Academic literature on the topic 'Sobel and bilinear operations'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Sobel and bilinear operations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Sobel and bilinear operations"

1

Uthaib, Masar Abed, and Muayad Sadik Croock. "Vehicle plate localization and extraction based on hough transform and bilinear operations." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 2 (2020): 1088–97. https://doi.org/10.11591/ijeecs.v20.i2.pp1088-1097.

Full text
Abstract:
In general, the extraction of the vehicle plate is a previous step of plate recognition, and it actively studied for several decades. Plate localization is used in various security and traffic applications. In this paper, the proposed method is efficient to localize a plate for the multinational countries. The proposed method consists of three levels. The first level is the preprocessing that contains several steps. The digital camera capture images have been taken about twenty meters from the car with zooming two to three meters. Images are resampled using the zooming technique (bilinear interpolation) that makes the dimension of image (1024 x 768) pixels. The resampled images are resized to (940x 730). These images are converted to grayscale (green channel), and the bilateral filter is applied for removing noise. The second level is plate detection that adopts morphological operations, image subtraction, and vertical edge detection (Sobel). At the last Connected component analysis and Hough transform are used. The third level is the Deskew plate that notifies the plate may skew so that Hough transform is used to detect the largest line segment. Then, the images are rotated using bilinear interpolation. About 860 images are tested for different countries (Iraq, Belarus, Armenia, Hungary), and the accuracy is 98.99 % for extraction of the plate and 100% for the Deskew plate. Thus, the proposed system shows high efficiency in achievement.
APA, Harvard, Vancouver, ISO, and other styles
2

Abed Uthaib, Masar, and Muayad Sadik Croock. "Vehicle plate localization and extraction based on hough transform and bilinear operations." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 2 (2020): 1088. http://dx.doi.org/10.11591/ijeecs.v20.i2.pp1088-1097.

Full text
Abstract:
<p>In general, the extraction of the vehicle plate is a previous step of plate recognition, and it actively studied for several decades. Plate localization is used in various security and traffic applications. In this paper, the proposed method is efficient to localize a plate for the multinational countries. The proposed method consists of three levels. The first level is the preprocessing<strong> </strong>that contains several steps. The digital camera capture images have been taken about twenty meters from the car with zooming two to three meters. Images are resampled using the zooming technique (bilinear interpolation) that makes the dimension of image (1024 x 768) pixels. The resampled images are resized to (940x 730). These images are converted to grayscale (green channel), and the bilateral filter is applied for removing noise. The second level is plate detection that adopts morphological operations, image subtraction, and vertical edge detection (Sobel). At the last Connected component analysis and Hough transform are used. The third level is the Deskew plate that notifies the plate may skew so that Hough transform is used to detect the largest line segment. Then, the images are rotated using bilinear interpolation. About 860 images are tested for different countries (Iraq, Belarus, Armenia, Hungary), and the accuracy is 98.99 % for extraction of the plate and 100% for the Deskew plate. Thus, the proposed system shows high efficiency in achievement.</p>
APA, Harvard, Vancouver, ISO, and other styles
3

Yilmaz, Rusen. "LATTICE OPERATIONS OF POSITIVE BILINEAR MAPPINGS." Taiwanese Journal of Mathematics 12, no. 1 (2008): 39–49. http://dx.doi.org/10.11650/twjm/1500602487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Shuaiming, Shuhui Yin, and Yizhan Zhao. "An improved hibbard interpolation algorithm based on edge gradient feature detection using Sobel operator." Applied and Computational Engineering 4, no. 1 (2023): 786–94. http://dx.doi.org/10.54254/2755-2721/4/2023424.

Full text
Abstract:
Color interpolation algorithms have important applications in color image processing, and many interpolation algorithms have been proposed one after another. The bilinear interpolation algorithm, Cok interpolation algorithm and gradient edge interpolation are three classical interpolation algorithms, however, they may cause problems such as zipper effect and Mohr's stripe effect. In this paper, this paper optimize the gradient edge algorithm, calculate the gradient by using Sobel operator and fit the direction of the edge in a weighted way, and propose a gradient edge weighted interpolation algorithm based on Sobel operator to improve the performance of the interpolation algorithm. Through the validation of color image recovery, the results show that the subjective visual effect and objective evaluation indexes such as structural similarity index, peak signal-to-noise ratio and minimum mean square error of the improved algorithm proposed in this paper are better than the traditional algorithm, which is of great significance to the improvement of the interpolation algorithm.
APA, Harvard, Vancouver, ISO, and other styles
5

Slovák, Jan. "Remark on bilinear operations on tensor fields." Archivum Mathematicum, no. 5 (2020): 301–5. http://dx.doi.org/10.5817/am2020-5-301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Adriyanto, Oscar, and Halim Agung. "Edge Detection to Indication Brain Tumor Using Sobel and Morphological Operations Methods Based on Image Magnetic Resonance Imaging." Computer Engineering, Science and System Journal 3, no. 2 (2018): 179. http://dx.doi.org/10.24114/cess.v3i2.10024.

Full text
Abstract:
Brain tumors are the second leading cause of death in the world in children under 20, scientists and researchers are developing applications to react brain tumors based on magnetic resonance imaging images. In this application the method used is sobel and morphological operations. Based on research conducted on brain tumor edge detection based on magnetic resonance imaging image, sobel method can reduce the noise contained in the image mri and can localize the edge of the image of Magnetic Resonance Imaging well. This research can conclude that the sobel method is suitable for edge detection but there is still some unprocessed noise, with the results of the brain imaging of 30 test images have 60% percentage, while for the use of edge detection method of 62.11%.
APA, Harvard, Vancouver, ISO, and other styles
7

Hrytsyk, Volodymyr, Mykola Medykovskyy, and Mariia Nazarkevych. "Estimation of Symmetry in the Recognition System with Adaptive Application of Filters." Symmetry 14, no. 5 (2022): 903. http://dx.doi.org/10.3390/sym14050903.

Full text
Abstract:
The aim of this work is to study the influence of lighting on different types of filters in order to create adaptive systems of perception in the visible spectrum. This problem is solved by estimating symmetry operations (operations responsible for image/image transformations). Namely, the authors are interested in an objective assessment of the possibility of reproducing the image of the object (objective symmetry of filters) after the application of filters. This paper investigates and shows the results of the most common edge detection filters depending on the light level; that is, the behavior of the system in a room with indirect natural and standard (according to the requirements of the educational process in Ukraine) electric lighting was studied. The methods of Sobel, Sobel x, Sobel y, Prewitt, Prewitt x, Prewitt y, and Canny were used and compared in experiments. The conclusions provide a subjective assessment of the performance of each of the filters in certain conditions. Dependencies are defined that allow giving priority to certain filters (from those studied) depending on the lighting.
APA, Harvard, Vancouver, ISO, and other styles
8

Huang, Ru Fen, and Qiang Nong. "Efficient Certificate-Based Blind Signature Scheme without Bilinear Pairings." Applied Mechanics and Materials 220-223 (November 2012): 2735–39. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2735.

Full text
Abstract:
Blind signature is a well-known cryptographical technique used to construct some advanced applications for the consideration of user privacy. In this work, we propose the first efficient certificate-based blind signature scheme that follows the idea of Certificate Based Encryption (CBE) presented by Gentry in EuroCrypt 2003. The security of our scheme is based on the elliptic curve discrete logarithm problem over a finite field. In addition, our scheme does not require any pairing operations which is regarded as cosely operations compared to other operations. Compared with the other secure blind signature scheme, our scheme enjoys shorter signature length, less running time and operation cost. So it can be used widely, especially in low-bandwidth communication environments such as wireless cooperative networks.
APA, Harvard, Vancouver, ISO, and other styles
9

Savostyanov, D. V., E. E. Tyrtyshnikov, and N. L. Zamarashkin. "Fast truncation of mode ranks for bilinear tensor operations." Numerical Linear Algebra with Applications 19, no. 1 (2011): 103–11. http://dx.doi.org/10.1002/nla.765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Peng, Chun Jiang, Qian Cheng Zhao, and Geng Huang. "Slant Detection and Correction of Mobile Phone Keyboard Image." Applied Mechanics and Materials 103 (September 2011): 102–8. http://dx.doi.org/10.4028/www.scientific.net/amm.103.102.

Full text
Abstract:
In vision detection system of mobile phone keyboard, images coming from product line are often slant. Those images have to be corrected in order to facilitate match and recognition in further image processing. This paper proposes an effective slant correction method based on the characteristics of mobile phone keyboard image. In this method, straight line edge detection is done only by horizontal Sobel operator. The angle parameter of straight line is tested by multiresolution Hough transform. Then the angle relation is deduced between the tested line and slant mobile phone keyboard image. The slant image is corrected by rotation algorithm which combines the fast rotation algorithm with bilinear interpolation algorithm. The results of experiment indicates that the method and its algorithm are effective and accurate.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Sobel and bilinear operations"

1

Dempe, S., and J. F. Bard. "A Bundle Trust Region Algorithm for Bilinear Bilevel Programming." In Operations Research Proceedings 1999. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-642-58300-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jeong, Jihwan, Scott Sanner, and Akshat Kumar. "A Mixed-Integer Linear Programming Reduction of Disjoint Bilinear Programs via Symbolic Variable Elimination." In Integration of Constraint Programming, Artificial Intelligence, and Operations Research. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33271-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nguyen, T. Q., M. Bouhtou, and J. L. Lutton. "D.C. Approach to Bilevel Bilinear Programming Problem: Application in Telecommunication Pricing." In Series on Computers and Operations Research. WORLD SCIENTIFIC, 2003. http://dx.doi.org/10.1142/9789812775368_0014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mohsen Ghoreishi, Seyed, and Mohammad Amiri. "A Decentralized Ciomputationally Lightweight Key Establishment Protocol Over Elliptic Curves." In New Frontiers in Communication and Intelligent Systems. Soft Computing Research Society, 2021. http://dx.doi.org/10.52458/978-81-95502-00-4-50.

Full text
Abstract:
The high cost of performing Bilinear Pairings besides the inherent problems of Traditional and Identity-based protocols, which are in turn in the category of public-key cryptographic ones, led to proposing many pairing-free cryptosystems in the context of Certificateless PKC. This category of cryptographic schemes is defined over lightweight elliptic curves rather than high-expense bilinear pairings. In this document, a pairing-free secret sharing scheme has been proposed over Certificateless PKC infrastructure which utilizes elliptic curve-based group operations. The output of this contribution, with a focus on computational complexity, is a novel scheme that is notably less expensive in comparison with the cost of related proposed ones.
APA, Harvard, Vancouver, ISO, and other styles
5

Nidhyananthan, S. Selva, M. Prasad, and R. Shantha Selva Kumari. "Secure Speaker Recognition using BGN Cryptosystem with Prime Order Bilinear Group." In Cryptography. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1763-5.ch016.

Full text
Abstract:
Speech being a unique characteristic of an individual is widely used in speaker verification and speaker identification tasks in applications such as authentication and surveillance respectively. In this paper, framework for secure speaker recognition system using BGN Cryptosystem, where the system is able to perform the necessary operations without being able to observe the speech input provided by the user during speaker recognition process. Secure speaker recognition makes use of Secure Multiparty Computation (SMC) based on the homomorphic properties of cryptosystem. Among the cryptosytem with homomorphic properties BGN is preferable, because it is partially doubly homomorphic, which can perform arbitrary number of addition and only one multiplication. But the main disadvantage of using BGN cryptosystem is its execution time. In proposed system, the execution time is reduced by a factor of 12 by replacing conventional composite order group by prime order group. This leads to an efficient secure speaker recognition.
APA, Harvard, Vancouver, ISO, and other styles
6

Gupta, Daya Sagar, and G. P. Biswas. "A Secure Cloud Storage using ECC-Based Homomorphic Encryption." In Cryptography. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1763-5.ch018.

Full text
Abstract:
This paper presents a new homomorphic public-key encryption scheme based on the elliptic curve cryptography (HPKE-ECC). This HPKE-ECC scheme allows public computation on encrypted data stored on a cloud in such a manner that the output of this computation gives a valid encryption of some operations (addition/multiplication) on original data. The cloud system (server) has only access to the encrypted files of an authenticated end-user stored in it and can only do computation on these stored files according to the request of an end-user (client). The implementation of proposed HPKE-ECC protocol uses the properties of elliptic curve operations as well as bilinear pairing property on groups and the implementation is done by Weil and Tate pairing. The security of proposed encryption technique depends on the hardness of ECDLP and BDHP.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Sobel and bilinear operations"

1

Olivos, Deiwid Fabian Ricaurte, C. A. Gomez-Perez, and Jairo Espinosa. "Bilinear Modeling Of Unitary Operations And BMPC Control." In 2019 IEEE 4th Colombian Conference on Automatic Control (CCAC). IEEE, 2019. http://dx.doi.org/10.1109/ccac.2019.8921167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Anamika, Manminder Singh, and Birmohan Singh. "Face detection and eyes extraction using sobel edge detection and morphological operations." In 2016 Conference on Advances in Signal Processing (CASP). IEEE, 2016. http://dx.doi.org/10.1109/casp.2016.7746183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, He, Daniel Zeng, Fen Xia, and HuiQian Li. "Bilinear models for item recommendation based on tags." In 2010 IEEE International Conference on Service Operations and Logistics and Informatics (SOLI). IEEE, 2010. http://dx.doi.org/10.1109/soli.2010.5551605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rout, Nikhil, and J. Jean Jenifer Nesam. "Optimizing RGB to Grayscale, Gaussian Blur and Sobel-Filter operations on FPGAs for reduced dynamic power consumption." In 2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT). IEEE, 2024. http://dx.doi.org/10.1109/aiiot58432.2024.10574796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Shing-Hong, Thomas F. Krile, and John F. Walkup. "Optical polynomial processing based on the bilinear transform." In OSA Annual Meeting. Optica Publishing Group, 1986. http://dx.doi.org/10.1364/oam.1986.thl1.

Full text
Abstract:
With the motivation to extend linear/bilinear operators to a more general class of nonlinear operators via a Volterra series (polynomial) approximation, we look into optical polynomial implementations using a factored representation so that presently known bilinear techniques can be employed. Since there are two inputs and one kernel in the generalized bilinear transform, the two inputs act as polynomial input variables and the elements in the kernel represent coefficients of the quadratic polynomial. Thus higher polynomial processing can be realized by iterating the bilinear transform. A dual-LCLV system is proposed to form such a quadratic polynomial. With electronic or optical feedback, a general optical polynomial processor is achievable. The work has been extended to perform bipolar complex analog and binary digital polynomial operations. The analog operations are performed by using separate parallel channels for real/imaginary and positive/negative numbers and making use of triple matrix-matrix product processing. Systolic and wavefront processors and a triple product processor are used to implement binary digital polynomial processing.
APA, Harvard, Vancouver, ISO, and other styles
6

Tang, Jin, and Xiaofeng Wang. "A Multi-Factor Certificateless Authenticated Key Agreement Protocol on ECC." In 4th International Conference on Natural Language Processing and Machine Learning. Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130816.

Full text
Abstract:
Key negotiation can establish a shared key between two or even multiple parties in a public networkenvironment, ensuring communication confidentiality and integrity. Certificateless public key cryptography(CL-PKC) aims to achieve succinct public key management without using certificates, while avoiding thekey escrow property in identity-based cryptography. As an important part of CL-PKC, certificateless authentication key agreement (CLAKA) has also received widespread attention. Most CLAKA protocols are constructed from bilinear mappings on elliptic curves which need costly operations. To improve theperformance, some pairing-free CLAKA protocols have been proposed. In this paper, we propose a multifactor authentication CLAKA protocol that can achieve local authentication factors joint unlocking. Theprotocol does not require bilinear pairing computation and has been proven to be secure under the mBRmodel.
APA, Harvard, Vancouver, ISO, and other styles
7

Yongliang, Tan, He Lesheng, Jin Haonan, and Kong Qingyang. "Fast Implementation of Elliptic Curve Cryptographic Algorithm on GF(3M) Based on FPGA." In 5th International Conference on Computer Science and Information Technology (COMIT 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111709.

Full text
Abstract:
As quantum computing and the theory of bilinear pairings continue being studied in depth, elliptic curves on GF(3m ) are becoming of an increasing interest because they provide a higher security. What’s more, because hardware encryption is more efficient and secure than software encryption in today's IoT security environment, this article implements a scalar multiplication algorithm for the elliptic curve on GF(3m ) on the FPGA device platform. The arithmetic in finite fields is quickly implemented by bit-oriented operations, and then the computation speed of point doubling and point addition is improved by a modified Jacobia projection coordinate system. The final experimental results demonstrate that the structure consumes a total of 7518 slices, which is capable of computing approximately 3000 scalar multiplications per second at 124 Mhz. It has relative advantages in terms of performance and resource consumption, which can be applied to specific confidential communication scenarios as an IP core.
APA, Harvard, Vancouver, ISO, and other styles
8

Izurieta, Alvaro Javier, Wilson Leonardo Padilla, and Christopher Jonathan Mayorga. "Challenging Traditional Practices in Conventional Reservoirs: Overflushing, Water Conformance and Pillar Fracturing Combination, S Field, Ecuador." In ADIPEC. SPE, 2022. http://dx.doi.org/10.2118/211319-ms.

Full text
Abstract:
Abstract We discuss the application of overflushing along with pillar fracturing in a mature oilfield in Ecuador, where an effective high conductivity (high proppant concentration) fracture is required to enhance productivity because of low reservoir pressure and high permeability. Hydraulic fracturing is a proven technology used in the Oriente Basin with three challenges that remain constant (1) maximize conductivity and (2) reduce proppant flowback risk in the production stage and (3) reduce well intervention time. To address these challenges a combination of overflushed pillar fracturing, and tip screen out (TSO) are proposed. We show the reservoir analysis, laboratory tests and hydraulic fracture modeling performed to support the implementation of overflushing. Reservoir analysis includes a methodology used to execute an optimized fracture design, and laboratory tests include core flow tests that define non-damaging fluids to be used during workover and fracturing operations, and relative permeability modifiers (RPM) for water conformance. Relevant results are also presented using three key performance indicators (KPI) to evaluate the effectiveness of resin-based pillar fracturing with overflushing viz., (1) pressure buildup data (2) fluid production and (3) productivity index increase post fracturing. Three case studies are presented for fracturing candidates with special conditions, that show that this technique can be extended beyond the traditional job. Pillar fracturing (fracture and refracturing jobs) combined with overflushing in conventional reservoirs is documented for the first time, with effective stimulation results. This study applies overflushing, a practice developed for completion efficiency in unconventional reservoirs, and combines it with already proven practices in mature conventional reservoirs (pillar fracturing, customized fluids, 3D fracture design, and water conformance while fracturing) with a positive effect on production enhancement and proppant flowback risk reduction. Pressure buildup tests confirm no adverse effect of overflushing since negative skin or bilinear flow is observed, along with an increase in fluid production and productivity index in the studied wells.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography