Breast Cancer Monitoring and Tracking System using Soft Computing and Expert System for Healthcare Support
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract:The decision process for selecting the best-suited follow-up treatment for suspected breast cancer cases are strongly dependent upon the correct diagnosis and assessment of the breast cancer risk. This study will develop an expert system with soft computing methods by using Fuzzy logic and Bayesian network. This system has five input variables and one output variable (risk status). The output variable is a value from 1 to 4; representing low risk status, intermediate risk status ,high risk status and very high risk. This study will help to diagnosis and monitor breast cancer at home.
Authors and Affiliations
Atiya Masood Rana , Somaya Abdullah Al Gamdi , Roa'a Abdulraheem bukhari , Maryam Tami Al-Osaimi
Intrusion Detection Systems By Anamoly-Based Using Neural Network
To improve network security different steps has been taken as size and importance of the network has increases day by day. Then chances of a network attacks increases Network is mainly attacked by some  ...
Optimization Techniques Incorporating Evolutionary Model inWireless Sensor Network: A Survey
Abstract: Wireless Sensor Network has several issues and challenges that are to be taken care while designing the techniques and algorithms to increase the Network lifetime of WSN. Network optimization is a critical comp...
Big Data in Bioinformatics & the Era of Cloud Computing
With the recent breakthrough in bioinformatics, demand of more storage space is increasing day by day. With this exponentially increasing data i.e. the big data of bioinformatics sector, the data needs to be hand...
Emergency Vehicle Priority Preference at Multiple Wireless Network Sensors (MWNS) Intelligent Road Traffic Signal Control System
Abstract: Traffic control management system has to be intelligent and equitable in signal allocation management system, especially priority order has to be given to emergency vehicles so as to prevent unforeseen...
Advanced Safe PIN-Entry Against Human Shoulder-Surfing
Abstract: When users insert their passwords in a common area, they might be at risk of aggressor stealingtheir password. The PIN entry can be perceived by close by adversaries, more effectually in a crowded place. Anew t...