2022
DOI: 10.1142/s0218488522500222
|View full text |Cite
|
Sign up to set email alerts
|

Detection of COVID-19 Cases from Chest X-Rays using Deep Learning Feature Extractor and Multilevel Voting Classifier

Abstract: Purpose: During the current pandemic scientists, researchers, and health professionals across the globe are in search of new technological methods for tackling COVID-19. The magnificent performance reported by machine learning and deep learning methods in the previous epidemic has encouraged researchers to develop systems with these methods to diagnose COVID-19. Methods: In this paper, an ensemble-based multi-level voting model is proposed to diagnose COVID-19 from chest x-rays. The multi-level voting model p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Related works [13][14][15][16] only reported the results after applying the transfer learning model. Te percentage improvement of the accuracy is 7.80% [9], 3.77% [10], 1.34% [11], 5.88% [12], and 6.85-9.92% (our work).…”
Section: Performance Comparison With Related Workmentioning
confidence: 61%
See 3 more Smart Citations
“…Related works [13][14][15][16] only reported the results after applying the transfer learning model. Te percentage improvement of the accuracy is 7.80% [9], 3.77% [10], 1.34% [11], 5.88% [12], and 6.85-9.92% (our work).…”
Section: Performance Comparison With Related Workmentioning
confidence: 61%
“…(i) Source domain and target domain: the related works [9][10][11][12] formulated the transfer learning problem using a similar source domain and target domain whereas other works [13][14][15][16] considered the distant source and target domains. Our work considered 10 benchmark datasets to evaluate the MTL using similar and distant sources and target domains.…”
Section: Performance Comparison With Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Once attackers gain access, they can manipulate or control the devices, potentially causing disruptions or unauthorized actions.Phishing attacks can also lead to the theft of sensitive data from IoT devices. By tricking users into providing their personal or financial information, attackers can gain access to valuable data stored on IoT devices, such as health records, financial information, or personal preferences [19,20]. This can have serious consequences for individuals and organizations, as the compromised data can be used for identity theft, fraud, or other malicious purposes.Furthermore, phishing attacks can exploit vulnerabilities in the IoT ecosystem.…”
Section: Introductionmentioning
confidence: 99%