41 results on '"THRESHOLDING TECHNIQUE"'
Search Results
2. Integration of SAR and multi-spectral imagery in flood inundation mapping – a case study on Kerala floods 2018.
- Author
-
Jacinth Jennifer, Jesudasan, Saravanan, Subbarayan, and Abijith, Devanantham
- Subjects
FLOODS ,DAMS ,RAINFALL ,IMAGE processing - Abstract
Torrential floods had placed a record in the history of Kerala, the state on the south-western coast of India, in 2018. This study focusses primarily on the assessment of flood inundation mapping using the Sentinel-1 SAR imagery applying the Otsu's thresholding algorithm for the Alappuzha region. Though the pre-processing of SAR imagery is difficult, the availability of software and enhanced hardware facilitates efficacy in image processing. Normalized Difference Water Index (NDWI) was computed to aid in differentiating the permanent waterbody from the flooded region. The results implicate the spread of flood-inundated zones has considerably increased in August, thereby indicating the devastating effect of the flood in August. Based on the results obtained, 13.86% area of the region has been covered by flood in August, excluding the permanent water bodies, which is comparatively high compared to the previous months. It is necessary to note that, extreme rainfall accompanied by the full reservoir level of the dams in the region served to be the key to the disaster in August. The resultant flood inundation map could be utilized quite effectively for relief measures and damage assessment. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
3. An Extensive Investigation of Wavelet-based Denoising Techniques for Various ECG Signals Utilizing Thresholding Function
- Author
-
Supraja, V., Nageswara Rao, P., Giriprasad, M. N., Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Pant, Millie, editor, Kumar Sharma, Tarun, editor, Arya, Rajeev, editor, Sahana, B.C., editor, and Zolfagharinia, Hossein, editor
- Published
- 2020
- Full Text
- View/download PDF
4. Association between clinical parameters and size of three-dimensionally reconstructed anatomical abnormalities in patients with lateral epicondylitis: a cross-sectional study
- Author
-
Seok Woo Hong, Jeong-Hyun Kang, Jin Hun Park, Ji Na Kim, Hee Jin Park, and Eugene Kim
- Subjects
Lateral epicondylitis ,Common extensor tendon ,Three-dimensional reconstruction ,Thresholding technique ,Magnetic resonance imaging ,Orthopedic surgery ,RD701-811 ,Diseases of the musculoskeletal system ,RC925-935 - Abstract
Abstract Background The association of the severity of clinical symptoms and level of functional performance with the degree of magnetic resonance imaging abnormalities in patients with lateral epicondylitis has not been fully elucidated. This study aimed to investigate the association between the degree of anatomical abnormalities by evaluating three-dimensional magnetic resonance imaging models of the common extensor tendon and clinical parameters in patients with lateral epicondylitis. Materials and methods A total of 61 patients (24 men and 37 women) with lateral epicondylitis were included in this study. 3-Tesla magnetic resonance imaging was performed for all patients, and clinical parameters, including pain visual analog scale score, Quick Disabilities of Arm, Shoulder and Hand questionnaire score, elbow range of motion, and demographic factors, were evaluated. The proportion of lesion volume of common extensor tendon was adopted for three-dimensional model analysis. To determine the factors associated with clinical parameters, univariate, and multivariate linear regression analyses were performed. Results The proportion of lesion volume of common extensor tendon was not associated with clinical parameters. Gender and muscle edema were independently associated with pain visual analog scale scores. However, demographic factors and magnetic resonance imaging abnormalities were not associated with the Quick Disabilities of Arm, Shoulder, and Hand questionnaire score or elbow range of motion. Conclusions The three-dimensional volumetric lesion size of common extensor tendon was not associated with clinical symptoms and functional performance in patients with lateral epicondylitis. The clinical parameters of lateral epicondylitis may be influenced by several factors.
- Published
- 2021
- Full Text
- View/download PDF
5. A convex selective segmentation model based on a piece-wise constant metric-guided edge detector function
- Author
-
Khan, Muhammad Shahkar, Ali, Haider, Zakarya, Muhammad, Tirunagari, Santosh, Khan, Ayaz Ali, Khan, Rahim, Ahmed, Aftab, and Rada, Lavdie
- Published
- 2023
- Full Text
- View/download PDF
6. A Comparative Study of Vetiveria zizanioides Leaf Segmentation Techniques Using Visible, Infrared, and Thermal Camera Sensors in an Outdoor Environment
- Author
-
Aryuanto Soetedjo and Evy Hendriarianti
- Subjects
leaf segmentation ,visible camera ,NoIR camera ,thermal camera ,thresholding technique ,K-Means ,Technology ,Applied mathematics. Quantitative methods ,T57-57.97 - Abstract
A camera vision system is a fast and effective approach to monitoring leaves. It can be used to monitor plant growth, detect diseases, and conduct plant phenotyping. However, due to the outdoor environment of plants, it becomes challenging to use. This paper addresses the problems of Vetiveria zizanioides leaf segmentation by comparing different camera types and segmentation techniques. Visible, no infrared filter (NoIR), and thermal cameras interfaced in an embedded device were used to capture plants during the day and at night. Several popular thresholding techniques and the K-Means algorithm were employed for leaf segmentation, and their performance was measured using Recall, Precision, and F1 score. The comparison results show that the visible camera achieved the best performance on daytime images, with the highest Recall of 0.934 using Triangle thresholding, the highest Precision of 0.751 using K-Means (K = 3), and the highest F1 score of 0.794 using Multi-Otsu thresholding. For nighttime images, the highest Recall of 0.990 was achieved by the thermal camera using Isodata and Otsu thresholding, the highest Precision of 0.572 was achieved by the NoIR camera using K-Means (K = 3), and the highest F1 score of 0.636 was achieved by the NoIR camera using K-Means (K = 3). To compare the leaf segmentation performance of the thresholding techniques and the K-Means algorithm between our image dataset and the well-known plant image dataset, we also evaluated the methods using the Ara2012 image dataset. The results showed that K-Means (K-3) achieved the best performance. The execution time of K-Means was about 3 s, which was longer than the thresholding techniques. However, it is still acceptable for the real-time plant monitoring system.
- Published
- 2022
- Full Text
- View/download PDF
7. Face Recognition for Varying Illumination and Different Optical Zoom Using a Combination of Binary and Geometric Features
- Author
-
Fatimah Khalid, Noor Amjeed, Rahmita Wirza O.K. Wirza, Hizmawati Madzin, and Illiana Azizan
- Subjects
Face recognition ,illumination variation ,smartphone database ,thresholding technique ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Preservation of image features caused by binary conversion is a difficult task under variation of illumination conditions. Several binary conversion-based methods have used an adaptive thresholding technique to improve their performance under illumination variation conditions because of its robustness. However, the performances of existing methods were still limited under high differences illumination conditions especially for uncontrolled lighting sources. In addition, various length of face-to-camera distance gives significant problem affect for the performance of face recognition method. It happens when various images are available for the same person with different length face-to-camera distances due to the appearance of varying facial features of the same person. Therefore, this study proposed to combine the strength normalization and feature-based method to build an illumination distribution model to overcome this problem. With the proposed method the illumination model will fit with variation of illumination conditions in a whole image to generate an adaptive threshold for a novel columnar binary conversion method. The proposed method consists of five main stages, starting with eye area detection using the developed Viola-Jones algorithm. Next, the iris is detected using the Circular Hough Transform (CHT) method and will convert it into binary using the proposed Columnar Binary Conversion (CBC) method to preserve the appearance of the facial features under the illumination variation. Then, the proposed Facial Feature Region Normalization (FFRN) method is performed to improve the effects of different optical zooms for the classification step. The classification is conducted based on the similarity measurement between the extracted normalised binary face region and the dataset that must be converted into their equivalent normalised binary images. The proposed method is evaluated on two different smartphone databases, namely as Smartphone Face Video (SFV) and MOBIO. The performance results showed the outperformance of the proposed method.
- Published
- 2020
- Full Text
- View/download PDF
8. Association between clinical parameters and size of three-dimensionally reconstructed anatomical abnormalities in patients with lateral epicondylitis: a cross-sectional study.
- Author
-
Hong, Seok Woo, Kang, Jeong-Hyun, Park, Jin Hun, Kim, Ji Na, Park, Hee Jin, and Kim, Eugene
- Subjects
STATISTICS ,THREE-dimensional imaging ,RANGE of motion of joints ,STRUCTURAL models ,MULTIPLE regression analysis ,PLASTIC surgery ,MAGNETIC resonance imaging ,VISUAL analog scale ,QUESTIONNAIRES ,TENNIS elbow - Abstract
Background: The association of the severity of clinical symptoms and level of functional performance with the degree of magnetic resonance imaging abnormalities in patients with lateral epicondylitis has not been fully elucidated. This study aimed to investigate the association between the degree of anatomical abnormalities by evaluating three-dimensional magnetic resonance imaging models of the common extensor tendon and clinical parameters in patients with lateral epicondylitis. Materials and methods: A total of 61 patients (24 men and 37 women) with lateral epicondylitis were included in this study. 3-Tesla magnetic resonance imaging was performed for all patients, and clinical parameters, including pain visual analog scale score, Quick Disabilities of Arm, Shoulder and Hand questionnaire score, elbow range of motion, and demographic factors, were evaluated. The proportion of lesion volume of common extensor tendon was adopted for three-dimensional model analysis. To determine the factors associated with clinical parameters, univariate, and multivariate linear regression analyses were performed. Results: The proportion of lesion volume of common extensor tendon was not associated with clinical parameters. Gender and muscle edema were independently associated with pain visual analog scale scores. However, demographic factors and magnetic resonance imaging abnormalities were not associated with the Quick Disabilities of Arm, Shoulder, and Hand questionnaire score or elbow range of motion. Conclusions: The three-dimensional volumetric lesion size of common extensor tendon was not associated with clinical symptoms and functional performance in patients with lateral epicondylitis. The clinical parameters of lateral epicondylitis may be influenced by several factors. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
9. Algorithm for automatic recognition of PSK and QAM with unique classifier based on features and threshold levels.
- Author
-
Ali, Ahmed K. and Erçelebi, Ergun
- Subjects
PHASE shift keying ,QUADRATURE amplitude modulation ,DECISION trees ,AUTOMATIC classification ,SIGNAL-to-noise ratio ,COMPUTATIONAL complexity - Abstract
In this paper, we present a unique modulation classification method that is based on determining an attractive relation between higher-order cumulants (HOCs) using a decision tree-classifier to improve the extracted features employed for the recognition of modulation schemes, such as phase shift keying (PSK) and quadrature amplitude modulation (QAM). A threshold algorithm is applied to the proposed classifier, which consists of sub-classifiers, each comprising a single feature, and each being capable of distinguishing the modulation types individually. In this work, a high-accuracy classifier system is utilized to recognize modulation schemes, such as QAM (16, 32, 64, 128, and 256) and (2, 4, and 8) PSK at a low signal-to-noise ratio (SNR). In this study, 1000 signals are studied for each SNR of –5 dB to 30 dB. The most prominent results of the classifier decisions range from 88% to 100% with regard to distinguishing the same types of PSK and QAM. In the long run, the proposed classifier module will be advantageous in terms of accuracy and computational complexity relative to the other classifiers in the literature. The results demonstrate that the proposed algorithm has a significantly better classification accuracy in comparison with the previously proposed ones. • A new method for automatic modulation classification is presented. • Optimize the extracted features distribution using logarithmic properties. • Multiple logarithmic hierarchical classifier outperforms over conventional classifiers. • Enhanced classification performance through multiple tree algorithm. • Simulation results confirmed the efficiency of the proposed algorithm under different noise scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
10. Weighted Extrapolation Techniques for Finite Difference Methods on Complex Domains with Cartesian Meshes
- Author
-
Baeza, A., Mulet, P., Zorío, D., Formaggia, Luca, Editor-in-chief, Gerbeau, Jean-Frédéric, Series editor, Martinez-Seara Alonso, Tere, Series editor, Parés, Carlos, Series editor, Pareschi, Lorenzo, Series editor, Pedregal, Pablo, Editor-in-chief, Tosin, Andrea, Series editor, Vazquez, Elena, Series editor, Zubelli, Jorge P., Series editor, Zunino, Paolo, Series editor, Ortegón Gallego, Francisco, editor, Redondo Neble, María Victoria, editor, and Rodríguez Galván, José Rafael, editor
- Published
- 2016
- Full Text
- View/download PDF
11. Thresholding technique for flood extent mapping using dual polarization ENVISAT ASAR data.
- Author
-
Gopi, P., Yarrakula, Kiran, and Rao, Y. R. S.
- Subjects
SYNTHETIC aperture radar ,THRESHOLDING algorithms ,FLOODS ,CLIMATE change ,STREAMFLOW - Abstract
The research paper explores an optimum water extraction technique using synthetic aperture radar (SAR) data to give the flood inundation map for irregular flood scenario, in which the planned algorithm depends on thresholding technique using MRS amplitude SAR data. For classification, supervised maximum likelihood method is used, and gamma filtering technique was used for speckle removal. Since water layer in SAR data has low amplitude value, thresholding technique for amplitude SAR data could efficiently take out water layer. The mean backscatter basics of water layers in SAR data is not to be compared with inundated regions caused by sharp release and is not considered as a terrain value. The speckle filtering method was used for the power generated noise subtraction using a window size 5x5. The threshold values were calculated from backscatter values and their average was taken as threshold, which gives clear difference of backscatter values between the land and the water in the river and the flood plain areas. The maximum likelihood classifier provides 99% overall accuracy. The Landsat 5 TM data was used in this research for delineating water feature and flood accurately. The results obtained from SAR data were validated with Landsat TM data. Finally, the flood inundation map using optical data and SAR data was generated. [ABSTRACT FROM AUTHOR]
- Published
- 2019
12. A New Method to Improve Quality of Reconstructed Images in Tomography
- Author
-
Ouaddah, Ahlem, Boughaci, Dalila, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Kobsa, Alfred, editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Weikum, Gerhard, editor, Zhang, Yongjie Jessica, editor, and Tavares, João Manuel R. S., editor
- Published
- 2014
- Full Text
- View/download PDF
13. Quantification of Vascular Calcifications on Digitized Mammograms
- Author
-
Nava, Enrique, Barba, Irene, Sendra, Francisco, Gómez–Rebollo, Celestino, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Martí, Joan, editor, Oliver, Arnau, editor, Freixenet, Jordi, editor, and Martí, Robert, editor
- Published
- 2010
- Full Text
- View/download PDF
14. Image Thresholding
- Author
-
Mitchell, H. B. and Mitchell, H. B.
- Published
- 2010
- Full Text
- View/download PDF
15. A Robust Method for Automatically Detecting Cracks on Noisy Concrete Surfaces
- Author
-
Fujita, Yusuke, Hamamoto, Yoshihiko, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Goebel, Randy, editor, Siekmann, Jörg, editor, Wahlster, Wolfgang, editor, Chien, Been-Chian, editor, Hong, Tzung-Pei, editor, Chen, Shyi-Ming, editor, and Ali, Moonis, editor
- Published
- 2009
- Full Text
- View/download PDF
16. Multi-Scale Image Analysis Applied to Radioastronomical Interferometric Data
- Author
-
Peracaula, Marta, Martí, Joan, Freixenet, Jordi, Martí, Josep, Paredes, Josep M., Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Araujo, Helder, editor, Mendonça, Ana Maria, editor, Pinho, Armando J., editor, and Torres, María Inés, editor
- Published
- 2009
- Full Text
- View/download PDF
17. Image Threshold Computation by Modelizing Knowledge/Unknowledge by Means of Atanassov’s Intuitionistic Fuzzy Sets
- Author
-
Bustince, Humberto, Pagola, Miguel, Melo-Pinto, Pedro, Barrenechea, Edurne, Couto, Pedro, Kacprzyk, Janusz, editor, Bustince, Humberto, editor, Herrera, Francisco, editor, and Montero, Javier, editor
- Published
- 2008
- Full Text
- View/download PDF
18. Card Images Binarization Based on Dual-Thresholding Identification
- Author
-
Liu, Chunmei, Miao, Duoqian, Wang, Chunheng, Carbonell, Jaime G., editor, Siekmann, Jörg, editor, Huang, De-Shuang, editor, Wunsch, Donald C., II, editor, Levine, Daniel S., editor, and Jo, Kang-Hyun, editor
- Published
- 2008
- Full Text
- View/download PDF
19. 3D Reconstruction on MRI to Analyse Marbling and Fat Level in Iberian Loin
- Author
-
Ávila, M. M., Durán, M. L., Antequera, T., Palacios, R., Luquero, M., Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Rangan, C. Pandu, editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Martí, Joan, editor, Benedí, José Miguel, editor, Mendonça, Ana Maria, editor, and Serrat, Joan, editor
- Published
- 2007
- Full Text
- View/download PDF
20. Restoring Ink Bleed-Through Degraded Document Images Using a Recursive Unsupervised Classification Technique
- Author
-
Fadoua, Drira, Le Bourgeois, Frank, Emptoz, Hubert, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Bunke, Horst, editor, and Spitz, A. Lawrence, editor
- Published
- 2006
- Full Text
- View/download PDF
21. Image Thresholding via a Modified Fuzzy C-Means Algorithm
- Author
-
Yang, Yong, Zheng, Chongxun, Lin, Pan, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Sanfeliu, Alberto, editor, Martínez Trinidad, José Francisco, editor, and Carrasco Ochoa, Jesús Ariel, editor
- Published
- 2004
- Full Text
- View/download PDF
22. Bleed-Through Removal from Degraded Documents Using a Color Decorrelation Method
- Author
-
Tonazzini, Anna, Salerno, Emanuele, Mochi, Matteo, Bedini, Luigi, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Marinai, Simone, editor, and Dengel, Andreas R., editor
- Published
- 2004
- Full Text
- View/download PDF
23. Oral Contrast
- Author
-
Dachman, Abraham H. and Dachman, Abraham H., editor
- Published
- 2003
- Full Text
- View/download PDF
24. Association between clinical parameters and size of three-dimensionally reconstructed anatomical abnormalities in patients with lateral epicondylitis: a cross-sectional study
- Author
-
Eugene Kim, Seok Woo Hong, Hee Jin Park, Jin Hun Park, Ji Na Kim, and Jeong-Hyun Kang
- Subjects
Adult ,Male ,medicine.medical_specialty ,Adolescent ,Visual analogue scale ,Elbow ,Diseases of the musculoskeletal system ,Three-dimensional reconstruction ,Common extensor tendon ,Lesion ,Tendons ,03 medical and health sciences ,Young Adult ,0302 clinical medicine ,Imaging, Three-Dimensional ,Magnetic resonance imaging ,Surveys and Questionnaires ,medicine ,Humans ,Orthopedics and Sports Medicine ,Lateral epicondylitis ,030212 general & internal medicine ,Range of Motion, Articular ,Aged ,Orthopedic surgery ,medicine.diagnostic_test ,business.industry ,Epicondylitis ,Tennis Elbow ,Middle Aged ,medicine.disease ,Thresholding technique ,medicine.anatomical_structure ,Cross-Sectional Studies ,RC925-935 ,Surgery ,Female ,Radiology ,medicine.symptom ,business ,Range of motion ,030217 neurology & neurosurgery ,RD701-811 ,Research Article - Abstract
Background The association of the severity of clinical symptoms and level of functional performance with the degree of magnetic resonance imaging abnormalities in patients with lateral epicondylitis has not been fully elucidated. This study aimed to investigate the association between the degree of anatomical abnormalities by evaluating three-dimensional magnetic resonance imaging models of the common extensor tendon and clinical parameters in patients with lateral epicondylitis. Materials and methods A total of 61 patients (24 men and 37 women) with lateral epicondylitis were included in this study. 3-Tesla magnetic resonance imaging was performed for all patients, and clinical parameters, including pain visual analog scale score, Quick Disabilities of Arm, Shoulder and Hand questionnaire score, elbow range of motion, and demographic factors, were evaluated. The proportion of lesion volume of common extensor tendon was adopted for three-dimensional model analysis. To determine the factors associated with clinical parameters, univariate, and multivariate linear regression analyses were performed. Results The proportion of lesion volume of common extensor tendon was not associated with clinical parameters. Gender and muscle edema were independently associated with pain visual analog scale scores. However, demographic factors and magnetic resonance imaging abnormalities were not associated with the Quick Disabilities of Arm, Shoulder, and Hand questionnaire score or elbow range of motion. Conclusions The three-dimensional volumetric lesion size of common extensor tendon was not associated with clinical symptoms and functional performance in patients with lateral epicondylitis. The clinical parameters of lateral epicondylitis may be influenced by several factors.
- Published
- 2021
25. Blood Vessel Detection in Retinal Images by Shape-Based Multi-Threshold Probing
- Author
-
Jiang, Xiaoyi, Mojon, Daniel, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Radig, Bernd, editor, and Florczyk, Stefan, editor
- Published
- 2001
- Full Text
- View/download PDF
26. Detection of Coal Fire Dynamics and Propagation Direction from Multi-Temporal Nighttime Landsat SWIR and TIR Data: A Case Study on the Rujigou Coalfield, Northwest (NW) China
- Author
-
Hongyuan Huo, Xiaoguang Jiang, Xianfeng Song, Zhao-Liang Li, Zhuoya Ni, and Caixia Gao
- Subjects
multi-temporal remote sensing ,dynamics ,coal fires ,thresholding technique ,TM ,ETM+ ,Science - Abstract
Coal fires are common and serious phenomena in most coal-producing countries in the world. Coal fires not only burn valuable non-renewable coal reserves but also severely affect the local and global environment. The Rujigou coalfield in Shizuishan City, Ningxia, NW China, is well known for being a storehouse of anthracite coal. This coalfield is also known for having more coal fires than most other coalfields in China. In this study, an attempt was made to study the dynamics of coal fires in the Rujigou coalfield, from 2001 to 2007, using multi-temporal nighttime Landsat data. The multi-temporal nighttime short wave infrared (SWIR) data sets based on a fixed thresholding technique were used to detect and monitor the surface coal fires and the nighttime enhanced thematic mapper (ETM+) thermal infrared (TIR) data sets, based on a dynamic thresholding technique, were used to identify the thermal anomalies related to subsurface coal fires. By validating the coal fires identified in the nighttime satellite data and the coal fires extracted from daytime satellite data with the coal fire map (CFM) manufactured by field survey, we found that the results from the daytime satellite data had higher omission and commission errors than the results from the nighttime satellite data. Then, two aspects of coal fire dynamics were analyzed: first, a quantitative analysis of the spatial changes in the extent of coal fires was conducted and the results showed that, from 2001 to 2007, the spatial extent of coal fires increased greatly to an annual average area of 0.167 km2; second, the spreading direction and propagation of coal fires was analyzed and predicted from 2001 to 2007, and these results showed that the coal fires generally spread towards the north or northeast, but also spread in some places toward the east.
- Published
- 2014
- Full Text
- View/download PDF
27. Processing of the Connected Shapes in Raster-to-Vector Conversion Process
- Author
-
Adam, Sébastien, Mullot, Rémy, Ogier, Jean-Marc, Cariou, Claude, Gardes, Joël, Lecourtier, Yves, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Chhabra, Atul K., editor, and Dori, Dov, editor
- Published
- 2000
- Full Text
- View/download PDF
28. Automatic Landmarking of Cortical Sulci
- Author
-
Beeston, C. J., Taylor, C. J., Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Delp, Scott L., editor, DiGoia, Anthony M., editor, and Jaramaz, Branislav, editor
- Published
- 2000
- Full Text
- View/download PDF
29. Massaging a linear programming solution to give a 2-approximation for a generalization of the vertex cover problem
- Author
-
Bshouty, Nader H., Burroughs, Lynn, Goos, G., editor, Hartmanis, J., editor, van Leeuwen, J., editor, Morvan, Michel, editor, Meinel, Christoph, editor, and Krob, Daniel, editor
- Published
- 1998
- Full Text
- View/download PDF
30. Development of a New Method for the Inspection of a 3D Volume of Ultrasonic Data
- Author
-
Moysan, J., Corneloup, G., Guerault, F., Roy, O., Thompson, Donald O., editor, and Chimenti, Dale E., editor
- Published
- 1996
- Full Text
- View/download PDF
31. Crest lines detection by valleys spreading
- Author
-
Piegay, E., Selmaoui, N., Leschi, C., Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Hlaváč, Václav, editor, and Šára, Radim, editor
- Published
- 1995
- Full Text
- View/download PDF
32. Face Recognition for Varying Illumination and Different Optical Zoom Using a Combination of Binary and Geometric Features
- Author
-
Rahmita Wirza, Hizmawati Madzin, Illiana Azizan, Fatimah Khalid, and Noor Amjeed
- Subjects
Normalization (statistics) ,illumination variation ,General Computer Science ,Computer science ,Normalization (image processing) ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Binary number ,smartphone database ,02 engineering and technology ,Facial recognition system ,Hough transform ,law.invention ,law ,Robustness (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Face recognition ,business.industry ,Binary image ,General Engineering ,thresholding technique ,020207 software engineering ,Pattern recognition ,Thresholding ,Feature (computer vision) ,020201 artificial intelligence & image processing ,Artificial intelligence ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 - Abstract
Preservation of image features caused by binary conversion is a difficult task under variation of illumination conditions. Several binary conversion-based methods have used an adaptive thresholding technique to improve their performance under illumination variation conditions because of its robustness. However, the performances of existing methods were still limited under high differences illumination conditions especially for uncontrolled lighting sources. In addition, various length of face-to-camera distance gives significant problem affect for the performance of face recognition method. It happens when various images are available for the same person with different length face-to-camera distances due to the appearance of varying facial features of the same person. Therefore, this study proposed to combine the strength normalization and feature-based method to build an illumination distribution model to overcome this problem. With the proposed method the illumination model will fit with variation of illumination conditions in a whole image to generate an adaptive threshold for a novel columnar binary conversion method. The proposed method consists of five main stages, starting with eye area detection using the developed Viola–Jones algorithm. Next, the iris is detected using the Circular Hough Transform (CHT) method and will convert it into binary using the proposed Columnar Binary Conversion (CBC) method to preserve the appearance of the facial features under the illumination variation. Then, the proposed Facial Feature Region Normalization (FFRN) method is performed to improve the effects of different optical zooms for the classification step. The classification is conducted based on the similarity measurement between the extracted normalised binary face region and the dataset that must be converted into their equivalent normalised binary images. The proposed method is evaluated on two different smartphone databases, namely as Smartphone Face Video (SFV) and MOBIO. The performance results showed the outperformance of the proposed method.
- Published
- 2020
33. Soft, Hard and Block Thresholding Techniques for Denoising of Mammogram Images.
- Author
-
Saha, Manas, Naskar, Mrinal Kanti, and Chatterji, B. N.
- Subjects
- *
MAMMOGRAMS , *BREAST cancer diagnosis , *SIGNAL denoising , *WAVELET transforms , *CURVELET transforms , *THRESHOLDING algorithms - Abstract
Mammogram is an easy and affordable means of diagnosis of breast cancer. Like other medical data, it is also affected by noise during acquisition. Therefore, it is a challenge for the researchers to denoise the mammograms for clear data extraction. This paper aims at denoising the mammogram by the wavelet and the curvelet transform with a motive to investigate the role of the “embedded” thresholding algorithm. As the thresholding technique is a key factor for the noise reduction, a comprehensive study on the employment of the different types of the thresholding techniques with the transforms have been presented methodically. A standard mammogram from the Mammographic Image Analysis Society database is supplemented with different types of noise and then denoised by the wavelet and the curvelet transforms using the three commonly used thresholding techniques to compare the denoising performance of the thresholding algorithms along with the transforms. This investigation renders a clear insight to the selection of the thresholding technique while denoising the mammogram with the transform. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
- Full Text
- View/download PDF
34. Atmospheric correction of remotely sensed multispectral satellite images in transform domain.
- Author
-
Gandhimathi@Usha, S., Vasuki, S., and Ariputhiran, Gowri
- Abstract
Remote sensing data provides much essential and critical information for monitoring many applications such as change detection, image fusion and land cover classification. Remotely sensed images are degraded due to the atmospheric effects. The atmospheric correction is one of the important pre processing steps to extract full spectral information from the remotely sensed images. In this paper, transform domain approaches are presented for the removal of atmospheric influences. Soft thresholding technique is adopted in wavelet transform method and gaussian high pass filter is used in homomorphic filtering. The results are tested on Landsat image consisting of 7 multispectral bands and their performance is evaluated using visual and statistical measures. The comparative analysis is done based on statistical parameters such as mean square error (MSE), peak signal to noise ratio (PSNR). Our result shows that wavelet transform is better for the removal of atmospheric effects than homomorphic filtering. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
35. Segmentation of immunohistochemical staining of β-catenin expression of oral cancer using Gabor filter technique.
- Author
-
Shahul Hameed, K.A., Banumathi, A., and Ulaganathan, G.
- Abstract
In this paper, a system for diagnosis of oral cancer has been developed using Gabor filter technique. The microscopic images of immunohistochemical staining of β-catenin expression are segmented using a bank of Gabor filter tuned to different spatial frequencies and orientation in order to decompose the image into number of filtered image to obtain feature image. To produce segmented image Fuzzy C-means (FCM) , K-means (KM) and Thresholding (Th) techniques are applied. To evaluate the segmentation process, an objective quantitative evaluation function F for the segmented textured images using Gabor FCM, KM, Th (GFCM, GKM, GTh) is determined by varying number of regions. Based on the evaluation process we conclude that GKM algorithm is efficient technique to help the pathologist to evaluate the histological changes on microscopic images of oral cancer. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
36. Skin Segmentation Using YUV and RGB Color Spaces.
- Author
-
Al-Tairi, Zäher Hamid, Rahmat, Rahmita Wirza, Saripan, M. Iqbal, and Sulaiman, Puteri Suhaiza
- Subjects
HUMAN skin color ,IMAGE segmentation ,HUMAN facial recognition software ,HUMAN-computer interaction ,THRESHOLDING algorithms ,LUMINANCE (Photometry) - Abstract
Skin detection is used in many applications, such as face recognition, hand tracking, and human-computer interaction. There are many skin color detection algorithms that are used to extract human skin color regions that are based on the thresholding technique since it is simple and fast for computation. The efficiency of each color space depends on Its robustness to the change in lighting and the ability to distinguish skin color pixels in images that have a complex background. For more accurate skin detection, we are proposing a new threshold based on RGB and YUV color spaces. The proposed approach starts by converting the RGB color space to the YUV color model. Then it separates the Y channel, which represents the intensity of the color model from the U and V channels to eliminate the effects of luminance. After that the threshold values are selected based on the testing of the boundary of skin colors with the help of the color histogram. Finally, the threshold was applied to the input image to extract skin parts. The detected skin regions were quantitatively compared to the actual skin parts in the input images to measure the accuracy and to compare the results of our threshold to the results of other's thresholds to prove the efficiency of our approach. The results of the experiment show that the proposed threshold is more robust in terms of dealing with the complex background and light conditions than others. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
37. Test suite prioritisation using trace events technique.
- Author
-
Rajarathinam, Kavitha and Natarajan, Sureshkumar
- Abstract
The size of the test suite and the duration of time determines the time taken by the regression testing. Conversely, the testers can prioritise the test cases by the use of a competent prioritisation technique to obtain an increased rate of fault detection in the system, allowing for earlier corrections, and getting higher overall confidence that the software has been tested suitably. A prioritised test suite is more likely to be more effective during that time period than would have been achieved via a random ordering if execution needs to be suspended after some time. An enhanced test case ordering may be probable if the desired implementation time to run the test cases is proven earlier. This research work's main intention is to prioritise the regression‐testing test cases. In order to prioritise the test cases some factors are considered here. These factors are employed in the prioritisation algorithm. The trace events are one of the important factors, used to find the most significant test cases in the projects. The requirement factor value is calculated and subsequently a weightage is calculated and assigned to each test case in the software based on these factors by using a thresholding technique. Later, the test cases are prioritised according to the weightage allocated to them. Executing the test cases based on the prioritisation will greatly decreases the computation cost and time. The proposed technique is efficient in prioritising the regression test cases. The new prioritised subsequences of the given unit test suites are executed on Java programs after the completion of prioritisation. Average of the percentage of faults detected is an evaluation metric used for evaluating the 'superiority' of these orderings. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
38. An Enhanced IAF-PNLMS Adaptive Algorithm for Sparse Impulse Response Identification.
- Author
-
das Chagas de Souza, Francisco, Seara, Rui, and Morgan, Dennis R.
- Subjects
- *
MEAN square algorithms , *SPARSE approximations , *ADAPTIVE filters , *THRESHOLDING algorithms , *SYSTEM identification - Abstract
This correspondence presents an individual-activation-factor proportionate normalized least-mean-square (IAF-PNLMS) algorithm that (during the adaptive process) uses a new gain distribution strategy for updating the filter coefficients. This strategy consists of increasing the gain assigned to the inactive coefficients as the active ones approach convergence. For such, whenever a predefined threshold is crossed during the learning process, a new gain distribution is carried out, rather than to assign gains proportional to coefficient magnitudes as the IAF-PNLMS algorithm does. This new version of the IAF-PNLMS algorithm leads to a better distribution of the adaptation energy over the whole learning process. As a consequence, for impulse responses exhibiting high sparseness, the proposed algorithm achieves faster convergence, outperforming the IAF-PNLMS and other well-known PNLMS-type algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
39. Estimating Local Intrinsic Dimensionality Using Thresholding Techniques
- Author
-
Goel, A., Rao, S. S., Passamante, A., Abraham, Neal B., editor, Albano, Alfonso M., editor, Passamante, Anthony, editor, and Rapp, Paul E., editor
- Published
- 1989
- Full Text
- View/download PDF
40. Fragile Watermarking for Color Images Using Thresholding Technique
- Author
-
Kuo-Cheng Liu
- Subjects
thresholding technique ,tamper proofing ,tamper recovery - Abstract
In this paper, we propose ablock-wise watermarking scheme for color image authentication to resist malicious tampering of digital media. The thresholding technique is incorporated into the scheme such that the tampered region of the color image can be recovered with high quality while the proofing result is obtained. The watermark for each block consists of its dual authentication data and the corresponding feature information. The feature information for recovery iscomputed bythe thresholding technique. In the proofing process, we propose a dual-option parity check method to proof the validity of image blocks. In the recovery process, the feature information of each block embedded into the color image is rebuilt for high quality recovery. The simulation results show that the proposed watermarking scheme can effectively proof the tempered region with high detection rate and can recover the tempered region with high quality., {"references":["C.-T. Li and Huayin Si, \"Wavelet-based fragile watermarking scheme\nfor image authentication,\"Journal Electron. Imaging, vol. 16, no. 1,\n013009, 2007.","H.-J. He, J.-S. Zhang, and F. Chen, \"Adjacent-block based statistical\ndetection method for self-embedding watermarking techniques,\"\nSignal Processing, vol. 89, no. 8, pp. 1557-1566, 2009.","P.-L. Lin, C.-K. Hsieh, and P.-W. Huang, \"A hierarchical digital\nwatermarking method for image tamper detection and recovery,\"\nPattern Recognition, vol. 38, pp. 2519-2529, 2005.","S. D. Lin, Y.-C. Kuo, and M.-H. Yao, \"An image watermarking\nscheme with tamper detection and recovery,\" Int. Journal of\nInnovative Computing, Information and Control, vol. 3, no. 6, pp.\n1379-1387, 2007.","C.-C. Chang, Y.-H. Fan, W.-L. Tai, \"Four-scanning Attack on\nHierarchical Digital Watermarking Method for Image Tamper\nDetection and Recovery,\" Pattern Recognition, Vol.41, No.2, pp. 654-\n661, 2008.","T.-Y. Lee and S. D. Lin, \"Dual watermark for tamper detection and\nrecovery,\" Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, 2008.","H. He, F. Chen, H.-M. Tai, T. Kalker, and J. Zhang, \"Performance\nanalysis of a block-neighborhood-based self-recovery fragile\nwatermarking scheme,\" IEEE Trans. Information Forensics and\nSecurity, vol. 7, no. 1, pp.185-196, 2012.","M. S. Wang and W. C. Chen, \"A majority-voting based watermarking\nscheme for color image tamper detection and recovery,\" Computer\nStandards & Interfaces, vol. 29, pp. 561-571, 2007.","H. Mirza, H. Thai, and Z. Nakao, \"Color image watermarking and\nself-recovery based on independent component analysis,\" Lecture\nNotes in Computer Science, vol. 5097, pp. 839-849, 2008.\n[10] N. Wang and C.-H. Kim, \"Color image of tamper detection and\nrecovery using block-based watermarking,\"in Proc. Int. Conf.\nEmbedded and Multimedia Computing, 2009, pp. 1-6.\n[11] N. Wang and C.-H. Kim, \"Tamper detection and self-recovery\nalgorithm of color image based on robust embedding of dual visual\nwatermarks using DWT-SVD,\"in Proc. Int. Symp. Communications\nand Information Technology, 2009, pp. 157-162.\n[12] M. Iwata, T. Hori, A. Shiozaki, and A. Ogihara, \"Digital\nwatermarking method for tamper detection and recovery of JPEG\nimages,\"in Proc. Int. Symp. Information Theory and its Applications,\n2010, pp. 309-314.\n[13] Z. Qian, G. Feng, and Y. Ren, \"Fragile watermarking for color image\nrecovery based on color filter array interpolation,\"Lecture Notes in\nComputer Science, vol. 6184, pp. 537-543, 2010.\n[14] W.-H. Tsai, \"Moment-preserving thresholding: A new\napproach,\"Computer Vision Graphics, and Image Processing, vol. 29,\npp. 377-393, 1985.\n[15] S.-C. Pei and C.-M. Cheng, \"Color image processing by using binary\nquaternion-moment-preserving thresholding technique,\" IEEE Trans.\nImage Processing, vol. 8, no. 5, pp.614-628, 1999."]}
- Published
- 2012
- Full Text
- View/download PDF
41. Automated segmentation and measurement of global white matter lesion volume in patients with multiple sclerosis
- Author
-
Alfano, B, Brunetti, A, Larobina, M, Quarantelli, Tedeschi, E, Ciarmiello, Covelli, Salvatore, Alfano, B, Brunetti, Arturo, Larobina, M, Quarantelli, M, Tedeschi, Enrico, Ciarmiello, A, Covelli, Em, and Salvatore, Marco
- Subjects
Adult ,Male ,medicine.medical_specialty ,FEATURE MAP ,QUANTITATIVE FOLLOW-UP ,brain ,volume measurement ,multiple sclerosis ,Sensitivity and Specificity ,Lesion ,White matter ,Imaging, Three-Dimensional ,Neuroimaging ,Reference Values ,REPRODUCIBILITY ,medicine ,Image Processing, Computer-Assisted ,Humans ,Radiology, Nuclear Medicine and imaging ,Multiple sclerosi ,LOAD ,THRESHOLDING TECHNIQUE ,CLINICAL OUTCOMES ASSESSMENT ,Reproducibility ,medicine.diagnostic_test ,business.industry ,Multiple sclerosis ,segmentation ,Magnetic resonance imaging ,Gold standard (test) ,Middle Aged ,medicine.disease ,Magnetic Resonance Imaging ,MAGNETIC-RESONANCE TECHNIQUES ,Hyperintensity ,medicine.anatomical_structure ,Female ,Radiology ,medicine.symptom ,DISPLAY ,Nuclear medicine ,business ,MRI - Abstract
A fully automated magnetic resonance (MR) segmentation method for identification and volume measurement of demyelinated white matter has been developed. Spin-echo MR brain scans were performed in 38 patients with multiple sclerosis (MS) and in 46 healthy subjects. Segmentation of normal tissues and white matter lesions (WML) was obtained, based on their relaxation rates and proton density maps. For WML identification, additional criteria included three-dimensional (3D) lesion shape and surrounding tissue composition. Segmented images were generated, and normal brain tissues and WML volumes were obtained. Sensitivity, specificity, and reproducibility of the method were calculated, using the WML identified by two neuroradiologists as the gold standard. The average volume of "abnormal" white matter in normal subjects (false positive) was 0.11 ml (range 0-0.59 ml). In MS patients the average WML volume was 31.0 ml (range 1.1-132.5 ml), with a sensitivity of 87.3%. In the reproducibility study, the mean SD of WML volumes was 2.9 ml. The procedure appears suitable for monitoring disease changes over time. J. Magn. Reson. Imaging 2000;12:799-807.
- Published
- 2000
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.