Please wait a minute...
Computer & Telecommunication  2018, Vol. 1 Issue (11): 15-17    DOI:
Current Issue | Archive | Adv Search |
Application Research on Identification of Cervical Lesions Based on Random Forest
South China Institute of Software Engineering; Guangdong Industry Polytechnic; Guangzhou Huaxia Vocational College
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  According to the analysis of the shortcomings of the joint inspection of HPV-DNA viral load testing and TCT liquid thin-layer cytology technical, this paper applies computer aided diagnosis (CAD) technology to improve cervical cancer screening accuracy, and proposes a cervical lesion recognition based on random forest (RF) model. Characteristic value of cervical cell image are extracted to form the cervical cells characteristic data sets, and then to do the Bootstrap sampling, using a random sample to build a decision tree. The results of cervical cell classification are voted out, and the model is applied to cervical cancer screening. According to theoretical analysis and experimental data, compared with traditional combined examination, this method improves the performance of cervical lesion identification, and its results have certain competitiveness and advantages.
Key wordsrandom forest      decision tree      cervical lesions identification      computer-assisted diagnosis     
Published: 16 January 2019
ZTFLH:  TP18  

Cite this article:

Yao Bing-ying Li Chao Zou Gui-hong. Application Research on Identification of Cervical Lesions Based on Random Forest. Computer & Telecommunication, 2018, 1(11): 15-17.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2018/V1/I11/15

[1] ZHANG Chun LIU Chao LIU Xv-dong CHEN Zhi-hao JIANG Yong ZHANG Hui ZHOU Hui HU Jian-cun. Consumer Portrait Construction and Potential Consumer Mining Method in Business District[J]. 电脑与电信, 2021, 1(6): 79-86.
[2] WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 1-3.
[3] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[4] Liu Yuanfeng Yang Bihua. Application of Property Reduction in Decision Tree Based on Rough Theory[J]. , 2010, 1(09): 0-0.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd