The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2020
DOI: 10.1007/s11036-020-01550-2
|View full text |Cite
|
Sign up to set email alerts
|

A DE-ANN Inspired Skin Cancer Detection Approach Using Fuzzy C-Means Clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
67
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 117 publications
(68 citation statements)
references
References 25 publications
0
67
0
1
Order By: Relevance
“…In the fourth step, a matrix norm is selected to compare the membership matrix before and after iteration ‖ U ( t +1) − U ( t ) ‖ ≤ ε . If the condition is not satisfied, return to the second step to continue the iteration [ 21 ]. Among them, the value of cluster number c needs to be set in advance.…”
Section: Fuzzy Clustering Generalized Regression Neural Network Evaluation Methodsmentioning
confidence: 99%
“…In the fourth step, a matrix norm is selected to compare the membership matrix before and after iteration ‖ U ( t +1) − U ( t ) ‖ ≤ ε . If the condition is not satisfied, return to the second step to continue the iteration [ 21 ]. Among them, the value of cluster number c needs to be set in advance.…”
Section: Fuzzy Clustering Generalized Regression Neural Network Evaluation Methodsmentioning
confidence: 99%
“…It should be noted that while gating is effective against motion artifacts in PET imaging, the reduction of data used for reconstruction results in increased level of noise in images. Such noise could be mitigated using several post-processing approaches, such as deeplearning-based denoising methods [30] and fuzzy image processing methods [31][32][33].…”
Section: Applicability To Respiratory-gated Pet Studiesmentioning
confidence: 99%
“…2) The CSP determines the original file F i and its corresponding tag , ij  , which will verify the formula (5) in the TagGen algorithm. Based on the nature of bilinear map, it can be derived to obtain the results prove that it is correct: .…”
Section: Security Analysismentioning
confidence: 99%
“…There are two hidden dangers in this way. One is the lack of control over the confidentiality and integrity of the data and the other is that it is difficult to recover the data if the local copy is deleted [4][5][6]. In order to solve these problems, the researchers proposed that users can encrypt data before outsourcing and sending it to a remote cloud server [7][8][9].…”
Section: Introductionmentioning
confidence: 99%