The Internet of Medical Things (IoMT). Группа авторов

Чтение книги онлайн.

Читать онлайн книгу The Internet of Medical Things (IoMT) - Группа авторов страница 20

The Internet of Medical Things (IoMT) - Группа авторов

Скачать книгу

problems. The recent published knowledge about use of soft computing in medicine is observed from the literature surveyed and reviewed. This study detects which methodology or methodologies of soft computing are used frequently together to solve the special problems of medicine. According to database searches, the rates of preference of soft computing methodologies in medicine are found as 70% of fuzzy logic-neural networks, 27% of neural networks-genetic algorithms and 3% of fuzzy logic-genetic algorithms in our study results. So far, fuzzy logic-neural networks methodology was significantly used in clinical science of medicine. On the other hand neural networks-genetic algorithms and fuzzy logic-genetic algorithms methodologies were mostly preferred by basic science of medicine. The study showed that there is undeniable interest in studying soft computing methodologies in genetics, physiology, radiology, cardiology, and neurology disciplines.

      The authors also described a decentralized system of managing personal data that users create themselves and control their data. They implement the protocol to change the automatic access control manager on Blockchain, which does not require a third-party trust. Unlike Bitcoin, its system is not strictly a financial transaction; it has to carry instructions for use, such as shared storage, query, and data. Finally, they discussed the extent of future potential Blockchain which can be used as the solution round for reliable computing problems in the community. The platform enables more: Blockchain intended as an access control itself with storage solutions in conjunction with Blockchain. Users rely on third parties and can always be aware of what kind of data is being collected about them and do not need to use them. Additionally, users of Blockchain recognize as the owner of their personal data. Companies, in turn, can focus on helping protect data properly and how to specifically use it without the bins being concerned. In addition, with the decentralization platform, sensitive data is gathered; it should be simple for legal rulings and rules on storage and sharing. In addition, laws and regulations can be programmed in Blockchain, so that they can be applied automatically. In other cases, access to data (or storage) may serve as evidence of that law, as it would be compromised.

      In this review proposed a machine learning-based framework to identify type2 diabetes using EHR. This work utilized 3 years of EHR data. The data was stored in the central repository, which has been managed by the District Bureau of Health in Changning, Shanghai since 2008. The EHR data generated from 10 local EHR systems are automatically deposited into the centralized repository hourly. The machine learning models within the framework, including K-Nearest-Neighbors, Naïve Bayes, Decision Tree, Random Forest, Support Vector Machine, and Logistic Regression. Also, the identification performance was higher than the state-of-the-art algorithm.

      Techniques to reach the clouds have proposed a number of data, continuing to develop techniques that provide tools. This same performance development on cloud software simulated cloud computing environment. Typical cloud environmental simulation test was performed by taking the final test matches result. The damaged devices provided for tolerance and efficiency to meet the environmental consequences of fake cloud workflow software that comes as a scientific and social networking sites [1, 12, 13] are continued to develop a method to obtain a higher amount and take advantage of security capabilities. Co-processor is called cryptographic. This increases cost and increases functionality data protection in a distributed computing [9].

      PaaS (as a protection of data services): The award has become user safety standards. Data protection, data security, and proposals provide data authentication and data protection for administrators, out of some malicious software though. Hindrance single-cloud platform is beneficial for protecting large amounts of application users.

      One fuzzy nearest neighbor technology is the proposed framework for decision rule fuzzy prototype; there are three strategies that determine the membership value of the training samples, helping for more blur results by providing input sample vector with unknown neighbor grade classification. When it is believed to be more than two neighbors, likely, this is why neighbors are between large numbers of parts of the tie, that it, Kashmir nearest neighbor residue groups.

      A cloud technology to avoid data duplication currently uses computing decks, and efferent and convergence remain important management strategy to secure de-duplication. Insured reduction strategy unnecessary data is widely applied to cloud storage despite the mass convergence encryption. The distribution of security is implemented for a major concern. Convergence works as encryption here. Large amounts of key are required to maintain power. At the same time, it is a difficult task.

      Research shows that some areas employ classification of public data to share data in private and technology and to protect personal data. One such classification technology is the k-nearest neighbor algorithm. It is a machine learning to know the types of technology classified as personal data and public data. Personal data is encrypted and sent using RSA technology cloud server.

      A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions, and improve patient care. A CDSS focuses on using knowledge management to get clinical advice based on multiple factors of patient-related

Скачать книгу