Feature Selection for Edge Detection in PolSAR Images
نویسندگان
چکیده
Edge detection is one of the most critical operations for moving from data to information. Finding edges between objects relevant image understanding, classification, segmentation, and change detection, among other applications. The Gambini Algorithm a good choice finding evidence edges. It finds point at which function difference properties maximized. This algorithm very general accepts many types objective functions. We use an built with likelihoods. Imaging active microwave sensors has revolutionary role in remote sensing. technology potential provide high-resolution images regardless Sun’s illumination almost independently atmospheric conditions. Images PolSAR are sensitive target’s dielectric structures several polarization states electromagnetic waves. polarimetric synthetic-aperture radar (PolSAR) imagery challenging because low signal-to-noise ratio format (complex matrices). There known marginal models stemming complex Wishart model full format. Each these renders different likelihood. work generalizes previous studies by incorporating intensities as edge detection. discuss solutions often problem parameter estimation. propose technique rejects estimates thin evidence. Using this idea discarding potentially irrelevant evidence, we fusing pieces channels that only incorporate those likely contribute positively. approach both single- multilook three sensors.
منابع مشابه
Feature Selection for Target Detection in SAR Images
A genetic algorithm (GA) approach is presented to select a set of features to discriminate the targets from the natural clutter false alarms in SAR images. Four stages of an automatic target detection system are developed: the rough target detection, feature extraction from the potential target regions, GA based feature selection and the final Bayesian classification. Experimental results show ...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملNoisy images edge detection: Ant colony optimization algorithm
The edges of an image define the image boundary. When the image is noisy, it does not become easy to identify the edges. Therefore, a method requests to be developed that can identify edges clearly in a noisy image. Many methods have been proposed earlier using filters, transforms and wavelets with Ant colony optimization (ACO) that detect edges. We here used ACO for edge detection of noisy ima...
متن کاملEnsemble Classification and Extended Feature Selection for Credit Card Fraud Detection
Due to the rise of technology, the possibility of fraud in different areas such as banking has been increased. Credit card fraud is a crucial problem in banking and its danger is over increasing. This paper proposes an advanced data mining method, considering both feature selection and decision cost for accuracy enhancement of credit card fraud detection. After selecting the best and most effec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Remote Sensing
سال: 2023
ISSN: ['2315-4632', '2315-4675']
DOI: https://doi.org/10.3390/rs15092479