Image noise is undesirable that can negatively affect the quality of digital images. It reduces the image quality and increases the processing failure ratio. It is highly recommended to remove the noise, and before re...
详细信息
ISBN:
(纸本)9789819995615
Image noise is undesirable that can negatively affect the quality of digital images. It reduces the image quality and increases the processing failure ratio. It is highly recommended to remove the noise, and before removing the noise, we have to know the type of noise and estimate the parameters of noise for developing effective noise reduction techniques. This study introduces a method to effectively detect, recognize, and estimate image noise of various types (Gaussian, lognormal, Rayleigh, salt and pepper, and speckle). The proposed model consists of four stages: the first stage is detecting the noise in an image using a convolutional neural network. The second stage classifies the noisy images into one of five types of noise using a new method based on a combination of deep wavelets and support vector machines (SVM) classifier. The third stage involves estimating the parameters of the noise using maximum likelihood estimation (MLE). Finally, choosing the most suitable noise reduction technique for each type using linear and nonlinear filters and showing the capability of the suggested technique in estimating multiple noises commonly present in digital images. The proposed method utilizes a likelihood function derived from the MLE model for each noise type to estimate the noise parameters. Then used to select the most suitable noise reduction technique for each type. The quality of the denoised images is calculated utilizing the peak signal-to-noise ratio (PSNR) as the evaluation metric. The results show that the combination of wavelets with machine learning, specifically SVM, can highly enhance the results, where the accuracy was 93.043% through many experiments conducted to build a sturdy classification model. The MLE-based noise estimation method is also a reliable and accurate method for image noise estimation, especially for Gaussian, salt and pepper, lognormal, and Rayleigh noise. However, for highly noisy types such as speckle noise, further research is re
When working in a proof assistant, automation is key to discharging routine proof goals such as equations between algebraic expressions. Homotopy Type Theory allows the user to reason about higher structures, such as ...
详细信息
System reliability and cost are crucial components in designing many types of equipment. Proper design is required to achieve a balance between design expenses and the highest possible performance. Multiple conflictin...
详细信息
In this paper, we introduce a new class of polynomials, called probabilistic q-Bernstein polynomials, alongside their generating function. Assuming (Formula presented.) is a random variable satisfying moment condition...
详细信息
In this paper, we consider a degree sum condition sufficient to imply the existence of k vertex-disjoint chorded cycles in a graph G. Let σ4(G) be the minimum degree sum of four independent vertices of G. We prove th...
详细信息
Hydroponic cultivation offers a promising solution to address environmental and food-related challenges by minimizing the use of fertilizers and water. Our research presents a greenhouse-based design for monitoring hy...
详细信息
The selection of printing strategies in the LPBF process is pivotal, as it significantly impacts residual stress, which in turn affects the mechanical properties and density of the material. Recognizing the importance...
详细信息
Graph theory plays a significant role in the applications of chemistry,pharmacy,communication,maps,and aeronautical *** molecules of chemical compounds are modelled as a graph to study the properties of the *** geomet...
详细信息
Graph theory plays a significant role in the applications of chemistry,pharmacy,communication,maps,and aeronautical *** molecules of chemical compounds are modelled as a graph to study the properties of the *** geometric structure of the compound relates to a few physical properties such as boiling point,enthalpy,π-electron energy,andmolecular *** article aims to determine the practical application of graph theory by solving one of the interdisciplinary problems describing the structures of benzenoid hydrocarbons and *** topological index is an invariant of a molecular graph associated with the chemical structure,which shows the correlation of chemical structures using many physical,chemical properties and biological *** study aims to introduce some novel degree-based entropy descriptors such as ENTSO,ENTGH,ENTHG,ENTSS,ENTNSO,ENTNReZ1,ENTNReZ2 and ENTNSS using the respective topological ***,the above-mentioned entropy measures and physico-chemical properties of benzenoid hydrocarbons are fitted using linear regression models and calculated for graphenylene structure.
Visibility problems have been investigated for a long time under different assumptions as they pose challenging combinatorial problems and are connected to robot navigation problems. The mutual-visibility problem...
详细信息
Smart home devices are vulnerable to a variety of *** matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart hom...
详细信息
Smart home devices are vulnerable to a variety of *** matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart home).To handle these attacks,most studies have hitherto proposed authentication protocols that cannot necessarily be implemented in devices,especially during Device-to-Device(D2D)*** into the potential of Ethereum blockchain and smart contracts,this work proposes a lightweight authentication mechanism that enables safe D2D interactions in a smart *** Ethereum blockchain enables the implementation of a decentralized prototype as well as a peer-to-peer distributed ledger *** work also uses a single server queuing system model and the authentication mechanism to curtail DDoS attacks by controlling the number of service requests in the *** simulation was conducted twenty times,each with varying number of devices chosen at random(ranging from 1 to 30).Each requester device sends an arbitrary request with a unique resource requirement at a *** is done to measure the system's consistency across a variety of device *** experimental results show that the proposed protocol not only prevents colluding attacks,but also outperforms the benchmark protocols in terms of computational cost,message processing,and response times.
暂无评论