By Topic

[1988 Proceedings] 9th International Conference on Pattern Recognition

May 14 1988-Nov. 17 1988

Filter Results

Displaying Results 1 - 25 of 335
  • 9th International Conference on Pattern Recognition (IEEE Cat. No.88CH2614-6)

    Publication Year: 1988
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • ERRORS-2: a 3D object recognition system using aspect graphs

    Publication Year: 1988, Page(s):6 - 10 vol.1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    A prototype 3D object recognition system is described that is composed of three major sections; an object representation module, a feature extraction and matching module, and a recognition control strategy module. The object representation module uses an algorithm which constructs perspective projection aspect graphs of convex polyhedra. The feature extraction and matching module uses Fourier desc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A morphological study on structure line

    Publication Year: 1988, Page(s):559 - 562 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1009 KB)

    Some examples of the structure line are shown and the morphological transition of the structure line is investigated. The waveform that causes the catastrophe of tree structure plays an important role in the transition. This waveform is called a catastrophe waveform. The catastrophe waveform means the transformation of the tree structure. Since the transformations of the branch such as separation ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A modified parallel thinning algorithm

    Publication Year: 1988, Page(s):1023 - 1025 vol.2
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB)

    A parallel thinning algorithm of C.M. Holt et al. (1987) is compared with an algorithm of D. Rutovitz (1966) and one by T.Y. Zhang and C.Y. Suen (1984). Analyses and experiments show that the Holt algorithm is similar to the Rutovitz algorithm. A heuristic modification to Rutovitz' algorithm is also proposed and the modified algorithm is faster than Holt's algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new method of estimating shape from shading by using a constraint at zero-crossings of image brightness

    Publication Year: 1988, Page(s):666 - 668 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    An iterative method is proposed for estimating shape from shading using a constraint of surface orientation at the zero-crossings of the image brightness. This method can be applied to objects with concave surfaces and one can obtain several different 3D shapes from the same shading information. The ∇2G filter (a Gaussian operator) is used to detect the zero-crossings of the image... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Line drawing interpretation: bilateral symmetry

    Publication Year: 1988, Page(s):1049 - 1052 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    Results previously derived by the author (1988) are used to investigate the implications of bilateral symmetry in line drawings. It is shown that the line drawing of an orthographically projected surface of revolution exhibits bilateral symmetry about the projection of its axis of revolution, irrespective of the viewing direction. Further, with only one exception, a bilaterally symmetric line draw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the accuracy of a bootstrap estimate of the classification error

    Publication Year: 1988, Page(s):1230 - 1232 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    Analytical and simulation studies show that a variance of the bootstrap estimator discussed is lower than that of the commonly used leave-one-out estimator only when sample size is extremely small or when the classification error is large. An essential feature of the bootstrap method is that observations of the training sample (TS) play the role of a general population and are used to determine th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An integrated visual system for solder inspection

    Publication Year: 1988, Page(s):663 - 665 vol.2
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    A technique is described for real-time solder joint inspection for printed wiring boards. It uses reflection on the specular solder surface projected by a straight-shaped light source (a straight fluorescent tube). For image processing, modified Hough transformation is adopted to approximate the image of the fluorescent tube reflected on a solder joint to a straight line. These processes are perfo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recognition of overlapping 2-D objects by local feature construction method

    Publication Year: 1988, Page(s):1046 - 1048 vol.2
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB)

    A method is described for the recognition of partially occluded 2-D objects. This method considers a set of corners, parallel lines, and so on as typical features of an object. Possible candidate models are estimated from these features, and structural matching is performed between these models and features obtained from a picture by checking the combinations of various features. Even if the whole... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A similarity value transformation method for probabilistic scoring

    Publication Year: 1988, Page(s):1225 - 1209 vol.2
    Cited by:  Papers (1)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    A method to transform a similarity measure into a probability measure which indicates the reliability of classification is shown. A statistical model for the similarity value distribution is introduced for efficient estimation from a small number of samples. It is theoretically derived that the similarity value distribution in the multiple similarity method belongs to the family of Γ distrib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collinear trinocular stereo using two-level dynamic programming

    Publication Year: 1988, Page(s):658 - 662 vol.2
    Cited by:  Papers (13)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    An almost occlusion-free trinocular stereo algorithm is described. It can cope with the occlusion problem when trying to obtain depth data of good accuracy by using a long stereo baseline. A third camera located midway between a pair of stereo cameras is used for the purpose. A correspondence search algorithmbased on two-level dynamic programming was developed to obtain an optimal correspondence a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vision system for turbine inspection

    Publication Year: 1988, Page(s):1202 - 1206 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    An image analysis method was developed for the inspection of rotating blades of steam turbines. The method consists of three parts: (1) detecting the eventual crack points, (2) locating the cluster of these points, i.e. the eventual crack; and (3) following and analyzing the eventual crack. A computer vision system was constructed to implement the method. The system has been tested during shutdown... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2D-3D pose estimation

    Publication Year: 1988, Page(s):385 - 391 vol.1
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    A robust technique is described for solving the 3D-to-2D perspective projection pose estimation problem, given corresponding point sets. The technique has a considerable advantage over the least-squares (LS) technique in that with as many as 30% of the corresponding point pair matches completely incorrect the robust technique can determine the correct pose almost as accurately as the LS technique ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-based matching using skewed symmetry information

    Publication Year: 1988, Page(s):1043 - 1045 vol.2
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    A model-based approach is proposed for recovering the 3-D position of a symmetrical polygon in the models from its single image. First, a Hough-type voting method detects skewed symmetry in the image. Matching of the skewed symmetry axis to symmetry axes of models then makes both selection of models and recovering their orientation easy. The method is shown to possess robustness of matching from o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of χ2 and κ statistics in finding signal and picture periodicity

    Publication Year: 1988, Page(s):1221 - 1224 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    Two statistical measures, based on contingency tables, were compared in trying to reveal the periodic or quasiperiodic structure of a texture from its cooccurrence histogram: the χ2 and the κ statistics. Both are sensitive to periodicity, but the κ statistic is clearly better in the sense that the χ2 can attain high values for displacements quite different... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A segmentation and object extraction algorithm with linear memory and time constraints

    Publication Year: 1988, Page(s):596 - 600 vol.1
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    An experimental segmentation and object extraction algorithm is described. The system was developed for medical image processing with the primary application being DNA (deoxyribonucleic acid) sequencing. A typical DNA sequencing can involve processing the image of an autodiagram of size 14×17 inches resulting in a 2048×8600 digitized image under the specified spatial resolutions. The d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extraction and recognition of 3-dimensional information by projecting a pair of slit-ray beams

    Publication Year: 1988, Page(s):736 - 743 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    A method is presented for extracting 3-D information of an object which has both Lambertian and specular components, such as metals, using a pair of slit-ray beams. Although the traditional slit-ray beam projection method obtains inaccurate distance information using specular slit-ray beam or mirror image, the method proposed solves the problem and calculates not only the position vector but also ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flexible recognition algorithms and flexible OCR system

    Publication Year: 1988, Page(s):655 - 657 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    An optical handwritten numeral recognition system is presented which uses a G3 facsimile transceiver (fax) as the input device. Flexible recognition algorithms perform raster scanning of the Huffman code produced by the fax only once. The hanger-chain algorithms separate handwritten numerals and obtain the first features at the same time. All the recognition software is coded in Turbo C language. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3-D heart image reconstructed from MRI data

    Publication Year: 1988, Page(s):1198 - 1201 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB)

    An outline of 3-D image reconstruction techniques for the left ventricle and the whole heart from MRI (magnetic resonance imaging) data is discussed. A method is proposed to reconstruct 3-D shapes of each part of the heart, i.e. left ventricle, left atrium, right ventricle, right atrium, aorta and pulmonary artery, in a voxel space using the cross-sectional images obtained by gated MRI of the hear... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Partial matching of two dimensional shapes using random coding

    Publication Year: 1988, Page(s):64 - 68 vol.1
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    Three algorithms for coding the boundary of two-dimensional shapes are described. In each algorithm, each boundary point is coded with respect to another point picked at random from the boundary. Using this method, an effective and efficient correlation technique to match two-dimensional shapes is developed. This technique can be used to match shapes of arbitrary scale and orientation. The given s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the relationship between augmented transition network and attributed grammar

    Publication Year: 1988, Page(s):337 - 341 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    Finite state attributed grammars are known to be rich in descriptive power because semantic information is included along with the structural information. They have applied to a number of practical problems in pattern recognition. The generative power of a finite-state attributed grammar is studied. The approach adopted is to establish a relationship between this grammar and the augmented transiti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two dimensional CAD-based object recognition

    Publication Year: 1988, Page(s):382 - 384 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    A local feature-aggregation method for recognizing two-dimensional objects based on their CAD models is presented. The method can handle cases in which the objects are translated, rotated, scaled and occluded, and it is well suited for parallel implementation. Two types of local features, the L structures and the U structures, are extracted from the input image and matched with those of a model to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A blackboard-based approach to handwritten ZIP code recognition

    Publication Year: 1988, Page(s):111 - 113 vol.1
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    A methodology for recognizing ZIP codes (US postal codes) in handwritten addresses is presented that uses many diverse pattern recognition and image processing algorithms. Given a high-resolution image of a handwritten address block, the solution invokes routines capable of hypothesizing the location of the ZIP code, segmenting and recognizing ZIP code digits, locating and recognizing city and sta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some applications of simulated annealing to pattern recognition

    Publication Year: 1988, Page(s):1040 - 1042 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    The simulated annealing technique for solving combinatorial problems is applied to: cluster analysis, isomorphisms of attributed relational graphs, piecewise curve fitting, and feature selection. A novel class of clustering algorithms based on simulated annealing are presented. One such algorithm, ALKMEANS, is proposed as a contrast to the commonly used heuristic clustering algorithm KMEANS; test ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The improvement on consecutive Hamming method and its application to deciding the earthquake-prone regions

    Publication Year: 1988, Page(s):971 - 973 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB)

    A pattern recognition method, the improved consecutive Hamming method (ICHAM) is proposed. It improves upon the Hamming method by using consecutive data. The method is applied to the earthquake-prone regions of Beijing. The results show that the effect of the ICHAM method is better than that of the binary Hamming method and the original consecutive Hamming method. The tests show better stability o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.