9.4 The hit-or-miss transformation Illustration...

Size: px
Start display at page:

Download "9.4 The hit-or-miss transformation Illustration..."

Transcription

1 Morphological image processing(9.4 to 9.5.8) SLIDE 1/ The hit-or-miss transformation Illustration...

2 Morphological image processing(9.4 to 9.5.8) SLIDE 2/18 Objectiveistofindadisjointregion(set)inanimage If B denotes the set composed of D and its background, the match/hit (orsetofmatches/hits)ofb ina,is Generalizednotation: B=(B 1,B 2 ) B 1 : A B=(A D) [A c (W D)] Set formed from elements of B associated with an object B 2 : Set formed from elements of B associated with the corresponding background [Preceedingdiscussion: B 1 =D andb 2 =(W D)] More general definition: A B=(A B 1 ) [A c B 2 ] A Bcontainsalltheoriginpointsatwhich,simultaneously,B 1 found ahitinaandb 2 foundahitina c

3 Morphological image processing(9.4 to 9.5.8) SLIDE 3/18 Alternative definition: A B=(A B 1 ) (A ˆB 2 ) A background is necessary to detect disjoint sets Whenwe onlyaimtodetectcertainpatterns withinaset, a background is not required, and simple erosion is sufficient 9.5 Some basic morphological algorithms When dealing with binary images, the principle application of morphology is extracting image components that are useful in the representation and description of shape Boundary extraction Theboundaryβ(A)ofasetAis β(a)=a (A B), where B is a suitable structuring element

4 Morphological image processing(9.4 to 9.5.8) SLIDE 4/18 Illustration... Example 9.5: Morphological boundary extraction

5 Morphological image processing(9.4 to 9.5.8) SLIDE 5/ Hole filling A setwhoseelementsare8-connectedboundariesthatencloseabackground region(hole) Givenapointpineachhole,theobjectiveistofillalltheholeswith1 s All non-boundary(background) points are labeled 0 Begin by forming an array X 0 of 0 s, except at the locations in X 0 that correspondtothepointspineachhole,whichissetto1... Thefollowingprocedurefillsalltheholeswith1 s, X k =(X k 1 B) A c, k=1,2,3,..., where B is the symmetric structuring element in figure 9.15(c) ThealgorithmterminatesatiterationstepkifX k =X k 1 ThesetunionofX k andacontainsthefilledsetanditsboundary NotethattheintersectionateachstepwithA c limitsthedilationresultto inside the region of interest

6 Morphological image processing(9.4 to 9.5.8) SLIDE 6/18 Example 9.6: Morphological hole filling

7 Morphological image processing(9.4 to 9.5.8) SLIDE 7/ Extraction of connected components Let A be a set containing one or more connected components, and form anarrayx 0 (withthesamesizeasa)whoseelementsare0(background), exceptateachlocationknowntocorrespondtoapointineachconnected componentina,whichissetto1(foreground) ThefollowingiterativeprocedurestartswithX 0 andfindalltheconnected components X k =(X k 1 B) A k=1,2,3,..., where B is a suitable structuring element. When X k = X k 1, with X k containing all the connected components, the procedure terminates This algorithm is applicable to any finite number of sets of connected componentscontainedina,assumingthatapointisknownineachconnected component

8 Morphological image processing(9.4 to 9.5.8) SLIDE 8/18

9 Morphological image processing(9.4 to 9.5.8) SLIDE 9/18 Example 9.7

10 Morphological image processing(9.4 to 9.5.8) SLIDE 10/ Convex hull Morphological algorithm for obtaining the convex hull, C(A), of a set A... LetB 1,B 2,B 3 andb 4 representthefourstructuringelementsinfig9.19(a), and then implement the equation... X i k=(x k 1 B i ) A, i=1,2,3,4, k=1,2,..., X i 0=A Now let D i =Xconv, i where conv indicates convergence in the sense that Xk i=xi k 1. ThentheconvexhullofAis 4 C(A)= D i Procedure illustrated in Fig 9.19: entries indicate don t care conditions Shortcoming of above algorithm: convex hull can grow beyond the minimum dimensions required to guarantee convexity Possible solution: Limit growth so that it does not extend past the vertical and horizontal dimensions of the original set of points Boundaries of greater complexity can be used to limit growth even further in images with more detail i=1

11 Morphological image processing(9.4 to 9.5.8) SLIDE 11/18

12 Morphological image processing(9.4 to 9.5.8) SLIDE 12/ Thinning: ThethinningofasetAbyastructuringelementB: A B=A (A B)=A (A B) c Symmetric thinning: Sequence of SEs, {B} = { B 1,B 2,B 3,...,B n}, where B i isarotatedversionofb i 1 A {B}=((...((A B 1 ) B 2 )...) B n )

13 Morphological image processing(9.4 to 9.5.8) SLIDE 13/ Thickening: Thickening is the morphological dual of thinning and is defined by: A B=A (A B), where B is a structuring element Similartothinning: A {B}=((...((A B 1 ) B 2 )...) B n ) Structuring elements for thickening are similar to those of Fig 9.21(a), but with all 1 s and 0 s interchanged Aseparatealgorithmforthickeningisseldomusedinpractice wethinthe background instead, and then complement the result

14 Morphological image processing(9.4 to 9.5.8) SLIDE 14/ Skeletons The algorithm proposed in this section is similar to the medial axis transformation (MAT). The MAT transformation is discussed in section and is far inferior to the skeletonization algorithm introduced in section The skeletonization algorithm proposed in this section also does not guarantee connectivity. We therefore do not discuss this algorithm. Illustration of the above comments...

15 Morphological image processing(9.4 to 9.5.8) SLIDE 15/18 A further illustration...

16 Morphological image processing(9.4 to 9.5.8) SLIDE 16/ Pruning Cleans up parasitic components left by thinning and skeletonization Use combination of morphological techniques Illustrative problem: Hand-printed character recognition Analyze shape of skeleton of character Skeletons characterized by spurs( parasitic components) Spurs caused during erosion of non-uniformities in strokes We assume that the length of a parasitic component does not exceed a specified number of pixels

17 Morphological image processing(9.4 to 9.5.8) SLIDE 17/18

18 Morphological image processing(9.4 to 9.5.8) SLIDE 18/18 Anybranchwiththreeorlesspixelsistobeeliminated (1) Three iterations of: X 1 =A {B} (2)FindalltheendpointsinX 1 : X 2 = 8 k=1 (X 1 B k ) (3)Dilateendpointsthreetimes,usingAasadelimiter: X 3 =(X 2 H) A, H= (4) Finally: X 4 =X 1 X 3

Ch9 Morphological Image Processing

Ch9 Morphological Image Processing Ch9 Morphological Image Processing 9.1 Preliminaries 9.1.1 Some Basic Concepts form Set Theory If every element of a set A is also an element of another set B, then A is said to be a subset of B, denoted

More information

Binary Image Scanning Algorithm for Cane Segmentation

Binary Image Scanning Algorithm for Cane Segmentation Binary Image Scanning Algorithm for Cane Segmentation Ricardo D. C. Marin Department of Computer Science University Of Canterbury Canterbury, Christchurch ricardo.castanedamarin@pg.canterbury.ac.nz Tom

More information

Visual Structure Analysis of Flow Charts in Patent Images

Visual Structure Analysis of Flow Charts in Patent Images Visual Structure Analysis of Flow Charts in Patent Images Roland Mörzinger, René Schuster, András Horti, and Georg Thallinger JOANNEUM RESEARCH Forschungsgesellschaft mbh DIGITAL - Institute for Information

More information

Unconstrained Handwritten Character Recognition Using Different Classification Strategies

Unconstrained Handwritten Character Recognition Using Different Classification Strategies Unconstrained Handwritten Character Recognition Using Different Classification Strategies Alessandro L. Koerich Department of Computer Science (PPGIA) Pontifical Catholic University of Paraná (PUCPR) Curitiba,

More information

PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION

PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION Introduction In the previous chapter, we explored a class of regression models having particularly simple analytical

More information

Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras

Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith

More information

AngioSys 2.0 Image Analysis Software Manual

AngioSys 2.0 Image Analysis Software Manual AngioSys 2.0 Image Analysis Software Manual Table of contents Introduction and ordering Activate your software Analyse a new plate Open a previous plate Add well details Delete well details Fill a row/column

More information

detection of Shaded Roads in urban Areas

detection of Shaded Roads in urban Areas Detection of shaded roads in high spatial resolution images of urban areas Thiago Statella 1 Federal Institute for Education, Science and Technology of Mato Grosso, Zulmira Canavarros street n 95, Cuiabá,

More information

Handwritten Character Recognition from Bank Cheque

Handwritten Character Recognition from Bank Cheque International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Handwritten Character Recognition from Bank Cheque Siddhartha Banerjee*

More information

Binary Image Reconstruction

Binary Image Reconstruction A network flow algorithm for reconstructing binary images from discrete X-rays Kees Joost Batenburg Leiden University and CWI, The Netherlands kbatenbu@math.leidenuniv.nl Abstract We present a new algorithm

More information

Machine vision systems - 2

Machine vision systems - 2 Machine vision systems Problem definition Image acquisition Image segmentation Connected component analysis Machine vision systems - 1 Problem definition Design a vision system to see a flat world Page

More information

5. Binary objects labeling

5. Binary objects labeling Image Processing - Laboratory 5: Binary objects labeling 1 5. Binary objects labeling 5.1. Introduction In this laboratory an object labeling algorithm which allows you to label distinct objects from a

More information

Medial Axis Construction and Applications in 3D Wireless Sensor Networks

Medial Axis Construction and Applications in 3D Wireless Sensor Networks Medial Axis Construction and Applications in 3D Wireless Sensor Networks Su Xia, Ning Ding, Miao Jin, Hongyi Wu, and Yang Yang Presenter: Hongyi Wu University of Louisiana at Lafayette Outline Introduction

More information

Subspace Analysis and Optimization for AAM Based Face Alignment

Subspace Analysis and Optimization for AAM Based Face Alignment Subspace Analysis and Optimization for AAM Based Face Alignment Ming Zhao Chun Chen College of Computer Science Zhejiang University Hangzhou, 310027, P.R.China zhaoming1999@zju.edu.cn Stan Z. Li Microsoft

More information

Sectional drawings cutting plane

Sectional drawings cutting plane Section Views Section Views The technique called section views is used to improve the visualization of new designs, clarify multiview drawings and facilitate the dimensioning of drawings. For mechanical

More information

A Method of Caption Detection in News Video

A Method of Caption Detection in News Video 3rd International Conference on Multimedia Technology(ICMT 3) A Method of Caption Detection in News Video He HUANG, Ping SHI Abstract. News video is one of the most important media for people to get information.

More information

Face detection is a process of localizing and extracting the face region from the

Face detection is a process of localizing and extracting the face region from the Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.

More information

PHOTOGRAMMETRIC TECHNIQUES FOR MEASUREMENTS IN WOODWORKING INDUSTRY

PHOTOGRAMMETRIC TECHNIQUES FOR MEASUREMENTS IN WOODWORKING INDUSTRY PHOTOGRAMMETRIC TECHNIQUES FOR MEASUREMENTS IN WOODWORKING INDUSTRY V. Knyaz a, *, Yu. Visilter, S. Zheltov a State Research Institute for Aviation System (GosNIIAS), 7, Victorenko str., Moscow, Russia

More information

Determining the Resolution of Scanned Document Images

Determining the Resolution of Scanned Document Images Presented at IS&T/SPIE EI 99, Conference 3651, Document Recognition and Retrieval VI Jan 26-28, 1999, San Jose, CA. Determining the Resolution of Scanned Document Images Dan S. Bloomberg Xerox Palo Alto

More information

The enhancement of the operating speed of the algorithm of adaptive compression of binary bitmap images

The enhancement of the operating speed of the algorithm of adaptive compression of binary bitmap images The enhancement of the operating speed of the algorithm of adaptive compression of binary bitmap images Borusyak A.V. Research Institute of Applied Mathematics and Cybernetics Lobachevsky Nizhni Novgorod

More information

Analecta Vol. 8, No. 2 ISSN 2064-7964

Analecta Vol. 8, No. 2 ISSN 2064-7964 EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,

More information

Arrangements And Duality

Arrangements And Duality Arrangements And Duality 3.1 Introduction 3 Point configurations are tbe most basic structure we study in computational geometry. But what about configurations of more complicated shapes? For example,

More information

Morphological segmentation of histology cell images

Morphological segmentation of histology cell images Morphological segmentation of histology cell images A.Nedzved, S.Ablameyko, I.Pitas Institute of Engineering Cybernetics of the National Academy of Sciences Surganova, 6, 00 Minsk, Belarus E-mail abl@newman.bas-net.by

More information

Computer Graphics. Geometric Modeling. Page 1. Copyright Gotsman, Elber, Barequet, Karni, Sheffer Computer Science - Technion. An Example.

Computer Graphics. Geometric Modeling. Page 1. Copyright Gotsman, Elber, Barequet, Karni, Sheffer Computer Science - Technion. An Example. An Example 2 3 4 Outline Objective: Develop methods and algorithms to mathematically model shape of real world objects Categories: Wire-Frame Representation Object is represented as as a set of points

More information

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification

More information

Robert Collins CSE598G. More on Mean-shift. R.Collins, CSE, PSU CSE598G Spring 2006

Robert Collins CSE598G. More on Mean-shift. R.Collins, CSE, PSU CSE598G Spring 2006 More on Mean-shift R.Collins, CSE, PSU Spring 2006 Recall: Kernel Density Estimation Given a set of data samples x i ; i=1...n Convolve with a kernel function H to generate a smooth function f(x) Equivalent

More information

Part-Based Recognition

Part-Based Recognition Part-Based Recognition Benedict Brown CS597D, Fall 2003 Princeton University CS 597D, Part-Based Recognition p. 1/32 Introduction Many objects are made up of parts It s presumably easier to identify simple

More information

SUPER RESOLUTION FROM MULTIPLE LOW RESOLUTION IMAGES

SUPER RESOLUTION FROM MULTIPLE LOW RESOLUTION IMAGES SUPER RESOLUTION FROM MULTIPLE LOW RESOLUTION IMAGES ABSTRACT Florin Manaila 1 Costin-Anton Boiangiu 2 Ion Bucur 3 Although the technology of optical instruments is constantly advancing, the capture of

More information

Largest Fixed-Aspect, Axis-Aligned Rectangle

Largest Fixed-Aspect, Axis-Aligned Rectangle Largest Fixed-Aspect, Axis-Aligned Rectangle David Eberly Geometric Tools, LLC http://www.geometrictools.com/ Copyright c 1998-2016. All Rights Reserved. Created: February 21, 2004 Last Modified: February

More information

Intersection of a Line and a Convex. Hull of Points Cloud

Intersection of a Line and a Convex. Hull of Points Cloud Applied Mathematical Sciences, Vol. 7, 213, no. 13, 5139-5149 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/1.12988/ams.213.37372 Intersection of a Line and a Convex Hull of Points Cloud R. P. Koptelov

More information

Automatic Traffic Estimation Using Image Processing

Automatic Traffic Estimation Using Image Processing Automatic Traffic Estimation Using Image Processing Pejman Niksaz Science &Research Branch, Azad University of Yazd, Iran Pezhman_1366@yahoo.com Abstract As we know the population of city and number of

More information

Categorical Data Visualization and Clustering Using Subjective Factors

Categorical Data Visualization and Clustering Using Subjective Factors Categorical Data Visualization and Clustering Using Subjective Factors Chia-Hui Chang and Zhi-Kai Ding Department of Computer Science and Information Engineering, National Central University, Chung-Li,

More information

A Method for Controlling Mouse Movement using a Real- Time Camera

A Method for Controlling Mouse Movement using a Real- Time Camera A Method for Controlling Mouse Movement using a Real- Time Camera Hojoon Park Department of Computer Science Brown University, Providence, RI, USA hojoon@cs.brown.edu Abstract This paper presents a new

More information

Euler Vector: A Combinatorial Signature for Gray-Tone Images

Euler Vector: A Combinatorial Signature for Gray-Tone Images Euler Vector: A Combinatorial Signature for Gray-Tone Images Arijit Bishnu, Bhargab B. Bhattacharya y, Malay K. Kundu, C. A. Murthy fbishnu t, bhargab, malay, murthyg@isical.ac.in Indian Statistical Institute,

More information

Traditional Drawing Tools

Traditional Drawing Tools Engineering Drawing Traditional Drawing Tools DRAWING TOOLS DRAWING TOOLS 1. T-Square 2. Triangles DRAWING TOOLS HB for thick line 2H for thin line 3. Adhesive Tape 4. Pencils DRAWING TOOLS 5. Sandpaper

More information

Shortest Inspection-Path. Queries in Simple Polygons

Shortest Inspection-Path. Queries in Simple Polygons Shortest Inspection-Path Queries in Simple Polygons Christian Knauer, Günter Rote B 05-05 April 2005 Shortest Inspection-Path Queries in Simple Polygons Christian Knauer, Günter Rote Institut für Informatik,

More information

Jump-Miss Binary Erosion Algorithm

Jump-Miss Binary Erosion Algorithm Jump-Miss Binary Erosion Algorithm Anderson Fraiha Machado and Ronaldo Fumio Hashimoto Institute of Mathematics and Statistics of University of Sao Paulo, SP, Brazil dandy@ime.usp.br and ronaldo@ime.usp.br

More information

STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK

STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK Volume 6, Issue 3, pp: 335343 IJESET STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK Dipti Verma 1, Sipi Dubey 2 1 Department of Computer

More information

Tracking Groups of Pedestrians in Video Sequences

Tracking Groups of Pedestrians in Video Sequences Tracking Groups of Pedestrians in Video Sequences Jorge S. Marques Pedro M. Jorge Arnaldo J. Abrantes J. M. Lemos IST / ISR ISEL / IST ISEL INESC-ID / IST Lisbon, Portugal Lisbon, Portugal Lisbon, Portugal

More information

SIGNATURE AUTHENTICATION

SIGNATURE AUTHENTICATION SIGNATURE AUTHENTICATION ABSTRACT By Romit Beed, Debapriya Ghosh, Farhana Javed Zareen, Nikita Goyal Post Graduate Department of Computer Science, St. Xavier s College(Autonomous), Kolkata Signature can

More information

Statistical Data Mining. Practical Assignment 3 Discriminant Analysis and Decision Trees

Statistical Data Mining. Practical Assignment 3 Discriminant Analysis and Decision Trees Statistical Data Mining Practical Assignment 3 Discriminant Analysis and Decision Trees In this practical we discuss linear and quadratic discriminant analysis and tree-based classification techniques.

More information

Automata Theory. Şubat 2006 Tuğrul Yılmaz Ankara Üniversitesi

Automata Theory. Şubat 2006 Tuğrul Yılmaz Ankara Üniversitesi Automata Theory Automata theory is the study of abstract computing devices. A. M. Turing studied an abstract machine that had all the capabilities of today s computers. Turing s goal was to describe the

More information

SYSTEMS OF EQUATIONS AND MATRICES WITH THE TI-89. by Joseph Collison

SYSTEMS OF EQUATIONS AND MATRICES WITH THE TI-89. by Joseph Collison SYSTEMS OF EQUATIONS AND MATRICES WITH THE TI-89 by Joseph Collison Copyright 2000 by Joseph Collison All rights reserved Reproduction or translation of any part of this work beyond that permitted by Sections

More information

Novel Automatic PCB Inspection Technique Based on Connectivity

Novel Automatic PCB Inspection Technique Based on Connectivity Novel Automatic PCB Inspection Technique Based on Connectivity MAURO HIROMU TATIBANA ROBERTO DE ALENCAR LOTUFO FEEC/UNICAMP- Faculdade de Engenharia Elétrica e de Computação/ Universidade Estadual de Campinas

More information

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA

More information

SAMPLE TEST PAPER - I

SAMPLE TEST PAPER - I SCHEME E SAMPLE TEST PAPER - I Course Name : Mechanical Engineering Group Course Code : AE/PG/PT/ME/MH/FE Semester : Third Subject : Mechanical Engineering Drawing 12042 Time : 90 Minutes Marks: 25 Instruction:

More information

Constrained Tetrahedral Mesh Generation of Human Organs on Segmented Volume *

Constrained Tetrahedral Mesh Generation of Human Organs on Segmented Volume * Constrained Tetrahedral Mesh Generation of Human Organs on Segmented Volume * Xiaosong Yang 1, Pheng Ann Heng 2, Zesheng Tang 3 1 Department of Computer Science and Technology, Tsinghua University, Beijing

More information

SPERNER S LEMMA AND BROUWER S FIXED POINT THEOREM

SPERNER S LEMMA AND BROUWER S FIXED POINT THEOREM SPERNER S LEMMA AND BROUWER S FIXED POINT THEOREM ALEX WRIGHT 1. Intoduction A fixed point of a function f from a set X into itself is a point x 0 satisfying f(x 0 ) = x 0. Theorems which establish the

More information

Convex Hull Probability Depth: first results

Convex Hull Probability Depth: first results Conve Hull Probability Depth: first results Giovanni C. Porzio and Giancarlo Ragozini Abstract In this work, we present a new depth function, the conve hull probability depth, that is based on the conve

More information

Recovery of primal solutions from dual subgradient methods for mixed binary linear programming; a branch-and-bound approach

Recovery of primal solutions from dual subgradient methods for mixed binary linear programming; a branch-and-bound approach MASTER S THESIS Recovery of primal solutions from dual subgradient methods for mixed binary linear programming; a branch-and-bound approach PAULINE ALDENVIK MIRJAM SCHIERSCHER Department of Mathematical

More information

COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012

COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012 Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about

More information

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding

More information

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal

More information

Fast and Accurate Segmentation of Dental X-Ray Records

Fast and Accurate Segmentation of Dental X-Ray Records Fast and Accurate Segmentation of Dental X-Ray Records Xin Li, Ayman Abaza, Diaa Eldin Nassar, and Hany Ammar Lane Dept. of Computer Science and Electrical Engineering, West Virginia University, Morgantown,

More information

Designing forms for auto field detection in Adobe Acrobat

Designing forms for auto field detection in Adobe Acrobat Adobe Acrobat 9 Technical White Paper Designing forms for auto field detection in Adobe Acrobat Create electronic forms more easily by using the right elements in your authoring program to take advantage

More information

SCAN-CA Based Image Security System

SCAN-CA Based Image Security System SCAN-CA Based Image Security System Bhagyashree.S.Anantwar 1, S.P.Sonavane 2 Student, Department of Computer Science and Engg, Walchand College of Engg, Sanli, India 1 Asso. Professor, Department of Information

More information

2. MATERIALS AND METHODS

2. MATERIALS AND METHODS Difficulties of T1 brain MRI segmentation techniques M S. Atkins *a, K. Siu a, B. Law a, J. Orchard a, W. Rosenbaum a a School of Computing Science, Simon Fraser University ABSTRACT This paper looks at

More information

Numerical analysis of boundary conditions to tunnels

Numerical analysis of boundary conditions to tunnels Global journal of multidisciplinary and applied sciences Available online at www.gjmas.com 2015 GJMAS Journal-2015-3-2/37-41 ISSN 2313-6685 2015 GJMAS Numerical analysis of boundary conditions to tunnels

More information

Topological Data Analysis Applications to Computer Vision

Topological Data Analysis Applications to Computer Vision Topological Data Analysis Applications to Computer Vision Vitaliy Kurlin, http://kurlin.org Microsoft Research Cambridge and Durham University, UK Topological Data Analysis quantifies topological structures

More information

AN EXPERT SYSTEM TO ANALYZE HOMOGENEITY IN FUEL ELEMENT PLATES FOR RESEARCH REACTORS

AN EXPERT SYSTEM TO ANALYZE HOMOGENEITY IN FUEL ELEMENT PLATES FOR RESEARCH REACTORS AN EXPERT SYSTEM TO ANALYZE HOMOGENEITY IN FUEL ELEMENT PLATES FOR RESEARCH REACTORS Cativa Tolosa, S. and Marajofsky, A. Comisión Nacional de Energía Atómica Abstract In the manufacturing control of Fuel

More information

A fast multi-class SVM learning method for huge databases

A fast multi-class SVM learning method for huge databases www.ijcsi.org 544 A fast multi-class SVM learning method for huge databases Djeffal Abdelhamid 1, Babahenini Mohamed Chaouki 2 and Taleb-Ahmed Abdelmalik 3 1,2 Computer science department, LESIA Laboratory,

More information

Automatic Extraction of Signatures from Bank Cheques and other Documents

Automatic Extraction of Signatures from Bank Cheques and other Documents Automatic Extraction of Signatures from Bank Cheques and other Documents Vamsi Krishna Madasu *, Mohd. Hafizuddin Mohd. Yusof, M. Hanmandlu ß, Kurt Kubik * *Intelligent Real-Time Imaging and Sensing group,

More information

IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING 1 0196-2892/$26.00 2010 IEEE

IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING 1 0196-2892/$26.00 2010 IEEE IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING 1 Morphological Attribute Profiles for the Analysis of Very High Resolution Images Mauro Dalla Mura, Student Member, IEEE, Jón Atli Benediktsson, Fellow,

More information

Vision-based Walking Parameter Estimation for Biped Locomotion Imitation

Vision-based Walking Parameter Estimation for Biped Locomotion Imitation Vision-based Walking Parameter Estimation for Biped Locomotion Imitation Juan Pedro Bandera Rubio 1, Changjiu Zhou 2 and Francisco Sandoval Hernández 1 1 Dpto. Tecnología Electrónica, E.T.S.I. Telecomunicación

More information

Chapter 6: Episode discovery process

Chapter 6: Episode discovery process Chapter 6: Episode discovery process Algorithmic Methods of Data Mining, Fall 2005, Chapter 6: Episode discovery process 1 6. Episode discovery process The knowledge discovery process KDD process of analyzing

More information

Structural Axial, Shear and Bending Moments

Structural Axial, Shear and Bending Moments Structural Axial, Shear and Bending Moments Positive Internal Forces Acting Recall from mechanics of materials that the internal forces P (generic axial), V (shear) and M (moment) represent resultants

More information

Finite Elements for 2 D Problems

Finite Elements for 2 D Problems Finite Elements for 2 D Problems General Formula for the Stiffness Matrix Displacements (u, v) in a plane element are interpolated from nodal displacements (ui, vi) using shape functions Ni as follows,

More information

MAVIparticle Modular Algorithms for 3D Particle Characterization

MAVIparticle Modular Algorithms for 3D Particle Characterization MAVIparticle Modular Algorithms for 3D Particle Characterization version 1.0 Image Processing Department Fraunhofer ITWM Contents Contents 1 Introduction 2 2 The program 2 2.1 Framework..............................

More information

RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA

RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA 2010 Number 29 3D MODEL GENERATION FROM THE ENGINEERING DRAWING Jozef VASKÝ, Michal ELIÁŠ,

More information

The Basics of FEA Procedure

The Basics of FEA Procedure CHAPTER 2 The Basics of FEA Procedure 2.1 Introduction This chapter discusses the spring element, especially for the purpose of introducing various concepts involved in use of the FEA technique. A spring

More information

Tracking And Object Classification For Automated Surveillance

Tracking And Object Classification For Automated Surveillance Tracking And Object Classification For Automated Surveillance Omar Javed and Mubarak Shah Computer Vision ab, University of Central Florida, 4000 Central Florida Blvd, Orlando, Florida 32816, USA {ojaved,shah}@cs.ucf.edu

More information

ESE498. Intruder Detection System

ESE498. Intruder Detection System 0 Washington University in St. Louis School of Engineering and Applied Science Electrical and Systems Engineering Department ESE498 Intruder Detection System By Allen Chiang, Jonathan Chu, Siwei Su Supervisor

More information

Segmentation of building models from dense 3D point-clouds

Segmentation of building models from dense 3D point-clouds Segmentation of building models from dense 3D point-clouds Joachim Bauer, Konrad Karner, Konrad Schindler, Andreas Klaus, Christopher Zach VRVis Research Center for Virtual Reality and Visualization, Institute

More information

Market Stock Decisions Based on Morphological Filtering

Market Stock Decisions Based on Morphological Filtering Market Stock Decisions Based on Morphological Filtering Pere Marti-Puig, R. Reig-Bolaño, J. Bajo, and S. Rodriguez * Abstract. In this paper we use a nonlinear processing technique based on mathematical

More information

Predict Influencers in the Social Network

Predict Influencers in the Social Network Predict Influencers in the Social Network Ruishan Liu, Yang Zhao and Liuyu Zhou Email: rliu2, yzhao2, lyzhou@stanford.edu Department of Electrical Engineering, Stanford University Abstract Given two persons

More information

Max-Min Representation of Piecewise Linear Functions

Max-Min Representation of Piecewise Linear Functions Beiträge zur Algebra und Geometrie Contributions to Algebra and Geometry Volume 43 (2002), No. 1, 297-302. Max-Min Representation of Piecewise Linear Functions Sergei Ovchinnikov Mathematics Department,

More information

Template-based Eye and Mouth Detection for 3D Video Conferencing

Template-based Eye and Mouth Detection for 3D Video Conferencing Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer

More information

Symbol Tables. Introduction

Symbol Tables. Introduction Symbol Tables Introduction A compiler needs to collect and use information about the names appearing in the source program. This information is entered into a data structure called a symbol table. The

More information

Line and Polygon Clipping. Foley & Van Dam, Chapter 3

Line and Polygon Clipping. Foley & Van Dam, Chapter 3 Line and Polygon Clipping Foley & Van Dam, Chapter 3 Topics Viewing Transformation Pipeline in 2D Line and polygon clipping Brute force analytic solution Cohen-Sutherland Line Clipping Algorithm Cyrus-Beck

More information

Artwork master Inspection and touch up Production phototools Inspection and touch up. development of outer layers

Artwork master Inspection and touch up Production phototools Inspection and touch up. development of outer layers AutomaticPCBInspectionAlgorithms:ASurvey UniversityofMissouri-Rolla,Rolla,MO65401 MadhavMoganti1 DepartmentofComputerScience FikretErcal2 UniversityofMissouri-Rolla,Rolla,MO65401 DepartmentofEngineeringManagement

More information

Graphing Information

Graphing Information Parts of a Typical Graph Graphing Information In the typical graph used to evaluate behavior, time and behavior are the two variables considered. Each data point on a graph gives two pieces of information:

More information

Computer Science 281 Binary and Hexadecimal Review

Computer Science 281 Binary and Hexadecimal Review Computer Science 281 Binary and Hexadecimal Review 1 The Binary Number System Computers store everything, both instructions and data, by using many, many transistors, each of which can be in one of two

More information

Speaker: Objective: Chakib Bennis Long list of contributors shown at the end of the presentation

Speaker: Objective: Chakib Bennis Long list of contributors shown at the end of the presentation Speaker: Chakib Bennis Long list of contributors shown at the end of the presentation Objective: Propose a new approach for local grid refinement in reservoir simulation of new generation : 2D/2.5D case

More information

Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object

More information

Arithmetic and Algebra of Matrices

Arithmetic and Algebra of Matrices Arithmetic and Algebra of Matrices Math 572: Algebra for Middle School Teachers The University of Montana 1 The Real Numbers 2 Classroom Connection: Systems of Linear Equations 3 Rational Numbers 4 Irrational

More information

Random graphs with a given degree sequence

Random graphs with a given degree sequence Sourav Chatterjee (NYU) Persi Diaconis (Stanford) Allan Sly (Microsoft) Let G be an undirected simple graph on n vertices. Let d 1,..., d n be the degrees of the vertices of G arranged in descending order.

More information

STATISTICS AND DATA ANALYSIS IN GEOLOGY, 3rd ed. Clarificationof zonationprocedure described onpp. 238-239

STATISTICS AND DATA ANALYSIS IN GEOLOGY, 3rd ed. Clarificationof zonationprocedure described onpp. 238-239 STATISTICS AND DATA ANALYSIS IN GEOLOGY, 3rd ed. by John C. Davis Clarificationof zonationprocedure described onpp. 38-39 Because the notation used in this section (Eqs. 4.8 through 4.84) is inconsistent

More information

Figure 2.1.1. Three stages of raster-to-vector conversion.

Figure 2.1.1. Three stages of raster-to-vector conversion. 2 Vectorization 2.1 Introduction 2.1.1 Problem formulation Vectorization (raster-to-vector conversion) consists of analyzing a raster image to convert its pixels representation to a vector representation

More information

jorge s. marques image processing

jorge s. marques image processing image processing images images: what are they? what is shown in this image? What is this? what is an image images describe the evolution of physical variables (intensity, color, reflectance, condutivity)

More information

Grade 5 Common Core State Standard

Grade 5 Common Core State Standard 2.1.5.B.1 Apply place value concepts to show an understanding of operations and rounding as they pertain to whole numbers and decimals. M05.A-T.1.1.1 Demonstrate an understanding that 5.NBT.1 Recognize

More information

Automated System for Computationof Burnt Forest Region using Image Processing

Automated System for Computationof Burnt Forest Region using Image Processing International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Automated System for Computationof Burnt Forest Region using Image Processing

More information

Optimizations. Optimization Safety. Optimization Safety. Control Flow Graphs. Code transformations to improve program

Optimizations. Optimization Safety. Optimization Safety. Control Flow Graphs. Code transformations to improve program Optimizations Code transformations to improve program Mainly: improve execution time Also: reduce program size Control low Graphs Can be done at high level or low level E.g., constant folding Optimizations

More information

Curves and Surfaces. Goals. How do we draw surfaces? How do we specify a surface? How do we approximate a surface?

Curves and Surfaces. Goals. How do we draw surfaces? How do we specify a surface? How do we approximate a surface? Curves and Surfaces Parametric Representations Cubic Polynomial Forms Hermite Curves Bezier Curves and Surfaces [Angel 10.1-10.6] Goals How do we draw surfaces? Approximate with polygons Draw polygons

More information

Introduction. UML = Unified Modeling Language It is a standardized visual modeling language.

Introduction. UML = Unified Modeling Language It is a standardized visual modeling language. UML 1 Introduction UML = Unified Modeling Language It is a standardized visual modeling language. Primarily intended for modeling software systems. Also used for business modeling. UML evolved from earlier

More information

Off-line Model Simplification for Interactive Rigid Body Dynamics Simulations Satyandra K. Gupta University of Maryland, College Park

Off-line Model Simplification for Interactive Rigid Body Dynamics Simulations Satyandra K. Gupta University of Maryland, College Park NSF GRANT # 0727380 NSF PROGRAM NAME: Engineering Design Off-line Model Simplification for Interactive Rigid Body Dynamics Simulations Satyandra K. Gupta University of Maryland, College Park Atul Thakur

More information

1. Relational database accesses data in a sequential form. (Figures 7.1, 7.2)

1. Relational database accesses data in a sequential form. (Figures 7.1, 7.2) Chapter 7 Data Structures for Computer Graphics (This chapter was written for programmers - option in lecture course) Any computer model of an Object must comprise three different types of entities: 1.

More information

Solving Geometric Problems with the Rotating Calipers *

Solving Geometric Problems with the Rotating Calipers * Solving Geometric Problems with the Rotating Calipers * Godfried Toussaint School of Computer Science McGill University Montreal, Quebec, Canada ABSTRACT Shamos [1] recently showed that the diameter of

More information

Dual Methods for Total Variation-Based Image Restoration

Dual Methods for Total Variation-Based Image Restoration Dual Methods for Total Variation-Based Image Restoration Jamylle Carter Institute for Mathematics and its Applications University of Minnesota, Twin Cities Ph.D. (Mathematics), UCLA, 2001 Advisor: Tony

More information

CITY UNIVERSITY LONDON. BEng Degree in Computer Systems Engineering Part II BSc Degree in Computer Systems Engineering Part III PART 2 EXAMINATION

CITY UNIVERSITY LONDON. BEng Degree in Computer Systems Engineering Part II BSc Degree in Computer Systems Engineering Part III PART 2 EXAMINATION No: CITY UNIVERSITY LONDON BEng Degree in Computer Systems Engineering Part II BSc Degree in Computer Systems Engineering Part III PART 2 EXAMINATION ENGINEERING MATHEMATICS 2 (resit) EX2005 Date: August

More information