HI I'M AMRUTH SIVARAMAKRISHNAN

I AM

image
Hello,

I'm Amruth Sivaramakrishnan

"Trained and Qualified System Engineer in a Reputed Organization with Strong Background in Networking, Frontend and Backend Technologies and also skilled with using Relational Databases to simplify complex data models. A little Knowledge on Cloud Computing and Data Analytics as an added Advantage."

"Our greatest weakness lies in giving up. The most certain way to succeed is always to try just one more time."

—Thomas A. Edison.


Education
B.E. Electronics & Communication Engineering

At SMK Fomra Institute of Technology, Chennai.

Percentage: 87.5%

HSC [12th Standard]

At CSI ST Thomas Higher Secondary School

Percentage: 94.5%

SSLC [10th Standard]

At CSI ST Thomas Matriculation Higher Secondary School

Percentage: 97%


Experience
Data Collection Agent [Aug 2020 - Apr 2021]

At Stats Perform Private Ltd

Description: As Data Collection Agent I am responsible for collecting detail soccer data, tracking and recording live coordinates and time of every on-ball event. This data helps our clients to create rich content for broadcast, digital experience, professional analysis and more!

System Engineer [May 2021 - Current Date]

At Infosys Ltd

Description: Trained and Qualified System Engineer capable of working with full stack projects and telecom projects with a good practical knowledge in both frontend and backend technologies.


My Skills
FRONTEND

HTML 5, CSS 3, Javascript, Bootstrap, Flutter, React Js.

BACKEND

Java, Spring Framework

DATABASES

SQL, MySQL

TECHNICAL KNOWLEDGE

Cloud Computing, Wireless Networks


OTHER TOOLS

Salesforce CRM, Redhat PAM


COMPUTER SKILLS

MS Office, Power BI, Digital Marketing

PROGRAMMING LANGUAGES

C, C++

Java

Python

Dart

WHAT CAN I DO

Web Design

Building a Business website from scratch using web technologies like HTML, CSS, Bootstrap, JavaScript, React

UI/UX Design

Creating a attractive, creative and user friendly UI/UX design for Apps and Websites

App Design

Creating Mobile Applications for both Android and iOS for your business using Flutter.

Clean Code

Provide a full fledged backend support on most common programming languages like C,C++,Java, Python & Dart

Customer Relationship Management[CRM]

Help your marketing, sales, commerce, service and IT teams work as one from anywhere using Salesforce.

Content Writing

I have an hobby of writing creative contents and blogs. I can able to provide good quality content for your business websites.

MY CERTIFICATIONS


MY WORKS

CHANDRAYAAN - EVENT WEBSITE

 


CHANDRAYAAN -2 

A Stylish and Responsive event website using HTML, CSS, JavaScript.


To view the website:  Click here.


The challenge

 The challenge is to build out this multi-page space event website and get it looking as close to the design as possible.

Your users should be able to:
1. View the optimal layout for each of the website's pages depending on their device's screen size.
2. See hover states for all interactive elements on the page.
3. View each page and be able to toggle between the tabs to see new information.

SUNNYSIDE WEBSITE

 

SUNNYSIDE

A BUSINESS BRANDING WEBSITE



To View the Website: Click here

FINAL YEAR PROJECT

BLINDSPOT WARNING AND SPEED MANIPULATION BY DATA TRANSFER THROUGH CAN PROTOCOL

TEAM MEMBERS:  

  1. Mr. S. Amruth, Department Of ECE, amruthsrku@gmail.com, SMKFIT, Chennai.  
  2. Mr. J. Eyanaeswhararaj, Department Of ECE, eyanaeswh@gmail.comSMKFIT, Chennai. 
  3. Mr. M. Hemantha Kumar,  Department Of ECE, hemanthakumar8899@gmail.com, SMKFIT, Chennai. 
  4. Mr. P.Ajith Kumar Department Of ECE, ajith270916@gmail.com, SMKFIT, Chennai. 

To view the full Report: Click Here.

ABSTRACT

            The motive of our project is to mitigate the number of road accidents by making the vehicles communicate among themselves by transferring the data using CAN protocol. Speed of the adjacent vehicle is captured via the wireless transceiver and logged into a dedicated Electronic control unit. The concerned vehicle's speed is sensed and captured. The ultrasonic sensors detect the presence of obstacle or vehicles residing in the region of blind spot, all this information are logged in to the ECU and transferred from one vehicle to an adjacent vehicle using CAN protocol. CAN protocol involves communication between various controllers without the involvement of a host computer which finds a wide application in the automotive industry. Thus, the proneness of accidents is greatly avoided which in turn pulls down the accident rate thereby saving more lives.

INTRODUCTION

 Theoretical Background:
            Every day we are communicating with each other in some way or another, be it by using words, actions, or even expressions in conveying a message. We, humans, depend not only on face-to-face communication but the kind that brings technology to the fore to bridge that gap between people by mere seconds across vast distances. 
            In The 5th Century, Letters And Documents Could Be Sent By using Pigeons’ Homing Abilities. Pigeons were trained by being removed from their homes and taken to a destination, from which they would return home. Observation stations were built on a hilltop to relay these messages over long distances One of the NSA’s observatory stations at Teufelsberg. These networks were replaced by telegraph networks invented by “Samuel morse” in 1838. Marconi-Radio's ability-first wireless telegraphy in 1897 was used to send one-way signals. Alexander Graham Bell, who patented the telephone, inaugurated the 1,520- km telephone line. After the invention of mobile phones till the 20th-century mobile were made to access only for voice and SMS usage.
            In the 21st century smartphones were the biggest evolution created in telecommunications We have seen a drastic changeover in communicational technologies and in our lifestyles too. There is no point in that, it doesn’t take much time for us to convert from 4G to 5G and is much more advanced. Only the thing is how ethically we are perfectly synchronized with the technology in our livelihoods. Ongoing in advance, inventors try to develop a technology that can make the machines communicate with each other. Thus in the case of automobile industries, the evolution of Vehicle to vehicle communication came into existence. 
            The evolution of the technologies and the standards enables a vehicle to communicate with other vehicles and the surrounding environment and become part of an extended intelligent transportation system (ITS) communication system able to support a wide range of services by using different communication media.

V2V Communication:

            Vehicle-to-vehicle communication (V2V communication) is the wireless transmission of data between motor vehicles. The goal of V2V communication is to prevent accidents by allowing vehicles in transit to send position and speed data to one another over an ad-hoc mesh network. Depending upon how the technology is implemented, the vehicle's driver may simply receive a warning should there be a risk of an accident, or the vehicle itself may take preemptive actions such as braking to slow down. V2V communication is expected to be more effective than current automotive original equipment manufacturer (OEM) embedded systems for lane departure, adaptive cruise control, blind-spot detection, rear parking sonar, and backup camera because V2V technology enables a ubiquitous 360-degree awareness of surrounding threats. V2V communication is part of the growing trend towards pervasive computing, a concept known as the Internet of Things (IoT). In the United States, V2V is an important part of the intelligent transport system (ITS), a concept that is being sponsored by the United States Department of Transportation (DOT) and the National Highway Traffic Safety Administration (NHTSA).
        The implementation of V2V communication and an intelligent transport system currently has three major roadblocks: the need for automotive manufacturers to agree upon standards, data privacy concerns, and funding. As of this writing, it is unclear whether the creation and maintenance of the supporting network would be publicly or privately funded. Automotive manufacturers working on ITS and V2V include GM, BMW, Audi, Daimler, and Volvo.


EXISTING SYSTEM
        Communication between vehicles is established using short-range communication (SRC). The conventional system works based on the accelerator input, the rate of fuel flow given to the engine, and the speed is controlled accordingly. If the vehicle needs to run at high speed the accelerator pedal has to be pressed more so that it supplies more fuel to the engine. In this method, the driver's concentration is much more and always alert to take necessary control actions depending on the traffic situation.

Fig: calculation of gap distance to avoid collision
Some of the hardware components in-vehicle can be integrated into a single unit or a discrete set of components and consist of the following component,
1) Dedicated Short Range (DSRC) radio: Responsible for receiving and transmitting data over antennae.
2) GPS Receiver: Provides the vehicle position, time to DSRC radio, and timing signals for applications.
3) Memory: Responsible for storing the security certificates with other information and application data.
4) DSRC & GPS Antenna: Interface between the propagating radio waves and its responsible for receiving and transmitting both the DSRC and GPS signals.
Fig: Block Diagram of the existing system

Disadvantages of Existing System:

The existing system even though very useful, also has several disadvantages like
• Drivers concentration is much more and always alert to take necessary control actions depending on the traffic situation.
• Increases cost of vehicle and maintenance.
• User’s Ignorance.
• The overall collision avoidance system is controlled manually.

PROPOSED SYSTEM
            In our proposed system, the vehicles are granted to communicate and share data via wireless transceiver by using CAN protocol. Speed of the adjacent vehicle and blind-spot warning information are communicated via Zigbee to the adjacent vehicle and are logged into a dedicated Electronic control unit (ECU). Vehicle at the blind spot region can be identified using ultrasonic sensors. An emergency electronic braking system provides automatic deceleration of vehicles to avoid a collision. The alert message passes from one node controller to another. Each autonomous and mobile node, connected to the others, forms a partially connected mesh network. The individual nodes forward the packets to each other. Improve the performance by making all the vehicles close to interact with each other and help the car in danger to undertake a more effective choice to solve the emerging problem. 
Fig: Block Diagram of Vehicle 1
Fig: Block Diagram of Vehicle 2

            The new Intelligent Transport Systems (ITSs) will employ data from V2V communication to enhance traffic management, allowing vehicles to also communicate with road infrastructures, such as traffic lights or signs. These technologies could become mandatory in the not too distant future and contribute to building more reliable self-driving cars on motorways. The proposed system comprises of performing the following works:

1. Collision avoidance
2. Collision detection
3. Blind spot warning

To view the full Report: Click Here.

1. COLLISION AVOIDANCE The collision avoidance system involves the usage of Speed sensors to detect the speed of the adjacent vehicle. The obtained data is then fed into the ECU of the car unit and the ECU is connected with the Zigbee for transferring the data using CAN protocol. Depending on the obtained data the speed of the corresponding vehicle which receives the data is decelerated by reducing the motor speed. Such that the proneness to accidents can be avoided.
2. COLLISION DETECTION The collision detection mechanism involves passing the message from one car node to another when one car gets involved in an accident or collision. CAN protocol is used to communicate these messages from one node to another.
Fig: Process of Speed Manipulation

3 BLIND SPOT WARNING This unit is concentrated separately because most of the accidents occur when the driver could not able to see the object which is nearer to the vehicle. The region which is not been visualized to the driver is known as the blind spot. The objects or vehicles which is present in the region of the blind spot are identified using ultrasonic sensors. The sensor data is then loaded in ECU for transferring the data to the adjacent vehicle.
 
Fig: Process of Blindspot warning

Advantages of Proposed system:

• CAN protocol is resilient to electrical noise.
• CAN protocol implementation requires low cost.
• Blind spot warning.
• Can communicate with more number of vehicles.
• Every operation will be controlled automatically.
• Automatic braking system.

HARDWARE MODEL

WORKING PRINCIPLE
            Different ECUs can communicate with each other via CAN Bus. The input speed of the vehicle is given through the speed switch to the ECU2 of vehicle 1. The motor rotates according to the speed (rpm) applied on the switch. The obtained speed is then communicated to the ECU1 via CAN Bus. The ECU 1 contains the Zigbee module which transmits the obtained information to the adjacent vehicle(Vehicle 2) Then the speed of the motor in vehicle 2 is manipulated according to the speed of vehicle 1. The Buzzer is used to indicate sound during speed manipulation. The ultrasonic sensor is used to identify the objects in the region of the blind spot. If there is any object or vehicle below the range of 20cm, the buzzer is ON and an alert message is passed from vehicle 1 to vehicle 2. Then vehicle 2 can pass an acknowledge message like
1. Wait do not overtake.
2. Yes you can overtake
The same process is repeated in vehicle 2.


Fig: Images of the Developed Model

To view the full Report: Click Here.

SOFTWARE REQUIREMENTS:
1. Embedded c
2. Mp lab IDE
HARDWARE REQUIREMENTS:
1. PIC 18F485
2. MCP2551 CAN Transceivers.
3. Zigbee module
4. Speed switch
5. Motor driver and motor
6. LCD
7. Ultrasonic sensor
8. Buzzer

CONCLUSION
            To avoid accidents and collisions many types of experiments are conducted. Thus, in a nutshell, vehicle safety and communication between vehicles have been conceived based on the CAN protocol. It is an emerging technology that may be predominant and will come into existence may be within a decade. Yet, still, the further edification of these systems is possible such as
i. The collected data can be uploaded on a centralized server for ease of access.
ii. Encryption on the CAN messages can help secure the communication over the CAN bus.
iii. On a large scale, the system may also employ RTOS.

            It’s evident that technology has great capabilities to help future generation transportation systems. V2V communication has unique characteristics to enable future generation intelligent transportation systems. We are planning to provide a few safety applications through our proposed system in order to provide efficient output at a reliable cost.

To view the full Report: Click Here.

REFERENCES
[1] Mayur Shinde, Nidhi Pandey, Pritham Shetty, Harsh Umrania &
Prof.Manoj Mishra, International Conference on Innovative and Advanced Technologies in Engineering (March-2018)
[2] Xiuliang Mo1,2, Pengyuan Chen1,2(B), Jianing Wang3, and Chundong Wang1,2 2 Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Ministry of Education, Tianjin University of Technology, Tianjin 300384, China 3 Sichuan University, Chengdu 610207, Sichuan, China
[3] Hussain A. Attia*, Shereen Ismail&, Halah Y. Ali# *Department of Electrical, Electronics and Communications Engineering / School of Engineering & Department of Computer Science and Engineering / School of Engineering #Department of Biotechnology / School of Art and Science American University of Ras Al Khaimah, Ras Al Khaimah, UAE.
[4] Nurbaiti Wahid, 2Hairi Zamzuri, 2Mohd Azizi Abdul Rahman, 3Satoshi Kuroda, 3Pongsathorn Raksincharoensak ,Nakacho 2-24-16, Koganei, Tokyo 184-8588, Japan,IEEE 2017.
[5] Erçakır, O.; Kızılırmak, O.; Erol, V. Network Security Issues and Solutions on Vehicular Communication Systems. Preprints 2017, 2017060001doi:10.20944/preprints201706.0001.v1
[6] M. T. Wolf and J. W. Burdick, “Artificial potential functions for highway driving with collision avoidance,” in Robotics and Automation, 2008. ICRA 2008.
IEEE International Conference on. IEEE, 2008, pp. 3731– 3736.
[7] E. Nasr, E. Kfoury and D. Khoury, "An IoT approach to vehicle accident detection, reporting, and navigation," 2016 IEEE International Multidisciplinary
Conference on Engineering Technology (CET), Beirut, 2016, pp. 231-236.
[8] LORA: Loss Differentiation Rate Adaptation Scheme for Vehicle-to-
Vehicle Safety Communications Yuan Yao, Member, IEEE, Xi Chen, Student Member, IEEE, Lei Rao, Member, IEEE, Xue Liu, Member, IEEE, and Xingshe Zhou, Member, IEEE,2016 IEEE.
[9] Weil, T.: VPKI Hits the Highway: Security Communication for the Connected Vehicle Program. IT Professional Magazine, Vol. 19, Issue 1, pp.
59-63, 2017.
[10] S. Pallewatta, P. S. Lakmali, S. Wijewardana, P. Ranathunga,T.
Samarasinghe,andD.Dias,“802.11p: Insights from the MAC and physical layers for a cooperate car following application,” in Proc. EAI International Conference on Intelligent Transport Systems, pp. 226–236, Jul. 2018.


To view the full Report: Click Here.

STUNNING PORTFOLIO ANDROID APP USING FLUTTER

Flutter is an open-source framework by Google for building beautiful, natively compiled, multi-platform applications from a single codebase.







 

STYLISH PORTFOLIO WEBSITE USING HTML, CSS & JAVASCRIPT



ATTRACTIVE AND RESPONSIVE PERSONAL WEBSITE TO SHOWCASE YOUR SKILLS AND KNOWLEDGE TO THE WORLD. 




To View the Website: CLICK HERE

IJICS JOURNAL PUBLICATION

   




CERVICAL CANCER DETECTION SYSTEM  USING VARIOUS TEXTURAL APPROACHES

AUTHORS:

  1. Dr.M. Robinson Joel, Department of CSE, joelnazareth@gmail.com, SMKFIT, Chennai.  
  2. Mr. S. Amruth, Department Of ECE, amruthsrku@gmail.com, SMKFIT, Chennai.  
  3. Mr. J. Eyanaeswhararaj, Department Of ECE,  eyanaeswh@gmail.com, SMKFIT, Chennai. 
  4. Mr. M. Hemantha Kumar,  Department Of ECE, hemanthakumar8899@gmail.com, SMKFIT, Chennai. 
  5. Mr. J. Lokesh Department Of ECE, lokred7489@gmail.com, SMKFIT, Chennai. 

ABSTRACT

        Cervical cancer is one of the types of cancer which is found to be deadliest among women. Cervical cancer affects the cervix region of the uterus. The vital problem is that cancer will be identified only at the final stages and does not show any symptoms. Therefore it is necessary to give accurate treatment volume to the patient. Nowadays Image processing uses some diagnosing tools like X-ray, CT, MRI, etc. to obtain the staging of disease. This paper proposes the texture-related research works on cervical cancer detection carried out by various research communities, and authors who explore the textural feature extraction in their investigations.

Keywords: X-rays, CT, MRI, cervix, stroma, cervigram, etc.



INTRODUCTION

        Cancer is the deadliest disease that is caused when cells in the human body grow old and when they die they become damaged or they do not die and form a mass of tissue that grows into a tumor. Cervical cancer occurs in women of all age groups. This cancer does not have any symptoms and it is very difficult to detect at the earlier stage of cancer development. Pap smear test is the diagnostic method proposed for women from age group 15 and above for manually screening cervical cancer. Cervical cancer is caused by the human Pamplona virus (HPV).

        Different cytologists show the subjective disparity in screening the results of Pap smear tests. It provides more inconsistencies. The test output shows more false results, which makes the reliability of the screening process a question mark and the possibility of human errors become  High. Thus textual approaches of image processing techniques are proposed. The texture is the predominant innate property used in the identification of certain objects or regions regardless of image types. Spectral, textural and contextural are kinds of patterns for describing the visual information meaningfully.

        So it is indeed to move toward the extraction of features in a view to achieve our goal by the way of describing the medical image accurately. This section reviews the texture-related research works carried out by various research communities, and authors who explore textural feature extraction in their investigations.

Figure 1. Cervical cancer mortality statistics.

MATERIAL AND METHODS

        Here we can study more about the texture classification in detail. These can be very useful in finding out the good direction towards the research. Santa & Elisa, (2017) have presented the basics of automated texture analysis in many applications of biomedicine such as the detection and grading of several types of cancer,  the various diagnosis levels of autoimmune diseases, and the study of physiological processes.  They have also reviewed the concepts of geometrical methods, statistical methods, local binary patterns, model-based methods, transform-based methods in the application of image segmentation, object classification, image and video compression, content-based retrieval, and 3D reconstruction and rendering. This study also investigated the latest trend i.e. deep learning architectures to learn the texture model directly from the images. It is very sensible to imagine that deep learning and more attention in the future, as its full ability in the aspect of the bio-logical textural analysis is yet to be discovered.

Figure2: visual textures with corresponding sub-patterns.

        Francesco et al. (2015), have proposed the visual perception-based image features for differentiating epithelium and stroma in histological images. The following five features. i.e.coarseness, contrast, directionality, line-likeliness, and roughness were reviewed which enables functioning with a very small dimensional feature vector and allows a relevant analysis of the feature values with respect to sound visual properties. Also, three classifiers were analyzed based on Support Vector Machines (SVM), Nearest Neighbor rule (1-NN), and  Naïve Bayes rule (NB). It is observed that the proposed features can appropriately distinguish epithelium from the stroma.

                                                      

Figure 3. Sample images of tumor epithelium and stroma.

        Jayachandran & Dhanasekaran, (2014)  have presented a brain tumor classification method by incorporating structural analysis on both timorous and normal tissues. This framework involves the preprocessing, segmentation, feature extraction and classification steps to be followed in detecting tumors. As a preprocessing step, the anisotropic filter is applied to eradicate the noise which improves the image quality for the skull-stripping process. Some of the features are captured from the intensity and some are from the modified multi-texton structure descriptor.  The hybrid kernel is formulated to train the  SVM classifier to carry out automatic categorization of tumors in magnetic resonance imaging  (MRI) images.

                                    

Figure 4: sample MRI Image Dataset, (a) Normal image, (b) tumor image.

        Sun, Park, et al (2011) have developed a domain-specific computerized image analysis for the identification of pre-cancerous and cancerous lesions of the cervix. Here, features are extracted in a probabilistic manner using conditional random field and also introduced a window-based assessment scheme for 2D image analysis which solves the missed alignment problem. Various tissue types of image regions are obtained for the extraction of domain-oriented anatomical features. Diagnostic relationship between tissue types is also obtained using a conditional random field.

Figure 5: (a) Cross polarized white light image;  and (b) histopathology slide of a patient's cervix

        Hayit et al. (2009) have proposed a multi-stage scheme for segmenting and labeling of the anatomical region inside the cervigrams and also features of cervix region are extracted thereby detecting cervix boundary. Besides that, specular reflection has been destroyed in the pre-processing step, and entry of the endo-cervical canal is also detected. Cervigram analysis includes a two-step process in which undesirable image regions are ignored by an ROI detection method and as a second step, specular reflection has been detected and removed. Geometric measure of local concavity method is incorporated for detection of the os (neck of the uterus).

Figure. 6. An example cervigram: the cervix boundary, the os, and SR artifacts are marked.

        Ji et al. (2000) have generalized the statistical texture technique for recognizing vascular patterns related to cervical lesions from colposcopic images. Texture primitive extraction method is incorporated that approximate vascular structures which include image preprocessing, skeletonization, and vectorization. Nine sets of textural features can be extracted from two marginal distributions, four features from the joint distribution, and two features directly from the vectorized images, a total of 24 features. Peak density, entropy, density have also been analyzed and the linear correlation coefficients have been computed for linearly correlated features between any two features. Figure 7 shows the pattern.

                                

Figure 7. Typical vascular patterns encountered in cervical lesions. (a) network capillaries in the original squamous epithelium; (b) hairpin capillaries in the original squamous epithelium; (c) and

(d) punctation vessels in dysplasia and carcinoma in situ; and (e) and (f) mosaic vessels as seen  in dysplasia and carcinoma in situ

Figure 8. Cervical cancer incidence rate and mortality rate in various regions of the world.

            Table 2.1 provides the detailed report of the existing cervical cancer detection frameworks which are emphasized textural features. On proper monitoring of the merits and demerits of these papers, some of the papers do not consider textural features, and only basic methods were applied for extracting textural features like first-order statistics features and simple co-occurrence patterns. These features do not exhibit efficient feature representation for increasing the performance of the cancer detection systems in terms of precision and recall.

Table 2.1 Textural feature-based Cancer detection system


CONCLUSION

        Cervical cancer is screened by the manual method (pap smear test) does not give accurate results in classifying the tumoured cells and normal cells located at the cervix of the uterus. In this paper, a study and analysis are done for detecting cervical cancer automatically using various textural approaches. The study was made to investigate the features derived from image processing of MR images of patients that could be used in predicting the disease stage.  Thus, textural approaches outperformed transform and statistical features in staging prediction. This idea which has been proposed by many journalists and researchers is taken as a  survey in this paper. From this, we come to a  conclusion that the textural approaches will become the best method of diagnosing the earlier stages of cervical cancer. It is better to predict the treatment volume will help the radiologist for better treatment planning according to the staging.

REFERENCES

[1] Mining textual knowledge in biological images: Applications, methods, and trends: San-  ta Di Cataldo, Elisa Ficarra.

[2] A, Jayachandran & Raghavan, Dhanaseka-  ran. (2014). Brain Tumor Severity Analysis Using Modified Multi-Texton Histogram and Hybrid Kernel SVM. International  Journal of Imaging Systems and Technology.  24. 10.1002/ima.22081.

[3] Park, Sun & Sargent, Dustin & Lieberman,  Richard & Gustafsson, Ulf. (2011). Domain-Specific Image Analysis for Cervical Neoplasia  Detection Based on Conditional Random Fields.  IEEE transactions on medical imaging. 30. 867-  78. 10.1109/TMI.2011.2106796.

[4] Hayit & Gordon, Jose & Antani, Sameer &  Long, L. (2009). Automatic Detection of Anatomical Landmarks in Uterine Cervix Images.  IEEE transactions on medical imaging. 28. 454-  68. 10.1109/TMI.2008.2007823.

[5] Ji, Qiang & Engel, John & Craine, Eric.  (2000). Texture Analysis for Classification of  Cervix Lesions. IEEE transactions on medical imaging. 19. 1144-9. 10.1109/42.896790.

[6] Bianconi, Francesco & Alvarez-Larrán, Al-  berto & Fernández, Antonio. (2015). Discrimi-  nation between tumour epithelium and stroma  via perception-based features. Neurocomputing.  154. 119–126. 10.1016/j.neucom.2014.




Are you Interested ?

Contact Me
Amruth
+91 8807500630

Search This Blog

Powered by Blogger.

Blog Archive

About Me

My photo
Trained and Qualified System Engineer in a Reputed Organization with Strong Background in Networking, Frontend and Backend Technologies and also skilled with using Relational Databases to simplify complex data models. A little Knowledge on Cloud Computing and Data Analytics as an added Advantage

CHANDRAYAAN - EVENT WEBSITE

  CHANDRAYAAN -2  A Stylish and Responsive event website using HTML, CSS, JavaScript. To view the website:  Click here. The challenge  The c...