oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2020 ( 4 )

2019 ( 105 )

2018 ( 136 )

2017 ( 118 )

Custom range...

Search Results: 1 - 10 of 23037 matches for " Samir Kumar Bandyopadhyay "
All listed articles are free for downloading (OA Articles)
Page 1 /23037
Display every page Item
Formation of Homogeneous Blocks For Segmentation of Mammograms
Samir Kumar Bandyopadhyay
International Journal of Engineering Science and Technology , 2010,
Abstract: In the paper a method have been develop to make a supporting tool to easy and less time consuming of identification of abnormal masses in digital mammography images. The identification technique is used forformation of Homogeneous Blocks The type of masses, orientation of masses, shape and distribution of masses, size of masses, position of masses, density of masses, symmetry between two pair etc are clearly sited after proposed method is executed on raw mammogram for easy and early detection abnormality.
Pre-processing of Mammogram Images
Samir Kumar Bandyopadhyay
International Journal of Engineering Science and Technology , 2010,
Abstract: Digital mammogram has become the most effective technique for early breast cancer detection modality. Digital mammogram takes an electronic image of the breast and stores it directly in a computer. High quality mammogram images are high resolution and large size images. Processing these images require high computational capabilities. The transmission of these images over the net is sometimes critical especially if the diagnosis of remote radiologists is required. The aim of this study is to develop an automated system for assisting the analysis of digital mammograms. Computer image processing techniques will be applied to enhance images and this is followed by segmentation of the region of interest (ROI). Subsequently, the textural features will be extracted from the ROI. The texture features will be used to classify the ROIs as either masses or non-masses.
A Method for Lung Boundary Detection
Samir Kumar Bandyopadhyay
International Journal of Information and Communication Technology Research , 2012,
Abstract: In computerized analysis of chest radiographs is the detection of the lung field boundaries. Once the boundaries of the lung fields are identified, physiological measurements of the lung features are possible. The properties of the boundary are determined by edge detection along with suitable filter algorithms. The aim of proposed work is to develop an experimental system which segmented and analysis of the lung boundaries in chest X-ray images. This paper presents boundary detection of lung using algorithms and results obtained quite satisfactory. This is tried to make a sharp distinction between the lung region and the exterior of the lung.
An Approach for registration method to find corresponding mass lesions in temporal mammogram pairs
Prof. Samir Kumar Bandyopadhyay
International Journal of Computer Technology and Applications , 2010,
Abstract: Radiologists generally use multiple mammographic views to detect and characterize suspiciousregions. When radiologists discover a suspicious lesion in one view, they try to find a corresponding lesion in the other views. Views from different projections, typically cranio caudal (CC) and medio lateral oblique (MLO) views, allow for a better realization of the lesion. Most current computer aided detection (CAD) systems differ considerably from radiologists in the way they use multiple views. These systems do not combine information from available views but instead analyse each view separately. Given the positive effect of multiview systems on radiologists' performance we expect that fusion of information from different views will improve CAD systems as well. Such multi-view CAD programs require regional registration methods to find corresponding regions in all available views. In this paper we concentrate on developing such a method for corresponding mass lesions in prior and In other words, starting from a current image containing a mass lesion, the method aims at locating the same mass lesion in the prior image. The method was tested on a set of 412 cancer cases. In each case a malignant mass, architectural distortion or asymmetry was annotated. In 92% of these cases the candidate mass detections by CAD included the cancer regions in both views. It was found that in 82% of the cases a correct link between the true. Positive regions in both views could be established by our method.Key words: Multiple View, Computer-Aided Detection, masses, mammography
Finding Bilateral Symmetry of the Human Brain from MRI
Prof. Samir Kumar Bandyopadhyay
Journal of Global Research in Computer Science , 2011,
Abstract: Various subjects that are paired usually are not identically the same, asymmetry is perfectly normal but sometimes asymmetry can be noticeable too much. Structural and functional asymmetry in the human brain and nervous system is reviewed in a historical perspective. Brain asymmetry is one of such examples, which is a difference in size or shape, or both. Asymmetry analysis of brain has great importance because it is not only indicator for brain cancer but also predict future potential risk for the same. In our work, we have concentrated to segment the anatomical regions of brain, isolate the two halves of brain and to investigate each half for the presence of asymmetry of anatomical regions in MRI.
IMAGE HIDING IN DNA SEQUENCE USING ARITHMETIC ENCODING
Prof. Samir Kumar Bandyopadhyay
Journal of Global Research in Computer Science , 2011,
Abstract: Recently, biological techniques become more and more popular, as they are applied to many kinds of applications, authentication protocols, biochemistry, and cryptography. One of the most interesting biology techniques is deoxyribo nucleic acid and using it in such domains. Hiding secret data in deoxyribo nucleic acid becomes an important and interesting research topic. Some researchers hide the secret data in transcribed deoxyribo nucleic acid, translated ribo nucleic acid regions, or active coding segments where it doesn't mention to modify the original sequence, but others hide data in non-transcribed deoxyribo nucleic acid, non-translated ribo nucleic acid regions, or active coding segments. Unfortunately, these schemes either alter the functionalities or modify the original deoxyribo nucleic acid sequences. DNA has the ability to store large amount of digital data. This paper presents a method to hide an image in DNA sequence using arithmetic encoding.
A Survey on Brain Image Segmentation Methods
Prof. Samir Kumar Bandyopadhyay
Journal of Global Research in Computer Science , 2011,
Abstract: For the past decade, many image segmentation techniques have been proposed. These segmentation techniques can be categorized into three classes, (1) characteristic feature thresholding or clustering, (2) edge detection, and (3) region extraction. This survey summarizes some of these techniques. In the area of biomedical image segmentation, most proposed techniques fall into the categories of characteristic feature thresholding or clustering and edge detection. We present current segmentation approaches are reviewed with an emphasis placed on revealing the advantages and disadvantages of these methods for medical imaging applications.
Edge Detection of Human Eye based on Homogeneity Analysis
Samir Kumar Bandyopadhyay
Journal of Global Research in Computer Science , 2011,
Abstract: Edge detection of eye is a pre-requisite stage for many applications such as iris recognition fatigue detection based on eye-blink count and eye-directed instruction control. This paper presents a method using image processing techniques to detect the edge of eyes in an image. Experiment result is presented and discussed at the end of this paper. Only gray levels are considered for the proposed method. The algorithms for edge detection of eye were assessed on 102 images from the Purdue database and on 897 images from a video sequence.
Lip contour Detection Techniques based on Front View of Face
Samir Kumar Bandyopadhyay
Journal of Global Research in Computer Science , 2011,
Abstract: Lip contour detection and tracking is the most important pre-requisite for computerized speech reading. Several approaches have been proposed for lip tracking after lip contour is accurately initialized on first frame. Detection and tracking of the lip contour is an issue in speech reading. A relatively large class of lip reading algorithms are available based on lip contour analysis. In these cases, lip contour extraction is needed as the first step. By lip contour extraction, we usually refer to the process of lip contour detection in the first frame of an audio-visual image sequence. Obtaining the lip contour in subsequent frames is usually referred as lip tracking. While for lip contour tracking there are well developed techniques and algorithms to perform this task automatically, in the case of lip contour extraction in the first frame the things are different. This is a much more difficult task than tracking, due to the lack of a good a-priori information in respect to the mouth position in the image, the mouth size, the approximate shape of the mouth, mouth opening etc. In this paper we propose a solution to automatic lip contour detection if front view of face is available. The proposed method has been tested on a database containing face images of different people and was found to have maximum success rate of 85%.
GENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY
Samir Kumar Bandyopadhyay
Journal of Global Research in Computer Science , 2011,
Abstract: Steganography is the act of hiding a message inside another message in such a way that can only be detected by its intended recipient.Naturally, there are security agents who would like to fight these data hiding systems by steganalysis, i.e. discovering covered messages and rendering them useless. There is currently no steganography system which can resist all steganalysis attacks. The most notable steganalysis algorithm is the RS attack which detects the steg-message by the statistic analysis of pixel values. To ensure the security against the RS analysis,we presents a new steganography based on Genetic Algorithm in this paper. In this paper, we present a novel approach to resolve the remained problems of substitution technique of image steganography. Using the proposed Genetic Algorithm, message bits are embedded into different bits of the pixel grey level values, resulting in increased robustness. The robustness would be increased against those attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.
Page 1 /23037
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.