Comparative analysis of different Edge detection techniques for biomedical images using MATLAB
Journal Title: Engineering and Scientific International Journal - Year 2014, Vol 1, Issue 1
Abstract
Edge detection appreciably preserves the important structural properties in an image and filters out unwanted information while reducing the amount of data. Edges outline the boundaries and are therefore a problem of fundamental importance in image processing of biomedical signals. The method used in this paper is to detect the tumor boundaries in the MRI image using various edge detection techniques. The result of this method makes very clear for physician to distinguish the tumor portion for surgical planning. It has been shown that with proper selection of the threshold value of the image the filters gives better result in terms of edge and PSNR for a given image .It has been shown that Canny’s edge detection algorithm performs better than all other operators under almost all scenarios. Experimental results presented in this paper are obtained by using MATLAB.
Authors and Affiliations
Millee Panigrahi
Internet of Things a Vision of Future and the Technological Growth
This paper addresses the impact of Internet of Things (IoT) in the whole world. The effort of IOT is to provide a communication between the network, common devices or human to other devices through the internet. Ten year...
Quasi-stationary thermoelastic problem with moving heat source in unidirectional Dirichlet’s rod
In this paper we deal quasi-stationary, nonhomogeneous thermo elastic problem with Dirichlet’s boundary condition in one dimensional rod of isotropic material occupying the region 0 x a . Initial temperature of the r...
Secured Smart Card System using PostGreSQL Database
This paper is concentrated on smart card security in increased transmission rate of information. The retrieval of data from the database for the application of smart cards is normally made up with embedded system technol...
Literature Review: Cloud Computing–Security Issues, Technologies and Challenges
Cloud computing is drastically increasing so to make cloud computing more popular the very first step for the organization is to identify exact place where the cloud related threats lie. The changes from server to servic...
Cross Layer Intrusion Detection System in WSNs using Self Rejuvenating Module
The Wireless Sensor Networks (WSN) had been inferior to different attacks at different layers of the union stack. So that the rare intrusion detection systems (IDS) has been projected to act the WSNs. But routinely told...