Texture Analysis of Ultrasound Medical Images for Diagnosis of Thyroid Nodule Using Support Vector Machine?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 10)Publication Date: 2013-10-30
Authors : Shrikant D. Kale Krushil M. Punwatkar;
Page : 71-77
Keywords : Texture analysis; thyroid nodule; GLCM; SVM;
Abstract
A texture analysis of medical images gives the quantitative information about the tissue characterization & internal structure of organs for possible pathology. The physician deducing the useful information concerning internal body parts for the pathology or lesions. This is the till subjective matter of concern & thus to provide the objectification of disease diagnosis from the medical image, this paper gives the idea for thyroid nodule diagnosis using texture of the ultrasound images. Thyroid gland is located at the base of the neck, just below Adam’s apple which produces hormones that control body metabolism. The nodules are found in thyroid may be benign or malignant. In this paper, gray level co-occurrence matrix (GLCM) is used as the texture characterization technique. The 10 GLCM feature are selected for feature extraction & GLCM matrix is calculated for four different orientation & different pixel distance from 1 to 15. The extracted features are classified using SVM classifier with linear kernel for diagnosis of thyroid nodule malignancy risk. The experimental results show the performance measure of SVM classifier in terms classification accuracy, Positive predicted rate, Negative predicted rate, sensitivity & specificity.
Other Latest Articles
- Calculating Optimal Cost of Using DGs in Micro Grids by Using Imperialistic Competitive Algorithm (ICA)?
- Cloud Computing Security from Single to Multi-Clouds?
- Le processus de reconnaissance d'opportunités : Cas des entrepreneurs opérant dans le secteur des TIC en Tunisie
- An Overview of Biometric Identifiers with Emphasis on the Concept and Applications of Finger Vein Recognition
- Mobile Based User Authentication for Guaranteed Password Security Using key?
Last modified: 2013-10-24 01:18:23