SEGMENTATION OF OIL SPILL IMAGES USING IMPROVED FCM AND LEVEL SET METHODS.
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 7
Abstract
The main part of image processing and computer vision is Image segmentation. Image segmentation is the task of splitting a digital image into one or more regions of interest. In this paper a robust method for oil spill SAR image segmentation is explored which is already used for medical images by Bing Nan li et al. The unique FCM algorithm yields better results for segmenting noise free images, but it fails to segment images degraded by noise, outliers and other imaging defects. The optimization property of FCM is improved when it is combined with spatial information (SFCM). Level set methods uses dynamic variational boundaries for an image segmentation which embeds the time dependant PDE function. In this paper, an integrated method of spatial based FCM and level set method for oil spill segmentation is discussed.
Authors and Affiliations
V. RADHIKA, , DR. G. PADMAVATHI
IMPROVED PROTECTION IN VIDEO STEGANOGRAPHY USED COMPRESSED VIDEO BITSTREAMS
In this paper propose a new method for the real-time hiding of information used in compressed video bitstreams. This method is based on the real-time hiding of information in audio steganography. This method of steganogr...
A Novel Algorithm for Scaling up the Accuracy of Decision Trees
Classification is one of the most efficient and widely used data mining technique. In classification, Decision trees can handle high dimensional data, and their representation is intuitive and generally easy to assimilat...
Minimizing weighted mean flow time in open shop scheduling with time-dependent weights and intermediate storage cost
Open shop scheduling problem is a common scheduling problem and has wide engineering applications in manufacturing. In some industrial cases, open shop scheduling could be a long scheduling problem as an aircraft product...
SSL-MAP: A More Secure Gossamer-based Mutual Authentication Protocol for Passive RFID Tags
Abstract— RFID systems that employ passive RFID tags, are run using lightweight protocols. The Gossamer protocol is a case in point. However, it is found that the Gossamer protocol uses rather simple operations, in order...
Hidden Web Data Extraction Using Dynamic Rule Generation
World Wide Web is a global information medium of interlinked hypertext documents accessed via computers connected to the internet. Most of the users rely on traditional search engines to search the information on the web...