SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 1, Ver. II (Jan.-Feb. 2017), PP 55-60
www.iosrjournals.org
DOI: 10.9790/0661-1901025560 www.iosrjournals.org 55 | Page
Application of Digital Image Processing in Drug Industry
Huvaida Manzoor
Abstract: Digital Image Processing is a very vast field It has many applications in every field and one such
application is in drug industry. Drug Industry is leading industry. Manufacturing process in drug Industry is
increasing day by day as we are dependent on these medicines. But these medicines might be defected, tablets
may be broken, there may be missing tablet in a strip and consumption of such drugs might be dangerous. This
paper shows different methods in digital image processing technique to find the defects in tablets. Four methods
are used in order to detect the defect in tablet strip.
Keywords: Digital Image Processing, Morphology opening, Template Matching, Mathematical Manipulation,
Euler’s number
I. Introduction
Digital image processing techniques and algorithms are applied on images in order to remove error. In
this paper, different digital image processing techniques are used to detect the defect in tablet strip
[1][2][4][5][6][7].Such defected tablets are harmful to consume and may have many side effects. The inspection
process is effective to detect the defects in tablets. Four techniques are used that is morphology operation(MO),
Template Matching(TM), Mathematical Manipulation(MM) and Euler’s Method(EM) to defect the different
defects in tablet strip. All the techniques are implemented in MATLAB 10. Figure 1 shows such defected tablet
strips.
Figure 1 Different Tablet strips with defect (a) Missing Tablet (b) Broken Tablet (c) Hole in Tablet.
II. Methodology
a) Morphology Operation technique(MO)
b) Template Matching(TM)
c) Mathematical manipulation(MM)
d) Euler’s Method(EM)
Morphology Operation
Morphological operations are affecting the form, structure or shape of an object. Applied on binary
images (black & white images – Images with only 2 colors: black and white). They are used in pre or post
processing (filtering, thinning, and pruning) or for getting a representation or description of the shape of
objects/regions (boundaries, skeletons convex hulls). Morphological operations apply a structuring element to
an input image, creating an output image of the same size. In a morphological operation, the value of each pixel
in the output image is based on a comparison of the corresponding pixel in the input image with its neighbors.
By choosing the size and shape of the neighborhood, you can construct a morphological operation that is
sensitive to specific shapes in the input image [1][3][8][11].
Morphology is of following types:
 Dilation: Dilation allows objects to expand, thus potentially filling in small holes and connecting disjoint
objects.
 Erosion: Erosion shrinks objects by etching away (eroding) their boundaries.
 Opening: Morphological opening is used to remove small objects from an image while preserving the shape
and size of larger objects in the image. Morphology opening is simply erosion followed by dilation. The
opening has the effect of removing objects that cannot completely contain the structuring element.
 Closing: Closing is opening performed in reverse. It is defined simply as dilation followed by erosion.
Erosion using the same structuring element for both operations.
Application of Digital Image Processing in Drug Industry
DOI: 10.9790/0661-1901025560 www.iosrjournals.org 56 | Page
Template Matching (TM)
Technique used in classifying objects. Template matching techniques compare portions of images
against one another[1][9][10][13]. Sample image may be used to recognize similar objects in source image. If
standard deviation of the template image compared to the source image is small enough, template matching may
be used. Templates are most often used to identify printed characters, numbers, and other small, simple objects.
For example original image is of tablet packet containing ten tablets. Like morphology operation image is first
converted into gray and then to binary. The binary image is then filtered in order to remove noise and edges are
detected using canny edge detection. A template is selected and is compared with rest of the tablets In this way
defected tablet can be found. The Template Matching block finds the best match of a template within an input
image. The block computes match metric values by shifting a template over a region of interest or the entire
image, and then finds the best match location.
Mathematical Manipulation (MM)
MM is used to find the defect in tablets.MM calculates the mathematical values. No. of tablets are
calculated which helps to determine the correct figure in a tablet strip. Counting can also help to find the
pharmaceutical company. They can simply discard the strip containing less or greater no. of tablets.
Euler’s Method(EM)
Tablet which is having any hole is detected by using Euler’s number of binary image. Euler’s number
is used to detect the holes in an object; we used this function in tablets having holes. Euler’s number is the
number of objects minus the number of holes [12].
Eu=N-H …...........................................(1)
Where Eu,N and H are Euler’s number, number of objects, number of holes respectively.
Also, H=N-Eu …………………………… (2)
Therefore, from the above equation number of holes is equal to the number of objects minus the
Euler’s number. For finding Euler’s number, image should be binary. Therefore, image is converted into binary.
Euler’s number tells whether tablet is having any hole or not. After finding Euler’s number, position of tablet is
detected. Also connected component of binary image is detected. Connected components in a binary image are a
set of pixels that form a connected group. From this we also get image size, list of pixels belonging to each
connected component. If the Euler’s number is negative, it indicates that the number of holes is greater than the
number of objects. Euler’s number will detect whether the tablet is having any hole or not. After finding the
presence of hole next step is to detect the position of hole. In order to detect the position of hole, we use simple
arithmetic operation. Tablet with hole and without hole are subtracted.
III. Proposed Work
The proposed work is divided into four parts, that is
a. Morphology Operation technique(MO)
b. Template Matching(TM)
c. Mathematical manipulation(MM)
d. Euler’s Method(EM)
All the above techniques are summarized in one block diagram as shown in figure 2
Figure 2 Block Diagram
Application of Digital Image Processing in Drug Industry
DOI: 10.9790/0661-1901025560 www.iosrjournals.org 57 | Page
It is clearly shown in figure 2 that MO detects the broken tablet in tablet strip, TM, MM detects broken as well
as missing tablet in tablet strip and EF detects hole in tablet strip.
a) Steps for MO
1. Capture an image of a tablet packet without any defect.
2. Convert this image into gray image.
3. Convert gray image into binary image
4. Apply morphology opening on binary image. Morphology opening will remove noise from the image.
5. Dilate the opened Image. Dilation will expand the image and will make the image big.
6. Calculate the no. of pixels of binary image.
7. Now capture the same tablet packet with broken/missing part.
8. Apply the same process that is applied on tablet packet without any defect.
9. When defected packet is found, beep will be generated.
10. Subtract the two images
11. Missing part of tablet and position of defect is obtained.
12. Filter it by using morphology opening technique which removes the noise.
b) Steps for Template Matching
1. Read an template image (defected or broken tablet).
2. Crop the image
3. Read the image of defected tablet packet.
4. Crop the image
5. Use normalized cross correlation to detect the position of defected tablet
6. Position of defected tablet found.
c) Steps for MM
1. Capture the image of tablet Strip
2. Convert the image into gray image
3. Convert gray image into binary image
4. Apply Morphology Opening on binary image. Morphology opening will remove noise from the image.
5. Boundaries of the output are detected after pre-processing.
6. After this process determine the roundness of the tablet, Find area and perimeter of each tablet
7. After calculating area and perimeter, find the metric. Metric closer to 1 indicates that tablet is not broken or
is completely round.
d) Steps for EM
1. Input image is first pre-processed. Pre-processing involves conversion from RGB to gray image then to
binary image. Binary image is then cleaned using morphology opening.
2. Pseudocolor is applied on opened image.
3. Connected objects is found.
4. Find the Euler’s number.
5. If Euler’s no. is equal to zero then the tablet is without hole else tablet is with hole and will ring beep.
6. Boundaries of the output are detected after pre processing.
7. After this process determine the roundness of tablet, find area and perimeter of each tablet.
8. After calculating area and perimeter, find the metric. Metric closer to 1 indicates that tablet is not broken or
is completely round.
IV. Results And Discussion
Simulation Result of MO
Figure 3 Pre-processing of Tablet Strip
Tablet without defect Gray level image of tablet without defect
Binary image of tablet without defect Tablet with defect
Gray level image of tablet with defect Binary image of tablet with defect
Application of Digital Image Processing in Drug Industry
DOI: 10.9790/0661-1901025560 www.iosrjournals.org 58 | Page
Figure 4 Morphology Opening process
Figure 5 Defect detected
It is clearly shown in figure 3,4,5 how defected tablet is detected in tablet strip.
At the end of program command window displays following information.
Simulation Result of TM
Figure 6 Tablet strip with broken part
Morphology opening of Tablet without defect Morphology opening of Tablet with defect
Dilation of image Tablet without defect Dilation of Tablet with defect
Defect found after subtraction Opening of output after subtraction
Application of Digital Image Processing in Drug Industry
DOI: 10.9790/0661-1901025560 www.iosrjournals.org 59 | Page
Figure 7 Broken tablet detected
Figure 8 Missing Tablet detected
It is clear from figure 7 and 8 that template matching detects broken as well as missing tablet
Simulation Result of MM
Figure 9 Shows defect detected by using MM
Figure 10 Missing Tablet detected in tablet strip
Simulation Result of EF
Figure 11 Holes in Tablet Strip
Metrics closer to 1 indicate that the tablet is approximately round
No. of Tablets Found:9
0.96
0.95
0.95
0.96
0.94 0.95
0.95
0.95
0.94
Input Image Gray Image Binary Image
Cleaned Image Pseudocolor Image
Application of Digital Image Processing in Drug Industry
DOI: 10.9790/0661-1901025560 www.iosrjournals.org 60 | Page
Figure 12 Message indicating presence of hole
At the end of program command window is displayed with above information.
V. Conclusion
This paper presents the application in drug industry using digital image Processing technique. It is
implemented on MATLAB 10. Four techniques are used that is MO, TM, MM and EF to defect the different
defects in tablet strip. MO detects the broken tablet in tablet strip, TM, MM detects broken as well as missing
tablet in tablet strip and EF detects hole in tablet strip.
References
[1]. Huvaida Manzoor, Yogeshwar SinghRandhawa-Comparative studies of algorithms using Digital Image Processing in Drug Industry
–published at: “International Journal of Scientific and Research Publications (IJSRP), Volume 4,Issue 4,April 2014 Edition”.
[2]. Manzoor,Huvaida, and Yogeshwer Singh Randhawa. "Edge Detection in Digital Image Using Statistical Method."
[3]. Ştefan Oprea, Ioan Liţă, Mariana Jurianu, Daniel Alexandru Vişan, Ion Bogdan Cioc, “Digital Image Processing Applied in Drugs
Industry for Detection of Broken Aspirin Tablets” Electronics,Communications and Computers Department, University of Pitesti
Str.Targul din Vale Nr. 1 Pitesti, Romania,2008
[4]. El-Khamy,S.E., Lotfy,M., El-Yamany,N.A.,“A Modified Fuzzy Sobel Edge Detector”,17. National Radio Science Conference,
Feb.22-24 2000, Minufiya University, Egypt
[5]. Hardeep Kaur and Er.Nidhi Garg, “Inspection of Defective Pharmaceutical Capsules using Harris Algorithm”, International Journal
of Advances in Electronics Engineering,2009
[6]. Peng Zhao and Shutao Li “Tablets Vision Inspection Approach Using Fourier Descriptors and Support Vector Machines” The 9th
International Conference for Young Computer Scientists,2008.
[7]. Ramya.S,,Suchitra.J,Nadesh R.K” Detection of Broken Pharmaceutical Drugs using Enhanced Feature Extraction Technique”
[8]. Baig, Hasan,Jeong-A. Lee, and Jieun Lee. "Performance evaluation of CPU-GPU and CPU-only algorithms for detecting defective
tablets through morphological imaging techniques." Information Systems and Technologies (CISTI),2012 7th Iberian Conference
on.IEEE, 2012.
[9]. Kitti, T., T. Jaruwan, and T. Chaiyapon. "An object recognition and identification system using the harris corner detection
method." International Journal of Machine Learning and Computing 2.4 (2012): 462-465.
[10]. Zakaria, Mohd Firdaus, Hoo Seng Choon, and Shahrel Azmin Suand. "Object Shape Recognition in Image for Machine Vision
Application." International Journal of Computer Theory & Engineering 4.1 (2012).
[11]. Baig, Hasan, et al. "Implementation of SCADA system for unsought tablets detection through morphological image processing."
Multitopic Conference, 2008. INMIC 2008. IEEE International. IEEE, 2008.
[12]. He, Li-Feng, Yu-Yan Chao, and Kenji Suzuki. "An algorithm for connected-component labeling, hole labeling and Euler number
computing." Journal of Computer Science and Technology 28.3 (2013): 468-478.
[13]. Khalil, M. I. "Car plate recognition using the template matching method."International Journal of Computer Theory and
Engineering 2.5 (2010): 1793-8201

More Related Content

What's hot

Q0460398103
Q0460398103Q0460398103
Q0460398103
IJERA Editor
 
Medical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set MethodMedical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set Method
IOSR Journals
 
Fuzzy Logic based Edge Detection Method for Image Processing
Fuzzy Logic based Edge Detection Method for Image Processing  Fuzzy Logic based Edge Detection Method for Image Processing
Fuzzy Logic based Edge Detection Method for Image Processing
IJECEIAES
 
A Novel Approach To Detection and Evaluation of Resampled Tampered Images
A Novel Approach To Detection and Evaluation of Resampled Tampered ImagesA Novel Approach To Detection and Evaluation of Resampled Tampered Images
A Novel Approach To Detection and Evaluation of Resampled Tampered Images
CSCJournals
 
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
IJERA Editor
 
L045066671
L045066671L045066671
L045066671
IJERA Editor
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
Color Image Segmentation Technique Using “Natural Grouping” of Pixels
Color Image Segmentation Technique Using “Natural Grouping” of PixelsColor Image Segmentation Technique Using “Natural Grouping” of Pixels
Color Image Segmentation Technique Using “Natural Grouping” of Pixels
CSCJournals
 
Improvement and Enhancement Point Search Algorithm
Improvement and Enhancement Point Search AlgorithmImprovement and Enhancement Point Search Algorithm
Improvement and Enhancement Point Search Algorithm
IJCSIS Research Publications
 
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHMPERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
AM Publications
 
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLSMIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
AM Publications
 
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGES
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGESTEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGES
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGES
IJCI JOURNAL
 
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...
csandit
 
Fuzzy Region Merging Using Fuzzy Similarity Measurement on Image Segmentation
Fuzzy Region Merging Using Fuzzy Similarity Measurement  on Image Segmentation  Fuzzy Region Merging Using Fuzzy Similarity Measurement  on Image Segmentation
Fuzzy Region Merging Using Fuzzy Similarity Measurement on Image Segmentation
IJECEIAES
 
Image Processing Algorithm for Fruit Identification
Image Processing Algorithm for Fruit IdentificationImage Processing Algorithm for Fruit Identification
Image Processing Algorithm for Fruit Identification
IRJET Journal
 
Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...
Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...
Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...
IJERA Editor
 
Wound epithelization model by 3 d imaging
Wound epithelization model by 3 d imagingWound epithelization model by 3 d imaging
Wound epithelization model by 3 d imaging
eSAT Publishing House
 
Detection of hard exudates using simulated annealing based thresholding mecha...
Detection of hard exudates using simulated annealing based thresholding mecha...Detection of hard exudates using simulated annealing based thresholding mecha...
Detection of hard exudates using simulated annealing based thresholding mecha...
csandit
 

What's hot (19)

Q0460398103
Q0460398103Q0460398103
Q0460398103
 
Medical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set MethodMedical Image Segmentation Based on Level Set Method
Medical Image Segmentation Based on Level Set Method
 
Fuzzy Logic based Edge Detection Method for Image Processing
Fuzzy Logic based Edge Detection Method for Image Processing  Fuzzy Logic based Edge Detection Method for Image Processing
Fuzzy Logic based Edge Detection Method for Image Processing
 
A Novel Approach To Detection and Evaluation of Resampled Tampered Images
A Novel Approach To Detection and Evaluation of Resampled Tampered ImagesA Novel Approach To Detection and Evaluation of Resampled Tampered Images
A Novel Approach To Detection and Evaluation of Resampled Tampered Images
 
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
 
L045066671
L045066671L045066671
L045066671
 
K011138084
K011138084K011138084
K011138084
 
G011134454
G011134454G011134454
G011134454
 
Color Image Segmentation Technique Using “Natural Grouping” of Pixels
Color Image Segmentation Technique Using “Natural Grouping” of PixelsColor Image Segmentation Technique Using “Natural Grouping” of Pixels
Color Image Segmentation Technique Using “Natural Grouping” of Pixels
 
Improvement and Enhancement Point Search Algorithm
Improvement and Enhancement Point Search AlgorithmImprovement and Enhancement Point Search Algorithm
Improvement and Enhancement Point Search Algorithm
 
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHMPERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
PERFORMANCE ANALYSIS USING SINGLE SEEDED REGION GROWING ALGORITHM
 
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLSMIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
MIP AND UNSUPERVISED CLUSTERING FOR THE DETECTION OF BRAIN TUMOUR CELLS
 
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGES
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGESTEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGES
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGES
 
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...
 
Fuzzy Region Merging Using Fuzzy Similarity Measurement on Image Segmentation
Fuzzy Region Merging Using Fuzzy Similarity Measurement  on Image Segmentation  Fuzzy Region Merging Using Fuzzy Similarity Measurement  on Image Segmentation
Fuzzy Region Merging Using Fuzzy Similarity Measurement on Image Segmentation
 
Image Processing Algorithm for Fruit Identification
Image Processing Algorithm for Fruit IdentificationImage Processing Algorithm for Fruit Identification
Image Processing Algorithm for Fruit Identification
 
Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...
Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...
Implementing Tumor Detection and Area Calculation in Mri Image of Human Brain...
 
Wound epithelization model by 3 d imaging
Wound epithelization model by 3 d imagingWound epithelization model by 3 d imaging
Wound epithelization model by 3 d imaging
 
Detection of hard exudates using simulated annealing based thresholding mecha...
Detection of hard exudates using simulated annealing based thresholding mecha...Detection of hard exudates using simulated annealing based thresholding mecha...
Detection of hard exudates using simulated annealing based thresholding mecha...
 

Similar to Application of Digital Image Processing in Drug Industry

An application of morphological
An application of morphologicalAn application of morphological
An application of morphological
Naresh Chilamakuri
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm for
prjpublications
 
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUESDIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
AM Publications
 
EDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATION
EDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATIONEDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATION
EDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATION
IJEEE
 
Statistical Feature based Blind Classifier for JPEG Image Splice Detection
Statistical Feature based Blind Classifier for JPEG Image Splice DetectionStatistical Feature based Blind Classifier for JPEG Image Splice Detection
Statistical Feature based Blind Classifier for JPEG Image Splice Detection
rahulmonikasharma
 
IMAGE RESTORATION BASED ON MORPHOLOGICAL OPERATIONS
IMAGE RESTORATION BASED ON MORPHOLOGICAL OPERATIONSIMAGE RESTORATION BASED ON MORPHOLOGICAL OPERATIONS
IMAGE RESTORATION BASED ON MORPHOLOGICAL OPERATIONS
ijcseit
 
Image restoration based on morphological operations
Image restoration based on morphological operationsImage restoration based on morphological operations
Image restoration based on morphological operations
ijcseit
 
F0342032038
F0342032038F0342032038
F0342032038
ijceronline
 
Ijartes v1-i2-008
Ijartes v1-i2-008Ijartes v1-i2-008
Ijartes v1-i2-008
IJARTES
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
CSCJournals
 
IMAGE COMPOSITE DETECTION USING CUSTOMIZED
IMAGE COMPOSITE DETECTION USING CUSTOMIZEDIMAGE COMPOSITE DETECTION USING CUSTOMIZED
IMAGE COMPOSITE DETECTION USING CUSTOMIZED
ijcga
 
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...Feature Extraction for Image Classification and Analysis with Ant Colony Opti...
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...
sipij
 
Comparative Study and Analysis of Image Inpainting Techniques
Comparative Study and Analysis of Image Inpainting TechniquesComparative Study and Analysis of Image Inpainting Techniques
Comparative Study and Analysis of Image Inpainting Techniques
IOSR Journals
 
AE 497 Spring 2015 Final Report
AE 497 Spring 2015 Final ReportAE 497 Spring 2015 Final Report
AE 497 Spring 2015 Final Report
Catherine McCarthy
 
Human Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew AlgorithmHuman Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew Algorithm
IOSRjournaljce
 
Lecture 15 image morphology examples
Lecture 15 image morphology examplesLecture 15 image morphology examples
Lecture 15 image morphology examples
Marwa Ahmeid
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
IJCI JOURNAL
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
IJCI JOURNAL
 
Comparative analysis and evaluation of image imprinting algorithms
Comparative analysis and evaluation of image imprinting algorithmsComparative analysis and evaluation of image imprinting algorithms
Comparative analysis and evaluation of image imprinting algorithms
Alexander Decker
 
Ijetcas14 447
Ijetcas14 447Ijetcas14 447
Ijetcas14 447
Iasir Journals
 

Similar to Application of Digital Image Processing in Drug Industry (20)

An application of morphological
An application of morphologicalAn application of morphological
An application of morphological
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm for
 
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUESDIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
 
EDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATION
EDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATIONEDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATION
EDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATION
 
Statistical Feature based Blind Classifier for JPEG Image Splice Detection
Statistical Feature based Blind Classifier for JPEG Image Splice DetectionStatistical Feature based Blind Classifier for JPEG Image Splice Detection
Statistical Feature based Blind Classifier for JPEG Image Splice Detection
 
IMAGE RESTORATION BASED ON MORPHOLOGICAL OPERATIONS
IMAGE RESTORATION BASED ON MORPHOLOGICAL OPERATIONSIMAGE RESTORATION BASED ON MORPHOLOGICAL OPERATIONS
IMAGE RESTORATION BASED ON MORPHOLOGICAL OPERATIONS
 
Image restoration based on morphological operations
Image restoration based on morphological operationsImage restoration based on morphological operations
Image restoration based on morphological operations
 
F0342032038
F0342032038F0342032038
F0342032038
 
Ijartes v1-i2-008
Ijartes v1-i2-008Ijartes v1-i2-008
Ijartes v1-i2-008
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
 
IMAGE COMPOSITE DETECTION USING CUSTOMIZED
IMAGE COMPOSITE DETECTION USING CUSTOMIZEDIMAGE COMPOSITE DETECTION USING CUSTOMIZED
IMAGE COMPOSITE DETECTION USING CUSTOMIZED
 
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...Feature Extraction for Image Classification and Analysis with Ant Colony Opti...
Feature Extraction for Image Classification and Analysis with Ant Colony Opti...
 
Comparative Study and Analysis of Image Inpainting Techniques
Comparative Study and Analysis of Image Inpainting TechniquesComparative Study and Analysis of Image Inpainting Techniques
Comparative Study and Analysis of Image Inpainting Techniques
 
AE 497 Spring 2015 Final Report
AE 497 Spring 2015 Final ReportAE 497 Spring 2015 Final Report
AE 497 Spring 2015 Final Report
 
Human Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew AlgorithmHuman Face Detection Systemin ANew Algorithm
Human Face Detection Systemin ANew Algorithm
 
Lecture 15 image morphology examples
Lecture 15 image morphology examplesLecture 15 image morphology examples
Lecture 15 image morphology examples
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
Comparative analysis and evaluation of image imprinting algorithms
Comparative analysis and evaluation of image imprinting algorithmsComparative analysis and evaluation of image imprinting algorithms
Comparative analysis and evaluation of image imprinting algorithms
 
Ijetcas14 447
Ijetcas14 447Ijetcas14 447
Ijetcas14 447
 

More from IOSRjournaljce

3D Visualizations of Land Cover Maps
3D Visualizations of Land Cover Maps3D Visualizations of Land Cover Maps
3D Visualizations of Land Cover Maps
IOSRjournaljce
 
Comparison between Cisco ACI and VMWARE NSX
Comparison between Cisco ACI and VMWARE NSXComparison between Cisco ACI and VMWARE NSX
Comparison between Cisco ACI and VMWARE NSX
IOSRjournaljce
 
Student’s Skills Evaluation Techniques using Data Mining.
Student’s Skills Evaluation Techniques using Data Mining.Student’s Skills Evaluation Techniques using Data Mining.
Student’s Skills Evaluation Techniques using Data Mining.
IOSRjournaljce
 
Classification Techniques: A Review
Classification Techniques: A ReviewClassification Techniques: A Review
Classification Techniques: A Review
IOSRjournaljce
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
IOSRjournaljce
 
Architecture of Cloud Computing
Architecture of Cloud ComputingArchitecture of Cloud Computing
Architecture of Cloud Computing
IOSRjournaljce
 
An Experimental Study of Diabetes Disease Prediction System Using Classificat...
An Experimental Study of Diabetes Disease Prediction System Using Classificat...An Experimental Study of Diabetes Disease Prediction System Using Classificat...
An Experimental Study of Diabetes Disease Prediction System Using Classificat...
IOSRjournaljce
 
Candidate Ranking and Evaluation System based on Digital Footprints
Candidate Ranking and Evaluation System based on Digital FootprintsCandidate Ranking and Evaluation System based on Digital Footprints
Candidate Ranking and Evaluation System based on Digital Footprints
IOSRjournaljce
 
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
IOSRjournaljce
 
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
IOSRjournaljce
 
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection SystemThe Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
IOSRjournaljce
 
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
IOSRjournaljce
 
An E-Governance Web Security Survey
An E-Governance Web Security SurveyAn E-Governance Web Security Survey
An E-Governance Web Security Survey
IOSRjournaljce
 
Exploring 3D-Virtual Learning Environments with Adaptive Repetitions
Exploring 3D-Virtual Learning Environments with Adaptive RepetitionsExploring 3D-Virtual Learning Environments with Adaptive Repetitions
Exploring 3D-Virtual Learning Environments with Adaptive Repetitions
IOSRjournaljce
 
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
IOSRjournaljce
 
Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...
IOSRjournaljce
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
IOSRjournaljce
 
Panorama Technique for 3D Animation movie, Design and Evaluating
Panorama Technique for 3D Animation movie, Design and EvaluatingPanorama Technique for 3D Animation movie, Design and Evaluating
Panorama Technique for 3D Animation movie, Design and Evaluating
IOSRjournaljce
 
Density Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri ImageDensity Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri Image
IOSRjournaljce
 
Analysis of the Waveform of the Acoustic Emission Signal via Analogue Modulat...
Analysis of the Waveform of the Acoustic Emission Signal via Analogue Modulat...Analysis of the Waveform of the Acoustic Emission Signal via Analogue Modulat...
Analysis of the Waveform of the Acoustic Emission Signal via Analogue Modulat...
IOSRjournaljce
 

More from IOSRjournaljce (20)

3D Visualizations of Land Cover Maps
3D Visualizations of Land Cover Maps3D Visualizations of Land Cover Maps
3D Visualizations of Land Cover Maps
 
Comparison between Cisco ACI and VMWARE NSX
Comparison between Cisco ACI and VMWARE NSXComparison between Cisco ACI and VMWARE NSX
Comparison between Cisco ACI and VMWARE NSX
 
Student’s Skills Evaluation Techniques using Data Mining.
Student’s Skills Evaluation Techniques using Data Mining.Student’s Skills Evaluation Techniques using Data Mining.
Student’s Skills Evaluation Techniques using Data Mining.
 
Classification Techniques: A Review
Classification Techniques: A ReviewClassification Techniques: A Review
Classification Techniques: A Review
 
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud ComputingAnalyzing the Difference of Cluster, Grid, Utility & Cloud Computing
Analyzing the Difference of Cluster, Grid, Utility & Cloud Computing
 
Architecture of Cloud Computing
Architecture of Cloud ComputingArchitecture of Cloud Computing
Architecture of Cloud Computing
 
An Experimental Study of Diabetes Disease Prediction System Using Classificat...
An Experimental Study of Diabetes Disease Prediction System Using Classificat...An Experimental Study of Diabetes Disease Prediction System Using Classificat...
An Experimental Study of Diabetes Disease Prediction System Using Classificat...
 
Candidate Ranking and Evaluation System based on Digital Footprints
Candidate Ranking and Evaluation System based on Digital FootprintsCandidate Ranking and Evaluation System based on Digital Footprints
Candidate Ranking and Evaluation System based on Digital Footprints
 
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
Multi Class Cervical Cancer Classification by using ERSTCM, EMSD & CFE method...
 
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
The Systematic Methodology for Accurate Test Packet Generation and Fault Loca...
 
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection SystemThe Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
The Use of K-NN and Bees Algorithm for Big Data Intrusion Detection System
 
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
 
An E-Governance Web Security Survey
An E-Governance Web Security SurveyAn E-Governance Web Security Survey
An E-Governance Web Security Survey
 
Exploring 3D-Virtual Learning Environments with Adaptive Repetitions
Exploring 3D-Virtual Learning Environments with Adaptive RepetitionsExploring 3D-Virtual Learning Environments with Adaptive Repetitions
Exploring 3D-Virtual Learning Environments with Adaptive Repetitions
 
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
Value Based Decision Control: Preferences Portfolio Allocation, Winer and Col...
 
Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...Assessment of the Approaches Used in Indigenous Software Products Development...
Assessment of the Approaches Used in Indigenous Software Products Development...
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
 
Panorama Technique for 3D Animation movie, Design and Evaluating
Panorama Technique for 3D Animation movie, Design and EvaluatingPanorama Technique for 3D Animation movie, Design and Evaluating
Panorama Technique for 3D Animation movie, Design and Evaluating
 
Density Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri ImageDensity Driven Image Coding for Tumor Detection in mri Image
Density Driven Image Coding for Tumor Detection in mri Image
 
Analysis of the Waveform of the Acoustic Emission Signal via Analogue Modulat...
Analysis of the Waveform of the Acoustic Emission Signal via Analogue Modulat...Analysis of the Waveform of the Acoustic Emission Signal via Analogue Modulat...
Analysis of the Waveform of the Acoustic Emission Signal via Analogue Modulat...
 

Recently uploaded

KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 

Recently uploaded (20)

KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 

Application of Digital Image Processing in Drug Industry

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 1, Ver. II (Jan.-Feb. 2017), PP 55-60 www.iosrjournals.org DOI: 10.9790/0661-1901025560 www.iosrjournals.org 55 | Page Application of Digital Image Processing in Drug Industry Huvaida Manzoor Abstract: Digital Image Processing is a very vast field It has many applications in every field and one such application is in drug industry. Drug Industry is leading industry. Manufacturing process in drug Industry is increasing day by day as we are dependent on these medicines. But these medicines might be defected, tablets may be broken, there may be missing tablet in a strip and consumption of such drugs might be dangerous. This paper shows different methods in digital image processing technique to find the defects in tablets. Four methods are used in order to detect the defect in tablet strip. Keywords: Digital Image Processing, Morphology opening, Template Matching, Mathematical Manipulation, Euler’s number I. Introduction Digital image processing techniques and algorithms are applied on images in order to remove error. In this paper, different digital image processing techniques are used to detect the defect in tablet strip [1][2][4][5][6][7].Such defected tablets are harmful to consume and may have many side effects. The inspection process is effective to detect the defects in tablets. Four techniques are used that is morphology operation(MO), Template Matching(TM), Mathematical Manipulation(MM) and Euler’s Method(EM) to defect the different defects in tablet strip. All the techniques are implemented in MATLAB 10. Figure 1 shows such defected tablet strips. Figure 1 Different Tablet strips with defect (a) Missing Tablet (b) Broken Tablet (c) Hole in Tablet. II. Methodology a) Morphology Operation technique(MO) b) Template Matching(TM) c) Mathematical manipulation(MM) d) Euler’s Method(EM) Morphology Operation Morphological operations are affecting the form, structure or shape of an object. Applied on binary images (black & white images – Images with only 2 colors: black and white). They are used in pre or post processing (filtering, thinning, and pruning) or for getting a representation or description of the shape of objects/regions (boundaries, skeletons convex hulls). Morphological operations apply a structuring element to an input image, creating an output image of the same size. In a morphological operation, the value of each pixel in the output image is based on a comparison of the corresponding pixel in the input image with its neighbors. By choosing the size and shape of the neighborhood, you can construct a morphological operation that is sensitive to specific shapes in the input image [1][3][8][11]. Morphology is of following types:  Dilation: Dilation allows objects to expand, thus potentially filling in small holes and connecting disjoint objects.  Erosion: Erosion shrinks objects by etching away (eroding) their boundaries.  Opening: Morphological opening is used to remove small objects from an image while preserving the shape and size of larger objects in the image. Morphology opening is simply erosion followed by dilation. The opening has the effect of removing objects that cannot completely contain the structuring element.  Closing: Closing is opening performed in reverse. It is defined simply as dilation followed by erosion. Erosion using the same structuring element for both operations.
  • 2. Application of Digital Image Processing in Drug Industry DOI: 10.9790/0661-1901025560 www.iosrjournals.org 56 | Page Template Matching (TM) Technique used in classifying objects. Template matching techniques compare portions of images against one another[1][9][10][13]. Sample image may be used to recognize similar objects in source image. If standard deviation of the template image compared to the source image is small enough, template matching may be used. Templates are most often used to identify printed characters, numbers, and other small, simple objects. For example original image is of tablet packet containing ten tablets. Like morphology operation image is first converted into gray and then to binary. The binary image is then filtered in order to remove noise and edges are detected using canny edge detection. A template is selected and is compared with rest of the tablets In this way defected tablet can be found. The Template Matching block finds the best match of a template within an input image. The block computes match metric values by shifting a template over a region of interest or the entire image, and then finds the best match location. Mathematical Manipulation (MM) MM is used to find the defect in tablets.MM calculates the mathematical values. No. of tablets are calculated which helps to determine the correct figure in a tablet strip. Counting can also help to find the pharmaceutical company. They can simply discard the strip containing less or greater no. of tablets. Euler’s Method(EM) Tablet which is having any hole is detected by using Euler’s number of binary image. Euler’s number is used to detect the holes in an object; we used this function in tablets having holes. Euler’s number is the number of objects minus the number of holes [12]. Eu=N-H …...........................................(1) Where Eu,N and H are Euler’s number, number of objects, number of holes respectively. Also, H=N-Eu …………………………… (2) Therefore, from the above equation number of holes is equal to the number of objects minus the Euler’s number. For finding Euler’s number, image should be binary. Therefore, image is converted into binary. Euler’s number tells whether tablet is having any hole or not. After finding Euler’s number, position of tablet is detected. Also connected component of binary image is detected. Connected components in a binary image are a set of pixels that form a connected group. From this we also get image size, list of pixels belonging to each connected component. If the Euler’s number is negative, it indicates that the number of holes is greater than the number of objects. Euler’s number will detect whether the tablet is having any hole or not. After finding the presence of hole next step is to detect the position of hole. In order to detect the position of hole, we use simple arithmetic operation. Tablet with hole and without hole are subtracted. III. Proposed Work The proposed work is divided into four parts, that is a. Morphology Operation technique(MO) b. Template Matching(TM) c. Mathematical manipulation(MM) d. Euler’s Method(EM) All the above techniques are summarized in one block diagram as shown in figure 2 Figure 2 Block Diagram
  • 3. Application of Digital Image Processing in Drug Industry DOI: 10.9790/0661-1901025560 www.iosrjournals.org 57 | Page It is clearly shown in figure 2 that MO detects the broken tablet in tablet strip, TM, MM detects broken as well as missing tablet in tablet strip and EF detects hole in tablet strip. a) Steps for MO 1. Capture an image of a tablet packet without any defect. 2. Convert this image into gray image. 3. Convert gray image into binary image 4. Apply morphology opening on binary image. Morphology opening will remove noise from the image. 5. Dilate the opened Image. Dilation will expand the image and will make the image big. 6. Calculate the no. of pixels of binary image. 7. Now capture the same tablet packet with broken/missing part. 8. Apply the same process that is applied on tablet packet without any defect. 9. When defected packet is found, beep will be generated. 10. Subtract the two images 11. Missing part of tablet and position of defect is obtained. 12. Filter it by using morphology opening technique which removes the noise. b) Steps for Template Matching 1. Read an template image (defected or broken tablet). 2. Crop the image 3. Read the image of defected tablet packet. 4. Crop the image 5. Use normalized cross correlation to detect the position of defected tablet 6. Position of defected tablet found. c) Steps for MM 1. Capture the image of tablet Strip 2. Convert the image into gray image 3. Convert gray image into binary image 4. Apply Morphology Opening on binary image. Morphology opening will remove noise from the image. 5. Boundaries of the output are detected after pre-processing. 6. After this process determine the roundness of the tablet, Find area and perimeter of each tablet 7. After calculating area and perimeter, find the metric. Metric closer to 1 indicates that tablet is not broken or is completely round. d) Steps for EM 1. Input image is first pre-processed. Pre-processing involves conversion from RGB to gray image then to binary image. Binary image is then cleaned using morphology opening. 2. Pseudocolor is applied on opened image. 3. Connected objects is found. 4. Find the Euler’s number. 5. If Euler’s no. is equal to zero then the tablet is without hole else tablet is with hole and will ring beep. 6. Boundaries of the output are detected after pre processing. 7. After this process determine the roundness of tablet, find area and perimeter of each tablet. 8. After calculating area and perimeter, find the metric. Metric closer to 1 indicates that tablet is not broken or is completely round. IV. Results And Discussion Simulation Result of MO Figure 3 Pre-processing of Tablet Strip Tablet without defect Gray level image of tablet without defect Binary image of tablet without defect Tablet with defect Gray level image of tablet with defect Binary image of tablet with defect
  • 4. Application of Digital Image Processing in Drug Industry DOI: 10.9790/0661-1901025560 www.iosrjournals.org 58 | Page Figure 4 Morphology Opening process Figure 5 Defect detected It is clearly shown in figure 3,4,5 how defected tablet is detected in tablet strip. At the end of program command window displays following information. Simulation Result of TM Figure 6 Tablet strip with broken part Morphology opening of Tablet without defect Morphology opening of Tablet with defect Dilation of image Tablet without defect Dilation of Tablet with defect Defect found after subtraction Opening of output after subtraction
  • 5. Application of Digital Image Processing in Drug Industry DOI: 10.9790/0661-1901025560 www.iosrjournals.org 59 | Page Figure 7 Broken tablet detected Figure 8 Missing Tablet detected It is clear from figure 7 and 8 that template matching detects broken as well as missing tablet Simulation Result of MM Figure 9 Shows defect detected by using MM Figure 10 Missing Tablet detected in tablet strip Simulation Result of EF Figure 11 Holes in Tablet Strip Metrics closer to 1 indicate that the tablet is approximately round No. of Tablets Found:9 0.96 0.95 0.95 0.96 0.94 0.95 0.95 0.95 0.94 Input Image Gray Image Binary Image Cleaned Image Pseudocolor Image
  • 6. Application of Digital Image Processing in Drug Industry DOI: 10.9790/0661-1901025560 www.iosrjournals.org 60 | Page Figure 12 Message indicating presence of hole At the end of program command window is displayed with above information. V. Conclusion This paper presents the application in drug industry using digital image Processing technique. It is implemented on MATLAB 10. Four techniques are used that is MO, TM, MM and EF to defect the different defects in tablet strip. MO detects the broken tablet in tablet strip, TM, MM detects broken as well as missing tablet in tablet strip and EF detects hole in tablet strip. References [1]. Huvaida Manzoor, Yogeshwar SinghRandhawa-Comparative studies of algorithms using Digital Image Processing in Drug Industry –published at: “International Journal of Scientific and Research Publications (IJSRP), Volume 4,Issue 4,April 2014 Edition”. [2]. Manzoor,Huvaida, and Yogeshwer Singh Randhawa. "Edge Detection in Digital Image Using Statistical Method." [3]. Ştefan Oprea, Ioan Liţă, Mariana Jurianu, Daniel Alexandru Vişan, Ion Bogdan Cioc, “Digital Image Processing Applied in Drugs Industry for Detection of Broken Aspirin Tablets” Electronics,Communications and Computers Department, University of Pitesti Str.Targul din Vale Nr. 1 Pitesti, Romania,2008 [4]. El-Khamy,S.E., Lotfy,M., El-Yamany,N.A.,“A Modified Fuzzy Sobel Edge Detector”,17. National Radio Science Conference, Feb.22-24 2000, Minufiya University, Egypt [5]. Hardeep Kaur and Er.Nidhi Garg, “Inspection of Defective Pharmaceutical Capsules using Harris Algorithm”, International Journal of Advances in Electronics Engineering,2009 [6]. Peng Zhao and Shutao Li “Tablets Vision Inspection Approach Using Fourier Descriptors and Support Vector Machines” The 9th International Conference for Young Computer Scientists,2008. [7]. Ramya.S,,Suchitra.J,Nadesh R.K” Detection of Broken Pharmaceutical Drugs using Enhanced Feature Extraction Technique” [8]. Baig, Hasan,Jeong-A. Lee, and Jieun Lee. "Performance evaluation of CPU-GPU and CPU-only algorithms for detecting defective tablets through morphological imaging techniques." Information Systems and Technologies (CISTI),2012 7th Iberian Conference on.IEEE, 2012. [9]. Kitti, T., T. Jaruwan, and T. Chaiyapon. "An object recognition and identification system using the harris corner detection method." International Journal of Machine Learning and Computing 2.4 (2012): 462-465. [10]. Zakaria, Mohd Firdaus, Hoo Seng Choon, and Shahrel Azmin Suand. "Object Shape Recognition in Image for Machine Vision Application." International Journal of Computer Theory & Engineering 4.1 (2012). [11]. Baig, Hasan, et al. "Implementation of SCADA system for unsought tablets detection through morphological image processing." Multitopic Conference, 2008. INMIC 2008. IEEE International. IEEE, 2008. [12]. He, Li-Feng, Yu-Yan Chao, and Kenji Suzuki. "An algorithm for connected-component labeling, hole labeling and Euler number computing." Journal of Computer Science and Technology 28.3 (2013): 468-478. [13]. Khalil, M. I. "Car plate recognition using the template matching method."International Journal of Computer Theory and Engineering 2.5 (2010): 1793-8201