2022
DOI: 10.1007/978-981-19-6379-7_6
|View full text |Cite
|
Sign up to set email alerts
|

Optimized Nature-Inspired Computing Algorithms for Lung Disorder Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…Through a comprehensive exploration of optimization-based approaches conducted by various researchers, their relevance for enhancing the AMISE approach becomes evident. This review encompasses a broad spectrum of optimization strategies, including traditional optimization algorithms, metaheuristic approaches, and machine-learning-based optimization [58][59][60], all of which resonate with the innovative and advanced nature of our proposed method. These techniques aim to address the intricate challenges of medical image segmentation and to ultimately optimize algorithm parameters to improve the segmentation outcomes, and, by extension [24,33], to advance the core concept of image enhancement that underpins our research.…”
Section: Optimization-based Approachesmentioning
confidence: 99%
“…Through a comprehensive exploration of optimization-based approaches conducted by various researchers, their relevance for enhancing the AMISE approach becomes evident. This review encompasses a broad spectrum of optimization strategies, including traditional optimization algorithms, metaheuristic approaches, and machine-learning-based optimization [58][59][60], all of which resonate with the innovative and advanced nature of our proposed method. These techniques aim to address the intricate challenges of medical image segmentation and to ultimately optimize algorithm parameters to improve the segmentation outcomes, and, by extension [24,33], to advance the core concept of image enhancement that underpins our research.…”
Section: Optimization-based Approachesmentioning
confidence: 99%
“…Because they are unable to employ complex security measures, these low-power devices are particularly susceptible to infestation. An anomaly detection solution for IoT networks that utilizes edge computing to uncover hidden threats is proposed by Lakshman Narayana et al [16] and called ADRIoT. A traffic preprocessor, a collection of anomaly detectors tailored to individual devices, and a traffic capturer are all components of an edge's detection module.…”
Section: Mishra Et Al [10] 2020mentioning
confidence: 99%
“…Worms, backdoors, malware, rootkits, adware, and so on are all examples of malware that can manifest in different ways and cause different types of damage [15]. Because most modern malware uses many polymorphic layers to avoid detection or uses side processes to automatically upgrade to a newer version at relatively short intervals, traditional signature-based malware detection methods are becoming more and more useless [16].…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, memory size, energy capacity, and computational capabilities are typically limited on low-cost sensor nodes [14]. It is usually not feasible to use centralized administration for many encryption and authentication schemes in routing protocols [15]. Adversaries may use physical ways to compromise sensor nodes put in an unsupervised region [16].…”
Section: Introductionmentioning
confidence: 99%