43 resultados para Image enhancement
em Cochin University of Science
Resumo:
Digital Image Processing is a rapidly evolving eld with growing applications in Science and Engineering. It involves changing the nature of an image in order to either improve its pictorial information for human interpretation or render it more suitable for autonomous machine perception. One of the major areas of image processing for human vision applications is image enhancement. The principal goal of image enhancement is to improve visual quality of an image, typically by taking advantage of the response of human visual system. Image enhancement methods are carried out usually in the pixel domain. Transform domain methods can often provide another way to interpret and understand image contents. A suitable transform, thus selected, should have less computational complexity. Sequency ordered arrangement of unique MRT (Mapped Real Transform) coe cients can give rise to an integer-to-integer transform, named Sequency based unique MRT (SMRT), suitable for image processing applications. The development of the SMRT from UMRT (Unique MRT), forward & inverse SMRT algorithms and the basis functions are introduced. A few properties of the SMRT are explored and its scope in lossless text compression is presented.
Resumo:
An improved color video super-resolution technique using kernel regression and fuzzy enhancement is presented in this paper. A high resolution frame is computed from a set of low resolution video frames by kernel regression using an adaptive Gaussian kernel. A fuzzy smoothing filter is proposed to enhance the regression output. The proposed technique is a low cost software solution to resolution enhancement of color video in multimedia applications. The performance of the proposed technique is evaluated using several color videos and it is found to be better than other techniques in producing high quality high resolution color videos
Resumo:
The paper summarizes the design and implementation of a quadratic edge detection filter, based on Volterra series, for enhancing calcifications in mammograms. The proposed filter can account for much of the polynomial nonlinearities inherent in the input mammogram image and can replace the conventional edge detectors like Laplacian, gaussian etc. The filter gives rise to improved visualization and early detection of microcalcifications, which if left undetected, can lead to breast cancer. The performance of the filter is analyzed and found superior to conventional spatial edge detectors
Resumo:
The differaction efficiency,sensitivity and storage life of Methylene Blue sencitized poly (vinyl chloride) film was improved by the addition of an electron donor in the matrix. The addition of pyridine enhanced the diffraction efficiency by two times and storage life of the gratings was increased to 2-3 days.
Resumo:
5-Hydroxytryptamine2A (5-HT2A) receptor kinetics was studied in cerebral cortex and brain stem of streptozotocin (STZ) induced diabetic rats. Scatchard analysis with [3H] (±) 2,3dimethoxyphenyl-l-[2-(4-piperidine)-methanol] ([3H]MDL100907) in cerebral cortex showed no significant change in maximal binding (Bmax) in diabetic rats compared to controls. Dissociation constant (K) of diabetic rats showed a significant decrease (p < 0.05) in cerebral cortex, which was reversed to normal by insulin treatment. Competition studies of [3H]MDL100907 binding in cerebral cortex with ketanserin showed the appearance of an additional low affinity site for 5-HT2A receptors in diabetic state, which was reversed to control pattern by insulin treatment. In brain stem, scatchard analysis showed a significant increase (p < 0.05) in Bmax accompanied by a significant increase (p < 0.05) in Kd. Competition analysis in brain stem also showed a shift in affinity towards a low affinity State for 5-HT2A receptors. All these parameters were reversed to control level by insulin treatment. These results show that in cerebral cortex there is an increase in affinity of 5-HT2A receptors without any change in its number and in the case of brain stem there is an increase in number of 5HT2A receptors accompanied by a decrease in its affinity during diabetes. Thus, from the results we suggest that the increase in affinity of 5-HT2A receptors in cerebral cortex and upregulation of 5-HT2A receptors in brain stem may lead to altered neuronal function in diabetes.
Resumo:
The high-affinity of [3H]y-aminobutyric acid (GABA) to GABAA receptors and [3H]baclofen to GABAB receptors were studied in the cerebellum of pyridoxine-deficient rats and compared to pyridoxine-supplemented controls. There was a significant increase in the maximal binding ( Bmax) of both GABAA and GABAB receptors with no significant difference in their binding affinities (Kd). The changes observed suggest a supersensitivity of GABAA and GABAB receptors which seems to correlate negatively with the concentration of GABA in the cerebellum of pyridoxine-deficient rats.
Resumo:
The differaction efficiency,sensitivity and storage life of Methylene blue sensitized poly(vinyl chloride) film was improved by the addition of an electron donor in the matrix. The addition of pyridine enhanced the diffraction efficiency by two times and storage life of the gratings was increased to 2-3 days.
Resumo:
Invertase was immobilised on microporous montmorillonite K-10 via adsorption and covalent binding. The immobilised enzymes were tested for sucrose hydrolysis activity in a batch reactor. Km for immobilised systems was greater than free enzyme. The immobilised forms could be reused for 15 continuous cycles without any loss in activity. After 25 cycles, 85% initial activity was retained. A study on leaching of enzymes showed that 100% enzyme was retained even after 15 cycles of reuse. Leaching increased with reaction temperature. Covalent binding resisted leaching even at temperatures of 70 °C.
Resumo:
International School of Photonics, Cochin University of Science and Technology
Resumo:
We have investigated the third-order nonlinearity in ZnO nanocolloids with particle sizes in the range 6-18 nm by the z-scan technique. The third-order optical susceptibility χ(3) increases with increasing particle size (R) within the range of our investigations. In the weak confinement regime, an R2 dependence of χ(3) is obtained for ZnO nanocolloids. The optical limiting response is also studied against particle size.
Resumo:
Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an information highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for infonnation security.Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet.Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several ·such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security.Hence studies were conducted on various types of algorithms being used in this area. Focus was given to identify the properties imparting security at this stage. By making use of a perception derived from these studies, new algorithms were designed. Performances of these algorithms were then studied followed by necessary modifications to yield an improved system consisting of a new stream cipher algorithm MAJE4, a new hash code JERIM- 320 and a new message authentication code MACJER-320. Detailed analysis and comparison with the existing popular schemes were also carried out to establish the security levels.The Secure Socket Layer (SSL) I Transport Layer Security (TLS) protocol is one of the most widely used security protocols in Internet. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL I TLS. But recent attacks on RC4 and HMAC have raised questions about the reliability of these algorithms. Hence MAJE4 and MACJER-320 have been proposed as substitutes for them. Detailed studies on the performance of these new algorithms were carried out; it has been observed that they are dependable alternatives.
Resumo:
In this thesis, we explore the design, computation, and experimental analysis of photonic crystals, with a special emphasis on structures and devices that make a connection with practically realizable systems. First, we analyze the propenies of photonic-crystal: periodic dielectric structures that have a band gap for propagation. The band gap of periodically loaded air column on a dielectric substrate is computed using Eigen solvers in a plane wave basis. Then this idea is extended to planar filters and antennas at microwave regime. The main objectives covered in this thesis are:• Computation of Band Gap origin in Photonic crystal with the abet of Maxwell's equation and Bloch-Floquet's theorem • Extension of Band Gap to Planar structures at microwave regime • Predict the dielectric constant - synthesized dieletric cmstant of the substrates when loaded with Photonic Band Gap (PBG) structures in a microstrip transmission line • Identify the resonant characteristic of the PBG cell and extract the equivalent circuit based on PBG cell and substrate parameters for microstrip transmission line • Miniaturize PBG as Defected Ground Structures (DGS) and use the property to be implemented in planar filters with microstrip transmission line • Extended the band stop effect of PBG / DGS to coplanar waveguide and asymmetric coplanar waveguide. • Formulate design equations for the PBG / DGS filters • Use these PBG / DGS ground plane as ground plane of microstrip antennas • Analysis of filters and antennas using FDID method
Resumo:
Effective use of fractal-based metallo-dielectric structures for enhancing the radar cross-section (RCS) of dihedral corner reflectors is reported. RCS enhancement of about 30 dBsm is obtained for corner reflectors with corner angles other than 90deg. This may find application in remote sensing and synthetic aperture radar.
Resumo:
Modern computer systems are plagued with stability and security problems: applications lose data, web servers are hacked, and systems crash under heavy load. Many of these problems or anomalies arise from rare program behavior caused by attacks or errors. A substantial percentage of the web-based attacks are due to buffer overflows. Many methods have been devised to detect and prevent anomalous situations that arise from buffer overflows. The current state-of-art of anomaly detection systems is relatively primitive and mainly depend on static code checking to take care of buffer overflow attacks. For protection, Stack Guards and I-leap Guards are also used in wide varieties.This dissertation proposes an anomaly detection system, based on frequencies of system calls in the system call trace. System call traces represented as frequency sequences are profiled using sequence sets. A sequence set is identified by the starting sequence and frequencies of specific system calls. The deviations of the current input sequence from the corresponding normal profile in the frequency pattern of system calls is computed and expressed as an anomaly score. A simple Bayesian model is used for an accurate detection.Experimental results are reported which show that frequency of system calls represented using sequence sets, captures the normal behavior of programs under normal conditions of usage. This captured behavior allows the system to detect anomalies with a low rate of false positives. Data are presented which show that Bayesian Network on frequency variations responds effectively to induced buffer overflows. It can also help administrators to detect deviations in program flow introduced due to errors.
Resumo:
This thesis is an outcome of the investigations carried out on the development of an Artificial Neural Network (ANN) model to implement 2-D DFT at high speed. A new definition of 2-D DFT relation is presented. This new definition enables DFT computation organized in stages involving only real addition except at the final stage of computation. The number of stages is always fixed at 4. Two different strategies are proposed. 1) A visual representation of 2-D DFT coefficients. 2) A neural network approach. The visual representation scheme can be used to compute, analyze and manipulate 2D signals such as images in the frequency domain in terms of symbols derived from 2x2 DFT. This, in turn, can be represented in terms of real data. This approach can help analyze signals in the frequency domain even without computing the DFT coefficients. A hierarchical neural network model is developed to implement 2-D DFT. Presently, this model is capable of implementing 2-D DFT for a particular order N such that ((N))4 = 2. The model can be developed into one that can implement the 2-D DFT for any order N upto a set maximum limited by the hardware constraints. The reported method shows a potential in implementing the 2-D DF T in hardware as a VLSI / ASIC