3rd Smart Cities Symposium (SCS 2020) 2021
DOI: 10.1049/icp.2021.0855
|View full text |Cite
|
Sign up to set email alerts
|

Cloud of medical things (CoMT) based smart healthcare framework for resource allocation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…The recording of many factors related to the tumor's features is required in order for these models to function, whereas generative models require prior knowledge of the tumor and its tissue and appearance to function. Models that are discriminative [10], on the other hand, become familiar with the quality of a cancer and how to segment it from physically commenting on information without the requirement for extra manual preparation (made by radiologists).…”
Section: Related Workmentioning
confidence: 99%
“…The recording of many factors related to the tumor's features is required in order for these models to function, whereas generative models require prior knowledge of the tumor and its tissue and appearance to function. Models that are discriminative [10], on the other hand, become familiar with the quality of a cancer and how to segment it from physically commenting on information without the requirement for extra manual preparation (made by radiologists).…”
Section: Related Workmentioning
confidence: 99%
“…Finally, the DSAE model receives the useful feature vectors and then classifies sugar plant leaf diseases. AE is a type of unsupervised 3-layer NN that has 2 parts of encoding and decoding, comprising input, hidden, and output layers [27].…”
Section: Image Classification Using Dsae Modelmentioning
confidence: 99%
“…With respect to data exchange in a transmission system, there is authentication when the transmitter of information could be unequivocally recognized by the receiver. Consecutively, there is integrity if it could be revealed that a message or data hasn't been deleted, created, or modified by unauthorized systems or users [10].…”
Section: Introductionmentioning
confidence: 99%