• Aucun résultat trouvé

AUTOMATIC SEGMENTATION OF CARDIAC MAGNETIC RESONANCE IMAGES USING ACTIVE APPEARANCE MODELS AND HAUSDORFF DISTANCE

N/A
N/A
Protected

Academic year: 2021

Partager "AUTOMATIC SEGMENTATION OF CARDIAC MAGNETIC RESONANCE IMAGES USING ACTIVE APPEARANCE MODELS AND HAUSDORFF DISTANCE"

Copied!
2
0
0

Texte intégral

(1)

AUTOMATIC SEGMENTATION OF CARDIAC

MAGNETIC RESONANCE IMAGES USING ACTIVE

APPEARANCE MODELS AND HAUSDORFF

DISTANCE

Auteur: Ammar, Mohammed; Mahmoudi, Said; Chikh, Mohammed

Amine; Abbou, Amine

Abstract/Résumé : Active Appearance Models (AAM), have been introduced by Cootes et al. [IEEE Transactions on Pattern Analysis and Machine Intelligence, 2001], and are used to learn objects characteristics during a training phase by building a compact statistical model representing shape and texture variation of the object. This Model is used to find the object location and shape-appearance parameters, in a test set. The selection of the initial position of the construct model in a test image is a very important task in this context.The goal of this work is to propose an automatic segmentation method applied to cardiovascular MR images using an AAM based segmentation approach. The AAM model was constructed using 20 end-diastolic and end-systolic short axis cardiac magnetic resonance images (MRI). Once the model is constructed, we select the best position in order to start the search step manually in the test image. That is why; in this paper, the localization of the left ventricular cavity in the test image is used to select the initial position of the construct model developed from the training images. So we propose an automatic approach to detect this spatial position by using two methods: (1) the circular Hough transform (CHT) and (2) the evaluation of the Hausdorff distance.

(2)

Keywords/Mots cléfs : MRI image; active appearance models (AAM); segmentation; left ventricular cavity localization; Hausdorff distance

Journal title / Revue : JOURNAL OF MECHANICS IN MEDICINE AND BIOLOGY

, 0219-5194, "DOI", 10.1142/S0219519412005058, "issue" , 4 , volume" 12

, "pp" 3833 -3838 sept-12 WOS:000310159000012

Références

Documents relatifs

For practical reason, this system is written using the vector potential A C of the incident laser field, the vector potential A R of the Raman component, the electric field

This does not preclude private networks from operating their own private name spaces, but if they wish to make use of names uniquely defined for the global Internet, they have

When a transit node’s policy permits it to support reroute request processing and local repair, the node MUST examine incoming PathErr messages to see it the node can perform

This memo describes how the "authPassword" Lightweight Directory Access Protocol (LDAP) attribute can be used for storing secrets used by the Salted Challenge

Each response may be followed by a response code (see Section 1.3) and by a string consisting of human-readable text in the local language (as returned by the LANGUAGE

This document defines the PaC-EP Master Key (PEMK) that is used by a secure association protocol as the pre-shared secret between the PaC and EP to enable cryptographic filters

The DCSite captures the type, identifier, location, and other pertinent information about the credential gathering process, or data collection site, used in the

It provides a collection of data objects that can be queried using the SNMP protocol and represent the current status of the NTP entity.. This includes general information