Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Sobel operator

Known as: Sobel, Sobel filter, Sobel-Feldman operator 
The Sobel operator, sometimes called the Sobel–Feldman operator or Sobel filter, is used in image processing and computer vision, particularly within… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
A number of image processing techniques IPTs have been implemented for detecting civil infrastructure defects to partially… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Edge detection is in the forefront of image processing for object detection, it is crucial to have a good understanding of edge… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
This paper proposes a method which combines Sobel edge detection operator and soft-threshold wavelet de-noising to do edge… Expand
  • figure I
  • figure 5
  • figure 6
  • figure 2
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Image edge detection is a process of locating the e dge of an image which is important in finding the approximate absolute… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Edge detection of images is a classical problem in computer vision and image processing. The key of edge detection is the choice… Expand
  • table 1
  • figure 1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We present measurements of {nu}{sub {mu}} disappearance in K2K, the KEK to Kamioka long-baseline neutrino oscillation experiment… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Abstract In this paper, a new edge detection approach combining Zernike moments operator with Sobel operator is proposed. This… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Biometrics-based authentication is a verification approach using the biological features inherent in each individual. They are… Expand
  • table 1
  • figure 3
  • figure 1
  • figure 2
  • figure 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We study a model in which perfectly informed experts offer advice to a decision maker whose actions affect the welfare of all… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1988
Highly Cited
1988
The architecture of the edge detector presented is highly pipeline to perform the computations of gradient magnitude and… Expand
Is this relevant?