0% found this document useful (0 votes)
45 views18 pages

University Name

The document summarizes a study on dynamic compression sensing edge detection techniques using dynamic compression sensing. It discusses the working mechanisms, features, sizing, capacity and design of chemical reactors. It also analyzes the effects of image processing reactions. The study aims to compare the efficiency of various edge detection techniques under different conditions.

Uploaded by

Rizwi PTI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views18 pages

University Name

The document summarizes a study on dynamic compression sensing edge detection techniques using dynamic compression sensing. It discusses the working mechanisms, features, sizing, capacity and design of chemical reactors. It also analyzes the effects of image processing reactions. The study aims to compare the efficiency of various edge detection techniques under different conditions.

Uploaded by

Rizwi PTI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

University Name

Study of Dynamic Compression Sensing Edge Detection Techniques Using Dynamic

Compression Sensing

Student Name

Course Name and Number

Professor Name
Last Name 2

Student’s Name

Professor’s Name

Course Number

Study of Dynamic Compression Sensing Edge Detection Techniques Using Dynamic

Compression Sensing

Executive Summary

The following covers the introduction of Study of Dynamic Compression Sensing Edge

Detection Techniques Using Dynamic Compression Sensing. It discusses their working

mechanism, physical features, sizing, capacity, and design features in detail. In addition, it deals

with the processes that took place in these reactors. It includes a comprehensive analysis of effect

of image processing reactions or vice versa.


Last Name 3

Table of Contents
Executive Summary.........................................................................................................................2
1. Introduction..............................................................................................................................4
2. Literature Review.....................................................................................................................4
2.1. Chemical Reactors............................................................................................................4
2.2. Types of Chemical Reactors.............................................................................................5
2.2.1. Batch Reactors:..........................................................................................................5
2.2.2. Continuous Reactors:.................................................................................................5
2.3. Continuous Stirred Tank Reactor:.....................................................................................6
3. Methods....................................................................................................................................6
3.1. Procedure (Batch Reactor, Adiabatic Reaction)...............................................................6
3.2. Procedure (Batch Reactor, Isothermal Reaction)..............................................................7
4. Precautions...............................................................................................................................7
5. Observations and Calculations.................................................................................................7
6. Results......................................................................................................................................8
7. Discussion................................................................................................................................8
8. Conclusion................................................................................................................................9
Appendix........................................................................................................................................10
Individual Contribution.................................................................................................................12
Last Name 4

1. Introduction

Image encryption has been an attractive research helped us validate our concepts of

industrial reactions. Practically, procedures are incomplete and are not spontaneous. The product

is formed gradually whereas the speed of the reaction remains variable. The conversion of

reactants into products depends upon a number of factors including the nature of the reactants,

the concentration and mixing of the reactant, the time that reactants are in contact, and the

reaction.

detection means the mechanism by which sharp discontinuities are identified and placed

in an image. The discontinuities are sudden differences in the strength of pixels that define object

boundaries in a scene. The Dynamic Compressive Sensing with an operator (a 2D philtre),

designed to be adaptive to wide gradients in dynamic compression, requires classical methods to

detect edges. The sensing values are returned to zero in the same regions. Extremely several edge

detection operators are usually available and each is built to be adaptive to such dominance

types. Edge orientation, noise condition and Edge composition include the factors used 49 in 49

the 49 selection 49 of 49 49 edge 49 detection 49 operator. The operator's geometry defines the

direction in which it is most susceptible to dominance. It is possible to refine operators in order

to find horizontal, vertical or diagonal dominance. Edge detection in noisy images is difficult

since both noise and dominance involve high frequency levels. Attempts to minimise noise

contribute to fluctuations and distortions. Noisy camera operators normally have wider scopes,

so that enough detail to discount localised noisy pixels can be averaged.

The observed superiorities are therefore less precisely located. Not all superiorities require a

steady strength transition. Objects with boundaries specified by a gradual changes in intensity
Last Name 5

will result in effects such as refraction or a lack of concentration[1]. In such instances, the

operator must be selected to respond to such an incremental transition. Thus there are problems

of false edge detection, lacking actual dominance, the edge position, time for estimation, and

noise problems, etc. Hence the purpose is to compare and evaluate the efficiency of the various

techniques under different conditions.

2. Literature Review

The precise overview of the two most commonly used types of chemical reactors is as

follows. Also, the reactor employed in the lab is discussed in detail.

2.1. Signal Model

We assume an i.i.d. Gaussian random walk model with support additions and removals

occurring every d time instants. Additions occur at every tj = 1 + jd and removals at every tj+1 −

1 for all j ≥ 0. The support sets, Nt, at all t, are deterministic unknowns, while the sequence of

xt’s is a random process. Signal Model 1: Assume the following model. 1) At t = 0, x0 is S0

sparse with support N0 and (x0)N0 ∼ N (0, σ2 sys,0I). 2) At every addition time, tj = 1 + jd, for

all j ≥ 0, there are Sa new additions to the support. Denote the set of indices of the coefficients

added at tj by A(j). 3) At every removal time, tj+1 − 1 = (j + 1)d, for all j ≥ 0, there are Sr

removals from the support. 4) The maximum support size is Smax, i.e. |Nt| ≤ Smax at all t. 5)

Every new coefficient that gets added to the support starts from zero and follows an independent

Gaussian random walk model with zero drift and change variance σ 2 sys. 6) The value of every

removed coefficient and the corresponding change variance both get set to zero.
Last Name 6

2.2 The Stability Result

We begin by stating Lemma 1 which shows two things. First, if accurate initialization is

assumed, the noise is bounded, Smax ≤ S∗∗, αdel = 0 and α is high enough, there are no false

detections. If the delay between addition times also satisfies d > τdet(ǫ, Sa), where τdet is what

we call the “high probability detection delay”, then the following holds. If before tj , the support

was perfectly estimated, then w.p. ≥ 1 − ǫ, all the additions which occurred at tj will get detected

by tj + τdet(ǫ, Sa) < tj+1. Lemma 1: Assume that xt follows Signal Model 2. If 1) (initialization

(t = 0)) all elements of x0 get correctly detected and there are no false detects, i.e. Nˆ0 = N0, 2)

(measurements) Smax ≤ S∗∗ and kwk∞ ≤ λ/kAk1, 3) (algorithm) we set αdel = 0 and α 2 = B∗ :=

C1(Smax)Smaxλ 2 , where C1(S) is defined in [8, Theorem 1.1], 4) (signal model) delay

between addition times, d > τdet(ǫ, Sa)

2.2. Fundamentals of Digital image processing

The digital image processing steps can be categorized into two broad areas as the

methods whose input and output are images, and methods whose inputs may be images, but

whose outputs are attributes extracted from those images. Image acquisition is the first process

in the digital

image processing. Note that acquisition could be as simple as being given an image that

is already in digital form. Generally, the image acquisition stage involves pre-processing, such as

scaling. The next step is image enhancement, which is one among the simplest and most

appealing areas of digital image processing. Basically, the idea behind enhancement

techniques is to bring out detail that is obscured, or simply to highlight certain features of

interest in an image. A familiar example of enhancement is when we increase the contrast of an


Last Name 7

image because “it looks better.” It is important to keep in mind that enhancement is a very

subjective area of image processing. Image restoration is an area that also deals with improving

the appearance of an image. However, unlike enhancement, which is subjective, image

restoration is

objective, in the sense that restoration techniques tend to be based on mathematical or

probabilistic models of image degradation. Enhancement, on the other hand, is based on human

subjective preferences regarding what constitutes a “good” enhancement result. Color image

processing is an area that has been gaining in importance because of the significant increase

in the use of digital images over the Internet. Color image processing involves the study

of fundamental concepts in color models and basic color processing in a digital domain. Image

color can be used as the basis for extracting features of interest in an image. Wavelets are the

foundation for representing images in various degrees of resolution. In particular, wavelets can

be used for image data compression and for pyramidal representation, in which images are

subdivided successively into smaller regions.

2.2.1. Batch Reactors:

These reactors are used for almost all laboratory reactions. The reactants are placed in a

container that could be beaker, flask or in case of industrial scale reactor a big tank. Then, the

reactants are mixed together. Usually external heat is provided to carry out the reaction. The

products are then retrieved or purified in case it is necessary. They are named so because the

reaction takes place in batches.


Last Name 8

Batch reactors are typically utilized when a firm wants to manufacture a variety of products

requiring various reactants and reactor requirements. In such scenarios, it is easy for them to use

the same equipment for all kind of situations. Batch reactors are usually used in colorant and

margarine production industries. We have performed our experiments on batch reactor.

2.3. Continuous Images Proceed:

In this circumstance, reactants are added into a reactor outfitted with a stirrer and the

products that are produced are eliminated constantly. The stirrer stirs, and make sure that the

output has a uniform composition throughout. This composition remains same even at the output

terminal. An image is used, in the production of the amide intermediate formed in production

process of duration image.  A distinction of the is the loop reactor which is comparatively easy

and economical to construct. Loop reactors are used, in the manufacture of poly(ethene) and

poly(propene). We have also observed the configuration of compressive sensing reactor.

3. Methods

False edge detection issues, the absence of real superiorities, thin or dense lines and noise

problems, etc are present. In this paper we studied and visually compared the most widely used

strategies for gradient and laplacian border detection, for problems with unreliable border

detections, lack of actual supervisors, thin or dense lines and noise problems, etc. MATLAB 7.0

is used to build the applications.

3.1. Procedure (Binary & Digital Data)

Many known to be the optimum edge monitor, the Canny edge detection algorithm. At the time

he began his job, Canny's thoughts were to develop the many edge detectors already. In his post,

'A theoretical approach to edge detection'[11], his concepts and methods were very good. He
Last Name 9

adopted a list of guidelines in his paper for enhancing existing edge detection procedures. Low

error rates are the first and most noticeable. It is critical that photos do not ignore superiorities

and that non-superiorities do not respond. The second criterion is the proper orientation of the

edge points. In other words, there shall be at a minimum the distance from the detector between

the edge pixels and the real edge. A third criterion is that one single edge is replied. This is

because the first two were inadequate to remove several reactions to one edge absolutely. The

cylindrical edge sensor smoothes first the dynamic pressure sensing to remove noise based on

these parameters.[18] The sensing gradient for dynamic compression is observed to prioritise

areas with high spatial derivatives. The algorithm tracks the areas and deletes any pixels not

maximal (non-maximum deletion). Hysteresis now limits the number of gradients further. 49

Hysteresis 49 is 49 used 49 to 49 map 49 the 49 remaining 49 non-suppressed 49 pixels.[19] 49

The 49 hysteresis 49 is 49 separated 49 by 49 2 49 thresholds 49 and 49 is 49 set 49 to 49 zero

49 (non-edged) 49 when 49 magnitude 49 is 49 smaller 49 than 49 the 49 first 49 threshold. 49 If

49 the 49 scale 49 is 49 larger 49 than 49

High, 49 it's 49 rendered 49 an 49 edge 49 threshold. 49 And 49 if 49 the 49 size 49 between 49

the 49 2 49 thresholds 49 is 49 set 49 to 49 zero, 49 unless 49 the 49 path 49 to 49 a 49 pixel 49

with 49 a 49 gradient 49 above 49 T2 49 is 49 from 49 this 49 pixel 49 .

3.2. Procedure (Singal and binary node)

These kernels are built to respond to dominance, which each has a two vertical and horizontal

perpendicular orientation to the pixel grid. In order to produce measures of all orientations in the

gradient section, you can add the kernels to the input image separately (Gx and Gy call). This

can then be combined to find at each point the absolute magnitude and direction of the gradient.
Last Name 10

4. Precautions

The derivative explicitly displays a limit in the initial signal at the middle of the tip. The

"gradient philtre" family of edge detection philtres are distinctive in the way an edge is placed

and involves the sobel process. If the value of the gradient reaches any threshold, a pixel location

is indicated as the edge location. As stated earlier, superiorities are greater than those around

them than pixel intensity values. Then after a threshold has been set, the gradient value will be

compared to the threshold value, and when the threshold is crossed, you can detect a point. In

addition, the second derivative is zero while the first derivative is at maximum. Thus the position

of the edge is another choice to locate the zeroes in the second derivative. This procedure is

called the laplacian and is seen below in the second derivative of the signal. :

5. Observations and Calculations


Last Name 11

6. Results

Data augmentation helps prevent the network from overfitting by memorizing the exact details of

the training images [24]. Beginning, we reflected each image horizontally, then horizontal and

vertical translations were applied to input images in the [-30, 30] range. Finally, images have

scaled in horizontal and vertical directions, thus allowing the classifier to trained on additional

views of objects.
Last Name 12

7. Discussion

The statistical data was collected in the form of tables for both binary and digital processes

within the three minutes of the origination of reaction. The reaction results have validated our

theoretical concepts, as stated in the introduction. The graphs for the better understanding of

results are listed in the appendix. The detailed overview of our topic has been also listed in

appendix in the form of an diagram.

8. Conclusion

We proposed Image processing structure which replaces the raw observation by user on the

residual, computed using the known part of the support. We proved stability, but the assumptions

used were somewhat strong. We demonstrated via simulations that binary image using
Last Name 13

compressive sensing error is stable and small under much weaker assumptions. Also, it

significantly outperformed when the available number of measurements was very small. A key

direction of future work is to prove stability under weaker assumptions. This will require

assuming a signal model with nonzero drift (to get a tighter detection delay bound) and bounded

signal power. It may also help to assume a statistical prior on support change, e.g. by using a

model.
Last Name 14

Appendix

Flow of image repository


Last Name 15

Face position rate


Last Name 16

References
1. E. Argyle. “Techniques for edge detection,” Proc. IEEE, vol. 59, pp. 285-286, 1971
2. Gradient-
Based_Image_Recovery_Methods_From_Incomplete_Fourier_Measurements

3. J. Canny, "A computational approach to edge detection", IEEE Trans. Patt. Anal.


Machine Intell., vol. 8, pp. 679-698, Nov. 1986.

4. L. S. Davis, "A survey of edge detection techniques", Comput. Graphics Image


Processing, vol. 4, pp. 248-270, 1975.

5. R. J. Beattie, Edge detection for semantically based early visual processing, 1984.

6. 2.C. Bingham, M. D. Godfrey and J. W. Tukey, "Modern techniques of power


spectrum estimation", IEEE Trans. Audio Electroacoust., vol. AU-15, no. 2, pp. 56-
66, 1967.

7. segmenting images with gradient-based edge detection using Membrane Computing


8. Gradient-
Based_Image_Recovery_Methods_From_Incomplete_Fourier_Measurements
9. F. Bergholm. “Edge focusing,” in Proc. 8th Int. Conf. Pattern Recognition, Paris,
France, pp. 597- 600, 1986

10. J. Matthews. “An introduction to edge detection: The sobel edge detector,” Available
at http://www.generation5.org/content/2002/im01.asp, 2002.

11.

12. L. G. Roberts. “Machine perception of 3-D solids” ser. Optical and Electro-Optical
Information Processing. MIT
Press, 1965 .

13. R. C. Gonzalez and R. E. Woods. “Digital Dynamic Compression Sensing


Processing”. 2nd ed. Prentice Hall, 2002.

14. V. Torre and T. A. Poggio. “On edge detection”. IEEE Trans. Pattern Anal. Machine
Intell., vol. PAMI-8, no. 2, pp. 187-163, Mar. 1986.
Last Name 17

15. E. R. Davies. “Constraints on the design of template masks for edge detection”.
Partern Recognition Lett., vol. 4, pp. 11 1-120, Apr. 1986.

16. W. Frei and C.-C. Chen. “Fast boundary detection: A generalization and a new
algorithm ”. lEEE Trans. Comput., vol. C-26, no. 10, pp. 949-998, 1977.

17. W. E. Grimson and E. C. Hildreth. “Comments on Digital step Superiorities from


zero crossings of second directional derivatives’’. IEEE Trans. Pattern Anal.
Machine Intell., vol. PAMI-7, no. 1, pp. 121-129, 1985.

18. R. M. Haralick. “Digital step Superiorities from zero crossing of the second
directional derivatives,” IEEE Trans. Pattern Anal. Machine Intell., vol. PAMI-6,
no. 1, pp. 58-68, Jan. 1984.

19. J. F. Canny. “A computational approach to edge detection”. IEEE Trans. Pattern


Anal. Machine Intell., vol. PAMI-8, no. 6, pp. 679-697, 1986

20. J. Canny. “Finding Superiorities and lines in image”. Master’s thesis, MIT, 1983.

21. R. A. Kirsch. “Computer determination of the constituent structure of biomedical


images”. Comput. Eiorned. Res., vol. 4, pp. 315-328, 1971.

22. M. H. Hueckel. “ A local visual operator which recognizes Superiorities and line”. J.
ACM, vol. 20, no. 4, pp. 634647, Oct. 1973.

23. Y. Yakimovsky, “Boundary and object detection in real world images”. JACM, vol.
23, no. 4, pp. 598-619, Oct. 1976

24. A. Yuille and T. A. Poggio . “Scaling theorems for zero crossings”. IEEE Trans.
Pattern Anal. Machine Intell., vol. PAMI-8, no. 1, pp. 187-163, Jan. 1986.

25. D. Marr and E.Hildreth. “Theory of Edge Detection”. Proceedings of the Royal
Society of London. Series B, Biological Sciences,, Vol. 207, No. 1167. (29 February
1980), pp. 187-217

26. E. Argyle. “Techniques for edge detection,” Proc. IEEE, vol. 59, pp. 285-286, 1971
Last Name 18

27. E. R. Davies. “Constraints on the design of template masks for edge detection”.
Partern Recognition Lett., vol. 4, pp. 11 1-120, Apr. 1986.

28. J. Matthews. “An introduction to edge detection: The sobel edge detector,” Available
at http://www.generation5.org/content/2002/im01.asp, 2002.

29. F. Bergholm. “Edge focusing,” in Proc. 8th Int. Conf. Pattern Recognition, Paris,
France, pp. 597- 600, 1986

30. L. G. Roberts. “Machine perception of 3-D solids” ser. Optical and Electro-Optical
Information Processing. MIT Press, 1965

31. R. C. Gonzalez and R. E. Woods. “Digital Image Processing”. 2nd ed. Prentice Hall,
2002.

32. V. Torre and T. A. Poggio. “On edge detection”. IEEE Trans. Pattern Anal. Machine
Intell., vol. PAMI-8, no. 2, pp. 187-163, Mar. 1986.

You might also like