Computational Intelligence - February 2013 - 32

1.0

250

0.8

200

0.6

150

0.4

100

obtained segmentations were not fully correct. To better take
advantage of the region-based segmentation capabilities, we
could endow the ETAN with a texture analysis system. Indeed,
texture is one of the important characteristics used in identifying objects or regions of interest in an image.
Acknowledgment

50

0.2

0
LS

MS DE
(a)

SS

LS

MS DE
(b)

SS

Figure 19 The distributions of the results (1/10 runs for 20 images),
for S and dH metrics obtained by the four methods. (a) Index S and
(b) dHausdorff.

❏ H0: median difference between the pairs is zero
❏ H1: median difference is not zero.

The p-values obtained for the four metrics are shown
in Table 3. For SS, the values of the medians are higher for the
S index and lower for the three distances. Given the obtained
p-values, we found enough evidence to reject the null hypothesis with a confidence level of 0.05 for every metric. It is worth
noting that the confidence level could have been much lower
for the S, M dRT and dH metrics, for example 0.01.
Although the Wilcoxon test is significant enough to prove
the superiority of the performance of our proposal with
respect to the other three methods, for the sake of clarity we
also show a boxplot of the two most relevant metrics, S and
dH, in Fig. 19. These boxplots are a quick way to graphically
examine graphically the distributions of the 200 results
obtained by the three stochastic algorithms over the 20 images,
considering the 10 runs (being deterministic, LS has been run
just once per image).
V. Conclusions and Future Work

In this work we have proposed an accurate, robust and automatic segmentation method that is able to perform in a reasonable time. It embeds the ETAN model into a customized SS
global search framework. We designed several new specific
components for the method. They become a crucial outcome
allowing us to really take advantage of the population-based
optimization framework as none of the previous approaches
were able to do. The obtained results were encouraging. Our
SS proposal significantly improved the accuracy of the segmentation on real-world medical images, as well as on synthetic
ones, in comparison with the original ETAN-EBILS, an
ETAN-MSLS and the state-of-the-art DE-based MA for
TANs. Moreover, the robustness achieved was significantly better than the previous methods.
Nevertheless, regardless of its good performance, our
method still has room for improvement. In a few cases the

32

IEEE ComputatIonal IntEllIgEnCE magazInE | FEbruary 2013

This work is supported by the European Commission with the
contract No. 238819 (MIBISOC Marie Curie ITN) and by
the Spanish Ministerio de Educación y Ciencia (ref. TIN200907727), both including EDRF funds. Part of the code related
to DE was provided by J. Novo and the VARPA group, University of A Coruña, Spain. We would like to thank A.Valsecchi
for his support in performing the statistical analysis.
References

[1] T. McInerney and D. Terzopoulos, "Deformable models in medical image analysis: A
survey," Med. Image Anal., vol. 1, no. 2, pp. 91-108, 1996.
[2] M. Kass, A. Witkin, and D. Terzopoulos, "Snakes: Active contour models," J. Int.
Comput. Vision, vol. 1, no. 4, pp. 321-331, 1987.
[3] M. Bro-Nielsen, "Active nets and cubes," IMM, Tech. Rep., 1994.
[4] F. M. Ansia, M. Penedo, C. Marino, and A. Mosquera, "A new approach to active
nets," Pattern Recognit. Image Anal., vol. 2, pp. 76-77, 1999.
[5] N. Bova, O. Cordón, and O. Ibánez, "Extended topological active nets," European
Centre for Soft Computing, Mieres, Spain, Tech. Rep. AFE 2012-01, 2012.
[6] Y.-S. Ong, M. H. Lim, and X. Chen, "Research frontier: Memetic computation-past,
present & future," IEEE Comput. Intell. Mag., vol. 5, no. 2, pp. 24-31, May 2010.
[7] O. Ibanez, N. Barreira, J.Santos, and M. G. Penedo, "Genetic approaches for topological active nets optimization," Pattern Recognit., vol. 42, no. 5, pp. 907-917, 2009.
[8] J. Novo, J. Santos, and M. Penedo, "Topological active models optimization with differential evolution," Expert Syst. Appl., vol. 39, no. 15, pp. 12165-12176, 2012.
[9] A. Eiben and J. Smith, Introduction to Evolutionary Computing. New York: SpringerVerlag, 2003.
[10] K. V. Price, R. M. Storn, and J. A. Lampinen, Differential Evolution: A Practical Approach to Global Optimization (Natural Computing Series), G. Rozenberg, T. Bäck, A. E.
Eiben, J. N. Kok, and H. P. Spaink, Eds. Berlin, Germany: Springer-Verlag, 2005.
[11] M. Laguna and R. Martı, Scatter Search: Methodology and Implementations. Norwell,
MA: Kluwer Academic, 2003.
[12] U. Maulik, "Medical image segmentation using genetic algorithms," IEEE Trans.
Inform. Technol. Biomed., vol. 13, no. 2, pp. 166-173, 2009.
[13] C. McIntosh and G. Hamarneh, "Medial-based deformable models in nonconvex
shape-spaces for medical image segmentation," IEEE Trans. Med. Imag., vol. 31, no. 1,
pp. 33-50, 2012.
[14] Y. Fan, T. Jiang, and D. J. Evans,"Volumetric segmentation of brain images using
parallel genetic algorithms," IEEE Trans. Med. Imag., vol. 21, no. 8, pp. 904-909, 2002.
[15] J. Novo, M. Penedo, and J. Santos, "Evolutionary multiobjective optimization of
topological active nets," Pattern Recognit., Lett., vol. 31, no. 13, pp. 1781-1794, 2010.
[16] T. Radulescu and V. Buzuloiu, "Extended vector field convolution snake for highly
non-convex shapes segmentation," in Proc. 2009 9th Int. Conf. Information Technology Applications Biomedicine, pp. 1-4.
[17] F. Glover, "Heuristics for integer programming using surrogate constraints," Decision
Sci., vol. 8, no. 1, pp. 156-166, 1977.
[18] R. Marti, A. Duarte, and M. Laguna, "Advanced scatter search for the maxcut problem," INFORMS J. Comput., vol. 21, no. 1, pp. 26-38, 2009.
[19] F. Glover and G. A. Kochenberger, Eds., Handbook of Metaheuristics. Norwell, MA:
Kluwer, 2003.
[20] S. Damas, O. Cordon, and J. Santamaria, "Medical image registration using evolutionary computation: An experimental survey," IEEE Comput. Intell. Mag., vol. 6, no. 4,
pp. 26-8, 2011.
[21] F. Herrera, M. Lozano, and A. M. Sánchez, "A taxonomy for the crossover operator
for real-coded genetic algorithms: An experimental study," J. Int. Intell. Syst., vol. 18,
pp. 309-338, 2003.
[22] A. P. Zijdenbos, B. M. Dawant, R. A. Margolin, and A. C. Palmer, "Morphometric
analysis of white matter lesions in MR images: Method and validation," IEEE Trans Med.
Imag., vol. 13, no. 4, pp. 716-724, 1994.
[23] D. P. Huttenlocher, G. A. Klanderman, and W. A. Rucklidge, "Comparing images
using the hausdorff distance," IEEE Trans. Pattern Anal. Mach. Intell., vol. 15, no. 9, pp.
850-863, 1993.
[24] D. F. Bauer, "Constructing confidence sets using rank statistics," J. Amer. Statistical
Assoc., vol. 67, no. 339, pp. 687-690, 1972.
[25] J. Demsˇar, "Statistical comparisons of classifiers over multiple data sets," J. Mach.
Learn. Res., vol. 7, no. 1, pp. 1-30, 2006.



Table of Contents for the Digital Edition of Computational Intelligence - February 2013

Computational Intelligence - February 2013 - Cover1
Computational Intelligence - February 2013 - Cover2
Computational Intelligence - February 2013 - 1
Computational Intelligence - February 2013 - 2
Computational Intelligence - February 2013 - 3
Computational Intelligence - February 2013 - 4
Computational Intelligence - February 2013 - 5
Computational Intelligence - February 2013 - 6
Computational Intelligence - February 2013 - 7
Computational Intelligence - February 2013 - 8
Computational Intelligence - February 2013 - 9
Computational Intelligence - February 2013 - 10
Computational Intelligence - February 2013 - 11
Computational Intelligence - February 2013 - 12
Computational Intelligence - February 2013 - 13
Computational Intelligence - February 2013 - 14
Computational Intelligence - February 2013 - 15
Computational Intelligence - February 2013 - 16
Computational Intelligence - February 2013 - 17
Computational Intelligence - February 2013 - 18
Computational Intelligence - February 2013 - 19
Computational Intelligence - February 2013 - 20
Computational Intelligence - February 2013 - 21
Computational Intelligence - February 2013 - 22
Computational Intelligence - February 2013 - 23
Computational Intelligence - February 2013 - 24
Computational Intelligence - February 2013 - 25
Computational Intelligence - February 2013 - 26
Computational Intelligence - February 2013 - 27
Computational Intelligence - February 2013 - 28
Computational Intelligence - February 2013 - 29
Computational Intelligence - February 2013 - 30
Computational Intelligence - February 2013 - 31
Computational Intelligence - February 2013 - 32
Computational Intelligence - February 2013 - 33
Computational Intelligence - February 2013 - 34
Computational Intelligence - February 2013 - 35
Computational Intelligence - February 2013 - 36
Computational Intelligence - February 2013 - 37
Computational Intelligence - February 2013 - 38
Computational Intelligence - February 2013 - 39
Computational Intelligence - February 2013 - 40
Computational Intelligence - February 2013 - 41
Computational Intelligence - February 2013 - 42
Computational Intelligence - February 2013 - 43
Computational Intelligence - February 2013 - 44
Computational Intelligence - February 2013 - 45
Computational Intelligence - February 2013 - 46
Computational Intelligence - February 2013 - 47
Computational Intelligence - February 2013 - 48
Computational Intelligence - February 2013 - 49
Computational Intelligence - February 2013 - 50
Computational Intelligence - February 2013 - 51
Computational Intelligence - February 2013 - 52
Computational Intelligence - February 2013 - 53
Computational Intelligence - February 2013 - 54
Computational Intelligence - February 2013 - 55
Computational Intelligence - February 2013 - 56
Computational Intelligence - February 2013 - 57
Computational Intelligence - February 2013 - 58
Computational Intelligence - February 2013 - 59
Computational Intelligence - February 2013 - 60
Computational Intelligence - February 2013 - 61
Computational Intelligence - February 2013 - 62
Computational Intelligence - February 2013 - 63
Computational Intelligence - February 2013 - 64
Computational Intelligence - February 2013 - 65
Computational Intelligence - February 2013 - 66
Computational Intelligence - February 2013 - 67
Computational Intelligence - February 2013 - 68
Computational Intelligence - February 2013 - 69
Computational Intelligence - February 2013 - 70
Computational Intelligence - February 2013 - 71
Computational Intelligence - February 2013 - 72
Computational Intelligence - February 2013 - 73
Computational Intelligence - February 2013 - 74
Computational Intelligence - February 2013 - 75
Computational Intelligence - February 2013 - 76
Computational Intelligence - February 2013 - 77
Computational Intelligence - February 2013 - 78
Computational Intelligence - February 2013 - 79
Computational Intelligence - February 2013 - 80
Computational Intelligence - February 2013 - Cover3
Computational Intelligence - February 2013 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com