Bachelor Graduation Project SOLVING JIGSAW PUZZLES USING COMPUTER VISION

Size: px
Start display at page:

Download "Bachelor Graduation Project SOLVING JIGSAW PUZZLES USING COMPUTER VISION"

Transcription

1 SOLVING JIGSAW PUZZLES USING COMPUTER VISION AUTHOR : AREEJ MAHDI SUPERVISOR : REIN VAN DEN BOOMGAARD DATE : JUNE 22, 2005 SIGNED BY : Bachelor Graduation Project

2 Solving Jigsaw Puzzles Using Computer Vision Areej Mahdi University of Amsterdam Abstract This paper presents a method to solve jigsaw puzzles by using shape alone. The method uses scans of a real jigsaw puzzle. The pieces of the puzzle are extracted and segmented from the image by using computer vision techniques. The pieces are then each split into four curves, each curve representing a side of the puzzle. The four corners of the pieces are detected using the curvature scale space technique. This technique has not been used in previous work on solving jigsaws by computer. For the local matching the Procrustes Analysis is used. This method is tested on a 24-piece puzzle. 1. Introduction Solving a jigsaw puzzle is a very interesting problem both theoretically and practically. By using a computer to solve jigsaw puzzles we come across various known problems in the computer vision field and in matching 2D subcurves. The solution for this problem can be used in solving various practical problems like reconstructing archaeological artefacts or fitting a protein with a known amino acid sequence to a 3D electron density map [1,2]. Yet simply solving a jigsaw puzzle is by its nature a very challenging problem. The very first paper published on solving jigsaw puzzles by shape alone goes back to the year 1964 [3]. Since then many articles have been published on this subject using only the shape of the pieces. Although there are quite a few algorithms introduced to solve jigsaw puzzles, still there is no algorithm known that can solve large jigsaw puzzles in a reliable and efficient way. The purpose of my research is to build a system that solves apictorial jigsaw puzzles from an image containing all the pieces of the puzzle. Computer vision is necessary for solving jigsaw puzzles by computer especially since it mainly depends on the shape of the pieces. Thus an accurate extraction of the information from the image is essential for a good representation of the puzzle pieces and eventually a correct solution of the puzzle. In paragraph 2 related work done on jigsaw puzzle solving will be described as well as the chosen approach. In the paragraphs 3 and 4 we will describe in more detail the setup of the jigsaw puzzle solver and the implementation. The results and experimentations will be presented in paragraph 5. Paragraph 6 contains the conclusions and finally paragraph 7 presents recommendations for future work. 2. Related work In this chapter related work done previously will be described as well as the chosen approach. There are a number of approaches used in the different papers to solve jigsaw puzzles. Generally they consist of the same stages: preprocessing the images of the pieces, matching the sides of the pieces (local matching) and finally matching the jigsaw pieces (global matching). To represent the pieces, most of the published work use polygon approximations of the borders of the pieces. However the way they deal with the puzzle pieces differ, as does their implementation. To represent the boundary of the pieces the following two methods are widely used: the polygon approximation and the Freeman chain code [3]. The advantage of using chain code is that it is more compact to represent. The representation of each point on the boundary costs about 2 to 3 bits per point. Chain code is also invariant to shifting and translation; it is also possible to scale and rotate. Besides the length of the contour is easy to calculate using chain code. As well as calculating the area of a closed loop and checking the contour for multiple loops and closure. In some papers the piece is treated as a sequence of strings. The local shape analysis is based on an approximate string matching [4]. Others transform a piece into a skeleton and apply most of the processing on the skeleton [5]. The rest of the methods use the curves of the pieces themselves to solve the puzzle. A method that worked very well was the algorithm given by Wolfson. It was able to

3 solve a 104-piece puzzle [1]. A later work that was based on Wolfson approach was able to solve a 204- piece puzzle. This method differs in how the interior pieces are placed. However the algorithm was not widely tested. It also required many hand-tuned parameters. In this paper the same overall approach as that of Wolfson will be followed, but some new techniques will be used. The assumptions that have been made in this paper are: the jigsaw puzzle must have a rectangular outside border, each jigsaw puzzle must have well defined neighbours and finally, the pieces must interlock with their neighbours by tabs. The solution of the jigsaw puzzle is done in a number of phases. First the pre-processing step in which the pieces are segmented one by one from the image. Then the border of each piece is extracted and represented. After splitting each piece into four curves each curve is then matched with every other curve. This is done using a local matching algorithm. This will result in a score of how well the curves match each other. A (global) algorithm can then be used to assemble the jigsaw puzzle. This is the general set-up of the research. Each of the different phases will each be described in detail. This method will be tested on a 24-piece puzzle. 3. Pre-processing Obtaining the pieces The pieces of the puzzle are obtained by scanning the pieces of the jigsaw puzzle. This produces a black and white image containing all the jigsaw pieces (see figure 1). All subsequent processing will be done on a binary image. The pieces are placed in random orientation and position on the scanner. The image contains noise which must first be removed so that all the pieces in the image can be recognized and segmented properly. To remove the noise from the image, morphological operations are applied. The morphological operations opening-byreconstruction followed by a closing-byreconstruction are used to remove the extra noise and fill up the holes in the pieces. The next step is to segment each of the pieces from the image. The pieces of the puzzle in the image lie rather close to each other and in some positions even slightly touch each other. By applying the Watershed Transformation, we are able to segment the image into the areas. Each area contains one of the pieces. The pieces are then stored separately. The pieces have been numbered manually to be able to check if the solution is correct. figure 1: The image obtained from scaning the pieces of the puzzle. Extracting the borders The next step will be to extract and represent the border of the pieces. To extract the border of the puzzle pieces first the inner pixels of the pieces in the image are removed so that only the border is left. Then a contour algorithm is applied to obtain the x,y coordinates of the boundary of each piece. The coordinates are needed to represent the border of the pieces. Other methods to extract the border are available but this approach is both simple and effective. For correctly matching puzzle pieces it is necessary to use a good boundary description method. We will therefore represent the border using the 8-connectivity version of the Freeman chain code. Because this also includes diagonal connections. Detecting the corner points The next step is to split each piece into four curves so that they can be matched later on. It is therefore necessary to extract the four corners from each piece. For the detection of the corners we use the curvature scale space. The curvature scale space is a multi scale representation of planar curves. It describes curves at varying levels of details, which makes it possible to detect relevant information at an appropriate scale. The curve is defined in terms of the first and second derivatives of the boundary coordinates x(u), y(u), where u is the length of the path along the

4 curvature. To express the different levels of details, the boundary coordinate functions are convolved with the Gaussian function g(u,σ) producing Gaussian smoothed coordinates X(u,σ) and Y(u,σ) [6]. where The curvature is then calculated according to the following formula: where filtered out. But since some pieces contain rather large corner angles, these angles are lost at high scales. Therefore a method must be used to select the real corner points. The method used in this paper is the first to combine possible corner points found at two different scales. The chosen scales both have to contain all four true corner points. By comparing the points obtained at the two scales, some false corner points can be eliminated. Corner points that appear at one scale and disappear at the other are obviously not true corner points, so they can be deleted. Possible corner points that almost have the same position on the curve on both scales are considered to be the same point. It is not easy to know which point is a better candidate and one does not want to accidentally delete the best corner point. So the two points are replaced with a point that lies between them. The real corner points do not lie close to each other, so possible corner points that lie close to one another are examined. The point with the lowest curvature is deleted. Although this eliminates many false corners, the number of possible corners is still greater than four. To choose the corner points we take the three points with the highest curvature. These points are used to construct a parallelogram, so that the fourth corner point lies at nearly the same distance regarding the other three points. 4. Solving the jigsaw puzzle The detected corner points are used to split the chain code for each piece into four sub-chain codes. The sub-chain codes will be matched to each other in the local matching algorithm. Corners of the pieces can be detected due to the high curvature at the corner points. However other interesting points in a piece can also be detected using the curvature scale space. For example points that correspond to the inflection points of the tabs in a piece because these points also contain high curvature. Unfortunately the pieces of the puzzle contain very ridged boundaries and curves created due to the noisy image. This results in lots of high curvature points which are neither corner points nor points of interest in the piece. It is therefore important to choose an appropriate scale which results in the least number of found points with high curvature yet still containing all the actual corner points of a piece. If the scale of the curvature scale space is higher, then it produces fewer points. By smoothing the curve more noisy points will be Local Matching Algorithm To match the pieces we have used the Procrustes Analysis. This is a method used to compare the shape of objects. The shape of the objects must be described by a finite set of points. The Procrustes Analysis determines the linear transformation: translation, reflection, orthogonal rotation and scaling of the points in matrix X of an object to best fit the points in matrix Y of another object so that [8]: Y = s*x*r + 1 t Where s is the scale factor, R is the rotation and reflection matrix, t the translation vector and 1 is a matrix of ones.

5 The matrices X and Y must have the same number of points. Therefore the curves that we are trying to match must be resampled so that their lengths correspond to each other. If the curves have different curve lengths then the curve with a shorter length is repeatedly matched with the longer curve; each time the smallest curve is matched with a part of the long curve. The goodness-of-fit criterion is the sum of squared errors. By applying the Procrustes Analysis a matrix is obtained that minimizes the value of the dissimilarity measure. It is a 4Nx4N matrix where N is the number of pieces. If the dissimilarity value is smaller than a specified threshold then the match is good. To prevent performing matches with straight sides, the straight sides are recognized before they are matched with the rest of the other curves. Global matching Based on the scores of the local matching a global algorithm can be implemented to assemble the pieces. It is therefore essential that the local matching algorithm provides good matches. For the assembly of the pieces, we can divide the pieces into two types: frame pieces and interior pieces. A frame piece is a piece that contains one or more straight sides. The frame pieces are assembled first so that they can be used to fit the interior pieces into the frame. The assembly of the frame pieces is done by matching the frame pieces with each other so that they form a cycle. The cycle should contain each piece only once and has the smallest dissimilarity matches between the pieces. This is the well-known Travelling Salesman problem. Once a cycle is found, we can match the remaining pieces in this frame. One can use the same approach as Wolfson [6]. 5. Experiments and results All the code was implemented in Matlab. The algorithm was tested on a 24-piece jigsaw puzzle and it meets the requirements set out by the assumptions made in paragraph 2. The image of the jigsaw puzzle was obtained by laying the pieces upside down on their backside on a flatbed-surface scanner at a resolution of 300 dpi. The pieces were placed at random positions and orientations with no overlap. After the segmentation and representation of each piece, the corners of each piece are determined. The results for the experiments are show in table 1. This table contains the number of real corner points that are detected at each step of the experiment. The pieces are all given an id number according to their location in the puzzle. The puzzle pieces are numbered from left to right, top to bottom. This makes it easy to know with which piece we are dealing with. To detect the corners the curvature scale space is used at scale 18 and 30. Scale 18 is the highest scale that can be chosen where all four real corner points can be found for all the pieces. At scale 30 however some real corner points are lost for some of the pieces. This is the case for pieces number 4 and 5. These pieces contain corner points with a rather large angle, which are hard to recognize because of the low curvature. By using a high scale of 30 the detection becomes even more difficult. Nevertheless this scale is chosen because it provides a sufficient level of detail so that the corner points can be easily found and it works for nearly all the pieces. The results of scale 18 and 30 are combined to obtain one set of points. This set will be narrowed down throughout the experiments. After applying the heuristics, described in paragraph 3, the four corners of 19 of the pieces are still among the points found with high curvature (see table 1). However when the ten points with the highest curvature for each piece are selected, all the corners of only fourteen of the pieces are among these points. For four of the pieces the number of real corner points in the top ten is two and for the remaining pieces only three real corners. This is because some of these pieces contain corners with rather big angles, so the real corner points do not have the highest curvature when compared to other points in the same piece. When the four points with the highest curvature are taken as the possible four corners of a piece, then it only successfully identifies one piece. While by taking the top 3 highest curvature points, the corners of eight of the pieces are correctly detected. This produces better results than the top 4 because the method used to select the fourth corner chooses the closest point that forms a parallelogram together with the other three found corners. The expected position of the fourth point is calculated and displayed as a circle in the figures. The distance between the remaining candidate points and the expected position is calculated. The point with the least distance is selected as the fourth. For one of the eight pieces this happened to be a point other than the real corner point, see figure 2. As can be seen in the figure the true corner point lies further from the expected position than the point chosen as

6 the fourth corner. For pieces that have less than three true corner points as the points with the highest curvature, this results as expected in a wrong estimation of the fourth corner point, see figure 3. The detection of the corners works correctly for seven pieces, see figure 4. These pieces are emphasized in the table. From these seven pieces, six are connected to each other in the puzzle at five different places. figure 4: presents piece with succesfully detected corners The red crosses are the points found in the top 3. The circle marks the estimated location of the fourth corner and the green cross marsk the selected point. figure 2: contains a jigsaw piece that has three succesfully detected corner. The selection of the fourth corner however is incorrect. The red crosses are the points found in the top 3. The circle is the estimated location of the fourth corner and the green cross marks the selected point. The reason that the corner points of some pieces get eliminated so easily at the first rounds is because in these pieces the starting point of the curve is very close to the corner. A wrap around of 5 points is used. But it is difficult to say how long the wrap must be. If the wrap is too large, then incorrect calculations will be made, for example the calculations of the chain code and the curvature of the piece. For points of which the starting point is far from the corner points the real corners can be detected, this is the case for the eight pieces which were successfully found in the top 3 experiment. The starting point used is always on the topside of the piece. Because the pieces were randomly placed on the scan platter, this starting point sometimes just happens to lie rather close to a corner point. So it is not always possible to know what the best wrap around value is because each piece has a random orientation. From experimenting with the data, it became clear that if another starting point is chosen, the four corners are successfully detected for pieces other than the previous eight. figure 3: contains a jigsaw piece that has only two succesfully detected corner points. The red crosses are the points found in the top 3. The circle marks the location of the estimated fourth corner the green cross marks the selected point. Piece ID Top 10 Top 4 Top 3 4 th point estimation

7 Table 1: contains the results of all the experiments performed to determine the corner points of each piece, the numbers in the table refer to number of real corner points that are detected at each experiment. Cornerpoints that are succesfully detected for a piece are emphasized. The matching algorithm produces a dissimilarity matrix. A match is considered to be successful if the dissimilarity value is above a certain threshold value. The optimal threshold value 0.03 is used and has been determined by trial and error. Table 2 contains the results of the matching algorithm. The columns contain the piece id and the side of the piece, which is successfully matched with the side of the piece in the second column. The correct matches are emphasized in the table. The local matching algorithm produces nine matches of which three matches are correct, see table 2. As is obvious the results of the local matching contained a number of false positives matches. Three of these matches are impossible matches, between two indents or two outdents. Specifying whether a curve is an indent or outdent can probably lead to reducing the false positive matches. Matched Pieces Table 2: contains the results of the local matching algorithm. The piece and curve numbere in the first column are considered as a successful match with the piece and curve in the second column. The correct matches are emphasized. To prevent the algorithm from performing impossible matches such as matching a straight side of a piece with other sides, the straight sides in the puzzle must be recognized. A straight side of one of the frame pieces is matched with every side of the other pieces. If the match is below a certain threshold value then the side is considered a straight side and is not matched with sides of other pieces. The threshold value is set on This method successfully recognized all frame sides of the pieces. This can be later used in the global matching algorithm so that only frame pieces are matched at first. The matches produced by the local matching are in fact good, considering the fact that the images are at low resolution and the curves are very noisy. Unfortunately due to time limitations, the global matching has not been implemented. 6. Conclusion A method to solve jigsaw puzzles has been presented which used some new techniques not used by previous work on solving jigsaw puzzles such as the curvature scale space. The curvature scale space is applied to detect the corners of each piece. It succeeded to detect all the corners for some of the pieces. However some improvements must be made to fully make use of potentials of these methods. Better results are probably possible if more scales are combined together to detect the corner points. Also applying more heuristics may help. Furthermore the pieces on which the curvature scale space was used contained very noisy curves. The implemented local matching algorithm was successful in finding three out of the five matches correct matches. However the algorithm also returned a number of false positive matches. A number of these matches are impossible ones, so a strong suggestion is to prevent such matches from happening. This will surely enhance the performance of the matching algorithm. 7. Future work It is possible to obtain better results by applying some changes. Finding the correct corner points of the jigsaw pieces can be improved. In the paper we used the curvature scale space at two different scales and the results were combined. By using

8 more than two scales it is possible to obtain more accurate findings, which lead to a better detection of the corner points. It became clear from the experiments that choosing another starting point, which is not very close to a corner, will result in better corner findings. Furthermore the method in which the final corner points are chosen can be enhanced. This method first chooses three of the possible corner points with the highest value as three of the final corners. Applying more heuristics before this method is used, may lead to better results. So that the remaining points with a highest curvature are for more pieces indeed the corner points. The way the fourth corner point is determined can also be improved. The matching of the curves can produce a better score if we specify whether a curve that we are matching is an indent or an outdent. This will eliminate many impossible matches such as matching two indents together. This will lead to a more accurate matching algorithm and a better score. Because the curves are so noisy, smoothing them a bit before applying the matching algorithm may also help improve the matching results. The images used in this paper are of relatively low resolution. This resulted in lots of noise in the image and curves. Another possible reason for the noisy curves is that the jigsaw used in the development of the method described in this paper is hand-made from wood. Therefore the boundaries of the pieces are not entirely smooth. Jigsaw Puzzles in Computer Vision. IEEE Transactions on Systems, Man, and Cybernetics, vol. 21, no. 5, [6] H. Wolfson, E. Schonberg, A. Kalvin and Y. Lamdan. Solving jigsaw puzzles by computer. Annals of Operations Research 12 (1988), [7] F. Mokhtarian, K. Mackworth. A Theory of Multiscale, Curvature-Based Shape Representation for Planar Curves. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 14, no. 8, [8] I. Borg and P. Groenen. Modern Multidimensional Scaling: Theory and Applications. Springer Series in Statistics (1997) References [1] D. Goldberg, C. Malon and M. Bern. A Global Approach to Automatic Solution of Jigsaw Puzzles. SoCG 02, June 5-7, [2] W. Kong and B.B. Kimia. On solving 2D and 3D puzzles using curve matching. Proc. IEEE Computer Vision and Pattern Recognition, [3] H. Freeman and L. Gardner. Apictorial jigsaw puzzles: The computer solution of a problem in pattern recognition. IEEE trans. on Electronic Computers 13 (1964) [4] H. Bunke and G. Kaufmann. Jigsaw puzzle solving using approximate string matching and best-first search. In Computer Analysis of Images and Patterns, Chetverikov and Kropatchs. ed., Springer (1993) [5] R.W. Webster, P.S. LaFolette and R. L. Stafford. Isthmus Critical Points for Solving

9 Solving Jigsaw Puzzles using Computer Vision Name: Areej Mahdi Supervisor: Rein van den Boomgaard Date: July 1, 2005

10 Overview Introduction Related work Preprocessing Local Matching Global Matching Discussion Conclusions Questions

11 Introduction The goal of this project: Building a system that solves jigsaw puzzles by shape alone from an image containing all the pieces of the puzzle

12 Interesting problem.. Reconstruction of archeological artifacts Art restoration Fitting a protein with known amino acid sequence to a 3D density map

13 Related Work (1) First article written on this subject goes back to 1964 Different approaches generally consists of the same phases Wolfson s approach

14 Related Work (2) Succeeded in solving 104-piece puzzle Divided border into four sub curves corresponding to the four sides Local Schwartz-Sharir matching algorithm Global matching Overall approach of Wolfson but applying new techniques

15 Jigsaw Puzzle Assumptions: Rectangular outside border Four well defined neighbors Pieces interlock with their neighbors by tabs

16 Jigsaw Puzzle Assumptions: Rectangular outside border Four well defined neighbors Pieces interlock with their neighbors by tabs

17 Preprocessing: Obtaining the pieces Scanning the pieces Removing the noise Segmenting the image

18 Preprocessing: Extracting the pieces Scanning the pieces Removing the noise Segmenting the image

19 Preprocessing: Extracting the pieces Scanning the pieces Removing the noise Segmenting the image

20 Preprocessing: Extracting the border Scanning the pieces Removing the noise Segmenting the image

21 Preprocessing: Extracting the border Scanning the pieces Removing the noise Segmenting the image

22 Preprocessing: Representing the border Borders are represented by Chain Code Chain code describes relative step from previous pixel 8-connectivity Chain Code: 2,1,0,7,7,0,1,1

23 Preprocessing: Dividing the border Finding the corners of the pieces: divide the border into 4 subcurves Use Curvature Scale Space

24 Curvature Scale Space (1) Mokhtarian Describes curves at varying levels of details Detection of relevant information at a appropriate scale It is invariant under rotation, uniformed scaling and translation Very suitable for noisy curves

25 Curvature Scale Space (2) Curve defined in terms of derivative of the boundary coordinates x(u), y(u), where u is the length of the path along the curve To express the different levels of details the boundary coordinate functions are convolved with the Gaussian function g(u,σ) producing Gaussian smoothed coordinates X(u,σ) and Y(u,σ)

26 Curvature Scale Space (3) The curvature of a curve is calculated as follows: where

27 Piece nr. 11

28 Piece nr. 11 Scale: 18

29 Piece nr. 19

30 Piece nr. 19 Scale: 18

31 Piece nr. 10 Scale: 18

32 Detecting the corners (1) More than four points are detected with high curvature even at high scales

33 Detecting the corners (2) Combining different scales to eliminate false corner points

34 Detecting the corners (3) Choosing the top 3 highest candidate corners and constructing a parallelogram from these points

35 Detecting the corners (3) Choosing the top 3 highest candidate corners and constructing a parallelogram from these points

36 Piece ID Top 4 Top 3 4 th point estimation

37 Detecting the corners (5)

38 Detecting the corners (5)

39 Detecting the corners (5)

40 Local Matching The corner of seven pieces are successfully detected Local matching is applied only to these pieces

41 Local Matching (1) Procrustes Analysis: Compares shapes of objects Determines linear transformation of matrix X to best fit into Y: Y = sxr + 1 T t where s is scale factor, R the rotation and reflection matrix, t the translation vector

42 Local Matching (2) Matched curves must have same lengths The minimized value of the dissimilarity measure between two curves is calculated Each curve of a piece is matched with all curves of the remaining pieces This produces a 4N x 4N matrix Straight sides of pieces are detected to prevent them from being matched with other pieces

43

44 Global Matching Same approach as Wolfson: Frame assembly Traveling Salesman Problem Interior assembly

45 Discussion Detection of the corner points: Higher resolution of jigsaw image Combining more Curvature scales Applying better heuristics to select the four corner points Local Matching: Eliminating false positive matches: indents and outdents

46 Conclusion New combination of techniques works, but lots of room for improvement Better results possible after applying suggestions to current approach

47 Questions??

48

49

50 Local Matching (3) Result table of found matches Matched Pieces

51

52 Detecting the corners (1) More than four points are detected with high curvature even at high scales

53 1 <image of curvature and X & Y in a 3D plot>

Component Ordering in Independent Component Analysis Based on Data Power

Component Ordering in Independent Component Analysis Based on Data Power Component Ordering in Independent Component Analysis Based on Data Power Anne Hendrikse Raymond Veldhuis University of Twente University of Twente Fac. EEMCS, Signals and Systems Group Fac. EEMCS, Signals

More information

Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object

More information

Subspace Analysis and Optimization for AAM Based Face Alignment

Subspace Analysis and Optimization for AAM Based Face Alignment Subspace Analysis and Optimization for AAM Based Face Alignment Ming Zhao Chun Chen College of Computer Science Zhejiang University Hangzhou, 310027, P.R.China zhaoming1999@zju.edu.cn Stan Z. Li Microsoft

More information

Signature Region of Interest using Auto cropping

Signature Region of Interest using Auto cropping ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,

More information

Circle Object Recognition Based on Monocular Vision for Home Security Robot

Circle Object Recognition Based on Monocular Vision for Home Security Robot Journal of Applied Science and Engineering, Vol. 16, No. 3, pp. 261 268 (2013) DOI: 10.6180/jase.2013.16.3.05 Circle Object Recognition Based on Monocular Vision for Home Security Robot Shih-An Li, Ching-Chang

More information

Convolution. 1D Formula: 2D Formula: Example on the web: http://www.jhu.edu/~signals/convolve/

Convolution. 1D Formula: 2D Formula: Example on the web: http://www.jhu.edu/~signals/convolve/ Basic Filters (7) Convolution/correlation/Linear filtering Gaussian filters Smoothing and noise reduction First derivatives of Gaussian Second derivative of Gaussian: Laplacian Oriented Gaussian filters

More information

Poker Vision: Playing Cards and Chips Identification based on Image Processing

Poker Vision: Playing Cards and Chips Identification based on Image Processing Poker Vision: Playing Cards and Chips Identification based on Image Processing Paulo Martins 1, Luís Paulo Reis 2, and Luís Teófilo 2 1 DEEC Electrical Engineering Department 2 LIACC Artificial Intelligence

More information

APPLYING COMPUTER VISION TECHNIQUES TO TOPOGRAPHIC OBJECTS

APPLYING COMPUTER VISION TECHNIQUES TO TOPOGRAPHIC OBJECTS APPLYING COMPUTER VISION TECHNIQUES TO TOPOGRAPHIC OBJECTS Laura Keyes, Adam Winstanley Department of Computer Science National University of Ireland Maynooth Co. Kildare, Ireland lkeyes@cs.may.ie, Adam.Winstanley@may.ie

More information

CALCULATIONS & STATISTICS

CALCULATIONS & STATISTICS CALCULATIONS & STATISTICS CALCULATION OF SCORES Conversion of 1-5 scale to 0-100 scores When you look at your report, you will notice that the scores are reported on a 0-100 scale, even though respondents

More information

Battleship. Big bands

Battleship. Big bands Ball Fill in the grid so that every row, column (six smaller cells and three bigger circles or stars), outlined figures (eight smaller cells and a bigger circle), nine bigger circles and nine bigger stars

More information

More Local Structure Information for Make-Model Recognition

More Local Structure Information for Make-Model Recognition More Local Structure Information for Make-Model Recognition David Anthony Torres Dept. of Computer Science The University of California at San Diego La Jolla, CA 9093 Abstract An object classification

More information

Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability

Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability Classification of Fingerprints Sarat C. Dass Department of Statistics & Probability Fingerprint Classification Fingerprint classification is a coarse level partitioning of a fingerprint database into smaller

More information

Morphological segmentation of histology cell images

Morphological segmentation of histology cell images Morphological segmentation of histology cell images A.Nedzved, S.Ablameyko, I.Pitas Institute of Engineering Cybernetics of the National Academy of Sciences Surganova, 6, 00 Minsk, Belarus E-mail abl@newman.bas-net.by

More information

Sudoku puzzles and how to solve them

Sudoku puzzles and how to solve them Sudoku puzzles and how to solve them Andries E. Brouwer 2006-05-31 1 Sudoku Figure 1: Two puzzles the second one is difficult A Sudoku puzzle (of classical type ) consists of a 9-by-9 matrix partitioned

More information

The Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy

The Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy BMI Paper The Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy Faculty of Sciences VU University Amsterdam De Boelelaan 1081 1081 HV Amsterdam Netherlands Author: R.D.R.

More information

Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap

Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic

More information

Visual Structure Analysis of Flow Charts in Patent Images

Visual Structure Analysis of Flow Charts in Patent Images Visual Structure Analysis of Flow Charts in Patent Images Roland Mörzinger, René Schuster, András Horti, and Georg Thallinger JOANNEUM RESEARCH Forschungsgesellschaft mbh DIGITAL - Institute for Information

More information

Galaxy Morphological Classification

Galaxy Morphological Classification Galaxy Morphological Classification Jordan Duprey and James Kolano Abstract To solve the issue of galaxy morphological classification according to a classification scheme modelled off of the Hubble Sequence,

More information

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,

More information

Binary Image Scanning Algorithm for Cane Segmentation

Binary Image Scanning Algorithm for Cane Segmentation Binary Image Scanning Algorithm for Cane Segmentation Ricardo D. C. Marin Department of Computer Science University Of Canterbury Canterbury, Christchurch ricardo.castanedamarin@pg.canterbury.ac.nz Tom

More information

Classifying Manipulation Primitives from Visual Data

Classifying Manipulation Primitives from Visual Data Classifying Manipulation Primitives from Visual Data Sandy Huang and Dylan Hadfield-Menell Abstract One approach to learning from demonstrations in robotics is to make use of a classifier to predict if

More information

Face detection is a process of localizing and extracting the face region from the

Face detection is a process of localizing and extracting the face region from the Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.

More information

Graph Theory Problems and Solutions

Graph Theory Problems and Solutions raph Theory Problems and Solutions Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles November, 005 Problems. Prove that the sum of the degrees of the vertices of any finite graph is

More information

ALGEBRA. sequence, term, nth term, consecutive, rule, relationship, generate, predict, continue increase, decrease finite, infinite

ALGEBRA. sequence, term, nth term, consecutive, rule, relationship, generate, predict, continue increase, decrease finite, infinite ALGEBRA Pupils should be taught to: Generate and describe sequences As outcomes, Year 7 pupils should, for example: Use, read and write, spelling correctly: sequence, term, nth term, consecutive, rule,

More information

A Simple Feature Extraction Technique of a Pattern By Hopfield Network

A Simple Feature Extraction Technique of a Pattern By Hopfield Network A Simple Feature Extraction Technique of a Pattern By Hopfield Network A.Nag!, S. Biswas *, D. Sarkar *, P.P. Sarkar *, B. Gupta **! Academy of Technology, Hoogly - 722 *USIC, University of Kalyani, Kalyani

More information

Determining optimal window size for texture feature extraction methods

Determining optimal window size for texture feature extraction methods IX Spanish Symposium on Pattern Recognition and Image Analysis, Castellon, Spain, May 2001, vol.2, 237-242, ISBN: 84-8021-351-5. Determining optimal window size for texture feature extraction methods Domènec

More information

Implementation of Canny Edge Detector of color images on CELL/B.E. Architecture.

Implementation of Canny Edge Detector of color images on CELL/B.E. Architecture. Implementation of Canny Edge Detector of color images on CELL/B.E. Architecture. Chirag Gupta,Sumod Mohan K cgupta@clemson.edu, sumodm@clemson.edu Abstract In this project we propose a method to improve

More information

Excel -- Creating Charts

Excel -- Creating Charts Excel -- Creating Charts The saying goes, A picture is worth a thousand words, and so true. Professional looking charts give visual enhancement to your statistics, fiscal reports or presentation. Excel

More information

Document Image Retrieval using Signatures as Queries

Document Image Retrieval using Signatures as Queries Document Image Retrieval using Signatures as Queries Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang CEDAR, University at Buffalo(SUNY) Amherst, New York 14228 Gady Agam and

More information

RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA

RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA 2010 Number 29 3D MODEL GENERATION FROM THE ENGINEERING DRAWING Jozef VASKÝ, Michal ELIÁŠ,

More information

Computational Geometry. Lecture 1: Introduction and Convex Hulls

Computational Geometry. Lecture 1: Introduction and Convex Hulls Lecture 1: Introduction and convex hulls 1 Geometry: points, lines,... Plane (two-dimensional), R 2 Space (three-dimensional), R 3 Space (higher-dimensional), R d A point in the plane, 3-dimensional space,

More information

Segmentation of building models from dense 3D point-clouds

Segmentation of building models from dense 3D point-clouds Segmentation of building models from dense 3D point-clouds Joachim Bauer, Konrad Karner, Konrad Schindler, Andreas Klaus, Christopher Zach VRVis Research Center for Virtual Reality and Visualization, Institute

More information

Scientific Graphing in Excel 2010

Scientific Graphing in Excel 2010 Scientific Graphing in Excel 2010 When you start Excel, you will see the screen below. Various parts of the display are labelled in red, with arrows, to define the terms used in the remainder of this overview.

More information

CS 534: Computer Vision 3D Model-based recognition

CS 534: Computer Vision 3D Model-based recognition CS 534: Computer Vision 3D Model-based recognition Ahmed Elgammal Dept of Computer Science CS 534 3D Model-based Vision - 1 High Level Vision Object Recognition: What it means? Two main recognition tasks:!

More information

Free Inductive/Logical Test Questions

Free Inductive/Logical Test Questions Free Inductive/Logical Test Questions (With questions and answers) JobTestPrep invites you to a free practice session that represents only some of the materials offered in our online practice packs. Have

More information

The Taxman Game. Robert K. Moniot September 5, 2003

The Taxman Game. Robert K. Moniot September 5, 2003 The Taxman Game Robert K. Moniot September 5, 2003 1 Introduction Want to know how to beat the taxman? Legally, that is? Read on, and we will explore this cute little mathematical game. The taxman game

More information

Solving Geometric Problems with the Rotating Calipers *

Solving Geometric Problems with the Rotating Calipers * Solving Geometric Problems with the Rotating Calipers * Godfried Toussaint School of Computer Science McGill University Montreal, Quebec, Canada ABSTRACT Shamos [1] recently showed that the diameter of

More information

Binary Image Reconstruction

Binary Image Reconstruction A network flow algorithm for reconstructing binary images from discrete X-rays Kees Joost Batenburg Leiden University and CWI, The Netherlands kbatenbu@math.leidenuniv.nl Abstract We present a new algorithm

More information

Genetic Algorithms and Sudoku

Genetic Algorithms and Sudoku Genetic Algorithms and Sudoku Dr. John M. Weiss Department of Mathematics and Computer Science South Dakota School of Mines and Technology (SDSM&T) Rapid City, SD 57701-3995 john.weiss@sdsmt.edu MICS 2009

More information

5/31/2013. 6.1 Normal Distributions. Normal Distributions. Chapter 6. Distribution. The Normal Distribution. Outline. Objectives.

5/31/2013. 6.1 Normal Distributions. Normal Distributions. Chapter 6. Distribution. The Normal Distribution. Outline. Objectives. The Normal Distribution C H 6A P T E R The Normal Distribution Outline 6 1 6 2 Applications of the Normal Distribution 6 3 The Central Limit Theorem 6 4 The Normal Approximation to the Binomial Distribution

More information

CAD / CAM Dr. P. V. Madhusuthan Rao Department of Mechanical Engineering Indian Institute of Technology, Delhi Lecture No. # 12 Reverse Engineering

CAD / CAM Dr. P. V. Madhusuthan Rao Department of Mechanical Engineering Indian Institute of Technology, Delhi Lecture No. # 12 Reverse Engineering CAD / CAM Dr. P. V. Madhusuthan Rao Department of Mechanical Engineering Indian Institute of Technology, Delhi Lecture No. # 12 Reverse Engineering So what we will do in today s lecture is basically take

More information

Environmental Remote Sensing GEOG 2021

Environmental Remote Sensing GEOG 2021 Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class

More information

Biometric Authentication using Online Signatures

Biometric Authentication using Online Signatures Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,

More information

Correcting the Lateral Response Artifact in Radiochromic Film Images from Flatbed Scanners

Correcting the Lateral Response Artifact in Radiochromic Film Images from Flatbed Scanners Correcting the Lateral Response Artifact in Radiochromic Film Images from Flatbed Scanners Background The lateral response artifact (LRA) in radiochromic film images from flatbed scanners was first pointed

More information

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA

More information

Predict the Popularity of YouTube Videos Using Early View Data

Predict the Popularity of YouTube Videos Using Early View Data 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

Character Image Patterns as Big Data

Character Image Patterns as Big Data 22 International Conference on Frontiers in Handwriting Recognition Character Image Patterns as Big Data Seiichi Uchida, Ryosuke Ishida, Akira Yoshida, Wenjie Cai, Yaokai Feng Kyushu University, Fukuoka,

More information

3D Human Face Recognition Using Point Signature

3D Human Face Recognition Using Point Signature 3D Human Face Recognition Using Point Signature Chin-Seng Chua, Feng Han, Yeong-Khing Ho School of Electrical and Electronic Engineering Nanyang Technological University, Singapore 639798 ECSChua@ntu.edu.sg

More information

Topographic Change Detection Using CloudCompare Version 1.0

Topographic Change Detection Using CloudCompare Version 1.0 Topographic Change Detection Using CloudCompare Version 1.0 Emily Kleber, Arizona State University Edwin Nissen, Colorado School of Mines J Ramón Arrowsmith, Arizona State University Introduction CloudCompare

More information

LESSON 7: IMPORTING AND VECTORIZING A BITMAP IMAGE

LESSON 7: IMPORTING AND VECTORIZING A BITMAP IMAGE LESSON 7: IMPORTING AND VECTORIZING A BITMAP IMAGE In this lesson we ll learn how to import a bitmap logo, transform it into a vector and perform some editing on the vector to clean it up. The concepts

More information

How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm

How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode

More information

PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION

PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION Introduction In the previous chapter, we explored a class of regression models having particularly simple analytical

More information

Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras

Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith

More information

GAP CLOSING. 2D Measurement GAP CLOSING. Intermeditate / Senior Facilitator s Guide. 2D Measurement

GAP CLOSING. 2D Measurement GAP CLOSING. Intermeditate / Senior Facilitator s Guide. 2D Measurement GAP CLOSING 2D Measurement GAP CLOSING 2D Measurement Intermeditate / Senior Facilitator s Guide 2-D Measurement Diagnostic...4 Administer the diagnostic...4 Using diagnostic results to personalize interventions...4

More information

Image Gradients. Given a discrete image Á Òµ, consider the smoothed continuous image ܵ defined by

Image Gradients. Given a discrete image Á Òµ, consider the smoothed continuous image ܵ defined by Image Gradients Given a discrete image Á Òµ, consider the smoothed continuous image ܵ defined by ܵ Ü ¾ Ö µ Á Òµ Ü ¾ Ö µá µ (1) where Ü ¾ Ö Ô µ Ü ¾ Ý ¾. ½ ¾ ¾ Ö ¾ Ü ¾ ¾ Ö. Here Ü is the 2-norm for the

More information

Machine vision systems - 2

Machine vision systems - 2 Machine vision systems Problem definition Image acquisition Image segmentation Connected component analysis Machine vision systems - 1 Problem definition Design a vision system to see a flat world Page

More information

Analysis of Micromouse Maze Solving Algorithms

Analysis of Micromouse Maze Solving Algorithms 1 Analysis of Micromouse Maze Solving Algorithms David M. Willardson ECE 557: Learning from Data, Spring 2001 Abstract This project involves a simulation of a mouse that is to find its way through a maze.

More information

Supporting Online Material for

Supporting Online Material for www.sciencemag.org/cgi/content/full/313/5786/504/dc1 Supporting Online Material for Reducing the Dimensionality of Data with Neural Networks G. E. Hinton* and R. R. Salakhutdinov *To whom correspondence

More information

CATIA Drafting TABLE OF CONTENTS

CATIA Drafting TABLE OF CONTENTS TABLE OF CONTENTS Introduction...1 Drafting...2 Drawing Screen...3 Pull-down Menus...4 File...4 Edit...5 View...6 Insert...7 Tools...8 Drafting Workbench...9 Views and Sheets...9 Dimensions and Annotations...10

More information

Canny Edge Detection

Canny Edge Detection Canny Edge Detection 09gr820 March 23, 2009 1 Introduction The purpose of edge detection in general is to significantly reduce the amount of data in an image, while preserving the structural properties

More information

Unit 1 Number Sense. In this unit, students will study repeating decimals, percents, fractions, decimals, and proportions.

Unit 1 Number Sense. In this unit, students will study repeating decimals, percents, fractions, decimals, and proportions. Unit 1 Number Sense In this unit, students will study repeating decimals, percents, fractions, decimals, and proportions. BLM Three Types of Percent Problems (p L-34) is a summary BLM for the material

More information

Recognition of Handwritten Digits using Structural Information

Recognition of Handwritten Digits using Structural Information Recognition of Handwritten Digits using Structural Information Sven Behnke Martin-Luther University, Halle-Wittenberg' Institute of Computer Science 06099 Halle, Germany { behnke Irojas} @ informatik.uni-halle.de

More information

/ Department of Mechanical Engineering. Manufacturing Networks. Warehouse storage: cases or layers? J.J.P. van Heur. Where innovation starts

/ Department of Mechanical Engineering. Manufacturing Networks. Warehouse storage: cases or layers? J.J.P. van Heur. Where innovation starts / Department of Mechanical Engineering Manufacturing Networks Warehouse storage: cases or layers? J.J.P. van Heur Where innovation starts Systems Engineering Group Department of Mechanical Engineering

More information

Euler Vector: A Combinatorial Signature for Gray-Tone Images

Euler Vector: A Combinatorial Signature for Gray-Tone Images Euler Vector: A Combinatorial Signature for Gray-Tone Images Arijit Bishnu, Bhargab B. Bhattacharya y, Malay K. Kundu, C. A. Murthy fbishnu t, bhargab, malay, murthyg@isical.ac.in Indian Statistical Institute,

More information

How To Filter Spam Image From A Picture By Color Or Color

How To Filter Spam Image From A Picture By Color Or Color Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among

More information

Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to:

Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to: Chapter 3 Data Storage Objectives After studying this chapter, students should be able to: List five different data types used in a computer. Describe how integers are stored in a computer. Describe how

More information

Robust NURBS Surface Fitting from Unorganized 3D Point Clouds for Infrastructure As-Built Modeling

Robust NURBS Surface Fitting from Unorganized 3D Point Clouds for Infrastructure As-Built Modeling 81 Robust NURBS Surface Fitting from Unorganized 3D Point Clouds for Infrastructure As-Built Modeling Andrey Dimitrov 1 and Mani Golparvar-Fard 2 1 Graduate Student, Depts of Civil Eng and Engineering

More information

G E N E R A L A P P R O A CH: LO O K I N G F O R D O M I N A N T O R I E N T A T I O N I N I M A G E P A T C H E S

G E N E R A L A P P R O A CH: LO O K I N G F O R D O M I N A N T O R I E N T A T I O N I N I M A G E P A T C H E S G E N E R A L A P P R O A CH: LO O K I N G F O R D O M I N A N T O R I E N T A T I O N I N I M A G E P A T C H E S In object categorization applications one of the main problems is that objects can appear

More information

Tracking of Small Unmanned Aerial Vehicles

Tracking of Small Unmanned Aerial Vehicles Tracking of Small Unmanned Aerial Vehicles Steven Krukowski Adrien Perkins Aeronautics and Astronautics Stanford University Stanford, CA 94305 Email: spk170@stanford.edu Aeronautics and Astronautics Stanford

More information

Part-Based Recognition

Part-Based Recognition Part-Based Recognition Benedict Brown CS597D, Fall 2003 Princeton University CS 597D, Part-Based Recognition p. 1/32 Introduction Many objects are made up of parts It s presumably easier to identify simple

More information

Static Environment Recognition Using Omni-camera from a Moving Vehicle

Static Environment Recognition Using Omni-camera from a Moving Vehicle Static Environment Recognition Using Omni-camera from a Moving Vehicle Teruko Yata, Chuck Thorpe Frank Dellaert The Robotics Institute Carnegie Mellon University Pittsburgh, PA 15213 USA College of Computing

More information

A Reliability Point and Kalman Filter-based Vehicle Tracking Technique

A Reliability Point and Kalman Filter-based Vehicle Tracking Technique A Reliability Point and Kalman Filter-based Vehicle Tracing Technique Soo Siang Teoh and Thomas Bräunl Abstract This paper introduces a technique for tracing the movement of vehicles in consecutive video

More information

ALGEBRA. Find the nth term, justifying its form by referring to the context in which it was generated

ALGEBRA. Find the nth term, justifying its form by referring to the context in which it was generated ALGEBRA Pupils should be taught to: Find the nth term, justifying its form by referring to the context in which it was generated As outcomes, Year 7 pupils should, for example: Generate sequences from

More information

http://www.elsevier.com/copyright

http://www.elsevier.com/copyright This article was published in an Elsevier journal. The attached copy is furnished to the author for non-commercial research and education use, including for instruction at the author s institution, sharing

More information

Inductive Reasoning Free Sample Test 1

Inductive Reasoning Free Sample Test 1 Inductive Reasoning Free Sample Test 1 Solutions Booklet Difficulty Rating: Difficult Instructions This inductive reasoning test comprises 22 questions. You will have 25 minutes in which to correctly answer

More information

A Learning Based Method for Super-Resolution of Low Resolution Images

A Learning Based Method for Super-Resolution of Low Resolution Images A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 emre.ugur@ceng.metu.edu.tr Abstract The main objective of this project is the study of a learning based method

More information

Tessellating with Regular Polygons

Tessellating with Regular Polygons Tessellating with Regular Polygons You ve probably seen a floor tiled with square tiles. Squares make good tiles because they can cover a surface without any gaps or overlapping. This kind of tiling is

More information

Neural Network based Vehicle Classification for Intelligent Traffic Control

Neural Network based Vehicle Classification for Intelligent Traffic Control Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN

More information

A Beginners Guide to Track Laying.

A Beginners Guide to Track Laying. A Beginners Guide to Track Laying. I should first say that none of the material below is original. I have made use of many sources of information and have often copied directly from them. All I claim to

More information

Kenken For Teachers. Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles June 27, 2010. Abstract

Kenken For Teachers. Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles June 27, 2010. Abstract Kenken For Teachers Tom Davis tomrdavis@earthlink.net http://www.geometer.org/mathcircles June 7, 00 Abstract Kenken is a puzzle whose solution requires a combination of logic and simple arithmetic skills.

More information

Reflection and Refraction

Reflection and Refraction Equipment Reflection and Refraction Acrylic block set, plane-concave-convex universal mirror, cork board, cork board stand, pins, flashlight, protractor, ruler, mirror worksheet, rectangular block worksheet,

More information

Vector storage and access; algorithms in GIS. This is lecture 6

Vector storage and access; algorithms in GIS. This is lecture 6 Vector storage and access; algorithms in GIS This is lecture 6 Vector data storage and access Vectors are built from points, line and areas. (x,y) Surface: (x,y,z) Vector data access Access to vector

More information

CHECKLIST FOR THE DEGREE PROJECT REPORT

CHECKLIST FOR THE DEGREE PROJECT REPORT Kerstin Frenckner, kfrenck@csc.kth.se Copyright CSC 25 mars 2009 CHECKLIST FOR THE DEGREE PROJECT REPORT This checklist has been written to help you check that your report matches the demands that are

More information

Research on Chinese financial invoice recognition technology

Research on Chinese financial invoice recognition technology Pattern Recognition Letters 24 (2003) 489 497 www.elsevier.com/locate/patrec Research on Chinese financial invoice recognition technology Delie Ming a,b, *, Jian Liu b, Jinwen Tian b a State Key Laboratory

More information

Maplex Tutorial. Copyright 1995-2010 Esri All rights reserved.

Maplex Tutorial. Copyright 1995-2010 Esri All rights reserved. Copyright 1995-2010 Esri All rights reserved. Table of Contents Introduction to the Maplex tutorial............................ 3 Exercise 1: Enabling Maplex for ArcGIS and adding the Labeling toolbar............

More information

Handwritten Character Recognition from Bank Cheque

Handwritten Character Recognition from Bank Cheque International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Handwritten Character Recognition from Bank Cheque Siddhartha Banerjee*

More information

Force on Moving Charges in a Magnetic Field

Force on Moving Charges in a Magnetic Field [ Assignment View ] [ Eðlisfræði 2, vor 2007 27. Magnetic Field and Magnetic Forces Assignment is due at 2:00am on Wednesday, February 28, 2007 Credit for problems submitted late will decrease to 0% after

More information

Geometry Notes PERIMETER AND AREA

Geometry Notes PERIMETER AND AREA Perimeter and Area Page 1 of 57 PERIMETER AND AREA Objectives: After completing this section, you should be able to do the following: Calculate the area of given geometric figures. Calculate the perimeter

More information

Drawing Lines with Pixels. Joshua Scott March 2012

Drawing Lines with Pixels. Joshua Scott March 2012 Drawing Lines with Pixels Joshua Scott March 2012 1 Summary Computers draw lines and circles during many common tasks, such as using an image editor. But how does a computer know which pixels to darken

More information

ROBUST VEHICLE TRACKING IN VIDEO IMAGES BEING TAKEN FROM A HELICOPTER

ROBUST VEHICLE TRACKING IN VIDEO IMAGES BEING TAKEN FROM A HELICOPTER ROBUST VEHICLE TRACKING IN VIDEO IMAGES BEING TAKEN FROM A HELICOPTER Fatemeh Karimi Nejadasl, Ben G.H. Gorte, and Serge P. Hoogendoorn Institute of Earth Observation and Space System, Delft University

More information

CATIA Basic Concepts TABLE OF CONTENTS

CATIA Basic Concepts TABLE OF CONTENTS TABLE OF CONTENTS Introduction...1 Manual Format...2 Log on/off procedures for Windows...3 To log on...3 To logoff...7 Assembly Design Screen...8 Part Design Screen...9 Pull-down Menus...10 Start...10

More information

QUALITY TESTING OF WATER PUMP PULLEY USING IMAGE PROCESSING

QUALITY TESTING OF WATER PUMP PULLEY USING IMAGE PROCESSING QUALITY TESTING OF WATER PUMP PULLEY USING IMAGE PROCESSING MRS. A H. TIRMARE 1, MS.R.N.KULKARNI 2, MR. A R. BHOSALE 3 MR. C.S. MORE 4 MR.A.G.NIMBALKAR 5 1, 2 Assistant professor Bharati Vidyapeeth s college

More information

Colour Image Segmentation Technique for Screen Printing

Colour Image Segmentation Technique for Screen Printing 60 R.U. Hewage and D.U.J. Sonnadara Department of Physics, University of Colombo, Sri Lanka ABSTRACT Screen-printing is an industry with a large number of applications ranging from printing mobile phone

More information

6.080/6.089 GITCS Feb 12, 2008. Lecture 3

6.080/6.089 GITCS Feb 12, 2008. Lecture 3 6.8/6.89 GITCS Feb 2, 28 Lecturer: Scott Aaronson Lecture 3 Scribe: Adam Rogal Administrivia. Scribe notes The purpose of scribe notes is to transcribe our lectures. Although I have formal notes of my

More information

CATIA Tubing and Piping TABLE OF CONTENTS

CATIA Tubing and Piping TABLE OF CONTENTS TABLE OF CONTENTS Introduction...1 Manual Format...2 Tubing and Piping design...3 Log on/off procedures for Windows...4 To log on...4 To logoff...8 Pull-down Menus...9 Edit...9 Insert...12 Tools...13 Analyze...16

More information

Jitter Measurements in Serial Data Signals

Jitter Measurements in Serial Data Signals Jitter Measurements in Serial Data Signals Michael Schnecker, Product Manager LeCroy Corporation Introduction The increasing speed of serial data transmission systems places greater importance on measuring

More information

Introduction to k Nearest Neighbour Classification and Condensed Nearest Neighbour Data Reduction

Introduction to k Nearest Neighbour Classification and Condensed Nearest Neighbour Data Reduction Introduction to k Nearest Neighbour Classification and Condensed Nearest Neighbour Data Reduction Oliver Sutton February, 2012 Contents 1 Introduction 1 1.1 Example........................................

More information

Working With Animation: Introduction to Flash

Working With Animation: Introduction to Flash Working With Animation: Introduction to Flash With Adobe Flash, you can create artwork and animations that add motion and visual interest to your Web pages. Flash movies can be interactive users can click

More information

Eðlisfræði 2, vor 2007

Eðlisfræði 2, vor 2007 [ Assignment View ] [ Pri Eðlisfræði 2, vor 2007 28. Sources of Magnetic Field Assignment is due at 2:00am on Wednesday, March 7, 2007 Credit for problems submitted late will decrease to 0% after the deadline

More information