This paper presents optimized connection searching method based on region filling algorithms. The proposed method is optimized using the heuristic and is intended for maze-solving. In specific cases, the proposed algo...
详细信息
ISBN:
(纸本)9781538618011
This paper presents optimized connection searching method based on region filling algorithms. The proposed method is optimized using the heuristic and is intended for maze-solving. In specific cases, the proposed algorithm performs better than variants which do not use heuristic and it depends on the maze structure and position of the starting and ending pixel.
In present scenario whole world is moving towards digital communication for fast and better communication. But in this a problem arises with security i.e. when we have to transmit information (either data or image) ov...
详细信息
ISBN:
(纸本)9781509047611;9781509047604
In present scenario whole world is moving towards digital communication for fast and better communication. But in this a problem arises with security i.e. when we have to transmit information (either data or image) over internet or to store information at any random location then its security is very important. To protect our information from hackers we use a technique i.e. Encryption. In this paper we use image as information and use different types of encryption techniques to encrypt it and protect it from hackers. After that we find various parameters from each image encryption technique and then compare each technique's parameters from one another. After that we search for the best result and then proceed forward with that technique for future scope.
Infrared signal processingalgorithms and architectures are important for the development of a high performance infrared imaging systems. Infrared signal processing deals with two types of processing sensor signal pro...
详细信息
ISBN:
(纸本)9781538632444
Infrared signal processingalgorithms and architectures are important for the development of a high performance infrared imaging systems. Infrared signal processing deals with two types of processing sensor signal processing and infrared imageprocessing for contrast enhancement and target detection. The sensor signal processing primarily deals with non uniformity correction for infrared sensors. Assessing the quality of the Infrared video frame is a complex and firm process since human's opinion is affected by physical and psychological parameters. Infrared Video frame quality assessment plays an important role in the field of video processing. Structural Similarity Index has become a standard among image quality metrics. It is a framework for quality assessment based on the degradation of structural information of video frame. In this paper SSIM values are computed and compared for Infrared video frames by applying different edge detection approaches by using different color models to assess the quality of the frames. Experimental results comparisons demonstrate the effectiveness of the proposed method.
The study of substances with a crystal structure is a complex multi-step process. The key step in the crystalline substance analysis is the unit cell parameter estimation. The estimation of the crystal lattice unit ce...
The study of substances with a crystal structure is a complex multi-step process. The key step in the crystalline substance analysis is the unit cell parameter estimation. The estimation of the crystal lattice unit cell parameters is a particular problem that involves the search of the crystal lattice model's parameters according to the information which can be extracted from the substance. In these recent times, the most accurate information about the substance structure can be obtained with the electron microscope whose linear resolution is high enough to observe the atomic structure of a substance. The problem of parameter estimation in this case means the reconstruction of the three-dimensional crystal lattice with 2-dimentional images received by an electron microscope, and the estimation of the crystal lattice unit cell parameters by reconstructed lattice. In the previous papers the crystal lattice parametric identification algorithms based on solving the local optimization problem were presented. However, the analysis of a large crystal lattice database requires a lot of computations. In this paper, a high-performance crystal lattices parametric identification algorithm using the CUDA technology is proposed. The investigation of the algorithm effectiveness is carried out on the GPU GeForce NVidia GTX 1070 Ti. With data dimension more than 32 translations the acceleration is higher than 70. The algorithm runs more efficiently at the use of a large number of CUDA-blocks.
By a car license plate recognition, we mean a software system processingimages and providing an alphanumeric transcription of car plates included in an image. We divide the task into four sub-tasks: license plate loc...
详细信息
ISBN:
(纸本)9781509049189
By a car license plate recognition, we mean a software system processingimages and providing an alphanumeric transcription of car plates included in an image. We divide the task into four sub-tasks: license plate localization, license plate extraction, characters segmentation and characters recognition. All four sub-tasks are discussed in the context of standard approaches and own solution based on a chain of standard and soft computing imageprocessingalgorithms is presented. In this chain, the F-transform approximate pattern matching algorithm plays the crucial role. For the solution, we presented recognition ability for a dataset which includes 500 images with difficult conditions.
One of the key technologies of the large-size electronic whiteboard is pen locating, but most existing technologies have their weaknesses. In this paper, a pen locating algorithm and its prototype are proposed. Using ...
详细信息
One of the key technologies of the large-size electronic whiteboard is pen locating, but most existing technologies have their weaknesses. In this paper, a pen locating algorithm and its prototype are proposed. Using Spatial-based watermark embedding method, the pen-locating algorithm generates watermarked blocks by embedding watermark information into the background image on the screen. The pen detects the watermarked blocks on the screen and when the watermarked blocks are detected, the pen can be located through the analysis of the image block location and the distance between the pen and the image block. The algorithm is tested by simulation and the locating error of the prototype system is 1.7 pixels approximately.
In this article, it is developed some area of issues related to data compression algorithms in the field of imageprocessing. imageprocessing area is very commonly used today with multiple applications in different f...
详细信息
ISBN:
(纸本)9781450347891
In this article, it is developed some area of issues related to data compression algorithms in the field of imageprocessing. imageprocessing area is very commonly used today with multiple applications in different fields, but also, the image compression methods or algorithms for imaging are used every day by the computer users. This paper will highlight the result of reports over the investigations or comparisons on image compression methods and will provide conclusions and ideas for further research in this area, with intense uses. Today there are a lot of different data compression methodologies, which are used to compress different data formats like, video, audio, image files. This article represents a comparison of several compression methods based on previous research and the analysis in the context of their current needs. In conclusion, this topic combines imageprocessingsystems, the advantage of using parallel programming, the benefits and results of the image compression and also the importance of some fundamental algorithms in this area.
Security is an important issue during communication and data transmission. There are many ways to provide security. One method to ensure security is the use of cryptographic algorithms such as DES, AES, RC5, Blowfish ...
详细信息
ISBN:
(纸本)9781509047611;9781509047604
Security is an important issue during communication and data transmission. There are many ways to provide security. One method to ensure security is the use of cryptographic algorithms such as DES, AES, RC5, Blowfish etc. Cryptography is a method used for encoding the data which may be hacked by the unauthorized person. In this paper FPGA based design and implementation of Blowfish algorithm has been proposed. For RTL coding VHDL has been used and Virtex-5XC5VLX50T FPGA device used as a reconfigurable platform for implementation of Blowfish algorithm. The aim of this system is to evaluate performance of Blowfish algorithm on reconfigurable platform in terms of power consumption and throughput. For testing purpose image data and ECG data has been used as plaintext.
Summary form only given. Digital imageprocessing refers to the set of algorithms used to transform, filter, enhance, modify, analyze, distort, fuse, etc., digital images. Most of these algorithms are designed to mimi...
详细信息
ISBN:
(纸本)9781509042548
Summary form only given. Digital imageprocessing refers to the set of algorithms used to transform, filter, enhance, modify, analyze, distort, fuse, etc., digital images. Most of these algorithms are designed to mimic an underlying physical operation defined in the continuous illumination domain and formerly achieved via optical or electronic filters or through manipulations, including painting, cutting, moving or pasting of image patches. It also allows more sophisticated transformations (associated to more or less complex algorithms) which would be impossible to process by analog means. It may be quite hard to completely transpose an operation from the continuous to the discrete domain. Such a transposition usually relies on methods that ensure a kind of interplay between continuous and discrete domains. The interplay between the continuous and the discrete domain usually involves a convolution with a point spread function, when the measurement model is supposed to be linear, while the interplay between the discrete and the continuous domain is ensured by interpolation or more generally approximation methods, which also involve a convolution with a reconstruction kernel. Performing a precise identification of the point spread function of an imager is usually pretty challenging. Moreover, modeling the imaging process by a point spread function could be considered as an approximation of a more complex (and not shift-invariant) phenomenon (e.g. radial distortion or chromatic aberrations).
The proceedings contain 25 papers. The special focus in this conference is on Soft Computing. The topics include: A multilevel genetic algorithm for the maximum constraint satisfaction problem;models and simulations o...
ISBN:
(纸本)9783319580876
The proceedings contain 25 papers. The special focus in this conference is on Soft Computing. The topics include: A multilevel genetic algorithm for the maximum constraint satisfaction problem;models and simulations of queueing systems;influence of random number generators on GPA-ES algorithm efficiency;genetic algorithm based random selection-rule creation for ontology building;improving artificial fish swarm algorithm by applying group escape behavior of fish;genetic programming algorithm creating and assembling subtrees for making analytical functions;comparison of parallel linear genetic programming implementations;geometric particle swarm optimization and reservoir computing for solar power forecasting;walkSAT based-learning automata for MAX-SAT;a self-adaptive artificial bee colony algorithm with incremental population size for large scale optimization;lie algebra-valued bidirectional associative memories;guaranteed training set for associative networks;Markov chain for author writing style profile construction;maximum traveling salesman problem by adapted neural gas;conjugate gradient algorithms for quaternion-valued neural networks;evaluating suitable job applicants using expert system;a computationally efficient approach for mining similar temporal patterns;estimating prevalence bounds of temporal association patterns to discover temporally similar patterns;an approach for imputation of medical records using novel similarity measure;implementation of particle filters for mobile robot localization;direct point cloud visualization using T-spline with edge detection and development of methods of the fractal dimension estimation for the ecological data analysis.
暂无评论