The computer vision branch of the artificial intelligence field is concerned with
developing algorithms for analyzing image content. Data may be compressed by
reducing the redundancy in the original data, but this makes the data have more
errors. In this paper image compression based on a new method that has been
created for image compression which is called Five Modulus Method (FMM). The
new method consists of converting each pixel value in an (4x4, 8×8,16x16) block
into a multiple of 5 for each of the R, G and B arrays. After that, the new values
could be divided by 5 to get new values which are 6-bit length for each pixel and it
is less in storage space than the original value which is 8-bits.
Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.
In this paper two main stages for image classification has been presented. Training stage consists of collecting images of interest, and apply BOVW on these images (features extraction and description using SIFT, and vocabulary generation), while testing stage classifies a new unlabeled image using nearest neighbor classification method for features descriptor. Supervised bag of visual words gives good result that are present clearly in the experimental part where unlabeled images are classified although small number of images are used in the training process.
Tests were performed on asphalt concrete specimens with (101.6 mm in diameter and 101.6 mm in height), and the results were implemented for calculating permanent deformation and resilient modulus under repeated compressive stress with different levels of stresses (0.068, 0.138 and 0.206) MPa at 40 ºC. Two types of additives namely (carbon black-asphalt) and (SBR-asphalt) were tried as rejuvenators with three percentages of (0.5, 1 and 1.5) % by weight of asphalt cement along with two ratios of AC (1 and 2) % have been implemented as rejuvenator and blended with the reclaimed asphalt concrete. Aged materials were obtained from the site. 100% Reclaimed Asphalt Pavement material from the reclaimed mixture is implemented. A
... Show MoreIncreasing material prices coupled with the emission of hazardous gases through the production and construction of Hot Mix Asphalt (HMA) has driven a strong movement toward the adoption of sustainable construction technology. Warm Mix Asphalt (WMA) is considered relatively a new technology, which enables the production and compaction of asphalt concrete mixtures at temperatures 15-40 °C lower than that of traditional hot mix asphalt. The Resilient modulus (Mr) which can be defined as the ratio of axial pulsating stress to the corresponding recoverable strain, is used to evaluate the relative quality of materials as well as to generate input for pavement design or pavement evaluation and analysis. Based on the aforementioned preface, it is
... Show MoreThis paper determined the difference between the first image of the natural and the second infected image by using logic gates. The proposed algorithm was applied in the first time with binary image, the second time in the gray image, and in the third time in the color image. At start of proposed algorithm the process images by applying convolution to extended images with zero to obtain more vision and features then enhancements images by Edge detection filter (laplacion operator) and smoothing images by using mean filter ,In order to determine the change between the original image and the injury the logic gates applied specially X-OR gates . Applying the technique for tooth decay through this comparison can locate inj
... Show MoreInternet technology has revolutionized the landscape of communication technologies in the modern era. However, because the internet is open to the public, communication security cannot be guaranteed. As a result, data concealment approaches have been developed to ensure confidential information sharing. Various methods have emerged to achieve the goal of secure data communication via multimedia documents. This study proposes a method, which is both adaptable and imperceptible, for concealing a secret text in a color image. From an adaptivity perspective, image corners are detected using the Harris corner detection algorithm and utilized as anchor points for picking the optimal hiding regions of interest using Bezier curve interp
... Show MoreThe purpose of the paper is to tind the degree of the approximation of a functions f be bounded , measurable and defined
in interval [a,h]by Bernstein polynomial in LP space 1 $ p < oo by
using Ditzian-Totik modulus of smootlmess and k 1n average modvlus of smoothness.
Image Fusion Using A Convolutional Neural Network
In this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was s