Multiple birth and cut algorithm

AI Thread Summary
The discussion centers around the use of the "multiple birth and cut" algorithm for detecting nuclei in histopathology images. The original poster expresses frustration with their current method, which involves the Hough transform and simulated annealing, citing its inefficiency and flawed assumptions. They seek open-source software related to the multiple birth and cut algorithm, acknowledging the complexity of the underlying mathematics, including Markov random fields and Gibbs sampling. Another participant suggests exploring Paraview or Mayavi for plotting, although they note these may not meet the original poster's needs. Additionally, a link to an implementation of the algorithm is shared, providing a potential resource for further exploration.
physical101
Messages
41
Reaction score
0
Hi there

I have found an algorithm within the literature that is known as multiple birth and cut.

It is in a word fantastic! It seems like it has the potential to solve a problem I have been fighting with.

I have been tasked with detecting nuclei in histopathology images and so far the best things I could come up with is using the hough transform with simulated annealing. It takes time and the underlying assumptions are all wrong!

Does anyone know of any opensource software for the above algorithm? I would say that it would be worth doing it from scratch but the mathematics is too complicated (markov random field strategies and gibbs sampling to name but a few).

Thanks for looking guys

D
 
Technology news on Phys.org
I don't quite understand what you need to plot, but have you looked into Paraview or Mayavi?
 
They are pretty epic but not quite what I'm after. However I know a few people who will be interested so thanks for the links
 
oops...sorry...wrong thread...I thought my post hadn't gone through to this thread, when I saw a page without my posting...too many Chrome tabs open...:confused:
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...
Back
Top