A comparison Approach in Image Optimization Techniques
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 1
Abstract
The capturing of multiple low-resolution images taken of the same scene results in a distortion between each image. Image registration is the process of determining this distortion. In this paper, we examine the hypothesis that the visual quality of a reconstructed highresolution image improves when accurate image registration is achieved. Here picture images are registered using two algorithms. The first registration algorithm based on an optimization approach while the other is based on the RANSAC algorithm. We find that the optimization approach is severely hampered by higher degree transforms such as affine transforms. This is attributed to the increased number of parameters requiring optimizing. First algorithm involved reconstructing an image when perfect registration was achieved, and comparing the results to when the RANSAC algorithm was employed. The results suggested that the visual quality of the reconstructed images were higher for perfect registration. We also found that the visual quality of reconstructed images was higher when images were registered using the RANSAC algorithm, as compared to an optimization approach.
Authors and Affiliations
S. S. Panda, Arun Kumar Dash
Automated Sentiment Analysis System Using Machine Learning Algorithms
Sentiment analysis can be very useful for business if employed correctly. In this article, I will attempt to demystify the process, provide context, and offer some concrete examples of how businesses can utilize it....
Adaptive Minimum Bit Error Rate Beamforming Assisted Detection for QAM Pre-FFT OFDM Communication Systems
A novel adaptive beam forming technique is proposed for broadband wireless communication using quadrature amplitude modulation (QAM) signaling based on least symbol error rate (LSER) criterion, the adaptive antenna ar...
Detecting Network And Application Layer Attacks in Networks
Distributed Denial of Service (DDoS) flooding attacks are launched by attackers disturbing server services as well as Individual users who are active in internet.espicially attackers are targeting network Transport l...
A New approach for Cam-Shift Algorithm for Tracking a Moving Object
The main aim of this paper to track a target which plays a key component of video surveillance and monitoring systems. In this paper, we present an new approach to CamShift algorithm and kalman filter for tracking a...
A Brief Servey Of Rfid Devices And Its Security Protocols
Security plays a very important role during the transmission of information in RFID devices. RFID are the wireless devices that contain a tag and a reader. While there are many authentication protocols put into opera...