Image Segmentation Using Stake-Denotes Algorithm
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 8
Abstract
In this paper, we present stake k-mean fragmentation and regions tracking model, which aims at combining color, texture, pattern, and motion features. in the first the stake algorithm segmented the objects which are tracking and realized them ;second the global motion of the video sequence is estimated and compensated with presenting algorithms. The spatio-temporal map is updated and compensated using stake fragmentation model to keep consistency in video objects tracking. The Stake algorithm considers the stakes’ placement which should be located as far as possible from each other to withstand against the pressure distribution of a roof, as identical to the number of centroidsamongst the data distribution. This algorithm is able to optimize the K-means clustering for icon fragmentation in aspects of precision and computation time. It designates the initial cancroids’ positions by calculating the accumulated distance metric between each data point and all previous cancroids, and then selects data points which have the maximum distance as new initial cancroids. This project presents a new approach for icon fragmentation by applying Stake-Kmeans algorithm. This fragmentation process includes a new mechanism for clustering the elements of highresolution icons in order to improve precision and reduce computation time. The system applies K-means clustering to the icon fragmentation after optimized by Stake Algorithm. This algorithm distributes all initial centroids according to the maximum accumulated distance metric.
Authors and Affiliations
Manohar Bammidi, V. Jeevan Kumar
Providing Security and Minimizing Data Management Cost in the Cloud
Cloud Computing Providing Efficient Services for Users and Organizations. To outsource their data to cloud servers. But main problem is users are worrying about the leakage or damage of the data. in order to overcome...
Slicing :A Proficient Scheme For Sustain And Publicize
The Privacy Preserving on a microdata publishing different anonymization techniques nameing as generalization and bucketization have been proposes. In generalization amount of information loses on high dimensional da...
Survey on Suspicious URL Detection Schemes in Twitter Stream
Twitter is a micro-blogging and online social networking service that enables its users to send and read "tweets”. Tweets are text messages limited to 140 characters. Twitter is prone to a lot of malicious tweets whi...
A Study on Tactics Used to Incorporate Medical Informatics and Automated Diagnostic Methods
Drastic changes have taken place in medicine over the last century. Physicians were faced with the difficulty of making diagnoses with little information that are not sufficient, often resorting to exploratory surger...
Z-source Inverter based DVR for Power Quality Improvement
Interest in Power Quality has been explicitly seen in Electrical Power Engineering since past decade, even though utilities all over the world have for decades worked on the improvement of voltage quality, what is no...