Scanning Electron Microscope (SEM) as one of the major research and industrial equipment for imaging of micro-scale samples and surfaces has gained extensive attention from its emerge. However, the ...acquired micrographs still remain two-dimensional (2D). In the current work a novel and highly accurate approach is proposed to recover the hidden third-dimension by use of multi-view image acquisition of the microscopic samples combined with pre/post-processing steps including sparse feature-based stereo rectification, nonlocal-based optical flow estimation for dense matching and finally depth estimation. Employing the proposed approach, three-dimensional (3D) reconstructions of highly complex microscopic samples were achieved to facilitate the interpretation of topology and geometry of surface/shape attributes of the samples. As a byproduct of the proposed approach, high-definition 3D printed models of the samples can be generated as a tangible means of physical understanding. Extensive comparisons with the state-of-the-art reveal the strength and superiority of the proposed method in uncovering the details of the highly complex microscopic samples.
We are living in an age where security of digital information like digital images is becoming more important in many aspects and the tranmission of digital images is increasing over the internal and ...international computer networks. The protection of digital images from unauthorized access is the main purpose of this paper.
This paper introduced an approach to encrypt a digital image in frequency domain through DCT (Discrete Cosine Transform) and one dimenssional cellular automata. It is based on encryption of some quantified DCT coefficient in high frequencies. We applied our proposed model on one hundred numbers of JPEG grayscale images of size 800 × 800. The experimental results have indicated the robustness of our algorithm.
Structural analysis of microscopic objects is a longstanding topic in several scientific disciplines, including biological, mechanical, and material sciences. The scanning electron microscope (SEM), ...as a promising imaging equipment has been around to determine the surface properties (e.g., compositions or geometries) of specimens by achieving increased magnification, contrast, and resolution greater than one nanometer. Whereas SEM micrographs still remain two-dimensional (2D), many research and educational questions truly require knowledge and information about their three-dimensional (3D) surface structures. Having 3D surfaces from SEM images would provide true anatomic shapes of micro samples which would allow for quantitative measurements and informative visualization of the systems being investigated. In this research project, we novel design and develop an optimized, adaptive, and intelligent multi-view approach named 3DSEM++ for 3D surface reconstruction of SEM images, making a 3D SEM dataset publicly and freely available to the research community. The work is expected to stimulate more interest and draw attention from the computer vision and multimedia communities to the fast-growing SEM application area.
Image features detection and description is a longstanding topic in computer vision and pattern recognition areas. The Scale Invariant Feature Transform (SIFT) is probably the most popular and widely ...demanded feature descriptor which facilitates a variety of computer vision applications such as image registration, object tracking, image forgery detection, and 3D surface reconstruction. This work introduces a Software as a Service (SaaS) based implementation of the SIFT algorithm which is freely available at http://siftservice.com for any academic, educational and research purposes. The service provides application-to-application interaction and aims Rapid Application Development (RAD) and also fast prototyping for computer vision students and researchers all around the world. An Internet connection is all they need!
N-Tier architecture considered as a comprehensive and integrated solution for designing, creating, developing and maintaining the large scale applications. Each application is a set of several ...physical and logical components. If we want an enterprise application, we should design these components as a well formed layout. N-Tier application architecture provides a model for developers to create a flexible and reusable application. By breaking up an application into tiers, developers only have to modify or add a specific layer, rather than have to rewrite the entire application over. There should be a presentation tier, a business or data access tier, and a data tier. 1
Using N-Tier architecture would improve flexibility, reliability and extensibility software applications.
ASYCUDA is the client/server application which performs customs declaration and clearance in some countries. ASYCUDA should assist Customs Administrations’ modernization and reforms, by supporting both facilitation of legitimate trade and efficiency of Customs clearance controls 2. It has implemented as a national project in Islamic Republic of IRAN Customs administration since 14 years ago. Nowadays, more than 90% of IRAN Customs processes are done with this system 11.
In this paper we analyze and adapt ASYCUDA application with the N-Tier architecture. We present the integration and validation of ASYCUDA application’s tier with the N-Tier architecture and we propose a framework for applying it with the N-Tier application architecture. Then we evaluate some results about our proposed framework and finally we found that, it will make ASYCUDA more flexible and scalable.
This paper introduces an online G2G (Government to Government) framework to the modern generation of customs information systems. A G2G framework describes internal or external Government to ...Government data communications. Nowadays, developing a G2G framework for customs information systems is the subject of many big researches as customs administrations meet the problems comes from international regulations, security, legal specifications, technology and trade. The G2G framework of customs must be as a flexible, scalable, available, comprehensive, open and integrated tools which able to address the needs of expected business and predictable future. To design and develop a more efficient G2G customs information system that will facilitate trade, we propose a model. This model is based on the new paradigm in software engineering as N-Tier architecture. We have evaluated our proposed framework with four datasets. Internal users of customs in this proposed G2G framework, external users of customs, internal and external domain expertise are our datasets. The framework allows maximal scalability and makes more future adaptations with a comprehensive G2G system for customs administration.
Automatic detection of human cell is one of the most common investigation methods that may be used as part of a computer aided medical decision making system. In this paper we present an efficient ...algorithm, based on the cluster analysis and the vector quantization techniques for human cell image detection. First, we perform the edge detection methods to specify the desired region of any object in image and then apply vector quantization technique to cluster the property approximation of human cells. Our proposed algorithm is applied on two sample datasets from our research laboratory and also Imamreza laboratory in Mashhad which contain 196 number of normal electron microscope images. Experimental results show that this model is both accurate and fast with a detection rate of around 86.69 percent. Our proposed method does not require any under segmentation.
A reliable approach for RGB digital image forgery detection is presented in this paper. Our method is based on the Singular Value Decomposition (SVD) of the original image in which the features of ...the image is extracted and then pushed into cellular automata to generate the Robust Secret Key for the image authentication. SVD is used as a strong mathematical tool to decompose the RGB Digital Image into three orthogonal matrices and create features that are rotation invariant. First we focus on a specific layer of RGB input image (i.e. red layer or red matrix) and apply SVD to calculate the Singular Values as well as Right and Left Singular Vectors. Then we generate an array to hold the values of the Singular Values and the Right and Left Singular Vectors and then push the values of the array into the One-Dimensional Cellular Automata to generate the Robust Secret key that can be used to protect the image against the forgery. Next, we embed the output of the cellular automata into the spatial domain of another layer, to authenticate the original image. We applied our algorithm on hundreds of 800 × 800, RGB digital images to test the behavior of our algorithm. The experimental results have illustrated the robustness, visual quality and reliability of our proposed algorithm.