2024
DOI: 10.1038/s41598-024-57393-4
|View full text |Cite
|
Sign up to set email alerts
|

A novel SpaSA based hyper-parameter optimized FCEDN with adaptive CNN classification for skin cancer detection

Rizwan Ali,
A. Manikandan,
Rui Lei
et al.

Abstract: Skin cancer is the most prevalent kind of cancer in people. It is estimated that more than 1 million people get skin cancer every year in the world. The effectiveness of the disease’s therapy is significantly impacted by early identification of this illness. Preprocessing is the initial detecting stage in enhancing the quality of skin images by removing undesired background noise and objects. This study aims is to compile preprocessing techniques for skin cancer imaging that are currently accessible. Researche… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2025
2025

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 13 publications
(1 citation statement)
references
References 45 publications
0
1
0
Order By: Relevance
“…Authentication mechanisms, such as cryptographic protocols and biometric authentication, play a crucial role in verifying the identities of IoT devices and preventing unauthorized access [4]. Intrusion detection systems (IDS), leveraging machine learning algorithms and anomaly detection techniques, enable the timely detection and mitigation of malicious activities in IoT networks [5]. Secure communication protocols, including Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS), ensure encrypted and authenticated communication channels, thereby mitigating eavesdropping and data tampering attacks [6].…”
Section: Introductionmentioning
confidence: 99%
“…Authentication mechanisms, such as cryptographic protocols and biometric authentication, play a crucial role in verifying the identities of IoT devices and preventing unauthorized access [4]. Intrusion detection systems (IDS), leveraging machine learning algorithms and anomaly detection techniques, enable the timely detection and mitigation of malicious activities in IoT networks [5]. Secure communication protocols, including Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS), ensure encrypted and authenticated communication channels, thereby mitigating eavesdropping and data tampering attacks [6].…”
Section: Introductionmentioning
confidence: 99%