A Review Paper on Thinning of Image Using Zhang and Suen Algorithm and Neural Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 2
Abstract
Abstract: This review paper provides a concise survey on different techniques for thinning and their comparison in image processing. Thinning is one of the fundamental requirements is to represent the structural shape of digital images. This can be done by reducing it to a graph. This process may be completed by obtaining the skeleton of the particular region of the image or the full image using skeletonization of the image also known as thinning. Skeletonization is the process of extracting skeletons from an object in a digital image. Skeletonization has been used in a wide variety of other applications like Optical character recognition, Pattern recognition, Fingerprint classification, Biometric authentication, Signature verification, Medical imaging. It proposes the new algorithm using Zhang and Suen algorithm also neural network based on various factors like PSNR, MSE, execution time and thinning rate. There are different techniques for thinning of the image like iterative, non-iterative etc
Authors and Affiliations
Sonam Soni , Dr. Raman Chadha , Sukhmeet Kaur
The impact of the attachment implementation in the healthcaredomain
Abstract: An “attachment” is any supplemental health documentation needed from a provider to support aspecific business process in the Healthcare domain while using electronic exchange within the organization orbet...
Severe SOA Security Threats on SOAP Web Services– A Critical Analysis
Abstract: Enterprise Application Integration (EAI) involves several technologies; among them, the popular and recent one is Service Oriented Architecture (SOA). Mainly, SOA is used for developing loosely coupled di...
A review of Hierarchical energy Protocols in Wireless SensorNetwork
Abstract: This paper attempts to provide an overview of various protocols used in wireless sensor networkwhich include data dissemination and data gathering protocols .Wireless network is any type of computernetwo...
An Efficient Windows Cardspace identity Management Technique in Cloud Computing
Abstract: Cloud computing provides the shared infrastructure to the user this lead to the privacy and security violation. Privacy is regarding to the user’s sensitive information that resides onto the cloud, unauth...
Regression Test Suite Prioritization Using Hill Climbing Algorithm
Abstract: Regression testing is an expensive, but important action in software testing. Unfortunately, there may be bereft assets to acquiesce for the re-execution of all analysis cases during corruption testing. In this...