Transfer learning based histopathologic image classification for burns recognition

Book chapter


Aliyu Abubakar, Hassan Ugail, Ali Maina Bukar, Ali Ahmad Aminu and Ahmad Musa 2019. Transfer learning based histopathologic image classification for burns recognition. in: 2019 15th International Conference on Electronics, Computer and Computation (ICECCO) IEEE.
AuthorsAliyu Abubakar, Hassan Ugail, Ali Maina Bukar, Ali Ahmad Aminu and Ahmad Musa
Abstract

Burn is one of the most leading devastating
injuries affecting people worldwide with high impact rate in
low-and middle-income countries subjecting hundreds of
thousands to loss of lives and physical deformities. Both
affected individuals and health institutions are faced with
challenges such as inadequate experience/well trained
workforce and high diagnostics cost. The demand of having
efficient, cost-effective and user-friendly technique to aid in addressing the problem is on the rise. Deep neural networks have recently attracted the attention of many researchers and achieved impressive results in many applications. Therefore, this paper proposed the use of off-the-shelf Convolutional Neural Network features from two ImageNet pre-trained models (GoogleNet and ResNet152), VGG-Face. The features are used to train Support Vector Machine (SVM) and Decision Tree (DT). 100% identification accuracy was recorded using ImageNet model and SVM.

KeywordsBurns; Bruises; Support vector machine; Decision tree; Convolutional neural network; Classification
Year2019
Book title2019 15th International Conference on Electronics, Computer and Computation (ICECCO)
PublisherIEEE
Output statusPublished
ISBN9781728151601
9781728151595
9781728151618
Publication dates
Online2019
Publication process dates
Deposited23 Jan 2023
Digital Object Identifier (DOI)https://doi.org/10.1109/ICECCO48375.2019.9043205
Official URLhttps://ieeexplore.ieee.org/document/9043205
Permalink -

https://repository.canterbury.ac.uk/item/939y6/transfer-learning-based-histopathologic-image-classification-for-burns-recognition

  • 27
    total views
  • 0
    total downloads
  • 0
    views this month
  • 0
    downloads this month

Export as

Related outputs

Comprehensive analysis of security issues in cloud-based Internet of Things: A survey
Gimba, U. A., Ariffrin, N. A. M., Musa, A. and Babangida, L. 2023. Comprehensive analysis of security issues in cloud-based Internet of Things: A survey. Journal of Computer Science & Computational Mathematics. 13 (2). https://doi.org/10.20967/jcscm.2023.02.004
Functional and performance analysis of discrete event network simulation tools
Musa, A. and Awan, I. 2022. Functional and performance analysis of discrete event network simulation tools. Simulation Modelling Practice and Theory. 116, p. 102470. https://doi.org/10.1016/j.simpat.2021.102470
The case for validating ADDIE model as a digital forensic model for peer to peer network investigation
Musa, A., Awan, I-U and Zarah, F. 2022. The case for validating ADDIE model as a digital forensic model for peer to peer network investigation. Information System Frontiers. https://doi.org/10.1007/s10796-022-10360-8
Machine learning for intrusion detection and network performance
Ibrahim Abobaker and Ahmad Musa 2021. Machine learning for intrusion detection and network performance. in: 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud)
Efficacy of ADDIE model in peer-to-peer networks: Digital evidence investigation
Ahmad Musa, Irfan-Ullah Awan and Ibrahim Abobaker 2021. Efficacy of ADDIE model in peer-to-peer networks: Digital evidence investigation. in: 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud) IEEE.
Self regulated learning in flipped classrooms: A systematic literature review
Rasheed Abubakar Rasheed, Amirrudin Kamsin, Nor Aniza Abdullah, Habeebah Adamu Kakudi, Auwal Shehu Ali, Ahmad Musa and Adamu Sani Yahaya 2020. Self regulated learning in flipped classrooms: A systematic literature review. International Journal of Information and Education Technology. 10 (11). https://doi.org/10.18178/ijiet.2020.10.11.1469
An investigation into peer-to-peer network security using Wireshark
Ahmad Musa, Aliyu Abubakar, Usman Abdul Gimba and Rasheed Abubakar Rasheed 2019. An investigation into peer-to-peer network security using Wireshark. in: 2019 15th International Conference on Electronics, Computer and Computation (ICECCO) IEEE.