An Efficient and elastic approach for partial shape matching using DTW
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 4
Abstract
We present the Partial shape matching for scale invariant and deformation tolerant 2D images. Scale invariance means a feature of objects that do not change if scale or length of objects changes. Deformation tolerance means tolerating a change in the volume and/or shape of object. We propose to transform shapes into sequences and utilize an algorithm that determines a subsequence of a target sequence that best matches a query.The proposed scheme lies a novel shape descriptor that also permits the quantification of local scale. Shape descriptors are computed along open or closed contours in a spatially non-uniform manner. The resulting ordered collections of shape descriptors constitute the global shape representation. A variant of an existing Dynamic Time Warping (DTW) matching technique is proposed to handle the matching of shape representations. Due to the properties of the employed shape descriptor, sampling scheme and matching procedure, the proposed approach performs partial shape matching that is invariant to Euclidean transformations, starting point as well as to considerable shape deformations.Additionally, the problem of matching closed-toclosed contours is naturally treated as a special case. Algorithm outperforms the commonly used techniques in retrieval accuracy.
Authors and Affiliations
Miss. Snehali M. Khakse, Prof. V. K. Shandilya
Efficiency of Corrosion Inhibitors on Cathodic Protection System
This study is on experiment being carried out to determine the efficiency of in inhibitors on catholically protected medium carbon steel in sea water in Bonny and Ogbokoro in the Niger Delta region of Nigeria. The experi...
Implementation of FPGA based PID Controller for DC Motor Speed Control System
In this paper, the implementation of software module using 'VHDL' for Xilinx FPGA (XC2S30) based PID controller for DC motor speed control system is presented. The tools used for building and testing the software m...
A Review of Black Hole and Worm Hole Attack on AODV Routing Protocol in MANET
The wireless mobile Ad-hoc network (MANET) is self-configuring mobile nodes connected through the wireless links with the decentralized networks where the nodes communicate with each other on the basis of mutual trust. F...
Influence of Modification of Design out Maintenance & Design Out Information System For Maintenance Cost Control & A Lucrative Business (With Case Study).
Maintenance management is one of the main focuses in industrial sector. Maintenance in production environments is becoming increasingly complex as machines become more technologically advanced, therefore higher...
Detection of Node Clones in Wireless Sensor Network Using Detection Protocols
Wireless sensor networks consist of hundreds to thousands of sensor nodes and are widely used in civilian and security applications. One of the serious physical attacks faced by the wireless sensor network is node clone...