A Modified Adaptive Thresholding Method using Cuckoo Search Algorithm for Detecting Surface Defects
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 5
Abstract
There are various mathematical optimization problems that can be effectively solved by meta-heuristic algorithms. The improvement of these algorithms is that they carry out iterative search processes which resourcefully act upon exploration and exploitation in spatial domain containing global and local optima. An innovative robust Cuckoo Optimization Algorithm (COA) with adaptive thresholding is proposed to solve the problem of detection and estimation of surface defects on metal coating surfaces. The proposed method is developed through implementing changes to COA and improved the performance. For improving capability of local search as well to keep the global search effect, the enhanced methods such as level set is associated with the proposed method. Also, the method adapts dynamic step size, adaptively changing with the search process for improving the rate of convergence and the ability of local search. The algorithm performance is scrutinized from the experimental analysis and results. Also, the segmentation effectiveness is further enhanced by adapting suitable methods for preprocessing and post processing. The comparison and analysis of the results accomplished with the proposed method and results of earlier methods shows superior performance of the proposed method.
Authors and Affiliations
Yasir Aslam, Santhi N, Ramasamy N, K. Ramar
An Efficient Algorithm for Resource Allocation in Parallel and Distributed Computing Systems
Resource allocation in heterogeneous parallel and distributed computing systems is the process of allocating user tasks to processing elements for execution such that some performance objective is optimized. In this pape...
Generating Classification Rules from Training Samples
In this paper, we describe an algorithm to extract classification rules from training samples using fuzzy membership functions. The algorithm includes steps for generating classification rules, eliminating duplicate and...
Performance Analysis of Security Mechanism for Automotive Controller Area Network
Connectivity of modern cars has led to security issues. A number of contributions have proposed the use of cryptographic algorithms in order to provide automotive Controller Area Network (CAN) security. However, due to C...
Hashtag Generator and Content Authenticator
: In the recent past, Online Marketing applications have been a focus of research. But still there are enormous challenges on the accuracy and authenticity of the content posted through social media. And if the social me...
No-Reference Perceived Image Quality Algorithm for Demosaiced Images
Visual image quality assessment (IQA) plays a key role in every multimedia application, as end user to it is a human-being. Real time applications demand no reference (NR) IQA, due to unavailability of the reference imag...