图书简介
This edited book brings together leading researchers, academic scientists and research scholars to put forward and share their experiences and research results on all aspects of an inspection system for detection analysis for various machine vision applications. It also provides a premier interdisciplinary platform to present and discuss the most recent innovations, trends, methodology, applications, and concerns as well as practical challenges encountered and solutions adopted in the inspection system in terms of image processing and analytics of machine vision for real and industrial application. Machine vision inspection systems (MVIS) utilized all industrial and non-industrial applications where the execution of their utilities based on the acquisition and processing of images. MVIS can be applicable in industry, governmental, defense, aerospace, remote sensing, medical, and academic/education applications but constraints are different. MVIS entails acceptable accuracy, high reliability, high robustness, and low cost. Image processing is a well-defined transformation between human vision and image digitization, and their techniques are the foremost way to experiment in the MVIS. The digital image technique furnishes improved pictorial information by processing the image data through machine vision perception. Digital image pro cessing has widely been used in MVIS applications and it can be employed to a wide diversity of problems particularly in Non-Destructive testing (NDT), presence/absence detection, defect/fault detection (weld, textile, tiles, wood, etc.,), automated vision test & measurement, pattern matching, optical character recognition & verification (OCR/OCV), barcode reading and traceability, medical diagnosis, weather forecasting, face recognition, defence and space research, etc. This edited book is designed to address various aspects of recent methodologies, concepts and research plan out to the readers for giving more depth insights for perusing research on machine vision using image processing techniques.
Preface xi 1 Land-Use Classification with Integrated Data 1 D. A. Meedeniya, J. A. A. M Jayanetti, M. D. N. Dilini, M. H. Wickramapala and J. H. Madushanka 1.1 Introduction 2 1.2 Background Study 3 1.2.1 Overview of Land-Use and Land-Cover Information 3 1.2.2 Geographical Information Systems 4 1.2.3 GIS-Related Data Types 4 1.2.3.1 Point Data Sets 4 1.2.3.2 Aerial Data Sets 5 1.2.4 Related Studies 6 1.3 System Design 6 1.4 Implementation Details 10 1.4.1 Materials 10 1.4.2 Preprocessing 11 1.4.3 Built-Up Area Extraction 11 1.4.4 Per-Pixel Classification 12 1.4.5 Clustering 14 1.4.6 Segmentation 14 1.4.7 Object-Based Image Classification 16 1.4.8 Foursquare Data Preprocessing and Quality Analysis 20 1.4.9 Integration of Satellite Images with Foursquare Data 21 1.4.10 Building Block Identification 21 1.4.11 Overlay of Foursquare Points 22 1.4.12 Visualization of Land Usage 23 1.4.13 Common Platform Development 23 1.5 System Evaluation 25 1.5.1 Experimental Evaluation Process 25 1.5.2 Evaluation of the Classification Using Base Error Matrix 28 1.6 Discussion 31 1.6.1 Contribution of the Proposed Approach 31 1.6.2 Limitations of the Data Sets 32 1.6.3 Future Research Directions 33 1.7 Conclusion 34 References 35 2 Indian Sign Language Recognition Using Soft Computing Techniques 37 Ashok Kumar Sahoo, Pradeepta Kumar Sarangi and Parul Goyal 2.1 Introduction 37 2.2 Related Works 38 2.2.1 The Domain of Sign Language 39 2.2.2 The Data Acquisition Methods 41 2.2.3 Preprocessing Steps 42 2.2.3.1 Image Restructuring 43 2.2.3.2 Skin Color Detection 43 2.2.4 Methods of Feature Extraction Used in the Experiments 44 2.2.5 Classification Techniques 45 2.2.5.1 K-Nearest Neighbor 45 2.2.5.2 Neural Network Classifier 45 2.2.5.3 Naive Bayes Classifier 46 2.3 Experiments 46 2.3.1 Experiments on ISL Digits 46 2.3.1.1 Results and Discussions on the First Experiment 47 2.3.1.2 Results and Discussions on Second Experiment 49 2.3.2 Experiments on ISL Alphabets 51 2.3.2.1 Experiments with Single-Handed Alphabet Signs 51 2.3.2.2 Results of Single-Handed Alphabet Signs 52 2.3.2.3 Experiments with Double-Handed Alphabet Signs 53 2.3.2.4 Results on Double-Handed Alphabets 54 2.3.3 Experiments on ISL Words 58 2.3.3.1 Results on ISL Word Signs 59 2.4 Summary 63 References 63 3 Stored Grain Pest Identification Using an Unmanned Aerial Vehicle (UAV)-Assisted Pest Detection Model 67 Kalyan Kumar Jena, Sasmita Mishra, Sarojananda Mishra and Sourav Kumar Bhoi 3.1 Introduction 68 3.2 Related Work 69 3.3 Proposed Model 70 3.4 Results and Discussion 72 3.5 Conclusion 77 References 78 4 Object Descriptor for Machine Vision 85 Aparna S. Murthy and Salah Rabba 4.1 Outline 85 4.2 Chain Codes 87 4.3 Polygonal Approximation 89 4.4 Moments 92 4.5 HU Invariant Moments 96 4.6 Zernike Moments 97 4.7 Fourier Descriptors 98 4.8 Quadtree 99 4.9 Conclusion 102 References 114 5 Flood Disaster Management: Risks, Technologies, and Future Directions 115 Hafiz Suliman Munawar 5.1 Flood Management 115 5.1.1 Introduction 115 5.1.2 Global Flood Risks and Incidents 116 5.1.3 Causes of Floods 118 5.1.4 Floods in Pakistan 119 5.1.5 Floods in Australia 121 5.1.6 Why Floods are a Major Concern 123 5.2 Existing Disaster Management Systems 124 5.2.1 Introduction 124 5.2.2 Disaster Management Systems Used Around the World 124 5.2.2.1 Disaster Management Model 125 5.2.2.2 Disaster Risk Analysis System 126 5.2.2.3 Geographic Information System 126 5.2.2.4 Web GIS 126 5.2.2.5 Remote Sensing 127 5.2.2.6 Satellite Imaging 127 5.2.2.7 Global Positioning System for Imaging 128 5.2.3 Gaps in Current Disaster Management Technology 128 5.3 Advancements in Disaster Management Technologies 129 5.3.1 Introduction 129 5.3.2 AI and Machine Learning for Disaster Management 130 5.3.2.1 AIDR 130 5.3.2.2 Warning Systems 130 5.3.2.3 QCRI 131 5.3.2.4 The Concern 131 5.3.2.5 BlueLine Grid 131 5.3.2.6 Google Maps 132 5.3.2.7 RADARSAT-1 132 5.3.3 Recent Research in Disaster Management 132 5.3.4 Conclusion 137 5.4 Proposed System 137 5.4.1 Image Acquisition Through UAV 138 5.4.2 Preprocessing 138 5.4.3 Landmarks Detection 138 5.4.3.1 Buildings 139 5.4.3.2 Roads 139 5.4.4 Flood Detection 140 5.4.4.1 Feature Matching 140 5.4.4.2 Flood Detection Using Machine Learning 141 5.4.5 Conclusion 143 References 143 6 Temporal Color Analysis of Avocado Dip for Quality Control 147 Homero V. Rios-Figueroa, Micloth Lopez del Castillo-Lozano, Elvia K. Ramirez-Gomez and Ericka J. Rechy-Ramirez 6.1 Introduction 147 6.2 Materials and Methods 148 6.3 Image Acquisition 149 6.4 Image Processing 150 6.5 Experimental Design 150 6.5.1 First Experimental Design 150 6.5.2 Second Experimental Design 151 6.6 Results and Discussion 151 6.6.1 First Experimental Design (RGB Color Space) 151 6.6.2 Second Experimental Design (L*a*b* Color Space) 152 6.7 Conclusion 156 References 156 7 Image and Video Processing for Defect Detection in Key Infrastructure 159 Hafiz Suliman Munawar 7.1 Introduction 160 7.2 Reasons for Defective Roads and Bridges 161 7.3 Image Processing for Defect Detection 162 7.3.1 Feature Extraction 162 7.3.2 Morphological Operators 163 7.3.3 Cracks Detection 164 7.3.4 Potholes Detection 165 7.3.5 Water Puddles Detection 166 7.3.6 Pavement Distress Detection 167 7.4 Image-Based Defect Detection Methods 169 7.4.1 Thresholding Techniques 170 7.4.2 Edge Detection Techniques 170 7.4.3 Wavelet Transform Techniques 171 7.4.4 Texture Analysis Techniques 171 7.4.5 Machine Learning Techniques 172 7.5 Factors Affecting the Performance 172 7.5.1 Lighting Variations 173 7.5.2 Small Database 173 7.5.3 Low-Quality Data 173 7.6 Achievements and Issues 173 7.6.1 Achievements 174 7.6.2 Issues 174 7.7 Conclusion 174 References 175 8 Methodology for the Detection of Asymptomatic Diabetic Retinopathy 179 Jaskirat Kaur and Deepti Mittal 8.1 Introduction 180 8.2 Key Steps of Computer-Aided Diagnostic Methods 181 8.3 DR Screening and Grading Methods 183 8.4 Key Observations from Literature Review 188 8.5 Design of Experimental Methodology 189 8.6 Conclusion 192 References 193 9 Offline Handwritten Numeral Recognition Using Convolution Neural Network 197 Abhisek Sethy, Prashanta Kumar Patra and Soumya Ranjan Nayak 9.1 Introduction 198 9.2 Related Work Done 199 9.3 Data Set Used for Simulation 201 9.4 Proposed Model 202 9.5 Result Analysis 204 9.6 Conclusion and Future Work 207 References 209 10 A Review on Phishing-Machine Vision and Learning Approaches 213 Hemamalini Siranjeevi, Swaminathan Venkatraman and Kannan Krithivasan 10.1 Introduction 213 10.2 Literature Survey 214 10.2.1 Content-Based Approaches 214 10.2.2 Heuristics-Based Approaches 215 10.2.3 Blacklist-Based Approaches 215 10.2.4 Whitelist-Based Approaches 216 10.2.5 CANTINA-Based Approaches 216 10.2.6 Image-Based Approaches 216 10.3 Role of Data Mining in Antiphishing 217 10.3.1 Phishing Detection 219 10.3.2 Phishing Prevention 220 10.3.3 Training and Education 222 10.3.4 Phishing Recovery and Avoidance 222 10.3.5 Visual Methods 223 10.4 Conclusion 224 Acknowledgments 224 References 224 Index 231
Trade Policy 买家须知
- 关于产品:
- ● 正版保障:本网站隶属于中国国际图书贸易集团公司,确保所有图书都是100%正版。
- ● 环保纸张:进口图书大多使用的都是环保轻型张,颜色偏黄,重量比较轻。
- ● 毛边版:即书翻页的地方,故意做成了参差不齐的样子,一般为精装版,更具收藏价值。
关于退换货:
- 由于预订产品的特殊性,采购订单正式发订后,买方不得无故取消全部或部分产品的订购。
- 由于进口图书的特殊性,发生以下情况的,请直接拒收货物,由快递返回:
- ● 外包装破损/发错货/少发货/图书外观破损/图书配件不全(例如:光盘等)
并请在工作日通过电话400-008-1110联系我们。
- 签收后,如发生以下情况,请在签收后的5个工作日内联系客服办理退换货:
- ● 缺页/错页/错印/脱线
关于发货时间:
- 一般情况下:
- ●【现货】 下单后48小时内由北京(库房)发出快递。
- ●【预订】【预售】下单后国外发货,到货时间预计5-8周左右,店铺默认中通快递,如需顺丰快递邮费到付。
- ● 需要开具发票的客户,发货时间可能在上述基础上再延后1-2个工作日(紧急发票需求,请联系010-68433105/3213);
- ● 如遇其他特殊原因,对发货时间有影响的,我们会第一时间在网站公告,敬请留意。
关于到货时间:
- 由于进口图书入境入库后,都是委托第三方快递发货,所以我们只能保证在规定时间内发出,但无法为您保证确切的到货时间。
- ● 主要城市一般2-4天
- ● 偏远地区一般4-7天
关于接听咨询电话的时间:
- 010-68433105/3213正常接听咨询电话的时间为:周一至周五上午8:30~下午5:00,周六、日及法定节假日休息,将无法接听来电,敬请谅解。
- 其它时间您也可以通过邮件联系我们:customer@readgo.cn,工作日会优先处理。
关于快递:
- ● 已付款订单:主要由中通、宅急送负责派送,订单进度查询请拨打010-68433105/3213。
本书暂无推荐
本书暂无推荐