Abnormalities Detection in Digital Mammography Using Template Matching
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 2
Abstract
Breast cancer affects 1 in 8 women in the United States. Early detection and diagnosis is key to recovery. Computer-Aided Detection (CAD) of breast cancer helps decrease morbidity and mortality rates. In this study we apply Template Matching as a method for breast cancer detection to a novel data set comprised of mammograms annotated according to ground truth. Performance is evaluated in terms of Area Under the Receiver Operator Characteristic Curve (Area Under ROC) and Free-response ROC.
Authors and Affiliations
Ahmed Farrag
Distance based Sweep Nearest Algorithm to Solve Capacitated Vehicle Routing Problem
The Capacitated Vehicle Routing Problem (CVRP) is an optimization problem owing to find minimal travel distances to serve customers with homogeneous fleet of vehicles. Clustering customers and then assign individual vehi...
Unifying Modeling Language-Merise Integration Approach for Software Design
Software design is the most crucial step in the software development process that is why it must be given a good care. Software designers must go through many modeling steps to end up with a good design that will allow f...
Appraising Research Direction & Effectiveness of Existing Clustering Algorithm for Medical Data
The applicability and effectiveness of clustering algorithms had unquestioningly benefitted solving various sectors of real-time problems. However, with the changing time, there is a significant change in forms of the da...
An Enhencment Medical Image Compression Algorithm Based on Neural Network
The main objective of medical image compression is to attain the best possible fidelity for an available communication and storage [6], in order to preserve the information contained in the image and does not have an err...
Defense against SYN Flood Attack using LPTR-PSO: A Three Phased Scheduling Approach
Security has become a critical factor in today’s computation systems. The security threats that risk our confidential information can come in form of seemingly legitimate client request to server. While illegitimate requ...