Free Essay

The Mid Point Algorithm

In:

Submitted By induni
Words 822
Pages 4
* Midpoint Algorithm for the line of 1<m<∞

| | | M1N pixel | M2NE pixel | | M | | |

The equation for the line ax + by + c = 0 1 The equation for the M point: d – Equation for the first midpoint d = a(x+1/2) + b(y+1) + c d = ax + by + c + a/2 + b d = 0 + a/2 + b d = a/2+b
×2
d = a + 2b 2 By substituting the value fora and b we will able to find the value of d. If d > 0, then we will select the N (North) pixel If d < 0, then we will select NE (Northeast) pixel

Then there are two possibilities to go the line through M1 or M2
Equation for the above two points; M1 and M2
M1:
d1 – Equation for the M1 midpoint d1 = a(x+1/2) + b(y+2) + c d1 = ax + by + c + a/2 +2 b d1 = 0 + a/2 + 2b
×2;
d1= a+4 b 3
3 – 2;d b = d1 – d d1 = b + d 4
The equation for the M1 is d1 = b+d

M2 :

d2 – Equation for the M2 midpoint

d1 = a(x+3/2) + b(y+2) + c d1 = ax + by + c +3 a/2 +2 b d1 = 0+ 3a/2 + 2b
×2;
d2 = 3a +4b 5
5 – 2; a + b = d2 – d d2 = a + b + d 6
The equation of the M2 midpoint is d1 = a + b + d

As mentioned above the algorithm chooses between N and NE pixels on the sign of the decision variable calculated in previous method. * Algorithm for the ellipse
The equation for the ellipse is : x2/a2 + y2/b2 = 1 x2/a2 + y2/b2 – 1 = 0 x2 b2 + y2 a2 - a2 b2 = 0

Center of the ellipse (x,y) = (0,0) a = rx , b = ry
The first point is considered from the origin (x,y) = (0,b)

The ellipse has 4 -fold symmetry, so that we have to consider ¼ of the ellipse to implement the algorithm. When we consider about the first region of the ellipse, m<0
In region 2 of the ellipse, m>0
Therefore we must find the point which changes the direction.

Direction Changing Criterion
Scenario 1 - Region 1:
∂f(x,y)∂x - ∂f(x,y)∂y< 0
2b2x - 2a2y< 0 b2x - a2y< 0
÷2,
b2x < a2y
In this region, units steps at x direction.

In the first scenario we can choose East pixel and SouthEast pixels d = initial decision variable. d = X2b2 + Y2a2 - a2b2 d= (x+1)2b2 +(y-1/2)2 - a2b2 d = x2b2 + y2a2 - a2b2 + 2b2x + b2 - a2y + a2/4

d = 0 + 2b2x + b2 - a2y + a2/4 ;Since at the beginning x =0 and y = b the equation finally would be like below. d = b2 –a2b + a2/4 1 if d < 0 we choose E pixel if d >= 0 we choose SE pixel.
If we consider d<0 ; next pixel is E, de = X2b2 + Y2a2 - a2b2 de = (x+2)2b2 +(y-1/2)2 - a2b2 de = x2b2 + y2a2 - a2b2 + 4b2x + 4b2 - a2y + a2/4 de = 0 + 4b2x +4b2 - a2y + a2/4 de-d = (4b2x +4b2 - a2y + a2/4) –( 2b2x + b2 - a2y + a2/4) de= 2b2x +3b2 + d 2

If we consider d >= 0 ; next pixel is SE, dse = X2b2 + Y2a2 - a2b2 dse = (x+2)2b2 +(y-3/2)2 - a2b2 dse = x2b2 + y2a2 - a2b2 + 4b2x + 4b2 - 3a2y + 9a2/4 dse = 0 + 4b2x +4b2 - 3a2y + 9a2/4 dse-d = (4b2x +4b2 -3 a2y + 9a2/4) –( 2b2x + b2 - a2y + a2/4) dse= 2b2x +3b2 -2a2y + 2 a2+ d dse= b2 (2x+3) +a2(-2y + 2) + d 3

Scenario 2 - Region 2:

∂f(x,y)∂x - ∂f(x,y)∂y>= 0
2b2x - 2a2y>= 0 b2x - a2y>= 0 b2x >= a2y
In this region, units steps at y direction.

In the first scenario we can choose South pixel and SouthEast pixels d = initial decision variable. d = x2b2 + y2a2 - a2b2 d= (x+1/2)2b2 +(y-1)2 - a2b2 d = x2b2 + y2a2 - a2b2 + b2x + b2/4- 2a2y + a2

d = x b2 + b2/4- 2a2y + a24

If d< 0 , choose SE pixel.
If the next pixel is SE, dse= x2b2 + y2a2 - a2b2 dse = (x+3/2)2b2 +(y-2)2 - a2b2 dse= x2b2 + y2a2 - a2b2 +6 b2x/2 + 9b2/4- 4a2y + 4a2 dse= 0 + 6 b2x/2 + 9b2/4- 4a2y + 4a2 dse - d= (3xb2 + 9b2/4- 4a2y + 4a2) – (x b2 + b2/4- 2a2y + a2)

dse - d= b2(2x+2) + a2(-2y+3) 5

If d>= 0 , choose S pixel.
If the next pixel is S,

ds = x2b2 + y2a2 - a2b2 ds = (x+1/2)2b2 +(y-2)2 - a2b2 ds= x2b2 + y2a2 - a2b2 +6 b2x/2 + 9b2/4- 4a2y + 4a2 ds = 0 + b2x + b2/4- 4a2y + 4a2 ds - d= (xb2 + b2/4- 4a2y + 4a2) – (x b2 + b2/4- 2a2y + a2)

ds= -2a2y+3a2+ d

ds - d= a2(-2y+3) 6

Similar Documents

Free Essay

Student

...should be addressed; E-Mail: migue@bioplantas.cu; Tel.: +53-33-224-016. Received: 25 January 2012; in revised form: 28 February 2012 / Accepted: 28 February 2012 / Published: 8 March 2012 Abstract: Improving fingerprint matching algorithms is an active and important research area in fingerprint recognition. Algorithms based on minutia triplets, an important matcher family, present some drawbacks that impact their accuracy, such as dependency to the order of minutiae in the feature, insensitivity to the reflection of minutiae triplets, and insensitivity to the directions of the minutiae relative to the sides of the triangle. To alleviate these drawbacks, we introduce in this paper a novel fingerprint matching algorithm, named M3gl. This algorithm contains three components: a new feature representation containing clockwise-arranged minutiae without a central minutia, a new similarity measure that shifts the triplets to find the best minutiae correspondence, and a global matching procedure that selects the alignment by maximizing the amount of global matching minutiae. To make M3gl faster, it includes some optimizations to discard non-matching minutia triplets without comparing the whole representation. In comparison with six verification algorithms,...

Words: 6435 - Pages: 26

Premium Essay

Cis115

...Week 2 Activity—Game Seating Charges ------------------------------------------------- TCO 2—Given a simple problem, design a solution algorithm that uses arithmetic expressions and built-in functions. Assignment Your goal is to solve the following simple programming exercise. You have been contracted by a local stadium to design an algorithm determining the total seating charges for any game held at the stadium. Lower level seats cost $25 per seat, midlevel seats cost $15 per seat, and upper level seats cost $10 per seat. The algorithm should ask the user for the number of seats being purchased in each seating level. Then, the algorithm will determine the total for each level and a grand total for the entire purchase. Be sure about the logic and design first (IPO chart, flowchart, and pseudocode). Advanced (optional): Use constants for the per-seat cost for each level. Rubric Complete the steps and submit the completed file to the Dropbox. 1) Variable list 2) IPO chart 3) Flowchart 4) Pseudocode 5) Desk-check Game Seating Charges | Document | Points possible | Points received | Variable list | 4 | | IPO chart | 4 | | Flowchart | 4 | | Pseudocode | 4 | | Desk-check | 4 | | Total Points | 20 | | 1) Variable List List all the variables you will use (use valid variable names). Indicate whether the data type is string, integer, or double, and so on. lowerLevelSeatQuantity Integer lowerLevelAmount Real Number midLevelSeatQuantity...

Words: 707 - Pages: 3

Premium Essay

Operations Research and Its Prospects in Pakistan

...Operations Research and its Prospects in Pakistan Prof. Dr. Shoaib ud Din Mathematics Department Punjab University, Lahore, Pakistan Operations Research has had an increasingly great impact on the management of organizations in the recent years. In fact, with the exception of advent of electronic computer, the extent of this impact seems to be unrivalled by that of any other recent development. However, all the development in this field has gone almost unnoticed in most developing countries including Pakistan. This article is an effort to introduce Mathematics community in the country to the subject and its achievements. A brief history In order to appreciate the importance of OR in the world today it is important that we know something of its history and evolution. Although roots of Operations Research can be traced back many decades, it is generally agreed that this discipline began during World War II. During the War team of British scientists with diverse background were called upon to study the strategic and tactical problems associated with air and land defense of the country. The establishment of this scientific team marked the first formal Operations Research activity. Their efforts were allegedly instrumental in winning the Air Battle of Britain, The Island Campaign in the Pacific, the Battle of the North Atlantic, and so on. The name Operations Research-Operational Research in the United Kingdom – was apparently coined because the problems assigned to this team...

Words: 1347 - Pages: 6

Free Essay

Areviewofwavelet

...A Review of Wavelet-domain Watermarking Techniques Mukul Salhotra, Shivam Maurya, Shashvat Jaiswal, Amit Kumar Singh Department of CS/ICT, Jaypee University of Information Technology Abstract--As networking continues to grow exponentially, the Intellectual Property Rights (IPR) can be obtained and reproduced easily. These threats create a high demand for a content protection technique such as digital watermarking; which is one of the most efficient ways to protect the digital properties in recent years. Image watermarking techniques are frequently applied in the transform and spatial domains to achieve desired secure and robust protection. This paper provides an overview of the wavelet-based watermarking techniques available for medical images until now. In this paper the major methods have been analyzed along with their advantages & disadvantages. Keywords: Discrete Wavelet Transform, Medical image watermarking, ROI, NROI, I. INTRODUCTION D igital watermarking has emerged as a research area that was originally focused on copyright protection. Also, it has been implemented in lot of domains, such as video, audio, image, and 3D graphic model. Despite the fact there are only a few medical oriented watermarking studies in the literature to date, digital watermarking will be a valuable tool for copyright protection with medical confidentiality protection, patient and examination-related information hiding, data integrity control and source identification, in Hospital Information...

Words: 3893 - Pages: 16

Premium Essay

Research

...ISS334: Information Systems Security (Project Description) * Each student work alone in this project (individual project). * Each student is required to complete a mid-size project, which includes proposal, implementation, and final demo or paper. * Students will be grouped into teams for the sake of presentations at the end of the semester. Marks allocated for each individual piece of the project are as follows: a) Proposal – 10% b) Project write-up – 22% c) Presentation – 8% Projects include but are not limited to: * Research Paper * You can work on original research problems. The outcome should be a paper with original technical contribution. Your grade on this will be judged on originality, soundness of the approach, and quality of presentation.  * Example Topics: * Vulnerability Analysis * Wireless Security * Intrusion Detection  * Authentication * Access Control * Authorization * DNS Security * Digital Watermarking * New Attacks * Survey Paper * You can write a paper that surveys a particular field on information security. The outcome should be a paper that summarizes the trend in the field you have chosen. Your grade will be judged on the completeness of the survey, the quality of the trend analysis, and the quality of presentation. * Example topics: * Vulnerability Analysis * Wireless...

Words: 1209 - Pages: 5

Free Essay

Google Case

...mover advantage. Downstream competitive advantage: Innovation and Expansion of its traditional Web Internet services. Brin & Page saw this unmet need for a quicker and better search engine and developed an all-together new algorithm for Google, providing benefit of relevant, to the point, and quick search. 1998: PageRankTM Algorithm favored pages that were referred by other pages and was determined by counting its inbound link. Till now the only source of revenue was licensing search technology to other search engines, no advertising revenues. Dec 1999: Paid Listing, cost per impression basis, i.e. they changed advertisers each time user views thread irrespective of clicking on the link. Mid 2001: Without spending on Marketing, Google became the 9th largest website in US. 2002: Google adopted a variant of cost per click (CPC) model. They weighted CPC by actual click through rate (CTR) to its expected CTR, i.e. Ads with higher CTR received more prominent position and vice-versa. This maximized their revenue. Google launches Froogle, a product search that identifies merchants for specific products along with prices. Merchants paid neither for their products to appear nor for referral fees when user clicked. May 2002: AOL switches fully to Google Algorithm and paid listing. March 2003: Launches contextual paid listing called AdSense, presented Ads on webpages with primarily editorial context. Jan 2004: Google launched personalized search, worked as per users past search and...

Words: 493 - Pages: 2

Free Essay

Fuzzy and Cla Based Edge Detection Method

...Learning Automata 6 Chapter 2 Literature Review 7 2.1 Edge Detection: Methodology 7 2.1.1 First Order Derivative Edge Detection 7 2.1.1.1 Prewitts Operator 7 2.1.1.2 [pic] Sobel Operator 8 2.1.1.3 Roberts Cross Operator 11 2.1.1.4 Threshold Selection 11 2.1.2 Second Order Derivative Edge Detection 11 2.1.2.1 Marr-Hildreth Edge Detector 11 2.1.2.2 Canny Edge Detector 12 2.1.3 Soft Computing Approaches to Edge Detection 13 2.1.3.1 Fuzzy Based Approach 14 2.1.3.2 Genetic Algorithm Approach 14 2.1.4 Cellular Learning Automata 15 Chapter 3 Fuzzy Image Processing 18 3.1 Need for Fuzzy Image Processing 19 3.2 Introduction to Fuzzy sets and Crisp sets 20 3.2.1 Classical sets (Crisp sets) 20 3.2.2 Fuzzy sets 21 3.3 Fuzzification 22 3.4 Membership Value Assignment 22 3.5 Defuzzification 23 3.6 Enhancing Edges Using Cellular Learning Automata 26 3.6.1 Divide the Edgy Image Into Overlapping 3 × 3 Windows 26 3.6.2 Penalty and Rewards. 27 Chapter 4 Implementation 30 4.1 Simple algorithm for edge detection using Fuzzy Logic 30 Chapter 5 Conclusion 38 References 39 Appendix A : Acronyms 41 Appendix B : Review Card 42 Appendix C: Compliance Report of Review...

Words: 9151 - Pages: 37

Free Essay

Bluetooth Network Security

...TECHNOLOGY A seminar report on GENETIC ALGORITHMS Submitted by Pranesh S S 2SD06CS061 8th semester DEPARTMENT OF COMPUTER SCIENCE ENGINEERING 2009-10 1 VISHVESHWARAIAH TECHNOLOGICAL UNIVERSITY S.D.M COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE ENGINEERING CERTIFICATE Certified that the seminar work entitled “GENETIC ALGORITHMS” is a bona fide work presented by Pranesh S S bearing USN NO 2SD06CS061 in a partial fulfilment for the award of degree of Bachelor of Engineering in Computer Science Engineering of the Vishveshwaraiah Technological University, Belgaum during the year 2009-10. The seminar report has been approved as it satisfies the academic requirements with respect to seminar work presented for the Bachelor of Engineering Degree. Staff in charge SANTOSH DESHPANDE SIR Name: Pranesh S S USN: 2SD06CS061 H.O.D 2 INDEX 1. INTRODUCTION 2. HISTORY 3. DEFINITION AND EXPLANATION 4. NEED FOR GENETIC ALGORITHM 5. IMPORTANCE OF GAOVER OTHER TECHNIQUES? 6. WORKING OF GA 6.1 BASIC DESCRIPTION 6.2 GENERAL ALGORITHM 7. IMPLEMENTATION 8. EXAMPLE-A SIMULATION BY HAND 9. ADVANTAGES AND DISADVANTAGES 10. CONCLUSION 11. REFERENCES 4 4 5 5 6 6 7 7 8 11 12 13 13 3 Abstract Genetic Algorithms have recently become a popular artificial technique for solving complex optimization problems and a sophisticated tool for machine learning. This paper provides an introduction to genetic algorithms and brief applicability to problems. There...

Words: 2516 - Pages: 11

Premium Essay

Budget Analysis

...and multi-SKU transportation), Conversion of transshipment model into classic transportation model. Text: BRS 5.4, 5.5 Class 4: Assignment problem Binary ILP formulation, solution by Hungarian method Text: BRS 5.6 Class 5: Network models Shortest path problem, Minimal spanning tree Text: BRS 5.8, 5.9 Class 6: Game theory Introduction to game theory: Types of game, Two person zero-sum game, concept of saddle point, dominance rule Text: WW 14.1, 14.2 Class 7: Game theory (contd.) Mixed startegy, Linear programming formulation Text: WW 14.2, 14.3 Class 8: Mid-term Test Class 9: Markov chain Introduction to stochastic processes, markov chains, transition probability matrix, steadystate probabilities. Text: Handouts and WW 17.1, 17.2, 17.3 Class 10: Decision theory Decision making under uncertainty, Decision criteria, Decision Tree Text: BRs 8.1, 8.2, 8.3, 8.4, 8.6 Class 11: Decision theory (contd.) Decision making under risk, EVPI, EVSI Text: 8.5, 8.8, 8.9 Class 12: Travelling Salesman Problem Optimization model formulation, solution approaches, Branch and bound algorithm Text: handouts and WW 9.6 Class 13: Case Study / Revision Class 14: Case study / Revision Software packages: MS Excel Text book 1. (BRS) Balakrishnan N, Render B, Stair Jr. RM (2007) Managerial decision modelling with spreadsheets (2nd Ed.), Pearson education. 2. (WW) Winston, W.L.:...

Words: 354 - Pages: 2

Premium Essay

Ms Summart

...Management Science Summary Definitions by Subject Game theory * Nash equilibrium * In game theory, the Nash equilibrium is a solution concept of a non-cooperative game involving two or more players, in which each player is assumed to know the equilibrium strategies of the other players, and no player has anything to gain by changing only their own strategy. If each player has chosen a strategy and no player can benefit by changing strategies while the other players keep theirs unchanged, then the current set of strategy choices and the corresponding payoffs constitute a Nash equilibrium. * Stated simply, Amy and Wili are in Nash equilibrium if Amy is making the best decision she can, taking into account Wili's decision, and Wili is making the best decision he can, taking into account Amy's decision. Likewise, a group of players are in Nash equilibrium if each one is making the best decision that he or she can, taking into account the decisions of the others. * Pareto efficiency * Pareto efficiency, or Pareto optimality, is a state of allocation of resources in which it is impossible to make any one individual better off without making at least one individual worse off. The term is named after Vilfredo Pareto (1848–1923), an Italian economist who used the concept in his studies of economic efficiency and income distribution.The concept has applications in academic fields such as economics and engineering. * Given an initial allocation of goods among...

Words: 3775 - Pages: 16

Premium Essay

Tiles

...Non-Majors with Flowcharts Martin C. Carlisle, Terry A. Wilson, Jeffrey W. Humphries, Steven M. Hadfield United States Air Force Academy Department of Computer Science 2354 Fairchild Dr, Suite 6G149 USAFA, CO 80840-6234 {Martin.Carlisle,Jeffrey.Humphries,Steven.Hadfield}@usafa.af.mil ABSTRACT When students are learning to develop algorithms, they very often spend more time dealing with issues of syntax than solving the problem. Additionally, the textual nature of most programming environments works against the learning style of the majority of students. RAPTOR is a flowchart-based programming environment, designed specifically to help students visualize their algorithms and avoid syntactic baggage. RAPTOR programs are created visually and executed visually by tracing the execution through the flowchart. Required syntax is kept to a minimum. Students preferred using flowcharts to express their algorithms, and were more successful creating algorithms using RAPTOR than using a traditional language or writing flowcharts without RAPTOR. Categories and Subject Descriptors D.1.7 [Visual Programming] General Terms Languages, Algorithms. Keywords Flowcharts, Visual Programming, Programming Environments, Problem Solving. 1. INTRODUCTION Shackelford and LeBlanc[6] previously observed that the use of a particular programming language in an introduction to computing course tends to “annoy and distract attention from the core issue of algorithmic problem solving.”...

Words: 3019 - Pages: 13

Free Essay

Cis 1700

...Question 1 2 out of 2 points The operating system manages each and every piece of hardware and software. Selected Answer: True Correct Answer: True Question 2 2 out of 2 points The Memory Manager, the Interface Manager, the User Manager, and the File Manager are the basis of all operating systems. Selected Answer: False Correct Answer: False Question 3 2 out of 2 points Networking was not always an integral part of operating systems. Selected Answer: True Correct Answer: True Question 4 2 out of 2 points The high-level portion of the Process Manager is called the Process Scheduler. Selected Answer: False Correct Answer: False Question 5 2 out of 2 points The Device Manager monitors every device, channel, and control unit. Selected Answer: True Correct Answer: True Question 6 2 out of 2 points When the Processor Manager receives a command, it determines whether the program must be retrieved from storage or is already in memory, and then notifies the appropriate manager. Selected Answer: True Correct Answer: True Question 7 2 out of 2 points The central processing unit (CPU) is the brains of the computer with the circuitry to control the interpretation and execution of instructions. Selected Answer: True Correct Answer: True Question 8 2 out of 2 points The supercomputer was developed...

Words: 2638 - Pages: 11

Free Essay

Ofdm

...Document Type: Prentice Hall Author: John G. Proakis and Masoud Salehi Book: Communication Systems Engineering Copyright: 2002 ISBN: 0-13-061793-8 NI Supported: No Publish Date: Sep 6, 2006 Multicarrier Modulation and OFDM Overview This tutorial is part of the National Instruments Signal Generator Tutorial series. Each tutorial in this series, will teach you a specific topic of common measurement applications, by explaining the theory and giving practical examples. This tutorial covers multicarrier modulation and OFDM. For additional signal generator concepts, refer to the Signal Generator Fundamentals main page. Table of Contents 1. Multicarrier Modulation and OFDM 2. Further Reading 3. Relevant NI products Multicarrier Modulation and OFDM In the preceding sections, we considered digital transmission through nonideal channels and observed that such channels cause intersymbol interference when the reciprocal of the system rate is significantly smaller than the time dispersion (duration of the impulse response) of the nonideal channel. In such a case, a channel equalizer is employed at the receiver to compensate for the channel distortion. If the channel is a bandpass channel with a specified bandwidth, the information-bearing signal may be generated at the baseband and then translated in frequency to the passband of the channel. Thus, the information-bearing signal is transmitted on a single carrier. We also observed that intersymbol interference usually results...

Words: 2381 - Pages: 10

Free Essay

Title Paper

...University of Pune, , India akirti2008@gmail.com, k_adoni@rediffmail.com 2 College of Engineering, University of Pune, India rdj.extc@coep.ac.in ABSTRACT Mobile Adhoc Network (MANET) eliminates the complexity associated with an infrastructure networks. Wireless devices are allowed to communicate on the fly for applications. It does not rely on base station to coordinate the flow of the nodes in the network. This paper introduces an algorithm of multipath OLSR (Optimized Link State Routing) for energy optimization of the nodes in the network. It is concluded that this solution improves the number of nodes alive by about 10 to 25% by always choosing energy optimized paths in the network with some increase in normalized routing overheads. KEYWORDS OLSR, multipath, Energy Optimization, Nodes Alive, Overheads 1. INTRODUCTION A Mobile Adhoc NETwork (MANET) is a multi-hop, distributed and self configuration network[1].The communication between two distant nodes is through the number of intermediate nodes which relays the information from one point to another. As nodes can move randomly within the network, routing packets between any pair of nodes become a challenging task. A route that is believed to be optimal for energy utilization at certain time might not be optimal at all, few moments later.[4] Traditional proactive routing protocols[3,5] maintain routes to all nodes. Even if traffic is unchanged, repeated topology interaction happens among nodes. Also, they require periodic...

Words: 3772 - Pages: 16

Free Essay

Image Analysis of Radiograph​Ic Scans for Detection of Threats in Cargo Containers​

...Wilbert A. McClay Email1: mcclay.w@husky.neu.edu Email2: wilmcclay@gmail.com Homeland Security Radiographic Image Analysis Project Image Analysis of Radiographic Scans for Detection of Threats in Cargo Containers Motivation The current standard methods for examining containers that pose a potential terrorist threat involve Department of Homeland Security (DHS) officers generally conducting either non-intrusive or physical inspections. The non-intrusive inspection (NII) involves use of X-ray or gamma ray scanners to generate an image of the contents, which DHS officers review for anomalies. DHS officers also scan cargo using radiation detection devices. When an irregularity is identified, officers may physically examine all or a portion of the container’s contents (see Figure 1 below). [pic] Figure 1: Cargo container being examined by portable VACIS system. Problem Importance The methods implemented will enable the identification and evaluation of cargo radiographic images having an extremely widespread and powerful impact for Homeland Security. Project Description Radiographic imaging has become an important tool for screening cargo containers for potential nuclear or radiological threats. We are investigating methods to extract features from these images that effectively characterize the contents and when combined with other measurements and information could indicate whether or not a threat is present. Analysis...

Words: 2050 - Pages: 9