Red Blood Cell Identification Using Watershed Technique
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Diseases caused by any parasite can be diagnosed using the shape of RBCs and WBCs. The blood sample consists of different cells like RBCs, WBCs, and Platelets from which manual shape analysis may not be accurate. So there is a need in designing an automated system that can identify the shape of RBCs. This paper presents an approach to detect the shape of Sickle cells present in RBCs by finding the highest, lowest and mean radius of each type of cell by comparing it with standard cell size and mark the cells by a red circle for identification. The proposed approach is tested on a collected SEM blood sample images and experimental results are encouraging. The number of red blood cells contributes more to clinical diagnosis with respect to blood diseases. The aim of this research is to produce a computer vision system that can detect and estimate the number of red blood cells in the blood sample image. Watershed algorithm is a very powerful tool in image processing, and it is been used to segment and extract the red blood cells from the background and other cells. The algorithm used features such as shape of red blood cells Hough transform is introduced in this process. The result presented here is based on images with normal blood cells. The tested data consists of 10 samples and produced the accurate estimation rate closest to 96% from manual counting.
Authors and Affiliations
M. MumthajBegam, R. Geetha, A. Sagayaselvaraj
Anti-Seismic reinforcement for highway network
This paper provides a novel practical method for analyzing an anti-seismic reinforcement (ASR) problem involving hundreds of transportation facilities on an urban road network subject to multiple earthquake risks. The r...
Enhanced Security Modal to Detection and Prevention of Web Crime Actvities
The current generations increasingly rely on the internet and advanced technologies to further their criminal operations. These criminals can easily leverage the internet and carry out the traditional crime such as disr...
Defend Dos Attack with Geometric Hashing Function and Software Puzzle
DOS attack can be exhaust the target server’s resources have become major threat to today’s internet. Even though client problem represent a promising way to defend against certain classes of DOS attack, several questio...
Breast Cancer Detection using Support Vector Machine
Women affected by breast cancer widely all around the world. The most commonly used screening method to detect breast cancer by using Mammographic images. In this paper, watershed segmentation algorithm is used for segm...
Ultra Energy Efficient Building’ For Housing Sector
Day by day the demand for electricity is increasing. With increasing population and industrialization, electricity consumption has been abruptly increased. The main source of today’s electricity generation is fossil fue...