1
|
Turimov Mustapoevich D, Kim W. Machine Learning Applications in Sarcopenia Detection and Management: A Comprehensive Survey. Healthcare (Basel) 2023; 11:2483. [PMID: 37761680 PMCID: PMC10531485 DOI: 10.3390/healthcare11182483] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/25/2023] [Revised: 09/01/2023] [Accepted: 09/05/2023] [Indexed: 09/29/2023] Open
Abstract
This extensive review examines sarcopenia, a condition characterized by a loss of muscle mass, stamina, and physical performance, with a particular emphasis on its detection and management using contemporary technologies. It highlights the lack of global agreement or standardization regarding the definition of sarcopenia and the various techniques used to measure muscle mass, stamina, and physical performance. The distinctive criteria employed by the European Working Group on Sarcopenia in Older People (EWGSOP) and the Asian Working Group for Sarcopenia (AWGSOP) for diagnosing sarcopenia are examined, emphasizing potential obstacles in comparing research results across studies. The paper delves into the use of machine learning techniques in sarcopenia detection and diagnosis, noting challenges such as data accessibility, data imbalance, and feature selection. It suggests that wearable devices, like activity trackers and smartwatches, could offer valuable insights into sarcopenia progression and aid individuals in monitoring and managing their condition. Additionally, the paper investigates the potential of blockchain technology and edge computing in healthcare data storage, discussing models and systems that leverage these technologies to secure patient data privacy and enhance personal health information management. However, it acknowledges the limitations of these models and systems, including inefficiencies in handling large volumes of medical data and the lack of dynamic selection capability. In conclusion, the paper provides a comprehensive summary of current sarcopenia research, emphasizing the potential of modern technologies in enhancing the detection and management of the condition while also highlighting the need for further research to address challenges in standardization, data management, and effective technology use.
Collapse
Affiliation(s)
| | - Wooseong Kim
- Department of Computer Engineering, Gachon University, Sujeong-gu, Seongnam-si 461-701, Gyeonggi-do, Republic of Korea;
| |
Collapse
|
2
|
Singh A, Chatterjee K. Edge computing based secure health monitoring framework for electronic healthcare system. CLUSTER COMPUTING 2022; 26:1205-1220. [PMID: 36091662 PMCID: PMC9438893 DOI: 10.1007/s10586-022-03717-w] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/24/2022] [Revised: 07/07/2022] [Accepted: 08/03/2022] [Indexed: 06/15/2023]
Abstract
Nowadays, Smart Healthcare Systems (SHS) are frequently used by people for personal healthcare observations using various smart devices. The SHS uses IoT technology and cloud infrastructure for data capturing, transmitting it through smart devices, data storage, processing, and healthcare advice. Processing such a huge amount of data from numerous IoT devices in a short time is quite challenging. Thus, technological frameworks such as edge computing or fog computing can be used as a middle layer between cloud and user in SHS. It reduces the response time for data processing at the lower level (edge level). But, Edge of Things (EoT) also suffers from security and privacy issues. A robust healthcare monitoring framework with secure data storage and access is needed. It will provide a quick response in case of the production of abnormal data and store/access the sensitive data securely. This paper proposed a Secure Framework based on the Edge of Things (SEoT) for Smart healthcare systems. This framework is mainly designed for real-time health monitoring, maintaining the security and confidentiality of the healthcare data in a controlled manner. This paper included clustering approaches for analyzing bio-signal data for abnormality detection and Attribute-Based Encryption (ABE) for bio-signal data security and secure access. The experimental results of the proposed framework show improved performance with maintaining the accuracy of up to 98.5% and data security.
Collapse
Affiliation(s)
- Ashish Singh
- School of Computer Engineering, KIIT Deemed to be University, Bhubaneswar, Odisha 751024 India
| | - Kakali Chatterjee
- Department of Computer Science and Engineering, National Institute of Technology, Patna, Bihar 800005 India
| |
Collapse
|
3
|
Patient Confidentiality of Electronic Health Records: A Recent Review of the Saudi Literature. DR. SULAIMAN AL HABIB MEDICAL JOURNAL 2022. [DOI: 10.1007/s44229-022-00016-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022] Open
Abstract
Abstract
Background
Health systems harbor lucrative data that can be targeted for illegal access, thus posing a serious privacy breach. In addition, patients could lose their lives or suffer permanent and irreversible harm due to such unauthorized access to health care data used in treatment. To ensure patient safety, the health care sector must integrate cybersecurity into its operations. Additionally, the health care industry must collaborate to tackle cybercrime and prevent unauthorized access to patient data. With the rapid transition from paper-based health records to electronic health records (EHRs), it is important to study, identify, and address the challenges that confront EHRs to protect patient confidentiality.
Aim
The main goal of this research was to create a clear picture of the role of EHRs in the health care system of Saudi Arabia regarding patient confidentiality. This work focused on the privacy and confidentiality challenges encountered in adopting EHRs in the health care system, and the advantages of using EHRs in terms of protecting patient confidentiality.
Methods
This project utilized a systematic literature review approach, and the methodology involved a careful critique of 11 recent articles.
Results
The confidentiality and privacy of patient data and information must be ensured, because the health care sector in Saudi Arabia is flawed with several security risks that may corrupt the integrity of patient data. The health care system is facing many cybercrimes whereby hackers can gain access to confidential data and patient information. Internal factors such as inexperienced medical personnel have also necessitated EHRs in Saudi Arabia. Health care workers who lack the appropriate skills in handling EHRs may cause breaches of patient data, which in turn may compromise the health and safety of the patients.
Conclusion
Confidentiality and privacy are critical components of a reliable EHR system. EHR confidentiality has a significant impact on maintaining patient safety and security, thus enhancing patient care in Saudi Arabia. Additionally, challenges such as hackers and data breaches have slowed the adoption process among health care companies in Saudi Arabia.
Collapse
|
4
|
Zala K, Thakkar HK, Jadeja R, Dholakia NH, Kotecha K, Jain DK, Shukla M. On the Design of Secured and Reliable Dynamic Access Control Scheme of Patient E-Healthcare Records in Cloud Environment. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:3804553. [PMID: 36035822 PMCID: PMC9410930 DOI: 10.1155/2022/3804553] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/27/2022] [Revised: 07/21/2022] [Accepted: 07/26/2022] [Indexed: 11/20/2022]
Abstract
Traditional healthcare services have changed into modern ones in which doctors can diagnose patients from a distance. All stakeholders, including patients, ward boy, life insurance agents, physicians, and others, have easy access to patients' medical records due to cloud computing. The cloud's services are very cost-effective and scalable, and provide various mobile access options for a patient's electronic health records (EHRs). EHR privacy and security are critical concerns despite the many benefits of the cloud. Patient health information is extremely sensitive and important, and sending it over an unencrypted wireless media raises a number of security hazards. This study suggests an innovative and secure access system for cloud-based electronic healthcare services storing patient health records in a third-party cloud service provider. The research considers the remote healthcare requirements for maintaining patient information integrity, confidentiality, and security. There will be fewer attacks on e-healthcare records now that stakeholders will have a safe interface and data on the cloud will not be accessible to them. End-to-end encryption is ensured by using multiple keys generated by the key conclusion function (KCF), and access to cloud services is granted based on a person's identity and the relationship between the parties involved, which protects their personal information that is the methodology used in the proposed scheme. The proposed scheme is best suited for cloud-based e-healthcare services because of its simplicity and robustness. Using different Amazon EC2 hosting options, we examine how well our cloud-based web application service works when the number of requests linearly increases. The performance of our web application service that runs in the cloud is based on how many requests it can handle per second while keeping its response time constant. The proposed secure access scheme for cloud-based web applications was compared to the Ethereum blockchain platform, which uses internet of things (IoT) devices in terms of execution time, throughput, and latency.
Collapse
Affiliation(s)
- Kirtirajsinh Zala
- Department of Computer Engineering, Marwadi University, Rajkot 360006, Gujarat, India
| | - Hiren Kumar Thakkar
- Department of Computer Science and Engineering, School of Technology, Pandit Deendayal Energy University, Gandhinagar 382007, Gujarat, India
| | | | - Neel H. Dholakia
- Department of Computer Engineering, Marwadi University, Rajkot 360006, Gujarat, India
| | - Ketan Kotecha
- Symbiosis Centre for Applied Artificial Intelligence, Symbiosis International (Deemed) University, Pune, India
| | - Deepak Kumar Jain
- Key Laboratory of Intelligent Air-Ground Cooperative Control for Universities in Chongqing, College of Automation, Chongqing University of Posts and Telecommunications, Chongqing, China
| | - Madhu Shukla
- Department of Computer Engineering, Marwadi University, Rajkot 360006, Gujarat, India
| |
Collapse
|
5
|
Segmentation and Classification of Encephalon Tumor by Applying Improved Fast and Robust FCM Algorithm with PSO-Based ELM Technique. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:2664901. [PMID: 35958769 PMCID: PMC9357778 DOI: 10.1155/2022/2664901] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/30/2022] [Revised: 06/20/2022] [Accepted: 06/25/2022] [Indexed: 11/18/2022]
Abstract
Nowadays, so many people are living in world. If so many people are living, then the diseases are also increasing day by day due to adulterated and chemical content food. The people may suffer either from a small disease such as cold and cough or from a big disease such as cancer. In this work, we have discussed on the encephalon tumor or cancer which is a big problem nowadays. If we will consider about the whole world, then there are deficiency of clinical experts or doctors as compared to the encephalon tumor affected person. So, here, we have used an automatic classification of tumor by the help of particle swarm optimization (PSO)-based extreme learning machine (ELM) technique with the segmentation process by the help of improved fast and robust fuzzy C mean (IFRFCM) algorithm and most commonly feature reduction method used gray level co-occurrence matrix (GLCM) that may helpful to the clinical experts. Here, we have used the BraTs (“Multimodal Brain Tumor Segmentation Challenge 2020”) dataset for both the training and testing purpose. It has been monitored that our system has given better classification accuracy as an approximation of 99.47% which can be observed as a good outcome.
Collapse
|
6
|
Mustafa S, Sohail MT, Alroobaea R, Rubaiee S, Anas A, Othman AM, Nawaz M. Éclaircissement to Understand Consumers' Decision-Making Psyche and Gender Effects, a Fuzzy Set Qualitative Comparative Analysis. Front Psychol 2022; 13:920594. [PMID: 35719580 PMCID: PMC9201776 DOI: 10.3389/fpsyg.2022.920594] [Citation(s) in RCA: 14] [Impact Index Per Article: 7.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/14/2022] [Accepted: 05/11/2022] [Indexed: 12/13/2022] Open
Abstract
Consumers' decision-making is complex and diverse in terms of gender. Different social, psychological, and economic factors mold the decision-making preferences of consumers. Most researchers used a variance-based approach to explain consumer decision-making that assumes symmetric relationship between variables. We have collected data from 468 smartwatch users and applied a fuzzy set qualitative comparative analysis (fsQCA) to explain and compare male and female consumers' decision-making complexity. fsQCA assumes that an asymmetric relationship between variables can exist in the real world, and different combinations of variables can lead to the same output. Results explain that different variables have a core and secondary level of impact on consumer decision-making. Hence, we can not claim that certain factors are significant or insignificant for decision-making. fsQCA results revealed that cost value, performance expectancy, and social influence play a key role in consumers' buying decisions. This study has contributed to the existing literature by explaining consumer decision-making by applying configuration and complexity theories and identifying unique solutions for both genders. A major contribution to theoretical literature was also made by this research, which revealed the complexity of consumer purchasing decisions made for new products.
Collapse
Affiliation(s)
- Sohaib Mustafa
- College of Economics and Management, Beijing University of Technology, Beijing, China
| | - Muhammad Tayyab Sohail
- South Asian Research Centre, School of Public Administration, Xiangtan University, Xiangtan, China
| | - Roobaea Alroobaea
- Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia
| | - Saeed Rubaiee
- Department of Industrial and Systems Engineering, College of Engineering, University of Jeddah, Jeddah, Saudi Arabia.,Department of Mechanical and Materials Engineering, College of Engineering, University of Jeddah, Jeddah, Saudi Arabia
| | - A Anas
- Department of Industrial and Systems Engineering, College of Engineering, University of Jeddah, Jeddah, Saudi Arabia
| | - Asem Majed Othman
- Department of Industrial and Systems Engineering, College of Engineering, University of Jeddah, Jeddah, Saudi Arabia
| | - Muhammad Nawaz
- Department of Business Administration, National College of Business Administration and Economics, Lahore, Pakistan
| |
Collapse
|
7
|
Zhou Y, Zhao G, Alroobaea R, Baqasah AM, Miglani R. Research on data mining method of network security situation awareness based on cloud computing. JOURNAL OF INTELLIGENT SYSTEMS 2022. [DOI: 10.1515/jisys-2022-0037] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022] Open
Abstract
Abstract
Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering technology. Knowledge and information about the security situation of a hybrid network has been analyzed using cloud computing strategy. The simulation results show that a cyber security crash occurs in window 20, after which the protection index drops to window 500. The increase in the security index of 500 windows is consistent with the effectiveness of the concept of this document method, indicating that this document method can sense changes in the network security situation. Starting from the first attacked window, the defense index began to decrease. In order to simulate the added network defense, the network security events in the 295th time window were reduced in the original data, and the defense index increased significantly in the corresponding time period, which is consistent with the method perception results, which further verifies the effectiveness and reliability of this method on the network security event perception. This method provides high-precision knowledge of network security situations and improves the security and stability of cloud-based networks.
Collapse
Affiliation(s)
- Ying Zhou
- Department of Science and Technology, Tianjin Open University , Tianjin , 300191 , China
| | - Guodong Zhao
- Network Management and Information Management Center, Ningxia University , Ningxia 750021 , China
| | - Roobaea Alroobaea
- Department Computer Science, College of Computers and Information Technology, Taif University , P. O. Box 11099 , Taif 21944 , Saudi Arabia
| | - Abdullah M. Baqasah
- Department of Information Technology, College of Computers and Information Technology, Taif University , P. O. Box 11099 , Taif 21944 , Saudi Arabia
| | - Rajan Miglani
- School of Electronics and Electrical Engineering, Lovely Professional University , Punjab , India
| |
Collapse
|
8
|
Niu J, Alroobaea R, Baqasah AM, Kansal L. Implementation of network information security monitoring system based on adaptive deep detection. JOURNAL OF INTELLIGENT SYSTEMS 2022. [DOI: 10.1515/jisys-2022-0032] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022] Open
Abstract
Abstract
For a better detection in Network information security monitoring system, the author proposes a method based on adaptive depth detection. A deep belief network (DBN) was designed and implemented, and the intrusion detection system model was combined with a support vector machine (SVM). The data set adopts the NSL-KDD network communication data set, and this data set is authoritative in the security field. Redundant cleaning, data type conversion, normalization, and other processing operations are performed on the data set. Using the data conversion method based on the probability mass function probability mass function coding, a standard data set with low redundancy and low dimensionality can be obtained. Research indicates that when the batch size reaches 64, the accuracy of the test set reaches its maximum value. As the batch size increases, the accuracy first increases and then decreases. When the batch size continues to increase, the model will inevitably fall into the local optimal state, resulting in the degradation of the detection performance of the system. In terms of the false alarm rate, the DBN-SVM model is also the highest; however, it is only 10.73%. Under the premise of increasing the detection rate, the false alarm rate is improved; for the overall detection performance of the model, it is within an acceptable range. In terms of accuracy, the DBN-SVM model also scored the highest. The accuracy rate is the ratio of normal and correct classification for intrusion detection. It can explain the detection ability of the model. In summary, the overall detection ability of the DBN-SVM model is the best. The good classification ability to use SVM is proved, and the classification of low-dimensional features is expected to increase the detection rate of the system.
Collapse
Affiliation(s)
- Jing Niu
- Nanyang Medical College , Nanyang 473000 , China
| | - Roobaea Alroobaea
- Department Computer Science, College of Computers and Information Technology, Taif University , P. O. Box 11099 , Taif 21944 , Saudi Arabia
| | - Abdullah M. Baqasah
- Department of Information Technology, College of Computers and Information Technology, Taif University , P. O. Box 11099 , Taif 21944 , Saudi Arabia
| | - Lavish Kansal
- School of Electronics and Electrical Engineering, Lovely Professional University , Punjab 144411 , India
| |
Collapse
|
9
|
Towards Cognitive Authentication for Smart Healthcare Applications. SENSORS 2022; 22:s22062101. [PMID: 35336276 PMCID: PMC8949031 DOI: 10.3390/s22062101] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/13/2022] [Revised: 03/02/2022] [Accepted: 03/04/2022] [Indexed: 12/14/2022]
Abstract
Secure and reliable sensing plays the key role for cognitive tracking i.e., activity identification and cognitive monitoring of every individual. Over the last years there has been an increasing interest from both academia and industry in cognitive authentication also known as biometric recognition. These are an effect of individuals’ biological and physiological traits. Among various traditional biometric and physiological features, we include cognitive/brainwaves via electroencephalogram (EEG) which function as a unique performance indicator due to its reliable, flexible, and unique trait resulting in why it is hard for an un-authorized entity(ies) to breach the boundaries by stealing or mimicking them. Conventional security and privacy techniques in the medical domain are not the potential candidates to simultaneously provide both security and energy efficiency. Therefore, state-of-the art biometrics methods (i.e., machine learning, deep learning, etc.) their applications with novel solutions are investigated and recommended. The experimental setup considers EEG data analysis and interpretation of BCI. The key purpose of this setup is to reduce the number of electrodes and hence the computational power of the Random Forest (RF) classifier while testing EEG data. The performance of the random forest classifier was based on EEG datasets for 20 subjects. We found that the total number of occurred events revealed 96.1% precision in terms of chosen events.
Collapse
|
10
|
Abstract
Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud computing system and use the data for inappropriate purposes, which may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data handling (HUDH) scheme for big data in cloud computing. The HUDH scheme aims to restrict illegitimate users from accessing the cloud and to provide data security provisions. The proposed HUDH consists of three steps: data encryption, data access, and intrusion detection. The HUDH scheme involves three algorithms: advanced encryption standards (AES) for encryption, attribute-based access control (ABAC) for data access control, and hybrid intrusion detection (HID) for unauthorized access detection. The proposed scheme is implemented using the Python and Java languages. The testing results demonstrated that the HUDH scheme can delegate computation overhead to powerful cloud servers. User confidentiality, access privilege, and user secret key accountability can be attained with more than 97% accuracy.
Collapse
|
11
|
Abstract
Abstract
The data with the advancement of information technology are increasing on daily basis. The data mining technique has been applied to various fields. The complexity and execution time are the major factors viewed in existing data mining techniques. With the rapid development of database technology, many data storage increases, and data mining technology has become more and more important and expanded to various fields in recent years. Association rule mining is the most active research technique of data mining. Data mining technology is used for potentially useful information extraction and knowledge from big data sets. The results demonstrate that the precision ratio of the presented technique is high comparable to other existing techniques with the same recall rate, i.e., the R-tree algorithm. The proposed technique by the mining effectively controls the noise data, and the precision rate is also kept very high, which indicates the highest accuracy of the technique. This article makes a systematic and detailed analysis of data mining technology by using the Apriori algorithm.
Collapse
|