Method for Filling and Sharpening False Colour Layers of Dual Energy X-ray Images
Journal Title: International Journal of Electronics and Telecommunications - Year 2016, Vol 62, Issue 1
Abstract
An X-ray scanning and image processing have a vast range of applications in the security. An image of a content of some package being passed for example to an airplane or to the court house may help to figure out if there are any dangerous objects inside that package and to avoid possible threatening situation. As the raw X-ray images are not always easy to analyze and interpret, some image processing methods like an object detection, a frequency resolution increase or a pseudocolouring are being used. In this paper, we propose a pseudocoloring improvement over material based approach. By addition of the edge detection methods we fill and sharpen colour layers over the image, making it easier to interpret. We demonstrate the effectiveness of the methods using real data, acquired from a professional dual energy X-ray scanner.
Authors and Affiliations
Krzysztof Dmitruk, Michał Mazur, Marcin Denkowski, Paweł Mikołajczak
Noise Detection for Biosignals Using an Orthogonal Wavelet Packet Tree Denoising Algorithm
This article deals with the noise detection of discrete biosignals using an orthogonal wavelet packet. More specifically, it compares the usefulness of Daubechies wavelets with different vanishing moments for the denoisi...
CBM Experiment Local and Global Implications
The research area of the compressed baryonic matter - CBM experiment (FAIR/GSI in Darmstadt) is sub-nuclear physics, thus hadron-baryon and quark-gluon, and the essence of phase transitions in the area of hot nuclear mat...
The Issue of Data Exchange in the UHF Band RFID System with an Semi-Passive Transponder
The article discusses the specifics of data exchange in the UHF band RFID systems using semi-passive transponders. In addition to the antenna and the RFID chip, there is also an additional source of energy (eg. battery)...
On Modelling AM/AM and AM/PM Conversions via Volterra Series
In this paper, we present the expressions, not published up to now, that describe the AM/AM and AM/PM conversions of communication power amplifiers (PAs) via the Volterra series based nonlinear transfer functions. Furthe...
Network Steganography in the DNS Protocol
This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a simplex communication channel between a malware-infected computer with a compromised DNS server. The proposed channel can b...