Volume-1 ~ Issue-5
- Citation
- Abstract
- Reference
ABSTRACT: Chromosomes are essential genomic information carriers. The identification of chromosome abnormalities is an essential part of diagnosis and treatment of genetic disorders such as chromosomal syndromes and many types of cancer. Currently available cytogenetic imaging software is designed to classify only normal chromosomes. The automation of chromosome analysis is involving segmentation of chromosomes and classification into 24 groups. Segmentation of the overlapped chromosomes is a major step toward the realization of homolog classification. Resolving chromosome overlaps is an unsolved problem in automated chromosome analysis. Current systems for automatic chromosome classification are mostly interactive and require human intervention. In this paper, an automatic procedure is proposed to obtain the separated chromosomes. The separations of overlapped and touching chromosomes are obtained by finding the intersecting (concave and convex) points with the help of Novel algorithm. The intersecting points are located on contour of the image and then the curvature function is used to find out concave points. Then the possible separation lines are plotted by using all concave points and finally construct the hypotheses for possible separation lines between concave points. The segmentation is carried out by means of a curvature function scheme, which proved to be successful.
Keywords: automatic chromosome classification, diagnosis, genetic disorders, hypothesis, interesting points.
no. 3, pp. 161-171, 1994.
[2] W. C. Schwartzkopf, A. C. Bovik, and B. L. Evans,.Maximum-likelihood techniques for joint segmentation-classification of
multispectral chromosome images,. IEEE Trans. Med. Imag., vol. 24, no. 12, pp. 1593–1610, Dec. 2005.
[4] P. Mousavi, R. K.Ward, and P. M. Lansdorp,.Feature analysis and classification of chromosome 16 homologs using fluorescence
microscopy image,.IEEE Can. J. Elect. Comput.Eng.,vol. 23, no. 4, pp. 95– 98, 1999.
[5] M. Moradi and S. K. Staredhan, .New features for automatic classification of human chromosomes: A
feasibilitystudy,.PatternRecognit.Lett., vol. 27, pp. 19–28, 2006.
[6] K.Z. Mao, P. Zhao, P. Tan, Supervised learning-based cell image segmentation for P53 immunohistochemistry, IEEE Transactions
on Biomedical Engineering 53 (6) (2006) 1153–1163.
[7] CarstenGarnica, Frank Boochs,MarekTwardochlib, .A new approach to edge-preserving smoothing for edge extraction and Image
segmentation., IAPRS, Vol. XXXIII, Amsterdam, 2000.
[8] T. Law, K. Yamada, D. Shibata, T. Nakamura, L. He, and H. Itoh, .Edge extraction using fuzzy reasoning,.in Soft Computing for
Image Processing, S. K. Pal, Ed. New York: Physica-Verlag, 2000.
[9] K. Saracoglu, J. Brown, L. Kearney, S. Uhrig, J.Azofeifa, C. Fauth, M. Speicher, and R. Eils,.New concepts to improve resolution
and sensitivity of molecular cytogenetic diagnostics by multicolor fluorescence in situ hybridization,. Cytometry, vol. 44, no. 1,
pp. 7 May 2001.
[10] E. Grisan, A. Pesce, A. Giani, M. Foracchia, and A.Ruggeri., .A new tracking system for the robustextraction of retinal vessel
structure,. in Proc. 26th Annu. Int. Conf. IEEE-EMBS. New York: IEEE Press, 2004, pp. 1620–1623.
- Citation
- Abstract
- Reference
Paper Type | : | Research Paper |
Title | : | Realization of FPGA based numerically Controlled Oscillator |
Country | : | India |
Authors | : | Gopal D. Ghiwala, Pinakin P. Thaker, Gireeja D.Amin |
: | 10.9790/4200-0150711 |
Keywords: Numerically Controlled Oscillator, FPGA, Look-up table, Register
Baoding, china IEEE, 2010.
[2] M.L. Welborn, "Direct Waveform Synthesis for software Radios," IEEE Wireless Communications and Networking Conference
WCNC. 1999, vol. 1, pp.211-215, September 1999.
[3] P.O. Bishop, Neurophysiology of binocular vision, in J.Houseman (Ed.), Handbook of physiology, 4 (New York: Springer- Verlag,
1970) 342-366.
[4] Song Weanmiao, "Implementation of digital IF receiver based on SDR using DSP builder", communication and electronics
department of north china Electric power University, Baoding, Hebei.IEEE 2011.
[5] Satish Sharma, Sunil, Vijaykumar Pujari, Vanitha M, P.Lakshminarsimhan. Digital Systems Group ISRO Satellite Center, "FPGA
Implementation of M-PSK Modulators for Satellite Communication" International Conference on Advances in Recent Technologies in
Communication and Computing, 2010.
- Citation
- Abstract
- Reference
ABSTRACT: Coronary heart disease (CHD) is one of the major causes of disability in adults as well as one of the main causes of death in the developed countries. Although significant progress has been made in the diagnosis and treatment of CHD, further investigation is still needed. The objective of this study was to develop the assessment of heart event-risk factors targeting in the reduction of CHD events using Weighted Association Rule Mining. The risk factors investigated were: 1) before the event: a) nonmodifiable—age, sex, and family history for premature CHD, b) modifiable—smoking before the event, history of hypertension, and history of diabetes; and 2) after the event: modifiable—smoking after the event, systolic blood pressure, diastolic blood pressure, total cholesterol, highdensity lipoprotein, low-density lipoprotein, triglycerides, and glucose. The events investigated were: myocardial infarction (MI), percutaneous coronary intervention (PCI), and coronary artery bypass graft surgery (CABGData-mining analysis was carried out using the Weighted Association Rule Mining for the afore mentioned three events using five different splitting criteria.
Keywords: Coronary heart disease (CHD), data mining, weighted association rule mining,MI,PCI
heartstats.org/datapage.asp?id=7683
[2] Euroaspire study group, ―A European Society of Cardiology survey of secondary prevention of coronary heart disease: Principal
results,‖ Eur. Heart J., vol. 18, pp. 1569–1582, 1997.
[3] Euroaspire II Study Group, ―Lifestyle and risk factor management and use of drug therapies in coronary patients from 15
countries,‖ Eur. Heart J., vol. 22, pp. 554–572, 2002.
[4] Euroaspire stusy group, ―Euroaspire III: A survey on the lifestyle, risk factors and use of cardioprotective drug therapies in coronary patients from 22 European countries,‖ Eur. J. Cardiovasc. Prev. Rehabil., vol. 16, no. 2, pp. 121–137, 2009.
[5] T. Marshall, ―Identification of patients for clinical risk assessment by prediction of cardiovascular risk using default risk factor
values,‖ Br. Med. Assoc. Public Health, vol. 8, p. 25, 2008.
[6] W. B. Kannel, ―Contributions of the Framingham Study to the conquest of coronary artery disease,‖ Amer. J. Cardiol., vol. 62, pp. 1109–1112, 1988.
[7] M. Karaolis, J. A.Moutiris, and C. S. Pattichis, ―Assessment of the risk of coronary heart event based on data mining,‖ in Proc. 8th IEEE Int. Conf. Bioinformatics Bioeng., 2008, pp. 1–5.
[8] L. T. Kohn, J. M. Corrigan, and M. S. Donaldson, To Err Is Human: Building a Safer Health System. Washington, DC: Natl. Acad.,
1999.
[9] Institute of Medicine, Preventing Medication Errors. Washington, DC: Natl. Acad., 2007.
[10] T. K. Gandhi, D. L. Seger, and D. W. Bates, ―Identifying drug safety issues: From research to practice,‖ Int. J. Qual. Health Care, vol. 12, no. 1, pp. 69–76, Feb. 2000.
- Citation
- Abstract
- Reference
[2] Ranjan Bose, "Information Theory, Coding and Cryptography".
[3] K.K.Parhi "VLSI Digital Signal Processing Systems-Design And Implementation".
[4] Wei Liu, Junrye Rho, and Wongong Sung , "Low- Power High throughput BCH error correction VLSI Design for Multi-Level cell
NAND Flash Memories".
[5] Keshab K. Parhi, "Eliminating the Fan out Bottleneck In Parallel Long Bch Encoders" in proc IEEE, vol.51.No.3, march 2004.
[6] Naresh Reddy, B.Kiran Kumar and K.monisha Sirisha," On the Design of High Speed Parallel CRC Circuits Using DSP Algorithms"
in IJCSIT, vol.3 (5), 2012.
[7] Chao Cheng and Keshab Parhi, "High-Speed Parallel CRC Implementation Based On Unfolding, Pipelining And Retiming", in proc,
IEEE, vol.53, No.10, October 2006.
[8] John G.Proakis Masoud Salehi, "Digital-Communications-Linear block codes, cyclic codes, BCH codes, Reed-Solomon codes," 5th
Edition, 2008.
- Citation
- Abstract
- Reference
Paper Type | : | Research Paper |
Title | : | A novel image hiding scheme by Optimal Pixel Pair Matching and Diamond Encoding |
Country | : | India |
Authors | : | Rajashree Shitole, Satish Todmal |
: | 10.9790/4200-0152531 |
ABSTRACT: This paper describes a novel method of data embedding based on Pixel Pair Matching(PPM).In Optimal Pixel Adjustment Process (OPAP),pixel x is embedded in k-bits of message m , using Least Significant Bit (LSB) substitution method by adjusting stego pixel at optimal level. In Diamond Encoding (DE), Diamond Characteristic Value, conceals secret digit in N-ary notational system when k ≥ 1.Comparison and Experimental results of OPAP and DE not only demonstrates acceptable image quality but also provides significant improvements for different payloads. Diamond shape reveals that it is selective to specific notational system but large amount of data can be embedded in the cover image maintaining imperceptible stego-image quality.
Keywords – Diamond Encoding (DE), Exploiting Modification Direction (EMD), Least Significant Bit (LSB), Optimal Pixel Adjustment Process (OPAP), Pixel Pair Matching (PPM).
on Multimedia and Security, 2001, pp. 27-30
[2] A. D. Ker, "Steganalysis of LSB matching in grayscale images" IEEE Signal Process. Lett. vol. 12, no. 6, pp. 441-444, Jun. 2005
[3] Ran-Zan Wang, Chi-Fang Lin, Ja-Chen Lin, "Image hiding by optimal LSB substitution and genetic algorithm," Pattern Recognition,
vol.34, no. 3, 671683, 2001
[4] C. H. Yang, "Inverted pattern approach to improve image quality of information hiding by LSB substitution," PatternRecognit. vol.
41, no.8, pp. 2674-2683, 2008
[5] J. Mielikainen, "LSB Matching revisited," IEEE Signal Process. Lett. vol.13, no. 5, pp. 285-287, May 2006.
[6] J. Wang, Y Sun, H. Xu, K. Chen, H. J. Kim, and S. H. Joo, "An improved section wise exploiting modification direction method,"
Signal Process., vol. 90, no. 11, pp. 2954-2964, 2010.
[7] Xinpeng Zhang and Shuozhong Wang, "Efficient Steganographic embedding by exploiting modification direction," IEEE
Communication Lett. Vol. 10, no.11, Nov. 2006
[8] Chi- Kwong Chan, L.M. Cheng, "Improved hiding data in images in optimal moderately significant bit replacement," IEE electron.
Lett. 37, vol. 16, pp. 1017-1018, 2001.
- Citation
- Abstract
- Reference
ABSTRACT: In this paper we have put forward an image fusion algorithm based on wavelet transform and second generation curvelet transform. The wavelet transform does not represent the edges and singularities well. So the second generation curvelet transform is performed along with the wavelet transform and the image fusion is done. Finally, the proposed algorithm is applied to experiments of multi focus image fusion and complementary image fusion. The proposed algorithm holds useful information from source multiple images quite well.
Keywords - Image fusion, Wavelet transforms, Second Generation Curvelet Transform
750-753.
[2] Li, H., Manjunath, B.S., Mitra, S.K., 'Multisensor image fusion using the Wavelet Transform'. Graphical Models Image Process.
1995 , pp 235–245.
[3] Li, S., Wang, Y., 'Multisensor image fusion using discrete MultiWavelet Transform'. In: Proc. 3rd Internat. Conf. on
VisualComputing, 2000, pp. 93–103.
[4] Li, H., Manjunath, B.S., Mitra, S.K., 'Multisensor image fusion using the Wavelet Transform'. Graphical Models Image Process,
1995, pp. 235–245.
[5] E. J. Candes, D. L. Donoho. 'Curvelets: A surprisingly effective nonadaptive representation for objects with edges'. In: C. Rabut
A. Cohen, L. L. Schumaker. Curves and Surfaces. Nashville, TN: Vanderbilt University Press, 2000, pp. 105-120.
[6] E. J. Candes,D. L. Donoho, 'New tight frames of curvelets andoptimal representations of objects with singularities'. Commun. On
Pure and Appl. Math.2004, pp. 219-266.
[7] E. J. Candes, L. Demanet, D.L. Donoho et al.. 'Fast DiscreteCurvelet Transforms'. Applied and Computational Mathematics.
California Institute of Technology 2005.
[8] LiHui-hu, i GuoLe, i LiuHang,'Research on image fusion based onthe second generation curvelet transform'. Acta Optica Sinica,
2006, pp. 657-662.
[9] Huang Xishan, Chen Zhe. 'A wavelet based scene image fusion algorithm'. Proceedings of IEEE TENCON 2002. Piscateway,
USA , IEEE Press, 2002, pp. 602-605.
[10] Starck J. L, Candes E. J, Donoho D. L, 'The Curvelet Transform for image denosing'. IEEE Trans Image Process, 2002, pp. 670-
684.
- Citation
- Abstract
- Reference
ABSTRACT: Background: Several lesions in the body present as a soft tumor mass which often necessitate an incision or excision biopsy for proper histologic diagnosis. It has been noted that several soft tissue tumours turn out to be primarily infective inflammatory conditions. This study is aimed at reviewing these inflammatory soft tissue masses with a view of understanding their aetiology, histologic morphology and anatomic locations. Methodology: The records of the Department of Pathology, UCTH, were accessed to retrieve relevant clinical information for reviewing all the histologically confirmed inflammatory tumours seen through the period of 1978 – 2007.
Keywords - Granulomatous, Necrotizing, Non-Necrotizing, Onchocerciasis, Molluscum Contagiosum.
surgically removed material. Am Journal of Surgical Pathology. 1982; 6 (2): 119-129.
[2] Adams, D. O. ―The granulomatous inflammatory response. A review‖. Am J of Pathology. 1976; 84(1): 164 -191.
[3] Granuloma. From Wikipedia, the free encyclopedia. Last modified 6 August, 2011 at 21.52.
[4] Andraea R., Edson RS, Kern EB. Rhinoscleroma: A growing concern in the United States? Mayo Clinic experience. Mayo Clinic
Proc. 1993; 68: 1151 – 1157.
[5] DiBartolomeo, Joseph R. Scleroma of the nose and pharynx. Western Journal of Medicine. 1976; vol. 124., pp 13-17.
[6] Palmer, PES and Reader MM. The imaging of tropical diseases. 2000. Heidelberg: Springer Verlachi; vols. 1 and 2 (ISBN 3 – 540
– 66219 – 7).
[7] Saint Andre A., Blackwell NM, Hall LR, et al. The role of endosymbiotic Wolbachia bacteria in the pathogenesis of river
blindness. Science. 2002; 295:1892 – 1895. In Mandell, Douglas and Bennett's Principles and Practice of infectious Diseases:
6th Ed, ELSEVIER Churchill Livingstone. Pp. 3273.
[8] American Academy of Paediatrics eBooks; accessed 22 July, 2011 on http: //aaparebook.apphblications.org.
[9] Taylor H R, Duke B O L, Munoz B. The selection of communities for treatment of onchocerciasis with ivermectin. Trop Med
Parasitol. 1992; 43:267.
[10] Elder D., Rosalie E., Christine J., Bernett J, Lever's Histopathology of the skin. 1990; 60-61.arck J. L, Candes E. J, Donoho D. L, 'The Curvelet Transform for image denosing'. IEEE Trans Image Process, 2002, pp. 670-
684.
- Citation
- Abstract
- Reference
ABSTRACT: Advanced Encryption Standard algorithm (AES) was introduced to resist classical methods of cryptanalysis (i.e.) from linear or differential attacks. The cryptographic strength of the AES depends strongly depends on the choice of S-box. The result of the new attack methods shows that there may be some lacuna in the design of S-box in AES algorithm. The setback is the weakness of the existing linearity structure in the S-box. After a detail analyze on the AES algorithm and a new performance scheme for rising complication of nonlinear transformation in the structure of S- box is presented. In order to resist from the new attacks and to execute the AES with the protected encryption and decryption by using verilog and to provide a further more protection a Bio-metric scheme has been used in both the encryption and decryption schemes. The result shows that the new nonlinear implementation of the AES S-Box by using Verilog provides enhanced security with good enough speed for encryption and decryption.
Keywords: AES, Non-linear S-Box, Bio-metric Image.
[1] National Institute of Standards and Technology (NIST), "Recommendation for Block cipher modes of operation," Dec.2001.
[2] "A New Mutable Nonlinear Transformation Algorithm for S-box" Atsushi WATANABE, Hiroshi HARUKI,Shun SH1MOTOMAI, Takeshi SAITO, Tomoyuki NAGASE
[3] "A Research and Improvement based On Rijndael Algorithm" Van chun, Yanxia GUO
[4] NIST, "Advanced Encryption Standard," FIPS PUB 197, pp. I-51, November 2001
[5] "AES Proposal: Rijndael", Joan Daemen, Vincent Rijmen, Springer- Verlag, Berlin Heidelberg, 2002.
[6] Claude Carlet "Lower bounds on the higher order nonlinearities of Boolean functions and their applications to the inverse function" [7] Concurrent Structure-Independent Fault Detection Schemes for the Advanced Encryption Standard Mehran Mozaffari- Kermani, and Arash Reyhani-Masoleh.
[8] "Efficient method for simplifYing and approximating the S-boxes based on power functions" by A. F arhadian and M.R. Aref in the year 2009.
[9] "A High speed FGPA implementation of the rinjdael algorithm" by Refik Sever A., Neslin Ismailoglu, Yusuf C.Tekmen, Murat Askar anc Burak Okcan.2004
[10] "Effect of Security Increment to Symmetric Data Encryption through AES Methodology" by Md. Nazrul.
- Citation
- Abstract
- Reference
ABSTRACT: Intensity non-uniformity or intensity inhomogeneity usually occurs in Real world Images, those images cannot be segmented by using image segmentation. The most commonly used algorithms in image segmentation are region based and depends on the homogeneity of the image intensities which usually fails to produce accurate segmentation results due to the intensity non-uniformity. In this paper we proposed a novel region based method for image segmentation which can be able to discuss with intensity non-uniformities in image segmentation. First according to the image models with intensity non-uniformities we define a local clustering criterion function for the intensities in the image neighbourhood of each part. The local clustering criterion function is then integrated with respect to the neighbourhood center to give a global criterion of image segmentation. In a level set formulation this criterion defines an energy in terms of level set functions that represents the partition of image domain and a bias field that corresponds to the intensity non-uniformity of the image. Therefore, by minimizing the energy we can able to segment the image simultaneously and estimate the bias field can be used for the intensity non-uniformity correction. This method is applied on MRI images and real world images of various modalities with desirable performance in the presence of intensity non-uniformities. The experiment results show that the method is stronger, faster and more accurate than the well-known piecewise smooth model and gives promising results. As an application this method is used for segmentation and bias correction of real world images and MRI images with better results.
Keywords –Bias field, Energy minimization, Image segmentation, Intensity non-uniformity, Level set method.
[2] T. Chan and L. Vese, "Active contours without edges," IEEE Trans. Image. Process., vol. 10, no. 2, pp. 266–277, Feb. 2001.
[3] R. Ronfard, "Region-based strategies for active contour models," Int. J. Comput. Vis., vol. 13, no. 2, pp. 229–251, Oct. 1994.
[4] C. Samson, L. Blanc-Feraud, G. Aubert, and J. Zerubia, "A variational model for image classification and restoration," IEEE Trans. PatternAnal. Mach. Intell., vol. 22, no. 5, pp. 460–472, May 2000.
[5] S. Osher and J. Sethian, "Fronts propagating with curvature-dependent speed: Algorithms based on Hamilton-Jacobi formulations," J. Comp.Phys., vol. 79, no. 1, pp. 12–49, Nov. 1988.
[6] V. Caselles, F. Catte, T. Coll, and F. Dibos, "A geometric model for active contours in image processing," Numer. Math., vol. 66, no. 1, pp. 1–31, Dec. 1993.
[7] D. Cremers, "A multiphase level set framework for variational motion segmentation," in Proc. Scale Space Meth. Comput. Vis., Isle of Skye, U.K., Jun. 2003, pp. 599–614.
[8] C. Li, R. Huang, Z. Ding, C. Gatenby, D. Metaxas, and J. Gore, "A variational level set approach to segmentation and bias correction of medical images with intensity Inhomogeneity," in Proc. Med. Image Comput. Aided Intervention, 2008, vol. LNCS 5242, pp.1083–1091, Part II.
[9] C. Li, C. Kao, J. C. Gore, and Z. Ding, "Minimization of region-scalable fitting energy for image segmentation," IEEE Trans. ImageProcess, vol. 17, no. 10, pp. 1940–1949, Oct. 2008.