search for books and compare prices
Tables of Contents for Data Management and Internet Computing for Image/Pattern Analysis
Chapter/Section Title
Page #
Page Count
Preface
xi
 
Acknowledgements
xiv
 
Overview
1
14
PRIP and IAP
1
1
IAP Dada Management in PRIP Computations
2
2
Internet Computing for PRIP
4
1
PRIP Applications
5
1
Book Perspective
6
9
References
10
5
Part I SOFTWARE MANAGEMENT: MODELS & ALGORITHMS
Issues of Data Management
15
18
IAP Input Data Format
15
4
Local Data Movement
19
4
Regional Data Movement
23
1
Global Data Movement
23
3
Regular and Irregular Data Movement
26
1
IAP Data Movement on Parallel Machines
27
2
Conclusion
29
4
References
30
3
Typical PRIP Algorithms and IAP Data Management
33
30
Introduction
33
1
Linear Spatial Filtering
34
4
Morphological Filtering
38
3
Hough Transform
41
14
Labeling
55
4
Conclusion
59
4
References
60
3
Neural Evolution Model for Gray Level Image Restoration
63
14
Introduction
63
1
MES Image Restoration Model
64
1
Improvements of ES Operators
65
2
Neural Evolution Algorithm (NEA)
67
2
Simulations and Comparisons
69
5
Conclusion
74
3
References
75
2
Partial Fractal Model for Hybird Image Coding
77
20
Introduction
77
2
Basic Fractal Mapping
79
2
Partial Fractal Mapping
81
4
A General Framework for Hybrid Fractal-based Image Coding Systems
85
1
A Hybrid Image Coding System
86
5
Simulations and Conclusions
91
6
References
94
3
Best Neighborhood Madle for Block-Based Image Coding
97
18
Introduction
97
1
Model Definition
98
2
Algorithm Implementation
100
3
ES-BNM Algorithm
103
2
Simulations and Comparisons
105
6
Conclusion and Discussion
111
4
References
111
4
Impulse Noise Removal Algorithms for IAP
115
18
Introduction
115
1
Noise Model and Impulse Detector
116
3
Polynomial Approximation (PA) Filter
119
2
Adaptive Order PA (AOPA) Filter
121
4
Simulations and Comparisons
125
6
Conclusion
131
2
References
131
2
Part II HARDWARE MANAGEMENT: ARCHITECTURES & RESOURCE SHARING
Internet Resource Sharing
133
18
Introduction
133
1
Software Resources
134
2
Hardware Resources
136
8
Image and Multimedia Databases on the Internet
144
2
Conclusion
146
5
References
147
4
Parallel Processing for Image Restoration
151
16
Introduction
151
1
JBNM Algorithm
152
6
Parallel Computation
158
3
Experimental Results and Analysis
161
3
Conclusion
164
3
References
164
3
Image Storage Management on Parallel Computers
167
28
Introduction
167
2
Linear Parallel Memory Systems
169
6
XOR Storage Schemes
175
13
Conclusion and Discussion
188
7
References
191
4
Data Management for Sequential Computer Systems
195
26
Introduction
195
3
Reuse Ratio Analysis
198
6
Performance Improvement from Cache Optimization
204
4
XOR Cache Mapping
208
8
Conclusion
216
5
References
218
3
Permutation Routing for Interconnection Network
221
44
Introduction
221
1
Two-stage Routing for BPC Permutations
222
13
Routing LC Permutations on MIMD Hypercubes
235
13
Setting up N Independent Paths for LC-Permutations
248
10
Conclusion
258
7
References
260
5
Part III TYPICAL EXAMPLES: APPLICATIONS & IMPLEMENTATIONS
Compression Coding for IAP Data
265
32
Introduction
265
4
Quadtree Compression and an Improved Reconstruction Phase
269
12
Wavelet Compression and Vector Quantization
281
8
The Performance of ModLVQ Algorithm
289
3
Conclusion
292
5
References
293
4
Reduction of Blocking Effects and Removal of Impulse Noise
297
20
Introduction
297
1
Blocking Effect Reduction Algorithm
298
2
Experimental Results
300
3
Progressive Switching Median Filter for the Removal of Impulse Noise
303
6
Impulse Noise Detection and Removal Using Fuzzy Techniques
309
4
Conclusion
313
4
References
314
3
Image Restoration from Internet Transmission Corruption
317
14
Introduction
317
3
Restoration Algorithm
320
1
Experimental Results
321
3
Performance Analysis
324
3
Conclusion
327
4
References
327
4
Encryption Coding for IAP Data
331
30
Introduction
331
3
Secret-key Encryption Algorithms
334
3
Public-key Encryption Algorithms
337
1
Image and Video Encryption Coding
338
6
Partial Encryption of Quadtree Compressed Images
344
7
Partial Encryption of Wavelet Compressed Images
351
3
Partial Encryption of Videos
354
2
Conclusion
356
5
References
357
4
Index
361