scholarly journals A Smart Architecture for Diabetic Patient Monitoring Using Machine Learning Algorithms

Healthcare ◽  
2020 ◽  
Vol 8 (3) ◽  
pp. 348
Author(s):  
Amine Rghioui ◽  
Jaime Lloret ◽  
Sandra Sendra ◽  
Abdelmajid Oumnad

Continuous monitoring of diabetic patients improves their quality of life. The use of multiple technologies such as the Internet of Things (IoT), embedded systems, communication technologies, artificial intelligence, and smart devices can reduce the economic costs of the healthcare system. Different communication technologies have made it possible to provide personalized and remote health services. In order to respond to the needs of future intelligent e-health applications, we are called to develop intelligent healthcare systems and expand the number of applications connected to the network. Therefore, the 5G network should support intelligent healthcare applications, to meet some important requirements such as high bandwidth and high energy efficiency. This article presents an intelligent architecture for monitoring diabetic patients by using machine learning algorithms. The architecture elements included smart devices, sensors, and smartphones to collect measurements from the body. The intelligent system collected the data received from the patient, and performed data classification using machine learning in order to make a diagnosis. The proposed prediction system was evaluated by several machine learning algorithms, and the simulation results demonstrated that the sequential minimal optimization (SMO) algorithm gives superior classification accuracy, sensitivity, and precision compared to other algorithms.

2021 ◽  
Vol 21 (1) ◽  
Author(s):  
Nayze Lucena Sangreman Aldeman ◽  
Keylla Maria de Sá Urtiga Aita ◽  
Vinícius Ponte Machado ◽  
Luiz Claudio Demes da Mata Sousa ◽  
Antonio Gilberto Borges Coelho ◽  
...  

Abstract Background With the emergence of the new coronavirus pandemic (COVID-19), distance learning, especially that mediated by information and digital communication technologies, has been adopted in all areas of knowledge and at all levels, including medical education. Imminently practical areas, such as pathology, have made traditional teaching based on conventional microscopy more flexible through the synergies of computational tools and image digitization, not only to improve teaching-learning but also to offer alternatives to repetitive and exhaustive histopathological analyzes. In this context, machine learning algorithms capable of recognizing histological patterns in kidney biopsy slides have been developed and validated with a view to building computational models capable of accurately identifying renal pathologies. In practice, the use of such algorithms can contribute to the universalization of teaching, allowing quality training even in regions where there is a lack of good nephropathologists. The purpose of this work is to describe and test the functionality of SmartPathk, a tool to support teaching of glomerulopathies using machine learning. The training for knowledge acquisition was performed automatically by machine learning methods using the J48 algorithm to create a computational model of an appropriate decision tree. Results An intelligent system, SmartPathk, was developed as a complementary remote tool in the teaching-learning process for pathology teachers and their students (undergraduate and graduate students), showing 89,47% accuracy using machine learning algorithms based on decision trees. Conclusion This artificial intelligence system can assist in teaching renal pathology to increase the training capacity of new medical professionals in this area.


2020 ◽  
pp. 1-11
Author(s):  
Jie Liu ◽  
Lin Lin ◽  
Xiufang Liang

The online English teaching system has certain requirements for the intelligent scoring system, and the most difficult stage of intelligent scoring in the English test is to score the English composition through the intelligent model. In order to improve the intelligence of English composition scoring, based on machine learning algorithms, this study combines intelligent image recognition technology to improve machine learning algorithms, and proposes an improved MSER-based character candidate region extraction algorithm and a convolutional neural network-based pseudo-character region filtering algorithm. In addition, in order to verify whether the algorithm model proposed in this paper meets the requirements of the group text, that is, to verify the feasibility of the algorithm, the performance of the model proposed in this study is analyzed through design experiments. Moreover, the basic conditions for composition scoring are input into the model as a constraint model. The research results show that the algorithm proposed in this paper has a certain practical effect, and it can be applied to the English assessment system and the online assessment system of the homework evaluation system algorithm system.


2020 ◽  
Author(s):  
Nandkumar Niture

The AI, deep learning and machine learning algorithms are gaining the ground in every application domain of information technology including information security. In formation security domain knows for traditional password management systems, auto-provisioning systems and user information management systems. There is another raising concern on the application and system level security with ransomware. On the existing systems cyber-attacks of Ransomware asking for ransom increasing every day. Ransomware is the class of malware where the goal is to gain the data through encryption mechanism and render back with the ransom. The ransomware attacks are mainly on the vulnerable systems which are exposed to the network with weak security measures. With the help of machine learning algorithms, the pattern of the attacks can be analyzed. Create or discuss a workaround solution of a machine learning model with combination of cryptographic algorithm which will enhance the effectiveness of the system response to the possible attacks. The other part of the problem, which is hard part to create an intelligence for the organizations for preventing the ransomware attacks with the help of intelligent system password management and intelligent account provisioning. In this paper I elaborate on the machine learning algorithms analysis for the intelligent ransomware detection problem, later part of this paper would be design of the algorithm.


Author(s):  
Angana Saikia ◽  
Vinayak Majhi ◽  
Masaraf Hussain ◽  
Sudip Paul ◽  
Amitava Datta

Tremor is an involuntary quivering movement or shake. Characteristically occurring at rest, the classic slow, rhythmic tremor of Parkinson's disease (PD) typically starts in one hand, foot, or leg and can eventually affect both sides of the body. The resting tremor of PD can also occur in the jaw, chin, mouth, or tongue. Loss of dopamine leads to the symptoms of Parkinson's disease and may include a tremor. For some people, a tremor might be the first symptom of PD. Various studies have proposed measurable technologies and the analysis of the characteristics of Parkinsonian tremors using different techniques. Various machine-learning algorithms such as a support vector machine (SVM) with three kernels, a discriminant analysis, a random forest, and a kNN algorithm are also used to classify and identify various kinds of tremors. This chapter focuses on an in-depth review on identification and classification of various Parkinsonian tremors using machine learning algorithms.


Author(s):  
Minal Shahakar

It might have happened so many times that you or someone yours need doctors help immediately, but they are not available due to some reason. The Heart Disease Prediction application is an end user support to the online. Here, we propose a web application that allows users to get instant guidance on their heart disease through an intelligent system online. The application is fed with various details and the heart disease associated with those details. The applications allows user to share their heart related issues. It then processes user specific details to check for various illnesses that could be associated with it. Here we use some intelligent data mining techniques to the most accurate that could be associated with patient‟s details. Based on result, system automatically shows the result specific doctors for further treatment and the system allows user to view doctor‟s details.


2021 ◽  
Vol 4 (1) ◽  
pp. 14
Author(s):  
Farman Pirzado ◽  
Shahzad Memon ◽  
Lachman Das Dhomeja Dhomeja ◽  
Awais Ahmed

Nowadays, smart devices have become a part of ourlives, hold our data, and are used for sensitive transactions likeinternet banking, mobile banking, etc. Therefore, it is crucial tosecure the data in these smart devices from theft or misplacement.The majority of the devices are secured with password/PINbaseduser authentication methods, which are already proveda less secure or easily guessable user authentication method.An alternative technique for securing smart devices is keystrokedynamics. Keystroke dynamics (KSD) is behavioral biometrics,which uses a natural typing pattern unique in every individualand difficult to fake or replicates that pattern. This paperproposes a user authentication model based on KSD as an additionalsecurity method for increasing the smart devices’ securitylevel. In order to analyze the proposed model, an android-basedapplication has been implemented for collecting data from fakeand genuine users. Six machine learning algorithms have beentested on the collected data set to study their suitability for usein the keystroke dynamics-based authentication model.


2021 ◽  
Vol 251 ◽  
pp. 03057
Author(s):  
Michael Andrews ◽  
Bjorn Burkle ◽  
Shravan Chaudhari ◽  
Davide Di Croce ◽  
Sergei Gleyzer ◽  
...  

Machine learning algorithms are gaining ground in high energy physics for applications in particle and event identification, physics analysis, detector reconstruction, simulation and trigger. Currently, most data-analysis tasks at LHC experiments benefit from the use of machine learning. Incorporating these computational tools in the experimental framework presents new challenges. This paper reports on the implementation of the end-to-end deep learning with the CMS software framework and the scaling of the end-to-end deep learning with multiple GPUs. The end-to-end deep learning technique combines deep learning algorithms and low-level detector representation for particle and event identification. We demonstrate the end-to-end implementation on a top quark benchmark and perform studies with various hardware architectures including single and multiple GPUs and Google TPU.


2020 ◽  
Author(s):  
Nandkumar Niture

The AI, deep learning and machine learning algorithms are gaining the ground in every application domain of information technology including information security. In formation security domain knows for traditional password management systems, auto-provisioning systems and user information management systems. There is another raising concern on the application and system level security with ransomware. On the existing systems cyber-attacks of Ransomware asking for ransom increasing every day. Ransomware is the class of malware where the goal is to gain the data through encryption mechanism and render back with the ransom. The ransomware attacks are mainly on the vulnerable systems which are exposed to the network with weak security measures. With the help of machine learning algorithms, the pattern of the attacks can be analyzed. Create or discuss a workaround solution of a machine learning model with combination of cryptographic algorithm which will enhance the effectiveness of the system response to the possible attacks. The other part of the problem, which is hard part to create an intelligence for the organizations for preventing the ransomware attacks with the help of intelligent system password management and intelligent account provisioning. In this paper I elaborate on the machine learning algorithms analysis for the intelligent ransomware detection problem, later part of this paper would be design of the algorithm.


Author(s):  
Angana Saikia ◽  
Vinayak Majhi ◽  
Masaraf Hussain ◽  
Sudip Paul ◽  
Amitava Datta

Tremor is an involuntary quivering movement or shake. Characteristically occurring at rest, the classic slow, rhythmic tremor of Parkinson's disease (PD) typically starts in one hand, foot, or leg and can eventually affect both sides of the body. The resting tremor of PD can also occur in the jaw, chin, mouth, or tongue. Loss of dopamine leads to the symptoms of Parkinson's disease and may include a tremor. For some people, a tremor might be the first symptom of PD. Various studies have proposed measurable technologies and the analysis of the characteristics of Parkinsonian tremors using different techniques. Various machine-learning algorithms such as a support vector machine (SVM) with three kernels, a discriminant analysis, a random forest, and a kNN algorithm are also used to classify and identify various kinds of tremors. This chapter focuses on an in-depth review on identification and classification of various Parkinsonian tremors using machine learning algorithms.


Sign in / Sign up

Export Citation Format

Share Document