• Tidak ada hasil yang ditemukan

BONE FRACTURE DETECTION USING OPENCV.

N/A
N/A
Protected

Academic year: 2017

Membagikan "BONE FRACTURE DETECTION USING OPENCV."

Copied!
16
0
0

Teks penuh

(1)
(2)

Journal of Theoretical and Applied I nformati on Technology

© 2005 - 2014 JATIT & LLS. All rights reserved

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

JOURNAL OF THEORETICAL AND APPLIED

INFORMATION TECHNOLOGY

EDITORIAL COMMITTEE

NIAZ AHMAD

(Chief Editor)

Professor, FCE, MOE, H-9 Islamabad

PAKISTAN

SHAHBAZ GHAYYUR

(Co- Chief Editor)

Assistant Professor, DCS, FBAS, International Islamic University Islamabad,

PAKISTAN

SAEED ULLAH

(Associate Editor)

Assistant Professor, DCS, Federal Urdu University of Arts, Science & Technology Islamabad,

PAKSITAN

MADIHA AZEEM

(Associate Editor)

Journal of Theoretical and Applied Information Technology, Islamabad.

PAKISTAN

SALEHA SAMAR

(Managing Editor)

Journal of Theoretical and Applied Information Technology, Islamabad.

PAKISTAN

KAREEM ULLAH

(Managing Editor)

Journal of Theoretical and Applied Information Technology, Islamabad.

PAKISTAN

SHAHZAD A. KHAN

Lecturer IMCB, FDE Islamabad, PAKISTAN

(Managing Editor/Linguists & In-charge Publishing)

Journal of Theoretical and Applied Information Technology, Islamabad.

PAKISTAN

June 2014. Vol. 64 No.1

.

i

(3)

Journal of Theoretical and Applied I nformati on Technology

© 2005 - 2014 JATIT & LLS. All rights reserved

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

JOURNAL OF THEORETICAL AND APPLIED

INFORMATION TECHNOLOGY

REGIONAL ADVISORY PANEL

Dr. SIKANDAR HAYAT KHIYAL

Professor &Chairman DCS& DSE, Fatima Jinnah Women University, Rawalpindi, PAKISTAN

Dr. MUHAMMAD SHER

Professor &Chairman DCS, FBAS, International Islamic University Islamabad, PAKISTAN

Dr. ABDUL AZIZ

Professor of Computer Science, University of Central Punjab, PAKISTAN

Dr. M. UMER KHAN

Asst. Professor Department of Mechatronics, Air University Islamabad, PAKISTAN

Dr. KHALID HUSSAIN USMANI

Asst. Professor Department of Computer Science, Arid Agriculture University,

Rawalpindi, PAKISTAN

June 2014. Vol. 64 No.1

.

(4)

Journal of Theoretical and Applied I nformati on Technology

© 2005 - 2014 JATIT & LLS. All rights reserved

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

JOURNAL OF THEORETICAL AND APPLIED

INFORMATION TECHNOLOGY

June 2014. Vol. 64 No.1

.

iii

Dr. CHRISTEL BAIER

Technical University Dresden, GERMANY

Dr KHAIRUDDIN BIN OMAR UniversitiKebangsaanMalysia, 43600 Bangi

Selangor Darul-Ehsan, MALYSIA

Dr. YUSUF PISAN

University of Technology, Sydney, AUSTRALIA

Dr. S. KARTHIKEYAN Department of Electronics and Computer Engineering, Caledonian College of Engineering,

OMAN (University College with Glascow University, Scotland, UK) DR. YUXIN MAO

School Of Computer & Information Engineering Zhejiang Gongshang University, CHINA

Dr. ZARINA SHUKUR

FakultiTeknologidanSainsMaklumat, University Kebangsaan MALYSIA

Dr. NOR AZAN MAT ZIN

Faculty of Information Science & Technology, National University of MALYSIA

Dr. R.PONALAGUSAMY

National Institute of Technology, Tiruchirappalli, Tamil Nadu, INDIA

Dr. MOHAMMAD TENGKU SEMBOK Universiti Kebangsaan MALYSIA

Dr. PRABHAT K. MAHANTI University of New Brunswick, Saint John, New

Brunswick, CANADA

Dr. NITIN UPADHYAY

Birla Institute of Technology and Science (BITS), Pilani-Goa Campus, INDIA

Dr. S.S.RIAZ AHAMED

Mohamed Sathak Engineering College, Kilakarai, &Sathak Institute of Technology, Ramanathapuram , Tamilnadu, INDIA

Dr. A. SERMET ANAGÜN Eskisehir Osmangazi University, Industrial Engineering Department, Bademlik Campus,

26030 Eskisehir, TURKEY.

Dr. YACINE LAFIFI

Department of Computer Science, University of Guelma, BP 401, Guelma 24000, ALGERIA.

Dr. CHRISTOS GRECOS

School Of Computing, Engineering And Physical Sciences University Of Central Lancashire.

UNITED KINGDOM

Dr. JAYANTHI RANJAN Institute of Management Technology Raj Nagar, Ghaziabad, Uttar Pradesh, INDIA

Dr. ADEL M. ALIMI

National Engineering School of Sfax (ENIS), University of SFAX, TUNISIA

Dr. RAKESH DUBE

Professor & Head, RKG Institute of Technology, Ghaziabad, UP, INDIA

Dr. ADEL MERABET Department of Electrical & Computer Engineering, Dalhousie University, Halifax,

CANADA

Dr. HEMRAJ SAINI

CE&IT Department, Higher Institute of Electronics, BaniWalid. LIBYA

(5)

Journal of Theoretical and Applied I nformati on Technology

© 2005 - 2014 JATIT & LLS. All rights reserved

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

June 2014. Vol. 64 No.1

.

iv Dr. SEIFEDINE KADRY

Lebanese International University, LEBONON

Dr. AIJUAN DONG Department of Computer Science Hood College Frederick, MD 21701. USA

Dr. ZURIATI AHMAD ZUKARNAIN University Putra Malaysia,

MALAYSIA

Dr. HEMRAJ SAINI

Higher Institute of Electronic, BaniWalid LIBYA

Dr. CHELLALI BENACHAIBA University of Bechar, ALGERIA

Dr. MOHD NAZRI ISMAIL

University of Kuala Lumpur (UniKL) MALYSIA

Dr. VITUS SAI WA LAM The University of Hong Kong, CHINA

Dr. WITCHA CHIMPHLEE SuanDusitRajabhat University, Bangkok,

THAILAND

Dr. SIDDHIVINAYAK KULKARNI University of Ballarat, Ballarat,

AUSTRALIA

Dr. S. KARTHIKEYAN Caledonian College of Engineering,

OMAN

Dr. DRAGAN R. MILIVOJEVIĆ Mining and Metallurgy Institute BorZelenibulevar

35, 19210 Bor, SERBIA

Dr. E. SREENIVASA REDDY Principal - VasireddyVenkatadri Institute of

Technology, Guntur, A.P., INDIA

Dr OUSMANE THIARE Gaston Berger University, Department of Computer Science, UFR S.A.T, BP 234 Saint-

Louis SENEGAL

Dr. SANTOSH DHONDOPANT KHAMITKAR RamanandTeerthMarathwada University, Nanded.

Maharashtra 431605, INDIA

Dr. M. IQBAL SARIPAN

(MIEEE, MInstP, Member IAENG, GradBEM) Dept. of Computer and Communication Systems Engineering, Faculty of Engineering, Universiti

Putra MALAYSIA

Dr. E. SREENIVASA REDDY Principal - VasireddyVenkatadri Institute of

Technology, Guntur, A.P., INDIA

Dr. T.C.MANJUNATH, Professor & Head of the Dept., Electronicis& Communication Engg. Dept,

New Horizon College of Engg., Bangalore-560087, Karnataka, INDIA.

Dr. SIDDHIVINAYAK KULKARNI

Graduate School of Information Technology and Mathematics University of Ballart AUSTRALIA

Dr. SIKANDAR HAYAT KHIYAL Professor & Chairman DCS& DSE, Fatima

Jinnah Women University, Rawalpindi,

PAKISTAN

Dr. MUHAMMAD SHER Professor & Chairman DCS, FBAS, International Islamic University Islamabad,

PAKISTAN

Dr. ABDUL AZIZ

Professor of Computer Science, University of Central Punjab, PAKISTAN

Dr. M. UMER KHAN

(6)

Journal of Theoretical and Applied Informati on Technology

© 2005 - 2014 JATIT & LLS. All rights reserved

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

Elite Panel Members Have A Decision Weight Equivalent of Two Referees (Internal OR External). The Expertise Of Editorial Board Members Are Also Called In For Settling Refereed Conflict About

June 2014. Vol. 64 No.1

Acceptance/Rejection And Their Opinion Is Considered As Final.

.

v Dr. RIKTESH SRIVASTAVA

Assistant Professor, Information Systems Skyline University College P O Box 1797, Sharjah, UAE

Dr. BONNY BANERJEE

PhD in Computer Science and Engineering, The Ohio State University, Columbus, OH, USA

Senior Scientist Audigence, FL, USA

PROFESSOR NICKOLAS S. SAPIDIS DME, University of Western Macedonia

Kozani GR-50100, GREECE.

Dr. NAZRI BIN MOHD NAWI Software Engineering Department, Faculty of

Science Computer Information Technology,

Universiti Tun Hussein Onn

MALAYSIA

Dr. JOHN BABALOLA OLADOSU Ladoke Akintola University of Technology,

Ogbomoso, NIGERIA

Dr. ABDELLAH IDRISSI

Department of Computer Science, Faculty of Science, Mohammed V University - Agdal,

Rabat, MOROCCO

Dr. AMIT CHAUDHRY University Institute of Engineering and Technology, Panjab University, Sector-25,

Chandigarh, INDIA

Dr. ASHRAF IMAM

Aligarh Muslim University, Aligarh-INDIA

Dr. MOHAMMED ALI HUSSAIN Dept. of Computer Science & Engineering, Sri Sai Madhavi Institute of Science & Technology,

Mallampudi, Rajahmundry, A.P, INDIA

Dr. KHALID HUSSAIN USMANI Asst. Professor Department of Computer Science,

Arid Agriculture University, Rawalpindi, PAKISTAN

Dr. GUFRAN AHAMD ANSARI Qassim University, College of Computer Science,

Ministry of Higher Education, Qassim University, KINGDOM OF SAUDI

ARABIA

Dr. Defa Hu

School of Information, Hunan University of Commerce

Changsha 410205, Hunan, P. R. of China

(7)

Journal of Theoretical and Applied I nformati on Technology

© 2005 - 2014 JATIT & LLS. All rights reserved

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

PREFACE

Journal of Theoretical and Applied Information Technology (JATIT) published since 2005 (E-ISSN 1817- 3195 / ISSN 1992-8645) is an International refereed research publishing journal with a focused aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of Information Technology. JATIT is an international scientific research journal focusing on issues in information technology research. A large number of manuscript inflows, reflects its popularity and the trust of world's research community. JATIT is indexed with various organizations and is now published on monthly basis.

All technical or research papers and research results submitted to JATIT should be original in nature, never previously published in any journal or undergoing such process across the globe. All the submissions will be peer-reviewed by the panel of experts associated with JATIT. Submitted papers should meet the internationally accepted criteria and manuscripts should follow the style of the journal for the purpose of both reviewing and editing. All of its articles also appear online as per policy of JATIT

Journal of Theoretical and Applied Information Technology receives papers in continuous flow and we will consider articles from a wide range of Information Technology disciplines encompassing the most basic research to the most innovative technologies. Please submit your papers electronically to our submission system at http://jatit.org/submit_paper.php in an MSWord, Pdf or compatible format so that they may be evaluated for publication in the upcoming issue. This journal uses a blinded review process; please remember to include all your personal identifiable information in the manuscript before submitting it for review, we will edit the necessary information at our side. Submissions to JATIT should be full research / review papers (properly indicated below main title).

It is the sole responsibility of the submitting authors to make sure that the submitted manuscript is not in process of publication anywhere in any conference/journal across the globe, nor part or whole of it is copied from any source.

The review process may take anywhere from five days to two months depending on the response time to referees. Authors will be informed about the updated status via e-mail as soon as we receive the evaluation results. After submission of publication dues for accepted manuscripts a publication slot will be allocated to your manuscript for its publication in upcoming monthly issues of JATIT.

******************

June 2014. Vol. 64 No.1

.

(8)

Journal of Theoretical and Applied I nformati on Technology

© 2005 - 2014 JATIT & LLS. All rights reserved

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

ABSTRACTING & INDEXING

Journal of Theoretical and Applied Information Technology Islamabad Pakistan is focused, double blind peer reviewed journal that is now being published monthly and is published by Asian Research Publishing Network and is Indexed / Abstracted by the following International Agencies and institutions. JATIT has been regularly published since 2005 and now has a well reputed international standing and invites contributions from researchers, scientists, and practitioners from all over the world.

*- Ulrich's Periodicals Directory

*- DataBase systems and Logic Programming (DBLP) *- EBSCO Publishing USA

*- Directory of Open Access Journals (DOAJ) *- Google & Google Scholar Journals

*- The Index of Information Systems Journals *- Information Technology Resources Collection *- ZDNet Australia

*- NLM Catalog

*- Computing Research and Education Association of Australasia *- CiteSeer

*- Elsevier *- SCOPUS

*- Engineering Village *- TOC Premier

******************

Feel free to suggest JATIT to any Indexing & Abstracting Services which are appropriate to its scope

TM

June 2014. Vol. 64 No.1

*- Computer Science Journals

*- Computers and Applied Sciences Complete *- N|W Switzerland

*- Microsoft Academic Search *- Cabell Publishing

*-OpenJgate *- INSPEC

*- IAOR Palgrave Macmillan

.

vii

(9)
(10)

Journal of Theoretical and Applied Information Technology

10th June 2014. Vol. 64 No.1

© 2005 - 2014 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

BONE FRACTURE DETECTION USING OPENCV

1SAMUEL FEBRIANTO KURNIAWAN, 2I KETUT GEDE DARMA PUTRA

, 3 A.A KOMPIANG OKA SUDANA 1,2,3

Department of Information Technology, Udayana University, Indonesia

E-mail: 1samuelfebriantokurniawan@gmail.com

,

2

ikgdarmaputra@gmail.com

,

3

agungokas@hotmail.com

ABSTRACT

Image processing is important in modern data storage and data transmission especially in progressive transmission of images, video coding (teleconferencing), digital libraries, image database, and remote sensing. The purpose of this project is to find out the accuration of an X-Ray Bone Fracture Detection using Canny Edge Detection Method. Fractured bone is a bone condition that suffered a breakdown of bone integrity. A disconnected connection between two cartilages also categorized as bone fracture. Normally, bones have elasticity and a great number of strength. Bone fracture only happen when the bones took a force beyond their elasticity or strength. This system is built using OpenCV library combined with Canny Edge Detection method to detect the bone fracture. Canny Edge Detection method is an optimal edge detection algorithm on determining the end of a line with changeable threshold and less error rate. The simulation results have shown how canny edge detection can help determine location of fractures in x-ray images.

Keywords: Fracture, Edge, Edge Detection, Canny, Threshold, x-ray images.

1. INTRODUCTION

Digital image processing is an expanding area with applications regarding to our daily lives, especially in progressive transmission of images, video coding (teleconferencing), digital libraries, image database, remote sensing, and other particular applied usage. Many image processing and analysis techniques have been developed to aid the interpretation of remote sensing images and to extract as much information as possible from the image. The huge collection of digital images are collected due to the improvement in the digital storage media, image capturing devices like scanners, web cameras, digital cameras and rapid development in internet. This leads to rapid and efficient retrieval of these images for visual information in different fields of life like medical, medicine, art, architecture, education, crime preventions, etc [1,2].

The medical imaging field has grown substantially in the recent year and has generated additional interest in methods and tools for management, analysis, and communication of medical image. Many diagnostic imaging modalities, such as x-ray, magnetic resonance imaging (MRI), digital radiography, and ultrasound

are currently available and are routinely used to support clinical decision making. By using medical imaging, physicians are able to glean qualitative and quantitative information about anatomy and physiology of the patients. With this advantages, medical imaging has become central to medical diagnosis. Thus, with the advances in computer processing capabilities, it has become possible to approach the problem of automating diagnosis in medical imaging. This paper will focus on canny edge detection that help radiologist in automated diagnosis image. Radiologist often experiencing difficulty on reading x-ray image. This can be caused by the lack of lighting, fractures the hardly seen by naked eyes, or noises the happened on image capturing process. By building the system, we hope the system can help people especially radiologist on detecting bones anomaly that happened on x-ray images [3].

(11)

Journal of Theoretical and Applied Information Technology

10th June 2014. Vol. 64 No.1

© 2005 - 2014 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

250

2. IMAGE PROCESSING TECHNIQUE

Image processing techniques are employed to develop this algorithm. It is discussed in detail in this section.

2.1 Canny Edge

Edges are considered to be most important image attributes that provide valuable information for human image perception. Edge detection is a very complex process affected by deterioration due to different level of noise [4]. An edge is the boundary between an object and the background. Edge detection is identifying points in a digital image at which the image brightness changes sharply or more formally has discontinuities. The purpose of detecting sharp changes in image brightness is to capture important events and changes in properties of the world [4].

Edge detection is used for identification of blurred frame broad classification among smooth and rough surface classification of cement and asphalt. The Canny edge detection is performed on the frames with the sensitive threshold values (upper threshold 10000 and lower threshold 4900) and again it is performed with the insensitive threshold values (upper threshold 50000 and lower threshold 9800) [4]. If a pixel has a gradient greater than the upper threshold, then it is an edge pixel. If a pixel has a gradient lower than the lower threshold, it is not an edge pixel. If the pixel’s gradient is between the upper and the lower thresholds, then it is considered as an edge, only if it is connected to a pixel that is above the high threshold value as given in [5,11].

Canny is one of modern edge detection method that founded by Marrdan Hildreth, who is doing research in modeling human visual perception. There are several criteria on edge detecting that can be fulfilled by Canny Edge Detection:

1. Canny has better detection (for detection criteria). Canny method capable to marks all existing edges matching with user determined parameter’s thresshold. Also giving high flexibility on determining thickness level of edge detection according to the required conditions.

2. Canny has better localizing way (localize criteria). Canny capable on producing minimum gap between detected edge and the real image edge.

3. Obvious response (response criteria). Only one response for every edge. This make less confusion on edge detection for the next image. Chosing parameters on Canny Edge Detection

will giving effect on every result and edge detection. The parameters are :

a. Gaussian Deviation Standard Value. b. Thresshold Value.

The following is the steps to do Canny Edge Detection.

1. Remove all noise on the image by implementing Gaussian Filter. The result is an image with less blur. It is intended to obtain the real edges of the image. If we did not apply the Gaussian Filter before, sometimes the noise itself will be detected as an edge.

2. Detect the edge with one of these detection operators, like Roberts, Perwit, or Sobel by do horizontal searching (Gx) and vertical searching (Gy). The following is the sample of edge detection operator (Sobel operators).

(a) (b)

Figure 1 Sobel Operator (a) Gx, (b) Gy

The result from both operators combined to obtain the summary of vertical edge and horizontal edge with this formula[6]:

(3)

3. Determining direction of the edge by using the following formula:

ଶ ଶ (4)

ீ௬

ீ௫ (5)

Canny Edge Detection using two thresholds (maximum threshold and minimum threshold). If pixel gradient higher than maximum threshold, pixel will be marked as an edge. If the pixel gradient lower than minimum threshold, the pixel will be denied as background image. If the pixel gradient between maximum threshold and minimum threshold, the pixel will be accepted as an edge if it is connected with other edge pixel that higher than maximum threshold.[11]

(12)

Journal of Theoretical and Applied Information Technology

10th June 2014. Vol. 64 No.1

© 2005 - 2014 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

5. The last step is binarizing the image pixels by applying two threshold value.

2.3 System Overview

System overview of this program is discussed in detail in this section.The next figure show the system design in flowchart. This flowchart explain the process flows from detecting X-ray image until producing the bone fracture detection on the X-ray image. Input R-ray Image Filtering Image Image Processing with Edge Detection

Shape Detection For Fracture Detection Output Image with Fragture Detection Begin End

Figure 2 Flowchart System

Here is an explanation of the performance of the system:

1. First user must input an image to be processed, the image will then be carried filtering to remove noise that exist in the image.

2. The next step will performed after image filtering process, the image will be processed using Canny Edge method, it will give results more visible lines on an X-ray image.

3. The system then combines the results of early detection canny with the original image, then user can clearly see the shape of the bone and this combined images will be processed by the system.

4. To detect the location of the fracture in the image, the system use shape detection with multiple parameters. A broken bone is expressed

when the line has an end, and do not have a connection with another line. A broken bone stated, if the lines form an angle less than 145 degrees, although the line still has a connection with the other lines.

5. The parameters on system specify in determining the location of the broken bone is as follows:

a. The red color, indicating the location after the end of a line through a process canny edge detection. Where the line is only a single line and doesn’t have adjacent to any other lines.

b. The blue color indicates the location of the end of a line next to each other (this is intended to indicate the location of the line that has the possibility of having a hairline fractured bone).

c. The green color indicates the location of the end of a line in the line has a lot of ends. The amount of a tip in the first line helps the system to recognize the location of a major fracture in the picture.

This system builds from OpenCv library, CV namespace contains image processing and camera calibration methods. The computational geometry functions are also located here. CVAUX namespace is described in OpenCv's documentation as containing obsolete and experimental code. However, the simplest interfaces for face recognition are in this module. The code behind them is specialized for face recognition, and they're widely used for that purpose. ML namespace contains machine-learning interfaces. HighGUI namespace contains the basic I/O interfaces and multi-platform windowing capabilities. CVCAM namespace contains interfaces for video access through DirectX on 32-bit Windows platforms.[7,8]. In book of [13,14,15] there much information about using OpenCv for build this system. Here is an example pseudocode from OpenCv that determining the location of the broken bone.

//Setting the parameter for edge detection

(13)

Journal of Theoretical and Applied Information Technology

10th June 2014. Vol. 64 No.1

© 2005 - 2014 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

252 CV_POLY_APPROX_DP,

cvContourPerimeter(contours)*0.05, 0);

//Red Point detection indicating for edge detection

if(result->total==2 )

{

CvPoint *pt[2]; for(int i=0;i<3;i++){

pt[i] = (CvPoint*)cvGetSeqElem(result, i); }

// blue point detection, indicating for hairline fracture bone

if(result->total==3 )

{

CvPoint *pt[3]; for(int i=0;i<3;i++){

pt[i] = (CvPoint*)cvGetSeqElem(result, i); }

//Green Point detection, indicating for major fracture

else if(result->total==4 )

{

CvPoint *pt[4]; for(int i=0;i<4;i++){

pt[i] = (CvPoint*)cvGetSeqElem(result, i); }

3. RESULT

Figure 3 shows step 1 – 5 in chapter 3 to start the bone fracture detection process. The first image output has been processed through Canny Edge Detection method, and then followed by the shape detection. Shape detection used to find the end of a line. End of a line can be ascertained as the position where the fracture occured. This application can reduce the unused parameter that categorized as undamaged part (chapter 2).

There are many outputs from this proses, which are the original image to be processed, 2 images that has been processed by Canny Edge Detection method, and 2 images that shows the user the result of fracture detection. Figure 3 will show those 5 outputs.

In figure 3 the user uploads an x-ray image, figure 3(a). Then system will process that image

with Canny Edge detection, figure 3(b). In figure 3(c) system shows the output of image processing, by combining the image of canny edge detection result and inverting the original image that uploaded by the user. In figure 3(d) system will detect the location of the end of each line. In Figure 3(e) the system will then automatically detect fractured bone and its location.

(a) (b) (c)

(d) (e)

Figure 3 (a) Input Image (b) Output Image with canny Detection(c) Invert Output Image Canny Detection (d) Output image with canny Detection with edge detection in every edge (e) Output image with Fracture detection.

To clarify the performance of the system, we decided to process the other images. Here is an example of the results of the image processing:

(14)

Journal of Theoretical and Applied Information Technology

10th June 2014. Vol. 64 No.1

© 2005 - 2014 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

(d) (e)

Figure 4 (a) Input Image (b) Output Image with canny Detection(c) Invert Output Image Canny Detection (d) Output image with canny Detection with edge detection in every edge (e) Output image with Fracture detection.

(a) (b) (c)

(d) (e)

Figure 5 (a) Input Image (b) Output Image with canny Detection(c) Invert Output Image Canny Detection (d) Output image with canny Detection with edge detection in every edge (e) Output image with Fracture detection.

After a number of attempts to detect the location of the fracture, the results of the experiments are summarized in Table 1.

Table 1 Result of Fracture Detection No End Of Line

Detection (Red) Hairline Fracture Detection (Blue) Fracture Detection (Green)

1 11 Edge

Detection None Hairline Fracture Detection 6 Major Fracture Detection

2 22 Edge

Detection 1 Hairline Fracture Detection 9 Major Fracture Detection

3 15 Edge

Detection 2 Hairline Fracture Detection 3 Major Fracture Detection

Table 1 shows the number of results of the detection system bone fracture, and accuracy of system detection can be seen in Table 2.

Table 2 Accuracy of Fracture Detection No Hairline

Fracture (a) Major Detection (b) Accuracy

True False True False A b

1 - - 4 2 - 50%

2 1 - 5 4 100% 55,6%

3 1 1 2 1 50% 66,7%

4. CONCLUSION

This Paper presented the Canny Edge detection framework to assist radiologist in detecting fractured bones from x-ray images. It has been tested with real data. Simulation result shows that the system need to be improvised on it performance and reduce the response time.

According to the test result that has been done to detect the bone fracture, a conclusion can be made that the performance and accuration of the detection method affected by the quality of the image. The better the image quality, the better result system got.

For the future development, there are some things that must be noted:

a. Implement another image processing method in order to improve the accuration of image detection.

b. Adding various language will capable on supporting the integration of this application to other application or system.

c. Improvise the method performance to decrease the amount of time and decrease the percentage of error by adding several model of different neural networks trained with different architecture before initiating this system.

REFRENCES:

[1] Mubeena Pathan, K.Jusoff, M. S. Alias ”Implication Of Image Processing Algorithm In Remote Sensing and gis applications”, Journal of Theoretical and Applied Information Technology, 15th December 2011, vol 34 No 1.

(15)

Journal of Theoretical and Applied Information Technology

10th June 2014. Vol. 64 No.1

© 2005 - 2014 JATIT & LLS. All rights reserved.

ISSN: 1992-8645 www.jatit.org E-ISSN: 1817-3195

254 [3] Mostafa Syiam, “AdAgen : Adaptive Interface

Agent For X-Ray Fracture Detection”, International Journal of Computing & Information Sciences, December 2004, vol 2, no 3.

[4] Dhanabal R,” Digital Image Processing Using Sobel Edge Detection Algorithm In Fpga “, Journal of Theoretical and Applied Information Technology, 10th December 2013, Vol. 58 No.1.

[5] Rafael C. Gonzalez, Richard and E. Woods, “Digital Image Processing”, Third Edition, 2009.

[6] Batra Yudha Pratama,”Pendeteksian Tepi Pengolahan Citra Digital “, 2007, Komunitas eLearning IlmuKomputer.Com.

[7] Robin Hewitt, 2010, Available at :http://www.cognotics.com/opencv/servo_2007 _series/part_1/index.html 2010/09/02.

[8] Shervin Emami,”Facial Recognition using OpenCV”, Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 1, 2012. [9] Bin Yu and Anil K. Jain, “Lane Boundary

Detection Using A Multiresolution Hough Transform,” Dept. of Computer Science Michigan State University, East Lansing, MI 48824, IEEE Conference, October 1997, vol. 2, pp. 748-751.

[10] N. Otsu, “A threshold selection method from grey-level histograms”, IEEE Trans. Syst., Man, Cybern, Vol. SMC-8, 1978, pp. 62–66. [11] Darma Putra,“Pengolahan Citra Digital”.

Andi. Yogjakarta, Indonesia, 2010.

[12] Xuan Mo, “OpenCV Tutorial I: Image Processing”, iPal Grub Meeting , 2011. [13] David Stavens,” The OpenCV Library:

Computing Optical Flow”, Stanford Artificial Intelligence Lab, 2013.

[14] Robert Laganière,” OpenCV 2 Computer Vision Application Programming Cookbook”. Packt Publishing , 2011.

[15] Klaus D. Toennies, “Advances in Computer Vision and Pattern Recognition”. Springer-Verlag, London, 2012.

(16)

Home

Journal Rankings

Journal Search

Country Rankings

Country Search

Compare

Map Generator

Help

About Us

Display journal title

Just copy the code below and paste within your html page:

<a href="http://www.scimagojr.com/journalsearch.php?q=19700182903&amp;tip=sid&amp;exact=no" title="SCImago Journal &amp; Country Rank"><img border="0" src="http://www.scimagojr.com/journal_img.php?id=19700182903&amp;title=true" alt="SCImago Journal &amp; Country Rank" /></a>

How to cite this website?

F o l l o w u s :

Twitter

SJR is developed by:

J o u r n a l S e a r c h

in Journal Title Search

Exact phrase

J o u r n a l o f T h e o r e t i c a l a n d A p p l i e d I n f o r m a t i o n T e c h n o l o g y

Country: Pakistan

Subject Area: Computer Science | Mathematics

Subject Category: Computer Science (miscellaneous) , Theoretical Computer Science

Publisher: Asian Research Publishing Network (ARPN). Publication type: Journals. ISSN: 18173195, 19928645

Coverage: 2010-2013

H Index: 5

Charts Data

Indicators 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 SJR 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,137 0,167

Total Documents 0 0 0 0 0 0 0 0 0 0 0 222 229 622

Total Docs. (3years) 0 0 0 0 0 0 0 0 0 0 0 0 222 451

Total References 0 0 0 0 0 0 0 0 0 0 0 3.880 4.120 9.475

Total Cites (3years) 0 0 0 0 0 0 0 0 0 0 0 0 61 178

Self Cites (3years) 0 0 0 0 0 0 0 0 0 0 0 0 4 17

Citable Docs. (3years) 0 0 0 0 0 0 0 0 0 0 0 0 222 451

Cites / Doc. (4years) 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,27 0,39 Cites / Doc. (3years) 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,27 0,39 Cites / Doc. (2years) 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,27 0,39 References / Doc. 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 17,48 17,99 15,23

Cited Docs. 0 0 0 0 0 0 0 0 0 0 0 0 43 101

Uncited Docs. 0 0 0 0 0 0 0 0 0 0 0 0 179 350

% International

Collaboration 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 5,86 5,68 5,31

Gambar

Figure 1 Sobel Operator (a) Gx, (b) Gy
Figure 2 Flowchart System
Figure 3 (a) Input Image (b) Output Image with
Figure 5 (a) Input Image (b) Output Image with

Referensi

Dokumen terkait