International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
mathematical model for image restoration based on fractional order total vari...IJAEMSJORNAL
This paper addresses mathematical model for signal restoration based on fractional order total variation (FOTV) for multiplicative noise. In alternating minimization algorithm the Newton method is coupled with time-marching scheme for the solutions of the corresponding PDEs related to the minimization of the denoising model. Results obtained from experiments show that our model can not only reduce the staircase effect of the restored images but also better improve the PSNR as compare to other existed methods.
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...sipij
The present paper, proposes an efficient denoising algorithm which works well for images corrupted with
Gaussian and speckle noise. The denoising algorithm utilizes the alexander fractional integral filter which
works by the construction of fractional masks window computed using alexander polynomial. Prior to the
application of the designed filter, the corrupted image is decomposed using symlet wavelet from which only
the horizontal, vertical and diagonal components are denoised using the alexander integral filter.
Significant increase in the reconstruction quality was noticed when the approach was applied on the
wavelet decomposed image rather than applying it directly on the noisy image. Quantitatively the results
are evaluated using the peak signal to noise ratio (PSNR) which was 30.8059 on an average for images
corrupted with Gaussian noise and 36.52 for images corrupted with speckle noise, which clearly
outperforms the existing methods.
mathematical model for image restoration based on fractional order total vari...IJAEMSJORNAL
This paper addresses mathematical model for signal restoration based on fractional order total variation (FOTV) for multiplicative noise. In alternating minimization algorithm the Newton method is coupled with time-marching scheme for the solutions of the corresponding PDEs related to the minimization of the denoising model. Results obtained from experiments show that our model can not only reduce the staircase effect of the restored images but also better improve the PSNR as compare to other existed methods.
ALEXANDER FRACTIONAL INTEGRAL FILTERING OF WAVELET COEFFICIENTS FOR IMAGE DEN...sipij
The present paper, proposes an efficient denoising algorithm which works well for images corrupted with
Gaussian and speckle noise. The denoising algorithm utilizes the alexander fractional integral filter which
works by the construction of fractional masks window computed using alexander polynomial. Prior to the
application of the designed filter, the corrupted image is decomposed using symlet wavelet from which only
the horizontal, vertical and diagonal components are denoised using the alexander integral filter.
Significant increase in the reconstruction quality was noticed when the approach was applied on the
wavelet decomposed image rather than applying it directly on the noisy image. Quantitatively the results
are evaluated using the peak signal to noise ratio (PSNR) which was 30.8059 on an average for images
corrupted with Gaussian noise and 36.52 for images corrupted with speckle noise, which clearly
outperforms the existing methods.
Image Restoration And Reconstruction
Mean Filters
Order-Statistic Filters
Spatial Filtering: Mean Filters
Adaptive Filters
Adaptive Mean Filters
Adaptive Median Filters
Image Restitution Using Non-Locally Centralized Sparse Representation ModelIJERA Editor
Sparse representation models uses a linear combination of a few atoms selected from an over-completed
dictionary to code an image patch which have given good results in different image restitution applications. The
reconstruction of the original image is not so accurate using traditional models of sparse representation to solve
degradation problems which are blurring, noisy, and down-sampled. The goal of image restitution is to suppress
the sparse coding noise and to improve the image quality by using the concept of sparse representation. To
obtain a good sparse coding coefficients of the original image we exploit the image non-local self similarity and
then by centralizing the sparse coding coefficients of the observation image to those estimates. This non-locally
centralized sparse representation model outperforms standard sparse representation models in all aspects of
image restitution problems including de-noising, de-blurring, and super-resolution.
Theories and Engineering Technics of 2D-to-3D Back-Projection ProblemSeongcheol Baek
The slides introduce mathematical basics of 3d-to-2d image projection, 2d-to-3d back-projection problem, and its engineering technics, such as convex optimization problem, principal component analysis (PCV), singular value decomposition (SVD), etc.
Robust Image Denoising in RKHS via Orthogonal Matching PursuitPantelis Bouboulis
We present a robust method for the image denoising task based on kernel ridge regression and sparse modeling. Added noise is assumed to consist of two parts. One part is impulse noise assumed to be sparse (outliers), while the other part is bounded noise. The noisy image is divided into small regions of interest, whose pixels are regarded as points of a two-dimensional surface. A kernel based ridge regression method, whose parameters are selected adaptively, is employed to fit the data, whereas the outliers are detected via the use of the increasingly popular orthogonal matching pursuit (OMP) algorithm. To this end, a new variant of the OMP rationale is employed that has the additional advantage to automatically terminate, when all outliers have been selected.
A digital image forensic approach to detect whether
an image has been seam carved or not is investigated herein.
Seam carving is a content-aware image retargeting technique
which preserves the semantically important content of an image
while resizing it. The same technique, however, can be used
for malicious tampering of an image. 18 energy, seam, and
noise related features defined by Ryu [1] are produced using
Sobel’s [2] gradient filter and Rubinstein’s [3] forward energy
criterion enhanced with image gradients. An extreme gradient
boosting classifier [4] is trained to make the final decision.
Experimental results show that the proposed approach improves
the detection accuracy from 5 to 10% for seam carved images
with different scaling ratios when compared with other state-ofthe-
art methods.
A Hough Transform Implementation for Line Detection for a Mobile Robot Self-N...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Image Restoration And Reconstruction
Mean Filters
Order-Statistic Filters
Spatial Filtering: Mean Filters
Adaptive Filters
Adaptive Mean Filters
Adaptive Median Filters
Image Restitution Using Non-Locally Centralized Sparse Representation ModelIJERA Editor
Sparse representation models uses a linear combination of a few atoms selected from an over-completed
dictionary to code an image patch which have given good results in different image restitution applications. The
reconstruction of the original image is not so accurate using traditional models of sparse representation to solve
degradation problems which are blurring, noisy, and down-sampled. The goal of image restitution is to suppress
the sparse coding noise and to improve the image quality by using the concept of sparse representation. To
obtain a good sparse coding coefficients of the original image we exploit the image non-local self similarity and
then by centralizing the sparse coding coefficients of the observation image to those estimates. This non-locally
centralized sparse representation model outperforms standard sparse representation models in all aspects of
image restitution problems including de-noising, de-blurring, and super-resolution.
Theories and Engineering Technics of 2D-to-3D Back-Projection ProblemSeongcheol Baek
The slides introduce mathematical basics of 3d-to-2d image projection, 2d-to-3d back-projection problem, and its engineering technics, such as convex optimization problem, principal component analysis (PCV), singular value decomposition (SVD), etc.
Robust Image Denoising in RKHS via Orthogonal Matching PursuitPantelis Bouboulis
We present a robust method for the image denoising task based on kernel ridge regression and sparse modeling. Added noise is assumed to consist of two parts. One part is impulse noise assumed to be sparse (outliers), while the other part is bounded noise. The noisy image is divided into small regions of interest, whose pixels are regarded as points of a two-dimensional surface. A kernel based ridge regression method, whose parameters are selected adaptively, is employed to fit the data, whereas the outliers are detected via the use of the increasingly popular orthogonal matching pursuit (OMP) algorithm. To this end, a new variant of the OMP rationale is employed that has the additional advantage to automatically terminate, when all outliers have been selected.
A digital image forensic approach to detect whether
an image has been seam carved or not is investigated herein.
Seam carving is a content-aware image retargeting technique
which preserves the semantically important content of an image
while resizing it. The same technique, however, can be used
for malicious tampering of an image. 18 energy, seam, and
noise related features defined by Ryu [1] are produced using
Sobel’s [2] gradient filter and Rubinstein’s [3] forward energy
criterion enhanced with image gradients. An extreme gradient
boosting classifier [4] is trained to make the final decision.
Experimental results show that the proposed approach improves
the detection accuracy from 5 to 10% for seam carved images
with different scaling ratios when compared with other state-ofthe-
art methods.
A Hough Transform Implementation for Line Detection for a Mobile Robot Self-N...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Investigative Compression Of Lossy Images By Enactment Of Lattice Vector Quan...IJERA Editor
In the digital era we live in, efficient representation of data generated by a discrete source and its reliable transmission are unquestionable need. In this work we have focused on source coding taking image as source. Lattice Vector Quantization (LVQ) can be used for source coding as well as for channel coding. (LVQ) with Generator Matrix (GM) and codebook is implemented. When implementation using codebook is done, two codebooks are constructed, one with 256 lattice points that are closest to (0,0,0,0) and another with 256 lattice points that are closest to (1,0,0,0). Energy for both the codes is calculated. When we compare the energy of both the codes we find that codes centered at a non lattice point is lower energy code.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance Evaluation of Wormhole Attack In AODVIJERA Editor
The Mobile Ad hoc Networks (MANETs) is a collection of wireless nodes which interact with each other by sending packets to one another or on behalf of another node, without any central network infrastructure to control data routing. For communication, the nodes cooperatively forward data packets to other nodes in network by using the routing protocol. But, these routing protocols are not secure, thus paving the way for the MANET to be open to malicious attacks. A malicious attack which is commonly observed in MANET environment is wormhole attack. The objective of this work is to analyze the performance parameters of throughput, delay and packet loss in AODV with the existence of wormhole attack. Simulation results have shown that the performance parameters are affected very much when there is an attack due to wormholes
Statistical Evaluation of Wastewater Characteristics at the Inlet – Outlet of...IJERA Editor
Effluent to Influent concentration ratios for BOD, COD, TSS and Food-to-Microorganisms (F/M) ratio are measure of treatment plant efficiency. Daily observed inlet and outlet concentrations at ASP in a plant are plotted as time series for Pre-monsoon (January – May) and Post-monsoon (July – December, 2013) period. BOD vs TSS and BOD vs COD indicated that inlet concentrations are ~ 80 % reduced in treatment process. Correlation matrix indicated strong correlationbetween COD and TSS of post-monsoon raw sewage, while weak correlation among the rest. Principle Component Analysis (PCA) and Factor Analysis (FA) are used to characterize wastewater at the inlet and outlet of ASP. PCA & FA clustered wastewater quality parameters into strongly correlated groups - pH, COD and BOD as PC1 in pre-monsoon raw sewage while, DO and F/Maverageas PC1 in post-monsoon raw sewage. All parameters (pH, TSS, COD, BOD, O&G) of treated effluent in pre-monsoon period are grouped into PC1. In post-monsoon period, for treated effluent, pH, DO, TSS and F/Maverageare clustered as PC1. Effluent BOD, COD and TSS are dependent variables with F/Maverage as independent variable for regression analysis. Regression fits developed with 2013 data for these effluent concentrations fit well with field samples (December 2013 – March 2014) and with routine monitored data (January – March, 2014), thus, validating the model. Effluent concentrations indicated 80 – 95% of removal efficiency. Thus, F/Maverage ratios obtained from regression fit can further be considered as design parameters for efficient functioning of ASP and can be used to design the inflow and outflow characteristics for any treatment plant with similar process conditions.
A comparative study for detection and measurement of voltage disturbance in o...IJERA Editor
Voltage disturbance is the most important power quality problem faced by many industrial customers. It includes voltage sag, swell, spikes and harmonics. Real time detection of these voltage disturbances posed various problems. This paper compares the various methods of detection of voltage sag and swells in real time on the basis of detection time, magnitude, effect of windowing and effect of sampling frequencies. The RMS, Peak, Fourier transform and Missing Voltage algorithm are introduced and discussed in them for real time implementation. Comparative analysis reveals that quantification of voltage sag and swell is possible using these measurements. The main focus is given on to these points and all the voltage sag and swell detection technique tested online with the help of advantech card data acquisition. The voltage sag and swell events are generated by using practical experimentation in laboratory.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...CSCJournals
Curvelets denoise approach has been widely used in many fields for its ability to obtain high quality result images.Curvelet transform is superior to wavelet in the expression of image edge, such as geometry characteristic of curve, which has already obtained good results in image denoising. However artifacts those appear in the result images of Curvelets approach prevent its application in some fields such as medical image. This paper puts forward a fusion based method because certain regions of the image have the ringing and radial stripe after Curvelets transform. The experimental results indicate that fusion method has an abroad future for eliminating the noise of images. The results of the algorithm applied to ultrasonic medical images also indicate that the algorithm can be used efficiently in medical image fields.
Filtering Corrupted Image and Edge Detection in Restored Grayscale Image Usin...CSCJournals
In this paper, different first and second derivative filters are investigated to find edge map after denoising a corrupted gray scale image. We have proposed a new derivative filter of first order and described a novel approach of edge finding with an aim to find better edge map in a restored gray scale image. Subjective method has been used by visually comparing the performance of the proposed derivative filter with other existing first and second order derivative filters. The root mean square error and root mean square of signal to noise ratio have been used for objective evaluation of the derivative filters. Finally, to validate the efficiency of the filtering schemes different algorithms are proposed and the simulation study has been carried out using MATLAB 5.0.
Performance Evaluation of Image Edge Detection Techniques CSCJournals
The success of an image recognition procedure is related to the quality of the edges marked. The
aim of this research is to investigate and evaluate edge detection techniques when applied to
noisy images at different scales. Sobel, Prewitt, and Canny edge detection algorithms are
evaluated using artificially generated images and comparison criteria: edge quality (EQ) and map
quality (MQ). The results demonstrated that the use of these criteria can be utilized as an aid for
further analysis and arbitration to find the best edge detector for a given image.
Efficient fingerprint image enhancement algorithm based on gabor filtereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Edge Extraction with an Anisotropic Vector Field using Divergence MapCSCJournals
The aim of this work is the extraction of edges by a deformable contour procedure, using an external force field derived from an anisotropic flow, with different external and initial conditions. By evaluating the divergence of the force field, we have generated a divergence map associated with it in order to analyze the field convergence. As we know, the divergence measures the intensity of convergence or divergence of a vector field at a given point, so by means level curves of the divergence map, we have automatically selected an initial contour for the deformation process. The initial curve must include areas from which the vector field diverges pushing it towards the edges. Furthermore the divergence map brings out the presence of curves pointing to the most significant geometric parts of boundaries corresponding to high curvature values, in this way it will result better defined the geometrical shape of the extracted object.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINijistjournal
In this paper A Median Based Directional Cascaded with Mask (MBDCM) filter has been proposed, which is based on three different sized cascaded filtering windows. The differences between the current pixel and its neighbors aligned with four main directions are considered for impulse detection. A direction index is used for each edge aligned with a given direction. Minimum of these four direction indexes is used for impulse detection under each masking window. Depending on the minimum direction indexes among these three windows new value to substitute the noisy pixel is calculated. Extensive simulations showed that the MBDCM filter provides good performances of suppressing impulses from both gray level and colored benchmarked images corrupted with low noise level as well as for highly dense impulses. MBDCM filter gives better results than MDWCMM filter in suppressing impulses from highly corrupted digital images.
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINijistjournal
In this paper A Median Based Directional Cascaded with Mask (MBDCM) filter has been proposed, which is based on three different sized cascaded filtering windows. The differences between the current pixel and its neighbors aligned with four main directions are considered for impulse detection. A direction index is used for each edge aligned with a given direction. Minimum of these four direction indexes is used for impulse detection under each masking window. Depending on the minimum direction indexes among these three windows new value to substitute the noisy pixel is calculated. Extensive simulations showed that the MBDCM filter provides good performances of suppressing impulses from both gray level and colored benchmarked images corrupted with low noise level as well as for highly dense impulses. MBDCM filter gives better results than MDWCMM filter in suppressing impulses from highly corrupted digital images.
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...sipij
This paper focuses on improved edge model based on Curvelet coefficients analysis. Curvelet transform is
a powerful tool for multiresolution representation of object with anisotropic edge. Curvelet coefficients
contributions have been analyzed using Scale Invariant Feature Transform (SIFT), commonly used to study
local structure in images. The permutation of Curvelet coefficients from original image and edges image
obtained from gradient operator is used to improve original edges. Experimental results show that this
method brings out details on edges when the decomposition scale increases.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Using Generic Image Processing Operations to Detect a Calibration GridJan Wedekind
Camera calibration is an important problem in 3D computer vision. The problem of determining the camera parameters has been studied extensively. However the algorithms for determining the required correspondences are either semi-automatic (i.e. they require user interaction) or they involve difficult to implement custom algorithms.
We present a robust algorithm for detecting the corners of a calibration grid and assigning the correct correspondences for calibration . The solution is based on generic image processing operations so that it can be implemented quickly. The algorithm is limited to distortion-free cameras but it could potentially be extended to deal with camera distortion as well. We also present a corner detector based on steerable filters. The corner detector is particularly suited for the problem of detecting the corners of a calibration grid.
- See more at: http://figshare.com/articles/Using_Generic_Image_Processing_Operations_to_Detect_a_Calibration_Grid/696880#sthash.EG8dWyTH.dpuf
DESIGN OF QUATERNARY LOGICAL CIRCUIT USING VOLTAGE AND CURRENT MODE LOGICVLSICS Design
In VLSI technology, designers main concentration were on area required and on performance of the
device. In VLSI design power consumption is one of the major concerns due to continuous increase in chip
density and decline in size of CMOS circuits and frequency at which circuits are operating. By considering
these parameter logical circuits are designed using quaternary voltage mode logic and quaternary current
mode logic. Power consumption required for quaternary voltage mode logic is 51.78 % less as compared
to binary . Area in terms of number of transistor required for quaternary voltage mode logic is 3 times
more as compared to binary. As quaternary voltage mode circuit required large area as compared to
quaternary current mode circuit but power consumption required in quaternary voltage mode circuit is less
than that required in quaternary current mode circuit .
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
When stars align: studies in data quality, knowledge graphs, and machine lear...
R04404112115
1. H. Aboelsoud M. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.112-115
www.ijera.com 112 | P a g e
Edge Detection Using Directional Filtering
H. Aboelsoud M.
(Military Technical Colleague – Egyptian Armed Forces)
ABSTRACT
Edge detection can be performed by applying an edge filter in n directions. Conceptually, in order to estimate
gradient, that is, to determine the edge map, eight filtering directions, e.g. (0, π/8, π/4, 3π/8, π/2, 5π/8, 3π/4,
7π/8), constitute the sufficient basis for the gradient calculation. Computationally, such a two-dimensional (2-D)
eight-directional filter can be represented by a pair of real masks, that is, by one complex-number matrix. Final
edges are determined after applying the non-maximum suppression followed by thresholding with hysteresis
algorithms to obtain smooth and connected edge map.
Keywords - Conjugate images, directional filtering, edge detection.
I. INTRODUCTION
An edge is characterized by an abrupt change in
intensity indicating the boundary between two
regions in an image. It is a local property of an
individual pixel and is calculated from the image
function in a neighborhood of the pixel. Edge
detection is a fundamental operation in computer
vision and image processing. It concerns the
detection of significant variations of a grey level
image. The output of this operation is mainly used in
higher-level visual processing like three-dimensional
(3-D) reconstruction, stereo motion analysis,
recognition, scene segmentation, image compression,
etc. Hence, it is important for a detector to be
efficient and reliable [1].
In computer vision, edge detection is
traditionally implemented by convolving the image
with some form of linear filter, usually a filter that
approximates a first or second derivative operator.
An odd symmetric filter will approximate a first
derivative, and peaks in the convolution output will
correspond to edges (luminance discontinuities) in
the image. An even symmetric filter will approximate
a second derivative operator. Zero-crossings in the
output of convolution with an even symmetric filter
will correspond to edges [2].
If we ignore the noise present in images, edge
detection can be based primarily on the computation
of the gradient of intensity with subsequent
thresholding of its magnitude. For this purpose the
popular filters, like the Sobel filter [3], are used.
Hence, a typical simple method of obtaining an edge
strength map is based on the estimation of two
components of the intensity gradient vector using
horizontal and vertical Sobel masks. Taking noise
and edge imperfection into consideration, edge filters
are traditionally constructed so as to improve the
suppression of unwanted disturbances by appropriate
lowpass filtering. The idea has originated perhaps
from the concept of stochastic gradient [4] and from
work of Marr and Hildreth [5], and in its current form
was introduced by Canny [6] and developed further
in many works using various criteria of optimality of
the edge detection process. Following a classification
of the optimal one-dimensional (1-D) edge filters
presented by Heijden [7], the following operators are
considered to be the main contenders: Canny [6] and
its version by Deriche [8], Shen–Castan [9], [10],
(see also [11]), Sarkar–Boyer [12], Boie–Cox [13],
Spacek [14], Petrou-Kittler [15], and the CVM
detector of Heijden [7]. The above filters were
primarily constructed as 1-D filters and then extended
appropriately into two dimensions.
This paper is focused on the use of directional
filtering for edge detection. We show that,
eventually, a 2-D eight-directional edge filter can be
represented by a pair of matrix filters, or equivalently
by one complex-number filter. We start with the
description of the details of the eight-directional 2-D
edge filter. In the next section we present
experimental results of its application for edge
detection in real life images. Finally, a conclusion is
presented in Section-4.
RESEARCH ARTICLE OPEN ACCESS
2. H. Aboelsoud M. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.112-115
www.ijera.com 113 | P a g e
(9)
(10)
(11)
II. Eight-Directional Filter
Consider a digital grey level image F(x,y),
assume we wish to convolve the image with a 2D
Gaussian filter to smooth it. The 2D Gaussian
smoothing operator G(x,y) is given by:
e
yx
yxG
2
1 2
22
2
)(
),(
(1)
where x,y are the image co-ordinates and σ is a
standard deviation of the associated probability
distribution [16].
Let f(x,y) denotes to the smoothed image, then:
f(x,y) = F(x,y) G(x,y) (2)
where denotes to the convolution operation.
Consider a neighborhood R of a pixel (x,y) expanded
in the direction d as shown in Fig. 1. A general
nonlinear filtering operation over the region R may
now be defined by [17]:
f(x,y)→g((x,y);R)=
R
uuuyuxfh )),,(( 21 (3)
where f(x,y) and g((x,y);R) are the smoothed and
filtered images respectively, such a region of interest
is rotated in the directions(d1; ……. ; dn) to cover the
whole 2π angle.
Fig. 1 Directional neighborhood of a pixel (x,y)
Applying the filtering operation (3) over the
region
R k
; we obtain a so-called conjugate image,
gk (x,y). The edge strength may now be calculated by
performing a vector addition of conjugate images.
Using the complex-number notation, we have:
n
k
j
km
k
eyxgyxg
1
),(),( (4)
where gm(x,y) is a complex-number-valued edge
strength and its magnitude specifies a scalar edge
strength.
If we use linear filters, then a conjugate image in the
kth
direction is calculated as a convolution of the
smoothed image, f(x,y); with a kth
directional filter,
h k , as follows:
gk(x,y) = f(x,y) h k (x,y) (5)
Now, the complex edge strength can be obtained as a
convolution of the smoothed image, f(x,y); with the
complex edge filter h(x,y), as follows:
n
1k
kj
km ey))(x,hy)f(x,()y,x(g (6)
n
1k
kj
km ey)(x,h)y,x(f)y,x(g (7)
gm(x,y) = f(x,y) h(x,y) (8)
where h(x,y) is a sum of appropriately rotated filter
components.
In order to estimate two components of the intensity
gradient, eight filtering directions (aiming at
detecting edges in all directions), e.g. (0, π/8, π/4,
3π/8, π/2, 5π/8, 3π/4, 7π/8), might be required. In this
case, there are eight directions, θk=k π/8,
k=0,1,2,….,7, thus eight filtering regions.
The complex “eight-directional” edge filter, h; can be
directly determined using (7) by adding eight uni-
directional components, namely:
8/7j
8/7
4/3j
4/3
8/5j
8/5
2/j
2/
8/3j
8/3
4/j
4/
8/j
8/0
eheheheh
ehehehhh
for the simplicity let “a” denotes to 8/j
e
, then:
a.
00000
ja0000
0000
0000ja
00000
a.
00000
0ja000
00000
000ja0
00000
a.
0j000
00000
00000
00000
000j0
a.
00000
00a00
00000
00a00
00000
a.
000a0
00000
00000
00000
0a000
a.
00000
000a0
00000
0a000
00000
a.
00000
00001
00000
10000
00000
a.
00000
00000
0a0a0
00000
00000
h
2
2
3
3
2
2
11
Then the complex edge filter can be calculated as:
a.
0j0a0
jajaaa1
0a0a0
1aajaja
0a0j0
h
2
23
11
32
2
3. H. Aboelsoud M. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.112-115
www.ijera.com 114 | P a g e
(12)
0107071.00
7071.09239.09239.03827.00
03827.003827.00
13827.09239.09239.07071.0
07071.0010
.j
0007071.00
7071.03827.03827.09239.01
09239.009239.00
19239.03827.03827.07071.0
07071.0000
h
From equations (11), and (12), a 2D eight-directional
edge filter can be represented by a pair of matrix
filters, or, equivalently by one complex-number filter.
Fig. 2 shows its frequency response.
Fig. 2 Frequency response of eight-directional filter
Equation (12) can be written as:
h(x,y) = hx(x,y) + j hy(x,y) (13)
From equation (8), the edge strength is given by:
gm(x,y) = f(x,y) (hx(x,y) + j hy(x,y)) (14)
gm(x,y) = (f(x,y) (hx(x,y))
+ j (f(x,y) hy(x,y)) (15)
gm(x,y) = fx(x,y) + j fy(x,y) (16)
its magnitude is given by:
2
y
2
xm ))y,x(f())y,x(f())y,x(g(mag (17)
and its direction by )
)y,x(f
)y,x(f
(tan
x
y1 .
III. EXPERIMENTAL RESULTS
The eight-directional edge filter has been
tested with three images: Wall image (Fig. 3), X-ray
image of brain (Fig. 4), and CT image of abdomen
(Fig. 5), and some results are presented in Fig. 6,
Fig.7, and Fig.8 respectively.
Fig. 3 A 256 ×256 Wall image.
Fig. 4 X-ray image of brain
Fig. 5 CT abdomen image
Fig. 6. (a): magnitude of the edge strength obtained
using eight-directional filter of (12). (b): edge map
after non-maximum and thresholding operations
(lower thresh = 0.08, and upper thresh =0.2).
Fig. 7. (a): magnitude of the edge strength obtained
using eight-directional filter of (12). (b): edge map
after non-maximum and thresholding operations
(lower thresh = 0.06, and upper thresh =0.15).
(a)
4. H. Aboelsoud M. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.112-115
www.ijera.com 115 | P a g e
(b)
Fig. 8 (a): magnitude of the edge strength obtained
using eight-directional filter of (12). (b): edge map
after non-maximum and thresholding operations
(lower thresh = 0.048, and upper thresh =0.12).
Figures 6(a), 7(a), and 8(a), illustrate the edge
strength maps generated using convolution of images
with the eight-directional filter of (12). In Figures
6(b), 7(b), and 8(b), the above maps are presented
after operations of the non-maximum suppression
followed by thresholding with hysteresis algorithms.
The threshold parameters are manually adjusted for
best results. It is clear from the figures, that the edge
maps generated using convolution of images with the
eight-directional filter of (12) contain many visibly
important edges.
IV. CONCLUSION
Physical edges are one of the most important
properties of objects. They correspond to object
boundaries or to changes in surface orientation or
material properties. Edges help to extracting useful
information and characteristics of an image.
In this paper, we have discussed how to build a
2-D edge filter that collects information from eight
directions around a central pixel. We show that, such
a 2-D eight-directional filter can be represented by a
pair of real masks, that is, by one complex-number
matrix.
The above filter has been tested in the
preceding section. The test is performed on three real
life images. The final edges are determined after
operations of the non-maximum suppression
followed by thresholding with hysteresis algorithms.
It is to be noted that on all the real life images
considered, the eight-directional edge filter produced
fairly good results.
REFERENCES
[1] Rishi R. Rakesh, Probal Chaudhuri, and C. A.
Murthy „Thresholding in Edge Detection: A
Statistical Approach‟ IEEE Transactions on
image processing, vol. 13, no. 7, July 2004.
[2] E. Davies, “Machine Vision: Theory,
Algorithms and Practicalities”, Academic
Press, pp 101 – 110, 1990.
[3] R. M. Haralick and L. S. Shapiro, Computer
Vision, vol. 1. Reading, MA: Addison-Wesley,
1992.
[4] A. K. Jain, Fundamentals of Digital Image
Processing. Englewood Cliffs, NJ: Prentice-
Hall, 1989.
[5] D. Marr and E. Hildreth, “Theory of edge
detection,” in Proc. R. Soc. Lond. B, vol. 207,
pp. 187–217, 1980.
[6] J. Canny, “A computational approach to edge
detection,” IEEE Trans .Pattern Anal.
Machine Intell., vol. PAMI-8, pp. 679–698,
Nov. 1986.
[7] F. van der Heijden, “Edge and line feature
extraction based on covariance models,”
IEEE Trans. Pattern Anal. Machine Intell.,
vol. 17, pp. 16–33, Jan. 1995.
[8] R. Deriche, “Using Canny‟s criteria to derive
a recursively implemented optimal edge
detector,” Int. J. Comput. Vis., vol. 1, pp.
167–187, 1987.
[9] J. Shen and S. Castan, “An optimal linear
operator for edge detection,” CVGIP: Graph.
Models Image Processing, vol. 54, pp. 112–
133, Mar. 1992.
[10] “Toward the unification of band-limited
derivative operators for edge detection,”
Signal Process., vol. 31, pp. 103–119, 1993.
[11] K. R. Rao and J. Ben-Arie, “Optimal edge
detection using expansion matching and
restoration,” IEEE Trans. Pattern Anal.
Machine Intell., vol. 16, pp. 1169–1182, Dec.
1994.
[12] S. Sarkar and K. L. Boyer, “On optimal
infinite impulse response edge detection
filters,” IEEE Trans. Pattern Anal. Machine
Intell., vol. 13, pp. 1154–1171, Nov. 1991.
[13] R. Boie and I. Cox, “Two dimensional
optimum edge recognition using matched and
Wiener filters for machine vision,” in Proc.
Int. Conf. Computer Vision, London, U.K.,
1997, pp. 450–456.
[14] L. A. Spacek, “Edge detection and motion
detection,” Image Vis. Comput., vol. 4, pp.
43–56, Feb. 1986.
[15] M. Petrou and J. Kittler, “Optimal edge
detectors for ramp edges,” IEEE Trans.
Pattern Anal. Machine Intell., vol. 13, pp.
483–491, May 1991.
[16] Milan Sonka, Vaclav Hlavac, and Roger
Boyle, “Image Processing, Analysis and
Machine Vision,” 1993.
[17] Andrew P. Paplinski, “Directional Filtering in
Edge Detection,” IEEE Tran. Image Proc.,
Vol. 7, No. 4, pp. 611-615, APRIL 1998.