slugCERVICAL CELL FOR THINPREP IMAGE ENHANCEMENT USING MORPHOLOGICAL SEGMENTATION
Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 4
Abstract
This paper proposes a contrast enhancement technique, which is applied on the ThinPrep Cervical Cell. The proposed technique is divided into two stages. In the First Stage the cervical cells for the thin Prep Image will be Segmented using morphological Segmentation. Then, three algorithms of contrast enhancement technique are applied on the cervical cell to increase their contrast. The results show that the proposed technique has successfully increased the contrast of the thinPrep images. Hence, the resultant image would be more useful to the pathologists.
Authors and Affiliations
S. Athinarayanan and Dr. M. V. Srinath
slugChallenges in Allocation of Resources in Future Cellular Mobile Networks
Efficient resource sharing is very important in mobile networks to provide satisfactory service to customers. The resource demand is increasing due to increasing number of user population and high bandwidth demanding m...
A study on Volatility Index Indian Capital Market: An evaluation of NSE
The Indian Stock market is one of the oldest stock market in Asia. Its history dates back nearly 200 years ago. The Indian stock market depends mainly on monsoon, global funds flowing into the qualities and the perform...
slugHIGHER ORDER MUTATION TESTING (RESULT- EQUIVALENT MUTANTS)
Whenever we make a single change to the original program we get First Order Mutant (FOM). When we apply another single change to FOM we get Second Order Mutant (SOM).On applying another single change to SOM we get Thir...
slugAutonomous Network Reconfiguration System with CA-AOMDV in Wireless Mesh Networks
Wireless mesh networks (WMNs) have emerged as a key technology for next-generation wireless networking. Because of their advantages over other wireless networks, WMNs are undergoing rapid progress and inspiring numerou...
Different Attacks in MANET
Security is an essential requirement in mobile ad hoc network (MANETs). Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resource...