Some Basic Morphological Algorithms (4)
|
|
- Theodore Johnston
- 7 years ago
- Views:
Transcription
1 2/27/
2 Some Basic Morphological Algorithms (4) Convex Hull A set A is said to be convex if the straight line segment joining any two points in A lies entirely within A. The convex hull H or of an arbitrary set S is the smallest convex set containing S. 2/27/
3 Some Basic Morphological Algorithms (4) Convex Hull i Let B, i = 1, 2, 3, 4, represent the four structuring elements. The procedure consists of implementing the equation: with X = A. i 0 i i X = ( X * B ) A k k 1 i = 1, 2,3, 4 and k = 1, 2,3,... When the procedure converges, or X = X,let D = X, the convex hull of A is 4 C( A) = D i= 1 i i i i i k k 1 k 2/27/
4 2/27/
5 2/27/
6 Some Basic Morphological Algorithms (5) Thinning The thinning of a set A by a structuring element B, defined A B= A ( A* B) = A ( A* B) c 2/27/
7 Some Basic Morphological Algorithms (5) A more useful expression for thinning A symmetrically is based on a sequence of structuring elements: { } { n B = B, B, B,..., B } where B i is a rotated version of B i-1 The thinning of A by a sequence of structuring element { B} A B = A B B B 1 2 n { } ((...(( ) )...) ) 2/27/
8 2/27/
9 Some Basic Morphological Algorithms (6) Thickening: The thickening is defined by the expression ( * ) A B= A A B The thickening of A by a sequence of structuring element { B} A B A B B B 1 2 n { } = ((...(( ) )...) ) In practice, the usual procedure is to thin the background of the set and then complement the result. 2/27/
10 Some Basic Morphological Algorithms (6) 2/27/
11 Some Basic Morphological Algorithms (7) Skeletons A skeleton, S( A) of a set A has the following properties a. if z is a point of S( A) and ( D) is the largest disk centered at z and contained in A, one cannot find a larger disk containing ( D ) and included in A. The disk ( D) is called a maximum disk. b. The disk ( D) touches the boundary of A at two or more different places. z z z z 2/27/
12 Some Basic Morphological Algorithms (7) 2/27/
13 Some Basic Morphological Algorithms (7) The skeleton of A can be expressed in terms of erosion and openings. S( A) = S ( A) k = 0 with K = max{ k A kb φ}; K k S ( A) = ( A kb) ( A kb) B k where B is a structuring element, and ( A kb) = ((..(( A B) B)...) B) k successive erosions of A. 2/27/
14 2/27/
15 2/27/
16 Some Basic Morphological Algorithms (7) A can be reconstructed from the subsets by using K A = ( S ( A) kb) k = 0 k where S ( A) kb denotes k successive dilations of A. k ( S ( A) kb) = ((...(( S ( A) B) B)... B) k k 2/27/
17 2/27/
18 Some Basic Morphological Algorithms (8) Pruning a. Thinning and skeletonizing tend to leave parasitic components b. Pruning methods are essential complement to thinning and skeletonizing procedures 2/27/
19 Pruning: Example X = A { B} 1 2/27/
20 Pruning: Example k = 1 ( * k ) X = X B 2/27/
21 Pruning: Example ( ) X = X H A 3 2 H : 3 3 structuring element 2/27/
22 Pruning: Example X4 = X1 X3 2/27/
23 Pruning: Example 2/27/
24 Some Basic Morphological Algorithms (9) Morphological Reconstruction It involves two images and a structuring element a. One image contains the starting points for the transformation (The image is called marker) b. Another image (mask) constrains the transformation c. The structuring element is used to define connectivity 2/27/
25 Morphological Reconstruction: Geodesic Dilation Let F denote the marker image and G the mask image, F G. The geodesic dilation of size 1 of the marker image (1) with respect to the mask, denoted by G ( ), is defined as (1) G ( ) D ( F) = F B G The geodesic dilation of size n of the marker image F ( n) with respect to G, denoted by DG ( F), is defined as (0) with DG ( F) F. 2/27/ D ( n) (1) ( n 1) DG ( F) = DG ( F) DG ( F) = F
26 2/27/
27 Morphological Reconstruction: Geodesic Erosion Let F denote the marker image and G the mask image. The geodesic erosion of size 1 of the marker image with (1) respect to the mask, denoted by EG ( F), is defined as (1) G ( ) E ( F) = F B G The geodesic erosion of size n of the marker image F ( n) with respect to G, denoted by EG ( F), is defined as (0) with EG ( F) F. ( n) (1) ( n 1) EG ( F) = EG ( F) EG ( F) = 2/27/
28 2/27/
29 Morphological Reconstruction by Dilation Morphological reconstruction by dialtion of a mask image D G from a marker image F, denoted R ( F), is defined as the geodesic dilation of F with respect to G, iterated until stability is achieved; that is, G D ( k) G( ) = G ( ) R F D F ( k) ( k 1) with k such that DG ( F) = DG ( F). 2/27/
30 2/27/
31 Morphological Reconstruction by Erosion Morphological reconstruction by erosion of a mask image E G from a marker image F, denoted R ( F), is defined as the geodesic erosion of F with respect to G, iterated until stability is achieved; that is, G E ( k) G( ) = G ( ) R F E F ( k) ( k 1) with k such that EG ( F) = EG ( F). 2/27/
32 Opening by Reconstruction The opening by reconstruction of size n of an image F is defined as the reconstruction by dilation of F from the erosion of size n of F; that is ( ) ( n) D OR ( F) = RF F nb where ( F nb) indicates n erosions of F by B. 2/27/
33 2/27/
34 Filling Holes Let Ixy (, ) denote a binary image and suppose that we form a marker image F that is 0 everywhere, except at the image border, where it is set to 1- I; that is Fxy (, ) then = 1 Ixy (, ) if ( xy, ) is on the border of 0 otherwise I D H = R c ( F) I c 2/27/
35 SE : 3 3 1s. 2/27/
36 D H = R c ( F) I c 2/27/
37 Border Clearing It can be used to screen images so that only complete objects remain for further processing; it can be used as a singal that partial objects are present in the field of view. The original image is used as the mask and the following marker image: Ixy (, ) if ( xy, ) is on the border of I Fxy (, ) = 0 otherwise D X = I R ( F) I 2/27/
38 2/27/
39 Summary (1) 2/27/
40 Summary (2) 2/27/
41 2/27/
42 2/27/
43 Gray-Scale Morphology f( xy, ) : gray-scale image bxy (, ): structuring element 2/27/
44 Gray-Scale Morphology: Erosion and Dilation by Flat Structuring [ f b] ( xy, ) = min { f( x+ sy, + t) } ( st,) b [ f b] ( xy, ) = max { f( x sy, t) } ( st,) b 2/27/
45 2/27/
46 Gray-Scale Morphology: Erosion and Dilation by Nonflat Structuring [ f b ]( xy, ) = min { f( x+ sy, + t) b ( st, )} N ( st,) b [ f b ]( xy, ) = max { f( x sy, t) + b ( st, )} N ( st,) b N N 2/27/
47 Duality: Erosion and Dilation c c f b ( xy, ) = f b ( xy, ) [ ] c where f = f( xy, ) and b= b( x, y) c c f b = f b [ ] c f b f b ( ) c = ( ) 2/27/
48 Opening and Closing f b= f b b ( ) f b= f b b ( ) c c f b = f b= f b ( ) c c f b = f b= f b ( ) 2/27/
49 2/27/
50 Properties of Gray-scale Opening ( a) f b f ( b) if f f, then f b f b ( ) ( ) ( ) ( c) f b b= f b where e r denotes e is a subset of r and also exy (, ) rxy (, ). 2/27/
51 Properties of Gray-scale Closing ( a) f f b ( b) if f f, then f b f b ( ) ( ) ( ) ( c) f b b= f b 2/27/
52 2/27/
53 Morphological Smoothing Opening suppresses bright details smaller than the specified SE, and closing suppresses dark details. Opening and closing are used often in combination as morphological filters for image smoothing and noise removal. 2/27/
54 Morphological Smoothing 2/27/
55 Morphological Gradient Dilation and erosion can be used in combination with image subtraction to obtain the morphological gradient of an image, denoted by g, g = ( f b) ( f b) The edges are enhanced and the contribution of the homogeneous areas are suppressed, thus producing a derivative-like (gradient) effect. 2/27/
56 Morphological Gradient 2/27/
57 Top-hat and Bottom-hat Transformations The top-hat transformation of a grayscale image f is defined as f minus its opening: T ( f) = f ( f b) hat The bottom-hat transformation of a grayscale image f is defined as its closing minus f: B ( f) = ( f b) f hat 2/27/
58 Top-hat and Bottom-hat Transformations One of the principal applications of these transformations is in removing objects from an image by using structuring element in the opening or closing operation 2/27/
59 Example of Using Top-hat Transformation in Segmentation 2/27/
60 Granulometry Granulometry deals with determining the size of distribution of particles in an image Opening operations of a particular size should have the most effect on regions of the input image that contain particles of similar size For each opening, the sum (surface area) of the pixel values in the opening is computed 2/27/
61 Example 2/27/
62 2/27/
63 Textual Segmentation Segmentation: the process of subdividing an image into regions. 2/27/
64 Textual Segmentation 2/27/
65 Gray-Scale Morphological Reconstruction (1) Let f and g denote the marker and mask image with the same size, respectively and f g. The geodesic dilation of size 1 of f with respect to g is defined as ( ) D (1) ( f) = f g g g where denotes the point-wise minimum operator. The geodesic dilation of size n of f with respect to g is defined as ( n) (1) ( n 1) (0) Dg ( f) = D g Dg ( f) with Dg ( f) = f 2/27/
66 Gray-Scale Morphological Reconstruction (2) The geodesic erosion of size 1 of f with respect to g is defined as ( ) E (1) ( f) = f g g g where denotes the point-wise maximum operator. The geodesic erosion of size n of f with respect to g is defined as ( n) (1) ( n 1) (0) Eg ( f) = Eg Eg ( f) with Eg ( f) = f 2/27/
67 Gray-Scale Morphological Reconstruction (3) The morphological reconstruction by dilation of a grayscale mask image g by a gray-scale marker image f, is defined as the geodesic dilation of f with respect to g, iterated until stability is reached, that is, D R ( f) = D f with k such that g ( k) g ( ) ( ) = k+ ( ) D f D f ( k) ( 1) g g The morphological reconstruction by erosion of g by f is defined as with k such that E R ( f) = E f g ( k) g ( ) k+ ( ) = ( ) E f E f ( k) ( 1) g g 2/27/
68 Gray-Scale Morphological Reconstruction (4) The opening by reconstruction of size n of an image f is defined as the reconstruction by dilation of f from the erosion of size n of f; that is, [ ] ( n ) D O ( f ) = R f nb R f The closing by reconstruction of size n of an image f is defined as the reconstruction by erosion of f from the dilation of size n of f; that is, [ ] ( n ) E C ( f ) = R f nb R f 2/27/
69 2/27/
70 Steps in the Example 1. Opening by reconstruction of the original image using a horizontal line of size 1x71 pixels in the erosion operation [ ] ( n ) D O ( f ) = R f nb R 2. Subtract the opening by reconstruction from original image f f O f ( n) ' = R ( ) 3. Opening by reconstruction of the f using a vertical line of size 11x1 pixels 4. Dilate f1 with a line SE of size 1x21, get f2. f [ ] f O f R f nb ( n) D 1 = R ( ') = f ' ' 2/27/
71 Steps in the Example 5. Calculate the minimum between the dilated image f2 and and f, get f3. 6. By using f3 as a marker and the dilated image f2 as the mask, R ( f3) = D f3 D ( k) f 2 f 2 ( ) with k such that D f3 = D f3 ( ) k+ ( ) ( k) ( 1) f 2 f 2 2/27/
Ch9 Morphological Image Processing
Ch9 Morphological Image Processing 9.1 Preliminaries 9.1.1 Some Basic Concepts form Set Theory If every element of a set A is also an element of another set B, then A is said to be a subset of B, denoted
More informationdetection of Shaded Roads in urban Areas
Detection of shaded roads in high spatial resolution images of urban areas Thiago Statella 1 Federal Institute for Education, Science and Technology of Mato Grosso, Zulmira Canavarros street n 95, Cuiabá,
More informationAngioSys 2.0 Image Analysis Software Manual
AngioSys 2.0 Image Analysis Software Manual Table of contents Introduction and ordering Activate your software Analyse a new plate Open a previous plate Add well details Delete well details Fill a row/column
More informationDrainage Network Extraction from a SAREX 92 RADAR image
Drainage Network Extraction from a SAREX 92 RADAR image ANA LÚCIA BEZERRA CANDEIAS 1 1 DPI/INPE Divisão de Processamento de Imagens / Instituto Nacional de Pesquisas Espacias Caixa Postal 515 12227 010
More informationMorphological segmentation of histology cell images
Morphological segmentation of histology cell images A.Nedzved, S.Ablameyko, I.Pitas Institute of Engineering Cybernetics of the National Academy of Sciences Surganova, 6, 00 Minsk, Belarus E-mail abl@newman.bas-net.by
More informationFace detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.
More informationRailway Expansion Joint Gaps and Hooks Detection Using Morphological Processing, Corner Points and Blobs
Railway Expansion Joint Gaps and Hooks Detection Using Morphological Processing, Corner Points and Blobs Samiul Islam ID: 12301053 Rubayat Ahmed Khan ID: 11301026 Supervisor RubelBiswas Department of Computer
More informationIEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING 1 0196-2892/$26.00 2010 IEEE
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING 1 Morphological Attribute Profiles for the Analysis of Very High Resolution Images Mauro Dalla Mura, Student Member, IEEE, Jón Atli Benediktsson, Fellow,
More informationDigital Image Processing
GONZ_FMv3.qxd 7/26/07 9:05 AM Page i Digital Image Processing Third Edition Rafael C. Gonzalez University of Tennessee Richard E. Woods MedData Interactive Upper Saddle River, NJ 07458 GONZ_FMv3.qxd 7/26/07
More informationBinary Image Reconstruction
A network flow algorithm for reconstructing binary images from discrete X-rays Kees Joost Batenburg Leiden University and CWI, The Netherlands kbatenbu@math.leidenuniv.nl Abstract We present a new algorithm
More informationAutomatic Traffic Estimation Using Image Processing
Automatic Traffic Estimation Using Image Processing Pejman Niksaz Science &Research Branch, Azad University of Yazd, Iran Pezhman_1366@yahoo.com Abstract As we know the population of city and number of
More information3D Scanner using Line Laser. 1. Introduction. 2. Theory
. Introduction 3D Scanner using Line Laser Di Lu Electrical, Computer, and Systems Engineering Rensselaer Polytechnic Institute The goal of 3D reconstruction is to recover the 3D properties of a geometric
More informationLine and Polygon Clipping. Foley & Van Dam, Chapter 3
Line and Polygon Clipping Foley & Van Dam, Chapter 3 Topics Viewing Transformation Pipeline in 2D Line and polygon clipping Brute force analytic solution Cohen-Sutherland Line Clipping Algorithm Cyrus-Beck
More informationSection 12.6: Directional Derivatives and the Gradient Vector
Section 26: Directional Derivatives and the Gradient Vector Recall that if f is a differentiable function of x and y and z = f(x, y), then the partial derivatives f x (x, y) and f y (x, y) give the rate
More informationBinary Image Scanning Algorithm for Cane Segmentation
Binary Image Scanning Algorithm for Cane Segmentation Ricardo D. C. Marin Department of Computer Science University Of Canterbury Canterbury, Christchurch ricardo.castanedamarin@pg.canterbury.ac.nz Tom
More informationAnalecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
More informationTracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
More informationLevel Set Framework, Signed Distance Function, and Various Tools
Level Set Framework Geometry and Calculus Tools Level Set Framework,, and Various Tools Spencer Department of Mathematics Brigham Young University Image Processing Seminar (Week 3), 2010 Level Set Framework
More informationMATH 304 Linear Algebra Lecture 9: Subspaces of vector spaces (continued). Span. Spanning set.
MATH 304 Linear Algebra Lecture 9: Subspaces of vector spaces (continued). Span. Spanning set. Vector space A vector space is a set V equipped with two operations, addition V V (x,y) x + y V and scalar
More informationConstrained curve and surface fitting
Constrained curve and surface fitting Simon Flöry FSP-Meeting Strobl (June 20, 2006), floery@geoemtrie.tuwien.ac.at, Vienna University of Technology Overview Introduction Motivation, Overview, Problem
More informationAutomatic Detection of PCB Defects
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 6 November 2014 ISSN (online): 2349-6010 Automatic Detection of PCB Defects Ashish Singh PG Student Vimal H.
More informationAn Iterative Image Registration Technique with an Application to Stereo Vision
An Iterative Image Registration Technique with an Application to Stereo Vision Bruce D. Lucas Takeo Kanade Computer Science Department Carnegie-Mellon University Pittsburgh, Pennsylvania 15213 Abstract
More informationjorge s. marques image processing
image processing images images: what are they? what is shown in this image? What is this? what is an image images describe the evolution of physical variables (intensity, color, reflectance, condutivity)
More informationA Novel Hole filling method based on Projection onto Convex Set in DIBR
3rd International Conference on Multimedia Technology ICMT 2013) A Novel Hole filling method based on Projection onto Convex Set in DIBR Weiquan Wang1 and Yingyun Yang2 and Qian Liang3 Abstract. Depth
More informationComputer Graphics. Geometric Modeling. Page 1. Copyright Gotsman, Elber, Barequet, Karni, Sheffer Computer Science - Technion. An Example.
An Example 2 3 4 Outline Objective: Develop methods and algorithms to mathematically model shape of real world objects Categories: Wire-Frame Representation Object is represented as as a set of points
More informationArrangements And Duality
Arrangements And Duality 3.1 Introduction 3 Point configurations are tbe most basic structure we study in computational geometry. But what about configurations of more complicated shapes? For example,
More informationJump-Miss Binary Erosion Algorithm
Jump-Miss Binary Erosion Algorithm Anderson Fraiha Machado and Ronaldo Fumio Hashimoto Institute of Mathematics and Statistics of University of Sao Paulo, SP, Brazil dandy@ime.usp.br and ronaldo@ime.usp.br
More informationCanny Edge Detection
Canny Edge Detection 09gr820 March 23, 2009 1 Introduction The purpose of edge detection in general is to significantly reduce the amount of data in an image, while preserving the structural properties
More informationCOMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS
COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS B.K. Mohan and S. N. Ladha Centre for Studies in Resources Engineering IIT
More informationMAVIparticle Modular Algorithms for 3D Particle Characterization
MAVIparticle Modular Algorithms for 3D Particle Characterization version 1.0 Image Processing Department Fraunhofer ITWM Contents Contents 1 Introduction 2 2 The program 2 2.1 Framework..............................
More informationHow To Segmentate An Image
Edge Strength Functions as Shape Priors in Image Segmentation Erkut Erdem, Aykut Erdem, and Sibel Tari Middle East Technical University, Department of Computer Engineering, Ankara, TR-06531, TURKEY, {erkut,aykut}@ceng.metu.edu.tr,
More informationVision-based Walking Parameter Estimation for Biped Locomotion Imitation
Vision-based Walking Parameter Estimation for Biped Locomotion Imitation Juan Pedro Bandera Rubio 1, Changjiu Zhou 2 and Francisco Sandoval Hernández 1 1 Dpto. Tecnología Electrónica, E.T.S.I. Telecomunicación
More informationVisual Structure Analysis of Flow Charts in Patent Images
Visual Structure Analysis of Flow Charts in Patent Images Roland Mörzinger, René Schuster, András Horti, and Georg Thallinger JOANNEUM RESEARCH Forschungsgesellschaft mbh DIGITAL - Institute for Information
More informationWIN32TRACE USER S GUIDE
WIN32TRACE USER S GUIDE Win32Trace is a program for converting raster (bitmap) images into vector images. These vector images can then be easily rescaled and are useful in many applications. For example,
More informationDERIVATIVES AS MATRICES; CHAIN RULE
DERIVATIVES AS MATRICES; CHAIN RULE 1. Derivatives of Real-valued Functions Let s first consider functions f : R 2 R. Recall that if the partial derivatives of f exist at the point (x 0, y 0 ), then we
More informationDigital Image Requirements for New Online US Visa Application
Digital Image Requirements for New Online US Visa Application As part of the electronic submission of your DS-160 application, you will be asked to provide an electronic copy of your photo. The photo must
More information3D Model of the City Using LiDAR and Visualization of Flood in Three-Dimension
3D Model of the City Using LiDAR and Visualization of Flood in Three-Dimension R.Queen Suraajini, Department of Civil Engineering, College of Engineering Guindy, Anna University, India, suraa12@gmail.com
More informationMedical Image Segmentation of PACS System Image Post-processing *
Medical Image Segmentation of PACS System Image Post-processing * Lv Jie, Xiong Chun-rong, and Xie Miao Department of Professional Technical Institute, Yulin Normal University, Yulin Guangxi 537000, China
More informationAN ALGORITHM FOR CENTRELINE EXTRACTION USING NATURAL NEIGHBOUR INTERPOLATION
AN ALGORITHM FOR CENTRELINE EXTRACTION USING NATURAL NEIGHBOUR INTERPOLATION Darka Mioc, François Anton and Girija Dharmaraj Department of Geomatics Engineering University of Calgary 2500 University Drive
More informationComputer Graphics CS 543 Lecture 12 (Part 1) Curves. Prof Emmanuel Agu. Computer Science Dept. Worcester Polytechnic Institute (WPI)
Computer Graphics CS 54 Lecture 1 (Part 1) Curves Prof Emmanuel Agu Computer Science Dept. Worcester Polytechnic Institute (WPI) So Far Dealt with straight lines and flat surfaces Real world objects include
More informationMAKE A CLOCK ART POSTER: 4 O CLOCK CLOCK REFLECTION
MAKE A CLOCK ART POSTER: 4 O CLOCK CLOCK REFLECTION 1. First: Practice drawing vertically or horizontally reflected patterns a. Draw these reflected patterns across the vertical lines: over this line over
More informationAutomatic Restoration Algorithms for 35mm film
P. Schallauer, A. Pinz, W. Haas. Automatic Restoration Algorithms for 35mm film. To be published in Videre, Journal of Computer Vision Research, web: http://mitpress.mit.edu/videre.html, 1999. Automatic
More informationMASKS & CHANNELS WORKING WITH MASKS AND CHANNELS
MASKS & CHANNELS WORKING WITH MASKS AND CHANNELS Masks let you isolate and protect parts of an image. When you create a mask from a selection, the area not selected is masked or protected from editing.
More informationDual Methods for Total Variation-Based Image Restoration
Dual Methods for Total Variation-Based Image Restoration Jamylle Carter Institute for Mathematics and its Applications University of Minnesota, Twin Cities Ph.D. (Mathematics), UCLA, 2001 Advisor: Tony
More informationAn Algorithm for Classification of Five Types of Defects on Bare Printed Circuit Board
IJCSES International Journal of Computer Sciences and Engineering Systems, Vol. 5, No. 3, July 2011 CSES International 2011 ISSN 0973-4406 An Algorithm for Classification of Five Types of Defects on Bare
More informationAutomatic Reconstruction of Parametric Building Models from Indoor Point Clouds. CAD/Graphics 2015
Automatic Reconstruction of Parametric Building Models from Indoor Point Clouds Sebastian Ochmann Richard Vock Raoul Wessel Reinhard Klein University of Bonn, Germany CAD/Graphics 2015 Motivation Digital
More information2.3 WINDOW-TO-VIEWPORT COORDINATE TRANSFORMATION
2.3 WINDOW-TO-VIEWPORT COORDINATE TRANSFORMATION A world-coordinate area selected for display is called a window. An area on a display device to which a window is mapped is called a viewport. The window
More informationBildverarbeitung und Mustererkennung Image Processing and Pattern Recognition
Bildverarbeitung und Mustererkennung Image Processing and Pattern Recognition 1. Image Pre-Processing - Pixel Brightness Transformation - Geometric Transformation - Image Denoising 1 1. Image Pre-Processing
More informationMean-Shift Tracking with Random Sampling
1 Mean-Shift Tracking with Random Sampling Alex Po Leung, Shaogang Gong Department of Computer Science Queen Mary, University of London, London, E1 4NS Abstract In this work, boosting the efficiency of
More informationSolving Simultaneous Equations and Matrices
Solving Simultaneous Equations and Matrices The following represents a systematic investigation for the steps used to solve two simultaneous linear equations in two unknowns. The motivation for considering
More informationMachine vision systems - 2
Machine vision systems Problem definition Image acquisition Image segmentation Connected component analysis Machine vision systems - 1 Problem definition Design a vision system to see a flat world Page
More informationGrayscale area openings and closings, their efficient implementation and applications
Proc. EURASIP Workshop on Mathematical Morphology and its Applications to Signal Processing, Barcelona, Spain, pp. 22 27, May 1993. Grayscale area openings and closings, their efficient implementation
More informationDigital image processing
746A27 Remote Sensing and GIS Lecture 4 Digital image processing Chandan Roy Guest Lecturer Department of Computer and Information Science Linköping University Digital Image Processing Most of the common
More information3. Evaluate the objective function at each vertex. Put the vertices into a table: Vertex P=3x+2y (0, 0) 0 min (0, 5) 10 (15, 0) 45 (12, 2) 40 Max
SOLUTION OF LINEAR PROGRAMMING PROBLEMS THEOREM 1 If a linear programming problem has a solution, then it must occur at a vertex, or corner point, of the feasible set, S, associated with the problem. Furthermore,
More informationLocating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith
More informationAdaptive Online Gradient Descent
Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650
More informationVariational approach to restore point-like and curve-like singularities in imaging
Variational approach to restore point-like and curve-like singularities in imaging Daniele Graziani joint work with Gilles Aubert and Laure Blanc-Féraud Roma 12/06/2012 Daniele Graziani (Roma) 12/06/2012
More informationObject tracking & Motion detection in video sequences
Introduction Object tracking & Motion detection in video sequences Recomended link: http://cmp.felk.cvut.cz/~hlavac/teachpresen/17compvision3d/41imagemotion.pdf 1 2 DYNAMIC SCENE ANALYSIS The input to
More informationEFX Keying/Alpha plugins for After Effects
EFX Keying/Alpha plugins for After Effects Here you'll find description of the plugins developed to help select pixels based on many criteria. Also after selection, there are often things you want to do
More informationCONFOCAL LASER SCANNING MICROSCOPY TUTORIAL
CONFOCAL LASER SCANNING MICROSCOPY TUTORIAL Robert Bagnell 2006 This tutorial covers the following CLSM topics: 1) What is the optical principal behind CLSM? 2) What is the spatial resolution in X, Y,
More informationDouble Integrals in Polar Coordinates
Double Integrals in Polar Coordinates. A flat plate is in the shape of the region in the first quadrant ling between the circles + and +. The densit of the plate at point, is + kilograms per square meter
More information2. MATERIALS AND METHODS
Difficulties of T1 brain MRI segmentation techniques M S. Atkins *a, K. Siu a, B. Law a, J. Orchard a, W. Rosenbaum a a School of Computing Science, Simon Fraser University ABSTRACT This paper looks at
More informationMULTI-RESOLUTION APPROACH FOR FINE STRUCTURE EXTRACTION Application and validation on road images
MULTI-RESOLUTION APPROACH FOR FINE STRUCTURE EXTRACTION Application and validation on road images Nicolas COUDRAY, Argyro KARATHANOU Laboratoire MIPS, Université de Haute-Alsace, Mulhouse, France nicolas.coudray@uha.fr,e0602532@uha.fr
More informationPlanar Curve Intersection
Chapter 7 Planar Curve Intersection Curve intersection involves finding the points at which two planar curves intersect. If the two curves are parametric, the solution also identifies the parameter values
More informationME 111: Engineering Drawing
ME 111: Engineering Drawing Lecture # 14 (10/10/2011) Development of Surfaces http://www.iitg.ernet.in/arindam.dey/me111.htm http://www.iitg.ernet.in/rkbc/me111.htm http://shilloi.iitg.ernet.in/~psr/ Indian
More informationCurves and Surfaces. Goals. How do we draw surfaces? How do we specify a surface? How do we approximate a surface?
Curves and Surfaces Parametric Representations Cubic Polynomial Forms Hermite Curves Bezier Curves and Surfaces [Angel 10.1-10.6] Goals How do we draw surfaces? Approximate with polygons Draw polygons
More informationFast and Accurate Segmentation of Dental X-Ray Records
Fast and Accurate Segmentation of Dental X-Ray Records Xin Li, Ayman Abaza, Diaa Eldin Nassar, and Hany Ammar Lane Dept. of Computer Science and Electrical Engineering, West Virginia University, Morgantown,
More informationH.Calculating Normal Vectors
Appendix H H.Calculating Normal Vectors This appendix describes how to calculate normal vectors for surfaces. You need to define normals to use the OpenGL lighting facility, which is described in Chapter
More information2.2 Creaseness operator
2.2. Creaseness operator 31 2.2 Creaseness operator Antonio López, a member of our group, has studied for his PhD dissertation the differential operators described in this section [72]. He has compared
More informationProtocol for Leaf Image Analysis Surface Area
Protocol for Leaf Image Analysis Surface Area By Kitren Glozer Associate Project Scientist Dept. of Plant Sciences, University of California, Davis Contact information: Dept. of Plant Sciences, University
More information5.7 Maximum and Minimum Values
5.7 Maximum and Minimum Values Objectives Icandefinecriticalpoints. I know the di erence between local and absolute minimums/maximums. I can find local maximum(s), minimum(s), and saddle points for a given
More informationDATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS
DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS 1 AND ALGORITHMS Chiara Renso KDD-LAB ISTI- CNR, Pisa, Italy WHAT IS CLUSTER ANALYSIS? Finding groups of objects such that the objects in a group will be similar
More informationTraditional Drawing Tools
Engineering Drawing Traditional Drawing Tools DRAWING TOOLS DRAWING TOOLS 1. T-Square 2. Triangles DRAWING TOOLS HB for thick line 2H for thin line 3. Adhesive Tape 4. Pencils DRAWING TOOLS 5. Sandpaper
More informationMeasurement of the effect of biomass burning aerosol on inhibition of cloud formation over the Amazon
Supporting Online Material for Koren et al. Measurement of the effect of biomass burning aerosol on inhibition of cloud formation over the Amazon 1. MODIS new cloud detection algorithm The operational
More informationNumerical Methods For Image Restoration
Numerical Methods For Image Restoration CIRAM Alessandro Lanza University of Bologna, Italy Faculty of Engineering CIRAM Outline 1. Image Restoration as an inverse problem 2. Image degradation models:
More informationComputer Vision & Digital Image Processing. Edge linking and boundary detection
Computer Vision & Digital Image Processing Edge Linking and Boundary Detection Dr. D. J. Jackson Lecture 17-1 Edge linking and boundary detection Ideally, edge detection techniques yield pixels lying only
More informationHandwritten Character Recognition from Bank Cheque
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Handwritten Character Recognition from Bank Cheque Siddhartha Banerjee*
More informationSignature Region of Interest using Auto cropping
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,
More informationRobust and Efficient Implicit Surface Reconstruction for Point Clouds Based on Convexified Image Segmentation
Noname manuscript No. (will be inserted by the editor) Robust and Efficient Implicit Surface Reconstruction for Point Clouds Based on Convexified Image Segmentation Jian Liang Frederick Park Hongkai Zhao
More informationVision based Vehicle Tracking using a high angle camera
Vision based Vehicle Tracking using a high angle camera Raúl Ignacio Ramos García Dule Shu gramos@clemson.edu dshu@clemson.edu Abstract A vehicle tracking and grouping algorithm is presented in this work
More informationImage Gradients. Given a discrete image Á Òµ, consider the smoothed continuous image ܵ defined by
Image Gradients Given a discrete image Á Òµ, consider the smoothed continuous image ܵ defined by ܵ Ü ¾ Ö µ Á Òµ Ü ¾ Ö µá µ (1) where Ü ¾ Ö Ô µ Ü ¾ Ý ¾. ½ ¾ ¾ Ö ¾ Ü ¾ ¾ Ö. Here Ü is the 2-norm for the
More informationEffective Gradient Domain Object Editing on Mobile Devices
Effective Gradient Domain Object Editing on Mobile Devices Yingen Xiong, Dingding Liu, Kari Pulli Nokia Research Center, Palo Alto, CA, USA Email: {yingen.xiong, dingding.liu, kari.pulli}@nokia.com University
More informationBCC Multi Stripe Wipe
BCC Multi Stripe Wipe The BCC Multi Stripe Wipe is a similar to a Horizontal or Vertical Blind wipe. It offers extensive controls to randomize the stripes parameters. The following example shows a Multi
More information7 Lens Shading Correction for Dirt Detection
7 Lens Shading Correction for Dirt Detection Chih-Wei Chen 1 and Chiou-Shann Fuh 1 Abstract We present a novel inspection framework to detect dirt and blemish in production line of optical fabrication
More informationThree-Dimensional Data Recovery Using Image-Based Modeling
Three-Dimensional Data Recovery Using Image-Based Modeling Jeremy W. Cannon Jonathan C. Derryberry Vitaly Y. Kulikov jcannon1@mit.edu jonderry@mit.edu vkulikov@mit.edu Abstract 6.837: Introduction to Computer
More informationPHOTOGRAMMETRIC TECHNIQUES FOR MEASUREMENTS IN WOODWORKING INDUSTRY
PHOTOGRAMMETRIC TECHNIQUES FOR MEASUREMENTS IN WOODWORKING INDUSTRY V. Knyaz a, *, Yu. Visilter, S. Zheltov a State Research Institute for Aviation System (GosNIIAS), 7, Victorenko str., Moscow, Russia
More information1. A wire carries 15 A. You form the wire into a single-turn circular loop with magnetic field 80 µ T at the loop center. What is the loop radius?
CHAPTER 3 SOURCES O THE MAGNETC ELD 1. A wire carries 15 A. You form the wire into a single-turn circular loop with magnetic field 8 µ T at the loop center. What is the loop radius? Equation 3-3, with
More informationA Method for Controlling Mouse Movement using a Real- Time Camera
A Method for Controlling Mouse Movement using a Real- Time Camera Hojoon Park Department of Computer Science Brown University, Providence, RI, USA hojoon@cs.brown.edu Abstract This paper presents a new
More informationComponent Ordering in Independent Component Analysis Based on Data Power
Component Ordering in Independent Component Analysis Based on Data Power Anne Hendrikse Raymond Veldhuis University of Twente University of Twente Fac. EEMCS, Signals and Systems Group Fac. EEMCS, Signals
More informationThe Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
More informationInternational Doctoral School Algorithmic Decision Theory: MCDA and MOO
International Doctoral School Algorithmic Decision Theory: MCDA and MOO Lecture 2: Multiobjective Linear Programming Department of Engineering Science, The University of Auckland, New Zealand Laboratoire
More informationMATH 10550, EXAM 2 SOLUTIONS. x 2 + 2xy y 2 + x = 2
MATH 10550, EXAM SOLUTIONS (1) Find an equation for the tangent line to at the point (1, ). + y y + = Solution: The equation of a line requires a point and a slope. The problem gives us the point so we
More informationWhy? A central concept in Computer Science. Algorithms are ubiquitous.
Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online
More informationMonash University Clayton s School of Information Technology CSE3313 Computer Graphics Sample Exam Questions 2007
Monash University Clayton s School of Information Technology CSE3313 Computer Graphics Questions 2007 INSTRUCTIONS: Answer all questions. Spend approximately 1 minute per mark. Question 1 30 Marks Total
More informationESE498. Intruder Detection System
0 Washington University in St. Louis School of Engineering and Applied Science Electrical and Systems Engineering Department ESE498 Intruder Detection System By Allen Chiang, Jonathan Chu, Siwei Su Supervisor
More information1. Prove that the empty set is a subset of every set.
1. Prove that the empty set is a subset of every set. Basic Topology Written by Men-Gen Tsai email: b89902089@ntu.edu.tw Proof: For any element x of the empty set, x is also an element of every set since
More informationCloud tracking with optical flow for short-term solar forecasting
Cloud tracking with optical flow for short-term solar forecasting Philip Wood-Bradley, José Zapata, John Pye Solar Thermal Group, Australian National University, Canberra, Australia Corresponding author:
More informationHøgskolen i Narvik Sivilingeniørutdanningen STE6237 ELEMENTMETODER. Oppgaver
Høgskolen i Narvik Sivilingeniørutdanningen STE637 ELEMENTMETODER Oppgaver Klasse: 4.ID, 4.IT Ekstern Professor: Gregory A. Chechkin e-mail: chechkin@mech.math.msu.su Narvik 6 PART I Task. Consider two-point
More informationE27 SPRING 2013 ZUCKER PROJECT 2 PROJECT 2 AUGMENTED REALITY GAMING SYSTEM
PROJECT 2 AUGMENTED REALITY GAMING SYSTEM OVERVIEW For this project, you will implement the augmented reality gaming system that you began to design during Exam 1. The system consists of a computer, projector,
More information