The raw data obtained directly from x-ray acquisition device may yield a comparatively poor image quality representation. In case of medical images human involvement and perception is of prime importance. It is a difficult task to interpret fine features in various contrast situations [5]. Dentists interpret the dental x-rays using their knowledge, perception and experience. So there is a chance of error in deciding the right medical treatment. Nowadays digital dental radiographs, in which enhancement is done automatically, are available but the system are very costly. Our algorithm will give alternate solution to this problem. It includes X-ray imaging & its processing for identifying the exact location & depth of damage in affected tooth. In this paper , we explore image segmentation using ISEF algorithm and active contour model to detect and diagnose the dental caries in case of decayed tooth.
ISEF based Identification of Dental Caries in Decayed Toothidescitation
Dental image processing is one of the emerging
fields in case of human identification in forensic sciences.
Dental x-rays have been quiet effective for the diagnosis and
detection of problems in tooth. This paper presents an add on
approach in the same area of medical biometrics to detect and
diagnose the dental caries in case of decayed tooth. The
enhancement and segmentation of digital dental x-ray image
is done by using Infinite Symmetric Exponential filter (Shen
Castan Algorithm). The aim of this paper will be to enhance
the extracted part of the tooth from digital dental x-ray, finding
edges corresponding to caries affected tooth and decide the
dental treatment like filling or Root Canal Treatment.
ISEF Based Identification of RCT/Filling in Dental Caries of Decayed ToothCSCJournals
Dental image processing is one of the emerging fields in case of human identification in forensic sciences. Dental x-rays have been quiet effective for the diagnosis and detection of problems in tooth. This paper presents an add on approach in the same area of medical biometrics to detect and diagnose the dental caries in case of decayed tooth. The enhancement and segmentation of digital dental x-ray image is done by using Infinite Symmetric Exponential filter (Shen Castan Algorithm). The aim of this paper will be to enhance the extracted part of the tooth from digital dental x-ray, finding edges corresponding to caries affected tooth and decide the dental treatment like filling or Root Canal Treatment.
Comparative Analysis of Face Recognition Algorithms for Medical ApplicationAM Publications
Biometric-based techniques have emerged for recognizing individuals authenticating people. In the field of
face recognition, plastic surgery based face recognition is still a lesser explored area. Thus the use of face recognition for
surgical faces introduces the new challenge for designing future face recognition system. Face recognition after plastic
surgery can lead to rejection of genuine users or acceptance of impostors. Transmuting facial geometry and texture
increases the intra-class variability between the pre- and post-surgery images of the same individual. Therefore, matching
post-surgery images with pre-surgery images becomes a difficult task for automatic face recognition algorithms. This paper
deals with testing of two popular face recognition algorithms on plastic surgery database such as PCA and LDA and
compared this algorithms based on Recognition Rate for better performance. Finally, the results are concluded.
A Survey : Iris Based Recognition SystemsEditor IJMTER
The security is one of the important aspect of today's life. Iris recognization is one of the leading
research of security which is used to identify the individual person. Usually iris based biometric is more better
than other biometric in terms of accuracy, fast, stability, uniqueness. The iris recognition system works by
capturing and storing biometric information and then compare scanned copy of iris biometric with the stored iris
images in the database. There are several Iris Based Recognition Systems are developed so far. In this paper we
presented several iris techniques and create a base for our future roadmap.
An Efficient Face Recognition Using Multi-Kernel Based Scale Invariant Featur...CSCJournals
Face recognition has gained significant attention in research community due to its wide range of commercial and law enforcement applications. Due to the developments in the past few decades, in the current scenario, face recognition is employing advanced feature identification techniques and matching methods. In spite of vast research done, face recognition still remains an open problem due to the challenges posed by illumination, occlusions, pose variation, scaling, etc. This paper is aimed at proposing a face recognition technique with high accuracy. It focuses on face recognition based on improved SIFT algorithm. In the proposed approach, the face features are extracted using a novel multi-kernel function (MKF) based SIFT technique. The classification is done using SVM classifier. Experimental results shows the superiority of the proposed algorithm over the SIFT technique. Evaluation of the proposed approach is done on CVL face database and experimental results shows that the proposed approach has a recognition rate of 99%.
ISEF based Identification of Dental Caries in Decayed Toothidescitation
Dental image processing is one of the emerging
fields in case of human identification in forensic sciences.
Dental x-rays have been quiet effective for the diagnosis and
detection of problems in tooth. This paper presents an add on
approach in the same area of medical biometrics to detect and
diagnose the dental caries in case of decayed tooth. The
enhancement and segmentation of digital dental x-ray image
is done by using Infinite Symmetric Exponential filter (Shen
Castan Algorithm). The aim of this paper will be to enhance
the extracted part of the tooth from digital dental x-ray, finding
edges corresponding to caries affected tooth and decide the
dental treatment like filling or Root Canal Treatment.
ISEF Based Identification of RCT/Filling in Dental Caries of Decayed ToothCSCJournals
Dental image processing is one of the emerging fields in case of human identification in forensic sciences. Dental x-rays have been quiet effective for the diagnosis and detection of problems in tooth. This paper presents an add on approach in the same area of medical biometrics to detect and diagnose the dental caries in case of decayed tooth. The enhancement and segmentation of digital dental x-ray image is done by using Infinite Symmetric Exponential filter (Shen Castan Algorithm). The aim of this paper will be to enhance the extracted part of the tooth from digital dental x-ray, finding edges corresponding to caries affected tooth and decide the dental treatment like filling or Root Canal Treatment.
Comparative Analysis of Face Recognition Algorithms for Medical ApplicationAM Publications
Biometric-based techniques have emerged for recognizing individuals authenticating people. In the field of
face recognition, plastic surgery based face recognition is still a lesser explored area. Thus the use of face recognition for
surgical faces introduces the new challenge for designing future face recognition system. Face recognition after plastic
surgery can lead to rejection of genuine users or acceptance of impostors. Transmuting facial geometry and texture
increases the intra-class variability between the pre- and post-surgery images of the same individual. Therefore, matching
post-surgery images with pre-surgery images becomes a difficult task for automatic face recognition algorithms. This paper
deals with testing of two popular face recognition algorithms on plastic surgery database such as PCA and LDA and
compared this algorithms based on Recognition Rate for better performance. Finally, the results are concluded.
A Survey : Iris Based Recognition SystemsEditor IJMTER
The security is one of the important aspect of today's life. Iris recognization is one of the leading
research of security which is used to identify the individual person. Usually iris based biometric is more better
than other biometric in terms of accuracy, fast, stability, uniqueness. The iris recognition system works by
capturing and storing biometric information and then compare scanned copy of iris biometric with the stored iris
images in the database. There are several Iris Based Recognition Systems are developed so far. In this paper we
presented several iris techniques and create a base for our future roadmap.
An Efficient Face Recognition Using Multi-Kernel Based Scale Invariant Featur...CSCJournals
Face recognition has gained significant attention in research community due to its wide range of commercial and law enforcement applications. Due to the developments in the past few decades, in the current scenario, face recognition is employing advanced feature identification techniques and matching methods. In spite of vast research done, face recognition still remains an open problem due to the challenges posed by illumination, occlusions, pose variation, scaling, etc. This paper is aimed at proposing a face recognition technique with high accuracy. It focuses on face recognition based on improved SIFT algorithm. In the proposed approach, the face features are extracted using a novel multi-kernel function (MKF) based SIFT technique. The classification is done using SVM classifier. Experimental results shows the superiority of the proposed algorithm over the SIFT technique. Evaluation of the proposed approach is done on CVL face database and experimental results shows that the proposed approach has a recognition rate of 99%.
Age Invariant Face Recognition using Convolutional Neural Network IJECEIAES
In the recent years, face recognition across aging has become very popular and challenging task in the area of face recognition. Many researchers have contributed in this area, but still there is a significant gap to fill in. Selection of feature extraction and classification algorithms plays an important role in this area. Deep Learning with Convolutional Neural Networks provides us a combination of feature extraction and classification in a single structure. In this paper, we have presented a novel idea of 7-Layer CNN architecture for solving the problem of aging for recognizing facial images across aging. We have done extensive experimentations to test the performance of the proposed system using two standard datasets FGNET and MORPH (Album II). Rank-1 recognition accuracy of our proposed system is 76.6% on FGNET and 92.5% on MORPH (Album II). Experimental results show the significant improvement over available state-of- the-arts with the proposed CNN architecture and the classifier.
An exploration of periocular region with reduced region for authentication re...csandit
Biometrics is science of measuring and statistically analyzing biological data. Biometric system
establishes identity of a person based on unique physical or behavioral characteristic possessed
by an individual. Behavioral biometrics measures characteristics which are acquired naturally
over time. Physical biometrics measures inherent physical characteristics on an individual.
Over the last few decades enormous attention is drawn towards ocular biometrics. Cues
provided by ocular region have led to exploration of newer traits. Feasibility of periocular
region as a useful biometric trait has been explored recently. With the promising results of
preliminary examination, research towards periocular region is currently gaining lot of
prominence. Researchers have analyzed various techniques of feature extraction and
classification in the periocular region. This paper investigates the effect of using Lower Central
Periocular Region (LCPR) for identification. The results obtained are comparable with those
acquired for full periocular texture features with an advantage of reduced periocular area.
AN EXPLORATION OF PERIOCULAR REGION WITH REDUCED REGION FOR AUTHENTICATION : ...cscpconf
Biometrics is science of measuring and statistically analyzing biological data. Biometric system establishes identity of a person based on unique physical or behavioral characteristic possessed by an individual. Behavioral biometrics measures characteristics which are acquired naturally over time. Physical biometrics measures inherent physical characteristics on an individual. Over the last few decades enormous attention is drawn towards ocular biometrics. Cues provided by ocular region have led to exploration of newer traits. Feasibility of periocular region as a useful biometric trait has been explored recently. With the promising results of preliminary examination, research towards periocular region is currently gaining lot of
prominence. Researchers have analyzed various techniques of feature extraction and classification in the periocular region. This paper investigates the effect of using Lower Central
Periocular Region (LCPR) for identification. The results obtained are comparable with those acquired for full periocular texture features with an advantage of reduced periocular area
A New Approach of Iris Detection and RecognitionIJECEIAES
This paper proposes an IRIS recognition and detection model for measuring the e-security. This proposed model consists of the following blocks: segmentation and normalization, feature encoding and feature extraction, and classification. In first phase, histogram equalization and canny edge detection is used for object detection. And then, Hough Transformation is utilized for detecting the center of the pupil of an IRIS. In second phase, Daugmen’s Rubber Sheet model and Log Gabor filter is used for normalization and encoding and as a feature extraction method GNS (Global Neighborhood Structure) map is used, finally extracted feature of GNS is feed to the SVM (Support Vector Machine) for training and testing. For our tested dataset, experimental results demonstrate 92% accuracy in real portion and 86% accuracy in imaginary portion for both eyes. In addition, our proposed model outperforms than other two conventional methods exhibiting higher accuracy.
ABSTRACT: a rigorous work on static and dynamic appearance based classification systems for face is on but, it is proving to be a challenging task for researchers to design a proper system since human face is complex one. Decades of work was and is focussed on how to classify a face and on how to increase the rate of classification but, little attention was paid to overcome redundancy in image classification. This paper presents a novel idea which focuses on redundancy check and its elimination. The paper after drawing inferences from previous work gives out a novel idea for exact face classification and elimination of redundancy.
Single Image Superresolution Based on Gradient Profile Sharpness1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Detection of Proximal Caries at The Molar Teeth Using Edge Enhancement Algori...IJECEIAES
Panoramic X-Ray produces the most common oral digital radiographic image that it used in dentistry practice. The image can further improve accuracy compared to analog one. This study aims to establish proximal caries edge on enhancement images so they can be easily recognized. The images were obtained from the Department of Radiology, General Hospital of M. Djamil Padang Indonesia. Total file of images to be tested were 101. Firstly, the images are analyzed by dentists who practiced at Segment Padang Hospital Indonesia. They concluded that there is proximal caries in 30 molar teeth. Furthermore, the images were processed using Matlab software with the following steps, i.e. cropping, enhancement, edge detection, and edge enhancement. The accuracy rate of detection of edge enhancement images being compared with that of dentist analysis was 73.3%. In the edge enhancement images proximal caries edge can be found conclusively in 22 teeth and dubiously in eight teeth. The results of this study convinced that edge enhancement images can be recommended to assist dentists in detecting proximal caries.
Happiness Expression Recognition at Different Age ConditionsEditor IJMTER
Recognition of different internal emotions of human face under various critical
conditions is a difficult task. Facial expression recognition with different age variations is
considered in this study. This paper emphasizes on recognition of facial expression like
happiness mood of nine persons using subspace methods. This paper mainly focuses on new
robust subspace method which is based on Proposed Euclidean Distance Score Level Fusion
(PEDSLF) using PCA, ICA, SVD methods. All these methods and new robust method is
tested with FGNET database. An automatic recognition of facial expressions is being carried
out. Comparative analysis results surpluses PEDSLF method is more accurate for happiness
emotional facial expression recognition.
In this paper, we present an automatic application of 3D face recognition system using geodesic distance in Riemannian geometry. We consider, in this approach, the three dimensional face images as residing in Riemannian manifold and we compute the geodesic distance using the Jacobi iterations as a solution of the Eikonal equation. The problem of solving the Eikonal equation, unstructured simplified meshes of 3D face surface, such as tetrahedral and triangles are important for accurately modeling material interfaces and curved domains, which are approximations to curved surfaces in R3. In the classifying steps, we use: Neural Networks (NN), K-Nearest Neighbor (KNN) and Support Vector Machines (SVM). To test this method and evaluate its performance, a simulation series of experiments were performed on 3D Shape REtrieval Contest 2008 database (SHREC2008).
The Indian Dental Academy is the Leader in continuing dental education , training dentists in all aspects of dentistry and
offering a wide range of dental certified courses in different formats.for more details please visit
www.indiandentalacademy.com
Medoid based model for face recognition using eigen and fisher facesijscmcj
Biometric technologies have gained a remarkable impetus in high security applications. Various biometric modalities are widely being used these days. The need for unobtrusive biometric recognition can be fulfilled through Face recognition which is the most natural and non intrusive authentication system. However the vulnerability to changes owing to variations in face due to various factors like pose,
illumination, ageing, emotions, expressions etc make it necessary to have robust face recognition systems.
Various statistical models have been developed so far with varying degree of accuracy and efficiency. This
paper discusses a new approach to utilize Eigen face and Fisher face methodology by using medoid instead
of mean as a statistic in calculating the Eigen faces and Fisher faces. The method not only requires lesser training but also demonstrates better time efficiency and performance compared to the conventional method of using mean
Gli attrezzi per pitturare casa - piccola guida pratica imbianchinoonline
Quando si vuole rinnovare la propria casa, si affida il compito ad un professionista, sapendo però che la spesa potrebbe essere anche abbastanza rilevante, in particolare se si decide di tinteggiare tutti i locali dell’abitazione. Se però si vuole risparmiare, si opta per il fai da te, praticabile soprattutto da chi possiede una buona manualità.
Age Invariant Face Recognition using Convolutional Neural Network IJECEIAES
In the recent years, face recognition across aging has become very popular and challenging task in the area of face recognition. Many researchers have contributed in this area, but still there is a significant gap to fill in. Selection of feature extraction and classification algorithms plays an important role in this area. Deep Learning with Convolutional Neural Networks provides us a combination of feature extraction and classification in a single structure. In this paper, we have presented a novel idea of 7-Layer CNN architecture for solving the problem of aging for recognizing facial images across aging. We have done extensive experimentations to test the performance of the proposed system using two standard datasets FGNET and MORPH (Album II). Rank-1 recognition accuracy of our proposed system is 76.6% on FGNET and 92.5% on MORPH (Album II). Experimental results show the significant improvement over available state-of- the-arts with the proposed CNN architecture and the classifier.
An exploration of periocular region with reduced region for authentication re...csandit
Biometrics is science of measuring and statistically analyzing biological data. Biometric system
establishes identity of a person based on unique physical or behavioral characteristic possessed
by an individual. Behavioral biometrics measures characteristics which are acquired naturally
over time. Physical biometrics measures inherent physical characteristics on an individual.
Over the last few decades enormous attention is drawn towards ocular biometrics. Cues
provided by ocular region have led to exploration of newer traits. Feasibility of periocular
region as a useful biometric trait has been explored recently. With the promising results of
preliminary examination, research towards periocular region is currently gaining lot of
prominence. Researchers have analyzed various techniques of feature extraction and
classification in the periocular region. This paper investigates the effect of using Lower Central
Periocular Region (LCPR) for identification. The results obtained are comparable with those
acquired for full periocular texture features with an advantage of reduced periocular area.
AN EXPLORATION OF PERIOCULAR REGION WITH REDUCED REGION FOR AUTHENTICATION : ...cscpconf
Biometrics is science of measuring and statistically analyzing biological data. Biometric system establishes identity of a person based on unique physical or behavioral characteristic possessed by an individual. Behavioral biometrics measures characteristics which are acquired naturally over time. Physical biometrics measures inherent physical characteristics on an individual. Over the last few decades enormous attention is drawn towards ocular biometrics. Cues provided by ocular region have led to exploration of newer traits. Feasibility of periocular region as a useful biometric trait has been explored recently. With the promising results of preliminary examination, research towards periocular region is currently gaining lot of
prominence. Researchers have analyzed various techniques of feature extraction and classification in the periocular region. This paper investigates the effect of using Lower Central
Periocular Region (LCPR) for identification. The results obtained are comparable with those acquired for full periocular texture features with an advantage of reduced periocular area
A New Approach of Iris Detection and RecognitionIJECEIAES
This paper proposes an IRIS recognition and detection model for measuring the e-security. This proposed model consists of the following blocks: segmentation and normalization, feature encoding and feature extraction, and classification. In first phase, histogram equalization and canny edge detection is used for object detection. And then, Hough Transformation is utilized for detecting the center of the pupil of an IRIS. In second phase, Daugmen’s Rubber Sheet model and Log Gabor filter is used for normalization and encoding and as a feature extraction method GNS (Global Neighborhood Structure) map is used, finally extracted feature of GNS is feed to the SVM (Support Vector Machine) for training and testing. For our tested dataset, experimental results demonstrate 92% accuracy in real portion and 86% accuracy in imaginary portion for both eyes. In addition, our proposed model outperforms than other two conventional methods exhibiting higher accuracy.
ABSTRACT: a rigorous work on static and dynamic appearance based classification systems for face is on but, it is proving to be a challenging task for researchers to design a proper system since human face is complex one. Decades of work was and is focussed on how to classify a face and on how to increase the rate of classification but, little attention was paid to overcome redundancy in image classification. This paper presents a novel idea which focuses on redundancy check and its elimination. The paper after drawing inferences from previous work gives out a novel idea for exact face classification and elimination of redundancy.
Single Image Superresolution Based on Gradient Profile Sharpness1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Detection of Proximal Caries at The Molar Teeth Using Edge Enhancement Algori...IJECEIAES
Panoramic X-Ray produces the most common oral digital radiographic image that it used in dentistry practice. The image can further improve accuracy compared to analog one. This study aims to establish proximal caries edge on enhancement images so they can be easily recognized. The images were obtained from the Department of Radiology, General Hospital of M. Djamil Padang Indonesia. Total file of images to be tested were 101. Firstly, the images are analyzed by dentists who practiced at Segment Padang Hospital Indonesia. They concluded that there is proximal caries in 30 molar teeth. Furthermore, the images were processed using Matlab software with the following steps, i.e. cropping, enhancement, edge detection, and edge enhancement. The accuracy rate of detection of edge enhancement images being compared with that of dentist analysis was 73.3%. In the edge enhancement images proximal caries edge can be found conclusively in 22 teeth and dubiously in eight teeth. The results of this study convinced that edge enhancement images can be recommended to assist dentists in detecting proximal caries.
Happiness Expression Recognition at Different Age ConditionsEditor IJMTER
Recognition of different internal emotions of human face under various critical
conditions is a difficult task. Facial expression recognition with different age variations is
considered in this study. This paper emphasizes on recognition of facial expression like
happiness mood of nine persons using subspace methods. This paper mainly focuses on new
robust subspace method which is based on Proposed Euclidean Distance Score Level Fusion
(PEDSLF) using PCA, ICA, SVD methods. All these methods and new robust method is
tested with FGNET database. An automatic recognition of facial expressions is being carried
out. Comparative analysis results surpluses PEDSLF method is more accurate for happiness
emotional facial expression recognition.
In this paper, we present an automatic application of 3D face recognition system using geodesic distance in Riemannian geometry. We consider, in this approach, the three dimensional face images as residing in Riemannian manifold and we compute the geodesic distance using the Jacobi iterations as a solution of the Eikonal equation. The problem of solving the Eikonal equation, unstructured simplified meshes of 3D face surface, such as tetrahedral and triangles are important for accurately modeling material interfaces and curved domains, which are approximations to curved surfaces in R3. In the classifying steps, we use: Neural Networks (NN), K-Nearest Neighbor (KNN) and Support Vector Machines (SVM). To test this method and evaluate its performance, a simulation series of experiments were performed on 3D Shape REtrieval Contest 2008 database (SHREC2008).
The Indian Dental Academy is the Leader in continuing dental education , training dentists in all aspects of dentistry and
offering a wide range of dental certified courses in different formats.for more details please visit
www.indiandentalacademy.com
Medoid based model for face recognition using eigen and fisher facesijscmcj
Biometric technologies have gained a remarkable impetus in high security applications. Various biometric modalities are widely being used these days. The need for unobtrusive biometric recognition can be fulfilled through Face recognition which is the most natural and non intrusive authentication system. However the vulnerability to changes owing to variations in face due to various factors like pose,
illumination, ageing, emotions, expressions etc make it necessary to have robust face recognition systems.
Various statistical models have been developed so far with varying degree of accuracy and efficiency. This
paper discusses a new approach to utilize Eigen face and Fisher face methodology by using medoid instead
of mean as a statistic in calculating the Eigen faces and Fisher faces. The method not only requires lesser training but also demonstrates better time efficiency and performance compared to the conventional method of using mean
Gli attrezzi per pitturare casa - piccola guida pratica imbianchinoonline
Quando si vuole rinnovare la propria casa, si affida il compito ad un professionista, sapendo però che la spesa potrebbe essere anche abbastanza rilevante, in particolare se si decide di tinteggiare tutti i locali dell’abitazione. Se però si vuole risparmiare, si opta per il fai da te, praticabile soprattutto da chi possiede una buona manualità.
an experimental investigation and comparative analysis on a four stroke cINFOGAIN PUBLICATION
An experimental analysis was made to investigate two non edible oils (hazelnut and palm), blending with neat diesel fuel with the proportions of 5%, 10%, 15%, 20% and 25% by volume and used as fuel in a single cylinder, four stroke, water cooled, Compression Ignition engine. Experimental tests were conducted by using the above bio-diesel blends as fuel operated with the above mentioned engine working at various loads. Performance parameters and exhaust emissions of hazelnut and crambe bio-diesel blends are compared with the same results of diesel fuel. Performance parameters selected to analyze are Brake Thermal Efficiency(BTHE), Brake Specific Fuel Consumption(BSFC) and Exhaust Gas Temperature(EGT) and exhaust emissions selected to investigate are Carbon Monoxide emissions(CO), Oxides Of Nitrogen(NOx) and smoke density(SD). From the results of all blends used as fuel in the engine, it is clarified that CI engine showing better performance by using a hazelnut bio-diesel blend with proportions of 20% hazelnut bio-diesel and 80% normal diesel fuel. Traditional Engine with bio-diesels as fuel are showing acceptable reduction in emissions like hydro carbons and oxides of carbon but with marginal increase in oxides of nitrogen compared with diesel fuel. But BTHE of Bio-diesel blend is less than the BTHE of diesel fuel operating in the same engine. From all the blends Hazelnut bio-diesel blends are giving better performance parameters and decreased emission characteristics hazelnut oil having better properties immediately after diesel fuel when compared with remaining bio-diesel blends.
Comparison of Executive Functions in Addicted Young People who Referred to Ad...INFOGAIN PUBLICATION
Background and aim of the study: The present study compares the executive functions between pre-university male students and young addicted people who referred to addiction treatment camps.Method: The study is a causal-comparative study. The sample of study consisted of two groups of 25 male students and young addicted people who referred to addiction treatment camps of Ardebill city in 2014-2015, with coordination of sex, education and public health factors. Data was collected through researcher general health questionnaire for primary screening, Wisconsin Card Sorting Test, Stroop Color Word Test and the Wechsler Digit Span subscale. Data were analyzed by multivariate variance analysis. Findings of the study: data analysis indicated that there is a significant difference between the executive functions of young addicted people who are in addiction treatment camps and healthy students.Conclusion: According to the gathered results, it’s likely that in addicts young, existence of neuropsychological anomalies such as weakness in executive function of response inhibition, Set shifting and updating of working memory, resulting in their weak performance compared to normal peers in the executive functions.
The Roadmap to the Electronic Voting System Development: A Literature ReviewINFOGAIN PUBLICATION
Since the start of the use of the electronic voting system, it has gone through numerous updates and upgrades. These upgrades and updates include changes from paper-ballot to a paperless, manual to technology, mechanical to electronic, offline to online, polling based stations to remote places and so on. In this paper, we briefly investigate the above issues of the electronic voting system as well as the development of its revolution and legalization, guidelines and recommendations, vulnerabilities and hacking, security and protection, and the alike in course of time.
effect of electrode material and geometry on edm performance for ohns dies s...INFOGAIN PUBLICATION
Modern EDM machinery is capable of machining micro-hole, thin slots, geometrically complex or hard material components, that are precise and difficult to machine, such as heat treated tool steels, composites, super alloys, etc. The studies of an experimental investigation evaluate the effects of EDM machining parameters such as MRR, EWR and Surface Roughness with two different electrode materials. The process parameters such as Input current, Pulse on time and duty cycle keeping flushing pressure constant. The full factorial design of experiment (L25) is used to study the effects of machining parameters. Investigations indicate that the output parameters of EDM increases with the increase in input current and the best machining rates are achieved with copper with through hole electrodes, better surface roughness compare to brass electrode. A brass electrode with higher input current and maximum pulse on time resulted in more EWR compared to copper electrodes. Also the increase in MRR by copper electrode, it improves the SR during Electric Discharge Machining.
Revista Matematica SupreMat Editoras:Aleiny Rojas Dayani Ramirez Aleiny Yairin Rojas
Revista SupreMat de Matematica es una revista para interactuar entre el Docente y el estudiante que busca ayudar o ser parte de el aprendizaje de los estudiantes y ayudar o ser parte de la enseñanza de los Docentes
Implementation of Lower Leg Bone Fracture Detection from X Ray Imagesijtsrd
A methodology and various techniques are presented for development of fracture detection system using digital image processing. This paper presents an implementation of bone fracture detection using medical X ray image. The goal of this paper is to generate a quick and diagnosis can save time, effort and cost as well as reduce errors. The main objective of this research is to classify the lower leg bone fracture using X ray image because this type of bone are the most commonly occur in bone. This paper classifies the two types of fracture Non fracture and fracture or Transverse fracture by using SVM classifier. The proposed system has basically five steps, namely, image acquisition, image pre processing, image segmentation, feature extraction and image classification. San Myint | Khaing Thinzar "Implementation of Lower Leg Bone Fracture Detection from X-Ray Images" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27957.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/27957/implementation-of-lower-leg-bone-fracture-detection-from-x-ray-images/san-myint
Indian Dental Academy: will be one of the most relevant and exciting
training center with best faculty and flexible training programs
for dental professionals who wish to advance in their dental
practice,Offers certified courses in Dental
implants,Orthodontics,Endodontics,Cosmetic Dentistry, Prosthetic
Dentistry, Periodontics and General Dentistry.
Diagnostic imaging / dental implant courses by Indian dental academy Indian dental academy
Description :
The Indian Dental Academy is the Leader in continuing dental education , training dentists in all aspects of dentistry and
offering a wide range of dental certified courses in different formats.for more details please visit
www.indiandentalacademy.com
The Indian Dental Academy is the Leader in continuing dental education , training dentists in all aspects of dentistry and
offering a wide range of dental certified courses in different formats.for more details please visit
www.indiandentalacademy.com
The paper holding a presentation of a system, which is recognizing peoples through their iris print and that by using Linear
Discriminant Analysis method. Which is characterized by the classification of a set of things in groups, these groups are observing a
group the features that describe the thing, and is characterized by finding a relationship which give rise to differences in the
dimensions of the iris image data from different varieties, and differences between the images in the same class and are less. This
Prototype proves a high efficiency on the process of classifying the patterns, the algorithms was applied and tested on MMU database,
and it gives good results with a ratio reaching up to 74%.
An Ear Recognition Method Based on Rotation Invariant Transformed DCT IJECEIAES
Human recognition systems have gained great importance recently in a wide range of applications like access, control, criminal investigation and border security. Ear is an emerging biometric which has rich and stable structure and can potentially be implemented reliably and cost efficiently. Thus human ear recognition has been researched widely and made greatly progress. High recognition rates which are reported in most existing methods can be reached only under closely controlled conditions. Actually a slight amount of rotation and translation which is inescapable would be injurious for system performance. In this paper, a method that uses a transformed type of DCT is implemented to extract meaningful features from ear images. This algorithm is quite robust to ear rotation, translation and illumination. The proposed method is experimented on two popular databases, i.e. USTB II and IIT Delhi II, which achieves significant improvement in the performance in comparison to other methods with good efficiency based on LBP, DSIFT and Gabor. Also because of considering only important coefficients, this method is faster compared to other methods.
Diagnostic imaging /certified fixed orthodontic courses by Indian dental acad...Indian dental academy
The Indian Dental Academy is the Leader in continuing dental education , training dentists in all aspects of dentistry and offering a wide range of dental certified courses in different formats.
The Indian Dental Academy is the Leader in continuing dental education , training dentists in all aspects of dentistry and offering a wide range of dental certified courses in different formats.
The Indian Dental Academy is the Leader in continuing dental education , training dentists in all aspects of dentistry and
offering a wide range of dental certified courses in different formats.for more details please visit
www.indiandentalacademy.com
Space analysis /certified fixed orthodontic courses by Indian dental academy Indian dental academy
The Indian Dental Academy is the Leader in continuing dental education , training dentists in all aspects of dentistry and offering a wide range of dental certified courses in different formats.
Indian dental academy provides dental crown & Bridge,rotary endodontics,fixed orthodontics,
Dental implants courses.for details pls visit www.indiandentalacademy.com ,or call
0091-9248678078
Diagnosis of Vertical Root Fracture Using Digital Radiography, Helical Comput...iosrjce
IOSR Journal of Dental and Medical Sciences is one of the speciality Journal in Dental Science and Medical Science published by International Organization of Scientific Research (IOSR). The Journal publishes papers of the highest scientific merit and widest possible scope work in all areas related to medical and dental science. The Journal welcome review articles, leading medical and clinical research articles, technical notes, case reports and others.
Image Processing of Panoramic Dental X-Ray for Identifying Proximal CariesTELKOMNIKA JOURNAL
This study aims to facilitate the identification of proximal caries in the Panoramic Dental
X-Ray image. Twenty-seven X-Ray images of proximal caries were elaborated. The images in
digital form were processed using Matlab and Multiple Morphological Gradients. The process
produced sharper images and clarifies the edges of the objects in the images. This makes the
characteristics of the proximal caries and the caries severity can be identified precisely.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
An Approach to Detecting Writing Styles Based on Clustering Techniquesambekarshweta25
An Approach to Detecting Writing Styles Based on Clustering Techniques
Authors:
-Devkinandan Jagtap
-Shweta Ambekar
-Harshit Singh
-Nakul Sharma (Assistant Professor)
Institution:
VIIT Pune, India
Abstract:
This paper proposes a system to differentiate between human-generated and AI-generated texts using stylometric analysis. The system analyzes text files and classifies writing styles by employing various clustering algorithms, such as k-means, k-means++, hierarchical, and DBSCAN. The effectiveness of these algorithms is measured using silhouette scores. The system successfully identifies distinct writing styles within documents, demonstrating its potential for plagiarism detection.
Introduction:
Stylometry, the study of linguistic and structural features in texts, is used for tasks like plagiarism detection, genre separation, and author verification. This paper leverages stylometric analysis to identify different writing styles and improve plagiarism detection methods.
Methodology:
The system includes data collection, preprocessing, feature extraction, dimensional reduction, machine learning models for clustering, and performance comparison using silhouette scores. Feature extraction focuses on lexical features, vocabulary richness, and readability scores. The study uses a small dataset of texts from various authors and employs algorithms like k-means, k-means++, hierarchical clustering, and DBSCAN for clustering.
Results:
Experiments show that the system effectively identifies writing styles, with silhouette scores indicating reasonable to strong clustering when k=2. As the number of clusters increases, the silhouette scores decrease, indicating a drop in accuracy. K-means and k-means++ perform similarly, while hierarchical clustering is less optimized.
Conclusion and Future Work:
The system works well for distinguishing writing styles with two clusters but becomes less accurate as the number of clusters increases. Future research could focus on adding more parameters and optimizing the methodology to improve accuracy with higher cluster values. This system can enhance existing plagiarism detection tools, especially in academic settings.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Literature Review Basics and Understanding Reference Management.pptx
an approach to identify caries in dental image
1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-6, June- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 744
An Approach to Identify Caries in Dental Image
A J Solanki
Lecturer, B & B Institute of Technology, V V Nagar, Gujarat, India
Abstract— The raw data obtained directly from x-ray
acquisition device may yield a comparatively poor image
quality representation. In case of medical images human
involvement and perception is of prime importance. It is a
difficult task to interpret fine features in various contrast
situations [5]. Dentists interpret the dental x-rays using
their knowledge, perception and experience. So there is a
chance of error in deciding the right medical treatment.
Nowadays digital dental radiographs, in which
enhancement is done automatically, are available but the
system are very costly. Our algorithm will give alternate
solution to this problem. It includes X-ray imaging & its
processing for identifying the exact location & depth of
damage in affected tooth. In this paper , we explore image
segmentation using ISEF algorithm and active contour
model to detect and diagnose the dental caries in case of
decayed tooth.
Keywords— Lesion, Enamel, RCT, caries, dentine, pulp,
ISEF, dental radiograph, dentistry, Canny edge
detection algorithm, Snake model.
I. INTRODUCTION
The process of extracting features, collecting & analysing
the useful image information for clinical diagnostics of
teeth is the prime need of today’s medical science [1]. In
this domain of dental image processing, most of the
research done is beneficial for forensic science experts for
the purpose of human identification. Moving a step ahead
in this domain of dentistry the diagnosis of dental diseases
from digital dental x-rays is being beneficial and helpful
for both doctor as well as patient. Bardia Yousefi et al. in
2012 improved the visibility of digital dental x-ray for
teeth, bone and canals using Laplacian transform along
with morphological operation. Wavelet transforms and
Bayesian classifier is used to classify teeth and canals
from resultant image [2]. Ştefan Oprea et al. in 2008
performed dental caries classification based on the edge
detection. The dental x-ray image is segmented into
individual tooth and then it is converted into binary image
of the tooth. The edge detection gives the outline of the
dental cavity. The number of carries affected pixels is
determined. The carries is classified as pulpal if black
caries region is adjacent to the white border enclosing the
tooth. If there exists two or more
number of black regions and the width of the black region
is less than 2 mm then it is Enamel carry [3].
Prof. G.A. Kulkarni et al. in 2011 proposed two degree
differential gray scale method for dental image
recognition. The two degree differential method isolated
the un-matched part of the two images and gave a
satisfied similar rate when the matching location was
found. If the matching location was not found, this
method enhanced the difference and reduced the similar
rate [1]. EyadHaj Said et al. in 2008 performed gray scale
stretching transformation for enhancement.
Morphological filtering like top-hat and bottom-hat filters
were used for segmentation. 2-D modified wavelet
kernels were used to detect boundaries of individual tooth
[4].
Dental caries is a major oral health problem in most
industrialised countries. The early manifestation of the
caries process is a small patch in enamel at the tooth
surface. The destruction spreads into the sensitive part of
the tooth beneath the enamel called dentine. The
weakened enamel then collapses to form a cavity and the
tooth is progressively destroyed. Infection of the dental
pulp will take place if dental caries are not treated at
proper time. Classification of dental diseases is decided
on the basis of certain criteria, such as based on either the
caries lesion is within the enamel, dentine or caries lesion
touches the pulp. Dental caries is visible in the x-rays.
Image processing techniques will help check the x-rays
and detect the depth to which the caries lesion is present
and then classify the type of caries present in the dental x-
rays. Dental treatment is also dependent on this
classification. If caries is developed up to the enamel, it is
classified as enamel caries and if caries extended up to the
dentine then it is classified as dentinal caries. In above
two cases, filling is the best solution. And if caries
extended up to the pulp then it is known as pulpal caries,
RCT (Root Canal Treatment) is the required treatment.
In this paper, we have applied two optimal edge detection
techniques, ISEF (Infinite Symmetric Exponential Filter)
and active contour model. The paper has been divided in
to five parts. Section 2 gives the detail explanation of
ISEF edge detection technique. In section 3 we discuss
about active contour model. Section 4 gives the result of
both the techniques and Section 5 gives comparison
between the result obtained from ISEF and active contour
model .
II. EDGE DETECTION USING ISEF [10]
There are many edge detection techniques, available in
the literature but Shen Castan algorithm is the optimal
edge detector[10] . Edge detection of caries affected tooth
is done by ISEF (Infinite Symmetric Exponential Filter).
TABLE.I:ISEF Algorithm
Sr.No Steps
1 Apply ISEF Filter in X direction
2 Apply ISEF Filter in Y direction
3 Apply Binary Laplacian Technique
4 Apply Non Maxima Suppression
5 Find the Gradient
6 Apply Hysteresis Thresholding
2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-6, June- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 745
Shen Castan Infinite Symmetric Exponential Filter is an
optimal edge detector. First the whole image will be
filtered by the recursive ISEF filter in X and Y direction
respectively which can be implemented by using
following equations:
Recursion in x direction:
Recursion in y direction:
b=thinning factor (0<b<1)
Subtract the filtered image from the original image to
obtain the Laplacian image. In the filtered image, there
will be zero crossing in the second derivative at the
location of an edge pixel because the first derivative of
the image function should have an extreme at the position
corresponding to the edge in image. Non maxima
suppression is used for thinning purpose for false zero
crossing. The gradient is either a maximum or a minimum
at the edge pixel. If the second derivative changes sign
from positive to negative, it is known as positive zero
crossing and if it changes sign from negative to positive,
it is known as negative zero crossing. We will permit
positive zero crossing to have positive gradient and
negative zero crossing to have negative gradient. We
considered all other zero crossing as false zero crossing.
Thresholding is applied on gradient image. One cutoff is
used in simple thresholding but Shen-Castan suggests for
Hysteresis thresholding in which two cut offs are used.
Thresholding is applied on the output of an edge detector
to decide significant edges. Noise will create spurious
response to the single edge that will create a streaking
problem. Streaking is defined by breaking up of the edge
contour caused by the operator fluctuating above and
below the threshold.
Hysteresis thresholding is used to eliminate streaking
problem. Individual weak responses usually correspond to
noise, but if these points are connected to any of the
pixels with strong responses, they are more likely to be
actual edge in the image. Such connected pixels are
treated as edge pixels if their response is above a low
threshold. The ISEF algorithm is given in table I.
III. CARIES DETECTION USING SNAKE MODEL
The active contours replica (also called snakes) was first
introduces by Kass, Witkin, and Terzopoulos (1987) for
objective boundary identification. It is defined by an
energy function.the energy functional, which is
minimized is a weighted combinational of internal &
external forces The internal forces serve to impose a
peace wise smoothness constrain. External forces are
responsible for putting the snake near desired local
minimum. By minimizing the energy function, each snake
contour point iteratively finds its new situation to move
toward object boundaries. The model planned in Kass et
al. (1988) performs a global investigate to minimize the
energy function. Later, a number of techniques were
proposed to decrease the computational complexity of
snakes (Williams & Shah, 1992; Lam & Yan, 1994;
Mirhosseini & Yan, 1997).
The contour is described in the (x, y) plane of an image as
a parametric curve (s) = (x(s),
y(s)) -------------- (7)
Contour is said to take an energy (E snake) which is defined
as the sum of the three energy terms.
------- -------------------- ---(8)
The energy terms are described cleverly in a way such
that the final location of the contour will have a minimum
energy (E min). Therefore our difficulty of obtaining
objects decreases to an energy minimization difficulty.
Internal Energy (E int)
Internal energy depends on the intrinsic property of the
curve and addition of elastic energy and bending energy.
Elastic Energy (E elastic)
The curve is care for as an elastic rubber band possessing
elastic potential energy. It dispirit extending by
introducing tension
---------
----------------------------(9)
Where,
----------
---------------------------(10)
Weight α(s) permits us to control elastic energy beside
diverse parts of the contour. α used for many applications
& responsible for shrinking of the contour.
Bending Energy (E bending)
The snake is also considered to behave like a thin metal
strip giving rise to bending energy. It is defined as sum of
squared curvature of the contour.
Total internal energy of the snake can be defined as
--------------------------(11)
[ ]
( )
( )
[ ] [ ]
[ ]
( )
( )
[ ] [ ]
[ ] [ ] [ ] )3(1,,,
)2(..1,1...,1,,,
)1(..1,...1,1,,,
21
12
11
1
1
1
1
KKKKKKKKKKKKKK
L
KK
++=
==++=
==−+=
+
−
+
−
jijijir
MiNjjibjiIji
MiNjjibjiIji
yy
y
b
b
by
y
b
b
y
[ ]
( )
( )
[ ] [ ]
[ ]
( )
( )
[ ] [ ]
[ ] [ ] [ ] )6(,1,,
)5(..1,1...,,1,,
)4(..1,...1,,1,,
21
12
11
1
1
1
1
KKKKKKKKKKKKKK
K
KK
jijijiy
NjMijibjiIji
NjMijibjiIji
yy
y
b
b
by
y
b
b
y
++=
==++=
==−+=
+
−
+
−
int intsnake ernal external constraE E E E= + +
21
( ) | |
2
elastic sE s v ds= α∫s
( )
s
d v s
v
d s
=
21
( ) | |
2
b e n d i n g s s
s
E s v d s= β∫
3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-6, June- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 746
---------(12)
External energy of the contour (E ext)
It is obtained from the image. Define a function E image
(x,y) so that it obtain on its smaller values at the features
of interest, such as boundaries
-----
-----------------------(13)
IV. RESULTS AND DISCUSSION
A. Results of Shen Castan’s Algorithm:
Dental treatment is dependent on the caries development
up to the enamel, dentine and pulp region.
For this diagnosis we suggest a technique as briefed in
Table-II. The detail description of the same is explained
below it.
TABLE.II:SUGGESTED TECHNIQUE
Sr
.No.
Steps
1 Acquire digital dental images.
2 Convert image in to gray scale image.
3 Apply morphological and filtering operations
for image
enhancement.
4 Extraction of caries affected tooth from image.
5 Edge detection using ISEF (Infinite
Symmetric
Exponential Filter).
6 Detection and decision based on caries
extension inside the tooth
Dental x-ray images are RGB images, so to reduce the
complexity level and time consumption, these images are
converted into gray scale images.
Image enhancement is the required task for dental x-ray
image as step 3 of table I suggests. In periapical view, as
shown in figure 1, we classify three main classes of
“objects”; teeth, gum, and air. An area with “bright” gray
scales (except for the pulp tissue) consists tooth area
while areas with “mid-range” gray scales consists gum
area, and “dark” gray scales indicates air. For better
segmentation,[11] it is desirable to convert poor quality
dental x-rays in to considerable degree of contrast
between the dominant gray scales used in capturing the
different classes of objects.[7]
Fig.1: Paraipical view of Dental Radiograph
{Courtesy: Dr. Ronak Panchal}
Top-hat and bottom-hat filters are applied on the original
image to achieve an enhanced and desired image for
further processing [6],[9]. Enhanced image is shown in
figure 2.
Fig.2: Enhanced Dental X-ray
Step 4 of table II is caries affected tooth extraction. We
extract caries affected tooth from the dental X-rays by
image cropping operation, so that caries affected area can
be visible more properly as shown in figure 3.
Fig.3: Caries affected Tooth
Fig.4:Output of ISEF
(LT=30% of maximum intensity
HT=70% of maximum intensity)
2 2
int
1
| | | | )
2
elastic bending s ss
s
E E E v v ds= + = (α +β∫
( ( ))ext image
s
E E v s ds= ∫
4. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-6, June- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 747
B. Results of snake Model:
16 points 50
iterations
16 points 100
iterations
16 points 150
iterations
22 points 50
iterations
22 points 100
iterations
22 points 150
iterations
17 points 50
iterations
17 points 100
iterations
17 points 150
iterations
Fig.5: Points and iterations in active contour model
V. DISCUSSION
We used two approaches for finding caries in caries
affected tooth. Using Shen Castan Edge detection method,
we find out edge of the caries affected tooth from which
we can identify proper treatment like RCT or filling, but
We have to select caries affected tooth manually from
periapical dental image. Whereas active contour model is
a semi automatic approach in which we have to select
initial points around the interested area and define
iterations. It will find out caries affected area
automatically. More iterations define accurate location of
caries.
REFERENCES
[1] G.A.Kulkarni , A.S.Bhide, D.G. Patil,
S.S.G.B.C.O.E. & T., Bhusawal, “Two Degree
Greyscale Differential Method for Teeth Image
Recognition”, International Journal of computer
Application, 2012
[2] B. Yousefi , H. Hakim, N. Motahir, P. Yousefi1, M.
M.Hosseini, “Visibility Enhancement of Digital
Dental X-Ray for RCT Application Using Bayesian
classifier and Two Times Wavelet Image Fusion”,
Journal of American Science, pp 7-13, 2012
[3] Ş. Oprea, C. Marinescu , I. Liţă, M. Jurianu, D. A.
Vişan, I. B. Cioc, “ Image Processing Techniques
used for Dental X-Ray Image Analysis” ,
Electronics Technology, ISSE 2008, pp 125-129
[4] E. H, said, G. Fahmy, D. nassar, H. Amar, "dental
X-ray image segmentation" Biometric Technology
for Human Identification, Proceedings of the SPIE,
Vol. 5404, pp. 409-417, 2004.
[5] S. Kiattisin, A. Leelasantitham, K. Chamnongthai ,
K. Higuchi, “ A Match of X-ray Teeth Films Using
Image processing Based on Special Features of
Teeth” , SICE Annual Conference 2008, pp 35-39
[6] S. Dighe, R. Shriram, “Pre-processing,
Segmentation and Matching of Dental Radiographs
used in Dental Biometrics”, International Journal of
Science and Applied Information Technology,
Volume 1, No.2, pp 52-56, May – June 2012
[7] R. B. Tiwari, Prof. A. R. Yardi, “Dental x-ray image
enhancement based on human visual system and
local image statistics”., International Conference on
Image Processing, Computer Vision and Pattern
Recognition, 2006, pp 100-108
[8] O. Nomir, M. A. Mottaleb. “A system for human
identification from X-ray dental radiographs,”
Pattern Recognition 38 (2005), pp 1295 – 1305.
[9] S. L. S. Abdullaha, H. A. Hambalia, N. Jamilc,
“Segmentation of Natural Images Using an
Improved Thresholding-based Technique”,
International Symposium on Robotics and Intelligent
Sensors 2012 (IRIS 2012), pp 938-944
[10]C. K. Modi , K. J. Pithadiya ,J. D.Chauhan, K. R.
Jain, “ Comparative study of Optimal edge
detection algorithms for liquid level inspection in
Bottles”, International conference on Emerging
Trends in Engineering and Technology , pp 447-
452, 2009 .
[11]E. H. Said, D. E. M. Nassar, G. Fahmy, H. H.
Ammar. "Teeth segmentation in digitized dental X-
ray films using mathematical morphology," IEEE
Transactions on information forensic and security,
vol. 1, Issue. 2, pp. 178-189, June. 2006.
[12]O. Gormeza, H. H.Yilmazb,” Image Post Processing
in Dental Practice”, European Journal of Dentistry
,October 2009 - Vol.3.
[13]S. Shah, A. Abaza, A. Ross, H. Ammar.” Automatic
Tooth Segmentation Using Active Contour Without
Edges”, In Biometric Consortium Conference, 2006
Biometrics Symposium: Special Session on
Research at the, pp. 1-6. IEEE, 2006.
[14]M. Analoui. “Radiographic image enhancement.
Part I: spatial domain techniques”, Dento
maxillofacial Radiology (2001) 30, pp 1-9.
[15]Du Jian-qiang, Lu Yan-sheng1, Zhu Ming-feng,
Zhang Kang, Ding Cheng-hua “A Novel
Algorithm of Color Tongue Image
Segmentation Based on HSI” 2008
International Conference on BioMedical Engineering
and Informatics.
[16]ZHAI Xue-ming, LU Hang-dong, ZHANG Li-
zhong “Application of Image Segmentation
Technique in Tongue Diagnosis” 2000
International Forumon Information Technology and
Applications.