SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 1, Ver. II (Jan.-Feb. 2017), PP 55-60
www.iosrjournals.org
DOI: 10.9790/0661-1901025560 www.iosrjournals.org 55 | Page
Application of Digital Image Processing in Drug Industry
Huvaida Manzoor
Abstract: Digital Image Processing is a very vast field It has many applications in every field and one such
application is in drug industry. Drug Industry is leading industry. Manufacturing process in drug Industry is
increasing day by day as we are dependent on these medicines. But these medicines might be defected, tablets
may be broken, there may be missing tablet in a strip and consumption of such drugs might be dangerous. This
paper shows different methods in digital image processing technique to find the defects in tablets. Four methods
are used in order to detect the defect in tablet strip.
Keywords: Digital Image Processing, Morphology opening, Template Matching, Mathematical Manipulation,
Euler’s number
I. Introduction
Digital image processing techniques and algorithms are applied on images in order to remove error. In
this paper, different digital image processing techniques are used to detect the defect in tablet strip
[1][2][4][5][6][7].Such defected tablets are harmful to consume and may have many side effects. The inspection
process is effective to detect the defects in tablets. Four techniques are used that is morphology operation(MO),
Template Matching(TM), Mathematical Manipulation(MM) and Euler’s Method(EM) to defect the different
defects in tablet strip. All the techniques are implemented in MATLAB 10. Figure 1 shows such defected tablet
strips.
Figure 1 Different Tablet strips with defect (a) Missing Tablet (b) Broken Tablet (c) Hole in Tablet.
II. Methodology
a) Morphology Operation technique(MO)
b) Template Matching(TM)
c) Mathematical manipulation(MM)
d) Euler’s Method(EM)
Morphology Operation
Morphological operations are affecting the form, structure or shape of an object. Applied on binary
images (black & white images – Images with only 2 colors: black and white). They are used in pre or post
processing (filtering, thinning, and pruning) or for getting a representation or description of the shape of
objects/regions (boundaries, skeletons convex hulls). Morphological operations apply a structuring element to
an input image, creating an output image of the same size. In a morphological operation, the value of each pixel
in the output image is based on a comparison of the corresponding pixel in the input image with its neighbors.
By choosing the size and shape of the neighborhood, you can construct a morphological operation that is
sensitive to specific shapes in the input image [1][3][8][11].
Morphology is of following types:
 Dilation: Dilation allows objects to expand, thus potentially filling in small holes and connecting disjoint
objects.
 Erosion: Erosion shrinks objects by etching away (eroding) their boundaries.
 Opening: Morphological opening is used to remove small objects from an image while preserving the shape
and size of larger objects in the image. Morphology opening is simply erosion followed by dilation. The
opening has the effect of removing objects that cannot completely contain the structuring element.
 Closing: Closing is opening performed in reverse. It is defined simply as dilation followed by erosion.
Erosion using the same structuring element for both operations.
Application of Digital Image Processing in Drug Industry
DOI: 10.9790/0661-1901025560 www.iosrjournals.org 56 | Page
Template Matching (TM)
Technique used in classifying objects. Template matching techniques compare portions of images
against one another[1][9][10][13]. Sample image may be used to recognize similar objects in source image. If
standard deviation of the template image compared to the source image is small enough, template matching may
be used. Templates are most often used to identify printed characters, numbers, and other small, simple objects.
For example original image is of tablet packet containing ten tablets. Like morphology operation image is first
converted into gray and then to binary. The binary image is then filtered in order to remove noise and edges are
detected using canny edge detection. A template is selected and is compared with rest of the tablets In this way
defected tablet can be found. The Template Matching block finds the best match of a template within an input
image. The block computes match metric values by shifting a template over a region of interest or the entire
image, and then finds the best match location.
Mathematical Manipulation (MM)
MM is used to find the defect in tablets.MM calculates the mathematical values. No. of tablets are
calculated which helps to determine the correct figure in a tablet strip. Counting can also help to find the
pharmaceutical company. They can simply discard the strip containing less or greater no. of tablets.
Euler’s Method(EM)
Tablet which is having any hole is detected by using Euler’s number of binary image. Euler’s number
is used to detect the holes in an object; we used this function in tablets having holes. Euler’s number is the
number of objects minus the number of holes [12].
Eu=N-H …...........................................(1)
Where Eu,N and H are Euler’s number, number of objects, number of holes respectively.
Also, H=N-Eu …………………………… (2)
Therefore, from the above equation number of holes is equal to the number of objects minus the
Euler’s number. For finding Euler’s number, image should be binary. Therefore, image is converted into binary.
Euler’s number tells whether tablet is having any hole or not. After finding Euler’s number, position of tablet is
detected. Also connected component of binary image is detected. Connected components in a binary image are a
set of pixels that form a connected group. From this we also get image size, list of pixels belonging to each
connected component. If the Euler’s number is negative, it indicates that the number of holes is greater than the
number of objects. Euler’s number will detect whether the tablet is having any hole or not. After finding the
presence of hole next step is to detect the position of hole. In order to detect the position of hole, we use simple
arithmetic operation. Tablet with hole and without hole are subtracted.
III. Proposed Work
The proposed work is divided into four parts, that is
a. Morphology Operation technique(MO)
b. Template Matching(TM)
c. Mathematical manipulation(MM)
d. Euler’s Method(EM)
All the above techniques are summarized in one block diagram as shown in figure 2
Figure 2 Block Diagram
Application of Digital Image Processing in Drug Industry
DOI: 10.9790/0661-1901025560 www.iosrjournals.org 57 | Page
It is clearly shown in figure 2 that MO detects the broken tablet in tablet strip, TM, MM detects broken as well
as missing tablet in tablet strip and EF detects hole in tablet strip.
a) Steps for MO
1. Capture an image of a tablet packet without any defect.
2. Convert this image into gray image.
3. Convert gray image into binary image
4. Apply morphology opening on binary image. Morphology opening will remove noise from the image.
5. Dilate the opened Image. Dilation will expand the image and will make the image big.
6. Calculate the no. of pixels of binary image.
7. Now capture the same tablet packet with broken/missing part.
8. Apply the same process that is applied on tablet packet without any defect.
9. When defected packet is found, beep will be generated.
10. Subtract the two images
11. Missing part of tablet and position of defect is obtained.
12. Filter it by using morphology opening technique which removes the noise.
b) Steps for Template Matching
1. Read an template image (defected or broken tablet).
2. Crop the image
3. Read the image of defected tablet packet.
4. Crop the image
5. Use normalized cross correlation to detect the position of defected tablet
6. Position of defected tablet found.
c) Steps for MM
1. Capture the image of tablet Strip
2. Convert the image into gray image
3. Convert gray image into binary image
4. Apply Morphology Opening on binary image. Morphology opening will remove noise from the image.
5. Boundaries of the output are detected after pre-processing.
6. After this process determine the roundness of the tablet, Find area and perimeter of each tablet
7. After calculating area and perimeter, find the metric. Metric closer to 1 indicates that tablet is not broken or
is completely round.
d) Steps for EM
1. Input image is first pre-processed. Pre-processing involves conversion from RGB to gray image then to
binary image. Binary image is then cleaned using morphology opening.
2. Pseudocolor is applied on opened image.
3. Connected objects is found.
4. Find the Euler’s number.
5. If Euler’s no. is equal to zero then the tablet is without hole else tablet is with hole and will ring beep.
6. Boundaries of the output are detected after pre processing.
7. After this process determine the roundness of tablet, find area and perimeter of each tablet.
8. After calculating area and perimeter, find the metric. Metric closer to 1 indicates that tablet is not broken or
is completely round.
IV. Results And Discussion
Simulation Result of MO
Figure 3 Pre-processing of Tablet Strip
Tablet without defect Gray level image of tablet without defect
Binary image of tablet without defect Tablet with defect
Gray level image of tablet with defect Binary image of tablet with defect
Application of Digital Image Processing in Drug Industry
DOI: 10.9790/0661-1901025560 www.iosrjournals.org 58 | Page
Figure 4 Morphology Opening process
Figure 5 Defect detected
It is clearly shown in figure 3,4,5 how defected tablet is detected in tablet strip.
At the end of program command window displays following information.
Simulation Result of TM
Figure 6 Tablet strip with broken part
Morphology opening of Tablet without defect Morphology opening of Tablet with defect
Dilation of image Tablet without defect Dilation of Tablet with defect
Defect found after subtraction Opening of output after subtraction
Application of Digital Image Processing in Drug Industry
DOI: 10.9790/0661-1901025560 www.iosrjournals.org 59 | Page
Figure 7 Broken tablet detected
Figure 8 Missing Tablet detected
It is clear from figure 7 and 8 that template matching detects broken as well as missing tablet
Simulation Result of MM
Figure 9 Shows defect detected by using MM
Figure 10 Missing Tablet detected in tablet strip
Simulation Result of EF
Figure 11 Holes in Tablet Strip
Metrics closer to 1 indicate that the tablet is approximately round
No. of Tablets Found:9
0.96
0.95
0.95
0.96
0.94 0.95
0.95
0.95
0.94
Input Image Gray Image Binary Image
Cleaned Image Pseudocolor Image
Application of Digital Image Processing in Drug Industry
DOI: 10.9790/0661-1901025560 www.iosrjournals.org 60 | Page
Figure 12 Message indicating presence of hole
At the end of program command window is displayed with above information.
V. Conclusion
This paper presents the application in drug industry using digital image Processing technique. It is
implemented on MATLAB 10. Four techniques are used that is MO, TM, MM and EF to defect the different
defects in tablet strip. MO detects the broken tablet in tablet strip, TM, MM detects broken as well as missing
tablet in tablet strip and EF detects hole in tablet strip.
References
[1]. Huvaida Manzoor, Yogeshwar SinghRandhawa-Comparative studies of algorithms using Digital Image Processing in Drug Industry
–published at: “International Journal of Scientific and Research Publications (IJSRP), Volume 4,Issue 4,April 2014 Edition”.
[2]. Manzoor,Huvaida, and Yogeshwer Singh Randhawa. "Edge Detection in Digital Image Using Statistical Method."
[3]. Ştefan Oprea, Ioan Liţă, Mariana Jurianu, Daniel Alexandru Vişan, Ion Bogdan Cioc, “Digital Image Processing Applied in Drugs
Industry for Detection of Broken Aspirin Tablets” Electronics,Communications and Computers Department, University of Pitesti
Str.Targul din Vale Nr. 1 Pitesti, Romania,2008
[4]. El-Khamy,S.E., Lotfy,M., El-Yamany,N.A.,“A Modified Fuzzy Sobel Edge Detector”,17. National Radio Science Conference,
Feb.22-24 2000, Minufiya University, Egypt
[5]. Hardeep Kaur and Er.Nidhi Garg, “Inspection of Defective Pharmaceutical Capsules using Harris Algorithm”, International Journal
of Advances in Electronics Engineering,2009
[6]. Peng Zhao and Shutao Li “Tablets Vision Inspection Approach Using Fourier Descriptors and Support Vector Machines” The 9th
International Conference for Young Computer Scientists,2008.
[7]. Ramya.S,,Suchitra.J,Nadesh R.K” Detection of Broken Pharmaceutical Drugs using Enhanced Feature Extraction Technique”
[8]. Baig, Hasan,Jeong-A. Lee, and Jieun Lee. "Performance evaluation of CPU-GPU and CPU-only algorithms for detecting defective
tablets through morphological imaging techniques." Information Systems and Technologies (CISTI),2012 7th Iberian Conference
on.IEEE, 2012.
[9]. Kitti, T., T. Jaruwan, and T. Chaiyapon. "An object recognition and identification system using the harris corner detection
method." International Journal of Machine Learning and Computing 2.4 (2012): 462-465.
[10]. Zakaria, Mohd Firdaus, Hoo Seng Choon, and Shahrel Azmin Suand. "Object Shape Recognition in Image for Machine Vision
Application." International Journal of Computer Theory & Engineering 4.1 (2012).
[11]. Baig, Hasan, et al. "Implementation of SCADA system for unsought tablets detection through morphological image processing."
Multitopic Conference, 2008. INMIC 2008. IEEE International. IEEE, 2008.
[12]. He, Li-Feng, Yu-Yan Chao, and Kenji Suzuki. "An algorithm for connected-component labeling, hole labeling and Euler number
computing." Journal of Computer Science and Technology 28.3 (2013): 468-478.
[13]. Khalil, M. I. "Car plate recognition using the template matching method."International Journal of Computer Theory and
Engineering 2.5 (2010): 1793-8201

More Related Content

What's hot

Medical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set MethodMedical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set MethodIOSR Journals
 
Fuzzy Logic based Edge Detection Method for Image Processing
Fuzzy Logic based Edge Detection Method for Image Processing  Fuzzy Logic based Edge Detection Method for Image Processing
Fuzzy Logic based Edge Detection Method for Image Processing IJECEIAES
 
A Novel Approach To Detection and Evaluation of Resampled Tampered Images
A Novel Approach To Detection and Evaluation of Resampled Tampered ImagesA Novel Approach To Detection and Evaluation of Resampled Tampered Images
A Novel Approach To Detection and Evaluation of Resampled Tampered ImagesCSCJournals
 
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...IJERA Editor
 
Color Image Segmentation Technique Using “Natural Grouping” of Pixels
Color Image Segmentation Technique Using “Natural Grouping” of PixelsColor Image Segmentation Technique Using “Natural Grouping” of Pixels
Color Image Segmentation Technique Using “Natural Grouping” of PixelsCSCJournals
 
Improvement and Enhancement Point Search Algorithm
Improvement and Enhancement Point Search AlgorithmImprovement and Enhancement Point Search Algorithm
Improvement and Enhancement Point Search AlgorithmIJCSIS Research Publications
 
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHMPERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHMAM Publications
 
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLSMIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLSAM Publications
 
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGES
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGESTEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGES
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGESIJCI JOURNAL
 
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...csandit
 
Fuzzy Region Merging Using Fuzzy Similarity Measurement on Image Segmentation
Fuzzy Region Merging Using Fuzzy Similarity Measurement  on Image Segmentation  Fuzzy Region Merging Using Fuzzy Similarity Measurement  on Image Segmentation
Fuzzy Region Merging Using Fuzzy Similarity Measurement on Image Segmentation IJECEIAES
 
Image Processing Algorithm for Fruit Identification
Image Processing Algorithm for Fruit IdentificationImage Processing Algorithm for Fruit Identification
Image Processing Algorithm for Fruit IdentificationIRJET Journal
 
Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...
Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...
Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...IJERA Editor
 
Wound epithelization model by 3 d imaging
Wound epithelization model by 3 d imagingWound epithelization model by 3 d imaging
Wound epithelization model by 3 d imagingeSAT Publishing House
 
Detection of hard exudates using simulated annealing based thresholding mecha...
Detection of hard exudates using simulated annealing based thresholding mecha...Detection of hard exudates using simulated annealing based thresholding mecha...
Detection of hard exudates using simulated annealing based thresholding mecha...csandit
 

What's hot (19)

Q0460398103
Q0460398103Q0460398103
Q0460398103
 
Medical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set MethodMedical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set Method
 
Fuzzy Logic based Edge Detection Method for Image Processing
Fuzzy Logic based Edge Detection Method for Image Processing  Fuzzy Logic based Edge Detection Method for Image Processing
Fuzzy Logic based Edge Detection Method for Image Processing
 
A Novel Approach To Detection and Evaluation of Resampled Tampered Images
A Novel Approach To Detection and Evaluation of Resampled Tampered ImagesA Novel Approach To Detection and Evaluation of Resampled Tampered Images
A Novel Approach To Detection and Evaluation of Resampled Tampered Images
 
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
 
L045066671
L045066671L045066671
L045066671
 
K011138084
K011138084K011138084
K011138084
 
G011134454
G011134454G011134454
G011134454
 
Color Image Segmentation Technique Using “Natural Grouping” of Pixels
Color Image Segmentation Technique Using “Natural Grouping” of PixelsColor Image Segmentation Technique Using “Natural Grouping” of Pixels
Color Image Segmentation Technique Using “Natural Grouping” of Pixels
 
Improvement and Enhancement Point Search Algorithm
Improvement and Enhancement Point Search AlgorithmImprovement and Enhancement Point Search Algorithm
Improvement and Enhancement Point Search Algorithm
 
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHMPERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
 
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLSMIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
 
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGES
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGESTEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGES
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGES
 
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...
 
Fuzzy Region Merging Using Fuzzy Similarity Measurement on Image Segmentation
Fuzzy Region Merging Using Fuzzy Similarity Measurement  on Image Segmentation  Fuzzy Region Merging Using Fuzzy Similarity Measurement  on Image Segmentation
Fuzzy Region Merging Using Fuzzy Similarity Measurement on Image Segmentation
 
Image Processing Algorithm for Fruit Identification
Image Processing Algorithm for Fruit IdentificationImage Processing Algorithm for Fruit Identification
Image Processing Algorithm for Fruit Identification
 
Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...
Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...
Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...
 
Wound epithelization model by 3 d imaging
Wound epithelization model by 3 d imagingWound epithelization model by 3 d imaging
Wound epithelization model by 3 d imaging
 
Detection of hard exudates using simulated annealing based thresholding mecha...
Detection of hard exudates using simulated annealing based thresholding mecha...Detection of hard exudates using simulated annealing based thresholding mecha...
Detection of hard exudates using simulated annealing based thresholding mecha...
 

Similar to Application of Digital Image Processing in Drug Industry

An application of morphological
An application of morphologicalAn application of morphological
An application of morphologicalNaresh Chilamakuri
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forprjpublications
 
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUESDIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUESAM Publications
 
EDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATION
EDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATIONEDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATION
EDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATIONIJEEE
 
Statistical Feature based Blind Classifier for JPEG Image Splice Detection
Statistical Feature based Blind Classifier for JPEG Image Splice DetectionStatistical Feature based Blind Classifier for JPEG Image Splice Detection
Statistical Feature based Blind Classifier for JPEG Image Splice Detectionrahulmonikasharma
 
Image restoration based on morphological operations
Image restoration based on morphological operationsImage restoration based on morphological operations
Image restoration based on morphological operationsijcseit
 
IMAGE RESTORATION BASED ON MORPHOLOGICAL OPERATIONS
IMAGE RESTORATION BASED ON MORPHOLOGICAL OPERATIONSIMAGE RESTORATION BASED ON MORPHOLOGICAL OPERATIONS
IMAGE RESTORATION BASED ON MORPHOLOGICAL OPERATIONSijcseit
 
Ijartes v1-i2-008
Ijartes v1-i2-008Ijartes v1-i2-008
Ijartes v1-i2-008IJARTES
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...CSCJournals
 
IMAGE COMPOSITE DETECTION USING CUSTOMIZED
IMAGE COMPOSITE DETECTION USING CUSTOMIZEDIMAGE COMPOSITE DETECTION USING CUSTOMIZED
IMAGE COMPOSITE DETECTION USING CUSTOMIZEDijcga
 
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...Feature Extraction for Image Classification and Analysis with Ant Colony Opti...
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...sipij
 
Comparative Study and Analysis of Image Inpainting Techniques
Comparative Study and Analysis of Image Inpainting TechniquesComparative Study and Analysis of Image Inpainting Techniques
Comparative Study and Analysis of Image Inpainting TechniquesIOSR Journals
 
AE 497 Spring 2015 Final Report
AE 497 Spring 2015 Final ReportAE 497 Spring 2015 Final Report
AE 497 Spring 2015 Final ReportCatherine McCarthy
 
Human Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew AlgorithmHuman Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew AlgorithmIOSRjournaljce
 
Lecture 15 image morphology examples
Lecture 15 image morphology examplesLecture 15 image morphology examples
Lecture 15 image morphology examplesMarwa Ahmeid
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
 
Comparative analysis and evaluation of image imprinting algorithms
Comparative analysis and evaluation of image imprinting algorithmsComparative analysis and evaluation of image imprinting algorithms
Comparative analysis and evaluation of image imprinting algorithmsAlexander Decker
 

Similar to Application of Digital Image Processing in Drug Industry (20)

An application of morphological
An application of morphologicalAn application of morphological
An application of morphological
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm for
 
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUESDIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
 
EDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATION
EDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATIONEDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATION
EDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATION
 
Statistical Feature based Blind Classifier for JPEG Image Splice Detection
Statistical Feature based Blind Classifier for JPEG Image Splice DetectionStatistical Feature based Blind Classifier for JPEG Image Splice Detection
Statistical Feature based Blind Classifier for JPEG Image Splice Detection
 
Image restoration based on morphological operations
Image restoration based on morphological operationsImage restoration based on morphological operations
Image restoration based on morphological operations
 
IMAGE RESTORATION BASED ON MORPHOLOGICAL OPERATIONS
IMAGE RESTORATION BASED ON MORPHOLOGICAL OPERATIONSIMAGE RESTORATION BASED ON MORPHOLOGICAL OPERATIONS
IMAGE RESTORATION BASED ON MORPHOLOGICAL OPERATIONS
 
F0342032038
F0342032038F0342032038
F0342032038
 
Ijartes v1-i2-008
Ijartes v1-i2-008Ijartes v1-i2-008
Ijartes v1-i2-008
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
 
IMAGE COMPOSITE DETECTION USING CUSTOMIZED
IMAGE COMPOSITE DETECTION USING CUSTOMIZEDIMAGE COMPOSITE DETECTION USING CUSTOMIZED
IMAGE COMPOSITE DETECTION USING CUSTOMIZED
 
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...Feature Extraction for Image Classification and Analysis with Ant Colony Opti...
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...
 
Comparative Study and Analysis of Image Inpainting Techniques
Comparative Study and Analysis of Image Inpainting TechniquesComparative Study and Analysis of Image Inpainting Techniques
Comparative Study and Analysis of Image Inpainting Techniques
 
AE 497 Spring 2015 Final Report
AE 497 Spring 2015 Final ReportAE 497 Spring 2015 Final Report
AE 497 Spring 2015 Final Report
 
Human Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew AlgorithmHuman Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew Algorithm
 
Lecture 15 image morphology examples
Lecture 15 image morphology examplesLecture 15 image morphology examples
Lecture 15 image morphology examples
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
Comparative analysis and evaluation of image imprinting algorithms
Comparative analysis and evaluation of image imprinting algorithmsComparative analysis and evaluation of image imprinting algorithms
Comparative analysis and evaluation of image imprinting algorithms
 
Ijetcas14 447
Ijetcas14 447Ijetcas14 447
Ijetcas14 447
 

More from IOSRjournaljce

3D Visualizations of Land Cover Maps
3D Visualizations of Land Cover Maps3D Visualizations of Land Cover Maps
3D Visualizations of Land Cover MapsIOSRjournaljce
 
Comparison between Cisco ACI and VMWARE NSX
Comparison between Cisco ACI and VMWARE NSXComparison between Cisco ACI and VMWARE NSX
Comparison between Cisco ACI and VMWARE NSXIOSRjournaljce
 
Student’s Skills Evaluation Techniques using Data Mining.
Student’s Skills Evaluation Techniques using Data Mining.Student’s Skills Evaluation Techniques using Data Mining.
Student’s Skills Evaluation Techniques using Data Mining.IOSRjournaljce
 
Classification Techniques: A Review
Classification Techniques: A ReviewClassification Techniques: A Review
Classification Techniques: A ReviewIOSRjournaljce
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingIOSRjournaljce
 
Architecture of Cloud Computing
Architecture of Cloud ComputingArchitecture of Cloud Computing
Architecture of Cloud ComputingIOSRjournaljce
 
An Experimental Study of Diabetes Disease Prediction System Using Classificat...
An Experimental Study of Diabetes Disease Prediction System Using Classificat...An Experimental Study of Diabetes Disease Prediction System Using Classificat...
An Experimental Study of Diabetes Disease Prediction System Using Classificat...IOSRjournaljce
 
Candidate Ranking and Evaluation System based on Digital Footprints
Candidate Ranking and Evaluation System based on Digital FootprintsCandidate Ranking and Evaluation System based on Digital Footprints
Candidate Ranking and Evaluation System based on Digital FootprintsIOSRjournaljce
 
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...IOSRjournaljce
 
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...IOSRjournaljce
 
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection SystemThe Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection SystemIOSRjournaljce
 
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...IOSRjournaljce
 
An E-Governance Web Security Survey
An E-Governance Web Security SurveyAn E-Governance Web Security Survey
An E-Governance Web Security SurveyIOSRjournaljce
 
Exploring 3D-Virtual Learning Environments with Adaptive Repetitions
Exploring 3D-Virtual Learning Environments with Adaptive RepetitionsExploring 3D-Virtual Learning Environments with Adaptive Repetitions
Exploring 3D-Virtual Learning Environments with Adaptive RepetitionsIOSRjournaljce
 
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...IOSRjournaljce
 
Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...IOSRjournaljce
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...IOSRjournaljce
 
Panorama Technique for 3D Animation movie, Design and Evaluating
Panorama Technique for 3D Animation movie, Design and EvaluatingPanorama Technique for 3D Animation movie, Design and Evaluating
Panorama Technique for 3D Animation movie, Design and EvaluatingIOSRjournaljce
 
Density Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri ImageDensity Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri ImageIOSRjournaljce
 
Analysis of the Waveform of the Acoustic Emission Signal via Analogue Modulat...
Analysis of the Waveform of the Acoustic Emission Signal via Analogue Modulat...Analysis of the Waveform of the Acoustic Emission Signal via Analogue Modulat...
Analysis of the Waveform of the Acoustic Emission Signal via Analogue Modulat...IOSRjournaljce
 

More from IOSRjournaljce (20)

3D Visualizations of Land Cover Maps
3D Visualizations of Land Cover Maps3D Visualizations of Land Cover Maps
3D Visualizations of Land Cover Maps
 
Comparison between Cisco ACI and VMWARE NSX
Comparison between Cisco ACI and VMWARE NSXComparison between Cisco ACI and VMWARE NSX
Comparison between Cisco ACI and VMWARE NSX
 
Student’s Skills Evaluation Techniques using Data Mining.
Student’s Skills Evaluation Techniques using Data Mining.Student’s Skills Evaluation Techniques using Data Mining.
Student’s Skills Evaluation Techniques using Data Mining.
 
Classification Techniques: A Review
Classification Techniques: A ReviewClassification Techniques: A Review
Classification Techniques: A Review
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
 
Architecture of Cloud Computing
Architecture of Cloud ComputingArchitecture of Cloud Computing
Architecture of Cloud Computing
 
An Experimental Study of Diabetes Disease Prediction System Using Classificat...
An Experimental Study of Diabetes Disease Prediction System Using Classificat...An Experimental Study of Diabetes Disease Prediction System Using Classificat...
An Experimental Study of Diabetes Disease Prediction System Using Classificat...
 
Candidate Ranking and Evaluation System based on Digital Footprints
Candidate Ranking and Evaluation System based on Digital FootprintsCandidate Ranking and Evaluation System based on Digital Footprints
Candidate Ranking and Evaluation System based on Digital Footprints
 
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
 
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
 
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection SystemThe Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
 
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
 
An E-Governance Web Security Survey
An E-Governance Web Security SurveyAn E-Governance Web Security Survey
An E-Governance Web Security Survey
 
Exploring 3D-Virtual Learning Environments with Adaptive Repetitions
Exploring 3D-Virtual Learning Environments with Adaptive RepetitionsExploring 3D-Virtual Learning Environments with Adaptive Repetitions
Exploring 3D-Virtual Learning Environments with Adaptive Repetitions
 
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
 
Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
 
Panorama Technique for 3D Animation movie, Design and Evaluating
Panorama Technique for 3D Animation movie, Design and EvaluatingPanorama Technique for 3D Animation movie, Design and Evaluating
Panorama Technique for 3D Animation movie, Design and Evaluating
 
Density Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri ImageDensity Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri Image
 
Analysis of the Waveform of the Acoustic Emission Signal via Analogue Modulat...
Analysis of the Waveform of the Acoustic Emission Signal via Analogue Modulat...Analysis of the Waveform of the Acoustic Emission Signal via Analogue Modulat...
Analysis of the Waveform of the Acoustic Emission Signal via Analogue Modulat...
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 

Application of Digital Image Processing in Drug Industry

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 1, Ver. II (Jan.-Feb. 2017), PP 55-60 www.iosrjournals.org DOI: 10.9790/0661-1901025560 www.iosrjournals.org 55 | Page Application of Digital Image Processing in Drug Industry Huvaida Manzoor Abstract: Digital Image Processing is a very vast field It has many applications in every field and one such application is in drug industry. Drug Industry is leading industry. Manufacturing process in drug Industry is increasing day by day as we are dependent on these medicines. But these medicines might be defected, tablets may be broken, there may be missing tablet in a strip and consumption of such drugs might be dangerous. This paper shows different methods in digital image processing technique to find the defects in tablets. Four methods are used in order to detect the defect in tablet strip. Keywords: Digital Image Processing, Morphology opening, Template Matching, Mathematical Manipulation, Euler’s number I. Introduction Digital image processing techniques and algorithms are applied on images in order to remove error. In this paper, different digital image processing techniques are used to detect the defect in tablet strip [1][2][4][5][6][7].Such defected tablets are harmful to consume and may have many side effects. The inspection process is effective to detect the defects in tablets. Four techniques are used that is morphology operation(MO), Template Matching(TM), Mathematical Manipulation(MM) and Euler’s Method(EM) to defect the different defects in tablet strip. All the techniques are implemented in MATLAB 10. Figure 1 shows such defected tablet strips. Figure 1 Different Tablet strips with defect (a) Missing Tablet (b) Broken Tablet (c) Hole in Tablet. II. Methodology a) Morphology Operation technique(MO) b) Template Matching(TM) c) Mathematical manipulation(MM) d) Euler’s Method(EM) Morphology Operation Morphological operations are affecting the form, structure or shape of an object. Applied on binary images (black & white images – Images with only 2 colors: black and white). They are used in pre or post processing (filtering, thinning, and pruning) or for getting a representation or description of the shape of objects/regions (boundaries, skeletons convex hulls). Morphological operations apply a structuring element to an input image, creating an output image of the same size. In a morphological operation, the value of each pixel in the output image is based on a comparison of the corresponding pixel in the input image with its neighbors. By choosing the size and shape of the neighborhood, you can construct a morphological operation that is sensitive to specific shapes in the input image [1][3][8][11]. Morphology is of following types:  Dilation: Dilation allows objects to expand, thus potentially filling in small holes and connecting disjoint objects.  Erosion: Erosion shrinks objects by etching away (eroding) their boundaries.  Opening: Morphological opening is used to remove small objects from an image while preserving the shape and size of larger objects in the image. Morphology opening is simply erosion followed by dilation. The opening has the effect of removing objects that cannot completely contain the structuring element.  Closing: Closing is opening performed in reverse. It is defined simply as dilation followed by erosion. Erosion using the same structuring element for both operations.
  • 2. Application of Digital Image Processing in Drug Industry DOI: 10.9790/0661-1901025560 www.iosrjournals.org 56 | Page Template Matching (TM) Technique used in classifying objects. Template matching techniques compare portions of images against one another[1][9][10][13]. Sample image may be used to recognize similar objects in source image. If standard deviation of the template image compared to the source image is small enough, template matching may be used. Templates are most often used to identify printed characters, numbers, and other small, simple objects. For example original image is of tablet packet containing ten tablets. Like morphology operation image is first converted into gray and then to binary. The binary image is then filtered in order to remove noise and edges are detected using canny edge detection. A template is selected and is compared with rest of the tablets In this way defected tablet can be found. The Template Matching block finds the best match of a template within an input image. The block computes match metric values by shifting a template over a region of interest or the entire image, and then finds the best match location. Mathematical Manipulation (MM) MM is used to find the defect in tablets.MM calculates the mathematical values. No. of tablets are calculated which helps to determine the correct figure in a tablet strip. Counting can also help to find the pharmaceutical company. They can simply discard the strip containing less or greater no. of tablets. Euler’s Method(EM) Tablet which is having any hole is detected by using Euler’s number of binary image. Euler’s number is used to detect the holes in an object; we used this function in tablets having holes. Euler’s number is the number of objects minus the number of holes [12]. Eu=N-H …...........................................(1) Where Eu,N and H are Euler’s number, number of objects, number of holes respectively. Also, H=N-Eu …………………………… (2) Therefore, from the above equation number of holes is equal to the number of objects minus the Euler’s number. For finding Euler’s number, image should be binary. Therefore, image is converted into binary. Euler’s number tells whether tablet is having any hole or not. After finding Euler’s number, position of tablet is detected. Also connected component of binary image is detected. Connected components in a binary image are a set of pixels that form a connected group. From this we also get image size, list of pixels belonging to each connected component. If the Euler’s number is negative, it indicates that the number of holes is greater than the number of objects. Euler’s number will detect whether the tablet is having any hole or not. After finding the presence of hole next step is to detect the position of hole. In order to detect the position of hole, we use simple arithmetic operation. Tablet with hole and without hole are subtracted. III. Proposed Work The proposed work is divided into four parts, that is a. Morphology Operation technique(MO) b. Template Matching(TM) c. Mathematical manipulation(MM) d. Euler’s Method(EM) All the above techniques are summarized in one block diagram as shown in figure 2 Figure 2 Block Diagram
  • 3. Application of Digital Image Processing in Drug Industry DOI: 10.9790/0661-1901025560 www.iosrjournals.org 57 | Page It is clearly shown in figure 2 that MO detects the broken tablet in tablet strip, TM, MM detects broken as well as missing tablet in tablet strip and EF detects hole in tablet strip. a) Steps for MO 1. Capture an image of a tablet packet without any defect. 2. Convert this image into gray image. 3. Convert gray image into binary image 4. Apply morphology opening on binary image. Morphology opening will remove noise from the image. 5. Dilate the opened Image. Dilation will expand the image and will make the image big. 6. Calculate the no. of pixels of binary image. 7. Now capture the same tablet packet with broken/missing part. 8. Apply the same process that is applied on tablet packet without any defect. 9. When defected packet is found, beep will be generated. 10. Subtract the two images 11. Missing part of tablet and position of defect is obtained. 12. Filter it by using morphology opening technique which removes the noise. b) Steps for Template Matching 1. Read an template image (defected or broken tablet). 2. Crop the image 3. Read the image of defected tablet packet. 4. Crop the image 5. Use normalized cross correlation to detect the position of defected tablet 6. Position of defected tablet found. c) Steps for MM 1. Capture the image of tablet Strip 2. Convert the image into gray image 3. Convert gray image into binary image 4. Apply Morphology Opening on binary image. Morphology opening will remove noise from the image. 5. Boundaries of the output are detected after pre-processing. 6. After this process determine the roundness of the tablet, Find area and perimeter of each tablet 7. After calculating area and perimeter, find the metric. Metric closer to 1 indicates that tablet is not broken or is completely round. d) Steps for EM 1. Input image is first pre-processed. Pre-processing involves conversion from RGB to gray image then to binary image. Binary image is then cleaned using morphology opening. 2. Pseudocolor is applied on opened image. 3. Connected objects is found. 4. Find the Euler’s number. 5. If Euler’s no. is equal to zero then the tablet is without hole else tablet is with hole and will ring beep. 6. Boundaries of the output are detected after pre processing. 7. After this process determine the roundness of tablet, find area and perimeter of each tablet. 8. After calculating area and perimeter, find the metric. Metric closer to 1 indicates that tablet is not broken or is completely round. IV. Results And Discussion Simulation Result of MO Figure 3 Pre-processing of Tablet Strip Tablet without defect Gray level image of tablet without defect Binary image of tablet without defect Tablet with defect Gray level image of tablet with defect Binary image of tablet with defect
  • 4. Application of Digital Image Processing in Drug Industry DOI: 10.9790/0661-1901025560 www.iosrjournals.org 58 | Page Figure 4 Morphology Opening process Figure 5 Defect detected It is clearly shown in figure 3,4,5 how defected tablet is detected in tablet strip. At the end of program command window displays following information. Simulation Result of TM Figure 6 Tablet strip with broken part Morphology opening of Tablet without defect Morphology opening of Tablet with defect Dilation of image Tablet without defect Dilation of Tablet with defect Defect found after subtraction Opening of output after subtraction
  • 5. Application of Digital Image Processing in Drug Industry DOI: 10.9790/0661-1901025560 www.iosrjournals.org 59 | Page Figure 7 Broken tablet detected Figure 8 Missing Tablet detected It is clear from figure 7 and 8 that template matching detects broken as well as missing tablet Simulation Result of MM Figure 9 Shows defect detected by using MM Figure 10 Missing Tablet detected in tablet strip Simulation Result of EF Figure 11 Holes in Tablet Strip Metrics closer to 1 indicate that the tablet is approximately round No. of Tablets Found:9 0.96 0.95 0.95 0.96 0.94 0.95 0.95 0.95 0.94 Input Image Gray Image Binary Image Cleaned Image Pseudocolor Image
  • 6. Application of Digital Image Processing in Drug Industry DOI: 10.9790/0661-1901025560 www.iosrjournals.org 60 | Page Figure 12 Message indicating presence of hole At the end of program command window is displayed with above information. V. Conclusion This paper presents the application in drug industry using digital image Processing technique. It is implemented on MATLAB 10. Four techniques are used that is MO, TM, MM and EF to defect the different defects in tablet strip. MO detects the broken tablet in tablet strip, TM, MM detects broken as well as missing tablet in tablet strip and EF detects hole in tablet strip. References [1]. Huvaida Manzoor, Yogeshwar SinghRandhawa-Comparative studies of algorithms using Digital Image Processing in Drug Industry –published at: “International Journal of Scientific and Research Publications (IJSRP), Volume 4,Issue 4,April 2014 Edition”. [2]. Manzoor,Huvaida, and Yogeshwer Singh Randhawa. "Edge Detection in Digital Image Using Statistical Method." [3]. Ştefan Oprea, Ioan Liţă, Mariana Jurianu, Daniel Alexandru Vişan, Ion Bogdan Cioc, “Digital Image Processing Applied in Drugs Industry for Detection of Broken Aspirin Tablets” Electronics,Communications and Computers Department, University of Pitesti Str.Targul din Vale Nr. 1 Pitesti, Romania,2008 [4]. El-Khamy,S.E., Lotfy,M., El-Yamany,N.A.,“A Modified Fuzzy Sobel Edge Detector”,17. National Radio Science Conference, Feb.22-24 2000, Minufiya University, Egypt [5]. Hardeep Kaur and Er.Nidhi Garg, “Inspection of Defective Pharmaceutical Capsules using Harris Algorithm”, International Journal of Advances in Electronics Engineering,2009 [6]. Peng Zhao and Shutao Li “Tablets Vision Inspection Approach Using Fourier Descriptors and Support Vector Machines” The 9th International Conference for Young Computer Scientists,2008. [7]. Ramya.S,,Suchitra.J,Nadesh R.K” Detection of Broken Pharmaceutical Drugs using Enhanced Feature Extraction Technique” [8]. Baig, Hasan,Jeong-A. Lee, and Jieun Lee. "Performance evaluation of CPU-GPU and CPU-only algorithms for detecting defective tablets through morphological imaging techniques." Information Systems and Technologies (CISTI),2012 7th Iberian Conference on.IEEE, 2012. [9]. Kitti, T., T. Jaruwan, and T. Chaiyapon. "An object recognition and identification system using the harris corner detection method." International Journal of Machine Learning and Computing 2.4 (2012): 462-465. [10]. Zakaria, Mohd Firdaus, Hoo Seng Choon, and Shahrel Azmin Suand. "Object Shape Recognition in Image for Machine Vision Application." International Journal of Computer Theory & Engineering 4.1 (2012). [11]. Baig, Hasan, et al. "Implementation of SCADA system for unsought tablets detection through morphological image processing." Multitopic Conference, 2008. INMIC 2008. IEEE International. IEEE, 2008. [12]. He, Li-Feng, Yu-Yan Chao, and Kenji Suzuki. "An algorithm for connected-component labeling, hole labeling and Euler number computing." Journal of Computer Science and Technology 28.3 (2013): 468-478. [13]. Khalil, M. I. "Car plate recognition using the template matching method."International Journal of Computer Theory and Engineering 2.5 (2010): 1793-8201