Search Results - ((reconstruction algorithm) OR (((extraction algorithm) OR (detection algorithm))))
Search alternatives:
- extraction algorithm »
-
1
Extraction and reconstruction of retinal vasculature
Published 2007“…This paper presents the development of an image processing algorithm for detecting and reconstructing retinal vasculature. …”
Get full text
Get full text
Get full text
Citation Index Journal -
2
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…This application should constitute the essential processes for a computer to understand the paper sketch junctions, depth and connections. Feature extraction is a preliminary step before 3D reconstruction and therefore, a junction detection algorithm is proposed. …”
Get full text
Get full text
Thesis -
3
A brief review on vessel extraction and tracking methods
Published 2019“…This step is usually performed by enhancing vessel-like objects in the image, in order to differentiate between blood vessels and background, followed by applying the thinning algorithm to obtain the final output. Another approach is direct extraction of centerline points using exploratory tracing algorithm preceded by a seed point detection schema to provide a set of reliable starting points for the tracing algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
4
Single-trial visual evoked potential extraction using partial least-squares-based approach
Published 2016“…The simulation results show that the proposed PLS algorithm is capable of reconstructing the EEG signal into its desired shape of the ideal VEP. …”
Get full text
Get full text
Article -
5
Single-trial visual evoked potential extraction using partial least-squares-based approach
Published 2016“…The simulation results show that the proposed PLS algorithm is capable of reconstructing the EEG signal into its desired shape of the ideal VEP. …”
Get full text
Get full text
Article -
6
Blotch removal using multi-level scanning, shape analysis, and meta heuristic techniques
Published 2015“…This post processing algorithm was provided based on a multi-level scanning and shape analysis which was presented for the better performance of high correct detection and lower false alarms for each given threshold. …”
Get full text
Get full text
Thesis -
7
Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman
Published 2014“…The artifacts are due to the beam hardening, photon starvation effect, and inappropriate correction algorithm during image reconstruction. Knowledge on factors affecting the artifacts is crucially important to minimize these artifacts. …”
Get full text
Get full text
Thesis -
8
Performance comparison of classification algorithms for EEG-based remote epileptic seizure detection in wireless sensor networks
Published 2014“…Identification of epileptic seizure remotely by analyzing the electroencephalography (EEG) signal is very important for scalable sensor-based health systems.Classification is the most important technique for wide-ranging applications to categorize the items according to its features with respect to predefined set of classes.In this paper, we conduct a performance evaluation based on the noiseless and noisy EEG-based epileptic seizure data using various classification algorithms including BayesNet, DecisionTable, IBK, J48/C4.5, and VFI.The reconstructed and noisy EEG data are decomposed with discrete cosine transform into several sub-bands.In addition, some of statistical features are extracted from the wavelet coefficients to represent the whole EEG data inputs into the classifiers.Benchmark on widely used dataset is utilized for automatic epileptic seizure detection including both normal and epileptic EEG datasets.The classification accuracy results confirm that the selected classifiers have greater potentiality to identify the noisy epileptic disorders.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A novel hybrid edge detection algorithm based on wavelet thresholding and ICA
Published 2012Get full text
Working Paper -
10
-
11
Foreground segmentation-based human detection with shadow removal
Published 2010“…The technique we propose includes background subtraction, foreground segmentation, and shadow removal. The proposed detection technique will first try to extract all foreground objects from the background and then moving shadows will be eliminated by a shadow detection algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Quantitative analysis evaluation of image reconstruction algorithms between digital and analog PET-CT
Published 2023“…Results demonstrate that both OSEM and HYPER DPR reconstruction algorithms in digital PET-CT has greater spatial resolution, increased detection sensitivity and less image noise when compared to analog PET-CT. …”
Get full text
Get full text
Article -
13
Improving Brain MR Image Classification for Tumor Segmentation using Phase Congruency
Published 2018“…In order to minimize the extracted feature set, we applied the principal Component Analysis algorithm. …”
Get full text
Get full text
Get full text
Article -
14
3D surface reconstruction of coronary arteries from cardiovascular angiography to detect location of heart vessels
Published 2012“…The first step is the coronary artery trees extraction. We proposed an algorithm to extract tree vessels from cardiovascular angiography by removing the background and highlighting the coronary artery tree vessels. …”
Get full text
Get full text
Thesis -
15
Subspace Techniques for Brain Signal Enhancement
Published 2009“…Later, the performance of the algorithms is assessed in their abilities to detect the latencies of the P100, P200 and P300 components. …”
Get full text
Get full text
Book Section -
16
Feature Extraction and Matching from images / lntan Syaherra Ramli
Published 2023“…This is a fundamental task for many applications such as 30 point cloud reconstruction and pattern recognition. In this task, feature extraction is used to detect the unique feature point from the images. …”
Get full text
Get full text
Monograph -
17
G2 parametric curve and surface fitting using beta-spline / Normi Abdul Hadi
Published 2015“…Beta-spline surface is then fitted to the extracted data points from each slice. The developed surface fitting algorithm is applied on 3D Computerized Tomography (CT) image of human face and Stanford bunny. …”
Get full text
Get full text
Thesis -
18
Image authentication using Zernike moment watermarking
Published 2013“…In case of authenticity failure, a comparison between recovered Sobel edge map and recently obtained Sobel edge map from the watermarked image detect the location of tampered areas. The results from the test show that the proposed algorithm has good performance in discriminating the malicious from non-malicious modifications which is the main character of an image authentication algorithm. …”
Get full text
Get full text
Thesis -
19
-
20
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…This study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code and Vertex chain code algorithm as picture description language, and a new computational algorithm and neural network classifier for corner detection. …”
Get full text
Get full text
Monograph
