3 research outputs found

    Bat Algorithm Based Non-linear Contrast Stretching for Satellite Image Enhancement

    No full text
    The remote sensing images acquired from the satellites are low contrast images. The availability of low contrast images and failure of the traditional methods such as Histogram Equalization and Gamma correction in preserving the brightness levels in the image are the main issues in satellite image processing. This paper proposes an optimized contrast stretching using non-linear transformation for image enhancement. The non-linear transformation is influenced by the appropriate choice of control parameters for the sample images since manual tuning for individual images is tedious. A Bat algorithm based tuning is employed for the automated selection of control parameters in the transformation. The performance of the optimization algorithm is compared against other metaheuristic algorithms such as Ant Colony Optimization (ACO) and Particle Swarm Optimization (PSO). It is noted that the bat algorithm based contrast enhancement outperforms the other optimization techniques in terms of metrics such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Absolute Mean Brightness Error (AMBE), Entropy and CPU time (Central Processing Unit)

    Image Processing Techniques for Analysis of Satellite Images for Historical Maps Classification—An Overview

    No full text
    Historical maps classification has become an important application in today’s scenario of everchanging land boundaries. Historical map changes include the change in boundaries of cities/states, vegetation regions, water bodies and so forth. Change detection in these regions are mainly carried out via satellite images. Hence, an extensive knowledge on satellite image processing is necessary for historical map classification applications. An exhaustive analysis on the merits and demerits of many satellite image processing methods are discussed in this paper. Though several computational methods are available, different methods perform differently for the various satellite image processing applications. Wrong selection of methods will lead to inferior results for a specific application. This work highlights the methods and the suitable satellite imaging methods associated with these applications. Several comparative analyses are also performed in this work to show the suitability of several methods. This work will help support the selection of innovative solutions for the different problems associated with satellite image processing applications

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT

    No full text
    The Industrial Internet of Things (IIoT) has led to the growth and expansion of various new opportunities in the new Industrial Transformation. There have been notable challenges regarding the security of data and challenges related to privacy when collecting real-time and automatic data while observing applications in the industry. This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. In FT-Block (Federated transfer learning blockchain), several blockchains are applied to preserve privacy and security for all types of industrial applications. Additionally, by introducing the authentication mechanism based on transfer learning, blockchains can enhance the preservation and security standards for industrial applications. Specifically, Novel Supportive Twin Delayed DDPG trains the user model to authenticate specific regions. As it is considered one of the most open and scalable interacting platforms of information, it successfully helps in the positive transfer of different kinds of data between devices in more significant and local operations of the industry. It is mainly due to a single authentication factor, and the poor adaptation to regular increases in the number of users and different requirements that make the current authentication mechanism suffer a lot in IIoT. As a result, it has been very clearly observed that the given solutions are very useful
    corecore