Analysis of Degenerated Tissue in Temporal Lobe of Human Brain using image segmentation Techniques
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 3
Abstract
Degenerated Tissue in temporal lobe may cause diminished speech and memory difficulty. The principal of our Research work is automatic detection of degenerated tissues due to any disease in the temporal lobe. Fully automatic based Histogram Thresholding Segmentation technique is applied for detection of the tissue from particular Magnetic Resonance Imaging (MRI) Scan of brain images. After that, This research paper propose the use of most powerful classifier techniques such as support vector machine that separate tissues into two classes specifically normal and abnormal tissue. Then we evaluate the volume of the tissue to identify its size. All proposed techniques will be implemented on MR image of temporal lobe using MATLAB 7.9.0(R2009b) platform.
Authors and Affiliations
Mahima jain
Enhanced Double Layer Security using RSA over DNA based Data Encryption System
In this paper we propose an enhanced algorithm to communicate data securely for communication and information security. The DNA cryptography is a new and promising area in cryptography. Here we propose techniques that us...
Image Encryption and Decryption Using Selective Block Encryption Technique
In the recent world, the need of information security has became a necessity with the progress in data exchange and communication by electronic system. Because of the growth of multimedia application, security becomes an...
Modern Steganographic technique: A survey
Steganography is one of the methods of secret communication that hides the existence of hidden message. It can be defined as the study of invisible communication that usually deals with the ways of hiding the existence o...
SPOOFING ATTACK DETECTION AND LOCALIZATION IN WIRELESS SENSOR NETWORK: A REVIEW
Spoofing attack is an identity based attack through which a malicious user can spoof the MAC address of a node to create multiple illegitimate identities that highly affect the performance of wireless sensor network. The...
Survey Report on Software Cost Estimation using Use Case Point Method
Software estimation is an important activity in software project management. Many software projects fail because of the inaccurate and untimely estimation of cost. Estimation in the early stages of the software life cycl...