Choras | Image Processing & Communications Challenges 2 | E-Book | www.sack.de
E-Book

E-Book, Englisch, Band 84, 486 Seiten

Reihe: Advances in Intelligent and Soft Computing

Choras Image Processing & Communications Challenges 2


1. Auflage 2010
ISBN: 978-3-642-16295-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, Band 84, 486 Seiten

Reihe: Advances in Intelligent and Soft Computing

ISBN: 978-3-642-16295-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



Image Processing and Communications represents an exciting and dynamic part of the information area. This book consists of 52 scientific and technical papers from 14 Nations, after a careful selection performed by many international reviewers. The papers are conveniently grouped into 6 chapters: - Computer Vision and Image Processing - Biometric - Recognition and Classification - Biomedical Image Processing - Applications - Communications. Each chapter focuses on a specific topic, presents results, and points out challenges and future directions.

Choras Image Processing & Communications Challenges 2 jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Title Page;1
2;Foreword;5
3;Contents;6
4;Part I: Computer Vision and Image Processing;12
4.1;Earliest Computer Vision Systems in Poland;13
4.1.1;Introduction;13
4.1.2;The Problem of Computer Image Input;14
4.1.3;Previous Research Related to Computer Vision;17
4.1.4;Multiprocessor Systems. CESARO2;19
4.1.5;And Then There Was an Avalanche ...;20
4.1.6;References;21
4.2;VICAL: Visual Cognitive Architecture for Concepts Learning to Understanding Semantic Image Content;24
4.2.1;Introduction;24
4.2.2;Visual Cognitive Framework VICAL;25
4.2.2.1;Eye Processor;25
4.2.2.2;Cognitive Processor;26
4.2.3;Structural Abstraction of VICAL;29
4.2.3.1;Operational Agent;30
4.2.3.2;Evolutionary Associator Agent;33
4.2.4;Experimental Results;36
4.2.5;Conclusion;37
4.2.6;References;38
4.3;Implementation of Computer Vision Algorithms in DirectShow Technology;40
4.3.1;Introduction;40
4.3.2;Filter Programming;42
4.3.3;Filter Pattern Design;44
4.3.4;DS Based Application for Scene Depth Estimation;45
4.3.5;Conclusions;47
4.3.6;References;47
4.4;Implementation of Hurwitz-Radon Matrices in Shape Representation;48
4.4.1;Introduction;48
4.4.2;Contour Points Based Shape Representation;49
4.4.3;Shape Reconstruction via MHR Method;50
4.4.3.1;The Operator of Hurwitz-Radon;51
4.4.3.2;MHR Method (Basic Version);53
4.4.3.3;MHR Method with Parameter k;54
4.4.3.4;MHR Method for Equidistance Nodes;55
4.4.4;Conclusion;57
4.4.5;References;58
4.5;Video Quality Assessment Using the Combined Full-Reference Approach;60
4.5.1;Introduction;60
4.5.2;Methods of Image Quality Assessment;61
4.5.3;Combined Metric and Its Verification;63
4.5.4;Conclusions;65
4.5.5;References;66
4.6;An Improved Self-embedding Algorithm: Digital Content Protection against Compression Attacks in Digital Watermarking;68
4.6.1;Introduction;68
4.6.2;OurMethod;70
4.6.3;Image Encryption Algorithm;71
4.6.4;Results and Discussion;72
4.6.4.1;JPEG Compression Attack;73
4.6.4.2;BTC Compression Attack;73
4.6.4.3;SVD Compression Attack;74
4.6.5;Conclusion;75
4.6.6;References;75
4.7;Generation of View Representation from View Points on Spiral Trajectory;76
4.7.1;Introduction;76
4.7.1.1;View Generation Space - Basic Concepts;77
4.7.2;Uniformly Distributed View Points on View Sphere;78
4.7.2.1;View Points on Spiral Path;80
4.7.2.2;Uniformly Distributed View Points on Spiral Path;80
4.7.3;Results;82
4.7.4;References;83
4.8;Gradient Based Edge Detection in Various Color Spaces;84
4.8.1;Introduction;84
4.8.2;RGB Space;84
4.8.3;HSB Space;85
4.8.4;YUV Space;86
4.8.5;CIEXYZ Space;87
4.8.6;CIELab Space;88
4.8.7;Conclusions;89
4.8.8;References;89
4.9;Improve Vector Quantization Strategy;90
4.9.1;Introduction;90
4.9.2;Adaptive VQ-Design;91
4.9.2.1;Rotation Block;91
4.9.2.2;Mean and Mode;91
4.9.2.3;Mean Removed VQ (MRVQ);92
4.9.2.4;Block Classification;93
4.9.2.5;Random Coding;93
4.9.2.6;Pruning Found;94
4.9.2.7;Result and Conclusion;96
4.9.3;Conclusion;96
4.9.4;References;97
5;Part II: Biometric;98
5.1;Knuckle Biometrics for Human Identification;99
5.1.1;Introduction;99
5.1.2;Knuckle Biometrics System Architecture Overview;100
5.1.3;Knuckle Preprocessing Phase;101
5.1.4;Feature Extraction;101
5.1.4.1;Short Feature Vector (Basic Features);101
5.1.4.2;Knuckle Lines Model;102
5.1.4.3;Knuckle Texture Descriptors;103
5.1.5;Classification;104
5.1.6;Results;104
5.1.7;Conclusions;105
5.1.8;References;105
5.2;A New Method of Fingerprint Key Protection of Grid Credential;107
5.2.1;Introduction;107
5.2.2;Method of Fingerprint Protection of Private Keys;107
5.2.3;Method Verification;110
5.2.4;References;111
5.3;Human Vein Pattern Segmentation from Low Quality Images – A Comparison of Methods;112
5.3.1;Introduction;112
5.3.2;Dataset Collection;113
5.3.3;The Method Based on Discrete Fourier Transform;113
5.3.4;The Gradient-Based Segmentation Method;116
5.3.5;Results of the Experiment;117
5.3.6;Conclusions;119
5.3.7;References;119
5.4;A Modified Algorithm for User Identification by His Typing on the Keyboard;120
5.4.1;Introduction;120
5.4.2;Other Works on Keystroke Dynamics;121
5.4.3;Authors’ Suggessed Approach;122
5.4.4;Experimental Results;124
5.4.5;Conclusions and Future Work;126
5.4.6;References;127
5.5;Multimodal Biometric Personal Authentication Integrating Iris and Retina Images;128
5.5.1;Introduction;128
5.5.2;Iris and Retina Recognition;130
5.5.2.1;Iris Recognition;132
5.5.2.2;Retina Recognition;135
5.5.3;Conclusion;137
5.5.4;References;137
6;Part III: Recognition and Classification;139
6.1;Fusion Methods for the Two Class Recognition Problem – Analytical and Experimental Results;140
6.1.1;Introduction;140
6.1.2;Fusion Based on Values of Classifiers Discriminant Function;141
6.1.3;Analytical Characteristics of Fusion Methods;142
6.1.4;Experiments;144
6.1.4.1;Set Up of Experiment;144
6.1.5;Results;145
6.1.5.1;Experimental Results Evaluation;145
6.1.6;FinalRemarks;146
6.1.7;References;146
6.2;Feature Type and Size Selection for AdaBoost Face Detection Algorithm;148
6.2.1;Introduction;148
6.2.2;The AdaBoost Algorithm;148
6.2.3;AdaBoost Algorithm for Face Detection;150
6.2.4;Rotated Haar-Like Features;151
6.2.5;Experiments;152
6.2.6;Conclusions and Future Research;153
6.2.7;References;154
6.3;3D Morphable Models Application for Expanding Face Database Limited to Single Frontal Face Image Per Person;155
6.3.1;Introduction;155
6.3.2;Model Construction;156
6.3.2.1;3D Face Scanner;156
6.3.2.2;Generic Face Model Construction;156
6.3.3;Generation of Novel Virtual Face Samples;157
6.3.3.1;Fitting Morphable Model;157
6.3.3.2;Performance;159
6.3.4;Conclusions;160
6.3.5;References;160
6.4;A Partition of Feature Space Based on Information Energy in Classification with Fuzzy Observations;162
6.4.1;Introduction;162
6.4.2;Bayes Classifier;163
6.4.2.1;Bayes Error;164
6.4.3;Basic Notions of Fuzzy Theory;165
6.4.4;Probability Error in Bayes Classifier with Fuzzy Observations;166
6.4.4.1;Numerical Example;167
6.4.5;Conclusion;168
6.4.6;References;169
6.5;Recognition of Signed Expressions Using Cluster-Based Segmentation of Time Series;170
6.5.1;Introduction;170
6.5.2;A Data-Driven Subsequence Extraction Method;171
6.5.2.1;The Input Data;171
6.5.2.2;Sequence Partitioning Problem;172
6.5.2.3;Optimization Method;173
6.5.3;Subunit–Based Recognition;174
6.5.4;Experiments;175
6.5.5;Conclusions;176
6.5.6;References;177
6.6;Extending 3D Shape Measurement with Reflectance Estimation;178
6.6.1;Introduction;178
6.6.2;Integrated Measurement Method;179
6.6.2.1;Shape Measurement;180
6.6.2.2;Color Measurement;180
6.6.2.3;Angular Reflection Measurement;181
6.6.2.4;Merging Multiple Measurements;182
6.6.3;Experimental Setup;183
6.6.4;Measurement Results;183
6.6.5;Conclusions;185
6.6.6;References;185
6.7;Software Framework for Efficient Tensor Representation and Decompositions for Pattern Recognition in Computer Vision;187
6.7.1;Introduction;187
6.7.2;Architecture of the Software Framework;188
6.7.3;Computation of the HOSVD Tensor Decomposition;191
6.7.4;Experiments;192
6.7.5;Conclusions;194
6.7.6;References;194
6.8;Hand Shape Recognition in Real Images Using Hierarchical Temporal Memory Trained on Synthetic Data;195
6.8.1;Introduction;195
6.8.2;Hierarchical Temporal Memory Concept;196
6.8.3;Problem Definition and Proposed Solution;197
6.8.4;Results and Discussion;199
6.8.5;Conclusions and Future Work;201
6.8.6;References;202
6.9;Performance Comparison among Complex Wavelet Transforms Based Face Recognition Systems;203
6.9.1;Introduction;203
6.9.2;GABOR Wavelets;204
6.9.3;Complex Wavelet Transform;205
6.9.3.1;Dual-Tree Complex Wavelet Transform;205
6.9.3.2;Single-Tree Complex Wavelet Transform;206
6.9.4;ProposedMethod;206
6.9.5;Simulation Results and Discussions;208
6.9.6;Conclusion;209
6.9.7;References;210
7;Part IV: Biomedical Image Processing;212
7.1;The Method of Immunohistochemical Images Standardization;213
7.1.1;Introduction;213
7.1.2;Images Charcteristics;214
7.1.3;Methods;216
7.1.4;Experimental Data;218
7.1.5;Results and Discussion;218
7.1.6;Conclusion;219
7.1.7;References;220
7.2;The Usefulness of Textural Features in Prostate Cancer Diagnosis;222
7.2.1;Prostate Cancer Diagnostics;222
7.2.2;Perfusion Computed Tomography;223
7.2.3;The p-CT Images;223
7.2.4;Textural Features;224
7.2.5;Methodology and Results;226
7.2.6;Conclusion;227
7.2.7;References;227
7.3;Noise Influance Reduction in Estimation of CBF, CBV and MTT, MRI Perfusion Parameters;229
7.3.1;Introduction;229
7.3.2;MRI Data Analysis;230
7.3.3;Interpolated Pixel Sampling;232
7.3.4;Tested Methods;233
7.3.5;Tests Results;234
7.3.6;Conclusions;235
7.3.7;References;236
7.4;Interpretation of the Sequences of Magnetocardiographical Images Based on Flow of Electrical Impulses through Human Heart;237
7.4.1;Introduction;237
7.4.2;MCG Data Formats;238
7.4.2.1;Time Runs;238
7.4.2.2;Magnetic Field Maps (MF Maps);238
7.4.2.3;Pseudo Current Density Maps (PCD Maps);239
7.4.3;Novel Approach to Patient’s MCG Data Evaluation;240
7.4.4;Experiment and Discussion;241
7.4.4.1;Experimental Database;241
7.4.4.2;Test Groups Construction;241
7.4.4.3;Parameters of the Experiment;241
7.4.4.4;Results Summary;242
7.4.4.5;Results Discussion;242
7.4.5;Conclusions;244
7.4.6;References;244
7.5;Automatic Left Ventricle Segmentation in T2 Weighted CMR Images;245
7.5.1;Introduction;245
7.5.2;Automatic Left Ventricle Segmentation System;246
7.5.2.1;Pre-processing and Centre Point Detection;246
7.5.2.2;Left Ventricle Segmentation;248
7.5.3;Experimental Result;250
7.5.4;Conclusion and Remarks;251
7.5.5;References;252
7.6;Research of Muscular Activity during Gait of Persons with Cerebral Palsy;253
7.6.1;Introduction;253
7.6.2;Methodology;254
7.6.3;Results and Discussion;255
7.6.4;Conclusions;258
7.6.5;References;259
7.7;Automated Recognition of Abnormal Structures in WCE Images Based on Texture Most Discriminative Descriptors;260
7.7.1;Introduction;260
7.7.2;Capsule Endoscopy;261
7.7.3;Texture Analysis;262
7.7.4;Vector Supported Convex Hull Method;263
7.7.5;Experiment;264
7.7.6;Results Discussion and Conclusions;265
7.7.7;References;266
7.8;Augmented Reality Interface for Visualization of Volumetric Medical Data;268
7.8.1;Introduction;268
7.8.2;Augmented Reality Environment;269
7.8.3;Real Time Rendering of 3D Data;270
7.8.4;The System Performance Test;271
7.8.5;Conclusion;273
7.8.6;References;274
7.9;Biomedical Computer Vision Using Computer Algebra: Analysis of a Case of Rhinocerebral Mucormycosis in a Diabetic Boy;275
7.9.1;Introduction;275
7.9.2;Image Processing Using Convolution;276
7.9.3;Image Processing Using Deblurring via Diffusion Equation;277
7.9.4;Image Processing Using Geometric Topology;278
7.9.4.1;Image Processing Using Tutte Polynomials for Graphs;279
7.9.4.2;Image Processing Using Khovanov Polynomials for Knots;280
7.9.4.3;Image Processing Using Homology;281
7.9.5;Conclusions;282
7.9.6;References;282
8;Part V: Applications;283
8.1;Adaptive B-Spline Model Based Probabilistic Active Contour for Weld Defect Detection in Radiographic Imaging;284
8.1.1;Introduction;284
8.1.2;Probabilistic Deformable Model;285
8.1.2.1;Probabilistic Image Model;285
8.1.2.2;Bayesian Approach for Contour Estimation;285
8.1.2.3;Case with Fixed $k$;286
8.1.2.4;Case with Adaptive $k$;286
8.1.3;Experimental Results;288
8.1.4;Conclusion;290
8.1.5;References;291
8.2;FONN-Based Affine-Invariant Image Recognition;293
8.2.1;Introduction;293
8.2.2;The Structure of the FONN Classifier;294
8.2.2.1;Invariance to Affine Transformations;295
8.2.3;Experimental Validation;296
8.2.4;Conclusion;300
8.2.5;References;300
8.3;Coarse-Grained Loop Parallelization for Image Processing and Communication Applications;301
8.3.1;Introduction;301
8.3.2;Image Processing and Communication Algorithms in the UTDSP Benchmark;302
8.3.3;Parallelism Extraction Using Iteration Space Slicing;303
8.3.4;Experiments;306
8.3.5;Conclusion;307
8.3.6;References;307
8.4;SMAS - Stereovision Mobility Aid System for People with a Vision Impairment;309
8.4.1;Introduction and Motivation;309
8.4.2;System Architecture;310
8.4.3;Obstacles Detection;310
8.4.3.1;Stereo Matching;311
8.4.3.2;Depth Map Segmentation;311
8.4.3.3;Object Identification;313
8.4.3.4;Risk Management;314
8.4.3.5;Experiments;314
8.4.3.6;Conclusions;315
8.4.4;References;316
8.5;Extracting Symbolic Function Expressions by Means of Neural Networks;317
8.5.1;Introduction;317
8.5.2;Simple Network Using Logarithmic and Exponential Functions;319
8.5.3;Network Based on Reciprocal Activation Functions;321
8.5.4;Learning the Network;322
8.5.5;Conclusions;323
8.5.6;References;324
8.6;Mathematical Morphology in the Process of Musical Notation Recognition;325
8.6.1;Introduction;325
8.6.2;Staff Line Removal Method;326
8.6.3;Preparing an Image to Notes Identification;328
8.6.4;Conclusions;329
8.6.5;References;329
8.7;GPU-Accelerated Object Tracking Using Particle Filtering and Appearance-Adaptive Models;330
8.7.1;Introduction;330
8.7.2;Object Tracking Using Appearance-Adaptive Models in Particle Filter;331
8.7.2.1;Particle Filtering;331
8.7.2.2;Appearance-Adaptive Models;333
8.7.3;Implementation of Object Tracking on GPU;334
8.7.3.1;Programming in CUDA;334
8.7.3.2;Implementation Details;334
8.7.4;Experimental Results;335
8.7.5;Conclusions;336
8.7.6;References;337
8.8;Application of Epipolar Rectification Algorithm in 3D Television;338
8.8.1;Introduction;338
8.8.2;Pinhole Camera Model;339
8.8.3;Proposed Rectification Algorithm;340
8.8.3.1;Camera Calibration;340
8.8.3.2;Coordinate Systems Transposition;340
8.8.3.3;Final Camera Parameters Calculation;342
8.8.3.4;Rectifying Transform Calculation;343
8.8.4;Conclusions;343
8.8.5;References;345
8.9;Crack Detection on Asphalt Surface Image Using Local Minimum Analysis;346
8.9.1;Introduction;346
8.9.2;Proposed Algorithm;347
8.9.2.1;Local Minimum Searching;347
8.9.2.2;Verification Process;348
8.9.3;Experimental Results;349
8.9.4;Conclusions;351
8.9.5;References;351
8.10;Eye Tracking System for Human Computer Interaction;353
8.10.1;Introduction;353
8.10.2;Object Detection;355
8.10.3;Pupil Center Detection;357
8.10.4;OpenCV Functions Used in Our System;358
8.10.5;Cursor Movement;359
8.10.6;Conclusions;360
8.10.7;References;361
9;Part VI: Communications;362
9.1;Errors Nature in Indoors Low Power 433 MHz Wireless Network;363
9.1.1;Introduction;363
9.1.2;The Study in More Detail;364
9.1.3;Packet Error Analysis;365
9.1.4;Frame Error Analysis;366
9.1.5;Frame Error Analysis;367
9.1.6;Conclusions;368
9.1.7;References;368
9.2;Using Google Earth for Visualization in FTTH Network Planning;369
9.2.1;Introduction;369
9.2.2;The Network Planning Process;370
9.2.3;Google Earth and Its Data Formats;372
9.2.4;Transformation Process;374
9.2.4.1;Application Examples;374
9.2.5;Conclusion;377
9.2.6;References;378
9.3;The Development of a Platform Based on Wireless Sensors Network and ZigBee Protocol for the Easy Detection of the Forest Fire. A Case Study;380
9.3.1;Introduction;380
9.3.2;Sensors Networks (WSN) Technology and the ZigBee Communication Protocol;381
9.3.3;The Platform;381
9.3.3.1;The Communication Network;381
9.3.3.2;The Wireless Sensor Network;383
9.3.3.3;The Reception Center;384
9.3.4;Programming the Nodes;384
9.3.5;System Architecture;385
9.3.6;Presentation of Data;387
9.3.7;References;388
9.4;Mazovia Broadband Network (MBN Network). Case Study;389
9.4.1;Introduction;389
9.4.2;Estimation of Total Volume IP Traffic Carried in MBN Network;390
9.4.3;MBN Network Implementation;393
9.4.4;MBN Architecture and Traffic Transfer in the Network;396
9.4.5;MBN Network Options and Active Equipment Configuration;397
9.4.6;Construction Cost for the Various Network Options;401
9.4.7;Conclusion;403
9.4.8;References;403
9.5;The Method of GMPLS Network Reliability Evaluation;405
9.5.1;Introduction;405
9.5.1.1;The GMPLS Network Architecture;406
9.5.1.2;Reliability Evaluation for Complex Systems;406
9.5.2;GMPLS as Multistate System;407
9.5.3;Example of Reliability Evaluation;408
9.5.3.1;Example 1;409
9.5.3.2;Example 2;409
9.5.4;Conclusions;411
9.5.5;References;411
9.6;The Improved Least Interference Routing Algorithm;413
9.6.1;Introduction;413
9.6.2;LSP Choice Algorithms;414
9.6.3;Proposed Algorithm of LSPs Choice;416
9.6.4;Obtained Results;417
9.6.5;Conclusions;420
9.6.6;References;421
9.7;Comparison of Modified Degree 6 Chordal Rings;422
9.7.1;Introduction;422
9.7.2;Background;423
9.7.3;Other Modified Topologies of Chordal Rings 6th Nodal Dergree;425
9.7.4;Comparison of Sixth Nodal Degree Chordal Rings;430
9.7.5;Conclusions;431
9.7.6;References;431
9.8;Evaluation of Measurement Based Admission Control Algorithms for IEEE 802.16 Networks in Simulations with L2S Physical Layer Abstraction and nbLDPC Codes;433
9.8.1;Introduction;433
9.8.2;Previous Work;434
9.8.3;ARAC with MCS and Connection State Control (ARAC) and ARAC Without MCS and Connection State Control (nscARAC);435
9.8.3.1;Introduction;435
9.8.3.2;Simulation Parameters and Results;436
9.8.3.3;Results Discussion and Conclusions;437
9.8.4;Performance Comparison of ARAC and EMAC;440
9.8.4.1;Introduction;440
9.8.4.2;Simulation Parameters and Results;441
9.8.4.3;Results Discussion and Conclusions;442
9.8.5;Future Work;444
9.8.6;References;444
9.9;The Gap between Packet Level QoS and Objective QoE Assessment of WWW on Mobile Devices;446
9.9.1;Introduction;446
9.9.2;Related Work;447
9.9.3;Market Analysis;448
9.9.4;Regulations and Standards (QoE/QoS) in Mobile Networks;448
9.9.5;Methodology;449
9.9.6;Results;451
9.9.7;Conclusions;452
9.9.8;References;453
9.10;Evaluation of Smoothing Algorithms for a RSSI-Based Device-Free Passive Localisation;454
9.10.1;Introduction;454
9.10.2;Initial Measurements;456
9.10.3;Evaluation;458
9.10.4;Conclusion;459
9.10.5;References;460
9.11;Performance Evaluation of ADS System Based on Redundant Dictionary;462
9.11.1;Introduction;462
9.11.2;Anomaly Detection Algorithm Based on Redundant Dictionary of Base Functions;463
9.11.3;Evaluation of the Proposed ADS Methodology;465
9.11.4;Comparison of the Matching Pursuit with Standard DWT Using 15 Traffic Parameters;467
9.11.5;Conclusion;468
9.11.6;References;469
10;Index;470



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.