Usually, image zooming is an interpolation of the original image, achieving high quality zooming image as fast as possible. But it is well known that many traditional interpolation methods such as bilinear or bicubic ...
详细信息
Usually, image zooming is an interpolation of the original image, achieving high quality zooming image as fast as possible. But it is well known that many traditional interpolation methods such as bilinear or bicubic often suffer from blurring edges or introduce zigzag errors. In this paper, a new adaptive image interpolation method based on edge, introducing rectangular interpolation and quincunx interpolation, putting forward the gradient weight function, motivated by the work of Nira Shezaf et al., is presented. The experimental results show that the new method can improve the quality of zoomed image effectively. At last, an evaluation is presented assess the quality of zoomed image.
The technique of image interpolation is usually required in image zooming. In this paper we make some changes to Hausdorff distance based on the theory of Hausdorff measurement. Then we use the changed Hausdorff dista...
详细信息
The technique of image interpolation is usually required in image zooming. In this paper we make some changes to Hausdorff distance based on the theory of Hausdorff measurement. Then we use the changed Hausdorff distance to evaluate the interpolation algorithms. And also we comp.re it with other evaluation methods and we can find that Hausdorff distance has better results and more identical to the vision impress.
The minimal surfaces are extensively employed in many areas such as architecture, aviation, ship manufacture, and so on. However, the comp.exity of the minimal surface equation prevents people from modeling the minima...
详细信息
The minimal surfaces are extensively employed in many areas such as architecture, aviation, ship manufacture, and so on. However, the comp.exity of the minimal surface equation prevents people from modeling the minimal surface in CAD/CAGD. Based on the nonlinear programming and the FEM (finite element method), the approximation to the solution of the minimal surface equation bounded by Bezier or B-spline curves is investigated. A global method, which is called numerical extension method, is appealed to in the whole iterative process and linearize the nonlinear finite element system by using a simple iteration. Some numerical results are given.
A discrete algorithm for grayscale image resizing through binary image zooming in 3D space is presented. The method can help to keep the edges and borders in the zoomed images as clear and natural as possible, with ar...
详细信息
A discrete algorithm for grayscale image resizing through binary image zooming in 3D space is presented. The method can help to keep the edges and borders in the zoomed images as clear and natural as possible, with arbitrary real positive scaling factors. When an image is enlarged, it can be still with vivid color, and express the appearance of original image faithfully. When the size of an image is reduced, the most important features of the image can also be preserved. Experiments show that the new method is effective, stable and convenient for image zooming, and it is also more advantageous in border and edge preserving comp.red to many common commercial software. We have applied the algorithm in our medical image processing system.
comp.icated information systems under network environment commonly faced with problems of end-users rights identification, right properties definition, dynamic rights configuration, and active protection under an open...
详细信息
comp.icated information systems under network environment commonly faced with problems of end-users rights identification, right properties definition, dynamic rights configuration, and active protection under an open or semi-open environment, whereas traditional users' static rights configuration management and direct authorization couldn't solve these problems. The user control strategies based on authorization objects were proposed, which consisted of three stages: identification authentication, access control and operation monitor. In identification authentication stage, the user's identification authorization under an open and semi-open environment was solved. In access control stage, authorization object was introduced to resolve rights properties definition, dynamic rights assignment, and rights identification of end-users. And the operation monitor stage was mainly focused on active protection.
暂无评论