DOI_FINAL
DOI_FINAL
net/publication/380169995
CITATIONS READS
2 833
6 authors, including:
B.Swarajya Lakshmi
G pullaiah engineering college
5 PUBLICATIONS 23 CITATIONS
SEE PROFILE
All content following this page was uploaded by B.Swarajya Lakshmi on 29 April 2024.
Abstract: Early detection of lung cancer is crucial for effective treatment. Traditional methods like X-ray and CT scans are
widely used but not always accessible globally. This study proposes a comprehensive approach for lung cancer detection using
medical image mining techniques. The process involves lung field segmentation, feature extraction, and classification utilizing
neural networks and support vector machines (SVM). Two datasets were utilized, and various experiments were conducted,
including feature selection and training Capsule Networks (CapsNet) with different parameters. Results indicate promising
accuracy rates: Convolutional Neural Network (CNN) achieved 21%, K-Nearest Neighbors (KNN) achieved 43%, SVM
achieved 90%, and Random Forest achieved 60%. Notably, CapsNet outperformed all other methods with an accuracy of 96%.
This suggests the potential of CapsNet in enhancing lung cancer detection. The findings underscore the importance of
advancing automated techniques for early-stage lung cancer diagnosis, especially in regions with limited access to advanced
screening technologies.
Keywords : Lung Cancer Detection, CNN, SVM, KNN, Random Forest, CapsNet, Deep Learning, Machine Learning.
3. METHODOLOGY
i) Proposed Work:
Detection
Page | 102 Copyright @ 2024 Author
Juni Khyat (जूनी ख्यात) ISSN: 2278-4632
(UGC CARE Group I Listed Journal) Vol-14, Issue-4, April: 2024
ImageDataGenerator module, which provides several
augmentation techniques to enrich the dataset. These
techniques include re-scaling the image to normalize pixel
values, shear transformation to introduce controlled
distortions, zooming to simulate varying perspectives, and
horizontal flipping to increase dataset diversity.
Additionally, reshaping the image ensures uniform
Fig3. 1 Proposed Architecture dimensions for compatibility with neural network
architectures. Another method utilizes Torchvision,
iii) Dataset Collection:
offering pre-defined functions tailored for object detection
The dataset utilized in this study comprises a collection of tasks. This framework enables operations such as resizing,
digital X-ray and computed tomography (CT) scan images normalization, and transformation of images to optimize
of the chest region. These images encompass a diverse their suitability for detection algorithms. By incorporating
range of cases, including both normal and abnormal these image processing techniques, the quality and
physiological conditions associated with lung cancer. The diversity of the dataset are enhanced, leading to improved
dataset is curated to represent various stages and model performance and robustness in detection tasks.
vi) Algorithms:
Fig 3.2 Sample Dataset Image
CNN (Convolutional Neural Network): A deep learning
iv) Image Processing: algorithm specifically designed for processing and
classifying visual data, such as images. CNNs consist of
Image processing plays a crucial role in preparing and
multiple layers, including convolutional layers for feature
enhancing images for various applications, including
extraction and pooling layers for dimensionality reduction,
detection tasks. One approach involves using the
followed by fully connected layers for classification.
4. EXPERIMENTAL RESULTS
5. CONCLUSION
Fig 4.2Registration Page
Eventually, this project involved different image
processing procedures of lung modules that were intended
for the most appropriate lung cancer detection. Among the
variety of image processing methods, fuzzy filter,
undoubtedly, showed the best performance in terms of
noise suppression and contrast
improvement. Segmentation by watershed marker-based
Future endeavors in this domain could explore integrating [7] Karukula, N. R., & Farooq, S. M. (2013). A route map
for detecting Sybil attacks in urban vehicular
additional advanced image processing techniques and networks. Journal of Information, Knowledge, and
machine learning algorithms to further enhance the Research in Computer Engineering, 2(2), 540-544.
accuracy and efficiency of lung cancer detection. Research [8] Farook, S. M., & NageswaraReddy, K. (2015).
could focus on optimizing computational efficiency and Implementation of Intrusion Detection Systems for High
Performance Computing Environment Applications. Inter
scalability to enable real-time application in clinical national journal of Scientific Engineering and Technology
settings. Additionally, the development of robust Research, 4(0), 41.
automated systems capable of processing large-scale [8] Sunar, M. F., & Viswanatham, V. M. (2018). A fast
datasets could pave the way for personalized medicine approach to encrypt and decrypt of video streams for secure
channel transmission. World Review of Science,
approaches and improved patient outcomes in the field of Technology and Sustainable Development, 14(1), 11-28.
oncology.
[9] Mahammad, F. S., & Viswanatham, V. M. (2017). A
study on h. 26x family of video streaming compression
REFERENCES techniques. International Journal of Pure and Applied
Mathematics, 117(10), 63-66.
[1] ZakariaSulimanZubi and RemaAsheibaniSaad, “Using
Some Data Mining Techniques for Early Diagnosis of [10] Devi,S M. S., Mahammad, F. S., Bhavana, D.,
Lung Cancer,” Recent Researches in Artificial Sukanya, D., Thanusha, T. S., Chandrakala, M., & [11]
Intelligence, Knowledge Engineering and Data Bases, [17] Swathi, P. V. (2022).” Machine Learning Based
Libya, 2007. Classification and Clustering Analysis of Efficiency of
Exercise Against Covid-19 Infection.” Journal of
[2] Paola Campadelli, Elena Casiraghi, and Diana Artioli, Algebraic Statistics, 13(3), 112-117.
“A Fully Automated Method for Lung Nodule Detection
[17] Lakshmi, B. S., & Kumar, A. S. (2018). Identity- [27] Kumar, M. A., Pullama, K. B., & Reddy, B. S. V. M.
Based Proxy-Oriented Data Uploading and Remote [18] (2013). Energy Efficient Routing In Wireless Sensor
Data Integrity checking in Public Cloud. International Networks. International Journal of Emerging Technology
Journal of Research, 5(22), 744-757. and Advanced Engineering, 9(9), 172-176.
[19] Lakshmi, B. S. (2021). Fire detection using Image [28] Kumar, M. M. A., Sivaraman, G., Charan Sai, P.,
processing. Asian Journal of Computer Science and Dinesh, T., Vivekananda, S. S., Rakesh, G., & Peer, S. D.
Technology, 10(2), 14-19. BUILDING SEARCH ENGINE USING MACHINE
LEARNING TECHNIQUES.
[20] Devi, M. S., Poojitha, M., Sucharitha, R., Keerthi, K.,
Manideepika, P., & Vasudha, C. Extracting and Analyzing [29] “Providing Security in IOT using Watermarking and
Features in Natural Language Processing for Deep Partial Encryption. ISSN No:
Learning with English Language.
[21]Kumar JDS, Subramanyam MV, Kumar APS. Hybrid 2250-1797 Issue 1, Volume 2 (December 2011)
Chameleon Search and Remora Optimization Algorithm-
based Dynamic Heterogeneous load balancing clustering [30] The Dissemination Architecture of Streaming Media
protocol for extending the lifetime of wireless sensor Information on Integrated CDN and P2P, ISSN 2249-6149
networks. Int J Commun Syst. 2023; 36(17):e5609. Issue 2, Vol.2 ( March-2012)
doi:10.1002/dac.5609
[31] Provably Secure and Blind sort of Biometric
[22] David Sukeerthi Kumar, J., Subramanyam, M.V., Siva Authentication Protocol using Kerberos, ISSN: 2249-9954,
Kumar, A.P. (2023). A Hybrid Spotted Hyena and Whale Issue 2, Vol 2 (APRIL 2012)
Optimization Algorithm-Based Load-Balanced Clustering
Technique in WSNs. In: Mahapatra, R.P., Peddoju, S.K.,