Multi-level of feature extraction and classification for X-Ray medical image
There has been a rise in demand for digitized medical images over the last two decades. Medical images' pivotal role in surgical planning is also an essential source of information for diseases and as medical reference as well as for the purpose of research and training....
| Main Authors: | Abdulrazaq, M, Alshaikhli, Imad Fakhri Taha, Mohd Noah, Shahrul Azman, Fadhil,, Moayad Al Athami |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Institute of Advanced Engineering and Science (IAES)
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/63248/ http://irep.iium.edu.my/63248/13/63248%20Multi-Level%20of%20Feature%20Extraction%20and%20Classification%20for%20X-Ray%20%20SCOPUS.pdf http://irep.iium.edu.my/63248/19/63248_Multi-Level%20of%20Feature%20Extraction%20and%20Classification%20for%20X-Ray_article.pdf |
Similar Items
XMIAR: X-ray medical image annotation and retrieval
by: Abdulrazzaq, M. M., et al.
Published: (2019)
by: Abdulrazzaq, M. M., et al.
Published: (2019)
An adequate approach to image retrieval based on local level feature extraction
by: Muhammad Hidayat Khan, Sumaira, et al.
Published: (2015)
by: Muhammad Hidayat Khan, Sumaira, et al.
Published: (2015)
Online feature selection based on input significance analysis (ISA) for evolving connectionist systems (ECos)
by: Hassan, Raini, et al.
Published: (2017)
by: Hassan, Raini, et al.
Published: (2017)
Comparative study of some symmetric ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
by: Jassim, Khalid Fadhil, et al.
Published: (2014)
Analysis of confidentiality algorithms in different mobile generations
by: Jassim, Khalid Fadhil, et al.
Published: (2017)
by: Jassim, Khalid Fadhil, et al.
Published: (2017)
Analysis the components of SNOW 3G and ZUC ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2018)
by: Jassim, Khalid Fadhil, et al.
Published: (2018)
Mobile technology generations and cryptographic algorithms: analysis study
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
by: Jassim, Khalid Fadhil, et al.
Published: (2016)
Emotion recognition model using source-temporal features and fuzzy
by: Shams, Wafa Khazal, et al.
Published: (2013)
by: Shams, Wafa Khazal, et al.
Published: (2013)
Brain & heart from computer science perspective
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
by: Taha Alshaikhli, Imad Fakhri
Published: (2014)
Scientific research in view of Quran and the creation of Allah s.w.t.
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
by: Taha Alshaikhli, Imad Fakhri
Published: (2018)
Scientific research in view of Quran and the creation of Allah s w t
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
by: Taha Alshaikhli, Imad Fakhri
Published: (2019)
Structure of research proposal
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri
Published: (2017)
A practical method for the analysis of genetic algorithms
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha
Published: (2011)
The use of genetic algorithm in improving medical image segmentation techniques
by: Hassan, Raini, et al.
Published: (2011)
by: Hassan, Raini, et al.
Published: (2011)
Convolutional Neural Network Model for Bone Fracture Detection and
Classification in X-Ray Images
by: M. Fariz Fadillah, Mardianto, et al.
Published: (2024)
by: M. Fariz Fadillah, Mardianto, et al.
Published: (2024)
Statistical approach for a complex emotion recognition based on EEG features
by: Dwi Handayani, Dini Oktarina, et al.
Published: (2016)
by: Dwi Handayani, Dini Oktarina, et al.
Published: (2016)
Disaster recovery in single-cloud and multi-cloud
environments: Issues and challenges
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
Medical Image Modality Classification using Feature Weighted Clustering Approach.
by: Chandra, Bhavik Anil
Published: (2010)
by: Chandra, Bhavik Anil
Published: (2010)
Dynamic linear feedback shift registers: a review
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Accident detection system and method for accident detection
by: Alkandari, Abdulrahman, et al.
Published: (2014)
by: Alkandari, Abdulrahman, et al.
Published: (2014)
Design and analysis of a new hash function gear
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
A review of steganographic methods and techniques
by: Beroual, Abdessalam, et al.
Published: (2018)
by: Beroual, Abdessalam, et al.
Published: (2018)
Dynamic fuzzy logic traffic light integrated system with accident detection and action
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Minimum capabilities and requirements for establishing a national cert for AGC
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
by: Taha Alshaikhli, Imad Fakhri, et al.
Published: (2017)
Effectiveness and performance of e-government in Saudi Arabia
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
by: Taha Alshaikhli, Haifa, et al.
Published: (2017)
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017)
by: Alahmad, Mohammad, et al.
Published: (2017)
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
An improved genetic algorithm for solving the multiprocessor scheduling problem
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Designing a smart city in Kuwait: an initial study
by: Alkandari, Abdulrahman, et al.
Published: (2012)
by: Alkandari, Abdulrahman, et al.
Published: (2012)
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Comparative study on 4G/LTE cryptographic algorithms based on different factors
by: Ghanim, Alyaa, et al.
Published: (2014)
by: Ghanim, Alyaa, et al.
Published: (2014)
Statistical analysis of the eSTREAM competition winners
by: Mohamed Eljadi, Fardous, et al.
Published: (2016)
by: Mohamed Eljadi, Fardous, et al.
Published: (2016)
Evaluation of usability problems of labor portal in Saudi Arabia
by: Alzuabi, Haifa Fahad, et al.
Published: (2013)
by: Alzuabi, Haifa Fahad, et al.
Published: (2013)
A new algorithm for human face detection using skin color tone
by: Zangana, Hewa Majeed, et al.
Published: (2013)
by: Zangana, Hewa Majeed, et al.
Published: (2013)
Cryptographic hash function: A high level view
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
by: Alkandari, Abdulaziz Ali, et al.
Published: (2013)
Effective noise removal technique for enhancement of the X-ray image / Azman Mohamed
by: Mohamed, Azman
Published: (2005)
by: Mohamed, Azman
Published: (2005)
Multi-stage feature selection in identifying potential biomarkers for cancer classification
by: Wong, Yit Khee, et al.
Published: (2022)
by: Wong, Yit Khee, et al.
Published: (2022)
A study on the effects of EEG and ECG signals while listening to Qur'an recitation
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Detection and restoration of cracked digitized paintings and
manuscripts using image processing - a survey
by: Farajalla Ali, Nawafil Abdulwahab, et al.
Published: (2017)
by: Farajalla Ali, Nawafil Abdulwahab, et al.
Published: (2017)
Similar Items
-
XMIAR: X-ray medical image annotation and retrieval
by: Abdulrazzaq, M. M., et al.
Published: (2019) -
An adequate approach to image retrieval based on local level feature extraction
by: Muhammad Hidayat Khan, Sumaira, et al.
Published: (2015) -
Online feature selection based on input significance analysis (ISA) for evolving connectionist systems (ECos)
by: Hassan, Raini, et al.
Published: (2017) -
Comparative study of some symmetric ciphers in mobile systems
by: Jassim, Khalid Fadhil, et al.
Published: (2014) -
Analysis of confidentiality algorithms in different mobile generations
by: Jassim, Khalid Fadhil, et al.
Published: (2017)