نتایج جستجو برای: boundary detection

تعداد نتایج: 719832  

2014
Amos Sironi Vincent Lepetit Pascal Fua

In this work we present an extension of the regression-based method presented in [27] for centerline and boundary detection. As shown in [27], classification based approaches are inaccurate when applied to centerline detection of linear structures. The reason is that centerline points and locations immediately next to them are extremely difficult to distinguish, The solution proposed in [27] is...

Journal: :IET Image Processing 2016
Elham Mahmoudzadeh Maryam Zekri Mohammad Ali Montazeri Saeid Sadri Sima Taghizadeh Dabbagh

Thermography of the breast has been shown to be well suited to detect early signs of breast cancer. This study proposes a novel method for boundary detection of breast thermography images using directional SUSAN method. Among breast thermography image processing steps, breast isolation from background and from each other is an essential stage for proper detection of breast cancer. For this purp...

1999
Volker Warnke

Successful detection of the position of prosodic phrase boundaries is useful for the rescoring of the sentence hypotheses in a speech recognition system. In addition, knowledge about prosodic boundaries may be used in a speech understanding system for disambiguation. In this paper, a segment oriented approach to prosodic boundary detection is presented. In contrast to word oriented methods (e.g...

2010
Ramaswamy Reddy C. Nagaraju

Breast cancer is currently one of the leading causes of death among women worldwide. This paper presents an approach for detecting in digital mammograms not only the detection and early stage of tumors can also detectable. In difficulty of image segmentation found misclassified pixels leads to ambiguity at correct detection of boundary. The effective classification is possible by NN Classifier....

2009
Min-Yian Su Yi-Hsuan Yang Yu-Ching Lin Homer H. Chen

Music boundary detection is a fundamental step of music analysis and summarization. Existing works either use unsupervised or supervised methods to detect boundary. In this paper, we propose an integrated approach that takes advantage of both methodologies. In particular, a graph-theoretic approach is proposed to fuse the results of an unsupervised model and a supervised one by the knowledge of...

Journal: :Journal of WSCG 2006
Gerhard H. Bendels Ruwen Schnabel Reinhard Klein

Models of non-trivial objects resulting from a 3d data acquisition process (e.g. Laser Range Scanning) often contain holes due to occlusion, reflectance or transparency. As point set surfaces are unstructured surface representations with no adjacency or connectivity information, defining and detecting holes is a non-trivial task. In this paper we investigate properties of point sets to derive c...

1999
Keesook J. Han Ahmed H. Tewfik

Shot boundary detection is an important for retrieval of visual media in multimedia system. Video temporal segmentation algorithms use thresholding techniques to identify both abrupt shot changes and gradual shot transitions. Thresholding methods frequently provide false positives due to large variations in gradual transition regions. The principal components decomposition and the progressive n...

2010
You-Yu Lin Yih-Ru Wang Yuan-Fu Liao

A sample-based phone boundary detection algorithm is proposed in this paper. Some sample-based acoustic parameters are first extracted in the proposed method, including six sub-band signal envelopes, sample-based KL distance and spectral entropy. Then, the sample-based KL distance is used for boundary candidates preselection. Last, a supervised neural network is employed for final boundary dete...

2003
Rachna Vargiya Philip Chan

Most of the current anomaly detection methods for network traffic rely on the packet header for studying network traffic behavior. We believe that significant information lies in the payload of the packet and hence it is important to model the payload as well. Since many protocols exist and new protocols are frequently introduced, parsing the payload based on the protocol specification is time-...

Journal: :The Open Automation and Control Systems Journal 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید