Fig 3 - uploaded by Ronen Basri
Content may be subject to copyright.
Left: the level sets of the solution to the Poisson equation for the silhouette of an elephant, right: the level sets of the distance transform for the same silhouette.
Source publication
We present a novel approach that allows us to reliably compute many useful properties of a silhouette. Our approach assigns, for every internal point of the silhouette, a value reflecting the mean time required for a random walk beginning at the point to hit the boundaries. This function can be computed by solving Poisson's equation, with the silho...
Context in source publication
Context 1
... ( x, y ) S , subject to Dirichlet boundary conditions U ( x, y ) = 0 at the bounding contour ∂S . Fig. 2 shows the solution to the Poisson equation obtained for the silhouettes in Fig. 1. High values of U are attained in the central part of the shape, whereas the external protrusions (the limbs, head, and tail) disappear at relatively low values of U . The level sets of U represent smoother versions of the bounding contour. This is different from the distance transform, which smoothes the shape near concavities while introducing discontinuities near convex sections of the contour (see Fig. 3). Also unlike the distance transform in which every value is determined by a single contour point (the nearest), the values assigned by the Poisson equation take into account many points on the boundaries and so they reflect more global properties of the silhouette. Below we exploit these properties of the Poisson solution to characterize a silhouette using measures constructed with derivatives of the solution. In addition we will explain (in Section V) that the solution to the Poisson equation can be calculated much faster than the distance transform. Poisson’s equation arises in gravitation and electrostatics. Here we only mention a few of its relevant properties. The solution to the Poisson equation exists and is unique for any closed region with boundary conditions given by any integrable function. Uniqueness is shown by noticing that the solution to the related homogeneous equation ∆ U = 0 (called the Laplace equation ) with zero boundary conditions is identically zero. More generally, the values of U along any closed curve within S determine the values of U inside the region bounded by this curve, but they are insufficient to uniquely determine the values of U outside the curve. For silhouettes described by conics the Poisson equation takes a particularly simple form. Consider a silhouette composed of the points ( x, y ) ...
Similar publications
The image foresting transform (IFT) is a graph-based approach to the design of image processing operators based on connectivity. It naturally leads to correct and efficient implementations and to a better understanding of how different operators relate to each other. We give here a precise definition of the IFT, and a procedure to compute it-a gene...
This paper presents the V2R algorithm, a novel method for multiple light source detection using a Lambertian sphere as a calibration object. The algorithm segments the image of the sphere into regions that are each illuminated by a single virtual light and subtracts the virtual lights of adjacent regions to estimate the light source vectors. The al...
Arguably the most important decision to be made when developing an object recognition algorithm is selecting the scene measurements or features on which to base the algorithm. In appearance-based object recognition, the features are chosen to be the pixel intensity values in an image of the object. These pixel intensities correspond directly to the...
This paper extends Lounsbery's multiresolution analysis wavelet-based theory for triangular 3D meshes, which can only be applied to regularly subdivided meshes and thus involves a remeshing of the existing 3D data. Based on a new irregular subdivision scheme, the proposed algorithm can be applied directly to irregular meshes, which can be very inte...
This paper explores a statistical basis for a process often described in computer vision: image segmentation by region merging following a particular order in the choice of regions. We exhibit a particular blend of algorithmics and statistics whose segmentation error is, as we show, limited from both the qualitative and quantitative standpoints. Th...
Citations
... Background. Many prior works have observed the central relationship between silhouettes and 3D shape [Ikeuchi and Horn 1981;Cipolla et al. 1998;DeCarlo et al. 2003], which allows geometric quantities, like depth, to be modeled in image space as the solution to a Poisson equation, with boundary conditions imposed along silhouettes [Ikeuchi and Horn 1981;Gorelick et al. 2006]. Inspired by this relationship, Baran and Lehtinen [2009] propose an artistic curve inflation model where height is modeled as a solution to the BVP Equation (3) with = 0, f = 4, and g = 0. ...
We introduce a Monte Carlo method for evaluating derivatives of the solution to a partial differential equation (PDE) with respect to problem parameters (such as domain geometry or boundary conditions). Derivatives can be evaluated at arbitrary points without performing a global solve, or constructing a volumetric grid or mesh. The method is hence well-suited to inverse problems with complex geometry, such as PDE-constrained shape optimization. Like other walk on spheres (WoS) algorithms, our method is trivial to parallelize, and is agnostic to boundary representation (meshes, splines, implicit surfaces etc.), supporting large topological changes. We focus in particular on screened Poisson equations, which model diverse problems from scientific and geometric computing. As in differentiable rendering, we jointly estimate derivatives with respect to all parameters -- hence, cost does not grow significantly with parameter count. In practice, even noisy derivative estimates exhibit fast, stable convergence for stochastic gradient-based optimization -- as we show via examples from thermal design, shape from diffusion, and computer graphics.
... The proposed distances include the Hausdorff and Frechet distances [7]. Other techniques are based on the Poisson equation [8], integral invariants [9], and an elastic shape distance on the energy required to elastically deform one boundary contour to the other [10,11]. ...
Cell biologists study in parallel the morphology of cells with the regulation mechanisms that modify this morphology. Such studies are complicated by the inherent heterogeneity present in the cell population. It remains difficult to define the morphology of a cell with parameters that can quantify this heterogeneity, leaving the cell biologist to rely on manual inspection of cell images. We propose an alternative to this manual inspection that is based on topological data analysis. We characterise the shape of a cell by its contour and nucleus. We build a filtering of the edges defining the contour using a radial distance function initiated from the nucleus. This filtering is then used to construct a persistence diagram that serves as a signature of the cell shape. Two cells can then be compared by computing the Wasserstein distance between their persistence diagrams. Given a cell population, we then compute a distance matrix that includes all pairwise distances between its members. We analyse this distance matrix using hierarchical clustering with different linkage schemes and define a purity score that quantifies consistency between those different schemes, which can then be used to assess homogeneity within the cell population. We illustrate and validate our approach to identify sub-populations in human mesenchymal stem cell populations. Author summary Cells are the basic unit of life. Understanding how they grow, divide, die, and change shape is of central importance in many other areas of the life sciences. In this paper, we focus on the concept of shape and, more specifically, on how to compare the shapes of two cells. We characterise this shape with the cell contour supplemented by the position of its nuclei. We use topological data analysis to define a signature of that shape, generated from its persistence diagram, a structure that reflects the relative position of the nucleus with respect to segments of the contours. We compute the distance between two cells as the Wasserstein distance between their shape signature. Using this distance, we analyse populations of cells to help identify members with unusual shapes (usually referred to as outliers) as well as sub-populations. We validate November 1, 2023 1/21 our approach to identify sub-populations within human mesenchymal stem cell populations that are known to be heterogeneous.
... Although stochastic fluctuation is a classical topic, it is still one of the popular subjects to be applied into various areas even in the present years [11,12]. Random walks are also applied into various areas, including decision support systems [10,[13][14][15][16], computer visions [17][18][19][20][21], social network analysis [22] and knowledge discovery [23]. The Brownian motion process is a Wiener stochastic process which is the random motion of a particle suspended in a medium [24][25][26]. ...
This article analyzes the behavior of a Brownian fluctuation process under a mixed strategic game setup. A variant of a compound Brownian motion has been newly proposed, which is called the Shifted Brownian Fluctuation Process to predict the turning points of a stochastic process. This compound process evolves until it reaches one step prior to the turning point. The Shifted Brownian Fluctuation Game has been constructed based on this new process to find the optimal moment of actions. Analytically tractable results are obtained by using the fluctuation theory and the mixed strategy game theory. The joint functional of the Shifted Brownian Fluctuation Process is targeted for transformation of the first passage time and its index. These results enable us to predict the moment of a turning point and the moment of actions to obtain the optimal payoffs of a game. This research adapts the theoretical framework to implement an autonomous trader for value assets including stocks and cybercurrencies.
... To generate spatial mapping of the lung masks, we first use the concept of Poisson distance map (PDM), introduced in [23], to encode the shape of individual lung masks V . PDM is commonly used for characterizing the silhouette of an object via continuous labeling of voxel positions with scalar field values U 3d in the range of [0, 1]. ...
... The solution for U proposed in [23] is guaranteed to be smooth according to [24]. It has the advantage of generating distance values that are sensitive to global shape characteristics, unlike other distance metrics (e.g. ...
Pulmonary emphysema overlaps considerably with chronic obstructive pulmonary disease (COPD), and is traditionally subcategorized into three subtypes previously identified on autopsy. Unsupervised learning of emphysema subtypes on computed tomography (CT) opens the way to new definitions of emphysema subtypes and eliminates the need of thorough manual labeling. However, CT-based emphysema subtypes have been limited to texture-based patterns without considering spatial location. In this work, we introduce a standardized spatial mapping of the lung for quantitative study of lung texture location and propose a novel framework for combining spatial and texture information to discover spatially-informed lung texture patterns (sLTPs) that represent novel emphysema subtype candidates. Exploiting two cohorts of full-lung CT scans from the MESA COPD (n=317) and EMCAP (n=22) studies, we first show that our spatial mapping enables population-wide study of emphysema spatial location. We then evaluate the characteristics of the sLTPs discovered on MESA COPD, and show that they are reproducible, able to encode standard emphysema subtypes, and associated with physiological symptoms.
... Some other characteristics of the PGVF merit further study. For example, in [13] the solution of the Poisson PDE u = −1 with Dirichlet initial condition was used for object decomposition to parts. In this paper, special functions were designed to generate GVFs whose SPs are located at different body parts. ...
... These are then used for automatic object description and partitioning. Therefore an advantage of the PGVF compared to the VFs generated in [13,38] is that it is capable of multiple object extraction and partitioning, while the VFs in [13,38] partition only a single object, assuming its boundary is extracted in advance. ...
... These are then used for automatic object description and partitioning. Therefore an advantage of the PGVF compared to the VFs generated in [13,38] is that it is capable of multiple object extraction and partitioning, while the VFs in [13,38] partition only a single object, assuming its boundary is extracted in advance. ...
This paper develops a new active contour (AC) model capable of multiple complex objects segmentation in the presence of heavy noise. The model segments images in the framework of two types of partial differential equations (PDEs): the Euler–Lagrange and Poisson PDEs. The former is used to build an evolution algorithm, while the Poisson solution gradient vector field (PGVF) directs the evolution toward the boundaries of all image objects. The AC halts on boundaries and PGVF separatrices, splits on the latter, and leaves at least one segment (called label) on every boundary. Each label tracks its boundary until the corresponding object is enveloped. The advantages of the new method are validated on a number of skin lesions, road, and aircraft images of varying sizes and in the presence of Gaussian noise. The obtained results are compared against results by contemporary and established active contours and neural networks.
... There have been quite a few extensions to overcome shortcomings of graph cuts like, multi-level banded graph cuts [19], lazy snapping [20], GMMRF [21] and GrabCut [22] however the later needs more computational power and the box interface is not always feasible. Random walks has earlier been proposed by [23] for texture discrimination and different aspects of random walk have been explored in [24,25]. Automatic clustering using Random Walks has also been proposed in [26,27]. ...
... For these methods, D Ω (x) acts as a generator function for the medial axis, such that points x ∈ MA if and only if they satisfy some constraint involving their distance to the boundary. However, other authors have proposed alternative generator functions in their pruning strategies [52], [53]. VOLUME 4, 2016 In [52] and [53], the authors introduce what they call Poisson skeletons by approximating D Ω (x) as the solution of the Poisson equation with constant source function. ...
... However, other authors have proposed alternative generator functions in their pruning strategies [52], [53]. VOLUME 4, 2016 In [52] and [53], the authors introduce what they call Poisson skeletons by approximating D Ω (x) as the solution of the Poisson equation with constant source function. Poisson skeletons rely on a solid mathematical formulation. ...
We present the CPMA, a new method for medial axis pruning with noise robustness and equivariance to isometric transformations. The CPMA leverages the discrete cosine transform to create smooth versions of a shape Ω. We use the smooth shapes to compute a score function FΩ that filters out spurious branches from the medial axis of the original shape Ω. Our method generalizes to n-dimensional shapes given the properties of the Discrete Cosine Transform. We extensively compare with state-of-the-art pruning methods to highlight the CPMA’s noise robustness and isometric equivariance. We conducted experiments using two 2D datasets — Kimia216 and Animal2000 — and one 3D dataset — the Groningen benchmark. We found that our pruning approach achieves competitive results and yields stable medial axes even in scenarios with significant contour perturbations.
... We use this final distribution as an energy function, whose horizontal and vertical gradients represent the two vector fields of our auxiliary vector flow representation. We obtained similar, but very slightly worse, performance by using other definitions of 'center' such as the 2D medoid, and other ways to generate an energy function such as the solution of the Poisson equation 57 . ...
Many biological applications require the segmentation of cell bodies, membranes and nuclei from microscopy images. Deep learning has enabled great progress on this problem, but current methods are specialized for images that have large training datasets. Here we introduce a generalist, deep learning-based segmentation method called Cellpose, which can precisely segment cells from a wide range of image types and does not require model retraining or parameter adjustments. Cellpose was trained on a new dataset of highly varied images of cells, containing over 70,000 segmented objects. We also demonstrate a three-dimensional (3D) extension of Cellpose that reuses the two-dimensional (2D) model and does not require 3D-labeled data. To support community contributions to the training data, we developed software for manual labeling and for curation of the automated results. Periodically retraining the model on the community-contributed data will ensure that Cellpose improves constantly.
... The distance transform acts as a generator function for the medial axis, such that points x ∈ MA if and only if they satisfy some constraint involving their distance to the boundary. However, other authors have proposed alternative generator functions in their pruning strategies [21,4]. ...
... For example, [21] and [4] introduce what they call Poisson skeletons by approximating D Ω (x) as the solution of the Poisson equation with constant source function. ...
We present the CPMA, a new method for medial axis pruning with noise robustness and equivariance to isometric transformations. Our method leverages the discrete cosine transform to create smooth versions of a shape $\Omega$. We use the smooth shapes to compute a score function $\scorefunction$ that filters out spurious branches from the medial axis. We extensively compare the CPMA with state-of-the-art pruning methods and highlight our method's noise robustness and isometric equivariance. We found that our pruning approach achieves competitive results and yields stable medial axes even in scenarios with significant contour perturbations.
... Hence, random walks are also effective in link prediction and recommendation system [20], [21], [22], [23], [24], [25], [26], [27]. Random walks can also be applied in computer vision [7], [28], [29], [30], [31], [32], [33], [34], [35], [36], semi-supervised learning [37], [38], [39], [40], [41], network embedding [42], [43], and complex social network analysis [44]. There are also some literature illustrating the applications of random walks on graphs [45], [46], text analysis [47], science of science [48], and knowledge discovery [49]. ...
... Gorelick et al. [29] characterize the shape of a picture using random walks. For each internal pixel, they calculate the value reflecting the mean time required for a random walker beginning at the pixel to reach the boundary. ...
A random walk is known as a random process which describes a path including a succession of random steps in the mathematical space. It has increasingly been popular in various disciplines such as mathematics and computer science. Furthermore, in quantum mechanics, quantum walks can be regarded as quantum analogues of classical random walks. Classical random walks and quantum walks can be used to calculate the proximity between nodes and extract the topology in the network. Various random walk related models can be applied in different fields, which is of great significance to downstream tasks such as link prediction, recommendation, computer vision, semi-supervised learning, and network embedding. In this paper, we aim to provide a comprehensive review of classical random walks and quantum walks. We first review the knowledge of classical random walks and quantum walks, including basic concepts and some typical algorithms. We also compare the algorithms based on quantum walks and classical random walks from the perspective of time complexity. Then we introduce their applications in the field of computer science. Finally we discuss the open issues from the perspectives of efficiency, main-memory volume, and computing time of existing algorithms. This study aims to contribute to this growing area of research by exploring random walks and quantum walks together.