Free Essay

Change Detection

In:

Submitted By dharris77
Words 3616
Pages 15
Different Change Detection Techniques

Table of Contents

Introduction...................................................3
Digital Change Detection Process...............................4
Description of the most commonly used change detection methods.5 I. Post-Classification Comparison..........................5 II. Direct Classification...................................6 III. Principal Component Analysis (PCA)......................6 IV. Image Differencing......................................8 V. Change Vector Analysis (CVA)............................9

Relative accuracy of the most commonly used change detection methods........................................................9

I. Post-Classification Comparison.........................10 II. Direct Classification..................................11 III. Principal Component Analysis (PCA).....................11 IV. Image Differencing.....................................12 V. Change Vector Analysis (CVA)

Conclusion....................................................14

References....................................................15

Introduction
Remote sensing change detection has been defined as the process of identifying change in the state of an object or phenomena through the detection of differences between two or more sets of images taken of the same area on different dates (Wang, 1993). The underlying assumption is that changes on the ground cause significant changes in image pixel values (Zhang et al., 2002). Change detection is a vital technique in remote sensing because it plays a role in monitoring and managing natural resources and urban development providing quantitative analysis of the spatial distribution of the population of interest.
Change detection is useful in such diverse applications as land use change analysis, monitoring shifting cultivation, assessment of deforestation, study of changes in vegetation, seasonal changes in pasture production, damage assessment, crop stress detection, disaster monitoring, day/night analysis of thermal characteristics as well as other environmental changes. When monitoring natural resources there are four basic aspects that are relevant; 1) Detecting that changes have occurred, 2) Identifying the nature of the change, 3) Measuring the areal extent of the change, 4) Assessing the spatial pattern of the change (Macleod and Congalton 1998) and by 1995 there were eleven different change detection techniques documented in the literature; 1) mono-temporal change delineation, 2) delta or post-classification comparison, 3) multidimensional temporal feature space analysis, 4) composite analysis, 5) image differencing, 6) image ratioing, 7) multitemporal linear data transformation, 8) change vector analysis, 9) image regression, 10) multitemporal biomass index, 11) background subtraction. The purpose of this paper is to outline the change detection process, discuss the five most common change detection techniques; post-classification comparison, direct classification, principal component analysis, image differencing, and change vector analysis (CVA) and discuss the literature on the relative accuracy of each method.
Digital Change Detection Process Listed below are the general steps used to conduct digital change detection using remote sensing data (Ridd, M., and J. Hipple, 2006). 1. State the Change Detection Problem a. Define the study area b. Specify frequency of change detection (e.g. seasonal, yearly) c. Identify classes from an appropriate land cover classification system 2. Consideration of Significance When Performing Change Detection d. Remote Sensing System Considerations i. Temporal resolution ii. Spatial resolution iii. Spectral resolution iv. Radiometric resolution e. Environmental Considerations v. Atmospheric conditions vi. Soil moisture conditions vii. Phenological cycle characteristics viii. Tidal stage 3. Image Processing of Remote Sensing Data to Extract Change Information f. Acquire Appropriate Change Detection Data ix. In situ and collateral data x. Remotely sensed data 1. Base year (Time n) 2. Subsequent Year(s) (Time n-1 or n+1) g. Preprocess the Multiple Date Remotely Sensed Data xi. Geometric registration xii. Radiometric correction (or normalization) h. Select Appropriate Change Detection Algorithm i. Apply Appropriate Image Classification Logic If Necessary xiii. Supervised, unsupervised, hybrid j. Perform Change Detection using GIS Algorithms xiv. Highlight selected classes using change detection matrix xv. Generate change map products xvi. Compute change statistics 4. Quality Assurance and Control Program k. Assess Statistical Accuracy of: xvii. Individual date classifications xviii. Change detection products 5. Distribute Results l. Digital products m. Analog (hardcopy) products
Description of the most commonly used change detection methods I. Post-classification comparison
The most intuitive method of change detection is post-classification comparison, an overlay of two independently produced classified images, which results in a complete descriptive matrix of the changes between the two dates. The individual classifications can either be supervised or unsupervised. Unfortunately, every error in the individual data classification maps will also be present in the final change detection map. Therefore, it is imperative that the individual classification maps used in the post-classification change detection methods be as accurate as possible (Jensen, 1996).
Post-classification comparison is different from all other change detection methods, because it alone involves a comparison of classified data. All other methods involve a comparison of continuous data, and are therefore sometimes grouped as spectral change analysis. In many cases, however, it is necessary to apply classification to the output of spectral change analysis, in order to provide simple, summary information on changes.
II. Direct classification
In contrast to post-classification comparison, which involves two separate classifications, it is possible to combine the multitemporal images into one large data set, and classify the spectral changes as a single, direct classification. As with post classification comparison, either a supervised or an unsupervised approach can be used (Singh, 1989). The combined multitemporal spectral data set is also a starting point for principal component analysis. While this technique requires only a single classification, it is a very complex one, in part because of the added dimensionality of two dates of data (Coppin et al. 2004). The potential disadvantages of the direct multitemporal method include redundancy in spectral information present in some of the bands, and difficulty in labeling change classes if an unsupervised approach is used.
III. Principal component analysis (PCA)
PCA is a statistical technique used extensively in remote sensing image analysis in applications well beyond that of change detection (Warner, 1999). PCA is a method that produces new images, known as principal components, which are each linear combinations of the original bands. The principal components are uncorrelated with each other, and are arranged such that the first component contains the most variance possible from the original data, with each succeeding component containing the maximum amount of the remaining variance (Young and Wang, 2001). PCA has been used for determining the intrinsic dimensionality of multispectral imagery (Swain and Davis, 1978), data enhancement for geological applications (Prakash and Gupta, 1998) and land cover change detection (Fung and LeDrew, 1987).
PCA is often used to reduce the dimensionality of the data without reducing the overall information content. This dimensionality reduction is based on the assumption that high order principal component images contain most of the information present in the original image (Warner, 1999). Principal components can be produced from the eigenvectors of the covariance matrix (unstandardized) or correlation matrix (standardized principal components) (Li and Yeh,
1998). These matrices may be extracted from a subset area, or the total study area.
PCA for change detection requires first stacking two or more single date images to form a combined multitemporal image. The spectral-temporal transformation of the multi-date TM data usually creates some components correlated with change (Guild et al., 2004). The highest order principal components ideally represent the spectral distribution of the land cover that is consistent with time, while land cover changes are represented in the next highest order components (Byrne et al., 1980). Image noise should be concentrated in the lowest order bands. In practice, however, land cover changes can be mixed with the spectral variation of unchanged classes, making interpretation of the PCA images complex.

IV. Image differencing
Image differencing is one of the most widely used techniques for change detection. Image differencing is simple to implement, and the output image is relatively easy to interpret. The procedure involves the subtraction of one or more bands of an image of one date from the equivalent bands of another date. The subtraction results in large positive or negative values in areas of changes in spectral radiance, and values close to zero in areas of no change (Sohl, 1999). A critical element of the image differencing method is deciding where to place the thresholds between change and no change pixels, because noise and natural variability in the spectral classes will result in a certain minimum amount of spectral change, even if the classes have not changed. Singh (1989) and Toll (1982) suggested selecting thresholds on the basis of the number of standard deviations from the mean value of the differenced image.
Studies of image differencing with Landsat Multi Spectral Scanner (MSS) data have shown that the red band is useful in detecting urban development, while the near infrared (NIR) band is good for detecting change within agricultural land (Fung, 1990). In an early study, it was reported that the detection of residential land use development at the urban fringe showed a significant improvement when image differencing included both Thematic Mapper (TM) band 5 and texture information (Toll 1982).

IV. Change vector analysis (CVA)
CVA yields information about the degree and type of spectral changes by calculating a vector magnitude and direction in multispectral change space for each pixel (Michalek et al., 1993). The vector magnitude, or the intensity of the change, is computed by determining the Euclidean distance between end points through n-dimensional change space. The direction of the change, measured as the angle of the vector, indicates the nature of the land-cover change process (Lambin and Strahler, 1994a). A particular advantage of CVA is the potential ability to process any number of spectral bands. This is important because not all changes are easily identified in any single band or spectral feature.
The change vector direction is useful in discriminating different types of changes, while the vector magnitude is useful for comparison of the intensity of change within and among change types. Also, CVA can be useful in long-term, multi-interval monitoring studies. By extracting consistent change vector information for multiple time intervals, and merging this information in one or more change images, the change trajectory of a given site may be observed over time, and spectral, spatial and temporal variations may be computed and contrasted (Johnson and Kasischke, 1998).
Relative accuracy of the most commonly used change detection methods
Much of the change detection literatures consist of experimental studies comparing the accuracy of different change detection methods. In general, the results obtained from these experimental comparisons are somewhat contradictory. For example, in studies that compared PCA to other change detection methods, Li and Yeh (1998) and Muchoney and
Haack (1994) found that PCA produced the highest accuracy, whereas Macleod and Congalton (1998) and Singh (1989) found that PCA produced the lowest accuracy. Furthermore, many studies simply conclude that there is no single best method, and suggest that each approach may have its own strengths (Ridd and Liu 1998, Sohl, 1999).
This lack of consistency may be attributed to the range of localities where the various studies have been carried out, each with different physical geography and land use patterns. It is noticeable that the research design of studies that compare change detection methods has almost always focused on a single location, and a single set of imagery. I. Post-classification comparison
While post-classification comparison for change detection has been criticized for relying upon the accuracy of the initial classification of the two individual images classification, Toll et al. (1980), and Singh (1989) argue that post-classification can be considered the superior change detection method, and therefore should be the standard for evaluating the results of other methods. Many change detection studies do not have independent ground data, and therefore the assumption that post-classification can be used to evaluate the other methods is attractive. Others have both pointed out that post-classification comparison is likely to be the best approach when anniversary images (i.e.images acquired in the same month and day of different years) are not used in the change analysis (Sohl, 1999, Luque, 2000). In addition, the post-classification comparison technique has the advantage of compensating for varied atmospheric conditions between dates, because each classification is independently produced. On the other hand, the difficulty of producing comparable classifications on different images may give poor results and the use of pre-defined land cover classes in post-classification comparison by definition implies a loss of the information present in the continuous range of image values provided by the original data (Toll, 1982).
II. Direct classification
The success of a multitemporal composite analysis depends upon the extent to which change classes are different spectrally from the no change classes. As with all spectral methods of change detection, errors are likely if there are spectral differences between two dates for pixels that have not changed in land cover. For example, vegetation spectral reflectance may vary due to seasonal or weather conditions, without any notable land cover change. In addition, the complexity and dimensionality of the classification can be quite great, and if all bands from each date are used, there may be substantial redundancy in their information content (Lillesand et al., 2004, Michener and Houhoulis 1997).
III. Principal component analysis
PCA has been found to provide accurate and effective change analysis. For example, Byrne et al. (1980) have shown that PCA can be effective for monitoring of land cover change using multitemporal Landsat MSS data. In a study by Li and Yeh (1998) obtained a relatively high overall accuracy with a principal component analysis of urban expansion in the Pearl River Delta. Despite these positive results, PCA is known to be sensitive to noise (Muchoney and Haack, 1994). A difficulty with implementing PCA-based change detection is that decisions regarding the implementation can have a large effect on the outcome of the analysis. For example, in a study of land cover change in the Kitchener-Waterloo-Guelph area, Fung and LeDrew (1987) found that the eigenvectors used for rotation could vary greatly depending upon the choice of using standardized or non-standardized data, and whether the whole data set, or a subset, was used for generating the image statistics. They suggested that, in general, the eigenstructure derived from the entire data set is more valid for land cover change detection.
IV. Image differencing
Image differencing has also been proposed as the method likely to have the highest accuracy (Macleod and Congalton 1998, Sohl 1999). Singh (1989) concluded that simple techniques, such as image differencing, tend to perform better than complex methods, such as principal component analysis. This view is supported by Macleod and Congalton (1998), who found image differencing performed significantly better than post-classification comparison and principal component analysis for mapping changes in eelgrass populations in Great Bay, New Hampshire.
Image differencing does however have some difficulties, including its sensitivity to mis-registration and mixed pixels. Also, simple image differencing fails to consider the starting and ending location of a pixel in the multi-dimensional feature space. Moreover, image differencing does not provide direct information on the nature of the change (Singh, 1989).
V. Change vector analysis (CVA)
The strength of the CVA approach is that it alone provides information separately on the type and degree of change (Sohl, 1999). CVA potentially allows processing of the full dimensionality of multispectral data, thus providing the potential to detect all the changes present in the data (Lambin and Strahler 1994a). However, most CVA analyses collapse the dimensionality down to just two or three dimensions (Sohl, 1999). The CVA method can be a valuable tool for coastal resource surveys and monitoring, especially for identifying suspected areas of change prior to more detailed on-site observation (Michalek et al. 1993). Lambin and Strahler (1994b) showed that CVA combined with a principal component analysis is effective in detecting and categorizing inter-annual change. Sohl’s (1999) study compared four change detection methods in the Abu Dhabi Emirate using Landsat TM data found that, although quantitative values of changes were most accurately provided by image differencing, CVA provides rich qualitative detail about the nature of changes. A study performed by Dhakal et al. (2002) found that among the different change detection methods used to map areas affected by flooding and erosion, CVA was the most accurate technique.
However, it was pointed out that CVA is very sensitive to the quality of the image radiometric normalization. An additional issue is that CVA lacks an automatic method to determine the threshold of change magnitude between change and no-change pixels. An iterative approach was developed using the classification of training data to select optimal change threshold Chen et al. (2003).
Conclusion
A large number of change detection techniques have been developed. The most common techniques for change detection are post-classification comparison, direct classification, principal component analysis, image differencing, and change vector analysis (CVA). These techniques are extremely useful and should be used in accordance with the sought after specific results. Along with ancillary data, multi-source data, Previous research shown that a combination of two techniques can often improve the results and implementation of several change detection techniques followed by an integration of the results could be the most effective way to detect change in a wide range of applications. The application of multi-source data and ground truth when possible should be incorporated as well.

References
Byrne, G., P. Crapper, and K. Mayo, 1980. Monitoring Land-Cover Change by Principal Components Analysis of Multitemporal Landsat Data, Remote Sensing of Environment, 10: 175-184

Chen, J., P. Gong, C. He, R. Pu, and P. Shi, 2003. Land-Use/Land-Cover Change Detection using Improved Change-Vector Analysis. Photogrammetric Engineering & Remote Sensing, 69: 369-379.

Coppin, P., I. Jonckheere, K. Nackaerts, B. Muys and E. Lambin, 2004. Digital Change Detection Methods in Ecosystem Monitoring: A Review, International Journal of Remote Sensing, 25: 1565-1596

Dhakal, A., T. Amada, M. Aniya, and R. Sharma, 2002. Detection of Areas Associated With Flood and Erosion Caused by a Heavy Rainfall Using Multitemporal Landsat TM Data, Photogrammetric Engineering & Remote Sensing, 68: 233- 239.

Fung, T., 1990. An assessment of TM Imagery for Land-Cover Change Detection, IEEE Transactions on Geoscience and Remote Sensing, 28: 681-684.

Fung, T., and E. LeDrew, 1987. Application of Principal Component Analysis to Change Detection, Photogrammetric Engineering & Remote Sensing, 53: 1649-1658

Guild, L., W. Cohen., and J. Kauffman, 2004. Detection of Deforestation and Land Conversion in Rondônia, Brazil Using Change Detection Techniques, International Journal of Remote Sensing, 25: 730-750.

Jensen, J. R., 1996. Introductory Digital Image Processing: A Remote Sensing Perspective, Prentice-Hall, Inc., Saddle River.

Johnson, R., and E. Kasischke, 1998. Change Vector Analysis: A Technique for the Multispectral Monitoring of Land Cover and Condition, International Journal of Remote Sensing, 19: 411-426

Lambin, E., and A. Strahler, 1994a. Change Vector Analysis in Multitemporal Space: A Tool to Detect and Categorize Land-Cover Change Processes Using High Temporal-Resolution Satellite Data, Remote Sensing of Environment, 48: 231-244.

Lambin, E., and A. Strahler, 1994b. Indicators of Land-Cover Change for Change-Vector Analysis in Multitemporal Space at Coarse Spatial Scale, International Journal of Remote Sensing, 15: 2099-2119

Lillesand, T. M., R. W. Kiefer, and J. W. Chipman, 2004. Remote Sensing and Image Interpretation, 5th edition., Wiley, New York

Li, X., and A. Yeh, 1998. Principal Component Analysis of Stacked Multi-Temporal Images for the Monitoring of Rapid Urban Expansion in the Pearl River Delta,International Journal of Remote Sensing, 19: 1501-1518

Luque, S., 2000. Evaluating Temporal Changes using Multi-Spectral Scanner and Thematic Mapper Data on the Landscape of a Natural Reserve: The New Jersey Pine Barrens, a Case Study, International Journal of Remote Sensing, 21: 2589 – 2610.

Macleod, R., and R. Congalton, 1998. A Quantitative Comparison of Change Detection Algorithms for Monitoring Eelgrass from Remotely Sensed Data, Photogrammetric Engineering & Remote Sensing, 64: 207-216

Michalek, J. L., T. W. Wagner, J. L. Luczkovich, and R. W. Stoffle, 1993. Multispectral Change Vector analysis for Monitoring Coastal Marine Environments, Photogrammetric Engineering & Remote Sensing, 59: 381-384.

Michener, W., and P. Houhoulis, 1997. Detection of Vegetation Changes Associated with Extensive Flooding in a Forested Ecosystem, Photogrammetric Engineering & Remote Sensing, 63: 1363-1374.

Muchoney, D. M., and B. Haack, 1994. Change Detection for Monitoring Forest Defoliation. Photogrammetric Engineering & Remote Sensing, 60: 1243-1251

Prakash A., and R. P. Gupta , 1998. Land-Use Mapping and Change Detection in a Coal Mining Area - A Case Study in the Jharia Coalfield, India, 1998. International Journal of Remote Sensing, 19: 391 – 410
Ridd, M., and J. Hipple, 2006, Remote Sensing of Human Settlements American Society of Photogrammetry and Remote Sensing: Bethesda, Maryland, 2006
Ridd, M., and J. Liu, 1998. A Comparison of Four Algorithms for Change Detection in an Urban Environment, Remote Sensing of Environment, 63: 95-100.

Singh, A., 1989. Digital Change Detection Techniques Using Remotely Sensed Data, International Journal of Remote Sensing, 10: 989-1003

Swain, P. H. and S. M. Davis, 1978. Remote Sensing: The Quantitative Approach. McGraw Hill, New York.

Sohl, T., L, 1999. Change Analysis in the United Arab Emirates: An Investigation of Two Techniques, Photgrammetric Engineering & Remote Sensing, 65: 475-484.

Toll, D., 1982. Detecting Residential Land-Use Development at the Urban Fringe, Photogrammetric Engineering & Remote Sensing, 48: 629-643

Wang, F., 1993. A Knowledge-Based Vision System for Detecting Land Changes at Urban Fringes, IEEE Transactions on Geoscience & Remote Sensing, 31: 136-145

Warner, T., 1999. Analysis of Spatial Patterns in Remotely Sensed Data Using Multivariate Spatial Correlation, Geocarto International, 14 (1): 59-65.

Young, S. S., and C. Y. Wang, 2001. Land-Cover Change Analysis of China Using Global-Scale Pathfinder AVHRR Landcover (PAL) Data, 1982–92, International Journal of Remote Sensing, 22: 1457 – 1477

Zhang. Q., J. Wang, X. Peng, P. Gong., and P. Shi, 2002. Urban Built-Up Land Change Detection with Road Density and Spectral Information from Multi-Temporal Landsat TM Data, International Journal of Remote Sensing, 23: 3057-3078

Similar Documents

Premium Essay

The Importance Of Land Use: Change Detection

...2.3 Land use/Land covers Change Detection An increasingly common application of remotely sensed data is for change detection. Change detection is the process of identifying differences in the state of an object or phenomenon by observing it at different times(Bottolomy, 1998). Change detection is an important process in monitoring and managing natural resources and urban development because it provides quantitative analysis of the spatial distribution of the population of interest. Change detection is useful in such diverse applications as land use change analysis, monitoring shifting cultivation, assessment of deforestation, and study of changes in vegetation phenology, seasonal changes in pasture production, damage assessment, crop...

Words: 899 - Pages: 4

Free Essay

They Made Me Do This

...to the abundance of police dramas on television, people have begun to believe that a polygraph test is infallible. Many studies, as well as a Supreme Court case, have since revealed that the veracity of polygraphs is far from impeccable. Also, there are few if any credible sources that support the veracity of polygraph machines. As Dr. Saxe and Israeli psychologist Gershon Ben-Shahar (1999) notes, "it may, in fact, be impossible to conduct a proper validity study." In real-world situations, it's very difficult to know what the truth is.” (American Psychological Association [APA], 2004) Polygraphs do not function as a lie detector. A polygraph only directly measures the autonomic responses of the subject. It measures reactions such as changes in skin conductance, pulse rate, blood pressure, and breathing while the subject is asked a series of questions. From that data, it makes an indirect assumption that positive physiological responsive indicate dishonesty and vice versa. When taking a polygraph test, proctors use several different tactics to elicit responses from their subjects. One is called the "relevant-irrelevant" technique, which mixes questions like "Did you steal the money?" in with questions like "Is today Tuesday?" Questions that are relevant to the topic are suppose to cause a jump within the subject’s autonomic system and in turn would produce results on the polygraph. Another tactic that is commonly used is "comparison questions" this process is similar to relevant-irrelevant...

Words: 769 - Pages: 4

Free Essay

Self Navigating Bot

...SELF NAVIGATING AUTONOMOUS BOT Major-Project Report by Arjun Surendran B080001EC Deepak Venga B080027EC Nandu Raj B080585EC Priyanka G Das B080312EC Sanjay George B080270EC Under the guidance of Dr. S. M. SAMEER Submitted in Partial Fulfillment of the Requirements for the degree of Bachelor of Technology In ELECTRONICS AND COMMUNICATION ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING NATIONAL INSTITUTE OF TECHNOLOGY CALICUT Kerala, India April 2012 NATIONAL INSTITUTE OF TECHNOLOGY CALICUT DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING CERTIFICATE This is to certify that this report titled SELF NAVIGATING AUTONOMOUS BOT is a bona fide record of the major-project done by Arjun Surendran Deepak Venga Nandu Raj Priyanka G Das Sanjay George B080001EC B080027EC B080585EC B080312EC B080270EC In partial fulfillment of the requirements for the award of Degree of Bachelor of Technology in Electronics and Communication Engineering from National Institute of Technology, Calicut. Dr. S. M. Sameer (Project Advisor) Assistant Professor Dr. P S Sathidevi Professor & Head April 2012 NIT Calicut i ACKNOWLEDGEMENT We would like to thank Dr. S. M. Sameer, Assistant Professor, Department of Electronics and Communication Engineering for his guidance and inspiration in helping us complete this project. We are also grateful to Dr. P S Sathidevi, Professor and Head, Department of Electronics and Communication...

Words: 13508 - Pages: 55

Free Essay

Self-Driving Mobile Platform

...Robotics 104-1 Final project: A self-driving mobile platform Lou, Seddik, Benjamin Derville and Chun-Kan Gary Chow Abstract— In this paper, we present our work on building an autonomous car. We first describe our choosen approach and the reason behind this choice, we then describe what we manage to implement and then we finish by reviewing our work done. I. INTRODUCTION Autonomous driving is maybe the most popular current project in machine learning, and especially deep learning. Billions of dollars are assigned to create self-driving car. Google lead the movement with their Google Car created from their lab Google X, followed by Tesla who manage to quickly catch up with their big fleet of cars driving on the roads at each instant. Uber just created a research center for this work, GM partner with Lyft, George Hotz, an americain car made his own home-made simple self-driving car and even Nvidea created a demo. In this sense, this work is not really original or innovative. We however thought this work was not yet popularized to students projects. This works is also interesting because it’s not ’achieved’ even by the current state-of-the-art, there are still lots of works to be done. II. T HEORY will be very hard to distinguish between them and not useful for a long-term solution. Additionally we would encounter a major problem when defining the color and shape of a car. So instead we design an machine-learning algorithm which uses a similar approach...

Words: 3460 - Pages: 14

Free Essay

Lab 4: Edge Detection in Images

...Edge Detection in Images A. Background Information Edge detection is a common, but very important method for analyzing images. It can be used to help identify objects in a scene or features of an object. It is widely used in biometrics security applications to identify facial features or fingerprints. The example below shows the process of edge detection applied to a picture of a bike next to a brick wall. As can be seen, edge detection easily shows the outline of the bike, the bricks in the wall, and even the writing on the bike. | | Edge Detection Example: Original Image (left) and Edge Detected Image (right) | So how does edge detection work? The first step in understanding the process is to understand what an edge is in an image. If you were to look at the values of in an image along a single row or column, you would see something that looks like this: Bricks Bricks Grout Lines Grout Lines This is actually the graph of the pixel values from the first row of the original picture shown above. What you are seeing here are the individual dark colored bricks that make up the top border of the image. The bricks themselves are the lower and relatively flat sections, while the lighter colored grout between the bricks is represented by the sharp peaks. With this understanding, we can see that an edge (a sharp change in color) is represented by a large change in the pixel value. In order to locate the areas that have these drastic changes in color...

Words: 2189 - Pages: 9

Free Essay

Fuzzy and Cla Based Edge Detection Method

...Edge detection using Fuzzy Logic and Automata Theory Title Page By Takkar Mohit Supervisor A Thesis Submitted to In Partial Fulfillment of the Requirements for the Degree of Master of Engineering in Electronics & Communication December 2014 . Table of Contents Title Page i CERTIFICATE ii COMPLIANCE CERTIFICATE iii THESIS APPROVAL CERTIFICATE iv DECLARATION OF ORIGINALITY v Acknowledgment vi Table of Contents vii List of Figures x Abstract xiii Chapter 1 Introduction 1 1.1 Edge Detection: Analysis 3 1.1.1 Fuzzy Logic in Image Processing 4 1.1.2 Fuzzy Logic for Edge Detection 5 1.1.3 Cellular Learning Automata 6 Chapter 2 Literature Review 7 2.1 Edge Detection: Methodology 7 2.1.1 First Order Derivative Edge Detection 7 2.1.1.1 Prewitts Operator 7 2.1.1.2 [pic] Sobel Operator 8 2.1.1.3 Roberts Cross Operator 11 2.1.1.4 Threshold Selection 11 2.1.2 Second Order Derivative Edge Detection 11 2.1.2.1 Marr-Hildreth Edge Detector 11 2.1.2.2 Canny Edge Detector 12 2.1.3 Soft Computing Approaches to Edge Detection 13 2.1.3.1 Fuzzy Based Approach 14 2.1.3.2 Genetic Algorithm Approach 14 2.1.4 Cellular Learning Automata 15 Chapter 3 Fuzzy Image Processing 18 3.1 Need for Fuzzy Image Processing 19 3.2 Introduction to Fuzzy sets and Crisp sets 20 3.2.1 Classical sets (Crisp sets) 20 3.2.2 Fuzzy sets 21 3.3 Fuzzification 22 3.4 Membership Value Assignment 22 3.5...

Words: 9151 - Pages: 37

Free Essay

Polygraphy

...INTRODUCTION: The idea of using a polygraph for lie detection emerged at the end of the nineteenth century. Despite major technological advances in the twentieth century, the polygraph has evolved little since its invention. The polygraph works under the assumption that lies can be detected by certain measurable physiological changes, a theory proposed more than 100 years ago. The three physiological vectors measured in polygraphs in the 1920s cardiovascular, respiratory and perspiratory activities are still measured by modern polygraphs. Although the polygraph is still widely used, critics question its accuracy because of the subjectivity involved in the test. Recent technological breakthroughs have created new machines for lie detection. However, since many of these new technologies still operate under questionable assumptions, they are still prone to error and misinterpretation. Perhaps one of the most fascinating and misunderstood tools of the criminal justice and criminology industry is the polygraph exam, more commonly known as the lie detector test. While the tests are based on relatively simple scientific principles, not just anyone can strap you up to an instrument and start firing away with questions. Lie detector tests are instead conducted by highly trained and disciplined technicians, known as polygraph examiners. LIE DETECTION AND FORENSIC PSYCHOPHYSIOLOGY * Lie Detection * It is also referred to as deception detection which uses questioning techniques along with...

Words: 3604 - Pages: 15

Free Essay

Lie Detector

...measure: rate ▶ Respiratory ▶ Blood ▶ Arm rate pressure and leg motion ▶ Electrodermal activity LIE DETECTION ▶ Lie detection, also referred to as deception detection, uses questioning techniques along with technology that record physiological functions to ascertain truth and falsehood in response. It is commonly used by law enforcement and has historically been an inexact science. Manufacturers of lie Detectors ▶ Lie detector manufacturer Nemesysco ▶ Lafayette Instrument Company  ▶ Axciton Systems ▶ Limestone Technologies Inc. ▶ Stoelting Company Evolution ▶ From the onset of civilization:there has been a compelling need to determine the truthfulness of individuals when transgressions have occurred. ▶ Over the centuries: there have been many efforts to refine the rule of ‘two or more witnesses’ with additional methods of truth verification. An example of this would be circa 500 B.C. in India Evolution conti.. ▶ The first recorded effort: In 1885 Lombroso was recording changes in blood pressure in police cases in Italy with some success. ▶ The next innovation :in lie detection came in 1914 when Vittorio Benussi measured breathing to determine truthfulness. ▶ In 1920 John Larson:was the 1st to record at one time for the purpose of lie detection both breathing & pressure Evolution cont… ▶ In the 1930's:Leonard Keeler incorporated the GSR into his polygraph and...

Words: 1002 - Pages: 5

Free Essay

Eigrp

...Design Project Submitted in partial fulfillment of the requirements for the degree of Bachelor of Science Department of Electrical and Computer Engineering Union College Steinmetz Hall Schenectady, New York 12308 U.S.A. Submitted May 30, 2003 Final Project Report Senior Capstone Design Project, Department of Electrical and Computer Engineering Union College, 2003. © 2003 Douglas Lockett, Christopher Roblee Lockett, Roblee Page 2 of 48 6/3/2003 Table of Contents: Abstract……………………………………………………………………………….3 1. Introduction…………………………………………………………………………..4 2. Theory of Multiplierless Arithmetic………………………………………………...5 3. Image Filters 3.1. Motivations for IIR vs. FIR……………………………………………………....7 3.2. Edge Detection …………………………………………………………………..8 3.3. Canny Edge Detection……………………………………………………………9 4. Genetic Algorithms 4.1. Motivations……………………………………………………………………...10 4.2. Basic Theory…………………………………………………………………….10 4.3. Description of the Designed Genetic Algorithm………………………………..13 4.3.1. Fitness Function Definition and Crossover Selection…………………...17 4.3.2. Magnitude Response and Relative Error………………………………...19 4.3.3. GA Parameters…………………………………………………………...19 5. Results 5.1. Magnitude Frequency Analysis ……………………………………………...…21 5.2. Spatial Analysis…………………………………………………………………24 5.3. Sample Filter Output…………………………………………………………….25 6. Comparative Analysis of Computational Complexity Between Multiplierless and Conventional Design Methodologies 6.1. FPGA Case ……………………………………………………………………..28...

Words: 9389 - Pages: 38

Free Essay

Change of Use

...refurbishment of a building and the way it is to be used will change. What is the key thing to consider from a life safety perspective? When a fire detection system is first commissioned it is configured around a specific building layout and occupancy patterns. If these change for any reason it is crucial to ensure that it continues to do the job it was originally designed to do, so that occupants are protected and can egress the building safely in an emergency. Changes to the way a building or a room is configured and used can go unnoticed. Take a look around the room you’re in now – what's changed from this time last year? The chances are more than you initially think, with new equipment, additional employees, storage areas and workstations. Building owners and managers should also consider what I term ‘the importance scale’. They should decide just how important things are within a building when planning changes – does the importance lie with fixtures and fittings, technology, comfort, security or life safety? Put simply, I have never come across a £500 leather executive chair and £1,000 Iroko wooden desk that can protect life and property as well as a £30 smoke detector! Is it necessary to completely replace an existing fire detection system if a building changes its use? In the vast majority of cases, no. However, change of use could require modifications to the fire detection system, such as additional detection and alarm devices. This will become apparent after a...

Words: 877 - Pages: 4

Free Essay

Lan Upgrade

...Collisions are occurring on a regular basis and the band is insufficient. 2. No central management for the 50 networked printers and there queues. 3. Current bandwidth is 10 Mbps 4. HVAC technician would like wireless access points 5. The 23 new classrooms are not on the network 6. New wing has slow connections to the mail server 7. The IT Director would like to to integrate VoIP into the current data network 8. Backbone miss-cabled Solution The correction of the limited bandwidth is the first priority. Re-cabling the current network with Category 6 UTP 1000Base F Ethernet cabling because it increases maximum data rate, from 10 Mbps to 1 Gbps. Ethernet will also allow for the use of Carrier Sense Multiple Access with Collision Detection (CSMA/CD) which can be assigned on the workstation NIC. This bandwidth increase will resolve the HVAC Technicians access issue, congestion issues for the classrooms, allows for VoIP integration and provides for future expansion. Replacing the twisted-pair on the backbone with Fiber 1000Based-F will give continued Gigabit throughput and eliminate the remote mail server issue. The use of Fiber will eliminate the 120 distance issue also between the new and old wings and allow for further expansions. A server farm needs to be stood up to include a domain controller, print server and file server will need to be completed. This server farm will allow for overall, central management of users, printers and fill access. This also allows central...

Words: 406 - Pages: 2

Premium Essay

Chapter 7 Review Questions

...traffic, and host-based IDPS stays on a particular computer or server and monitors that system. 4. Signature-based IDPS examine data traffic for patterns that match signatures, and behavior-based IDPS collect data from normal traffic and establish a baseline. 5. A switched-port analysis port is a data port on a switched device that copies all designated traffic from the switch device so the traffic can be stored and analyzed for IDPS. 6. In the Centralized control strategy all IDPS control functions are implemented and managed in a central location. Fully-Distributed is the opposite of Centralized, and in this strategy each monitoring site uses its own paired sensors to perform its own control functions to complete necessary detection, reaction, and response functions. 7. Honeypots are decoy systems designed to lure potential attackers away from critical systems. When more than one honeypot is connected to a number of honey pot systems on a subnet it’s called a honeynet. 8. A padded-cell is a tougher honeypot, when its detected attackers it smoothly sends them to a special stimulated environment where they can no longer cause harm. 9. Network footprinting is the organized research of the internet addresses owned or controlled by a target organization. 10. Network fingerprinting is a survey of all the target organization’s internet addresses that are collected during footprinting. 11. Fingerprinting relies on footprinting for data 12. Because it...

Words: 541 - Pages: 3

Free Essay

Identifying the Troubled Employee

...according to you, are some of the signs of a troubled employee that you have noticed? Changes in employee behavior can signify that an individual may have a personal problem that is interfering with their work performance. There are “red flags” in an employee’s behavior that can be used as indicators. There is usually no single event, but rather a noticeable pattern of change in the employee’s behavior, attitude or work activity. Individually, these signs may seem harmless enough but taken together they may represent a serious problem. It is important to avoid ignoring the initial indicators. These are some of the signs that might help you identify an employee who has a problem. Work Related     Unable to concentrate on work and complete the given task/activities on time. Errors in the task completed Making excuses for substandard work Procrastination, inability to concentrate Self       Major changes in personal appearance, attitude or behavior Problems with family, friends, co-workers, legal issues, financial issues Heightened anxiety, overly defensive 2.         Have you come across any such individual/s at your organisations? YES 3. How have you handled the situation? A ONCE-to-be valuable and productive employee unexpectedly starts turning in less than an acceptable worker. More often than not, the root cause of such dramatic behavioural change is troubles - either personal or professional. Most employees develop some problems at some...

Words: 827 - Pages: 4

Free Essay

Research

...measured blood pressure and pulse to assess the honesty of persons suspected of criminal conduct. His device was called a hydrosphygmograph. The theory behind polygraph tests is that when a subject is lying in response to a question, he/she will produce physiological responses that are different from those that arise in the normal course. During the polygraph examination, several instruments are attached to the subject for measuring and recording the physiological responses. The examiner then reads these results, analyzes them and proceeds to gauge the credibility of the subject's answers. Instruments such as cardiographs, pneumographs, cardio-cuffs and sensitive electrodes are used in the course of polygraph examinations. They measure changes in various aspects such as respiration, blood pressure, blood flow, pulse and galvanic skin resistance. There are three prominent polygraph examination techniques: i. The relevant-irrelevant (R-I) technique ii. The control question (CQ) technique iii. Directed Lie-Control (DLC) technique Each of these techniques includes a pre-test interview during which the subject is acquainted with the test procedure and the examiner gathers the information which is needed to finalize the questions that are to be asked....

Words: 1790 - Pages: 8

Premium Essay

The Hacker in All of Us

...Now Business or Corporate users usually have an entire department dedicated to protecting them so they are less vulnerable. 2. What is the magnitude of the risk? That is, if security is compromised, what is the potential cost to the victim? Again this will depend on the user. Your average home users will run the risk of viruses, loss of data due to system crash and identity theft if they are not careful. With the Business or Corporate users the magnitude of the risk is much greater. If it is a financial institute, we could be talking millions of dollars at risk if security is compromised. 3. What policies and procedures can you suggest to counter the types of threats illustrated in this case study? * Intrusion Detection: A security service that monitors and analyzes system events for the purpose of finding and providing real-time or near-real-time warning of, attempts to access system resources in an unauthorized manner. * If an intrusion is detected quickly enough, the intruder can be identified and ejected from the system before any damage is done or any data compromised. * An effective IDS can serve as...

Words: 530 - Pages: 3