A multi-parametric machine learning approach using authentication trees for the healthcare industry

被引:4
|
作者
Abunadi, Ibrahim [1 ]
Rehman, Amjad [1 ]
Haseeb, Khalid [1 ,2 ]
Alam, Teg [3 ,4 ]
Jeon, Gwanggil [1 ,5 ,6 ,7 ]
机构
[1] CCIS Prince Sultan Univ, Artificial Intelligence & Data Analyt Lab AIDA, Riyadh, Saudi Arabia
[2] Islamia Coll Peshawar, Dept Comp Sci, Peshawar, Pakistan
[3] Prince Sattam Bin Abdulaziz Univ, Coll Engn, Dept Ind Engn, Al Kharj, Saudi Arabia
[4] Azad Inst Engn & Technol, Azad puram,Chandrawal via Bangla Bazar & Bijnour,N, Lucknow, India
[5] Incheon Natl Univ, Dept Embedded Syst Engn, Incheon, South Korea
[6] CCIS Prince Sultan Univ, Incheon, South Korea
[7] Incheon Natl Univ, Incheon, South Korea
关键词
data distribution; health risks; healthcare industry; internet of things; machine learning; multi-parametric analysis; security; INTERNET; MODEL;
D O I
10.1111/exsy.13202
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Health Things (IoHT) has grown in importance for developing medical applications with the support of wireless communication systems. IoHT is integrated with many sensors to capture the patients' records and transmits them to hospital centres for analysis and reporting. Controlling and managing health records has been addressed in several ways, however, it is noted that two key research problems for vital communication systems are reliability and reducing data loss. To enhance the sustainability of health applications and effectively use the network infrastructure when transferring sensitive data, this research provides a machine learning approach. Moreover, data collected from the IoHTs are protected and can be securely received for physical process in hospitals using authentication trees. Firstly, the undirected graphs are explored based on the multi-parametric machine learning approach to minimize the computation overheads and traffic congestion. Secondly, it evaluates the nodes' level behaviour over the heterogeneous traffic load with efficient identification of redundant links. Finally, in-depth analysis and simulation results have shown that the proposed protocol is more effective than existing approaches for data accuracy and security analysis.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Multi-Source Cyber-Attacks Detection using Machine Learning
    Taheri, Sona
    Gondal, Iqbal
    Bagirov, Adil
    Harkness, Greg
    Brown, Simon
    Chi, CHihung
    2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2019, : 1167 - 1172
  • [22] Comparison of machine learning models based on multi-parametric magnetic resonance imaging and ultrasound videos for the prediction of prostate cancer
    Qi, Xiaoyang
    Wang, Kai
    Feng, Bojian
    Sun, Xingbo
    Yang, Jie
    Hu, Zhengbiao
    Zhang, Maoliang
    Lv, Cheng
    Jin, Liyuan
    Zhou, Lingyan
    Wang, Zhengping
    Yao, Jincao
    FRONTIERS IN ONCOLOGY, 2023, 13
  • [23] Trust aggregation authentication protocol using machine learning for IoT wireless sensor networks
    Chinnaswamy, Santhanakrishnan
    Annapurani, K.
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 91
  • [24] Pattern trees: An effective machine learning approach
    Huang, Zhiheng
    Nikravesh, Masoud
    Gedeon, Tamas D.
    Azvine, Ben
    FORGING NEW FRONTIERS: FUZZY PIONEERS II, 2008, 218 : 399 - +
  • [25] Behavioural Biometric Authentication using Keystroke Features with Machine Learning
    Chandok, Rhea
    Bhoir, Vishwajeet
    Chinnaswamy, Santhanakrishnan
    2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON, 2022,
  • [26] An approach to multi-class imbalanced problem in ecology using machine learning
    Sidumo, Bonelwa
    Sonono, Energy
    Takaidza, Isaac
    ECOLOGICAL INFORMATICS, 2022, 71
  • [27] An intensive healthcare monitoring paradigm by using IoT based machine learning strategies
    Kondaka, Lakshmi Sudha
    Thenmozhi, M.
    Vijayakumar, K.
    Kohli, Rashi
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (26) : 36891 - 36905
  • [28] Security Enhancement in Healthcare Cloud using Machine Learning
    Marwan, Mbarek
    Kartit, Ali
    Ouahmane, Hassan
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 : 388 - 397
  • [29] A Novel Approach for Fraud Detection in Blockchain-Based Healthcare Networks Using Machine Learning
    Mohammed, Mohammed A.
    Boujelben, Manel
    Abid, Mohamed
    FUTURE INTERNET, 2023, 15 (08):
  • [30] Machine learning approach to predict software evolvability using fuzzy binary trees
    Boukadoum, AM
    Sahraoui, HA
    Lounis, H
    IC-AI'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOLS I-III, 2001, : 953 - 960