• No results found

image based transfer function

Image-Based Transfer Function Design for Data Exploration in Volume Visualization

Image-Based Transfer Function Design for Data Exploration in Volume Visualization

... these image volumes sensitive to small changes in ren- dering ...an image, it is difficult to determine an appropriate transfer function to generate a useful and informative ...

8

Transfer function optimization for volume visualization based on visibility and saliency

Transfer function optimization for volume visualization based on visibility and saliency

... rendered image and saliency fields measure how strongly each voxel stands out in its local ...different transfer functions can be measured in a quantitative and fully auto- mated ...effective ...

176

A Generic Transfer Function based Technique for Estimating Noise from Images

A Generic Transfer Function based Technique for Estimating Noise from Images

... the image with a Laplacian mask as given in ...the image is suppressed, leaving behind mostly the noisy ...only image’, we compute the local standard deviation of the noisy ...entire image as ...

7

An Improved Image Style Transfer Algorithm Based on Deep Learning Network

An Improved Image Style Transfer Algorithm Based on Deep Learning Network

... algorithm based on neural network in ...an image by using antagonistic branches, and then reconstruct the style of one image and the content of another image by using an automatic encoder to ...

7

An Advanced Crypto Based Security System for Medical Image/Data Transfer

An Advanced Crypto Based Security System for Medical Image/Data Transfer

... to transfer the medical images over the ...crypto based algorithm based on strong cryptographic functions with internally generated symmetric keys and hash ...encryption function is primarily ...

6

Research on Image Generation and Style Transfer Algorithm Based on Deep Learning

Research on Image Generation and Style Transfer Algorithm Based on Deep Learning

... At present, the art creation and animation creation process mainly uses sketch- ing first, and then through a series of processes such as coloring to form an ac- tual picture. When the style needs to be converted, most ...

12

The design of medical image transfer function using multi feature fusion and improved k means clustering

The design of medical image transfer function using multi feature fusion and improved k means clustering

... CT image sequence, experiment images are selected with 3-4 intervals from the CT ...scalar transfer function, which only employs gray feature, and roughly distinguish the contour of different ...

7

An Evaluation of a Novel Technique to Suppress Corruptive Artifacts for Example-Based Color Transfer Framework

An Evaluation of a Novel Technique to Suppress Corruptive Artifacts for Example-Based Color Transfer Framework

... statistical transfer, N - dimensional probability density function transfer, gradient-preserving transfer non-rigid dense correspondence transfer , progressive transfer, to list ...

7

Analysis of Mid-range Wireless Power Transfer Circuits Based on Reactance Function and Image Impedance

Analysis of Mid-range Wireless Power Transfer Circuits Based on Reactance Function and Image Impedance

... power transfer [3]. Wireless power transfer realizes flexible power charging without wires or plugs, and its application to electric vehicles is deemed essential since such vehicles need frequent ...power ...

8

A detailed measure of apparent modulation induced by Cornsweet edges on a digital image display system

A detailed measure of apparent modulation induced by Cornsweet edges on a digital image display system

... object lightness of transfer function using the Fourier based on the image as described Their apparatus of paper of object the caused Lowry ramp and DePalma bands inherent Another used h[r] ...

124

Image steganography using mod 4 embedding algorithm based on image contrast

Image steganography using mod 4 embedding algorithm based on image contrast

... Steganography is the art and science of invisible communication. This is accomplished through hiding information in other information, thus hiding the existence of the communicated information. The word steganography is ...

5

Energy Based Method to Predict Temperature within Rectangular Concrete Sections

Energy Based Method to Predict Temperature within Rectangular Concrete Sections

... The proposed method can be used to predict the temperature profile in rectangular section, such as beams and columns, with normal concrete properties. The method suitable for the section under various fire loads in two ...

20

Anchored neighborhood deep network for single-image super-resolution

Anchored neighborhood deep network for single-image super-resolution

... deep-learning- based image SR methods have also been ...low-resolution image to high-resolution one in an end-to-end ...compressive image restora- tion ...undegraded image as ground ...

12

Speed Trap Image Transfer through GSM Network

Speed Trap Image Transfer through GSM Network

... Over the last decade, the implementation of Speed Trap Image Transfer through GSM Network has been attempted by using the internet and through power-line modems. However, these solutions are not only ...

5

Efficient content based image retrieval system for satellite image using SVM

Efficient content based image retrieval system for satellite image using SVM

... efficient image retrieval algorithm based on color-correlogram for color feature extraction, wavelet transformation for extracting shape features and Gabor wavelet for texture feature extraction is ...

7

A new transfer function analyser

A new transfer function analyser

... that, using analogue computer simulation, random data around a specific region, could be extracted in blocks using filtering techniques, mnnipulnted by hardware in the form of a first-or[r] ...

170

Solution of the Problem of Smoothing of the Signals at the Preprocessing of Thermal Images

Solution of the Problem of Smoothing of the Signals at the Preprocessing of Thermal Images

... 1. The loading an IR image, and parameters camera. 2. In the second stage, we select an arbitrary point in the image. The pixel cannot belong to the border of the image. This point is the middle and ...

5

LSB based image steganography techniques renovation

LSB based image steganography techniques renovation

... substitution based on Huffman ...stego image is acceptable and it is very hard to detection and secret message extraction by the attacker due to Huffman table utilized, which reduces the cover image ...

5

Application of Radial Basis Function Network   for Content Based Image Retrieval

Application of Radial Basis Function Network for Content Based Image Retrieval

... An image database from MIT Media Laboratories [17] is used for the simulation. Out of 2000 images, 500 images are selected and manually grouped and properly labeled in to 5 classes. This set of 500 images is used ...

5

A Performance Evaluation of Shape Based Image Retrieval Using Heuristic Function

A Performance Evaluation of Shape Based Image Retrieval Using Heuristic Function

... Outer based methods use only the contour or border of the object shape and completely ignore its ...area based techniques take into account internal details besides the outer ...heuristic function ...

8

Show all 10000 documents...

Related subjects