Comparative Study of Techniques for Edge Detection of Angiogram Images using Classical Image Processing
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3
Abstract
" In medical image processing, blood vessels need to be extracted clearly and properly from a noisy background, drift image intensity, and low contrast pose. The Blood vessels of the human body can be visualized using many medical imaging methods such as X-ray, Computed Tomography (CT), and Magnetic Resonance (MR). Angiography is a procedure widely used for the observation of the blood vessels in medical research, where the angiogram area covered by vessels and/or the vessel length is required. Vessel enhancement and segmentation is an effective technique used in angiogram. Segmentation is a process of partitioning a given image into several non-overlapping regions. Edge detection is an important task and in this process and complex algorithms have been modeled for the detection of the edges of the blood vessels. This paper discusses a comparative study of digital image-processing algorithm for detecting the edges of the vessels in the angiogram images. "
Latest Technologies in Surface Computing
Latest Technologies in Surface Computing
Cross Correlation Velocity Measurement of Multiphase Flow
Abstract: The cross correlation signal processing is not a new idea it has wide spread and has large numbers of applications in the engineering field. It became as a suitable tool for analysing time invariant systems and...
European Union: An Integration Exporter or an Actor Sui Generis
"The European Union was formed after the Second World War in search of peace and to help Europe stand up on its feet economically. Starting from a six nation organisation, today it is a 28 member organisation. It is one...
Enhancing the Security of Playfair Square Cipher by Double Substitution and Transposition Techniques
Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form. Transposition technique, Substitution technique.In recent years...
Review of Trust based Methodologies in WSNs
In this research paper we have done objective study on latest trust based methodologies that are used in securing the WSN, the focuses in our current study have been on the aspect of energy and memory consumption due to...