Brain Tumor Detection through MR Images: A Review of Literature
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 5
Abstract
Abstract: A brain tumor is an abnormal growth of tissue in the brain or central spine that can disrupt proper brain function and creates an increasing pressure in the brain. This paper is intended to present a comprehensive review of the methods of brain tumor detection through Magnetic Resonance Imaging (MRI) technique used in different stages of Computer Aided Detection System (CAD). It also provides a brief background on brain tumor in general and non-invasive imaging of brain tumor in order to give a comprehensive insight into the field. Lastly, the paper concludes with a concise discussion and provides a direction toward the upcoming trend of more advanced research studies on brain image segmentation and tumor detection.
Authors and Affiliations
Ritu Rana , Parvinder Singh
An Effective Keyword Search over Encrypted Data In Cloudenvironment
As Cloud Computing ends up pervasive, touchy data are as a rule progressively unified into the cloud. For the insurance of information protection, delicate information must be scrambled before outsourcing, which makes co...
Automated Detection of Cancerous Lung Nodule from the Computed Tomography Images
An automated Computer Aided Diagnosis (CAD) system is proposed in this paper for the detection of lung nodule from the computed tomography (CT) images. CT Images are more efficient and provideappropriate detai...
Dynamic Stream Ciphering Algorithm
Abstract The main idea of any stream cipher algorithm is to generate stream cipher key base on the use set of LFSR with fix arrangement, all this LFSR are filling depending on the value of the basic key. In this pa...
CEET: A Compressed Encrypted & Embedded Technique for Digital Image Steganography
Abstract: In this information era, digital information sharing and transfer plays a vital role and their use has increased exponentially with the development of technology. Thus providing security of data is a topi...
A Novel identity based secure distributed data storage scheme
Abstract: Secure distributed data storage can shift the burden of maintaining a large number of files from the owner to proxy servers. Proxy servers can convert encrypted files for the owner to encrypted files for...