8 research outputs found

    Data Mining Technique to Interpret Lung Nodule for Computer Aided Diagnosis

    Get PDF
    Diagnostic decision-making in pulmonary medical imaging has been improved by computer-aided diagnosis (CAD) systems, serving as second readers to detect suspicious nodules for diagnosis by a radiologist. Though increasing the accuracy, these CAD systems rarely offer useful descriptions of the suspected nodule or their decision criteria, mainly due to lack of nodule data. In this paper, we present a framework for mapping image features to radiologist-defined diagnostic criteria based on the newly available data). Using data mining, we found promising mappings to clinically relevant, human-interpretable nodule characteristics such as malignancy, margin, spiculation, subtlety, and texture. Bridging the semantic gap between computed image features and radiologist defined diagnostic criteria allows CAD systems to offer not only a second opinion but also decision-support criteria usable by radiologists. Presenting transparent decisions will improve the clinical acceptance of CAD

    MOTION ARTIFACT CANCELLATION IN AMBULATORY ECG MEASUREMENT SYSTEM FOR THE DETECTION OF CARDIAC DISEASES

    Get PDF
    Abstract-In this work, a simple and efficient artifact cancellation in ambulatory ECG using adaptive filter is designed for the detection of different cardiac diseases like bradycardia, tachycardia, left ventricular hypertrophy and right ventricular hypertrophy. Our work is focused on extraction of noise free ECG signal and the real-time implementation of artifacts removal techniques. As ECG signal is very sensitive in nature, and even if small noise mixed with original signal the various characteristics of the signal changes, data corrupted with noise must either filtered or discarded, filtering is important issue for design consideration of real-time ECG measurement systems. Here we have implemented different adaptive filtering algorithms (LMS-Least Mean Square, RLS-Recursive Least Squares) using virtual instrumentation technique to minimize the noisy components and to analyze different cardiac diseases like bradycardia, tachycardia, left ventricular hypertrophy and right ventricular hypertrophy. Finally the overall performance of LMS and RLS algorithm is also compared according to the error signal generated by the techniques

    Efficient Image Mining Technique for Classification of Mammograms to Detect Breast Cancer

    Get PDF
    The image mining technique deals with the extraction of implicit knowledge and image with data relationship or other patterns not explicitly stored in the images. It is an extension of data mining to image domain. The main objective of this paper is to apply image mining in the domain such as breast mammograms to classify and detect the cancerous tissue. Mammogram image can be classified into normal, benign and malignant class. Total of 24 features including histogram intensity features and GLCM features are extracted from mammogram images. A hybrid approach of feature selection is proposed which approximately reduces 75% of the features and new decision tree is used for classification. Experiments have been taken for a data set of 300 images taken from MIAS of different types with the aim of improving the accuracy by generating minimum no. of rules to cover more patterns

    A NOVEL VLSI ARCHITECTURE OF HIGH SPEED 1D DISCRETE WAVELET TRANSFORM

    Get PDF
    This paper describes an efficient implementation for a multi-level convolution based 1-D DWT hardware architecture for use in FPGAs. The proposed architecture combines some hardware optimization techniques to develop a novel DWT architecture that has high performance and is suitable for portable and high speed devices. The first step towards the hardware implementation of the DWT algorithm was to choose the type of FIR filter block. Firstly we design the high speed linear phase FIR filter using pipelined and parallel arithmetic methods. This proposed filter employs efficiently distributed D-latches and multipliers. Furthermore this filter is used in the proposed DWT architecture. Thus, the new VLSI architecture based on combining of fast FIR filters for reducing the critical path delay and data interleaving technique for lower chip area. We synthesized the final design using Xilinx 9.1i ISE tool. We illustrate that a DWT design using a pipelined linear phase FIR filter coupled with data-interleaving gives the best combination of the performance metrics when compared to other DWT structures

    Adaptive circular queue image steganography with RSA cryptosystem

    Get PDF
    The major objective of the article is to supply the novel and efficient methodology of digital image steganography that describes individuality regarding secret transmission using the adaptive circular queue least significant bits (LSBs) substitution. The data structure queue is employed dynamically in resource distribution between multiple communication recipients and once secret information transmitted asynchronously. Here, RSA cryptosystem is employed for secret information confidentiality and authentication. The result of the cryptosystem organised into various blocks. In steganography method, organise the cover image into various circular queues blocks. Dynamically adapted procedure is employed to assign secret cypher blocks to circular queues for embedding. Authorised receiver will determine the right plain text using private key in RSA decypherment. Performance analysis is evaluated by using MSE, PSNR and maximum embedding capacity. Results are higher as compared with several of existing algorithms of image steganography

    A Technique for Secure Communication Using Message Dependent Steganography

    Get PDF
    In this paper we present a technique for secure communication between two parties Alice and Bob. We use both cryptography and steganography. We take image as the carrier to use steganography. By using our own substitution cipher called two square reverse we encrypt the secret information. Then the cipher text of the secret information is embedded into the carrier image in LSB (least significant bit) minus one position of some selected bytes. The byte selection is done depending on the bit pattern of the secret information. Thus the embedding locations are dependent on the secret message. So the intruder will face difficulties to locate the bits. After embedding the resultant image will be sent to the receiver, the receiver will apply the reverse operation what the sender has done and get the secret information
    corecore