ISSN 2278-9723
 

- 


A Survey of suboptimal polygonal approximation methods

Mangayarkarasi R Vanitha M,Sakthivel R Dr. Bharanitharan K.

Abstract
Polygonal approximation detects a set of feature points on the boundary of a shape that constitute the vertices of the shape. In particular, shape representation by polygonal approximation has become a popular technique due to its easiness, locality and compression. This paper presents a survey of methods that detects a set of dominant points that constitute the boundary of a 2D digital planar curve with an iterative procedure and a comparison of the polygonal approximation algorithms on various shapes with varying number of dominant points is made along with the demerits of each of the techniques

Key words: Polygonal approximation, Dominant point detection, Iterative merge.


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by Mangayarkarasi R Vanitha M
Articles by Sakthivel R Dr. Bharanitharan K
on Google
on Google Scholar


How to Cite this Article
Pubmed Style

Mangayarkarasi R Vanitha M ,Sakthivel R Dr. Bharanitharan K. A Survey of suboptimal polygonal approximation methods. . 2016; 4(1): 40-45. doi:10.31838/ijccts/04.01.07


Web Style

Mangayarkarasi R Vanitha M ,Sakthivel R Dr. Bharanitharan K. A Survey of suboptimal polygonal approximation methods. http://www.ijccts.org/?mno=302643851 [Access: September 19, 2020]. doi:10.31838/ijccts/04.01.07


AMA (American Medical Association) Style

Mangayarkarasi R Vanitha M ,Sakthivel R Dr. Bharanitharan K. A Survey of suboptimal polygonal approximation methods. . 2016; 4(1): 40-45. doi:10.31838/ijccts/04.01.07



Vancouver/ICMJE Style

Mangayarkarasi R Vanitha M ,Sakthivel R Dr. Bharanitharan K. A Survey of suboptimal polygonal approximation methods. . (2016), [cited September 19, 2020]; 4(1): 40-45. doi:10.31838/ijccts/04.01.07



Harvard Style

Mangayarkarasi R Vanitha M ,Sakthivel R Dr. Bharanitharan K (2016) A Survey of suboptimal polygonal approximation methods. , 4 (1), 40-45. doi:10.31838/ijccts/04.01.07



Turabian Style

Mangayarkarasi R Vanitha M ,Sakthivel R Dr. Bharanitharan K. 2016. A Survey of suboptimal polygonal approximation methods. International Journal of Communication and Computer Technologies, 4 (1), 40-45. doi:10.31838/ijccts/04.01.07



Chicago Style

Mangayarkarasi R Vanitha M ,Sakthivel R Dr. Bharanitharan K. "A Survey of suboptimal polygonal approximation methods." International Journal of Communication and Computer Technologies 4 (2016), 40-45. doi:10.31838/ijccts/04.01.07



MLA (The Modern Language Association) Style

Mangayarkarasi R Vanitha M ,Sakthivel R Dr. Bharanitharan K. "A Survey of suboptimal polygonal approximation methods." International Journal of Communication and Computer Technologies 4.1 (2016), 40-45. Print. doi:10.31838/ijccts/04.01.07



APA (American Psychological Association) Style

Mangayarkarasi R Vanitha M ,Sakthivel R Dr. Bharanitharan K (2016) A Survey of suboptimal polygonal approximation methods. International Journal of Communication and Computer Technologies, 4 (1), 40-45. doi:10.31838/ijccts/04.01.07





Most Viewed Articles
  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • Most Downloaded
  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Most Cited Articles