Skin cancer is one of the most dangerous *** of the high melanoma death rate,skin cancer is divided into non-melanoma and *** dermatologist finds it difficult to identify skin cancer from dermoscopy images of skin ***...
详细信息
Skin cancer is one of the most dangerous *** of the high melanoma death rate,skin cancer is divided into non-melanoma and *** dermatologist finds it difficult to identify skin cancer from dermoscopy images of skin ***,pathology and biopsy examinations are required for cancer *** studies have formulated computer-based systems for detecting skin cancer from skin lesion *** recent advancements in hardware and software technologies,deep learning(DL)has developed as a potential technique for feature ***,this study develops a new sand cat swarm optimization with a deep transfer learning method for skin cancer detection and classification(SCSODTL-SCC)*** major intention of the SCSODTL-SCC model lies in the recognition and classification of different types of skin cancer on dermoscopic ***,Dull razor approach-related hair removal and median filtering-based noise elimination are ***,the U2Net segmentation approach is employed for detecting infected lesion regions in dermoscopic ***,the NASNetLarge-based feature extractor with a hybrid deep belief network(DBN)model is used for ***,the classification performance can be improved by the SCSO algorithm for the hyperparameter tuning process,showing the novelty of the *** simulation values of the SCSODTL-SCC model are scrutinized on the benchmark skin lesion *** comparative results assured that the SCSODTL-SCC model had shown maximum skin cancer classification performance in different measures.
Wearable gadgets are becoming a major constituent of our society due to a wide range of applications like financial transactions, unlocking automobiles, tracking health and fitness, and many more. Personal data is usu...
详细信息
Wireless Sensor Networks (WSNs) are rapidly employed in many applications due to highly demanded autonomous systems. These networks are of immense importance due to their ability to collect data from remote and challe...
详细信息
This paper presents a synthesis method of decision-making systems based on Agents forming multiple coalitions. The condition for coalition formation is defined by a mathematical model that solves the problem of global...
详细信息
Biometric technologies have been widely adopted in various commercial products, ranging from security systems to personal devices, due to their exceptional reliability and user-friendliness. Among these, palmprint bio...
详细信息
Multi-objective decision making systems based on Spatial-Temporal logics presents a class of computational systems based on Artificial Intelligence in which spatial location and time evolution of processes (events) ar...
详细信息
This paper presents the Electromagnetic Transient (EMT) modeling and simulation of power electronics in Modelica, a declarative equation-based language. In this paper, modeling of switching components such as diodes, ...
详细信息
Automatic speaker verification (ASV) systems have been used in numerous voice-controlled technologies including voice banking, automobiles, smartphones, smart homes, etc. The growth of voice-operated devices is increa...
详细信息
The process of educating and learning about the automotive industry is still ongoing, and one of the most effective techniques is the provision of direct practice. Such a system is regarded as effective, albeit with c...
详细信息
Embracing software product lines(SPLs)is pivotal in the dynamic landscape of contemporary software ***,the flexibility and global distribution inherent in modern systems pose significant challenges to managing SPL var...
详细信息
Embracing software product lines(SPLs)is pivotal in the dynamic landscape of contemporary software ***,the flexibility and global distribution inherent in modern systems pose significant challenges to managing SPL variability,underscoring the critical importance of robust cybersecurity *** paper advocates for leveraging machine learning(ML)to address variability management issues and fortify the security of *** the context of the broader special issue theme on innovative cybersecurity approaches,our proposed ML-based framework offers an interdisciplinary perspective,blending insights from computing,social sciences,and ***,it employs ML for demand analysis,dynamic feature extraction,and enhanced feature selection in distributed settings,contributing to cyber-resilient *** experiments demonstrate the framework’s superiority,emphasizing its potential to boost productivity and security in *** digital threats evolve,this research catalyzes interdisciplinary collaborations,aligning with the special issue’s goal of breaking down academic barriers to strengthen digital ecosystems against sophisticated attacks while upholding ethics,privacy,and human values.
暂无评论