The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The main disadvantage of traditional global thresholding techniques is that they do not have an ability to exploit information of the characteristics of target images that they threshold. In this paper, we propose a new approach based on combination of modified p-tile and edge detection algorithms to have more accurate object segmentation. Using our proposed method, it is shown that almost all of...
Automatic license plate (LP) recognition is one of the most promising aspects of applying computer vision techniques towards intelligent transportation system. In order to recognize a license plate, the localization of it must be detected first. Obviously, accurately localize the plate from a vehicle image, is a crucial step of an ALPR system, which greatly affects the overall recognition performance...
This paper proposed an edge detection technique based on extracting geometrical features from images. With helping of geometrical features, such as line and point features, fault connections are removed, edges of targets are refined. And we implement this algrithom on random arrangement capsule edge detection, and rely on refined edges defective capsules are detected and counted successfully.
Contours are the most common feature used in the shape detection and recognition applications. Contours in digital images constitute of consecutive pixels, thus they can be represented with chain codes by encoding the relative positions of the pixels forming that contour. Sharp transitions on chain coded contour information correspond to the corners or notches of the 2D shape enclosed by that contour...
In this paper, we describe a side-view car detection algorithm based on template detection. The template is constructed according to car shape knowledge. The algorithm can roughly be divided into two stages, hypothesis generation and hypothesis verification. In HG step, we use Hough transform to detect wheels, with the shape knowledge we get a rectangular area to generate hypothesis area. In HV step,...
For accurate location of a partial discharge source in the power cables, exact determination of time of arrival of initiated waves by PD source, is very important. The proposed method in this paper is based on applying mathematical morphology operators to perform this task. In this method the Opening-Closing filter of mathematical morphology is used for noise reduction of signal and gradient operator...
Mahalanobis, Jaccard and others are similarity measurements which are commonly used in sketch recognition. Attempts to improve similarity measurement can be made by manipulating formulae and reducing the testing data set used but less effort are attempted to propose algorithm. Hence, the purpose of this study is to propose a new algorithm for a better method in shape recognition. To do so, Mahalanobis...
Contrary to uniform local averaging, we propose non-linear approach for precise sparse depth map extraction. Noisy focus measurements are replaced with estimated values. This helps to compute accurate 3D shape while preserving edges of objects.
This study proposes an algorithm where edge shape information is retrieved using a vote based rearranged chain code. The proposed algorithm rearranges and normalizes the chain code of edges to create a maximum vote based normalization chain code whose correlativity is reinforced. As it obtains cyclical maximum values from the chain code, rearranges them and flips code values according to the frequency,...
In this paper, we solve the problem of human detection in crowded scenes using a Bayesian 3D model based method. Human candidates are first nominated by a head detector and a foot detector, then optimization is performed to find the best configuration of the candidates and their corresponding shape models. The solution is obtained by decomposing the mutually related candidates into un-occluded ones...
In the process of edge detection based on mathematical morphology, different shapes and different scales structure elements have different roles in filtering noise and keeping edge details. The paper proposes an adaptive edge detection algorithm based on multi-shape and multi-scale structure elements, uses different directions and sizes structure elements to extract image edge, determines weight coefficients...
Overdraw and edge crossings are common problems during the exploration of large graphs. Layout methods, such as edge bundling, have been applied to diminish this problem. They often come at the cost of introducing local ambiguities and losing connectivity detail, thus making edge interaction difficult. In this paper we propose EdgeAnalyzer, a focus+context technique for direct interaction with edges...
Human figure identification is always a challenging move in field of pattern recognition. This paper presents a complete algorithm to find a single object (human body) and identify the object as human being. The algorithm starts the segmentation process with basic frame difference method and use morphological operators, edge detection, feature point generation and finally spline interpolation to find...
This paper proposes a new method to detect objects in images. Boundaries contain shape of the objects. To detect objects in cluttered images, we use boundary fragments. Boundary fragments are obtained by our new training procedure. Poisson equation is used to divide edges and extract generic model of the object. Gaussian Mixture Model (GMM) is used to model shape of the object. This creates relation...
Forensic analysis of individual printed items, including single characters, enables the addition of some level of security to any printed item (label, document, package, etc.). In this paper, we present a model-based approach for extracting a signature profile around the outer edge of virtually any text glyph. We show that for two high-resolution imaging devices (the Dyson Relay CMOS Imaging Device,...
With the emerge of multimedia, communication and processing, a typical image database has a large volume of data. It is an essential to build an efficient retrieval system to browse through the entire database. In this paper we proposed precise Relevance Feed Back (RFB) Content Based Image Retrieval (CBIR) using multiple features based on interactive retrieval approach which will extensively reduces...
This paper proposes a face occlusion verification method for an automated teller machine (ATM) application. The proposed method mainly consists of three steps. Firstly, a head and shoulder shape is detected by applying B-spline active contour to motion edges. This motion edge is generated by a kurtosis-based frame selection and distance transformation-based motion edge detection. Secondly, a face...
Dynamic phenomena such as oil spills, mud flow, diffusion or leakage of gases in the environment are characterized by non-deterministic variations in shape, size and direction of motion. Due to the absence of any well defined model for tracking their dynamics, the detection and tracking of such phenomena through Wireless Sensor Networks (WSNs) is very challenging. Most of the existing works consider...
In this paper, we present a non-symmetry and anti-packing object pattern representation model (NAM) for object detection. A set of distinctive sub-patterns (object parts) is constructed from a set of sample images of the object class; object pattern are then represented using sub-patterns, together with spatial relations observed among the sub-patterns. Many feature descriptors can be used to describe...
The design of traffic sign recognition (TSR) system, one important subsystem of Advanced Driver Assistance System (ADAS), has been a challenge practical problem for many years due to the complex issues like road environments, lighting conditions, occlusion, and so on. In this paper, we introduce a new TSR system, whose effectiveness has been tested through extensive experiments. The established TSR...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.