average retrieval time. Eigen value technique found to be the best as
compared with other two techniques.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
SubGraD- An Approach for Subgraph Detection cscpconf
A new approach of graph matching is introduced in this paper, which efficiently solves the
problem of graph isomorphism and subgraph isomorphism. In this paper we are introducing a
new approach called SubGraD, for query graph detection in source graph. Firstly consider the model graph (query graph) and make the possible sets called model sets starting from the chosen initial node or starter. Similarly, for the source graph (reference graph), all the possible sets called reference sets could be made. Our aim is to make the reference set on the basis of the model set. If it is possible to make the reference set, then it is said that query graph has been detected in the source graph.
Principal Component Analysis (PCA) and LDA PPT SlidesAbhishekKumar4995
Machine learning (ML) technique use for Dimension reduction, feature extraction and analyzing huge amount of data are Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) are easily and interactively explained with scatter plot graph , 2D and 3D projection of Principal components(PCs) for better understanding.
A Novel Super Resolution Algorithm Using Interpolation and LWT Based Denoisin...CSCJournals
Image capturing technique has some limitations and due to that we often get low resolution(LR) images. Super Resolution(SR) is a process by which we can generate High Resolution(HR) image from one or more LR images. Here we have proposed one SR algorithm which take three shifted and noisy LR images and generate HR image using Lifting Wavelet Transform(LWT) based denoising method and Directional Filtering and Data Fusion based Edge-Guided Interpolation Algorithm.
Comparison of various Image Registration Techniques with the Proposed Hybrid ...idescitation
Image Registration is termed as the method to
transform different forms of image data into one coordinate
system. Registration is a important part in image processing
which is used for matching the pictures which are obtained at
different time intervals or from various sensors. A broad range
of registration techniques have been developed for the various
types of image data. These techniques are independently
studied for many applications resulting in the large body of
result. Vision is the most advanced of human sensors, so
naturally images play one of the most important roles in
human perception. Image registration is one of the branches
encompassed by the diverse field of digital image processing.
Due to its importance in many application areas as well as
since its nature is complicated; image registration is now the
topic of much recent research. Registration algorithms tend
to compute transformations to set correspondence betweenthe two images. In this paper the survey is done on various
image registration techniques. Also the different techniques
are compared with the proposed system of the projec
Introducing the Concept of Back-Inking as an Efficient Model for Document Ret...IJITCA Journal
Today, many institutions and organizations are facing serious problem due to the tremendously increasing
size of documents, and this problem is further triggering the storage and retrieval problems due to the
continuously growing space and efficiency requirements. This problem is becoming more complex with
time and the increase in the size and number of documents in an organization. Therefore, there is a
growing demand to address this problem. This demand and challenge can be met by developing a
technique to enable specialized document imaging people to use when there is a need for storing
documents images. Thus, we need special and efficient storage techniques for this type of information
storage (IS) systems.
In this paper, we present an efficient storage technique for electronic documents. The proposed technique
uses the Information Pixels concept to make the technique more efficient for certain image formats. In
addition, we shall see how Storing Information Pixels Addresses ( SIPA ) method is an efficient method for
document storage and as a result makes the document image storage relatively efficient for most image
formats.
Dimensionality Reduction and Feature Selection Methods for Script Identificat...ITIIIndustries
The goal of this research is to explore effects of dimensionality reduction and feature selection on the problem of script identification from images of printed documents. The kadjacent segment is ideal for this use due to its ability to capture visual patterns. We have used principle component analysis to reduce the size of our feature matrix to a handier size that can be trained easily, and experimented by including varying combinations of dimensions of the super feature set. A modular
approach in neural network was used to classify 7 languages – Arabic, Chinese, English, Japanese, Tamil, Thai and Korean.
Review of ocr techniques used in automatic mail sorting of postal envelopessipij
This paper presents a review of various OCR techniq
ues used in the automatic mail sorting process. A
complete description on various existing methods fo
r address block extraction and digit recognition th
at
were used in the literature is discussed. The objec
tive of this study is to provide a complete overvie
w about
the methods and techniques used by many researchers
for automating the mail sorting process in postal
service in various countries. The significance of Z
ip code or Pincode recognition is discussed.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformIJERA Editor
In this paper, radix-3 algorithm for computation of type-II discrete sine transform (DST-II) of length N =
3𝑚 (𝑚 = 1,2, … . ) is presented. The DST-II of length N can be realized from three DST-II sequences, each of
length N/3. A block diagram of for computation of the radix-3 DST-II algorithm is given. Signal flow graph for
DST-II of length 𝑁 = 32 is shown to clarify the proposed algorithm.
Modification on Energy Efficient Design of DVB-T2 Constellation De-mapperIJERA Editor
The second generation of terrestrial digital video broadcasting standard (DVB-T2) offers several advantages for greater efficiency. Signal Space Diversity (SSD) contains rotated constellation and Q-Delay (RQD), which is one of advantage that offered to improve the performance over fading channels compared to the non-rotated modulation. In this journal, the proposed low-power de-mapper design of this work attempts to employ the introduced SSD to reduce power through replacing LLR calculations by a significantly less complex projection-based de-mapping whenever possible. It benefits from an algorithm that applies projection-based de-mapping to significantly reduce LLR computations without deteriorating performance. Two versions are introduced for hard de-mapping and soft de-mapping. The design uses several techniques simultaneously to be even more energy efficient without affecting the performance. Prototype results indicate significant reduction of LLR calculations as Eb/N0 increases with no performance degradation. The idea and energy saving techniques can be easily applied to any rotated constellation de-mapper.
A Novel Super Resolution Algorithm Using Interpolation and LWT Based Denoisin...CSCJournals
Image capturing technique has some limitations and due to that we often get low resolution(LR) images. Super Resolution(SR) is a process by which we can generate High Resolution(HR) image from one or more LR images. Here we have proposed one SR algorithm which take three shifted and noisy LR images and generate HR image using Lifting Wavelet Transform(LWT) based denoising method and Directional Filtering and Data Fusion based Edge-Guided Interpolation Algorithm.
Comparison of various Image Registration Techniques with the Proposed Hybrid ...idescitation
Image Registration is termed as the method to
transform different forms of image data into one coordinate
system. Registration is a important part in image processing
which is used for matching the pictures which are obtained at
different time intervals or from various sensors. A broad range
of registration techniques have been developed for the various
types of image data. These techniques are independently
studied for many applications resulting in the large body of
result. Vision is the most advanced of human sensors, so
naturally images play one of the most important roles in
human perception. Image registration is one of the branches
encompassed by the diverse field of digital image processing.
Due to its importance in many application areas as well as
since its nature is complicated; image registration is now the
topic of much recent research. Registration algorithms tend
to compute transformations to set correspondence betweenthe two images. In this paper the survey is done on various
image registration techniques. Also the different techniques
are compared with the proposed system of the projec
Introducing the Concept of Back-Inking as an Efficient Model for Document Ret...IJITCA Journal
Today, many institutions and organizations are facing serious problem due to the tremendously increasing
size of documents, and this problem is further triggering the storage and retrieval problems due to the
continuously growing space and efficiency requirements. This problem is becoming more complex with
time and the increase in the size and number of documents in an organization. Therefore, there is a
growing demand to address this problem. This demand and challenge can be met by developing a
technique to enable specialized document imaging people to use when there is a need for storing
documents images. Thus, we need special and efficient storage techniques for this type of information
storage (IS) systems.
In this paper, we present an efficient storage technique for electronic documents. The proposed technique
uses the Information Pixels concept to make the technique more efficient for certain image formats. In
addition, we shall see how Storing Information Pixels Addresses ( SIPA ) method is an efficient method for
document storage and as a result makes the document image storage relatively efficient for most image
formats.
Dimensionality Reduction and Feature Selection Methods for Script Identificat...ITIIIndustries
The goal of this research is to explore effects of dimensionality reduction and feature selection on the problem of script identification from images of printed documents. The kadjacent segment is ideal for this use due to its ability to capture visual patterns. We have used principle component analysis to reduce the size of our feature matrix to a handier size that can be trained easily, and experimented by including varying combinations of dimensions of the super feature set. A modular
approach in neural network was used to classify 7 languages – Arabic, Chinese, English, Japanese, Tamil, Thai and Korean.
Review of ocr techniques used in automatic mail sorting of postal envelopessipij
This paper presents a review of various OCR techniq
ues used in the automatic mail sorting process. A
complete description on various existing methods fo
r address block extraction and digit recognition th
at
were used in the literature is discussed. The objec
tive of this study is to provide a complete overvie
w about
the methods and techniques used by many researchers
for automating the mail sorting process in postal
service in various countries. The significance of Z
ip code or Pincode recognition is discussed.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformIJERA Editor
In this paper, radix-3 algorithm for computation of type-II discrete sine transform (DST-II) of length N =
3𝑚 (𝑚 = 1,2, … . ) is presented. The DST-II of length N can be realized from three DST-II sequences, each of
length N/3. A block diagram of for computation of the radix-3 DST-II algorithm is given. Signal flow graph for
DST-II of length 𝑁 = 32 is shown to clarify the proposed algorithm.
Modification on Energy Efficient Design of DVB-T2 Constellation De-mapperIJERA Editor
The second generation of terrestrial digital video broadcasting standard (DVB-T2) offers several advantages for greater efficiency. Signal Space Diversity (SSD) contains rotated constellation and Q-Delay (RQD), which is one of advantage that offered to improve the performance over fading channels compared to the non-rotated modulation. In this journal, the proposed low-power de-mapper design of this work attempts to employ the introduced SSD to reduce power through replacing LLR calculations by a significantly less complex projection-based de-mapping whenever possible. It benefits from an algorithm that applies projection-based de-mapping to significantly reduce LLR computations without deteriorating performance. Two versions are introduced for hard de-mapping and soft de-mapping. The design uses several techniques simultaneously to be even more energy efficient without affecting the performance. Prototype results indicate significant reduction of LLR calculations as Eb/N0 increases with no performance degradation. The idea and energy saving techniques can be easily applied to any rotated constellation de-mapper.
Presented by Nicolai Zarganis, Head of Division, Danish Energy Authority, denmark, at the IEA DSM Programme workshop in Copenhagen, Denmark on 19 April 2006.
내가 뽀로로를 아이들에게 추천하는 이유 (Pororo is good for your children.)TAEHOON_KIM_KOREA
필자는 개인적으로 아이들에게 기왕 애니메이션을 보여준다면 뽀로로를 보여주는 것을 추천한다.
뽀로로가 왜 이렇게 아이들을 사로잡았으며, 왜 아이들에게 보여주어도 좋을 콘텐츠로 생각하는지 간단하게 이미지로 담아보았다.
This slide is about 'Why is Pororo good for your children' written in Korean.
Planeación de actividades secuenciadas que potencien o fortalezcan la comunicación en un contexto que presenta dificultad en los procesos comunicativos asociados con alguna discapacidad.
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...IJERA Editor
In this paper, radix-2 algorithms for computation of type-II discrete sine transform (DST-II) and type-IV
discrete sine transform (DST-IV), each of length 2 ( 2,3,.....)
m
N m , are presented. The odd-indexed
output components of DST-II can be realized using simple recursive relations. The recursive algorithms are
appropriate for VLSI implementation. The DST-IV of length N can be computed from type-II discrete cosine
transform (DCT-II) and DST-II sequences, each of length N/2.
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...IJERA Editor
The Mobility in wireless cellular communication systems is its backbone so as to enhance the quality of service and maintain the continuous service. Handoff is an important task in maintaining the continuity of call in cellular systems and its failure can result in ongoing call termination. In cellular mobile networks, the coverage region is divided into smaller cells in order to achieve high system capacity. Each cell has a Base-Station (BS), which provides the service to the Mobile Terminals (MTs), i.e. users equipped with phones, within its region. Before a mobile user can communicate with other user(s) in the network, a group of the frequency bands or channels should usually be assigned. The MTs is free to move across cells. When the mobile user crossing a cell boundary or by deterioration in quality of the signal in the current channel, handoff process is initiated. The scope of this project is to design 802.11 handoff schemes to solve the handoff problems in closely-spaced WLANs.The major problem in multiple WLANs are so many users trying to use same access point(AP), and interferences from nearby WLAN. The better hand off scheme based on signal strength and velocity of the nodes is proposed. The simulation results show that the proposed handoff scheme significantly reduces packet losses compared with existing handoff schemes.
A Systematic Approach to Improve BOC Power Spectrum for GNSSIJERA Editor
An analysis of digital Phase-modulated signals is performed based on frequency spectrum which consists of a continuous and a number of discrete components at multiples of clock frequencies. The analysis shows that these components depend on the pulse shape function of multi-level digital signals to be phase modulated. In this paper, the effect of duty cycle, rise and fall times of these multi-level digital signals, on the frequency spectrum is studied. It is observed that the duty cycle variation of 10% results 30 dB increase in undesired component and the 10% increase in rise & fall times increase the power of undesired component by 12 dB. The theoretical observations of the effects are applied on the Binary Offset Carrier (BOC) modulated signals as a case study, to discuss their effects in Global Navigation Satellite Systems (GNSS).
A Low Phase Noise CMOS Quadrature Voltage Control Oscillator Using Clock Gate...IJERA Editor
This project presents the low phase noise cmos quadrature voltage control oscillator using clock gating technique. Here the colpitts vco is used to split the capacitance in the Qvco circuit producing quadrature output. The startup condition in the oscillator is improved by using 𝐺𝑚enhancement [12].This QVCO performs the operation anti phase injection locking fordevice reuse [8]. The new clock gating technique is used to reduce the power with thepower supply 1.5v. The QVCO uses a 0.5m𝐴with phase error of 0.4𝑜and exhibits a phase noise of -118dBc/HZ at 1MHZ offset at the centre frequency of 500MHZ.
Intensify Denoisy Image Using Adaptive Multiscale Product ThresholdingIJERA Editor
This Paper presents a wavelet-based multiscale products thresholding scheme for noise suppression of magnetic resonance images. This paper proposed a method based on image de-noising and edge enhancement of noisy multidimensional imaging data sets. Medical images are generally suffered from signal dependent noises i.e. speckle noise and broken edges. Most of the noises signals appear from machine and environment generally not contribute to the tissue differentiation. But, the noise generated due to above mentioned reason causes a grainy appearance on the image, hence image enhancement is required. For the intent of image denoising, Adaptive Multiscale Product Thresholding based on 2-D wavelet transform is used. In this method, contiguous wavelet sub bands are multiplied to improve edge structure while reducing noise. In multiscale products, boundaries can be successfully distinguished from noise. Adaptive threshold is designed and forced on multiscale products as an alternative of wavelet coefficients or recognize important features. For the edge enhancement. Canny Edge Detection Algorithm is used with scale multiplication technique. Simulation results shows that the planned technique better suppress the Poisson noise among several noises i.e. salt & pepper, speckle noise and random noise. The Performance of Image Intesification can be estimate by means of PSNR, MSE.
Modeling and Analysis of Bracket Assembly in Aerospace IndustryIJERA Editor
This project deals with the Model and static Analysis of Bracket assembly used in Aerospace Industry. This bracket assembly is used for placing components for various purposes like carrying fuel and air. The mounting bracket assembly consists of a circular plate with nine lugs for which three different tanks are mounted. The individual components i.e., circular plate, lugs etc are modeled and assembled through NX-CAD Software.The loads are transferred by the tanks to the bracket are considered as pressure loads. To reveal the stresses induced due to pressure loads, Finite Element (FE) Analysis is performed with the help of ANSYS. Then the occurrence of max stress is found and factor of safety is calculated. This project provides a methodology for analysis of an assembly consisting of components made of composite materials and metal components.
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...sipij
This paper focuses on improved edge model based on Curvelet coefficients analysis. Curvelet transform is
a powerful tool for multiresolution representation of object with anisotropic edge. Curvelet coefficients
contributions have been analyzed using Scale Invariant Feature Transform (SIFT), commonly used to study
local structure in images. The permutation of Curvelet coefficients from original image and edges image
obtained from gradient operator is used to improve original edges. Experimental results show that this
method brings out details on edges when the decomposition scale increases.
OTSU Thresholding Method for Flower Image Segmentationijceronline
Segmentation is basic process in image processing. It always produces an effective result for next process. In this paper, we proposed the flower image segmentation. Oxford flower collection is used for segmentation.Different segmentation techniques are available. Different techniques and algorithm are developed to describe the segmentation.We proposed a OTSU thresholding technique for flower image segmentation in this paper. which gives good result as compared with the other methods and simple also.Segmentation subdivide the image into different parts.firstly, segmentation techniques and then otsu thresholding method described in this paper.CIE L*a*b color space is used in thresholding for better results.Thresholding apply seperatly on each L, a and b component. accordingly the features can be extracted like shape, color, texture etc. finally, results with the flower images are shown.
REMOVING OCCLUSION IN IMAGES USING SPARSE PROCESSING AND TEXTURE SYNTHESISIJCSEA Journal
We provide a solution to problem of occlusion in images by removing the occluding region and filling in the gap left behind. Inpainting algorithms fail in filling occlusions when the occluding region is large since there is loss of both structure and texture. We decompose the image into structure and texture images using a decomposition method based on sparseness of the image. The sparse reconstruction of the decomposed images result in an inpainted image with all the structures made intact. A texture synthesis is performed on the texture only image. Finally the structure and texture images are combined to get an image where the occlusion is filled. The performance of our algorithm in terms of visual effectiveness is compared with other algorithms used for inpainting.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
In this paper, the use of Multi-Layer Perceptron (MLP) Neural Network model is proposed for recognizing
unconstrained offline handwritten Numeral strings. The Numeral strings are segmented and isolated
numerals are obtained using a connected component labeling (CCL) algorithm approach. The structural
part of the models has been modeled using a Multilayer Perceptron Neural Network. This paper also
presents a new technique to remove slope and slant from handwritten numeral string and to normalize the
size of text images and classify with supervised learning methods. Experimental results on a database of
102 numeral string patterns written by 3 different people show that a recognition rate of 99.7% is obtained
on independent digits contained in the numeral string of digits includes both the skewed and slant data.
Hierarchical Approach for Total Variation Digital Image InpaintingIJCSEA Journal
The art of recovering an image from damage in an undetectable form is known as inpainting. The manual work of inpainting is most often a very time consum ing process. Due to digitalization of this technique, it is automatic and faster. In this paper, after the user selects the regions to be reconstructed, the algorithm automatically reconstruct the lost regions with the help of the information surrounding them. The existing methods perform very well when the region to be reconstructed is very small, but fails in proper reconstruction as the area increases. This paper describes a Hierarchical method by which the area to be inpainted is reduced in multiple levels and Total Variation(TV) method is used to inpaint in each level. This algorithm gives better performance when compared with other existing algorithms such as nearest neighbor interpolation, Inpainting through Blurring and Sobolev Inpainting.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Low Memory Low Complexity Image Compression Using HSSPIHT EncoderIJERA Editor
Due to the large requirement for memory and the high complexity of computation, JPEG2000 cannot be used in
many conditions especially in the memory constraint equipment. The line-based W avelet transform was
proposed and accepted because lower memory is required without affecting the result of W avelet transform, In
this paper, the improved lifting schem e is introduced to perform W avelet transform to replace Mallat method
that is used in the original line-based wavelet transform. In this a three-adder unit is adopted to realize lifting
scheme. It can perform wavelet transform with less computation and reduce memory than Mallat algorithm. The
corresponding HS_SPIHT coding is designed here so that the proposed algorithm is more suitable for
equipment. W e proposed a highly scale image compression scheme based on the Set Partitioning in
Hierarchical Trees (SPIHT) algorithm. Our algorithm, called Highly Scalable SPIHT (HS_SPIHT), supports
High Compression efficiency, spatial and SNR scalability and provides l bit stream that can be easily adapted to
give bandwidth and resolution requirements by a simple transcoder (parse). The HS_SPIHT algorithm adds
the spatial scalability feature without sacrificing the S NR embeddedness property as found in the original
SPIHT bit stream. Highly scalable image compression scheme based on the SPIHT algorithm the proposed
algorithm used, highly scalable SPIHT (HS_SPIHT) Algorithm, adds the spatial scalability feature to the SPIHT
algorithm through the introduction of multiple resolution dependent lists and a resolution-dependent sorting
pass. SPIHT keeps the import features of the original SPIHT algorithm such as compression efficiency, full
SNR Scalability and low complexity.
Enhancement and Segmentation of Historical Recordscsandit
Document Analysis and Recognition (DAR) aims to extract automatically the information in the document and also addresses to human comprehension. The automatic processing of degraded
historical documents are applications of document image analysis field which is confronted with many difficulties due to the storage condition and the complexity of the script. The main interest
of enhancement of historical documents is to remove undesirable statistics that appear in the
background and highlight the foreground, so as to enable automatic recognition of documents
with high accuracy. This paper addresses pre-processing and segmentation of ancient scripts, as an initial step to automate the task of an epigraphist in reading and deciphering inscriptions.
Pre-processing involves, enhancement of degraded ancient document images which is achieved through four different Spatial filtering methods for smoothing or sharpening namely Median,
Gaussian blur, Mean and Bilateral filter, with different mask sizes. This is followed by
binarization of the enhanced image to highlight the foreground information, using Otsu
thresholding algorithm. In the second phase Segmentation is carried out using Drop Fall and
WaterReservoir approaches, to obtain sampled characters, which can be used in later stages of
OCR. The system showed good results when tested on the nearly 150 samples of varying
degraded epigraphic images and works well giving better enhanced output for, 4x4 mask size
for Median filter, 2x2 mask size for Gaussian blur, 4x4 mask size for Mean and Bilateral filter.
The system can effectively sample characters from enhanced images, giving a segmentation rate of 85%-90% for Drop Fall and 85%-90% for Water Reservoir techniques respectively
Denoising and Edge Detection Using SobelmethodIJMER
The main aim of our study is to detect edges in the image without any noise , In many of the images edges carry important information of the image, this paper presents a method which consists of sobel operator and discrete wavelet de-noising to do edge detection on images which include white Gaussian noises. There were so many methods for the edge detection, sobel is the one of the method, by using this sobel operator or median filtering, salt and pepper noise cannot be removed properly, so firstly we use complex wavelet to remove noise and sobel operator is used to do edge detection on the image. Through the pictures obtained by the experiment, we can observe that compared to other methods, the method has more obvious effect on edge detection.
Fast Segmentation of Sub-cellular OrganellesCSCJournals
Segmentation and counting sub-cellular structure is a very challenging problem even for medical experts. A fast and efficient method for segmentation and counting of sub-cellular structure is proposed. The proposed method uses a hybrid combination of several image processing techniques and is effective in segmenting the sub-cellular structures in a fast and effective manner.
1. L. Alnufaie Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part -1) June 2015, pp.01-03
www.ijera.com 1 | P a g e
Extract the ancient letters from decorated
L. Alnufaie*
*(Collage of Engineering, Shaqra University,Kingdom of Saudi Arabia, Al Dawadmi)
ABSTRACT
Nowadays, large databases of ornaments of the hand-press period are available and need efficient retrieval tools
for history specialists and general users. This article deals with document images analysis. The purpose of our
work is to automatically determine the letter represented in an ornamental letter image. Our process is divided
into two parts: Wavelet transformation: Segmentation of the ornamental letter followed by a recognition step.
The segmentation process uses multi-resolution analysis to filter background decorations followed by
binarisation and morphologic reconstruction of the expected letter.
Keywords - segmentation, multiresolution analysis, ornemental lettres, Wavelet transform
I. INTRODUCTION
Nowadays, cultural heritage preservation is a
very important task for every nation in order to save
knowledge and literature for future generations.
Ancient books from the hand-press period often have
beautiful page layouts because books were precious
and rare things at that time. Ornamental letters (or
decorated initials) were used to start new chapters for
illustrating the content of it. On the web, many
databases of ornamental letter images are available
for online search. Efficient tools are needed to
browse these databases. Figure 1 shows several
ornamental letters images out of the BVH database.
Figure 1: Examples of ornamental letters
II. WAVELET TRANSFORM
The most important feature of wavelet
transformation is that it allows multi-resolution
decomposition. An image that is decomposed by
wavelet transformation could be reconstructed with
desired resolution. The procedure for this is that low
and high pass filters are chosen, such that they
exactly halve the frequency range between
themselves. This filter pair is called the “Analysis
Filter pair”. First of all, the low pass filter is applied
for each row of data, then, we obtain low frequency
components of the row. As the LPF is a half band
filter, the output data consists of frequencies only in
the first half of the original frequency range.
According to Shannon's Sampling Theorem, they can
be sub-sampled by two, so that the output data
contains only half the original number of samples.
Similarly, the high pass filter is applied for the same
row of data, then, the high pass components are
separated and placed by the side of the low pass
components. This procedure is done for all rows.
Channel 2 Channel 3
Figure 2: example Segmentation of the initials
In order to obtain a good segmentation, the
background information should be removed from the
ornamental letter image. The idea of this work is to
use multi-resolution analysis as a tool to remove
small details of the image, in order to keep the shape
of the letter for processing. The principle of our
method is proposed in figure 2, figure 3. and figure 4
It starts with the original image and ends with
segmentation result that shows a better representation
of the letter.
Figure 3: principle of our system
RESEARCH ARTICLE OPEN ACCESS
2. L. Alnufaie Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part -1) June 2015, pp.01-03
www.ijera.com 2 | P a g e
Our method uses an integer lifting scheme
algorithm to decompose the original image (defined
at scale s = 0) at multiple scales. This method was
proposed by Calderbank at al. The Haar wavelets S-
transform was used in our method at scale s = 1
because it is easy to compute and sufficient for
cutting unimportant details of the background of the
ornamental letter image. After this lifting scheme
decomposition, details are set to zero value and the
approximation of the obtained image is used alone
for reconstruction at scale s = 0 (original size of the
ornamental letter image). An example of this process
is proposed on Figure 4.
Figure 4: Principal of our work and simulation
III. BINARIZATION
The aim of binarization is to keep most of the
letter pixels while removing most of the decoration
pixels. Thanks to the Otsu algorithm. Under the
hypothesis that the image histogram can be expressed
as the sum of two Gaussians, the histogram is divided
in two classes. The inter-class variance is then
minimized. An example of the Otsu thresholding is
given in figure 5. the raw Otsu binarization keeps too
much pixels in the decoration area. We thus modify
the algorithm in order to “o” set the threshold. The
“o” set T is a relative value computed as follows :
Figure 5: An original image, its integer lifting
Scheme decomposition at s=2 and the reconstructed
image without details at scale s=0.
IV. WORK AND SIMULATIONS
We have reproduced the histogram and we chose
several different levels to find what threshold shift
allowed good Cleaning without losing a piece of the
letter, for channel 2 and for channel 3. The ideal is to
find a common threshold (seuil) shift all treated
initials. A histogram is a statistical graph to represent
the distribution of the pixel intensities of an image,
that is to say the number of pixels for each
lightintensity. By convention, a histogram represents
the level of intensity x-axis going from darker (left)
to lightest (right).Thus the histogram of an image in
256 gray levels is represented by a graph 256 having
abscissa values, and the number of pixels Image
ordinate. Take for example the following image to
grayscale. This drop cap to the low gray level has the
following characteristics:
- The chain 2: if the difference is less than 60%,
there are still tasks white visible then enough for a
80% offset, tasks are longer present but a part of the
letter C as. The ideal shift seems be a value between
50% and 60% as white spots are almost non-existent
and the letter C is almost intact. For channel 3:
whatever the shift, there is no white spots but the
letter C is not completely reformed. For the most
threshold shift low (40%), it was the best obtaining
latter C.
Figure 6: latter (C) with histogram
A histogram is a statistical graph to represent the
distribution of the pixel intensities of an image, that
is to say the number of pixels for each light intensity.
By convention, a histogram represents the level of
intensity x-axis going from darker (left) to lightest
(right).The histogram of an image in 256 gray levels
is represented by a graph 256 having abscissa values,
and the number of pixels Image ordinate. Take for
example the following image to grayscale Figure 6.
This drop cap to the low gray level has the following
characteristics:
-for the chain 2: if the difference is less than 60%,
there are still tasks white visible then enough for a
80% offset, tasks are longer present but a part of the
letter C .
The ideal shift seems to be a value between 50%
and 60% as white spots are almost non-existent and
the letter C is almost intact, Table Results of
Channel 2, Channel 3
- For channel 3: whatever the shift, there is no
white spots but the letter C is not completely
reformed. For the most threshold shift low (40%), it
was the best obtaining C.
3. L. Alnufaie Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part -1) June 2015, pp.01-03
www.ijera.com 3 | P a g e
Table: Results of Channel 2, Channel 3
Shift of
Seuil
Value of
Seuil
channel 2 channel 3
40% 205
50% 213
60% 221
70% 229
80% 237
V. CONCLUSION
In this article, an original method segmentation
method for ornamental lettershas been proposed. This
method consists in a coarse to fine segmentation with
progressive improvements. The atomic step of the
process is composed of a modified Otsu binarization,
followed by a selection of the biggest onnected
component. This image represents the seed of a
morphological reconstruction. Our multiresolution
approach offers a very good separation of letter
information and decoration information. The Results
are very good even on difficult images composed of
many decorations of various sizes which are the most
difficult images to process in such kind of image
analysis problems.
REFERENCES
[1] J. Zhang and J. Hu, Image, Segmentation
Based on 2D Otsu Method with Histogram
Analysis, International Conference on
Computer Science and Software
Engineering, IEEE 2008.
[2] W. Hongzhi and D. Ying, An Improved
Image Segmentation Algorithm Based on
Otsu Method, International Symposium on
Photoelectronic Detection and Imaging
2007, Related Technologies and
Applications, ( 6625), 2008.
[3] J. Roerdink and Arnold Meijster, The
Watershed Transform: De_nitions,
Algorithms and Parallelization Strategies
Fundamenta Informaticae (IOS Press, 2001).
[4] R. Gonzalez and R. Woods, Digital Image
Processing, (Third edition, PHI publication,
2008).
[5] J.-Y. Ramel and S. Leriche. Segmentation
en analyse interactives de documents
anciens imprimés. Traitement du Signal,
22(3),2005, 209–222
[6] S. Uttama, J.-M. Ogier, and P. Loonis, Top-
down segmentation of ancient graphical
drop caps, lettrines, In Proceedings of 6th
IAPR International Workshop on Graphics
Recognition, HongKong, pages 87–96,
August 2005.
[7] E. Baudrier, F. Nicolier, G. Millon, and S.
Ruan. Binaryimage comparison with local-
dissimilarity quantification.Pattern
Recognition, 41(5), 2008, 1461–1478,.
[8] K. Ersahin, I. Cumming, and R. Ward,
Segmentation and classification of
polarimetric SAR data using spectral graph
partitioning, IEEE Trans. Geos. Remote
Sens, 48(1), 2010, 164-174
[9] N. Senthilkumaran and R. Rajesh, Edge
Detection Techniques for Image
Segmentation – A Survey of Soft Computing
Approaches, International Journal of Recent
Trends in Engineering, 2(1), 2009.
[10] J.-M. Ogier and K. Tombre. Madonne,
Document image analysis techniques for
cultural heritage documents. In International
Conference on Digital Cultural Heritage,
2006.
[11] J. Ramel, S. Leriche, M.-L. Demonet, and S.
Busson. Userdriven page layout analysis of
historical printed books. International
Journal on Document Analysis and
Recognition (IJDAR), 9(2–4), 2007, 243–
267.
[12] N. Salman, Image Segmentation Based on
Watershed and Edge Detection Techniques,
The International Arab Journal of
Information Technology, 2(3), 2006.
[13] I. Patel and S. Garg, Robust Face Detection
using Fusion of Haar and Daubechies
Orthogonal Wavelet Template, International
Journal of Computer Applications, 46(6),
2012,38-44.
[14] I. Patel and R. Patel,Robust Face
Recognition Using Distance Matrice,
International Journal of Computer and
Electrical Engineering, 5( 4), 2013, 401-
404.
[15] D. Saraf, D. Sisodia, A. Sinhal and N. Gupta
, Comparisons of wavelets based image
compression methods, World Journal of
Science and Technology, 2(3)2012, 2231 –
2587