A study on detecting and classifying underwater mine like objects using image processing techniques
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 10
Abstract
Detection and classification of underwater mines among natural formations and debris along the sea floor is a tedious task. In order to overcome such scenario an automated computer aided detection and classification system is required. Image processing techniques are used to improve the performance of mine hunting operations using sector-scan, side-scan, magnetometers, cameras, etc. This paper serve as a strategic review of the potential for image processing techniques to aid the detection and classification of underwater mines and mine-like objects in side scan sonar imagery. Five basic components of any Computer-Aided Detection and Classification (CAD/CAC) technique are considered namely image preprocessing, segmentation, feature extraction, computer aided detection and computer aided classification. In this paper more than thirty research papers of image processing techniques are clearly reviewed.
Authors and Affiliations
Dr. S. N. Geethalakshmi , Dr. P. Subashini , Mrs. P. Geetha
Analysis of Dependencies of Checkpoint Cost and Checkpoint Interval of Fault Tolerant MPI Applications
In this paper, we have analysed i) the relationship between the checkpoint cost and the optimal checkpoint interval and ii) the relationship between the checkpoint cost and the number of processors (processes) and we hav...
Cryptography on Android Message Applications – A Review
Short Message Service (SMS) is a text messaging service component of phone, web, or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed l...
An Incremental framework for a Thai-English Machine Translation System using a LFG tree structure as an Interlingua
Abstract—Developing a machine translation system which can correctly translate any sentence from one language to another is a formidable and challenging task. This suggests that such a system should be implemented increm...
Generation of a pool of variable size symmetric keys through Image
This paper introduces a new concept of the generation of a unending pool of keys through an image leaving behind the idea of sending keys every time for encryption and decryption. This can help in avoiding the problem of...
TRACING REAL TIME LOCATION OF A FRIEND IN MOBILE SYSTEM
The application of this project is to track a number of people even in crowded natural environments. A system of this sort would be useful in a number of applications, such as human-computer interaction, surveillance, an...