Drainage Network Extraction from a SAREX 92 RADAR image
|
|
|
- Jennifer Cunningham
- 10 years ago
- Views:
Transcription
1 Drainage Network Extraction from a SAREX 92 RADAR image ANA LÚCIA BEZERRA CANDEIAS 1 1 DPI/INPE Divisão de Processamento de Imagens / Instituto Nacional de Pesquisas Espacias Caixa Postal São José dos Campos, SP, Brazil [email protected] Abstract. The purpose of this paper is to show how to extract the drainage network from the SAREX project RADAR image using Mathematical Morphology tools. The problem is to find a mapping from a grey level image into a binary image that exhibits the drainage. The selected region is from a test site in Acre, SW Amazonia, Brazil. In RADAR images, the drainage network appears with high contrast and well defined shape. Mathematical Morphology is a theory for spatial structure analysis and aims here at analyzing the shape and the forms of the drainage network. This analysis is based on the set and lattice theories. This paper uses the MMach, a Mathematical Morphology Toolbox for the KHOROS system. A comparison between visual analysis and presented method is developed. Keywords: Image Processing, Mathematical Morphology, Remote Sensing, Radar, Drainage extraction. 1 Introduction Mathematical Morphology is a theory for spatial structure analysis and aims at analyzing the shape and the forms of objects. It is a powerful tool to extract image information and is based on a mapping study between complete lattices in terms of some families of simple mappings: dilations, erosions, anti dilations, anti erosions. These mappings are built combining the elementary mappings through union, intersection and composition operations [Barrera et al. (1995)]. In RADAR images, drainage network appears with high contrast and is usually clearly defined as well as relatively easy to map by visual analysis. Therefore, the drainage network is presented with a well defined spatial structure. The drainage is significant in helping visual interpretation for nearly every subject, even more so in geology [Trevett (1986)]. Figure 1 (a) shows the selected image from a test site in Acre, SW Amazonia, Brazil. The drainage network analysis is important to understand the dynamics of annual flooding, to plan development such as location of roads and settlement projects, to estimate the kind of soil and to help the estimation of soil erosion potential. With simple threshold it is not clearly possible to extract the drainage as shown in Figure 1 (b) because of some parameters like: antenna pattern, speckle and texture patterns. This paper shows that it is possible to extract the drainage network with Mathematical Morphology mappings and operations. The example selected is from a SAREX 92 RADAR image project. The objective of SAREX 92 was to acquire a C band dataset, including simulated satellite data products, to be used for the evaluation of spaceborne C band SAR data in tropical forest environment [Kux et al. (1993)], [ Kux et al. (1995)]. The solution or goal of the drainage network problem is broken heuristically into subgoals, which are achieved by primitive mappings. To achieve the desired goal, the right composition of such mappings is fundamental. The methodology is implemented using the KHO- ROS system [Rasure et al. (1990)] and the MMach toolbox [Barrera et al. 1995]. The MMach is composed of a set of primitive mappings and operations. Some of them are defined in section 2. This paper is divided into four Sections. The next one, Section 2 gives the Mathematical Morphology basic concepts. Section 3 presents the methodology and a comparison between this methodology and the visual analysis extraction. Section 4 presents some conclusions. 2 Mathematical Morphology basic concepts Mathematical Morphology basic concepts can be seen in [Serra (1982)], [Serra (1988)], [Barrera (1987)], [Haralick et al. (1987)], [Haralick Shapiro (1991)], [Banon Barrera (1994)]. For more details about transformation using complete lattices, see [Banon Barrera (1991)], [Banon Barrera (1993)]. Mathematical Morphology operators used in Section 3 are defined bellow. Anais do IX SIBGRAPI (1996)
2 244 A. L. B. Candeias (a) (b) (c) Figure 1. (a) Original image. (b) Image threshold. (c) MM Binarization. 2.1 Basic image operations and transformations [Barrera et al. (1995)] Let be the set of integers. Let E be a rectangle of 2 and let K be an interval [0, k] of, with k 0. The collection of functions from E to K will represent the gray scale images of interest. We denote such a collection by K E and by f, g, f 1 and f 2 generic elements of K E. We first recall some useful local operations definitions on images. These definitions are based on the structural properties of the interval [0, k] of The intersection of f 1 and f 2, denoted f 1 ) f 2, is the function in K E given by, for any x in E, (f 1 ) f 2 )(x) min {f 1 (x), f 2 (x)}, (1) the union of f 1 and f 2, denoted f 1 ) f 2, is the function in K E given by, for any x in E, (f 1 ) f 2 )(x) max {f 1 (x), f 2 (x)}. (2) The two binary operations ) and ) from K E K E to K E are called, respectively, intersection and union. Actually, these operations applied to f 1 and f 2 produced, respectively, the infimum and the supremum of f 1 and f 2 with respect to the partial ordering given by f 1 f 2 (f 1 (x) f 2 (x) (x $ E)). The complementary (or inverse) of f, denoted f, is the function in K E given by, for any x in E, ( f)(x) k f (x). (3) The unary operation from K E to K E is called complementary operation (or inversion). This unary operation is both an anti dilation and an anti erosion. The difference between f 1 and f 2, denoted f 1 f 2, is the function in K E given by, for any x in E, (f 1 f 2 )(x) - f 1(x) f 2 (x) if f 2 (x) f 1 (x) (4) The binary operation from K E K E to K E is called difference operation (or subtraction). Actually, we have f 1 f 2 f 1 ) ( f 2 ) and we get the equality for binary images, that is, for f 1 (E) f 2 (E) {0, k}. Given a function f $ K E, the unary operation f is both an anti dilation and an anti erosion, and the unary operation f is both a dilation and an erosion. The comparison between f 1 and f 2, denoted f 1 f 2, is the function in K E given by, for any x in E, (f 1 f 2 )(x) - k if f 1(x) f 2 (x) (5) The binary operation from K E K E to K E is called comparison operation. The unary operations f and f from K E to K E are called adaptive thresholds with respect to f. These unary operations are, respectively, an anti dilation and an erosion. We now recall the definitions of two important subclasses of dilations and erosions. These definitions are based on the Abelian group property of ( 2, +). Let B be a subset of 2, called structural set (or, structural element). We denote by B h the translate of B by any vector h in 2, that is, B h {x h : x $ B}. We denote by B t the transpose of B, that is, B t { x : x $ B}. We denote by B c the complement of B, that is, B c {x : x % B}. The dilation of f by B is the function B(f) in K E, given by, for any x in E, B(f)(x) max {f (y): y$b t x(e}; (6) the erosion of f by B is the function B(f) in K E, given by, for any x in E, B(f)(x) min {f (y): y$b x (E}. (7) In the above expressions, we recall that max() 0 and min() k.
3 Drainage Network Extraction from a SAREX 92 RADAR Image 245 The two transformations B and B from K E to K E are called, respectively, dilation and erosion by B. Let g be an element of K E, the transformations B, g and B, g from K E to K E, given by B, g B ) g and B, g B ) g, (8) are called, respectively, conditional (or geodesic) dilation and erosion with respect to B given g. The transformations B and B from K E to K E, given by the following compositions B B B and B B B, (9) are called, respectively, (morphological) opening and closing with respect to B. Let A and B be two subsets of 2 such that A $ B, the two transformations A, B and A, B from K E to K E, given by the following compositions A, B A ) a B ct and A, B A ) a B ct, (10) are called, respectively, (morphological) sup generator and inf generator with respect to B. Let B be a subset of 2, the two transformations n B and n B from K E to K E, given, for n > 0, by the following n 1 successive compositions n B B B and n B B B, (11) are called, respectively, n dilation and n erosion by B. Actually, n B and n B are, respectively, equivalent to the dilation and erosion by nb, where nb is given by the following n 1 successive compositions nb (B B) B and, for n = 0, nb {o}. Let g be an element of K E, the transformations n B, g and n B, g from K E to K E, given by the following n 1 successive compositions n B, g B, g B, g and n B, g B, g B, g, (12) are called, respectively, n conditional dilation and erosion with respect to B given g. Let B be a subset of 2 and let f be an element of K E, the transformations B, f and B, f from K E to K E, given by, for any g $ K E, B, f (g) ){ n B, g(f): n 1, } and B, f (g) ){ n B, g(f): n 1, }, (13) are called, respectively, opening and closing by reconstruction from the marker f. 3 Drainage network extraction Section 2 illustrated some Mathematical Morphology tools. These tools are used in this section to extract the drainage network. The problem is to find a mapping from a grey level image f into a binary image g that exhibits the drainage. Figure 2 shows an example of this transformation. The mapping uses the fact that an image can be seen as a 3D mapping (pixel position x, y and its gray level z). The drainage is represented by low gray levels and can be seen by a valley. To reduce the texture effect, the image is a mean filter using a 3x3 mask (see Figure 3). The methodology is presented in Figure 4. The images shown in this figure are cut out from the original one. filter1, filter2 and filter3 extract the drainage with different structural elements. The box vmsup makes the union among filter1, filter2 and filter3 results. Figure 2. Drainage network extraction.
4 246 A. L. B. Candeias (a) (b) (c) (d) (e) (f) Figure 3. (a) Original image. (b) Low pass filtered image. (c) Binary result of drainage network. (d) 3D mapping of original image. (e) 3D mapping of low pass filtered image. (f) 3D mapping of binary result of drainage network. f 2 f f 1 f 3 f 5 f 6 g f 4 Figure 4. Visual programming to show mapping.
5 Drainage Network Extraction from a SAREX 92 RADAR Image 247 This methodology generates a resulting image with noise represented by left vertical, top and bottom lines with 255 gray levels. This spurious noise is identified by a mask called [. These lines are suppressed by the box vsubm. The representation of the structural elements is identified here by binary to decimal coding. Each line is represented by a decimal number. For example B024 is a 3x3 structural element with the origin in the center of the mask. The origin is represented by.. Then: B024 * and 8B024 is seven successive compositions of B024. After equation (11), there is an 1 0 0* explanation about it. Figure 4 presents the methodology in form of visual programming (cantata KHOROS). Each box of this figure is shown below. 1) Low pass filtering to smooth the input image. This step reduces the image texture. f 1 lp M (f). Where lp M () is a mean filter using 3x3 mask M. 2) filter1 identifies the drainage in the 45 o direction. This identification is based on finding the local minimum by a comparison between two images. For example, let h be an image. The comparison made in equation (15) will generate an h 1 image which selects a local minimum and a homogeneous region of h image : h 1 (x) - k if h(x) B(h(x)) If there is a lot of texture, h 1 will appear with a lot of noise. If B is larger, then the noise decreases. To identify the drainage in the 45 o direction, the comparison is described as following: g 1 byte(f 1 ). (16) Where byte() is cast to byte. g 2 B1 (g 1 ). (17) Where B 1 8B024. Where B 2 B120. g 3 B2 (g 1 ) (14) (15) (18) The comparison between g 1 and g 2 generates a binary result of the drainage with spurious noise. g 4 (x) - k if g 1(x) g 2 (x) It can be defined too by: g 4 (g 1 g 2 ). Pixels from drainage can be defined by local minimum. If a large structural element B was chosen to find the drainage, the binary image would contain the drainage and less noise. It is possible to identify and suppress part of the present noise in g 4 by applying equations described as following. First, a comparison between g 1 and g 3 generates a binary result. g 5 (x) - k if g 1(x) g 3 (x) g 5 (g 1 g 3 ). (19) (20) (21) (22) g 6 g 4 g 5. (23) The equation above reduces some spurious noise. Equation (24) identifies isolated pixels and equation (25) takes away these pixels. g 7 B3, B 4 (g 6 ). (24) Where B 3 B020 and B 4 B757. g 8 g 6 g 7. (25) Equation (26) gets g 8 like a marker for image g 4 and reconstructs the drainage network. f 2 B5, g 8 (g 4 ). (26) Where B 5 B777. 3) filter2 identifies drainage in the 0 o direction. The processing sequence is almost the same as for step 2. The change is only in the structural element of g 2 and g 3, B 1 8B060 and B 2 B030. The image resulting is f 3. 4) filter3 identifies drainage in the 45 o direction. The processing sequence is the same as for step 2. The change is only in the structural element of g 2 and g 3, B 1 8B420 and B 2 B021. The image resulting is f 4. 5) The union (vmsup) of filter1, filter2 and filter3 images generates the image f 5 (see Figure 4). f 5 f 2 ) f 3 ) f 4. (27) 6) The box called [ presents the mask. Equation (28) to (32) generates this mask. g 1 byte(f 5 ). (28) Where byte() is cast to byte.
6 248 A. L. B. Candeias g 3 g 5 g 6 g 7 f 1 g 1 g 2 g 4 f 2 g 8 filter_1 Figure 5. Visual programming of filter_1 box. Equation (29) generates a black nxm image to any nxm input image and assigns, automatically, the correct dimension nxm to the Cantata visual programming. g 2 g 1 g 1. (29) The union of images g 3, g 2 and g 5 generates the mask [. g 3 B040 (g 2 ). (30) g 4 B400 (g 2 ). g 5 B004 (g 2 ). f 6 g 3 ) g 4 ) g 5. (31) (32) (33) 7) The box called vsubm subtracts the image f 5 from the mask f 6 (see Figure 4). Then the top, bottom and the left side of image f 5 are taken away. g f 5 f 6. (34) 3.1 Comparison between visual analysis and automatic drainage extraction In section 3 an automatic drainage extraction was seen. In this section, the automatic extraction is compared with the visual analysis extraction to verify the quality of this mapping. Figure 8 shows a drainage extraction by using the visual analysis (image x) and an automatic one (image y). Image y is defined as following: y B,X ( B1 B 2 B 3 B 4 (g)). (35)
7 Drainage Network Extraction from a SAREX 92 RADAR Image 249 where (g) is the g image skeleton defined by Jang and Chin (1990) [Banon Barrera, 1994] and is included in MMach toolbox. B B777, B 1 B032, B 2 B640, B 3 B072 and B 4 B200. It is assumed that the white pixels from the automatic extraction image y belong to and the white pixels from the visual extraction image x belong to and both belong to a set (see Fig. 7). The ideal case is when and the worst one is when (. If an automatic extraction is good NP( ( ) is close to NP( ( ), otherwise, NP( ( ) is low compared with NP( ( ). Where NP() computes the number of elements. by: by: a) Let NP(a)% be the degree of agreement given by: NP(a)% NP(a) T. (41) b) Let NP(e)% be the degree of error of type 1 given NP(e)% NP(e) T. (42) d) Let NP(f)% be the degree of error of type 2 given NP(f)% NP(f) T. Where T NP(a) NP(e) NP(f). (43) Table 1 shows the result of each percentage of pixels with B 1 B777, B 2 2B 1 and B 3 3B 1. Table 1 Percentage of pixels Figure 7. Venn Diagram. It is supposed that both extraction have some errors. So a distance tolerance is included in (. The tolerance is obtained by dilation of x and y by B. More precisely, the following expressions are introduced [Banon (1996)]: Error region of type 1 called by exceed error image: e y B(x). (36) Error region of type 2 called by absence error image: f x B(y). (37) Agreement region of type 1 selection: a 2 y ) B(x) (38) Agreement region of type 2 selection: a 1 x ) B(y). (39) The next step is to compute the number of pixels, NP() of each region defined in (36) to (39). Let NP(a) be the average of the pixel number of the agreement regions, Np(a) (Np(a 1 ) Np(a 2 )) 2. (40) The number of pixels percentage in each region is defined by: NP(a)% NP(e)% NP(f)% B B B Conclusion Drainage network extraction is an image analysis problem and is significant in helping visual interpretation for nearly every subject that needs remote sensing data, even more so in Geology. This paper presented a methodology to extract drainage network from a SAREX 92 radar image using Mathematical Morphology tools. The implementation used the KHOROS system and a MMach toolbox. The methodology developed here was compared with a visual extraction. A distance tolerance was considered through a dilation by B, assuming some errors in automatic drainage extraction as well as in visual extraction. The larger B is, the larger the tolerance is, and more pixels belong to the agreement region. Results would be better in table 1 if the skeleton from the automatic extraction (see Fig. 8 (c)) were prunned. In table 1, the automatic extraction is 80% right with the visual analysis extraction, supposing a tolerance of three pixels.
8 250 A. L. B. Candeias (a) (b) (c) Figure 8. (a) Original image f. (b) Visual extraction, image x. (c) Automatic extraction, image y. To use this methodology for other images, some adaptations would be necessary such to smooth the input image and to change the size and direction of the structural element. Acknowledgment The author thanks Dr. Gerald J. F. Banon for his suggestions to solve this problem, Dr. Herman Kux for having supplied the image and Marco Aurélio Carvalho for English review. During the elaboration period of this paper, the author obtained the support of CNPq/ProTeM CC through AnIMoMat contract /94 9. Bibliography B. K. Jang and R. T. Chin, Analysis of thinning algorithms using Mathematical Morphology. IEEE Transactions on Pat. Anal. mach. Intel. (12),6,1990. G. J. F. Banon, Personal communication, ago, G. J. F. Banon and J. Barrera, Minimal representations for translation invariant set mappings by mathematical morphology, SIAM Journal of Applied Mathematics, 51, 6(1991): G. J. F. Banon and J. Barrera, Decomposition of mappings between complete lattices by Mathematical Morphology. Part I: General lattices, Signal Processing, 30(1993): G. J. F. Banon and J. Barrera, Bases da Morfologia Matemática para a análise de imagens binárias. IX Escola de Computação, Recife, 24 31, julho, H. J. H. Kux, F. J. Ahern and R. W. Pietsch, Evaluation of radar remote sensing for natural resource management in the tropical rainforests of Acre State, Brazil, Canadian Journal of Remote Sensing, 21, 4(1995): H. J. H. Kux, F. J. Ahern, R. K. Raney, R. W. Pietsch, B. Tittley The contribuition of SAREX 92 (South American RADAR Experiment) Campaign to the evaluation of Natural Resources in Tropical Rainforests: First Results From Test Site Acre, SW Amazonia, Brazil, In: 16th Canadian Symposium on Remote Sensing, proceedings, Sherbrooke, Quebec, Canada, _(1993): J. Barrera, Uma abordagem unificada para os problemas de Processamento Digital de Imagens: a Morfologia matemática. Dissertação de mestrado, INPE, São José dos Campos, J. Barrera, G. J. F. Banon e R. A. A. Lotufo. A mathematical morphology toolbox for the KHOROS system: specifications for Version 1.2b. Workshop 95 de Morfologia matemática, Campinas, mar., Available at URLib repository: ime.usp.br/jb/1996/ , J. Rasure, D. Argiro, T. Sauer and C. Williams, Visual Language and Software Development Environment for Image Processing, International Journal of Imaging Systems and Technology, 2(1990): J. Serra, Image Analysis and Mathematical Morphology. Volume 1, Academic Press, London, J. Serra, Image Analysis and Mathematical Morphology. Volume 2: Theoretical Advances, Academic Press, London, J. W. Trevett, Imaging radar for resource surveys, Chapman and Hall, London, 313p. R. M. Haralick, S. R. Sternberb and X. Zhuang. Image analysis using mathematical morphology, IEEE Patern Anal. Machine Intell., vol. PAMI 9, 4(1987): R. M. Haralick and L. G. Shapiro. Computer and robot vision, vol. 1, New York, Addison Wesley, 1991.
Novel Automatic PCB Inspection Technique Based on Connectivity
Novel Automatic PCB Inspection Technique Based on Connectivity MAURO HIROMU TATIBANA ROBERTO DE ALENCAR LOTUFO FEEC/UNICAMP- Faculdade de Engenharia Elétrica e de Computação/ Universidade Estadual de Campinas
Determining optimal window size for texture feature extraction methods
IX Spanish Symposium on Pattern Recognition and Image Analysis, Castellon, Spain, May 2001, vol.2, 237-242, ISBN: 84-8021-351-5. Determining optimal window size for texture feature extraction methods Domènec
5. Binary objects labeling
Image Processing - Laboratory 5: Binary objects labeling 1 5. Binary objects labeling 5.1. Introduction In this laboratory an object labeling algorithm which allows you to label distinct objects from a
Jump-Miss Binary Erosion Algorithm
Jump-Miss Binary Erosion Algorithm Anderson Fraiha Machado and Ronaldo Fumio Hashimoto Institute of Mathematics and Statistics of University of Sao Paulo, SP, Brazil [email protected] and [email protected]
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
Ch9 Morphological Image Processing
Ch9 Morphological Image Processing 9.1 Preliminaries 9.1.1 Some Basic Concepts form Set Theory If every element of a set A is also an element of another set B, then A is said to be a subset of B, denoted
COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS
COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS B.K. Mohan and S. N. Ladha Centre for Studies in Resources Engineering IIT
Automatic Detection of PCB Defects
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 6 November 2014 ISSN (online): 2349-6010 Automatic Detection of PCB Defects Ashish Singh PG Student Vimal H.
Analecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
Signature Segmentation from Machine Printed Documents using Conditional Random Field
2011 International Conference on Document Analysis and Recognition Signature Segmentation from Machine Printed Documents using Conditional Random Field Ranju Mandal Computer Vision and Pattern Recognition
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
Grayscale area openings and closings, their efficient implementation and applications
Proc. EURASIP Workshop on Mathematical Morphology and its Applications to Signal Processing, Barcelona, Spain, pp. 22 27, May 1993. Grayscale area openings and closings, their efficient implementation
Frsq: A Binary Image Coding Method
Frsq: A Binary Image Coding Method Peter L. Stanchev, William I. Grosky, John G. Geske Kettering University, Flint, MI 4854, {pstanche, jgeske}@kettering.edu University of Michigan-Dearborn, Dearborn,
3D Model of the City Using LiDAR and Visualization of Flood in Three-Dimension
3D Model of the City Using LiDAR and Visualization of Flood in Three-Dimension R.Queen Suraajini, Department of Civil Engineering, College of Engineering Guindy, Anna University, India, [email protected]
Colorado School of Mines Computer Vision Professor William Hoff
Professor William Hoff Dept of Electrical Engineering &Computer Science http://inside.mines.edu/~whoff/ 1 Introduction to 2 What is? A process that produces from images of the external world a description
Face detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.
COLOR-BASED PRINTED CIRCUIT BOARD SOLDER SEGMENTATION
COLOR-BASED PRINTED CIRCUIT BOARD SOLDER SEGMENTATION Tz-Sheng Peng ( 彭 志 昇 ), Chiou-Shann Fuh ( 傅 楸 善 ) Dept. of Computer Science and Information Engineering, National Taiwan University E-mail: [email protected]
Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
Visualization methods for patent data
Visualization methods for patent data Treparel 2013 Dr. Anton Heijs (CTO & Founder) Delft, The Netherlands Introduction Treparel can provide advanced visualizations for patent data. This document describes
Medical Image Segmentation of PACS System Image Post-processing *
Medical Image Segmentation of PACS System Image Post-processing * Lv Jie, Xiong Chun-rong, and Xie Miao Department of Professional Technical Institute, Yulin Normal University, Yulin Guangxi 537000, China
Multiscale Object-Based Classification of Satellite Images Merging Multispectral Information with Panchromatic Textural Features
Remote Sensing and Geoinformation Lena Halounová, Editor not only for Scientific Cooperation EARSeL, 2011 Multiscale Object-Based Classification of Satellite Images Merging Multispectral Information with
ScienceDirect. Brain Image Classification using Learning Machine Approach and Brain Structure Analysis
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 50 (2015 ) 388 394 2nd International Symposium on Big Data and Cloud Computing (ISBCC 15) Brain Image Classification using
AUTOMATIC ATIC PCB DEFECT DETECTION USING IMAGE SUBTRACTION METHOD
AUTOMATIC ATIC PCB DEFECT DETECTION USING IMAGE SUBTRACTION METHOD 1 Sonal Kaushik, 2 Javed Ashraf 1 Research Scholar, 2 M.Tech Assistant Professor Deptt. of Electronics & Communication Engineering, Al-Falah
Simultaneous Gamma Correction and Registration in the Frequency Domain
Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong [email protected] William Bishop [email protected] Department of Electrical and Computer Engineering University
Binary Image Scanning Algorithm for Cane Segmentation
Binary Image Scanning Algorithm for Cane Segmentation Ricardo D. C. Marin Department of Computer Science University Of Canterbury Canterbury, Christchurch [email protected] Tom
Arithmetic Coding: Introduction
Data Compression Arithmetic coding Arithmetic Coding: Introduction Allows using fractional parts of bits!! Used in PPM, JPEG/MPEG (as option), Bzip More time costly than Huffman, but integer implementation
Detection and Restoration of Vertical Non-linear Scratches in Digitized Film Sequences
Detection and Restoration of Vertical Non-linear Scratches in Digitized Film Sequences Byoung-moon You 1, Kyung-tack Jung 2, Sang-kook Kim 2, and Doo-sung Hwang 3 1 L&Y Vision Technologies, Inc., Daejeon,
Signature Region of Interest using Auto cropping
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,
2.2 Creaseness operator
2.2. Creaseness operator 31 2.2 Creaseness operator Antonio López, a member of our group, has studied for his PhD dissertation the differential operators described in this section [72]. He has compared
Towards a Reliable Statistical Oracle and its Applications
Towards a Reliable Statistical Oracle and its Applications Johannes Mayer Abteilung Angewandte Informationsverarbeitung Universität Ulm [email protected] Abstract It is shown how based on the
COMPUTER VISION SYSTEM FOR PRINTED CIRCUIT BOARD INSPECTION
ABCM Symposium Series in Mechatronics - Vol. 3 - pp.623-632 Copyright c 2008 by ABCM COMPUTER VISION SYSTEM FOR PRINTED CIRCUIT BOARD INSPECTION Fabiana R. Leta Universidade Federal Fluminense Programa
Mathematics Course 111: Algebra I Part IV: Vector Spaces
Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are
Using quantum computing to realize the Fourier Transform in computer vision applications
Using quantum computing to realize the Fourier Transorm in computer vision applications Renato O. Violin and José H. Saito Computing Department Federal University o São Carlos {renato_violin, saito }@dc.uscar.br
Morphological segmentation of histology cell images
Morphological segmentation of histology cell images A.Nedzved, S.Ablameyko, I.Pitas Institute of Engineering Cybernetics of the National Academy of Sciences Surganova, 6, 00 Minsk, Belarus E-mail [email protected]
A New Two-Scan Algorithm for Labeling Connected Components in Binary Images
, July 4-6, 2012, London, U.K. A New Two-Scan Algorithm for Labeling Connected Components in Binary Images Lifeng He, Yuyan Chao, Kenji Suzuki Abstract This paper proposes a new two-scan algorithm for
A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation
A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation S.VENKATA RAMANA ¹, S. NARAYANA REDDY ² M.Tech student, Department of ECE, SVU college of Engineering, Tirupati, 517502,
High Performance GPU-based Preprocessing for Time-of-Flight Imaging in Medical Applications
High Performance GPU-based Preprocessing for Time-of-Flight Imaging in Medical Applications Jakob Wasza 1, Sebastian Bauer 1, Joachim Hornegger 1,2 1 Pattern Recognition Lab, Friedrich-Alexander University
Wavelet based Marker-Controlled Watershed Segmentation Technique for High Resolution Satellite Images
Wavelet based Marker-Controlled Watershed Segmentation Technique for High Resolution Satellite Images Imdad Rizvi Satellite Image Processing Research Laboratory CSRE, Indian Institute of Technology Bombay
THE KHOROS SOFTWARE DEVELOPMENT ENVIRONMENT FOR IMAGE AND SIGNAL PROCESSING. Konstantinos Konstantinides and John R.
THE KHOROS SOFTWARE DEVELOPMENT ENVIRONMENT FOR IMAGE AND SIGNAL PROCESSING Konstantinos Konstantinides and John R. Rasure ABSTRACT Data flow visual language systems allow users to graphically create a
Big Data: Rethinking Text Visualization
Big Data: Rethinking Text Visualization Dr. Anton Heijs [email protected] Treparel April 8, 2013 Abstract In this white paper we discuss text visualization approaches and how these are important
A RAPID METHOD FOR WATER TARGET EXTRACTION IN SAR IMAGE
A RAPI METHO FOR WATER TARGET EXTRACTION IN SAR IMAGE WANG ong a, QIN Ping a ept. o Surveying and Geo-inormatic Tongji University, Shanghai 200092, China. - [email protected] ept. o Inormation, East
Combining an Alternating Sequential Filter (ASF) and Curvelet for Denoising Coronal MRI Images
Contemporary Engineering Sciences, Vol. 5, 2012, no. 2, 85-90 Combining an Alternating Sequential Filter (ASF) and Curvelet for Denoising Coronal MRI Images Mohamed Ali HAMDI Ecole Nationale d Ingénieur
Digital image processing
746A27 Remote Sensing and GIS Lecture 4 Digital image processing Chandan Roy Guest Lecturer Department of Computer and Information Science Linköping University Digital Image Processing Most of the common
521466S Machine Vision Assignment #7 Hough transform
521466S Machine Vision Assignment #7 Hough transform Spring 2014 In this assignment we use the hough transform to extract lines from images. We use the standard (r, θ) parametrization of lines, lter the
A Method of Caption Detection in News Video
3rd International Conference on Multimedia Technology(ICMT 3) A Method of Caption Detection in News Video He HUANG, Ping SHI Abstract. News video is one of the most important media for people to get information.
A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number
A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number 1 Tomohiro KAMIMURA, 2 Akinori KANASUGI 1 Department of Electronics, Tokyo Denki University, [email protected]
1. Prove that the empty set is a subset of every set.
1. Prove that the empty set is a subset of every set. Basic Topology Written by Men-Gen Tsai email: [email protected] Proof: For any element x of the empty set, x is also an element of every set since
Vision based Vehicle Tracking using a high angle camera
Vision based Vehicle Tracking using a high angle camera Raúl Ignacio Ramos García Dule Shu [email protected] [email protected] Abstract A vehicle tracking and grouping algorithm is presented in this work
HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika
1 Example of Time Series Analysis by SSA 1
1 Example of Time Series Analysis by SSA 1 Let us illustrate the 'Caterpillar'-SSA technique [1] by the example of time series analysis. Consider the time series FORT (monthly volumes of fortied wine sales
Thresholding technique with adaptive window selection for uneven lighting image
Pattern Recognition Letters 26 (2005) 801 808 wwwelseviercom/locate/patrec Thresholding technique with adaptive window selection for uneven lighting image Qingming Huang a, *, Wen Gao a, Wenjian Cai b
3D Scanner using Line Laser. 1. Introduction. 2. Theory
. Introduction 3D Scanner using Line Laser Di Lu Electrical, Computer, and Systems Engineering Rensselaer Polytechnic Institute The goal of 3D reconstruction is to recover the 3D properties of a geometric
Super-resolution method based on edge feature for high resolution imaging
Science Journal of Circuits, Systems and Signal Processing 2014; 3(6-1): 24-29 Published online December 26, 2014 (http://www.sciencepublishinggroup.com/j/cssp) doi: 10.11648/j.cssp.s.2014030601.14 ISSN:
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING Ms.PALLAVI CHOUDEKAR Ajay Kumar Garg Engineering College, Department of electrical and electronics Ms.SAYANTI BANERJEE Ajay Kumar Garg Engineering
2. MATERIALS AND METHODS
Difficulties of T1 brain MRI segmentation techniques M S. Atkins *a, K. Siu a, B. Law a, J. Orchard a, W. Rosenbaum a a School of Computing Science, Simon Fraser University ABSTRACT This paper looks at
Tracking Groups of Pedestrians in Video Sequences
Tracking Groups of Pedestrians in Video Sequences Jorge S. Marques Pedro M. Jorge Arnaldo J. Abrantes J. M. Lemos IST / ISR ISEL / IST ISEL INESC-ID / IST Lisbon, Portugal Lisbon, Portugal Lisbon, Portugal
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
Euler Vector: A Combinatorial Signature for Gray-Tone Images
Euler Vector: A Combinatorial Signature for Gray-Tone Images Arijit Bishnu, Bhargab B. Bhattacharya y, Malay K. Kundu, C. A. Murthy fbishnu t, bhargab, malay, [email protected] Indian Statistical Institute,
Automatic 3D Reconstruction via Object Detection and 3D Transformable Model Matching CS 269 Class Project Report
Automatic 3D Reconstruction via Object Detection and 3D Transformable Model Matching CS 69 Class Project Report Junhua Mao and Lunbo Xu University of California, Los Angeles [email protected] and lunbo
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING 1 0196-2892/$26.00 2010 IEEE
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING 1 Morphological Attribute Profiles for the Analysis of Very High Resolution Images Mauro Dalla Mura, Student Member, IEEE, Jón Atli Benediktsson, Fellow,
Integrating Benders decomposition within Constraint Programming
Integrating Benders decomposition within Constraint Programming Hadrien Cambazard, Narendra Jussien email: {hcambaza,jussien}@emn.fr École des Mines de Nantes, LINA CNRS FRE 2729 4 rue Alfred Kastler BP
PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM
PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM Rohan Ashok Mandhare 1, Pragati Upadhyay 2,Sudha Gupta 3 ME Student, K.J.SOMIYA College of Engineering, Vidyavihar, Mumbai, Maharashtra,
Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition
Send Orders for Reprints to [email protected] The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary
A Simple Feature Extraction Technique of a Pattern By Hopfield Network
A Simple Feature Extraction Technique of a Pattern By Hopfield Network A.Nag!, S. Biswas *, D. Sarkar *, P.P. Sarkar *, B. Gupta **! Academy of Technology, Hoogly - 722 *USIC, University of Kalyani, Kalyani
High Quality Image Magnification using Cross-Scale Self-Similarity
High Quality Image Magnification using Cross-Scale Self-Similarity André Gooßen 1, Arne Ehlers 1, Thomas Pralow 2, Rolf-Rainer Grigat 1 1 Vision Systems, Hamburg University of Technology, D-21079 Hamburg
Visual Structure Analysis of Flow Charts in Patent Images
Visual Structure Analysis of Flow Charts in Patent Images Roland Mörzinger, René Schuster, András Horti, and Georg Thallinger JOANNEUM RESEARCH Forschungsgesellschaft mbh DIGITAL - Institute for Information
Image Processing Based Automatic Visual Inspection System for PCBs
IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 Volume 2, Issue 6 (June 2012), PP 1451-1455 www.iosrjen.org Image Processing Based Automatic Visual Inspection System for PCBs Sanveer Singh 1, Manu
How To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
Set operations and Venn Diagrams. COPYRIGHT 2006 by LAVON B. PAGE
Set operations and Venn Diagrams Set operations and Venn diagrams! = { x x " and x " } This is the intersection of and. # = { x x " or x " } This is the union of and. n element of! belongs to both and,
ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
Content. Chapter 4 Functions 61 4.1 Basic concepts on real functions 62. Credits 11
Content Credits 11 Chapter 1 Arithmetic Refresher 13 1.1 Algebra 14 Real Numbers 14 Real Polynomials 19 1.2 Equations in one variable 21 Linear Equations 21 Quadratic Equations 22 1.3 Exercises 28 Chapter
Tracking and Recognition in Sports Videos
Tracking and Recognition in Sports Videos Mustafa Teke a, Masoud Sattari b a Graduate School of Informatics, Middle East Technical University, Ankara, Turkey [email protected] b Department of Computer
Building an Advanced Invariant Real-Time Human Tracking System
UDC 004.41 Building an Advanced Invariant Real-Time Human Tracking System Fayez Idris 1, Mazen Abu_Zaher 2, Rashad J. Rasras 3, and Ibrahiem M. M. El Emary 4 1 School of Informatics and Computing, German-Jordanian
A Learning Based Method for Super-Resolution of Low Resolution Images
A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 [email protected] Abstract The main objective of this project is the study of a learning based method
ADVANTAGES AND DISADVANTAGES OF THE HOUGH TRANSFORMATION IN THE FRAME OF AUTOMATED BUILDING EXTRACTION
ADVANTAGES AND DISADVANTAGES OF THE HOUGH TRANSFORMATION IN THE FRAME OF AUTOMATED BUILDING EXTRACTION G. Vozikis a,*, J.Jansa b a GEOMET Ltd., Faneromenis 4 & Agamemnonos 11, GR - 15561 Holargos, GREECE
WATER BODY EXTRACTION FROM MULTI SPECTRAL IMAGE BY SPECTRAL PATTERN ANALYSIS
WATER BODY EXTRACTION FROM MULTI SPECTRAL IMAGE BY SPECTRAL PATTERN ANALYSIS Nguyen Dinh Duong Department of Environmental Information Study and Analysis, Institute of Geography, 18 Hoang Quoc Viet Rd.,
Subspace Analysis and Optimization for AAM Based Face Alignment
Subspace Analysis and Optimization for AAM Based Face Alignment Ming Zhao Chun Chen College of Computer Science Zhejiang University Hangzhou, 310027, P.R.China [email protected] Stan Z. Li Microsoft
An adaptive technique for shadow segmentation in high-resolution omnidirectional images
An adaptive technique for shadow segmentation in high-resolution omnidirectional images Vander Luis de Souza Freitas Univ Estadual Paulista - UNESP Undergraduate Student Scholarship PIBIC/CNPq Presidente
Automatic Extraction of Signatures from Bank Cheques and other Documents
Automatic Extraction of Signatures from Bank Cheques and other Documents Vamsi Krishna Madasu *, Mohd. Hafizuddin Mohd. Yusof, M. Hanmandlu ß, Kurt Kubik * *Intelligent Real-Time Imaging and Sensing group,
Poker Vision: Playing Cards and Chips Identification based on Image Processing
Poker Vision: Playing Cards and Chips Identification based on Image Processing Paulo Martins 1, Luís Paulo Reis 2, and Luís Teófilo 2 1 DEEC Electrical Engineering Department 2 LIACC Artificial Intelligence
Techniques of the simplex basis LU factorization update
Techniques of the simplex basis L factorization update Daniela Renata Cantane Electric Engineering and Computation School (FEEC), State niversity of Campinas (NICAMP), São Paulo, Brazil Aurelio Ribeiro
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith
Mathematics Curriculum Guide Precalculus 2015-16. Page 1 of 12
Mathematics Curriculum Guide Precalculus 2015-16 Page 1 of 12 Paramount Unified School District High School Math Curriculum Guides 2015 16 In 2015 16, PUSD will continue to implement the Standards by providing
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia [email protected]
