Improved Brain Extraction Tool using Marker-Controlled Watershed Segmentation
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: MRI head scan images contains some non-brain tissues and it is necessary to remove these non-brain tissues for further processing. The Brain Extraction Tool (BET) is one of the most popular brain segmentation technique which removes the non-brain tissues in MRI head scan volumes. It is a simple and robust brain extraction method. It is a boundary based method and uses deformable surface to detect brain boundaries. Due to its over smoothing capabilities it always under-segment the brain images by including more non-brain tissues in its final segmentation. The aim of this proposed method is to overcome the problems encountered with the existing BET method by using the marker-controlled watershed segmentation. The proposed improved brain extraction tool (IMBET) was tested with 20 volumes of brain images and its performance was compared with the popular existing methods BET, BSE, WAT, HWA and GCUT. The computed similarity measures Dice (D) and Jaccard (J) show that the proposed method outperform the BET and produced better brain extraction result than the existing methods.
Authors and Affiliations
Kalavathi P.
Smart Car Collision Avoidance System
Abstract: In this paper we demonstrate the potential usage of vehicle to vehicle communication(V2V) to reduce the number of road accidents caused due to over taking of vehicles. The system will operate by transferring da...
Human Identification via Face Recognition: Comparative Study
Biometric recognition becomes an attractive issue of processing, and have a vast amount of real applications.According to wide spread of Internet and the new aspect of Internet of things, millions of human characteristic...
An Efficient implementation of PKI architecture based Digital Signature using RSA and various hash functions (MD5 and SHA variants
Digital Signature technique is widely being used to detect unauthorized modification to data and to authenticate the identity of the signatory. It is essential for secure transaction over unsecure/ open networks....
Conjunctive Use of Surface and Groundwater as Agri-tourismResource Facilitator: Discourse Analysis for Planning inDeveloping Nations
Abstract: Ecotourism is increasingly exhibited as a component of the conventional tourism that needsaugmentation with enhanced availability of water resources in sustainable modes. This sustainability isattainable...
A Survey of Weight-Based Clustering Algorithms in MANET
As MANETs haven't any mounted infrastructure, all messages have to be routed through the nodes within the network. several clustering and routing algorithms are developed for MANETs. Moreover, most of the prevail...