An approach to remove duplication records in healthcare dataset based on Mimic Deep Neural Network (MDNN) and Chaotic Whale Optimization (CWO)

2021 ◽  
pp. 1063293X2199201
Author(s):  
Anto Praveena M.D. ◽  
Bharathi B

Duplication of data in an application will become an expensive factor. These replication of data need to be checked and if it is needed it has to be removed from the dataset as it occupies huge volume of data in the storage space. The cloud is the main source of data storage and all organizations are already started to move their dataset into the cloud since it is cost effective, storage space, data security and data Privacy. In the healthcare sector, storing the duplicated records leads to wrong prediction. Also uploading same files by many users, data storage demand will be occurred. To address those issues, this paper proposes an Optimal Removal of Deduplication (ORD) in heart disease data using hybrid trust based neural network algorithm. In ORD scheme, the Chaotic Whale Optimization (CWO) algorithm is used for trust computation of data using multiple decision metrics. The computed trust values and the nature of the data’s are sequentially applied to the training process by the Mimic Deep Neural Network (MDNN). It classify the data is a duplicate or not. Hence the duplicates files are identified and they were removed from the data storage. Finally, the simulation evaluates to examine the proposed MDNN based model and simulation results show the effectiveness of ORD scheme in terms of data duplication removal. From the simulation result it is found that the model’s accuracy, sensitivity and specificity was good.

Author(s):  
Nikola Davidović ◽  
Slobodan Obradović ◽  
Borislav Đorđević ◽  
Valentina Timčenko ◽  
Bojan Škorić

The rapid technological progress has led to a growing need for more data storage space. The appearance of big data requires larger storage space, faster access and exchange of data as well as data security. RAID (Redundant Array of Independent Disks) technology is one of the most cost-effective ways to satisfy needs for larger storage space, data access and protection. However, the connection of multiple secondary memory devices in RAID 0 aims to improve the secondary memory system in a way to provide greater storage capacity, increase both read data speed and write data speed but it is not fault-tolerant or error-free. This paper provides an analysis of the system for storing the data on the paired arrays of magnetic disks in a RAID 0 formation, with different number of queue entries for overlapped I/O, where queue depth parameter has the value of 1 and 4. The paper presents a range of test results and analysis for RAID 0 series for defined workload characteristics. The tests were carried on in Microsoft Windows Server 2008 R2 Standard operating system, using 2, 3, 4 and 6 paired magnetic disks and controlled by Dell PERC 6/i hardware RAID controller. For the needs of obtaining the measurement results, ATTO Disk Benchmark has been used. The obtained results have been analyzed and compared to the expected behavior.


2017 ◽  
Vol 1 (4) ◽  
pp. 271-277 ◽  
Author(s):  
Abdullah Caliskan ◽  
Mehmet Emin Yuksel

Abstract In this study, a deep neural network classifier is proposed for the classification of coronary artery disease medical data sets. The proposed classifier is tested on reference CAD data sets from the literature and also compared with popular representative classification methods regarding its classification performance. Experimental results show that the deep neural network classifier offers much better accuracy, sensitivity and specificity rates when compared with other methods. The proposed method presents itself as an easily accessible and cost-effective alternative to currently existing methods used for the diagnosis of CAD and it can be applied for easily checking whether a given subject under examination has at least one occluded coronary artery or not.


Author(s):  
Yong Du ◽  
Yangyang Xu ◽  
Taizhong Ye ◽  
Qiang Wen ◽  
Chufeng Xiao ◽  
...  

Color dimensionality reduction is believed as a non-invertible process, as re-colorization results in perceptually noticeable and unrecoverable distortion. In this article, we propose to convert a color image into a grayscale image that can fully recover its original colors, and more importantly, the encoded information is discriminative and sparse, which saves storage capacity. Particularly, we design an invertible deep neural network for color encoding and decoding purposes. This network learns to generate a residual image that encodes color information, and it is then combined with a base grayscale image for color recovering. In this way, the non-differentiable compression process (e.g., JPEG) of the base grayscale image can be integrated into the network in an end-to-end manner. To further reduce the size of the residual image, we present a specific layer to enhance Sparsity Enforcing Priors (SEP), thus leading to negligible storage space. The proposed method allows color embedding on a sparse residual image while keeping a high, 35dB PSNR on average. Extensive experiments demonstrate that the proposed method outperforms state-of-the-arts in terms of image quality and tolerability to compression.


Author(s):  
Thippa Reddy Gadekallu ◽  
Dharmendra Singh Rajput ◽  
M. Praveen Kumar Reddy ◽  
Kuruva Lakshmanna ◽  
Sweta Bhattacharya ◽  
...  

10.28945/4838 ◽  
2021 ◽  
Vol 16 ◽  
pp. 331-369
Author(s):  
Anshul Jain ◽  
Tanya Singh ◽  
Satyendra Kumar Sharma

Aim/Purpose: The primary purpose of this study is to provide a cost-effective and artificial intelligence enabled security solution for IoT enabled healthcare ecosystem. It helps to implement, improve, and add new attributes to healthcare services. The paper aims to develop a method based on an artificial neural network technique to predict suspicious devices based on bandwidth usage. Background: COVID has made it mandatory to make medical services available online to every remote place. However, services in the healthcare ecosystem require fast, uninterrupted facilities while securing the data flowing through them. The solution in this paper addresses both the security and uninterrupted services issue. This paper proposes a neural network based solution to detect and disable suspicious devices without interrupting critical and life-saving services. Methodology: This paper is an advancement on our previous research, where we performed manual knowledge-based intrusion detection. In this research, all the experiments were executed in the healthcare domain. The mobility pattern of the devices was divided into six parts, and each one is assigned a dedicated slice. The security module regularly monitored all the clients connected to slices, and machine learning was used to detect and disable the problematic or suspicious devices. We have used MATLAB’s neural network to train the dataset and automatically detect and disable suspicious devices. The different network architectures and different training algorithms (Levenberg–Marquardt and Bayesian Framework) in MATLAB software have attempted to achieve more precise values with different properties. Five iterations of training were executed and compared to get the best result of R=99971. We configured the application to handle the four most applicable use cases. We also performed an experimental application simulation for the assessment and validation of predictions. Contribution: This paper provides a security solution for the IoT enabled healthcare system. The architectures discussed suggest an end-to-end solution on the sliced network. Efficient use of artificial neural networks detects and block suspicious devices. Moreover, the solution can be modified, configured and deployed in many other ecosystems like home automation. Findings: This simulation is a subset of the more extensive simulation previously performed on the sliced network to enhance its security. This paper trained the data using a neural network to make the application intelligent and robust. This enhancement helps detect suspicious devices and isolate them before any harm is caused on the network. The solution works both for an intrusion detection and prevention system by detecting and blocking them from using network resources. The result concludes that using multiple hidden layers and a non-linear transfer function, logsig improved the learning and results. Recommendations for Practitioners: Everything from offices, schools, colleges, and e-consultation is currently happening remotely. It has caused extensive pressure on the network where the data flowing through it has increased multifold. Therefore, it becomes our joint responsibility to provide a cost-effective and sustainable security solution for IoT enabled healthcare services. Practitioners can efficiently use this affordable solution compared to the expensive security options available in the commercial market and deploy it over a sliced network. The solution can be implemented by NGOs and federal governments to provide secure and affordable healthcare monitoring services to patients in remote locations. Recommendation for Researchers: Research can take this solution to the next level by integrating artificial intelligence into all the modules. They can augment this solution by making it compatible with the federal government’s data privacy laws. Authentication and encryption modules can be integrated to enhance it further. Impact on Society: COVID has given massive exposure to the healthcare sector since last year. With everything online, data security and privacy is the next most significant concern. This research can be of great support to those working for the security of health care services. This paper provides “Security as a Solution”, which can enhance the security of an otherwise less secure ecosystem. The healthcare use cases discussed in this paper address the most common security issues in the IoT enabled healthcare ecosystem. Future Research: We can enhance this application by including data privacy modules like authentication and authorisation, data encryption and help to abide by the federal privacy laws. In addition, machine learning and artificial intelligence can be extended to other modules of this application. Moreover, this experiment can be easily applicable to many other domains like e-homes, e-offices and many others. For example, e-homes can have devices like kitchen equipment, rooms, dining, cars, bicycles, and smartwatches. Therefore, one can use this application to monitor these devices and detect any suspicious activity.


2019 ◽  
Vol 24 (8) ◽  
pp. 5573-5592 ◽  
Author(s):  
Eslam. M. Hassib ◽  
Ali. I. El-Desouky ◽  
Labib. M. Labib ◽  
El-Sayed M. El-kenawy

Objectives/Backgrounds: Nowadays, heart diseases play a very big role in the universe. The Physicians in practice gives various names for heart diseases such as heart attack, cardiac attack, cardiac arrest etc. Among the computerized methods to find the heart disease, Named Entity Recognition (NER) algorithm is used to find the synonyms for the heart disease text to mine the meaning in medical reports and various applications. Methods/Statistical Analysis: The Heart disease text input data given by the physician is taken for the prepossessing and changes the input content to the desired format, then that resultant output fed as input for the prediction. This research work uses the NER to find the meanings of the heart disease text data and uses the existing two methods Deep Learning Models and whale optimization are combined and proposed a new method Optimal Deep Neural Network (ODNN) for predicting the disease. Findings: For the prediction, weights and ranges of the patient affected data via selected attributes are chosen for the analysis. The result is then classified with the Deep Neural Network to find the accuracy of the algorithms. The performance of ODNN is evaluated by means of classification measures such as precision, recall and f-measure values. Improvement: In future, the other classification algorithms or other text data algorithms were used to find for large amount of text data


2020 ◽  
Vol 245 ◽  
pp. 04008
Author(s):  
Andreas-Joachim Peters ◽  
Michal Kamil Simon ◽  
Elvin Alin Sindrilaru

The storage group of CERN IT operates more than 20 individual EOS[1] storage services with a raw data storage volume of more than 340 PB. Storage space is a major cost factor in HEP computing and the planned future LHC Run 3 and 4 increase storage space demands by at least an order of magnitude. A cost effective storage model providing durability is Erasure Coding (EC) [2]. The decommissioning of CERN’s remote computer center (Wigner/Budapest) allows a reconsideration of the currently configured dual-replica strategy where EOS provides one replica in each computer center. EOS allows one to configure EC on a per file bases and exposes four different redundancy levels with single, dual, triple and fourfold parity to select different quality of service and variable costs. This paper will highlight tests which have been performed to migrate files on a production instance from dual-replica to various EC profiles. It will discuss performance and operational impact, and highlight various policy scenarios to select the best file layout with respect to IO patterns, file age and file size. We will conclude with the current status and future optimizations, an evaluation of cost savings and discuss an erasure encoded EOS setup as a possible tape storage replacement.


The cloud is an online platform that offers services for end-users by ensuring the Quality of services (QoS) of the data. Since, the user’s access data through the internet, therefore problem like Security and confidentiality of cloud data appears. To resolve this problem, encryption mechanism named as Rivest–Shamir–Adleman (RSA) with Triple Data Encryption Standard (DES) approach is used in hybridization. This paper mainly focused on two issues, such as Security and Storage of data. The Security of cloud data is resolved using the encryption approach, whereas, the data storage is performed using Modified Best Fit Decreasing (MBFD) with Whale Optimization algorithm (WOA)&Artificial Neural Network (ANN) approach. The neural network with the whale as an optimization approach model makes sure the high confidentiality of cloud data storage in a managed way. From the experiment, it is analyzed that the proposed cloud system performs better in terms of energy consumption, delay, and Service Level Agreement (SLA) violation.


Sign in / Sign up

Export Citation Format

Share Document