Use of Chain Code Histogram Method to Quantify Airborne Particle Shapes

Size: px
Start display at page:

Download "Use of Chain Code Histogram Method to Quantify Airborne Particle Shapes"

Transcription

1 Aerosol Science and Technology ISSN: (Print) (Online) Journal homepage: Use of Chain Code Histogram Method to Quantify Airborne Particle Shapes Ying Xie, P. K. Hopke, Gary Casuccio & Brad Henderson To cite this article: Ying Xie, P. K. Hopke, Gary Casuccio & Brad Henderson (1994) Use of Chain Code Histogram Method to Quantify Airborne Particle Shapes, Aerosol Science and Technology, 21:3, , DOI: / To link to this article: Published online: 12 Jun Submit your article to this journal Article views: 355 View related articles Citing articles: 3 View citing articles Full Terms & Conditions of access and use can be found at

2 Use of Chain Code Histogram Method to Quantify Airborne Particle Shapes Ying Xie and P. K. Hopke* Chemistry Department, Clarkson University, Potsdam, NY Gary Casuccio and Brad Henderson R. J. Lee Group Inc., 350 Hochberg Road, Monroeuille, PA The chain code histogram method was used to provide a shape index to characterize airborne particles. A total of 136 airborne particles were analyzed using this method. The results showed that the chain code histogram method is an easy and quick way to quantify airborne particle shapes. Furthermore, this technique has the potential to be incorporated into the on-line Computer-Controlled Scanning Electron Microscope (CCSEM) analysis software such that a simple shape index can be determined in automatic fashion along with the particle size, elemental chemistry and image. INTRODUCTION Airborne particles play a very important role in air quality with resulting problems on public health. In order to make effective control strategies, studies of particle composition, sources, and transportation are needed. Receptor models based on single particle classification have proven to have high specificity for source identification and airborne particle mass apportionment (Kim and Hopke 1988a, 1988b). However, these models depend directly on the ability to classify particles into well defined classes. Thus, particle classification is a critical first step in the use of single particle receptor models. Currently, particle classification has been performed based only on the chemical information obtained from the fluoresced x-rays. However, some particles may share very similar chemical composition but come from different sources. For *Author to whom correspondences should be addressed. example, fly ash and clay mineral particles may share very similar chemical compositions. However, they have quite different shapes. Fly ash particles are spherical because they experience high temperatures while clay mineral particles are nonspherical because they are from mechanical processes. In order to develop effective pollution control strategies, it is important to distinguish between these two sources. The fly ash particles are from combustion processes. They clay mineral particles are crustal material from natural sources. Thus, there is a need to combine a shape index with the chemical compositions so that more accurate particle classification can be achieved. In receptor modeling studies based on the characterization of individual particles, most of the particles can be distinguished by their chemical compositions. The most difficult problem is to distinguish fly ash and clay mineral particles. Thus, the problem is to define a shape index that can clearly discriminate spherical particles from nonspherical ones. Aerosol Science and Technology 21: (1994) D 1994 Elsevier Science Inc.

3 Use of Chain Code Histogram Method 211 Chain code generation is the technique used to follow the boundary of an object as well as creating a record of the path followed as the object's outline is defined. In general, a chain code describes the direction to move from the current pixel to the next boundary pixel. As shown in Figure 1, the chain code is a data array that stores the ordered representation of the eight possible directions of the boundary pixels. The eight directions are numbered from 0 to 7. The frequency distribution of the occurrence of the various directions reflect the shape of the object. The normalized histogram is size invariant and the changes in the orientation of the object are equivalent to horizontal cyclic shifts in the histogram (Sadjadi (1992). Sadjadi used the chain code histogram method to perform object recognition. He suggested that the chain code histogram may provide shape information and a chain code histogram library may be created. Then, any unknown object can be recognized by matching its chain code histogram with the ones in the library. As an initial study of the utility of chain code histograms, airborne particle images obtained using Computer-Controlled Scanning Electron Microscope (CCSEM) were first preprocessed such that the binary images were obtained; a binary image means all the foreground picture elements (pixels) equal to a nonzero value and all the background pixels equal to zero. Based on the binary images, the chain code histograms of the particle images were generated. The chain code histogram patterns were then studied to determine if spherical particles could be easily distinguished from the non-spherical particles. IMAGE PREPROCESSING The particle images were taken using CCSEM with a 1 byte/pixel resolution. Thus, they are images with pixel values * Starting Point FIGURE 1. Definition of the chain code and an example of the chain code of an image. ranging from 0 to 255. Figure 2 shows a typical image obtained using CCSEM. The present CCSEM system can find the edge points easily based on the contrast between the particle and the background. The only work that needs to be conducted is to store the edge points as the codes defined for the directions. Then the chain

4 2 Y. Xie et al. 2. A particle image taken by CCSEM. Pixel Value code histogram can be generated. Thus, '.here would not be a preprocessing of the image if this method were incorporated into the on-line system. However, at this exploratory stage, the method needs to be developed in an off-line mode. Thus, there is a need to employ image preprocessing to separate the foreground from the background. Because only the foreground pixels were of interest, the first step was to separate foreground from background. Thresholding can achieve this. Figure 3 shows the histogram of the particle image shown in Figure 2. Thus, a threshold at the pixel value of 70 was selected for this particle. After thresholding, the image shown in Figure 4 was obtained and its histogram is shown in Figure 5. It can be noted that there are some small black holes in the foreground region and also there is some noise in the background region. Thus, there is a nced to remove the noise in the background region and fill the holes in the foreground region. To achieve this, the shrink and swell filters were used. In this study 5, was used as the filter index FIGURE 3. The histogram of the image shown in Figure 2. ters. It is a binary image without noise and holes. In order to show the effect of the filter index value, Figure 7 shows the image with shrink filter index of 5 and the swell filter index of 4. Comparing Figures 6, 7, and the original image shown in Figure 2, it can be noted that Figure 7 has a greatly distorted edge and results in an image that no longer resembles the origi- for all the particles. Figure 6 shows the FIGU 4. The image after thresholding of Figfinal image after the shrink and swell fil- ure 2.

5 Use of Chain Code Histogram Method Pixel Value 5. The histogram of imagc shown in Figure The resulted image after using the shrink filter with index of 5 and swell filter with index of 4. nal particle shape. Thus, care must bc taken in choosing the filter index. GENE CODE Once the binary image is obtained, the chain code of the boundary may bc generated. The algorithm for generating chain GURE 6. The resulted imagc after using the shrink and swell filters with both filter index of 5. code is as follow: Stcp 1: Find a pixel on the boundary of the foreground region; Step2: Store the starting pixel's location; Step3: Examine each neighbor in a counter-clockwise direction until a forcground pixel is found; Step4: Save the chain link according to the definition in Figure 1; Step5: Let the new pixel of the interest be the neighbor found in step 3. If the pixel of interest is not the starting pixel, go to step 3; otherwise stop. The chain code for the forcground boundary can be generated easily following this owever, one problem remains. In step 3, every neighbor is checked in order to find the foreground neighbor and some of them may then be checked more than once from differing pixels resulting in lost computing time. In order to avoid this repetition problem, a closedform expression was derived (shown as Eq. 1) to determine which neighbor should be examined first without looking at pixels that had already been searched.

6 214 Y. Xie et ai. [ (last 1i;k + 6) start link = 2 mod I (1) where start link is the coded direction from current pixel to the one that should be examined, and it is coded from 0 to 7 as defined in Figure 1. Similarly, last link is the coded direction from the previous interesting pixel to the current pixel of interest. The operator "mod7' generates the remainder. After the chain code of the boundary was generated, its histogram can be calculated by counting the frequencies corresponding to every chain code number that is from 0 to 7. The normalized histogram is generated by dividing the frequencies by the total number of the edge pixels. The normalized histogram is image size invariant. Figure 8 shows the normalized chain code histogram of the particle shown in Figure 2. APPLYING THE CHAIN CODE HISTOGRAM METHOD TO DISTINGUISH SPHERICAL PARTICLES FROM NONSPHERICAL PARTICLES The concept of the chain code histogram suggests that a spherical shape should have a uniform chain code histogram with the frequency for each of the chain code values of 1/8. However, when an image is digitized, all eight possible directions do not have the same probability. The vertical and horizontal directions have somewhat higher probabilities than the diagonal directions. This discrepancy can be understood as follows: A quantized description of an edge is obtained by designating as edge points the coordinates of the grid nodes that lie close to the given edge. The edge points are connected in sequence by diagonal, horizontal, or vertical straight-line segments to approximate the edge. This is shown in Figure 9. There are various kinds of quan t I I I I I Chain Code FIGURE 8. The normalized chain code histogram of the image shown in Figure 2. tization schemes to estimate the probability for each direction. However, a diamond shape should be used for an 8-directional digitized image. This is called grid-intersect quantization (Koplowitz 1981; Freeman 1974). The diamond shape is formed by connecting the mid-points of the 4 grid lines that define the 4 adjacent pixels. Suppose the edge being digitized is straight over a small distance, then intersecting the cross in the diamond (Figure FIGURE 9. Grid-intersect quantization of 8-directional digitized image.

7 Use of Chain Code Histogram Method 9) is equivalent to intersecting the diamond at any point. The probability of horizontal direction is equal to: and where P(A) and P(B) are the probabilities for the edge intersecting diamonds A and B, respectively. P( A) = P(B) = perimeter of the diamond, and P(B ua) equals to the perimeter of the whole convex hull formed by the two diamonds. Suppose the unit length of the pixel cell is 1, then and Combining Eqs. 2 and 3, P(B/A) = 1 - n /2 = The probability for both horizontal and vertical directions are 0.293; thus, the probability for the diagonal direction is 1-2"0.293 = Finally, the probability for each horizontal and vertical direction is 0.293/2 = 0.147, and the probability for each diagonal direction is 0.414/4 = From this discussion, it can be concluded that the probability for a diagonal direction is smaller than for a horizontal or vertical direction. It should be noted that the diagonal directions were represented by odd numbers in the chain code while the vertical and horizontal directions werc represented by even numbers. This results in the chain code histogram for a spherical object showing an odd-even effect. The solid line in Figure 11 is the odd-even chain code histogram of the spherical particle shown in Figure 10. After dividing the frequencies by and for odd-number coded directions FIGURE 10. A spherical particle image taken by CCSEM. and even-number coded directions, respectively, the histogram is closer to being a straight line as the dotted line shown in Figure 11. The criteria for spherical particle shape are that first, the normalized chain code histogram should have a zig-zag pattern. Secondly, the minimum frequency among the 8 directions should be greater than a. Original. Modified I Chain Code CURE 11. The chain code histogram for the image shown in Figure 10.

8 Y. Xie et al. LE 1. Frequencies of Chain Codcs for Some Rcgular Shapes Chain Codc Rectangular Hexagon Octagon Nonag on threshold, for example, in this study was used. The zig-zag pattern can be recognized by computing the difference of the slope of two neighbor lines in the histogram. If the absolute value of difference is bigger than both of the two absolute slopes, then these two neighbor lines have the opposite slope. If this condition is true for all the pairs of neighbors, the histogram has a zig-zag pattern. Otherwise, it does not have a zig-zag pattern. Figure 8 shows an example of this case. The minimum frequency restriction is required because not only do spherical shapes have a zag-zig chain code histogram, some regular symmetric shapes may also have the zig-zag pattern. In order to investigate this problem further, several simulated regular shapes were studied. Regular polygons with sides from 3 to 9 were digitized. The frequencies of chain codes for some regular shapes are presented in Table 1. The results showed that among the regular polygons with less than 8 sides, all of those with an even number of sides tend to have a zig-zag chain code histogram. Thus, rectangular and hexagonal shapes also have that pattern as shown in Figure 12. However, from Table 1, it can be noted that the frequencies for some direction codes were very low because they have less than 8 sides. Thus, these symmetric shapes can be separated from spherical shapes by their very low frequencies for at least some of the direction codes. TS AND DISCUSS A total of 136 airborne particles were analyzed following the procedure shown in Figure 13. Among them 16 were spherical particles and the rest were nonspherical particles. Each of them were well described in terms of whether or not it was a spherical particle. The program to perform this analysis was written in C for a SUN SPARCstation 2. ased on the preprocessed images, it took less than 2 min to finish the chain code histogram run for 136 particles. The output provided the shape information as to whether or not each was a spherical particle. Some simulated regular shapes were Hexagon. Rectangular 0.0 I I I I I I I Chain Code 12. Thc chain code histogram for rectangular and regular hexagonal shapes.

9 Use of Chain Code Histogram Method I I I I I I Image Nonagon n Octagon Thresholding ii X k I I I I I I Chain Code Chain Code Histo FIGURE 14. The chain code histogram of octagonal and nonagonal shapes. 0 Spherical? FIGURE 13. The flow chart for the whole procedure. also studied. The results showed that all the regular polygons with more than 7 sides tend to have very similar chain code histograms as that of spherical particles. Figure 14 shows the chain code histogram of both octagonal and nonagonal shapes. The reason for the inability to distinguish spherical shapes from octagonal shapes is that the resolution of this method was limited by the 8 directions. However, there are usually very few airborne particles with regular polygon shapes, and thus, this problem is not a serious one for the airborne particle studies. The possibility that this method can be incorporated into the on-line CCSEM system lies in the fact that when CCSEM system scans a filter, it can find the edge the secondary electrons. Thus, there is no need to do the preprocessing part. When the edge is detected, the relative position of the edge points can be stored. Thus, the chain code histogram can be easily obtained during the on-line scanning. Thcrcforc, this algorithm can be easily incorporated into the on-line system. In summary, this study showed that the chain code histogram method is a practical and quick way to calculate a shape index. Also, this study indicated that it would be possible to add such a feature to the on-line system of CCSEM so that this system may automatically analyze the individual particles and provide not only the chemical compositions but also the shape index in close to real time. This work has been supported by the National Science Foundation under grants ATM and ATM REFERENCES Casuccio, G. S., et al. (1983). J. Air Pollut. Control Assoc. 33: of the particle by the intensity contrast of Freeman, H. (1974). ACM Computing Suroeys

10 218 Y. Xie et al. Henderson, B. C. et al. (1989). Am. Lab. 21: Koplowitz, J. (1981). IEEE Trans. Pattern Anal. Ma- Kim, D., and Hopke, P. K. i1988a). Aerosol Sci. Tech- chine Intelligence. PAMI-3: nol. 9: Sadjadi, F. (1992). Opt. Eng. 31: Kim, D., and Hopke, P. K. (1988b). Aerosol Sci. Technol. 9:

CS443: Digital Imaging and Multimedia Binary Image Analysis. Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University

CS443: Digital Imaging and Multimedia Binary Image Analysis. Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University CS443: Digital Imaging and Multimedia Binary Image Analysis Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University Outlines A Simple Machine Vision System Image segmentation by thresholding

More information

Digital Image Processing

Digital Image Processing Digital Image Processing Part 9: Representation and Description AASS Learning Systems Lab, Dep. Teknik Room T1209 (Fr, 11-12 o'clock) achim.lilienthal@oru.se Course Book Chapter 11 2011-05-17 Contents

More information

Problem definition Image acquisition Image segmentation Connected component analysis. Machine vision systems - 1

Problem definition Image acquisition Image segmentation Connected component analysis. Machine vision systems - 1 Machine vision systems Problem definition Image acquisition Image segmentation Connected component analysis Machine vision systems - 1 Problem definition Design a vision system to see a flat world Page

More information

Chain Code Approach for Shape based Image Retrieval

Chain Code Approach for Shape based Image Retrieval Indian Journal of Science and Technology, Vol 11(3), DOI: 10.17485/ijst/2018/v11i3/119998, January 2018 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Chain Code Approach for Shape based Image Retrieval

More information

(Refer Slide Time: 00:02:00)

(Refer Slide Time: 00:02:00) Computer Graphics Prof. Sukhendu Das Dept. of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 18 Polyfill - Scan Conversion of a Polygon Today we will discuss the concepts

More information

C E N T E R A T H O U S T O N S C H O O L of H E A L T H I N F O R M A T I O N S C I E N C E S. Image Operations I

C E N T E R A T H O U S T O N S C H O O L of H E A L T H I N F O R M A T I O N S C I E N C E S. Image Operations I T H E U N I V E R S I T Y of T E X A S H E A L T H S C I E N C E C E N T E R A T H O U S T O N S C H O O L of H E A L T H I N F O R M A T I O N S C I E N C E S Image Operations I For students of HI 5323

More information

A Vertex Chain Code Approach for Image Recognition

A Vertex Chain Code Approach for Image Recognition A Vertex Chain Code Approach for Image Recognition Abdel-Badeeh M. Salem, Adel A. Sewisy, Usama A. Elyan Faculty of Computer and Information Sciences, Assiut University, Assiut, Egypt, usama471@yahoo.com,

More information

Connected components - 1

Connected components - 1 Connected Components Basic definitions Connectivity, Adjacency, Connected Components Background/Foreground, Boundaries Run-length encoding Component Labeling Recursive algorithm Two-scan algorithm Chain

More information

Image retrieval based on region shape similarity

Image retrieval based on region shape similarity Image retrieval based on region shape similarity Cheng Chang Liu Wenyin Hongjiang Zhang Microsoft Research China, 49 Zhichun Road, Beijing 8, China {wyliu, hjzhang}@microsoft.com ABSTRACT This paper presents

More information

Character Recognition

Character Recognition Character Recognition 5.1 INTRODUCTION Recognition is one of the important steps in image processing. There are different methods such as Histogram method, Hough transformation, Neural computing approaches

More information

Chapter 11 Representation & Description

Chapter 11 Representation & Description Chain Codes Chain codes are used to represent a boundary by a connected sequence of straight-line segments of specified length and direction. The direction of each segment is coded by using a numbering

More information

Topic 4 Image Segmentation

Topic 4 Image Segmentation Topic 4 Image Segmentation What is Segmentation? Why? Segmentation important contributing factor to the success of an automated image analysis process What is Image Analysis: Processing images to derive

More information

MATRIX BASED INDEXING TECHNIQUE FOR VIDEO DATA

MATRIX BASED INDEXING TECHNIQUE FOR VIDEO DATA Journal of Computer Science, 9 (5): 534-542, 2013 ISSN 1549-3636 2013 doi:10.3844/jcssp.2013.534.542 Published Online 9 (5) 2013 (http://www.thescipub.com/jcs.toc) MATRIX BASED INDEXING TECHNIQUE FOR VIDEO

More information

Graphics (Output) Primitives. Chapters 3 & 4

Graphics (Output) Primitives. Chapters 3 & 4 Graphics (Output) Primitives Chapters 3 & 4 Graphic Output and Input Pipeline Scan conversion converts primitives such as lines, circles, etc. into pixel values geometric description a finite scene area

More information

5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015)

5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) 5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) An Improved Watershed Segmentation Algorithm for Adhesive Particles in Sugar Cane Crystallization Yanmei

More information

Lecture 18 Representation and description I. 2. Boundary descriptors

Lecture 18 Representation and description I. 2. Boundary descriptors Lecture 18 Representation and description I 1. Boundary representation 2. Boundary descriptors What is representation What is representation After segmentation, we obtain binary image with interested regions

More information

Scanner Parameter Estimation Using Bilevel Scans of Star Charts

Scanner Parameter Estimation Using Bilevel Scans of Star Charts ICDAR, Seattle WA September Scanner Parameter Estimation Using Bilevel Scans of Star Charts Elisa H. Barney Smith Electrical and Computer Engineering Department Boise State University, Boise, Idaho 8375

More information

Morphological Image Processing

Morphological Image Processing Morphological Image Processing Binary image processing In binary images, we conventionally take background as black (0) and foreground objects as white (1 or 255) Morphology Figure 4.1 objects on a conveyor

More information

Tiling Rectangles with Gaps by Ribbon Right Trominoes

Tiling Rectangles with Gaps by Ribbon Right Trominoes Open Journal of Discrete Mathematics, 2017, 7, 87-102 http://www.scirp.org/journal/ojdm ISSN Online: 2161-7643 ISSN Print: 2161-7635 Tiling Rectangles with Gaps by Ribbon Right Trominoes Premalatha Junius,

More information

Lecture 10: Tutorial Sakrapee (Paul) Paisitkriangkrai Evan Tan A/Prof. Jian Zhang

Lecture 10: Tutorial Sakrapee (Paul) Paisitkriangkrai Evan Tan A/Prof. Jian Zhang Lecture : Tutorial Sakrapee (Paul) Paisitkriangkrai Evan Tan A/Prof. Jian Zhang NICTA & CSE UNSW COMP959 Multimedia Systems S 9 jzhang@cse.unsw.edu.au Part I: Media Streaming Evan Tan Acknowledgement:

More information

Morphological Image Processing

Morphological Image Processing Morphological Image Processing Morphology Identification, analysis, and description of the structure of the smallest unit of words Theory and technique for the analysis and processing of geometric structures

More information

MULTI ORIENTATION PERFORMANCE OF FEATURE EXTRACTION FOR HUMAN HEAD RECOGNITION

MULTI ORIENTATION PERFORMANCE OF FEATURE EXTRACTION FOR HUMAN HEAD RECOGNITION MULTI ORIENTATION PERFORMANCE OF FEATURE EXTRACTION FOR HUMAN HEAD RECOGNITION Panca Mudjirahardjo, Rahmadwati, Nanang Sulistiyanto and R. Arief Setyawan Department of Electrical Engineering, Faculty of

More information

Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds

Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds 9 1th International Conference on Document Analysis and Recognition Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds Weihan Sun, Koichi Kise Graduate School

More information

CoE4TN4 Image Processing

CoE4TN4 Image Processing CoE4TN4 Image Processing Chapter 11 Image Representation & Description Image Representation & Description After an image is segmented into regions, the regions are represented and described in a form suitable

More information

An Efficient Character Segmentation Based on VNP Algorithm

An Efficient Character Segmentation Based on VNP Algorithm Research Journal of Applied Sciences, Engineering and Technology 4(24): 5438-5442, 2012 ISSN: 2040-7467 Maxwell Scientific organization, 2012 Submitted: March 18, 2012 Accepted: April 14, 2012 Published:

More information

Morphological Image Processing

Morphological Image Processing Morphological Image Processing Ranga Rodrigo October 9, 29 Outline Contents Preliminaries 2 Dilation and Erosion 3 2. Dilation.............................................. 3 2.2 Erosion..............................................

More information

MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ)

MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ) 5 MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ) Contents 5.1 Introduction.128 5.2 Vector Quantization in MRT Domain Using Isometric Transformations and Scaling.130 5.2.1

More information

Rotation Invariant Finger Vein Recognition *

Rotation Invariant Finger Vein Recognition * Rotation Invariant Finger Vein Recognition * Shaohua Pang, Yilong Yin **, Gongping Yang, and Yanan Li School of Computer Science and Technology, Shandong University, Jinan, China pangshaohua11271987@126.com,

More information

Development of system and algorithm for evaluating defect level in architectural work

Development of system and algorithm for evaluating defect level in architectural work icccbe 2010 Nottingham University Press Proceedings of the International Conference on Computing in Civil and Building Engineering W Tizani (Editor) Development of system and algorithm for evaluating defect

More information

Data Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon

Data Hiding in Binary Text Documents 1. Q. Mei, E. K. Wong, and N. Memon Data Hiding in Binary Text Documents 1 Q. Mei, E. K. Wong, and N. Memon Department of Computer and Information Science Polytechnic University 5 Metrotech Center, Brooklyn, NY 11201 ABSTRACT With the proliferation

More information

Direction-Length Code (DLC) To Represent Binary Objects

Direction-Length Code (DLC) To Represent Binary Objects IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. I (Mar-Apr. 2016), PP 29-35 www.iosrjournals.org Direction-Length Code (DLC) To Represent Binary

More information

Journal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article

Journal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical esearch, 015, 7(3):175-179 esearch Article ISSN : 0975-7384 CODEN(USA) : JCPC5 Thread image processing technology research based on

More information

UNIT PLAN. Big Idea/Theme: Polygons can be identified, classified, and described.

UNIT PLAN. Big Idea/Theme: Polygons can be identified, classified, and described. UNIT PLAN Grade Level: 5 Unit #: 11 Unit Name Geometry Polygons Time: 15 lessons, 18 days Big Idea/Theme: Polygons can be identified, classified, and described. Culminating Assessment: (requirements of

More information

Ulrik Söderström 17 Jan Image Processing. Introduction

Ulrik Söderström 17 Jan Image Processing. Introduction Ulrik Söderström ulrik.soderstrom@tfe.umu.se 17 Jan 2017 Image Processing Introduction Image Processsing Typical goals: Improve images for human interpretation Image processing Processing of images for

More information

Digital Halftoning Algorithm Based o Space-Filling Curve

Digital Halftoning Algorithm Based o Space-Filling Curve JAIST Reposi https://dspace.j Title Digital Halftoning Algorithm Based o Space-Filling Curve Author(s)ASANO, Tetsuo Citation IEICE TRANSACTIONS on Fundamentals o Electronics, Communications and Comp Sciences,

More information

EE795: Computer Vision and Intelligent Systems

EE795: Computer Vision and Intelligent Systems EE795: Computer Vision and Intelligent Systems Spring 2012 TTh 17:30-18:45 WRI C225 Lecture 04 130131 http://www.ee.unlv.edu/~b1morris/ecg795/ 2 Outline Review Histogram Equalization Image Filtering Linear

More information

CHAPTER 6 DETECTION OF MASS USING NOVEL SEGMENTATION, GLCM AND NEURAL NETWORKS

CHAPTER 6 DETECTION OF MASS USING NOVEL SEGMENTATION, GLCM AND NEURAL NETWORKS 130 CHAPTER 6 DETECTION OF MASS USING NOVEL SEGMENTATION, GLCM AND NEURAL NETWORKS A mass is defined as a space-occupying lesion seen in more than one projection and it is described by its shapes and margin

More information

CS534 Introduction to Computer Vision Binary Image Analysis. Ahmed Elgammal Dept. of Computer Science Rutgers University

CS534 Introduction to Computer Vision Binary Image Analysis. Ahmed Elgammal Dept. of Computer Science Rutgers University CS534 Introduction to Computer Vision Binary Image Analysis Ahmed Elgammal Dept. of Computer Science Rutgers University Outlines A Simple Machine Vision System Image segmentation by thresholding Digital

More information

DESIGNING A REAL TIME SYSTEM FOR CAR NUMBER DETECTION USING DISCRETE HOPFIELD NETWORK

DESIGNING A REAL TIME SYSTEM FOR CAR NUMBER DETECTION USING DISCRETE HOPFIELD NETWORK DESIGNING A REAL TIME SYSTEM FOR CAR NUMBER DETECTION USING DISCRETE HOPFIELD NETWORK A.BANERJEE 1, K.BASU 2 and A.KONAR 3 COMPUTER VISION AND ROBOTICS LAB ELECTRONICS AND TELECOMMUNICATION ENGG JADAVPUR

More information

Computer Graphics. Chapter 4 Attributes of Graphics Primitives. Somsak Walairacht, Computer Engineering, KMITL 1

Computer Graphics. Chapter 4 Attributes of Graphics Primitives. Somsak Walairacht, Computer Engineering, KMITL 1 Computer Graphics Chapter 4 Attributes of Graphics Primitives Somsak Walairacht, Computer Engineering, KMITL 1 Outline OpenGL State Variables Point Attributes Line Attributes Fill-Area Attributes Scan-Line

More information

Texture recognition of medical images with the ICM method

Texture recognition of medical images with the ICM method Nuclear Instruments and Methods in Physics Research A 525 (2004) 387 391 Texture recognition of medical images with the ICM method Jason M. Kinser*, Guisong Wang George Mason University, Institute for

More information

- Low-level image processing Image enhancement, restoration, transformation

- Low-level image processing Image enhancement, restoration, transformation () Representation and Description - Low-level image processing enhancement, restoration, transformation Enhancement Enhanced Restoration/ Transformation Restored/ Transformed - Mid-level image processing

More information

Chain Coding Streamed Images through Crack Run-Length Encoding

Chain Coding Streamed Images through Crack Run-Length Encoding Chain Coding Streamed Images through Crack Run-Length Encoding D.G. Bailey School of Engineering and Advanced Technology, Massey University, Palmerston North, New Zealand. Email: D.G.Bailey@massey.ac.nz

More information

Fabric Defect Detection Based on Computer Vision

Fabric Defect Detection Based on Computer Vision Fabric Defect Detection Based on Computer Vision Jing Sun and Zhiyu Zhou College of Information and Electronics, Zhejiang Sci-Tech University, Hangzhou, China {jings531,zhouzhiyu1993}@163.com Abstract.

More information

Boundary descriptors. Representation REPRESENTATION & DESCRIPTION. Descriptors. Moore boundary tracking

Boundary descriptors. Representation REPRESENTATION & DESCRIPTION. Descriptors. Moore boundary tracking Representation REPRESENTATION & DESCRIPTION After image segmentation the resulting collection of regions is usually represented and described in a form suitable for higher level processing. Most important

More information

Character Recognition of High Security Number Plates Using Morphological Operator

Character Recognition of High Security Number Plates Using Morphological Operator Character Recognition of High Security Number Plates Using Morphological Operator Kamaljit Kaur * Department of Computer Engineering, Baba Banda Singh Bahadur Polytechnic College Fatehgarh Sahib,Punjab,India

More information

Computer Graphics. Attributes of Graphics Primitives. Somsak Walairacht, Computer Engineering, KMITL 1

Computer Graphics. Attributes of Graphics Primitives. Somsak Walairacht, Computer Engineering, KMITL 1 Computer Graphics Chapter 4 Attributes of Graphics Primitives Somsak Walairacht, Computer Engineering, KMITL 1 Outline OpenGL State Variables Point Attributes t Line Attributes Fill-Area Attributes Scan-Line

More information

EyeTech. Particle Size Particle Shape Particle concentration Analyzer ANKERSMID

EyeTech. Particle Size Particle Shape Particle concentration Analyzer ANKERSMID EyeTech Particle Size Particle Shape Particle concentration Analyzer A new technology for measuring particle size in combination with particle shape and concentration. COMBINED LASERTECHNOLOGY & DIA Content

More information

Computer Graphics. The Two-Dimensional Viewing. Somsak Walairacht, Computer Engineering, KMITL

Computer Graphics. The Two-Dimensional Viewing. Somsak Walairacht, Computer Engineering, KMITL Computer Graphics Chapter 6 The Two-Dimensional Viewing Somsak Walairacht, Computer Engineering, KMITL Outline The Two-Dimensional Viewing Pipeline The Clipping Window Normalization and Viewport Transformations

More information

ECG782: Multidimensional Digital Signal Processing

ECG782: Multidimensional Digital Signal Processing Professor Brendan Morris, SEB 3216, brendan.morris@unlv.edu ECG782: Multidimensional Digital Signal Processing Spatial Domain Filtering http://www.ee.unlv.edu/~b1morris/ecg782/ 2 Outline Background Intensity

More information

International Journal of Modern Engineering and Research Technology

International Journal of Modern Engineering and Research Technology Volume 4, Issue 3, July 2017 ISSN: 2348-8565 (Online) International Journal of Modern Engineering and Research Technology Website: http://www.ijmert.org Email: editor.ijmert@gmail.com A Novel Approach

More information

Image Acquisition + Histograms

Image Acquisition + Histograms Image Processing - Lesson 1 Image Acquisition + Histograms Image Characteristics Image Acquisition Image Digitization Sampling Quantization Histograms Histogram Equalization What is an Image? An image

More information

Improvement of the bimodal parameterization of particle size distribution using laser diffraction

Improvement of the bimodal parameterization of particle size distribution using laser diffraction Improvement of the bimodal parameterization of particle size distribution using laser diffraction Marco Bittelli Department of Agro-Environmental Science and Technology, University of Bologna, Italy. Soil

More information

(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22)

(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22) Digital Image Processing Prof. P. K. Biswas Department of Electronics and Electrical Communications Engineering Indian Institute of Technology, Kharagpur Module Number 01 Lecture Number 02 Application

More information

Digital Image Processing Fundamentals

Digital Image Processing Fundamentals Ioannis Pitas Digital Image Processing Fundamentals Chapter 7 Shape Description Answers to the Chapter Questions Thessaloniki 1998 Chapter 7: Shape description 7.1 Introduction 1. Why is invariance to

More information

CHAPTER 2 TEXTURE CLASSIFICATION METHODS GRAY LEVEL CO-OCCURRENCE MATRIX AND TEXTURE UNIT

CHAPTER 2 TEXTURE CLASSIFICATION METHODS GRAY LEVEL CO-OCCURRENCE MATRIX AND TEXTURE UNIT CHAPTER 2 TEXTURE CLASSIFICATION METHODS GRAY LEVEL CO-OCCURRENCE MATRIX AND TEXTURE UNIT 2.1 BRIEF OUTLINE The classification of digital imagery is to extract useful thematic information which is one

More information

Orthogonal art galleries with holes: a coloring proof of Aggarwal s Theorem

Orthogonal art galleries with holes: a coloring proof of Aggarwal s Theorem Orthogonal art galleries with holes: a coloring proof of Aggarwal s Theorem Pawe l Żyliński Institute of Mathematics University of Gdańsk, 8095 Gdańsk, Poland pz@math.univ.gda.pl Submitted: Sep 9, 005;

More information

The Evolution and Trend of Chain Code Scheme

The Evolution and Trend of Chain Code Scheme The Evolution and Trend of Chain Scheme 1 Lili Ayu Wulandhari, 2 Habibolah Haron Department of Modelling and Industrial Computing Faculty of Computer Science and Information Systems Universiti Teknologi

More information

Unit 1, Lesson 1: Moving in the Plane

Unit 1, Lesson 1: Moving in the Plane Unit 1, Lesson 1: Moving in the Plane Let s describe ways figures can move in the plane. 1.1: Which One Doesn t Belong: Diagrams Which one doesn t belong? 1.2: Triangle Square Dance m.openup.org/1/8-1-1-2

More information

Hierarchical Representation of 2-D Shapes using Convex Polygons: a Contour-Based Approach

Hierarchical Representation of 2-D Shapes using Convex Polygons: a Contour-Based Approach Hierarchical Representation of 2-D Shapes using Convex Polygons: a Contour-Based Approach O. El Badawy, M. S. Kamel Pattern Analysis and Machine Intelligence Laboratory, Department of Systems Design Engineering,

More information

Image Processing. Bilkent University. CS554 Computer Vision Pinar Duygulu

Image Processing. Bilkent University. CS554 Computer Vision Pinar Duygulu Image Processing CS 554 Computer Vision Pinar Duygulu Bilkent University Today Image Formation Point and Blob Processing Binary Image Processing Readings: Gonzalez & Woods, Ch. 3 Slides are adapted from

More information

Practical Image and Video Processing Using MATLAB

Practical Image and Video Processing Using MATLAB Practical Image and Video Processing Using MATLAB Chapter 18 Feature extraction and representation What will we learn? What is feature extraction and why is it a critical step in most computer vision and

More information

EECS490: Digital Image Processing. Lecture #23

EECS490: Digital Image Processing. Lecture #23 Lecture #23 Motion segmentation & motion tracking Boundary tracking Chain codes Minimum perimeter polygons Signatures Motion Segmentation P k Accumulative Difference Image Positive ADI Negative ADI (ADI)

More information

Adaptive Local Thresholding for Fluorescence Cell Micrographs

Adaptive Local Thresholding for Fluorescence Cell Micrographs TR-IIS-09-008 Adaptive Local Thresholding for Fluorescence Cell Micrographs Jyh-Ying Peng and Chun-Nan Hsu November 11, 2009 Technical Report No. TR-IIS-09-008 http://www.iis.sinica.edu.tw/page/library/lib/techreport/tr2009/tr09.html

More information

Convex polygon - a polygon such that no line containing a side of the polygon will contain a point in the interior of the polygon.

Convex polygon - a polygon such that no line containing a side of the polygon will contain a point in the interior of the polygon. Chapter 7 Polygons A polygon can be described by two conditions: 1. No two segments with a common endpoint are collinear. 2. Each segment intersects exactly two other segments, but only on the endpoints.

More information

Use of Shape Deformation to Seamlessly Stitch Historical Document Images

Use of Shape Deformation to Seamlessly Stitch Historical Document Images Use of Shape Deformation to Seamlessly Stitch Historical Document Images Wei Liu Wei Fan Li Chen Jun Sun Satoshi Naoi In China, efforts are being made to preserve historical documents in the form of digital

More information

Digital Image Processing

Digital Image Processing Digital Image Processing Lecture # 4 Digital Image Fundamentals - II ALI JAVED Lecturer SOFTWARE ENGINEERING DEPARTMENT U.E.T TAXILA Email:: ali.javed@uettaxila.edu.pk Office Room #:: 7 Presentation Outline

More information

Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong)

Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong) Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong) References: [1] http://homepages.inf.ed.ac.uk/rbf/hipr2/index.htm [2] http://www.cs.wisc.edu/~dyer/cs540/notes/vision.html

More information

Lecture 10: Image Descriptors and Representation

Lecture 10: Image Descriptors and Representation I2200: Digital Image processing Lecture 10: Image Descriptors and Representation Prof. YingLi Tian Nov. 15, 2017 Department of Electrical Engineering The City College of New York The City University of

More information

A Robust Wipe Detection Algorithm

A Robust Wipe Detection Algorithm A Robust Wipe Detection Algorithm C. W. Ngo, T. C. Pong & R. T. Chin Department of Computer Science The Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong Email: fcwngo, tcpong,

More information

RESEARCH ON OPTIMIZATION OF IMAGE USING SKELETONIZATION TECHNIQUE WITH ADVANCED ALGORITHM

RESEARCH ON OPTIMIZATION OF IMAGE USING SKELETONIZATION TECHNIQUE WITH ADVANCED ALGORITHM 881 RESEARCH ON OPTIMIZATION OF IMAGE USING SKELETONIZATION TECHNIQUE WITH ADVANCED ALGORITHM Sarita Jain 1 Sumit Rana 2 Department of CSE 1 Department of CSE 2 Geeta Engineering College 1, Panipat, India

More information

GENERAL AUTOMATED FLAW DETECTION SCHEME FOR NDE X-RAY IMAGES

GENERAL AUTOMATED FLAW DETECTION SCHEME FOR NDE X-RAY IMAGES GENERAL AUTOMATED FLAW DETECTION SCHEME FOR NDE X-RAY IMAGES Karl W. Ulmer and John P. Basart Center for Nondestructive Evaluation Department of Electrical and Computer Engineering Iowa State University

More information

Detection of a Single Hand Shape in the Foreground of Still Images

Detection of a Single Hand Shape in the Foreground of Still Images CS229 Project Final Report Detection of a Single Hand Shape in the Foreground of Still Images Toan Tran (dtoan@stanford.edu) 1. Introduction This paper is about an image detection system that can detect

More information

A System for Joining and Recognition of Broken Bangla Numerals for Indian Postal Automation

A System for Joining and Recognition of Broken Bangla Numerals for Indian Postal Automation A System for Joining and Recognition of Broken Bangla Numerals for Indian Postal Automation K. Roy, U. Pal and B. B. Chaudhuri CVPR Unit; Indian Statistical Institute, Kolkata-108; India umapada@isical.ac.in

More information

Lesson Polygons

Lesson Polygons Lesson 4.1 - Polygons Obj.: classify polygons by their sides. classify quadrilaterals by their attributes. find the sum of the angle measures in a polygon. Decagon - A polygon with ten sides. Dodecagon

More information

Ulrik Söderström 21 Feb Representation and description

Ulrik Söderström 21 Feb Representation and description Ulrik Söderström ulrik.soderstrom@tfe.umu.se 2 Feb 207 Representation and description Representation and description Representation involves making object definitions more suitable for computer interpretations

More information

Unit 3 Transformations and Clipping

Unit 3 Transformations and Clipping Transformation Unit 3 Transformations and Clipping Changes in orientation, size and shape of an object by changing the coordinate description, is known as Geometric Transformation. Translation To reposition

More information

SHAPE AND STRUCTURE. Shape and Structure. An explanation of Mathematical terminology

SHAPE AND STRUCTURE. Shape and Structure. An explanation of Mathematical terminology Shape and Structure An explanation of Mathematical terminology 2005 1 POINT A dot Dots join to make lines LINE A line is 1 dimensional (length) A line is a series of points touching each other and extending

More information

Keywords Binary Linked Object, Binary silhouette, Fingertip Detection, Hand Gesture Recognition, k-nn algorithm.

Keywords Binary Linked Object, Binary silhouette, Fingertip Detection, Hand Gesture Recognition, k-nn algorithm. Volume 7, Issue 5, May 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Hand Gestures Recognition

More information

1. INTRODUCTION. AMS Subject Classification. 68U10 Image Processing

1. INTRODUCTION. AMS Subject Classification. 68U10 Image Processing ANALYSING THE NOISE SENSITIVITY OF SKELETONIZATION ALGORITHMS Attila Fazekas and András Hajdu Lajos Kossuth University 4010, Debrecen PO Box 12, Hungary Abstract. Many skeletonization algorithms have been

More information

Geometry Foundations Planning Document

Geometry Foundations Planning Document Geometry Foundations Planning Document Unit 1: Chromatic Numbers Unit Overview A variety of topics allows students to begin the year successfully, review basic fundamentals, develop cooperative learning

More information

Building Detection. Guillem Pratx LIAMA. 18 August BACKGROUND 2 2. IDEA 2

Building Detection. Guillem Pratx LIAMA. 18 August BACKGROUND 2 2. IDEA 2 Building Detection Guillem Pratx LIAMA 18 August 2004 1. BACKGROUND 2 2. IDEA 2 2.1 STARTING POINT 2 2.2 IMPROVEMENTS 2 2.2.1 IMAGE PREPROCESSING 2 2.2.2 CONTOURS CHARACTERIZATION 2 3. IMPLEMENTATION 3

More information

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE sbsridevi89@gmail.com 287 ABSTRACT Fingerprint identification is the most prominent method of biometric

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

Part-Based Skew Estimation for Mathematical Expressions

Part-Based Skew Estimation for Mathematical Expressions Soma Shiraishi, Yaokai Feng, and Seiichi Uchida shiraishi@human.ait.kyushu-u.ac.jp {fengyk,uchida}@ait.kyushu-u.ac.jp Abstract We propose a novel method for the skew estimation on text images containing

More information

Sobel Edge Detection Algorithm

Sobel Edge Detection Algorithm Sobel Edge Detection Algorithm Samta Gupta 1, Susmita Ghosh Mazumdar 2 1 M. Tech Student, Department of Electronics & Telecom, RCET, CSVTU Bhilai, India 2 Reader, Department of Electronics & Telecom, RCET,

More information

Salient Region Detection using Weighted Feature Maps based on the Human Visual Attention Model

Salient Region Detection using Weighted Feature Maps based on the Human Visual Attention Model Salient Region Detection using Weighted Feature Maps based on the Human Visual Attention Model Yiqun Hu 2, Xing Xie 1, Wei-Ying Ma 1, Liang-Tien Chia 2 and Deepu Rajan 2 1 Microsoft Research Asia 5/F Sigma

More information

Asynchronous Cellular Operations on Gray Images Extracting Topographic Shape Features and Their Relations

Asynchronous Cellular Operations on Gray Images Extracting Topographic Shape Features and Their Relations Asynchronous Cellular Operations on Gray Images Extracting Topographic Shape Features and Their Relations Igor Polkovnikov Yes San Francisco LLC, ipolk@virtuar.com, www.virtuar.com/ia/ March 19, 2013 Abstract

More information

Polygons. Discuss with a partner what a POLYGON is. Write down the key qualities a POLYGON has. Share with the class what a polygon is?

Polygons. Discuss with a partner what a POLYGON is. Write down the key qualities a POLYGON has. Share with the class what a polygon is? Polygons Use a ruler to draw 3 different POLYGONS Discuss with a partner what a POLYGON is Write down the key qualities a POLYGON has Share with the class what a polygon is? *Can you find the area of each

More information

CIRCULAR MOIRÉ PATTERNS IN 3D COMPUTER VISION APPLICATIONS

CIRCULAR MOIRÉ PATTERNS IN 3D COMPUTER VISION APPLICATIONS CIRCULAR MOIRÉ PATTERNS IN 3D COMPUTER VISION APPLICATIONS Setiawan Hadi Mathematics Department, Universitas Padjadjaran e-mail : shadi@unpad.ac.id Abstract Geometric patterns generated by superimposing

More information

A new approach to reference point location in fingerprint recognition

A new approach to reference point location in fingerprint recognition A new approach to reference point location in fingerprint recognition Piotr Porwik a) and Lukasz Wieclaw b) Institute of Informatics, Silesian University 41 200 Sosnowiec ul. Bedzinska 39, Poland a) porwik@us.edu.pl

More information

Lecture 8 Object Descriptors

Lecture 8 Object Descriptors Lecture 8 Object Descriptors Azadeh Fakhrzadeh Centre for Image Analysis Swedish University of Agricultural Sciences Uppsala University 2 Reading instructions Chapter 11.1 11.4 in G-W Azadeh Fakhrzadeh

More information

Polyominoes and Polyiamonds as Fundamental Domains for Isohedral Tilings of Crystal Class D 2

Polyominoes and Polyiamonds as Fundamental Domains for Isohedral Tilings of Crystal Class D 2 Symmetry 2011, 3, 325-364; doi:10.3390/sym3020325 OPEN ACCESS symmetry ISSN 2073-8994 www.mdpi.com/journal/symmetry Article Polyominoes and Polyiamonds as Fundamental Domains for Isohedral Tilings of Crystal

More information

Polyominoes and Polyiamonds as Fundamental Domains for Isohedral Tilings of Crystal Class D 2

Polyominoes and Polyiamonds as Fundamental Domains for Isohedral Tilings of Crystal Class D 2 Symmetry 2011, 3, 325-364; doi:10.3390/sym3020325 OPEN ACCESS symmetry ISSN 2073-8994 www.mdpi.com/journal/symmetry Article Polyominoes and Polyiamonds as Fundamental Domains for Isohedral Tilings of Crystal

More information

Small-scale objects extraction in digital images

Small-scale objects extraction in digital images 102 Int'l Conf. IP, Comp. Vision, and Pattern Recognition IPCV'15 Small-scale objects extraction in digital images V. Volkov 1,2 S. Bobylev 1 1 Radioengineering Dept., The Bonch-Bruevich State Telecommunications

More information

Chain Code Histogram based approach

Chain Code Histogram based approach An attempt at visualizing the Fourth Dimension Take a point, stretch it into a line, curl it into a circle, twist it into a sphere, and punch through the sphere Albert Einstein Chain Code Histogram based

More information

Computer Graphics Prof. Sukhendu Das Dept. of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 24 Solid Modelling

Computer Graphics Prof. Sukhendu Das Dept. of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 24 Solid Modelling Computer Graphics Prof. Sukhendu Das Dept. of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 24 Solid Modelling Welcome to the lectures on computer graphics. We have

More information

IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc

IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION. Catalin Dragoi, Dinu Coltuc 0th European Signal Processing Conference (EUSIPCO 01) Bucharest, Romania, August 7-31, 01 IMPROVED RHOMBUS INTERPOLATION FOR REVERSIBLE WATERMARKING BY DIFFERENCE EXPANSION Catalin Dragoi, Dinu Coltuc

More information

Advanced Image Processing, TNM034 Optical Music Recognition

Advanced Image Processing, TNM034 Optical Music Recognition Advanced Image Processing, TNM034 Optical Music Recognition Linköping University By: Jimmy Liikala, jimli570 Emanuel Winblad, emawi895 Toms Vulfs, tomvu491 Jenny Yu, jenyu080 1 Table of Contents Optical

More information

Fine Classification of Unconstrained Handwritten Persian/Arabic Numerals by Removing Confusion amongst Similar Classes

Fine Classification of Unconstrained Handwritten Persian/Arabic Numerals by Removing Confusion amongst Similar Classes 2009 10th International Conference on Document Analysis and Recognition Fine Classification of Unconstrained Handwritten Persian/Arabic Numerals by Removing Confusion amongst Similar Classes Alireza Alaei

More information