Analysis of Degenerated Tissue in Temporal Lobe of Human Brain using image segmentation Techniques
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 3
Abstract
Degenerated Tissue in temporal lobe may cause diminished speech and memory difficulty. The principal of our Research work is automatic detection of degenerated tissues due to any disease in the temporal lobe. Fully automatic based Histogram Thresholding Segmentation technique is applied for detection of the tissue from particular Magnetic Resonance Imaging (MRI) Scan of brain images. After that, This research paper propose the use of most powerful classifier techniques such as support vector machine that separate tissues into two classes specifically normal and abnormal tissue. Then we evaluate the volume of the tissue to identify its size. All proposed techniques will be implemented on MR image of temporal lobe using MATLAB 7.9.0(R2009b) platform.
Authors and Affiliations
Mahima jain
EQUALITY IN BETWEEN ITERATIVE SOFT DILATION AND ITERATIVE SOFT CLOSE IN MULTI SCALE ENVIRONMENT
In this paper, equality is established and discussed in between soft dilation and soft close in multi scale environment as well as in iterative environment. Soft erosion and soft dilation will exist for various threshold...
Enhancement of old manuscripts using fuzzy logic
Old manuscripts are very important which contain important information about a person, place, or event. Image processing is very vast field and one of the most important part of image processing is thresholding. . The ol...
Design and Comparative Analysis of CMOS Full Adder Cells Using Tanner EDA Tool
The binary adders are the fundamental and key component in digital signal processors, general purpose microprocessors and data-processing application specific integrated circuits. Therefore, binary adders are crucial bui...
SPY BOT:A BOOM FOR CAMOUFLAGING
The objective behind making this project deals out with satisfying various functional needs such as secretly spying or keeping surveillance over a desired target location. We also aim to achieve a few more additional com...
Secure Data Sharing using Decoy Technology
Cloud computing is a virtualized compute power and storage delivered via platform-agnostic infrastructures of abstracted hardware and software accessed over the Internet. Data sharing is an important functionality in clo...