This document provides an overview of medical image segmentation techniques. It discusses fundamental medical image processing steps such as image capture, enhancement, segmentation, and feature extraction. Various segmentation methods are reviewed, including thresholding, region-based, edge detection, and hybrid techniques. The document emphasizes the need for developing robust segmentation methods that can recognize malignant growths early to improve cancer treatment outcomes.
FUZZY SEGMENTATION OF MRI CEREBRAL TISSUE USING LEVEL SET ALGORITHMAM Publications
The current study investigated a median filter with the fuzzy level set method to propose fuzzy segmentation of magnetic resonance imaging (MRI) cerebral tissue images. An MRI image was used as an input image. A median filter and fuzzy c-means (FCM) clustering were utilized to remove image noise and create image clusters, respectively. The image clusters showed initial and final cluster centers. The level set method was then used for segmentation after separating and extracting white matter from gray matter. Fuzzy c-means was sensitive to the choice of the initial cluster center. Improper center selection caused the method to produce suboptimal solutions. The proposed algorithm was successfully utilized to segment MRI cerebral tissue images. The algorithm efficiently performed segmentation of test MRI cerebral tissue images compared with algorithms proposed in previous studies.
DETERMINATION OF BREAST CANCER AREA FROM MAMMOGRAPHY IMAGES USING THRESHOLDIN...AM Publications
This document discusses a study that used thresholding methods to determine the area of breast cancer from mammography images. Mammography images from three projections (oblique, lateral, cranial caudal) of patients with breast cancer were analyzed. The images were segmented using thresholding to separate the cancer area from the background. Morphological operations were also used to improve segmentation and remove noise. The calculated breast cancer areas for the three projections were 4.49 cm2, 3.03 cm2, and 2.58 cm2 respectively. Thresholding was able to accurately segment the images and calculate the cancer areas, aiding medical professionals in diagnosis and treatment.
Adaptive K-Means Clustering Algorithm for MR Breast Image Segmentation
3D Brain Tumor Segmentation Scheme using K-mean Clustering and Connected Component Labeling Algorithms
Volume Identification and Estimation of MRI Brain Tumor
MRI Breast cancer diagnosis hybrid approach using adaptive Ant-based segmentation and Multilayer Perceptron NN classifier
Lec8: Medical Image Segmentation (II) (Region Growing/Merging)Ulaş Bağcı
. Region Growing algorithm
• Homogeneity Criteria
• Split/Merge algorithm
• Examples from CT, MRI, PET
• Limitations
Image Filtering, Enhancement, Noise Reduction, and Signal Processing • MedicalImageRegistration • MedicalImageSegmentation • MedicalImageVisualization • Machine Learning in Medical Imaging • Shape Modeling/Analysis of Medical Images Deep Learning in Radiology
This document summarizes a research paper on segmenting and classifying brain tumors in MRI images using cellular automata and neural networks. The researchers first use co-occurrence matrices and run length features to automatically select seed points in abnormal tumor regions. A cellular automata algorithm then performs seeded segmentation on the images to detect and highlight the tumor region. Finally, the images are classified into normal, benign, or malignant categories using texture features and a radial basis function neural network. The neural network approach provides fast and accurate tumor classification compared to other methods. In summary, this paper presents an automatic method for segmenting and classifying brain tumors in MRI images based on cellular automata for segmentation and neural networks for classification.
brain tumor detection by thresholding approachSahil Prajapati
This technical paper proposes a method for detecting tumors in MRI brain images using thresholding and morphological operations. The methodology involves preprocessing images using sharpening filters, histogram equalization, and median filtering. Threshold segmentation is then used to create binary images, and morphological operations like erosion and dilation are applied. Finally, tumor regions are extracted using image subtraction, which removes closely packed pixels. The authors found that this approach, combining thresholding with morphological operations and subtraction, was effective at detecting and segmenting tumor regions in MRI brain images.
The document outlines the methodology for brain tumor detection from MRI images. It involves four main stages: pre-processing, skull stripping, segmentation, and feature extraction. In pre-processing, MRI images are converted to grayscale and filters are applied to remove noise. Skull stripping removes non-brain tissues. Segmentation uses Otsu's thresholding and watershed methods to separate brain regions. Feature extraction uses morphological operators to extract the tumor region by subtracting it from the original grayscale image.
FUZZY SEGMENTATION OF MRI CEREBRAL TISSUE USING LEVEL SET ALGORITHMAM Publications
The current study investigated a median filter with the fuzzy level set method to propose fuzzy segmentation of magnetic resonance imaging (MRI) cerebral tissue images. An MRI image was used as an input image. A median filter and fuzzy c-means (FCM) clustering were utilized to remove image noise and create image clusters, respectively. The image clusters showed initial and final cluster centers. The level set method was then used for segmentation after separating and extracting white matter from gray matter. Fuzzy c-means was sensitive to the choice of the initial cluster center. Improper center selection caused the method to produce suboptimal solutions. The proposed algorithm was successfully utilized to segment MRI cerebral tissue images. The algorithm efficiently performed segmentation of test MRI cerebral tissue images compared with algorithms proposed in previous studies.
DETERMINATION OF BREAST CANCER AREA FROM MAMMOGRAPHY IMAGES USING THRESHOLDIN...AM Publications
This document discusses a study that used thresholding methods to determine the area of breast cancer from mammography images. Mammography images from three projections (oblique, lateral, cranial caudal) of patients with breast cancer were analyzed. The images were segmented using thresholding to separate the cancer area from the background. Morphological operations were also used to improve segmentation and remove noise. The calculated breast cancer areas for the three projections were 4.49 cm2, 3.03 cm2, and 2.58 cm2 respectively. Thresholding was able to accurately segment the images and calculate the cancer areas, aiding medical professionals in diagnosis and treatment.
Adaptive K-Means Clustering Algorithm for MR Breast Image Segmentation
3D Brain Tumor Segmentation Scheme using K-mean Clustering and Connected Component Labeling Algorithms
Volume Identification and Estimation of MRI Brain Tumor
MRI Breast cancer diagnosis hybrid approach using adaptive Ant-based segmentation and Multilayer Perceptron NN classifier
Lec8: Medical Image Segmentation (II) (Region Growing/Merging)Ulaş Bağcı
. Region Growing algorithm
• Homogeneity Criteria
• Split/Merge algorithm
• Examples from CT, MRI, PET
• Limitations
Image Filtering, Enhancement, Noise Reduction, and Signal Processing • MedicalImageRegistration • MedicalImageSegmentation • MedicalImageVisualization • Machine Learning in Medical Imaging • Shape Modeling/Analysis of Medical Images Deep Learning in Radiology
This document summarizes a research paper on segmenting and classifying brain tumors in MRI images using cellular automata and neural networks. The researchers first use co-occurrence matrices and run length features to automatically select seed points in abnormal tumor regions. A cellular automata algorithm then performs seeded segmentation on the images to detect and highlight the tumor region. Finally, the images are classified into normal, benign, or malignant categories using texture features and a radial basis function neural network. The neural network approach provides fast and accurate tumor classification compared to other methods. In summary, this paper presents an automatic method for segmenting and classifying brain tumors in MRI images based on cellular automata for segmentation and neural networks for classification.
brain tumor detection by thresholding approachSahil Prajapati
This technical paper proposes a method for detecting tumors in MRI brain images using thresholding and morphological operations. The methodology involves preprocessing images using sharpening filters, histogram equalization, and median filtering. Threshold segmentation is then used to create binary images, and morphological operations like erosion and dilation are applied. Finally, tumor regions are extracted using image subtraction, which removes closely packed pixels. The authors found that this approach, combining thresholding with morphological operations and subtraction, was effective at detecting and segmenting tumor regions in MRI brain images.
The document outlines the methodology for brain tumor detection from MRI images. It involves four main stages: pre-processing, skull stripping, segmentation, and feature extraction. In pre-processing, MRI images are converted to grayscale and filters are applied to remove noise. Skull stripping removes non-brain tissues. Segmentation uses Otsu's thresholding and watershed methods to separate brain regions. Feature extraction uses morphological operators to extract the tumor region by subtracting it from the original grayscale image.
Comparison of Feature selection methods for diagnosis of cervical cancer usin...IJERA Editor
Even though a great attention has been given on the cervical cancer diagnosis, it is a tuff task to observe the
pap smear slide through microscope. Image Processing and Machine learning techniques helps the pathologist
to take proper decision. In this paper, we presented the diagnosis method using cervical cell image which is
obtained by Pap smear test. Image segmentation performed by multi-thresholding method and texture and shape
features are extracted related to cervical cancer. Feature selection is achieved using Mutual Information(MI),
Sequential Forward Search (SFS), Sequential Floating Forward Search (SFFS) and Random Subset Feature
Selection(RSFS) methods.
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...ijcsit
Segmentation is a process of partitioning the image into several objects. It plays a vital role in many fields
such as satellite, remote sensing, object identification, face tracking and most importantly in medical field.
In radiology, magnetic resonance imaging (MRI) is used to investigate the human body processes and
functions of organisms. In hospitals, this technique has been using widely for medical diagnosis, to find the
disease stage and follow-up without exposure to ionizing radiation.Here in this paper, we proposed a novel
MR brain image segmentation method for detecting the tumor and finding the tumor area with improved
performance over conventional segmentation techniques such as fuzzy c means (FCM), K-means and even
that of manual segmentation in terms of precision time and accuracy. Simulation performance shows that
the proposed scheme has performed superior to the existing segmentation methods.
Massive Regional Texture Extraction for Aerial and Natural ImagesIOSR Journals
The document presents a proposed method called Massive Regional Texture Extraction (MRTE) for segmenting natural and aerial images. The MRTE method uses local thresholding and seeded region growing to extract textured regions from images. It maintains a lookup table to control pixel homogeneity during region growth. The algorithm provides less user interaction while achieving sharp demarcation of edges and intensity levels. Experimental results on natural and aerial image datasets show MRTE increases segmented homogeneous regions by 40-50% and pixels in segmented images by 50-60% compared to existing seeded growing methods. The proposed method effectively segments images into precise homogeneous regions for applications like content-based image retrieval.
A Novel Multiple-kernel based Fuzzy c-means Algorithm with Spatial Informatio...CSCJournals
Fuzzy c-means (FCM) algorithm has proved its effectiveness for image segmentation. However, still it lacks in getting robustness to noise and outliers, especially in the absence of prior knowledge of the noise. To overcome this problem, a generalized a novel multiple-kernel fuzzy cmeans (FCM) (NMKFCM) methodology with spatial information is introduced as a framework for image-segmentation problem. The algorithm utilizes the spatial neighborhood membership values in the standard kernels are used in the kernel FCM (KFCM) algorithm and modifies the membership weighting of each cluster. The proposed NMKFCM algorithm provides a new flexibility to utilize different pixel information in image-segmentation problem. The proposed algorithm is applied to brain MRI which degraded by Gaussian noise and Salt-Pepper noise. The proposed algorithm performs more robust to noise than other existing image segmentation algorithms from FCM family.
Detection of Malignancy in Digital Mammograms from Segmented Breast Region Us...IOSR Journals
This document presents a technique for detecting malignancy in digital mammograms using morphological operations. The proposed method involves noise removal using Gaussian filtering, image enhancement, removing background information through thresholding and morphological operations, performing image subtraction on the segmented image and converted RGB image to obtain tumors, and applying erosion to reduce small scale details and region sizes. The method was tested on images from a cancer hospital and implemented in Matlab. Experimental results show the technique can effectively preprocess images and segment regions to identify malignant data for assessment. Future work may focus on improving edge detection, segmentation algorithms, and producing more accurate cancer detection results.
Image Fusion and Image Quality Assessment of Fused ImagesCSCJournals
Accurate diagnosis of tumor extent is important in radiotherapy. This paper presents the use of image fusion of PET and MRI image. Multi-sensor image fusion is the process of combining information from two or more images into a single image. The resulting image contains more information as compared to individual images. PET delivers high-resolution molecular imaging with a resolution down to 2.5 mm full width at half maximum (FWHM), which allows us to observe the brain\'s molecular changes using the specific reporter genes and probes. On the other hand, the 7.0 T-MRI, with sub-millimeter resolution images of the cortical areas down to 250 m, allows us to visualize the fine details of the brainstem areas as well as the many cortical and sub-cortical areas. The PET-MRI fusion imaging system provides complete information on neurological diseases as well as cognitive neurosciences. The paper presents PCA based image fusion and also focuses on image fusion algorithm based on wavelet transform to improve resolution of the images in which two images to be fused are firstly decomposed into sub-images with different frequency and then the information fusion is performed and finally these sub-images are reconstructed into result image with plentiful information. . We also propose image fusion in Radon space. This paper presents assessment of image fusion by measuring the quantity of enhanced information in fused images. We use entropy, mean, standard deviation and Fusion Mutual Information, cross correlation , Mutual Information Root Mean Square Error, Universal Image Quality Index and Relative shift in mean to compare fused image quality. Comparative evaluation of fused images is a critical step to evaluate the relative performance of different image fusion algorithms. In this paper, we also propose image quality metric based on the human vision system (HVS).
Segmentation of Tumor Region in MRI Images of Brain using Mathematical Morpho...CSCJournals
This paper introduces an efficient detection of brain tumor from cerebral MRI images. The methodology consists of two steps: enhancement and segmentation. To improve the quality of images and limit the risk of distinct regions fusion in the segmentation phase an enhancement process is applied. We applied mathematical morphology to increase the contrast in MRI images and to segment MRI images. Some of experimental results on brain images show the feasibility and the performance of the proposed approach.
Non negative matrix factorization ofr tuor classificationSahil Prajapati
The PPT aware about you the concept of Non Negative Matrix Factorization and how theses techniques can be used to treat cancer by the use of the coding such as a MATLAB,LABVIEW software to locate the tumor or the cancer part with the different approaches and tachniques.
Go through the PPT to know and how one can improvise my work for better results??
Please help me if one come up with other techniques.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Medical Image segmentation using Image Mining conceptsEditor IJMTER
Image differencing is usually done by subtracting the low-level skin texture like strength
in images that are already associated. This paper extracts high-level skin texture in order to find out
an efficient image differencing method for the analysis of Brain Tumor. On the other hand, this
produces sets of skin texture that are both spatial. We demonstrate a technique that avoids arbitrary
spatial constraints and is robust in the presence of sound, outliers, and imaging artifact, while
outperforming even profitable products in the analysis of Brain Tumor images. First, the landmark
are establish, and then the top entrant are sorted into a end set. Second, the top sets of the two
descriptions are then differenced through a cluster judgment. The symmetry of the human body is
utilized to increase the accuracy of the finding. We imitate this technique in an effort to understand
and ultimately capture the judgment of the radiologist. The image differencing with clustered
contrast process determines the being there of Brain Tumor. Using the most favorable features
extracted from normal and tumor regions of MRI by using arithmetical features, classifiers are used
to categorize and segment the tumor portion in irregular images. Both the difficult and preparation
phase gives the proportion of accuracy on each parameter in neural networks, which gives the idea to
decide the best one to be used in supplementary works. The results showed outperformance of
algorithm when compared with classification accuracy which works as shows potential tool for
classification and requires extension in brain tumor analysis.
RANSAC BASED MOTION COMPENSATED RESTORATION FOR COLONOSCOPY IMAGESsipij
Colonoscopy is a procedure that has been used widely to detect the abnormality in a colon. Colonoscopy images suffer from a lot of problems that make it hard for the doctor to investigate/ understand a colon patient. Unfortunately, with the current technology, three is no way for doctors to know if the whole colon surface has been investigated or not. We have developed a method that utilizes RANSAC-based image registration to align sequences of any length in the colonoscopy video and restores each frame of the video using information from these aligned images. We proposed two methods. First method used the deep neural net for the classification of informative and non-informative image. The classification result was used as a preprocessing for alignment method. Also, we proposed a visualization structure for the classification results. The second method used the alignment to decide/classify the bad and good alignment by using two factors. The first factor is the accumulated error and the second factor contain three checking steps that check the pair error alignment beside the geometry transform status. The second method was able to align long sequences.
This document describes a methodology for detecting brain tumors and edema from magnetic resonance images (MRI) using bounding box symmetry. The methodology involves segmenting the brain from MRI images, applying filters, and using a novel score function based on Bhattacharya coefficient to detect a rectangle representing the region of interest by comparing the left and right sides of the brain. The method was tested on 12 brain MRI images and was able to accurately detect tumor and edema regions and their sizes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Lec5: Pre-Processing Medical Images (III) (MRI Intensity Standardization)Ulaş Bağcı
2017 Spring, UCF Medical Image Computing CAVA: Computer Aided Visualization and Analysis • CAD: Computer Aided Diagnosis • Definitions and Terminologies • Coordinate Systems • Pre-Processing Images – Volume of Interest – RegionofInterest – IntensityofInterest – ImageEnhancement • Filtering • Smoothing • Introduction to Medical Image Computing and Toolkits • Image Filtering, Enhancement, Noise Reduction, and Signal Processing • MedicalImageRegistration • MedicalImageSegmentation • MedicalImageVisualization • Machine Learning in Medical Imaging • Shape Modeling/Analysis of Medical Images Deep Learning in Radiology
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document proposes a method for improving medical image registration using mutual information. It aims to address limitations in standard mutual information-based registration when there are local intensity variations. The method incorporates spatial and geometric information by computing mutual information in regions identified by the Harris corner detection operator. These regions have large spatial variations that provide geometric information. The method is tested on synthetic and clinical data, showing improved registration accuracy. It is implemented on a GPU for increased parallel processing efficiency, providing a 4-46% speed improvement over standard registration methods.
CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...ijitcs
The aim of this paper is to introduce a comparison between cell tracking using active shape model (ASM)
and active appearance model (AAM) algorithms, to compare the cells tracking quality between the two
methods to track the mobility of the living cells. Where sensitive and accurate cell tracking system is
essential to cell motility studies. The active shape model (ASM) and active appearance model (AAM)
algorithms has proved to be a successful methods for matching statistical models. The experimental results
indicate the ability of (AAM) meth
International Journal of Pharmaceutical Science Invention (IJPSI)inventionjournals
International Journal of Pharmaceutical Science Invention (IJPSI) is an international journal intended for professionals and researchers in all fields of Pahrmaceutical Science. IJPSI publishes research articles and reviews within the whole field Pharmacy and Pharmaceutical Science, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Comparison of Feature selection methods for diagnosis of cervical cancer usin...IJERA Editor
Even though a great attention has been given on the cervical cancer diagnosis, it is a tuff task to observe the
pap smear slide through microscope. Image Processing and Machine learning techniques helps the pathologist
to take proper decision. In this paper, we presented the diagnosis method using cervical cell image which is
obtained by Pap smear test. Image segmentation performed by multi-thresholding method and texture and shape
features are extracted related to cervical cancer. Feature selection is achieved using Mutual Information(MI),
Sequential Forward Search (SFS), Sequential Floating Forward Search (SFFS) and Random Subset Feature
Selection(RSFS) methods.
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...ijcsit
Segmentation is a process of partitioning the image into several objects. It plays a vital role in many fields
such as satellite, remote sensing, object identification, face tracking and most importantly in medical field.
In radiology, magnetic resonance imaging (MRI) is used to investigate the human body processes and
functions of organisms. In hospitals, this technique has been using widely for medical diagnosis, to find the
disease stage and follow-up without exposure to ionizing radiation.Here in this paper, we proposed a novel
MR brain image segmentation method for detecting the tumor and finding the tumor area with improved
performance over conventional segmentation techniques such as fuzzy c means (FCM), K-means and even
that of manual segmentation in terms of precision time and accuracy. Simulation performance shows that
the proposed scheme has performed superior to the existing segmentation methods.
Massive Regional Texture Extraction for Aerial and Natural ImagesIOSR Journals
The document presents a proposed method called Massive Regional Texture Extraction (MRTE) for segmenting natural and aerial images. The MRTE method uses local thresholding and seeded region growing to extract textured regions from images. It maintains a lookup table to control pixel homogeneity during region growth. The algorithm provides less user interaction while achieving sharp demarcation of edges and intensity levels. Experimental results on natural and aerial image datasets show MRTE increases segmented homogeneous regions by 40-50% and pixels in segmented images by 50-60% compared to existing seeded growing methods. The proposed method effectively segments images into precise homogeneous regions for applications like content-based image retrieval.
A Novel Multiple-kernel based Fuzzy c-means Algorithm with Spatial Informatio...CSCJournals
Fuzzy c-means (FCM) algorithm has proved its effectiveness for image segmentation. However, still it lacks in getting robustness to noise and outliers, especially in the absence of prior knowledge of the noise. To overcome this problem, a generalized a novel multiple-kernel fuzzy cmeans (FCM) (NMKFCM) methodology with spatial information is introduced as a framework for image-segmentation problem. The algorithm utilizes the spatial neighborhood membership values in the standard kernels are used in the kernel FCM (KFCM) algorithm and modifies the membership weighting of each cluster. The proposed NMKFCM algorithm provides a new flexibility to utilize different pixel information in image-segmentation problem. The proposed algorithm is applied to brain MRI which degraded by Gaussian noise and Salt-Pepper noise. The proposed algorithm performs more robust to noise than other existing image segmentation algorithms from FCM family.
Detection of Malignancy in Digital Mammograms from Segmented Breast Region Us...IOSR Journals
This document presents a technique for detecting malignancy in digital mammograms using morphological operations. The proposed method involves noise removal using Gaussian filtering, image enhancement, removing background information through thresholding and morphological operations, performing image subtraction on the segmented image and converted RGB image to obtain tumors, and applying erosion to reduce small scale details and region sizes. The method was tested on images from a cancer hospital and implemented in Matlab. Experimental results show the technique can effectively preprocess images and segment regions to identify malignant data for assessment. Future work may focus on improving edge detection, segmentation algorithms, and producing more accurate cancer detection results.
Image Fusion and Image Quality Assessment of Fused ImagesCSCJournals
Accurate diagnosis of tumor extent is important in radiotherapy. This paper presents the use of image fusion of PET and MRI image. Multi-sensor image fusion is the process of combining information from two or more images into a single image. The resulting image contains more information as compared to individual images. PET delivers high-resolution molecular imaging with a resolution down to 2.5 mm full width at half maximum (FWHM), which allows us to observe the brain\'s molecular changes using the specific reporter genes and probes. On the other hand, the 7.0 T-MRI, with sub-millimeter resolution images of the cortical areas down to 250 m, allows us to visualize the fine details of the brainstem areas as well as the many cortical and sub-cortical areas. The PET-MRI fusion imaging system provides complete information on neurological diseases as well as cognitive neurosciences. The paper presents PCA based image fusion and also focuses on image fusion algorithm based on wavelet transform to improve resolution of the images in which two images to be fused are firstly decomposed into sub-images with different frequency and then the information fusion is performed and finally these sub-images are reconstructed into result image with plentiful information. . We also propose image fusion in Radon space. This paper presents assessment of image fusion by measuring the quantity of enhanced information in fused images. We use entropy, mean, standard deviation and Fusion Mutual Information, cross correlation , Mutual Information Root Mean Square Error, Universal Image Quality Index and Relative shift in mean to compare fused image quality. Comparative evaluation of fused images is a critical step to evaluate the relative performance of different image fusion algorithms. In this paper, we also propose image quality metric based on the human vision system (HVS).
Segmentation of Tumor Region in MRI Images of Brain using Mathematical Morpho...CSCJournals
This paper introduces an efficient detection of brain tumor from cerebral MRI images. The methodology consists of two steps: enhancement and segmentation. To improve the quality of images and limit the risk of distinct regions fusion in the segmentation phase an enhancement process is applied. We applied mathematical morphology to increase the contrast in MRI images and to segment MRI images. Some of experimental results on brain images show the feasibility and the performance of the proposed approach.
Non negative matrix factorization ofr tuor classificationSahil Prajapati
The PPT aware about you the concept of Non Negative Matrix Factorization and how theses techniques can be used to treat cancer by the use of the coding such as a MATLAB,LABVIEW software to locate the tumor or the cancer part with the different approaches and tachniques.
Go through the PPT to know and how one can improvise my work for better results??
Please help me if one come up with other techniques.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Medical Image segmentation using Image Mining conceptsEditor IJMTER
Image differencing is usually done by subtracting the low-level skin texture like strength
in images that are already associated. This paper extracts high-level skin texture in order to find out
an efficient image differencing method for the analysis of Brain Tumor. On the other hand, this
produces sets of skin texture that are both spatial. We demonstrate a technique that avoids arbitrary
spatial constraints and is robust in the presence of sound, outliers, and imaging artifact, while
outperforming even profitable products in the analysis of Brain Tumor images. First, the landmark
are establish, and then the top entrant are sorted into a end set. Second, the top sets of the two
descriptions are then differenced through a cluster judgment. The symmetry of the human body is
utilized to increase the accuracy of the finding. We imitate this technique in an effort to understand
and ultimately capture the judgment of the radiologist. The image differencing with clustered
contrast process determines the being there of Brain Tumor. Using the most favorable features
extracted from normal and tumor regions of MRI by using arithmetical features, classifiers are used
to categorize and segment the tumor portion in irregular images. Both the difficult and preparation
phase gives the proportion of accuracy on each parameter in neural networks, which gives the idea to
decide the best one to be used in supplementary works. The results showed outperformance of
algorithm when compared with classification accuracy which works as shows potential tool for
classification and requires extension in brain tumor analysis.
RANSAC BASED MOTION COMPENSATED RESTORATION FOR COLONOSCOPY IMAGESsipij
Colonoscopy is a procedure that has been used widely to detect the abnormality in a colon. Colonoscopy images suffer from a lot of problems that make it hard for the doctor to investigate/ understand a colon patient. Unfortunately, with the current technology, three is no way for doctors to know if the whole colon surface has been investigated or not. We have developed a method that utilizes RANSAC-based image registration to align sequences of any length in the colonoscopy video and restores each frame of the video using information from these aligned images. We proposed two methods. First method used the deep neural net for the classification of informative and non-informative image. The classification result was used as a preprocessing for alignment method. Also, we proposed a visualization structure for the classification results. The second method used the alignment to decide/classify the bad and good alignment by using two factors. The first factor is the accumulated error and the second factor contain three checking steps that check the pair error alignment beside the geometry transform status. The second method was able to align long sequences.
This document describes a methodology for detecting brain tumors and edema from magnetic resonance images (MRI) using bounding box symmetry. The methodology involves segmenting the brain from MRI images, applying filters, and using a novel score function based on Bhattacharya coefficient to detect a rectangle representing the region of interest by comparing the left and right sides of the brain. The method was tested on 12 brain MRI images and was able to accurately detect tumor and edema regions and their sizes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Lec5: Pre-Processing Medical Images (III) (MRI Intensity Standardization)Ulaş Bağcı
2017 Spring, UCF Medical Image Computing CAVA: Computer Aided Visualization and Analysis • CAD: Computer Aided Diagnosis • Definitions and Terminologies • Coordinate Systems • Pre-Processing Images – Volume of Interest – RegionofInterest – IntensityofInterest – ImageEnhancement • Filtering • Smoothing • Introduction to Medical Image Computing and Toolkits • Image Filtering, Enhancement, Noise Reduction, and Signal Processing • MedicalImageRegistration • MedicalImageSegmentation • MedicalImageVisualization • Machine Learning in Medical Imaging • Shape Modeling/Analysis of Medical Images Deep Learning in Radiology
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document proposes a method for improving medical image registration using mutual information. It aims to address limitations in standard mutual information-based registration when there are local intensity variations. The method incorporates spatial and geometric information by computing mutual information in regions identified by the Harris corner detection operator. These regions have large spatial variations that provide geometric information. The method is tested on synthetic and clinical data, showing improved registration accuracy. It is implemented on a GPU for increased parallel processing efficiency, providing a 4-46% speed improvement over standard registration methods.
CELL TRACKING QUALITY COMPARISON BETWEEN ACTIVE SHAPE MODEL (ASM) AND ACTIVE ...ijitcs
The aim of this paper is to introduce a comparison between cell tracking using active shape model (ASM)
and active appearance model (AAM) algorithms, to compare the cells tracking quality between the two
methods to track the mobility of the living cells. Where sensitive and accurate cell tracking system is
essential to cell motility studies. The active shape model (ASM) and active appearance model (AAM)
algorithms has proved to be a successful methods for matching statistical models. The experimental results
indicate the ability of (AAM) meth
International Journal of Pharmaceutical Science Invention (IJPSI)inventionjournals
International Journal of Pharmaceutical Science Invention (IJPSI) is an international journal intended for professionals and researchers in all fields of Pahrmaceutical Science. IJPSI publishes research articles and reviews within the whole field Pharmacy and Pharmaceutical Science, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
The document summarizes research on the relationship between student housing and success in computer-based learning. It finds that students who live on campus tend to have higher academic success compared to those who live off campus. Specifically, the study conducted at Liberty University's math emporium found that on-campus housing predicted higher scores in math courses compared to off-campus housing. The document also discusses other research showing benefits of on-campus living such as higher sense of community and involvement. It provides implications for universities to optimize on-campus housing to promote student academic success.
This document provides a summary of Terri Shawn Mitchell's education and professional experience. It outlines her educational background including degrees from Louisiana State University in Anthropology and Geography. It then details her work experience teaching at various universities, including Louisiana State University, Elon College, University of North Carolina at Chapel Hill, Troy University, Spring Hill College, and University of South Alabama. It also lists publications, conference presentations, courses taught, and awards.
The document provides information on the Droid Pro smartphone by Motorola, highlighting its key productivity, security, and personalization features. It includes three slides summarizing the device's business capabilities, competitive advantages, and example use cases. The remaining slides provide instructions on setting up email and global dialing, scheduling meetings, and global roaming settings.
Rogelio Prior Solís es un productor de cine mexicano con más de 20 años de experiencia en publicidad, mercadotecnia y ventas. Actualmente es fundador y productor de Imán Consulting, una empresa dedicada a la búsqueda de financiamiento y comercialización de proyectos creativos. Tiene una maestría en marketing estratégico y licenciatura en diseño gráfico. Actualmente está produciendo tres películas, incluyendo una de ciencia ficción y dos comedias románticas para toda la familia.
Gustavo Alejandro Raush Faggembaau has successfully completed the online Coursera course "Online Games: Literature, New Media, and Narrative" offered by Vanderbilt University. The course explored the history of literary romance and its impact on contemporary media forms from Tolkien's fiction to online games. The statement of accomplishment was signed by Jay Clayton, William R. Kenan, Jr. Professor of English and Director of the Curb Center for Art, Enterprise, and Public Policy at Vanderbilt University.
Geoff Lindsay received certification on October 6, 2016. His candidate ID is UQ7K and his certificate ID is CVXX4. The document provides certification details for an individual named Geoff Lindsay.
This document provides a literature survey on methods for detecting brain tumors from MRI images. It discusses several segmentation techniques that have been used for this purpose, including thresholding, edge-based, region-based, k-means clustering, fuzzy c-means clustering, and optimization methods like ant colony optimization, genetic algorithms, and particle swarm optimization. The document reviews related work comparing these methods and evaluates their performance based on metrics like PSNR and RMSE. It concludes that while no single universal method exists, fuzzy c-means is well-suited for medical image segmentation tasks due to its simplicity and ability to provide faster clustering.
Literature Survey on Detection of Brain Tumor from MRI Images IOSR Journals
This document provides a literature survey on methods for detecting brain tumors from MRI images. It discusses several segmentation and clustering techniques that have been used for this purpose, including thresholding, edge-based segmentation, region-based segmentation, fuzzy c-means clustering, and k-means clustering. The document also reviews related work applying these methods and evaluates their effectiveness at automatically detecting and segmenting brain tumors from MRI data.
Image Segmentation Based Survey on the Lung Cancer MRI ImagesIIRindia
Educational data mining (EDM) creates high impact in the field of academic domain. The methods used in this topic are playing a major advanced key role in increasing knowledge among students. EDM explores and gives ideas in understanding behavioral patterns of students to choose a correct path for choosing their carrier. This survey focuses on such category and it discusses on various techniques involved in making educational data mining for their knowledge improvement. Also, it discusses about different types of EDM tools and techniques in this article. Among the different tools and techniques, best categories are suggested for real world usage.
This paper presents a novel edge-based method for segmenting masses in mammogram images. The method first enhances the image contrast and reduces noise. It then computes a texture descriptor for each pixel to create an energy texture image. Edge detection is performed on this image to identify closed-path edges representing possible mass regions. The boundary of the identified mass region is used as the segmented contour of the mass. Preliminary results show the proposed method outlines masses more closely than radiologist markings.
A HYBRID APPROACH BASED SEGMENTATION TECHNIQUE FOR BRAIN TUMOR IN MRI IMAGESsipij
Automatic image segmentation becomes very crucial for tumor detection in medical image processing. Manual and semi automatic segmentation techniques require more time and knowledge. However these drawbacks had overcome by automatic segmentation still there needs to develop more appropriate techniques for medical image segmentation. Therefore, we proposed hybrid approach based image segmentation using the combined features of region growing and threshold segmentation technique. It is followed by pre-processing stage to provide an accurate brain tumor extraction by the help of Magnetic Resonance Imaging (MRI). If the tumor has holes in it, the region growing segmentation algorithm can’t reveal but the proposed hybrid segmentation technique can be achieved and the result as well improved. Hence the result used to made assessment with the various performance measures as DICE, Jaccard similarity, accuracy, sensitivity and specificity. These similarity measures have been extensively used for evaluation with the ground truth of each processed image and its results are compared and analyzed.
A HYBRID APPROACH BASED SEGMENTATION TECHNIQUE FOR BRAIN TUMOR IN MRI IMAGESsipij
Automatic image segmentation becomes very crucial for tumor detection in medical image processing.
Manual and semi automatic segmentation techniques require more time and knowledge. However these
drawbacks had overcome by automatic segmentation still there needs to develop more appropriate
techniques for medical image segmentation. Therefore, we proposed hybrid approach based image
segmentation using the combined features of region growing and threshold segmentation technique. It is
followed by pre-processing stage to provide an accurate brain tumor extraction by the help of Magnetic
Resonance Imaging (MRI). If the tumor has holes in it, the region growing segmentation algorithm can’t
reveal but the proposed hybrid segmentation technique can be achieved and the result as well improved.
Hence the result used to made assessment with the various performance measures as DICE, Jaccard
similarity, accuracy, sensitivity and specificity. These similarity measures have been extensively used for
evaluation with the ground truth of each processed image and its results are compared and analyzed.
Comparative performance analysis of segmentation techniquesIAEME Publication
This document compares the performance of several image segmentation techniques: global thresholding, adaptive thresholding, region growing, and level set segmentation. It applies these techniques to medical and synthetic images corrupted with noise and evaluates the segmentation results using binary classification metrics like sensitivity, specificity, accuracy, and precision. The results show that level set segmentation best preserves object boundaries, adaptive thresholding captures most image details, and global thresholding has the highest success rate at extracting regions of interest. Overall, the study aims to determine the optimal segmentation method for medical images from CT scans.
The document presents a study that implemented segmentation and classification techniques for mammogram images to detect breast cancer malignancy. It used Gray Level Difference Method (GLDM) and Gabor texture feature extraction methods with Support Vector Machine (SVM) and K-Nearest Neighbors (K-NN) classifiers. The results showed that GLDM features with SVM achieved the best classification accuracy of 95.83%, outperforming the other combinations. The study concluded the GLDM and SVM approach provided the most effective classification of mammogram images.
Survey on Brain MRI Segmentation TechniquesEditor IJMTER
Image segmentation is aimed at cutting out, a ROI (Region of Interest) from an image. For
medical images, segmentation is done for: studying the anatomical structure, identifying ROI ie tumor
or any other abnormalities, identifying the increase in tissue volume in a region, treatment planning.
Currently there are many different algorithms available for image segmentation. This paper lists and
compares some of them. Each has their own advantages and limitations.
International Journal of Computational Engineering Research(IJCER) ijceronline
This document presents a hybrid methodology for classifying segmented images using both unsupervised and supervised classification techniques. The proposed methodology involves first segmenting the image into spectrally homogeneous regions using region growing segmentation. Then, a clustering algorithm is applied to the segmented regions for initial classification. Selected regions are used as training data for a supervised classification algorithm to further categorize the image. The hybrid approach combines the benefits of unsupervised clustering and supervised classification. The methodology is evaluated on natural and aerial images to compare its performance to existing seeded region growing and texture extraction segmentation methods.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Medical Image Segmentation Based on Level Set MethodIOSR Journals
This document presents a new medical image segmentation technique based on the level set method. The technique uses a combination of thresholding, morphological erosion, and a variational level set method. Thresholding is applied to determine object pixels, followed by optional erosion to remove small fragments. Then a variational level set method is applied on the original image to evaluate the contour and segment objects. The technique is tested on various medical images and provides good segmentation results, though it struggles with complex images containing multiple distinct objects.
AUTOMATIC SEGMENTATION IN BREAST CANCER USING WATERSHED ALGORITHMijbesjournal
This document summarizes a research study that developed an automatic segmentation algorithm using the watershed transform to detect breast cancer lesions in MRI images. The algorithm segments MRI images into regions by applying preprocessing like filtering, watershed segmentation on a gradient map to identify boundaries, and post-processing to refine the segments. It was tested on 20 patient MRI images and successfully segmented lesions, agreeing with manual detection. The algorithm has potential to help detect breast cancer at earlier stages by automatically identifying suspicious regions for further analysis.
A UTOMATIC S EGMENTATION IN B REAST C ANCER U SING W ATERSHED A LGORITHMijbesjournal
Accurate and reproducible delineation of breast les
ions can be challenging, as the lesions may have
complicated topological structures and heterogeneou
s intensity distributions. Diagnosis using magnetic
resonance imaging (MRI) with an appropriate automat
ic segmentation algorithm can be a better imaging
technique for the early detection of malignant brea
st tumours. The main objective of this system is to
develop a method for automatic segmentation and the
early detection of breast cancer based on the
application of the watershed transform to MRI image
s. The algorithm was separated into three major
sections: pre-processing, watershed and post-proces
sing. After computing different segments, the final
image was cleared of all noise and superimposed on
the original MRI image to generate the final modifi
ed image. The algorithm successfully resulted in the a
utomatic segmentation of the MRI images, and this c
an be a beneficial tool for the early detection of bre
ast cancer. This study showed that the automatic re
sults correctly agree with manual detection.
Classification of mammograms based on features extraction techniques using su...CSITiaesprime
Now mammography can be defined as the most reliable method for early breast cancer detection. The main goal of this study is to design a classifier model to help radiologists to provide a second view to diagnose mammograms. In the proposed system medium filter and binary image with a global threshold have been applied for removing the noise and small artifacts in the preprocessing stage. Secondly, in the segmentation phase, a hybrid bounding box and region growing (HBBRG) algorithm are utilizing to remove pectoral muscles, and then a geometric method has been applied to cut the largest possible square that can be obtained from a mammogram which represents the region of interest (ROI). In the features extraction phase three method was used to prepare texture features to be a suitable introduction to the classification process are first Order (statistical features), local binary patterns (LBP), and gray-level co-occurrence matrix (GLCM), Finally, support vector machine (SVM) has been applied in two-level to classify mammogram images in the first level to normal or abnormal, and then the classification of abnormal once in the second level to the benign or malignant image. The system was tested on the MAIS the mammogram image analysis society (MIAS) database, in addition to the image from the Teaching Oncology Hospital, Medical City in Baghdad, where the results showed achieving an accuracy of 95.454% for the first level and 97.260% for the second level, also, the results of applying the proposed system to the MIAS database alone were achieving an accuracy of 93.105% for the first level and 94.59 for the second level.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Review of Image Segmentation Techniques based on Region Merging ApproachEditor IJMTER
Image segmentation is an important task in computer vision and object recognition. Since
fully automatic image segmentation is usually very hard for natural images, interactive schemes with a
few simple user inputs are good solutions. In image segmentation the image is dividing into various
segments for processing images. The complexity of image content is a bigger challenge for carrying out
automatic image segmentation. On regions based scheme, the images are merged based on the similarity
criteria depending upon comparing the mean values of both the regions to be merged. So, the similar
regions are then merged and the dissimilar regions are merged together.
Human Skin Cancer Recognition and Classification by Unified Skin Texture and ...IOSR Journals
This document presents a novel method for automatically segmenting skin lesions in macroscopic images using iterative stochastic region merging based on discrete wavelet transformation. It aims to address challenges like illumination variation, presence of hair, irregular skin color variation, and multiple unhealthy skin regions. The method divides an input image into regions, extracts features like color, texture, skewness and kurtosis, then classifies the image using knowledge-based classification. Experimental results on 60 real images show the proposed method achieves lower segmentation error than level set active contours, skin lesion segmentation, and multidirectional gradient vector flow methods.
IRJET-A Novel Approach for MRI Brain Image Classification and DetectionIRJET Journal
This document proposes a new approach for classifying and detecting brain tumors in MRI images. The method uses discrete wavelet transform for feature extraction, support vector machine for classification, and incremental supervised neural network and invariant moments for tumor detection. MRI brain images are first classified as normal or tumorous. For images detected as tumorous, the method then segments the image and uses moments to determine the symmetry axis and detect any asymmetry which would indicate the location of the tumor. The approach is evaluated on a dataset of 60 MRI images, achieving 98.33% classification accuracy in distinguishing normal and tumorous images.
Comparison of Feature selection methods for diagnosis of cervical cancer usin...IJERA Editor
Even though a great attention has been given on the cervical cancer diagnosis, it is a tuff task to observe the
pap smear slide through microscope. Image Processing and Machine learning techniques helps the pathologist
to take proper decision. In this paper, we presented the diagnosis method using cervical cell image which is
obtained by Pap smear test. Image segmentation performed by multi-thresholding method and texture and shape
features are extracted related to cervical cancer. Feature selection is achieved using Mutual Information(MI),
Sequential Forward Search (SFS), Sequential Floating Forward Search (SFFS) and Random Subset Feature
Selection(RSFS) methods
Similar to International Journal of Engineering Research and Development (IJERD) (20)
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
This document summarizes a study on reducing corrosion rates in steel through welding design. The researchers tested different welding groove designs (X, V, 1/2X, 1/2V) and preheating temperatures (400°C, 500°C, 600°C) on ferritic malleable iron samples. Testing found that X and V groove designs with 500°C and 600°C preheating had corrosion rates of 0.5-0.69% weight loss after 14 days, compared to 0.57-0.76% for 400°C preheating. Higher preheating reduced residual stresses which decreased corrosion. Residual stresses were 1.7 MPa for optimal X groove and 600°C
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
The document summarizes a study on the use of ground granulated blast furnace slag (GGBS) and limestone powder to replace cement in self-compacting concrete (SCC). Tests were conducted on SCC mixes with 0-50% replacement of cement with GGBS and 0-20% replacement with limestone powder. The results showed that replacing 30% of cement with GGBS and 15% with limestone powder produced SCC with the highest compressive strength of 46MPa, meeting fresh property requirements. The study concluded that this ternary blend of cement, GGBS and limestone powder can improve SCC properties while reducing costs.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Monitoring and Managing Anomaly Detection on OpenShift.pdf
International Journal of Engineering Research and Development (IJERD)
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 8, Issue 9 (September 2013), PP. 13-17
13
Overview of Medical Image Segmentation
Adegoke, B. O.1
, Olawale, B. O2
., Olabisi, N.I.2
1
Department of Computer Science and Engineering, LAUTECH, Ogbomoso Nigeria.
2
Department of Computer Engineering, Osun State Polytechnic, Iree, Nigeria
ABSTRACT
This paper reviews image segmentation as related to medical image processing. It examined fundamental
medical image processing flow of actions, reviews available segmentation methods in literatures, their
applications and brief performance. It conclusively highlight the need for development of a robust medical
image segmentation method which will be able to recognize malignant growths in human body before it gets out
of hand. The problem of cancerous growth as a threat to human existence is emphasized.
Keywords: Image processing, medical images, image segmentation, image enhancement
I. INTRODUCTION
American Heritage Dictionary, 3rd edition: a reproduction of a person or an object, especially a
sculptured likeness. A physics philosophy where an optically formed duplicate, counterpart, or other
representative reproduction of an object, especially an optical reproduction of an object formed by a lens or a
mirror [1]. Medical imaging systems are based on the physical interaction between some energy source and the
human body. Exceptions include phonocardiography and thermography, which use internal energy sources
within the body are rare and represent very few applications. Literatures have identified many medical imaging
modalities [2; 3]. These modalities include: radiology and computed tomography with X-ray, diagnostic
ultrasound, magnetic resonance imaging, radioisotope imaging, and electrical impedance tomography.
II. MEDICAL IMAGE PROCESSING
Image processing in medical diagnosis involve stages such as image capture, image enhancement,
image segmentation and feature extraction [4:5] Figure 1 shows a general description of lung cancer detection
system that contains four basic stages. The first stage starts with taking a collection of image (normal and
abnormal) from the available client. The second stage applies several techniques of image enhancement, to get
best level of quality and clearness. The third stage applies image segmentation algorithms which play an
effective rule in image processing stages, and the fourth stage obtain the general features from enhanced
segmented image which gives indicators of normality or abnormality of images.
Figure 1: Lung Cancer image Processing Stages
III. MEDICAL IMAGE SEGMENTATION
The aim of segmentation is to extract region of interest (ROIs) containing all masses and locate the
suspicious mass candidates from the ROI. Segmentation of the suspicious regions on a mammographic image is
designed to have a very high sensitivity and a large number of false positives acceptable since they are expected
to be removed in later stage of the algorithm [6] Researchers have used several segmentation techniques and
their combinations also. Segmentation is very crucial in image processing; its output will determine the
2. Overview of Medical Image Segmentation
14
effectiveness of the features to be extracted at the feature extraction stage [7] The outcome of these extracted
features will be used in guiding the decision of medical personnel [8]
3.1 Thresholding Techniques
Global thresholding [9] is one of the common techniques for image segmentation. It is based on the
global information, such as histogram. The fact that masses usually have greater intensity than the surrounding
tissues can be used for finding global threshold value. On the histogram, the regions with an abnormality impose
extra peaks while a healthy region has only a single peak [10] after finding a threshold value the regions with
abnormalities can be segmented. Global thresholding is not a very good method to identify level. Global
thresholding has good results when used as a primary step of some other segmentation techniques. Local
thresholding is slightly better than global thresholding. The threshold value is defined locally for each pixel
based on the intensity values of its neighbor pixels [11] Multiple pixels belonging to the same class (pixels at the
periphery of the mass and pixels at the center of the mass) are not always homogenous and may be represented
by different feature values. Li and his associates used local adaptive thresholding to segment mammographic
image into parts belonging to same classes and an adaptive clustering was applied to refine the results[12]
` Matsubara’s group [13] developed an adaptive thresholding technique that uses histogram analysis to
divide mammographic image into three categories based on the density of the tissue ranging from fatty to dense.
ROIs containing potential masses are detected using multiple threshold values based on the category of the
mammographic image. Dominguez and Nandi [14] performed segmentation of regions via conversion of images
to binary images at multiple threshold levels. Images in their study, with grey values in the range (0, 1), 30
levels with step size of 0.025 were adequate to segment all mammographic images. Varel segmented suspicious
regions using an adaptive threshold level [15] The images were previously enhanced with an iris filter. Li [16]
used adaptive gray-level thresholding to obtain an initial segmentation of suspicious regions followed by a
multi-resolution Markov random field model-based method.
3.2 Region-Based Techniques
Markov random field (MRF) or Gibbs random field (GRF) is one of the segmentation methods in
iterative pixel classification category. MRFs/GRFs are statistical methods and powerful modeling tools [16]
Szekely [17] used MRF in fine segmentation to improve the preliminary results provided by the coarse
segmentation. In coarse segmentation the feature vector is calculated and passed to a set of decision tress that
classified the image segment. After the fine segmentation they used a combination of three different
segmentation methods; a modification of the radial gradient index method, the Bezier histogram method and
dual binarization to segment a mass from the image.
Region growing and region clustering are also based on pixel classification. In region growing methods
pixels are grouped into regions. A seed pixel is chosen as a starting point from which the region iteratively
grows and aggregates with neighboring pixels that fulfill a certain homogeneity criterion. Zheng [18] used an
adaptive topographic region growth algorithm to define initial boundary contour of the mass region and then
applied an active contour algorithm to modify the final mass boundary contour.
Region clustering searches the region directly without initial seed pixel [11] pappas [19] used a
generalization of k-means clustering algorithm to separate the pixels into clusters based on their intensity and
their relative location. Li [12] used adaptive clustering to refine the result attained from the localized adaptive
thresholding. Sahiner and his research group [20] used k-means clustering algorithm followed by object
selection to detect initial mass shape within the ROI. The ROI is extracted based on the location of the biopsied
mass identified by a qualified radiologist. initial mass shape detection is followed by an active contour
segmentation method to refine the boundaries of the segmented mass.
3.3 Edge Detection Techniques
Petrick used Laplacian of Gaussian filter in conjunction with density weighted contrast enhancement
(DWCE) [21]. DWCE method enhances the structures within the mammographic image to make the edge
detection algorithm able to density.
Edge detection algorithms are based on the gray level discontinuities in the image. Basis for edge
detection are gradients or derivatives that measure the rate of change in the gray level. Rangayyan [22]
described standard operators for edge detection such as Prewitt operator Sobel operator, Roberts operator and
Laplacian of Gaussian (LoG) operator. Fauci et al. [23] developed an edge-based segmentation algorithm that
operative procedure, a ROI Hunter algorithm for selecting ROIs. ROI Hunter algorithm is based on the search of
relative intensity maximum inside the square windows that form the mammographic image. Zou [24] proposed a
method that uses Gradient Vector Flow field (GVF), which is a parametric deformable contour model, after the
enhancement of mammographic images with adaptive histogram equalization, the GVF field component with
the larger entropy is used to generate the ROI. In the example of GVF with and without enhancement is given.
3. Overview of Medical Image Segmentation
15
Ferreira [25] used active contour model (ACM) based on self-organizing network (SON) to segment the ROI.
This model explores the principle of isomorphism and self-organization to create flexible contours that
characterizes the shapes in the image. Yuan [26] employed a dual-stage method to extract masses from the
surrounding tissues. Radial gradient index (RGI) based segmentation is used to yield an initial contour close to
the lesion boundary location and a region-based active contour model is utilized to evolve the contour further to
the lesion boundary.
3.4 Hybrid Techniques
Stochastic model-based image segmentation is a technique for partitioning an image into distinctive
meaningful regions based on the statistical properties of both grey level and context images. Li [27] employed a
Finite Generalized Gaussian Mixture (FGGM) distribution which is a statistical method for enhanced
segmentation and extraction of suspicious mass area. They used FGGM distribution to model mammography
pixel images together with a model selection procedure based on the two information theoretic criteria to
determine the optimal number of image regions. Finally, they applied a contextual Bayesian Relaxation
Labelling (CBRL) technique to perform the selection of the suspected masses.
Ball and Brue [28] segmented suspicious masses in polar domain. Adaptive Level Set Segmentation Method
(ALSSM) was used to adaptively adjust the border threshold at each angle in order to provide high-quality
segmentation results. The work was extended in [28], where Speculation Segmentation with Level Sets (SSLS)
was used to detect and segment speculated masses. In conjunction with level set segmentation, Dixon and
Taylor line operator (DTLO and a generalized version of DTLO (GDTLO) were hybridized.
Hassanien and Ali develop an algorithm for segmenting speculated masses based on Pulse Coupled Neutral
Networks (PCNN) in conjunction with fuzzy set theory [29].
IV. LITERATURE REVIEW
[30] summarized method of medical image segmentation. They divided into three generations. the first
generation is composed of the simplest forms of image analysis such as the use of intensity thresholds and
region growing. The second generation is characterized by the application of uncertainty models and
optimization methods, while the third generation incorporates knowledge into the segmentation process. Some
medical image database foe segmentation method validation were identified which include McConnell Brain
Imaging (MNI) Internet Brain Segmentation Repository (IBSR) Section for Biomedical Image Analysis
(SBIA).[31] summarised new method for medical image segmentation which is called the status Quo of
Artificial Intelligence method in Automatic medical image segmentation. Since segmentation is an effective and
fundamental step in the medical image analysis (MIA). It is categorized into four segmentation method based on
applied AI techniques. These methods can decrease the human intervention gradually and each category
facilitates the higher level of AI techniques than the previous one. They are respectively based on image
processing techniques, hybrid AI methods, expert systems development and ultimately registration-based in the
multispectral and multi model imaging.
[32] summarized eight different deformable contour methods (DCMs) of snake which are Balloon
snake, Topology snake, Distance snake, Gradient vector flow snake Original level set, Geodesic active contour,
Area and Length active contour and Constrained Optimization and level set method applied to the medical
image segmentation are presented. These DCMs are now applied extensively in industrial and medical image
application. The segmentation task that is required for biomedical application is usually not simple. The studied
DCMs are compared use both qualitative and quantitative measures and the comparative results both the
strength and limitation of these method. So from this medical segmentation comparison can also be translated to
other image segmentation domains.
Xiaolei and Gavrii, in their research efforts, have been devoted to processing and analyzing medical image to
extract meaningful information such as volume, shape, motion of organs in other to detect abnormalities and to
quantify changes. They also performed image data immense practical in medical information. Medical image
such as computed Axial Tomography (CAT), Magnetic Resonance Imaging (MRI), Ultrasound, and X-Ray,
they focus on two general categories of segmentation methods which are widely used in medical visions, namely
the deformable models and the machine learning-based classification.
Zulaikha and Mohamed developed a robust segmentation approach for noisy medical image
segmentation using Fuzzy Clustering with spatial probability [33] This developing robust and efficient
algorithm for medical image segmentation has been a demanding area of growing research interest. Fuzzy C-
Means (FCM) algorithm was extensively used in medical image segmentation. FCM is highly sensitive to noise
because it segment images on the basis of approach which utilizes histogram based fuzzy C-means clustering
algorithms for the segmentation of medical images. So to improve the robustness against noise, the spatial
probability of the neighbouring pixel is integrated in the objective function of FCM. The noisy medical are de-
noised with the help of an effective de-noising algorithm, prior to segmentation. The results obtained from the
4. Overview of Medical Image Segmentation
16
experimentation showed that the proposed approach attains reliable segmentation accuracy despite of noise
levels and it is also clear that the proposed approach is more efficient and robust against noise when compared
to that of the FCM.
Rastgarpour and Shanbehzadeh identified biomedical features for segmentation which are more
accurate by applying the artificial intelligence methods in which include intelligence methods in valuable
medical image segmentation [34]. This segmentation method depends on many factors like disease type and
image features and those factors result in remain the segmentation challengeable and lead to increasing the
growth of literatures. The literatures help the researchers to understand more easily and rapidly and then a novel
categorization is proposed related to the most recent important literatures in four sets based on applying the AI
techniques and decreasing human intervention. Categorization of available methods and literatures. The
segmentation methods depend on modality and dimension of imaging because of the high dependency on factor
like disease type and image features. Adegoke and his research group conducted an extensive survey on image
segmentation but it was basically on iris segmentation as it is related to development of iris recognition system
[7]
V. CONCLUSION
Increased development of malignant and recorded death rate of men and women in the 21st century
[35:36:37] necessitates development of real-time, robust segmentation algorithms which will be able to detect
development of growths in human body. It was discovered from literatures that early detection in malignant
such as ovarian cancer [38] colorectal cancer, breast cancer [39], prostate cancer [40] and other abnormal
developments in human systems at early stage can be helpful to their control [36:41]
REFERENCES
[1]. Ball, J. E and Bruce, L. M, (2007). Digital Mammographic Speculated Mass Detection and Spicule
Segmentation Using Level Set. In Proceeding of the 29th Annual International Conference of the IEEE
EMBS, 499-4984.
[2]. Rangayyan,R,M, Guliato, D, Decarvalho, J, D and Santiago, S.A, (2006). Feature Extraction from the
Turning Angle Function for the Classification of Contours of Breast Tumors. IEEE Special Topic
Symposium on Information Technology in Biomedicine, 4.
[3]. Li, H, Giger, M, L, Yuan, Y, Lan, L, and Sennett, C. A, (2008). Performance of CADx on a Large
Clinical Database of FFDM Image, Pattern Recognition, 51(16), 510-514.
[4]. Mokheld, S.A., (2012). Lung Cancer Detection Using Image Processing Techniques. Leonardo
Electronic Journal of Practices and Technologies, 20, 147-158.
[5]. Katrien V., Dirk R., Van B., and Zwi N.B., (2003). The cell cycle, a review of regulation, deregulation
and therapeutic targets in cancer. Black well Publishing, 36, 131-149
[6]. Sampat, M.P, Markey, M.B, Bovik, A.C (2005). Computer-Aided Detection and Diagnosis in
Mammography.
[7]. Adegoke, B.O, Omidiora, E.O, Falohun, S.A. and Ojo, D.A., (2013). Iris segmentation: a survey.
International Journal of Modern Engineering Research, 3(3), 1263-1267.
[8]. Tiina R., Jonathan S.C. and Philip K.M., (2007). Mathematical Models of Avascular Growth. Society
for Industrial and Applied Mathematics, 49 (2), 179 – 208.
[9]. Brzakovic, D., Luo, X.M, Brzakovic, P, (1990). An approach to automated detection of tumors
immammograms. IEEE Trasactions on Medical Imaging 9(3), 233-241
[10]. Van Schin, G, and Karssemeijer, N, (2008). Detection of Micro-calcifications Using a Non uniform
Noise Model, 51(16), 378-384.
[11]. Cheng, H.D, Shi, X,J, Min, R, Hu, L,M, Cai, X.P, Du, H,N, (2006). Approaches for Automated
Detection and Classification of Masses in Mammograms, Pattern Recognition, 39(4), 646-668.
[12]. Li, L,H, Qian, W, Clarke, I,P, Clark, R.A., Thomas J, (1999). Improving Mass Detection by Adaptive
and Multi-Scale Processing in Digitized Mommograms. Proceeding of SPIE, 490-498
[13]. Matsubara et al., 1996
[14]. Dominguez, A.R, Nandi, A.F(2007).Enhanced Multi-Level Thresholding Segmentation and rank Based
Region Selection for Detection of Masses in Mammograms, In, IEEE International Conference on
Acoustics, Speech and Signal Processing, (ICASSP), 449 - 452.
[15]. Varela, C, Tahoces, P .G, Mendez, A,J ,Soutu, M, Vidal ,J.J, (2007) .Computerized Detection of Breast
Masses in Digitized Mammograms. Computer in Biology and Medicine, 214-226.
[16]. Li ,H.D, MKallergi, M, Clarke. L, .P, Jain, V ,K, Clark, R.A(1995).Markov Random Field for Tumor
Detection in Digital Mammography, IEEE Transactions on Medical Imaging, 565-576.
[17]. Szekely, N, Toth, N, Pataki, B,(2006).A Hybrid System for Detection Masses in Mammographic
Images. IEEE Transactions on Instrumentation and Measurement, 944 - 915.
5. Overview of Medical Image Segmentation
17
[18]. Zheng, B, Mello-Thoms, C, Wang, X.H, Gur ,D, (2007).Improvement of Visual Similarity of Similar
Breast Masses Selection by Computer-Aided Diagnosis Schemes, 516-519.
[19]. Pappas, T.N, (1992). An Adaptive Clustering Algorithm for Image Segmentation. IEEE Transactions
on Signal Processing, 901-914.
[20]. Sahiner, B, Hadjiiski, L. M, Chan, H, P, Paramagul, C, Nees, A, ,Helvie, M,Shi, J, (2008).
Concordance of Computer-Extracted Image Features with BI-RADS Descriptors for Mammogrphic
Mass Margin. 69(15), 342-348.
[21]. Douglas H. and Robert A. W., (2000). . The Hallmarks of Cancer. Cell, vol. 100, pp. 57-70.
[22]. Rangayyan, R, M,(2005). Biomedical Image Analysis. CRC Press LLC, Boca Raton.
[23]. Fauci, F, Bagnasco, S, Bellotti, R, Cascio, D, Cheran,S.C, DeCarlo, F, DeNumzio, G, Fantacci, M. E,
Forni,G, Lauria, A, Torres, E. L, Magro, R, Masala, G. Oliva, P, Quarta, M, Raso, G, Retico, A.,
Tangaro, S., (2004). Mammographic Segmentation by Contour Searching and Massive Lesion
Classification with Neural Network, 5, 265-2699.
[24]. Zou, F, Zheng Y., Zhou Z., Agyepong K., (2008). Gradient Vector Flow Field and Mass Region
Extraction in Digital Mammograms, pp 17-19.
[25]. Ferreira, A. A, Nascimento, Jr, F, Tsang, I.R, Cavalcanri, G.D.O, Ludermir, T,B, Aquino, R. B.,
(2007). Analysis of Mammogram using self-organizing neural networks based on spatial Isomorphism,
In, Proceeeding of international Joint Conference on Neural Network, 1796-1801.
[26]. Yuan, Y, Giger, M. L, Li, H, Scennett, C,(2008).Correlative Feature Analysis of FDDM Images, 69
(15).
[27]. Li, H, Wang, Y, Liu, K.J.R, Lo, S.B, Freedman, M.T,(2001).ComputrizedRadiogeaphic Mass
Detection C Part I, Lesion Site Selection by Morpholigical Enhancement and Contextual Segmentation.
IEEE Transactions on Medical Imaging, pp 289-301.
[28]. Ball, J. E., Bruce L.M, (2007). Digital Mammographic Computer Aided Diagnosis (CAD) Using
Adaptive Level Set Segmentation. In Proceedings of the 29th Annual International Conference of the
IEEE EMBS, 4973-4978.
[29]. Hassanien, A. E, and Ali, J. M., (2004).Mammographic Segmentation Algorithm Using Pulse Coupled
Neural Network, In Proceeding of the third International Conference on Image and Graphics,
[30]. Withey D.J, ,Koles, Z.J, (2007).Medical Image segmentation ,Methods and Software Proceedings of
NFSI & ICFBI Hangzhou,China,140-143.
[31]. Maryam, and Jamshid, (2013). Feature Segmentation in medical images. International Journal of
innovative computing, information and control, 8(1), 578- 583.
[32]. Lei H., Zhigang P., Bryan E., Xun W.,Cgin, Y, Ha, Kenneth ,L,W., William, G,W., (2008).A
Comparative Study of Deformable Contour Method on Medical Image Segmentation. ScienceDirect,
26, 141-163.
[33]. Zulaikha Beevi, Mohamed Sthik, (2012).A Robust Segmentation Approach for Noisy MedicalImage
Using Fuzzy Clustering with Spatial Probability. The International Arab journal of Information
Technology, 9 , 75-83.
[34]. Rastgarpour, M, Shanbehzadeth, J, (2011). Application of AI Techniques inMedical Image
Segmentation and Novel Categorization of Available Methods and Tools. Proceedings of the
International Multiconference of Engineers and Computer Scientists 1, 823-831.
[35]. Sten F. and Stefan M., (1997). On the Growth Rates of Human Malignant Tumors: Implications for
Medical Decision Making. Journal of Medical Oncology, vol. 65, pp. 284 – 297.
[36]. Hanifa, B., Lorenzo, T., Pascal, C., Christian M., Walter S., Dominique S., Snejana A., Maurine M.,
Fred B. and Jean B., (2006). A cost-effective algorithm for Hereditary Non-polyposis Colorectal
Cancer Detection. America Journal of Clinical Pathology,
[37]. Mokheld, 2012; Katrien et al., (2003).
[38]. Roberts C.B., (2003). Status of Tumor Markers in Ovarian Cancer Screening. Journal of Clinical
Oncology, 21 (10), 200-205.
[39]. Byrne D.,O ’Halloran M.,Glavin M. and Jones E., (2011). Breast Cancer Detection Based on
Differential Ultra-wideband Microwave Radar. Progress in Electromagnetics Research, vol. 20, 231-
242.
[40]. ArulMurugan A., Tsung-Han C., Kannan K., Fei-Shih Y, and Chong-Yung C., (2012). An NBSS
Algorithm for Pharmacokinetic Analysis of Prostate Cancer Using DCE-MRImages, IEEE
Transaction, 566 – 569.
[41]. Anuradha K. and Sankaranarayanan K., (2012). Identification of Suspicious Regions to Detect Oral
Cancer at an earlier Stateg: a literature review. International Journal of Advances in Engineering and
Technology.