Javascript is required
Search
Volume 3, Issue 2, 2024
Open Access
Review article
Advances in Breast Cancer Segmentation: A Comprehensive Review
ayah abo-el-rejal ,
shehab eldeen ayman ,
farah aymen
|
Available online: 03-20-2024

Abstract

Full Text|PDF|XML

The diagnosis and treatment of breast cancer (BC) are significantly subject to medical imaging techniques, with segmentation being crucial in delineating pathological regions for precise diagnosis and treatment planning. This comprehensive analysis explores a variety of segmentation methodologies, encompassing classical, machine learning, deep learning (DL), and manual segmentation, as applied in the medical imaging field for BC detection. Classical segmentation techniques, which include edge-driven and threshold-driven segmentation, are highlighted for their utilization of filters and region-based methods to achieve precise delineation. Emphasis is placed on the establishment of clear guidelines for the selection and comparison of these classical approaches. Segmentation through machine learning is discussed, encompassing both unsupervised and supervised techniques that leverage annotated images and pathology reports for model training, with a focus on their efficacy in BC segmentation tasks. DL methods, especially models such as U-Net and convolutional neural networks (CNNs), are underscored for their remarkable efficiency in segmenting BC images, with U-Net models noted for their minimal requirement for annotated images and achieving accuracy levels up to 99.7%. Manual segmentation, though reliable, is identified as time-consuming and susceptible to errors. Various metrics, such as Dice, F-score, Intersection over Union (IOU), and Area Under the Curve (AUC), are used for assessing and comparing the segmentation techniques. The analysis acknowledges the challenges posed by limited dataset availability, data range inadequacy, and confidentiality concerns, which hinder the broader integration of segmentation methods into clinical practice. Solutions to overcome these challenges are proposed, including the promotion of partnerships to develop and distribute extensive datasets for BC segmentation. This approach would necessitate the pooling of resources from multiple organizations and the adoption of anonymization techniques to safeguard data privacy. Through this lens, the analysis aims to provide a thorough analysis of the practical implications of segmentation methods in BC diagnosis and management, paving the way for future advancements in the field.

Abstract

Full Text|PDF|XML

Named Entity Recognition (NER), a pivotal task in information extraction, is aimed at identifying named entities of various types within text. Traditional NER methods, however, often fall short in providing sufficient semantic representation of text and preserving word order information. Addressing these challenges, a novel approach is proposed, leveraging dual Graph Neural Networks (GNNs) based on multi-feature fusion. This approach constructs a co-occurrence graph and a dependency syntax graph from text sequences, capturing textual features from a dual-graph perspective to overcome the oversight of word interdependencies. Furthermore, Bidirectional Long Short-Term Memory Networks (BiLSTMs) are utilized to encode text, addressing the issues of neglecting word order features and the difficulty in capturing contextual semantic information. Additionally, to enable the model to learn features across different subspaces and the varying degrees of information significance, a multi-head self-attention mechanism is introduced for calculating internal dependency weights within feature vectors. The proposed model achieves F1-scores of 84.85% and 96.34% on the CCKS-2019 and Resume datasets, respectively, marking improvements of 1.13 and 0.67 percentage points over baseline models. The results affirm the effectiveness of the presented method in enhancing performance on the NER task.

Abstract

Full Text|PDF|XML

Dental implants (DIs) are prone to failure due to uncommon mechanical complications and fractures. Precise identification of implant fixture systems from periapical radiographs is imperative for accurate diagnosis and treatment, particularly in the absence of comprehensive medical records. Existing methods predominantly leverage spatial features derived from implant images using convolutional neural networks (CNNs). However, texture images exhibit distinctive patterns detectable as strong energy at specific frequencies in the frequency domain, a characteristic that motivates this study to employ frequency-domain analysis through a novel multi-branch spectral channel attention network (MBSCAN). High-frequency data obtained via a two-dimensional (2D) discrete cosine transform (DCT) are exploited to retain phase information and broaden the application of frequency-domain attention mechanisms. Fine-tuning of the multi-branch spectral channel attention (MBSCA) parameters is achieved through the modified aquila optimizer (MAO) algorithm, optimizing classification accuracy. Furthermore, pre-trained CNN architectures such as Visual Geometry Group (VGG) 16 and VGG19 are harnessed to extract features for classifying intact and fractured DIs from panoramic and periapical radiographs. The dataset comprises 251 radiographic images of intact DIs and 194 images of fractured DIs, meticulously selected from a pool of 21,398 DIs examined across two dental facilities. The proposed model has exhibited robust accuracy in detecting and classifying fractured DIs, particularly when relying exclusively on periapical images. The MBSCA-MAO scheme has demonstrated exceptional performance, achieving a classification accuracy of 95.7% with precision, recall, and F1-score values of 95.2%, 94.3%, and 95.6%, respectively. Comparative analysis indicates that the proposed model significantly surpasses existing methods, showcasing its superior efficacy in DI classification.

Open Access
Research article
Characterization and Risk Assessment of Cyber Security Threats in Cloud Computing: A Comparative Evaluation of Mitigation Techniques
oludele awodele ,
chibueze ogbonna ,
emmanuel o. ogu ,
johnson o. hinmikaiye ,
jide e. t. akinsola
|
Available online: 05-15-2024

Abstract

Full Text|PDF|XML

Advancements in information technology have significantly enhanced productivity and efficiency through the adoption of cloud computing, yet this adoption has also introduced a spectrum of security threats. Effective cybersecurity mitigation strategies are imperative to minimize the impact on cloud infrastructure and ensure reliability. This study seeks to categorize and assess the risk levels of cybersecurity threats in cloud computing environments, providing a comprehensive characterization based on eleven major causes, including natural disasters, loss of encryption keys, unauthorized login access, and others. Using fuzzy set theory to analyze uncertainties and model threats, threats were identified, prioritized, and categorized according to their impact on cloud infrastructure. A high level of data loss was revealed in five key features, such as encryption key compromise and unauthorized login access, while a lower impact was observed in unknown cloud storage and exposure to sensitive data. Seven threat features, including encryption key loss and operating system failure, were found to significantly contribute to data breaches. In contrast, others like virtual machine sharing and impersonation, exhibited lower risk levels. A comparative analysis of threat mitigation techniques determined Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service and Elevation of Privilege (STRIDE) as the most effective methodology with a score of 59, followed by Quality Threat Modeling Methodology (QTMM) (57), Common Vulnerability Scoring System (CVSS) (51), Process for Attack Simulation and Threat Analysis (PASTA) (50), and Persona non-Grata (PnG) (47). Attack Tree and Hierarchical Threat Modeling Methodology (HTMM) each achieved 46, while Linkability, Identifiablility, Nonrepudiation, Detectability, Disclosure of Information, Unawareness and Noncompliance (LINDDUN) scored 45. These findings underscore the value of fuzzy set theory in tandem with threat modeling to categorize and assess cybersecurity risks in cloud computing. STRIDE is recommended as an effective modeling technique for cloud environments. This comprehensive analysis provides critical insights for organizations and security experts, empowering them to proactively address recurring threats and minimize disruptions to daily operations.

Open Access
Research article
DNA-Level Enhanced Vigenère Encryption for Securing Color Images
abdelhakim chemlal ,
hassan tabti ,
hamid el bourakkadi ,
rrghout hicham ,
abdellatif jarjar ,
abdellhamid benazzi
|
Available online: 06-25-2024

Abstract

Full Text|PDF|XML
This study presents the development of a novel method for color image encryption, leveraging an enhanced Vigenère algorithm. The conventional Vigenère cipher is augmented with substantial substitution tables derived from widely used chaotic maps in the cryptography domain, including the logistic map and the A.J. map. These enhancements incorporate new confusion and diffusion functions integrated into the substitution tables. Following the Vigenère encryption process, a transition to deoxyribonucleic acid (DNA) notation is implemented, controlled by a pseudo-random crossover matrix. This matrix facilitates a genetic crossover specifically adapted for image encryption. Simulations conducted on a variety of images of diverse formats and sizes demonstrate the robustness of this approach against differential and frequency-based attacks. The substantial size of the encryption key significantly enhances the system's security, providing strong protection against brute-force attacks.
- no more data -