StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Sciences and Information Technology - Essay Example

Cite this document
Summary
Apparently, the original image has a low frequency in the corners while the frequency in the centre is remarkably high. Additionally, it has a sharp edge…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.2% of users find it useful
Computer Sciences and Information Technology
Read Text Preview

Extract of sample "Computer Sciences and Information Technology"

The paper "Computer Sciences and Information Technology" is a wonderful example of an assignment on information technology. Exercise A From the above, image is the original image, 2 is a Fourier transform of the image while 3 is a centered Fourier transmute of image. Apparently, the original image has a low frequency in the corners while the frequency in the center is remarkably high. Additionally, it has a sharp edge in the middle indicating how sharp straight lines can be utilized in the production of remarkable images.

Noteworthy, the Fourier transform of image 2 has a high frequency at the edges and lighter angles connoting low frequency. Furthermore, image 1 and 3 are opposite of each other. The centered Fourier image 3 is an inversion of the image; has a high frequency in the corners and light soft edges in its central line. After eliminating the logarithmic conversion, it is noted that images 1a and 3a are quite similar to images 1 and 3. However, in image 2, there is no comparison that can be made since there are no details in the image that is produced.

  Exercise B In the above images, image (a) is the original image, image (b) is the convert of image (a) while image (c) is the reverse convert of image (b). In the image (a), there is Fourier transformation. Therefore, to rebuild the original image whose pixels and brightness are significantly similar to those in the original image, an inverse transform was indispensable. Additionally, as evident in an image (c), converse Fourier transformation can be used to reconstruct the original image.

Remarkably, a transformation of image (b) results to a dot in the center of the image which implies that there is a very high frequency at the center of the image. Likewise, images A2, B2 and C2 further elucidate and designate the results of the current exercise. Exercise C The above images indicate some noteworthy findings. Image C1 is the image of the circle with jumbled noise, C3 is the image of the circle with coherent noise while C2 and C4 are their respective transformations. Image (C1) indicate how randomly the noise is spread over the image while image (C2) clearly signpost that the noises are not absolutely jettisoned even after filtering the image.

In the image with coherent noise, it has sharp edges and the noise is systematic in the upright direction as evident in C3. In the transformed image, C4, lines disappear and soft noises form circles around the dot in the inside of the image. The circles of noises vanish as one move towards the edges and the image becomes clear. It is also imperative to note that image C2 is quite sharp as compared to image C4. It is, therefore, evident that if the noise is regular, the Fourier separates it from the image.

Nonetheless, when the noise is random, the Fourier eliminates it from the image. Exercise D These images further indicate the effects of filtering and image transformation. Image (a) is the ideal lowpass filter, (b) is the filtered spectrum of the true image with jumbled noise while image (c) is plainly the reverse convert of image (b). After applying the lowpass filter on the true image, image (b) becomes clear and better than the original image. It becomes candid and bright thus displaying finer details as compared to the original image.

Conclusively, the lowpass filter is quite useful in excluding the noise from an image so that the final image becomes clear, more visible and brighter enough to reveal more details of the original image. Exercise E In exercise E, image (a) is the Butterworth filter, the filtered spectrum of the true circle image with jumbled noise is an image (b). Image (c) is the opposite convert of image (b). Image (A), Butterworth filter, has a high frequency at the center but this frequency diminishes as it approaches the outside.

Furthermore, the spectrum amplitude of image (B) declines towards the corners of the image. However, the filtered spectrum, image (B), is clearer than the original image thus revealing more details. Its frequency is high at the center. Additionally, the amount of noise in the final image is low as compared to the original image and more details are revealed. As clearly indicated above, the Butterworth filter is convenient in excluding the noise from an image thus making the final image more clear and visible to reveal finer details of the image.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Computer Sciences and Information Technology Essay, n.d.)
Computer Sciences and Information Technology Essay. https://studentshare.org/information-technology/1844702-lab-7
(Computer Sciences and Information Technology Essay)
Computer Sciences and Information Technology Essay. https://studentshare.org/information-technology/1844702-lab-7.
“Computer Sciences and Information Technology Essay”. https://studentshare.org/information-technology/1844702-lab-7.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Sciences and Information Technology

Threat for Information Technology

hellip; ing to Edward, the typical steps in the Risk Assessment process are the following: System Characterization, Threat Identification, Vulnerability Identification, Control Analysis, Likelihood Determination, Impact Analysis, Risk Determination, Control Recommendations, and Kenny Hartford Marianne Scott Computer Sciences and Information Technology 25 August Discuss the difference between a “Threat” and a “Threat Agent”.... “Risk Management Guide for information technology Systems....
2 Pages (500 words) Research Paper

Information Security Skills

With respect to the evolution of computing Computer Sciences and Information Technology Undertaking postgraduate studies in computer security is an important academic and career advantage inthe modern computing market due its unique position.... It will be interesting to learn how to improve internal company and national security systems to make them capable of resisting attacks such as hacking which exposes important confidential information to cyber attackers....
2 Pages (500 words) Essay

Opinions about balancing between information sharing and information protection

However, in the current times when these processes pertaining to information are getting digitized, much debate has come into existence regarding… Though on the surface, there seems to be a dichotomy between the sharing and protection of information, in a pragmatic context, there is no innate conflict between information sharing and information Opinions about Balancing Between Information Sharing and Information Protection of the Computer Sciences and Information Technology of the Concerned ProfessorApril 14, 2012Opinions about Balancing Between Information Sharing and Information Protection Running institutions and organizations is primarily about the storage, retrieval, processing and dissemination of information....
2 Pages (500 words) Assignment

Information Technology and Cyber Attackers

Dongfan was sentenced on February 8, 2009 under the act of the Economic Espionage passed in 1966 in US (LOS ANGELES, Questions First Computer Sciences and Information Technology d Questions E-Activity An enormous quantity of information and economic is transferred by the cheaper and faster technology in these days.... It is concluded that the information security is important from both inside and outside attackers.... America's Cyber Future, Security and Prosperity in the information Age, Centre for a New American Security, Vol....
1 Pages (250 words) Essay

Computer Virtualization Infrastructure

It is Computer Sciences and Information Technology Server virtualization infrastructure.... As senior system administrator the server virtualization infrastructure ordinarily includes the hypervisor (VM) and the virtual machine monitor (VMM).... t is important to understand the advantages and disadvantages of adopting a server virtualization infrastructure in an… (Michael, 2008) iii....
2 Pages (500 words) Essay

Computer Sciences and Information Technology Microsoft Updates

Other recommendations are, keeping personal computers on sleep mode, managing power settings, using the Ready Boost option to increase the memory of the computer and elevating CPU Priority (Callahan, Computer Sciences and Information Technology Microsoft Up s al Affiliation) According to Callahan, there are a number of recommendations that when used, can optimize the installation of Windows 8 Professional.... Other recommendations are, keeping personal computers on sleep mode, managing power settings, using the Ready Boost option to increase the memory of the computer and elevating CPU Priority (Callahan, 2011)....
1 Pages (250 words) Essay

CIS 206 U1 Review Assigment

The development of Linux from the time it was UNIX took the effort of universities took the efforts of university Computer Sciences and Information Technology Reasons why Linux is Popular Linux is popular because it has unique, as well as powerful features.... It supports compilers and interpreters for a quite number of computer languages like C, C++, Ada, Java, Lisp, Fortran, Python, Perl, Pascal inter alia (Sobell, 2012).... Utility Program and how it can be used with a Shell to Create ApplicationsUtility program is the software that assists in the management, maintenance and control of computer resources....
1 Pages (250 words) Coursework

System Analysis vs Systems Design Phases

System design and phases, on the other hand, involves the process of developing a plan for a new business, complementing and replacing or improving on an Module Computer Sciences and Information Technology al Affiliation The differences between the system analysis and system design phases and tasksSystem analysis and systems design phases and tasks refer to the process of carefully examining the situation of a business with an intention of improving it.... he accountability of a business analyst with respect to information technology projectsWith respect to information technology, a business analyst is usually dealing with issues concerning the development of software or enhancement issue....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us