The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
- Plants play an important role in both human life and other lives that exist on the earth. Due to environmental deterioration and lack of awareness, many rare plant species are at the margins of extinction. Despite the great advances made in botany, there are many plants yet to be discovered, classified, and utilized; unknown plants are treasures waiting to be found. Leaf classification and recognition...
This paper proposes a novel scheme to save the usage of ink or toner by an approximate-K algorithm for color printers. Existing printers use the mixtures of three color toners(C, M and Y) to print all the pixels for color images, and it makes color printing cost 4-4.5 times more expensive than monochromic printing. Since human eyes are not sensitive to distinguish neighboring colors in the color space,...
Reliable feature recognition is necessary in broad fields of computer vision and image processing. Edges often act as primary artifacts of visual data. Edge detection is to mark sharp changes of the intensity or brightness of digital images. Canny edge detection and ant colony optimization detection are two essential edge detection approaches. The former is susceptible to noises presented on source...
Visual Cryptography is an encryption technique where a secret image is cryptographically encoded into n meaningless share images. In visual secret sharing scheme (k, n) the secret images can be visually revealed by stacking together any k or more transparencies of the shares and by inspecting less than k shares, one cannot retrieve the secret image. In Visual Secret Sharing based on halftoning, the...
In this paper, different kinds of methods for realizing gray scale for LCoS were studied. Among these methods, time ratio gray scale (TRG) is superior to other methods in the aspect of gray scale. We have achieved high gray scales and image uniformity for the LCoS using the sub-frame modulation of TRG. In this method, each frame was divided into 8 sub-frames with the proportion as 1:2:4:8:16:32:64:128...
In this paper, we propose a new methodology for detecting lane markers that exploits the parallel nature of lane boundaries on the road. First, the input image is pre-processed and filtered to detect lane marker features. Then, using the Polar Randomized Hough Transform that is introduced in this paper, lines are fitted through the detected features and the orientation of each line is evaluated. By...
We define a new reduced model to represent coloured images. We propose to use two components for a full definition of a colour instead of three. To that end we take advantage of the geometrical structure of the HCL conical colour space and approximate its circular base by a spiral. We thus write chroma as a function of hue. The resulting spiral is therefore defined by one parameter only. This parameter...
This paper presents 1) algorithms for blood vessels extraction in sclera-conjunctiva images, which can be applied in syndrome differentiation by observing human eyes (named Ocular Diagnostic in Traditional Chinese Medicine), 2) digitization of extracted vessels. First, sclera-conjunctiva region is isolated by optimal threshold segmentation and mathematical operation. Second, scanning and edge detection...
This paper proposes a cyclic load balancing strategy to parallel Fuzzy C-Means cluster analysis algorithm. The problem is to minimize the total time cost and maximize the parallel processing efficiency when a subset of clusters is distributed over a set of processors cores on shared memory architecture. The parallel Fuzzy C - Means (FCM) cluster analysis algorithm is composed by two distinct parts...
In view of the Kirsch edge detection algorithm's shortage, a method of improved Kirsch human face edge detection was proposed. First, this method smoothed the original image with Gaussian filter, calculated its gradient image. Then, this method calculated the gradient image using the improved Kirsch algorithm, and extract edge according T1 and T2 two. Computer simulation experiments indicated that...
Cavity profile and its parameter is an important aspect in supercavitation experiment, series of slender-body cavity flow pattern and control channel experiments were studied in high-speed tunnel. The cavity image information was obtained on the basis of high-speed photography, by further optimization of cavity image; the complete cavity information was given to provide valuable reference on study...
In this paper we propose a novel steganographic method for hiding information within the spatial domain of the gray scale image. The proposed approach works by dividing the cover into blocks of equal sizes and then embeds the message in the edge of the block depending on the number of ones in left four bits of the pixel. Our experimental results have shown that the proposed method not only has an...
In this paper a new, faster approach which is different from all the other conventional image vectorization techniques. Using canny edge detection we are able to find the sharp edges in the image and the assigning shades to each identifiable segment using random colour extraction from the original image. Finally mapping the colour blobs with the SVG Schema and generating a scalable vector image. This...
Plant skeleton is a key geometrical of itself, it can reserve topology and shape information of the object, so it is easy to reconstruct the source form. In this paper, leaf vein skeleton extracting method based on watershed was proposed using images of leaves. Through it the main vein and lateral vein of the leaf are extracted. Then use the morphology method like dilation and erosion to do the final...
With the development of the Broadcasting and Video network, the Monitoring System on Digital Video Broadcasting is becoming more and more important. Image recognition technology is widely applied to detect the degraded video in the television observation system. Mosaic block easily occurs in the TV signals, which will degrade the video quality. The conventional mosaic detection algorithm can't distinguish...
Security has become an inseparable issue even in the field of space technology. Visual Cryptography is the study of mathematical techniques related aspects of Information Security which allows Visual information to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique represents the secret image by...
Background subtraction is a common method for detecting moving objects, but it is yet a difficult problem to distinguish moving objects from backgrounds when these backgrounds change significantly. Hence, we propose a method for detecting moving objects with a background model that covers dynamic changes in backgrounds utilizing a spatio-temporal texture named “Space-Time Patch”, which describes motion...
Mathematical morphology is widely used in the area of signal and image analysis. It has enormous applications in detection of weak targets, object recognition and feature extraction, edge detection, image enhancement and many more. However, its use has long been hampered by its algorithmic complexity as the size of the structuring element or image grows. With the trend toward larger images and proportionally...
Thailand is an agricultural country, where is located in Southeast Asia. We can produce various kinds of food in not only a good quality but also a huge quantity. One problem of both quality and quantity control of our food products are the food harmful pests such as bird, ant, weevil, aphid, grasshopper etc. Therefore, this project intends to develop the computer system that can be chased birds from...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.