SlideShare a Scribd company logo
Bubble Character Analysis using Image Processing Methods
Guangshen Ma, Ziyao Wang, Yihui Feng, Minwoo Kim
Duke University
Introduction
The goal of this project is to process the bubble images using image
processing algorithms so that we can easily study the dynamics
properties of bubbles. In order to further analyze bubble’s
characters such as velocity and trajectory path, interactive
segmentation and bubble region detection algorithms can be used to
detect the bubble position and to extract its physical information.
Then, image inpainting algorithm is used to focus on a single
bubble of interest. Also, the bubble’s penetration depth and
departure frequency are measured with our methods.
1. Preprocess raw images
2. Measure penetration depth
3. Estimate bubble’s departure frequency
4. Inpaint the damaged image
5. Segment out a single bubble using interactive segmentation
6. Detect the bubble region
Algorithm and results
1. Preprocessing
A. Background processing: Subtract pure background image from bubble image.
B. Grayscale processing: Change the RGB color image to gray image.
C. Binary processing: Identify bubble shape by binarization.
D. Bubble padding: Filling holes inside bubble regions.
E. Canny edge detection: Detect the edge using Canny-edge detector.
Algorithm and results
Further work includes developing algorithms of bubble ellipse reconstruction using
Hough transform and using methods of Gray-level Co-occurrence Matrix for flow regime
classification.
Algorithm and results
Future work
5. Interactive segmentation
To study the behavior of a single bubble, we segment out the bubble
of interest from the rest of the other bubbles.
A. Provide hints of samples for foreground and background by
marking connected lines as in the right figure. These samples
form sample distribution for the foreground and background.
B. From the user-provided samples, estimate the conditional
probability densities ! " ℱ), ! " ℬ) for foreground and
background. To resolve non-smoothness and sparsity of the
densities, use nonparametric smoothing technique to smooth
these densities. Use kernel smoothing with Epanechnikov kernel.
C. For every pixel in the image, compute the probability of how
each pixel is likely to be the foreground or background using
Bayes’s rule, i.e., ! ℱ ") =
((*|ℱ)
( ℱ ⋅((*|ℱ)-( ℬ ⋅((*|ℬ)
.
D. For each pair of pixels (x,y) in the image, measure the distance
between two points regarding how likely two points belong to
the same group. Specifically, compute geodesic distance defined
by . ", / = min
34,5
∫ |7 8 ⋅ 9:*,; 8 |
;
*
, where 7 8 =
	9! ℱ 8) and :*,; 8 is any arbitrary path from pixel " to /.
E. Computing . ", / for each pair of pixels reduces to computing
shortest path in a discretized image space with 4-neighbour
scheme. Use Dijstra’s single source shortest path algorithm to
compute all the distances, which takes time complexity of
=(> log >), where >	is the total number of pixels in the image.
F. Based on the user-provided samples and computed distances,
determine whether a given pixel " is more likely to belong to the
foreground or background.4. Image inpainting
In order to recover the original image after segmenting the single bubble, we need to
inpaint the regions where all the other bubbles are removed.
A. Detect all the bubbles using edge detection techniques
B. Remove all the bubbles from the image except the selected one.
C. Inpaint the removed regions B by solving ∆D = 0	over B with Dirichlet boundary
condition.
2. Penetration depth
The penetration depth is defined as the bubble’s
penetrating distance along the upper edge of the
nozzle, which is a significant feature for bubbles
that is determined by different diameters of
nozzle and fluid speed.
A. Use Canny-edge detector to process binary
images and choose proper threshold to
generate clear edge of the first bubble.
B. Use loops to find peak values in a set of
bubble images
3. Departure frequency
Bubble departure frequency is the rate of
generating new bubbles from the nozzle.
A. Use Canny-edge detector to find the upper
horizontal edge of the nozzle, using an
imaginary horizontal line for scanning.
B. Detect the moment when each bubble just
separates from the nozzle by sweeping the
scan line.
C. Based on the recorded separated points,
calculate the number of images between two
seperated moments to get departure
frequency.
6. Bubble detection
The goal of this algorithm is to detect the
position of the region of bubble by labeling
the connection components. This method is
useful for further extracting the property
information in bubble images.
A. After image preprocessing, the
connected components of the binary
image is labeled with arbitrary numbers
(“1” to “8”).
B. With the labeled binary image, the
numbers are reindexed based on the
barycenter of the bubble from bottom to
top. Therefore, the positions and regions
of the bubbles are easily detected.
Objectives

More Related Content

What's hot

Color Image Processing: Basics
Color Image Processing: BasicsColor Image Processing: Basics
Color Image Processing: Basics
A B Shinde
 
Image Representation & Descriptors
Image Representation & DescriptorsImage Representation & Descriptors
Image Representation & Descriptors
PundrikPatel
 
The motion estimation
The motion estimationThe motion estimation
The motion estimation
sakshij91
 
Concept of basic illumination model
Concept of basic illumination modelConcept of basic illumination model
Concept of basic illumination model
Ankit Garg
 
Walsh transform
Walsh transformWalsh transform
Walsh transform
SachinMaithani1
 
Chapter 9 morphological image processing
Chapter 9   morphological image processingChapter 9   morphological image processing
Chapter 9 morphological image processing
Ahmed Daoud
 
Wavelet transform in two dimensions
Wavelet transform in two dimensionsWavelet transform in two dimensions
Wavelet transform in two dimensions
Ayushi Gagneja
 
Image restoration and degradation model
Image restoration and degradation modelImage restoration and degradation model
Image restoration and degradation model
AnupriyaDurai
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation ppt
Gichelle Amon
 
Illumination models
Illumination modelsIllumination models
Illumination models
KABILESH RAMAR
 
Edge detection-LOG
Edge detection-LOGEdge detection-LOG
Edge detection-LOG
Ankita Khadsare
 
Digital Image Processing - Image Restoration
Digital Image Processing - Image RestorationDigital Image Processing - Image Restoration
Digital Image Processing - Image Restoration
Mathankumar S
 
Wavelet transform in image compression
Wavelet transform in image compressionWavelet transform in image compression
Wavelet transform in image compression
jeevithaelangovan
 
Region Splitting and Merging Technique For Image segmentation.
Region Splitting and Merging Technique For Image segmentation.Region Splitting and Merging Technique For Image segmentation.
Region Splitting and Merging Technique For Image segmentation.
SomitSamanto1
 
Ray tracing
Ray tracingRay tracing
Ray tracing
Farah Shaikh
 
Color models
Color modelsColor models
Color models
Haitham Ahmed
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantization
VARUN KUMAR
 
Lecture 1 for Digital Image Processing (2nd Edition)
Lecture 1 for Digital Image Processing (2nd Edition)Lecture 1 for Digital Image Processing (2nd Edition)
Lecture 1 for Digital Image Processing (2nd Edition)
Moe Moe Myint
 
Unit ii
Unit iiUnit ii
Information Theory - Introduction
Information Theory  -  IntroductionInformation Theory  -  Introduction
Information Theory - Introduction
Burdwan University
 

What's hot (20)

Color Image Processing: Basics
Color Image Processing: BasicsColor Image Processing: Basics
Color Image Processing: Basics
 
Image Representation & Descriptors
Image Representation & DescriptorsImage Representation & Descriptors
Image Representation & Descriptors
 
The motion estimation
The motion estimationThe motion estimation
The motion estimation
 
Concept of basic illumination model
Concept of basic illumination modelConcept of basic illumination model
Concept of basic illumination model
 
Walsh transform
Walsh transformWalsh transform
Walsh transform
 
Chapter 9 morphological image processing
Chapter 9   morphological image processingChapter 9   morphological image processing
Chapter 9 morphological image processing
 
Wavelet transform in two dimensions
Wavelet transform in two dimensionsWavelet transform in two dimensions
Wavelet transform in two dimensions
 
Image restoration and degradation model
Image restoration and degradation modelImage restoration and degradation model
Image restoration and degradation model
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation ppt
 
Illumination models
Illumination modelsIllumination models
Illumination models
 
Edge detection-LOG
Edge detection-LOGEdge detection-LOG
Edge detection-LOG
 
Digital Image Processing - Image Restoration
Digital Image Processing - Image RestorationDigital Image Processing - Image Restoration
Digital Image Processing - Image Restoration
 
Wavelet transform in image compression
Wavelet transform in image compressionWavelet transform in image compression
Wavelet transform in image compression
 
Region Splitting and Merging Technique For Image segmentation.
Region Splitting and Merging Technique For Image segmentation.Region Splitting and Merging Technique For Image segmentation.
Region Splitting and Merging Technique For Image segmentation.
 
Ray tracing
Ray tracingRay tracing
Ray tracing
 
Color models
Color modelsColor models
Color models
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantization
 
Lecture 1 for Digital Image Processing (2nd Edition)
Lecture 1 for Digital Image Processing (2nd Edition)Lecture 1 for Digital Image Processing (2nd Edition)
Lecture 1 for Digital Image Processing (2nd Edition)
 
Unit ii
Unit iiUnit ii
Unit ii
 
Information Theory - Introduction
Information Theory  -  IntroductionInformation Theory  -  Introduction
Information Theory - Introduction
 

Similar to Poster image processing

Iris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmIris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
Editor IJCATR
 
E017443136
E017443136E017443136
E017443136
IOSR Journals
 
E0442328
E0442328E0442328
E0442328
IJERA Editor
 
Av4301248253
Av4301248253Av4301248253
Av4301248253
IJERA Editor
 
Kevin_Park_OSU_ Master_Project Report
Kevin_Park_OSU_ Master_Project ReportKevin_Park_OSU_ Master_Project Report
Kevin_Park_OSU_ Master_Project Report
Kevin Park
 
OBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGE
OBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGEOBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGE
OBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGE
IJCSEA Journal
 
Object Detection for Service Robot Using Range and Color Features of an Image
Object Detection for Service Robot Using Range and Color Features of an ImageObject Detection for Service Robot Using Range and Color Features of an Image
Object Detection for Service Robot Using Range and Color Features of an Image
IJCSEA Journal
 
Object detection for service robot using range and color features of an image
Object detection for service robot using range and color features of an imageObject detection for service robot using range and color features of an image
Object detection for service robot using range and color features of an image
IJCSEA Journal
 
IRJET- Image Feature Extraction using Hough Transformation Principle
IRJET- Image Feature Extraction using Hough Transformation PrincipleIRJET- Image Feature Extraction using Hough Transformation Principle
IRJET- Image Feature Extraction using Hough Transformation Principle
IRJET Journal
 
A Method of Survey on Object-Oriented Shadow Detection & Removal for High Res...
A Method of Survey on Object-Oriented Shadow Detection & Removal for High Res...A Method of Survey on Object-Oriented Shadow Detection & Removal for High Res...
A Method of Survey on Object-Oriented Shadow Detection & Removal for High Res...
IJERA Editor
 
Reconstruction of Inner Worm Passage of Quercus Mongolica Seeds
Reconstruction of Inner Worm Passage of Quercus Mongolica SeedsReconstruction of Inner Worm Passage of Quercus Mongolica Seeds
Reconstruction of Inner Worm Passage of Quercus Mongolica Seeds
Dr. Amarjeet Singh
 
Morphological Operations (2).pptx
Morphological Operations (2).pptxMorphological Operations (2).pptx
Morphological Operations (2).pptx
RiyaLuThra7
 
SALIENCY MAP BASED IMPROVED SEGMENTATION
SALIENCY MAP BASED IMPROVED SEGMENTATIONSALIENCY MAP BASED IMPROVED SEGMENTATION
SALIENCY MAP BASED IMPROVED SEGMENTATION
Prerana Mukherjee
 
Denoising and Edge Detection Using Sobelmethod
Denoising and Edge Detection Using SobelmethodDenoising and Edge Detection Using Sobelmethod
Denoising and Edge Detection Using Sobelmethod
IJMER
 
Image segmentation for high resolution images
Image segmentation for high resolution imagesImage segmentation for high resolution images
Image segmentation for high resolution images
jeet patalia
 
Face Detection and Recognition Using Back Propagation Neural Network and Four...
Face Detection and Recognition Using Back Propagation Neural Network and Four...Face Detection and Recognition Using Back Propagation Neural Network and Four...
Face Detection and Recognition Using Back Propagation Neural Network and Four...
sipij
 
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
IOSR Journals
 
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKINGAPPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
sipij
 
Computer Graphics: Visible surface detection methods
Computer Graphics: Visible surface detection methodsComputer Graphics: Visible surface detection methods
Computer Graphics: Visible surface detection methods
Joseph Charles
 
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
IJEEE
 

Similar to Poster image processing (20)

Iris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmIris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
 
E017443136
E017443136E017443136
E017443136
 
E0442328
E0442328E0442328
E0442328
 
Av4301248253
Av4301248253Av4301248253
Av4301248253
 
Kevin_Park_OSU_ Master_Project Report
Kevin_Park_OSU_ Master_Project ReportKevin_Park_OSU_ Master_Project Report
Kevin_Park_OSU_ Master_Project Report
 
OBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGE
OBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGEOBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGE
OBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGE
 
Object Detection for Service Robot Using Range and Color Features of an Image
Object Detection for Service Robot Using Range and Color Features of an ImageObject Detection for Service Robot Using Range and Color Features of an Image
Object Detection for Service Robot Using Range and Color Features of an Image
 
Object detection for service robot using range and color features of an image
Object detection for service robot using range and color features of an imageObject detection for service robot using range and color features of an image
Object detection for service robot using range and color features of an image
 
IRJET- Image Feature Extraction using Hough Transformation Principle
IRJET- Image Feature Extraction using Hough Transformation PrincipleIRJET- Image Feature Extraction using Hough Transformation Principle
IRJET- Image Feature Extraction using Hough Transformation Principle
 
A Method of Survey on Object-Oriented Shadow Detection & Removal for High Res...
A Method of Survey on Object-Oriented Shadow Detection & Removal for High Res...A Method of Survey on Object-Oriented Shadow Detection & Removal for High Res...
A Method of Survey on Object-Oriented Shadow Detection & Removal for High Res...
 
Reconstruction of Inner Worm Passage of Quercus Mongolica Seeds
Reconstruction of Inner Worm Passage of Quercus Mongolica SeedsReconstruction of Inner Worm Passage of Quercus Mongolica Seeds
Reconstruction of Inner Worm Passage of Quercus Mongolica Seeds
 
Morphological Operations (2).pptx
Morphological Operations (2).pptxMorphological Operations (2).pptx
Morphological Operations (2).pptx
 
SALIENCY MAP BASED IMPROVED SEGMENTATION
SALIENCY MAP BASED IMPROVED SEGMENTATIONSALIENCY MAP BASED IMPROVED SEGMENTATION
SALIENCY MAP BASED IMPROVED SEGMENTATION
 
Denoising and Edge Detection Using Sobelmethod
Denoising and Edge Detection Using SobelmethodDenoising and Edge Detection Using Sobelmethod
Denoising and Edge Detection Using Sobelmethod
 
Image segmentation for high resolution images
Image segmentation for high resolution imagesImage segmentation for high resolution images
Image segmentation for high resolution images
 
Face Detection and Recognition Using Back Propagation Neural Network and Four...
Face Detection and Recognition Using Back Propagation Neural Network and Four...Face Detection and Recognition Using Back Propagation Neural Network and Four...
Face Detection and Recognition Using Back Propagation Neural Network and Four...
 
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
 
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKINGAPPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING
 
Computer Graphics: Visible surface detection methods
Computer Graphics: Visible surface detection methodsComputer Graphics: Visible surface detection methods
Computer Graphics: Visible surface detection methods
 
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

Poster image processing

  • 1. Bubble Character Analysis using Image Processing Methods Guangshen Ma, Ziyao Wang, Yihui Feng, Minwoo Kim Duke University Introduction The goal of this project is to process the bubble images using image processing algorithms so that we can easily study the dynamics properties of bubbles. In order to further analyze bubble’s characters such as velocity and trajectory path, interactive segmentation and bubble region detection algorithms can be used to detect the bubble position and to extract its physical information. Then, image inpainting algorithm is used to focus on a single bubble of interest. Also, the bubble’s penetration depth and departure frequency are measured with our methods. 1. Preprocess raw images 2. Measure penetration depth 3. Estimate bubble’s departure frequency 4. Inpaint the damaged image 5. Segment out a single bubble using interactive segmentation 6. Detect the bubble region Algorithm and results 1. Preprocessing A. Background processing: Subtract pure background image from bubble image. B. Grayscale processing: Change the RGB color image to gray image. C. Binary processing: Identify bubble shape by binarization. D. Bubble padding: Filling holes inside bubble regions. E. Canny edge detection: Detect the edge using Canny-edge detector. Algorithm and results Further work includes developing algorithms of bubble ellipse reconstruction using Hough transform and using methods of Gray-level Co-occurrence Matrix for flow regime classification. Algorithm and results Future work 5. Interactive segmentation To study the behavior of a single bubble, we segment out the bubble of interest from the rest of the other bubbles. A. Provide hints of samples for foreground and background by marking connected lines as in the right figure. These samples form sample distribution for the foreground and background. B. From the user-provided samples, estimate the conditional probability densities ! " ℱ), ! " ℬ) for foreground and background. To resolve non-smoothness and sparsity of the densities, use nonparametric smoothing technique to smooth these densities. Use kernel smoothing with Epanechnikov kernel. C. For every pixel in the image, compute the probability of how each pixel is likely to be the foreground or background using Bayes’s rule, i.e., ! ℱ ") = ((*|ℱ) ( ℱ ⋅((*|ℱ)-( ℬ ⋅((*|ℬ) . D. For each pair of pixels (x,y) in the image, measure the distance between two points regarding how likely two points belong to the same group. Specifically, compute geodesic distance defined by . ", / = min 34,5 ∫ |7 8 ⋅ 9:*,; 8 | ; * , where 7 8 = 9! ℱ 8) and :*,; 8 is any arbitrary path from pixel " to /. E. Computing . ", / for each pair of pixels reduces to computing shortest path in a discretized image space with 4-neighbour scheme. Use Dijstra’s single source shortest path algorithm to compute all the distances, which takes time complexity of =(> log >), where > is the total number of pixels in the image. F. Based on the user-provided samples and computed distances, determine whether a given pixel " is more likely to belong to the foreground or background.4. Image inpainting In order to recover the original image after segmenting the single bubble, we need to inpaint the regions where all the other bubbles are removed. A. Detect all the bubbles using edge detection techniques B. Remove all the bubbles from the image except the selected one. C. Inpaint the removed regions B by solving ∆D = 0 over B with Dirichlet boundary condition. 2. Penetration depth The penetration depth is defined as the bubble’s penetrating distance along the upper edge of the nozzle, which is a significant feature for bubbles that is determined by different diameters of nozzle and fluid speed. A. Use Canny-edge detector to process binary images and choose proper threshold to generate clear edge of the first bubble. B. Use loops to find peak values in a set of bubble images 3. Departure frequency Bubble departure frequency is the rate of generating new bubbles from the nozzle. A. Use Canny-edge detector to find the upper horizontal edge of the nozzle, using an imaginary horizontal line for scanning. B. Detect the moment when each bubble just separates from the nozzle by sweeping the scan line. C. Based on the recorded separated points, calculate the number of images between two seperated moments to get departure frequency. 6. Bubble detection The goal of this algorithm is to detect the position of the region of bubble by labeling the connection components. This method is useful for further extracting the property information in bubble images. A. After image preprocessing, the connected components of the binary image is labeled with arbitrary numbers (“1” to “8”). B. With the labeled binary image, the numbers are reindexed based on the barycenter of the bubble from bottom to top. Therefore, the positions and regions of the bubbles are easily detected. Objectives