Computer Analysis of Images and Patterns: Proceedings of the International Conference on Automatic Image Processing Held in Wismar (GDR), September 2–4, 1987 [Reprint 2021 ed.] 9783112473184, 9783112473177


189 30 17MB

German Pages 288 Year 1988

Report DMCA / Copyright

DOWNLOAD PDF FILE

Recommend Papers

Computer Analysis of Images and Patterns: Proceedings of the International Conference on Automatic Image Processing Held in Wismar (GDR), September 2–4, 1987 [Reprint 2021 ed.]
 9783112473184, 9783112473177

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

Mathematica/ Research Computer Analysis of Images and Patterns edited by L.P. YaroslavskiT- A.Rosenfeld W. Wilhelmi

Band 4 0 AKADEMIE-VERLAG BERLIN

In this series original contributions of mathematical research in all fields are contained, such as — research monographs — collections of papers to a single topic — reports on congresses of exceptional interest for mathematical research. This series is aimed at promoting quick information and communication between mathematicians of the various special branches.

In diese Reihe werden Originalbeiträge zu allen Gebieten der mathematischen Forschung aufgenommen wie — Forschungsmonographien — Sammlungen von Arbeiten zu einem speziellen Thema — Berichte von Tagungen, die für die mathematische Forschung besonders aktuell sind. Die Reihe soll die schnelle Information und gute Kommunikation zwischen den Mathematikern der verschiedenen Fachgebiete fördern.

Manuscripts in English and German comprising at least 100 pages and not more than 500 pages can be admitted to this series. With respect to a quick publication the manuscripts are reproduced photomechanically. Authors w h o are interested in this series please turn directly to the 'Akademie-Verlag'. Here you will get more detailed information about the form of the manuscripts and the modalities of publication.

Manuskripte in englischer und deutscher Sprache, die mindestens 100,Seiten und n i c h t ' mehr als 500 Seiten umfassen, können in diese Reihe aufgenommen werden. Im Interesse einer schnellen Publikation werden die Manuskripte auf fotomechanischem Weg reproduziert. Autoren, die an der Veröffentlichung entsprechender Arbeiten in dieser Reihe interessiert sind, wenden sich bitte direkt an den Akademie-Verlag. Sie erhalten dort genauere Informationen über die'Gestaltung der Manuskripte und die Modalitäten der Veröffentlichung.

Computer Analysis of Images and Patterns

Mathematical Research Wissenschaftliche Beiträge herausgegeben von der Akademie der Wissenschaften der D D R Karl-Weierstraß-Institut für Mathematik

Band 40 C o m p u t e r Analysis of Images a n d Patterns

Mathematische Forschung

Computer Analysis of Images and Patterns Proceedings of the II. International Conference CAIP '87 on Automatic Image Processing held in Wismar (GDR), September 2 - 4 , 1 9 8 7 edited by Leonid P. Yaroslavsku Azriel Rosenfeld, Wolfgang Wilhelmi

Akademie-Verlag Berlin 1987

Herausgeber: P r o f . Dr. sc.techn. Leonid P. Yaroslavskil Akademie der Wissenschaften der UdSSR Institut

für Probleme der Informationsübertragung

(IPPI)

P r o f . Dr. phil. A z r i e l Rosenfeld University of Maryland Center for Automation

Research

P r o f . D r . sc.techn. Wolfgang

Wilhelm!

Akademie der Wissenschaften der DDR Zentralinstitut

für Kybernetik und

Informationsprozesse

Die Titel dieser Schriftenreihe werden vom Originalmanuskript Autoren

der

reproduziert

ISBN 3-05-500451-5 ISSN 0138-3019 Erschienen im Akademie-Verlag Berlin.DDR-1086 Berlin, Leipziger Str.3-4 ( ^ Akademie-Verlag Berlin

1987

Lizenznummer: 202 • 100/410/87 Printed in the German Democratic

Republic

Gesamtherstellung: VEB K o n g r e ß - und Werbedruck, 9273 Oberlungwitz Lektor: Dipl^-Phys. Gisela Lagowitz LSV 1085 Bestellnummer: 763 790 6 (2182/40) 03800

F o r e wo r d

volume

This

is

a collection

International

Conference

held

in W i s m a r ,

The

success

Automatic

GDR

from

achieved

Image

encouraged

of

on

Automatic

September by

the

Processing

the

selected

2

papers Image

to

I.

4,

Processing

Processing for

Control

a

conference

doing so The

so

far

we

hope

played

image

of

machines

new

hand,

CAIP

intelligence

methods

reader

not

will

balanced The

quality

dependent invited

of

on

was

in

cooperation

WGMA.

"87

in

and

the

of

by

-

two

has

in

the

and

years

importance

on

Berlin)

Automatic later.

and

great

its

influence

recognition

In role

progress real

image

towards world

the

on

generations

scenes. of

On

the

artificial

field.

breakthroughs

the

principles

new

penetration

analysis

reached

methods

infor m a t i o n - p r o c e s s i n g the

the

for

two

members was

Executive

showing and

volume.-

given

by

Technik

containing

the

of

A

Board

pages

the

of

highest to

complete

another 2

Each

taken

topicality

this

is

publication

refereeing.

decision

presentations (KdT)

of

accepted

final

approach

publication

'87

Undoubtedly

but

rather

a

well

advance.

Contributions

innovative

image

spectacular

quality

with

its

the

demonstrated

into

evaluated The

shown

understanding

papers

the

Committee.

and

observe

continuous

have

ones)

of

in

Measurement

increase

II.

circles.

kinds

parallel capable

second

will

expert

processing

(especially

other

CAIP

contributions

introduction

of

that

among

presented

by

organize

CAIP

Group

Society

to

-

the

Conference

17-18,1985

Scientific-Techno1ogical (WGMA)

at

1987.

International

(October

Image

delivered

by

paper

except

for

those

Programm

W.Wilhelmi

R.Klette

Image score CAIP

on

and

Processing in

by

Group

scientific

were

overview

abstract

essentially

International

publication of

was

the

every

level,

selected

including

in

for

poster

Kammer

der

contribution.

The of

editors the

would

program

like

to e x p r e s s

S.Fuchs

(Kiev)

(Wismar)

F.Sloboda

(Bratislava)

K.Voss

(Oena)

competent and

and

chairman

contributors.

A great

Dr.

R.Klette

during

are

very

obliged

of

help

to

sponsoring

made

in

Informatics

work

to h o s t

of t h e s e

Last,

not

a successful

Looking

the

editors and

this

and was

decision

V.Kempe,

and

due

of

this

conference and

the

to

CAIP'87

to

all

other

the

support

of

making

process.

We

Director

Information

of

the

Central

Processes,

Institute,

and

for

in c o n n n e c t i o n

to

their

with

the

WGMA.

Prof.Dr. in W i s m a r

providing

we

and M r . and

forward

would

D.Schmidt and

excellent

like

K.-D.Muller

fruitful

to C A I P

Azriel Rosenfeld Leonid Yaroslavski? Wolfgang Wilhelml

6

for

to

for

to M r s .

his

G.Lagowitz

conditions

for

the

Proceedings.

least,

H.Rustenbach,

ensure

sessions,

the G D R

are

publication

Mrs.

of

Akademie-Verlag

but

the

Director

thanks

organizational the

of

Cybernetics

efforts

from

cooperation,

Prof.Dr.

Deputy

special

reliable

the e v a l u a t i o n

Prof.Dr. H.Fuchs,

Our

invited

(Hannover)

O.Schmidt

of

the

(Berlin)

M.I. Schlesinger

Society

members

(Berlin)

C.-E.Liedtke

Institute

other

(Linkoping)

V.A.Kovalevsky

much

the

(Dresden)

R.Klette

speakers

to

(Budapest)

B.Gudmundsson

their

thanks

committee

D .Chetverikov

for

their

CAIP

'89

for '87.

to their

thank

Mrs.

untiring

E.Bahn,

efforts

to

Table

of

I. S I G N A L

PROCESSING

Oackel , Koschan , Neumann : Design of Operators for B e z i e r - A p p r o x i m a 1 1 on 3ahn

:

Edge

Detection

Vitkus

on

the

, Yaroslavsky

Recursive

Basis

Content

Image

Processing

Based

on 11

of

Piecewise

Linear Models

23

:

Algorithms

for

Local

Adaptive

Linear

Filtration

Matej : Fast Transform Methods of Image Reconstruction P a r a l l e l I m p l e m e n t a t i o n on S I M D - T y p e C o m p u t e r Morhac : Error-Free Dec o n v o l u t i o n and its Application Processing Krasnov , Glotov , Starodubtsev : I n t e g r a l I n v a r i a n t D e s c r i p t i o n of G r e y - S c a l e II.

34

and

Their 40

in

Signal

Images

48 55

ALGORITHMS

HegedOs Fast

Geometric

Correction

Lucka , Creutzburg Parallel Sommer The

SIMD

Design

Vilser

of

Optimal

Matrix

, Vajtersic

Using

the

Gaussian

DOLP

, Grundmann

Multiplication

I I I . AI Klette

: Systems-

on

A Modern Software

, Kleifi , K l e t t e

Knowledge

Based

62 : Number

Transform

70

Program

Edge

Detectors

82

:

an A r r a y - L o g i c a l

R et si eo n nt ae ld Te rp ar di

Processor

by a n e nL ti s t Compo

Ds ae td a Ba

90

101 95

TECHNIQUES

Liedtke . Ender : U t i l i z a t i o n of K n o w l e d g e C o n t e n t s of an I n d u s t r i a l V i s i o n S y s t e m Hesse

Fermat

, Gössel

L ul t eh s. N .: : Kö AI fm fa i rc a en s sf io nrgm a tA il og no sr i ton g e sa gn ee PT ro h m sI m aon Se tl rl up cr to uc r e s sor C

Expert

Images

:

, Creutzburg

Parallel

, Grundmann

Convolution

, Meinel

of D i g i t a l

Technology

for

the

107

Automated

Adaptation

121

: Construction

for

Sagerer , Schroder , Niemann : An A s s o c i a t i v e N e t w o r k as S y s t e m S h e l l Understanding

Image

for

Analysis

Knowledge

Based

133

Image

141

7

IV. Klette The

,

Voss

Three

MODELLING

:

Basic

Kovalevsky

IMAGE

Formulas

of

Neighborhood

Structures

149

:

The Topology of Cellular Complexes as Applied to Image Processing 162 Hub 1 e r : A n A x i o m a t i c A p p r o a c h to D i s c r e t e G e o m e t r y a n d I t s R e l a t i o n s to U s u a l D i g i t a l G e o m e t r y for I m a g e P r o c e s s i n g 174 K i e s e w e t t er

:

T w o di m e n s i on a l Chetverikov On

Some

Toward

Concepts

, Stiehl a Testbed

Vos s : Discrete

Orders

and

Picture

Processing

187

:

Basic

Neumann

Topologie

of

Texture

Analysis

196

: for

Integral

Evaluation

of

Early

Visual

Processes

202

Geometry V.

209 APPLICATIONS

Fritzsch : V i s i o n for I n d u s t r y

213

Danz , Elter , Mangoldt , Möhlmann , Rubbert , Weidlich I m a g e P r o c e s s i n g for t h e V E G A - M i s s i o n to C o m e t H a l l e y Höfling , Osten Image Modelling Interferometry Pietrzyk The

: and

Kühnert

in

Holographic

and

Speckle

, Michel

Based ,

Fringe

Henniger

,

Pattern Hussack

Processing

the

, Schwarze

Programmable

235

: Patterns

in 242

IMPLEMENTATION

A6472

Image

Processing

System

by

Use

of 247

Unger , Winter , Feist , Marzok , Zedier : P r o g r a m P a c k a g e for P r o c e s s i n g L i n e Flow Like A6472 Using A d a p t i v e and A n i s o t r o p i c M e t h o d s

Images

by

BVS 255

:

Hardware-Structure

Owczarczyk : D e s i g n of a H i g h - P e r f o r m a n c e

8

System

Aided Processing of SEM-Interference M e c h a n i c s and M i e r o m e c h a n i c s

Luth.W. . Gössel : L i n e a r F i l t e r i n g on Residue Arithmetics

The

Pattern

:

VI.

Kutschke

222

227

Microcomputer

Computer Fracture

Analysis

:

Binary

GIPP Image

and

Its

Application

Processor

266 275

AUTHOR

INDEX

Chetverikov

196

Creutzburg

70.

90

Danz

222

Elter Ender

222 121

Feist Fritzsch

255 213

Glotov Gössel Grundmann

90, 70,

Hegedüs Henniger Hesse Höfling Hübler Hussack

62 242 133 227 174 242

Jack el 3ahn Kiesewetter Klein Klette Köles Koschan Kovalevsky Krasnov Kühnert Kutschke Liedtke Lucka Luth, N Luth, W Mangoldt Marzok Mat e j Mei nel Michel Möhlmann Morhac

55 247 90

11 23

107,

133,

187 133 149 101 11 162 55 242 266 121 70 95 247 222 255 40 82 242 '2 2 2 48

Neumann Niemann

11 141

Osten Owczarczyk

227 275

9

Pietrzyk

235

Rubbert

222

Sagerer Schröder Schwarze Sommer Starodubtsev Stiehl

141 141 266 82 55 202

Unger

255

. . ."

Vajtersic Vilser Vitkus Voss

149,

70 90 34 209

Weidlich

222

Winter

255

Yaroslavsky Zedier

10

34 255

DESIGN OF OPERATORS FOR IMAGE PROCESSING BASED ON THE BÉZIER-APPROXIMATION D. Jackél, A. Koschan, H. Neumann

»

ABSTRACT The function values of a two-dimensional image function can be considered as a threedimensional surface. The often degraded image function should be preprocessed with a smoothing operator prior to a differentiation step to detect significant changes In the intensity surface. In consideration of the B£zler surface approximation technique such operators can be generated

on a quadratic segment with an odd number of control

points. We will call them 'B6zier' operators. The Bernstein polynomials Involved are to be understood as weighting functions of the control points. The first and second derivatives of a 'B6zler' operator can be developed easily.

An

efficiency

evaluation

of

the

'Bezier'

operators

compared

to

'Gaussian'

operators suggested by Harr and Hildreth has been made. As a result, the substantially easier generation

of

'B6zler'-convolution

operators

has to

be stressed.

Furthermore,

empiric studies done on some test Images have shown that 'B6zler' operators of smaller size

are

reacting

less

strong

with

regard to

discretization

errors

than

'Gaussian'

operators. 1. INTRODUCTION For the detection of discontinuities in the Image function which can be caused by different

physical

rotationally

phenomena,

symmetrical

Harr/Hlldreth

operators

based

on

16] suggest the

a

Laplacian

set of

of a

variable

sized

two-dimensional

Gaussian:

F*G(x,y,o)

-1 n-o«

l

-

x> + y s 2Bj , • ( v ) i=C j=0 with

r i j = [ xi j , y i j , Zi j

]T

,

u,v

e [ 0.0

1.0 ] ,

Bi,n(u) - (n!/(i!•(n-i)!))>u'•(1-u)»"1 , Bj , • ( v ) = ( m ! / ( j ! - ( m - j ) ! ) ) - v J • ( l - v ) - - J and n,m = Order of function (surface with ( n + l ) x ( m + l ) control points r i j ) The functions Bi,n(u) and Bj,»(v), often referred to as 'blending functions', are Bernstein polynomials. The Cartesian components of these vector functions can be simplified because the control points are equidistant. Thus, the functions x(u,v) and y(u,v) are defined by the equations x(u,v) = n-u and y(u,v) = m-v. With this the vector function r(u,v) can be considerably reduced. We receive:

r(u,v)

n-u m-v

n m Z ZI j -Bt , o ( u ) -Bj , • ( v ) I i=0 j=0

(1)

With regard to the definition of rotationally symmetrical operators and the local approximation of the image intensity function by a Monge patch r = u-ei + v-ea + /(u,v)-e3 equation (1) gives

r(u,v)

12

= n

u v z(u,v)/n

1/n

n I i=0

u v

m I zi j -Bi , n ( u ) - B j , D ( v ) j-0

Based on the equation

(1) the first and second partial derivatives of r(u,v) can be

calculated easily. Differentiating the vector function only Its z-components z(u,v)

=

n I i=0

m I 21 j - B i , > ( u ) - B j , » ( v ) j-0

have to be considered. If the Bernstein polynomials are broken into their components Bi,.(u)

= C(n,i)*F(u)

with C ( n , i ) the

partial

-

(2)

n ! / ( n - i ) ! and F ( u )

differentiation

of first

« u'-(l-u)»-' and

second

,

order

of z(u,v)

is

reduced

to

the

differentiation of the function F(u). We receive for the first derivative F ' (u)

« i-u'"1 •(1-u)»-'

-

(n-i)-u'•(1-u)»-'

and for the second derivative F"(u)

-

i - [ ( i - 1 ) - u ' - *1 • ( 1 - u ) ' - 1 1 - ( n - i ) • u ' - ' • ( 1 - u ) " - ' " 1 ] (n-i)•[i-u'" •(1-u)»-'" - (n-i-1)-u'•(1-u)»-'-»]

(3)

For the disassembly and the differentiation of the Bernstein polynomial as a

function

of the parameter v the corresponding equations result analogously. 2.2 GENERATION OF DISCRETE TWO-DIMENSIONAL CONVOLUTION KERNELS Depending on the number of given control points a corresponding number of Bernstein polynomials are established Bezier surface

as 'blending functions'.

Inside a defined interval of the

these define an unambiguous function value

for a random point

(u,v)

depending on the number of control points. The influence of every control point value when calculating a specific function value at a random location (u,v) is a direct result of

the

functional

values

of

the

corresponding

Bernstein

polynomial

for

u

or

v,

respectively. Thus, these have to be understood as weighting functions for the- control points. For

the

development

mentioned principle

of

rotationally

symmetrical

can be applied. Such

convolution

operator can

kernels

be generated

the

on a

above

quadratic

segment with an odd number of control points. If it is assumed that this set of picture elements for the specifically viewed local neighborhood of a point Pij control

points

for

a

Bezier approximation,

this point

is

located

is the set of

Inside

the

viewed

interval at the location (0.5,0.5). For the calculation of the functional value of the Bezier surface at the location (u,v) = (0.5,0.5) the weighting of the individual control point from the Bernstein polynomials at the

location

u=0.6

or

v=0.5,

respectively,

is

neighborhood of the central picture element. Fig.

received

depending

on

the

1(a) shows by way of example

local the

shape of the Bernstein polynomials with the order n=14.

13

Fig. 1: Bernstein polynomials with 16 control points. The broken line in the diagrams indicates the weighting of the function values based on the values of the polynomials at u = 0.6. (a) Original function, (b) first derivative. For the approximation of differentiation operators from Bernstein polynomials the partial derivatives of the equation (2) can be calculated with the support of equation (3). As a result we receive the slope and/or the curvature of the polynomials for each point Inside the interval. Fig. 1(b) represents the shape of the first derivative of Bernstein polynomials with

n + 1 = 15 control points.

The

operators

convolution

for

smoothing

and

partial

differentiation of

the

image

function can be generated from Bernstein polynomials and their derivatives at location (u,v) = (0.5,0.5). With regard to the definition of the discrete convolution (see e.g. [1]) the convolution kernels of different operators are defined as follows: B(i,j)

= (1/n)-Bt , . (0.5)-Bj , • (0.5) ,

B. ( i , j )

= ( 1 / n ) - B ' i , . ( 0 . 5 ) - B j . . (0.5) ,

B,(i,j)

= (1/n)-Bi , . ( 0 . 5 ) - B ' j , n (0.5) ,

Bu i ( i , j ) = (1/n« ) - B " i , • ( 0 . 5 ) - B j , . ( 0 . 5 ) .. Bw(i,j)

= (1/n» ) - B i , n ( 0 . 5 ) - B 1 ' j , o ( 0 . 5 ) , a n d

B.»(i,j)

-

( l / n 2 ) « B ' i , o (0 . 5) • B ' j , • ( 0 . 5 ) .

For a more complete development, see [3]. Fig. 2 shows convolution operators and their partial derivatives generated by applying the 'B6zier' approximation. Fig. 3 displays by way of example the corresponding power spectra In frequency domain for B(iJ) and its Laplaclan.

14

Fig. 2: Convolution operator of order n=32 generated by t h e method based on t h e B6zler approximation. (a) Operator for noise suppression B, (b) f i r s t partial derivative B«, (c) second partial derivative Buu, (d) operator for generation of negative Laplacian - v * B = -(B..(1J)+Btv(1J))

Fig. 3: Corresponding power spectra for (a) operator for noise suppression B, (b) negative Laplacian operator. 3. IMPLEMENTATION AND RESULTS The

'Bezler'

operators

of

parametric

size

as

developed

In

Chapter

2 have

been

implemented for a floating point arithmetic. For the evaluation of the processing results from convolutions

of operators

with digital

image matrices,

operators

from a

two-

dimensional Gaussian and their partial derivatives of equal size have been applied to t h e same images. In the following, the applied operators will be presented and compared with each other. Subsequently,

the

image data

and the

processing purposes will

be specified and

a

representation of the processing results will be given.

15

3.1 'BEZIER' OPERATORS IN COMPARISON WITH GAUSSIAN OPERATORS For the application of 'Bezier' operators for digital image matrices and the evaluation of the processing results Gaussian operators with different generated.

standard deviations were

d=5.08-o as suggested by Grimson |2) served as criterion for the definition

of the kernel size. For the present implementation the specific operator size was defined to be d =L5.08-o| + 4 (I.e. functional values in the periphery are only 1% of the maximum magnitude),

where the

absolute value of the

diameter has

to be

an odd

number. Dependent on the parametrlzatlon of the Gaussian operators the operator sizes defined this way are serving as predetermination for the number of control points for generating corresponding 'Bezier' operators. Table 1 shows the operator parameters and their size in a survey.

Gauss o

Diameter

0 75 1 41 3 18 Table 1:

Bézier d

Order

7 11 19

n

Control points

6 10 18

Parametrization

(n+1)

7 11 19

and s i z e o f a p p l i e d

operators

Numerical differentiation of Images is an ill-posed problem which can be regularized by filtering the data prior to differentiation [8], Small sized 'B6zier' operators for example with a diameter of 7 control points show better low pass characteristics than Gaussian operators of equal size (standard deviation o = 0.75). Real-valued kernels and corresponding

frequency

spectra

for

equal

sized

(same

diameter)

Gaussian

and

'Bezier'

convolution kernels are presented in Table 2/Fig.4 and Table 3/Fig.5. Besides the operator for the suppression of noise there have been generated specific convolution kernels

for each partial derivative

up to second order. With this it

is

possible to evaluate the magnitudes and the directions of the gradients as well as zero crossings of the second derivative apart from image smoothing.

0.00000 3.00000 ). 00003 0.00000 >.00023 1.00332

0.00003 1.00332 1.04782

0.00009 0.00808 0.11632

0.00003 0.00000 1.00000 0.00332 0.00023 1.00000 0.04782 0.00332 1.00003

0.00009 0.00808 0.11632

0.28294

0.11632 0.00808 1.00009

0.00003 1.00332 1.04782 0.00000 1.00023 1.00332 0.00000 1.00000 .00003

0.11632 0.00808 0.00009

0.04782 0.00332 1.00003 0.00332 0.00023 1.00000 0.00003 0.00000 1.00000

Table 2: Gaussian kernel 7x7 with a = 0.75.

16

Fig.4: Plot of corresponding freqency spectra.

0.00024 0.80146 0.00366 0.00146 0.00878 0.02197 0.00366 0.02197 0.05493

0.00488 0.02929 0.07324

0.00366 0.00146 0.00024 0.02197 0.00878 0.00146 0.05493 0.02197 0.00366

0.00488 0.02929 0.07324

0.09765

0.07324 0.02929 0.00488

0.00366 0.02197 0.05493 0.00146 0.00878 0.02197 0.00024 0.00146 0.00366

0.07324 0.02929 0.00488

0.05493 0.02197 0.00366 0.02197 0.00878 0.00146 0.00366 0.00146 0.00024

Table 3 :

' B 6 z i e r * k e r n e l with 7x7 c o n t r o l p o i n t s . F i g . 5 : P l o t of corresponding frequency s p e c t r a .

3.2 IMAGE DATA AND PROCESSING PURPOSES For t e s t i n g t h e 'B6zier' operators Image matrices a s described

in the following

chapter

were applied: CIRCRAMP_0 Is a s y n t h e t i c a l l y generated

image matrix where different

ratios

can

and

slopes

of an

Image function

be simulated

examplarily.

local

contrast

The

function

contains a ramp of c o n s t a n t slope, a circular region of c o n s t a n t I n t e n s i t y being located in the image c e n t e r (Fig. 6(a)). Thereby the ramp is approximated by a step function of two pixels width with an increase of two i n t e n s i t y units each (Fig. 6(b)).

Fig. 6: Structure of the Image function CIRCRAMP_0: (a) surface representation of t h e i n t e n s i t y function, (b) approximation of t h e ramp of c o n s t a n t slope. With t h i s image function a closed contour of c o n s t a n t c u r v a t u r e with uniformly changing local contrast ratio is simulated. The accuracy

of t h e

and direction)

detection

can

be tested

as

well

as t h e

gradient calculation of

discontinuities.

pattern can be used to evaluate the behaviour of the operator response in

(magnitude This

test

dependence

of discretization errors and weakly contrasted images.

17

LSPHERE60 shows a synthetically generated image function of a luminance distribution for a Lambertlan surface of a sphere model. The radius of

calculated using a computer-graphics illumination

the sphere is 50 pixels

(equals 101 pixels In diameter). The

simulated light source is in the viewer position. Viewer and light source are assumed to be at infinity, so in this case orthographic projection and parallel light rays can be assumed. For the illuminated surface of the sphere a continuous intensity surface of negative curvature is generated, bounded by a tangential occluding contour. Vlth

the

help

of

this

image

function

the

susceptibility

to

disturbances

of

the

convolution kernels of small size with regard to discretization errors with intensity distributions (r.g. with shaded surfaces) can be evaluated. 3.3 PROCESSING RESULTS Fig. 7(a) and (b) show the processing results of Gaussian operators with a = 1.41 and 'B6zler' operators with n = 10 on CIRCRAMP_0, respectively. The processing results for the visualization

in Fig. 7 are strongly dependent on the selection of

an Interval

( - £ , + i ) for the definition of a real-valued zero. This arrangement is arbitrary. An 'a priori' calculation based on the image data and the convolution kernels remains an unsolved problem. The empirical determination for e =

10-"

showed consistently good

results. The absolute values of Intensity gradients vary according to the local contrast ratio continuously along the contour of the embedded region. The directions are orthogonal to the tangent of the circular contour. In regions of constant intensity the operators yield the value zero; the constant slope of the ramp causes gradients of constant norm In the direction of the steepest descend. The second derivative of (Laplacian)

and

by

this

considerably from v8B"I

also

the

number

of

the

detected

to paG"I. It is recognizable that the

the image function

zero V2B

crossings

differ

operator for the

digital 6tep function of constant slope Indicates a curvature value with the absolute value of zero (linear approximation) while opposed to this the V-2G operator specifically shows across a picture element alternatively positive and negative curvatures (waving approximation). This filter response therefore leads for

y 2 G'I

to the detection of zero

crossings in the 'subpixel' area over the whole ramp.

Fig. 8(a)

and (b) show processing results on LSPHERE60 for the calculation

of the

second derivative of curved Intensity surfaces for operators of small size. For o = 0.75 the y*G operator shows non-significant changes In curvature (zero crossings) inside the intensity surface that has a uniform curvature. The corresponding

V'B-Operator with

n = 6 shows only one alteration of curvature for the enclosing occluding contour.

18

Fig. 7: Convolution of CIRCRAMP_0 with (a) G'l, P 2 G'I = (Gxx + Gyy)"I, | vG'I | = / ( ( G * ' I ) , + (Gy"I) J ), ^?»=tan" 1 (Gy"I/Gi"I) with o = 1.41, (b) B"I, = (B.a+B» v )'I, | pB"I I =V((Bu"I) a +(Bv'I) J ), V«=tan-»(Bv'I/Bu - I) with n = 10. For the representation of a r e a l - v a l u e d zero an i n t e r v a l ( - £ , + £ ) with t = 10-® has been chosen, i.e. all values with a magnitude |x| < 10-® have been mapped to zero.

19



ttfij «ft -»ith B „ ' i * r • •

o Fig. 8: C o n v o l u t i o n s of LSPHERE60 w i t h (a) G'l, V 2 G = ( G « + G , y ) , l with (b) B'l, y2B=(Baii+Bvv)'I with

20

o = 0.75 n = 6

4. SUMMARY Based on a given number af control points a surface can be sufficiently approximated with

the

help

of

polynomials.

elements as a set

We

looked

upon

the

of control points representing

two-dimensional

set

of

quantized intensities. The

picture

plecewlse

approximation of this set of control points by a Bernsteln/B6zler surface segment causes a smoothing of the discrete functional shape.

The Bernstein polynomials used for the approximation are to be understood as weighting functions of

the specific

discrete

discrete control point interval

control points. Choosing

the

central

element

of a Bezler surface of even order parametric

of

a

operators

for image processing can be generated.

The generation

of

'Bäzler'

convolution

kernels

is

easily

practiced:

Mainly, only

the

calculations of integer-valued factorials and of the powers of 0.5 are necessary. Thus, the

generation

of

parametric

Bfezier'

convolution

kernels

and

their

derivatives

is

numerically more stable than the generation of Gaussian kernels and their derivatives. The

definition

boundary

for

of

the

size

of

the functional

Gaussian

value

operators

(minimum

depends

value),

on

a randomly

contrarlly

the

size

selected

of

'B6zier'

operators is uniquely defined by the number of given control points.

The processing results In Chapter 3 show that Gaussian operators of the smallest size react very strongly to discretization errors. Corresponding 'Bezler'

operators,

however,

do not perform this way. Neurophyslological examinations of the human retina showed a sensibility profile for the receptive field which can be described In good approximation by a Gaussian distribution or a difference of two Gaussians (see f.e. Korn [4]). It has to

be

checked

If

maybe the

use

of

Bernstein

polynomials

could

yield

to

a

better

modeling of these profiles.

Furthermore, the less strong reaction of 'B6zler' operators with regard to discretization errors

could

analysis

in

maybe "lower

result scales"

in

a

(see

further Investigations. Finally

more

accurate

Pentland

operator

17]). These

response

aspects

will

for be

local a part

shading of

our

the advantages of 'B6zier' operators In comparison with

Gaussian operators should be summarized:

-

substantially easier generation of 'Bezler' operators,

-

more numerical stability,

-

less strong reaction with regard to discretization errors.

This work was carried out within SFB 203 at the Technische Universität Berlin and was funded by the Deutsche Forschungsgemeinschaft (DFG).

21

REFERENCES (1| |2| [3] [4) (6) [6] [71 [8]

22

Gonzalez, R.C., P. Wintz: Digital Image Processing. Reading: Addlson-Vesley 1977. Grlmson, W.E.L.: From Images to Surfaces: A Computational Study of the Human Early Visual System. The MIT Press, Cambridge 1981. Jackél, D., A. Koschan, H. Neumann: Entwurf lokaler Blldvorverarbeitungsoperatoren auf der Grundlage der Bézler- Approximation. Techn. Bericht 86-11 , Institut für Techn. Informatik, TU Berlin 1986. Korn, A.: Das visuelle System als Merkmalsfilter, Fachberichte Messen, Steuern, Regeln, Band 13: Aspekte der Informationsverarbeitung, Springer Berlin 1985. Marr, D., E. Hildreth.: Theory of Edge Detection. Proc. of the Royal Society of London, Vol.207 (1980), Series B, pp.187-217. Newman, W.M., R.F. Sproull.: Principle of Interactive Computer Graphics. McGrawHill Tokyo. 2nd Edition 1979. Pentland, A.P.: Local Shading Analysis. Tech. Note 272, AI Center, SRI International 1982. Torre, V., T. Poggio: On Edge Detection. MIT, AI Laboratory: AI Memo 768 1984.

EDGE DETECTION ON THE BASIS OF P1ECEWISE LINEAR MODELS Herbert Jahn

'

1. Introduction The detection of edges in images is one of the most important steps towards an automatical analysis of scenes. Because of the 3D - origin of 2D - images there may exist objects in the images which are not limited by closed contours (one may think about the objekt "nose" in the image of a human face). Therefore a primary forming of regions is not always the right first step and the recognition of objects primarily should be oriented at (not always closed) contours. The generation of a raw primal sketch in the sense of Marr and Hildreth /1/ therefore should be the first step in object recognition in natural scenes. This does not mean that the use of region forming methods generally fails; in simple (artificial) scenes they may work sufficiently but in complex (natural) scenes the edge detection should be primary. Towards a simple description of scenes by edges one first has to find edge elements (edgels). In a second step these edgels must be linked to get edge fragments. In this process besides the strength of the edgels their direction is needed too. The method for the generation of edgels which is described in this paper therefore provides both the strength and direction of edge elements. According to their different origin in the 3D - scene there exist edges of different types. The most important types are the step edge and the roof edge /2/ (Fig. 1).

Fig. 1 There exist many methods (e.g. /1/ - /4/) for the detection of edges and especially step edges. Most important are the methods basing on the gradient operator, the Hueckel operator, template matching and the zero crossings of the 2n

=

k = ( M ^ ) " 1 - 4 T ( 1 /2-k)-H .

(13)

(12) i s a f i n i t e impulse response ( F I R ) f i l t e r f o r the c a l c u l a t i o n of the l e f t - hand l i m i t s y^(i+i/2) and y ' L ( i + y 2 ) which i s easy to implement on a d i g i t a l computer. The estimation q u a l i t y of the V t t l s t a t e component z^(i+i/2) ( i s given by the mean quadratic estimation e r r o r o ^ ( i

+

y

2

)

=

y 5 i t follows from f i g . 4- that *.» there i s a d i s c o n t i n u i t y i f the i n e q u a l i t y

SiL,v(i+1/2) = K , v ( i + 1 / 2 ) ] V 2

y L - K=$L > / + or y - ;T > K'(«T + S ) ^ T

^ p

T

-

p

i s f u l f i l l e d . Here K i s a c e r t a i n parameter.

Fig. 4 In the ; e n e r a l case the i n e q u a l i t y - y1! > K - ( ? r + ? L ) or ( f o r both s t a t e components) f«E + L 1 O =1,2) P.* - ' < „ 1 > must be f u l f i l l e d . One obtains d i s c o n t i n u i t i e s of o ^ order i f st v a l i d f o r v = 1 and d i s c o n t i n u i t i e s of 1 order for v = 2. If there i s a d i s c o n t i n u i t y of order at x=i+1/2 but not one order, then i t corresponds to a step edge ( f i g . 5 a ) . Reversely, 26

(18) (13) i s of , 1 s t a roof

edge corresponds to a discontinuity of 1 s t order (fig. 5b). If there are discontinuities of Otl1 and 1 s t order then one has a combined edge type (fig. 5c). 1 ! I._J J * i r^-»-"— i ^ I I I I LLI I I L_L L. _J I I LLI I I I

JS.

a)

b)

1

"i-4-*. 1 "*i J-* i-_J 1—J LLI 1 1 1— c)

Fig. 5

Now it must be discussed how to choose the numbers nJu T and n,-, which deK fine the extent of the left - hand and right - hand estimation interval respectively. Obviously n (n = n L ,n R ) must be grater than or equal two in order to make possible the estimation of two unknowns z^ and Zg. A reduction of noise results for n> 3 only. But an unlimited increase of n in general is iiot possible because then the polynomial model becomes invalid. According to /7/ one gets an optimal value n L ^ of n L (and analogously of n^) if one looks for the minimum of the estimation error f ^ v (i+1/2) with respect to n L (for n L > n L rnin » 3). In order to do that the quantities must be calculated for'all possible values ¡ujjj» This can be done recursively if one makes use of the equations f

nL+1^ =f n

^

m:

=

mJ

L

^

+

4T (-niT1/2)'H "yi-nL •

+ (f,T(-nL-y2)-H'HT. (-nL-i/2) ,

which immediately follow from (10) and (11) (see /7/). But much computer time is needed if one uses this method, and therefore it is only justified if very weak edges have to be detected. In most cases it is better to choose fixed values n^, n^ in dependence of the class of pictures which are to be processed. Now the advantages and disadvantages of the method have to be discussed. First of all, as already has been said, the method enables one to detect edges of a general type with step and roof edges as special cases. In large regions with smoothly increasing or decreasing grey values no edges will be found. In this respect the method is superior to the well - known gradient methods. The possibility of detection of an edge according to (18) depends on the dissimilarities in the vicinity of the edge. The less the deviations of the grey values from P L linear polynomials are, that is the less the quantities ? " and f ^T? fc f n^jp zA T/ are, the less may be the difference |zn ~ n v ! which represents the strength of the edgel. So very weak edges may be detected if the data values left - hand and right - hand of the discontinuity fit the polynomials exactly. To avoid the detection of too weak edges one may change the decision criterion (18) slightly to get

27

IznR,» — zn. ,»l

>

v

+ÌÌ v ]

.

(19)

Here the quantities A y (y = 1,2) are certain thresholds which define lower limits for the detection of discontinuities of O^*1 and order respectively. According to (19) one can define a quntity •¿R sL nn nT S„ ; , (20) i> = MIX which may be associated to an edgel as a feature with ls„ ) being the strength of the edgel of order V-1. If one has found a discontinuity in row i at position j with a strength |S^ 0W j and another one in column 0 at position i with a strength then it is possible to defind an edgel at (i,j) which is characterized by the feature vector (S* ow , S ° o 1 ) giving the strength and direction of the edgel. Another good property of the method follows from the possibility of an optimal choice of the numbers n R and n^. At a given noise strength the capability of detection of a discontinuity increases with increasing n^ and n^ as long as the used polynomial model is not violated. This is a property which the visual system of humans has too: The perception of an edge increases with the extends of the adjacent homogeneous regions. Another advantage is the possibility of a straightforward extension of the method to the detection of discontinuities of higher order using polynomials of order V -1 (v2 3)• The main deficiency of the method follows from the fact that the used model does not represent the reality sufficiently good. Sharp discontinuities usually do not oo°ur in real images because the modulation transfer function of the receiving camera provides a blur. Therefore in most cases "soft" edges will be observed, and in the next step the convolution of the polynomial pieces with the line spread function of the used camera must be provided. A further deficiency of the method results from the used one - dimensional half - neighborhoods. If n L and / or n^ are small then the reduction of noise may be not sufficient resulting in false edgels. Therefore a generalization of the method to two - dimensional half neighborhoods would be desirable. 3. Results First of all the method has been tested using simulated data. Fig. 6 shows a step - like grey value profile corrupted by uncorrelated Gaussian noise with different dispersions = 0.1 for is 4-0, o* = 0.2 for iS 41).

23

Fig. 6 Various combinations of the thresholds K„ and d* has been checked. In the case of fig. 6 (and in other cases too) one obtains good results for K„ = 3...5 (* = 1,2), A, = 0...0.3 and \ = n^ = n R = 5 and K^ = 3, Kg =

A, = 0.3,

0...0.03. Choosing

= 0.03 one finds disconti-

nuities of 0 t h order between 20 and 21, 40 and

and discontinuities

of 1 s t order between 17 and 18, 18 and 19, 22 and 2 3 . The latter disappear if one makes use of the algorithm with optimal choice of n^ and n^ (njj,n-g>5). Then discontinuities of 0^'a order between 19 and 20, 20 and 21, 38 and 39, 40 and 41, 41 and 42 will be found ( with the greatest strength between 20 and 21, 40 and 41). st Fig. 7 shows a discontinuity of 1 order, that is y^

(i = 1..40),

y ± = - 2 + 0.05-i +«-• ^ ( i = 41...80), 45 with a sheet of paper each the visual system of humans does not find the discontinuity too. But the algorithm with the optimal choice of n^ and

(n^.n-^ > 5) finds dis-

continuities in the vicinity of i = 40, and the one with the greatest strength is situated between 39 and 40. At this discontinuity the optimal values of n L and n R are 41 and 39 respectively. This means that all data have been used for the estimation.

29

Ill the upper part of fig. 8 a simulated grey value step (on the left grey value 190, on the right - 210) corrupted by white Gaussian noise with the dispersion (i = 5 is shown. The lower part of fig. 8 shows the overlay of the result of the application of the O tl1 order edge operator with the parameters K^ = 3, A, = 0.3. The optimal values of the numbers n L and rig automatically have been chosen within the interval [5,20].

Fig. 8

The upper part of fig. 9 represents another simulated scene. In the columns 1 - 4 4 and 85 - 128 there is a constant intensity with mean grey value 100. Prom column 45 to column 64 the grey value linearly increases up to the top level 200. After that it linearly decreases, reaching the value 100 at column 84. This spike as well as the other parts of the image again are corrupted by white Gaussian noise with order at tf = 8. It is difficult to recognize the discontinuity of column 64 in the photographic picture which means that it is not a very strong one. The lower part of the picture displays the strength st of the found discontinuities of 1 order (maximum brightness corresponds to a strength of 15» ¿i = 0.02, 5 - n0pi; - 20). In almost all image rows the existing discontinuities have been found but the strong noise influence is evident. Fig. 10 shows parts of the Baltic Sea islands Hiddensee and Rugia. The essential edges are found by the edge operator of 0 tl1 order with the parameters \ = 0.3, 5 - n0p-(; - 20 (maximum brightness corresponds to edge strength 8), as is shown in the lower part of fig. 10. Edges which are bounds of very narrow regions are not detected satisfactorily beoause n m i r i = 5 was chosen. With respect to this better results will be obtained if one chooses n m i n = 3« But then many additional noise edgels arise.

30

The a e r i a l photograph of an agricultural f i e l d ( f i g . 11) shows s t r i p e l i k e structures which very much resemble the simulated spike of f i g . 9. Applying the O^*1 order edge operator one does not obtain useful results st but the 1 order edge strength displayed in the lower part of the picture s a t i s f a c t o r i l y reproduce the structure ( A* = 0.02, 5 i n ^f 10). I t f o l l o w s that in natural scenes roof edges may be essential which means that the use of the usual edge operators f o r the detection of step edges i s not s u f f i c i e n t . The last picture ( f i g . 12) has been generated by computer graphics. I t contains regions with gradually changing grey values as w e l l as edges of d i f f e r e n t type and strength. The lower part of the picture shows discontinuities of 0 ^ order. Maximum brightness corresponds to an edge strength of 10 ( A„ = 0.3. 5 i n ^ i 20). Weak edges which cannot be r e produced by the photographic picture ( e . g . in the right upper p a r t ) 31

precisely have been found and the bright central point within the circle on the left of the picture too.

Fig. 11

Pig. 12

REFERENCES /1/ D. Marr, E. Hildreth; Theory of edge detection; Proc. R. Soc. Lond. B 207, 1980,p. 187 - 217 /2/ R. M. Haralick; Digital step edges from zero crossing of second directional derivatives; IEEE Trans., PAMI-6, 1984-, p. 58 - 68 /3/ G. B. Shaw; Local and regional edge detectors: some comparisons; Computer Graphics and Image Processing 9» 1979, P. 135 - 149

/4•/ R. Nevatia; Machine Perception; Prentice - Hall, Inc., Englewood Cliffs, N. J., 1982 /5/ I. Leclerc, S. W. Zucker; The local structure of image discontinuities in one t dimension;

Proc. of the 7

32

Int. Conf. on Pattern Recogn., Montreal, 1984

/ 6 / L. A. Zadeh, C. Ä. Deeoer; Linear System Theory; Mo Graw - H i l l , New York, 1963 / 7 / H. Jahn; Zustandsschätzung mit adaptivem Gedächtnis MESSEN STEUERN HEGELN 24, 1981, S . 146 - 149

RECURSIVE ALGORITHMS FOR LOCAL A D A P T I V E LINEAR FILTRATION R. Vitkus, L. Yaroslavsky

Introduction The class of adaptive linear filters for picture processing as d e scribed in [ 1 , 2 ] features frequency response adjustable to the observed spectrum of the picture to be processed. These filters can be adaptive locally or globally. With global adaptation, the filter parameters are adjusted to the spectrum estimate of all the picture w h i c h is processed as a whole. W i t h local adaptation, the filter parameters are adjusted to the spectra of individual image fragments, and the image is processed on the fragment-by-fragment

basis. Finally, w i t h sliding processing

where the passage from one fragment to another is done by shifting the fragment center by one sample, at each step only the central sample is estimated and the adjustment is performed over all the fragment.

This

implies that in order to perform filtration one must estimate the spectrum of each picture fragment, generate the filter frequency response

in

terms of the spectrum, multiply it by the fragment spectrum and perform the inverse spectral transform in a single point, the central

fragment

sample. The technique of adaptive filter parameter adjustment is independent of the chosen orthogonal basis

^ 1 , Zj

w i t h respect to w h i c h pic-

ture fragment spectrum is estimated. Filtration effectiveness,

there-

fore, is defined by the effectiveness of the algorithms for computation through picture fragment

spectra. The discrete Fourier transform

(DFT) is one of the most common orthogonal transforms used in picture processing. The two-dimensional DFT is known (see, for example, £ 2 J ) to be computable recursively w h i c h dramatically reduces the amount of computations in sliding processing. However, the DFT-based

estimation

of Fourier spectra has disadvantages due to the pronounced influence of the boundary effects on the spectrum. Special spectral windows provide better spectral estimation. The discrete cosine transform

(DCT) is an

alternative to spectral windows. It makes better use of signal

samples

for spectrum estimation. Recursive spectral analysis algorithms based on DFT w i t h spectral windows or o n DCT have n e v e r been described in the literature. This paper is devoted to the study of the class of linear orthogonal two-dimensional transforms for w h i c h recursive spectral a n o The authors are w i t h the Institute of Information Transmission Problems, at the USSR Academy of Sciences, 19, Ermolovoyst. Moscow, 101447, USSR

34

lysis algorithms can be constructed and to their description for DPT with cosine spectral window and for DCT.

The class of base functions and recursive algorithms of local spectral analysis. We confine our consideration to two-dimensional linear transforms that are performed over rectangular picture fragments and are separable. All the widely used picture-independent two-dimensional orthogonal transforms meet this constraint by construction. Starting with the property of separability, the two-dimensional recursive algorithms may be constructed by means of one-dimensional transforms along picture rows and columns. Therefore, let us consider at first the algorithms of onedimensional recursive transforms. Let (

{(X(/7)J be sequence of, generally, complex numbers, and k

e

a set of base functions of a transform that are ortho-

gonal over an interval of length mple vector

M

. The components of special sa-

Oti, •••, M~i J

the fragment

, as computed through

{a (f1-M+i),a(n-M+2),...,Cl(n)] are defined by

M-i (")=2- a(n-M+k) k=o

(k) ,

..., M-i

(1)

Write this expression as

M-i a(n-k)

,

1=0,1,M-i

(2>

k'O where h^(k) = (f^ (M~i~ k) . it describes M linear filters with finite pulse response that compute spectrum samples when the processed fragment slides along the sequence. Let us determine the form of filter pulse responses allowing recursive determination of the coefficients (n) with respect to n . At the sample-by-sample shifting of the processed fragment, one end sample leaves it and another appears on the opposite side. Therefore, the requirement that the spectral samples be computed as a linear combination of (a) input and output of the initial sequence at shifting the fragment and (b) the value of the same spectral samples in the previous position of the processed fragment

d*(n) = is Ot

(n-i)

a(n) +d?a(n-M)

,

^

M-i ,

where { C ^ j , and fct*i j are arbitrary numbers, is one of the simplest and natural recursiveness conditions. According to (3), the spectral samples j are computed independently of each other, and at most three multiplications and two

35

additions of, generally, complex numbers are required for one sample. The following expressions may be written for the pulse responses of linear systems described by the difference equations (3): C

f

L

£

k = 0 i

'

''

'

Since we are interested in the final pulse responses of length M

, the

condition

6i

= - di

must be obeyed. Finally, obtain the following relations

and the

coefficients of (3):

(k) = Si c* where

and

; d7 =-Sz c?

C^

are arbitrary numbers. Hence, the following con-

straints on ^cfjf(k)^

result:

(0) cik

t = -(fi (o) Cn Si

=

one substitutes

^f-i(k)

k,? = 0,1,..., M-i

,

are arbitrary real numbers. If the

i s orthonormal,

{ifijz(k)J

that

R

K

=

- ¿Afpf



The

choice of the

defines a particular base. If for t/ftf1

and

of shifted DPT (SDFT) with parameters

K

, obtain the known base

and R

defining the shift

in the space and in the spectral domain, respectively, ( [ 2] ). In this case, the parameters =

(*/{M)

C*

f^P-tfO)^

anc

*

from (4) are

exp[i2rft*R)K/M]

= ex/7 l-L2ir( ? + R)]

, (5)

.

By substituting them into (4) obtain after appropriate transformations the following recursive algo ithm for computation of SDFT spectrum -

W

36

1

) =

) ^(n-i)

+e*plizïï(>t +R) K/M J

x

7

(exp(iZTTR) a(n) -a(n-M))}

e%p[-i2ïï(t+R)/M]

(6,

Notably, the amount of arithmetic operations for computation of mz ] =

R

i L , i 2 E i ( n i» n 2 )] R i : L ,i 2 C x ( n i ' n 2 0 ( m o d u >

il»i 2 = 0,1,...,N-1 and 11 is the Fermat number defined as ,t M = F ^ = 2

+1

t=

0,1,2,...

(14)

The properties of the solution aire : - it does not require the calculation of inverse matrix - there do not arise rounding-off errors due to the integer operations executed in modular arithmetic 3. Algorithm of two dimensional deconvolution using Fermat transform Two dimensional Fermat transform pair can be expressed as > 1 ?=J ,alnl ,a2n2 I x(a T ,a P ) = (mod M )

(15)

respectively x(nlfn2) =

_2

H=1 aj=0

where n^, n 2 > a^, a 2 ¿jCj1 (mod if) = 1

fcl oC/

1

1

/ ~a2n; oL 2 2 X ^ . a ^

(mod it)

(iß)

= 0,1,...,N-l; N is a power of 2 and there holds (17)

Similarly the same transform pair can be written in matrix notation as X = [T. X.T] (mod M ) resp.

50

(18)

x = (t_1. X'T_1J (mod M)

(19)

where T, T-^" are Fermat resp.inverse Fermat transform matrices. The error-free one dimensional algorithm was derived and published in

.

According to this derivation the two-dimensional error-free deconvolutioia algorithm can be described as follows 1. Calculate the matrix of the transformed values of the two-dimensional response function h H = T.h.T (mod M )

(20)

2. Calculate the matrix H ^ such that for all their elements H ^i^jig) there holds H (i1,i2)- H~ 1 |i 1 ,i 2 ) (mod M) = 1

i-^ig = 0,1,..., N-l

(2l)

Using the matrix H from. eq.(20) we can write for the determinant of system (7 ) N-l

D(mod M) = DJJ

3. Let

N-l

flo

(mod M )

i i

y n i Q ^ j n g ) = yfn^iig)

(22)

n-^,^ = 0,1,...,N-1

4. Calculate the transform of ym^ Y M 0 = [T.ym 0 .T](mod M ) 5. For i 1 »i2

=

(23)

0,1,...,N-1 calculate

X0(ilfi2) = [ H - ^ i ^ i ^ . Y M ^ i ^ i ^ m o d 6. The inverse transform of X« is xM

p. M x M (mod m ) = — XJJ(mod m )

D = [ V ^ X 0 «T _ 1 ](mod m ) = —

7. Let x(i l f i 2 l

- XQII^IJ

= DJJ X ^ i ^ ^ ij.^

8. According to y? =

%

(mod M )

=

0

(25) (26)

N"1

'2?)

*0

7 (

(24)

(6) ,(7) calculate the vector

form the matrix =

tO

y

v

yQ and then D

-yo)

yn^ = y-^mod M )

calculate matrices

j + i = yj+ifmod

M

(36)

)

15. If for a l l i 1 » i 2 = 0 , 1 , . . . , » - ! y ^ i 1 ! » 1 ^ ! = °> t h e n f i n i s h the calculation. If not, increment j and repeat f r o m point 10 on. 16.

= x ^ t ^ /

D

ii»^

=

0,1,...,N-1

(37)

Well known Euclidian algorithm can be used for calculation of needed inverse number

(see eq. 21} in the framework of modular arithmetic. One

version of such; algorithm is described in

.

The error-free algorithm also requires the value of determinant in (28) ,(37) . In; £ t h e

algorithm for precise calculation of the deter-

minant o f one-dimensional convolution, system was introduced. The algorithm to calculate the determinant of matrix for two-dimensional. case (see eq. (6)and (7)) was found and described in ^ 7 ^ •

4. Applications The described method of deconvolution was used to the resolution enhancement in processing of spectroscopic data. The algorithms were applied to data given in fig.l and 3. Fig. 1 shows spectrum consisting of 4 peaks located very closely to each other (positions

86, 89, 93, 97 } heights 150, 100, 50, 200 ) .

Looking at this figure we cannot state the existence of second and third peak in the middle of the spectrum. Fig. 2 shows the spectrum after deconvolution.

52

A

t ^ X Fig. 1



X

Fig. 2

Similarly the two-dimensional deconvolution algorithm described in part 3 of this paper was verified. Fig. 3 shows the spectrum before deconvolution (positions x 1 = 7 = 9, x 2 = 10, y 2 = 8, x^ = 8, y^ =5» heights 200, 150, 50) and fig. 4 shows deconvoluted spectrum with evidently better resolution«

Fig. 3

Fig. 4

The algorithms were implemented for a TPA-70 minicomputer(Hungarian production ) . The modulus M = F^ = 65537 and coefficient oL= 3 were chosen in order to permit the length of the transformed vector or matrix up to 65536.

5. Conclusion The method described in the paper shows that Fermat transform can be successfully used also for the two-dimensional deconvolution. The main point of the usage of modular arithmetic is an elimination of the rounding-off errors. On the other hand commonly used Fourier transform gives a solution with oscillations. Unfortunately, the algoritlm is rather time-consuming since the

53

calculation process must be repeated several times. But there is a possibility to eliminate this disadvantage using specialized processor of the fast Fermat transform.

6. Literature [l] f2j [3^

£4] [5J [6] [7J [ßj [9j

54

Ahmed,N., Rao, K.R. : Orthogonal Transforms for Digital Signal Processing. Springer-Verlag, Berlin 1975« Goutte, R., Prost, R., Georges, A. : Déconvolution numérique avec prolongement spectral. Applications aux signaux et aux images. Analusis £ (1980) 1, 6-15. Grabaric, B.S., o'Halloran, R.J., Smith, D.E. : Resolution Enhancement of A.C. Polarographics Peaks by Déconvolution Using Fast Fourier Transform. Analytica Chimica Acta ^¿¿(1981), 349- 358. Kennet, T.J., Prestwich, W.V.,: Incremental Déconvolution I. Algorithm Development and Assessement. Nuclear Instruments and Methods 201 (1982), 317-327. Lacoste, L.J.B, s Déconvolution by Succesive Approximations. Geophysics ¿X (1982) 12, 1724-1730. MorhéS, M. : Precise Déconvolution Using the Fermat Number Transform. Computers and Math, with Appls. 12A (1986) 3, 319329. Morhäö, M.: System Identification and Déconvolution Using the Fourier and the Fermat transforms . In Slovak . Dissertation, Bratislava 1983. Nussbaumer, H.J. : Fast Fourier Transform and Convolution Algorithms. Springer-Verlag, Berlin 1981. Ore, 0. : Number Theory and Its History. McGraw-Hill, New York 1948.

Integral Invariant Description of Grey-Scale Images A.E.Krasnov, A.K.Glotov, V.F.Starodubtsev

Introduction In certain applikations of the automatic monitoring one has to generate image description that are independent of unknown initial conditions of the object in question. A most complicated and most common is the case where all the information on object state is contained in the degrees of grey of its image. In this connection, the problem of constructing an integral invariant image description cannot be regarded as the new. vThen one comes across an individual object or a group of objects making up a complex scene, the problem may by of interest by itself or be the basic element of a more general, e.g. structural, description. Mathematically, construction of the integral description involves calculation of various functionals of two-dimensional functions which may be exemplified by the well known methods of moment, spectral or statistical invariants [1,2,3J. The ever increasing amount of methods for separation of image features attests the importance of the problem and, at the same time, points to the lack of a unique approach to it[4]. The lack of generality is the common disadvantage of these methods because they depend on the nature of image and disregard the physical properties of the image as the subject of inquire. As the result, degenerate descriptions are obtained where similar descriptions correspond to structurally different images, and the causes of degeneracy and the ways to its elimination are not clear. This paper aims at an integral invariant method of image description that is free of the above demerits and emphasizes a description invariant to translation-and-scale image transformations. Image is primarily regarded here not as a function but as a physical object or the result of interaction of certain physical processes such as spatial propagation of electromagnetic oscillations or waves and detection of physical v a lues related to them. Owing to the common nature of the dynamic processes of electromagnetic wave propagation, the method suggested here may be used for image description in the optical, radio-frequency or X-ray bands. In each of the bands there are, however, specific features of wave detection. In this connection, the paper considers the promising digital, analogue and optical hardware for implementation of the proposed method in different applications.

^ The authors are with the Institute of Control Sciences, 65, Profsoyuznaya St., Moscow, 117342, USSR.

55

Qualitative description of image. Phase portrait of the image spatial structure. Let us consider a scalar electromagnetic signal corresponding to the intensity of electromagnetic field propagating from the object under consideration to the detector. The signal is described in mathematical terms as a real function E(x,y,z,t) of space (x,y,z) and time (t) coordinates. The interaction of the field and detector including operations of measurement and computation results in the image I(x,y,t), a positive definite function giving mathematically adequate spatial structure of the electromagnetic signal observed at the aperture of the detector. It goes without saying that in the process of image generation the physical properties of both signal and detection are taken into account in order to render as much information contained in the signal as possible. In the final image, however, the usefui qualitative properties of the signal, interrelations between its individual components are reduced. Description of their relations is the integral image description. This interrelation may be established by taking into account the space-time relations between the components of electromagnetic signal E or the physical process corresponding this signal. This space-time relation is known to be expressible according to the laws of the classical electrodynamics as the wave equation c^ V^E = d t^ that is satisfied by field E in the free space [5}. In practice, at image generation one observes quasi-stationary electromagnetic fields E(x,y,z,t) = ft(x,y,z) cos(cot) having the variation speed of envelope f much smaller then the mean cyclic frequency 0> of the electromagnetic signal carrier. The en2 2 velope or the "video" signal f t satisfies the wave equation v f^ + k f^ = 0 where k is the wave number corresponding to co and light speed c in vacuum (k = CJ c). Superposition of flat waves propagating from the object to detector is the real part of the equation solution having a profound physical sense [6] ft(x,y,z) = £

j ^ L ^ L

k z

R k x , k y > k z ( t ) exp (-i (kxx+kyy+kzz)),

p O O p where k^+k^+k^ x y z = k and the amplitudes iRj of flat waves depend on the boundary conditions as defined by the object and the distance to the detector aperture. Let us group the terms of the solution so as to explicitly separate the harmonic dependence of lines and omit the coordinate z=Z of the flat detector aperture: f t (x,y) = ft(x,y,Z) =

L

k x

R kx (y.t) exp(-ikxx)

Thus, the video signal of any line y in the detector aperture plane is the superposition of harmonic processes q w ( x ) with different spectral kx p 2 2 weights R ^ satisfying each the second-order equation d The geometric correction can also be defined by points whose as well as their points or

OUTPUT

INPUT

positions

positions are known. These are called reference

Fiducial marks, and their positions can be experimentally measured.

This is not an exact way of generating geometric corrections,as,due to measuring precision, the exact positions of the reference points are not known. The positions of all other points are not known at all, but must be interpolated or extrapolated from corrections found at the reference points. However the theoretical and experimental approaches can be combined, i.e.,the correction obtained theoretically can be parametrized by calculating the positions of a few reference points. In section 2, concerning the computational problems, we suggest an efficient solution of the general geometric correction problem. In sections 3 and 4 we discuss how to obtain the correction theoretically and experimentally. Section 5 shows the results of our implementation. A brief bibliography is presented in section 6.

62

2. Discussion of computational problems a) Without loss of generality we may assume that if a correction is restricted. to an appropriately small domain it may be considered as a linear function e.g.

in the case vhen the dlstorsion to be corrected is not too

large. Linear and affine correction of digital pictures are well developed disciplines. There are several fast algorithms published

[2,5] which are

based on the fundamental rules of digital straight line representation [lj . It is useful to use these fast algorithms, with appropriate adjusment even in the case of globally nonlinear corrections. One might use a point-by-point modification but with a smooth correction function one may adjust at much less frequent materials. Theoretically a good solution is to adjust less frequently where actual correction changes slowly and more frequently at other places. Although from the point of view of the number of adjustments needed it Is only suboptlmal, In our case the following method seems to be promising: -Let us consider the picture domain

e.g.

in system

A. We can cover the pic-

ture with a regular square lattice such that in each square the correction may be considered to be linear. A single square in this lattice will be referred to as a lattice element. The more linear the correction is, the more points of the picture can be Included in a single lattice element. -Obtain the position of each vertex of each lattice element in system

B .

These are called control data. -Knowing the positions of the vertices in system

B , one can perform the cor-

rection as a four-point interpolation at each lattice element of the picture to be correct. If the correcting relation is invertable, then the transformed lattice elements are disjoint and form a perfect tiling In system

B .

This method can be justified as follows: -To control an adjustment whose density changes, one has to perform extra computations

i.e.

gradient computation. In the case of a regular lattice it

can be omitted. -Although in this method one has to obtain the control data more often than it would be necessary, since its frequency is determined by the intervals with the fastest change, the amount of extra computation is not considerable since the number of control points is generally much less than the total number of points in the picture. -If one handles the lattice elements of a row in the system

A , then one can

raster scan the image. This is compatible with the data structures of many of the common secondary storage systems.

63

b) In geometric transformations one obtains the position of the vertices of regular lattice defined in one system in another system. If the regular lattice is defined in the

IHPUT

is defined in the

OUTPUT system, the one obtains a n inverse transformation.

system, then one obtains direct transformation. If it

If the correcting relation is invertable, direct and inverse methods will theoretically yield the same result. From several points of view

[4] it is more useful to choose the inverse

method, for example i n this case every position of the picture in the corrected system is defined

i.e. there is no need for initialization.

c) To assign the original and the corrected lattice to each other one needs an interpolating function

R . If a spot is homogeneous in the picture, one

cannot see the difference between them. However i n the case of a picture with outlines there occur considerable differences. The nearest neighbour technique, which is often used i n fast algorithms, cannot be used here since it would produce a false outline. Hore precise results can be obtained by bilinear or spline interpolating functions. However these need much more computation. It is fruitful to let the picture adjust the choice of the interpolating function. However, this requires the fast detection of changes in the picture. One can detect edges using fixed point arithmetic by convolving the picture function with a quickly decaying function that stresses the local change in the picture. Thus, when transforming the lattice elements -one can vise a fa3t algorithm based o n a fixed point arithmetic in the homogeneous parts of the picture. I n this case the interpolation is the same as in the nearest neighbour technique. - I n addition one can use a n additional correction of the position in the less homogeneous parts of the picture, and one should use a more precise interpolating formulae i n the neighbourhood of this position. Thus it is possible to arrange that only the minimal amount of computation Is performed Jo achieve the requested accuracy.

3.

A theoretical way of performing geometric corrections

If one knows the correcting relation

f: A — B

, then the steps of

correction are as follows. a) Choose the lattice spacing coefficient according to the smoothness of the correcting relation. It can be done by investigating the extremal values of the gradient function or the coefficient can be determined from prior knowledge. b) Perform the correction at the vertices of the lattice, and so obtain the control data.

64

c) Using the control data, perform the row-to-row corrections -perform tha general four-point transformation of the elemental squares using fixed point arithmetic -process simultaneously the elemental squares including the row which is currently being processed -use the picture controlled interpolation (incorporating a fast edge detecting technique together with the correction).

4« An experimental way of performing geometric correction The geometric correction can be defined by obtaining the positions of the points (the so called reference points) which are the same in both the and in the

OUTPUT

INPUT

pictures. Even if corresponding points can be identified

unambiguously quantisation of the position limits the accuracy. In the view of the above points, one should find a correcting relation such that: -the error of assigning the reference points to one another should be minimal, -the mapping to be found should be as smooth as possible ever the whole plane of the picture, -one should be able to obtain a more precise correction by using additional reference points. Requirements for the algorithm for obtaining the correcting relation are: -it should require no other information than the positions of the reference points, but if there are such additional pieces of information, then there should be a way to utilize them (such as the parametrization of the correction obtained theoretically by the reference points). -it should contain both simple and more complex approximations, and one should be able to prescribe the necessary complexity. -it should converge fast enough even in the case of a large set of reference points. -it should be possible to control the errors. Consider a set of reference points that consists of fine a one-to-one correspondence between systems

A

N

and

points and that deB :

P s= ' W W

V

I

8=1

y



D(5) s=ls

,

D(Ì) =

(f

m - S i-1

_ 1

2 1

(6)

denotes the actual value of the approximated function at points F g (s=l,..,H)

fjdenotes the weights. The weights

should be choosen according to the distribution of points P g .

^fj should be smaller where the density of points If f

m « N

, the second constraint

Fg

is greater.

(smoothness) can be fairly since,function

has relatively few parameters and so when the functions g. are smooth it has

less chance to differ from f . The smoothness can also be achieved by appropriate regularization. In this case, instead of (^(a), one can use ^ ( S , j ) when obtaining coefficients by minimization:

66

a^

(7) Functional \|/(a)

must express the smoothness of the function« so it can

be,for example, an approximation of the integral (8) where K is the plane of the picture,

pCK.

The choice of parameter J determines the balance between whether the approximation is more precise at the points given, or whether the approximating function is smoother. Unfortunately, both the computation of the functional (computation of the gradient in the whole domain) and the redefinition of it, into a form with maximum gradient using general basis functions, need a lot of computation. In our case another method seems to be suitable: a) perform the approximation with $ »0

i.e. without any constraint of

smoothness, b) try to achieve a smooth approximation by distributing tha identification points

P s uniformly and by choosing smooth functions

g^ .

c) choose the faster solution rather than optimizing one after performing such global investigations as: -perform several approximations with different complexities (see later) -check their smoothness subsequently,by a tilt, visual technique, and leave the choices that need trade-offs to human decision. Note that this method can yield almost the same result as using formula (7), but it is much faster and it can be coupled with the computation of the data directly controlling the correction. The computation needed by this method depends crucially on approximating function case of large

m

m , one must invert an

m. If one uses

m by m matrix. Thus, in the

it is difficult to change the basis functions

g^ , and to

alter the number of functions used in the approximation. Zherefore these computations are slow. This difficulty can be avoided by finding a recursive relation between the approximations with

m

and

m+1

(but suboptimal)

terns. Moreover the

program should choose the functions used in the ra -term approximation from a so called basis function library

containing

M ^ m

functions, such that the

error caused by the approximation should be minimal. In this way we do not have to determine the number of terns in an approximation in advance and we use the basis functions that yield the best results at every stage We also require that the algorithm should utilize the results of the m-teim approximation when it computes the

m+1 -tera, i.e., the magnitude of computa-

tion should not increase. Obviously, the number of terms one can use is limited since in the computer a number can be stored with finite accuracy. The algo-

67

rithm is also required to control the errors. The recursive algorithm worked out by us yields

m

approximating functions

different from one another and considering the requirements of accuracy and smoothness, we have to select the best one. One gains information about the satisfaction of the requirements of accuracy from the messages of the program implementing the algorithm. It is useful to couple the check of whether the requirements of smoothness are satisfied with the computation of the control data correction i.e., it is useful that, when perforating what is described in Article

b) of section

3,

the program enables the user to check the result visually. This can be realized by displaying the corrected lattice on a

TV-monitor,

The correction can actually be done as it is described in Article

c) of

section 3. 5. In the

MIP

system

Implementation (Modular Image Processing, made by SzKI)

there is a

subsystem for solving the tasks in connections with the geometric corrections. The approximating method allows us to approximate with a rational fractional function of degree 5, and so the basis function library consists of

21+20

elements. The recursive algorithm uses the elements of a subset of it. Both the subset and the number of the functions used in the algorithm

(max. 15)

can be specified by the user. The maximum number of reference points is 255. These points can be defined numerically or interactively by defining a controllable position in the picture displayed. If the number of reference points is ten then the approximation takes about one minute. The best approximation is selected by displaying the corrected lattice, producing simultaneously the data directly controlling the correction. Thus the time to investigate an approximation is one minute. In the case of

256x256 point pictures, the actual correction takes 0.5-2

minutes. This timo depends on the need for secondary storage and on the threshold value of the change of interpolation mode. The time needed is (practically) independent of the complexity of the correction approximated and although the approximation is several magnitudes faster than the precise correction they yield almost identical results.

68

6.

[1]

References

B.W.Jordan,W.J.Lemon,B.D.Holm,"An Improved Algorithm for the Generation of Nonparametric Curves", IEEE Transaction on Computers, C-22, 1973,1052-1060.

[2]

C.Braccini,G.Marino,"Fast Geometrical Manipulations of Digital Pictures", Computer Graphics and Image Processing, 13.,1980,127-141.

[3]

Carl F.R.V/eiman, "Highly Parallel Digitized Geometric Transformations Without Matrix Multiplications",Proceedings of the 1976. International Conference on Parallel Proceedings, Detroit, Michigan,

1-10. [4]

D.Pertly,M.Gangnet,Ph.Coueignoux,"Perspective Mapping of Planar Textures", Computer Graphics, 16.,1982.,72-89.

[5]

H.L.Ingram,R.Hoolcer, "The Selection of Approximating Functions for Tabulated Numerical",Technical Report, X-64658,George C.Marshall Space Flight Center, Alabama.

Acknowledgement The author would like to thank Dr. G6za Alio (Computer Research and Innova® tion Center,HUNGABY) and Dr. John Illingworth (Rutherford Appleton Laboratory, ENGLA1TD) for their corrections and useful pieces of advice.

Dr.Gy.Csaba

Hegediis

deputy head of department Computer Research and Innovation Center H-1015 Budapest I.

, Donati u. 35-45.

HUNGARY

69

PARALLEL SIMO CONVOLUTION USING THE FERMAT NUMBER TRANSFORM M&riS LuckS

Reiner Creutzburg

++

, Hans-Jorg Grundmann

and Marian Vajter¥iC

+++

,

+

1. Introduction With the rapid advances in large scale integration, a growing number of digital signal processing operations becomes attractive. The convolution property of certain transforms can be used to compute the cyclic convolution of two discrete signals. One such transform is the discrete Fourier transform (DFT) in the modified version of the fast Fourier transform (FFT) / if- / which operates on signals in the complex number field. The FFT of length N requires (N/2) log 2 (N/2) complex multiplications / k=0

h(n-k) x(k)

.

formulae

n = 0.1,

...,N-l.

(8)

In order to obtain the same result in (7) and (8) it is necessary choose a unique representation of the m elements of the residue

to

class

71

ring of integers modulo m . Often the symmetric representation of the m elements —

m-1 ^ , t«*r

,

1 Q 1 o t "J.» Wi J. «

• ••»

m-1 ^

(9)

J

if m is an odd integer, is used. Note that m has to be an odd integer in order to get nontrivial transform lengths N in If

max

| , m < m-1 I y(n)l =

(4). (10)

.

then the modulus m is large enough and no overflow modulo m in (7) occurs. Then (9) is called the dynamic range of the N T T . To obtain (10) from (8)

follows

|y(n)| t max |y(n)| i N max [x(n)[ max|h(n)l If

maxlx(n)l

=

'

(11)

= A, max|h(n)| = A, then (11) yields

1*1 -I/tS-^' •

With (12) a simple bound for"the signals x and h is given to prevent overflow in aonvolution and correlation computations. Better bounds can be obtained using the -ip-norm of the signal x / j / . The convolution

(7)

can be interpreted as a filtering of the signal x with the filter h . For such filtering applications often the following bound is useful |y(n)j

= maxlx(n)|

h (n)[ = ¡¡¿i . n=0 because in most cases the filter h and the maximal amplitude

max|x(n)[

of the signal x are known. From the numerical point of view one wishes to choose a NTT with parameters N,o£, ii, that have the following

properties:

- the transform length N has to be large enough and highly

factorizable

(preferably a power of 2), - the primitive N-th root of unity ai modulo m has a simple

binary

arithmetic, - the modulus m has to be large enough to avoid overflow and should have a simple binary a r i t h m e t i c . For most practical applications

and N are given and a convenient

dulus m has to be found. In / £ , ? / a useful way is shown to solve problem by studying cyclotomic polynomials and primitive

factors of the term



N

mo-

this

$fj( x ) f° r integer valuesol

- 1. The following theorem

is

given here without proof. For a detailed describtion the reader is referred to / t*-/. T h e o r e m : Let

oCe. Z

(| X(k) 2 " n k mod F r k=0

b = 2

N = 2 d + 1 , oL - 2,

with =

_ 2 2 2

g)

M k l < - S H F D M k l (2°)

)

LOC (FXN)^ (Mkl) k -1

h)

i

i)

Fk

j)

go to e )

then go to step 4 . else

continue

i+j LOC

(FXN)^(Mkl)

4 . j « - j/2 5 . Fl«- F 1 . 2 F k 6. F 2 < - Fl2k-1 |2k 7 . Create the mask Mkl^*-(I . , a 8 . F1 9.

F1

k.....I

^

k.

2

0

k)

2

(Mkl s )

F1F1+F2

10. k

k+1

if k i logN

then go to 3 .

11. Decoding the elements of F1 from D-code into the B - c o d e . tie note that the multiplication in step 5 . can be performed as shown in (22). In step 3., each computational stage for k=l,2, ...,logN into Fk exponents located in the field FXN on positions j.l, 2k_1

delivers j=0,l,...,

- 1, l = N / 2 k .

As a consiuding step in the inverse FNT algorithm, one has to divide the result by the value N = 2 n . Since N

can be expressed from (18) as

N - 1 = _ 2 n " l ° 9 N ; (nultiplication by this value can be computed by means of formula (23), using shift and negation operations 6 . Fermat Number Transforms in convolution

only.

computing

As mentioned in the chapter 2, the F N T saves the convolution It means that the convolution computed by where

iFNT



I F N T

property.

of two periodic signals x, h_ can be (24)

£ ( F N T * „ FNT hj]

denotes the inverse Fermat Number

Transform.

Hence, to evaluate the convolution one needs to perform 2 direct one inverse FNT and the points-wise multiplication of the

FNT's,

transformed

79

signals. This multiplication the f o r m u l a The of

following formula

is c o m p u t e d in the D - c o d e , a c c o r d i n g

(22) g i v e n in the p r e v i o u s table summarizes e x p e c t e d

times

(24) on PPS S I M D in d e p e n d e n c e

N . For c o m p a r i s o n

purposes,

the t a b l e

for p a r a l l e l

brings

also the t i m e s

256. Analyzing

the

the l o s t of e f f i c i e n c y l e n g t h of d a t a n e e d e d

run on t h i s

for l a r g e N is c a u s e d by the i n c r e a s i n g

FFT

32

0,0057

0,0268

64

0,0141

0,0376

128

0,0360

0,0559

256

0,09500

0,0811

it is to n o t e

rence

on the p a r a l l e l

that

word-

using

the t i m e s g i v e n are o b t a i n e d

c o s t s in c o r r e s p o n d i n g

time we i n t e n d

that

FNT.

FNT

the i n s t r u c t i o n

for

for N = 2 5 6 , it is to e x p e c t

T i m e s / i n s e c . / for c y c l i c c o n v o l u t i o n

Finally,

computing computer

g a i n s in f a v o u r of the F N T are t r a n s p a r e n t

time e t t i m a t i o n s in

N

parameter for

bits.

A s s e e n , the e f f e c t i v i t y N
**n-

(19)

Some simple production rules demonstrate the power of this operation f o r k = 1,2,3, . . . 86

E

E

k{Qk)**Ok

2 k + l } * * A 2k+1

{ A

k+1

=Qk*

(E2k-i{A3} **n

=

A2(k+1)2-1

- A2k+1-i



In f i g u r e 1 the impulse response of the DOLP edge d e t e c t o r —DOLP = C9 ~ C13

r

1 3

aid those of the lowpass f i l t e r s

cn3)**2**

-

(n5)**2

are shown. The convolution of f with Qg i s r e a l i z e d in three p a s s e s by using quadrant symmetry of A 3 with 9 s h i f t s and 24 additions per p i x e l . The convolution with C 13 weeds f o u r passes with a t o t a l of 4 m u l t i p l i c a t i o n s and 16 additions per p i x e l . Figure 2 shows the t r a n s f e r functions H(u) of those f i l t e r s and the modulations t r a n s f e r function MTF of the imaging system, an Anger s c i n t i l l a t i o n camera, which i s used in Nuclear Medicine. The upper 2 boundary frequency of the MTF i s indicated as u^. Because u^ » UJJ the influence of a l i a s i n g onto true image c o n t r a s t can be n e g l e c t e d . 5. Design of a Gaussian DOLP edge detector The design of Gaussian DOLP f i l t e r s by synthesis on the base of cascaded and expanded b o x f i l t e r s means the m u l t i p l i c a t i o n of t r a n s f e r functions

with

H (u)

= 7 7 n ± (u)

Hj (u) i

= Hn nk

(u)

=

Bin(k(w). and Note, and in

- classical

At that point,

it is possible to define features of knowledge which are

essential for specifying the structure of concrete expert systems. features, as incompleteness, inconsistency, non-monotonity, relativity,

uncertainty,

Such

inaccurracy,

imprecision, informality, significance,

rele-

vance etc. are considered in (2), e.g., and these features are characterizing

at some extent the new quality by going from data

knowledge

Progress

logic,

such features of knowledge as listed will have an essential

and

in

to

processing.

studying these "non-classical extensions"

impact on the futher development of expert system

of

technology.

5. Conclusions In rating the present situation in the field of expert systems, ally

in

Computer

Vision,

some critical remarks and important

futher research may be listed.

for

expert systems,

and

connected with

years

ago

decreasing

interest

be

that

AI in general have gained during the last years it Computer

Vision were highly

at many places (and now,

underestimation),

topics

Despite of the high attention

may be said that this field is still at its beginning. ties

especi-

in

it seems,

As the difficul-

underestimated

we do have

a

this field what is the normal result

some

time of

of this

now the same is true for expert systems. There should

much more concrete projects in this field for stimulating real

pro-

gress, and less papers "just talking about it". Research

in the field of expert systems will make contributions to

knowledge

about KNOWLEDGE,

i.e.

stems which may be used for certain types of reasoning as well as features deal types ving the

of knowledge as mentioned at the end of Section 4,

with knowledge which is characterized by these features.

expert

systems

in

our

about the structur e of inference sy-

Computer Vision have

demonstrated

that

about

and how to So

far,

different

of inference systems (several agents) have to cooperate for complex problems (as illustrated in Fig.6 for three agents) iteration

essential.

solwhere

between low-level and high -level processes seems to

Only close to the configuration or program synthesizing

there is some hope that operational systems may be possible in the

be area near

future. General research issues of expert systems are, for example: (i)

Learning for simplifying the knowledge acquisition processes,

(ii)

explanations

of

"why" this solution path

was selected, and not

"in what sequence of steps" the solution was generated so far, (iii) generalisations of specifi ed expert system approaches, (iv)

inclusion of

causal knowledge

of the given domain into the infe-

rence system, (v)

more comfort at the user surface (Natural language Interface, spe-

(vi)

judgement of its own competence, or the development of own strate-

cialized Hardware/Software components etc.), and gies which may be (partially) in conflict to the user's requests.

119

References 1. 2. 3. 4. 5. 6. 7. 8. 9. 10.

11. 12. 13. 14. 15. 16. 17.

18. 19. 20. 21. 22.

120

D . H . B a l l a r d , C . M . B r o w n , Computer V i s i o n . E n g l e w o o d C l i f f s , N . J . , P r e n t i c e - H a l l , 1982. W . B i b e l , P h . J o r r a n d (eds.), Fundamentals of A r t i f i c i a l I n t e l l i gence . LNCS 232, Springer, Berlin H e i d e l b e r g New York London Paris Tokyo, 1985. T.O.Binford, Survey of m o d e l - b a s e d image a n a l y s i s s y s t e m s . Int. J. of R o b o t i c s R e s e a r c h 1(1982), 18-64. W . C l o c k s i n , C . M e l l i s h , P r o g r a m m i n g in Prolog. S p r i n g e r , Berlin H e i d e l b e r g New York , 1981. P . R . C o h e n , E . A . F e i g e n b a u m , The Handbook of A r t i f i c i a l I n t e l l i g e n c e . Heuristech Press, Stanford, C.A., 1982. J.Mc D e r m o t t , R1 r e v i s i t e d : f o u r years in the t r e n c h e s . AI M a g a z i n 5 ( 1 9 8 4 ) 3 , 21-32. M . E n d e r , C . - E . L i e d t k e , R e p r ä s e n t a t i o n der r e l e v a n t e n W i s s e n s i n h a l t e in einem s e l b s t a d a p t i e r t e n B i l d d e u t u n g s s y s t e m . IFB 125 (8.DAGM S y m p . ) , S p r i n g e r - V e r l a g 1986, 2 1 9 - 2 2 3 . A . G r z e g o r c z y k , An O u t l i n e of M a t h e m a t i c a l Logic • D . R e i d e l Publ. Company D o r d r e c h t - H o l l a n d 7 B o s t o n - USA, 1974. B . H a y e s - R o t h , A b l a c k b o a r d a r c h i t e c t u r e for c o n t r o l . A r t i f i c i a l Int e l l i g e n c e 26 (1985), No. 3. R . H e s s e , R . K l e i n , R . K l e t t e , XAMBA - A knowledge-based programming e n v i r o n m e n t for a u t o m a t e d picture a n a l y s i s . P r o c . I n t . C o n f . " S y s t e m s of k n o w l e d g e and picture p r o c e s s i n g " , S m o l e n i c e , C z e c h o s l o v a k i a , 24 - 2 8 N o v . 1 9 8 6 , 105-109. M.D.Levin, A.B.Nazif, Rule-based image segmentation. Computer Vision, G r a p h i c s , and Image P r o c e s s i n g 32 (1985), 104-126. R . K l e t t e , R . W i e h a g e n , R e s e a r c h in the theory of i n d u c t i v e i n f e r e n c e by GDR m a t h e m a t i c i a n s - a survey. Information Sciences, 22(1980), 149-169. T . M a t s u y a m a , K n o w l e d g e o r g a n i z a t i o n and control s t r u c t u r e for image u n d e r s t a n d i n g . P r o c . 7 t h I n t . C o n f . o n P a t t e r n R e c o g n i t i o n , July 30 August 2, 1984, M o n t r e a l , IEEE, 1118-1127. T.Matsuyama, M . O z u k i , LLVE-: An E x p e r t system for top-down image s e g m e n t a t i o n . Journal of IPS Japan 2 7 ( 1 9 8 6 ) , 191-204 (in J a p a n e s e ) . M . M i n s k y , A framework for r e p r e s e n t i n g k n o w l e d g e , in: P s y c h o l o g y of Computer V i s i o n (P.H. W i n s t o n , ed.), M c - G r a w Hill, New York, 1975. N . N i l s s o n , P r i n c i p l e s of A r t i f i c i a l I n t e l l i g e n c e . S p r i n g e r , Berlin H e i d e l b e r g New York, 1980. E.M.Riseman, A.R. Hanson, A m e t h o d o l o g y for the d e v e l o p m e n t of general k n o w l e d g e - b a s e d v i s i o n systems, in: Wissensbasierte Systeme (W. Brauer, B.Radig, Hrsgb.), I n f o r m a t i k - F a c h b e r i c h t 112, S p r i n g e r Verlag Berlin H e i d e l b e r g New York Tokyo, 1985, 257 - 288. A. R o s e n f e l d , Image a n a l y s i s : problems, progress and prospects. P a t t e r n R e c o g n i t i o n 17 (1984), 3-12. G . S a g e r e r , D a r s t e l l u n g und N u t z u n g von E x p e r t e n w i s s e n für ein B i l d a n a l y s e s y s t e m . IFB 104, S p r i n g e r - V e r l a g 1985. K.Sakane, RTTamura, A u t o m a t i c g e n e r a t i o n of image p r o c e s s i n g p r o g r a m s . P r o c . of CVPR, 1985, 189-192. M.Stefik, J.Aikins, R.Balzer, J.Benoit, L.Birnbaum, F.Hayes-Roth, E . S a c e r d o t i , The o r g a n i z a t i o n of expert systems, a T u t o r i a l . A r t i f i cial I n t e l l i g e n c e 18(1982), 135. P.H.Winston, B.K.P.Horn, LISP . A d d i s o n - W e s l e y P u b l i s h . C o m p . , R e a ding , M a s s . , 1981.

U T I L I Z A T I O N O F K N O W L E D G E C O N T E N T S FOR THE ADAPTATION OF AN INDUSTRIAL VISION C.-E. L i e d t k e , M.

AUTOMATED

SYSTEM

Ender

I n s t i t u t für T h e o r e t i s c h e N a c h r i c h t e n t e c h n i k Informationsverarbeitung, Callinstr.

1.

problem

becomes

the

in the

use of v i s i o n

adaptation

properties,

changes

of

in

these

area

of

image

are

highly

processing

expensive

question

arises

entering

a

itself,

if

part

so

that

Since

we

the

cannot to

recognition

a

of

and

systems

pattern

system

can

this

very

specific

and

relevant is

ourselves

contained

vertices,

in

the f o l l o w i n g concept

developed

the

circles,

for

a

fast

the

to be a n a l y z e d

(b)

The

Fig.l. During

more

one

This

adaptation

hand and

is

and

quite

support

by

flexible

all

the

situation vision the

generality,

by

system

user

we

application, position

industrial

adapt

of

line call

from

and

line

a

the

single

f u r t h e r , we where

the

orientation

structures these

limited

namely

scenes,

type, p o s i t i o n ,

image

analysis

considerations:

needed

(a)

less

like

edges,

structures

system

Many

available.

The

frequently, concept

p h a s e a fast a l g o r i t h m by hand

is

some

contents

on the other

the

experts

limited

this the

their

of

object

algorithm phase

knowledge

these

has

similar

in

about

is

the

illustrated

generated

mechanism,

object

domain

knowledge contents about

fast,

therefore

is used for the

automatically

inference

and

been images

the a n a l y s i s p r o c e d u r e m u s t b e e x t r e m e l y is

time

camera in

cues".

and

a processing

interpretation.

interest

and

object

the

to s i m p l i f y this p r o b l e m

relation

following

adaptation

is into

of

and e l l i p s e s . We will

have

preceding

spatial

in

area

class the

"scene d o m a i n

under

considerably

a

about

and

of

Since

overcome

little

problem

3D-objects

to

information

objects

the h e l p of e x p e r t s

number

to

automation

contents.

s t a n d a r d TV c a m e r a image. In order restricted

new

changes

knowledge

with

solve

2D-

their

to new s c e n e

to

industrial

recognition.

possible expert

in

and

requires

since

is

this

itself automatically

ourselves

and

it

of

systems

illumination,

p o s i t i o n . Up to now the a d a p t a t i o n

on

Hannover

1, FRG

INTRODUCTION

A major

A

Universität

32, D 3000 Hannover

und

which of image

in

image in

a

employs

immediate analysis

algor ithms.

121

2. C O N C E P T OF THE A U T O M A T E D A D A P T A T I O N The

concept

knowledge offered

of

contents to

the

corresponding system The

can

the of

about

object

in

the

image.

the

The

ideal

processing

path.

criterion

Parts the

of

has been

the

the

is e s s e n t i a l

for

have

been

a s p e c t of

described

the

knowledge

o b j e c t can b e expressed

Measure tances

the center

the

image 3.1 In

to

knowledge

to

contrast

be

is

From

representations contents

122

have

the

this

frequently

the

shape

by the

a

in d e t a i l .

of

procedure.

a

particular

procedure:

If all

the disin(3.2)

both

examples

apparent

difference knowledge

in

are

the

refers

to

content.

If

an

attribute

"round"

in

to m e e t

the

adapt

use

concluded, in

the

modified.

object

the new

that

the

procedure declarative where

the

in

in an

declaration situation. 3.2

3.2 h a s c o m p l e t e l y

applications,

same,

of

flexibility

"angular" to

the

use

by

be

to be

In

which

object.

s h a p e . The p r o c e d u r e

can

CI - 33.

coding,

by a d e c l a r a t i o n or a

tolerance

in

difficult

find

and

the

replaced

quite

will

One

of

d e s c r i p t i o n of an angular rewritten.

in

termination

literature

is round."

angular,

to be

it

repeated

pregiven

is d i s c u s s e d

any p o i n t of

become

schemes.

modification only

a

the

be expressed

contents

differences

appears

needs

processed

modifications

(3.1)

a pregiven

the o b j e c t

representational respect

in

about

of g r a v i t y .

remain within

significant

actual in

representation

of g r a v i t y of the

the center

t e r v a l , then

Though

is round"

the d i s t a n c e b e t w e e n

o b j e c t and

until

results.

processing

declaration:

k n o w l e d g e c o n t e n t could

"Calculate

the

a the

CONTENTS

content

by the

"The o b j e c t

The same

are

and

by

resulting

the s o l u t i o n of the p r o b l e m

Any k n o w l e d g e c o n t e n t can b e e x p r e s s e d example

processing

obtained

is p e r i o d i c a l l y

cycle

knowledge

3. C O D I N G M E T H O D S FOR K N O W L E D G E

For

image

fulfilled.

system

following

are

between

procedure

This

The

the r e f e r e n c e d e s c r i p t i o n

evaluated

processing-evaluation-modification

Fig.2. interest

reference

intermediate

differences

in

immediate

a

results

r e s u l t s are

shown

of

of

From

ideal

processing

is

domain

form

automatically

intermediate

and

the

procedure

reference description.

reference the

adaptation

system

derive

actual

results

the

SYSTEM

to

the

to b e

knowledge knowledg'e

A second

difference

contents. that

it

The

concerns

procedural

contains

a

content.

The

that

validity

of

the

gives

no

In

Therefore

used.

In

and

where

Knowledge for

than

those

in

and

the the

knowledge

contents

"explicite". has

the

and

control

The

term

The

advantage,

of

combinations

of

most

different

efficient They

languages

like

caused

mainly

for

the

of

the

knowledge

prefered.

which

a

properties This

form the

of

situation

systems

more

human

a different

in

is

is

In c a s e a

in

easily

the

similar

called

representation can

are

processed procedural

representation".

to

procedural mainly

the

coding

to

be

machines

understand

and

supported

by

technical

C,

RULE,

and

are

classical

of

indicated

There

today's

for

SEMANTIC

and

up

of

algorithmic etc..

vs.

methods

manipulation

LISP,

properties

implicite

coding

methods

the

formulation

PASCAL,

and

four

PARAMETER,

represent

strongly

FORTRAN, by

be

in

work.

very

methods

to b e

contents,

technical

ALGORITHM,

PARAMETER

are

have

representation

vs.

led

properties

tools

contents.

have

namely

and

they

operator

declarative

contents,

ALGORITHM

the

importance,

knowledge

human

checked

of

different

the such,

systems.

knowledge The

the

in

knowledge

the

data

of

representation

inefficient

represented

which

be

therefore

knowledge

explicite

representation

Fig.3.

the

that

technical

in

validity

can

knowledge

to

represented

them,

use

The

will

usually

"implicite

explicite

NET.

are

of

knowledge advantage,

formulated

validity

minor

systems' d u e

are

use

of

the

the the

knowledge

usually

amounts

of

has

mostly

content

contents

environments

by

humans

is

use

check

been

the

and

abstract.

technical

to

has

check

large

purposes

described

as

are

reasoning

systems

to

where

the

declarative

general

knowledge

contents

uses

how

knowledge

flexibility for

of

the

how

more

applications,

representations

form

the

contrast,

in

representation

description

indication,

content.

efficiency

description

knowledge

efficiently.

the

knowledge

in

to

now

knowledge

programming wide

use

existing

is

computer

systems .

The

coding

methods

RULE

representation

of

interpretation

mechanism.

supported

The

a

level

of

of

image

symbolic

processing of

extraction

a

Explicite

analysis methods:

NET

For

permit

their

knowledge

first

can (1)

description,

includes

of

SEMANTIC

contents.

use

the they

representation

explicite require is

an

mostly

systems.

processing

first

extraction the

expert

methods

groups of

by

and

knowledge

and

(3)

preprocessing

symbolic

scene

usually

domain

be

subdivided

Low-level-processing,

cues.

The

into

three

extraction

high-level-processing. and

description

(2)

image

refers

in

processing

Low-

segmentation. our

application

methods

(1)

and

The to (2)

123

have

ir common, that

they work on the data

structure of pixel

arrays,

which contain usually a large amount of data. In this group mainly high efficiency and only to a lower degree flexibility is required

to handle

the

knowledge

large

data

representation processing,

volumes. schemes

where

Therefore

are

prefered.

hypotheses

inference

mechanisms

explicite

knowledge

implicite

are

are

In

set

applied,

the up,

the

representation

and

procedural

group

(3) of

plans

are

request

becomes

for

high-level-

generated

and

flexibility

and

dominant.

The

processing

methods work mostly on reduced data sets of symbolic data, which employ more general and flexible data structures like trees or graphs. 4. CODING OF KNOWLEDGE CONTENTS IN THE AUTOMATED ADAPTATION SYSTEM The

solution

requires

of

the

the

adaptation

utilization

of

problem, which

knowledge

has been

contents

stated

(KC) , in the

above,

following

ca tegor ies: (a) KC about the object domain Prior

to

with

a

the

adaptation

relevant

recognized

during

phase

the operator

description

of

the

has to provide

workpiece,

which

the has

system to

the production phase, and a reference description

be of

the reference scene, to which the system will be adapted. (b) KC concerning processing Image is

interpretation

enhanced

processing

step

In

step

The

KC

are contained

connection

preprocessing, first

is a multistep by

methods.

information

symbolic

with

methods

the

by

process.

applying

about

The relevant

a

the

sequence

enhancement

information

of

of

elementary

the

relevant

in the set of elementary processing

given

application

segmentation,

the

description,

and

this

extraction about

includes

of

scene

grouping

KC

methods. about

domain

methods

cues

for

the as

object

recogni tion. (c) KC about evaluation methods The evaluation

is based on the calculation of quality measures and

interpretation of the values of these measures. Since the evaluation applied

sequentially

optimization Consistency

requires

different the

use

is obtained by stating

measures on a higher

124

to

level.

levels of

of

abstraction,

consistent

quality

a

the is

global

measures.

the common properties of the quality

Essential

KC are c o n t a i n e d

in

- the p r o p e r t i e s of the q u a l i t y -

the

(d) K C a b o u t the a d a p t a t i o n The

measures

i n t e r p r e t a t i o n of the v a l u e s of the q u a l i t y

adaptation

adaptation,

strategy

measures

strategy

employs

heuristic

KC a b o u t

the m e t h o d o l o g y

the use of the e v a l u a t i o n m e t h o d s and KC a b o u t

the

of

context

for w h i c h a d a p t a t i o n r u l e s are v a l i d . (e) KC a b o u t the s y s t e m In order

to p r o c e s s

control

the d a t a

the a c t u a l p r o c e s s i n g

KC are

needed, which describe

- the f u n c t i o n i n g of the e x p e r t s y s t e m -

the c o m m u n i c a t i o n p a t h s of the

- the m e c h a n i s m s of r u l e -

the e l e m e n t a r y p r o c e s s i n g procedures

- the i n d i v i d u a l

rules

All

KC,

procedures

some

which

have

been mentioned

so

a r e a of a p p l i c a t i o n , or

general

"edges",

and the e v a l u a t i o n

KC and

are

needed,

logic,

"vertices",

KC

like

about

"circles",

far

(g) KC a b o u t the p r o c e s s i n g

specific

KC

the

about meaning

"ellipses",

for

system.

the

laws

of

general

and

KC

the In

and

object

addition rules

terms,

about

of like

general

etc..

algorithm

about

- the o p t i m a l -

are

the p r o c e s s i n g

p r o c e d u r e s like m i n i m a t i o n , m a x i m a t i o n ,

The KC

system

KC

the

mathematics

shell

subsystems

- the a c t i v a t i o n o f the p r o c e s s i n g

domain,

run

selection

- the e v a l u a t i o n

(f) G e n e r a l

h o w to

s y s t e m . These i n c l u d e KC a b o u t

s e q u e n c e of e l e m e n t a r y p r o c e d u r e s

the o p t i m a l p a r a m e t e r

represent obtained

the by

results

the

of

inference

w h i c h have b e e n m e n t i o n e d

and

values the

adaptation

mechanism

of

process. the

system

These from

KC the

have

been

other

KC

above.

125

The coding

methods

which are e i t h e r which

are

used

for

the

related

KC are

the

quality

explicite

-

in

to the processing

frequently

are coded

scheme ALGORITHM. H e u r i s t i c of

listed

measures,

procedural

for

about

methods

table

of

Fig.4.

KC

of l a r g e volumes o f data or reasons of

KC ahout the

representation

the

e f f i c i e n c y by

interpretation

of

the

and methodologies and

are

coded

require

by

the

the

values an

scheme

RULE. KC, which have f r e q u e n t l y to be exchanged, l i k e

the KC about the

object

or

domain,

which

processing

methods,

frequently

updated

explicite

-

changes the

with

each

evaluation

methods

and m o d i f i e d during

declarative

application and

the

KC about

rules,

which

the are

the adaptation process need an

representation.

They

have

been

coded

by

the

scheme SEMANTIC NET. Examples

for

ALGORTITHM,

the

RULE,

different and

representation

SEMANTIC

NET

as

they

and have

coding been

methods

used

in

the

proposed system are shown in F i g . 5 - 7. 5. RESULTS The d e s c r i b e d 11/780.

knowledge based v i s i o n system has been simulated on a VAX

The symbolic data base c o n t a i n s p r e s e n t l y about

40 nodes of a

semantic net and about 60 production r u l e s . An example f o r the

stepwise

adaptation

an angle

iron of by

in connection

i s shown in F i g . 8 .

with

the r e c o g n i t i o n

of

vertices

of

The adaptation process needed about 20 minutes

CPU-time, where about 10% were used by the e x p e r t system, about 90% the

image

processing

system

and

less

than

1% by

the

internal

communication between the e x p e r t system and the image processing

part.

6. REFERENCES 1. L i e d t k e ,

C.-E.;

Ender,

wissensbasierten Objekten,

7.

M.; Heuser, M.: Komponenten e i n e s

Bildverarbeitungssystems

DAGM

Symposium

zur

adaptiven

Lageerkennung

"Mustererkennung

1985",

von

Erlangen,

1985. 2. Ender,

M. ;

Processing

Liedtke, Quality

C.-E.: in

a

Evaluation Fully

Criteria

Automatic

for

Knowledge

Assessment Based

of

Vision

System, EUSIPCO-86, The Hague, 1986. 3. L i e d t k e , Automated

C.-E.;

Ender, M.: A Knowledge Based V i s i o n System f o r

Adaptation

to

New Scene

Contents,

Eighth

Conference on P a t t e r n R e c o g n i t i o n , P a r i s , October

126

the

International

1986.

Fig.1. Concept of a fast and flexible image analysis system (KC = knowledge contents)

result Fig.2. Concept of automated adaptation

127

UH O

M

e

u M EH E-t Z

< £

u Z

ai 4-1 •H U •rH rH a ^ X 0)

u

OI > -H 4-1 ra Ul (D H O 0) •O

03

(D 4-1 •H O •H >H o< X 01

u J o 05

rH ra Ul 3 T3 ai O o Ul D.

01 E OJ 4-1 M

ai 4-1 ra >1 m

Ul 0) ra 4-1 ra u

XI 0)

ra ID ai

a X ttl

i XI

c o •rH 4-1

ra e ~ 0) • 4-1 o ra 4-1 >1

Q)

ra

K 4-1 in U 1 oí w A N X o Id —

ra

ra >i

ra 01

«—i ai 3 E TH u. 3 O ui UJ iw 3 o 1 XI







O) 3 rH ra >

ra — a) 4-1 •rH o •H ,-H a ^ e •H

EH u S

< os

a) > -H 4-1 ra Ul HJ H o 0) T3

C

• Oí o 18 4-1 3 0)

0)

CT

c i ra XI a

ra

U

X 1 0 XI c rH O ra - H Ul 4 J o j ra C i-H ai 3 en e Ul c o •rH UH

«

J

3 O rH

Ul o

X) c c o ra - H 4-1 o» ra RH o 3 - H Ul r H a ai & x; ra ¿J

ra ra S

ra

11 ui

u ra a

u o

3 O >-H

>

-Y.

-

-

•o 0) 4J

,—i 3 E Ul O UH

ra

-H i—i E Ul

O UH

ro ra V

4-1

>H XI

Ol a o

ai x:

ra

- ra

-H -C

-

E

0) i-H XI o c •rH 4-1 o g x : 01 x: •rH 4-1 x: 3 E

ra ra ra

-

ra ra ro ra

I c o o ro -rH 14 4-1 4J a -H 0) u i O » ra C 01 O T3 -rH 4-1 ro - H •O r H c o 0) X I e e CP > 1 o ; ra

CP u i C -rH •rH UH

CT

ra

r—1 Ul ai c ai u

U

ra

.c

ro

ra

X

ai >i - Q UH 3 O rH

c o e •H x : 4-1 4 J ra -rH U Ui •H 0 r H CP a n a ra

ra e ra

ra

c o •H o ai •rH 4-1 a ra CP •RH C (U u i O 4-1 O -H ra - u Ul a) ra 4-J a i-H e n

-C en •H x:

UH O

rH 3 e IH O UH • H iH 0) XI E Ul c O UH o O - C •rH 4-1 -H x : -rH Ul 3 3 01 x:

ra u ra ro ra ra U «

rH O X2 E >H

•o

ra

O i—1 c UH (-H O i—1 r H Ol V c

ra

ui CTi 01 C 4-J - H aj

D 01 4-1

ra ra

ra

UH 4-1 >1 O - H x¡

UH O

CT>< O ui en a < a, o •rH ».

C O •rH 4J ra 4J 01 U Di ui o; 4J C •H

ai rH 3 ui ra

>i XI

ai 1 c o ai o c U -rH i o x: 4-1 M 4-1 ra O O RH a 0) a i > i • n > x: — xi ai



œ u

e x: O -u •H -H 4-1 Ul ra o 4-1 CT1 « 1 H u i ra Q. ui c a) ra 4-1 en c •H C •rH > 1 RA XI 3

U UH

ro

>i XI

•• I—i

ro

01 o u o c ui o OL-rH CU 4-1 Ul CU

u t
1 o c ai -rH O • rH UH UH U

UH c O •H x: 4-1 - H a i •rH Ul 3 >i i-H C c 0 •o •H Ul 4-1 01 a) UH o CP a i •rH Ul i-H e cu O i - H Oí

ra ra

ra ra

ro ro ro ro

•a o

CT

c •H •u o

u

ra

ai •H b

U

4-1

M

EH En z w

< £

z

U

cn

O OI •n XI

U

U ti) 0)

4-1

X 0) 4-1 c o o a> «H D os

C "O

OO

•H 4J JJ

ai

O

c a c (0 - H ai > M U a> u ai R-H 10 UH ai ci ai os os

• • i ta •o "O o 4J ai ai u c u o a « c o o U 1H MH O a a o QI e tJ> c c o e o o u

MH T 3

o ai o ai o O >H c a ai 3 Di o1 c ai -H ta ta to • ai 4J o a o O u 0.

•H -H -H (0 4-1 4 J rH

to to (0 ai 3 di O rH •—i O io 3 u > os a. M

to

ra

> UL -H 3 4 J •O

o ai «c o

UH

O ai c 3 0 pH •H 10 4-1 > ra 4-1 >1 ai 4-1 u •H ÛH 14 10 ai 3 4-1 CT c

u J D œ

>i

CP c o o rH •H O 4-1 "O ra o 3 x: rH 4-1 ra 01 > £ u

M

c o

c C o O

•H 4-1

•H •H 4-1 4-1

U ai ai to ai tH 3 as

to 10 E E

tH

•H •H X C (0 - H

£ £

i ai 4-1 Û4--H o PH IH ra cu 3 CP

c •H O rH -tH ai 4J x: m to O

MH

C

4J

0 c ai 4J e 10 01 e o u C o 1 O 02 O

B

to ai 3 O C •H 10

&

o •o

ai c ai u co

CT> Cß C TJ

•H

O

•O J= O 4-1 CJ 01 e

./

4->

C

O "H ai io e -n e o XI o ai u E

rH

o

C O

>i tn 10 ai 4-1 4-1 a . 10 10 M TD 4-> < to

e o ai u to c >1 O LO U

u ai c ai o

Ol C E x: tO 4 J to - H ai u o o o cri iH rH a< to

T3

ai

UH

en

•H 4-1

•H

rH

4-1 4-1

rH

ra

129

Quality: Q = 1 + (K-G)/(C*N) + Diff/N with

Diff - - J ]

MIN

m «M Notation

C d(m,r)/D

, 1 3

r tR

used:

R

-

Processed

M

-

Ideal set of scene domain cues

set of scene domain cues

N

-

Number of elements of M

G

-

Number of elements of R

K

-

Number of correctly extracted scene domain cues

D

-

Tolerance bound

C

-

See text below

d(,) -

Weighted Minkowsky Distance

Knowledge contents about properties of the evaluation 1. Increasing

similarity between

the ideal and

criterion:

the processed

set of

scene domain cues increases the numerical value of Q. 2. If

n

scene

domain

cues

are

found

exactly

in

addition

to

a

previous state the value of Q is increased by n/N. 3. A tolerance bound of Q does not

is defined

increase

for each scene domain cue. The value

if an additionally detected

scene

domain

cue is on the tolerance bound. 4. The value of Q does not change scene

domain

cue

scene

domain

cues

which have

if for each additionally

has been been

found

found

in

its exact

outside

the

detected

position,

tolerance

C

bound

additionally, too.

Fig.5. Example

for

the

implicite

and

procedural

representation

of

knowledge contents about the properties of an evaluation measure. The

evaluation

adaptation

measure

process

scene domain cues.

130

and

is

used

to

assess

is

based

on

the

the

quality

comparison

of

of sets

the of

T3 C n) ai •P •r4 O •H -H a X ai m .c •y M 0 i« 0) — i f a g (0 X w

M-l 0 G 0 •H -p H 10 14 P T3 ai u 0 ^ a

Cl .c 4-> •p 3 0 XI (0 01 4-1 c ai 4J c 0 o ai tp Cl T3

10 •P a i0 •a (0 i« 0 >i CP ai P (0 a 4-1 M 01

CP •H

fc,

to LU 1

co

s

% u_ ¡Ü •



LU Q_

S


e

ntshlaveO,

goal

or

action

is

slots:

not),

program

starting

refinement

program

the

during

the

the

potential

processing,

rule

of

the

refinement

algo-

rithm ,

(5) father the

(6) a

and

children

refinement

fragment

action

to

of

the

achieve

(7) arguments

frame

lames

according

to t h e

position

within

hierarchy,

which

program's

the

are

goal

data

source

(only

in

code

case

structures

and

which

represents

of t e r m i n a l

connect

the

goals),

action

the

with

others.

The

whole

generated called cut-out graphs. tional by

program during

program of The

net

an

stage

the

being

example

rectangular

n o d e s ) of

is r e p r e s e n t e d

past

refinement a set

successor—relations

of r e l a t e d

program nodes

different

by t h e

steps.

net

in

represent

program

form

of

type

program

list

list

of t h e

represents

graphs. two

potential

organisational

(organisational

full

This

Fig.

program

structure

a

program

actions

split)

so-

1 shows

connected

(action,

frames a

(func-

connected

or

135

I ••« w•«» * 5

1 L (ù

$ O u_

Pig. 1:

136

Program net representation of a refinement situatic

c i r c u l a r n o d e s r e p r e s e n t d a t a w h i c h are

connected

w i t h f u n c t i o n a l n o d e s by i n p u t - o u t p u t - r e l a t i o n s to e n s u r e the

control

flow).

necessary

interaction functions

The

b e t w e e n the f u n c t i o n a l

child-relation graph)

(means

generates

different also

completely independent program

(informational program structure that

or d a t a f l o w ) .

The

the f a t h e r node w a s r e f i n e d b y

a h i e r a r c h y of p r o g r a m g r a p h s w h i c h

l e v e l s of s p e c i f i c a t i o n d e t a i l of the

e n s u r e s the correct m a n a g e m e n t

the

layers

program

sub-

fatherchild

describe

function.

of g l o b a l a n d local d a t a by

an i n h i e r i t a g e m e c h a n i s m p a s s i n g the r e l a t e d d a t a of the f a t h e r node the c o r r e s p o n d i n g f u n c t i o n a l n o d e s of the c h i l d The program

program

construction

process starts w i t h a

representing .the fully unspecified overall program consider the

trivial

initial

function.

only the c o n n e c t e d d a t a n o d e s a n d can be p r o c e s s e d

reto

independent-

The c o m p l e t e

refinement

p r o g r a m w i l l be a c h i e v e d by r e f i n i n g r e p e a t e d l y a l l goal

until t h e r e are only t e r m i n a l nodes i n the l o w e s t l e v e l s of the graph

nodes

The

of one goal f u n c t i o n node of a c e r t a i n p r o g r a m g r a p h n e e d s

ly of all other n o d e s of the w h o l e p r o g r a m n e t . of

to

graph.

g r a p h c o n s i s t i n g of only one f u n c t i o n a l n o d e and no d a t a

finement

It

causing

nodes program

hierarchy.

3. K n o w l e d g e b a s e d The

Refinement

b a s i c a l g o r i t h m of goal n o d e d e c o m p o s i t i o n a n d a c t i o n

t i o n is as

genera-

follows:

(1) c h a r a c t e r i z a t i o n

of the goal n o d e f u n c t i o n to be d e c o m p o s e d

user-system-interaction

during

and s t o r i n g the o b t a i n e d p r e d i c a t e

values

in the d a t a b a s e , (2) c l a s s i f i c a t i o n of

the

of the goal node f u n c t i o n a p p l y i n g p r o d u c t i o n

k n o w l e d g e base w h i c h m a t c h the g i v e n goal

characteristics (3) a l l o c a t i o n

of

of

data

a p r e d e f i n e d subgoal

of

structures

structure

the subgoal

algorithm

belonging

to

the

of

its

node),

s t r u c t u r e by s p e c i f i c a t i o n

in order to fit it a c c o r d i n g to the real

t i o n s of the goal node to be This

rules

function

(1),

i n f e r e d goal node class ( c h i l d g r a p h of the goal (4) s p e c i f i c a t i o n

node

condi-

refined.

is a p p l i e d r e p e a t e d l y to e a c h goal node until t h e r e

are

only t e r m i n a l n o d e s w i t h i n the frame l i s t . T h e n a p r o g r a m g e n e r a t o r

will

produce

base

contains

the source code of the p r o g r a m . two d i f f e r e n t kinds

T h e r e f o r e the

of k n o w l e d g e u n i t s :

knowledge

production rules

and

137

predefined subgoal The

units

patterns.

structures.

of

the k n o w l e d g e base are a d d r e s s e d by

B e c a u s e of the fact t h a t slot (4) of the frame

formal

string

representation

of f u n c t i o n a l n o d e s m a y c o n t a i n s u c h an a d d r e s s p a t t e r n as a p o i n t e r of the n o d e ,

of

generalisation-specialisa-

the

k n o w l e d g e b a s e are o r d e r e d w i t h i n a

tion-hierarchy. determine

the

the

to

the rule f i r s t to a p p l y in case of r e f i n e m e n t

elements

T h i s h i e r a r c h y , the i n t r o d u c e d s u b s t r u c t u r e s , and d o m a i n of a p p l i c a t i o n of the s y s t e m .

All

rules

knowledge

d e c l a r e d w i t h the help of a f r a m e - l i k e d e s c r i p t i o n l a n g u a g e and c a n

is easy

be c h a n g e d or m o d i f i e d . To p r e p a r e the s y s t e m for a special a p p l i c a t i o n d o m a i n the

knowledge

can be i n s e r t e d w i t h the h e l p of a c o m f o r t a b l e g r a p h i c - s u p p o r t e d ledge a q u i s i t i o n

know-

module.

The s e p a r a t e p r o g r a m g e n e r a t o r a l l o w s e a s i l y to a d a p t the s y s t e m to d i f f e r e n t goal p r o g r a m m i n g l a n g u a g e s . system

4. A p p l i c a t i o n to Image The ting

2 shows a flow chart of the

Processing

s y s t e m w a s i m p l e m e n t e d i n P A S C A L a n d runs u n d e r M S - D O S

system

on I B M - P C - c o m p a t i b l e

m e m o r y and 6 4 0 K b y t e o p e r a t i o n a l Firstly

it

was

- repeatedly processing

(2) s u b s t r u c t u r e s - picture - picture

of single

of series of pictures

input preprocessing s e a r c h and object

- object

classification

- result

for the

for

for

object class output

operaexternal

memory.

- object -

disk

analysis

slides. The k n o w l e d g e b a s e c o n t a i n s a b o u t

(1) basic p r o g r a m s t r u c t u r e s

- processing

16-Bit-PC's with hard

a p p l i e d to d e v e l o p p r o g r a m s

medical microscopical

138

Fig.

kernel.

evaluation

isolation

pictures

of

hundred

I Fig.

I

Mnou ledge engineer

2: Flow chart of the system's

domain oriented user

kernel

139

(3) data structures for - olass membership oriterions - olase features - output formats - parameters of functions, and (4)

simple tasks

menue driven rules for specification and

ohoosing functional

of

substructures

program from

the

knowledge base. The

generated

language

IAHBA

picture

processing programs

are

written

in

the

(Robotron,1985).

During the test phase the following results oould be stated: - The maximum time-out of the system between two user requests is some seconds.

The

development of a typical program takes about half

an

hour. - The generated programs are well structured and commented w - The

efficiency of the automatically generated programs doesn't sic-

nifioantly differ from that of hand-made programs. - Additionally inserted verbal or graphic help and overview make

the

handling

of the system very comfortable to

functions

the

domain-

oriented user. Up to now the system was tested in analysis of microscopical

slides

in pathology.

5. References Cohen, P. R., Feigenbaum, E. A., 1982, The Handbook of Artificial

Intel-

ligence, Heuristeoh Press, Stanford, C. A. Robotron

Vertrieb

Berlin

(VEB),

1985,

Dialog-und-Programmier-System

AMBA/R, Berlin Sacerdoti,

E.

D., 1977, A Structure for Plans and Behavior, Artificial

Intelligence Series, Elsevier North-Holland Inc., New York Voss,

K.,

Hufnagl,

P., Klette, R., 1985, Interactive Software Systems

for Computer Vision, Progress in Pattern Recognition 2 (Kanal, L. N., Rosenfeld, A., eds.), North Holland, 57:78 Stefik, M., 1981, Planning with constraints (MOLGEN: Part 1 and Part 2), AI-Journal 16 (1981), pp. 111-170

140

AN A S S O C I A T I V E NETWORK AS SYSTEM SHELL f'up KNOWLEDGF BASED

' MAGE UNDERSTANDING «

G . Sagerer, S. Schroder, H. Niemann Lehrstuhl fUr Informatik 5 (Mustererkennung) Martensstr. 3 D-8520 Erlangen Federal Republic of Germany Abstract: For the analysis of complex images, or image sequences explicit knowledge about the task domain is required, in order to extract a symbolic d e s c r i p t i o n out of the input data automatically. In this p a p e r , a shell for such image analysis systems is described. It combines a powerful knowledge representation scheme with a control a l g o r i t h m , which m a y be refined for special tasks. Tools for knowledge acquisition c o m p l e t e the shell. It does not d e p e n d on a special field of problems to be attacked. It was successfully u s e d for the analysis of scintigraphic image sequences of the heart. Applications for the analysis of industrial scenes, and speech understanding are in progress. 1.

Introduction

The purpose of image a n a l y s i s is the automatic investigation of a symbolic description of an image, or an image sequence. The content of the symbolic d e s c r i p t i o n must c o r r e s pond to the requirements of a concrete application. E.g., for a medical application like X-ray images, diagnostic descriptions are to be extracted out of an image; for industrial scenes descriptions of the quality of built objects or special tasks for a robot a r e required. To achieve this, complex applications need the explicit representation of extensiv knowledge about objects to be recognized, their relations to each other a n d their task specific domain. Furthermore there is a need for algorithms to use the stored knowledge during the analysis process. The efficiency of an image analysis system therefore depends on both the knowledge base a n d the control a l g o r i t h m . Besides this two modules, knowledge base a n d control, a database for the results a n d methods for preprocessing a n d segmentation of images are necessary/1/. In many approaches the system is c o m p l e t e d by an explanation module which allows the user to check system activities a n d to evaluate final and intermediate results after an analysis process has been finished. Up to this point the structure of an image analysis system, c o m p a r e Fig.l, is quite similar to a so called e x p e r t system/2/. The differences are mainly the input data and therefore also the data transformation processes. While expert systems transform symbolic d a t a into other symbolic data, image analysis systems has to extract symbolic descriptions out of image matrices, additionally. This y i e l d in a s e c o n d distinction. In expert systems input d a t a can be viewed as to be correct, while images are noisy, segmentation errors may occur, and so on. That is the reason why image analysis systems have to take into account certainty values of data they manipulate. Viewing the knowledge base of a system, different approaches for formalizing knowledge exist. If a knowledge acquisition is done by hand and the obtained special approach is fixed, knowledge is coded into the desired approach. First investigations are done in the a u t o m a t i c acquisition mainly in rule basjd approaches. Up to now, a rough knowledge is also necessary for training processes and training is only possible for a fixed representation scheme. The a c q u i s i t i o n modules, basic knowledge and training processes c o m pletes the system structure in Fig. 1. Depending on the scheme used for knowledge representation, image a n a l y s i s or more g e n e ral pattern analysis systems can be divided into the following groups: - syntactical approaches based on formal grammars - relational database systems - rule b a s e d systems - logic systems based on first order predicate calculus - a s s o c i a t i v e network systems Overviews a n d descriptions of different systems are given for example in /1,3,4/. Control algorithms mainly used are meta rules, depth first or best first search, a n d the A * - A l g o r i t h m / 9 / . To handle certainties heuristic functions, probabilities, or fuzzy sets are used. In this paper a system shell for pattern analysis systems will be described which In this shell, an depends on an associative network formalism a n d the A*-Algorithm.

The work reported in this paper is partially supported by SIEMENS A G , Erlangen

141

pattern

description Analjsis

>1

Fig. 1 Modules of a Pattern Analysis System and their

Interactions

active hierarchical knowledge base incorperates with an control algorithm, which only knows the syntax and semantics of the network but not it's content. This allows, to create homogenuous knowledge based systems for various applications. Therefore, theshell itself is independend of a special application. Besides the knowledge base structure and the control module which may be refined, the shell actually subsumes also tools for allows interactive acquisition, for creating a n d updating the database for results and difierent types of certainty-functions, only restricted by the A*-Algorithm. Tools for at most a u t o m a t i c knowledge acquisition are in development. The shell was successfully used in a system which achieves automatically an d i a g n o s t i c interpretation of scintigraphic image sequences of the human heart. Two further systems, a speaker independent continuous speech understanding system and for the interpretation of industrial scenes are in progress. 2. Knowledge Representation by an Associative Network 2.1 General

Approach

Remarks

Associative (or semantic) networks are special d i r e c t e d graphs, with labeled nodes and edges. First developed to represent the semantics of natural language, they were used as knowledge representation scheme for different applications. The basic idea is quite simple: Information about conceptions (objects, relations, events) are r e p r e s e n t e d by nodes, interrelationships between nodes are represented by labeled edges, to mark also the kind of the relationship. Additional, a special kind of edge, mostly named " I S _ A M , is used to connect a conception to another one which represent a class. Along such a is hierarchie of more general to more special nodes an inheritance of the properties defined. The theoretical background of such networks was studied with large effort by many groups/5/. It was c a r r i e d out, that associative network formalisms has to be epistemological adequate. That means on the one hand that there is a need for a clear distingtion, what kind of information has to be represented by nodes and what kind by edges/6/. On the other hand the syntax of a network must be well defined a n d also the semantics of the different types of nodes a n d edges must be fixed/7/. This leads to formalisms which are independend from the special content of knowledge they are used for. Further investigations were done to expand the prior only declarative content of such networks due to procedural knowledge. Starting with procedural attachment at some slots of a node this y i e l d to the powerful integration of procedures into "procedural associative networks", e.g./8/. By our opinion, such well structured networks with the capability to handle also procedural knowledge are, at the moment, the adequate way to built up knowledge bases for image (and speech) analysis systems. Our approach which will be described in the next sections is mainly influenced by KL-ONE/7/ and PSN/8/.

142

3.2 7Vpeg of Nodes thi**e different types of nodes exist in the network. Fii st of all, a CONCEPT gives the nterisional description of an object, an event, or classes of objects or events. The intensional description subsumes all properties of the conception to be modeled. Examples of such concepts are general ones like "3D-object", "movement", or "disease", or more special ones like "car", "run", or "enlarged left ventricle". The second type, called INSTANCE, represent a hypotheses that a real world object or event satisfies the description of a concept. If, for example, some region of an image is interpreted to be a "car" during the analysis process, an instance of car is created referring this region, may it be true or not. Therefore one real object may be referred to by more than one instance, but each instance is associated with exactly one concept. The concepts form the knowledge base, while their extensional sets, the instances, are the intermediate and final results. Viewed as data structures, they are both identical, exept that instances hold results while concepts subsume descriptions. The third type of node, the hUTA-OONCUfl , build up the knowledge base for the acquisition process, which results in a knowledge base for the image analysis system. Concepts can be looked at to be created by meta-concepts and data. This third kind of node will be described in section 4. The features of concepts and their interrelation will be discussed in the following. Fig. 2 shows the syntactical structure of a concept. Hatched blocks are necessary for the knowledge acquisition process and are explaned in section 4. 2.3 Types of Edges Relationships between concepts (and also between instances) can be built up by three different types of edges. They are denoted by generalization, semantic-part, and necessary-part. Each of these edges is described in a concept, see Fig.2. While a concept can only have an unique generalization which is another concept, it may consist of arbatrary number of semantic-, and/or necessary-parts. All the edges define a hierarchie in the network. Both part relationships are dscribed by a complex slot, see Fig.2. If, e.g., a concept A has concept B as semantic-part, B is the domain inside a slot semantic-part in A. For all the three relationships also the inverse is defined by specialization, semantic-part-of, and necessary-part-of, respectively. In the following, first the semantics of the relationships will be discussed, and after that the different facets inside the both "part"-slots. Generalization combines a concept to another one which represent a superclass compared to the concept itself, e.g. vehicle would be the generalization of car and object of vehicle. Like in KL-ONE all properties, that are parts, attributes, and structural_relations defined in a concept A are inherited to all concepts which are specializations of A, but they may be explicitely modified. Such modifications are to be described in special facets of the different slots. The restrictions and the rules for such modifications are comparable to those defined in KL-OHE. Contrary to other approaches of semantic networks we distinguish two different "part" relationships. Semant ic-part s of a concept must hold the restriction that they are parts in a natural sense. E.g., semantic-parts of a car are wheels, semantic-parts of a special movement can only be other special movements, not an object. Therefore we can denote this by: a concept and its semantic-parts must have the same degree of abstraction. By the relationship necessary-part concepts of different abstraction levels can be combined. If a concept A has necessary-par. B, this fact can be expressed by: to talk about A requires B. Therefore a object can be necessary-part-of a movement, or a line of a car. All slots in a concept are referred uniquely defined by their role, which describes the functional role of the slot inside the concept. E.g., the fact that one car passes another one has to be modeled in the following way: a concept "pass" has two necessaryparts. Both have the domain "car". One of the part-slots has the role "passes", the other one "is passed". The facet modified explain modifications of an inherited slot. The value can be NO, if the slot is not defined in a more general concept, YES, if a slot with identical role has been modified compared to the more general concept, and therefore been overlayed by a new definition. If also the rqje has changed, the old one has to referred to by this facet. Finally, the facet computation, which is only defined for semantic-parts (and attributes) gives information about the context dependency of the referred part. That is, the conception defined by this part depends on a larger context, i.e., the concept referring the part. E.g., the conception "(chair-)leg" depend on the context "chair". It is not possible to describe a concept "chairleg" without the knowledge that it is a part of a "chair". Contrary, a wheel can be modeled without knowing if it is part of a car, or a bike and so on. Different semantic-parts or different necessary-parts can be combined to sets of modality. Each such set describe which combinations of such parts are sufficient for the concept (obligatory set), and for each set the optional and inherent parts which may complete the optional set.

143

conctpt

àttribute

name of concept

text

role

text

hierarchy levels

4 int

y differentiation A

2 int

priority

6 int

/ camp. ol dHf. y

name ol procedure

descriptive into.

text

/ / dimension / / y

2 int

concept

/ comp. of dim. / - f

generalization

/

spezioization

- *

fot ol concepts

context

- *

1st ol concepts

- *

concepì

meta-concepty

computation

/

name ol procedure name ol procedure

arguments

list of orguments

argument-testy

name of procedure

^ model-concept ^

Usi ol concepts

inverse comp.

semantic-part-ol

ht ol concepts

restrictions

name of procedure

doman

int or float or char 2 int or 2 float

semantic-ports

list ol

sem. -attributes

Ust ol

tttribules

selection

sem.-structures

Ust ol

structures

modified

list of concepts

necessary-port-of

'/

list ol

ittributes

nec.-structures

list ol

structures

local-attributes

list ol

attributes

modality

Ust ol

*

modilitj-sets

Cf-procedure

name ol procedure list ol arguments

graphic

a

-

Cf-arguments argument-testy

/ / mmódifed / y

list of ptrts

necessary-ports nec.-attributes

ptrts

name of procedure X- and Y-value

YES or NO or role — •

default-values

name of procedure

otri role

text

/ differentiation^ >' >* i' / i ' / / / comp. ol d'tfl /

2 int

dimension ' / / Y / i ' i< J' / >' i ' / / comp. of dim. y

2 int

domain

name ol procedure

name ol procedure —*•

name ol concept

— •

name ol procedure

computation list of

ptrts

optional

list of ptrts

inherent

ht of ptrts

deftult-rilae

NO or role deftull-vtlue

; comp. of default ',

odtlity-eel obligatory

name of procedure

restrictions modified ^y

mmodifiedy^,

YES or NO

YES or NO or role NO or role

structure int or Hoot or char

lyp number values

role

text

ini

/ dUferenlhtion y

2 int

(typ)-array

/ Cornp. of dill. /

name of procedure

relation

name ol procedure

arguments ' argument-test / default-value

list of arguments name ol procedure lloat NO or role

Fig. 2:

14¿

Relationships, Slots, and Facets building up the definition of a Concept

2.4 Attributes. Structures. Certainty Attribute* characterize properties of a concept which a r e essential with respect to the task domain. In most cases such attributes are physical properties, like the volume or the color of an object, or start or end time of a movement. But also, e.g., textual explanations of diagnostic interpretations may be attributes of concepts. But they must not be used to handle properties which describe relationships to another attribute or special relationships between properties of parts. Identical to parts, attributes are uniquely defined by their role. Additional facets give the domain, select ions for the domain and default (or initial) values. As mentioned a b o v e , attributes are inherited from a more general to a more special concept. But it is also possible to modify an attribute in the same way as a modification can be done for parts. Substantial for the definition of a n attribute is the procedure how a value for an instance can be calculated (computation). Such a procedure can be a simple multiplication, but also a parser combined with a grammar, or, even more complex, a complete rule based system. There is no necessity for such procedures to give an unique result. Based on the same input data they may build up different competing results. Each is stored in one instance, and therefore competing instances are created, each having one unique value for all its attributes. The results of the computation can be restricted due to the conception they are used for. The procedure referred to by restrictions do this job. The arguments of the computation procedure are referred in a further facet of the slot. The arguments are a subset of those attributes which are d e f i n e d in parts of the concept, or if the concept depend on a larger concept also in the concept describing this context, compare section 3. In order to support control algorithms with mixed bottom-up and topdown strategies, also a procedure for an inverse computation is referred. Properties which must hold between different attributes and/or attributes of parts, are to be tested by structures. The semantics of these slots, which are also uniquely defined by their role, is: a relation tests the arguments due to the fact substantial for the concept. E.g., in a concept "car" a structure "above" may b e defined, which is able to test, whether the "bodywork" is above the "wheels". The results of structural tests are essential for an instance to be more or less valid for the concept. Other informations which may help to judge the quality of an instance are the restrictions facets in the different slots and the quality of the instances referred to by part relationships. Out of these facts the CF-arguments can be chosen to check the quality of an instance by the CF-procedure.

3. Use of Knowledge. Creating Instances The main idea to use knowledge stored in an associative network as described above is concentrated in the basic rule for instantiation. This rule completes the definition of the network scheme by a third step. Besides the syntax a n d the semantics of the formalism, the use of stored knowledge and therefore the pragmatic is defined. This can also be done without respect to a task domain. The rule can be expressed as follows: of the modality of A, IF for a concept A with respect to one obligatory-set instances for those concepts exist, which are referred to by the following slots in A or slots inherited to A without modificat ions: necessary-parts AMD semant ic_part s with facet computation equal to A O AND one of context if this slot is not equal A O THEN build u p instances ivp(A) of A as follows: - create empty instances of A, - connect these instances to those instances, which are mentioned in the condition of the rule, - calculate the attribut«-values for all ivp(A), with respect to the argument s - test the restrictions - estimate the quality of ivp(A), by CF-procedure with respect to the CFarguments referring yet known instances a n d restrict ions By this rule partial instances are built up with calculated attribute values and tested restrictions, a n d an estimated quality. As mentioned in section 2.4, for structural tests attributes out of all parts may be used. Therefore a n additional rule, the rule for completing an instance, is required: IF an instance ivp(A) of a concept A exists AND instances for all those concepts exist, which are referred to by the semantic-part slots in A, with respect to the obligatory set of the modality used for building up ivp(A)

145

THEN

build up iv(A) out of ivp(A) as follows: - connect iv(fl) to the instances referred to by the condition of this rule and not y e t c o n n e c t e d to ivp(A) - test the structures d e f i n e d in A with respect to the arguments - calculate the quality of iv(A), by CF-procedure with respect to the CFarguments If a goal concept for an analysis process is known, fecursive application of these b o t h rules results in a search path for the g o a l concept. By c o m p e t i n g instances, generated for a concept, this path is splitted into a search tree. Based on the q u a l i t i e s of instances qualities for concepts r e s t r i c t e d to one path of the tree can be estimated. This yield to quality functions for the nodes of the search tree, w h i c h are used for the A - A l g o r i t h m /10/. Up to this point only obligatory sets of the modality of the concepts were used. An a d d i t i o n a l rule, the rule for extending an instance, a l s o handles the optional and inherent parts. IF an instance iv(A) of a concept A exists AND instances of concepts e x i s t , which are optional or inherent due to the modality used for building up iv(A) THEN e x t e n d iv(A) to ive(A) as follows: - connect the instances m e n t i o n e d in the c o n d i t i o n to ive(A) - c a l c u l a t e attributes with r e s t e c t to the arguments - test structures with respect to the arguments - c a l c u l a t e the CF of the new ive(A) If the goal concept is k n o w n , this three rules together w i t h the A*-Algorithm form the skeleton for d i f f e r e n t c o n t r o l strategies. But they are also one complete strategie. F u r t h e r m o r e , it is a l s o possible to e x t r a c t automatically potential g o a l concepts /15/. 4. Knowledge

Acauisistion

4.1 General Remarks The ability of knowledge acquisition (learning) is very important for m o d e r n image analysis systems. A l t h o u g h the analysis system is designed modularly, the a d a p t i o n to another field of interest is a time spending process. The bottleneck of this process is of course the c o n s t r u c t i o n of the new k n o w l e d g e base. There are basically two approaches to knowledge a c q u i s i t i o n : leave it to the d e s i g n e r , that is, the manual a p p r o a c h , or leave it to the machine, that is, the (automatic) learning a p p r o a c h . And there is an a r b i t r a r y number of r e l a t e d approaches resulting from some mixture of the m a n u a l a n d the learning approach /l/. Examples of knowledge a c q u i s i tion for image a n a l y s i s systems are g i v e n in /13,14/. Until now we followed the manual a p p r o a c h . The system designer was able to b u i l d up the declarative part of the knowledge base using a special network editor. This editor is described in /12/. The goal of our knowledge a c q u i s i t i o n system will be a n almost automatically c o n s t r u c t i o n of the d e c l a r a t i v e part of the knowledge baSe. This learning will be done by e x a m p l e s . Our knowledge acquisition system will enable persons, w h o are not well v e r s e d in a c q u i s i t i o n networks, to build up a new knowledge base. This is an important p r e c o n d i t i o n for a n easy a d a p t i o n of the analysis system to different fields of interest. 4.2 Features used by the Acquisition Process The hatched blocks in Fig. 2 show the features which are used by the a c q u i s i t i o n process. If a concept is g e n e r a t e d by the a c q u i s i t i o n process using a special m e t a - c o n c e p t , these two c o n c e p t s are c o n n e c t e d by an edge named meta-concept from the generated concept to the m e t a - c o n c e p t . The inverse edge is named mode I-concept. A concept of the knowledge-base of the analysis process can only have one meta-concept while a metaconcept can have'several m o d e l - c o n c e p t s . There is no inheritance from a m e t a - c o n c e p t to its m o d e l - c o n c e p t s . Instead each m e t a - c o n c e p t contains a description about h o w to construct such a m o d e l - c o n c e p t . During the a c q u i s i t i o n process the e x i s t i n g parts, structures, a n d attributes of the meta-concept may be split. For instance the m e t a - c o n c e p t 3D-0BJECT may have a part surface. Of course the g e n e r a t e d concepts of real objects w i l l have several surfaces. Therefore the process of splitting, named differentiation, is c o n t r o l e d by a given interval. This interval defines the a l l o w e d number of differentiations. The slot differentiation contains the bounds of this interval. The slot computation of differentiation refers to the procedure that c o m p u t e s the real number of differentiations. The same p r o b l e m o c c u r e s in the case of dimension. Different model-concepts of the same meta-concept may have d i f f e r e n t d i m e n s i o n s of their parts, structures a n d attributes. T h e problem is s o l v e d in the same way as the differentiation. The slot dimension con-

146

- i'I i 11 b tut bounds of the allowed dimension-interva; while t li 1 • • imputation of dimension refers tc the procedure which computes the real numbec. The slot rnnodlfied is used if a part, structure or attribute of the meta-concept has to be splitted. In this case the slot of the model-concept contains the role of the part, structure or attribute of the meta-concept. Otherwise rnnodlfied is set to NO. The slot argument-test always refers to a procedure that checks the existance of arguments of procedures that are used by the analysis process. The slot computation of default refers to a procedure that computes the default-values during the acquisition process. 4.3 System Structure The system structure of the acquisition system is shown in Fig. 1. It is similar to the the structure of the analysis system. The modul METHODS is equal to the same modul of analysis system. The content of the modul META-KNOWLEDGE will be explained later. During the acquisition process the database for the results contains concepts instead of instances in the case of analysis. The control of the acquisition process is done by a special algorithm which only knows the syntax a n d semantic of the assosiative network but not it's content. Of course this algorithm is not as sophisticated as the control algorithm of the analysis process. The acquisition process does not have to classify the input data. The goal is to determine a symbolic description of the input data of a given object or a given class of objects that can be used by the analysis process. In our system the symbolic description is stored in an associative network. The two steps of the acquisition algorithm are: creating one concept using a single observation and creating a new concept by comparison of existing concepts. The input data is a sample. But this sample may not only consist of images. For example the process for acquisition of workpieces may use images a n d CAD data of these workpieces as input data. 4.4 Meta-Knowledqe The knowledge base of the acquisition process contains the meta-knowledge. It is separated into a declarative and a procedural part. The declarative part is the meta-model which is formed by the meta-concepts. The meta-model is based on the associative network formalism, which was explained in chapter 2. The procedural part of the meta-knowledge consists of the procedures referred to by the slots argument-test , computation of differentiation, computation of dimension, and computation of default a n d of the rules used to compare intermediate results. The meta-knowledge incorperates with the control algorithm of the acquisition process. But of course they are independent in the way that the same algorithm will work with different meta-knowledge each for one field of interest. 4.5 The Acquisition Process The acquisition process is divided into two steps. The first one is to create one concept using a single observation. This observation may be for instance an image of an object or CAD-data. The algorithm has two parameters. The first parameter is the name of the meta-concept that leads the algorithm. The second one is the name of the concept to be created. During the first phase of step one the acquisition algorithm will b u i l d up a concept shell. Concept - shell means that the new concept, it's parts, attributes a n d structures, and the edges between the parts and the concept are created, but the slots which will later contain special values are empty. This means during this phase computation of differentiation and computation of dimension takes place. The parts, attributes and structures of the meta-concept may be splitted. The goal of the second phase is to test the existance of the arguments of the analysis procedures. This is done by calling the routines referred to by the slots argument-test . A part, attribute or structure of the meta-concept may no more occur in the modelconcept because of differentiation. If a part, attribute or structure of the metaconcept is splitted into several parts, attributes or structures, then they will have new a n d different roles and they can not have the role of the part, attribute or structure from the meta-concept. In this case the names of the arguments which cure composed of the roles have to be determined again. During the third phase, the default values are computed by calling the computation procedure of each attribute. The analysis process may be improved by restriction of the domain of attributes. But if, for example, the analysis is supposed to recpgnize an object independent from its position and the computation procedure for a special 3dpoint computes the position values, it would be fatal to restrict the domain of this attribute. On the other hand it may be useful to restrict the domain of an attribute to

147

an »«tervfel e l t o -the coayutetf default value. "J^is way the- analysis w l l oiJy iflarch u>r segments of the image that satisfy the given restriction. The conclusion from these examples is: Restriction of the domain is not always useful and if a restriction takes place, some inaccuracy should be taken into account. The concepts created by the first step are the intermediate results of the acquisition process that are stored in the database. The second step will create new concepts by rulebased comparison of these intermediate results. The comparison may be done to combine several observations of the same object. Especially if you want to build up a complete 3d-model of an object you have to examine several images from different views. On the other hand the comparison of concepts may lead to a description of a given class of objects (generalization). This can be done by specifying positive and negative examples. After these two steps have been processed several times the final results of the acquisition process, the created concepts, have to be transmitted to the knowledge base of the analysis process. 5. Applications and Results The shell described was used for the automatic diagnostic interpretation of scintigraphic image sequences of the heart. This system is discussed in detail in /10/. The knowledge base consists of about 180 concepts with more than 1000 edges. Procedures to calculate attributes are, beside others, also a parser with formal grammars, dynamic programming routines, and fuzzy rules. All the tests and qualities are realized by fuzzy-membership-functions. The system was tested with 21 image sequences. 18 were interpreted correctly, while 3 had result "undefined". A speech understanding system using this shell is in progress. A rapid prototyted version with about 200 concepts is tested. The Strategie of this system is mixed bottom-up and top-down due to the basic rule of instantiation. Therefore also "inverted" attribute calculation is used. Datadriven the knowledge base is restricted to created instances. These variable knowledge bases are build up by NDDIFIED-OONCEFTS. The quality of instances is based on probabilistic features. The main point of the third application, interpretation of industrial scenes, will be automatic knowledge acquisition. The meta-knowledge base of this system consists at the moment of about 20 meta-concepts. The complete shell, including further investigations, is, respectivelly will be realized in C under UNIX. The reason is the high efficiency. Other versions with less functionality were realized in FORTRAH /10/ and LISP /15/. References; /I/ Niemann, H.: Pattern Analysis. Berlin, Heidelberg, New York: Springer 1981 /2/ Hayes-Roth, F., Waterman, D.A., Lenat, D.B. (eds): Building Expert Systems. McGraw Hill 1982 /3/ Ballard, D.H., Brown, C.M.: Computer Vision. Englewood Cliffs: Prentice-Hall 1982 /4/ Hanson, A.R., Riseman, E.M. (eds): Computer Vision Systems. New York: Academic Press 1978 /5/ Findler, N.V. (ed): Associative Networks. New York: Academic Press 1979 /6/ Woods, W.: What's in a Link: Foundations for Semantic Networks. In Bobrow, D., Collins, A. (eds): Representation and Understanding. New York: Academic Press 1975 111 Brachman, R.J.: On the Epistemological Status of Semantic Networks. In /5/, 3-50. /8/ Levesque, H., Mylopoulos, J.; A Procedurel Semantics for Semantic Networks. In /5/, 93-121. /9/ Nilsson, N.J.: Principles of Artificial Intelligence. Berlin, Heidelberg, New York: Springer 1982 /10/ Sagerer, G.: Darstellung und Nutzung von Expertemwissen fUr ein Bildanalsesystem. Berlin, Heidelberg, New York: Springer 1985 /11/ Niemann, H., Sagerer, G: Semantische Netze als Ansatz zur Repräsentation und Nutzung von Wissen fUr die automatische Bildanalyse. In Robotersysteme 1, 1985, 139-150. /12/ Hofmann, I., Gamlich, R., Niemann, H.: A Human Interface for Control of an Image Processing System. Proc. 8th ICPR, Paris, 1986, 1256-1258. /13/ Perkins, W.A.: INSPECTOR: A Computer Vision System that Learns to Inspect Parts. IEEE PAMI, Vol.5, No.6, 1986, 584-592. 1141 Yashida, M., Isuji, S.: A Variable Machine Vision System for Complex Industrial Parts. IEEE Trans, on Comp., Vol.C-26, No.9, 1977, 882-894. /15/ Eichhorn, W., Niemann, H.: A Bidirectional Control Strategy in a Hierarchical Knowledge Structure. Proc. 8th ICPR, Paris, 1986, 181-183.

148

THE

THREE

BASIC

FORMULAS

Reinhard Abstract.

It

structures EULER

tance

to

digital

izes

1. The

basic

may

topological

theory

Theorem, be

be

theoretical

period

of

an

by

cyclic

to

the

oriented

neighborhood

in

be

a

enumeration

of

Theorem,

and

to

basic

be

"object

and

all

the

the

impor-

features

areas".

approach

The

and

neighborhood

of

of

practical

measures

presented

way

of

Mesh

facts

and

to

considered

the

2)

characterized

algorithms,

importace

defined

the

fundamental discipline

of

notion

character-

structure.

point

The

neighborhoods.

by

the

During eral

the

the

digital

last

a

series and

brief

of

of

theory

is

connected

has

to

be

well-developed

it-

the

digital

geometry;

"low

neighborhood

"image this

of

a

Image to

topics

vision"

characterized

relations

in

theory".

papers

will

as

be

-

just

given 1985

of

have

use

in

cite

pub-

of

irre-

sets

most

presented

to

essentially

point

the

self-

represen-

we

bj> t h e

discrete Some

sev-

a

connectivity,

closed

is

Since

formu-

Processing

[ 1 , ..., 10 ]

[llj.

for

formulate

relatively

level

is

necessary

recorded

covering

sets

processing

series

Digital

be

[12]

point

[ 1 3 ] which

tools

compare

In

to

random

of

may

approach

papers.

related

of

papers

an in

and

field

attempts

the

as

the

important

this

paper

way. of

images of

digital

generated by

other

hand,

ables

of

image

a given

specifying

acterized

or

symmetric

subjects

were

in

theory

contained

lected

decades

successful

mostly

the

facts

crete

available.

topics

objects

The

be

books

of

flexive

a

scientific

results)

to

related

basic

in

a

Mathematics

have

two

less

topology,

upon

lished

of

of

theoretic-mathematical

of

based

methods,

branches

theory

or

contained

tation

(notions,

different

more

few

foundation

preconditions,

and

lating

a

is

which

central

Voss

will

deducing

STRPCTURES

1 ) and Klaus

Vertex

formulas

theoretic-mathematical two

self, -

by

the

the

NEIGHBORHOOD

Introduction

to -

of

complete

orientation

that

processing, sets

is

Klette

upon

three

importance

point

a

shown

based

These

image

a mesh

be

be

Theorem.

topological

of

will

may

OF

by

the

field

processing of

assumptions

on

abstraction, so-called

"4-,

such

models

may

be

a given

theory

which

are

application digital there

6-,

or

should

be

certain

topology

and

obtained

images. a

are

some

or

For

a

has

geometry.

"favorite

8-neighborhood", by

dealing

model

generalization

These

example.

of of

be

models"

for

interpretation

with to

some all

consemodels charOn

the

vari-

the

con-

1 ") Zentralinstitut fUr Berlin, DDR-1086

Kybernetik

2 ) Friedrich-Schiller-Universitat, haus,

Jena,

und

Informationsprozesse,

Sektion

Technfllogie,

KurstraBe

33,

Universitatshoch-

DDR-6900

149

crete m o d e l s relevant to image p r o c e s s i n g . At this level of v a r i a b l e s of the t h e o r y are lation tion

points,

a certain

abstraction,

n e i g h b o r h o o d

d e f i n e d on the set of these points, and a c e r t a i n

d e f i n e d by cyclic o r d e r i n g of all the finite n e i g h b o r h o o d s

By i n t e r p r e t i n g these v a r i a b l e s ,

re-

o r i e n t a of

for example points by points of an

points. ortho-

gonal, or by cells of a c e l l u l a r space, or by r e g i o n s of images etc., crete m o d e l s may b e o b t a i n e d . At this level of a f u n d a m e n t a l t h e o r y , e s t a b l i s h e d branches of M a t h e m a t i c s may be c h a r a c t e r i z e d to be the tools, as Set Theory, Graph Theory, Theory of Algebraic Complexes Grid T h e o r y

con-

some methodic

[ 14 ] , or

[ 15 1. But sets, g r a p h s , c o m p l e x e s , or grids are not the

ry subjects of a tlteory of digital

prima-

image p r o c e s s i n g . This point of v i e w

may be compared with the I n v e s t i g a t i o n of spatial m o t i o n s in P h y s i c s , example: The subject is a model of the moving mass point, and the of vector spaces and d i f f e r e n t i a l

e q u a t i o n s are p r o v i d i n g the

tools.

So far we see the following four m a i n topics of a t h e o r y of image sing w h i c h may be studied in the same m e t h o d i c a l - the t o p o l o g i c a l t h e o r y of n e i g h b o r h o o d as support structures of digital

n e i g h b o r h o o d structures - the theory of discrete

s t r u c t u r e s w i t h specific

structures,

in r e g u l a r grids based u p o n mappings' of

into the real space,

and

image functions d e f i n e d on r e g u l a r grids

In the present paper we shall restrict ourself-s to the most

is a finite set of

s t r uct u r e points,

N we obtain concrete

is defined to be a tuple

(P, N) where P

and N - P i Pis an i r r e f l e x i v e

r e l a t i o n called n e i g h b o r h o o d models

relation.

of n e i g h b o r h o o d

of point pi P, and

& (p,q)fcNjis

Let £ = card (P) be the n u m b e r of points, and let structure

graph theory is g i v e n by the V e r t e x

symmetric

structures. A neighborhood

^ ( p ) = card (N(p)) denotes

of edges cf a g i v e n n e i g h b o r h o o d

and

By i n t e r p r e t a t i o n of P and

(P, N) is i s o m o r p h i c to an u n d i r e c t e d g r a p h without

loops and m u l t i p l e edges. The set N ( p ) = ^ q | q £ P

P6P

fundamental

structures.

Structures

A n e i g h b o r h o o d

borhood

charac-

continuosity.

theory, the t o p o l o g i c a l t h e o r y of n e i g h b o r h o o d

structure

models

images,

t e r i z e d by a principal e x c l u s i o n of

2. N e i g h b o r h o o d

proces-

line,

- the geometric theory of digital figures on n e i g h b o r h o o d - the metric theory of figures

for

theories

elementary the

neigh-

its v a l e n c e .

card (N)/2 be the

number

(P, N). Then, a basic f o r m u l a of

Theorem

*(p) = 2 St.

(1 )

Then, ^ = 2at/£ roay be called the a v e r a g e d

valence

of the

given

n e i g h b o r h o o d structure. By g r a p h theory some common notations are g i v e n : A way 9

150

(q 1 , . . . ,

in

a

subset

Q satisfying q i € N ( q ± _ 1 ) ,

Q S P is an ordered sequence

for i = 2, . . . , n . A set QS.P is

of

points

c o n n e c t e d

if a n d o n l y

if

(iff) there

exists

po i n t s p, qft Q. A r e g i o n of a s e t

Q £ P denotes

3. O r i e n t e d By c y c l i c

ordering the

3pecific

realization a

.... Q j ^ Let

H

C be t h e

(P, N, C) is t h e s t r u c t u r e A

(directed)

ed) edge

(p, q ) u n i q u e l y

successor

within

edges,

the

defines

structure

g e n e r a t e s

an

sequence

finite,

any generated way

(p, q, r, s, ...)

ment

of o u r a p p r o a c h w i t h the

c ( p ) = ^ r , t, q ^

the

ordering

predecessor any

its

any edge

(direct-

direct

(p, q )i N

(q,r),(r,s),...

way

of p o i n t s

Because

the

set

P of

Figure

1. The

of

edges,

e. g.

or c ( q ) = ^ r , s, t, p ^ . T h e n u m b e r

points is

period

by m ( p , q).

by

of

passed

A complete

, and denoted

is i l l u s t r a t e d

clockwise

edge

q. T h u s ,

(q, r ) as

(p,q),

P =

n e i g b o r h o o d

(directed)

is c y c l i c .

a g e n e r a t e d w a y w ( p , q ) is c a l l e d a m e s h coincide

a

edge

a c y c l e

p C P. T h e n ,

p is a d i r e c t

of p o i n t

of e d g e s .

is

sequel.

In t h i s w a y ,

by this g e n e r a t e d

notion

by

sequence

a n d w ( p , q ) = (p, q, r, s, ...) d e n o t e s

cycles

c(p),

in the

(directed)

through

basic

cycles

c(q)

(P, N, C).

infinite

an For

ordering { l ^ t Qg'

of a n o r i e n t e d

cycle

an

processing

A cyclic

, i . e . point

the n e i g h b o r h o o d

N(p),

structure.

a n e i g h b o r h o o d

f o l l o w e d

— > —

1 i

0

0

1

2

3

4

5

6

7

8

9

10

11

12

13

H

15

Fig. 2. A structure P ( p o i n t s o, », edges — , • » ) and a structure (points •, e d g e s « » ) , where points p.. are identified by 1J row number i and column number j. For example, in Fig. 2 cycle

c(p

cycle o Q ( p 5 8 ) = < p 6 8 P/.n> P > , -48' *57 r nQ. for p, qfcQ and (p, q ) £ N (i)a

core

P , too

(for

(ii) or a

mesh example,

border

3 8

^

in Figure

p m

Q

68' p59' p48' Q^p' ^

= m

Then, m n

is

and

57 me

^

is restricted

®h

=

p

P

P

Q ^ 2 2 ' 32' 31 ' mesh of Tq iff

P

in Figure 2), 21^ n{p, q), i. the edge

from m^ (for example,

m^

structure

(p, q ) geu-

p < PAR48 ' Prb> ^58 'PC 57' •

2).

of Q , ( p , q ) is an (ordered) b o r d e r

( p , q ) are a t t a c h e d

to

P and cycle c ^ ( q ) =

(undirected) b o r d e r

pair

of Q, and both [ p , q j

the border mesh m Q ( B , q ) = m g ( q , r ) ,

cycle c (q) =(s, s^, ..., s^, p, p^, ..., p-^, r,

of point q in

of point q in substructure

the border edges { p

p

p

p

Euler t _ » « .

example are at... in

by successively

adding a single point

In this way it may be proved

or a

structure)

by induction

that

Theorem +

v

= X $ 2

holds for connected c h a r a c t e r i s t i c

152

P

(connecting two points already existing within the

to a given substructure. the

p

Theorem

Structures may be constructed single edge

p

for

structure

P . For

56' ^57 Ì l 5 6 ' 6 6 $ ' i 55' 5 6 } ' Ì 4 5 ' 5 5 Ì tached to the border mesh m^ip^g, P 5 7 ) m (p Q 5 7 ' p 6 7 } = m Q ( p 6 7 ' p 66' Figure 2 . 4. Euler's

to

substructure

called

For qtQ and pfcP - Q, if q t N ( p ) then £ p , q j is an edge

p a

of PQ iff m^ = m(p , q ) , i . . m^ is a mesh of

erates a mesh in P different P

58 . Let

16

F_

(3)

(!) structures. X

Also

it follows that the

of a given oonnected

Euler

structure may be equal to an

even n u m b e r +2, 0, -2, -4, ... only. In g e n e r a l , = (P, N, C ) consists

of

wise building up a structure striction

(deletion

we have

iff X = X ( P ) =

exists

planar sible

because

C on this graph

X = 2 would of

* ( P )

= 0. For example,

r

In toroidal nets it holds that 2 \ + 2 V

-t. - * a . = o,

thus this equation may be

transformed to where g is called the

total

curvature

of the single border mesh

of P R . The total curvature may be equal to +1 in case of planar

regions,

or equal to -1 in case if toroidal regions, the border mesh of the region is called an

outer

border

mesh,

or an

inner

border

mesh

respectively. Now assume that region R has r border meshes m^ , m^, . . . , m^. Let

156

be the

length mesh

of

m..

mesh

m^ , and

Then,

let

similarty

n^

to

be

(5)

the we

number

of

border

edges

attached

to

obtain

r Vf

-

2 H n i =1

*(u-r)+

+

* for

the

2 *

,

(7.1)

- 1. = 1=1 1

2 *

, and

(7.2)

*

(7.3)

R

r

P _ = (R, N„ , C D ) . n H H

=

J. *T

"

the

global

calculated

logical

*R

^

-

topological

by

7

Because

All

- ^ 1 and

total

Pick R

n. a n d l

1 = ^ - 1 . . . 1

It

1=1

n

and

1

which

Furthermore, of

mesh

exactly

other

characterized

by

the

value

of

r

may

*

based

on

curvature

one

border

may

outer

meshes

be

equational may

border

of

R

obtained

be

local

system

topo-

(7)

the

proved:

mesh

are

by

inner

of

total

ones

curvature

with

total

cur-

n

may

be

process. or

calculated

signalizes Finally,

e x t e r i o r

during

the

the

type

of

.equation

relatively

computation

border

(6) to

may the

mesh be

of

at

used

a

the to

computed

border

mesh,

end

this

of

define

the

border

mesh.

border

meshes.

Formulas

be

For ^

.



curvature

i n t e r i o r

Let

1=1

structure

values

R has

the

=

computational

8.

the

region

+1.

the

2—