A Systematic Study of Segmentation Methods
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 1, Issue 10
Abstract
This paper provides a Systematic study of segmentation methods for detection of kidney tumor using Computed Tomography images. There are large numbers of CT image segmentation algorithms are available, CT image segmentation can be divided into edge based, texture based, Thresholding .We studied the performance of algorithms in each category using a kidney CT ima more suitable for relatively homogeneous kidney tumors. In addition computed tomography (CT) provides wide range of physiological and anatomical information. In the process of detection of tumor vital role for partitioning an image into different sub region with homogeneous properties. In this paper various methods that have been used for segmentation in MRI are reviewed and a new approach by incorporating the advantages of Region growing is proposed.
Authors and Affiliations
Kuldeep Pawar
Handwritten Devnagari Special Characters and Words Recognition Using Neural Network
The aim of this paper is to develop software which can recognize off line Devanagari special words which is made up of half consonant and consonant and special characters which is half form of consonant from scann...
Implementation of Multimode Interleaver Address Generator for Wireless Application
In this brief the Low-complexity and novel technique is developed to implement efficiently the address generation circuitry of the interleaver used in the WiMAX and WLAN transreceiver. Wireless communication is on...
An Image Steganography Technique with High Hiding Capacity Based On 24 Bit Color Image
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular becaus...
A SECURE WAY OF LOGIN WITH PERSUASIV E CUED CLICK POINTS AND PASSFACES
Text passwords are the most prevalent user authentication method, but have security and usability problems. Replacements such as biometric systems and tokens have their own drawbacks. Graphical passwor...
A SURVEY ON DISTRIBUTED DENIAL OF SERVICE ATTACK AND DEFENCE
In computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS)attack is an attempt to make a machine or network resource unavailable to its intended users.DOS attack reduces the efficiency of the...