A review on image segmentation techniques

NR Pal, SK Pal - Pattern recognition, 1993 - Elsevier
Many image segmentation techniques are available in the literature. Some of these
techniques use only the gray level histogram, some use spatial details while others use …

Survey over image thresholding techniques and quantitative performance evaluation

M Sezgin, B Sankur - Journal of Electronic imaging, 2004 - spiedigitallibrary.org
We conduct an exhaustive survey of image thresholding methods, categorize them, express
their formulas under a uniform notation, and finally carry their performance comparison. The …

[图书][B] Handbook of computer vision and applications

B Jähne, H Haussecker, P Geissler - 1999 - Citeseer
This handbook offers a fresh approach to computer vision. The whole vision process from
image formation to measuring, recognition, or reacting is regarded as an integral process …

Image thresholding using type II fuzzy sets

HR Tizhoosh - Pattern recognition, 2005 - Elsevier
Image thresholding is a necessary task in some image processing applications. However,
due to disturbing factors, eg non-uniform illumination, or inherent image vagueness, the …

A local fuzzy thresholding methodology for multiregion image segmentation

S Aja-Fernández, AH Curiale… - Knowledge-Based …, 2015 - Elsevier
Thresholding is a direct and simple approach to extract different regions from an image. In its
basic formulation, thresholding searches for a global value that maximizes the separation …

Image registration using hierarchical B-splines

Z Xie, GE Farin - IEEE Transactions on visualization and …, 2004 - ieeexplore.ieee.org
Hierarchical B-splines have been widely used for shape modeling since their discovery by
Forsey and Bartels. We present an application of this concept, in the form of free-form …

Investigations on fuzzy thresholding based on fuzzy clustering

CV Jawahar, PK Biswas, AK Ray - Pattern Recognition, 1997 - Elsevier
Thresholding, the problem of pixel classification is attempted here using fuzzy clustering
algorithms. The segmented regions are fuzzy subsets, with soft partitions characterizing the …

[图书][B] Handbook of fuzzy computation

E Ruspini, P Bonissone, W Pedrycz - 2020 - books.google.com
This handbook provides information about fundamental aspects of the field and explores the
myriad applications of fuzzy logic techniques and methods. It presents basic conceptual …

Beyond limits: How to disable validators in secure networks

T Hlavacek, P Jeitner, D Mirdita, H Shulman… - Proceedings of the …, 2023 - dl.acm.org
Relying party validator is a critical component of RPKI: it fetches and validates signed
authorizations mapping prefixes to their owners. Routers use this information to block bogus …

Interval type-2 fuzzy sets constructed from several membership functions: application to the fuzzy thresholding algorithm

M Pagola, C Lopez-Molina, J Fernandez… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
An important problem in working with fuzzy sets is the correct construction of the
membership functions that represent the objects of the system. Different experts construct …