MRI Brain Abnormalities Segmentation using K-Nearest Neighbors (k-NN)
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2
Abstract
Segmentation of medical imagery remains as a challenging task due to complexity of medical images. This study proposes a method of k-Nearest Neighbor (k-NN) in abnormalities segmentation of Magnetic Resonance Imaging (MRI) brain images. A preliminary data analysis is performed to analyze the characteristics for each brain component of “membrane”, “ventricles”, “light abnormality” and “dark abnormality” by extracting the minimum, maximum and mean grey level pixel values. The segmentation is done by executing five steps of k-NN which are determination of k value, calculation of Euclidian distances objective function, sortation of minimum distance, assignment of majority class, and determination of class based on majority ranking. The k-NN segmentation performances is tested to hundred and fifty controlled testing data which designed by cutting various shapes and size of various abnormalities and pasting it onto normal brain tissues. The tissues are divided into three categories of “low”, “medium” and “high” based on the grey level pixel value intensities. The overall experimental result returns good and promising segmentation outcomes for both light and dark abnormalities.
Authors and Affiliations
Noor Elaiza Abdul Khalid , Shafaf Ibrahim , Puteri Nurain Megat Mohd Haniff
A Comparative Analysis of Web Page Ranking Algorithms
Web is expending day by day and people generally rely on search engine to explore the web. In such a scenario it is the duty of service provider to provide proper, relevant and quality information to the internet user ag...
An Efficient Watermarking Algorithm Based on DWT and FFT Approach
Multimedia and Internet have become our daily needs. It has become a common practice to create copy, transmit and spread digital data .It leads to unauthorized duplication problem. Digital image watermarking provides a p...
Enhancement of Network Security Techniques using Quantum Cryptography
Quantum cryptography uses the law of quantum physics for unconditionally secure data communications. This is a main achievement because the cryptography currently in use, known as conventional cryptography, relies comple...
AHP and Group Decision Making for Access Network Selection in Multi-Homed Mobile Terminals
The evolving fourth generation wireless networks provide heterogeneous wireless access. This feature enables the multi homed mobile devices to seamlessly roam across various wireless access technologies and to connect al...
CLASSIFICATION OF AGRICULTURAL LAND SOILS A DATA MINING APPROACH
The problem of the knowledge acquisition and efficient knowledge exploitation is very popular also in agriculture area. One of the methods for knowledge acquisition from the existing agricultural databases is the methods...