2022
DOI: 10.11591/ijeecs.v28.i1.pp183-191
|View full text |Cite
|
Sign up to set email alerts
|

Fully automated model on breast cancer classification using deep learning classifiers

Abstract: Deep learning models on the same database have varied accuracy ratings; as such, additional parameters, such as pre-processing, data augmentation and transfer learning, can influence the models’ capacity to obtain higher accuracy. In this paper, a fully automated model is designed using deep learning algorithm to capture images from patients and pre-process, segment and classify the intensity of cancer spread. In the first pre-processing step, pectoral muscles are removed from the input images, which are then … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 6 publications
0
16
0
Order By: Relevance
“…Afterward, Fourier and circularity descriptors can be extracted in the effectual method corresponding to the texture and affine shape adaptation features. In [35], a fully automated method has been designed utilizing the DL approach to capture images in patients and pre-processing, segmentation, and classifying the intensity of cancer spread.…”
Section: Related Workmentioning
confidence: 99%
“…Afterward, Fourier and circularity descriptors can be extracted in the effectual method corresponding to the texture and affine shape adaptation features. In [35], a fully automated method has been designed utilizing the DL approach to capture images in patients and pre-processing, segmentation, and classifying the intensity of cancer spread.…”
Section: Related Workmentioning
confidence: 99%
“…In this regard, vulnerability prediction models play critical roles in the identification of the location of source code that require more attention [41], [90]. For instance, authors in [91] have used machine learning [92] techniques to predict the vulnerability of the software from source code before its release. Similarly, a security assurance framework is developed in [93] for connected vehicular technology.…”
Section: Security Models and Frameworkmentioning
confidence: 99%
“…After rigorous testing, the patch is applied to the software, which is the followed by the release of the patch [271]. To address the software system security, various models [272], practices, strategies, and methods have been proposed. They have been shown to improve security procedures in the stages of SDLC [273].…”
Section: Approaches To Software Quality and Securitymentioning
confidence: 99%