A system of microcalcifications detection and evaluation of the radiologist: comparative study of the three main races in Malaysia
This paper uses wavelets in the detection comparison of breast cancer among the three main races in Malaysia: Chinese, Malays, and Indians followed by a system that evaluates the radiologist's findings over a period of time to gauge the radiologist's skills in confirming breast cancer case...
| Main Authors: | Al-Qdah,, M, Ramli, , AR, Mahmud,, R |
|---|---|
| Format: | Article |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2160/ |
Similar Items
A system of microcalcifications detection and evaluation of the radiologist: comparative study of the three main races in Malaysia
by: Al-Qdah, Majdi, et al.
Published: (2005)
by: Al-Qdah, Majdi, et al.
Published: (2005)
A system of microcalcifications detection and evaluation of the radiologist: comparative study of the three main races in Malaysia
by: Al-Qdaha, Majdi, et al.
Published: (2005)
by: Al-Qdaha, Majdi, et al.
Published: (2005)
Detection of Microcalcifications Using Wavelet Techniques in Mammogram Digital Images and Development of a Software for Evaluation of Radiologist Findings
by: Hasan Al-Qdah, Majdi Taysir
Published: (2006)
by: Hasan Al-Qdah, Majdi Taysir
Published: (2006)
Scale invariants of three-dimensional Legendre moments
by: Ong, , Lee-Yeng, et al.
Published: (2006)
by: Ong, , Lee-Yeng, et al.
Published: (2006)
Microcalcifications segmentation using three edge detection techniques
by: Yasiran, Siti Salmah, et al.
Published: (2012)
by: Yasiran, Siti Salmah, et al.
Published: (2012)
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)
by: Robin Salim,, et al.
Published: (2006)
Automated Fish Detection And Identification
by: Wong , Poh Lee
Published: (2015)
by: Wong , Poh Lee
Published: (2015)
An Approach For Detection Of Logical Inconsistency
by: Yadav, Rinki
Published: (2012)
by: Yadav, Rinki
Published: (2012)
Subcarrier Multiple Access system using a single optical source to suppress Optical Beat Interference
by: Abdul-Rashid, H. A., et al.
Published: (2007)
by: Abdul-Rashid, H. A., et al.
Published: (2007)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
A comparative analysis of algorithms for fast computation of Zernike moments
by: Chong, C
Published: (2003)
by: Chong, C
Published: (2003)
Modelling, Detection And Exploitation Of Lexical Functions For Analysis.
by: Schwab, Didier, et al.
Published: (2007)
by: Schwab, Didier, et al.
Published: (2007)
A Framework For Detecting Bluetooth Mobile Worms.
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
A Background Study on Ant Colony Optimization Metaheuristic
and its Application Principles in Resolving Three Combinatorial Optimization Problem.
by: Sallim, Jamaludin, et al.
Published: (2007)
by: Sallim, Jamaludin, et al.
Published: (2007)
A Feature Selection Approach Based On Hybridizing Flower Pollination Algorithm With Particle Swarm Optimization For Enhancing The Performance Of Ipv6 Intrusion Detection System
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
by: Al Ghuraibawi, Adnan Hasan Bdair
Published: (2023)
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al.
by: Omar, Mohd Nizam, et al.
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
A mobile phone malicious software detection model with behavior checker
by: Yap, , TS, et al.
Published: (2005)
by: Yap, , TS, et al.
Published: (2005)
Off-line signature verification and forgery detection using fuzzy modeling
by: Hanmandlu, , M, et al.
Published: (2005)
by: Hanmandlu, , M, et al.
Published: (2005)
Scale-space segment growing for hierarchical detection of biliary tree structure
by: LOGESWARAN, RAJASVARAN
Published: (2005)
by: LOGESWARAN, RAJASVARAN
Published: (2005)
Statistical-based SYN-flooding detection using programmable network processor
by: Lim, , BP, et al.
Published: (2005)
by: Lim, , BP, et al.
Published: (2005)
Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Vehicle Monitoring System Using Motion Detection Algorithms For USM Campus.
by: Osman, Mohd. Azam, et al.
Published: (2007)
by: Osman, Mohd. Azam, et al.
Published: (2007)
Parallelizing Algorithm For Object Recognition Based On Edge Detection On Sunfire Cluster.
by: Osman, Mohd Azam, et al.
Published: (2007)
by: Osman, Mohd Azam, et al.
Published: (2007)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Off-line signature verification and forgery detection system based on fuzzy modeling
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
Pixel-Based Parallel-Coordinates Technique For Outlier Detection In Cardiac Patient Dataset.
by: Hasimah, H.M., et al.
Published: (2007)
by: Hasimah, H.M., et al.
Published: (2007)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Soccer Video Event Detection Via Collaborative Textual, Aural And Visual Analysis
by: Halin, Alfian Abdul
Published: (2011)
by: Halin, Alfian Abdul
Published: (2011)
Layered Botnet Detection Framework Based On Signal
Processing And Discrete Time Analysis
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
Optimization of chromatic dispersion measurement technique using relative power of two beating frequencies
by: Abdul Rashid, Hairul Azhar, et al.
Published: (2006)
by: Abdul Rashid, Hairul Azhar, et al.
Published: (2006)
Optimization of optical modulator chirp measurement technique using differential frequency beating
by: Abdul Rashid, Hairul Azhar, et al.
Published: (2007)
by: Abdul Rashid, Hairul Azhar, et al.
Published: (2007)
High Performance Network Worm Detection Engine Using Memory Efficient Circular Buffer.
by: Budiarto, Rahmat, et al.
Published: (2007)
by: Budiarto, Rahmat, et al.
Published: (2007)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
Similar Items
-
A system of microcalcifications detection and evaluation of the radiologist: comparative study of the three main races in Malaysia
by: Al-Qdah, Majdi, et al.
Published: (2005) -
A system of microcalcifications detection and evaluation of the radiologist: comparative study of the three main races in Malaysia
by: Al-Qdaha, Majdi, et al.
Published: (2005) -
Detection of Microcalcifications Using Wavelet Techniques in Mammogram Digital Images and Development of a Software for Evaluation of Radiologist Findings
by: Hasan Al-Qdah, Majdi Taysir
Published: (2006) -
Scale invariants of three-dimensional Legendre moments
by: Ong, , Lee-Yeng, et al.
Published: (2006) -
Microcalcifications segmentation using three edge detection techniques
by: Yasiran, Siti Salmah, et al.
Published: (2012)