2022
DOI: 10.1155/2022/1302170
|View full text |Cite|
|
Sign up to set email alerts
|

On Improved 3D-CNN-Based Binary and Multiclass Classification of Alzheimer’s Disease Using Neuroimaging Modalities and Data Augmentation Methods

Abstract: Alzheimer’s disease (AD) is an irreversible illness of the brain impacting the functional and daily activities of elderly population worldwide. Neuroimaging sensory systems such as Magnetic Resonance Imaging (MRI) and Positron Emission Tomography (PET) measure the pathological changes in the brain associated with this disorder especially in its early stages. Deep learning (DL) architectures such as Convolutional Neural Networks (CNNs) are successfully used in recognition, classification, segmentation, detectio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 77 publications
0
12
0
Order By: Relevance
“…IoMT environments pose three issues as follows: e rst is the heterogeneous network and dynamic nature, the second is its hugely scattered design, and the last is the protocols that the IoT use to address concerns like computing limits and power consumption in network sensors [12,13]. e most common issue in IoMT setups is keylogging, botnet attacks, and zero-day exploits [14][15][16]. e intruder's primary purpose is to contaminate sensitive machines with different techniques, including denialof-service (DoS) attacks, distributed denial of service (DDoS), and advanced persistent threats (APTs), in order to gain control and change their functioning [17,18].…”
Section: Introductionmentioning
confidence: 99%
“…IoMT environments pose three issues as follows: e rst is the heterogeneous network and dynamic nature, the second is its hugely scattered design, and the last is the protocols that the IoT use to address concerns like computing limits and power consumption in network sensors [12,13]. e most common issue in IoMT setups is keylogging, botnet attacks, and zero-day exploits [14][15][16]. e intruder's primary purpose is to contaminate sensitive machines with different techniques, including denialof-service (DoS) attacks, distributed denial of service (DDoS), and advanced persistent threats (APTs), in order to gain control and change their functioning [17,18].…”
Section: Introductionmentioning
confidence: 99%
“…Many ML algorithms employ the tf-pose skeleton as a feature to extract the locations of the human body joints (KNN, logistic regression, SVM, NB, DT, and RF). The RF model has the greatest level of accuracy [ 122 , 123 , 124 , 128 ]. Another posture issue that impacts people is that they spend most of their time sitting down.…”
Section: Detection Of Yoga Using Intelligent Internet Of Thingsmentioning
confidence: 99%
“…It offered high execution speed but used a limited‐size database. Tufail et al 28 established a CNN approach for classifying AD. Here, the multiclass classification and binary classification issues were considered.…”
Section: Motivationmentioning
confidence: 99%