Preface |
|
xv | |
|
1 Machine Learning-Assisted Remote Patient Monitoring with Data Analytics |
|
|
1 | (26) |
|
|
|
|
2 | (3) |
|
1.1.1 Traditional Patient Monitoring System |
|
|
2 | (1) |
|
1.1.2 Remote Monitoring System |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
5 | (3) |
|
1.2.1 Machine Learning Approaches in Patient Monitoring |
|
|
7 | (1) |
|
1.3 Machine Learning in RPM |
|
|
8 | (7) |
|
1.3.1 Support Vector Machine |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
1.3.4 Logistic Regression |
|
|
11 | (1) |
|
|
12 | (1) |
|
1.3.6 Simple Linear Regression |
|
|
12 | (1) |
|
|
13 | (1) |
|
1.3.8 Naive Bayes Algorithm |
|
|
14 | (1) |
|
|
15 | (6) |
|
|
16 | (1) |
|
1.4.2 Data Pre-Processing |
|
|
17 | (1) |
|
1.4.3 Apply Machine Learning Algorithm and Prediction |
|
|
18 | (3) |
|
|
21 | (2) |
|
|
23 | (1) |
|
1.7 Conclusion 24 References |
|
|
24 | (3) |
|
2 A Survey on Recent Computer-Aided Diagnosis for Detecting Diabetic Retinopathy |
|
|
27 | (32) |
|
|
|
|
|
28 | (1) |
|
|
28 | (3) |
|
|
28 | (1) |
|
|
29 | (2) |
|
2.3 Overview of DL Models |
|
|
31 | (2) |
|
2.3.1 Convolution Neural Network |
|
|
31 | (1) |
|
|
32 | (1) |
|
2.3.3 Boltzmann Machine and Deep Belief Network |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (2) |
|
|
36 | (16) |
|
2.6.1 Segmentation of Blood Vessels |
|
|
36 | (13) |
|
|
49 | (1) |
|
|
50 | (1) |
|
2.6.3.1 Exudate Detection |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
2.7 Discussion and Future Directions |
|
|
52 | (1) |
|
|
53 | (6) |
|
|
53 | (6) |
|
3 A New Improved Cryptography Method-Based e-Health Application in Cloud Computing Environment |
|
|
59 | (26) |
|
|
|
|
|
60 | (2) |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (2) |
|
|
64 | (1) |
|
|
64 | (2) |
|
3.6 Proposed Algorithm for Encryption |
|
|
66 | (7) |
|
3.6.1 Demonstration of Encryption Algorithm |
|
|
66 | (1) |
|
3.6.1.1 When the Number of Columns Selected in the Table is Even |
|
|
66 | (3) |
|
3.6.1.2 When the Number of Columns Selected in the Table is Odd |
|
|
69 | (3) |
|
3.6.2 Flowchart for Encryption |
|
|
72 | (1) |
|
3.7 Algorithm for Decryption |
|
|
73 | (5) |
|
3.7.1 Demonstration of Decryption Algorithm |
|
|
73 | (1) |
|
3.7.1.1 When the Number of Columns Selected in the Table is Even |
|
|
73 | (2) |
|
3.7.1.2 When the Number of Columns Selected in the Table is Odd |
|
|
75 | (3) |
|
3.7.2 Flowchart of Decryption Algorithm |
|
|
78 | (1) |
|
3.8 Experiment and Result |
|
|
78 | (2) |
|
|
80 | (5) |
|
|
80 | (5) |
|
4 Cutaneous Disease Optimization Using Teledermatology Underresourced Clinics |
|
|
85 | (16) |
|
|
|
|
|
|
86 | (1) |
|
4.2 Materials and Methods |
|
|
87 | (1) |
|
4.2.1 Clinical Setting and Teledermatology Workflow |
|
|
87 | (1) |
|
4.2.2 Study Design, Data Collection, and Analysis |
|
|
87 | (1) |
|
|
88 | (7) |
|
4.3.1 Teledermatology in an Underresourced Clinic |
|
|
88 | (1) |
|
4.3.2 Teledermatology Consultations from Uninsured Patients |
|
|
89 | (1) |
|
4.3.3 Teledermatology for Patients Lacking Access to Dermatologists |
|
|
90 | (2) |
|
4.3.4 Teledermatologist Management from Nonspecialists |
|
|
92 | (1) |
|
4.3.5 Segment Factors of Referring PCPs and Their Patients |
|
|
93 | (1) |
|
4.3.6 Teledermatology Operational Considerations |
|
|
94 | (1) |
|
4.3.7 Instruction of PCPs |
|
|
94 | (1) |
|
|
95 | (1) |
|
4.5 Results and Discussion |
|
|
95 | (6) |
|
4.5.1 Challenges of Referring to Teledermatology Services 96 References |
|
|
98 | (3) |
|
5 Cognitive Assessment Based on Eye Tracking Using Device-Embedded Cameras via Tele-Neuropsychology |
|
|
101 | (16) |
|
|
|
|
|
|
102 | (1) |
|
5.2 Materials and Methods |
|
|
102 | (1) |
|
|
102 | (4) |
|
|
102 | (1) |
|
|
103 | (3) |
|
|
106 | (1) |
|
5.3.4 Camera for Eye Tracking |
|
|
106 | (1) |
|
|
106 | (3) |
|
5.4.1 Camera for Tracking Eye |
|
|
106 | (2) |
|
|
108 | (1) |
|
|
108 | (1) |
|
5.4.4 Eye Tracking Camera |
|
|
108 | (1) |
|
5.4.5 Web Camera Human-Coded Scoring |
|
|
108 | (1) |
|
|
109 | (1) |
|
5.5.1 Characteristics of Subject |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
110 | (2) |
|
|
112 | (2) |
|
|
114 | (3) |
|
|
115 | (2) |
|
6 Fuzzy-Based Patient Health Monitoring System |
|
|
117 | (42) |
|
|
|
|
|
|
|
118 | (4) |
|
|
119 | (1) |
|
6.1.2 Existing Patient Monitoring and Diagnosis Systems |
|
|
119 | (1) |
|
6.1.3 Fuzzy Logic Systems |
|
|
120 | (2) |
|
|
122 | (3) |
|
6.2.1 Hardware Requirements |
|
|
122 | (1) |
|
6.2.1.1 Functional Requirements |
|
|
123 | (2) |
|
6.2.1.2 Nonfunctional Specifications |
|
|
125 | (1) |
|
6.3 Software Architecture |
|
|
125 | (15) |
|
6.3.1 The Data Acquisition Unit (DAQ) Application Programmable Interface (API) |
|
|
126 | (2) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
6.3.6 The Fuzzy Logic System |
|
|
131 | (1) |
|
6.3.6.1 Introduction to Fuzzy Logic |
|
|
131 | (1) |
|
6.3.6.2 The Modified Prior Alerting Score (MPAS) |
|
|
132 | (2) |
|
6.3.6.3 Structure of the Fuzzy Logic System |
|
|
134 | (1) |
|
6.3.7 Designing a System in Fuzzy |
|
|
135 | (1) |
|
|
135 | (3) |
|
6.3.7.2 The Output Variable |
|
|
138 | (2) |
|
6.4 Results and Discussion |
|
|
140 | (15) |
|
6.4.1 Hardware Sensors Validation |
|
|
140 | (1) |
|
6.4.2 Implementations, Testing, and Evaluation of the Fuzzy Logic Engine |
|
|
141 | (5) |
|
|
146 | (1) |
|
|
146 | (7) |
|
6.4.5 High Risk Group (HRG) |
|
|
153 | (2) |
|
6.5 Conclusions and Future Work |
|
|
155 | (4) |
|
6.5.1 Summary and Concluding Remarks |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (4) |
|
7 Artificial Intelligence: A Key for Detecting COVID-19 Using Chest Radiography |
|
|
159 | (20) |
|
|
|
|
|
|
|
160 | (2) |
|
|
162 | (1) |
|
7.2.1 Traditional Approach |
|
|
162 | (1) |
|
7.2.2 Deep Learning-Based Approach |
|
|
163 | (1) |
|
7.3 Materials and Methods |
|
|
163 | (8) |
|
7.3.1 Data Set and Data Pre-Processing |
|
|
163 | (2) |
|
|
165 | (6) |
|
7.4 Experiment and Result |
|
|
171 | (3) |
|
|
171 | (2) |
|
7.4.2 Comparison with Other Models |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
175 | (4) |
|
|
176 | (3) |
|
8 An Efficient IoT Framework for Patient Monitoring and Predicting Heart Disease Based on Machine Learning Algorithms |
|
|
179 | (22) |
|
|
|
|
|
|
180 | (2) |
|
|
182 | (1) |
|
8.3 Machine Learning Algorithms |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
185 | (7) |
|
8.5.1 Data Set Description |
|
|
185 | (1) |
|
8.5.2 Collection of Values Through Sensor Nodes |
|
|
186 | (1) |
|
8.5.3 Storage of Data in Cloud |
|
|
187 | (1) |
|
8.5.4 Prediction with Machine Learning Algorithms |
|
|
188 | (1) |
|
8.5.4.1 Data Cleaning and Preparation |
|
|
188 | (1) |
|
|
189 | (1) |
|
8.5.4.3 Training and Testing |
|
|
189 | (1) |
|
8.5.5 Machine Learning Algorithms |
|
|
189 | (1) |
|
8.5.5.1 Naive Bayes Algorithm |
|
|
189 | (1) |
|
8.5.5.2 Decision Tree Algorithm |
|
|
190 | (1) |
|
8.5.5.3 K-Neighbors Classifier |
|
|
191 | (1) |
|
8.5.5.4 Logistic Regression |
|
|
192 | (1) |
|
8.6 Performance Analysis and Evaluation |
|
|
192 | (5) |
|
|
197 | (4) |
|
|
197 | (4) |
|
9 BABW: Biometric-Based Authentication Using DWT and FFNN |
|
|
201 | (20) |
|
|
|
|
|
202 | (1) |
|
|
203 | (5) |
|
9.3 BABW: Biometric Authentication Using Brain Waves |
|
|
208 | (3) |
|
9.4 Results and Discussion |
|
|
211 | (4) |
|
|
215 | (6) |
|
|
216 | (5) |
|
10 Autism Screening Tools With Machine Learning and Deep Learning Methods: A Review |
|
|
221 | (28) |
|
|
|
|
|
|
222 | (1) |
|
10.2 Autism Screening Methods |
|
|
223 | (5) |
|
10.2.1 Autism Screening Instrument for Educational Planning---3rd Version |
|
|
224 | (1) |
|
10.2.2 Quantitative Checklist for Autism in Toddlers |
|
|
224 | (1) |
|
10.2.3 Autism Behavior Checklist |
|
|
224 | (1) |
|
10.2.4 Developmental Behavior Checklist-Early Screen |
|
|
225 | (1) |
|
10.2.5 Childhood Autism Rating Scale Version 2 |
|
|
225 | (1) |
|
10.2.6 Autism Spectrum Screening Questionnaire (ASSQ) |
|
|
226 | (1) |
|
10.2.7 Early Screening for Autistic Traits |
|
|
226 | (1) |
|
10.2.8 Autism Spectrum Quotient |
|
|
226 | (1) |
|
10.2.9 Social Communication Questionnaire |
|
|
227 | (1) |
|
10.2.10 Child Behavior Check List |
|
|
227 | (1) |
|
10.2.11 Indian Scale for Assessment of Autism |
|
|
227 | (1) |
|
10.3 Machine Learning in ASD Screening and Diagnosis |
|
|
228 | (10) |
|
|
238 | (4) |
|
|
242 | (7) |
|
|
242 | (7) |
|
11 Drug Target Module Mining Using Biological Multifunctional Score-Based Coclustering |
|
|
249 | (36) |
|
|
|
|
249 | (1) |
|
|
250 | (3) |
|
11.3 Materials and Methods |
|
|
253 | (5) |
|
11.3.1 Biological Terminologies |
|
|
253 | (3) |
|
11.3.2 Functional Coherence |
|
|
256 | (1) |
|
11.3.3 Biological Significances |
|
|
257 | (1) |
|
11.3.4 Existing Approach: MR-CoC |
|
|
257 | (1) |
|
11.4 Proposed Approach: MR-CoCmulti |
|
|
258 | (6) |
|
11.4.1 Biological Score Measures for DTM |
|
|
259 | (1) |
|
11.4.2 Multifunctional Score-Based Co-Clustering Approach |
|
|
259 | (5) |
|
11.5 Experimental Analysis |
|
|
264 | (16) |
|
11.5.1 Experimental Results |
|
|
265 | (15) |
|
|
280 | (1) |
|
|
280 | (5) |
|
|
281 | (1) |
|
|
281 | (4) |
|
12 The Ascendant Role of Machine Learning Algorithms in the Prediction of Breast Cancer and Treatment Using Telehealth |
|
|
285 | (32) |
|
|
|
|
|
|
286 | (3) |
|
|
287 | (1) |
|
12.1.2 Description and Goals |
|
|
287 | (1) |
|
12.1.2.1 Data Exploration |
|
|
288 | (1) |
|
12.1.2.2 Data Pre-Processing |
|
|
288 | (1) |
|
|
288 | (1) |
|
12.1.2.4 Model Selection and Evaluation |
|
|
288 | (1) |
|
|
289 | (15) |
|
12.3 Architecture Design and Implementation |
|
|
304 | (6) |
|
12.4 Results and Discussion |
|
|
310 | (2) |
|
|
312 | (1) |
|
|
313 | (4) |
|
|
314 | (3) |
|
13 Remote Patient Monitoring: Data Sharing and Prediction Using Machine Learning |
|
|
317 | (22) |
|
|
|
|
|
|
318 | (3) |
|
13.1.1 Patient Monitoring in Healthcare System |
|
|
318 | (3) |
|
|
321 | (1) |
|
|
322 | (1) |
|
|
322 | (4) |
|
|
322 | (2) |
|
|
324 | (1) |
|
13.4.3 Design and Architecture |
|
|
325 | (1) |
|
|
326 | (5) |
|
13.6 Results and Discussions |
|
|
331 | (2) |
|
13.7 Privacy and Security Challenges |
|
|
333 | (1) |
|
13.8 Conclusions and Future Enhancement |
|
|
334 | (5) |
|
|
335 | (4) |
|
14 Investigations on Machine Learning Models to Envisage Coronavirus in Patients |
|
|
339 | (20) |
|
|
|
|
|
|
340 | (1) |
|
14.2 Categories of ML Algorithms in Healthcare |
|
|
341 | (2) |
|
14.3 Why ML to Fight COVID-19? Tools and Techniques |
|
|
343 | (1) |
|
14.4 Highlights of ML Algorithms Under Consideration |
|
|
344 | (5) |
|
14.5 Experimentation and Investigation |
|
|
349 | (4) |
|
14.6 Comparative Analysis of the Algorithms |
|
|
353 | (1) |
|
14.7 Scope of Enhancement for Better Investigation |
|
|
354 | (5) |
|
|
356 | (3) |
|
15 Healthcare Informatics: Emerging Trends, Challenges, and Analysis of Medical Imaging |
|
|
359 | (24) |
|
|
|
15.1 Emerging Trends and Challenges in Healthcare Informatics |
|
|
360 | (4) |
|
15.1.1 Advanced Technologies in Healthcare Informatics |
|
|
360 | (1) |
|
15.1.2 Intelligent Smart Healthcare Devices Using IoT With DL |
|
|
361 | (1) |
|
15.1.3 Cyber Security in Healthcare Informatics |
|
|
362 | (1) |
|
15.1.4 Trends, Challenges, and Issues in Healthcare IT Analytics |
|
|
363 | (1) |
|
15.2 Performance Analysis of Medical Image Compression Using Wavelet Functions |
|
|
364 | (7) |
|
|
364 | (2) |
|
15.2.2 Materials and Methods |
|
|
366 | (1) |
|
15.2.3 Wavelet Basis Functions |
|
|
367 | (1) |
|
|
367 | (1) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
15.2.4 Compression Methods |
|
|
370 | (1) |
|
15.2.4.1 Embedded Zero-Trees of Wavelet Transform |
|
|
370 | (1) |
|
15.2.4.2 Set Partitioning in Hierarchical Trees |
|
|
370 | (1) |
|
15.2.4.3 Adaptively Scanned Wavelet Difference Reduction |
|
|
370 | (1) |
|
15.2.4.4 Coefficient Thresholding |
|
|
371 | (1) |
|
15.3 Results and Discussion |
|
|
371 | (9) |
|
|
371 | (1) |
|
15.3.2 Peak Signal to Noise Ratio |
|
|
371 | (9) |
|
|
380 | (3) |
|
|
380 | (1) |
|
|
380 | (3) |
Index |
|
383 | |