Microscopic Image Analysis of Nanoparticles by Edge Detection Using Ant Colony Optimization
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 11, Issue 3
Abstract
In this paper, I present an approach for analyzing nanoparticles microscopic images by edge detection using Ant Colony Optimization (ACO) algorithm to obtain a well-connected image edge map. Microscope image analysis of nanoparticles are subject to errors. Initially, the edge map of the image is obtained using various matlab toolbox conventional edge detectors & adaptive thresholding. The end points obtained using such detectors are calculated. The ants are then placed at these points. The movement of the ants is guided by the local variation in the pixel intensity values. The probability factor of only undetected neighboring pixels is taken into consideration while moving an ant to the next probable edge pixel. The two stopping rules are implemented to prevent the movement of ants through the pixel already detected. The method is applied on the atomic force microscope (AFM) images of Cerium Oxide (CeO2) nanoparticles & SEM image of ZnO nanoparticles. The results show that the edges obtained in the images can be used for classification of particles, determining sizes & shapes & also distinguishing particles in agglomerates more precisely
Authors and Affiliations
Shwetabh Singh
Classification of Cardiovascular Disease from ECG using Artificial Neural Network and Hidden Markov Model.
Abstract: this paper deals with the classification of cardiovascular disease for its future analysis. If future progression of the disease can be predicted earlier with proper change in medication patients treatmen...
Collective Behavior of social Networking Sites
Now a days a huge data is generated by social media like Facebook, Twitter, Flickr, and YouTube This big data present opportunities and challenges to study collective behavior of data. In this work, we predict collective...
Buffer Overflow Attack
- Exploits, vulnerabilities, and buffer-overflow techniques have been used by malicious hackers and virus writers for a long time. In order to attack and get the remote root privilege, using buffer overflow and...
Trust Modeling Scheme using Cluster Aggregation of Messages for Vehicular Ad hoc Networks
Abstract: A VANET is a decentralized network as every node performs the functions of both host and router. The main benefit of VANET communication is the enhanced passenger safety by virtue of exchanging warning messages...
Fuzzy C Means Clustering Algorithm for High Dimensional Data Using Feature Subset Selection Technique
Feature choice involves characteristic a set of the foremost helpful options that produces compatible results because the original entire set of options. A feature choice rule is also evaluated from each the potency...