2022 5th International Conference on Engineering Technology and Its Applications (IICETA) 2022
DOI: 10.1109/iiceta54559.2022.9888456
|View full text |Cite
|
Sign up to set email alerts
|

Soft Edge Detection by Mamdani Fuzzy Inference of Color Image

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…In this study, we have computed the performance parameters, namely Precision (PRE), Sensitivity (SEN), Accuracy (ACC), Specificity (SP), also F1 score (F1), to consider the data label imbalance [21]. One of the literatures most widely used and extensively discussed accuracy measurements is the F1 score [22][23][24][25].…”
Section: Design Of the Proposed Methodsmentioning
confidence: 99%
“…In this study, we have computed the performance parameters, namely Precision (PRE), Sensitivity (SEN), Accuracy (ACC), Specificity (SP), also F1 score (F1), to consider the data label imbalance [21]. One of the literatures most widely used and extensively discussed accuracy measurements is the F1 score [22][23][24][25].…”
Section: Design Of the Proposed Methodsmentioning
confidence: 99%
“…And so on for all locations and all angular; see Figure 5. In the last step, the twenty-two texture features of the GLCM matrices we used to perform the proposed method are defined in Table 1 [10,18,19]. Where 𝑄 = ∑…”
Section: 𝑝(𝑟 𝑐|𝑑 𝜃) = 𝑁 𝑑𝜃 (𝑟 𝑐) 𝑁mentioning
confidence: 99%
“…Typically, GLCM is known for its ability to extract robust statistical texture features, with many researchers utilizing it as a secondary feature extraction method, in addition to other techniques, in the MATLAB image processing toolbox, where only four features (contrast, correlation, energy, and inverse difference moment/homogeneity) [9][10][11][12][13] 2). However, GLCM is usually used as a secondary feature extractor method [14,15].…”
Section: Introductionmentioning
confidence: 99%
“…The proposed approach will employ a proportionately big secret key (Represented with a hexadecimal number system) in the form of a byte matrix of size (16 × 16). This key was used for replacement operations and transposition and provides propagation characteristics with good obfuscation in an encrypted form [8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%