An Efficient Boundary Detection and Image Segmentation Method Based on Perceptual Organization
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 7, Issue 1
Abstract
In this paper, we presents a novel method for detecting the boundaries of the object in outdoor images by using most common properties of the images such as perceptual organization laws. Here the proposed segmentation scheme is based on perceptual organization and background recognition. This paper mainly concentrates to recognize the structurally challenging objects, which is generally combination of several constituent parts. Our new proposed method based on perceptual organization model can efficiently recognize the non-accidental relationships, which are perfectly structured from the constituent parts of the strictly structured objects. The simulation results of this paper show that theefficient and accurate image segmentation by using perceptual organization models.
Authors and Affiliations
Ch . S ambasivarao , V. Naganjaneyulu
Web Mining using Artificial Ant Colonies : A Survey
Web mining has been very crucial to any organization as it provides useful insights to business patterns. It helps the company to understand its customers better. As the web is growing in pace, so is its importance and h...
Performance Evaluation of VOIP over Multi Radio Multi channel Network
Wireless mesh network is an advanced form of wireless network. A wireless mesh network provides a better solution to problems that often arise in cellular and WLAN. Wireless mesh networks (WMNs) are receiving increasing...
Enhancing Rural Development in Tamilnadu through ICT: An Evaluation of Latest Technologies in the scheme MGNREGS
When e-governance indicates better governance, naturally, rural development becomes an essential part of it. It is so because developing countries like India depend on the villages and their welfare. Keeping this in mind...
Robust Watermarking Framework with DCT Based Encryption
Since several years,, the protection of multimedia data is becoming extremely important. The protection of the multimedia data might be performed with encryption or data hiding algorithms. To address the transmission tim...
Meticulous Tasks of Various Cryptographic Techniques in Secure Communications
Our main intention of writing this paper is to provide a understandable knowledge about cryptographic techniques. This paper deals with various Message Authentication Codes, Hash functions and encryption techniques and p...