Recent Advances in Computer Science and Communications - Volume 19, Issue 1, 2026
Volume 19, Issue 1, 2026
-
-
Basal Cell Carcinoma Detection Using Convolutional Neural Network
More LessAuthors: Meriem Chahinez Benabdelhak, Reda Kasmi and Lilia BensadiIntroduction/ObjectiveBasal Cell Carcinoma (BCC) is the most prevalent type of skin cancer, accounting for three-quarters of all cancer cases. It is often confused with other benign lesions, such as Acne Vulgaris (AV). In this paper, we propose a classification approach to discriminate BCC from AV in dermoscopic images, using an algorithm based on deep learning techniques.
MethodsA two-branch Convolutional Neural Network (CNN) is employed to construct the model. The first branch consists of CNN structures that process an RGB dermoscopic image, while the second branch leverages the pre-trained ResNet18 network with an HSV dermoscopic image input. Both branches use Principal Component Analysis (PCA), normalization, and image resizing. This concatenated architecture enables the system to exploit features extracted from both color spaces as well as CNN networks, enhancing the overall performance of the model.
Results and DiscussionThe proposed architecture is assessed using two public datasets. The first one is dedicated to the binary classification of Basal Cell Carcinoma (BCC) versus Acne Vulgaris (AV), achieving an accuracy of 99.06%, a sensitivity of 98.73%, and a specificity of 99.37%. The second dataset addresses multiclass classification along melanoma, BCC, and AV, and achieves an accuracy of 97.17%, a sensitivity of 97.13%, and a specificity of 98.57%. The results highlight the effectiveness of the proposed model.
ConclusionThe dual-input hybrid algorithm, based on convolutional neural networks and incorporating principal component analysis, demonstrates promising results in distinguishing BCC from AV.
-
-
-
Analysis and Classification of Medical Images Using Deep Learning Algorithms
More LessAuthors: Chouchene Karima, Nadjla Bourbia, Kamel Messaoudi and El-Bay BourennaneIntroductionNowadays, Artificial intelligence and machine learning have emerged as a powerful tool for the analysis of medical images such as MRI scans. This technology holds significant potential to improve diagnostic services and accelerate medical advances by facilitating clinical decision-making.
MethodsIn this work, we developed a Convolutional Neural Network (CNN) model specifically designed for the classification of medical images. Using a selected database, the model achieved a classification accuracy of 92%. To further improve the performance, we leveraged the pre-trained VGG16 model, which increased the classification accuracy to 100%. Additionally, we preprocessed the MRI images using the Roboflow platform and then developed YOLOv5 models for the detection of tumors, infections, and cancerous lesions.
ResultsThe results demonstrate a localization accuracy of 50.41% for these medical conditions.
ConclusionThis research highlights the value of AI-driven approaches in enhancing medical image analysis and their potential to support more accurate diagnoses and accelerate advancements in healthcare.
-
-
-
Data Security and Privacy Preservation in Cloud-Based IoT Technologies: An Analysis of Risks and the Creation of Robust Countermeasures
More LessAuthors: Mayank Pathak, Kamta Nath Mishra and Satya Prakash SinghThe Internet of Things (IoT) is a revolutionary technology being used in many different industries to improve productivity, automation, and comfort of the user in the cloud and distributed computing settings. Cloud computing is essential because it makes data management and storage more effective by automatically storing and examining the enormous amounts of data generated by Internet of Things applications. End users, companies, and government data are consequently migrating to the cloud at an increasing rate. A survey of the literature, however, reveals a variety of issues, including data integrity, confidentiality, authentication, and threat identification, that must be resolved to improve data security and privacy. To effectively address contemporary data security concerns, the existing approaches need to be improved. Ensuring secure end-to-end data transmission in a cloud-IoT situation requires innovative and dependable protocol architecture. New technologies that address some of the issues related to cloud data include edge computing, fog, blockchain, and machine learning. This paper provides a thorough examination of security risks, classifying them and suggesting possible defenses to safeguard cloud-IoT data. It also highlights innovative approaches, such as blockchain technology and machine learning, applied to privacy and data security. The paper also explores existing issues with respect to data privacy and security in today's cloud-IoT environments. It suggests possible future directions, including the need for end-user authentication, enhanced security, and procedures for recovering data in the event of an attack.
-
-
-
A Review on Secure Outsourcing and Privacy-Preserving Traffic Monitoring in Fog-Enabled VANETs
More LessAuthors: Nagaraju Pacharla and Srinivasa Reddy KondaNew possibilities for fog-based vehicle monitoring have emerged with the expansion of fog computing, but present privacy concerns provide a significant barrier that limits the extent to which vehicles can participate. Because of its potential to improve road network security and vehicle productivity, the field of Vehicle-based Ad hoc Networks (VANETs) is gaining prominence. The security problems with VANETs, such as data confidentiality and message access control still need better solutions to provide better Quality of Service (QoS). The effectiveness of VANET networks is diminished due to their instability problem. Vehicles continually add requests to the Road Side Unit (RSU) queue whenever they want specific information. For ever-evolving networks like VANETs, better routing is a continual process. Fundamental problems arise in large-scale systems when centralized procedures are used to assign jobs to the nodes along a route. The present centralized system for computing and safety has many needs, including the protection of data storage, user authentication, access control, system availability across multiple network connections, and the provision of a real-time data flow overview. Distributed problem solving and work sharing between multiple agents can improve the system's scalability. This paper provides a brief survey on the secured outsourcing and privacy preservation-based traffic monitoring model with routing and task scheduling models in Fog-enabled VANETS. This survey presents the limitations of the traditional models that help the researchers design new solutions for secure outsourcing in VANETs.
-
-
-
GWTBFO, Revolutionizing Cloud Efficiency: A Novel Approach Using Grey Wolf-Based TOPSIS and Bacterial Foraging Firefly Optimization
More LessAuthors: Vijay Anand R., Shanmuga Priyan T., Balamurugan Balusamy and Rishabha MalviyaBackgroundThe growing demand for cloud computing services necessitates innovative strategies to enhance cloud deployment efficiency. Existing cloud load balancing models often grapple with suboptimal resource allocation, leading to increased task makespan, lowered virtual machine (VM) efficiency, and failure to meet task deadlines effectively.
ObjectiveAddressing these limitations, this study aims to introduce a novel model that significantly improves cloud deployment efficiency through a strategic blend of pre-emptive load analysis and resource pre-allocation operations.
MethodsThe proposed model hinges on the innovative use of Grey Wolf-based TOPSIS (GWTOPSIS) operations for the initial segregation of VMs. This approach considers VM capacity, current load, and availability levels, dynamically modifying internal weights to adapt VM categories based on fluctuating demand. The novelty of GWTOPSIS lies in its extension of traditional TOPSIS methods, allowing for more responsive and demand-aligned VM categorization. Furthermore, the clustering of new tasks based on makespan, deadline, and resource utilization levels-with a higher preference for makespan-addresses critical task scheduling challenges. A pivotal aspect of our model is the integration of the Bacterial Foraging Firefly Optimizer (BFFO) for task assignment to VMs. This optimizer synergizes the exploratory prowess of bacterial foraging with the efficient search capabilities of fireflies, leading to a more effective task-to-VM assignment process.
ResultsEmpirical evaluations of our model reveal substantial improvements over existing models: a reduction in task makespan by 8.5%, a 3.9% boost in VM computation efficiency, a 1.9% enhancement in deadline hit ratio, a 3.5% increase in task diversity, a 2.4% improvement in execution efficiency, and a 3.5% reduction in decision delay.
ConclusionThese improvements not only demonstrate the efficacy of our model in real-time cloud deployment scenarios but also underscore its potential to revolutionize cloud resource management.
-
-
-
The Inverse-Consistent Deformable MRI Registration Method Based on the Improved UNet Model and Similarity Attention
More LessAuthors: Tianqi Cheng, Lei Wang, Yaolong Han, Shilong Liu, Chunyu Yan, Yanqing Sun, Shanliang Yang and Bin LiIntroductionDeformable image registration is an essential task in medical image analysis. The UNet model, or the model with the U-shaped structure, has been popularly proposed in deep learning-based registration methods. However, they easily lose the important similarity information in the up-sampling stage, and these methods usually ignore the inherent inverse consistency of the transformation between a pair of images. Furthermore, the traditional smoothing constraints used in the existing methods can only partially ensure the folding of the deformation field.
MethodsAn inverse consistent deformable medical image registration network (ICSANet) based on the inverse consistency constraint and the similarity-based local attention is developed. A new UNet network is constructed by introducing similarity-based local attention to focus on the spatial correspondence in the high-similarity space. A novel inverse consistency constraint is proposed, and the objective function of the new form is presented with the combination of the traditional constraint conditions.
ExperimentThe performance of the proposed method is compared with the typical registration models, such as the VoxelMorph, PVT, nnFormer, and TransMorph-diff model, on the brain IXI and OASIS datasets.
ResultsExperimental results on the brain MRI datasets show that the images can be deformed symmetrically until two distorted images are well matched. The quantitative comparison and visual analysis indicate that the proposed method performs better, and the Dice index can be improved by at least 12% with only 10% parameters.
ConclusionThis paper presents a new medical image registration network, ICSANet. By introducing a similarity attention gate, it accurately captures high-similarity spatial correspondences between source and target images, resulting in better registration performance.
-
Most Read This Month