Automated Leukemia Detection using Contour Signature in Blood Microscopic Images
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Out of four major types of leukemia acute lymphoblastic leukemia (ALL) is most common blood disorder in children’s of age ranging from 1-9 years. With lymphoblastic leukemia cancerous change begins in marrow cell where rapid growth of abnormal lymphocytes (a type of WBC) takes place. ALL often leads to wrong diagnosis because of its nonspecific nature. The present techniques that are generally used for diagnosis are time consuming and very costly. Microscopic examination of blood smear and bone marrow aspirate is the most economical technique but manual examination of microscopic images often leads to bias because of human error. Thus, there is a need to automate this procedure. Most convenient way is to do analysis of microscopic images using image processing techniques. The proposed work focuses on automation of microscopic study. In which preprocessing using median filtering is carried out to remove the noise from images. Automatic thresholding gives region of interest. Shape based features of separated nucleus are evaluated and then boundary roughness is evaluated using contour signature which can be used for identification of cancer cells.
Authors and Affiliations
Amruta Deshmukh , Prof. Mrs. Anagha Panditrao
Intuitionistic Fuzzy Sets: New Approach and Applications
This paper presents an extended definition of intuitionistic fuzzy set and some operations on intuitionistic fuzzy sets which will be very useful for solving the real life problems. In fact, the intuitionistic fuzzy...
Live Activity Index To Gather Effective Live Traffic Broadcasting To Users
A few online services give live movement information by dissecting gathered information from street sensors, activity cameras, and group sourcing strategies, for example, Google-Map, Navteq, INRIX Traffic Information...
An Effective Approach for Mitigating Reactive Jamming Attacks in Wireless Sensor Networks
Wireless Sensor Network (WSN) is an emerging technology for various applications public sector, private sector and military. It formed by a large number of networked sensing nodes. It contains of many sensor devices...
High Performance of Fault Detection And Correction Technique Using Difference Set Codes For Memory Applications
The advanced combination technologies made it possible for accessing any device so fast that within a portion of seconds the job can be performed. Now days fast memories exists everywhere during accessing if any erro...
Applications of MVS on Hierarchical Clustering Algorithms
Clustering is a valuable method that arranges a large quantity of unordered text documents into a small number of expressive and coherent clusters, thereby offering a basis for instinctive and informative steering an...