SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013

INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR
DOCUMENT RETRIEVAL
( IMAGE RECONSTRUCTION )
Mohammad A. ALGhalayini
Computer and Information Unit Director
Vice Rectorate for Graduate Studies and Scientific Research
King Saud University, Riyadh, Saudi Arabia

ABSTRACT
Today, many institutions and organizations are facing serious problem due to the tremendously increasing
size of documents, and this problem is further triggering the storage and retrieval problems due to the
continuously growing space and efficiency requirements. This increase in the size and number of
documents is becoming a complex problem in most offices. Therefore, there is a demand to address this
challenging problem. This can be met by developing a technique to enable specialized document imaging
people to use when there is a need for storing documents images. Thus, there is a need for an efficient
retrieval technique for this type of information retrieval (IR) systems.
In this paper, we present an efficient retrieval technique for electronic documents. TheBack-Inking concept
is proposed as an efficient technique for certain image formats. The use of this approach is a continuation
of the SIPA [32]approach which was presented in an earlier paper as an efficient method for document
storage,and as a result makes the image retrieval relatively efficient.

KEYWORDS
Information Pixels, Document Retrieval, Document Segmentation, Image Formats, Back-Inking

1. INTRODUCTION
By using SIPA technique, we learned how we can store the addresses of information pixels and
how it helps in minimizing the storage size of the image components. We also analyzed the time
consumed to convert an image from its respective format into an array of addresses.
There is a practical significance of this analysis. By converting an image into our format, we are
saving the image not as an array with pixel intensity values but as an array with the addresses of
information pixels. The time taken to convert the image into such an array is in reality the time
taken to save the image in our format. Analogously, if retrieving the image saved in our format is
the purpose, in reality we will be converting the array of addresses of information pixels into an
image. The time taken to open the image saved in our format must be equivalent to converting the

DOI:10.5121/ijitca.2013.3402

21
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013

array into an image. In this research paper, we retrieve the image from the array of addresses by
applying a technique that we shall call "Back-Inking".

2. BACK-INKING ALGORITHM
As the name implies, in this technique, we work backwards and replace an information pixel to
where the address in the array points to. The addresses of information pixels are stored in the
array. Every row in the array is made up of 2 elements. The first element is a pointer that points to
the row and the second element is a pointer that points to a column. Together, they work as a 2dimansional pointer pointing to the original location of the information pixel in an image.
The algorithm places a black pixel at the address pointed by the array and the remaining pixels
are white.
The Back-Inking Algorithm does the following:
•

•
•
•
•
•
•

An array of size (mX n) is formed with all values in it being 256. This represents an image
with all pixels white. Let us call it image R. Here m and n are the corresponding numbers
of rows and columns( the coordinates ) in the original image.
The algorithm reads the first row in the array of addresses.It contains 2 elements.
It points to the row in image R correspondingto the first element among the 2 values read.
It then points to the column in image R corresponding to the second element among the 2
values read.
This pixel formed by the row-column intersection of addresses is replaced with the value
0.
The algorithm next reads the second row in the array of addresses and points to the pixel
corresponding to that address in image R. This pixel value is replaced by 0.
The process repeats till the algorithm reads all rows in the array of addresses and replaces
the pixels in image R corresponding to those addresses by 0.

Example: Let us simulate this algorithm for a BMP image with 150 pixels per inch.
Step 1: Create an array of size (1327 X 1004) with each value in it being 256. This image is called
R.
This represents an image with intensity 256 all through. Hence the image is white. This is an
initialization process. We replace white pixels with black ones according to the address stored in
the array.
Step 2: The first element in the array of addresses corresponding to this image is read.
We have seen in previous research paper [32] that the array of addresses that corresponds to a
BMP image of 150 pixels per inch has a size of (43266 X 2). Let us call this array Array1. The
first row of the array gets read, that is, Array1(1,1) and Array1(1,2).
Array1 (1,1)=1; Array (1,2)=241;
Step 3: The algorithm points to the first row in image R.
This is because it points to the row in image R corresponding to the first element read, that is,
Array1 (1,1)=1.
Step 4: It then points to the 241st column in image R.
22
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013

This is because it points to the column in image R corresponding to the second element read, that
is,
Array1 (1,2)=241.
Step 5: The pixel formed by the row-column intersection in step 3 and in step 4 is replaced by a 0.
Intensity 0 corresponds to black. We have now replaced a black pixel at location (1,241).
Step 6: The same process repeats for each row of Array1 and hence all addresses present in
Array1 are replaced by a 0 in image R, that is, a black pixel in image R. We shall call this the
"Back-Inking Process".

3. MATLAB SIMULATION OF BACK-INKING ALGORITHM
Previously, we have used MATLAB to store the image in the form of an array of addresses. We
will now simulate the conversion of array of addresses into an image in MATLAB.A snippet of
the code that is used for reconstruction of the image is shown below.
% Start counter to keep a tab of the time
tic;
% Reconstructed array
Rearray=uint8(255*ones(m,n));
for l=1:lgth
rearray(Array(l,1),Array(l,2))=0;
end
figure(2)
imshow(rearray)
% End of time counter
toc;
1. Here tic and toc commands are used to keep a tab of the time. They return the time taken
to convert the array of addresses into an image.
2. Rearray=uint8(255*ones(m,n));
We initialize the reconstructed image (calledrearray) with all intensity values 255.
Here
m- Number of rows in the image;
n- Number of columns in the image;
ones (m,n) will create an array of size (m X n) with all values in it being 1.
255*ones(m,n) will multiply each value in the array ones (m,n) by 255. Hence each value in the
array is now initialized to 255.
uint 8 is a function used to convert numbers from any data type to the type- uint8. This is because
images are supposed to be in the form uint8 in MATLAB. uint8 has a range (0 – 255) which
matches the intensity range in 8-bit grayscale images.

23
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013

1. for l=1:lgth
rearray(Array(l,1),Array(l,2))=0;
end
This part of the program is used to replace each pixel in the image rearraywith an intensity value
0. The address of the pixel is pointed by the array of addresses (called Array).
Here lgth= number of rows in the array.
The for loop:
for l=1:lgth
………
End
executes the statement within the loop #lgth number of times and in each iteration, the value of l
is incremented by 1. The start value of l is 1 and its stop value is #lgth.
The statement within the for loop is:
Rearray(Array(l,1),Array(l,2))=0
As explained in the example above, the initial value in the for loop is Array(1,1)=1 and
Array(1,2)=241.
Here,

rearray(Array(l,1),Array(l,2)), i.e., rearray(1,241)=0;

For each iteration in the for loop, successive values of addresses stored in Array are read and the
corresponding values in rearray are replaced by 0. Since the for loop ends at l=lgth, the last
iteration is executed till the last element in Array is read and a 0 is replaced in its corresponding
location in the image.
2. Imshow(rearray) is used to display the reconstructed image.
The same snippet of code can be used for all image formats with different dpi and for both full
body segments of the scanned document image and the whole A4 scanned document image types.
For the same dpi, since the size of the full body image is smaller than that of an A4 size image;
the number of information pixels in a full body image is lesser, the size of its corresponding array
of addresses is smaller and hence it will take lesser time to be reconstructed into an image when
compared to its A4 counterpart.

24
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013

Table ( 1 ) below shows the reconstruction time and the average viewable mark of the reconstructed images
for different resolutions of the Whole KSU Document images.

No
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16

IMAGE
FORMAT
( TYPE )

GIF

BMP

JPG

TIF

IMAGE
RESOLUTION
( DPI )

RECONTRUCTION

TIME ( Seconds )

IMAGE
EVALUATION
POINTS ( 10 )

75
100
150
200
75
100
150
200
75
100
150
200
75
100
150
200

1.8223
1.6245
7.8764
23.4180
0.8154
1.7831
8.4214
24.2599
1.4210
3.6006
14.6970
59.8907
0.7510
1.5989
7.7328
19.2055

6.2
6.9
8.9
9.7
7.8
8.6
9.2
9.6
5.9
7.1
8.6
9.1
6.3
7.9
8.9
9.6

IMAGE

Table ( 1 )

4 . MATLAB CODES AND RECONSTRUCTED IMAGES
Now we are ready to see the MATLAB codes and reconstructed images for the examined image
types for different image resolutions for both the whole KSU A4 document and for the Full Body
Segment images.
The code below is the code for reconstructing ( Back-Inking ) the whole A4 Document ( .gif )
format image scanned with ( 150 ) dpi.
clear all; close all; clc;
tic;
RGBimage = imread( 'C:UsersALGhalayini_rn a4sizegiffull page 256 colors 8bit 150.gif ,
'gif' );
GRAYimage = RGBimage;
figure ( 1 ) ;
imshow ( GRAYimage ) ;
25
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013

m = length ( GRAYimage ) ;
n = length ( GRAYimage ( 1 , : ) ) ;
total_pixels = m * n;
k = 1;
fori = 1 : m
for j = 1 : n
ifGRAYimage ( i , j ) < 128
Array1 ( 1 , k ) = i; Array2 ( 1 , k ) = j;
k = k + 1;
end
end
end
Array = [Array1' Array2'];
Toc
Table ( 2 ) below shows the reconstruction time and the average viewable mark of the reconstructed images
for different resolutions of the Full Body Segment Images.
No
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16

IMAGE
FORMAT
( TYPE )

GIF

BMP

JPG

TIF

IMAGE
RESOLUTION
( DPI )

RECONTRUCTION

TIME ( Seconds )

IMAGE
EVALUATION
POINTS ( 10 )

75
100
150
200
75
100
150
200
75
100
150
200
75
100
150
200

0.6415
1.4724
6.1677
12.8715
0.7326
1.4580
6.1659
12.6825
0.7860
1.7775
6.8940
12.8280
0.6282
1.4001
6.1385
12.9299

5.1
6.8
9.0
9.7
4.1
5.9
8.1
9.1
6.4
7.1
8.9
9.8
6.3
7.1
8.5
9.2

IMAGE

Table ( 2 )

26
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013

Figure ( 1 ) below shows the reconstructed Image after applying the Back-Inking Method the whole A4
Document ( .gif ) format image scanned with (150) dpi

Figure ( 1 )

27
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013

The code below is the code for reconstructing ( Back-Inking ) the Full Body ( .tif ) format
image scanned with ( 150 ) dpi.
clear all; close all; clc;
tic;
RGBimage = imread( 'C:UsersALGhalayini_rn Fulltiffull page 256 colors 8bit 150.tif' , 'tif' ) ;
GRAYimage= rgb2gray ( RGBimage ) ;
figure ( 1 ) ;
imshow ( GRAYimage ( 454 : 1459 , 118 : 1122 ) );
m = length ( GRAYimage ) ;
n = length ( GRAYimage ( 1 , : ) ) ;
total_pixels = m * n;
k = 1;
fori = 454 : 1459
for j = 118 : 1122
ifGRAYimage ( i , j ) < 128
Array1 ( 1 , k ) = i; Array2 ( 1 , k ) = j;
k = k + 1;
end
end
end
Array = [Array1' Array2'];
Toc

28
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013

Figure ( 2 ) below shows the reconstructed Image after applying the Back-Inking Method the Full Body
Segment ( .tif ) format image scanned with ( 150 ) dpi

Figure ( 2 )

5. CONCLUSION
Our goal in this research paper was to introduce the concept of Back-Inking which is the
procedure to retrieve the stored addresses of the Information pixels from the array and plot black
29
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013

pixels back into the white page to reconstruct the whole image back, then display it to the user in
a relatively short time.
We observe that the reconstructed images for all formats are better in quality, in that, as the dpi
increases, the sharpness of the image increases. But as the dpi increases the time to reconstruct
the image also increases.Through applying this method, we came up with the following
conclusions:
•

•

The time taken to retrieve an image in a specific format with lesser dpi is less than the
time taken to retrieve an image in the same format with larger dpi. Hence, this is a
time/complexity-quality tradeoff.
Full body images of a specific format and dpi take lesser time to be executed than its A4
size image counterpart.

•

Consideringthe above 2 factors, the complexity and time of image retrieval increases as
we move from 75 to 200 dpi. It takes lesser time to retrieve a full body segment scanned
image than an A4 scanned image. We can therefore conclude that using 150 dpi full body
segment scanned images produces an optimum result because :

•
•

Retrieval of images with 150 dpi do not take as much time as images with 200 dpi;
Retrieval of an image with 150 dpi is not as complex as an image with 200 dpi because
the number of information pixels are lesser in images with 150 dpi and hence lesser the
size of the array of addresses.
The quality of images is certainly better than images with 75,100

•

References
[1]

O. Lezoray and H. Cardot, “Cooperation of color classification schemes and color watershed: a study
for microscopic images,” IEEE Trans. on Image Processing, no. 7, vol. 11, 2002.
[2] D. Comaniciu, “Image segmentation using clustering with saddle point detection,” IEEE Int. Conf.
Image Processing (ICIP'02), Rochester, NY, Vol. 3, 297-300, 2002
[3] G. Herman, and B. Carvalho, “Multiseeded segmentation using fuzzy connectedness,” IEEE Tans. On
Pattern Analysis and Machine Intelligence, no. 5, vol. 23, May 2001.
[4] R. Nock, F. Nielsen, “Semi-supervised statistical region refinement for color image segmentation,”
Pattern Recognition no. 6 vol. 38 pp. 835-846, 2005.
[5] T. Lee, and M. Lewicki, “Unsupervised classification, segmentation, and enhancement using, ICA
mixture model,” IEEE Trans. Image Proc. No. 3 vol 11 pp. 270-279, 2002.
[6] H. Shah-Hosseini and R. Safabakhsh, “Automatic multilevel thresholding for image segmentation by
growing time adaptive self-organizing map,” IEEE Tans. On Pattern Analysis and Machine
Intelligence, no. 10, vol. 24, 2002.
[7] T. HORIUCHI, “Grayscale image segmentation using color space,” IEICE Transactions on
Information and Systems, E89-D(3) pp. 1231-1237, 2006.
[8] T. Horiuchi and S. Hirano, "Colorization algorithm for grayscale image by propagating seed pixels,"
Proc. IEEE ICIP 2003, pp.457–460, 2003.
[9] Y. Deng, and B. Manjunath, “Unsupervised segmentation of color-texture regions in image and
video,” IEEE Tans. On Pattern Analysis and Machine Intelligence, no. 3, vol, 23, pp. 800-810, 2001.
[10] Z. Tu, and S. Zhu, “Image segmentation by data-driven markov chain montecarlo,” IEEE Tans. On
Pattern Analysis and Machine Intelligence, no 5, vol. 24, pp. 657-673, 2002.
[11] J. Rushing, H. Ranganth, T. Hinke, and S. Graves, “Image Segmentation using association rule
features,” IEEE Trans. on Image Processing, no. 5, vol. 11, 2002.
[12] M. Ozden, E. Polat, “A color image segmentation approach for content-based image retrieval,”
Pattern Recognition,vol. 40 , issue 4, pp. 1318-1325, 2007.
30
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013

[13] S. Panda, P. Nanda, and P Mohapatra, “Multiresolution Approach for Color Image Segmentation
using MRF Model,” Proceedings of the National Conference on Smart Communication Technologies
and Industrial Informatics, SCTII, 03-04 pp. 34-42, Rourkela, Feb 2007.
[14] S. Kang, S. Park, Y. Shin, H. Yoo, and D. Jang, “Image segmentation using statistical approach via
perception-based color Information,” International Journal of Computer Science and Network
Security, no. 4, vol. 8 No.4, April 2008.
[15] Bocij, P. et al., Business information systems: Technology, development and management. (London:
Financial Times Management, 1999).
[16] Richard Casey, " Document Image Analysis", available
athttp://cslu.cse.ogi.edu/HLTsurvey/ch2node4.html
[17] H Bunke And P S P Wang, "Handbook Of Character Recognition And Document ImageAnalysis",
available at:http://www.worldscibooks.com/compsci/2757.html
[18] M Simone, " Document Image Analysis And Recognition" , available at
:http://www.dsi.unifi.it/~simone/DIAR/
[19] "Document Image Analysis",availableat:http://elib.cs.berkeley.edu/dia.html
[20] Richard Casey, " Document Image Analysis", available
at:http://cslu.cse.ogi.edu/HLTsurvey/ch2node4.html
[21] H Bunke And P S P Wang, "Handbook Of Character Recognition And Document Image Analysis",
available at :http://www.worldscibooks.com/compsci/2757.html
[22] M Simone, " Document Image Analysis And Recognition" http://www.dsi.unifi.it/~simone/DIAR/
[23] "Basic Images Processing" : "Some general commands related to handling Matlab graphics and
printing" "Simple image processing operations that you can do with Matlab" available at:
http://noodle.med.yale.edu/~papad/ta/handouts/matlab_image.html
[24] "Document Image Analysis" availableat :http://elib.cs.berkeley.edu/dia.html
[25] "Getting Started with MATLAB" available at
:http://www.stewart.cs.sdsu.edu/cs205/module7/getting6.html
[26] "Matlab Image Processing Toolbox" available at
:http://homepages.inf.ed.ac.uk/rbf/HIPR2/impmatl.htm
[27] Matlab Resources" available at :http://www.cse.uiuc.edu/heath/scicomp/matlab.htm
[28] "Read and Display an Image" available at
:http://www.mathworks.com/access/helpdesk/help/toolbox/images/getting8.html
[29] "Reading and displaying images" matlab toutorial",03/25/2005, available at
:http://ai.ucsd.edu/Tutorial/matlab.html#images
[30] ALGhalayini M., Shah A., "Introducing The ( POSSDI ) Process : The Process of Optimizing the
Selection of The Scanned Document Images". International Joint Conferences on Computer,
Information, Systems Sciences, and Engineering (CISSE 06) December 4 - 14, 2006.
[31] Mohammad A. ALGhalayini and ELQasemALNemah, “An Efficient Storage and Retrieval
Technique for Documents Using Symantec Document Segmentation (SDS) Approach”; CISSE 2007,
The Third International Joint Conferenceson Computer, Information, and Systems Sciences, and
Engineering (CISSE 07).
[32] Mohammad A. ALGhalayini “Introducing The Concept Of Information Pixels and the SIPA ( Storing
Information Pixels Addresses ) Method As a Model for Document Storage”; CISSE 2011, The
Seventh International Joint Conferenceson Computer, Information, and Systems Sciences, and
Engineering (CISSE 11).

31
International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013

AUTHOR
Mohammad A. ALGhalayini, Bs.C. in Computer Science and Mathematics, Iowa, USA.
1987. Ms.C. in Computer Science, Alabama, USA. 1999. Ph.D. in Information
Management Systems, London, UK. 2010.The author lectured at the College of
Information & Computer Sciences of King Saud University, KSA for more than 14 years.
Specialized in document management and databases, the author developed several
imaging database systems for various KSU offices and departments, currently working as an academic
researcherand supervisor of computer and Information unit at the KSU Vice Rectorate of Graduate Studies
and scientific Research.

32

Weitere ähnliche Inhalte

Was ist angesagt?

R-Tree Implementation of Image Databases
R-Tree Implementation of Image DatabasesR-Tree Implementation of Image Databases
R-Tree Implementation of Image Databasessipij
 
A comprehensive study on Applications of Vedic Multipliers in signal processing
A comprehensive study on Applications of Vedic Multipliers in signal processingA comprehensive study on Applications of Vedic Multipliers in signal processing
A comprehensive study on Applications of Vedic Multipliers in signal processingIRJET Journal
 
Images in matlab
Images in matlabImages in matlab
Images in matlabAli Alvi
 
Implementation of an arithmetic logic using area efficient carry lookahead adder
Implementation of an arithmetic logic using area efficient carry lookahead adderImplementation of an arithmetic logic using area efficient carry lookahead adder
Implementation of an arithmetic logic using area efficient carry lookahead adderVLSICS Design
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
JOURNAL PAPER
JOURNAL PAPERJOURNAL PAPER
JOURNAL PAPERRaj kumar
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionIRJET Journal
 
Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...
 Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul... Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...
Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...ijsrd.com
 
A Hybrid Approach for Content Based Image Retrieval System
A Hybrid Approach for Content Based Image Retrieval SystemA Hybrid Approach for Content Based Image Retrieval System
A Hybrid Approach for Content Based Image Retrieval SystemIOSR Journals
 
Data clustering using map reduce
Data clustering using map reduceData clustering using map reduce
Data clustering using map reduceVarad Meru
 
Efficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixIJNSA Journal
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueIJERA Editor
 
FPGA IMPLEMENTATION OF HIGH SPEED BAUGH-WOOLEY MULTIPLIER USING DECOMPOSITION...
FPGA IMPLEMENTATION OF HIGH SPEED BAUGH-WOOLEY MULTIPLIER USING DECOMPOSITION...FPGA IMPLEMENTATION OF HIGH SPEED BAUGH-WOOLEY MULTIPLIER USING DECOMPOSITION...
FPGA IMPLEMENTATION OF HIGH SPEED BAUGH-WOOLEY MULTIPLIER USING DECOMPOSITION...eeiej_journal
 
Fpga implementation of high speed
Fpga implementation of high speedFpga implementation of high speed
Fpga implementation of high speedeeiej
 

Was ist angesagt? (17)

R-Tree Implementation of Image Databases
R-Tree Implementation of Image DatabasesR-Tree Implementation of Image Databases
R-Tree Implementation of Image Databases
 
A comprehensive study on Applications of Vedic Multipliers in signal processing
A comprehensive study on Applications of Vedic Multipliers in signal processingA comprehensive study on Applications of Vedic Multipliers in signal processing
A comprehensive study on Applications of Vedic Multipliers in signal processing
 
Images in matlab
Images in matlabImages in matlab
Images in matlab
 
Implementation of an arithmetic logic using area efficient carry lookahead adder
Implementation of an arithmetic logic using area efficient carry lookahead adderImplementation of an arithmetic logic using area efficient carry lookahead adder
Implementation of an arithmetic logic using area efficient carry lookahead adder
 
first_assignment_Report
first_assignment_Reportfirst_assignment_Report
first_assignment_Report
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Matlab Working With Images
Matlab Working With ImagesMatlab Working With Images
Matlab Working With Images
 
JOURNAL PAPER
JOURNAL PAPERJOURNAL PAPER
JOURNAL PAPER
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
 
Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...
 Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul... Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...
Compare "Urdhva Tiryakbhyam Multiplier" and "Hierarchical Array of Array Mul...
 
A1804010105
A1804010105A1804010105
A1804010105
 
A Hybrid Approach for Content Based Image Retrieval System
A Hybrid Approach for Content Based Image Retrieval SystemA Hybrid Approach for Content Based Image Retrieval System
A Hybrid Approach for Content Based Image Retrieval System
 
Data clustering using map reduce
Data clustering using map reduceData clustering using map reduce
Data clustering using map reduce
 
Efficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
 
FPGA IMPLEMENTATION OF HIGH SPEED BAUGH-WOOLEY MULTIPLIER USING DECOMPOSITION...
FPGA IMPLEMENTATION OF HIGH SPEED BAUGH-WOOLEY MULTIPLIER USING DECOMPOSITION...FPGA IMPLEMENTATION OF HIGH SPEED BAUGH-WOOLEY MULTIPLIER USING DECOMPOSITION...
FPGA IMPLEMENTATION OF HIGH SPEED BAUGH-WOOLEY MULTIPLIER USING DECOMPOSITION...
 
Fpga implementation of high speed
Fpga implementation of high speedFpga implementation of high speed
Fpga implementation of high speed
 

Andere mochten auch

Andere mochten auch (8)

Img 3510
Img 3510Img 3510
Img 3510
 
Img 3463
Img 3463Img 3463
Img 3463
 
Petróleo
PetróleoPetróleo
Petróleo
 
Img 3495
Img 3495Img 3495
Img 3495
 
Img 3337
Img 3337Img 3337
Img 3337
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Ähnlich wie Introducing the Concept of Back-Inking as an Efficient Model for Document Retrieval (Image Reconstruction)

INTRODUCING THE CONCEPT OF INFORMATION PIXELS AND THE SIPA (STORING INFORMATI...
INTRODUCING THE CONCEPT OF INFORMATION PIXELS AND THE SIPA (STORING INFORMATI...INTRODUCING THE CONCEPT OF INFORMATION PIXELS AND THE SIPA (STORING INFORMATI...
INTRODUCING THE CONCEPT OF INFORMATION PIXELS AND THE SIPA (STORING INFORMATI...IJITCA Journal
 
INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RET...
 INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RET... INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RET...
INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RET...IJITCA Journal
 
INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RETR...
INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RETR...INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RETR...
INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RETR...IJITCA Journal
 
A comparative analysis of retrieval techniques in content based image retrieval
A comparative analysis of retrieval techniques in content based image retrievalA comparative analysis of retrieval techniques in content based image retrieval
A comparative analysis of retrieval techniques in content based image retrievalcsandit
 
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVALA COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVALcscpconf
 
Wavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile DevicesWavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile Devicescsandit
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014ijcsbi
 
IRJET- 3D Vision System using Calibrated Stereo Camera
IRJET- 3D Vision System using Calibrated Stereo CameraIRJET- 3D Vision System using Calibrated Stereo Camera
IRJET- 3D Vision System using Calibrated Stereo CameraIRJET Journal
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformIOSR Journals
 
One dimensional vector based pattern
One dimensional vector based patternOne dimensional vector based pattern
One dimensional vector based patternijcsit
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Editor IJARCET
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Editor IJARCET
 
Simple Pendulum Experiment and Automatic Survey Grading using Computer Vision
Simple Pendulum Experiment and Automatic Survey Grading using Computer VisionSimple Pendulum Experiment and Automatic Survey Grading using Computer Vision
Simple Pendulum Experiment and Automatic Survey Grading using Computer VisionAnish Patel
 
ijrrest_vol-2_issue-2_013
ijrrest_vol-2_issue-2_013ijrrest_vol-2_issue-2_013
ijrrest_vol-2_issue-2_013Ashish Gupta
 
A Mat Lab built software application for similar image retrieval
A Mat Lab built software application for similar image retrievalA Mat Lab built software application for similar image retrieval
A Mat Lab built software application for similar image retrievalIOSR Journals
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniqueseSAT Publishing House
 

Ähnlich wie Introducing the Concept of Back-Inking as an Efficient Model for Document Retrieval (Image Reconstruction) (20)

INTRODUCING THE CONCEPT OF INFORMATION PIXELS AND THE SIPA (STORING INFORMATI...
INTRODUCING THE CONCEPT OF INFORMATION PIXELS AND THE SIPA (STORING INFORMATI...INTRODUCING THE CONCEPT OF INFORMATION PIXELS AND THE SIPA (STORING INFORMATI...
INTRODUCING THE CONCEPT OF INFORMATION PIXELS AND THE SIPA (STORING INFORMATI...
 
INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RET...
 INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RET... INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RET...
INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RET...
 
INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RETR...
INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RETR...INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RETR...
INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RETR...
 
A comparative analysis of retrieval techniques in content based image retrieval
A comparative analysis of retrieval techniques in content based image retrievalA comparative analysis of retrieval techniques in content based image retrieval
A comparative analysis of retrieval techniques in content based image retrieval
 
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVALA COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
A COMPARATIVE ANALYSIS OF RETRIEVAL TECHNIQUES IN CONTENT BASED IMAGE RETRIEVAL
 
Wavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile DevicesWavelet-Based Warping Technique for Mobile Devices
Wavelet-Based Warping Technique for Mobile Devices
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014
 
mini prjt
mini prjtmini prjt
mini prjt
 
IRJET- 3D Vision System using Calibrated Stereo Camera
IRJET- 3D Vision System using Calibrated Stereo CameraIRJET- 3D Vision System using Calibrated Stereo Camera
IRJET- 3D Vision System using Calibrated Stereo Camera
 
I010135760
I010135760I010135760
I010135760
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
 
One dimensional vector based pattern
One dimensional vector based patternOne dimensional vector based pattern
One dimensional vector based pattern
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229
 
Simple Pendulum Experiment and Automatic Survey Grading using Computer Vision
Simple Pendulum Experiment and Automatic Survey Grading using Computer VisionSimple Pendulum Experiment and Automatic Survey Grading using Computer Vision
Simple Pendulum Experiment and Automatic Survey Grading using Computer Vision
 
ijrrest_vol-2_issue-2_013
ijrrest_vol-2_issue-2_013ijrrest_vol-2_issue-2_013
ijrrest_vol-2_issue-2_013
 
B070306010
B070306010B070306010
B070306010
 
A Mat Lab built software application for similar image retrieval
A Mat Lab built software application for similar image retrievalA Mat Lab built software application for similar image retrieval
A Mat Lab built software application for similar image retrieval
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniques
 

Mehr von IJITCA Journal

The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...IJITCA Journal
 
International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)IJITCA Journal
 
International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)IJITCA Journal
 
International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)IJITCA Journal
 
International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)IJITCA Journal
 

Mehr von IJITCA Journal (20)

The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...The International Journal of Information Technology, Control and Automation (...
The International Journal of Information Technology, Control and Automation (...
 
International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)
 
International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)
 
International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)
 
International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)International Journal of Information Technology, Control and Automation (IJITCA)
International Journal of Information Technology, Control and Automation (IJITCA)
 

Kürzlich hochgeladen

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Introducing the Concept of Back-Inking as an Efficient Model for Document Retrieval (Image Reconstruction)

  • 1. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 INTRODUCING THE CONCEPT OF BACKINKING AS AN EFFICIENT MODEL FOR DOCUMENT RETRIEVAL ( IMAGE RECONSTRUCTION ) Mohammad A. ALGhalayini Computer and Information Unit Director Vice Rectorate for Graduate Studies and Scientific Research King Saud University, Riyadh, Saudi Arabia ABSTRACT Today, many institutions and organizations are facing serious problem due to the tremendously increasing size of documents, and this problem is further triggering the storage and retrieval problems due to the continuously growing space and efficiency requirements. This increase in the size and number of documents is becoming a complex problem in most offices. Therefore, there is a demand to address this challenging problem. This can be met by developing a technique to enable specialized document imaging people to use when there is a need for storing documents images. Thus, there is a need for an efficient retrieval technique for this type of information retrieval (IR) systems. In this paper, we present an efficient retrieval technique for electronic documents. TheBack-Inking concept is proposed as an efficient technique for certain image formats. The use of this approach is a continuation of the SIPA [32]approach which was presented in an earlier paper as an efficient method for document storage,and as a result makes the image retrieval relatively efficient. KEYWORDS Information Pixels, Document Retrieval, Document Segmentation, Image Formats, Back-Inking 1. INTRODUCTION By using SIPA technique, we learned how we can store the addresses of information pixels and how it helps in minimizing the storage size of the image components. We also analyzed the time consumed to convert an image from its respective format into an array of addresses. There is a practical significance of this analysis. By converting an image into our format, we are saving the image not as an array with pixel intensity values but as an array with the addresses of information pixels. The time taken to convert the image into such an array is in reality the time taken to save the image in our format. Analogously, if retrieving the image saved in our format is the purpose, in reality we will be converting the array of addresses of information pixels into an image. The time taken to open the image saved in our format must be equivalent to converting the DOI:10.5121/ijitca.2013.3402 21
  • 2. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 array into an image. In this research paper, we retrieve the image from the array of addresses by applying a technique that we shall call "Back-Inking". 2. BACK-INKING ALGORITHM As the name implies, in this technique, we work backwards and replace an information pixel to where the address in the array points to. The addresses of information pixels are stored in the array. Every row in the array is made up of 2 elements. The first element is a pointer that points to the row and the second element is a pointer that points to a column. Together, they work as a 2dimansional pointer pointing to the original location of the information pixel in an image. The algorithm places a black pixel at the address pointed by the array and the remaining pixels are white. The Back-Inking Algorithm does the following: • • • • • • • An array of size (mX n) is formed with all values in it being 256. This represents an image with all pixels white. Let us call it image R. Here m and n are the corresponding numbers of rows and columns( the coordinates ) in the original image. The algorithm reads the first row in the array of addresses.It contains 2 elements. It points to the row in image R correspondingto the first element among the 2 values read. It then points to the column in image R corresponding to the second element among the 2 values read. This pixel formed by the row-column intersection of addresses is replaced with the value 0. The algorithm next reads the second row in the array of addresses and points to the pixel corresponding to that address in image R. This pixel value is replaced by 0. The process repeats till the algorithm reads all rows in the array of addresses and replaces the pixels in image R corresponding to those addresses by 0. Example: Let us simulate this algorithm for a BMP image with 150 pixels per inch. Step 1: Create an array of size (1327 X 1004) with each value in it being 256. This image is called R. This represents an image with intensity 256 all through. Hence the image is white. This is an initialization process. We replace white pixels with black ones according to the address stored in the array. Step 2: The first element in the array of addresses corresponding to this image is read. We have seen in previous research paper [32] that the array of addresses that corresponds to a BMP image of 150 pixels per inch has a size of (43266 X 2). Let us call this array Array1. The first row of the array gets read, that is, Array1(1,1) and Array1(1,2). Array1 (1,1)=1; Array (1,2)=241; Step 3: The algorithm points to the first row in image R. This is because it points to the row in image R corresponding to the first element read, that is, Array1 (1,1)=1. Step 4: It then points to the 241st column in image R. 22
  • 3. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 This is because it points to the column in image R corresponding to the second element read, that is, Array1 (1,2)=241. Step 5: The pixel formed by the row-column intersection in step 3 and in step 4 is replaced by a 0. Intensity 0 corresponds to black. We have now replaced a black pixel at location (1,241). Step 6: The same process repeats for each row of Array1 and hence all addresses present in Array1 are replaced by a 0 in image R, that is, a black pixel in image R. We shall call this the "Back-Inking Process". 3. MATLAB SIMULATION OF BACK-INKING ALGORITHM Previously, we have used MATLAB to store the image in the form of an array of addresses. We will now simulate the conversion of array of addresses into an image in MATLAB.A snippet of the code that is used for reconstruction of the image is shown below. % Start counter to keep a tab of the time tic; % Reconstructed array Rearray=uint8(255*ones(m,n)); for l=1:lgth rearray(Array(l,1),Array(l,2))=0; end figure(2) imshow(rearray) % End of time counter toc; 1. Here tic and toc commands are used to keep a tab of the time. They return the time taken to convert the array of addresses into an image. 2. Rearray=uint8(255*ones(m,n)); We initialize the reconstructed image (calledrearray) with all intensity values 255. Here m- Number of rows in the image; n- Number of columns in the image; ones (m,n) will create an array of size (m X n) with all values in it being 1. 255*ones(m,n) will multiply each value in the array ones (m,n) by 255. Hence each value in the array is now initialized to 255. uint 8 is a function used to convert numbers from any data type to the type- uint8. This is because images are supposed to be in the form uint8 in MATLAB. uint8 has a range (0 – 255) which matches the intensity range in 8-bit grayscale images. 23
  • 4. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 1. for l=1:lgth rearray(Array(l,1),Array(l,2))=0; end This part of the program is used to replace each pixel in the image rearraywith an intensity value 0. The address of the pixel is pointed by the array of addresses (called Array). Here lgth= number of rows in the array. The for loop: for l=1:lgth ……… End executes the statement within the loop #lgth number of times and in each iteration, the value of l is incremented by 1. The start value of l is 1 and its stop value is #lgth. The statement within the for loop is: Rearray(Array(l,1),Array(l,2))=0 As explained in the example above, the initial value in the for loop is Array(1,1)=1 and Array(1,2)=241. Here, rearray(Array(l,1),Array(l,2)), i.e., rearray(1,241)=0; For each iteration in the for loop, successive values of addresses stored in Array are read and the corresponding values in rearray are replaced by 0. Since the for loop ends at l=lgth, the last iteration is executed till the last element in Array is read and a 0 is replaced in its corresponding location in the image. 2. Imshow(rearray) is used to display the reconstructed image. The same snippet of code can be used for all image formats with different dpi and for both full body segments of the scanned document image and the whole A4 scanned document image types. For the same dpi, since the size of the full body image is smaller than that of an A4 size image; the number of information pixels in a full body image is lesser, the size of its corresponding array of addresses is smaller and hence it will take lesser time to be reconstructed into an image when compared to its A4 counterpart. 24
  • 5. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 Table ( 1 ) below shows the reconstruction time and the average viewable mark of the reconstructed images for different resolutions of the Whole KSU Document images. No 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 IMAGE FORMAT ( TYPE ) GIF BMP JPG TIF IMAGE RESOLUTION ( DPI ) RECONTRUCTION TIME ( Seconds ) IMAGE EVALUATION POINTS ( 10 ) 75 100 150 200 75 100 150 200 75 100 150 200 75 100 150 200 1.8223 1.6245 7.8764 23.4180 0.8154 1.7831 8.4214 24.2599 1.4210 3.6006 14.6970 59.8907 0.7510 1.5989 7.7328 19.2055 6.2 6.9 8.9 9.7 7.8 8.6 9.2 9.6 5.9 7.1 8.6 9.1 6.3 7.9 8.9 9.6 IMAGE Table ( 1 ) 4 . MATLAB CODES AND RECONSTRUCTED IMAGES Now we are ready to see the MATLAB codes and reconstructed images for the examined image types for different image resolutions for both the whole KSU A4 document and for the Full Body Segment images. The code below is the code for reconstructing ( Back-Inking ) the whole A4 Document ( .gif ) format image scanned with ( 150 ) dpi. clear all; close all; clc; tic; RGBimage = imread( 'C:UsersALGhalayini_rn a4sizegiffull page 256 colors 8bit 150.gif , 'gif' ); GRAYimage = RGBimage; figure ( 1 ) ; imshow ( GRAYimage ) ; 25
  • 6. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 m = length ( GRAYimage ) ; n = length ( GRAYimage ( 1 , : ) ) ; total_pixels = m * n; k = 1; fori = 1 : m for j = 1 : n ifGRAYimage ( i , j ) < 128 Array1 ( 1 , k ) = i; Array2 ( 1 , k ) = j; k = k + 1; end end end Array = [Array1' Array2']; Toc Table ( 2 ) below shows the reconstruction time and the average viewable mark of the reconstructed images for different resolutions of the Full Body Segment Images. No 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 IMAGE FORMAT ( TYPE ) GIF BMP JPG TIF IMAGE RESOLUTION ( DPI ) RECONTRUCTION TIME ( Seconds ) IMAGE EVALUATION POINTS ( 10 ) 75 100 150 200 75 100 150 200 75 100 150 200 75 100 150 200 0.6415 1.4724 6.1677 12.8715 0.7326 1.4580 6.1659 12.6825 0.7860 1.7775 6.8940 12.8280 0.6282 1.4001 6.1385 12.9299 5.1 6.8 9.0 9.7 4.1 5.9 8.1 9.1 6.4 7.1 8.9 9.8 6.3 7.1 8.5 9.2 IMAGE Table ( 2 ) 26
  • 7. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 Figure ( 1 ) below shows the reconstructed Image after applying the Back-Inking Method the whole A4 Document ( .gif ) format image scanned with (150) dpi Figure ( 1 ) 27
  • 8. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 The code below is the code for reconstructing ( Back-Inking ) the Full Body ( .tif ) format image scanned with ( 150 ) dpi. clear all; close all; clc; tic; RGBimage = imread( 'C:UsersALGhalayini_rn Fulltiffull page 256 colors 8bit 150.tif' , 'tif' ) ; GRAYimage= rgb2gray ( RGBimage ) ; figure ( 1 ) ; imshow ( GRAYimage ( 454 : 1459 , 118 : 1122 ) ); m = length ( GRAYimage ) ; n = length ( GRAYimage ( 1 , : ) ) ; total_pixels = m * n; k = 1; fori = 454 : 1459 for j = 118 : 1122 ifGRAYimage ( i , j ) < 128 Array1 ( 1 , k ) = i; Array2 ( 1 , k ) = j; k = k + 1; end end end Array = [Array1' Array2']; Toc 28
  • 9. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 Figure ( 2 ) below shows the reconstructed Image after applying the Back-Inking Method the Full Body Segment ( .tif ) format image scanned with ( 150 ) dpi Figure ( 2 ) 5. CONCLUSION Our goal in this research paper was to introduce the concept of Back-Inking which is the procedure to retrieve the stored addresses of the Information pixels from the array and plot black 29
  • 10. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 pixels back into the white page to reconstruct the whole image back, then display it to the user in a relatively short time. We observe that the reconstructed images for all formats are better in quality, in that, as the dpi increases, the sharpness of the image increases. But as the dpi increases the time to reconstruct the image also increases.Through applying this method, we came up with the following conclusions: • • The time taken to retrieve an image in a specific format with lesser dpi is less than the time taken to retrieve an image in the same format with larger dpi. Hence, this is a time/complexity-quality tradeoff. Full body images of a specific format and dpi take lesser time to be executed than its A4 size image counterpart. • Consideringthe above 2 factors, the complexity and time of image retrieval increases as we move from 75 to 200 dpi. It takes lesser time to retrieve a full body segment scanned image than an A4 scanned image. We can therefore conclude that using 150 dpi full body segment scanned images produces an optimum result because : • • Retrieval of images with 150 dpi do not take as much time as images with 200 dpi; Retrieval of an image with 150 dpi is not as complex as an image with 200 dpi because the number of information pixels are lesser in images with 150 dpi and hence lesser the size of the array of addresses. The quality of images is certainly better than images with 75,100 • References [1] O. Lezoray and H. Cardot, “Cooperation of color classification schemes and color watershed: a study for microscopic images,” IEEE Trans. on Image Processing, no. 7, vol. 11, 2002. [2] D. Comaniciu, “Image segmentation using clustering with saddle point detection,” IEEE Int. Conf. Image Processing (ICIP'02), Rochester, NY, Vol. 3, 297-300, 2002 [3] G. Herman, and B. Carvalho, “Multiseeded segmentation using fuzzy connectedness,” IEEE Tans. On Pattern Analysis and Machine Intelligence, no. 5, vol. 23, May 2001. [4] R. Nock, F. Nielsen, “Semi-supervised statistical region refinement for color image segmentation,” Pattern Recognition no. 6 vol. 38 pp. 835-846, 2005. [5] T. Lee, and M. Lewicki, “Unsupervised classification, segmentation, and enhancement using, ICA mixture model,” IEEE Trans. Image Proc. No. 3 vol 11 pp. 270-279, 2002. [6] H. Shah-Hosseini and R. Safabakhsh, “Automatic multilevel thresholding for image segmentation by growing time adaptive self-organizing map,” IEEE Tans. On Pattern Analysis and Machine Intelligence, no. 10, vol. 24, 2002. [7] T. HORIUCHI, “Grayscale image segmentation using color space,” IEICE Transactions on Information and Systems, E89-D(3) pp. 1231-1237, 2006. [8] T. Horiuchi and S. Hirano, "Colorization algorithm for grayscale image by propagating seed pixels," Proc. IEEE ICIP 2003, pp.457–460, 2003. [9] Y. Deng, and B. Manjunath, “Unsupervised segmentation of color-texture regions in image and video,” IEEE Tans. On Pattern Analysis and Machine Intelligence, no. 3, vol, 23, pp. 800-810, 2001. [10] Z. Tu, and S. Zhu, “Image segmentation by data-driven markov chain montecarlo,” IEEE Tans. On Pattern Analysis and Machine Intelligence, no 5, vol. 24, pp. 657-673, 2002. [11] J. Rushing, H. Ranganth, T. Hinke, and S. Graves, “Image Segmentation using association rule features,” IEEE Trans. on Image Processing, no. 5, vol. 11, 2002. [12] M. Ozden, E. Polat, “A color image segmentation approach for content-based image retrieval,” Pattern Recognition,vol. 40 , issue 4, pp. 1318-1325, 2007. 30
  • 11. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 [13] S. Panda, P. Nanda, and P Mohapatra, “Multiresolution Approach for Color Image Segmentation using MRF Model,” Proceedings of the National Conference on Smart Communication Technologies and Industrial Informatics, SCTII, 03-04 pp. 34-42, Rourkela, Feb 2007. [14] S. Kang, S. Park, Y. Shin, H. Yoo, and D. Jang, “Image segmentation using statistical approach via perception-based color Information,” International Journal of Computer Science and Network Security, no. 4, vol. 8 No.4, April 2008. [15] Bocij, P. et al., Business information systems: Technology, development and management. (London: Financial Times Management, 1999). [16] Richard Casey, " Document Image Analysis", available athttp://cslu.cse.ogi.edu/HLTsurvey/ch2node4.html [17] H Bunke And P S P Wang, "Handbook Of Character Recognition And Document ImageAnalysis", available at:http://www.worldscibooks.com/compsci/2757.html [18] M Simone, " Document Image Analysis And Recognition" , available at :http://www.dsi.unifi.it/~simone/DIAR/ [19] "Document Image Analysis",availableat:http://elib.cs.berkeley.edu/dia.html [20] Richard Casey, " Document Image Analysis", available at:http://cslu.cse.ogi.edu/HLTsurvey/ch2node4.html [21] H Bunke And P S P Wang, "Handbook Of Character Recognition And Document Image Analysis", available at :http://www.worldscibooks.com/compsci/2757.html [22] M Simone, " Document Image Analysis And Recognition" http://www.dsi.unifi.it/~simone/DIAR/ [23] "Basic Images Processing" : "Some general commands related to handling Matlab graphics and printing" "Simple image processing operations that you can do with Matlab" available at: http://noodle.med.yale.edu/~papad/ta/handouts/matlab_image.html [24] "Document Image Analysis" availableat :http://elib.cs.berkeley.edu/dia.html [25] "Getting Started with MATLAB" available at :http://www.stewart.cs.sdsu.edu/cs205/module7/getting6.html [26] "Matlab Image Processing Toolbox" available at :http://homepages.inf.ed.ac.uk/rbf/HIPR2/impmatl.htm [27] Matlab Resources" available at :http://www.cse.uiuc.edu/heath/scicomp/matlab.htm [28] "Read and Display an Image" available at :http://www.mathworks.com/access/helpdesk/help/toolbox/images/getting8.html [29] "Reading and displaying images" matlab toutorial",03/25/2005, available at :http://ai.ucsd.edu/Tutorial/matlab.html#images [30] ALGhalayini M., Shah A., "Introducing The ( POSSDI ) Process : The Process of Optimizing the Selection of The Scanned Document Images". International Joint Conferences on Computer, Information, Systems Sciences, and Engineering (CISSE 06) December 4 - 14, 2006. [31] Mohammad A. ALGhalayini and ELQasemALNemah, “An Efficient Storage and Retrieval Technique for Documents Using Symantec Document Segmentation (SDS) Approach”; CISSE 2007, The Third International Joint Conferenceson Computer, Information, and Systems Sciences, and Engineering (CISSE 07). [32] Mohammad A. ALGhalayini “Introducing The Concept Of Information Pixels and the SIPA ( Storing Information Pixels Addresses ) Method As a Model for Document Storage”; CISSE 2011, The Seventh International Joint Conferenceson Computer, Information, and Systems Sciences, and Engineering (CISSE 11). 31
  • 12. International Journal of Information Technology, Control and Automation (IJITCA) Vol.3, No.4, October 2013 AUTHOR Mohammad A. ALGhalayini, Bs.C. in Computer Science and Mathematics, Iowa, USA. 1987. Ms.C. in Computer Science, Alabama, USA. 1999. Ph.D. in Information Management Systems, London, UK. 2010.The author lectured at the College of Information & Computer Sciences of King Saud University, KSA for more than 14 years. Specialized in document management and databases, the author developed several imaging database systems for various KSU offices and departments, currently working as an academic researcherand supervisor of computer and Information unit at the KSU Vice Rectorate of Graduate Studies and scientific Research. 32