Comment on "collinear segment detection using HT neighborhoods"

Article


Rahmdel, P., Shi, D. and Comley, R. 2013. Comment on "collinear segment detection using HT neighborhoods". IEEE Transactions on Image Processing. 23 (2), pp. 952-955. https://doi.org/10.1109/TIP.2013.2291329
TypeArticle
TitleComment on "collinear segment detection using HT neighborhoods"
AuthorsRahmdel, P., Shi, D. and Comley, R.
Abstract

A novel application of the Hough transform (HT) neighborhood approach to collinear segment detection was proposed in [1]. It, however, suffered from one major weakness in that it could not provide an effective solution to the case of segment intersection. This paper analyzes a vital prerequisite step, disturbance elimination in the Hough space, and shows why, this method alone, is incapable of distinguishing the true segment endpoints. To address the problem, a unique HT butterfly separation method is proposed in this correspondence, as an essential complement to the above publication.

Research GroupArtificial Intelligence group
PublisherInstitute of Electrical and Electronics Engineers
JournalIEEE Transactions on Image Processing
ISSN1057-7149
Publication dates
Print14 Nov 2013
Publication process dates
Deposited03 Jun 2015
Output statusPublished
Digital Object Identifier (DOI)https://doi.org/10.1109/TIP.2013.2291329
LanguageEnglish
Permalink -

https://repository.mdx.ac.uk/item/858w3

  • 16
    total views
  • 0
    total downloads
  • 0
    views this month
  • 0
    downloads this month

Export as

Related outputs

An enhanced deep learning architecture for classification of Tuberculosis types from CT lung images
Gao, X., Comley, R. and Khan, M. 2020. An enhanced deep learning architecture for classification of Tuberculosis types from CT lung images. ICIP 2020: 27th IEEE International Conference on Image Processing. Abu Dhabi, Unites Arab Emirates (Virtual Conference) 25 - 28 Oct 2020 IEEE. pp. 2486-2490 https://doi.org/10.1109/ICIP40778.2020.9190815
Design of a robotic sensorimotor system for phantom limb pain rehabilitation
Snow, P., Loureiro, R. and Comley, R. 2014. Design of a robotic sensorimotor system for phantom limb pain rehabilitation. 5th IEEE RAS & EMBS International Conference on Biomedical Robotics and Biomechatronics (BioRob). São Paulo, Brazil 12 - 15 Aug 2014 IEEE. pp. 120-125 https://doi.org/10.1109/BIOROB.2014.6913763
Optical flow estimation via steered-L1 norm
Zayouna, A., Comley, R. and Shi, D. 2016. Optical flow estimation via steered-L1 norm. Pan, Z. and Skala, V. (ed.) 24th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision. Plzen, Czech Republic 30 May - 03 Jun 2016 Digital Library University of West Bohemia. pp. 81-90
Parametric tracking across multiple cameras
Sebastian, P., Voon, Y. and Comley, R. 2017. Parametric tracking across multiple cameras. Pertanika Journal of Science & Technology. 25 ((S)Jan), pp. 159-168.
A review of hough transform and line segment detection approaches
Rahmdel, P., Comley, R., Shi, D. and McElduff, S. 2015. A review of hough transform and line segment detection approaches. 10th International Conference on Computer Vision Theory and Applications (VISAPP 2015). Berlin, Germany 11 - 14 Mar 2015 SCITEPRESS - Science and Technology Publications. pp. 411-418 https://doi.org/10.5220/0005268904110418
Colour space effect on tracking in video surveillance
Sebastian, P., Voon, Y. and Comley, R. 2010. Colour space effect on tracking in video surveillance. International Journal on Electrical Engineering and Informatics. 2 (4), pp. 298-312.
Content-based petrieval of 3D medical images
Qian, Y., Gao, X., Loomes, M., Comley, R., Barn, B., Hui, R. and Tian, Z. 2011. Content-based petrieval of 3D medical images. in: Gemert-Pijnen, L., Ossebaard, H. and Hämäläinen, P. (ed.) eTELEMED 2011, The Third International Conference on eHealth, Telemedicine, and Social Medicine IARIA. pp. 7-12
Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents
Georgiades, A., Luo, Y., Lasebae, A. and Comley, R. 2009. Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents. Trilling, L., Perkins, D., Dionysios, D., Perlovsky, L., Davey, K., Landgrebe, D., Marino, M., Russell, D., Collicott, S., Ceccarelli, M. and Lund, J. (ed.) The 8th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications (EHAC '09). Cambridge, UK 21 - 23 Feb 2009 WSEAS Press. pp. 51-56
The effect of colour space on tracking robustness
Sebastian, P., Voon, Y. and Comley, R. 2008. The effect of colour space on tracking robustness. in: 2008 3rd IEEE Conference on Industrial Electronics and Applications Institute of Electrical and Electronics Engineers (IEEE). pp. 2512-2516
Introducing mobile home agents into the distributed authentication protocol to achieve location privacy in mobile IPv6
Georgiades, A., Luo, Y., Lasebae, A. and Comley, R. 2008. Introducing mobile home agents into the distributed authentication protocol to achieve location privacy in mobile IPv6. International Journal of Communications. 2 (3), pp. 185-194.
Retrieval of 3D medical images via their texture features
Gao, X., Qian, Y., Loomes, M., Barn, B., Comley, R., Chapman, A., Rix, J., Hui, R. and Tian, Z. 2012. Retrieval of 3D medical images via their texture features. International Journal on Advances in Software. 4 (3&4), pp. 499-509.
Extended mobile WiMAX signal transmission over RoF via triple symmetrical dispersion system SMF, DCF and CFBG
Al Noor, M., Loo, J. and Comley, R. 2011. Extended mobile WiMAX signal transmission over RoF via triple symmetrical dispersion system SMF, DCF and CFBG. International Journal on Advances in Telecommunications. 4 (1&2), pp. 183-193.
Bridging the abridged – the diffusion of Telemedicine in Europe and China
Gao, X., Loomes, M. and Comley, R. 2012. Bridging the abridged – the diffusion of Telemedicine in Europe and China. in: Rodrigues, J., Díez, I. and Abajo, B. (ed.) Telemedicine and e-health services, policies, and applications: avancements and developments USA IGI Global. pp. 451-495
Local-global optical flow for image registration agents
Zayouna, A., Comley, R. and Shi, D. 2011. Local-global optical flow for image registration agents. iUBICOM ’11: The 6th International Workshop on Ubiquitous and Collaborative Computing. Northumbria University, Newcastle 04 Jul 2011
Wireless mesh network security: a traffic engineering management approach
Muogilim, O., Loo, J. and Comley, R. 2011. Wireless mesh network security: a traffic engineering management approach. Journal of Network and Computer Applications. 34 (2), pp. 478-491. https://doi.org/10.1016/j.jnca.2010.03.027
Towards healthcare based on ubiquitous computing
Shi, D. and Comley, R. 2010. Towards healthcare based on ubiquitous computing. IEEE Transactions on Systems, Man, and Cybernetics eNewsletter. 33.
Heuristic standards for universal design in the face of technological diversity.
Adams, R. and Comley, R. 2009. Heuristic standards for universal design in the face of technological diversity. 2009 IEEE Accessing the Future Conference. Boston: Northeastern University 20 - 21 Jul 2009
The potential of the BCI for accessible and smart e-learning
Adams, R., Comley, R. and Ghoreyshi, M. 2009. The potential of the BCI for accessible and smart e-learning. Lecture Notes in Computer Science. 5615, pp. 467-476. https://doi.org/10.1007/978-3-642-02710-9_51
Texture-based 3d image retrieval for medical applications
Gao, X., Qian, Y., Hui, R., Loomes, M., Comley, R., Barn, B., Chapman, A. and Rix, J. 2010. Texture-based 3d image retrieval for medical applications. Macedo, M. (ed.) IADIS International Conference e-Health 2010. Freiburg, Germany 29 - 31 Jul 2010 IADIS. pp. 101-108
Dual identity return routability for the security of mobile IPv6 binding updates within the distributed authentication protocol.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2006. Dual identity return routability for the security of mobile IPv6 binding updates within the distributed authentication protocol. in: WSEAS Conferences: Elounda, Agios Nikolaos, Crete, Greece, August 18-20, 2006 Athens WSEAS.
Distributed authentication protocol utilizing dual identity return routability for the security of binding updates within mobile IPv6.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2006. Distributed authentication protocol utilizing dual identity return routability for the security of binding updates within mobile IPv6. WSEAS transactions on communications. 5 (10), pp. 1109-2742.
Distributed authentication protocol for the security of binding updates in mobile IPv6.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Distributed authentication protocol for the security of binding updates in mobile IPv6. in: Proceedings of the 9th WSEAS international CSCC multiconference: circuits 05, systems 05, computers 05, communications 05. WSEAS.
Binding update security for mobile IPv6 using a distributed authentication protocol.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Binding update security for mobile IPv6 using a distributed authentication protocol. WSEAS transactions on communications. 4 (9), pp. 1109-2742.
Trinity protocol for authentication of binding updates in mobile IPv6.
Luo, Y., Comley, R., Lasebae, A. and Georgiades, A. 2004. Trinity protocol for authentication of binding updates in mobile IPv6. WSEAS transactions on communications. 3 (3), pp. 872-877.
Attacks on an ISO/IEC 11770-2 key establishment protocol
Comley, R. and Cheng, Z. 2005. Attacks on an ISO/IEC 11770-2 key establishment protocol. International Journal of Network Security. 3 (3), pp. 290-295.
Remove key escrow from the identity-based encryption system.
Comley, R., Vasiu, L. and Cheng, Z. 2004. Remove key escrow from the identity-based encryption system. IFIP Eighteenth World Computer Congress, Information Technology, TC1 3rd International Conference on Theoretical Computer Science in the Era of Network and Mobile Computing, IFIP TCS2004, Toulouse, France. Proceedings.. 3 (3), pp. 37-50.
Toward a robust system to monitor the head motions during PET based on facial landmarks detection: a new approach
Anishenko, S., Osimov, V., Shaposhnikov, D., Podladchikova, L., Comley, R. and Gao, X. 2008. Toward a robust system to monitor the head motions during PET based on facial landmarks detection: a new approach. Puuronen, S., Pechenizkiy, M., Tsymbal, A. and Lee, D. (ed.) 21st IEEE International Symposium on Computer-Based Medical Systems. Jyvaskyla, Finland 17 - 19 Jun 2008 IEEE Computer Society. pp. 50-52 https://doi.org/10.1109/CBMS.2008.19
General and efficient Certificateless Public Key Encryption constructions
Comley, R., Cheng, Z., Chen, L. and Ling, L. 2007. General and efficient Certificateless Public Key Encryption constructions. Takagi, T., Okamoto, T., Okamoto. E. and Okamoto, T. (ed.) Pairing-Based Cryptography - Pairing 2007. First International Conference. Tokyo, Japan 02 - 04 Jul 2007 Berlin, Heidelberg Springer. https://doi.org/10.1007/978-3-540-73489-5_6
Identity-based key agreement with unilateral identity privacy using pairings
Comley, R., Chen, L., Tang, Q. and Cheng, Z. 2006. Identity-based key agreement with unilateral identity privacy using pairings. Chen, K., Deng, R., Lai, X. and Zhou, J. (ed.) Information Security Practice and Experience: Second International Conference, ISPEC 2006. Hangzhou, China 11 - 14 Apr 2006 Berlin, Heidelberg Springer. https://doi.org/10.1007/11689522_19