Method for Filling and Sharpening False Colour Layers of Dual Energy X-ray Images
Journal Title: International Journal of Electronics and Telecommunications - Year 2016, Vol 62, Issue 1
Abstract
An X-ray scanning and image processing have a vast range of applications in the security. An image of a content of some package being passed for example to an airplane or to the court house may help to figure out if there are any dangerous objects inside that package and to avoid possible threatening situation. As the raw X-ray images are not always easy to analyze and interpret, some image processing methods like an object detection, a frequency resolution increase or a pseudocolouring are being used. In this paper, we propose a pseudocoloring improvement over material based approach. By addition of the edge detection methods we fill and sharpen colour layers over the image, making it easier to interpret. We demonstrate the effectiveness of the methods using real data, acquired from a professional dual energy X-ray scanner.
Authors and Affiliations
Krzysztof Dmitruk, Michał Mazur, Marcin Denkowski, Paweł Mikołajczak
MTCA.4 - modular measurement and control system with sub-nanosecond time synchronization and support for RF applications
The Micro TCA platform is rapidly developing modular technology for measurement and control systems. There are available versions for laboratories, military and aviation. The newest release of the standard (MTCA.4) suppo...
Classification of EEG Signals Using Quantum Neural Network and Cubic Spline
The main aim of this paper is to propose Cubic Spline-Quantum Neural Network (CS-QNN) model for analysis and classification of Electroencephalogram (EEG) signals. Experimental data used here were taken from seven differe...
Joint Timing Synchronization and Channel Estimation Using Perfect Sequence in Uplink Time Domain Synchronous OFDMA
Time Domain Synchronous Orthogonal Frequency Division Multiple Access (TDS-OFDMA) is used in mobile broadband wireless access scheme in uplink transmission. This leads to multiple user interference due to timing offset a...
Analysis of Object Location Accuracy for iBeacon Technology based on the RSSI Path Loss Model and Fingerprint Map
This paper presents analysis of object location accuracy of a mobile device on the basis of the iBeacon technology. The research starts with radio signal strength indicator analysis along the corridor in order to create...
Network Steganography in the DNS Protocol
This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a simplex communication channel between a malware-infected computer with a compromised DNS server. The proposed channel can b...