SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 4, Ver. II (July – Aug. 2015), PP 64-67
www.iosrjournals.org
DOI: 10.9790/0661-17426467 www.iosrjournals.org 64 | Page
A Exploratory Review on Soft Computing Segmentation
Techniques
Chandanpreet Kaur1
, Dr. Bikrampal Kaur 2
1
M.Tech Student (IT Department), Chandigarh Engineering College, Landran, Mohali,Punjab,india.
2
Professor (IT Department), Chandigarh Engineering College, Landran, Mohali,Punjab,india.
Abstract: Segmentation is a process to divides the images into its regions or objects that have similar features
or characteristics. Segmentation has no single standard procedure and it is very difficult in non-trivial images.
The extent, to which segmentation is carried out, depends on the problem specification. Segmentation
algorithms are based on two properties of intensity values- discontinuity and similarity. First property is to
partition an image based on the abrupt changes in the intensity and the second is to partition the image into
regions that are similar according to a set of predefined criteria. In this paper some methods to detect the
discontinuity and similarity of digital images will be discussed. The basic techniques for detecting the gray level
discontinuities in a digital images and locating the objects and boundaries of images ( points, lines and edges)
have also been discussed. The other segmentation techniques like histogram thresholding, filtration, watershed,
edge detection, region growing, region splitting and merging are based on the fact of classification with the
usage of range functions that are applied to the intensity value of image pixels.
Keywords: Thresholding, Segmentation, Edge detection, Region growing, Region splitting and merging,
watershed.
I. Introduction
The goal of image segmentation is to cluster pixels into image regions, i.e. regions corresponding to
individual surfaces, objects, or natural parts of objects. Segmentation is a testing field of picture investigation.
Specifically, medical picture division has ended up essential with improvement of complex restorative imaging
modalities which are fit for delivering a substantial amount of high-determination two-dimensional (2-D) and
three-dimensionalbh (3-D) pictures. Haralik R.H [6] define the issue of picture division and there is an
expansive number of systems depicted in the writing.
The first step in image analysis is segment the image. Segmentation divides an image into its cluster
parts or objects. Extent of level to which this subdivision is carried out depends on the problem being viewed.
To read the image correct and to identify the content of the image there is need to segment the object from the
background and for this reason there are two techniques of segmentation i.e discontinuity detection technique
and similarity detection technique. In the first technique, one approach is to partition an image based on abrupt
changes in gray-level image and the second technique is based on the threshold, region growing and the Edge
Detection method.Image segmentation technique used for :-
1. In automated inspection of electronic assemblies, presence or absence of specific objects can be determined
by analyzing images.
2. Analyzing aerial photos to classify terrain into forests, water bodies etc.
3. Analyzing MRI and X-ray images in medicine for classify the body organs.
II. Segmentation Techniques
Various segmentation techniques are discussed below:-
1.Segmentation using discontinuities
Several techniques for detecting three basic gray level discontinuities in a digital image (points, lines and edges)
are different types of filtration. The most common way to look for discontinuities is by spatial filtering methods.
a).Point detection idea is to isolate a point which has gray level significantly different from its background.
A Exploratory Review On Soft Computing Segmentation Techniques
DOI: 10.9790/0661-17426467 www.iosrjournals.org 65 | Page
Figure.1
w1=w2=w3=w4=w6=w7=w8=w9 = -1, w5 = 8.
Response is R = w1z1+ w2z2 +………+ w9z9, where z is the gray level of the pixel.
Based on the response calculated from the above equation we can find out the points desired.
b).Line detection is next level of complexity to point detection and the lines could be vertical, horizontal or at
+/- 45 degree angle. Responses are calculated for each of the mask above and based on the value we can detect
if the lines and their orientation.
c)Edge detection The edge is a regarded as the boundary between two objects (two dissimilar regions) or
perhaps a boundary between light and shadow falling on a single surface. To find the differences in pixel values
between regions can be computed by considering gradients. The edges of an image hold much information in
that image. The edges tell where objects are, their shape and size, and something about their texture. An edge is
where the intensity of an image moves from a low value to a high value or vice versa. There are numerous
applications for edge detection, which are often used for various special effects. Digital artists use it to create
dazzling image outlines. The output of an edge detector can be added back to an original image to enhance the
edges. Edge detection is often the first step in image segmentation. Image segmentation, a field of image
analysis, is used to group pixels into regions to determine an image's composition. A common example of image
segmentation is the "magic wand" tool in photo editing software. This tool allows the user to select a particular
pixels in an image.
There is an infinite number of edge orientations to specify the widths and shapes of edges such that roof edge,
line edge, step edge, ramp edge etc.
Figure 2 Different edge orientation
Some edges are straight while others are curved with varying radii. There are many edge detection
techniques to go with all these edges, each having its own strengths. Some edge detectors may work well in one
application and perform poorly in others. Sometimes it takes experimentation to determine what the best edge
detection technique for an application is.
Edge detection is also used in image registration. Image registration aligns two images that may have
been acquired at separate times or from different sensors.
The simplest and quickest edge detectors determine the maximum value from a series of pixel
subtractions. The homogeneity operator subtracts each 8 surrounding pixels from the center pixel of a 3 x 3
window. The output of the operator is the maximum of the absolute value of each difference. Similar to the
homogeneity operator is the difference edge detector. It operates more quickly because it requires four
subtractions per pixel as opposed to the eight needed by the homogeneity operator. The subtractions are upper
left  lower right, middle left  middle right, lower left  upper right, and top middle  bottom middle.
A Exploratory Review On Soft Computing Segmentation Techniques
DOI: 10.9790/0661-17426467 www.iosrjournals.org 66 | Page
2. Segmentation using Thresholding
Thresholding is based on the assumption that the histogram has two dominant modes, for example light
objects and an dark background. In this method to extract the objects from the image is needs to select a
threshold value such that it separates the two modes.
F(x,y)= T
Depending on the kind of problem to be solved there are multilevel thresholding. A. D Brink[8] Define the
region of thresholding, there is two type of thresholding global thresholding and local thresholding. Global
threshoding is considered as a function for the entire image and local thresholding involves only a certain
region. In addition to the above mentioned techniques, if the thresholding function T depends on the spatial co-
ordinates then it is known as the dynamic or adaptive thresholding.
a) Basic global thresholding technique:
In this technique the entire image is scanned by pixel after pixel and some pixels labeled as object or
the background, depending on whether the gray level is greater or lesser than the thresholding function T. The
success depends on how well the histogram is constructed. It can be fulfilled in controlled environments, and
can also find the applications primarily in the industrial inspection area. R.C Gonzalez [7] present an algorithm
for global thresholding that can be summarized in a few steps.
1) Select an initial estimate for T.
2) Segment the image using T. This will produce two groups of pixels. G1 consisting of all pixels with gray
level values >T and G2 consisting of pixels with values <=T.
3) Compute the average gray level values mean1 and mean2 for the pixels in regions G1 and G2.
4) Compute a new threshold value T= (1/2)(mean1 +mean2).
5) Repeat steps 2 through 4 until difference in T in successive iterations is smaller than a predefined parameter
T0.
b) Basic adaptive thresholding technique:
In this technique the images having uneven illumination make it difficult to segment using the
histogram, in this case Ioannis M. Stephanakis [12] divide the image in many sub images and then come up
with different threshold to segment each sub image. The key issues are how to divide the image into sub images
and utilize a different threshold to segment each sub image.
3). Region based segmentation
The main objective of segmentation is to divide the image into different regions and region based
segmentation techniques are used to determining the region of images directly. The segmentation must be
complete and every pixel must be in region it indicates that the region is disjoint.
Formulation of the regions:
An entire image is divided into sub regions and they must be in accordance to some rules such as
1. Union of sub regions is the region
2. All are connected in some predefined sense.
3. No to be same, disjoint
4. Properties must be satisfied by the pixels in a segmented region P (Ri) =true if all pixels have same gray
level.
5. Two sub regions should have different sense of predicate.
a) Segmentation by region splitting and merging: The basic idea of splitting is, as the name implies, to break
the image into many disjoint regions which are coherent within themselves. Take into consideration the entire
image and then group the pixels in a region if they satisfy some kind of similarity constraint. This is like a
divide and conquers method. Merging is a process used when after the split the adjacent regions merge if
necessary. D. Chaudhuri [11] developed an algorithms of this nature are called split and merge algorithms.
b) Segmentation by region growing: This is a simple region based approach which is also classified as a pixel
based image segmentation and it involves the selection of initial seed point in which examine neighboring pixels
of initial seed point and determines whether the pixel neighbors should be added to the region or not. This
approach is the opposite of split and merges said by Thanos Athanasiadis[10].
1. An initial set of small area are iteratively merged based on similarity of constraints.
2. Start by choosing an arbitrary pixel and compared with the neighboring pixel.
3. Region is grown from the seed pixel by adding in neighboring pixels that are similar, increasing the size of
the region.
A Exploratory Review On Soft Computing Segmentation Techniques
DOI: 10.9790/0661-17426467 www.iosrjournals.org 67 | Page
4. 4 When the growth of one region stops we simply choose another seed pixel which does not yet belong to
any region and start again.
5. 5 This whole process is continued until all pixels belong to some region.
6. 6 A bottom up method.
4. Segmentation by Morphological watersheds:
This method combines the positive aspects of many of the methods discussed earlier. The basic idea to
embody the objects in “watersheds” is given by Alan P. Mangan [9].The concept of watersheds is the idea of
visualizing an image in 3D to spatial versus gray levels. So all points in such a topology are either belonging to
regional minimum all with certain to a single minimum, equal to two points where more than one minimum. A
particular region is called watershed if a region minimum satisfying certain conditions.
III. Conclusion
In this paper, the study reviews the research on various research methodologies applied for image
segmentation in soft computing specially for the medical images. And the new study aims to provide a simple
guidance to the researcher who want to carry out their research on the image segmentation very accurately.In
future the efforts for the proposal of genetic segmentation filter will be done , the GA is a stochastic global
search method that mimics the metaphor of natural biological evolution. GA operates on a population of
potential solution applying the principle of survival of fittest to produce better and better approximation of
solution. At each generation, a new set of approximation is created by process of selecting individuals according
to their level of fitness in the problem domain and breeding them using operators borrowed from natural
genetics. The genetic algorithm solves optimization problems by mimicking the principles of biological
evolution, repeatedly modifying a population of individual points using rules modeled on gene combinations in
biological reproduction. Due to its random nature, the genetic algorithm improves your chances of finding a
global solution. It enables you to solve unconstrained, bound constrained and general optimization problems,
and it does not require the functions to be differentiable or continuous.
This research will provide the guidance to the researcher and doctors to exract the particular tumor area
from the medical images by using the biography based neural clustering with genetic algorithm.
References
[1]. R. Gonzalez and Richard E.Woods, “Digital Image Processing”, 2Ed, 2002.
[2]. B. Sumengen, B. S. Manjunath, C. Kenney, "Image Segmentation using Curve Evolution and Flow Fields” Proceedings of IEEE
International Conference on Image Processing (ICIP), Rochester, NY, USA, September 2002.
[3]. W. Ma, B.S. Manjunath, “Edge Flow: a technique for boundary detection and image segmentation” Trans. Image Proc., pp. 1375-
88, Aug. 2000
[4]. Venugopal, “Image segmentation” written reports 2003.
[5]. Jin Wang, “Image segmentation Using curve evolution and flow fields”, written reports 2003.
[6]. Haralick R. H, Shapiro L. G,”Computer and Robot Vision” Vol. I, Addison Wesley Publishing Company, 1993.
[7]. R. C. Gonzalez, R.E. Woods, “Digital Image Processing” Publishing House of Electronics Industry, Beijing, 3rd ed. pp. 711, 760-
764.
[8]. A. D. Brink, “Minimum spatial entropy threshold selection,” IEEE
[9]. Alan P. Mangan, Ross T. Whitaker, “Surface Segmentation Using Morphological Watersheds.”
[10]. ThanosAthanasiadis, Yannis Avrithis and StefanosKollias, “A Semantic Region Growing Approach in ImageSegmentation and
Annotation.”
[11]. D. Chaudhuri and A. Agrawal,“Split-and-merge Procedure for Image Segmentation usingBimodality Detection Approach”, Defence
Science Journal, Vol. 60, No. 3, May 2010, pp. 290-300,2010, DESIDOC
[12]. Ioannis M. Stephanakis and George C. Anastassopoulos, “segmentation using adaptive thresholding of the image histogram
according to the incremental rates of the segment likelihood functions”.

Mais conteúdo relacionado

Mais procurados

ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain ijcisjournal
 
Reversible Encrypytion and Information Concealment
Reversible Encrypytion and Information ConcealmentReversible Encrypytion and Information Concealment
Reversible Encrypytion and Information ConcealmentIJERA Editor
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...IOSR Journals
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniquesIRJET Journal
 
Emblematical image based pattern recognition paradigm using Multi-Layer Perce...
Emblematical image based pattern recognition paradigm using Multi-Layer Perce...Emblematical image based pattern recognition paradigm using Multi-Layer Perce...
Emblematical image based pattern recognition paradigm using Multi-Layer Perce...iosrjce
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...IAESIJEECS
 
Dj31514517
Dj31514517Dj31514517
Dj31514517IJMER
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONsipij
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419IJRAT
 
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGEMULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGEijcsity
 

Mais procurados (17)

ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
Reversible Encrypytion and Information Concealment
Reversible Encrypytion and Information ConcealmentReversible Encrypytion and Information Concealment
Reversible Encrypytion and Information Concealment
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
Survey paper on image compression techniques
Survey paper on image compression techniquesSurvey paper on image compression techniques
Survey paper on image compression techniques
 
H0114857
H0114857H0114857
H0114857
 
Emblematical image based pattern recognition paradigm using Multi-Layer Perce...
Emblematical image based pattern recognition paradigm using Multi-Layer Perce...Emblematical image based pattern recognition paradigm using Multi-Layer Perce...
Emblematical image based pattern recognition paradigm using Multi-Layer Perce...
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Dj31514517
Dj31514517Dj31514517
Dj31514517
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
 
Jc3515691575
Jc3515691575Jc3515691575
Jc3515691575
 
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGEMULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
MULTIPLE RECONSTRUCTION COMPRESSION FRAMEWORK BASED ON PNG IMAGE
 

Destaque

Buyer-Vendor Integrated system – the Technique of EOQ Dependent Shipment Size...
Buyer-Vendor Integrated system – the Technique of EOQ Dependent Shipment Size...Buyer-Vendor Integrated system – the Technique of EOQ Dependent Shipment Size...
Buyer-Vendor Integrated system – the Technique of EOQ Dependent Shipment Size...IOSR Journals
 
Pengurusan dokumen izin Pendirian PMDN
Pengurusan dokumen izin Pendirian PMDNPengurusan dokumen izin Pendirian PMDN
Pengurusan dokumen izin Pendirian PMDNlegalservice
 
IT PRODUK TERTENTU - KOSMETIK
IT PRODUK TERTENTU - KOSMETIKIT PRODUK TERTENTU - KOSMETIK
IT PRODUK TERTENTU - KOSMETIKlegalservice
 
40 Gbit/S All-Optical Signal Regeneration with Soa In Mach-Zehnder Configuration
40 Gbit/S All-Optical Signal Regeneration with Soa In Mach-Zehnder Configuration40 Gbit/S All-Optical Signal Regeneration with Soa In Mach-Zehnder Configuration
40 Gbit/S All-Optical Signal Regeneration with Soa In Mach-Zehnder ConfigurationIOSR Journals
 
Machine Learning, Machine Reading and the Web
Machine Learning, Machine Reading and the WebMachine Learning, Machine Reading and the Web
Machine Learning, Machine Reading and the WebEstevam Hruschka
 
Numerical Solution for Two Dimensional Laplace Equation with Dirichlet Bounda...
Numerical Solution for Two Dimensional Laplace Equation with Dirichlet Bounda...Numerical Solution for Two Dimensional Laplace Equation with Dirichlet Bounda...
Numerical Solution for Two Dimensional Laplace Equation with Dirichlet Bounda...IOSR Journals
 
IT PRODUK TERTENTU - PAKAIAN JADI
IT PRODUK TERTENTU - PAKAIAN JADIIT PRODUK TERTENTU - PAKAIAN JADI
IT PRODUK TERTENTU - PAKAIAN JADIlegalservice
 
Discharge and Sediment Transport Modeling Buck Creek Proposal
Discharge and Sediment Transport Modeling Buck Creek ProposalDischarge and Sediment Transport Modeling Buck Creek Proposal
Discharge and Sediment Transport Modeling Buck Creek ProposalJames Blumenschein
 
LordJeshuainheritancemay2016
LordJeshuainheritancemay2016LordJeshuainheritancemay2016
LordJeshuainheritancemay2016Lord Jesus Christ
 

Destaque (17)

Buyer-Vendor Integrated system – the Technique of EOQ Dependent Shipment Size...
Buyer-Vendor Integrated system – the Technique of EOQ Dependent Shipment Size...Buyer-Vendor Integrated system – the Technique of EOQ Dependent Shipment Size...
Buyer-Vendor Integrated system – the Technique of EOQ Dependent Shipment Size...
 
Pengurusan dokumen izin Pendirian PMDN
Pengurusan dokumen izin Pendirian PMDNPengurusan dokumen izin Pendirian PMDN
Pengurusan dokumen izin Pendirian PMDN
 
IT PRODUK SEMEN
IT PRODUK SEMENIT PRODUK SEMEN
IT PRODUK SEMEN
 
H012264250
H012264250H012264250
H012264250
 
D011121524
D011121524D011121524
D011121524
 
IT PRODUK TERTENTU - KOSMETIK
IT PRODUK TERTENTU - KOSMETIKIT PRODUK TERTENTU - KOSMETIK
IT PRODUK TERTENTU - KOSMETIK
 
L010419197
L010419197L010419197
L010419197
 
Sudhir
SudhirSudhir
Sudhir
 
NPWP
NPWPNPWP
NPWP
 
40 Gbit/S All-Optical Signal Regeneration with Soa In Mach-Zehnder Configuration
40 Gbit/S All-Optical Signal Regeneration with Soa In Mach-Zehnder Configuration40 Gbit/S All-Optical Signal Regeneration with Soa In Mach-Zehnder Configuration
40 Gbit/S All-Optical Signal Regeneration with Soa In Mach-Zehnder Configuration
 
Machine Learning, Machine Reading and the Web
Machine Learning, Machine Reading and the WebMachine Learning, Machine Reading and the Web
Machine Learning, Machine Reading and the Web
 
Numerical Solution for Two Dimensional Laplace Equation with Dirichlet Bounda...
Numerical Solution for Two Dimensional Laplace Equation with Dirichlet Bounda...Numerical Solution for Two Dimensional Laplace Equation with Dirichlet Bounda...
Numerical Solution for Two Dimensional Laplace Equation with Dirichlet Bounda...
 
IT PRODUK TERTENTU - PAKAIAN JADI
IT PRODUK TERTENTU - PAKAIAN JADIIT PRODUK TERTENTU - PAKAIAN JADI
IT PRODUK TERTENTU - PAKAIAN JADI
 
Discharge and Sediment Transport Modeling Buck Creek Proposal
Discharge and Sediment Transport Modeling Buck Creek ProposalDischarge and Sediment Transport Modeling Buck Creek Proposal
Discharge and Sediment Transport Modeling Buck Creek Proposal
 
LordJeshuainheritancemay2016
LordJeshuainheritancemay2016LordJeshuainheritancemay2016
LordJeshuainheritancemay2016
 
NPIK GULA
NPIK GULANPIK GULA
NPIK GULA
 
NPIK MAINAN ANAK
NPIK MAINAN ANAKNPIK MAINAN ANAK
NPIK MAINAN ANAK
 

Semelhante a J017426467

A Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisA Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisIOSR Journals
 
SIRG-BSU_3_used-important.pdf
SIRG-BSU_3_used-important.pdfSIRG-BSU_3_used-important.pdf
SIRG-BSU_3_used-important.pdfDrAhmedElngar
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...eSAT Journals
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...eSAT Publishing House
 
Image Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesImage Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesIIRindia
 
A Review on Image Segmentation using Clustering and Swarm Optimization Techni...
A Review on Image Segmentation using Clustering and Swarm Optimization Techni...A Review on Image Segmentation using Clustering and Swarm Optimization Techni...
A Review on Image Segmentation using Clustering and Swarm Optimization Techni...IJSRD
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposureiosrjce
 
AUTOMATIC DOMINANT REGION SEGMENTATION FOR NATURAL IMAGES
AUTOMATIC DOMINANT REGION SEGMENTATION FOR NATURAL IMAGES AUTOMATIC DOMINANT REGION SEGMENTATION FOR NATURAL IMAGES
AUTOMATIC DOMINANT REGION SEGMENTATION FOR NATURAL IMAGES cscpconf
 
Automatic dominant region segmentation for natural images
Automatic dominant region segmentation for natural imagesAutomatic dominant region segmentation for natural images
Automatic dominant region segmentation for natural imagescsandit
 
Survey on Brain MRI Segmentation Techniques
Survey on Brain MRI Segmentation TechniquesSurvey on Brain MRI Segmentation Techniques
Survey on Brain MRI Segmentation TechniquesEditor IJMTER
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0Kapil Tiwari
 
Segmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain TumorSegmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain TumorIRJET Journal
 
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONMAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONVLSICS Design
 
Edge detection by using lookup table
Edge detection by using lookup tableEdge detection by using lookup table
Edge detection by using lookup tableeSAT Journals
 
Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Editor IJARCET
 
Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Editor IJARCET
 

Semelhante a J017426467 (20)

A Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisA Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and Analysis
 
Q0460398103
Q0460398103Q0460398103
Q0460398103
 
SIRG-BSU_3_used-important.pdf
SIRG-BSU_3_used-important.pdfSIRG-BSU_3_used-important.pdf
SIRG-BSU_3_used-important.pdf
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
 
Image Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI ImagesImage Segmentation Based Survey on the Lung Cancer MRI Images
Image Segmentation Based Survey on the Lung Cancer MRI Images
 
A Review on Image Segmentation using Clustering and Swarm Optimization Techni...
A Review on Image Segmentation using Clustering and Swarm Optimization Techni...A Review on Image Segmentation using Clustering and Swarm Optimization Techni...
A Review on Image Segmentation using Clustering and Swarm Optimization Techni...
 
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier ExposurePerformance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
Performance of Efficient Closed-Form Solution to Comprehensive Frontier Exposure
 
I010634450
I010634450I010634450
I010634450
 
IMAGE SEGMENTATION.
IMAGE SEGMENTATION.IMAGE SEGMENTATION.
IMAGE SEGMENTATION.
 
AUTOMATIC DOMINANT REGION SEGMENTATION FOR NATURAL IMAGES
AUTOMATIC DOMINANT REGION SEGMENTATION FOR NATURAL IMAGES AUTOMATIC DOMINANT REGION SEGMENTATION FOR NATURAL IMAGES
AUTOMATIC DOMINANT REGION SEGMENTATION FOR NATURAL IMAGES
 
Automatic dominant region segmentation for natural images
Automatic dominant region segmentation for natural imagesAutomatic dominant region segmentation for natural images
Automatic dominant region segmentation for natural images
 
Survey on Brain MRI Segmentation Techniques
Survey on Brain MRI Segmentation TechniquesSurvey on Brain MRI Segmentation Techniques
Survey on Brain MRI Segmentation Techniques
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
 
Segmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain TumorSegmentation and Classification of MRI Brain Tumor
Segmentation and Classification of MRI Brain Tumor
 
Cj36511514
Cj36511514Cj36511514
Cj36511514
 
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATIONMAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
MAGNETIC RESONANCE BRAIN IMAGE SEGMENTATION
 
Edge detection by using lookup table
Edge detection by using lookup tableEdge detection by using lookup table
Edge detection by using lookup table
 
Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251
 
Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251Ijarcet vol-2-issue-7-2246-2251
Ijarcet vol-2-issue-7-2246-2251
 

Mais de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
C011121114
C011121114C011121114
C011121114
 

Último

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 

Último (20)

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 

J017426467

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 4, Ver. II (July – Aug. 2015), PP 64-67 www.iosrjournals.org DOI: 10.9790/0661-17426467 www.iosrjournals.org 64 | Page A Exploratory Review on Soft Computing Segmentation Techniques Chandanpreet Kaur1 , Dr. Bikrampal Kaur 2 1 M.Tech Student (IT Department), Chandigarh Engineering College, Landran, Mohali,Punjab,india. 2 Professor (IT Department), Chandigarh Engineering College, Landran, Mohali,Punjab,india. Abstract: Segmentation is a process to divides the images into its regions or objects that have similar features or characteristics. Segmentation has no single standard procedure and it is very difficult in non-trivial images. The extent, to which segmentation is carried out, depends on the problem specification. Segmentation algorithms are based on two properties of intensity values- discontinuity and similarity. First property is to partition an image based on the abrupt changes in the intensity and the second is to partition the image into regions that are similar according to a set of predefined criteria. In this paper some methods to detect the discontinuity and similarity of digital images will be discussed. The basic techniques for detecting the gray level discontinuities in a digital images and locating the objects and boundaries of images ( points, lines and edges) have also been discussed. The other segmentation techniques like histogram thresholding, filtration, watershed, edge detection, region growing, region splitting and merging are based on the fact of classification with the usage of range functions that are applied to the intensity value of image pixels. Keywords: Thresholding, Segmentation, Edge detection, Region growing, Region splitting and merging, watershed. I. Introduction The goal of image segmentation is to cluster pixels into image regions, i.e. regions corresponding to individual surfaces, objects, or natural parts of objects. Segmentation is a testing field of picture investigation. Specifically, medical picture division has ended up essential with improvement of complex restorative imaging modalities which are fit for delivering a substantial amount of high-determination two-dimensional (2-D) and three-dimensionalbh (3-D) pictures. Haralik R.H [6] define the issue of picture division and there is an expansive number of systems depicted in the writing. The first step in image analysis is segment the image. Segmentation divides an image into its cluster parts or objects. Extent of level to which this subdivision is carried out depends on the problem being viewed. To read the image correct and to identify the content of the image there is need to segment the object from the background and for this reason there are two techniques of segmentation i.e discontinuity detection technique and similarity detection technique. In the first technique, one approach is to partition an image based on abrupt changes in gray-level image and the second technique is based on the threshold, region growing and the Edge Detection method.Image segmentation technique used for :- 1. In automated inspection of electronic assemblies, presence or absence of specific objects can be determined by analyzing images. 2. Analyzing aerial photos to classify terrain into forests, water bodies etc. 3. Analyzing MRI and X-ray images in medicine for classify the body organs. II. Segmentation Techniques Various segmentation techniques are discussed below:- 1.Segmentation using discontinuities Several techniques for detecting three basic gray level discontinuities in a digital image (points, lines and edges) are different types of filtration. The most common way to look for discontinuities is by spatial filtering methods. a).Point detection idea is to isolate a point which has gray level significantly different from its background.
  • 2. A Exploratory Review On Soft Computing Segmentation Techniques DOI: 10.9790/0661-17426467 www.iosrjournals.org 65 | Page Figure.1 w1=w2=w3=w4=w6=w7=w8=w9 = -1, w5 = 8. Response is R = w1z1+ w2z2 +………+ w9z9, where z is the gray level of the pixel. Based on the response calculated from the above equation we can find out the points desired. b).Line detection is next level of complexity to point detection and the lines could be vertical, horizontal or at +/- 45 degree angle. Responses are calculated for each of the mask above and based on the value we can detect if the lines and their orientation. c)Edge detection The edge is a regarded as the boundary between two objects (two dissimilar regions) or perhaps a boundary between light and shadow falling on a single surface. To find the differences in pixel values between regions can be computed by considering gradients. The edges of an image hold much information in that image. The edges tell where objects are, their shape and size, and something about their texture. An edge is where the intensity of an image moves from a low value to a high value or vice versa. There are numerous applications for edge detection, which are often used for various special effects. Digital artists use it to create dazzling image outlines. The output of an edge detector can be added back to an original image to enhance the edges. Edge detection is often the first step in image segmentation. Image segmentation, a field of image analysis, is used to group pixels into regions to determine an image's composition. A common example of image segmentation is the "magic wand" tool in photo editing software. This tool allows the user to select a particular pixels in an image. There is an infinite number of edge orientations to specify the widths and shapes of edges such that roof edge, line edge, step edge, ramp edge etc. Figure 2 Different edge orientation Some edges are straight while others are curved with varying radii. There are many edge detection techniques to go with all these edges, each having its own strengths. Some edge detectors may work well in one application and perform poorly in others. Sometimes it takes experimentation to determine what the best edge detection technique for an application is. Edge detection is also used in image registration. Image registration aligns two images that may have been acquired at separate times or from different sensors. The simplest and quickest edge detectors determine the maximum value from a series of pixel subtractions. The homogeneity operator subtracts each 8 surrounding pixels from the center pixel of a 3 x 3 window. The output of the operator is the maximum of the absolute value of each difference. Similar to the homogeneity operator is the difference edge detector. It operates more quickly because it requires four subtractions per pixel as opposed to the eight needed by the homogeneity operator. The subtractions are upper left  lower right, middle left  middle right, lower left  upper right, and top middle  bottom middle.
  • 3. A Exploratory Review On Soft Computing Segmentation Techniques DOI: 10.9790/0661-17426467 www.iosrjournals.org 66 | Page 2. Segmentation using Thresholding Thresholding is based on the assumption that the histogram has two dominant modes, for example light objects and an dark background. In this method to extract the objects from the image is needs to select a threshold value such that it separates the two modes. F(x,y)= T Depending on the kind of problem to be solved there are multilevel thresholding. A. D Brink[8] Define the region of thresholding, there is two type of thresholding global thresholding and local thresholding. Global threshoding is considered as a function for the entire image and local thresholding involves only a certain region. In addition to the above mentioned techniques, if the thresholding function T depends on the spatial co- ordinates then it is known as the dynamic or adaptive thresholding. a) Basic global thresholding technique: In this technique the entire image is scanned by pixel after pixel and some pixels labeled as object or the background, depending on whether the gray level is greater or lesser than the thresholding function T. The success depends on how well the histogram is constructed. It can be fulfilled in controlled environments, and can also find the applications primarily in the industrial inspection area. R.C Gonzalez [7] present an algorithm for global thresholding that can be summarized in a few steps. 1) Select an initial estimate for T. 2) Segment the image using T. This will produce two groups of pixels. G1 consisting of all pixels with gray level values >T and G2 consisting of pixels with values <=T. 3) Compute the average gray level values mean1 and mean2 for the pixels in regions G1 and G2. 4) Compute a new threshold value T= (1/2)(mean1 +mean2). 5) Repeat steps 2 through 4 until difference in T in successive iterations is smaller than a predefined parameter T0. b) Basic adaptive thresholding technique: In this technique the images having uneven illumination make it difficult to segment using the histogram, in this case Ioannis M. Stephanakis [12] divide the image in many sub images and then come up with different threshold to segment each sub image. The key issues are how to divide the image into sub images and utilize a different threshold to segment each sub image. 3). Region based segmentation The main objective of segmentation is to divide the image into different regions and region based segmentation techniques are used to determining the region of images directly. The segmentation must be complete and every pixel must be in region it indicates that the region is disjoint. Formulation of the regions: An entire image is divided into sub regions and they must be in accordance to some rules such as 1. Union of sub regions is the region 2. All are connected in some predefined sense. 3. No to be same, disjoint 4. Properties must be satisfied by the pixels in a segmented region P (Ri) =true if all pixels have same gray level. 5. Two sub regions should have different sense of predicate. a) Segmentation by region splitting and merging: The basic idea of splitting is, as the name implies, to break the image into many disjoint regions which are coherent within themselves. Take into consideration the entire image and then group the pixels in a region if they satisfy some kind of similarity constraint. This is like a divide and conquers method. Merging is a process used when after the split the adjacent regions merge if necessary. D. Chaudhuri [11] developed an algorithms of this nature are called split and merge algorithms. b) Segmentation by region growing: This is a simple region based approach which is also classified as a pixel based image segmentation and it involves the selection of initial seed point in which examine neighboring pixels of initial seed point and determines whether the pixel neighbors should be added to the region or not. This approach is the opposite of split and merges said by Thanos Athanasiadis[10]. 1. An initial set of small area are iteratively merged based on similarity of constraints. 2. Start by choosing an arbitrary pixel and compared with the neighboring pixel. 3. Region is grown from the seed pixel by adding in neighboring pixels that are similar, increasing the size of the region.
  • 4. A Exploratory Review On Soft Computing Segmentation Techniques DOI: 10.9790/0661-17426467 www.iosrjournals.org 67 | Page 4. 4 When the growth of one region stops we simply choose another seed pixel which does not yet belong to any region and start again. 5. 5 This whole process is continued until all pixels belong to some region. 6. 6 A bottom up method. 4. Segmentation by Morphological watersheds: This method combines the positive aspects of many of the methods discussed earlier. The basic idea to embody the objects in “watersheds” is given by Alan P. Mangan [9].The concept of watersheds is the idea of visualizing an image in 3D to spatial versus gray levels. So all points in such a topology are either belonging to regional minimum all with certain to a single minimum, equal to two points where more than one minimum. A particular region is called watershed if a region minimum satisfying certain conditions. III. Conclusion In this paper, the study reviews the research on various research methodologies applied for image segmentation in soft computing specially for the medical images. And the new study aims to provide a simple guidance to the researcher who want to carry out their research on the image segmentation very accurately.In future the efforts for the proposal of genetic segmentation filter will be done , the GA is a stochastic global search method that mimics the metaphor of natural biological evolution. GA operates on a population of potential solution applying the principle of survival of fittest to produce better and better approximation of solution. At each generation, a new set of approximation is created by process of selecting individuals according to their level of fitness in the problem domain and breeding them using operators borrowed from natural genetics. The genetic algorithm solves optimization problems by mimicking the principles of biological evolution, repeatedly modifying a population of individual points using rules modeled on gene combinations in biological reproduction. Due to its random nature, the genetic algorithm improves your chances of finding a global solution. It enables you to solve unconstrained, bound constrained and general optimization problems, and it does not require the functions to be differentiable or continuous. This research will provide the guidance to the researcher and doctors to exract the particular tumor area from the medical images by using the biography based neural clustering with genetic algorithm. References [1]. R. Gonzalez and Richard E.Woods, “Digital Image Processing”, 2Ed, 2002. [2]. B. Sumengen, B. S. Manjunath, C. Kenney, "Image Segmentation using Curve Evolution and Flow Fields” Proceedings of IEEE International Conference on Image Processing (ICIP), Rochester, NY, USA, September 2002. [3]. W. Ma, B.S. Manjunath, “Edge Flow: a technique for boundary detection and image segmentation” Trans. Image Proc., pp. 1375- 88, Aug. 2000 [4]. Venugopal, “Image segmentation” written reports 2003. [5]. Jin Wang, “Image segmentation Using curve evolution and flow fields”, written reports 2003. [6]. Haralick R. H, Shapiro L. G,”Computer and Robot Vision” Vol. I, Addison Wesley Publishing Company, 1993. [7]. R. C. Gonzalez, R.E. Woods, “Digital Image Processing” Publishing House of Electronics Industry, Beijing, 3rd ed. pp. 711, 760- 764. [8]. A. D. Brink, “Minimum spatial entropy threshold selection,” IEEE [9]. Alan P. Mangan, Ross T. Whitaker, “Surface Segmentation Using Morphological Watersheds.” [10]. ThanosAthanasiadis, Yannis Avrithis and StefanosKollias, “A Semantic Region Growing Approach in ImageSegmentation and Annotation.” [11]. D. Chaudhuri and A. Agrawal,“Split-and-merge Procedure for Image Segmentation usingBimodality Detection Approach”, Defence Science Journal, Vol. 60, No. 3, May 2010, pp. 290-300,2010, DESIDOC [12]. Ioannis M. Stephanakis and George C. Anastassopoulos, “segmentation using adaptive thresholding of the image histogram according to the incremental rates of the segment likelihood functions”.