2 research outputs found

    Transfer and Ensemble Approach for Breast Cancer Detection and Classification Using Deep Learning

    Get PDF
    Breast cancer is a serious disease that can cause significant health problems for women worldwide. It is crucial to detect and classify breast cancer early stage so that doctors can promptly treat it and aid patients in their recovery. Many investigators have used various deep learning (DL) strategies to detect and classify breast cancer. However, due to the complexity of the problem, relying on a single DL model may not suffice to achieve high accuracy. Therefore, this study suggests a transfer and ensemble deep model for breast cancer detection and classification. The suggested model involves using pre-trained models such as Sequential, Xception, DenseNet201, VGG16, and InceptionResNetV2. The top three models are selected to collaborate and deliver the most accurate results. The proposed DL model was tested on publicly available breast BUSI datasets, demonstrating its superiority over single DL models, achieving an accuracy of 87.9% on the BUSI dataset. Additionally, the model proved to be adapTABLE to different amounts of data, making it potentially valuable in hospitals and clinics

    Web3 Chain Authentication and Authorization Security Standard (CAA)

    Get PDF
    Web3 is the next evolution of the internet, which uses blockchains, cryptocurrencies, and NFTs to return ownership and authority to the consumers. The potential of Web3 is highlighted by the creation of decentralized applications (dApps), which are more secure, transparent, and tamper-proof than their centralized counterparts, allowing for new business models that were previously impossible on the traditional internet.Web3 also focuses on user privacy, where users have more control over their personal data and can choose to share only what they want. The emergence of Web3 represents an exciting new frontier in blockchain technology, and its focus on decentralization, user privacy, and trustless systems has the potential to transform the way we interact with the internet.Web3 authentication is required for enhanced security, increased privacy, and simplified user interface. Traditional login procedures and an authorization flow using web3 authentication work together seamlessly. However, there are several challenges associated with Web3, including scalability and regulatory issues. Chain Authentication and Authorization (CAA) is a multi-layer security mechanism that allows users to choose the security layer that suits them, just like a heavy iron chain, where the user and CAA developers act as blacksmith and form their security protocol that suits them. CAA is a solution to the challenges associated with Web3 authentication and authorization, and it focuses on creating a secure and decentralized authentication and authorization system that is scalable, flexible, and user-friendly
    corecore