SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
mukeshtekwani@outlook.com

Digital Signal and Image Processing
Frequently Asked Questions
In BE (Sem VII) – University of Mumbai
No

Question
JUSTIFY:
1. If the kernel of the image transform is separable and symmetric the transform
can be explained in matrix form. Justify.
2. Laplacian is not a good edge detector – Justify
3. Lossy compression is not suitable for compressing executable files – Justify
4.
5.
6.
7.

Low pass filter is a smoothing filter – Justify
Unit step sequence is a power signal – Justify
If the energy of a signal is finite, its power is zer. Justify
Laplacian is better than gradient for detection of edges – Justify

8. Walsh transform is nothing but sequently ordered Hadamard transform
matrix. Justify
9. All image compression techniques are invertible. Justify
10. For digital image having salt and pepper noise, median filter is best filter.
11. Unit ramp signal is neither energy nor power signal.
12. List and prove any four properties of DFT.
13. Find the circular convolution on the given two sequences x1(n) = {1, -1, 2, -4}
and x2(n) = {1, 2}
14. Compute the Hadamard of the image shown:
2
1
2
1
1
2
3
2
2
3
4
3
1
2
3
2
15. Give the classification of noise in images. Compare restoration and
enhancement. What are the differences between the two? What do they have
in common?
16. Three column vectors are given. Show that they are orthogonal. Also generate
all possible patterns. X1 = [1 1 1], x2 = [-2 1 1], x3 = [0 -1 1]
17. Explain image segmentation using thresholding. How to apply thresholding to
unevenly illuminated images?
18. What is image segmentation? Explain the following methods of image
segmentation. (i) Region growing , (ii) region splitting , (iii) thresholding
19. Determine the Z-transform of the following discrete time signals and also
specify the region of convergence (ROC)
(i) X(n) = {1*, 2, 3, 4},
(ii) X(n) = {1, 3, 5, 7*},
(iii) X(n) = {1, 2, 3, 4*, 5, 6, 7}
20. Explain log transformation. How is gamma correction done?
21. Find the Huffman code for the following stream of data (28 points)
{1,1,1,1,1,1,1, 2,2,2,2,2,2,2, 3,3,3,3,3, 4,4,4,4, 5,5,5, 6,6,7 }
1|Page

Marks

M/YY

5

D10

5
5

5

D10
D10
J12
D10
D10
D11
D11,
J12
D11

5
5
5
10
5

D11
J12
J12
D10
D10

5

D10

10

D10
J12

10

D10

10

D11

10
10

D10
J13
D10

10
10

D10
D10

5
5
5
5
mukeshtekwani@outlook.com
22. What do you mean by Gaussian noise and why is averaging filter used to
eliminate it?
23. List down the advantages and disadvantages of Wiener filter.
24. Write short notes on
(i) KL transform (J13)
(ii) JPEG compression
(iii) Hough Transform
(iv) Classification of signals
(v) Discrete Cosine Transform (5) (D10) (J12) (J13)
(vi) Wiener filter (5) (2010)
(vii) Difference between low pass filter and median filter
(viii) Hough transform (5) (D10) (J12)
(ix) Homomorphic filter (5) (D10)
(x) 4,8,m connectivity of image pixels. (5) (D10)
(xi) Sampling and Quantization (5) (J12)
(xii) Wavelet transform (5) (J12)(J13)
(xiii) Properties of Fourier Transform (J13)

5

D10

5
10
each

D10

25.

10

D
2010

26. Obtain linear convolution of two discrete time signals as below:

10

D
2010

27. Find cross-correlation betweeen given signals
X(n) = {1, 2, 0*, 1} and y(n) = {4, 3, 2*, 1}

5

D
2010

28. Find Z transform of x(n) and draw its ROC

10

D
2010

29. Determine the auto corrrelation of the following signal x(n) = {1*, 3, 1, 1}

5

30. Using 4 point FFT algorithm, calculate the 2-D DFT of

10

D
2010
D10

31. Write 8 x 8 Hadamard transform matrix and its signal flow graph. Using the
butetrfly diagram, compute Hadamard transform for x(n) = {1, 2, 3, 4, 1, 2, 1, 2}
32. Perform histogram equalization and draw new equalized histogram of the
following image data
Gray
0
1
2
3
4
5
6
7
Level

10

D10

10

D11

2|Page
mukeshtekwani@outlook.com
No of 790 1023 850
656 329 245
122 81
pixels
33. Equalize the given histogram. What happens when we equalize it twice?
Justify.
Grey Level
0
1
2
3
No. of pixels
70
20
7
3
34. Perform histogram equalization for following. Obtain a plot of original as well
as equalized histogram.
Intensity 0
1
2
3
4
5
6
7
No
of 70
100 40
60
0
80
10
40
pixels
35. Whatare the different types of redundancies in digital image? Explain in detail.
36. For the 3-bit 4x4 size image perform following operations.
(i) Thresholding T = 4
(ii) Intensity level slicing with background r1 = 2 and r2 = 5
(iii) bit plane slicing for MSB and LSB planes
(iv) Negation

37.

38.
39.
40.

41.

42.
43.

4
2
3
0
1
3
5
7
5
3
2
1
2
4
6
7
A causal FIR system has three cascaded block, first two of them have individual
impulse responses h1(n) = {1,2,2} h2(n) = u(n) – u(n-2). Find impulse response
of third block h3(n) if an overall impulse response is h(n) = {2, 5, 6, 3, 2, 2}
Explain in detail enhancement techniques used in Spatial domain used for
images.
Explain homomorphic filtering in detail.
Find the DFT of the given image:
0
1
2
1
1
2
3
2
2
3
4
3
1
3
2
3
Define
(i) Eucledean distance
(ii) City block distance
(iii) Chess board distance
(iv) m connectivity
Find the DFT of the given sequence (Use DITFFT algo) : x(n) = {1,2,3,4,4,3,2,1}
Given below is the table of 8 symbols and their frequency of coccurence. Give
the Huffman code for each symbol.

Symbol
S1
S2
S3
S4
S5
S6
S7
S8
Frequency 0.25 0.15 0.06 0.08 0.21 0.14 0.07 0.04
44. Perform the convolution of the following two sequences using Z transforms:
3|Page

10

D10

10

J12

10

D
2010
D
2010

10

10

J12

8

J12

6
6

J12
J12

10

J12

10
10

J12
J12

8

J12
mukeshtekwani@outlook.com

45.
46.
47.
48.

X(n ) = (0.2) n and h(n) = (0.3) n u(n)
Find the inverse Z transform H(z) = 1/ [1 – 3z-1 + 0.5 z-2 ] , |z| > 1
Prove that two dimensional fourier transform matrix is an ordinary matrix.
Derive 8 directional Laplacian filter mask
Derive matrix representation of one dimensional Walsh tranbsform for N = 4
from forward Walsh transformation function.
State fidelity objective and and subjective criteria of image evaluation.
Derive the equation of contrast stretching transformation function on the
input image F and obtain the output image R.

6
5
5
5

J12
D12
D12
D12

5
6

D12
D12

8

D12

6

D12

6

D12

54. Segment the following image such that the difference between the maximum
intensity value and minimum intensity value in the segmente region is less
than 18 using split and merge technique.

8

J12

55. Let x(n) be four point sequence with x(k) = {1, 2, 3, 4}. Find the DFT of the
following sequence using X(k).
(i) P(n) = x(n) cos (nπ/2)
(ii) q(n) = 2∆(n) + 3 {Four point u(n) } + 4 x(n)

6

J12

49.
50.

51.

Given
,
(i) Find 3 bit IGS coded image and calculate compression factor and bits per
pixel (BPP).
(ii) Find decoded image and calculate MSK and PSNR.
52. Given h(n) = {1*, 2} find the response of the system to the input x(n) = {1, 2, 3}
using FFT and IFFT.
53.

4|Page
mukeshtekwani@outlook.com
56.

8

D12

6

D12

6

D12

6

D12

8

D12

If the gray level intensity changes are to be made as shown in fig below, derive
the necessary expression for obtaining the new pixel value using slope.

(ii) Obtain the new image by applying the above mentioned transformation
function.
(iii) Plot the histogram of input and output image.
(iv) Compare the histogram of input and output image.
57.

Apply the folllowing filter mask W1, W2 and W3 on the input image F and
obtain the output image.
58. Given h(n) = (1/2)n u(n), find the response of the system to the input x(n) =
(1/4)n u(n) using Z transform method.
59. Explain trimmed average filter. Find trimmed average value of the input image
F at the center position for R = 2 and S = 1 wher R is the number of
consecutive pixels to be trimmed from the minimum extreme and S is the
number of consecutive pixels to be trimmed from maximum extreme.

60.

5|Page
mukeshtekwani@outlook.com

(ii) Calculate bits per pixel (BPP) and percentage of compression of compressed
image. Donot consider the payload of Huffman table.
61. X(t) = sin(480πt) + 3 sin(720 πt) is sampled with Fs = 600 Hz.
(i) What are the frequencies in radians in the resulting DT signal x(n)?
(ii) If x(n) is passed through an ideal interpolator, what sithe reconstructed
signal?
62. Apply horizontal and vertical line detection mask on the following image F. Use
appropriate threshold value. Assume virtual rows and columns by repeating
border pixel values.

6

D12

6

D12

63. Assume that the edge in the gray level image starts in the first row and ends in
the last row. Find the cost of all possible edges using the following cost
function.
Cost (p, q) = Imax | f(p) – f(q)|
Where Imax is the max intensity value in the image and f(p) and f(q) are pixel
values at points p and q resp. Find the edge with the minimum value of cost.
Plot the graph.

8

D12

64.
65.
66.
67.
68.

5
5
5
5
5

D12
D12
D12
D12
J13

5

J13

5
5
10

J13
J13
J13

10

J13

69.
70.
71.
72.
73.

How to find inverse one dimensional DFT using forward DITFFT flowgraph.
Derive High Boost Filter mask (3 x3)
Bitreversal technique in FFT
Image enhancement using LOG transformation and power law trasformation.
Explain signals and systems with the help of suitable examples. Give
applications of signals and systems.
Find Z transform of the following finite duration signal and state its ROC: X(n) =
{1,2,5,7,0,1}
Given X(n) = {0, 1, 2, 3} find X(k) using DIT-FFT algorithm.
Find convolution of following signals: x(n) = {2, 1, 3, 5} and h(n) = {0, 1, 2, 4}
Determine the sytem function and unit sample response of the system given
by the diffference equation Y(n) = (1/2) Y(n-1) + 2 X(n)
Perform Histogram equalization for the following. Obtain a plot of original as
well as equalized histogram.
Grey
0
levels
No of 100
pixels

6|Page

1

2

3

4

5

6

7

90

50

20

0

0

0

0
mukeshtekwani@outlook.com
74. Given x(n) = {0,1,2,3,4,5,6,7}, find x(k) using DIT-FFT algo.
75. Compute 2D DFT of given image using DIT-FFT algorithm.

10
10

J13
J13

76. Explain in detail enhancement techniques in spatial domain used for images.
77. What is HADAMARD transform? Write a 4x4 Hadamard matrix and its
applications.
78. Explain image restoration and its applications.
79. What do you understand by sampling and quantization with respect to digital
image pocessing? How will you convert an analog image into a digital image?
80. Name and explain different types of redundancies associated with digital
image.

10
10

J13
J13

10
10

J13
J13

10

J13

7|Page

Más contenido relacionado

La actualidad más candente

ARCHITECTURAL CONDITIONING FOR DISENTANGLEMENT OF OBJECT IDENTITY AND POSTURE...
ARCHITECTURAL CONDITIONING FOR DISENTANGLEMENT OF OBJECT IDENTITY AND POSTURE...ARCHITECTURAL CONDITIONING FOR DISENTANGLEMENT OF OBJECT IDENTITY AND POSTURE...
ARCHITECTURAL CONDITIONING FOR DISENTANGLEMENT OF OBJECT IDENTITY AND POSTURE...홍배 김
 
Brief intro : Invariance and Equivariance
Brief intro : Invariance and EquivarianceBrief intro : Invariance and Equivariance
Brief intro : Invariance and Equivariance홍배 김
 
Convex optmization in communications
Convex optmization in communicationsConvex optmization in communications
Convex optmization in communicationsDeepshika Reddy
 
Digital Signal Processing Tutorial:Chapt 3 frequency analysis
Digital Signal Processing Tutorial:Chapt 3 frequency analysisDigital Signal Processing Tutorial:Chapt 3 frequency analysis
Digital Signal Processing Tutorial:Chapt 3 frequency analysisChandrashekhar Padole
 
Lecture 12 (Image transformation)
Lecture 12 (Image transformation)Lecture 12 (Image transformation)
Lecture 12 (Image transformation)VARUN KUMAR
 
Chapter 4 Image Processing: Image Transformation
Chapter 4 Image Processing: Image TransformationChapter 4 Image Processing: Image Transformation
Chapter 4 Image Processing: Image TransformationVarun Ojha
 
Graph Convolutional Neural Networks
Graph Convolutional Neural Networks Graph Convolutional Neural Networks
Graph Convolutional Neural Networks 신동 강
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationVARUN KUMAR
 
D I G I T A L C O N T R O L S Y S T E M S J N T U M O D E L P A P E R{Www
D I G I T A L  C O N T R O L  S Y S T E M S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  C O N T R O L  S Y S T E M S  J N T U  M O D E L  P A P E R{Www
D I G I T A L C O N T R O L S Y S T E M S J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
DISTINGUISH BETWEEN WALSH TRANSFORM AND HAAR TRANSFORMDip transforms
DISTINGUISH BETWEEN WALSH TRANSFORM AND HAAR TRANSFORMDip transformsDISTINGUISH BETWEEN WALSH TRANSFORM AND HAAR TRANSFORMDip transforms
DISTINGUISH BETWEEN WALSH TRANSFORM AND HAAR TRANSFORMDip transformsNITHIN KALLE PALLY
 
Image formation
Image formationImage formation
Image formationpotaters
 
Tensor representations in signal processing and machine learning (tutorial ta...
Tensor representations in signal processing and machine learning (tutorial ta...Tensor representations in signal processing and machine learning (tutorial ta...
Tensor representations in signal processing and machine learning (tutorial ta...Tatsuya Yokota
 
Adaptive Median Filters
Adaptive Median FiltersAdaptive Median Filters
Adaptive Median FiltersAmnaakhaan
 
Branch and bounding : Data structures
Branch and bounding : Data structuresBranch and bounding : Data structures
Branch and bounding : Data structuresKàŕtheek Jåvvàjí
 
Image trnsformations
Image trnsformationsImage trnsformations
Image trnsformationsJohn Williams
 
A Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersA Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersIDES Editor
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Editor IJCATR
 
Introduction to Deep Neural Network
Introduction to Deep Neural NetworkIntroduction to Deep Neural Network
Introduction to Deep Neural NetworkLiwei Ren任力偉
 

La actualidad más candente (20)

ARCHITECTURAL CONDITIONING FOR DISENTANGLEMENT OF OBJECT IDENTITY AND POSTURE...
ARCHITECTURAL CONDITIONING FOR DISENTANGLEMENT OF OBJECT IDENTITY AND POSTURE...ARCHITECTURAL CONDITIONING FOR DISENTANGLEMENT OF OBJECT IDENTITY AND POSTURE...
ARCHITECTURAL CONDITIONING FOR DISENTANGLEMENT OF OBJECT IDENTITY AND POSTURE...
 
Brief intro : Invariance and Equivariance
Brief intro : Invariance and EquivarianceBrief intro : Invariance and Equivariance
Brief intro : Invariance and Equivariance
 
Convex optmization in communications
Convex optmization in communicationsConvex optmization in communications
Convex optmization in communications
 
Branch and bound
Branch and boundBranch and bound
Branch and bound
 
Digital Signal Processing Tutorial:Chapt 3 frequency analysis
Digital Signal Processing Tutorial:Chapt 3 frequency analysisDigital Signal Processing Tutorial:Chapt 3 frequency analysis
Digital Signal Processing Tutorial:Chapt 3 frequency analysis
 
Lecture 12 (Image transformation)
Lecture 12 (Image transformation)Lecture 12 (Image transformation)
Lecture 12 (Image transformation)
 
Chapter 4 Image Processing: Image Transformation
Chapter 4 Image Processing: Image TransformationChapter 4 Image Processing: Image Transformation
Chapter 4 Image Processing: Image Transformation
 
Graph Convolutional Neural Networks
Graph Convolutional Neural Networks Graph Convolutional Neural Networks
Graph Convolutional Neural Networks
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantization
 
D I G I T A L C O N T R O L S Y S T E M S J N T U M O D E L P A P E R{Www
D I G I T A L  C O N T R O L  S Y S T E M S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  C O N T R O L  S Y S T E M S  J N T U  M O D E L  P A P E R{Www
D I G I T A L C O N T R O L S Y S T E M S J N T U M O D E L P A P E R{Www
 
DISTINGUISH BETWEEN WALSH TRANSFORM AND HAAR TRANSFORMDip transforms
DISTINGUISH BETWEEN WALSH TRANSFORM AND HAAR TRANSFORMDip transformsDISTINGUISH BETWEEN WALSH TRANSFORM AND HAAR TRANSFORMDip transforms
DISTINGUISH BETWEEN WALSH TRANSFORM AND HAAR TRANSFORMDip transforms
 
Image formation
Image formationImage formation
Image formation
 
Tensor representations in signal processing and machine learning (tutorial ta...
Tensor representations in signal processing and machine learning (tutorial ta...Tensor representations in signal processing and machine learning (tutorial ta...
Tensor representations in signal processing and machine learning (tutorial ta...
 
Adaptive Median Filters
Adaptive Median FiltersAdaptive Median Filters
Adaptive Median Filters
 
Branch and bounding : Data structures
Branch and bounding : Data structuresBranch and bounding : Data structures
Branch and bounding : Data structures
 
Image trnsformations
Image trnsformationsImage trnsformations
Image trnsformations
 
A Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR FiltersA Novel Methodology for Designing Linear Phase IIR Filters
A Novel Methodology for Designing Linear Phase IIR Filters
 
Image transforms
Image transformsImage transforms
Image transforms
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
 
Introduction to Deep Neural Network
Introduction to Deep Neural NetworkIntroduction to Deep Neural Network
Introduction to Deep Neural Network
 

Destacado

Java chapter 6 - Arrays -syntax and use
Java chapter 6 - Arrays -syntax and useJava chapter 6 - Arrays -syntax and use
Java chapter 6 - Arrays -syntax and useMukesh Tekwani
 
Python - Regular Expressions
Python - Regular ExpressionsPython - Regular Expressions
Python - Regular ExpressionsMukesh Tekwani
 
Java chapter 3 - OOPs concepts
Java chapter 3 - OOPs conceptsJava chapter 3 - OOPs concepts
Java chapter 3 - OOPs conceptsMukesh Tekwani
 
Phases of the Compiler - Systems Programming
Phases of the Compiler - Systems ProgrammingPhases of the Compiler - Systems Programming
Phases of the Compiler - Systems ProgrammingMukesh Tekwani
 
Python reading and writing files
Python reading and writing filesPython reading and writing files
Python reading and writing filesMukesh Tekwani
 
Chap 3 data and signals
Chap 3 data and signalsChap 3 data and signals
Chap 3 data and signalsMukesh Tekwani
 
Data communications ch 1
Data communications   ch 1Data communications   ch 1
Data communications ch 1Mukesh Tekwani
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferWayne Jones Jnr
 
Introduction to systems programming
Introduction to systems programmingIntroduction to systems programming
Introduction to systems programmingMukesh Tekwani
 

Destacado (19)

Data Link Layer
Data Link Layer Data Link Layer
Data Link Layer
 
Java 1-contd
Java 1-contdJava 1-contd
Java 1-contd
 
Html graphics
Html graphicsHtml graphics
Html graphics
 
Java chapter 6 - Arrays -syntax and use
Java chapter 6 - Arrays -syntax and useJava chapter 6 - Arrays -syntax and use
Java chapter 6 - Arrays -syntax and use
 
Python - Regular Expressions
Python - Regular ExpressionsPython - Regular Expressions
Python - Regular Expressions
 
Java chapter 3 - OOPs concepts
Java chapter 3 - OOPs conceptsJava chapter 3 - OOPs concepts
Java chapter 3 - OOPs concepts
 
Html tables examples
Html tables   examplesHtml tables   examples
Html tables examples
 
Java swing 1
Java swing 1Java swing 1
Java swing 1
 
Java chapter 1
Java   chapter 1Java   chapter 1
Java chapter 1
 
Phases of the Compiler - Systems Programming
Phases of the Compiler - Systems ProgrammingPhases of the Compiler - Systems Programming
Phases of the Compiler - Systems Programming
 
Jdbc 1
Jdbc 1Jdbc 1
Jdbc 1
 
Java chapter 5
Java chapter 5Java chapter 5
Java chapter 5
 
Java misc1
Java misc1Java misc1
Java misc1
 
Java chapter 3
Java   chapter 3Java   chapter 3
Java chapter 3
 
Python reading and writing files
Python reading and writing filesPython reading and writing files
Python reading and writing files
 
Chap 3 data and signals
Chap 3 data and signalsChap 3 data and signals
Chap 3 data and signals
 
Data communications ch 1
Data communications   ch 1Data communications   ch 1
Data communications ch 1
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
 
Introduction to systems programming
Introduction to systems programmingIntroduction to systems programming
Introduction to systems programming
 

Similar a Digital signal and image processing FAQ

3 intensity transformations and spatial filtering slides
3 intensity transformations and spatial filtering slides3 intensity transformations and spatial filtering slides
3 intensity transformations and spatial filtering slidesBHAGYAPRASADBUGGE
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...ijistjournal
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...ijistjournal
 
Lec_2_Digital Image Fundamentals.pdf
Lec_2_Digital Image Fundamentals.pdfLec_2_Digital Image Fundamentals.pdf
Lec_2_Digital Image Fundamentals.pdfnagwaAboElenein
 
PPT Image Analysis(IRDE, DRDO)
PPT Image Analysis(IRDE, DRDO)PPT Image Analysis(IRDE, DRDO)
PPT Image Analysis(IRDE, DRDO)Nidhi Gopal
 
AU QP Answer key NOv/Dec 2015 Computer Graphics 5 sem CSE
AU QP Answer key NOv/Dec 2015 Computer Graphics 5 sem CSEAU QP Answer key NOv/Dec 2015 Computer Graphics 5 sem CSE
AU QP Answer key NOv/Dec 2015 Computer Graphics 5 sem CSEThiyagarajan G
 
Mining of time series data base using fuzzy neural information systems
Mining of time series data base using fuzzy neural information systemsMining of time series data base using fuzzy neural information systems
Mining of time series data base using fuzzy neural information systemsDr.MAYA NAYAK
 
Chapter 1 introduction (Image Processing)
Chapter 1 introduction (Image Processing)Chapter 1 introduction (Image Processing)
Chapter 1 introduction (Image Processing)Varun Ojha
 
WAVELET BASED AUTHENTICATION/SECRET TRANSMISSION THROUGH IMAGE RESIZING (WA...
WAVELET BASED AUTHENTICATION/SECRET  TRANSMISSION THROUGH IMAGE RESIZING  (WA...WAVELET BASED AUTHENTICATION/SECRET  TRANSMISSION THROUGH IMAGE RESIZING  (WA...
WAVELET BASED AUTHENTICATION/SECRET TRANSMISSION THROUGH IMAGE RESIZING (WA...sipij
 
LAPLACE TRANSFORM SUITABILITY FOR IMAGE PROCESSING
LAPLACE TRANSFORM SUITABILITY FOR IMAGE PROCESSINGLAPLACE TRANSFORM SUITABILITY FOR IMAGE PROCESSING
LAPLACE TRANSFORM SUITABILITY FOR IMAGE PROCESSINGPriyanka Rathore
 
Lec_3_Image Enhancement_spatial Domain.pdf
Lec_3_Image Enhancement_spatial Domain.pdfLec_3_Image Enhancement_spatial Domain.pdf
Lec_3_Image Enhancement_spatial Domain.pdfnagwaAboElenein
 
13 fourierfiltrationen
13 fourierfiltrationen13 fourierfiltrationen
13 fourierfiltrationenhoailinhtinh
 
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IJNSA Journal
 
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IJNSA Journal
 

Similar a Digital signal and image processing FAQ (20)

Lect5 v2
Lect5 v2Lect5 v2
Lect5 v2
 
3 intensity transformations and spatial filtering slides
3 intensity transformations and spatial filtering slides3 intensity transformations and spatial filtering slides
3 intensity transformations and spatial filtering slides
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
 
Lec_2_Digital Image Fundamentals.pdf
Lec_2_Digital Image Fundamentals.pdfLec_2_Digital Image Fundamentals.pdf
Lec_2_Digital Image Fundamentals.pdf
 
PPT Image Analysis(IRDE, DRDO)
PPT Image Analysis(IRDE, DRDO)PPT Image Analysis(IRDE, DRDO)
PPT Image Analysis(IRDE, DRDO)
 
AU QP Answer key NOv/Dec 2015 Computer Graphics 5 sem CSE
AU QP Answer key NOv/Dec 2015 Computer Graphics 5 sem CSEAU QP Answer key NOv/Dec 2015 Computer Graphics 5 sem CSE
AU QP Answer key NOv/Dec 2015 Computer Graphics 5 sem CSE
 
Mining of time series data base using fuzzy neural information systems
Mining of time series data base using fuzzy neural information systemsMining of time series data base using fuzzy neural information systems
Mining of time series data base using fuzzy neural information systems
 
Image denoising using curvelet transform
Image denoising using curvelet transformImage denoising using curvelet transform
Image denoising using curvelet transform
 
I3602061067
I3602061067I3602061067
I3602061067
 
Chapter 1 introduction (Image Processing)
Chapter 1 introduction (Image Processing)Chapter 1 introduction (Image Processing)
Chapter 1 introduction (Image Processing)
 
WAVELET BASED AUTHENTICATION/SECRET TRANSMISSION THROUGH IMAGE RESIZING (WA...
WAVELET BASED AUTHENTICATION/SECRET  TRANSMISSION THROUGH IMAGE RESIZING  (WA...WAVELET BASED AUTHENTICATION/SECRET  TRANSMISSION THROUGH IMAGE RESIZING  (WA...
WAVELET BASED AUTHENTICATION/SECRET TRANSMISSION THROUGH IMAGE RESIZING (WA...
 
2013-June: 5th Semester E & C Question Papers
2013-June: 5th Semester E & C Question Papers2013-June: 5th Semester E & C Question Papers
2013-June: 5th Semester E & C Question Papers
 
5th Semester Electronic and Communication Engineering (2013-June) Question Pa...
5th Semester Electronic and Communication Engineering (2013-June) Question Pa...5th Semester Electronic and Communication Engineering (2013-June) Question Pa...
5th Semester Electronic and Communication Engineering (2013-June) Question Pa...
 
LAPLACE TRANSFORM SUITABILITY FOR IMAGE PROCESSING
LAPLACE TRANSFORM SUITABILITY FOR IMAGE PROCESSINGLAPLACE TRANSFORM SUITABILITY FOR IMAGE PROCESSING
LAPLACE TRANSFORM SUITABILITY FOR IMAGE PROCESSING
 
Lec_3_Image Enhancement_spatial Domain.pdf
Lec_3_Image Enhancement_spatial Domain.pdfLec_3_Image Enhancement_spatial Domain.pdf
Lec_3_Image Enhancement_spatial Domain.pdf
 
13 fourierfiltrationen
13 fourierfiltrationen13 fourierfiltrationen
13 fourierfiltrationen
 
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
 
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
 
It 603
It 603It 603
It 603
 

Más de Mukesh Tekwani

ISCE-Class 12-Question Bank - Electrostatics - Physics
ISCE-Class 12-Question Bank - Electrostatics  -  PhysicsISCE-Class 12-Question Bank - Electrostatics  -  Physics
ISCE-Class 12-Question Bank - Electrostatics - PhysicsMukesh Tekwani
 
Hexadecimal to binary conversion
Hexadecimal to binary conversion Hexadecimal to binary conversion
Hexadecimal to binary conversion Mukesh Tekwani
 
Hexadecimal to decimal conversion
Hexadecimal to decimal conversion Hexadecimal to decimal conversion
Hexadecimal to decimal conversion Mukesh Tekwani
 
Hexadecimal to octal conversion
Hexadecimal to octal conversionHexadecimal to octal conversion
Hexadecimal to octal conversionMukesh Tekwani
 
Gray code to binary conversion
Gray code to binary conversion Gray code to binary conversion
Gray code to binary conversion Mukesh Tekwani
 
Decimal to Binary conversion
Decimal to Binary conversionDecimal to Binary conversion
Decimal to Binary conversionMukesh Tekwani
 
Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21Mukesh Tekwani
 
Refraction and dispersion of light through a prism
Refraction and dispersion of light through a prismRefraction and dispersion of light through a prism
Refraction and dispersion of light through a prismMukesh Tekwani
 
Refraction of light at a plane surface
Refraction of light at a plane surfaceRefraction of light at a plane surface
Refraction of light at a plane surfaceMukesh Tekwani
 
Atom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atomAtom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atomMukesh Tekwani
 
Refraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lensesRefraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lensesMukesh Tekwani
 
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGEISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGEMukesh Tekwani
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 

Más de Mukesh Tekwani (20)

Circular motion
Circular motionCircular motion
Circular motion
 
Gravitation
GravitationGravitation
Gravitation
 
ISCE-Class 12-Question Bank - Electrostatics - Physics
ISCE-Class 12-Question Bank - Electrostatics  -  PhysicsISCE-Class 12-Question Bank - Electrostatics  -  Physics
ISCE-Class 12-Question Bank - Electrostatics - Physics
 
Hexadecimal to binary conversion
Hexadecimal to binary conversion Hexadecimal to binary conversion
Hexadecimal to binary conversion
 
Hexadecimal to decimal conversion
Hexadecimal to decimal conversion Hexadecimal to decimal conversion
Hexadecimal to decimal conversion
 
Hexadecimal to octal conversion
Hexadecimal to octal conversionHexadecimal to octal conversion
Hexadecimal to octal conversion
 
Gray code to binary conversion
Gray code to binary conversion Gray code to binary conversion
Gray code to binary conversion
 
What is Gray Code?
What is Gray Code? What is Gray Code?
What is Gray Code?
 
Decimal to Binary conversion
Decimal to Binary conversionDecimal to Binary conversion
Decimal to Binary conversion
 
Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21Video Lectures for IGCSE Physics 2020-21
Video Lectures for IGCSE Physics 2020-21
 
Refraction and dispersion of light through a prism
Refraction and dispersion of light through a prismRefraction and dispersion of light through a prism
Refraction and dispersion of light through a prism
 
Refraction of light at a plane surface
Refraction of light at a plane surfaceRefraction of light at a plane surface
Refraction of light at a plane surface
 
Spherical mirrors
Spherical mirrorsSpherical mirrors
Spherical mirrors
 
Atom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atomAtom, origin of spectra Bohr's theory of hydrogen atom
Atom, origin of spectra Bohr's theory of hydrogen atom
 
Refraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lensesRefraction of light at spherical surfaces of lenses
Refraction of light at spherical surfaces of lenses
 
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGEISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
ISCE (XII) - PHYSICS BOARD EXAM FEB 2020 - WEIGHTAGE
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
XML
XMLXML
XML
 
Social media
Social mediaSocial media
Social media
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 

Último

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 

Último (20)

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 

Digital signal and image processing FAQ

  • 1. mukeshtekwani@outlook.com Digital Signal and Image Processing Frequently Asked Questions In BE (Sem VII) – University of Mumbai No Question JUSTIFY: 1. If the kernel of the image transform is separable and symmetric the transform can be explained in matrix form. Justify. 2. Laplacian is not a good edge detector – Justify 3. Lossy compression is not suitable for compressing executable files – Justify 4. 5. 6. 7. Low pass filter is a smoothing filter – Justify Unit step sequence is a power signal – Justify If the energy of a signal is finite, its power is zer. Justify Laplacian is better than gradient for detection of edges – Justify 8. Walsh transform is nothing but sequently ordered Hadamard transform matrix. Justify 9. All image compression techniques are invertible. Justify 10. For digital image having salt and pepper noise, median filter is best filter. 11. Unit ramp signal is neither energy nor power signal. 12. List and prove any four properties of DFT. 13. Find the circular convolution on the given two sequences x1(n) = {1, -1, 2, -4} and x2(n) = {1, 2} 14. Compute the Hadamard of the image shown: 2 1 2 1 1 2 3 2 2 3 4 3 1 2 3 2 15. Give the classification of noise in images. Compare restoration and enhancement. What are the differences between the two? What do they have in common? 16. Three column vectors are given. Show that they are orthogonal. Also generate all possible patterns. X1 = [1 1 1], x2 = [-2 1 1], x3 = [0 -1 1] 17. Explain image segmentation using thresholding. How to apply thresholding to unevenly illuminated images? 18. What is image segmentation? Explain the following methods of image segmentation. (i) Region growing , (ii) region splitting , (iii) thresholding 19. Determine the Z-transform of the following discrete time signals and also specify the region of convergence (ROC) (i) X(n) = {1*, 2, 3, 4}, (ii) X(n) = {1, 3, 5, 7*}, (iii) X(n) = {1, 2, 3, 4*, 5, 6, 7} 20. Explain log transformation. How is gamma correction done? 21. Find the Huffman code for the following stream of data (28 points) {1,1,1,1,1,1,1, 2,2,2,2,2,2,2, 3,3,3,3,3, 4,4,4,4, 5,5,5, 6,6,7 } 1|Page Marks M/YY 5 D10 5 5 5 D10 D10 J12 D10 D10 D11 D11, J12 D11 5 5 5 10 5 D11 J12 J12 D10 D10 5 D10 10 D10 J12 10 D10 10 D11 10 10 D10 J13 D10 10 10 D10 D10 5 5 5 5
  • 2. mukeshtekwani@outlook.com 22. What do you mean by Gaussian noise and why is averaging filter used to eliminate it? 23. List down the advantages and disadvantages of Wiener filter. 24. Write short notes on (i) KL transform (J13) (ii) JPEG compression (iii) Hough Transform (iv) Classification of signals (v) Discrete Cosine Transform (5) (D10) (J12) (J13) (vi) Wiener filter (5) (2010) (vii) Difference between low pass filter and median filter (viii) Hough transform (5) (D10) (J12) (ix) Homomorphic filter (5) (D10) (x) 4,8,m connectivity of image pixels. (5) (D10) (xi) Sampling and Quantization (5) (J12) (xii) Wavelet transform (5) (J12)(J13) (xiii) Properties of Fourier Transform (J13) 5 D10 5 10 each D10 25. 10 D 2010 26. Obtain linear convolution of two discrete time signals as below: 10 D 2010 27. Find cross-correlation betweeen given signals X(n) = {1, 2, 0*, 1} and y(n) = {4, 3, 2*, 1} 5 D 2010 28. Find Z transform of x(n) and draw its ROC 10 D 2010 29. Determine the auto corrrelation of the following signal x(n) = {1*, 3, 1, 1} 5 30. Using 4 point FFT algorithm, calculate the 2-D DFT of 10 D 2010 D10 31. Write 8 x 8 Hadamard transform matrix and its signal flow graph. Using the butetrfly diagram, compute Hadamard transform for x(n) = {1, 2, 3, 4, 1, 2, 1, 2} 32. Perform histogram equalization and draw new equalized histogram of the following image data Gray 0 1 2 3 4 5 6 7 Level 10 D10 10 D11 2|Page
  • 3. mukeshtekwani@outlook.com No of 790 1023 850 656 329 245 122 81 pixels 33. Equalize the given histogram. What happens when we equalize it twice? Justify. Grey Level 0 1 2 3 No. of pixels 70 20 7 3 34. Perform histogram equalization for following. Obtain a plot of original as well as equalized histogram. Intensity 0 1 2 3 4 5 6 7 No of 70 100 40 60 0 80 10 40 pixels 35. Whatare the different types of redundancies in digital image? Explain in detail. 36. For the 3-bit 4x4 size image perform following operations. (i) Thresholding T = 4 (ii) Intensity level slicing with background r1 = 2 and r2 = 5 (iii) bit plane slicing for MSB and LSB planes (iv) Negation 37. 38. 39. 40. 41. 42. 43. 4 2 3 0 1 3 5 7 5 3 2 1 2 4 6 7 A causal FIR system has three cascaded block, first two of them have individual impulse responses h1(n) = {1,2,2} h2(n) = u(n) – u(n-2). Find impulse response of third block h3(n) if an overall impulse response is h(n) = {2, 5, 6, 3, 2, 2} Explain in detail enhancement techniques used in Spatial domain used for images. Explain homomorphic filtering in detail. Find the DFT of the given image: 0 1 2 1 1 2 3 2 2 3 4 3 1 3 2 3 Define (i) Eucledean distance (ii) City block distance (iii) Chess board distance (iv) m connectivity Find the DFT of the given sequence (Use DITFFT algo) : x(n) = {1,2,3,4,4,3,2,1} Given below is the table of 8 symbols and their frequency of coccurence. Give the Huffman code for each symbol. Symbol S1 S2 S3 S4 S5 S6 S7 S8 Frequency 0.25 0.15 0.06 0.08 0.21 0.14 0.07 0.04 44. Perform the convolution of the following two sequences using Z transforms: 3|Page 10 D10 10 J12 10 D 2010 D 2010 10 10 J12 8 J12 6 6 J12 J12 10 J12 10 10 J12 J12 8 J12
  • 4. mukeshtekwani@outlook.com 45. 46. 47. 48. X(n ) = (0.2) n and h(n) = (0.3) n u(n) Find the inverse Z transform H(z) = 1/ [1 – 3z-1 + 0.5 z-2 ] , |z| > 1 Prove that two dimensional fourier transform matrix is an ordinary matrix. Derive 8 directional Laplacian filter mask Derive matrix representation of one dimensional Walsh tranbsform for N = 4 from forward Walsh transformation function. State fidelity objective and and subjective criteria of image evaluation. Derive the equation of contrast stretching transformation function on the input image F and obtain the output image R. 6 5 5 5 J12 D12 D12 D12 5 6 D12 D12 8 D12 6 D12 6 D12 54. Segment the following image such that the difference between the maximum intensity value and minimum intensity value in the segmente region is less than 18 using split and merge technique. 8 J12 55. Let x(n) be four point sequence with x(k) = {1, 2, 3, 4}. Find the DFT of the following sequence using X(k). (i) P(n) = x(n) cos (nπ/2) (ii) q(n) = 2∆(n) + 3 {Four point u(n) } + 4 x(n) 6 J12 49. 50. 51. Given , (i) Find 3 bit IGS coded image and calculate compression factor and bits per pixel (BPP). (ii) Find decoded image and calculate MSK and PSNR. 52. Given h(n) = {1*, 2} find the response of the system to the input x(n) = {1, 2, 3} using FFT and IFFT. 53. 4|Page
  • 5. mukeshtekwani@outlook.com 56. 8 D12 6 D12 6 D12 6 D12 8 D12 If the gray level intensity changes are to be made as shown in fig below, derive the necessary expression for obtaining the new pixel value using slope. (ii) Obtain the new image by applying the above mentioned transformation function. (iii) Plot the histogram of input and output image. (iv) Compare the histogram of input and output image. 57. Apply the folllowing filter mask W1, W2 and W3 on the input image F and obtain the output image. 58. Given h(n) = (1/2)n u(n), find the response of the system to the input x(n) = (1/4)n u(n) using Z transform method. 59. Explain trimmed average filter. Find trimmed average value of the input image F at the center position for R = 2 and S = 1 wher R is the number of consecutive pixels to be trimmed from the minimum extreme and S is the number of consecutive pixels to be trimmed from maximum extreme. 60. 5|Page
  • 6. mukeshtekwani@outlook.com (ii) Calculate bits per pixel (BPP) and percentage of compression of compressed image. Donot consider the payload of Huffman table. 61. X(t) = sin(480πt) + 3 sin(720 πt) is sampled with Fs = 600 Hz. (i) What are the frequencies in radians in the resulting DT signal x(n)? (ii) If x(n) is passed through an ideal interpolator, what sithe reconstructed signal? 62. Apply horizontal and vertical line detection mask on the following image F. Use appropriate threshold value. Assume virtual rows and columns by repeating border pixel values. 6 D12 6 D12 63. Assume that the edge in the gray level image starts in the first row and ends in the last row. Find the cost of all possible edges using the following cost function. Cost (p, q) = Imax | f(p) – f(q)| Where Imax is the max intensity value in the image and f(p) and f(q) are pixel values at points p and q resp. Find the edge with the minimum value of cost. Plot the graph. 8 D12 64. 65. 66. 67. 68. 5 5 5 5 5 D12 D12 D12 D12 J13 5 J13 5 5 10 J13 J13 J13 10 J13 69. 70. 71. 72. 73. How to find inverse one dimensional DFT using forward DITFFT flowgraph. Derive High Boost Filter mask (3 x3) Bitreversal technique in FFT Image enhancement using LOG transformation and power law trasformation. Explain signals and systems with the help of suitable examples. Give applications of signals and systems. Find Z transform of the following finite duration signal and state its ROC: X(n) = {1,2,5,7,0,1} Given X(n) = {0, 1, 2, 3} find X(k) using DIT-FFT algorithm. Find convolution of following signals: x(n) = {2, 1, 3, 5} and h(n) = {0, 1, 2, 4} Determine the sytem function and unit sample response of the system given by the diffference equation Y(n) = (1/2) Y(n-1) + 2 X(n) Perform Histogram equalization for the following. Obtain a plot of original as well as equalized histogram. Grey 0 levels No of 100 pixels 6|Page 1 2 3 4 5 6 7 90 50 20 0 0 0 0
  • 7. mukeshtekwani@outlook.com 74. Given x(n) = {0,1,2,3,4,5,6,7}, find x(k) using DIT-FFT algo. 75. Compute 2D DFT of given image using DIT-FFT algorithm. 10 10 J13 J13 76. Explain in detail enhancement techniques in spatial domain used for images. 77. What is HADAMARD transform? Write a 4x4 Hadamard matrix and its applications. 78. Explain image restoration and its applications. 79. What do you understand by sampling and quantization with respect to digital image pocessing? How will you convert an analog image into a digital image? 80. Name and explain different types of redundancies associated with digital image. 10 10 J13 J13 10 10 J13 J13 10 J13 7|Page