Colorectal Cancer Detection using Image Processing based on IGVF Model
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Colorectal cancer is the third most common cancer in both men and women. Computed Tomography (CT) Colonography is a valid technique for detecting and screening colorectal cancers. In order to accomplish an effective way to identify colon cancer at an early stage, digital images of colon polyps have been investigated. In this paper, an improved gradient vector flow (IGVF) is considered as an essential method to segment an image appropriately. This new algorithm, IGVF can improve GVF snake model’s ability to capture thin boundary indentation like the boundary of cancer images. The segmented candidates are typically characterized by features describing like the polyp shape and its internal intensity distribution. Such features will serve as input for the classification system. Classification is performed by Support Vector Machine (SVM).Finally, measure the overlap between the manual and the algorithm segmentation to test the accuracy of frame work. It is expected to obtain greater accuracy and to produce good segmentation results of colonic polyps.
Authors and Affiliations
G. Shantha Lakshmi, Prof. B. Mohamed FaizeBasha
An Approach to Identify Dishonest Nodes Using MAC Protocol inMultihop Cellular Networks
Abstract: In mobility based networks, the mobile nodes usually relay on other node packets rather than theirown rightful packet for enhancing network performance. It happens due to the availability of some selfish...
Retention of Knowledge: A Comparative Analysis in Petrol Engine Using Interactive Computer Simulation and Computer Simulation Video
This study compared two groups of four technical college classes studying automobile engine. One group learned using interactive computer simulation; the other group learned using computer simulation video. The study ado...
A Survey Of Sign Based Image Copy Detection Methods
Abstract: The world wide web is filled with billions of images and redundant copies of images can frequently be found on many websites. These duplicates can be exact copies or differ slightly in their visual conten...
Role of Women in Information and Communication Technologies in India
Pseudonym Based Security Architecture for Wireless Mesh Network
Abstract : Wireless Mesh Network (WMN) is a wireless network with mesh topology and is expected to be widespread due to the advantages such as low deployment cost, easy maintenance, robustness, scalability, reliable serv...