Wavelets assisted fuzzy edge refinement
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 14, Issue 2
Abstract
Image enhancement is a crucial pre-processing step to be performed for various applications where object recognition, identification, verification is required. Among various image enhancement methods, edge enhancement has taken its importance as it is widely used for understanding features in an image. Several types of edge detectors are available for certain types of edges. If edges are enhanced and clear, the reliability for feature extraction increases. The Quality of edge detection can be measured from several criteria objectively. In this paper, a novel algorithm for edge enhancement has been proposed for multiple types of images. The features can be extracted clearly by using this method. For comparison purpose Roberts, Sobel, Prewitt, Canny, and Log edge operators are used and their results are displayed. Experimental results demonstrate the effectiveness of the proposed approach.
Authors and Affiliations
Kumud Saxena
ANALYZING AND IMPROVING WEB APPLICATION QUALITY USING DESIGN PATTERNS
With the mounting demand of web applications, a number of issues allied to its quality have came in existence. In the meadow of web applications, it is very thorny to develop high quality web applications. A design patte...
An Improved General Purpose Arabic Morphological Analyzer and Generator Model (GPAM)
Although, morphological analysis is a vital part of natural language processing applications, there are no definitive standards for evaluating and benchmarking Arabic morphological systems. This paper proposes assessment...
IMPLEMENTATION OF SECURITY THROUGH SIMPLE SYMMETRIC KEY ALGORITHM BASED ON MODULO 37
The demand for adequate security to electronic data system grows high over the decades. Security is the one of the biggest concern in different type of networks. Due to diversify nature of network, security breaching bec...
Fingerprint Image Enhancement Algorithms for Identification in an Electoral Process
Electoral process in many developing nations is characterized with fraud and failure as a result of inefficient and effective system of voter’s register and voting system. This usually leads to crises. This paper prese...
SECURITY MECHANISMS AND ANALYSIS FOR INSECURE DATA STORAGE AND UNINTENDED DATA LEAKAGE FOR MOBILE APPLICATIONS
Using one mobile programming language like Objective-C, Swift or Java is challenging enough because of the many things that need to be considered from a security point of view, like the programming language secure guidel...