The proposed algorithms are applied to the pattern analysis of the isothermal distribution in the oceanic environment.doi:10.1016/0031-3203(81)90072-8Motoyasu NagataElsevier LtdPattern Recognition
In this paper, we conducted a cause analysis on boundary artifacts in image deconvolution. Results of the cause analysis show that boundary artifacts are caused not only by a misuse of boundary conditions but also by no use of the normal... J Lee,N Lee - 《Journal of Korea Multimedia Soci...
We also use optional cookies for advertising, personalisation of content, usage analysis, and social media. By accepting optional cookies, you consent to the processing of your personal data - including transfers to third parties. Some third parties are outside of the European Economic Area, with...
Gabor filters are widely applied in image analysis and computer vision applications. This paper describes a fast algorithm for isotropic complex Gabor filtering that outperforms existing implementations. The main computational improvement arises from the decomposition of Gabor filtering into more efficient Ga...
facility, the wavefront coding (WFC) technologyhas been adopted to obtain 3m-13m over-long depth of field in an array optical componentsdefect detection system; The lack of the boundary information due to the sudden boundarytruncation will cause the ringing effect in the image restoration process...
We also use optional cookies for advertising, personalisation of content, usage analysis, and social media. By accepting optional cookies, you consent to the processing of your personal data - including transfers to third parties. Some third parties are outside of the European Economic Area, with...
We define sub-boundaries as boundaries, where a change in crop type takes a place within the fixed geometry of an agricultural field. To perform field-based processing and analysis operations, the field boundary data and satellite imagery are integrated. The edge pixels are detected using the ...
Noniterative Algorithms for Sensitivity Analysis Attacks This is accomplished by exploiting geometric properties of the detection boundary and the information leaked by the detector. Several important extensions are ... M El Choubassi,P Moulin - 《IEEE Transactions on Information Forensics & Security》 ...
image processingdiffusion filtering methodsinitial boundary-value problemnoise removallocal image intensityfinite-difference method/ B6135 Optical, image and video signal processing B6140B Filtering methods in signal processing B0290P Differential equations (numerical analysis) C5260B Computer vision and image...
In medical imaging, 3D boundary extraction is a preliminary requisite for a coherent shape analysis of an organ. Deformable objects, like the heart cavities, are often hard to detect because of the artefacts caused by the motion. The authors present a 3D deformable surface model based on a par...