A Relative Study on Retinal Vessel Segmentation
Journal Title: International Journal on Computer Science and Engineering - Year 2016, Vol 8, Issue 10
Abstract
Retinal image processing is a standard medical repetition and offers number of profitable products for physicians. In the field of retinal image processing retinal vessel segmentation is the crucial task for detection of cardiovascular diseases in advance. The recognition of erroneous blood vessel may cause in incorrect clinical diagnosis. Various processing steps are required for the extraction of blood vessel from the retinal image such as preprocessing, noise reduction, gray scale conversion and segmentation. Segmentation is the final and important stage of blood vessel extraction process. Many segmentation techniques are proposed by researchers for blood vessel extraction. Methods and comparison of some segmentation techniques are given in this paper.
Authors and Affiliations
Vinitha. K , Dr. M. Sundaresan
Filtering Non-Stationary Noise in Speech Signals using Computationally Efficient Unbiased and Normalized Algorithm
Extraction of high resolution information signals is important in all practical applications. The Least Mean Square (LMS) algorithm is a basic adaptive algorithm has been extensively used in many applications as a conseq...
Effect of Normalized Scale on Design of Rectangular Microstrip Antenna by using FFBP
Nonlinear neural optimization networks are used for the esigning of MSA. The paper presents NN model for computing resonant frequency of RMSA with normalized scale. NN model with normalised scale computes very fast. The...
Person Identification System Based on Electrocardiogram Signal Using LabVIEW
This paper presents a method to analyze electrocardiogram (ECG) signal, extract the features, for the real time human identification. Data were obtained from short-term Lead-I ECG records (only one lead) of forty student...
Mobile Wireless Enhanced Routing Protocol in Adhoc Networks
Adhoc network consists of peer-to-peer communicating nodes that are highly mobile. As such, an ad-hoc network lacks nfrastructure and the topology of the network changes ynamically. The task of routing data from a source...
Multimodal Authentication For High End Security
In earlier days Traditional authentication method in computer systems are based on knowledge and token based. Unfortunately lot of drawbacks are in these systems. Passwords often be forgotten, disclosed or changed. A rel...