Image Edge Detection based on ACO-PSO Algorithm
نویسندگان
چکیده
منابع مشابه
Image Edge Detection based on ACO-PSO Algorithm
This survey focuses on the problem of parameters selection in image edge detection by ant colony optimization (ACO) algorithm. By introducing particle swarm optimization (PSO) algorithm to optimize parameters in ACO algorithm, the fitness function based on connectivity of image edge is proposed to evaluate the quality of parameters in ACO algorithm. And the ACO-PSO algorithm is applied to image...
متن کاملImage Based Retrieval Using Edge Detection Algorithm
The increasing necessity of image retrieval based on content given technique can be used in a number of domains like Data Mining, Academics, Medical, Crime Prevention, Weather forecasting, Remote sensing and Management of Resources. This paper presents the content based image retrieval , using an edge detection called as canny edge detection algorithm in which the image can be viewed as binary ...
متن کاملImage Edge Detection Based on Ant Colony Optimization Algorithm
No part of this journal may be reproduced or used in any form or by any means without written permission from the publisher, except for noncommercial, educational use including classroom teaching purposes. Product or company names used in this journal are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of...
متن کاملA novel image edge detection algorithm based on neutrosophic set
Neutrosophic set (NS) theory is a formal framework to study the origin, nature, and scope of the neutral state. In this paper, neutrosophic set is applied in image domain and a new directional a-mean operation is defined. Based on this operation, neutrosophic set is applied into image edge detection procedure. First, the image is transformed into NS domain, which is described by three membershi...
متن کاملImage Steganography based on a Parameterized Canny Edge Detection Algorithm
Steganography is the science of hiding digital information in such a way that no one can suspect its existence. Unlike cryptography which may arouse suspicions, steganography is a stealthy method that enables data communication in total secrecy. Steganography has many requirements, the foremost one is irrecoverability which refers to how hard it is for someone apart from the original communicat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2015
ISSN: 2156-5570,2158-107X
DOI: 10.14569/ijacsa.2015.060708