[1988 Proceedings] 9th International Conference on Pattern Recognition

May 14 1988-Nov. 17 1988

Filter Results

Displaying Results 1 - 25 of 335
  • 9th International Conference on Pattern Recognition (IEEE Cat. No.88CH2614-6)

    Publication Year: 1988
    Request permission for commercial reuse | |PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • ERRORS-2: a 3D object recognition system using aspect graphs

    Publication Year: 1988, Page(s):6 - 10 vol.1
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (424 KB)

    A prototype 3D object recognition system is described that is composed of three major sections; an object representation module, a feature extraction and matching module, and a recognition control strategy module. The object representation module uses an algorithm which constructs perspective projection aspect graphs of convex polyhedra. The feature extraction and matching module uses Fourier desc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A morphological study on structure line

    Publication Year: 1988, Page(s):559 - 562 vol.1
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1009 KB)

    Some examples of the structure line are shown and the morphological transition of the structure line is investigated. The waveform that causes the catastrophe of tree structure plays an important role in the transition. This waveform is called a catastrophe waveform. The catastrophe waveform means the transformation of the tree structure. Since the transformations of the branch such as separation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A modified parallel thinning algorithm

    Publication Year: 1988, Page(s):1023 - 1025 vol.2
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (163 KB)

    A parallel thinning algorithm of C.M. Holt et al. (1987) is compared with an algorithm of D. Rutovitz (1966) and one by T.Y. Zhang and C.Y. Suen (1984). Analyses and experiments show that the Holt algorithm is similar to the Rutovitz algorithm. A heuristic modification to Rutovitz' algorithm is also proposed and the modified algorithm is faster than Holt's algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonparametric feature selection for multiple class processes

    Publication Year: 1988, Page(s):1032 - 1035 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (272 KB)

    A method of feature selection is presented that has linear computational complexity, and ways are shown how to use it when the type of the probability density function is unknown. There is no claim that the procedures for nonparametric probability density function estimation are applicable to any thinkable distribution, but the lower bound for the classifier performance estimation, makes the prese... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Document image analysis for generating syntactic structure description

    Publication Year: 1988, Page(s):744 - 747 vol.2
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (348 KB)

    A document image analysis is described which automatically converts an input image into a syntactic document tree structure, while simultaneously representing the elements and their relative relations. Top-down image segmentation, using projection profiles, was greatly improved by systematically using a feedback process. As a result, the tree structure, including the blocks and their relative rela... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stochastic image segmentation using spatial-temporal context

    Publication Year: 1988, Page(s):342 - 344 vol.1
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (216 KB)

    A stochastic syntactic method for the analysis of time-varying images is presented. The time-varying phenomenon is analyzed using a language translation schema. Stochastic tree grammars are used to describe the patterns, and the stochastic translation is used to characterize the evolution process of the time-varying image sequence. It is shown that the necessary conditions for the existence of a m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new look at system parameter estimation via signal processing

    Publication Year: 1988, Page(s):194 - 196 vol.1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (236 KB)

    Signal processing is used to obtain unbiased parameter estimates for stochastic systems subject to correlated disturbances. A filter is designed and inserted artificially into the identified system so that the resulting system has some known zeros which can be used to estimate the bias arising from the correlated disturbances. It is shown that the proposed algorithm gives a consistent estimate and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PIS: a probabilistic inference system

    Publication Year: 1988, Page(s):360 - 364 vol.1
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (448 KB)

    A method is proposed for probabilistic interference through empirical observations involving categorical data. This method can detect statistically independent patterns inherent in a set of observed events. The evidence provided by the patterns for or against some hypotheses generated during the inference process are then quantitatively estimated and combined to find the most plausible hypotheses.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the intra-category clustering to make multidictionary patterns for multidictionary template matching method

    Publication Year: 1988, Page(s):1029 - 1031 vol.2
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (200 KB)

    The applications of a template-matching method for handprinted Japanese kanji character recognition are discussed. Various clustering methods for the intracategory clustering to make the optimal multiple templates are examined. The efficiencies of each method with handprinted kanji characters, using the ratio of variances, are evaluated, and a character recognition experiment are executed with the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extraction and recognition of 3-dimensional information by projecting a pair of slit-ray beams

    Publication Year: 1988, Page(s):736 - 743 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (192 KB)

    A method is presented for extracting 3-D information of an object which has both Lambertian and specular components, such as metals, using a pair of slit-ray beams. Although the traditional slit-ray beam projection method obtains inaccurate distance information using specular slit-ray beam or mirror image, the method proposed solves the problem and calculates not only the position vector but also ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the relationship between augmented transition network and attributed grammar

    Publication Year: 1988, Page(s):337 - 341 vol.1
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (340 KB)

    Finite state attributed grammars are known to be rich in descriptive power because semantic information is included along with the structural information. They have applied to a number of practical problems in pattern recognition. The generative power of a finite-state attributed grammar is studied. The approach adopted is to establish a relationship between this grammar and the augmented transiti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust linear prediction based on adaptive lattice filter

    Publication Year: 1988, Page(s):191 - 193 vol.1
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (260 KB)

    A robust speech-analysis method based on an adaptive weighted least-squares lattice algorithm is introduced to improve the performance of conventional frame-based linear predictive coding analysis. The likelihood variable, which can be considered as a statistic measure of nonGaussian components, is used to de-weight the excitation interval. The likelihood variable can also be considered as a usefu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On stereo image coding

    Publication Year: 1988, Page(s):357 - 359 vol.1
    Cited by:  Papers (27)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (304 KB)

    An approach to stereo image compression based on disparity compensation is proposed and evaluated. The scheme is motivated by the suppression theory in human vision. A methodology for evaluating compressed stereo images is proposed. It is based on time measurements of depth perception tasks performed by human subjects. Subjects taking part in the experiment were exposed to displays of stereo image... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The identification of autocorrelation model of discrete random image

    Publication Year: 1988, Page(s):1026 - 1028 vol.2
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (216 KB)

    The Z-transform of the autocorrelation model of discrete random images is derived. By using the power series expansion and truncation of the Z-transform, the least-squares identification method for the coefficients of Z-transform is developed. The computational formulas for the parameters of the autocorrelation model of images are given. The validity of the method is confirmed by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A heuristic search algorithm for image registration

    Publication Year: 1988, Page(s):733 - 735 vol.2
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (120 KB)

    A heuristic search algorithm for image registration is proposed, in which no threshold sequence is needed. The results show that the algorithm is reasonable and efficient, and has higher speed than sequential similarity detection algorithm in some cases View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High speed string edit methods using hierarchical files and hashing technique

    Publication Year: 1988, Page(s):334 - 336 vol.1
    Cited by:  Papers (4)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (184 KB)

    Two dictionary-based methods for correction of strings with errors are proposed. The first method uses a hierarchical file based on two kinds of class name expression. The second method applies a hashing technique to methods already proposed. The correction rates of the two methods are the same. An experiment using 3782 words of length 6 characters shows that the computing time of the second metho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Boundary estimation in complex imagery using Fourier descriptors

    Publication Year: 1988, Page(s):187 - 190 vol.1
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (336 KB)

    A scheme is proposed to estimate the boundary in complex imagery by the use of Fourier descriptors. The rough boundary is encoded in vector form by connecting the centroid of the region and its boundary points and resampling angularly. Thus the 2-D boundary is transformed into a 1-D discrete curve. The discrete Fourier transform (DFT) is applied to the transformed and resampled 1-D curve, and the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Segmentation of echocardiographic images

    Publication Year: 1988, Page(s):1255 - 1259 vol.2
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (288 KB)

    Several texture analysis methods are studied, leading for each image region to a condensed textural information vector determined by stepwise discriminant analysis. Image segmentation is performed by split and merge, using a classification based on the Mahalanobis distance. More than 90% of the regions are well classified View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiresolution rotation invariant simultaneous auto regressive model for texture analysis

    Publication Year: 1988, Page(s):845 - 847 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (240 KB)

    Two models, called the multivariate rotation-invariant SAR (RISAR) model and the multiresolution SAR/RISAR (MRSAR/MRRISAR) model, are presented. The information used by the in MRSAR/MRRISAR model is more complete and more independent. Many experiments on image classification using RISAR model and MRRISAR model indicate that these models have very strong classification power, wide area in which the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Total 8-connectivity on the square raster

    Publication Year: 1988, Page(s):354 - 356 vol.1
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (232 KB)

    In order to avoid logical inconsistencies on the regular square raster, the foreground and the background in a binary image have to be treated differently during, for example, labelling or thinning operations. If the foreground is considered 8-connected, then the background has to be 4-connected, or vice versa. It is demonstrated that after certain topographic and possibly topological changes to a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A stereo vision technique using curve-segments and relaxation matching

    Publication Year: 1988, Page(s):149 - 151 vol.1
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (284 KB)

    A multichannel feature-based stereo vision technique is described in which curve segments are used as the feature primitives in the matching process. The left and right images are first filtered by using several Laplacian of Gaussian operators of different widths (channel). Curve segments are extracted by a tracking algorithm, and their centroids are obtained. At each channel, the generalized Houg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated threshold detection using a pyramid data structure

    Publication Year: 1988, Page(s):689 - 692 vol.2
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (252 KB)

    An approach to detect the thresholds automatically in a noisy histogram is discussed. The histogram is considered as a 1D image. Then, a histogram pyramid is built for smoothing the noisy histogram and eliminating the small noise peaks and valleys. The threshold is first found at the higher level of the histogram pyramid and then mapped back to the successive levels. The results show that the thre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonlinear transformations of digitized patterns

    Publication Year: 1988, Page(s):134 - 136 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (136 KB)

    For applying general, nonlinear shape transformations T: (ξ η)→(x, y) such that x=x(ξ, η), y=y(ξ, η), novel shooting methods are presented to avoid superfluous holes or blanks in the transformed images. Important relationships are established for the numerical methods used in image transformations and pattern recogniti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Yet another mesh array smart sensor?

    Publication Year: 1988, Page(s):863 - 865 vol.2
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (276 KB)

    Describes the architecture of a mesh array smart sensor, in close relation with the algorithms to be carried out by it. On the one hand, a monolithic implementation of the mesh array is a logical consequence of its design requirements within the framework of full custom integration. On the other hand, today's implementations are limited to Boolean picture processing and binary picture memorization... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.