A Comparative Study on Shape Reorganization
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 1
Abstract
This paper proposes a new mechanism for identifying two-dimensional shapes called the SKS algorithm and compares it with three other state-ofart methods in detail. These include the Hu Moments, CSS matching and Shape context. The algorithm uses the philosophy of evidence accumulation equal to generalized Hough transform and is highly parallel in nature. The performance of each algorithm is evaluated under affine transforms - translation, rotation in the plane, scale (zoom) and also under partial occlusion.
Authors and Affiliations
S. Suresh| Research Scholar , Dept. of Computer Science and Engineering Acharya Nagarjuna University, A.P. -India, Dr. R Siva Ram Prasad| Research Director, Dept. of Computer Science and Engineering Acharya Nagarjuna University, A.P. -India
Analysis Of Linear And Planarantenna Arrays
This paper describes the theories and techniques for designing linear and planar Antenna arrays and compares their radiation pattern with conventional arrays. The results of this work are among others, a software tha...
Modeling And Simulation of An Advanced Step Up Converter For Low Voltage Energy Harvesting By Using Fuzzy Logic Controller
This paper presents a direct AC-DC power electronic converter topology and it is proposed for efficient and maximum energy harvesting from low voltage inertial micro generators. To process the positive and negative h...
Embedded Platform For Online Signature Verification
in my project the proposed system is used for verifying the signature of particular person with help of embedded plat form on mobile devices. This paper studies online signature verification on PC interface-based mob...
FPGA Based Wireless Jamming Networks
A mobile jammeris a device which is used to jam signals of cell phone from receiving signals from base stations. Mobile jammer is used majorly where the disturbances that are occurred with the cell phones. So, in this...
Virus Attack Identification And Representation In Sensor Network
Clusters consist of circulated sensors and motor that interact with each other via wireless network. The use of open wireless intermediate and unattended deployment leaves these systems vulnerable to intelligent adve...