Abstract In this paper, we consider the Interactive image segmentation with multiple user inputs. The proposed system is the use of multiple intuitive user inputs to better reflect the user’s intention. The use of multiple types of intuitive inputs provides the user’s intention under different scenario. The proposed method is developed as a combined segmentation and editing tool. It incorporates a simple user interface and a fast and reliable segmentation based on 1D segment matching. The user is required to click just a few "control points" on the desired object border, and let the algorithm complete the rest. The user can then edit the result by adding, removing and moving control points, where each interaction follows by an automatic, real-time segmentation by the algorithm. Interactive image segmentation involves a proposed algorithm, Constrained Random walks algorithm. The Constrained Random Walks algorithm facilitates the use of three types of user inputs. 1. Foreground and Background seed input 2. Soft Constraint input 3. Hard Constraint input. The effectiveness of the proposed method is validated by experimental results. The proposed algorithm is algorithmically simple, efficient and less time consuming. Keywords: Interactive image segmentation, Interactive image segmentation, digital image editing, multiple user inputs, random walks algorithm.
Implementation of Face Recognition in Cloud Vision Using Eigen FacesIJERA Editor
Cloud computing comes in several different forms and this article documents how service, Face is a complex multidimensional visual model and developing a computational model for face recognition is difficult. The papers discuss a methodology for face recognition based on information theory approach of coding and decoding the face image. Proposed System is connection of two stages – Feature extraction using principle component analysis and recognition using the back propagation Network. This paper also discusses our work with the design and implementation of face recognition applications using our mobile-cloudlet-cloud architecture named MOCHA and its initial performance results. The dispute lies with how to performance task partitioning from mobile devices to cloud and distribute compute load among cloud servers to minimize the response time given diverse communication latencies and server compute powers
A novel approach for performance parameter estimation of face recognition bas...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Face Recognition Based Intelligent Door Control Systemijtsrd
This paper presents the intelligent door control system based on face detection and recognition. This system can avoid the need to control by persons with the use of keys, security cards, password or pattern to open the door. The main objective is to develop a simple and fast recognition system for personal identification and face recognition to provide the security system. Face is a complex multidimensional structure and needs good computing techniques for recognition. The system is composed of two main parts face recognition and automatic door access control. It needs to detect the face before recognizing the face of the person. In face detection step, Viola Jones face detection algorithm is applied to detect the human face. Face recognition is implemented by using the Principal Component Analysis PCA and Neural Network. Image processing toolbox which is in MATLAB 2013a is used for the recognition process in this research. The PIC microcontroller is used to automatic door access control system by programming MikroC language. The door is opened automatically for the known person according to the result of verification in the MATLAB. On the other hand, the door remains closed for the unknown person. San San Naing | Thiri Oo Kywe | Ni Ni San Hlaing ""Face Recognition Based Intelligent Door Control System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23893.pdf
Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/23893/face-recognition-based-intelligent-door-control-system/san-san-naing
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
Biometric matching involves finding similarity between fingerprint images.The accuracy and speed of the
matching algorithmdetermines its effectives. This researchaims at comparing two types of matching
algorithms namely(a) matching using global orientation features and (b) matching using minutia triangulation.The comparison is done using accuracy, time and number of similar features. The experiment is conducted on a datasets of 100 candidates using four (4) fingerprints from each candidate. The data is sampled from a mass registration conducted by a reputable organization in Kenya.Theresearch reveals that fingerprint matching based on algorithm (b) performs better in speed with an average of 38.32 milliseconds
as compared to matching based on algorithm (a) with an average of 563.76 milliseconds. On accuracy,algorithm(a) performs better with an average accuracy of 0.142433 as compared to algorithm (b) with an average accuracy score of 0.004202.
Implementation of Face Recognition in Cloud Vision Using Eigen FacesIJERA Editor
Cloud computing comes in several different forms and this article documents how service, Face is a complex multidimensional visual model and developing a computational model for face recognition is difficult. The papers discuss a methodology for face recognition based on information theory approach of coding and decoding the face image. Proposed System is connection of two stages – Feature extraction using principle component analysis and recognition using the back propagation Network. This paper also discusses our work with the design and implementation of face recognition applications using our mobile-cloudlet-cloud architecture named MOCHA and its initial performance results. The dispute lies with how to performance task partitioning from mobile devices to cloud and distribute compute load among cloud servers to minimize the response time given diverse communication latencies and server compute powers
A novel approach for performance parameter estimation of face recognition bas...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Face Recognition Based Intelligent Door Control Systemijtsrd
This paper presents the intelligent door control system based on face detection and recognition. This system can avoid the need to control by persons with the use of keys, security cards, password or pattern to open the door. The main objective is to develop a simple and fast recognition system for personal identification and face recognition to provide the security system. Face is a complex multidimensional structure and needs good computing techniques for recognition. The system is composed of two main parts face recognition and automatic door access control. It needs to detect the face before recognizing the face of the person. In face detection step, Viola Jones face detection algorithm is applied to detect the human face. Face recognition is implemented by using the Principal Component Analysis PCA and Neural Network. Image processing toolbox which is in MATLAB 2013a is used for the recognition process in this research. The PIC microcontroller is used to automatic door access control system by programming MikroC language. The door is opened automatically for the known person according to the result of verification in the MATLAB. On the other hand, the door remains closed for the unknown person. San San Naing | Thiri Oo Kywe | Ni Ni San Hlaing ""Face Recognition Based Intelligent Door Control System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23893.pdf
Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/23893/face-recognition-based-intelligent-door-control-system/san-san-naing
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
Biometric matching involves finding similarity between fingerprint images.The accuracy and speed of the
matching algorithmdetermines its effectives. This researchaims at comparing two types of matching
algorithms namely(a) matching using global orientation features and (b) matching using minutia triangulation.The comparison is done using accuracy, time and number of similar features. The experiment is conducted on a datasets of 100 candidates using four (4) fingerprints from each candidate. The data is sampled from a mass registration conducted by a reputable organization in Kenya.Theresearch reveals that fingerprint matching based on algorithm (b) performs better in speed with an average of 38.32 milliseconds
as compared to matching based on algorithm (a) with an average of 563.76 milliseconds. On accuracy,algorithm(a) performs better with an average accuracy of 0.142433 as compared to algorithm (b) with an average accuracy score of 0.004202.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Interactive liver tumor segmentation using eSAT Journals
Abstract This literature review attempts to provide a brief overview of the most common segmentation techniques, and a comparison between them. It discusses the “Grab-Cut” technique, and" Graph Cut" techniques. GrabCut is a way to perform 2D segmentation in an image that is very user friendly. The user only need to input a very rough segmentation between foreground and background .The Graph Cut approaches to segmentation can be extended to 3-D data and can be used for segmenting 3-D volumes. Other segmentation techniques use either contour or edge segmentation to perform segmentation. The Graph Cut techniques use both contour and edge detection. Typically this is down by drawing a rectangle around the object of interest. The way that this is accomplished technically is by using a combination of Graph Cuts and statistical models of the foreground and background structure in the colour space. Grab Cut Technique use very minimum energy to separate Foreground and Background Images. Keywords - Interactive Image Segmentation, Object Selection, Foreground extraction, Graph Cut, Grab cut
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...cscpconf
Biometrics is one of the primary key concepts of real application domains such as aadhar card, passport, pan card, etc. In such applications user can provide two to three biometrics patterns
like face, finger, palm, signature, iris data, and so on. We considered face and finger patterns
for encoding and then also for verification. Using this data we proposed a novel model for
authentication in multimodal biometrics often called Context-Sensitive Exponent Associative Memory Model (CSEAM). It provides different stages of security for biometrics patterns. In
stage 1, face and finger patterns can be fusion through Principal Component Analysis (PCA), in stage 2 by applying SVD decomposition to generate keys from the fusion data and preprocessed face pattern and then in stage 3, using CSEAM model the generated keys can be encoded. The final key will be stored in the smart cards. In CSEAM model, exponential
kronecker product plays a critical role for encoding and also for verification to verify the chosen samples from the users. This paper discusses by considering realistic biometric data in
terms of time and space
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Improving of Fingerprint Segmentation Images Based on K-MEANS and DBSCAN Clus...IJECEIAES
Nowadays, the fingerprint identification system is the most exploited sector of biometric. Fingerprint image segmentation is considered one of its first processing stage. Thus, this stage affects typically the feature extraction and matching process which leads to fingerprint recognition system with high accuracy. In this paper, three major steps are proposed. First, Soble and TopHat filtering method have been used to improve the quality of the fingerprint images. Then, for each local block in fingerprint image, an accurate separation of the foreground and background region is obtained by K-means clustering for combining 5-dimensional characteristics vector (variance, difference of mean, gradient coherence, ridge direction and energy spectrum). Additionally, in our approach, the local variance thresholding is used to reduce computing time for segmentation. Finally, we are combined to our system DBSCAN clustering which has been performed in order to overcome the drawbacks of K-means classification in fingerprint images segmentation. The proposed algorithm is tested on four different databases. Experimental results demonstrate that our approach is significantly efficacy against some recently published techniques in terms of separation between the ridge and non-ridge region.
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
In this paper, we propose an efficient method to provide personal identification using fingerprint to get better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding minutia pairings, has been in use for a long time, which is not very efficient for recognizing the low quality fingerprints. To overcome this problem, correlation technique is used. The correlation-based fingerprint verification system is capable of dealing with low quality images from which no minutiae can be extracted reliably and with fingerprints that suffer from non-uniform shape distortions, also in case of damaged and partial images. Orientation Field Methodology (OFM) has been used as a preprocessing module, and it converts the images into a field pattern based on the direction of the ridges, loops and bifurcations in the image of a fingerprint. The input image is then Cross Correlated (CC) with all the images in the cluster and the highest correlated image is taken as the output. The result gives a good recognition rate, as the proposed scheme uses Cross Correlation of Field Orientation (CCFO = OFM + CC) for fingerprint identification.
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONijsc
The word biometrics refers to the use of physiological or biological characteristics of human to recognize
and verify the identity of an individual. Face is one of the human biometrics for passive identification with
uniqueness and stability. In this manuscript we present a new face based biometric system based on neural
networks supervised self organizing maps (SOM). We name our method named SOM-F. We show that the
proposed SOM-F method improves the performance and robustness of recognition. We apply the proposed
method to a variety of datasets and show the results.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Interactive liver tumor segmentation using eSAT Journals
Abstract This literature review attempts to provide a brief overview of the most common segmentation techniques, and a comparison between them. It discusses the “Grab-Cut” technique, and" Graph Cut" techniques. GrabCut is a way to perform 2D segmentation in an image that is very user friendly. The user only need to input a very rough segmentation between foreground and background .The Graph Cut approaches to segmentation can be extended to 3-D data and can be used for segmenting 3-D volumes. Other segmentation techniques use either contour or edge segmentation to perform segmentation. The Graph Cut techniques use both contour and edge detection. Typically this is down by drawing a rectangle around the object of interest. The way that this is accomplished technically is by using a combination of Graph Cuts and statistical models of the foreground and background structure in the colour space. Grab Cut Technique use very minimum energy to separate Foreground and Background Images. Keywords - Interactive Image Segmentation, Object Selection, Foreground extraction, Graph Cut, Grab cut
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...cscpconf
Biometrics is one of the primary key concepts of real application domains such as aadhar card, passport, pan card, etc. In such applications user can provide two to three biometrics patterns
like face, finger, palm, signature, iris data, and so on. We considered face and finger patterns
for encoding and then also for verification. Using this data we proposed a novel model for
authentication in multimodal biometrics often called Context-Sensitive Exponent Associative Memory Model (CSEAM). It provides different stages of security for biometrics patterns. In
stage 1, face and finger patterns can be fusion through Principal Component Analysis (PCA), in stage 2 by applying SVD decomposition to generate keys from the fusion data and preprocessed face pattern and then in stage 3, using CSEAM model the generated keys can be encoded. The final key will be stored in the smart cards. In CSEAM model, exponential
kronecker product plays a critical role for encoding and also for verification to verify the chosen samples from the users. This paper discusses by considering realistic biometric data in
terms of time and space
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Improving of Fingerprint Segmentation Images Based on K-MEANS and DBSCAN Clus...IJECEIAES
Nowadays, the fingerprint identification system is the most exploited sector of biometric. Fingerprint image segmentation is considered one of its first processing stage. Thus, this stage affects typically the feature extraction and matching process which leads to fingerprint recognition system with high accuracy. In this paper, three major steps are proposed. First, Soble and TopHat filtering method have been used to improve the quality of the fingerprint images. Then, for each local block in fingerprint image, an accurate separation of the foreground and background region is obtained by K-means clustering for combining 5-dimensional characteristics vector (variance, difference of mean, gradient coherence, ridge direction and energy spectrum). Additionally, in our approach, the local variance thresholding is used to reduce computing time for segmentation. Finally, we are combined to our system DBSCAN clustering which has been performed in order to overcome the drawbacks of K-means classification in fingerprint images segmentation. The proposed algorithm is tested on four different databases. Experimental results demonstrate that our approach is significantly efficacy against some recently published techniques in terms of separation between the ridge and non-ridge region.
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
In this paper, we propose an efficient method to provide personal identification using fingerprint to get better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding minutia pairings, has been in use for a long time, which is not very efficient for recognizing the low quality fingerprints. To overcome this problem, correlation technique is used. The correlation-based fingerprint verification system is capable of dealing with low quality images from which no minutiae can be extracted reliably and with fingerprints that suffer from non-uniform shape distortions, also in case of damaged and partial images. Orientation Field Methodology (OFM) has been used as a preprocessing module, and it converts the images into a field pattern based on the direction of the ridges, loops and bifurcations in the image of a fingerprint. The input image is then Cross Correlated (CC) with all the images in the cluster and the highest correlated image is taken as the output. The result gives a good recognition rate, as the proposed scheme uses Cross Correlation of Field Orientation (CCFO = OFM + CC) for fingerprint identification.
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONijsc
The word biometrics refers to the use of physiological or biological characteristics of human to recognize
and verify the identity of an individual. Face is one of the human biometrics for passive identification with
uniqueness and stability. In this manuscript we present a new face based biometric system based on neural
networks supervised self organizing maps (SOM). We name our method named SOM-F. We show that the
proposed SOM-F method improves the performance and robustness of recognition. We apply the proposed
method to a variety of datasets and show the results.
Federal Lawsuit San Diego Police Darren ChakerDarren Chaker
1983 civil rights lawsuit against San Diego Police, Darren_Chaker, provides concerning alleged civil rights abuse in California. Attorney fees are common in civil rights cases.
A novel predicate for active region merging in automatic image segmentationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A novel predicate for active region merging in automatic image segmentationeSAT Journals
Abstract Image segmentation is an elementary task in computer vision and image processing. This paper deals with the automatic image segmentation in a region merging method. Two essential problems in a region merging algorithm: order of merging and the stopping criterion. These two problems are solved by a novel predicate which is described by the sequential probability ratio test and the minimal cost criterion. In this paper we propose an Active Region merging algorithm which utilizes the information acquired from perceiving edges in color images in L*a*b* color space. By means of color gradient recognition method, pixels with no edges are clustered and considered alone to recognize some preliminary portion of the input image. The color information along with a region growth map consisting of completely grown regions are used to perform an Active region merging method to combine regions with similar characteristics. Experiments on real natural images are performed to demonstrate the performance of the proposed Active region merging method. Index Terms: Adaptive threshold generation, CIE L*a*b* color gradient, region merging, Sequential Probability Ratio Test (SPRT).
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERINGIJNSA Journal
Background subtraction is typically one of the first steps carried out in motion detection using static video cameras. This paper presents a novel method for background removal that processes only some pixels of each image. Some regions of interest of the objects in the image or frame are located with the help of edge detector. Once the region is detected only that area will be segmented instead of processing the whole image. This method achieves a significant reduction in computation time that can be used for subsequent image analysis. In this paper we detect the foreground object with the help of edge detector and combine the Fuzzy c-means clustering algorithm to segment the object by means of subtracting the current frame from the previous frame, the accurate background is identified.
Background differencing algorithm for moving object detection using system ge...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IMAGE RECOGNITION USING MATLAB SIMULINK BLOCKSETIJCSEA Journal
The world over, image recognition are essential players in promoting quality object recognition especially in emergency and search-rescue operation. In this paper precise image recognition system using Matlab Simulink Blockset to detect selected object from crowd is presented. The process involves extracting object
features and then recognizes it considering illumination, direction and pose. A Simulink model has been developed to eliminate the tiny elements from the image, then creating segments for precise object recognition. Furthermore, the simulation explores image recognition from the coloured and gray-scale images through image processing techniques in Simulink environment. The tool employed for computation
and simulation is the Matlab image processing blockset. The process comprises morphological operation method which is effective for captured images and video. The results of extensive simulations indicate that this method is suitable for application identifying a person from a crow. The model can be used in emergency and search-rescue operation as well as in medicine, information security, access control, law enforcement, surveillance system, microscopy etc.
An Efficient FPGA Implemenation of MRI Image Filtering and Tumour Characteriz...VLSICS Design
This paper presents an efficient architecture for various image filtering algorithms and tumor characterization using Xilinx System Generator (XSG). This architecture offers an alternative through a graphical user interface that combines MATLAB, Simulink and XSG and explores important aspects concerned to hardware implementation. Performance of this architecture implemented in SPARTAN-3E Starter kit (XC3S500E-FG320) exceeds those of similar or greater resources architectures. The proposed architecture reduces the resources available on target device by 50%.
AN EFFICIENT FPGA IMPLEMENTATION OF MRI IMAGE FILTERING AND TUMOUR CHARACTERI...VLSICS Design
This paper presents an efficient architecture for various image filtering algorithms and tumor characterization using Xilinx System Generator (XSG). This architecture offers an alternative through a graphical user interface that combines MATLAB, Simulink and XSG and explores important aspectsconcerned to hardware implementation. Performance of this architecture implemented in SPARTAN-3E Starter kit (XC3S500E-FG320) exceeds those of similar or greater resources architectures. The proposed architecture reduces the resources available on target device by 50%.
Hand gesture recognition using support vector machinetheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...ijcsit
Edge detection is one of the most fundamental algorithms in digital image processing. Many algorithms have been implemented to construct image layers extracted from the original image based on selecting threshold parameters. Changing theses parameters to get a high quality layer is time consuming. In this paper, we propose two parallel technique, NASHT1 and NASHT2, to generate multiple layers of an input
image automatically to enable the image tester to select the highest quality detected edges. In addition, the
effect of intensive I/O operations and the number of parallel running processes on the performance of the proposed techniques have also been studied.
Analysis and Comparison of various Methods for Text Detection from Images usi...rahulmonikasharma
In this paper analysis and comparison of various methods for text detection is carried by using canny edge detection algorithm and MSER based method along with the image enhancement which results in the improved performance in terms of text detection. In addition, we improve current MSERs by developing a contrast enhancement mechanism that enhances region stability of text patterns to remove the blurring caused during the capture of image Lucy Richardson de blurring Algorithm is used.
Review paper on segmentation methods for multiobject feature extractioneSAT Journals
Abstract Feature extraction and representation plays a vital role in multimedia processing. It is still a challenge in computer vision system to extract ideal features that represents intrinsic characteristics of an image. Multiobject feature extraction system means a system that can extract features and locations of multiple objects in an image. In this paper we have discuss various methods to extract location and features of multiple objects and describe a system that can extract locations and features of multiple objects in an image by implementing an algorithm as hardware logic on a field-programmable gate array-based platform. There are many multiobject extraction methods which can be use for image segmentation based on motion, color intensity and texture. By calculating zeroth and first order moments of objects it is possible to obtain locations and sizes of multiple objects in an image. Keywords: multiobject extraction, image segmentation
Framework on Retrieval of Hypermedia Data using Data mining Techniquerahulmonikasharma
Image Annotation is a method to reveal the meaning for a specific image .The embedded meaning in the image is identified and mined. The Scenario is identified through the image annotation scheme with in a provided training. The focus is on the blur images, noisy images and images with pixels lost. The image annotation can be done on the good resolution image. The analysis carried outon the image data to derive the information and image restoration takes place. Image mining deals with extracting embedded details, patterns and their relationship in images. Embedded details in the image could be extracted using high-level features that are robust. Inpainting techniques can be utilized for cleaning the image .The analytics is applied on enormous amount of data, techniques performed on the test images sets for better accuracy.
FPGA Implementation for Image Edge Detection using Xilinx System Generatorrahulmonikasharma
Edge detection of an image is the primary and significant step in image processing. Image edge detection plays a vital role in computer vision and image processing. Hardware implementation of image edge detection is essential for real time application and it is used to increase the speed of operation. Field Programmable Gate Array(FPGA) plays a vital role in hardware implementation of image processing application because of its re-programmability and parallelism. The proposed work is FPGA implementation of image edge detection. The hardware implementation of edge detection algorithm is done using the most efficient tool called Xilinx System Generator(XSG).‘Xilinx System Generator’ (XSG) tool is used for system modeling and FPGA programming. The Xilinx System Generator tool is a new application in image processing, and offers a model based design for processing. The algorithms are designed by blocks and it also supports MATLAB codes through user customizable blocks. This paper aims at developing algorithmic models in MATLAB using Xilinx blockset for specific role then creating workspace in MATLAB to process image pixels and performing hardware implementation on FPGA.
Semi-Supervised Method of Multiple Object Segmentation with a Region Labeling...sipij
Efficient and efficient multiple object segmentation is an important task in computer vision and object recognition. In this work; we address a method to effectively discover a user’s concept when multiple objects of interest are involved in content based image retrieval. The proposed method incorporate a framework for multiple object retrieval using semi-supervised method of similar region merging and flood fill which models the spatial and appearance relations among image pixels. To improve the effectiveness of similarity based region merging we propose a new similarity based object retrieval. The users only need to roughly indicate the after which steps desired objects contour is obtained during the automatic merging of similar regions. A novel similarity based region merging mechanism is proposed to guide the merging process with the help of mean shift technique and objects detection using region labeling and flood fill. A region R is merged with its adjacent regions Q if Q has highest similarity with Q (using Bhattacharyya descriptor) among all Q’s adjacent regions. The proposed method automatically merges the regions that are initially segmented through mean shift technique, and then effectively extracts the object contour by merging all similar regions. Extensive experiments are performed on 12 object classes (224 images total) show promising results.
Similar to An interactive image segmentation using multiple user inputªs (20)
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
Abstract
Soil stabilization has proven to be one of the oldest techniques to improve the soil properties. Literature review conducted revealed
that uses of natural inorganic stabilizers are found to be one of the best options for soil stabilization. In this regard an attempt has
been made to evaluate the influence of RBI-81 stabilizer on properties of black cotton soil through laboratory investigations. Black
cotton soil with varying percentages of RBI-81 viz., 0, 0.5, 1, 1.5, 2, and 2.5 percent were studied for moisture density relationships
and strength behaviour of soils. Also the effect of curing period was evaluated as literature review clearly emphasized the strength
gain of soils stabilized with RBI-81 over a period of time. The results obtained shows that the unconfined compressive strength of
specimens treated with RBI-81 increased approximately by 250% for a curing period of 28 days as compared to virgin soil. Further
the CBR value improved approximately by 400%. The studies indicated an increasing trend for soil strength behaviour with
increasing percentage of RBI-81 suggesting its potential applications in soil stabilization.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
Abstract
Increase in traffic along with heavier magnitude of wheel loads cause rapid deterioration in pavements. There is a need to improve
density, strength of soil subgrade and other pavement layers. In this study an attempt is made to improve the properties of locally
available loamy soil using twin approaches viz., i) increasing the compaction of soil and ii) treating the soil with chemical stabilizer.
Laboratory studies are carried out on both untreated and treated soil samples compacted by different compaction efforts. Studies
show that increase in compaction effort results in increase in density of soil. However in soil treated with chemical stabilizer, rate of
increase in density is not significant. The soil treated with chemical stabilizer exhibits improvement in both strength and performance
properties.
Keywords: compaction, density, subgradestabilization, resilient modulus
Geographical information system (gis) for water resources managementeSAT Journals
Abstract
Water resources projects are inherited with overlapping and at times conflicting objectives. These projects are often of varied sizes
ranging from major projects with command areas of millions of hectares to very small projects implemented at the local level. Thus,
in all these projects there is seldom proper coordination which is essential for ensuring collective sustainability.
Integrated watershed development and management is the accepted answer but in turn requires a comprehensive framework that can
enable planning process involving all the stakeholders at different levels and scales is compulsory. Such a unified hydrological
framework is essential to evaluate the cause and effect of all the proposed actions within the drainage basins.
The present paper describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) which is
intended to meet the specific information needs of the various line departments of a typical State connected with water related aspects.
The HIS consist of a hydrologic information database coupled with tools for collating primary and secondary data and tools for
analyzing and visualizing the data and information. The HIS also incorporates hydrological model base for indirect assessment of
various entities of water balance in space and time. The framework would be maintained and updated to reflect fully the most
accurate ground truth data and the infrastructure requirements for planning and management.
Keywords: Hydrological Information System (HIS); WebGIS; Data Model; Web Mapping Services
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
Abstract
This paper presents an outlook on experimental behavior and a comparison with predicted formula on the behaviour of circular
concentrically loaded self-consolidating fibre reinforced concrete filled steel tube columns (HSSCFRC). Forty-five specimens were
tested. The main parameters varied in the tests are: (1) percentage of fiber (2) tube diameter or width to wall thickness ratio (D/t
from 15 to 25) (3) L/d ratio from 2.97 to 7.04 the results from these predictions were compared with the experimental data. The
experimental results) were also validated in this study.
Keywords: Self-compacting concrete; Concrete-filled steel tube; axial load behavior; Ultimate capacity.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
Abstract
Efficiency of the road network system is analyzed by travel time reliability measures. The study overlooks on an important measure of
travel time reliability and prioritizing Tiruchirappalli road network. Traffic volume and travel time were collected using license plate
matching method. Travel time measures were estimated from average travel time and 95th travel time. Effect of non-motorized vehicle
on efficiency of road system was evaluated. Relation between buffer time index and traffic volume was created. Travel time model has
been developed and travel time measure was validated. Then service quality of road sections in network were graded based on
travel time reliability measures.
Keywords: Buffer Time Index (BTI); Average Travel Time (ATT); Travel Time Reliability (TTR); Buffer Time (BT).
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
Abstract
Land and water are the two vital natural resources, the optimal management of these resources with minimum adverse environmental
impact are essential not only for sustainable development but also for human survival. Satellite remote sensing with geographic
information system has a pragmatic approach to map and generate spatial input layers of predicting response behavior and yield of
watershed. Hence, in the present study an attempt has been made to understand the hydrological process of the catchment at the
watershed level by drawing the inferences from moprhometric analysis and runoff. The study area chosen for the present study is
Yagachi catchment situated in Chickamaglur and Hassan district lies geographically at a longitude 75⁰52’08.77”E and
13⁰10’50.77”N latitude. It covers an area of 559.493 Sq.km. Morphometric analysis is carried out to estimate morphometric
parameters at Micro-watershed to understand the hydrological response of the catchment at the Micro-watershed level. Daily runoff
is estimated using USDA SCS curve number model for a period of 10 years from 2001 to 2010. The rainfall runoff relationship of the
study shows there is a positive correlation.
Keywords: morphometric analysis, runoff, remote sensing and GIS, SCS - method
-
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
An interactive image segmentation using multiple user inputªs
1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 318
AN INTERACTIVE IMAGE SEGMENTATION USING MULTIPLE USER
INPUT’S
Swathika P1
, Pradhiba Selvarani M2
, Arulmary S3
, Krishnalakshmi B4
1, 2, 3, 4
Assistant Professor, CSE, Kamaraj College Of Engineering and Technology College, Tamilnadu, Virudhunagar,
Swathika.me@gmail.com, mpradhiba@gmail.com, arulmarys@gmail.com, krishna11.kcet@gmail.com
Abstract
In this paper, we consider the Interactive image segmentation with multiple user inputs. The proposed system is the use of multiple
intuitive user inputs to better reflect the user’s intention. The use of multiple types of intuitive inputs provides the user’s intention
under different scenario. The proposed method is developed as a combined segmentation and editing tool. It incorporates a simple
user interface and a fast and reliable segmentation based on 1D segment matching. The user is required to click just a few "control
points" on the desired object border, and let the algorithm complete the rest. The user can then edit the result by adding, removing
and moving control points, where each interaction follows by an automatic, real-time segmentation by the algorithm. Interactive
image segmentation involves a proposed algorithm, Constrained Random walks algorithm. The Constrained Random Walks algorithm
facilitates the use of three types of user inputs. 1. Foreground and Background seed input 2. Soft Constraint input 3. Hard Constraint
input. The effectiveness of the proposed method is validated by experimental results. The proposed algorithm is algorithmically
simple, efficient and less time consuming.
Keywords: Interactive image segmentation, Interactive image segmentation, digital image editing, multiple user inputs,
random walks algorithm.
---------------------------------------------------------------------***-------------------------------------------------------------------------
1. INRODUCTION
Interactive image segmentation, an important branch of image
segmentation aims to make use of a small amount of user
interaction to extract the foreground object out from the
background. The main challenge of interactive image
segmentation systems is to get as much information as possible
from limited user inputs. Interactive image segmentation
involves minimal user interaction to incorporate user intention
into the segmentation process. The users only need to roughly
indicate the location and region of the object and background by
using strokes, which are called markers. The user has to
initialize the foreground and background seeds to separate the
foreground and background objects.
For good interactive image segmentation, there are two basic
requirements: First, given a certain user input, the constrained
random walks algorithm should produce intuitive segmentation
that reflects the user intent. Second, the algorithm must be
efficient so that it can produce better segmented results.
Interactive segmentation minimizes user interaction, and also
allows users to draw strokes matting on the boundary of the
selected object. Completely automatic segmentation never
seems to be perfect and so interactive tools are becoming more
and more popular. This means that if the results obtained by the
first segmentation are not satisfactory, the user can refine the
selection. The process of extracting the foreground from the
background of an image is known as segmentation. There are
many tools that already exist which perform this function.
These tools either use texture (color) information or edge
(contrast) information to perform the segmentation. Magic
wand (color) and Intelligent scissors (contrast) are two good
examples. Early interactive image segmentation algorithms
utilize either regional properties such as Adobe‟s magic wand or
boundary properties such as active contour [7] and intelligent
scissors [10], [11]. The proposed Interactive segmentation
method introduces an innovative approach of using both color
and contrast information in order to do the segmentation.
The purpose of interactive segmentation is to split an image into
two parts – the background and foreground. In order to do this
the user has to give „clues‟ to the algorithm indicating which
regions of the image are part of the foreground and which are
part of the background. This can be done by using „seeds‟. A
pixel can either be labeled as definitely background or definitely
foreground. This is a means of hard segmentation. In other
words that pixel must become part of the foreground or
background. These pixels then become seeds. Seeds allow the
algorithm to automatically calculate the rest of the foreground
or background while making sure that the hard constraints are
met.
In this paper, the foreground image has to be segmented
accurately in still images using constrained random walks
algorithm. In Constrained random walks algorithm, three types
2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 319
of constraints are given as an input to the segmentation process.
The user has to draw the strokes manually, in the foreground
and in Background region. Three cases arise for providing a
input to the images. In the first case, only Foreground and
Background seeds are identified from the image. From the seed,
the foreground and background strokes are given as input. In the
second case, the soft constraint is given as input, which allows a
user to draw the strokes to indicate the region that the boundary
should pass through. In the third case, the hard constraint is
given as input, which allows a user to specify the pixels that the
boundary must align with.
The fundamental task of segmenting or partitioning an image
into disjoint regions is used for applications ranging from
medical image analysis, quality control, or military surveillance
and tracking. Although the general segmentation problem
involves separating N distinct partitions, a piecewise
assumption of two sets is generally made. That is, the image is
assumed to be comprised of two homogeneous regions, often
referred to as “object and “Background”. The goal of
segmentation is to accurately capture these regions.
The rest of the paper is organized as follows: We discuss about
the related works in Section 2. We define the proposed work in
Section 3. We present the constrained random walks algorithm
for interactive image segmentation in Section 4. We present the
foreground and background seed generation in Section 5. We
present the soft and hard constrained inputs in Section 6. In
Section 7, we present the results of the proposed framework and
in Section 8, we present our conclusion.
2. RELATED WORKS
There have been many published studies of interactive image
segmentation. Active Contour Models where first proposed by
Kass [7] in 1987 as an Interactive Segmentation method for 2D
images. Active Contour Model treats the desired contour as a
time evolving curve and the segmentation process as an
optimization over time of an adequate energy functional. Live
Wire [10] (also known as intelligent scissors) is a Dynamic
Programming method for extracting a desired object's contour.
The image is treated as a 2D directed weighted graph in which
the nodes are image pixels and the arcs are 8-connectivity
neighbour‟s links. Finding the boundary is implemented as
finding the shorted path in the graph, where low cost path
corresponds to passing near edges and other boundary-related
features. For finding optimal path, Dijkstra's algorithms are
used, which proves the path globally optimal.
Graph Cut segmentation was originally introduced by Boykov
and Jolly [1]. It is shown here as an image segmentation
technique but all arguments hold for N-D as well (in fact, it was
originally introduced as an N-D method). The number of
objects is also arbitrary. The user marks "foreground" and
"background" pixels using free-form, wide-brush strokes. The
system uses the marked pixels as foreground and background
seeds and implies "hard constraints" on them, meaning, the seed
pixels must be labels exactly as the user marked, in the final
segmentation.
Lazy Snapping [8] enables the user to start by specifying
foreground and background marks, and edit the result by border
editing. Furthermore, it attacks the performance problem of
extensive region-based calculation by working first in higher
scale. This is well suited with the dual interaction scheme.
GrabCut algorithm by Rother [12] takes the above Graph Cut
segmentation even further. It applies the min-cut algorithm
iteratively, inferring unknown knowledge from one iteration to
another. This allows it to minimize user interaction by just
specifying the background (and not the foreground) pixels. User
interaction is therefore minimized to placing a rectangle or a
lasso around the object (with respectable distance) instead of
marking brush-strokes.
Simple Interactive Object Extraction (SIOX) is an algorithm for
extracting foreground objects from colour images and videos
with very little user interaction. SIOX works well with noise
and videos [4]. It has been implemented as "foreground
selection" tool in the GIMP. Although the algorithm was
originally designed for videos, virtually all implementations use
SIOX primarily for still image segmentation. The random walks
algorithm [5], [6] model an image as a graph, have been
adopted for various image processing tasks. The random walks
algorithm requires the input of foreground and background
seeds. The random walks algorithm is essentially an approach
that minimizes Dirichlet energy with boundary conditions,
where different boundary conditions results in different
harmonic functions.
The framework proposed in this paper is different from the
above in the sense that it considers a foreground extraction with
minimal user interaction. Further, the objective of our
framework is to extract the foreground object more accurately,
even in camouflage (which allows a visible object to remain
unseen) when background and foreground colour distributions
overlap at least in part.
3. PROPOSED WORK
In the existing system, existing interactive image segmentation
algorithms lack more intelligent ways to understand the
intention of user inputs. Sometimes the user intends to provide
cues for regions while at other times the user intends to focus on
the boundaries. When segmenting a difficult image such as a
cluttered or camouflaged scene, the user frequently struggles
with laborious local editing because the user cannot effectively
communicate his intentions with the underlying segmentation
engine. Even with more and more scribbles, the segmentation
result still may not be what the user wants.
In this paper, we propose a constrained random walks algorithm
that facilitates the use of three types of user inputs: 1)
foreground and background seed input, 2) soft constraint input,
and 3) hard constraint input, as well as their combinations. The
3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 320
foreground and background seed input allows a user to draw
strokes to specify foreground and background seeds. The soft
constraint input allows a user to draw strokes to indicate the
region that the boundary should pass through. The hard
constraint input allows a user to specify the pixels that the
boundary must align with. In comparison, the three types of
user inputs and any of their combinations can be supported by
our coherent computational framework consisting of the
constrained random walks algorithm and a local editing
algorithm that imposes soft and hard constraints and allows
more precise contour refinements.
4. CONSTRAINED RANDOM WALKS
In this section, the extension to the random walks algorithm is
proposed. The extension is known as constrained random walks
algorithm to facilitate the use of various user inputs in
interactive image segmentation. The human input could be
valuable in steering the segmentation process in order to obtain
more easily and reliably accurate results according to the visual
perception. The overall design of the proposed interactive image
segmentation method is shown in the Fig. 1.
Fig. 1: Overall design of the proposed method
3.1 Graph Construction
A graph is constructed, in which each node represents a pixel
and neighbouring nodes are connected with undirected edges. A
graph is represented by its vertices and edges as
,vg
,
where ivv
is a set of vertices iv
and jv
and ije
is
a set of edges ije
bounded by vertices iv
and jv
. The weight
for edge ije
is denoted as ijw
and the degree of node iv is
defined as
j iji wd
, that is the sum of the weights of all
the edges that incident on iv .
3.2 Edge weights
The edge weights play a critical role since each edge weight
ijw
describes the likelihood of a random walker moving to the
neighbouring node. Each weight should be defined based upon
the distance between two neighbouring pixels/nodes. In the
random walks algorithm, the distance between two nodes is
defined as jiij ggd
, which is the Euclidean distance in
colour. The prior models have also been incorporated into the
random walks algorithm, where two virtual nodes are added in
the graph to represent the foreground and the background. The
foreground and background node is connected to every pixel
node and the edge weight is assigned to the probability that the
pixel fits the foreground/background prior model. In the
proposed method, the prior models are incorporated directly
into the distance function to avoid the distance connection
problem. The edge weight ijw
and the corresponding distance
are defined as
2
exp ijij dw
222
)Pr()Pr(1 jijiij vvggd
(1)
The second term
2
)Pr()Pr( ji vv
is the prior term, )Pr( iv
denotes the normalized probability that node iv fits the
foreground prior model, 1,0 is a trade off factor, and
is a scaling factor. The values of
2
ji gg
and
2
)Pr()Pr( ji vv
are normalized to [0, 1] individually.
The foreground and the background are modelled by the
Gaussian mixture model (GMM) and their seeds FS and BS
are used to estimate the model parameters. Let
FviPr
BviPr
denote the probability that node iv
fits the
foreground and the background GMM. The normalized
probability
)Pr( iv is defined as
BvFv
Fv
v
ii
i
i
PrlogPrlog
Prlog
)Pr(
(2)
Get Seed Input
Foreground and
Background Strokes are
drawn
Soft
Constrained
Input
Segmentation of images
with less accuracy
Hard
Constrained
Input
Segmented image
with more
accuracy
4. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 321
According to equation (1), it is clear that the second term
2
)Pr()Pr( ji vv
should dominate when the foreground and
background colours are well separable. Otherwise, the first term
2
ji gg
should dominate. Let be the distance between the
foreground and background GMMs. The Monte-Carlo
simulation is used to approximate the KL-divergence between F
and B. can be defined as,
n
i ii
ii
BvFv
BvFv
n 1 PrlogPrlog
PrlogPrlog1
(3)
Where n is the total number of pixels. After determining the
parameter , the distance measure is calculated. The edge
weight can be applied to graph cuts, random walks, normalized
cuts.
5. FOREGROUND AND BACKGROUND SEED
GENERATION
The foreground and background seed input allows a user to
draw strokes to specify foreground and background seeds. It
identifies the foreground and background object clearly. After
foreground and background seeds are identified and located, the
strokes are drawn. The use of only foreground and background
strokes as input allows the user to segment foreground object
accurately. The design of the foreground and background seed
generation is shown in Fig. 2.
Fig. 2: Design of the Foreground and Background seed
generation
First, the image is given as input. Graph and edge weight is
constructed. The user input includes foreground and
background seeds. Let ip be the probability that an edge
weight will arrive at one of the foreground seeds. Clearly, for
the probability ip , if 1ip , the high probability node is
considered as a Foreground seed. If the probability is
0ip ,
the low probability node is considered as a Background. The
user input includes foreground seeds FS and background
seeds BS , where FS , BS , and BF SS . Let
ip be the probability,
1ip for any Fi S and
0ip for any Bi S . A vertex on which the soft constraint
is imposed has the property that the difference its probability is
½, lies within a small prescribed range [ , ]. A vertex on
which the hard constraint is imposed has a probability of ½.
Let SS
and HS denote soft boundary seeds and hard boundary
seeds, respectively. The Constrained random walks are given by
the following equations:
)(,.
1
HBFij
e
ij
i
i SSSpw
d
p
ij
(4)
0,,5.0
,5.0
,0
,1
.,.
Sii
Hii
Bii
Fii
Svp
Svp
Svp
Svp
ts
The equation (4) can be reformulated into
ij Sie Sv
ijiij pppw 22
)5.0()(min
Hii
Bii
Fii
Svp
Svp
Svp
ts
,5.0
,0
,1
.,.
(5)
Where is a trade off factor controlling the importance of the
difference between the probability of each soft constraint vertex
and ½. Differentiating the objective function of equation (5)
with respect to each ip for
)( HBFi SSSv and
setting it equal to zero. The constrained random walks solve the
linear system of equation given in equation (6)
Get Input
Image
Graph and Edge
weight is constructed
Compute Probability
High probability node
is taken as Foreground
node
Low probability node
is taken as
Background node
Output:
Background and
Foreground seeds
5. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 322
)(,
1
,5.0
1
SHBFij jij
i
Sij jij
i
i
SSSSvpw
d
Svpw
d
p
(6)
The above equation (6) can be considered as adding a virtual
neighbour vertex with probability of ½ to each soft constraint
vertex through a virtual edge with weight .
The logical step in using Random walks algorithm is to generate
a suitable initialization (seed points). In our approach, a list of
potential seed points are generated, that are used to locate the
foreground and background regions. The seed points are chosen
as the maxima points in the distance map that are located in the
foreground and background. Maxima points are located by
dilating the distance map and finding those points that do not
change in value. It is easy to see that dilation by a mask does
not change the value at only the maxima points. The size of the
mask determines the minimum separation distance between any
two seed-points.
6. CONSTRAINED INPUTS
Two other types of user inputs as constraints into the random
walks algorithm, the extension is known as constrained random
walks. The two constrained inputs are soft constrained input and
hard constrained input.
6.1 Soft Constrained Input
The soft constraint input allows a user to draw strokes to
indicate the region that the boundary should pass through. After
the foreground and background seeds are located, the
foreground and background strokes are drawn. By only
inputting the foreground and background strokes, the weak
boundary between the object and the background cannot be
detected precisely. To overcome this problem, a soft stroke is
drawn. With only one additional soft boundary stroke, which is
partially drawn on the boundary provides better results.
6.1.1 Local Contour Deformation for Soft Constraint
Input
A method of soft constraint input is the local refinement step,
where only additional hard and soft boundary constraints are
allowed to be used to indicate the boundaries. This local
refinement still needs to be performed if there is any soft or
hard boundary stroke being input in the global stage. This is
because the constrained random walks algorithm itself cannot
achieve the purpose of both hard and soft boundary constraints.
For example, the neighbouring nodes of soft constraint have
probability values. Let be the weighting parameter, if the
value is too large, the pixels masked by the soft boundary
strokes will have probability values very close to ½, for which
the precise boundary is difficult to locate by thresholding.
For the local refinement, first determine the pixels/positions that
the contour must pass and then build the correspondences
between these pixels and the pixels on the initial contour. After
that, the initial contour is deformed with the correspondences
used as positional constraints and the rest of the pixels on the
initial contour as stay-put constraints.
6.1.2 Optimal Path in Soft Boundary Stroke
Within each soft boundary stroke, an optimal path called soft
boundary path needs to be searched first. The Dijkstra‟s shortest
path algorithm is used to find the shortest path. Let pv
and qv
denote two neighbouring pixels. The local cost pqe
of the
directed edge from pv
to qv
is defined as a weighted sum of
three components: Laplacian zero crossings zf , gradient
magnitude gf
, and the gradient directional cost qpfd , , i.e,
len
qpfqfqf
e
dgz
pq
),(3.0)(6.0)(1.0
(7)
Where the division by len, denotes the length of the path from
pv
to qv
is to avoid the “shortcut” problem. The weights
specified in equation (7) are empirical values. The purpose of
having the Laplacian zero-crossing term in equation (7) is for
edge localization. The gradient magnitude is to distinguish
between a strong edge and a weak edge. The gradient direction
or orientation term adds a smoothness constraint to the
boundary by associating a relatively high cost for sharp
changes.
6.1.3 Finding Correspondences in Soft Constraint
Input
Correspondences between the soft user input and the initial
contour C obtained in the global stage are established before
contour deformation. The correspondence for a soft boundary
constraint matches the points from the initial contour to the soft
boundary path inside the stroke. First, the two end points of the
soft boundary path are matched to the points on the contour
with minimum geometric distance, and then the in-between
points of the soft boundary path and the contour are matched by
bilinear interpolation. The correspondence set is given as:
221221 .........,,.........., k
s
k
ss
sssvvv
(8)
Where is
is the soft boundary constraint point, and
s
iv
is the
corresponding point on the initial contour.
6. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 323
6.1.4 Refinement by Contour Deformation
The contour deformation can be summarized as: for the initial
contour C, the positional constraints resulted from the
correspondences for the hard and soft boundary points. The
contour deformation is given as:
j
h
jjj
Cjj
j
s
j
v
hvtsvvjdistfsvLvLv
stay
''
'
.,.,)(minarg
2'
22'
(9)
Where is a trade off parameter for soft boundary constraint
points, and v and
'
v denote two column vectors whose
elements jv
and
'
jv
are the vertices on the initial contour C
and the deformed contour
'
C respectively. The first term
2'
LvLv
is adapted from the Laplacian mesh processing to
preserve the global shape with the transform matrix L defined
as
ADIL 1
(10)
Where D is a matrix with iiD =2 and A is the adjacent matrix
defined in equation (11)
otherwise
ji
Aij
,0
1,1
(11)
The distance function )(idistf is considered as the weight.
)(idist is the normalized geometric distance from pixel )(iv
to the input strokes and the function f can be any monotonic
increasing function such that pixels near the input strokes have
small weights and those far away from the input strokes have
larger weights.
6.2 Hard Constrained Input
The hard constraint input allows a user to specify the pixels that
the boundary must align with. In the soft constraint input, the
user draws the strokes along the boundary and the object is
fairly well segmented except some small inaccuracies i.e., the
boundary is not aligned with in the region. To overcome this
problem, the hard boundary constraint input method is
proposed. Boundary pixel selector, which selects pixels on the
desired contour, is introduced as the hard constraint. A vertex
on which the hard constraint is imposed has a probability of ½.
Specifically, by marking five hard boundary pixels, the local
editing algorithm snaps the initial contour to the specified
boundary pixels through local contour deformation, which
results in a smoother and more accurate object contour.
6.2.1 Local Contour Deformation for Hard Constraint
Input
Local Contour Deformation is also performed in hard constraint
input. Deforming contours occur either due to changing region
of partial occlusions or when the object of interest is actually
deforming its shape over a time or space sequence of images.
Higher speed is achieved by the local segmentation determined
only on the vicinity of the route initialization contour and the
segmentation is not performed on the entire input image. The
size of the vicinity of the initialization contour which is taken
into account by the processing of the image is determined
interactively by the user. Terminals of the object and
background in this procedure are determined automatically from
initialization contours specified by the user. The neighbouring
nodes of a hard constraint node have probabilities larger than ½
or less than ½, for which the resulting contour will not pass
through the hard constraint node.
6.2.2 Finding Correspondences in Hard Constraint
Input
Correspondences between the soft user input and the initial
contour C is obtained in the global stage are established before
contour deformation. The correspondence for a hard constraint
point is defined as the point on the contour with minimum
geometric distance. The point from the initial contour to the
hard boundary path inside the stroke is matched. First, the two
end points of the hard boundary path are matched to the points
on the contour with minimum geometric distance. The
correspondence set is given as:
121121 ..,.........,.........., k
h
k
hh
hhhvvv
(10)
Where ih
, is the hard boundary constraint point, and
h
iv is the
corresponding point on the initial contour.
7. RESULTS AND DISCUSSIONS
The proposed method has been implemented and tested on
various still images. The proposed system is to accurately
segment the foreground image from the background with the
minimal user interaction using interactive image segmentation.
Figure 3 (a) shows the input image. This image is given as input
for the foreground and background seed generation. The object
with high intensity is considered as the foreground object. The
green seed indicates the foreground object. The blue seed
indicates the background object. Figure 3 (b) shows the
foreground and background seed input in the image.
7. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 324
(a) (b)
Fig .3(a) Original input image (b) Image with Foreground and
Background Seeds. Green seed indicates the foreground object.
Blue seed indicates the background object.
The foreground and background seeds are generated based on
graph and edge weight calculation. Figure 4 (a) shows the
image with seed input. Figure 4(b) shows the image with
foreground and background strokes. Figure 4 (c) shows the
probability map for the given image. Figure 4(d) shows the
segmented output for the given image.
(a) (b)
(c) (d)
Fig. 4 (a) Image with Foreground and Background Seeds. Green
seed indicates the foreground object. Blue seed indicates the
background object (b) Foreground and Background seeds (c)
Probability map for the Constrained Random walks Algorithm
(d) segmented result for the Foreground and background
strokes.
If the object is in complex background, foreground and
background strokes are drawn on the image. The probability
map provides the good separation between the foreground and
background object. Figure 5 (a) shows the input image. Figure 5
(b) shows the image with soft constraint input. Figure 5 (c)
shows the segmented output for the soft constraint input.
(a) (b)
(c)
Fig. 5 (a) Original input image (b) Soft Constraint input. Red
stroke indicates the foreground object. Yellow stroke indicates
the background object. Green stroke indicates the Soft
constraint input. (c) Segmented result for the soft constraint
input.
The soft constraint input allows the user to draw the strokes to
indicate the region that the boundary must align with. The Soft
Constraint input is given with the boundary brush that roughly
mark parts of the boundary.
Figure 6 (a) shows the hard constraint input. Figure 6 (b) shows
the segmented output.
(a) (b)
Fig. 6(a) hard constraint input, Black pixels are the hard
boundary pixel selector. (b) Segmented Output.
The hard constraint input allows a user to specify the pixels that
the boundary must align with. In the soft constraint input, the
user draws the strokes along the boundary and the object is
fairly well segmented except some small inaccuracies i.e., the
boundary is not aligned with in the region. To overcome this
problem, the hard boundary constraint input is given.
8. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 325
7.2 Performance Measure
The error rate is defined as the ratio of number of misclassified
pixels to the number of pixels in unclassified region. The error
rate is calculated using the formula:
regionedunclassifiinpixelsno
pixelsiedmisclassifno
.
.
Where misclassified pixels are the incorrect pixels within the
contour region. The unclassified region specifies the pixels that
are present in the contour region. For most of the images in the
MSRC data set, the proposed method achieves very low error
rates. High error rates occur in images where the input
foreground seeds only cover a small portion of the foreground
and, thus, do not cover all the distinct colors of the foreground,
while pixels with similar colors are masked by the background
seeds. For such cases, the GrabCut algorithm and the random
walks algorithm also perform poorly.
Table 1: Performance comparison with different images
In the existing random walks algorithm, the error rate is high,
while for contour deformation the error rate gets decreased. In
the proposed constrained random walk algorithm, the error rate
gets decreased compared to existing algorithm. Therefore the
proposed algorithm is much better than the existing algorithm
which is shown in the Table 1. It is also inferred from the table
that for complex images the error rate gets decreased compared
to the existing method.
CONCLUSIONS AND FUTURE WORK
Interactive image segmentation consists of two components:
Constrained random walks algorithm and local contour
deformation. The proposed method supports multiple intuitive
types of user inputs and also combines the advantages of
different user interactions. The proposed method can be
applicable for camouflaged images and images with thin
structures, if the user inputs are carefully placed.
The foreground and background strokes are carefully drawn at
each side of the object boundary in order to well segment the
object. With a certain amount of user interaction, some
inaccuracies can occur for thin structures whose colour
overlapped with the background colour. In this case, the soft
constraint and hard constraint input is given by the user. The
soft constraint input allows the user to draw soft strokes on the
boundary with the boundary brush. With the soft constraint
input, small inaccuracies occur in the boundary. To overcome
this problem, hard constraint input is provided. The hard
constraint input allows the user to mark the pixels on the
boundary. Specifically, by marking hard boundary pixels on the
inaccurate regions are marked with the boundary pixel selector.
This results in smoother and more accurate segmented output.
The proposed method uses three types of user inputs, and able
to provide more efficient and accurate results. The proposed
method is faster compared to other techniques. Constrained
random walks algorithm requires minimal user interaction to
extract the region. The error rate gets reduced compared to
existing methods.
The proposed method can be extended in two ways. First, its
runtime can be further improved. The response can be improved
through the graphics processing unit. Second, the proposed
method is extended to video segmentation. Extending the
method to video segmentation is not straight forward. This is
because video data consists of thousands of video frames. So
the user has to provide inputs for each video frame. It is also
possible to create a metric to measure the amount and the
complexity of interaction that is required for an interactive
image segmentation to achieve better results.
REFERENCES
[1] Boykov Y. and Jolly M.P., “Interactive graph cuts for
optimal boundary and region segmentation of objects in N-
D images,” in Proc. IEEE Int. Conf. Computer Vision,
2001, pp. 105–112.
[2] Bai X. and Sapiro G., “A geodesic framework for fast
interactive image and video segmentation and matting,” in
Proc. IEEE Int. Conf. Computer Vision, 2007, pp. 1–8.
[3] Falcao A., Stolfi J., and Lotufo R., “The image foresting
transform: Theory, algorithms, and applications,” IEEE
Trans. Pattern Anal. Mach. Intell., vol. 26, no. 1, pp. 19–29,
Jan. 2004.
[4] Friedland G., Jantz K., and Rojas R., “SIOX: Simple
interactive object extraction in still images,” in Proc. IEEE
Int. Symp. Multimedia, Dec. 2005, pp. 253–259.
[5] Grady L., “Multilabel random walker image segmentation
using prior models,” in Proc. IEEE Int. Conf. Computer
Vision Pattern Recognition, 2005, pp. 763–770.
[6] Grady L., “Random walks for image segmentation,” IEEE
Trans. Pattern Anal. Mach. Intell., vol. 28, no. 11, pp.
1768–1783, Nov. 2006.
[7] Kass M., Witkin .A, and Terzopoulos .D, “Snakes: Active
contour models,” Int. J. Comput. Vis., pp. 321–331,
1988.
Images Error
rate for
Random
Walks
in (%)
Error rate
for Contour
Deformation
in (%)
Error rate
for
Constrained
Random
Walks in
(%)
Statues.jpg 5.85 4.92 4.82
Building.jpg 5.66 4.84 4.75
Penguin.jpg 5.42 4.8 4.63
Tiger.jpg 5.43 4.63 4.45
Boy.jpg 5.38 4.23 4.36
Crow.jpg 5.08 4.16 4.14
Bear.jpg 4.9 4.02 4.08
Flower.jpg 4.5 3.98 3.8
9. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 03 | Mar-2013, Available @ http://www.ijret.org 326
[8] Li Y., Sun J., Tang C.K. and Shum H.Y., “Lazy snapping,”
ACM Siggraph, pp. 303–308, 2004.
[9] Miranda P., Falcao A., and Udupa J., “Synergistic arc-
weight estimation for interactive image segmentation using
graphs,” Comput. Vis. Image Understand., vol. 114, no. 1,
pp. 85–99, Jan. 2010.
[10] Mortensen E. N. and Barrett W. A., “Intelligent scissors for
image composition,” Comput. Graph. Int. Techniques, pp.
191–198, 1995.
[11] Mortensen E. N. and Barrett W. A., “Interactive
segmentation with intelligent scissors,” Graph. Models
Image Process., vol. 60, no. 5, pp. 349–384, 1998.
[12] Rother C., Kolmogorov V., and Blake A., “Grabcut:
Interactive foreground extraction using iterated graph cuts,”
ACM Siggraph, pp. 309–314, 2004.
[13] Sinop A. K. and Grady L., “A seeded image segmentation
framework unifying graph cuts and random walks which
yields a new algorithm,” in Proc. IEEE Int. Conf. Computer
Vision, 2007, pp. 1–8.
BIOGRAPHIES:
Swathika. P received her UG - B.Tech
(Information Technology) degree in 2009 from
Kamaraj College of Engineering and
Technology. She then completed her P.G -
M.E degree in Computer Science and
Engineering at Mepco Schlenk Engineering
College, Sivakasi in 2011. She is currently
working as an Assistant Professor in Kamaraj College of
Engineering and Technology, Virudhunagar, India. She is a Life
Member of Indian Society of Technical Education (ISTE). Her
area of interest encompasses Digital Image Processing, image
segmentation and Visual cryptography.
Pradhiba Selvarani. M received her UG -
B.Tech (Information Technology) degree in
2009 from Idhaya Engineering College for
Women, chinnasalem. She then completed her
P.G - M.E degree in Computer and
Communication Engineering at National
Engineering College, Kovilpatti in 2011. She is currently
working as an Assistant Professor in Kamaraj College of
Engineering and Technology, Virudhunagar, India. She is a Life
Member of Indian Society of Technical Education (ISTE). Her
area of interest encompasses Digital Image Processing and
Visual Cryptography.
Arul Mary.S received her UG - B.E (Computer
Science) degree in 2009 from Sri Ramakrishna
Engineering College, Coimbatore . She then
completed her P.G - M.E degree in Computer
Science and Engineering at Mepco Schlenk
Engineering College, Sivakasi in 2011. She is
currently working as an Assistant Professor in Kamaraj College
of Engineering and Technology, Virudhunagar, India. She is a
Life Member of Indian Society of Technical Education (ISTE).
Her area of interest encompasses Digital image processing,
Biometric authentication and Visual cryptography.
Krishnalakshmi. B received her UG - B.E
(Computer Science) degree in 2009 from
P.S.R.Engineering College, Sivakasi. She then
completed her P.G - M.E degree in Computer
Science and Engineering at Anna University of
Technology, Coimbatore in 2011. She had
worked as an Assistant Professor in RVS
educational group of institutions, Coimbatore. She is currently
working as an Assistant Professor in Kamaraj College of
Engineering and Technology, Virudhunagar, India. She is a Life
Member of Indian Society of Technical Education (ISTE). Her
area of interest encompasses Network Security, Cryptography.