IN-DEPTH EXPLORATION AND COMPARATIVE ASSESSMENT OF CUTTING-EDGE ALGORITHMS FOR IMPULSE NOISE ATTENUATION IN CORRUPTED VISUAL DATA
Journal Title: International Journal of Data Science and Artificial Intelligence - Year 2024, Vol 2, Issue 04
Abstract
Image denoising is a vital process in image pre-processing, particularly for applications focused on image-based objectives. This process, which occurs during image acquisition and transmission, is crucial for enhancing image quality to facilitate subsequent analysis by medical image processing algorithms. Given its importance in improving medical images, image denoising has become a prominent research focus. This paper explores the latest advancements in denoising techniques specifically tailored for magnetic resonance imaging (MRI), offering a detailed examination of their publication details, underlying methodologies, strengths, limitations, and accuracy metrics, including peak signal-to-noise ratio (PSNR). The study provides a thorough review of contemporary denoising strategies proposed by researchers such as Taherkhani et al., Zhang et al., Yuan et al., and Chen et al., among others, presenting an in-depth survey of current denoising algorithms. Understanding these methods is critical for selecting robust denoising techniques capable of mitigating artifacts like salt-and-pepper noise, which is essential for effective medical image segmentation. This paper aims to provide valuable insights into denoising methodologies, thereby advancing MRI image processing in the medical domain.
Authors and Affiliations
S. Prathiba and B. Sivagami
A STUDY ON SURGICAL ROBOTS AND THEIR RECENT DEVELOPMENTS
In recent years, Robotics has been rapidly developing with outstanding growth and innovation. This paper aims to analyze the key developments in the sub-domain of robotics such as medical robots, especially surgical robo...
SEMANTIC FEATURE ENABLED AGGLOMERATIVE CLUSTERING FOR INFORMATION TECHNOLOGY JOB PROFILE ANALYSIS
The maintenance and implementation of computer systems are the core activities of information technology. Database administration and network architecture are also included in information technology. Professionals have a...
BLOCK CHAIN ENABLED DATA SECURITY USING BLOWFISH ALGORITHM IN SMART GRID NETWORK
Smart Grid provides a reliable and efficient end-toend delivery system. Data on each user's unique electricity consumption is given in real time. It also enables utilities to control and monitor the electrical system in...
IOT-CENTRIC DATA PROTECTION USING DEEP LEARNING TECHNIQUE FOR PRESERVING SECURITY AND PRIVACY IN CLOUD
The Internet of Things (IoT) describes a system where interconnected physical objects are connected online. As the collection and sharing of vast amounts of personal data grow, so do concerns over user privacy within IoT...
HYBRID OPTIMIZATION INTEGRATED INTRUSION DETECTION SYSTEM IN WSN USING ELMAN NETWORK
Wireless Sensor Networks (WSNs) increases the usage of integrated systems and areas which attracts the attention of attackers. However, WSNs are vulnerable to different kinds of security threats and attacks. To ensure th...