Unlocking the Power of Data: An Introduction to Data Analysis in Healthcare
Research Paper | Journal Paper
Vol.11 , Issue.3 , pp.1-9, Mar-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i3.19
Abstract
Healthcare data [1] is becoming more complex and voluminous, which makes it difficult to extract valuable insights and improve healthcare services. Data analysis can help solve this challenge by providing a powerful solution. In this paper, the authors introduce the concept of data analysis in healthcare and explain its significance in enhancing patient outcomes, reducing healthcare costs, and improving the quality of care. The authors also discuss the different types of healthcare data, including electronic health records, claims data, medical imaging data, and patient-generated data, and explain the techniques used in data preprocessing, including data cleaning, transformation, and integration. Moreover, the authors describe the techniques used in exploratory data analysis (EDA), such as data visualization, summary statistics, and correlation analysis, which can help identify patterns and trends in healthcare data. They also explain the various predictive modeling techniques used in healthcare data analysis, including regression analysis, decision trees, and neural networks, which can be used for predicting patient outcomes and identifying risk factors. Additionally, the authors discuss the development of clinical decision support systems using data analysis, which can assist healthcare professionals in making informed decisions about patient care. The paper provides real-world examples of how data analysis has been used in healthcare, such as predicting hospital readmissions, identifying high-risk patients, and improving medication adherence. Finally, the authors discuss emerging trends in data analysis in healthcare, such as the use of artificial intelligence and machine learning, and their potential impact on healthcare. Overall, this paper highlights the importance of data analysis in healthcare and its potential to revolutionize the industry.
Key-Words / Index Term
Data Analysis, Healthcare Data, EHR, Claims Data, Medical Imaging Data, Data Preprocessing, Data Cleaning, Data transformation, Data Integration, EDA, Data Visualization, Clinical Decision Support, AI, ML.
References
[1]. Thacker SB: Historical development. In Principles and Practice of Public Health Surveillance. Edited by: Teutsch SM, Churchill RE. 2000, New York: Oxford University Press, Inc, pp.1-16, 2000.
[2]. Supporting Medical Research in Healthcare: A Systematic Review of Current Practices and Future Directions by L. H. Green et al. 2019.
[3]. J. Peifer, A. Hopper and B. Sudduth, "A patient-centric approach to telemedicine database development", _Proc. Medicine Meets Virtual Reality 6_, pp.67-73, 1998.
[4]. Kruse CS, Mileski M, Vijaykumar AG, Viswanathan SV, Suskandla U, Chidambaram Y. Impact of electronic health records on long-term care facilities: systematic review. _JMIR Med Inform_. 5:e35, 2017.
[5]. R. Agrawal and R. Srikant, "Fast Algorithms for Mining Association Rules", _Proc. 20th int. conf. very large data bases VLDB_, vol.1215, pp.487-499, 1994.
[6]. K. Nakayama, "Data analysis by the correspondence analysis", _Kansei Gakuin University bulletin society department bulletin_, no.108, pp.133-145, 2009.
[7]. A. Mcafee and E. Brynjolfsson, "Spotlight on Big Data Big Data: The Management Revolution", _Harv. Bus. Rev._, no. October, pp.1-9, 2012.
[8]. C. Castaneda, K. Nalley, C. Mannion et al., "Clinical decision support systems for improving diagnostic accuracy and achieving precision medicine", _Journal of Clinical Bioinformatics_, vol.5, pp.4, 2015.
[9]. Applications of Data Analysis in Healthcare: A Systematic Review of Current Literature" by A. M. Abdel-Aziz et al. 2021.
[10]. Chidanand Apte, Leora. Morgenstern and Se Hong, "AI at IBM Research", _IEEE Intelligent Systems and their Applications_, vol.15, no.6, pp. 51-57, Nov. 2000.
[11]. J. Reiling, B. L. Knutzen, T. K. Wallen, S. McCullough, R. Miller and S. Chernos, "Enhancing the traditional hospital design process: a focus on patient safety", The Joint Commission Journal on Quality and Patient Safety, vol.30, no.3, pp.115-124, 2004.
[12]. I. A. Walker, S. Reshamwalla and I. H. Wilson, "Surgical safety checklists: do they improve outcomes?", _Br. J. Anaesth._, vol.109, no.1, pp.47-54, 2012.
[13]. S. Goldwasser, "Multi party computations: past and present," in PODC`97, Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing. New York: ACM, pp.1-6, 1997.
[14]. T. Alshugran, J. Dichter and M. Faezipour, "Formally expressing HIPAA privacy policies for web services", _IEEE Int. Conf Electro Inf Technol._, vol. 201S-June, pp.295-299, 2015.
[15]. W. Moore and S. Frye, "Review of HIPAA part 2: Limitations rights violations and role for the imaging technologist", J. Nucl. Med. Technol., vol.48, no.1, pp.17-23, Mar. 2020.
[16]. X. Du, M. Guizani, Y. Xiao and H. H. Chen, "a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks", _IEEE Transactions on Wireless Communications_, vol.8, no.3, pp.1223-1229, 2009.
[17]. D.K. Vawdrey, T.L. Sundelin, K.E. Seamons and C.D. Knustson, "Trust negotiation for authentication and authorization in health care information system," 25th Annual International Conference of IEEE, vol. 2, issue, pp.1406-1409, 17-21 September 2003.
[18]. U. Strandbygaard, S. F. Thomsen, and V. Backer, ‘‘A daily SMS reminder increases adherence to asthma treatment: A three-month follow-up study,’’ Respiratory Med., vol.104, no.2, pp.166–171, 2010.
[19]. B. G. Celler, N. H. Lovell, and D. Chan, "The Potential Impact of Home Telecare on Clinical Practice," Medical Journal of Australia, vol.171, pp.512-521, 1999.
[20]. M. Rahimpour, N. H. Lovell, B. G. Celler, and J. McCormick, "Patients` perceptions of a home telecare system," International Journal of Medical Informatics, 2008.
[21]. S. J. Strath and T. W. Rowley, "Wearables for Promoting Physical Activity", _Clinical chemistry_, vol.64, no.1, pp.53-63, 2018.
Y Zhou and R Deng, "Goal-oriented system design for home medication management products [J]", _Packaging Engineering_, vol.39, no.02, pp.202-208, 2018.
Citation
Sameer Shukla, "Unlocking the Power of Data: An Introduction to Data Analysis in Healthcare," International Journal of Computer Sciences and Engineering, Vol.11, Issue.3, pp.1-9, 2023.
Energy-Efficient and Secure Framework for IoMT-Based E-Healthcare Systems Using Intelligent Routing
Research Paper | Journal Paper
Vol.11 , Issue.3 , pp.10-16, Mar-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i3.1016
Abstract
The Internet of Medical Things (IoMT) is a group of internet-connected medical devices used in e-healthcare for remote patient diagnosis, medical equipment regulation, and tracking of quarantined patients. However, the IoMT faces security and privacy concerns due to the vast amounts of data handled by these devices, which can lead to sensitive personal data being exposed to various attacks. This paper proposes a secure route management strategy using the AODV protocol and a modified lightweight AES encryption approach to protect healthcare data. The approach is demonstrated to be secure against black hole attacks and requires relatively low computation and communication resources. These findings indicate that the proposed paradigm is suitable for deployment in IoMT devices with limited.
Key-Words / Index Term
IoMT Intelligent routing, lightweight cryptography, IoMT, E-healthcare, IoMT-Security.
References
[1]. F. Khan, M. A. Jan, R. Alturki, M. D. Alshehri, S. T. Shah and A. u. Rehman, “A Secure Ensemble Learning-Based Fog-Cloud Approach for Cyberattack Detection in IoMT,” in IEEE Transactions on Industrial Informatics, doi: 10.1109/TII.2022.3231424.
[2]. B. Tahir, A. Jolfaei and M. Tariq, “A Novel Experience-Driven and Federated Intelligent Threat-Defense Framework in IoMT,” in IEEE Journal of Biomedical and Health Informatics, doi: 10.1109/JBHI.2023.3236072.
[3]. Z. Xu, Y. Guo, C. Chakraborty, Q. Hua, S. Chen and K. Yu, “A Simple Federated Learning-Based Scheme for Security Enhancement Over Internet of Medical Things,” in IEEE Journal of Biomedical and Health Informatics, vol.27, no.2, pp.652-663, Feb. 2023, doi: 10.1109/JBHI.2022.3187471.
[4]. M. Sirajuddin and B. S. Kumar, “Efficient and Secured Route Management Scheme Against Security Attacks in Wireless Sensor Networks,” 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, pp.1045-1051, 2021. doi: 10.1109/ICESC51422.2021.9532779.
[5]. R. P. Parameswarath, P. Gope and B. Sikdar, “Privacy-Preserving User-Centric Authentication Protocol for IoT-Enabled Vehicular Charging System Using Decentralised Identity,” in IEEE Internet of Things Magazine, vol.6, no.1, pp.70-75, March 2023. doi: 10.1109/IOTM.001.2200041.
[6]. Sirajuddin, M., Sateesh Kumar, B. (2022). Collaborative Security Schemes for Wireless Sensor Networks. In: Kumar, A., Mozar, S. (eds) ICCCE 2021. Lecture Notes in Electrical Engineering, vol 828, 2022. Springer, Singapore. https://doi.org/10.1007/978-981-16-7985-8_36
[7]. T. Alladi, A. Agrawal, B. Gera, V. Chamola and F. R. Yu, “Ambient Intelligence for Securing Intelligent Vehicular Networks: Edge-Enabled Intrusion and Anomaly Detection Strategies,” in IEEE Internet of Things Magazine, vol.6, no.1, pp.128-132, March 2023, doi: 10.1109/IOTM.001.2200197.
[8]. S. Yu and K. Park, “SALS-TMIS: Secure, Anonymous, and Lightweight Privacy-Preserving Scheme for IoMT-Enabled TMIS Environments,” in IEEE Access, vol.10, pp.60534-60549, 2022, doi: 10.1109/ACCESS.2022.3181182.
[9]. M. Wazid, J. Singh, A. K. Das, S. Shetty, M. K. Khan and J. J. P. C. Rodrigues, “ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things,” in IEEE Access, vol.10, pp.57990-58004, 2022, doi: 10.1109/ACCESS.2022.3179418.
[10]. Xueli Nie, Aiqing Zhang, Jindou Chen, Youyang Qu, Shui Yu, “Blockchain-Empowered Secure and Privacy-Preserving Health Data Sharing in Edge-Based IoMT”, Security and Communication Networks, vol.2022, Article ID 8293716, 16 pages, 2022. https://doi.org/10.1155/2022/8293716.
[11]. Chien-Ming Chen, Shuangshuang Liu, Xuanang Li, SK Hafizul Islam, Ashok Kumar Das, A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT, Journal of Systems Architecture, Vol.136,2023,102831,ISSN1383-7621, https://doi.org/10.1016/j.sysarc.2023.102831.
[12]. Yi, H., Nie, Z. On the security of MQ cryptographic systems for constructing secure internet of medical things. Pers Ubiquit Comput 22, 1075–1081, 2018. https://doi.org/10.1007/s00779-018-1149-y.
[13]. Kumar, V., Mahmoud, M.S., Alkhayyat, A. et al. RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure. J Supercomput 78, 16167–16196, 2022. https://doi.org/10.1007/s11227-022-04513-4S.
[14]. Willium, “Biological Sciences,” International Journal of Scientific Research in Computer Science and Engineering, Vol.31, Issue 4, pp.123-141, 2012.
[15]. M. Wazid, J. Singh, A. K. Das, S. Shetty, M. K. Khan and J. J. P. C. Rodrigues, “ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things,” in IEEE Access, vol.10, pp.57990-58004, 2022, doi: 10.1109/ACCESS.2022.3179418.
[16]. N. Garg, M. Wazid, A. K. Das, D. P. Singh, J. J. P. C. Rodrigues and Y. Park, “BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment,” in IEEE Access, vol.8, pp.95956-95977, 2020, doi: 10.1109/ACCESS.2020.2995917.
[17]. M. Kumar, Kavita, S. Verma, A. Kumar, M. F. Ijaz and D. B. Rawat, “ANAF-IoMT: A Novel Architectural Framework for IoMT-Enabled Smart Healthcare System by Enhancing Security Based on RECC-VC,” in IEEE Transactions on Industrial Informatics, vol.18, no.12, pp.8936-8943, Dec.2022, doi: 10.1109/TII.2022.3181614.
[18]. Gupta, D.S., Mazumdar, N., Nag, A. et al. Secure data authentication and access control protocol for industrial healthcare system. J Ambient Intell Human Comput, 2023. https://doi.org/10.1007/s12652-022-04370-2
Citation
Mohammad Sirajuddin, B. Sateesh Kumar, "Energy-Efficient and Secure Framework for IoMT-Based E-Healthcare Systems Using Intelligent Routing," International Journal of Computer Sciences and Engineering, Vol.11, Issue.3, pp.10-16, 2023.
Predictive Analytics for identifying Suicide Risk on Social Media Forums using Machine Learning Algorithms
Research Paper | Journal Paper
Vol.11 , Issue.3 , pp.17-23, Mar-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i3.1723
Abstract
This paper discusses the use of machine learning techniques for predicting and identifying suicide risk on social networking websites and suggests an approach that involves analyzing social media posts using different machine learning algorithms, including deep learning models, to detect suicidal ideation. The effectiveness of the model is evaluated using various metrics such as precision, recall, accuracy, and F1-score. The results show that machine learning techniques can successfully identify individuals at risk of suicide. The findings are significant for mental health professionals, social media companies, and individuals at risk of suicide, and contribute to the ongoing efforts to use technology for suicide prevention and improved mental health outcomes.
Key-Words / Index Term
Machine Learning, Predictive Modeling, Social Media, Suicide Prevention, Text
References
[1] Callaghan, Sascha, Christopher Ryan, and Ian Kerridge. "Risk of suicide is insufficient warrant for coercive treatment for mental illness." International journal of law and psychiatry 36.5-6:374-385, 2013.
[2] Bolton, James M., David Gunnell, and Gustavo Turecki. "Suicide risk assessment and intervention in people with mental illness." Bmj 351, 2015.
[3] Razvodovsky, Yury, and Andrew Stickley. "Suicide in urban and rural regions of Belarus, 1990–2005." Public health 123.1: 27-31, 2009.
[4] Cameron, Shri, et al. "Understanding the relationship between suicidality, current depressed mood, personality, and cognitive factors." Psychology and Psychotherapy: Theory, Research and Practice 90.4: 530-549, 2017.
[5] Portes, Pedro R., Daya S. Sandhu, and Robert Longwell-Grice. "Understanding adolescent suicide: A psychosocial interpretation of developmental and contextual factors." ADOLESCENCE-SAN DIEGO- 37 : 805-814, 2002.
[6] Renjith, Shini, et al. "An ensemble deep learning technique for detecting suicidal ideation from posts in social media platforms." Journal of King Saud University-Computer and Information Sciences 34.10: 9564-9575, 2022.
[7] Li, Nan, and Desheng Dash Wu. "Using text mining and sentiment analysis for online forums hotspot detection and forecast." Decision support systems 48.2 : 354-368, 2010.
[8] Reece, Andrew G., and Christopher M. Danforth. "Instagram photos reveal predictive markers of depression." EPJ Data Science 6.1: 15, 2017.
[9] Asfaw, Henock, et al. "Prevalence and associated factors of suicidal ideation and attempt among undergraduate medical students of Haramaya University, Ethiopia. A cross sectional study." PloS one 15.8 : e0236398, 2020.
[10] Burnap, Pete, Walter Colombo, and Jonathan Scourfield. "Machine classification and analysis of suicide-related communication on twitter." Proceedings of the 26th ACM conference on hypertext & social media. 2015.
[11] Desmet, Bart, and Véronique Hoste. "Online suicide prevention through optimised text classification." Information Sciences 439 (2018): 61-78.
[12] Thompson, Paul, Craig Bryan, and Chris Poulin. "Predicting military and veteran suicide risk: Cultural aspects." Proceedings of the workshop on computational linguistics and clinical psychology: From linguistic signal to clinical reality. 2014.
[13] Masuda, Naoki, Issei Kurahashi, and Hiroko Onari. "Suicide ideation of individuals in online social networks." PloS one 8.4: e62262, 2013.
[14] Desmet, Bart, and Véronique Hoste. "Emotion detection in suicide notes." Expert Systems with Applications 40.16 : 6351-6358, 2013.
[15] Czyz, Ewa K., et al. "Self-reported barriers to professional help seeking among college students at elevated risk for suicide." Journal of American college health 61.7 : 398-406, 2013.
[16] Torous, John, and Laura Weiss Roberts. "Needed innovation in digital health and smartphone applications for mental health: transparency and trust." JAMA psychiatry 74.5 (): 437-438, 2017.
[17] Larsen, Mark Erik, Jennifer Nicholas, and Helen Christensen. "A systematic assessment of smartphone tools for suicide prevention." PloS one 11.4 : e0152285, 2016.
Citation
Ed Gowhar Hafiz Wani, Virendra K. Sharma, "Predictive Analytics for identifying Suicide Risk on Social Media Forums using Machine Learning Algorithms," International Journal of Computer Sciences and Engineering, Vol.11, Issue.3, pp.17-23, 2023.
Applications and Challenges of E-Learning Technologies
Research Paper | Journal Paper
Vol.11 , Issue.3 , pp.24-27, Mar-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i3.2427
Abstract
The present work investigates the application of e-learning in the education system in the situations of social distancing caused by the pandemic COVID-19. The likelihoods and challenges in the execution of e-learning have been discussed. The recent widely used platforms for e-learning are presented in the present work. An investigation of these platforms, along with their advantages and disadvantages have been addressed. Based upon the analysis conducted, the challenges for the future enhancement and successful deployment of e-learning are addressed.
Key-Words / Index Term
Web Conferencing, E-learning, LMS, Schoology, Google Classroom.
References
[1]. S. Tzanova, N. Mileva, “Dipseil Project”, Information Communication Technologies in Education (ICICTE 2006), Rhodes Island, Greece, pp.447-449, July 2006.
[2]. S. Choudhury, & S. Pattnaik, “Emerging themes in e- learning: A review from the stakeholders` perspective”, Computers & Education, 144, 103657, 2020.
[3]. S. Hrastinski, “Asynchronous and synchronous e- learning”, Educause quarterly, 31(4), pp.51-55, 2008.
[4]. D. Al-Fraihat, M. Joy, & J. Sinclair, “Evaluating E- learning systems success: An empirical study”, Computers in Human Behavior, 102, pp.67-86, 2020.
[5]. D. Zhang, J.L. Zhao, L. Zhou, & J. F. Nunamaker Jr, “Can e-learning replace classroom learning?”, Communications of the ACM, 47(5), pp.75-79, 2004.
[6]. S. Hrastinski, “A theory of online learning as online participation”, Computers & Education, 52(1), pp.78-82, 2009.
[7]. V. Gyurova, “Why only pedagogical competence is not enough for the 21st century teacher?”, Online Journal Educational forum, 3, pp.1-16, 2018.
[8]. S. S. Tzanova and R. I. Radonov, “Evaluation of Multimedia Learning Materials in Microelectronics”, 2019 IEEE XXVIII International Scientific Conference Electronics (ET), Sozopol, pp.1-4, Bulgaria, 2019.
[9]. Bulgarian national program - https://www.mon.bg/bg/100725
[10]. P. Martinek et al., “Building a cloud platform for education in microelectronics”, 2017 40th International Spring Seminar on Electronics Technology (ISSE), pp.1-6, Sofia, 2017.
[11]. E. Paunova-Hubenova, V. Terzieva, & K. Todorova, “The Role of ICT in Teaching Processes in Bulgarian Schools”, 2019 29th Annual Conference of the European Association for Education in Electrical and Information Engineering (EAEEIE), Ruse, pp.1-6, Bulgaria, 2019.
[12]. Terzieva, Valentina, E. Paunova-Hubenova, S. Dimitrov, & Y. Boneva, “ICT in STEM Education in Bulgaria”, In International Conference on Interactive Collaborative Learning, pp.801-812. Springer, Cham, 2018.
Citation
A. Thakur, "Applications and Challenges of E-Learning Technologies," International Journal of Computer Sciences and Engineering, Vol.11, Issue.3, pp.24-27, 2023.
Revolutionizing Online Education: Integrating Machine Learning and Data Analysis into LMS
Research Paper | Journal Paper
Vol.11 , Issue.3 , pp.28-33, Mar-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i3.2833
Abstract
In 2020, the events that transpired revealed the fragility of society and its vulnerability to abrupt shifts in governing paradigms. The outbreak of COVID-19 pandemic globally altered the manner in which people engage in activities such as communication, work, study, and interaction. This resulted in a significant change in the way society operates, including education. To accommodate the new reality, education embraced the use of technology, specifically information and communication technologies. One such example is the increased reliance on learning management systems as a platform for resource management and educational activities. This proposal seeks to enhance the learning experience by incorporating artificial intelligence and data analysis into learning management systems. The aim is to establish robust educational models in the new normal, where students have access to virtual assistants for guidance during online learning.
Key-Words / Index Term
analysis of data; artificial intelligence; machine learning; online education
References
[1]. Li, H., Liu, S.M., Yu, X.H., Tang, S.L. & Tang, C.K. (2020). Coronavirus disease 2019 (COVID-19): Current status and future perspectives. International Journal of Antimicrobial Agents, 55, 105951, 2020. doi: 10.1016/j.ijantimicag.2020.105951
[2]. Riofrio, G., Encalada, E., Guaman, D. & Aguilar, J. (2015, October). Business intelligence applied to learning analytics in student-centered learning processes. In Proceedings of the Latin American Computing Conference. Arequipa, Peru. pp.1-10, 2015.
[3]. Beldarrain, Y. (2006). Distance education trends: Integrating new technologies to foster student interaction and collaboration. Distance Education, 27, 139-153, 2006. doi: 10.1080/01587910600789498
[4]. Hssina, B., Bouikhalene, B. & Merbouha, A. (2017). Europe and MENA Cooperation Advances in Information and Communication Technologies (Vol. 520). In A. Rocha, S. Mohammed & C. Felgueiras (Eds.), Springer International Publishing. 2017. doi: 10.1007/978-3-319-46568-5_43
[5]. Villegas-Ch, W., Lujan-Mora, S. & Buenano-Fernandez, D. (2017, November). Application of a Data Mining Method in to LMS for the Improvement of Engineering Courses in Networks. In Proceedings of the 10th International Conference of Education, Research and Innovation. Seville, Spain. pp. 6374-6381, 2017.
[6]. Comendador, B.E.V., Rabago, L.W. & Tanguilig, B.T. (2016, March). An educational model based on Knowledge Discovery in Databases (KDD) to predict learner’s behavior using classification techniques. In Proceedings of the IEEE International Conference on Signal Processing, Communications and Computing, Shanghai, China. pp. 1-6, 2016.
[7]. Kim, T. & Lim, J. (2019). Designing an Efficient Cloud Management Architecture for Sustainable Online Lifelong Education. Sustainability, 11, 1523, 2019. doi: 10.3390/su11061523
[8]. Ferguson, R. (2013). Learning analytics: Drivers, developments and challenges. International Journal of Technology Enhanced Learning, 4, 304-317, 2013. doi: 10.1504/IJTEL.2013.057405
[9]. Lee, S.J., Lee, H. & Kim, T.T. (2018). A study on the instructor role in dealing with mixed contents: How it affects learner satisfaction and retention in e-learning. Sustainability, 10, 850, 2018. doi: 10.3390/su10030850
[10]. Lee, J., Song, H.D. & Hong, A.J. (2019). Exploring factors, and indicators for measuring students’ sustainable engagement in e-learning. Sustainability, 11, 985, 2019. doi: 10.3390/su11040985
[11]. Villegas-Ch, W., Palacios-Pacheco, X., Buenaño-Fernandez, D. & Luján-Mora, S. (2019). Comprehensive learning system based on the analysis of data and the recommendation of activities in a distance education environment. International Journal of Engineering Education, 35, 1316-1325, 2019.
[12]. Darcy, A.M., Louie, A.K. & Roberts, L.W. (2016). Machine learning and the profession of medicine. JAMA, 315, 2016.
Citation
Parveen Singh, Meenakshi Handa, Anwal Ul Haq, "Revolutionizing Online Education: Integrating Machine Learning and Data Analysis into LMS," International Journal of Computer Sciences and Engineering, Vol.11, Issue.3, pp.28-33, 2023.
Predictive Analysis for Decision Making Using Machine Learning in Health Care
Research Paper | Journal Paper
Vol.11 , Issue.3 , pp.34-38, Mar-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i3.3438
Abstract
Breast Cancer has turned into the normal reason for death among ladies. There are several machine learning algorithms that can be used for breast cancer predictive analysis, such as logistic regression, decision trees, random forests, support vector machines, and neural networks. These algorithms can be trained on large datasets of patient information, including demographic data, medical history, and genetic markers, to identify patterns and make accurate predictions. One of the key benefits of machine learning in breast cancer predictive analysis is the ability to personalize treatment plans based on individual patient characteristics. By analyzing a patient`s unique combination of risk factors, doctors can develop tailored treatment plans that are more effective and less invasive. Our point is to group whether the breast cancer is harmless or dangerous and foresee the repeat and non-repeat of threatening cases after a specific period. To accomplish this we have utilized AI strategies, for example, “Support Vector Machine”, “Logistic Regression”, “KNN and Naive Bayes”. We additionally have investigated the precision of expectation of by applying different calculation on the new arrangement of information that has been joined. This paper explores the use of predictive analytics in healthcare decision-making through machine learning. The application of machine learning algorithms in healthcare can assist in identifying patterns and trends in patient data, which can then be used to predict potential health risks, recommend treatment options, and optimize healthcare delivery. The paper discusses various predictive analytics techniques such as decision trees, random forests, logistic regression, and neural networks, and their applications in healthcare. Additionally, the paper also highlights the challenges associated with the implementation of predictive analytics in healthcare, such as data quality, privacy concerns, and ethical issues. Finally, the paper concludes by emphasizing the need for healthcare organizations to leverage predictive analytics to improve patient outcomes, reduce costs, and enhance the quality of care.
Key-Words / Index Term
Breast Cancer, Support Vector Machine, K-Nearest Neighbor, Naive Bayes, Logistic Regression, Classification
References
[1] P. A. Francis, et al., “Adjuvant ovarian suppression in premenopausal breast cancer,” New England Journal of Medicine, Vol.372, no.5, pp.436-446, 2015. [Online]. Doi: 10.1056/ NEJMoa1412379
[2] C. E. De Santi’s, et al., “Breast cancer statistics, 2015: Convergence of incidence rates between black and white women,” CA: a cancer journal for clinicians, Vol.66, no.1, pp.31-42, 2016. [Online]. doi: 10.3322/caac.21320
[3] C. E. De Santi’s, et al., “Breast cancer statistics, 2017, racial disparity in mortality by state,” CA: a cancer journal for clinicians, Vol.67, no.6, pp.439-448, 2017. [Online]. doi: 10.3322/caac.21412
[4] N. K. Nikolova, “Microwave imaging for breast cancer,” IEEE microwave magazine, Vol.12, no.7, pp.78- 94, 2011. [Online]. doi: 10.1109/MMM.2011.942702
[5] Xie, Yao, et al., “Multistatic adaptive microwave imaging for early breast cancer detection,” IEEE Transactions on Biomedical Engineering, Vol.53, no.8, pp.1647-1657, 2006. [Online]. doi: 10.1109/TBME.2006.87805
[6] Rana, pooja chandorkar, Alishiba Dsouza and Nikahat kazi, Breast cancer diagonosis and recurrence prediction using machine learning techniques. Vol.4 Issue: 04 | Apr-2015.
[7] B. M Gayathri, C. P. Sumathi, and T. Santhanam- Breast cancer diagonosis using machine learning algorithm. Vol.4, No.3, May 2013.
[8] Rashmi Aggarwal – Predictive analysis of breast cancer using machine techniques. Vol.15, No.3, 2019.
Citation
Walli Prasadu, Ravishankar Kumar, Ravi Kiran Katta, Pinki Sagar, "Predictive Analysis for Decision Making Using Machine Learning in Health Care," International Journal of Computer Sciences and Engineering, Vol.11, Issue.3, pp.34-38, 2023.
Dynamic Core Allocation: Enhancing Fault Tolerance and Energy Efficiency in Cloud Computing
Research Paper | Journal Paper
Vol.11 , Issue.3 , pp.39-43, Mar-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i3.3943
Abstract
As the prevalence of cloud computing continues to surge, cloud computing entities face the formidable challenge of meeting coordinated Service Level Agreement (SLA) understandings, particularly in terms of stability and operational efficiency, all while achieving cost and energy efficiency. This paper introduces Shadow Replication, a novel adaptation to internal failure mechanisms for cloud computing that seamlessly addresses faults at scale, concurrently limiting energy consumption and reducing its impact on costs. Energy conservation is realized by establishing dynamic cores as opposed to static cores, achieved through the deployment of cloudlets. Essentially, equivalent cores are created, with core failure metrics considering memory capacity, energy, and power consumption. If any of these parameters exceed the threshold value, the core is flagged, and progress is maintained within a shadow, assigned one for each host. The workload of a failed core is transferred to the next core within another virtual machine (VM). In the event of all cores within a VM failing, VM migration is executed. Results obtained through the proposed system exhibit improvements in indexed energy consumption, latency, cost, and fault rate.
Key-Words / Index Term
Shadow Replication; fault tolerance; Energy Conservation
References
[1] B. Meroufel and G. Belalem, "Adaptive time-based coordinated checkpointing for cloud computing workflows," Scalable Comput., Vol.15, No.2, pp.153–168, 2014.
[2] D. Kliazovich, P. Bouvry, and S. U. Khan, "GreenCloud: A Packet-level Simulator of Energy-aware Cloud Computing Data Centers," J. Supercomput., Vol.62, No.3, pp.1263–1283, 2012.
[3] B. Alami Milani and N. Jafari Navimipour, "A comprehensive review of the data replication techniques in the cloud environments: Major trends and future directions," J. Netw. Comput. Appl., Vol.64, pp.229–238, 2016.
[4] R. Balamanigandan, "Analyzing massive machine data maintaining in a cloud computing," Vol.23, No.10, pp.78–81, 2013.
[5] D. Singh, J. Singh, and A. Chhabra, "High availability of clouds: Failover strategies for cloud computing using integrated checkpointing algorithms," Proc. - Int. Conf. Commun. Syst. Netw. Technol. CSNT 2012, pp.698–703, 2012.
[6] Y. Zhang, Z. Zheng, and M. R. Lyu, "BFTCloud: A Byzantine Fault Tolerance framework for voluntary-resource cloud computing," Proc. - 2011 IEEE 4th Int. Conf. Cloud Comput. CLOUD 2011, no. July 2011, pp.444–451, 2011.
[7] P. K. Szwed, D. Marques, R. M. Buels, S. A. McKee, and M. Schulz, "SimSnap: Fast-forwarding via native execution and application-level checkpointing," Proc. - Eighth Work. Interact. between Compil. Comput. Archit. INTERACT-8 2004, pp.65–74, 2004.
[8] K. H. Kim and C. Subbaraman, "A modular implementation model of the Primary-Shadow TMO replication scheme and a testing approach using a real-time environment simulator," Softw. Reliab. Eng. 1998. Proceedings. Ninth Int. Symp., pp.247–256, 1998.
[9] K. H. Kim and C. Subbaraman, "An Integration of the Primary-Shadow TMO Replication (PSTR) Scheme with a Supervisor-based Network Surveillance Scheme and its Recovery Time Bound Analysis," Proc. SRDS ’98 (IEEE CS 17th Symp. Reliab. Distrib. Syst. 1998, pp.168–176, 1998.
[10] Hsiao, Hui-I., and David J. DeWitt. "Chained declustering: A new availability strategy for multiprocessor database machines." University of Wisconsin-Madison Department of Computer Sciences, 1989.
[11] M. R. Marty and M. D. Hill, "Virtual hierarchies to support server consolidation," ACM SIGARCH Comput. Archit. News, Vol.35, no.2, pp.46, 2007.
[12] R. T. Kaushik, "GreenHDFS: Towards An Energy-Conserving , Storage-Efficient , Hybrid Hadoop Compute Cluster," HotPower, pp.1–9, 2010.
[13] D. Kliazovich, P. Bouvry, and S. U. Khan, "DENS: Data center energy-efficient network-aware scheduling," Cluster Comput., Vol.16, No.1, pp.65–75, 2013.
[14] Y. Lin and H. Shen, "EAFR: An Energy-Efficient Adaptive File Replication System in Data-Intensive Clusters," IEEE Trans. Parallel Distrib. Syst., vol.28, no.4, pp.1017–1030, 2017.
[15] J. Liu, F. Zhao, X. Liu, and W. He, "Challenges Towards Elastic Power Management in Internet Data Centers," 2009 29th IEEE Int. Conf. Distrib. Comput. Syst. Work., pp.65–72, 2009.
[16] B. Mills, T. Znati, R. Melhem, K. B. Ferreira, and R. E. Grant, "Energy consumption of resilience mechanisms in large scale systems," Proc. - 2014 22nd Euromicro Int. Conf. Parallel, Distrib. Network-Based Process. PDP 2014, pp.528–535, 2014.
[17] A. Odlyzko, "Data Networks are Lightly Utilized, and will Stay that Way," Rev. Netw. Econ., Vol.2, no.3, pp.210–237, 2003.
[18] H.-I. Hsiao and D. J. DeWitt, "A performance study of three high availability data replication strategies," [1991] Proc. First Int. Conf. Parallel Distrib. Inf. Syst., pp.18–28, 1991.
[20] C. S. Shih and T. K. Trieu, "Shadow phone: Context aware device replication for disaster management," Proc. - 2012 5th IEEE Int. Conf. Serv. Comput. Appl. SOCA 2012, 2012.
Citation
Vikas Mongia, "Dynamic Core Allocation: Enhancing Fault Tolerance and Energy Efficiency in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.11, Issue.3, pp.39-43, 2023.