M Sezgin, B Sankur - Journal of Electronic imaging, 2004 - spiedigitallibrary.org
We conduct an exhaustive survey of image thresholding methods, categorize them, express their formulas under a uniform notation, and finally carry their performance comparison. The …
B Jähne, H Haussecker, P Geissler - 1999 - Citeseer
This handbook offers a fresh approach to computer vision. The whole vision process from image formation to measuring, recognition, or reacting is regarded as an integral process …
Image thresholding is a necessary task in some image processing applications. However, due to disturbing factors, eg non-uniform illumination, or inherent image vagueness, the …
Thresholding is a direct and simple approach to extract different regions from an image. In its basic formulation, thresholding searches for a global value that maximizes the separation …
Z Xie, GE Farin - IEEE Transactions on visualization and …, 2004 - ieeexplore.ieee.org
Hierarchical B-splines have been widely used for shape modeling since their discovery by Forsey and Bartels. We present an application of this concept, in the form of free-form …
CV Jawahar, PK Biswas, AK Ray - Pattern Recognition, 1997 - Elsevier
Thresholding, the problem of pixel classification is attempted here using fuzzy clustering algorithms. The segmented regions are fuzzy subsets, with soft partitions characterizing the …
This handbook provides information about fundamental aspects of the field and explores the myriad applications of fuzzy logic techniques and methods. It presents basic conceptual …
Relying party validator is a critical component of RPKI: it fetches and validates signed authorizations mapping prefixes to their owners. Routers use this information to block bogus …
An important problem in working with fuzzy sets is the correct construction of the membership functions that represent the objects of the system. Different experts construct …