EQUALITY IN BETWEEN ITERATIVE SOFT DILATION AND ITERATIVE SOFT CLOSE IN MULTI SCALE ENVIRONMENT
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 5
Abstract
In this paper, equality is established and discussed in between soft dilation and soft close in multi scale environment as well as in iterative environment. Soft erosion and soft dilation will exist for various thresholds. So soft open and soft close also exist for various thresholds. If definition for soft erosion and soft dilation are studied (5 ),then some type of equalities are viewed among soft morphological operations. So equality may be established in between softerosion and soft dilation in multi scale environment (47).open and close are composite operations.So soft open and soft close are also composite operations which will exist at various thresholds. Equality may be viewed among all soft morphological operations. As part of that ,in this paper equality may be established in between soft dilation and soft close in multi scale as well as iterative environment.A very important point is that equality does not exist in mathematical morphology but will exist in soft mathematical morphology.
Authors and Affiliations
Kompella venkataramana Ph. D
EXTRACT THE PUNJABI WORD WITH EDGE DETECTOR FROM MACHINE PRINTED DOCUMENT IMAGES
Optical character recognition is the essential area of research in the world. Text segmentation and extraction is an important task under the OCR System. OCR system depends on the quality of the input document and type o...
An Improved Algorithm for Text Document Clustering
Due to the advancement of internet, the volume of the electronic documents available on the web is increasing day by day. Document clustering plays important role in organization and summarization of these documents. Thu...
A Systematic Survey report on Various Frameworks and Models for Verification of Choreography in SOA
Service- Oriented Architecture (SOA) is a mainstream strategy for improving IT performance. Web Services are self-contained internet enabled applications which are capable of performing business activities. Web Services...
Enhancing The Security of Caesar Cipher Using Double Substitution Method
Cryptography comes from the Greek words for “secret writing”. The plain text is encrypted into the corresponding cipher text, using an algorithm and a key. Substitution and Transposition are two techniques used for conve...
Performance Evaluation of Edge-based Video Error Concealment using H.264 Flexible Macroblock Ordering
This paper evaluates the directional interpolation scheme used widely for spatial error concealment in the H.264/AVC video coding standard using Flexible Macroblock Ordering (FMO). A mathematical analysis of FMO is prese...