SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
Computer Engineering and Intelligent Systems                                         www.iiste.org
 ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
 Vol 2, No.3

       Advanced Fractal Image Coding Based on the Quadtree

                                        Ruhiat Sultana, Associate Professor
                                       Al-Habeeb College of Engg and Tech,
                                Chevella, R.R. Dist - 501503, Hyderabad, A.P. INDIA
                                         E- mail: ruhiatsultana@gmail.com


                                         Nisar Ahmed, Associate Professor
                                       Al-Habeeb College of Engg and Tech,
                                Chevella, R.R. Dist - 501503, Hyderabad, A.P. INDIA
                                          E- mail: nisar.ahcet@gmail.com

                                         Shaik Mahaboob Basha, Professor
                                       Al-Habeeb College of Engg and Tech,
                                Chevella, R.R. Dist - 501503, Hyderabad, A.P. INDIA
                                         E- mail: smbasha.phd@gmail.com

Abstract

Fractal image coding simply based on quad tree is a unique technique for still image compression.
Compared with other image compression methods, fractal image coding has the advantage of higher
compression ratio, higher decoding speed and decoded image having nothing to do with the resolution of
image. It spends too much time to look for the best matching Ri block on encoding. To improve the
encoding speed, we must narrow the search range and improve the search skills to ensure the best match
block falls within our range. In this paper, an advanced fractal image compression algorithm based on
quad tree is proposed. First, we can improve the construction method of search attractor by constructing
directly from the big Di block, so it can save a lot of searching time in encoding. Second, the attractors
can be self-constructed, so it is not happened that the attractor is not found in the traditional methods.
Experimental result shows that the algorithm makes image coding faster and more efficiency.

Keywords: Image compression; Fractal; Quad tree; Coding

I. Introduction

Fractal image compression, is base on the IFS (iterated function system) proposed by M.F.Barnsley,
(1986), “Fractal functions and interpolation”, is a unique approach to image coding. Its performance
relies on the presence of self-similarity between the regions of an image. Since most images process a
high degree of self- similarity, fractal compression contributes an excellent tool for compressing referred
by Cardinal J.(2001), “Fast Fractal Compression of Grayscale Images”, Truong T K(2004),Kung C
M,Jeng J H,(et a1), “Fast Fractal Image Compression Using Spatial Correlation”. In order to improve
the efficiency of fractal image compression, many people proposed a variety of flexible segmentation
methods, such as quad tree, rectangular, triangular and region segmentation method, it has proposed in
Tong Chong .(2001), “ Fast Fractal Image Encoding Based on Adaptive Search”, Saupe D,
RuhlM.(2004) “Evolutionary Fractal Image Compression”. In this paper, an advanced fractal image
coding algorithm based on quad tree is proposed to improve the speed of fractal image coding.


                                              129
Computer Engineering and Intelligent Systems                                      www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3

The setting of the paper is given below. Section II shall introduce the basic fractal image coding based
on quad tree. Section III shall describe our improvement. Then the experimental results of the proposed
method shall be shown and compared with that of the traditional one in Section IV. Finally, Section V
shall serve to present the conclusions.

II. Review of the Quad tree Approach

Quad tree segmentation is a unique technique that divides a gray level image into a set of homogenous
regions. The segmentation represents into a tree, and each tree node has four children. When we
decompose an image following this quad tree technique, we first assign the whole image to the root of
the tree and test its uniformity. If the uniformity condition is not met, it is then quartered into four sub-
images. These four sub-images have the same size and are associated with the four child nodes of the
root. The uniformity of each sub-image will be tested next, and the sub-image will be subdivided
repeatedly until the uniformity criterion is met or some minimum sub-image size has been reached and it
has been proposed in Distasi R, Nappi M,(2006). A demonstration of the process is shown in Figure 1.




(a) The segmentation process




(b) The corresponding quadtree

Figure 1: Example of quadtree segmentation

 Before division, we first set maximal and minimal depth of the quad tree and maximal allowable error
to decide the number of ranges. Then, we continuously split a range into four square ranges of the same
size by the quad tree method until minimal depth is met. An optimum matching block will be searched
for each range on the level. If it is found, it can be marked as Ri and the range corresponding with it can
be marked as Di and the split is not done again. Otherwise they are further splited into four ranges. This
process continues until we get the maximal depth is met. It has been proposed in Erjun Zhao, Dan Liu,
(2005), Tong Chong (2001).

III. The Proposed Method

A. The Proposed Algorithm

 As mentioned above, the traditional method of fractal coding generally divides the original image into
larger blocks Di and also divides the original image into smaller blocks Ri .Then classifies the blocks Di
by the defined standard and searches the similar Di in the divided classes. It takes too much time in
searching, and it is also the main reason of the long time in fractal coding. The algorithm of the paper

                                                    130
Computer Engineering and Intelligent Systems                                        www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3

used is different from the traditional method. It divides the original image directly into larger blocks Di,
divides the original image into smaller blocks Ri, then classifies the blocks Ri by the defined standard
and searches the similar Ri in the divided classes. Then it searches the attractor in the corresponding
classes, if it does not find out the right Ri, searches the most similar Ri, and calculates the correctional
value to construct the fictitious Ri and saves the correctional value, instead of searching the Ri from the
huge database. So it boosts the speed of the encoding. And the algorithm begins searching Ri from the
biggest block, and the traditional algorithm begins searching Ri from the least block. Main step of the
improved encoding algorithm is as follows:

Step I. First of all, the original image is segmented to determine Di.
Step II. Then, directly split to locks find the correct Ri for each block.
Step III. Exchange and distribute the Di sub-blocks according to the block mean, and note the
information of exchange. The block mean and exchange information are added as part of its code.
Step IV. Interchange Ri according to the same method as step 3, and the exchange information is added
as part of the it’s code.
Step V. Search the same block of Di in Ri if find, continue next, if not find, look for the most similar
block Ri and calculates the correctional value to construct the fictitious Ri add the correctional value as
part of its code
Step VI. Repeat step 4 and 5 until it reaches the set of conditions.
Step VII. Encoding with the traditional fractal encoding method based on quad tree.
Main step of the improved decoding algorithm is as follows:
Step 1.Read the encoding file by sequences. First, read the block mean of Di and its exchange
information. According to the exchange information, we can get the sub-block mean with the original
order.
Step 2.Then read the correctional value and Interchange information of Ri to calculate the mean of Ri.
Step 3.Repeat step 2 until reaching the smallest block size.
Step 4.According to exchange information and the original mean, decoding with the traditional fractal
decoding method based on quad tree.

B. Encode file format

Encode file format is shown as figure 2, which consists of 5 parts




                                        Figure 2: encode file format

Part 1 is block classification information, which occupies 2 bytes.
Part 2 is judging information of initial Di block mean. Its each bit shows that the mean error of initial
block is less than the given error or not. If 0, it is less than and indicates that the block pixel value equal
the block pixel mean multiply by the size of block. If 1, it is larger than and indicates that the block

                                                     131
Computer Engineering and Intelligent Systems                                        www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3

should be further splited into four small blocks. So the second part byte size is not fixed, its equal line
number multiply by column number, and divided by 8.
Part 3 is judging information of square Ri block mean. Its each bit shows that the mean error of Ri block
is less than the given error or not. Its value represents the same meaning as Part 2.Its byte size is not
fixed too, which equal line number multiply by column number, and divided by 8.
Part 4 is the basic information of Original Square Ri block, occupying 6 bytes. The first 4 bytes
represent the mean of initial block, and following 1 byte represents position exchange information of
initial block, the last 1 byte represents judging information of quad tree mean.
Part 5 is the cycle information of quad tree, occupying 4 bytes which represent the judging, correctional
and exchange information of quartered squares individually. Correctional value is computed as follows:

       Ci  ERi  ERi                           (1)

Where ERi is the block mean of Ri and ERi is computed as follows:

                                 Ei
        ERi = 4  Ei                           (2)
                         E1  E2  E3  E4

       Where E1, E2, E3, E4are mean of the original four sub-blocks mean.

       So when decoding, the corresponding Eri can be computed as follows

                                Ei
         ERi=4  Ei                      Ci   (3)
                        E1  E2  E3  E4

   C. Exchange information format

There are eight special classification transformation methods known as the "reflection-rotation"
transformation, shown in table 1. With the transformation methods, we can classifies the blocks Ri, and
reduce the searching time in encoding.

                             Table 1 eight "reflection- rotation" transformations

          ID            transformation matrix               meaning

                                 1    0
           0                                            Rotation 0o
                                 0    1
                                 0    1
           1                                            Rotation 90o
                                -1    0
                                -1    0
           2                                           Rotation 180o
                                0    -1
                                0    -1
           3                                           Rotation 270o
                                 1    0

                                                      132
Computer Engineering and Intelligent Systems                                      www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3

                               1     0
           4                                           X reflection
                               0    -1
                               -1    0
           5                                           Y reflection
                               0     1
                               0     1
           6                                         Y= X reflection
                               1     0
                               0    -1
           7                                         Y= X reflection
                               -1    0




But in our methods, the encoding time is mainly used in calculating the correctional value, not in
searching the similar block, so we don’t use the eight special classification transformation methods. To
get the exchange information, first we divide the original image directly into four smaller blocks, shown
in figure 3.




                                   Figure 3 the sequence of blocks
And then we define an array named as A1,A2,A3,A4 , the value of A1,A2,A3,A4 are assigned with the
corresponding mean value of block.




                                    Figure 4 block exchange information

As shown in figure 4, the block exchange bit value is all set “0” first. We compare the A1 value with the
A2, A3, A4, and set the exchange information in corresponding 6th, 5th, 4th bit in figure 4. For example, if
A1is smaller than A2, then exchange the mean value of A1and A2, and set “1” in the 6th bit in figure 4, if
A1is smaller than A3, then exchange the mean value of A1 and A3,and set “1” in the 5th bit, and so on. We
compare the A2 value with the A3 A4, and set the exchange information in corresponding 3rd, 2nd bit in
figure 4. and the exchange information of A3 compared with A4 is set in 1st bit.

                                                    133
Computer Engineering and Intelligent Systems                                www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3

IV. Experimental results

We have made several experiments in MatLAB to code and to decode the original image “Lena” (256 x
256) by the traditional fractal and the advanced method on a microcomputer(PIV 2.4G,256MB).
Experimental parameters and demands are listed as follows: Maximal size of a range: 32x 32; Minimal
size of a range: 4x4.Under the same experimental conditions, the two methods can both reconstruct the
original image well. Figure 5 is the image processing results. From Table 2, we can see that the
advanced method provides significant improvement in encoding time, but the compression ratio
decreased.




(a) Original image




(b) Reconstructed image with traditional method




(c)Reconstructed image with the improved method
                                               134
Computer Engineering and Intelligent Systems                                    www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3


Figure 5: Image Processing Results

Table2. Performance comparison between the traditional and improved method


                                the traditional fractal
      Coding method                                        Improved method
                                   coding method


       encoding time                     345                      227


   Compression ratio(s)                 13.09                     10.8


         PSNR/dB                        29.17                    30.12



V. Conclusions

In this paper, we have proposed an advanced fractal image compression algorithm based on quadtree,
which construct search attractor directly from the big Di block. And if Di can not search the similar Ri ,
we searches the most similar Ri , and calculates the correctional value to construct the fictitious Ri ,
Experimental results show that if the correctional value is reasonable, it could reduce the image
distortion degree, and the algorithm makes image coding faster and more efficiency. Disadvantage of the
advanced algorithm is that image compression ratio decreased Compared with the traditional method,
and it is the direction of further research.

References

M. F. Barnsley, “Fractal functions and interpolation” onstr.Approx.2:303-329, 1986.
Cardinal J. Fast Fractal Compression of Grayscale Images. IEEE Transactions on Image Processing,
2001, 10(1):56-67.
Truong T K,Kung C M,Jeng J H,et a1.Fast Fractal Image Compression Using Spatial
Correlation[J].ChaosSolitons Fractals.2004.(22):1 071-1 076.
Tong Chong Sze. Fast Fractal Image Encoding Based on Adaptive Search IEEE Transactions on Image
Processing, 2001, 10(9):933-942.
Saupe D, RuhlM. Evolutionary Fractal Image
Compression[OB/OL].http://www.inf.uni.konstanz.de/cgip/bib/files/SaRu96.pdf, 2004.
Distasi R, Nappi M, Riccio D.A range/domain approximation error-based approach for fractal image
compression [J].IEEE Transactions on Image Processing, 2006, 15(1):89-97.
Erjun Zhao, Dan Liu. Fractal image compression methods a review[c].Proceedings of the Third
International Conference on Information Technology and Applications.2005.2 (2):756-759.

                                                    135
Computer Engineering and Intelligent Systems                          www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3

Tong Chong Sze.Fast Fractal Image Encoding Based on Adaptive search IEEE Transaction on Image
Processing, 2001, 10(9); 933-942.




                                             136

Mais conteúdo relacionado

Mais procurados

Handwritten character recognition in
Handwritten character recognition inHandwritten character recognition in
Handwritten character recognition inijaia
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
 
Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionNaiyan Noor
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
 
Recognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkRecognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkeSAT Publishing House
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Chiranjeevi Adi
 
Representation and recognition of handwirten digits using deformable templates
Representation and recognition of handwirten digits using deformable templatesRepresentation and recognition of handwirten digits using deformable templates
Representation and recognition of handwirten digits using deformable templatesAhmed Abd-Elwasaa
 
IRJET - A Survey on Recognition of Strike-Out Texts in Handwritten Documents
IRJET - A Survey on Recognition of Strike-Out Texts in Handwritten DocumentsIRJET - A Survey on Recognition of Strike-Out Texts in Handwritten Documents
IRJET - A Survey on Recognition of Strike-Out Texts in Handwritten DocumentsIRJET Journal
 
A Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition SystemA Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition Systemiosrjce
 
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterArtificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterIOSR Journals
 
Devnagari handwritten numeral recognition using geometric features and statis...
Devnagari handwritten numeral recognition using geometric features and statis...Devnagari handwritten numeral recognition using geometric features and statis...
Devnagari handwritten numeral recognition using geometric features and statis...Vikas Dongre
 
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERHANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERvineet raj
 
A Novel Document Image Binarization For Optical Character Recognition
A Novel Document Image Binarization For Optical Character RecognitionA Novel Document Image Binarization For Optical Character Recognition
A Novel Document Image Binarization For Optical Character RecognitionEditor IJCATR
 
An effective approach to offline arabic handwriting recognition
An effective approach to offline arabic handwriting recognitionAn effective approach to offline arabic handwriting recognition
An effective approach to offline arabic handwriting recognitionijaia
 

Mais procurados (17)

Text Detection and Recognition
Text Detection and RecognitionText Detection and Recognition
Text Detection and Recognition
 
Handwritten character recognition in
Handwritten character recognition inHandwritten character recognition in
Handwritten character recognition in
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer Version
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
Recognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural networkRecognition of handwritten digits using rbf neural network
Recognition of handwritten digits using rbf neural network
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
 
Representation and recognition of handwirten digits using deformable templates
Representation and recognition of handwirten digits using deformable templatesRepresentation and recognition of handwirten digits using deformable templates
Representation and recognition of handwirten digits using deformable templates
 
IRJET - A Survey on Recognition of Strike-Out Texts in Handwritten Documents
IRJET - A Survey on Recognition of Strike-Out Texts in Handwritten DocumentsIRJET - A Survey on Recognition of Strike-Out Texts in Handwritten Documents
IRJET - A Survey on Recognition of Strike-Out Texts in Handwritten Documents
 
A Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition SystemA Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition System
 
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterArtificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
 
Devnagari handwritten numeral recognition using geometric features and statis...
Devnagari handwritten numeral recognition using geometric features and statis...Devnagari handwritten numeral recognition using geometric features and statis...
Devnagari handwritten numeral recognition using geometric features and statis...
 
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIERHANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
HANDWRITTEN DIGIT RECOGNITION USING k-NN CLASSIFIER
 
Different Steganography Methods and Performance Analysis
Different Steganography Methods and Performance AnalysisDifferent Steganography Methods and Performance Analysis
Different Steganography Methods and Performance Analysis
 
D017422528
D017422528D017422528
D017422528
 
A Novel Document Image Binarization For Optical Character Recognition
A Novel Document Image Binarization For Optical Character RecognitionA Novel Document Image Binarization For Optical Character Recognition
A Novel Document Image Binarization For Optical Character Recognition
 
An effective approach to offline arabic handwriting recognition
An effective approach to offline arabic handwriting recognitionAn effective approach to offline arabic handwriting recognition
An effective approach to offline arabic handwriting recognition
 

Destaque

X2 T01 02 complex equations (2011)
X2 T01 02 complex equations (2011)X2 T01 02 complex equations (2011)
X2 T01 02 complex equations (2011)Nigel Simmons
 
Klaas hummel cocos islands
Klaas hummel cocos islandsKlaas hummel cocos islands
Klaas hummel cocos islandsKlaas Hummel
 
Where to look for good divorce lawyers
Where to look for good divorce lawyersWhere to look for good divorce lawyers
Where to look for good divorce lawyerssherilynjar
 
Parent Meeting1
Parent Meeting1Parent Meeting1
Parent Meeting1asahl
 
Making the Most of Predictive Models
Making the Most of Predictive ModelsMaking the Most of Predictive Models
Making the Most of Predictive ModelsRajarshi Guha
 
DEWA - Digital Evaluation of World Around
DEWA - Digital Evaluation of World AroundDEWA - Digital Evaluation of World Around
DEWA - Digital Evaluation of World AroundSetiawan Hadi
 

Destaque (13)

X2 T01 02 complex equations (2011)
X2 T01 02 complex equations (2011)X2 T01 02 complex equations (2011)
X2 T01 02 complex equations (2011)
 
 
Prueba1
Prueba1Prueba1
Prueba1
 
Avances científicos
Avances científicosAvances científicos
Avances científicos
 
Klaas hummel cocos islands
Klaas hummel cocos islandsKlaas hummel cocos islands
Klaas hummel cocos islands
 
Mustafa DNA Presentation
Mustafa DNA PresentationMustafa DNA Presentation
Mustafa DNA Presentation
 
Where to look for good divorce lawyers
Where to look for good divorce lawyersWhere to look for good divorce lawyers
Where to look for good divorce lawyers
 
Parent Meeting1
Parent Meeting1Parent Meeting1
Parent Meeting1
 
Making the Most of Predictive Models
Making the Most of Predictive ModelsMaking the Most of Predictive Models
Making the Most of Predictive Models
 
Kf3617641768
Kf3617641768Kf3617641768
Kf3617641768
 
2.11.gui ejercicio swing-holaadios
2.11.gui ejercicio swing-holaadios2.11.gui ejercicio swing-holaadios
2.11.gui ejercicio swing-holaadios
 
DEWA - Digital Evaluation of World Around
DEWA - Digital Evaluation of World AroundDEWA - Digital Evaluation of World Around
DEWA - Digital Evaluation of World Around
 
La Antartida
La AntartidaLa Antartida
La Antartida
 

Semelhante a 12 ruhiatsultana final_paper--129-136

Indexing for Large DNA Database sequences
Indexing for Large DNA Database sequencesIndexing for Large DNA Database sequences
Indexing for Large DNA Database sequencesCSCJournals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff DistanceIRJET Journal
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff DistanceIRJET Journal
 
3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrieval3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrievalAlexander Decker
 
11.graph cut based local binary patterns for content based image retrieval
11.graph cut based local binary patterns for content based image retrieval11.graph cut based local binary patterns for content based image retrieval
11.graph cut based local binary patterns for content based image retrievalAlexander Decker
 
3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrieval3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrievalAlexander Decker
 
11.framework of smart mobile rfid networks
11.framework of smart mobile rfid networks11.framework of smart mobile rfid networks
11.framework of smart mobile rfid networksAlexander Decker
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networksAlexander Decker
 
A Review on Matching For Sketch Technique
A Review on Matching For Sketch TechniqueA Review on Matching For Sketch Technique
A Review on Matching For Sketch TechniqueIOSR Journals
 
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...IJERA Editor
 
Image compression using negative format
Image compression using negative formatImage compression using negative format
Image compression using negative formateSAT Journals
 
Image compression using negative format
Image compression using negative formatImage compression using negative format
Image compression using negative formateSAT Publishing House
 
Binarization of Degraded Text documents and Palm Leaf Manuscripts
Binarization of Degraded Text documents and Palm Leaf ManuscriptsBinarization of Degraded Text documents and Palm Leaf Manuscripts
Binarization of Degraded Text documents and Palm Leaf ManuscriptsIRJET Journal
 
Fractal Image Compression By Range Block Classification
Fractal Image Compression By Range Block ClassificationFractal Image Compression By Range Block Classification
Fractal Image Compression By Range Block ClassificationIRJET Journal
 
Performance Evaluation Of Ontology And Fuzzybase Cbir
Performance Evaluation Of Ontology And Fuzzybase CbirPerformance Evaluation Of Ontology And Fuzzybase Cbir
Performance Evaluation Of Ontology And Fuzzybase Cbiracijjournal
 
PERFORMANCE EVALUATION OF ONTOLOGY AND FUZZYBASE CBIR
PERFORMANCE EVALUATION OF ONTOLOGY AND FUZZYBASE CBIRPERFORMANCE EVALUATION OF ONTOLOGY AND FUZZYBASE CBIR
PERFORMANCE EVALUATION OF ONTOLOGY AND FUZZYBASE CBIRacijjournal
 
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...ijtsrd
 
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdfHandwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdfSachin414679
 

Semelhante a 12 ruhiatsultana final_paper--129-136 (20)

Indexing for Large DNA Database sequences
Indexing for Large DNA Database sequencesIndexing for Large DNA Database sequences
Indexing for Large DNA Database sequences
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff Distance
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff Distance
 
3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrieval3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrieval
 
F045053236
F045053236F045053236
F045053236
 
11.graph cut based local binary patterns for content based image retrieval
11.graph cut based local binary patterns for content based image retrieval11.graph cut based local binary patterns for content based image retrieval
11.graph cut based local binary patterns for content based image retrieval
 
3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrieval3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrieval
 
11.framework of smart mobile rfid networks
11.framework of smart mobile rfid networks11.framework of smart mobile rfid networks
11.framework of smart mobile rfid networks
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks
 
A Review on Matching For Sketch Technique
A Review on Matching For Sketch TechniqueA Review on Matching For Sketch Technique
A Review on Matching For Sketch Technique
 
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
 
Image compression using negative format
Image compression using negative formatImage compression using negative format
Image compression using negative format
 
Image compression using negative format
Image compression using negative formatImage compression using negative format
Image compression using negative format
 
Binarization of Degraded Text documents and Palm Leaf Manuscripts
Binarization of Degraded Text documents and Palm Leaf ManuscriptsBinarization of Degraded Text documents and Palm Leaf Manuscripts
Binarization of Degraded Text documents and Palm Leaf Manuscripts
 
Fractal Image Compression By Range Block Classification
Fractal Image Compression By Range Block ClassificationFractal Image Compression By Range Block Classification
Fractal Image Compression By Range Block Classification
 
Performance Evaluation Of Ontology And Fuzzybase Cbir
Performance Evaluation Of Ontology And Fuzzybase CbirPerformance Evaluation Of Ontology And Fuzzybase Cbir
Performance Evaluation Of Ontology And Fuzzybase Cbir
 
PERFORMANCE EVALUATION OF ONTOLOGY AND FUZZYBASE CBIR
PERFORMANCE EVALUATION OF ONTOLOGY AND FUZZYBASE CBIRPERFORMANCE EVALUATION OF ONTOLOGY AND FUZZYBASE CBIR
PERFORMANCE EVALUATION OF ONTOLOGY AND FUZZYBASE CBIR
 
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
 
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdfHandwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
 

Mais de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mais de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Último

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Último (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

12 ruhiatsultana final_paper--129-136

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Advanced Fractal Image Coding Based on the Quadtree Ruhiat Sultana, Associate Professor Al-Habeeb College of Engg and Tech, Chevella, R.R. Dist - 501503, Hyderabad, A.P. INDIA E- mail: ruhiatsultana@gmail.com Nisar Ahmed, Associate Professor Al-Habeeb College of Engg and Tech, Chevella, R.R. Dist - 501503, Hyderabad, A.P. INDIA E- mail: nisar.ahcet@gmail.com Shaik Mahaboob Basha, Professor Al-Habeeb College of Engg and Tech, Chevella, R.R. Dist - 501503, Hyderabad, A.P. INDIA E- mail: smbasha.phd@gmail.com Abstract Fractal image coding simply based on quad tree is a unique technique for still image compression. Compared with other image compression methods, fractal image coding has the advantage of higher compression ratio, higher decoding speed and decoded image having nothing to do with the resolution of image. It spends too much time to look for the best matching Ri block on encoding. To improve the encoding speed, we must narrow the search range and improve the search skills to ensure the best match block falls within our range. In this paper, an advanced fractal image compression algorithm based on quad tree is proposed. First, we can improve the construction method of search attractor by constructing directly from the big Di block, so it can save a lot of searching time in encoding. Second, the attractors can be self-constructed, so it is not happened that the attractor is not found in the traditional methods. Experimental result shows that the algorithm makes image coding faster and more efficiency. Keywords: Image compression; Fractal; Quad tree; Coding I. Introduction Fractal image compression, is base on the IFS (iterated function system) proposed by M.F.Barnsley, (1986), “Fractal functions and interpolation”, is a unique approach to image coding. Its performance relies on the presence of self-similarity between the regions of an image. Since most images process a high degree of self- similarity, fractal compression contributes an excellent tool for compressing referred by Cardinal J.(2001), “Fast Fractal Compression of Grayscale Images”, Truong T K(2004),Kung C M,Jeng J H,(et a1), “Fast Fractal Image Compression Using Spatial Correlation”. In order to improve the efficiency of fractal image compression, many people proposed a variety of flexible segmentation methods, such as quad tree, rectangular, triangular and region segmentation method, it has proposed in Tong Chong .(2001), “ Fast Fractal Image Encoding Based on Adaptive Search”, Saupe D, RuhlM.(2004) “Evolutionary Fractal Image Compression”. In this paper, an advanced fractal image coding algorithm based on quad tree is proposed to improve the speed of fractal image coding. 129
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 The setting of the paper is given below. Section II shall introduce the basic fractal image coding based on quad tree. Section III shall describe our improvement. Then the experimental results of the proposed method shall be shown and compared with that of the traditional one in Section IV. Finally, Section V shall serve to present the conclusions. II. Review of the Quad tree Approach Quad tree segmentation is a unique technique that divides a gray level image into a set of homogenous regions. The segmentation represents into a tree, and each tree node has four children. When we decompose an image following this quad tree technique, we first assign the whole image to the root of the tree and test its uniformity. If the uniformity condition is not met, it is then quartered into four sub- images. These four sub-images have the same size and are associated with the four child nodes of the root. The uniformity of each sub-image will be tested next, and the sub-image will be subdivided repeatedly until the uniformity criterion is met or some minimum sub-image size has been reached and it has been proposed in Distasi R, Nappi M,(2006). A demonstration of the process is shown in Figure 1. (a) The segmentation process (b) The corresponding quadtree Figure 1: Example of quadtree segmentation Before division, we first set maximal and minimal depth of the quad tree and maximal allowable error to decide the number of ranges. Then, we continuously split a range into four square ranges of the same size by the quad tree method until minimal depth is met. An optimum matching block will be searched for each range on the level. If it is found, it can be marked as Ri and the range corresponding with it can be marked as Di and the split is not done again. Otherwise they are further splited into four ranges. This process continues until we get the maximal depth is met. It has been proposed in Erjun Zhao, Dan Liu, (2005), Tong Chong (2001). III. The Proposed Method A. The Proposed Algorithm As mentioned above, the traditional method of fractal coding generally divides the original image into larger blocks Di and also divides the original image into smaller blocks Ri .Then classifies the blocks Di by the defined standard and searches the similar Di in the divided classes. It takes too much time in searching, and it is also the main reason of the long time in fractal coding. The algorithm of the paper 130
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 used is different from the traditional method. It divides the original image directly into larger blocks Di, divides the original image into smaller blocks Ri, then classifies the blocks Ri by the defined standard and searches the similar Ri in the divided classes. Then it searches the attractor in the corresponding classes, if it does not find out the right Ri, searches the most similar Ri, and calculates the correctional value to construct the fictitious Ri and saves the correctional value, instead of searching the Ri from the huge database. So it boosts the speed of the encoding. And the algorithm begins searching Ri from the biggest block, and the traditional algorithm begins searching Ri from the least block. Main step of the improved encoding algorithm is as follows: Step I. First of all, the original image is segmented to determine Di. Step II. Then, directly split to locks find the correct Ri for each block. Step III. Exchange and distribute the Di sub-blocks according to the block mean, and note the information of exchange. The block mean and exchange information are added as part of its code. Step IV. Interchange Ri according to the same method as step 3, and the exchange information is added as part of the it’s code. Step V. Search the same block of Di in Ri if find, continue next, if not find, look for the most similar block Ri and calculates the correctional value to construct the fictitious Ri add the correctional value as part of its code Step VI. Repeat step 4 and 5 until it reaches the set of conditions. Step VII. Encoding with the traditional fractal encoding method based on quad tree. Main step of the improved decoding algorithm is as follows: Step 1.Read the encoding file by sequences. First, read the block mean of Di and its exchange information. According to the exchange information, we can get the sub-block mean with the original order. Step 2.Then read the correctional value and Interchange information of Ri to calculate the mean of Ri. Step 3.Repeat step 2 until reaching the smallest block size. Step 4.According to exchange information and the original mean, decoding with the traditional fractal decoding method based on quad tree. B. Encode file format Encode file format is shown as figure 2, which consists of 5 parts Figure 2: encode file format Part 1 is block classification information, which occupies 2 bytes. Part 2 is judging information of initial Di block mean. Its each bit shows that the mean error of initial block is less than the given error or not. If 0, it is less than and indicates that the block pixel value equal the block pixel mean multiply by the size of block. If 1, it is larger than and indicates that the block 131
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 should be further splited into four small blocks. So the second part byte size is not fixed, its equal line number multiply by column number, and divided by 8. Part 3 is judging information of square Ri block mean. Its each bit shows that the mean error of Ri block is less than the given error or not. Its value represents the same meaning as Part 2.Its byte size is not fixed too, which equal line number multiply by column number, and divided by 8. Part 4 is the basic information of Original Square Ri block, occupying 6 bytes. The first 4 bytes represent the mean of initial block, and following 1 byte represents position exchange information of initial block, the last 1 byte represents judging information of quad tree mean. Part 5 is the cycle information of quad tree, occupying 4 bytes which represent the judging, correctional and exchange information of quartered squares individually. Correctional value is computed as follows: Ci  ERi  ERi (1) Where ERi is the block mean of Ri and ERi is computed as follows: Ei ERi = 4  Ei  (2) E1  E2  E3  E4 Where E1, E2, E3, E4are mean of the original four sub-blocks mean. So when decoding, the corresponding Eri can be computed as follows Ei ERi=4  Ei  Ci (3) E1  E2  E3  E4 C. Exchange information format There are eight special classification transformation methods known as the "reflection-rotation" transformation, shown in table 1. With the transformation methods, we can classifies the blocks Ri, and reduce the searching time in encoding. Table 1 eight "reflection- rotation" transformations ID transformation matrix meaning 1 0 0 Rotation 0o 0 1 0 1 1 Rotation 90o -1 0 -1 0 2 Rotation 180o 0 -1 0 -1 3 Rotation 270o 1 0 132
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 1 0 4 X reflection 0 -1 -1 0 5 Y reflection 0 1 0 1 6 Y= X reflection 1 0 0 -1 7 Y= X reflection -1 0 But in our methods, the encoding time is mainly used in calculating the correctional value, not in searching the similar block, so we don’t use the eight special classification transformation methods. To get the exchange information, first we divide the original image directly into four smaller blocks, shown in figure 3. Figure 3 the sequence of blocks And then we define an array named as A1,A2,A3,A4 , the value of A1,A2,A3,A4 are assigned with the corresponding mean value of block. Figure 4 block exchange information As shown in figure 4, the block exchange bit value is all set “0” first. We compare the A1 value with the A2, A3, A4, and set the exchange information in corresponding 6th, 5th, 4th bit in figure 4. For example, if A1is smaller than A2, then exchange the mean value of A1and A2, and set “1” in the 6th bit in figure 4, if A1is smaller than A3, then exchange the mean value of A1 and A3,and set “1” in the 5th bit, and so on. We compare the A2 value with the A3 A4, and set the exchange information in corresponding 3rd, 2nd bit in figure 4. and the exchange information of A3 compared with A4 is set in 1st bit. 133
  • 6. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 IV. Experimental results We have made several experiments in MatLAB to code and to decode the original image “Lena” (256 x 256) by the traditional fractal and the advanced method on a microcomputer(PIV 2.4G,256MB). Experimental parameters and demands are listed as follows: Maximal size of a range: 32x 32; Minimal size of a range: 4x4.Under the same experimental conditions, the two methods can both reconstruct the original image well. Figure 5 is the image processing results. From Table 2, we can see that the advanced method provides significant improvement in encoding time, but the compression ratio decreased. (a) Original image (b) Reconstructed image with traditional method (c)Reconstructed image with the improved method 134
  • 7. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Figure 5: Image Processing Results Table2. Performance comparison between the traditional and improved method the traditional fractal Coding method Improved method coding method encoding time 345 227 Compression ratio(s) 13.09 10.8 PSNR/dB 29.17 30.12 V. Conclusions In this paper, we have proposed an advanced fractal image compression algorithm based on quadtree, which construct search attractor directly from the big Di block. And if Di can not search the similar Ri , we searches the most similar Ri , and calculates the correctional value to construct the fictitious Ri , Experimental results show that if the correctional value is reasonable, it could reduce the image distortion degree, and the algorithm makes image coding faster and more efficiency. Disadvantage of the advanced algorithm is that image compression ratio decreased Compared with the traditional method, and it is the direction of further research. References M. F. Barnsley, “Fractal functions and interpolation” onstr.Approx.2:303-329, 1986. Cardinal J. Fast Fractal Compression of Grayscale Images. IEEE Transactions on Image Processing, 2001, 10(1):56-67. Truong T K,Kung C M,Jeng J H,et a1.Fast Fractal Image Compression Using Spatial Correlation[J].ChaosSolitons Fractals.2004.(22):1 071-1 076. Tong Chong Sze. Fast Fractal Image Encoding Based on Adaptive Search IEEE Transactions on Image Processing, 2001, 10(9):933-942. Saupe D, RuhlM. Evolutionary Fractal Image Compression[OB/OL].http://www.inf.uni.konstanz.de/cgip/bib/files/SaRu96.pdf, 2004. Distasi R, Nappi M, Riccio D.A range/domain approximation error-based approach for fractal image compression [J].IEEE Transactions on Image Processing, 2006, 15(1):89-97. Erjun Zhao, Dan Liu. Fractal image compression methods a review[c].Proceedings of the Third International Conference on Information Technology and Applications.2005.2 (2):756-759. 135
  • 8. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.3 Tong Chong Sze.Fast Fractal Image Encoding Based on Adaptive search IEEE Transaction on Image Processing, 2001, 10(9); 933-942. 136