Bat algorithm based Softcomputing Approach to Perceive Hairline Bone Fracture in Medical X-ray Images
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 4
Abstract
Detection of bone fracture is easy if it is an open fracture and we do not need any special mechanism to identify that. But in case of closed fracture that is, hairline bone fracture the case becomes complicated. It is not always possible to detect that through bare eye. This is also a challenge for computer vision, through which detection of such cases could become easy and time saving. There are already a lot of methods and techniques available to solve this problem. But there is no such effort in the trend of using nature inspired metaheuristic algorithms. These emerging algorithms are becoming popular and can become a significant tool for computer vision. In this study, detection of hairline bone fracture is taken as a problem to be solved via implementing Bat algorithm. In the preprocessing stage this algorithm is been applied, to enhance the image, after which self organizing map (SOM) is used to draw segmentation and at last K-means clustering is used to produce the objective image. The results are exceptionally encouraging and the effectiveness of Bat algorithm as an image enhancer is proved.
Authors and Affiliations
Goutam Das
Predicting Students Attrition using Data Mining
Student attrition has become one of the most important measures of success for higher education institutions. It is an important issue for all institutions due to the potential negative impact on the image of the univers...
A SURVEY OF DESKTOP GRID SYSTEM SCHEDULING
Grid Computing forms virtual, collaborative organizations that share applications and data in an open heterogeneous server environment in order to work on common problems. Desktop Grid is a named collection of machines i...
A KEY MANAGEMENT PROTOCOL FOR HIERACHICAL WIRELESS SENSOR NETWORKS
Wireless sensor networks (WSNs) are deployed in hostile environments in many applications. In order to resist security threats, sensor nodes of WSNs often use pre-shared secret keys to encrypt and exchange confidential d...
Review paper of Character recognition using image processing
The paper proposes a system for gesture or hand images recognition to provide a easy method for communication between deaf-dump and vocal people it allow the user to deal with the system in a natural way. The hand can be...
A Study on Reliable Data Delivery for Highly Dynamic MANETs
This paper addresses the problem of delivering data packets in highly dynamic Mobile Ad Hoc network. Existing routing protocols are susceptible to node mobility. To overcome this issue, an efficient Position based Routin...