This document presents a method for characterizing the four evolutionary stages of a hemorrhagic stroke hematoma based on analyzing CT scan images. The method models the density distribution of oxyhemoglobin in the hematoma over time using a radioactive decay function. By determining the decay rate that best correlates empirical hematoma density curves to the theoretical model, the method can date CT scans and identify the evolutionary stage. When applied to a database of 103 images, the method achieved a 97.09% success rate in characterizing the hyperacute, acute, subacute, and chronic stages.
Detection of uveal melanoma using fuzzy and neural networks classifiersTELKOMNIKA JOURNAL
The use of image processing is increasingly utilized for disease detection. In this article, an algorithm is proposed to detect uveal melanoma (UM) which is a type of intraocular cancer. The proposed method integrates algorithms related to iris segmentation and proposes a novel algorithm for the detection of UM from the approach of fuzzy logic and neural networks. The study case results show 76% correct classification in the fuzzy logic system and 96.04% for the artificial neural networks.
This document describes a study using microwave imaging to detect brain strokes. Researchers used an anatomically realistic numerical head phantom with an inserted simulated hemorrhagic stroke. Microwave signals were used to estimate backscattered signals from the phantom. The Born iterative method was then applied to the signals to reconstruct an image of the phantom and detect the inserted stroke based on differences in dielectric properties between healthy and stroke-affected tissues. The study aims to more accurately model attenuation and reflections in the head compared to previous works using simpler phantoms. Reconstructed images using 850 MHz signals clearly detected the inserted stroke region.
SWI , high susceptibility for blood products, iron depositions, and calcifications
makes susceptibility-weighted imaging an important additional sequence for the diagnostic
workup of pediatric brain pathologic abnormalities. Compared with conventional MRI
sequences, susceptibility-weighted imaging may show lesions in better detail or with higher
sensitivity
Steganography is the art and science of hiding the
existence of information. In computer-based steganography,
several forms of digital media may be used as “cover” for hidden
information. Photos, documents, web pages and even MP3 music
files may all serve as innocuous looking hosts for secret messages.
In this paper, we generate a ECG signal of patient and hide this
ECG signal in the image of patient i.e. patient photo is used as a
cover for hiding the ECG signal. Steganography is done using the
Contourlet transform. To hide the data in image Singular Value
Decomposition (SVD) is used. The contourlet transform provides
higher correlation coefficient. The results are comparing with the
wavelet transform. The proposed system provides a better PSNR
value than the wavelet transform.
This document summarizes a research paper on computed tomography (CT) dose reduction and view number optimization. It discusses how CT uses X-rays to create images but that radiation exposure is a concern, especially for pediatric patients. The paper explores how iterative reconstruction techniques and compressed sensing theories have aimed to reduce views and dose while maintaining image quality. It presents the goal of investigating the relationship between image quality, view number, and radiation dose level. Numerical tests were performed to determine the optimal view number for a given dose level that achieves the best reconstruction quality.
Detection of uveal melanoma using fuzzy and neural networks classifiersTELKOMNIKA JOURNAL
The use of image processing is increasingly utilized for disease detection. In this article, an algorithm is proposed to detect uveal melanoma (UM) which is a type of intraocular cancer. The proposed method integrates algorithms related to iris segmentation and proposes a novel algorithm for the detection of UM from the approach of fuzzy logic and neural networks. The study case results show 76% correct classification in the fuzzy logic system and 96.04% for the artificial neural networks.
This document describes a study using microwave imaging to detect brain strokes. Researchers used an anatomically realistic numerical head phantom with an inserted simulated hemorrhagic stroke. Microwave signals were used to estimate backscattered signals from the phantom. The Born iterative method was then applied to the signals to reconstruct an image of the phantom and detect the inserted stroke based on differences in dielectric properties between healthy and stroke-affected tissues. The study aims to more accurately model attenuation and reflections in the head compared to previous works using simpler phantoms. Reconstructed images using 850 MHz signals clearly detected the inserted stroke region.
SWI , high susceptibility for blood products, iron depositions, and calcifications
makes susceptibility-weighted imaging an important additional sequence for the diagnostic
workup of pediatric brain pathologic abnormalities. Compared with conventional MRI
sequences, susceptibility-weighted imaging may show lesions in better detail or with higher
sensitivity
Steganography is the art and science of hiding the
existence of information. In computer-based steganography,
several forms of digital media may be used as “cover” for hidden
information. Photos, documents, web pages and even MP3 music
files may all serve as innocuous looking hosts for secret messages.
In this paper, we generate a ECG signal of patient and hide this
ECG signal in the image of patient i.e. patient photo is used as a
cover for hiding the ECG signal. Steganography is done using the
Contourlet transform. To hide the data in image Singular Value
Decomposition (SVD) is used. The contourlet transform provides
higher correlation coefficient. The results are comparing with the
wavelet transform. The proposed system provides a better PSNR
value than the wavelet transform.
This document summarizes a research paper on computed tomography (CT) dose reduction and view number optimization. It discusses how CT uses X-rays to create images but that radiation exposure is a concern, especially for pediatric patients. The paper explores how iterative reconstruction techniques and compressed sensing theories have aimed to reduce views and dose while maintaining image quality. It presents the goal of investigating the relationship between image quality, view number, and radiation dose level. Numerical tests were performed to determine the optimal view number for a given dose level that achieves the best reconstruction quality.
Patient data acquisition and treatment verification.pptxJuliyet K Joy
1) Patient data acquisition involves obtaining 3D models from CT, MRI, or ultrasound scans to represent patient anatomy and tumours for treatment planning. CT numbers provide information on tissue density.
2) Treatment verification is important to ensure accurate radiation dose delivery and can involve portal films, electronic portal imaging, or cone-beam CT to check patient positioning.
3) Cone-beam CT acquires multidirectional x-ray images using on-board imaging systems to reconstruct 3D volumetric images for treatment guidance and avoiding critical structures.
On The Detection of Ctni - A Comparison of Surface-Plasmon Optical - Electroc...komalicarol
“Cardiovascular diseases (CVDs) are the number one cause of
death globally, taking an estimated 17.9 million lives each year.
CVDs are a group of disorders of the heart and blood vessels and
include coronary heart disease, cerebrovascular disease, rheumatic
heart disease, and other conditions
Usefulness of Non-Enhanced 3-Dementional CT with Partial Maximum Intensity Pr...science journals
Computed Tomography (CT) with contrast material is often used for preoperative assessment and planning of embolotherapy in the treatment of Pulmonary Arteriovenous Malformations (PAVMs).
Detection of acute leukemia using white blood cells segmentation based onIAEME Publication
This document describes a study that developed an automated system for detecting acute leukemia using white blood cell segmentation from blood samples. The system applies image segmentation, feature extraction and cell classification techniques to differentiate normal cells from blast cells. It was tested on 108 images from a public dataset. The segmentation approach involved preprocessing, thresholding, and morphological operations to isolate white blood cells. Features like area, perimeter and circularity were then extracted and a k-nearest neighbor classifier was used to classify cells as normal or blast. Experimental results found the segmentation approach could accurately isolate white blood cells within milliseconds to aid in acute leukemia detection.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Automatic Segmentation of Brachial Artery based on Fuzzy C-Means Pixel Clust...IJECEIAES
Automatic extraction of brachial artery and measuring associated indices such as flow-mediated dilatation and Intima-media thickness are important for early detection of cardiovascular disease and other vascular endothelial malfunctions. In this paper, we propose the basic but important component of such decision-assisting medical software development – noise tolerant fully automatic segmentation of brachial artery from ultrasound images. Pixel clustering with Fuzzy C-Means algorithm in the quantization process is the key component of that segmentation with various image processing algorithms involved. This algorithm could be an alternative choice of segmentation process that can replace speckle noise-suffering edge detection procedures in this application domain.
MDCT Principles and Applications- Avinesh ShresthaAvinesh Shrestha
Multidetector CT (MDCT) is one of the most commonly used imaging modality in the field of Radiology. Development and advancement in MDCT has made it's application as a major component in diagnosis and treatment planning of multitude of disease across the planet. This presentation briefly describes its basic principle and it's wide variety of application in medical imaging.
An automated system for classifying types of cerebral hemorrhage based on ima...IJECEIAES
The brain is one of the most important vital organs in the human body. It is responsible for most of the body’s basic activities, such as breathing, heartbeat, thinking, remembering, speaking, and others. It also controls the central nervous system. Cerebral hemorrhage is considered one of the most dangerous diseases that a person may be exposed to during his life. Therefore, the correct and rapid diagnosis of the hemorrhage type is an important medical issue. The innovation in this work lies in extracting a huge number of effective features from computed tomography (CT) images of the brain using the Orange3 data mining technique, as the number of features extracted from each CT image reached (1,000). The proposed system then uses the extracted features in the classification process through logistic regression (LR), support vector machine (SVM), k-nearest neighbor algorithm (KNN), and convolutional neural networks (CNN), which classify cerebral hemorrhage into four main types: epidural hemorrhage, subdural hemorrhage, intraventricular hemorrhage, and intraparenchymal hemorrhage. A total of (1,156) CT images were tested to verify the validity of the proposed model, and the results showed that the accuracy reached the required success level with an average of (97.1%).
This document summarizes research on mathematical modeling of brain tumor growth and invasion. It discusses early models of tumor growth and diffusion that assumed homogeneous brain tissue. Later models incorporated brain heterogeneity by allowing different diffusion rates in grey and white matter. An example application uses a partial differential equation model and high performance computing to predict brain tumor growth. Cellular automata models are also described that simulate cancer growth and proliferation as a complex, chaotic dynamical system. Biomagnetic measurements provide evidence of low-dimensional chaotic dynamics in cancer lesions.
Thesis / Doctoral Project / Dissertation Proposal
Student Information:
Student GUID Number:
833168318
Student Name: (As it appears on your transcript)
Abdullatif Abdullah
Address:
1850 Columbia Pike Apt 406, Arlington, Virginia, 22204
E-Mail Address:
[email protected]
Phone Number:
571-340-6065
Degree:
Masters in Health Physics
Expected Graduation Month/Year
05 / 2022
Dept./Major:
Health Physics
I. Title:
Estimation of Peak Skin Dose and Its Relation to the Size Specific Dose Estimate
II. Problem or Hypothesis:
The CT Dose Index (CTDIvol) was originally designed as an index of dose associated with various CT diagnostic procedures not as a direct dosimetry method for individual patient dose assessments. There is no current method for calculating peak skin dose (PSD) using the key metrics provided from the radiation dose structure report of a CT scanner. Every CT study is required to output the kVp and mAs that were used, the dose length product and CT dose index volume which will all be shown on the CT console, but there is no direct method to go straight to the PSD. This project will test the hypothesis that the SSDE has a sufficiently strong linear relationship with PSD to allow direct calculation of the PSD directly from the SSDE.
III. Review of Related Literature:
The highest radiation dose accruing at a single site on a patient’s skin is referred to as the peak skin dose (PSD) which is related to the Computed Tomography dose index (CTDIvol) that is displayed on the console of CT scanners. However, the CT Dose Index was originally designed as an index not as a direct dosimetry method for patient dose assessment. More recently, modifications to original CTDI concept have attempted to convert it into to patient dosimetry method, but have with mixed results in terms of accuracy. Nonetheless, CTDI-based dosimetry is the current worldwide standard for estimation of patient dose in CT. Therefore, CTDIvol is often used to enable medical physicists to compare the dose output between different CT scanners.
Fearon, Thomas (2011) explained that current estimation of radiation dose from CT scans on patients has relied on the measurement of Computed Tomography Dose Index (CTDI) in standard cylindrical phantoms, and calculations based on mathematical representations of “standard man.” The purpose of this study was to investigate the feasibility of adapting a radiation treatment planning system (RTPS) to provide patient-specific CT dosimetry. A radiation treatment planning system was modified to calculate patient-specific CT dose distributions, which can be represented by dose at specific points within an organ of interest, as well as organ dose-volume (after image segmentation) for a GE Light Speed Ultra Plus CT scanner. Digital representations of the phantoms (virtual phantom) were acquired with the GE CT scanner in axial mode. Thermoluminescent dosimeter (TLDs) measurements in pediatric anthropomorphic phantoms were utilized t ...
The document provides an overview of computed tomography (CT) scans. It discusses the history and development of CT scans, how they work, their components and circuitry. Key points covered include that CT scans were invented in the 1970s, use X-rays to generate cross-sectional images of the body, and have advanced from early generation whole body scanners to current high resolution multi-slice machines. CT scans provide important medical imaging capabilities with minimal risks when used properly.
Computed tomography (CT) uses computer-processed X-rays to create cross-sectional images of the body. CT works by rotating an X-ray tube and detectors around the patient, acquiring multiple transmission measurements at different angles to reconstruct a 3D image. Image reconstruction involves algorithms like back projection and filtered back projection that use the transmission data to calculate the attenuation coefficients of different tissues and generate tomographic images representing slices of the body. CT numbers, measured in Hounsfield units, provide standardized values related to tissue density and visibility.
This document summarizes key concepts in computed tomography (CT) imaging. It discusses how CT uses x-rays to measure the attenuation of objects along different projection angles to reconstruct cross-sectional images. Specifically, it covers:
1) How monoenergetic and polychromatic x-ray sources are used to measure attenuation projections and the artifacts that can arise from beam hardening and scatter.
2) Different scanning methods like fan beam rotational and fixed detector ring configurations.
3) Emission CT techniques like SPECT and PET that use radioactive tracers.
4) Ultrasound CT and magnetic resonance imaging which use different physical phenomena for tissue imaging and data collection.
5) Artifacts like
Discrete Wavelet Transform Based Brain Tumor Detection using Haar AlgorithmIIRindia
This document summarizes a research paper on detecting brain tumors using discrete wavelet transform and the Haar algorithm. It begins by introducing brain tumors and their grading based on malignancy. It then discusses using discrete wavelet transform to decompose MRI images into frequency subbands, and the Haar wavelet transform specifically. The proposed method decomposes an input MRI image with a potential tumor and database MRI images using DWT. It compares the low frequency subbands of the input and database images using mutual information to detect differences indicating a tumor. Experimental results on real MRI images demonstrate the method can accurately detect brain tumors.
This document discusses the use of CT scans for evaluating patients with strokes. It covers:
1) What a stroke is and the main types.
2) Why CT scans are commonly used for stroke patients due to advantages like cross-sectional imaging, visualization of small objects, and fast diagnosis.
3) The key components of a CT system and scanning techniques for stroke patients, including contrast administration and dual energy technology advances.
This document presents a method for enhancing latent fingerprint images acquired using optical coherence tomography (OCT). OCT produces 3D volume data of fingerprints that is processed into 2D images, but these images suffer from speckle noise. The paper proposes using a wavelet transform algorithm based on phase preservation to denoise the images. Experimental results on fingerprints collected from 20 individuals show that applying the denoising algorithm improves feature extraction accuracy compared to non-denoised images, with a lower equal error rate and false match rate. This demonstrates that the denoising method enhances fingerprint image quality and improves the performance of fingerprint recognition.
The Computed Tomography (CT) dose output of some selected hospitals in the Federal capital Territory, Abuja, Nigeria have been determined by calculating the Effective doses of CT Chest and Abdomen-Pelvis of selected hospitals and compared its average with the Mean Reference Dose of CT Chest and Abdomen-Pelvis from four hospitals in the Federal Capital Territory, Abuja, Nigeria. Effective Dose and Scan type were extracted from the CT Chest and Abdomen-Pelvis examinations recorded. The Effective Dose of each patient undergoing the Chest and Abdomen-Pelvis examinations were calculated using the coefficient factor and the DLP values. Patients’ CT dose data from the ages of 18 to 60years from each of the 4 centres for each study type from January, 2013 to December, 2014 was extracted. A total of 112 patients’ CT dose data was extracted. Chest CT Effective Dose ranged from 9.0 to 34.0mSv, while Abdomen-Pelvis CT Effective Dose ranged from 15.9 to 61.0 for all the Centres in Federal Capital Territory, Abuja. This is higher than the recommended Reference Effective Dose range for CT Chest which is from 5 – 7mSv. and for CT Abdomen-Pelvis is from 8 – 14mSv. The mean effective dose from the Chest CT is 21.8mSv and from the Abdomen-Pelvis is 31.9mSv.
IRJET- Acute Ischemic Stroke Detection and ClassificationIRJET Journal
This document presents a method for detecting and classifying acute ischemic strokes in CT scan images. The method involves pre-processing images using median filtering and skull stripping. Features like mean, entropy, and gray-level co-occurrence matrix values are then extracted. Naive Bayes and k-nearest neighbor classifiers are used to classify images as normal or stroke with 92% accuracy. The k-NN classifier takes longer (8.80 seconds) to process images compared to the Naive Bayes classifier (5.85 seconds). The method accurately detects stroke regions in images and can help in early diagnosis and treatment of ischemic strokes.
Brain Tumor Segmentation and Volume Estimation from T1-Contrasted and T2 MRIsCSCJournals
This document presents a novel, fully automatic method for brain tumor segmentation and volume estimation using T1-contrasted and T2 MRI scans. The method involves 5 main steps: 1) preprocessing images using anisotropic diffusion filtering, 2) segmenting tumor regions using k-means clustering, 3) combining segmented regions using logical and morphological operations, 4) applying temporal smoothing for error checking, and 5) measuring the tumor volume. The method was tested on brain volumes from a public dataset and compared to 5 other state-of-the-art algorithms, outperforming them in accuracy and closeness to actual tumor volumes.
IRJET- Computer Aided Detection Scheme to Improve the Prognosis Assessment of...IRJET Journal
This document describes a computer-aided detection scheme to predict the risk of cancer recurrence in early-stage lung cancer patients after surgery. The scheme uses chest CT images taken before surgery to automatically segment lung tumors and extract morphological and texture-based image features. A naive Bayesian classifier is trained on six image features to predict recurrence risk. A separate artificial neural network classifier is trained on two genomic biomarkers to predict risk. The results from the two classifiers are then combined using a fusion method to produce the overall risk prediction. The goal is to more accurately assess prognosis and help doctors better manage early-stage non-small cell lung cancer patients after surgery.
This document summarizes a research paper that examines pricing strategy in a two-stage supply chain consisting of a supplier and retailer. The supplier offers a credit period to the retailer, who then offers credit to customers. A mathematical model is formulated to maximize total profit for the integrated supply chain system. The model considers three cases based on the relative lengths of the credit periods offered at each stage. Equations are developed to represent the profit functions for the supplier, retailer and overall system in each case. The goal is to determine the optimal selling price that maximizes total integrated profit.
The document discusses melanoma skin cancer detection using a computer-aided diagnosis system based on dermoscopic images. It begins with an introduction to skin cancer and melanoma. It then reviews existing literature on automated melanoma detection systems that use techniques like image preprocessing, segmentation, feature extraction and classification. Features extracted in other studies include asymmetry, border irregularity, color, diameter and texture-based features. The proposed system collects dermoscopic images and performs preprocessing, segmentation, extracts 9 features based on the ABCD rule, and classifies images using a neural network classifier to detect melanoma. It aims to develop an automated diagnosis system to eliminate invasive biopsy procedures.
More Related Content
Similar to Dating the Hematoma of Haemorrhagic Stroke by Analysis of the Sisintegration of Oxyhemoglobin Nuclei
Patient data acquisition and treatment verification.pptxJuliyet K Joy
1) Patient data acquisition involves obtaining 3D models from CT, MRI, or ultrasound scans to represent patient anatomy and tumours for treatment planning. CT numbers provide information on tissue density.
2) Treatment verification is important to ensure accurate radiation dose delivery and can involve portal films, electronic portal imaging, or cone-beam CT to check patient positioning.
3) Cone-beam CT acquires multidirectional x-ray images using on-board imaging systems to reconstruct 3D volumetric images for treatment guidance and avoiding critical structures.
On The Detection of Ctni - A Comparison of Surface-Plasmon Optical - Electroc...komalicarol
“Cardiovascular diseases (CVDs) are the number one cause of
death globally, taking an estimated 17.9 million lives each year.
CVDs are a group of disorders of the heart and blood vessels and
include coronary heart disease, cerebrovascular disease, rheumatic
heart disease, and other conditions
Usefulness of Non-Enhanced 3-Dementional CT with Partial Maximum Intensity Pr...science journals
Computed Tomography (CT) with contrast material is often used for preoperative assessment and planning of embolotherapy in the treatment of Pulmonary Arteriovenous Malformations (PAVMs).
Detection of acute leukemia using white blood cells segmentation based onIAEME Publication
This document describes a study that developed an automated system for detecting acute leukemia using white blood cell segmentation from blood samples. The system applies image segmentation, feature extraction and cell classification techniques to differentiate normal cells from blast cells. It was tested on 108 images from a public dataset. The segmentation approach involved preprocessing, thresholding, and morphological operations to isolate white blood cells. Features like area, perimeter and circularity were then extracted and a k-nearest neighbor classifier was used to classify cells as normal or blast. Experimental results found the segmentation approach could accurately isolate white blood cells within milliseconds to aid in acute leukemia detection.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Automatic Segmentation of Brachial Artery based on Fuzzy C-Means Pixel Clust...IJECEIAES
Automatic extraction of brachial artery and measuring associated indices such as flow-mediated dilatation and Intima-media thickness are important for early detection of cardiovascular disease and other vascular endothelial malfunctions. In this paper, we propose the basic but important component of such decision-assisting medical software development – noise tolerant fully automatic segmentation of brachial artery from ultrasound images. Pixel clustering with Fuzzy C-Means algorithm in the quantization process is the key component of that segmentation with various image processing algorithms involved. This algorithm could be an alternative choice of segmentation process that can replace speckle noise-suffering edge detection procedures in this application domain.
MDCT Principles and Applications- Avinesh ShresthaAvinesh Shrestha
Multidetector CT (MDCT) is one of the most commonly used imaging modality in the field of Radiology. Development and advancement in MDCT has made it's application as a major component in diagnosis and treatment planning of multitude of disease across the planet. This presentation briefly describes its basic principle and it's wide variety of application in medical imaging.
An automated system for classifying types of cerebral hemorrhage based on ima...IJECEIAES
The brain is one of the most important vital organs in the human body. It is responsible for most of the body’s basic activities, such as breathing, heartbeat, thinking, remembering, speaking, and others. It also controls the central nervous system. Cerebral hemorrhage is considered one of the most dangerous diseases that a person may be exposed to during his life. Therefore, the correct and rapid diagnosis of the hemorrhage type is an important medical issue. The innovation in this work lies in extracting a huge number of effective features from computed tomography (CT) images of the brain using the Orange3 data mining technique, as the number of features extracted from each CT image reached (1,000). The proposed system then uses the extracted features in the classification process through logistic regression (LR), support vector machine (SVM), k-nearest neighbor algorithm (KNN), and convolutional neural networks (CNN), which classify cerebral hemorrhage into four main types: epidural hemorrhage, subdural hemorrhage, intraventricular hemorrhage, and intraparenchymal hemorrhage. A total of (1,156) CT images were tested to verify the validity of the proposed model, and the results showed that the accuracy reached the required success level with an average of (97.1%).
This document summarizes research on mathematical modeling of brain tumor growth and invasion. It discusses early models of tumor growth and diffusion that assumed homogeneous brain tissue. Later models incorporated brain heterogeneity by allowing different diffusion rates in grey and white matter. An example application uses a partial differential equation model and high performance computing to predict brain tumor growth. Cellular automata models are also described that simulate cancer growth and proliferation as a complex, chaotic dynamical system. Biomagnetic measurements provide evidence of low-dimensional chaotic dynamics in cancer lesions.
Thesis / Doctoral Project / Dissertation Proposal
Student Information:
Student GUID Number:
833168318
Student Name: (As it appears on your transcript)
Abdullatif Abdullah
Address:
1850 Columbia Pike Apt 406, Arlington, Virginia, 22204
E-Mail Address:
[email protected]
Phone Number:
571-340-6065
Degree:
Masters in Health Physics
Expected Graduation Month/Year
05 / 2022
Dept./Major:
Health Physics
I. Title:
Estimation of Peak Skin Dose and Its Relation to the Size Specific Dose Estimate
II. Problem or Hypothesis:
The CT Dose Index (CTDIvol) was originally designed as an index of dose associated with various CT diagnostic procedures not as a direct dosimetry method for individual patient dose assessments. There is no current method for calculating peak skin dose (PSD) using the key metrics provided from the radiation dose structure report of a CT scanner. Every CT study is required to output the kVp and mAs that were used, the dose length product and CT dose index volume which will all be shown on the CT console, but there is no direct method to go straight to the PSD. This project will test the hypothesis that the SSDE has a sufficiently strong linear relationship with PSD to allow direct calculation of the PSD directly from the SSDE.
III. Review of Related Literature:
The highest radiation dose accruing at a single site on a patient’s skin is referred to as the peak skin dose (PSD) which is related to the Computed Tomography dose index (CTDIvol) that is displayed on the console of CT scanners. However, the CT Dose Index was originally designed as an index not as a direct dosimetry method for patient dose assessment. More recently, modifications to original CTDI concept have attempted to convert it into to patient dosimetry method, but have with mixed results in terms of accuracy. Nonetheless, CTDI-based dosimetry is the current worldwide standard for estimation of patient dose in CT. Therefore, CTDIvol is often used to enable medical physicists to compare the dose output between different CT scanners.
Fearon, Thomas (2011) explained that current estimation of radiation dose from CT scans on patients has relied on the measurement of Computed Tomography Dose Index (CTDI) in standard cylindrical phantoms, and calculations based on mathematical representations of “standard man.” The purpose of this study was to investigate the feasibility of adapting a radiation treatment planning system (RTPS) to provide patient-specific CT dosimetry. A radiation treatment planning system was modified to calculate patient-specific CT dose distributions, which can be represented by dose at specific points within an organ of interest, as well as organ dose-volume (after image segmentation) for a GE Light Speed Ultra Plus CT scanner. Digital representations of the phantoms (virtual phantom) were acquired with the GE CT scanner in axial mode. Thermoluminescent dosimeter (TLDs) measurements in pediatric anthropomorphic phantoms were utilized t ...
The document provides an overview of computed tomography (CT) scans. It discusses the history and development of CT scans, how they work, their components and circuitry. Key points covered include that CT scans were invented in the 1970s, use X-rays to generate cross-sectional images of the body, and have advanced from early generation whole body scanners to current high resolution multi-slice machines. CT scans provide important medical imaging capabilities with minimal risks when used properly.
Computed tomography (CT) uses computer-processed X-rays to create cross-sectional images of the body. CT works by rotating an X-ray tube and detectors around the patient, acquiring multiple transmission measurements at different angles to reconstruct a 3D image. Image reconstruction involves algorithms like back projection and filtered back projection that use the transmission data to calculate the attenuation coefficients of different tissues and generate tomographic images representing slices of the body. CT numbers, measured in Hounsfield units, provide standardized values related to tissue density and visibility.
This document summarizes key concepts in computed tomography (CT) imaging. It discusses how CT uses x-rays to measure the attenuation of objects along different projection angles to reconstruct cross-sectional images. Specifically, it covers:
1) How monoenergetic and polychromatic x-ray sources are used to measure attenuation projections and the artifacts that can arise from beam hardening and scatter.
2) Different scanning methods like fan beam rotational and fixed detector ring configurations.
3) Emission CT techniques like SPECT and PET that use radioactive tracers.
4) Ultrasound CT and magnetic resonance imaging which use different physical phenomena for tissue imaging and data collection.
5) Artifacts like
Discrete Wavelet Transform Based Brain Tumor Detection using Haar AlgorithmIIRindia
This document summarizes a research paper on detecting brain tumors using discrete wavelet transform and the Haar algorithm. It begins by introducing brain tumors and their grading based on malignancy. It then discusses using discrete wavelet transform to decompose MRI images into frequency subbands, and the Haar wavelet transform specifically. The proposed method decomposes an input MRI image with a potential tumor and database MRI images using DWT. It compares the low frequency subbands of the input and database images using mutual information to detect differences indicating a tumor. Experimental results on real MRI images demonstrate the method can accurately detect brain tumors.
This document discusses the use of CT scans for evaluating patients with strokes. It covers:
1) What a stroke is and the main types.
2) Why CT scans are commonly used for stroke patients due to advantages like cross-sectional imaging, visualization of small objects, and fast diagnosis.
3) The key components of a CT system and scanning techniques for stroke patients, including contrast administration and dual energy technology advances.
This document presents a method for enhancing latent fingerprint images acquired using optical coherence tomography (OCT). OCT produces 3D volume data of fingerprints that is processed into 2D images, but these images suffer from speckle noise. The paper proposes using a wavelet transform algorithm based on phase preservation to denoise the images. Experimental results on fingerprints collected from 20 individuals show that applying the denoising algorithm improves feature extraction accuracy compared to non-denoised images, with a lower equal error rate and false match rate. This demonstrates that the denoising method enhances fingerprint image quality and improves the performance of fingerprint recognition.
The Computed Tomography (CT) dose output of some selected hospitals in the Federal capital Territory, Abuja, Nigeria have been determined by calculating the Effective doses of CT Chest and Abdomen-Pelvis of selected hospitals and compared its average with the Mean Reference Dose of CT Chest and Abdomen-Pelvis from four hospitals in the Federal Capital Territory, Abuja, Nigeria. Effective Dose and Scan type were extracted from the CT Chest and Abdomen-Pelvis examinations recorded. The Effective Dose of each patient undergoing the Chest and Abdomen-Pelvis examinations were calculated using the coefficient factor and the DLP values. Patients’ CT dose data from the ages of 18 to 60years from each of the 4 centres for each study type from January, 2013 to December, 2014 was extracted. A total of 112 patients’ CT dose data was extracted. Chest CT Effective Dose ranged from 9.0 to 34.0mSv, while Abdomen-Pelvis CT Effective Dose ranged from 15.9 to 61.0 for all the Centres in Federal Capital Territory, Abuja. This is higher than the recommended Reference Effective Dose range for CT Chest which is from 5 – 7mSv. and for CT Abdomen-Pelvis is from 8 – 14mSv. The mean effective dose from the Chest CT is 21.8mSv and from the Abdomen-Pelvis is 31.9mSv.
IRJET- Acute Ischemic Stroke Detection and ClassificationIRJET Journal
This document presents a method for detecting and classifying acute ischemic strokes in CT scan images. The method involves pre-processing images using median filtering and skull stripping. Features like mean, entropy, and gray-level co-occurrence matrix values are then extracted. Naive Bayes and k-nearest neighbor classifiers are used to classify images as normal or stroke with 92% accuracy. The k-NN classifier takes longer (8.80 seconds) to process images compared to the Naive Bayes classifier (5.85 seconds). The method accurately detects stroke regions in images and can help in early diagnosis and treatment of ischemic strokes.
Brain Tumor Segmentation and Volume Estimation from T1-Contrasted and T2 MRIsCSCJournals
This document presents a novel, fully automatic method for brain tumor segmentation and volume estimation using T1-contrasted and T2 MRI scans. The method involves 5 main steps: 1) preprocessing images using anisotropic diffusion filtering, 2) segmenting tumor regions using k-means clustering, 3) combining segmented regions using logical and morphological operations, 4) applying temporal smoothing for error checking, and 5) measuring the tumor volume. The method was tested on brain volumes from a public dataset and compared to 5 other state-of-the-art algorithms, outperforming them in accuracy and closeness to actual tumor volumes.
IRJET- Computer Aided Detection Scheme to Improve the Prognosis Assessment of...IRJET Journal
This document describes a computer-aided detection scheme to predict the risk of cancer recurrence in early-stage lung cancer patients after surgery. The scheme uses chest CT images taken before surgery to automatically segment lung tumors and extract morphological and texture-based image features. A naive Bayesian classifier is trained on six image features to predict recurrence risk. A separate artificial neural network classifier is trained on two genomic biomarkers to predict risk. The results from the two classifiers are then combined using a fusion method to produce the overall risk prediction. The goal is to more accurately assess prognosis and help doctors better manage early-stage non-small cell lung cancer patients after surgery.
Similar to Dating the Hematoma of Haemorrhagic Stroke by Analysis of the Sisintegration of Oxyhemoglobin Nuclei (20)
This document summarizes a research paper that examines pricing strategy in a two-stage supply chain consisting of a supplier and retailer. The supplier offers a credit period to the retailer, who then offers credit to customers. A mathematical model is formulated to maximize total profit for the integrated supply chain system. The model considers three cases based on the relative lengths of the credit periods offered at each stage. Equations are developed to represent the profit functions for the supplier, retailer and overall system in each case. The goal is to determine the optimal selling price that maximizes total integrated profit.
The document discusses melanoma skin cancer detection using a computer-aided diagnosis system based on dermoscopic images. It begins with an introduction to skin cancer and melanoma. It then reviews existing literature on automated melanoma detection systems that use techniques like image preprocessing, segmentation, feature extraction and classification. Features extracted in other studies include asymmetry, border irregularity, color, diameter and texture-based features. The proposed system collects dermoscopic images and performs preprocessing, segmentation, extracts 9 features based on the ABCD rule, and classifies images using a neural network classifier to detect melanoma. It aims to develop an automated diagnosis system to eliminate invasive biopsy procedures.
This document summarizes various techniques for image segmentation that have been studied and proposed in previous research. It discusses edge-based, threshold-based, region-based, clustering-based, and other common segmentation methods. It also reviews applications of segmentation in medical imaging, plant disease detection, and other fields. While no single technique can segment all images perfectly, hybrid and adaptive methods combining multiple approaches may provide better results. Overall, image segmentation remains an important but challenging task in digital image processing and computer vision.
This document presents a test for detecting a single upper outlier in a sample from a Johnson SB distribution when the parameters of the distribution are unknown. The test statistic proposed is based on maximum likelihood estimates of the four parameters (location, scale, and two shape) of the Johnson SB distribution. Critical values of the test statistic are obtained through simulation for different sample sizes. The performance of the test is investigated through simulation, showing it performs well at detecting outliers when the contaminant observation represents a large shift from the original distribution parameters. An example application to census data is also provided.
This document summarizes a research paper that proposes a portable device called the "Disha Device" to improve women's safety. The device has features like live location tracking, audio/video recording, automatic messaging to emergency contacts, a buzzer, flashlight, and pepper spray. It is designed using an Arduino microcontroller connected to GPS and GSM modules. When the button is pressed, it sends an alert message with the woman's location, sets off an alarm, activates the flashlight and pepper spray for self-defense. The goal is to provide women a compact, one-click safety system to help them escape dangerous situations or call for help with just a single press of a button.
- The document describes a study that constructed physical fitness norms for female students attending social welfare schools in Andhra Pradesh, India.
- Researchers tested 339 students in classes 6-10 on speed, strength, agility and flexibility tests. Tests included 50m run, bend and reach, medicine ball throw, broad jump, shuttle run, and vertical jump.
- The results showed that 9th class students had the best average time for the 50m run. 10th class students had the highest flexibility on average. Strength and performance generally improved with increased class level.
This document summarizes research on downdraft gasification of biomass. It discusses how downdraft gasifiers effectively convert solid biomass into a combustible producer gas. The gasification process involves pyrolysis and reactions between hot char and gases that produce CO, H2, and CH4. Downdraft gasifiers are well-suited for biomass gasification due to their simple design and ability to manage the gasification process with low tar production. The document also reviews previous studies on gasifier configuration upgrades and their impact on performance, and the principles of downdraft gasifier operation.
This document summarizes the design and manufacturing of a twin spindle drilling attachment. Key points:
- The attachment allows a drilling machine to simultaneously drill two holes in a single setting, improving productivity over a single spindle setup.
- It uses a sun and planet gear arrangement to transmit power from the main spindle to two drilling spindles.
- Components like gears, shafts, and housing were designed using Creo software and manufactured. Drill chucks, bearings, and bits were purchased.
- The attachment was assembled and installed on a vertical drilling machine. It is aimed at improving productivity in mass production applications by combining two drilling operations into one setup.
The document presents a comparative study of different gantry girder profiles for various crane capacities and gantry spans. Bending moments, shear forces, and section properties are calculated and tabulated for 'I'-section with top and bottom plates, symmetrical plate girder, 'I'-section with 'C'-section top flange, plate girder with rolled 'C'-section top flange, and unsymmetrical plate girder sections. Graphs of steel weight required per meter length are presented. The 'I'-section with 'C'-section top flange profile is found to be optimized for biaxial bending but rolled sections may not be available for all spans.
This document summarizes research on analyzing the first ply failure of laminated composite skew plates under concentrated load using finite element analysis. It first describes how a finite element model was developed using shell elements to analyze skew plates of varying skew angles, laminations, and boundary conditions. Three failure criteria (maximum stress, maximum strain, Tsai-Wu) were used to evaluate first ply failure loads. The minimum load from the criteria was taken as the governing failure load. The research aims to determine the effects of various parameters on first ply failure loads and validate the numerical approach through benchmark problems.
This document summarizes a study that investigated the larvicidal effects of Aegle marmelos (bael tree) leaf extracts on Aedes aegypti mosquitoes. Specifically, it assessed the efficacy of methanol extracts from A. marmelos leaves in killing A. aegypti larvae (at the third instar stage) and altering their midgut proteins. The study found that the leaf extract achieved 50% larval mortality (LC50) at a concentration of 49 ppm. Proteomic analysis of larval midguts revealed changes in protein expression levels after exposure to the extract, suggesting its bioactive compounds can disrupt the midgut. The aim is to identify specific inhibitor proteins in the midg
This document presents a system for classifying electrocardiogram (ECG) signals using a convolutional neural network (CNN). The system first preprocesses raw ECG data by removing noise and segmenting the signals. It then uses a CNN to extract features directly from the ECG data and classify arrhythmias without requiring complex feature engineering. The CNN architecture contains 11 convolutional layers and is optimized using techniques like batch normalization and dropout. The system was tested on ECG datasets and achieved classification accuracy of over 93%, demonstrating its effectiveness at automated ECG classification.
This document presents a new algorithm for extracting and summarizing news from online newspapers. The algorithm first extracts news related to the topic using keyword matching. It then distinguishes different types of news about the same topic. A term frequency-based summarization method is used to generate summaries. Sentences are scored based on term frequency and the highest scoring sentences are selected for the summary. The algorithm was evaluated on news datasets from various newspapers and showed good performance in intrinsic evaluation metrics like precision, recall and F-score. Thus, the proposed method can effectively extract and summarize online news for a given keyword or topic.
This presentation is about Food Delivery Systems and how they are developed using the Software Development Life Cycle (SDLC) and other methods. It explains the steps involved in creating a food delivery app, from planning and designing to testing and launching. The slide also covers different tools and technologies used to make these systems work efficiently.
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfBalvir Singh
Sri Guru Hargobind Ji (19 June 1595 - 3 March 1644) is revered as the Sixth Nanak.
• On 25 May 1606 Guru Arjan nominated his son Sri Hargobind Ji as his successor. Shortly
afterwards, Guru Arjan was arrested, tortured and killed by order of the Mogul Emperor
Jahangir.
• Guru Hargobind's succession ceremony took place on 24 June 1606. He was barely
eleven years old when he became 6th Guru.
• As ordered by Guru Arjan Dev Ji, he put on two swords, one indicated his spiritual
authority (PIRI) and the other, his temporal authority (MIRI). He thus for the first time
initiated military tradition in the Sikh faith to resist religious persecution, protect
people’s freedom and independence to practice religion by choice. He transformed
Sikhs to be Saints and Soldier.
• He had a long tenure as Guru, lasting 37 years, 9 months and 3 days
Levelised Cost of Hydrogen (LCOH) Calculator ManualMassimo Talia
The aim of this manual is to explain the
methodology behind the Levelized Cost of
Hydrogen (LCOH) calculator. Moreover, this
manual also demonstrates how the calculator
can be used for estimating the expenses associated with hydrogen production in Europe
using low-temperature electrolysis considering different sources of electricity
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...DharmaBanothu
The Network on Chip (NoC) has emerged as an effective
solution for intercommunication infrastructure within System on
Chip (SoC) designs, overcoming the limitations of traditional
methods that face significant bottlenecks. However, the complexity
of NoC design presents numerous challenges related to
performance metrics such as scalability, latency, power
consumption, and signal integrity. This project addresses the
issues within the router's memory unit and proposes an enhanced
memory structure. To achieve efficient data transfer, FIFO buffers
are implemented in distributed RAM and virtual channels for
FPGA-based NoC. The project introduces advanced FIFO-based
memory units within the NoC router, assessing their performance
in a Bi-directional NoC (Bi-NoC) configuration. The primary
objective is to reduce the router's workload while enhancing the
FIFO internal structure. To further improve data transfer speed,
a Bi-NoC with a self-configurable intercommunication channel is
suggested. Simulation and synthesis results demonstrate
guaranteed throughput, predictable latency, and equitable
network access, showing significant improvement over previous
designs
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
Dating the Hematoma of Haemorrhagic Stroke by Analysis of the Sisintegration of Oxyhemoglobin Nuclei
1. International Journal of Research in Advent Technology, Vol.7, No.9, September 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
6
doi: 10.32622/ijrat.79201903
Abstract— Hemorrhagic stroke is caused by the rupture of
cerebral blood vessels discharging blood onto the
surrounding tissues and caused the hematoma. The
knowledge of the evolutionary profile of the hematoma is
essential at the end of the stroke, because it allows specialists
to direct the treatment. The present work aims to develop a
method to characterize the four stages of evolution of the
hematoma. The material consists of haemorrhagic CT scan
images collected at the Cotonou CNHU CT scan unit and
processed in MATLAB R2015a environment. The proposed
method made it possible to determine a mathematical
function that can model the density distribution of
oxyhemoglobins in the hematoma. The results obtained made
it possible to characterize the different evolutionary stages of
the hemorrhagic stroke with a success rate of 97,09% on a
database of 103 images. This method of dating the hematoma
will certainly be a decision-making tool in the diagnosis and
management of haemorrhagic stroke.
Index Terms— Clot, Evolutionary profile, hemorrhagic
stroke, oxyhemoglobin
I. INTRODUCTION
The stroke is a neurological deficit suddenly caused by an
infarction or hemorrhage. The hemorrhagic stroke, is caused
by the rupture of cerebral blood vessels spilling blood into the
surrounding tissues. The hematoma is the blood clot resulting
from cerebral hemorrhage [2]. According to the WHO
(2015) report on the causes of death worldwide, ischemia and
hemorrhagic stroke are largely ahead of respiratory diseases,
cancer and AIDS. WHO [6] does not hesitate to talk about
Pandemic and expects a progressive increase in the incidence
of stroke worldwide from 16 million cases in 2005 to nearly
of 23 million in 2030. The strokes are nowadays a major
public health problem.In general, in case of stroke, when the
Manuscript revised on September 17, 2019 and published on October
10, 2019
BIAOU Dimon Jean, Ecole Doctorale Sciences de l’Ingénieur, Université
d’Abomey-Calavi (UAC), Laboratoire d’Electrotechnique de
Télécommunications et d’Informatique Appliquée (LETIA), 01 BP 2009 RP
Cotonou, Bénin.
ASSOGBA Kokou, Ecole Doctorale Sciences de l’Ingénieur, Université
d’Abomey-Calavi(UAC), Laboratoire d’Electrotechnique de
Télécommunications et d’Informatique Appliquée (LETIA), 01 BP 2009 RP
Cotonou, Bénin.
VIANOU Antoine, Ecole Doctorale Sciences de l’Ingénieur, Université
d’Abomey-Calavi(UAC), Laboratoire d’Electrotechnique de
Télécommunications et d’Informatique Appliquée (LETIA), 01 BP 2009 RP
Cotonou, Bénin.
life threatening is engaged, it is the cerebral CT scan without
injection which is the examination most often carried out
urgently for the diagnosis of hematoma [3]. The goal of
imaging is to make the diagnosis of hematoma, is to know the
evolutionary profile, and to recognize the underlying causes
because of the risk of bleeding recurrence and treatment
possibilities.
Table 1 : WHO statistics and forecasts (Source : [7])
The precision in the diagnosis and the promptness in the care
are essential at the stroke outcome. This is why the
establishment of a method for dating the hematoma is
certainly a decision-making tool that can provide more
precision and speed in the diagnosis of hemorrhagic stroke.
Four evolutionary profiles of the hematoma are classically
distinguished: the hyper-acute, acute, subacute and chronic
stages. For example, we have:
• In the hyper-acute stage (3 to 6 hours)
The clot consists of a heterogeneous mass composed of red
blood cells filled with oxyhemoglobins. In CT scan, the
hematoma is hyperdense compared to the cerebral
parenchyma but it can be heterogeneous and contain
hypodense areas [5], [2].
• At the sub-acute stage (3 days-4 weeks)
The oxidative denaturation of hemoglobin progresses and
deoxyhemoglobin is transformed into methemoglobin. On
CT scan, the density of the hematoma decreases further, the
edges become blurred, isodense and hypodense [5], [2].
Fig. 1. Different stages or Evolutionary
II. MATERIAL AND METHODS
A. Material
The material consists of brain CT scan images collected at the
CT scan unit of the Hubert MAGA University Hospital
Dating the Hematoma of Haemorrhagic Stroke by Analysis
of the disintegration of Oxyhemoglobin Nuclei
BIAOU Dimon Jean, ASSOGBA Kokou, VIANOU Antoine
YEAR Number of
Victims
Number of
Deaths
1990 10 100 000 4 700 000
2010 16 800 000 5 900 000
2030 23 000 000 12 000 000
Acute stage Sub-acute stage Chronic stageHyperacute stage
2. International Journal of Research in Advent Technology, Vol.7, No.9, September 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
7
doi: 10.32622/ijrat.79201903
Center (CNHU-HKM) located at the Faculty of Health
Sciences of Cotonou and supplemented by images for free
download on the Net. This image database was processed in a
Matlab version 8.5 environment (R2015a)
B. Methods
1) Disintegration of oxyhemoglobin nuclei
The hematoma dating method used here is based on the
knowledge of the anatomical transformations of the
hematoma [1]. The global analysis of the hematoma
transformations shows a continuous decrease of the
oxyhemoglobin level in the hematoma. In fact, the density of
oxyhemoglobins, generally represented in the image of the
CT scan, by blocks of white pixels, gradually decreases from
the edges of the hematoma towards the center following the
evolutionary stages of the hemorrhagic stroke to cancel at the
chronic phase [2]. This decrease in oxyhemoglobin level can
be modeled by the radioactive decay function.
In a sample of radioactive material consisting of radioactive
nuclei of a given species, the number of nuclei will decrease
over time, and will be noted
N (t). If we call N0 the number of nuclei initially present, we
have the relation :
With λ the probability that a kernel disintegrates per unit of
time.
From the relation Eq. (1) we can determine
The analysis of a database of brain CT scan images of the
same individual over several days made it possible to draw an
empirical curve of the decay of oxyhemoglobins.
2) Determination of a reference threshold T0
The threshold T0 sought here corresponds to the threshold of
the distributions of the oxyhemoglobins at the date T0
corresponding to the day 1 of the beginning of the stroke. To
do this, the Otsu threshold determination method was applied
to all day 1 images. The average of the calculated thresholds
made it possible to obtain a reference threshold T0.
Otsu's [8] method automatically detects the threshold by
seeking to minimize the variance within each region, which
amounts to maximizing the variance between the two
regions. This Otsu thresholding algorithm can be summed up
to [4] :
With : µ = moy{I(x)} , µ0 = moy{I(x) for I(x) < T} and µ1=
moy{I(x) for I(x) ≥ T}. h being the histogram function.
3) Correlation between the empirical curve and the
modeling function
• Kolmogorov-Smirnov test
In order to determine the value of the parameter λ which
makes it possible to obtain a correlation between the
empirical curve and the theoretical function modeling this
distribution, the Komogorov-smirnov test is used.
Indeed, the Kolmogorov-Smirnov (KS) bilateral Dn test
statistic is widely used to measure the quality of fit between
the empirical distribution of a set of n observations and a
continuous probability distribution. It is defined by :
Where n is the number of (independent) observations, Gn is
the function of the empirical cumulative distribution and G is
a fully specified continuous theoretical cumulative
distribution function. Let Fn be the cumulative distribution
function of Dn responding to the null hypothesis H0 for which
the n observations are independent and whose function is of
cumulative distribution G, we have :
The value λ corresponding to the hypothesis H0 = 0 is then the
correlation value of the empirical curve and the theoretical
curve.
The general algorithm of the method is:
VARIABLES InputImage, SizeofImage, N0, landa, Dn, N(t), n
PREDEFINED FUNCTIONS SmirnovTest
ASSIGNMENT H0=1, landa = 0,009
BEGING
//Détermination of NO per size of image
READ InputImage
IF(SizeofImage =114x106) THEN
N0=9303
WHILE (Dn !=0)
n++
DO
Landa=landa-0.001
N(t) = N0*exp(-landa*t)
END WHILE
ELSE IF (SizeofImage = 75x96) THEN
N0=2650
WHILE (Dn !=0)
n++
DO
Landa=landa-0.001
N(t) = N0*exp (-landa*t)
END WHILE
ELSE IF (SizeofImage=34x34) THEN
N0=907
WHILE(Dn !=0)
n++
DO
Landa=landa-0.001
N(t) = N0*exp(-landa*t)
END WHILE
END IF
END
// Détermination of reference threshold
VARIABLES refInputImage, n, T0
3. International Journal of Research in Advent Technology, Vol.7, No.9, September 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
8
doi: 10.32622/ijrat.79201903
PREDEFINED FUNCTIONS OtsuThreshold
BEGING
READ RefInputImage
T= OtsuThreshold(refInputImage)
FOR (1 to n)
DO
T0 =(T)/n
END FOR
END
III. RESULTS
A. Disintegration equation of oxyhemoglobin nuclei
Table 2 : Decay equation of oxyhemoglobins as a function
of hematoma size
Correlation curve H0 = 0
Fig. 2. Kolmogorov-Smirnov Test Correlation Curve
B. Hematoma dating result
C. Hematoma dating result
hematoma
size
Treshold
T0
equivalent
to H0
N0 Equation of
decay
114x106 190 8,8x10-3
9303
75x96 190 8,8x10-3
2650
34x34 190 8,8x10-3
907
CT1
Fig. 4 : CT2 hematoma dating curve
Fig. 3. CT1 hematoma dating curve
Dating CT1 t = 12,99 hours, day 1
Evolutionary profile : Acute stage
Datation CT 2 t = 80,35 hours, day 8.
Evolutionary profile : Subacute stage
CT2
Fig. 4. CT1 hematoma dating curve
4. International Journal of Research in Advent Technology, Vol.7, No.9, September 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
9
doi: 10.32622/ijrat.79201903
D. Summary of the application of the method on the
images of the database
Table 3 : Percentages of the application of the
method
Numbers Percentage
Hyperacute 4 3,88%
Acute 46 44,46%
Subacute 40 38,83%
Chronic 10 9,71%
Success 100 97,03%
Failure 3 2,91%
Total 103 100%
The relatively low failure rate demonstrates the effectiveness
of the method in dating hematomas. Indeed this rate is related
to the poor quality of some images including those download
on the net.
IV. CONCLUSION
In this study we proceeded to the characterization of
hemorrhagic stroke by dating the evolutionary profile of the
hematoma. Otsu's inter-mean algorithm allowed us to make a
judicious choice of the reference threshold in order to
determine the empirical decay curve. The Kolmogorov test
made it possible to adjust the parameter λ to obtain a perfect
correlation (H0 = 0) between the empirical curve and the
theoretical curve. The results obtained made it possible to
characterize the different evolutionary stages of the
hemorrhagic stroke with a success rate of 97,09% on a
database of 103 images. We can conclude that globally the
atomic decay function has made it possible to model the
distribution of the density of oxyhemoglobins in the
hematoma and consequently to characterize the four
evolutionary stages of the hemorrhagic stroke.
REFERENCES
[1]. Clark R.et al., 1990. Acute hematomas: effects of deoxygenation,
hematocrit, and fibrin-clot formation and retraction on T2
shortening Radiology 1990; 175, 201-206.
[2]. Domitille M., 2015. Pathologie neurovasculaire aigue [en ligne] (2015)
adresse url :
www.uclimaging.be/.../des.../des1_2015_2_pathologie_vasculaire_cer
ebrale_aigue.pdf, consulté le 12/08/2017
[3]. JFR, 2014. Diagnostique et Interventionnelle, 62ème Journées
Françaises de Radiologie Diagnostique et Interventionnelle. JFR 2014.
[4]. Krähenbühl A., 2014. Segmentation et analyse géométrique :
application aux images tomodensitométriques de bois. Imagerie
médicale. Université de Lorraine
[5]. Leclerc X. et al., 2003. Imagerie des hématomes intracérébraux non
traumatiques, Journal of Neuroradiology Vol 30, N° 5, 303-316
[6]. Marsaglia, G., W. Tsang, and J. Wang. "Evaluating Kolmogorov's
Distribution." Journal of Statistical Software. Vol. 8, Issue 18, 2003
[7]. Mendis, S., Puska, P., Norrving, B., World Health Organization, World
Heart Federation, World Stroke Organization, 2011. Global atlas on
cardiovascular disease prevention and control. World Health
Organization : World Heart Federation : World Stroke Organization,
Geneva.
[8]. Otsu, N., 1979. "A Threshold Selection Method from Gray-Level
Histograms," IEEE Transactions on Systems, Man, and Cybernetics,
Vol. 9, No. 1, 62-66
AUTHORS PROFILE
Dimon Jean BIAOU obtained his MASTER in
Network and Telecommunications in 2013, and the
Diplôme d’Etudes Approfondies (DEA) from the
Graduate School of Engineering Sciences in 2015. He
is currently a PhD student at the University of
Abomey-Calavi (UAC) at the LETIA laboratory under
the direction of Kokou Assogba. His research interests
include Image processing applied to stroke, Artificial
Intelligence, Object detection and tracking.
Dr. Kokou ASSOGBA obtained his PhD degree in
Images and Signal Processing in 1999 at University
Paris XII Val de Marne, France. He is working, since as
teacher researcher in Computer Science and
Electronics at University of Abomey-Calavi. He is
Senior Member AND Head of the Laboratory of
Electronics, Telecommunications and Applied
Informatics (LETIA), he recently became Director
General of Higher Education. His main research
interests are: Digital Image processing, Pattern
Recognition, Images Segmentation and smart
technology.
Pr. Antoine VIANOU, full Professor in Engineering
Science and Technology, Vice-Chancellor of the
University of Abomey-Calavi (UAC) Knight of the
International Order of Academic Palms CAMES.
Academician: Member of the National Academy of
Sciences, Arts and Letters of Benin. President of the
Sectorial Scientific Committee Engineering Sciences
and Techniques / UAC Quality Assurance Consultant
in Higher Education. He recently became Director of
the UAC Graduate School of Engineering Sciences