By Topic

IEEE Transactions on Pattern Analysis and Machine Intelligence

Issue 1 • Date Jan. 1983

Filter Results

Displaying Results 1 - 25 of 25
  • [Front cover]

    Publication Year: 1983, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (733 KB)
    Freely Available from IEEE
  • List of Contributors

    Publication Year: 1983, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (305 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 1983, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (305 KB)
    Freely Available from IEEE
  • A System for Programming and Controlling Sensor-Based Robot Manipulators

    Publication Year: 1983, Page(s):1 - 7
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1726 KB)

    This paper describes an approach to programming and controlling robot manipulators which facilitates the use of sensory information. Robot actions are specified by declaring software servo processes which control the robot's various degrees of freedom. These servo processes can involve position, orientation, force, and torque information from the robot itself, or data from external sensors. Robot ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Boundary Location from an Initial Plan: The Bead Chain Algorithm

    Publication Year: 1983, Page(s):8 - 13
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2733 KB)

    A new boundary finding method is described and applied to a problem in morphometric cytology. The method is shown to offer several advantages over existing boundary locating techniques. Some experimental results are presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Restoration of a Feature Closed Class of Two-Dimensional Images

    Publication Year: 1983, Page(s):14 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1964 KB)

    A restoration principle is proposed and demonstrated for a feature closed class of two-dimensional images. Any member of this class of images can be represented as an intersection of unions of half planes in R2. Images with corners as well as images with continuous curvature can be generated under this algebraic representation. All resulting images have a well-defined interior and a nonintersectin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Markov Random Field Texture Models

    Publication Year: 1983, Page(s):25 - 39
    Cited by:  Papers (592)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6358 KB)

    We consider a texture to be a stochastic, possibly periodic, two-dimensional image field. A texture model is a mathematical procedure capable of producing and describing a textured image. We explore the use of Markov random fields as texture models. The binomial model, where each point in the texture has a binomial distribution with parameter controlled by its neighbors and ``number of tries'' equ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Effect of Cluster Size, Dimensionality, and the Number of Clusters on Recovery of True Cluster Structure

    Publication Year: 1983, Page(s):40 - 47
    Cited by:  Papers (69)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2100 KB)

    An evaluation of four clustering methods and four external criterion measures was conducted with respect to the effect of the number of clusters, dimensionality, and relative cluster sizes on the recovery of true cluster structure. The four methods were the single link, complete link, group average (UPGMA), and Ward's minimum variance algorithms. The results indicated that the four criterion measu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classification by Thresholding

    Publication Year: 1983, Page(s):48 - 54
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1874 KB)

    A procedure is given which substantially reduces the processing time needed to perform maximum likelihood classification on large data sets. The given method uses a set of fixed thresholds which, if exceeded by one probability density function, makes it unnecessary to evaluate a competing density function. Proofs are given of the existence and optimality of these thresholds for the class of contin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gray Level Image Processing by Cellular Logic Transforms

    Publication Year: 1983, Page(s):55 - 58
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5528 KB)

    The cellular logic transform has been used extensively in the analysis of bilevel images generated by thresholding gray level images. Now, by a process of gray level resynthesis, it is shown to be useful in gray level image processing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Direct Computation of the Focus of Expansion

    Publication Year: 1983, Page(s):58 - 64
    Cited by:  Papers (39)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5680 KB)

    Optical flow carries valuable information about the nature and depth of surfaces and the relative motion between observer and objects. In the extraction of this information, the focus of expansion plays a vital role. In contrast to the current approaches, this paper presents a method for the direct computation of the focus of expansion using an optimization approach. The optical flow can then be c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Segmentation by Texture Using Correlation

    Publication Year: 1983, Page(s):64 - 69
    Cited by:  Papers (66)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4275 KB)

    The correlation coefficients are used for segmentation according to texture. They are first evaluated on a set of square regions forming two levels of the quadratic picture tree (or pyramid). If the coefficients of a square and its four children in the tree are similar, then that region is considered to be of uniform texture. If not, it is replaced by its children. In this way, the split-and-merge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Edge Detection of X-Ray Images Using Fuzzy Sets

    Publication Year: 1983, Page(s):69 - 77
    Cited by:  Papers (101)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6606 KB)

    The effectiveness of the theory of fuzzy sets in detecting different regional boundaries of X-ray images is demonstrated. The algorithm includes a prior enhancement of the contrast among the regions (having small change in gray levels) using the contrast intensification (INT) operation along with smoothing in the fuzzy property plane before detecting its edges. The property plane is extracted from... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Quadtrees for Image Segments

    Publication Year: 1983, Page(s):77 - 83
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2500 KB)

    Quadtrees are compact hierarchical representations of images. In this paper, we define the efficiency of quadtrees in representing image segments and derive the relationship between the size of the enclosing rectangle of an image segment and its optimal quadtree. We show that if an image segment has an enclosing rectangle having sides of lengths x and y, such that 2N-1 × max (x, y) ¿ 2N, then th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of a Multilayer Decision Tree in Computer Recognition of Chinese Characters

    Publication Year: 1983, Page(s):83 - 89
    Cited by:  Papers (44)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1319 KB)

    A multistage classifier with general tree structure has been developed to recognize a large number of Chinese characters. A simple and efficient method of classifying the characters was achieved by choosing the best feature at each stage of the tree. The features used are Walsh coefficients obtained from two profiles of a character projected onto the X-Y orthogonal axes. Some algorithms for aligni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved Speedup Bounds for Parallel Alpha-Beta Search

    Publication Year: 1983, Page(s):89 - 92
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (821 KB)

    In this paper we investigate the ``mandatory-work-first'' approach to parallel alpha-beta search first proposed by Akl, Barnard, and Doran. This approach is based on a version of alpha-beta search without deep cutoffs and a two-stage evaluation process, the second stage of which is often pruned. Our analysis shows that for best-first ordering on the lookahead tree, this approach provides greater s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical Structures and Complexities of Parallel Isometric Languages

    Publication Year: 1983, Page(s):92 - 99
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1551 KB)

    The relationship between parallel isometric array languages and sequential isometric array languages is examined. Their hierarchical structures are investigated and a hierarchy is established by introducing parallel context-free array languages (PCFAL), derivation bounded array languages (DBAL), linear array languages (LAL), and extended regular afray languages (ERAL). It is interesting to find th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fisher Discriminant Analysis and Factor Analysis

    Publication Year: 1983, Page(s):99 - 104
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (884 KB)

    We show that information on the inherent structure of multidimensional data derived from a factor analysis procedure is equivalent to information obtained by Fisher discriminant analysis techniques, provided certain conditions, usually required in the factor analysis model, are satisfied. The results advocate the use of a factor analysis approach when Fisher discriminant analysis is not applicable... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Segmenting Dot Patterns by Voronoi Diagram Concavity

    Publication Year: 1983, Page(s):104 - 110
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1230 KB)

    This correspondence defines a signed distance, called ``internal concavity,'' on paths of the Voronoi diagram of a dot pattern. An algorithm using internal concavity to segment dot patterns is described. The segmentation algorithm produces subsets of the Dirichlet tessellation (Delaunay triangulation) of the dot pattern. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packing Volumes by Spheres

    Publication Year: 1983, Page(s):111 - 116
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3515 KB)

    In this note we present an algorithm for packing spheres in an arbitrary shaped volume. This algorithm is similar to Blum's transform in that it fits spheres into a volume, but it is different in that it fits only tangential spheres, and thereby the data reduction is larger than by Blum's transform. The spheres are of variable radii, which enables us to achieve a hierarchy of intrinsic volume prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE copyright form

    Publication Year: 1983, Page(s):117 - 118
    Request permission for commercial reuse | PDF file iconPDF (268 KB)
    Freely Available from IEEE
  • Information for authors

    Publication Year: 1983, Page(s): 119
    Request permission for commercial reuse | PDF file iconPDF (257 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 1983, Page(s): 120
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • List of Contributors

    Publication Year: 1983, Page(s): nil2
    Request permission for commercial reuse | PDF file iconPDF (200 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 1983, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI) is published monthly. Its editorial board strives to present most important research results in areas within TPAMI's scope.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
David A. Forsyth
University of Illinois
e-mail: daf@illinois.edu