Artificial neural networks (ANNs) are computational models inspired by biological neural networks in the human brain. ANNs contain artificial neurons that are interconnected in layers and transmit signals to one another. The connections between neurons are associated with weights that are adjusted during training to produce the desired output. ANNs can learn complex patterns and relationships through a process of trial and error. They are widely used for tasks like pattern recognition, classification, prediction, and data clustering.
* 모두의연구소에서 2018년 12월에 진행한 Moducon 2018을 리뷰합니다.
* 재밌게 들었던 발표 두 가지를 정리합니다
1. Research of Clova AI toward 'AI for Everyone' - 하정우 님 (Clova AI Research Director)
2. 나만 알고싶은 논문 - 민규식 님 (한양대학교)
* 광주과학기술원 인공지능스터디 A-GIST 모임에서 발표했습니다.
* 발표영상 (한국어, 유튜브): https://youtu.be/FRvlwaqrGHM
The document discusses the FaceNet paper, which proposes a unified embedding for face recognition and clustering using a deep neural network. Some key points:
- FaceNet uses a triplet loss during training to learn a embedding space where distances between faces correspond to whether they are from the same person or not.
- This eliminates the need for complex multi-stage training pipelines used by previous works.
- On standard benchmarks, FaceNet achieves over 99% accuracy for face verification, outperforming prior state-of-the-art models.
- The unified embedding allows for face recognition via distance thresholding and face clustering via k-means in the learned space.
This document discusses face detection techniques. It begins with an introduction that defines face detection and discusses why it is important and challenging. It then covers topics like image segmentation, face detection approaches, morphological image processing, and skin color-based face detection. The document analyzes literature on face detection methods and provides descriptions of techniques like thresholding, edge detection, region-based segmentation, and template matching. It also includes a case study on specific face detection software applications and concludes by summarizing the discussed techniques.
A multilevel automatic thresholding method based on a genetic algorithm for a...Akshit Arora
This document summarizes a project to implement a multilevel automatic thresholding method for image segmentation based on a genetic algorithm. The method uses a genetic algorithm to initialize population of threshold values, applies genetic operators like selection, crossover and mutation to improve the threshold values at each generation, and refines the best thresholds to segment the image. The project studied this thresholding method from a research paper and implemented it in MATLAB to segment images using a genetic algorithm approach to optimization of threshold values.
This document describes iris and periocular recognition techniques. It discusses segmentation, normalization, feature extraction and matching steps for iris recognition. Segmentation involves localization of the iris and eyelid detection. Normalization maps the iris to polar coordinates. Features are represented as a 2048-bit iris code. Periocular recognition uses the area around the eye for identification. The document tests the techniques on three datasets, achieving 100% accuracy even with noise, blur and transformations added to query images. Processing time increases with the number of keypoints and image size.
THIS IS A 2 AXIS FEEDER APPLICATION .X AND Y AXIS SERVO DRIVES COVER PREDEFINED DISTANCES FOR N NO. OF TIMES . THEY MOVE IN A ZIG ZAG MANNER AND PRODUCE THE MAXIMUM EFFICIENT PUNCHING SOLUTION WITHOUT WASTAGE IN TO AND FRO MOTION.
This document describes a proposed network intrusion detection system using a genetic algorithm. The existing systems are rules-based but static, complex, and manual. The proposed system uses genetic algorithms to generate dynamic rule sets based on real-time network traffic behavior. This eliminates the need to pre-define attack rules and allows the system to detect unknown attacks. The architecture monitors network connections, converts data to chromosomes, implements genetic algorithms to check rules and make decisions, and generates new rules for the dataset.
advance operators.
explain about the diploid , dominance, and partial match crossover and the order crossover
Technologies
Multi objective optimization , knowledge base technologies hibrid, parallel computing
The document summarizes iris recognition as a biometric identification method. It describes the anatomy of the human eye and details how the iris has unique patterns that can be used to identify individuals. The summary explains that iris recognition works by imaging the iris, locating its boundaries, normalizing variations, and matching its texture patterns to encoded templates in a database. With over 200 identifying features, the iris provides very high accuracy for identification applications such as border control, ATMs, and computer login authentication.
Genetic algorithms are a type of evolutionary algorithm that mimics natural selection. They operate on a population of potential solutions applying operators like selection, crossover and mutation to produce the next generation. The algorithm iterates until a termination condition is met, such as a solution being found or a maximum number of generations being produced. Genetic algorithms are useful for optimization and search problems as they can handle large, complex search spaces. However, they require properly defining the fitness function and tuning various parameters like population size, mutation rate and crossover rate.
The document provides an overview of genetic algorithms, including their history, principles, components, and applications. Specifically, it discusses how genetic algorithms can be used to solve the traveling salesman problem (TSP) through permutation encoding of cities, calculating fitness based on total tour distance, and using techniques like order-1 crossover to preserve city order in offspring.
The document discusses iris recognition as the best biometric identification system. It provides an overview of the iris recognition process which involves iris localization, normalization, feature encoding, and matching. Real-world applications of iris recognition include the Aadhaar ID project in India and border security in the UAE. While highly accurate, iris recognition has some disadvantages like accuracy variations depending on imaging conditions and potential for fake iris lenses. Overall, iris recognition is described as a fast and accurate biometric technology that will become more common with further development to address current limitations.
Edge detection identifies points in a digital image where brightness changes sharply. It is used for image segmentation to divide an image into regions of different objects. The Canny edge detection algorithm is commonly used as it has low error rates and well-localized edges. It applies noise reduction, finds intensity gradients, performs non-maximum suppression and hysteresis thresholding to detect a wide range of edges.
brain tumor detection by thresholding approachSahil Prajapati
This technical paper proposes a method for detecting tumors in MRI brain images using thresholding and morphological operations. The methodology involves preprocessing images using sharpening filters, histogram equalization, and median filtering. Threshold segmentation is then used to create binary images, and morphological operations like erosion and dilation are applied. Finally, tumor regions are extracted using image subtraction, which removes closely packed pixels. The authors found that this approach, combining thresholding with morphological operations and subtraction, was effective at detecting and segmenting tumor regions in MRI brain images.
This is an easy introduction to the concept of Genetic Algorithms. It gives Simple explanation of Genetic Algorithms. Covers the major steps that are required to implement the GA for your tasks.
For other resources visit: http://pimpalepatil.googlepages.com/
For more information mail me on [email protected]
This document discusses genetic algorithms and their applications. It explains key concepts like genetic crossover, genetic algorithm steps to solve optimization problems, and how genetic algorithms mimic biological evolution. Examples are provided of genetic algorithms being used for tasks like predicting protein structure, automotive design optimization, and generating musical variations. Advantages and limitations of genetic algorithms are also summarized.
This document provides an introduction to genetic algorithms, which are a class of computational models inspired by evolution. It describes how genetic algorithms use processes analogous to natural selection and genetics to arrive at optimal solutions to problems. The document outlines the key components of genetic algorithms, including representing potential solutions as binary strings, selecting parents based on fitness, recombining parents via crossover to create offspring, mutating offspring randomly, and replacing the population with the offspring. The goal is to evolve better and better solutions over many generations through these evolutionary processes of selection, recombination and mutation.
The document discusses edge detection methods including gradient based approaches like Sobel and zero crossing based techniques like Laplacian of Gaussian. It proposes a new algorithm that applies fuzzy logic to the results of gradient and zero crossing edge detection on an image to more accurately identify edges. The algorithm calculates gradient and zero crossings, applies fuzzy rules to classify pixels, and thresholds to determine final edge pixels.
Genetic algorithms are optimization techniques inspired by Darwin's theory of evolution. They use operations like selection, crossover and mutation to evolve solutions to problems by iteratively trying random variations. The document outlines the history, concepts, process and applications of genetic algorithms, including using them to optimize engineering design, routing, computer games and more. It describes how genetic algorithms encode potential solutions and use fitness functions to guide the evolution toward better outcomes.
This document provides an overview and examples of using MATLAB. It introduces MATLAB, describing its origins and applications in fields like aerospace, robotics, and more. It then covers various topics within MATLAB like image processing, reading and writing images, converting images to binary and grayscales, plotting functions, and using GUI tools. Examples of code are provided for tasks like reading images, filtering noise, and capturing video from a webcam. The document also lists some common file extensions used in MATLAB and describes serial communication.
The document provides an overview of basic image processing concepts and techniques using MATLAB, including:
- Reading and displaying images
- Performing operations on image matrices like dilation, erosion, and thresholding
- Segmenting images using global and local thresholding methods
- Identifying and labeling connected components
- Extracting properties of connected components using regionprops
- Performing tasks like edge detection and noise removal
Code examples and explanations are provided for key functions like imread, imshow, imdilate, imerode, im2bw, regionprops, and edge.
This document provides an introduction to genetic algorithms (GAs) including:
- GAs are inspired by Darwin's theory of evolution and use techniques like inheritance, mutation, selection, and crossover to find solutions to optimization problems.
- The document discusses key GA components like populations of individuals, fitness functions, selection, crossover, and mutation.
- Examples of GA applications to energy management problems are presented including categorizing appliances, pricing schemes, and parametrizing a GA for scheduling home appliances.
មេរៀនៈ Data Structure and Algorithm in C/C++Ngeam Soly
This document provides an introduction to a lecture on data structures and algorithms. It discusses the lecturer's contact information and expectations for reading ahead of lectures. It then covers topics that will be discussed in the course, including programs and programming, introduction to programming, crafting programs effectively, what makes a good program, and why data structures and algorithms are important subjects. The document provides an overview of what will be covered in the course.
This presentation is intended for giving an introduction to Genetic Algorithm. Using an example, it explains the different concepts used in Genetic Algorithm. If you are new to GA or want to refresh concepts , then it is a good resource for you.
Microscopic Image Analysis of Nanoparticles by Edge Detection Using Ant Colon...IOSR Journals
This document presents a method for analyzing nanoparticles using microscopic images through edge detection with Ant Colony Optimization (ACO). Initially, edges are extracted from images using various detectors and adaptive thresholding. Ants are placed at endpoint pixels and move between pixels probabilistically based on pheromone levels, connecting discontinuities. Results on cerium oxide and zinc oxide nanoparticle images show the ACO-improved edges better distinguish particles and determine sizes/shapes compared to conventional detectors alone.
The document discusses the basics of computed tomography (CT) scanning. It explains some limitations of conventional X-rays like superimposition of structures and poor contrast resolution. CT provides cross-sectional images of the body with no superimposition of tissues and excellent contrast resolution. A CT scan uses X-rays combined with computer technology to produce internal images of the body. An X-ray tube rotates around the patient, emitting a thin beam of X-rays that pass through the body and are measured by a detector. The computer analyzes the data to generate two-dimensional cross-sectional images of the inside of the body.
This document describes a proposed network intrusion detection system using a genetic algorithm. The existing systems are rules-based but static, complex, and manual. The proposed system uses genetic algorithms to generate dynamic rule sets based on real-time network traffic behavior. This eliminates the need to pre-define attack rules and allows the system to detect unknown attacks. The architecture monitors network connections, converts data to chromosomes, implements genetic algorithms to check rules and make decisions, and generates new rules for the dataset.
advance operators.
explain about the diploid , dominance, and partial match crossover and the order crossover
Technologies
Multi objective optimization , knowledge base technologies hibrid, parallel computing
The document summarizes iris recognition as a biometric identification method. It describes the anatomy of the human eye and details how the iris has unique patterns that can be used to identify individuals. The summary explains that iris recognition works by imaging the iris, locating its boundaries, normalizing variations, and matching its texture patterns to encoded templates in a database. With over 200 identifying features, the iris provides very high accuracy for identification applications such as border control, ATMs, and computer login authentication.
Genetic algorithms are a type of evolutionary algorithm that mimics natural selection. They operate on a population of potential solutions applying operators like selection, crossover and mutation to produce the next generation. The algorithm iterates until a termination condition is met, such as a solution being found or a maximum number of generations being produced. Genetic algorithms are useful for optimization and search problems as they can handle large, complex search spaces. However, they require properly defining the fitness function and tuning various parameters like population size, mutation rate and crossover rate.
The document provides an overview of genetic algorithms, including their history, principles, components, and applications. Specifically, it discusses how genetic algorithms can be used to solve the traveling salesman problem (TSP) through permutation encoding of cities, calculating fitness based on total tour distance, and using techniques like order-1 crossover to preserve city order in offspring.
The document discusses iris recognition as the best biometric identification system. It provides an overview of the iris recognition process which involves iris localization, normalization, feature encoding, and matching. Real-world applications of iris recognition include the Aadhaar ID project in India and border security in the UAE. While highly accurate, iris recognition has some disadvantages like accuracy variations depending on imaging conditions and potential for fake iris lenses. Overall, iris recognition is described as a fast and accurate biometric technology that will become more common with further development to address current limitations.
Edge detection identifies points in a digital image where brightness changes sharply. It is used for image segmentation to divide an image into regions of different objects. The Canny edge detection algorithm is commonly used as it has low error rates and well-localized edges. It applies noise reduction, finds intensity gradients, performs non-maximum suppression and hysteresis thresholding to detect a wide range of edges.
brain tumor detection by thresholding approachSahil Prajapati
This technical paper proposes a method for detecting tumors in MRI brain images using thresholding and morphological operations. The methodology involves preprocessing images using sharpening filters, histogram equalization, and median filtering. Threshold segmentation is then used to create binary images, and morphological operations like erosion and dilation are applied. Finally, tumor regions are extracted using image subtraction, which removes closely packed pixels. The authors found that this approach, combining thresholding with morphological operations and subtraction, was effective at detecting and segmenting tumor regions in MRI brain images.
This is an easy introduction to the concept of Genetic Algorithms. It gives Simple explanation of Genetic Algorithms. Covers the major steps that are required to implement the GA for your tasks.
For other resources visit: http://pimpalepatil.googlepages.com/
For more information mail me on [email protected]
This document discusses genetic algorithms and their applications. It explains key concepts like genetic crossover, genetic algorithm steps to solve optimization problems, and how genetic algorithms mimic biological evolution. Examples are provided of genetic algorithms being used for tasks like predicting protein structure, automotive design optimization, and generating musical variations. Advantages and limitations of genetic algorithms are also summarized.
This document provides an introduction to genetic algorithms, which are a class of computational models inspired by evolution. It describes how genetic algorithms use processes analogous to natural selection and genetics to arrive at optimal solutions to problems. The document outlines the key components of genetic algorithms, including representing potential solutions as binary strings, selecting parents based on fitness, recombining parents via crossover to create offspring, mutating offspring randomly, and replacing the population with the offspring. The goal is to evolve better and better solutions over many generations through these evolutionary processes of selection, recombination and mutation.
The document discusses edge detection methods including gradient based approaches like Sobel and zero crossing based techniques like Laplacian of Gaussian. It proposes a new algorithm that applies fuzzy logic to the results of gradient and zero crossing edge detection on an image to more accurately identify edges. The algorithm calculates gradient and zero crossings, applies fuzzy rules to classify pixels, and thresholds to determine final edge pixels.
Genetic algorithms are optimization techniques inspired by Darwin's theory of evolution. They use operations like selection, crossover and mutation to evolve solutions to problems by iteratively trying random variations. The document outlines the history, concepts, process and applications of genetic algorithms, including using them to optimize engineering design, routing, computer games and more. It describes how genetic algorithms encode potential solutions and use fitness functions to guide the evolution toward better outcomes.
This document provides an overview and examples of using MATLAB. It introduces MATLAB, describing its origins and applications in fields like aerospace, robotics, and more. It then covers various topics within MATLAB like image processing, reading and writing images, converting images to binary and grayscales, plotting functions, and using GUI tools. Examples of code are provided for tasks like reading images, filtering noise, and capturing video from a webcam. The document also lists some common file extensions used in MATLAB and describes serial communication.
The document provides an overview of basic image processing concepts and techniques using MATLAB, including:
- Reading and displaying images
- Performing operations on image matrices like dilation, erosion, and thresholding
- Segmenting images using global and local thresholding methods
- Identifying and labeling connected components
- Extracting properties of connected components using regionprops
- Performing tasks like edge detection and noise removal
Code examples and explanations are provided for key functions like imread, imshow, imdilate, imerode, im2bw, regionprops, and edge.
This document provides an introduction to genetic algorithms (GAs) including:
- GAs are inspired by Darwin's theory of evolution and use techniques like inheritance, mutation, selection, and crossover to find solutions to optimization problems.
- The document discusses key GA components like populations of individuals, fitness functions, selection, crossover, and mutation.
- Examples of GA applications to energy management problems are presented including categorizing appliances, pricing schemes, and parametrizing a GA for scheduling home appliances.
មេរៀនៈ Data Structure and Algorithm in C/C++Ngeam Soly
This document provides an introduction to a lecture on data structures and algorithms. It discusses the lecturer's contact information and expectations for reading ahead of lectures. It then covers topics that will be discussed in the course, including programs and programming, introduction to programming, crafting programs effectively, what makes a good program, and why data structures and algorithms are important subjects. The document provides an overview of what will be covered in the course.
This presentation is intended for giving an introduction to Genetic Algorithm. Using an example, it explains the different concepts used in Genetic Algorithm. If you are new to GA or want to refresh concepts , then it is a good resource for you.
Microscopic Image Analysis of Nanoparticles by Edge Detection Using Ant Colon...IOSR Journals
This document presents a method for analyzing nanoparticles using microscopic images through edge detection with Ant Colony Optimization (ACO). Initially, edges are extracted from images using various detectors and adaptive thresholding. Ants are placed at endpoint pixels and move between pixels probabilistically based on pheromone levels, connecting discontinuities. Results on cerium oxide and zinc oxide nanoparticle images show the ACO-improved edges better distinguish particles and determine sizes/shapes compared to conventional detectors alone.
The document discusses the basics of computed tomography (CT) scanning. It explains some limitations of conventional X-rays like superimposition of structures and poor contrast resolution. CT provides cross-sectional images of the body with no superimposition of tissues and excellent contrast resolution. A CT scan uses X-rays combined with computer technology to produce internal images of the body. An X-ray tube rotates around the patient, emitting a thin beam of X-rays that pass through the body and are measured by a detector. The computer analyzes the data to generate two-dimensional cross-sectional images of the inside of the body.
An Information-Theoretic Approach for Clonal Selection AlgorithmsMario Pavone
This document presents an information-theoretic approach for clonal selection algorithms (CSA) used to solve global optimization problems. It introduces CSA as biologically-inspired algorithms, describes the key operators of cloning, hypermutation, and aging. It also discusses using Kullback-Leibler, Rényi, and Von Neumann divergences to analyze the learning process of CSA. The document outlines applying CSA to benchmark optimization functions and comparing results.
This document discusses image feature extraction and classification techniques for plankton images. It explores edge detection methods like Roberts, Sobel, and Canny edge detectors. Shape features like area, perimeter, axes lengths, convexity, compactness, eccentricity, and solidity are extracted from the edge images. Classification is done using a random forest model trained on the features. Combining Canny with Sobel produced the best edges for feature extraction. The random forest model performed better than random guessing on a test dataset, showing these features can distinguish plankton species. Future work could improve edge detection, add more features, and optimize the classification model.
Personalized medicine via molecular interrogation, data mining and systems bi...Gerald Lushington
One of the major problems in our medical system is the prescription of medicines that, although well validated over a general group of clinical trial patients for specific ailments, may produce unhelpful or even harmful results in some individuals. A major emerging goal in the pharmaceutical and biomedical industries is the ability to tailor medicines to the individual. This can be achieved, but in practice still requires careful analysis of an extensive array of data and thus has not yet entered the mainstream medical practice.
Biofield Sciences has been developing a premedical, non invasive assessment protocol. This preventative approach has led us to imaging the human biofield, where the early warning signs of disease develop. Please visit our website www.biofieldscience.com and have a look at our new Biofield Viewer, www.biofieldviewer.com
ABSTRACT
Medical images are pictures of distributions of physical attributes captured by an image acquisition system. Most of today’s images are digital. They may be post processed for analysis by a computer-assisted method. Edges are important features in an image. Edge detection extracts salient features from an image such as corners, lines and curves. These features are used by higher level computer vision algorithms. Segmentation plays a crucial role in extraction of useful information and attributes from medical images. Different edge detection methods are applied on dental images. It is implemented using MATLAB.
Keywords – Edge Detection, Dental Image, Canny
This document discusses and compares various nature-inspired optimization algorithms for resolving the mixed pixel problem in remote sensing imagery, including Biogeography-Based Optimization (BBO), Genetic Algorithm (GA), and Particle Swarm Optimization (PSO). It provides an overview of each algorithm, explaining key concepts like migration and mutation in BBO. The document aims to prove that BBO is the best algorithm for resolving the mixed pixel problem by comparing it to other evolutionary algorithms. It also includes figures illustrating concepts like the species model and habitat in BBO.
This document compares the Biogeography-Based Optimization (BBO) algorithm to other nature-inspired optimization algorithms for resolving the mixed pixel problem in remote sensing images. It provides background on remote sensing, mixed pixels (mixels), and describes optimization algorithms including genetic algorithm, particle swarm optimization, differential evolution, and ant colony optimization. It then describes the BBO algorithm in detail and compares its key characteristics to other algorithms. Finally, it proposes a methodology for using BBO to resolve mixed pixels and concludes that BBO is better suited than other algorithms for this task due to its unique features like low migration rates and effective memory capability.
This document presents Kendi Muchungi's PhD thesis on rod-cone convergence in the retina. The thesis includes:
1) An introduction to the participating neurons in the retina and existing models of light adaptation and contrast gain control.
2) Research questions on how rod-cone convergence affects light adaptation and contrast gain control, and how this convergence could be exploited.
3) Details of the author's biologically inspired computational model of the retina that incorporates rod influence through rod-cone coupling and feedback from horizontal and amacrine cells.
4) Evaluation of the model showing it can replicate biological responses to variations in light intensity and contrast.
5) Analysis demonstrating the significance of rod influence in improving
This document discusses using ant colony optimization (ACO) for image edge detection. It begins with an introduction to how real ants find food sources by laying pheromone trails. It then presents the ACO edge detection model, which uses artificial ants to construct a pheromone matrix representing edge information. The ants move between adjacent pixels probabilistically based on pheromone levels and image features. After construction, the pheromone matrix is updated and used to classify pixels as edges or non-edges. Experimental results are presented but not described.
This document summarizes a research paper on estimating skeletal maturity through the Tanner and Whitehouse bone age assessment method. The paper presents a system for segmenting wrist bones from left hand radiographs. The system first preprocesses images using Gaussian filtering and grayscale conversion. Canny edge detection is then used to extract regions of interest, which are classified using an Iterative Dichotomiser 3 classifier. The Tanner and Whitehouse method is applied to assess bone age. The system was tested on 50 images with 96% accuracy for males and 98% accuracy for females.
This document summarizes a study on automatically detecting boundaries and regions of interest in ultrasound images of focal liver lesions. The researchers used texture analysis and gradient vector flow snakes to extract boundaries after reducing speckle noise. They tested several noise filters and found median filtering worked best, achieving the highest PSNR. Texture analysis via gray-level co-occurrence matrix extraction detected regions more accurately than range or standard deviation filters. Morphological operations and seed point determination were then used to generate the final region of interest. The proposed automatic method facilitates ultrasound image segmentation and analysis of focal liver lesions.
This document summarizes a study on automatically detecting boundaries and regions of interest in ultrasound images of focal liver lesions. The researchers used texture analysis and gradient vector flow snakes to extract boundaries after applying speckle noise reduction filters. They compared median, mean, Wiener and Gaussian low-pass filters, finding median filtering worked best with a PSNR of 31.3089dB. Gray-level co-occurrence matrix texture analysis, morphological operations and seed point determination were then used to generate regions of interest. The automatic method effectively detected lesion boundaries and regions of interest in ultrasound images.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Computational Engineering Research(IJCER)ijceronline
This document summarizes and compares four point-based feature extraction methods for palmprint authentication: Forstner operator, SUSAN operator, wavelet-based salient point detection, and Trajkovic and Hedley corner detector. It provides details on how each method works, including equations to calculate features. The Forstner operator identifies points, edges and regions using autocorrelation and error ellipses. The SUSAN operator finds areas of similar brightness within a circular window. Wavelet-based detection extracts salient points from variations across image resolutions. Trajkovic and Hedley corner detection has improved localization compared to other operators like Plessey.
This document discusses using ant colony optimization (ACO) to perform edge detection on red blood cell images. It begins with an overview of how real ants find food sources by laying pheromone trails. It then describes the ACO edge detection model, which uses artificial ants to iteratively construct solutions and update a pheromone matrix representing edge information. The ants move between pixels based on pheromone levels and edge connections, locally updating pheromone levels. After construction, a global update is done before classification decides on edges. Experimental results showed the ACO approach effectively detected edges in test images.
This document presents a method for image segmentation using modified bacterial foraging optimization and RGB decomposition. The image is decomposed into R, G, and B color planes. Thresholds are calculated for each plane using the modified bacterial foraging algorithm. A final threshold is calculated as the average of the three thresholds and applied to the original image for segmentation. Performance is measured using metrics like PSNR, standard deviation, entropy, and class variance. The method is tested on several images and results show improved thresholds compared to other methods like Otsu thresholding. While computation time increases with image size, the segmentation accuracy is better than other thresholding techniques.
The accurate determination of the sex and age of human skull is a critical challenge in skeleton anthropology and crime department. In the forensic
laboratory they determine both the sex and age of skeleton using carbon content of the bones. The teeth, pelvis and skull are the most widely used sites
for determination of sex and age of the skeleton. This paper introduces a technique for objective qualification of age and sexual dimorphic features
using wavelet transformation, it is a multiscale mathematical technique that allows determination of shape variation that are hide at various scale of
resolution. We use a 2D discrete wavelet transform in the proposed method. In the skull the supraorbital margin is consider to determine sex of skull
and the area occupation of upper part of skull is used to estimate the age of the skull. SVM is a classifier used for classification. We used both
supervised and unsupervised SVM for both sex and age detection of the skull.
Data Driven Process Optimization Using Real-Coded Genetic Algorithms ~陳奇中教授演講投影片Chyi-Tsong Chen
The document describes the development of data-driven techniques for process optimization using real-coded genetic algorithms. It introduces genetic algorithms and how they are inspired by biological evolution. It then describes real-coded genetic algorithms and the key steps of the algorithm, including reproduction, crossover, and mutation. Finally, it discusses applications of real-coded genetic algorithms for single-objective and multi-objective optimization problems, and their use in optimizing metalorganic chemical vapor deposition processes.
How to Customize Your Financial Reports & Tax Reports With Odoo 17 AccountingCeline George
The Accounting module in Odoo 17 is a complete tool designed to manage all financial aspects of a business. Odoo offers a comprehensive set of tools for generating financial and tax reports, which are crucial for managing a company's finances and ensuring compliance with tax regulations.
Title: A Quick and Illustrated Guide to APA Style Referencing (7th Edition)
This visual and beginner-friendly guide simplifies the APA referencing style (7th edition) for academic writing. Designed especially for commerce students and research beginners, it includes:
✅ Real examples from original research papers
✅ Color-coded diagrams for clarity
✅ Key rules for in-text citation and reference list formatting
✅ Free citation tools like Mendeley & Zotero explained
Whether you're writing a college assignment, dissertation, or academic article, this guide will help you cite your sources correctly, confidently, and consistent.
Created by: Prof. Ishika Ghosh,
Faculty.
📩 For queries or feedback: [email protected]
Real GitHub Copilot Exam Dumps for SuccessMark Soia
Download updated GitHub Copilot exam dumps to boost your certification success. Get real exam questions and verified answers for guaranteed performance
Contact Lens:::: An Overview.pptx.: OptometryMushahidRaza8
A comprehensive guide for Optometry students: understanding in easy launguage of contact lens.
Don't forget to like,share and comments if you found it useful!.
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...Celine George
Analytic accounts are used to track and manage financial transactions related to specific projects, departments, or business units. They provide detailed insights into costs and revenues at a granular level, independent of the main accounting system. This helps to better understand profitability, performance, and resource allocation, making it easier to make informed financial decisions and strategic planning.
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schoolsdogden2
Algebra 1 is often described as a “gateway” class, a pivotal moment that can shape the rest of a student’s K–12 education. Early access is key: successfully completing Algebra 1 in middle school allows students to complete advanced math and science coursework in high school, which research shows lead to higher wages and lower rates of unemployment in adulthood.
Learn how The Atlanta Public Schools is using their data to create a more equitable enrollment in middle school Algebra classes.
How to Set warnings for invoicing specific customers in odooCeline George
Odoo 16 offers a powerful platform for managing sales documents and invoicing efficiently. One of its standout features is the ability to set warnings and block messages for specific customers during the invoicing process.
"Basics of Heterocyclic Compounds and Their Naming Rules"rupalinirmalbpharm
This video is about heterocyclic compounds, which are chemical compounds with rings that include atoms like nitrogen, oxygen, or sulfur along with carbon. It covers:
Introduction – What heterocyclic compounds are.
Prefix for heteroatom – How to name the different non-carbon atoms in the ring.
Suffix for heterocyclic compounds – How to finish the name depending on the ring size and type.
Nomenclature rules – Simple rules for naming these compounds the right way.
Common rings – Examples of popular heterocyclic compounds used in real life.
GDGLSPGCOER - Git and GitHub Workshop.pptxazeenhodekar
This presentation covers the fundamentals of Git and version control in a practical, beginner-friendly way. Learn key commands, the Git data model, commit workflows, and how to collaborate effectively using Git — all explained with visuals, examples, and relatable humor.
What makes space feel generous, and how architecture address this generosity in terms of atmosphere, metrics, and the implications of its scale? This edition of #Untagged explores these and other questions in its presentation of the 2024 edition of the Master in Collective Housing. The Master of Architecture in Collective Housing, MCH, is a postgraduate full-time international professional program of advanced architecture design in collective housing presented by Universidad Politécnica of Madrid (UPM) and Swiss Federal Institute of Technology (ETH).
Yearbook MCH 2024. Master in Advanced Studies in Collective Housing UPM - ETH
Geography Sem II Unit 1C Correlation of Geography with other school subjectsProfDrShaikhImran
The correlation of school subjects refers to the interconnectedness and mutual reinforcement between different academic disciplines. This concept highlights how knowledge and skills in one subject can support, enhance, or overlap with learning in another. Recognizing these correlations helps in creating a more holistic and meaningful educational experience.
*Metamorphosis* is a biological process where an animal undergoes a dramatic transformation from a juvenile or larval stage to a adult stage, often involving significant changes in form and structure. This process is commonly seen in insects, amphibians, and some other animals.
3. Edges are significant local
changes of intensity in an image.
A Tulips image
Edge Detection is the process
of identifying and locating sharp
discontinuities in an image.
Abrupt change in pixel intensity
Characterize boundary of a object
Edges of the Tulips image
4.
A tulips Image Part of the image Edge of the part of the image
Matrix generated by the Part of the image
5. CAUSES OF INTENSITY CHANGES
1. Geometric events
Discontinuity in depth and/or
surface colour and texture
2.Non-geometric events
Edge formation due to
Reflection of light discontinuity of surface
Illumination
shadows
REFLECTANCE ILLUMINATION SHADOWS
7. The basic idea behind edge detection is to find places in an
image where the intensity changes rapidly, using one of the
two criterions:
1. Find places where the first derivative of the intensity is greater
in magnitude than a specified threshold. (USING
GRADIENT)
2. Find places where the second derivative of the intensity has a
zero crossing. (USING LAPLACIAN)
Examples of the gradient based edge detectors are Prewit and
Sobel operators.
An alternative method is an optimal edge detector like the
Canny operator, for two dimensional images.
9. INPUT
IMAGE ENHANCEME
FILTERING DETECTION
NT
EDGES OF
THE IMAGE LOCALISATI
LINK
ON
10. The quality of Edge Detection depends upon a lot of
factors such as lighting conditions, the presence of
objects of similar intensity,density of edges in the
scene and noise.
There is no good method for automatically setting
these values, so they are manually changed by an
operator each time the detector is run with a different
set of data.
In the presence of noise, detection of edges becomes
very difficult because both edges and noise are
characterized by high frequency.
11. 1.Corners are often missed.
2.Here we have to choose
Threshold values and width
of the mask. Changing the size of the image
complicates the setting of these values.
3.For different features we need a different operator.
13. The name “EVOLUTIONARY ALGORITHM”
suggests, evolution as it is observed in nature is
imitated.
These algorithms are increasingly sought for
finding optimum solutions for the engineering
problems.
Well suited to solve complex computational
problems such as optimization of objective
functions , pattern recognition ,image processing,
filter modelling,etc.
14. The word „„heuristic” is Greek and means „„to know”, „„to find”, „„to discover”
or „„to guide an investigation”, Specifically, „„Heuristics are techniques which
seek good (near-optimal) solutions at a reasonable computational cost
without being able to guarantee either feasibility or optimality, or even in
many cases to state how close to optimality a particular feasible solution
is.” Heuristic algorithms mimic physical or biological processes.
Some of most famous of these algorithms are
ANT COLONY • MIMICS THE BEHAVIOUR OF ANTS
OPTIMIZATION FORAGING FOR FOOD
BACTERIA FORAGING • COMES FROM SEARCH AND THE
ALGORITHM OPTIMAL FORAGING OF BACTERIA
PARTICLE SWARM • SIMULATES THE BEHAVIOUR OF
OPTIMIZATION FLOCK OF BIRDS
GENETIC ALGORITHM • INSPIRED FROM DARWINIAN THEORY
16. Given by Kelvin M. Passino (2002)
Exploits the foraging behaviour of Bacteria
Foraging can be modeled as an optimization process where bacteria
seek to maximize the energy obtained per unit time spent during
foraging.
An objective function is posed as the cost incurred by the bacteria in
search of food.
A set of bacteria tries to reach an optimum cost.
Four Stages in the life cycle of Bacteria
1. Chemo taxis
2. Swarming
3. Reproduction and
4. Elimination and Dispersal
These stages in the search space generate an optimal solution to the
problem of optimization.
17. In Chemo taxis stage, the bacteria
either resort or tumble followed by
a tumble or make a tumble followed
by a run or swim.
Movement stage of Bacteria
In Swarming, each E. coli
bacterium signals another
bacterium via attractants to
swarm together.
Cell to cell signalling stage.
18. In the Reproduction the least healthy
bacteria die and of the healthiest each
bacterium splits into two bacteria,
which are placed at the same location
In the Elimination and Dispersal
stage, any bacterium from the total set
can be either eliminated or dispersed
to a random location during the
optimization.
This stage prevents the Bacterium Reproduction stage
Of Bacteria
from attaining local optimum.
19. Start
Initialization p: Dimension
Evaluation S: Population Size
Moving Nc: Chemotactic steps
Tumble / Swim
NS: Swim Length Limitation
No
End of Nc? Nre: Reproduction Steps
Yes
Ned: Elimination-Dispersal Steps
Reproduction
Ped: Elimination Rate
No
End of Rep.? dlt(i): random number on [-1,1].
Yes
where i from 1 to p.
Elimination
c(i): Step Size for the dimension.
No
End of Eli.?
Yes
19
End
21. i
J (i , j , k , l )
J (i , j , k , l ) J cc j, k , l , P j, k , l (1)
i i dlt i
j 1, k , l j, k , l C i
T
dlt i dlt i (2)
i
J (i, j 1, k , l ) J (i, j 1, k , l ) J cc j 1, k , l , P j 1, k , l (3)
Nc 1
i
J health
J i, j, k , l (4)
j 1
22. The original bacterial foraging (BF) Technique
modified to make it suitable for edge detection.
The nutrient concentration at each position is
calculated using a derivative approach.
Modifications
Search Space
2-dimension search space of bacteria consists of
the x and y coordinates of a pixel in an image.
23. Chemo taxis
Goal of this stage is to let the bacterium search for the edge pixels of the
image.
Another goal is to keep the bacterium away from the noisy pixels.
Probabilistic derivative approach is used to find the edge pixels.
Swarming
A bacterium relies on other bacteria
The bacterium that has searched an optimum path, signals other bacteria so
that they can reach the desired optimum path swiftly.
That optimum path is the best edge detected.
Bacterium releases both attractant and repellant.
Bactreia congregate in to groups and move in a concentric manner.
Reproduction
The population is sorted in the ascending order of the accumulated cost
Half of the least healthy bacteria dies and each of the other healthiest bacteria
splits up into two.
Elimination-Dispersal
Each bacterium in the population is subjected to elimination-dispersal with
some Probablity.
24. RESULT OF BACTERIA FORAGING
ALGORITHM
A Cameraman Image Edge Detected using BFOA
With split ratio 4
Edge detected using BFOA
With split ratio 12
25. Edges are accurately detected
The result of this algorithm may show
disconnected edges as shown in Fig
Thick edges can be seen due to bacteria moving
parallel to an edge.
Since BFOA has been devised with the aim of
global extremes, this error is expected.
27. Proposed by Kenedy and Eberhert (1995)
Global optimization method
Population based Evolutionary Algorithm based on social-
psychological principles
Simulates a social model such as flocking of birds, schooling of
fish etc.
PSO algorithm attempt to maximize or minimize a given set of
data by generating a random set of particles which move with
randomly changing velocity throughout the search space.
The Particle with the best position is selected and other particle
will swarm towards it.
Successfully applied to training neural networks, optimizing
power system,fuzzy control systems, robotics, antenna design
and computer games.
29. The velocity update equation is given by
The next position of the particle will be
31. Best Edge is nothing but a COLLECTION OF
PIXELS WHICH ARE ON CURVES.
PSO based algorithm can be used to detect those
curves.
To Apply PSO based algorithm in edge detection
“Each Particle represents a CURVE”
32. The movement directions from a
pixel to one of eight neighbours
An example for a curve passing through pixel A
5 5 5 4 3 3 4 4 5 0 0 0 0 0 ......
Particle encoding for the curve above
The dimension of the vector representing a particle depends on image size.
Each Curve can be encoded using the direction of movement from a pixel to
the next pixel on the curve.
The Best fitting Curve is selected which passes through a pixel.
All other neighbour curves (Particles) swarm towards the Best fitting Curve.
33. Homogeneity and
Uniformity factors
The first one measures the homogeneity of the pixels on a curve and the second one
measures the intensity similarity of these pixels.
The homogeneity operator can be formulated as below:
(5)
Homogeneity factor of a curve: This factor shows the average of homogeneity of the pixels on a
curve where the homogeneity of each pixel on the curve is calculated based on equation (5).
This factor is defined as below:
(6)
Uniformity factor of a curve: The pixels on a curve often have similar values of intensities;
hence we introduce a new concept that we call the uniformity factor of a curve. This factor
can be computed for any curve as below:
(7)
34. Objective function is needed to calculate the fitness of the particle at each
point. In case of edge detection the objective function is calculated with
the help of homogeneity factor and uniformity factor. Here, we search the
curves which pass through a pixel. We expect to make the homogeneity
factor bigger, the uniformity factor smaller, and the length of the curves
bigger. So heuristically this function is defined as below:
(8)
35. Flow chart depicting the General PSO Algorithm:
Start
Initialize particles with random position
and velocity vectors.
particles exhaust
For each particle’s position (p)
Loop until all
evaluate fitness
Loop until max iter
If fitness(p) better than
fitness(pbest) then pbest= p
Set best of pBests as gBest
Update particles velocity (eq. 1) and
position (eq. 3)
Stop: giving gBest, optimal solution.
36. RESULTS OF PSO
Edge Detected Using Sobel Operator
A Test Image
Edge Detected using PSO
37. A
A noisy Image Output Using Sobel Operator
Output Using PSO
38. Ease of implementation
High rate of convergence
Fewer operators
A limited memory for each particle to save its
previous state
High capability to optimise noisy functions
39. Bacteria Foraging method finds robust edges even in the
complex and noisy images. This work opens a new domain of
research in the field of edge detection using bio-inspired
algorithms. This method performs better than many other
standard methods.
Particle Swarm Optimization (PSO) is a computational
intelligence method. Here the results of PSO are compared with
the Sobel operator and this algorithm outperforms the Sobel
operator.
A main advantage of these algorithms is detection of edges
in one step and there is no need for smoothing, enhancement and
localization as pre-processing steps.
The PSO algorithm used here gives the output only for
predefined shapes (e.g. Circle, Triangle etc). An improvement
can be made so that this algorithm can be applied for the
complex images also.
40. 1. R afael C. Gonzalez, Richard E.Woods and Steven l. Eddins “Digital
Image Processing using MATLAB” Second Edition
2. Om Prakash Verma, Madasu Hanmandlu, Puneet Kumar , Sidharth
Chhabra, and Akhil Jindal, “A Novel Bacterial Foraging Technique
for Edge detection ”, 2011 IEEE
3. Kelvin M. Passino , “Biomimicry of Bacteria Foraging and Control
for Distributed Optimization and Control”, JUNE 2002 IEEE, pp 52-
67
4. Mahdi Setayesh1, Mengjie Zhang1 and Mark Johnston2,” A new
homogeneity-based approach to edge detection using PSO, 24th
International Conference Image and Vision Computing New Zealand
(IVCNZ 2009)”, 2009 IEEE
5. Mahdi Setayesh, Mengjie Zhang and Mark Johnston, “Improving
Edge Detection Using Particle Swarm Optimisation”,2010,IEEE
Editor's Notes
#13: Sobel operator output of noisy and blurred images.