Automated Leukemia Detection using Contour Signature in Blood Microscopic Images
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Out of four major types of leukemia acute lymphoblastic leukemia (ALL) is most common blood disorder in children’s of age ranging from 1-9 years. With lymphoblastic leukemia cancerous change begins in marrow cell where rapid growth of abnormal lymphocytes (a type of WBC) takes place. ALL often leads to wrong diagnosis because of its nonspecific nature. The present techniques that are generally used for diagnosis are time consuming and very costly. Microscopic examination of blood smear and bone marrow aspirate is the most economical technique but manual examination of microscopic images often leads to bias because of human error. Thus, there is a need to automate this procedure. Most convenient way is to do analysis of microscopic images using image processing techniques. The proposed work focuses on automation of microscopic study. In which preprocessing using median filtering is carried out to remove the noise from images. Automatic thresholding gives region of interest. Shape based features of separated nucleus are evaluated and then boundary roughness is evaluated using contour signature which can be used for identification of cancer cells.
Authors and Affiliations
Amruta Deshmukh , Prof. Mrs. Anagha Panditrao
Swastika shaped Monopole Antenna with Stubs for Cognitive radio Applications
The proposed antenna designed specifically for Cognitive radio applications consists of a circular monopole which is modified and evolved into the Swastika shaped dotted monopole by incorporating slots into the plane...
Design Basis Concerns And Challenges For The Data Environment
Big Data are becoming a new technology focus both in science and in industry and motivate technology shift to data centric architecture and operational models. There is a vital need to define the basic information/se...
Multi Credential Routing a New Event Dissemination Strategy Which Strengthens The Weak Subscription Confidentiality
The provisioning of basic safety devices such as authentication and confidentiality is extremely challenging in a content based publish/subscribe system. Authentication of publishers and subscribers is not easy to ge...
A Case study on Run time Load Balancing of Virtual Machines in Cloud Environment
In these days many people using clouds for all their needs, because of robust features and security provided by the cloud computing. Cloud computing must satisfy all the needs of users who scale the resource usage in...
MCLOUD: Effective Data Sharing In Multiple-Groups
Cloud computing is an emerging computing paradigm. It provides an economical and efficient solution for sharing group resource among cloud users. Due to frequent change of members in multi owner group, preserving user...