Holography is pivotal in various applications ranging from microscopy to data storage. However, the practical implementation of holography often necessitates compression, which inevitably degrades the quality of the r...
详细信息
Due to their adaptive nature, empirical wavelets (EWs) had several successes in many fields from engineering, science, medical signal/imageprocessing. Recently, a general theoretical framework has been developed in t...
详细信息
Due to their adaptive nature, empirical wavelets (EWs) had several successes in many fields from engineering, science, medical signal/imageprocessing. Recently, a general theoretical framework has been developed in the one-dimensional case, showing the possibility to build EWs from any classic mother wavelets. Given extensive literature both in theory and applications of classic wavelet frames, it is legitimate to ask about the feasibility of building EW frames. We address this question in this paper. We prove several results which provide conditions on the existence of EW frames taking into account the above-mentioned adaptability.
In order to obtain the low resolution(LR) image's detailed information, super resolution(SR) image reconstruction is essential. From 1D projections, we can reconstruct images in 2D and 3D. The LR images attained h...
详细信息
Edge is the important feature in images, which has important applications in imageprocessing, image analysis and image understanding. Accordingly, Edge detection is the basic problem in imageprocessing and computer ...
详细信息
Aurora spectral image lossless compression has seen significant advancements in recent years. However, most compression algorithms are based on traditional image compression techniques, focusing solely on spectral and...
详细信息
This research paper discusses about, The Camouflaged human or object Detection using different variations of YOLOV5. Our project deep dives into the analysis of YOLO(You Only Look Once) algorithm and it's differen...
详细信息
ISBN:
(纸本)9798350350661;9798350350654
This research paper discusses about, The Camouflaged human or object Detection using different variations of YOLOV5. Our project deep dives into the analysis of YOLO(You Only Look Once) algorithm and it's different types for performance analysis. The proposed model, trained on the dataset with different regions and angles of images, utilizes YOLOv5 for efficient camouflaged human detection, with manual annotation of images used for training the dataset and calculated different outputs for performance analysis. There can be lot of applications of the Camouflaged object detection project. Even if it is Biodiversity conservation in Nature like detecting the animals or plants which gets camouflaged in the nature and are difficult to detect or detecting enemy military invasion. This algorithm can be combined with one or more other imageprocessing algorithms also for better accuracy and easy implementation purpose. This research work is carried out on different variants of YOLOv5 algorithm. We have used the different variants like Yolov5l, Yolov5m, Yolov5n, Yolov5x enhancing accuracy and robustness. The performance analysis is carried out in terms of P curve (Precision), R curve(recall), PR curve(precision and recall) and F1 curve of each training set and also the confusion matrix for all the algorithms is calculated and it is observed that Yolov5l works better as compared to other YOLO variants.
image matching is an important step in the process of power inspection image stitching and 3D reconstruction, which directly affects the effect of power line image stitching and 3D reconstruction, and is widely used i...
详细信息
Compared to traditional image compression methods, learned image compression (LIC) methods have demonstrated increasingly superior rate-distortion performance. However, LIC networks are often regarded as black boxes, ...
详细信息
ISBN:
(纸本)9798350390155;9798350390162
Compared to traditional image compression methods, learned image compression (LIC) methods have demonstrated increasingly superior rate-distortion performance. However, LIC networks are often regarded as black boxes, still lacking a theoretical understanding. Sparse coding provides the sparse and interpretable modeling for analyzing or synthesizing natural images in various signal and imageprocessingapplications. Therefore, we introduce convolutional sparse coding (CSC) into transform network for enhancing the interpretability of LIC methods. In this paper, we first employ CSC layers to achieve certain theoretical modeling for LIC network, and adopt a weight sharing strategy in encoderdecoder pair and attention mechanism to balance the complexity and performance. Additionally, we analyze the model robustness against data input perturbations and consider the impact of sparsity trade-off parameter in the CSC layer optimization process. Experimental results demonstrate that our method achieves comparable performance with the corresponding baseline, and our model is more robust.
image segmentation is an important and difficult task in many medical applications. The segmentation results can be used to help doctors diagnose diseases, observe the lesion areas, and make surgical plans. Traditiona...
详细信息
Quality assessment of digital images plays an important role in modeling, implementation and optimization of image and video processingapplications. One of the most popular methods in image quality assessment (IQA) i...
详细信息
ISBN:
(数字)9781510662117
ISBN:
(纸本)9781510662100;9781510662117
Quality assessment of digital images plays an important role in modeling, implementation and optimization of image and video processingapplications. One of the most popular methods in image quality assessment (IQA) is feature based IQA techniques. These feature based image quality assessment (IQA) techniques, which consist of feature extraction and feature pooling phases, extracts features from the images in order to generate objective scores. Various hand-crafted features have been used in the feature extraction phase of the feature based IQA methods. In this work, instead of implementing a hand-crafted feature extraction scheme, automatic feature extraction is utilized by using a pre-trained deep neural network (DNN) inference structure. Feature pooling, which provides mapping between the proposed features and the subjective scores, is carried out by utilizing a fully-connected layer at the end of the network architecture. Experimental results show that the proposed technique obtains promising results for the IQA problem by making use of the generalization capability of deep learning architectures.
暂无评论