Image Segmentation Using Signed Pressure Force Based Active Contour Model
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 12, Issue 1
Abstract
A novel signed pressure force (SPF) based active contour model (ACM) is proposed in this work. It is implemented with help of Gaussian filtering regularized level set method, which first selectively penalizes the level set function to be binary, and then uses a Gaussian smoothing kernel to regularize it. The advantages of this method are as follows. First, a new region-based signed pressure force (SPF) function is proposed, which can efficiently stop the contours at weak or blurred edges. Second, the exterior and interior boundaries can be automatically detected with the initial contour being anywhere in the image. Third, the proposed SPF with ACM has the property of selective local or global segmentation. It can segment not only the desired object but also the other objects. Fourth, the level set function can be easily initialized with a binary function, which is more efficient. The computational cost for traditional re-initialization can also be reduced.
Authors and Affiliations
Sagar Chouksey, Mayur Ghadle, Shreya Sharma, Rohan Puranik
Low Cost VoIP Architecture Using Open Source Software Component in Tertiary Institutions
Governments and their agencies are often challenged by high cost and flexible telephonic, Web based data services. Emerging technologies, such as those of Voice over Internet Protocol (VoIP) that allow convergent system...
The Analysis of Mobile WiMAX and LTE using MIMO technique
A quality of service is a fundamental component of the 4G broadband network for satisfactory service delivery by evolving internet application to end user, and managing the network resources. The 4G technology has emerge...
The Automated VSMs to Categorize Arabic Text Data Sets
Text Categorization is one of the most important tasks in information retrieval and data mining. This paper aims at investigating different variations of vector space models (VSMs) using KNN algorithm. we used 242 Arabic...
A comparative study of chain based routing algorithms in wireless sensor networks
Many routing algorithms for Wireless Sensor Networks (WSNs) are designed and presented in the literature. The main target of these algorithms is to improve the performance of WSNs. In this paper, a comparative study of c...
A SIGNATURE IDENTIFICATION SYSTEM WITH PRINCIPAL COMPONENT ANALYSIS AND STENTIFORD THINNING ALGORITHMS
Several biometric security systems have been implemented. Biometric is the use of a person’s physiological or behavioural characteristics to identify the individual. An example of behavioural method of biometric is sig...