2021
DOI: 10.1007/s42979-021-00618-4
|View full text |Cite
|
Sign up to set email alerts
|

Spinal Cord MRI Segmentation Techniques and Algorithms: A Survey

Abstract: Spinal cord tumour is an abnormal growth of cells in and around the spinal cord. Detecting spinal cord tumours is a very crucial process. Identifying the tumour from MRI is difficult because of the shape size and flexible nature of the spinal cord. The cross-sectional area of the cord is also very less. The boundary of tumour can be identified in the MRI by various segmentation techniques. Segmentation is one of the necessary steps. Spinal cord segmentation techniques are not as developed as brain segmentation… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 44 publications
0
4
0
Order By: Relevance
“…For data encryption and decryption, the security module implements two functions rsa_aes_encrypt and rsa_aes_decrypt. The Public-Key Cryptography Standards (PKCS) # 1 OPTIMAL ASYMMETRIC ENCRYPTION PADDING (OAEP) [69] padding scheme is used by the RSA's implementation, which is defined by RFC 8017. To encrypt and decrypt the keys for symmetric encryption algorithms, RSA is used.…”
Section: Securitymentioning
confidence: 99%
“…For data encryption and decryption, the security module implements two functions rsa_aes_encrypt and rsa_aes_decrypt. The Public-Key Cryptography Standards (PKCS) # 1 OPTIMAL ASYMMETRIC ENCRYPTION PADDING (OAEP) [69] padding scheme is used by the RSA's implementation, which is defined by RFC 8017. To encrypt and decrypt the keys for symmetric encryption algorithms, RSA is used.…”
Section: Securitymentioning
confidence: 99%
“…On the other hand, a dataset with about 1000 images would still be considered modest, and the larger the deep-learning model is, the more it is in need of larger image datasets. Thus, our proposed solution based on a light CNN model, such as MobileUNetV3, is well justified considering the rather modest and limited dataset size of 1092 available SCGM magnetic resonance images [18].…”
Section: Dataset Description and Pre-processingmentioning
confidence: 99%
“…The security of distributed systems is traditionally proposed to be provided using asymmetric ciphers [33], such as RSA [34]. There are many works devoted to this topic [35][36][37].…”
Section: Introductionmentioning
confidence: 99%