Using data mining techniques to identify factors associated with medication non-adherence

Authors

  • Vinay Kumar Jaiswal
  • Varri Srinivasa Rao

DOI:

https://doi.org/10.52783/jns.v14.1569

Keywords:

Internet of things (IoT), privacy and security, encryption algorithm, pattern-based attack on the bf-encoded data

Abstract

Techniques for data mining and machine learning have recently become widely used in the healthcare industry. The goal of this research is to create an automated method of disease diagnosis. Here, three distinct methods for disease diagnosis utilizing data mining techniques are proposed: the hybrid fuzzy decision making tree approach, the association rule-based approach, and the efficient hybrid approach. The first strategy suggests an effective hybrid technique to lower the number of outliers. In data mining, outlier detection is a current study topic. The items that reside outside of the clusters are highlighted and identified as outliers if clustering techniques are applied. However, a small number of unidentified pieces might be added to the cluster. Therefore, it becomes vital to identify and remove such data that has been merged with the clusters in order to fully remove the unnecessary data from the dataset. The suggested method uses two datamining methods, Multilayer Neural Networks (MLN) and density-based K-means, to find outliers in a data set. When evaluated on the UCI repository, the suggested system outperforms the current ones in terms of disease prediction. The classification accuracy has increased while the time complexity has decreased.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

Nabi SA, Kalpana P, Chandra NS, Smitha L, Naresh K, Ezugwu AE, Abualigah L. Distributed private preserving learning based chaotic encryption framework for cognitive healthcare IoT systems. Informatics in Medicine Unlocked. 2024 Jan 1;49:101547. https://doi.org/10.1016/j.imu.2024.101547

Xie Q, Jiang S, Jiang L, Huang Y, Zhao Z, Khan S, Dai W, Liu Z, Wu K. Efficiency optimization techniques in privacy-preserving federated learning with homomorphic encryption: A brief survey. IEEE Internet of Things Journal. 2024 Jul 8;11(14):24569-80. https://doi.org/10.1109/JIOT.2024.3382875

Aswathy RH, Srithar S, Dayana KR, Suresh P. MIAS: an IoT based multiphase identity authentication server for enabling secure communication. Journal of Internet Services and Information Security (JISIS). 2023;13(4):114-26. https://doi.org/10.58346/JISIS.2023.I4.008

Su J, Bangalore L, Berger H, Yi J, Castor A, Sherr M, Venkitasubramaniam M. SCIF: Privacy-Preserving Statistics Collection with Input Validation and Full Security. Cryptology ePrint Archive. 2024.

Kofod-Petersen A, Cassens J. Proxies for privacy in ambient systems.

Nabi SA, Kalpana P, Chandra NS, Smitha L, Naresh K, Ezugwu AE, Abualigah L. Distributed private preserving learning based chaotic encryption framework for cognitive healthcare IoT systems. Informatics in Medicine Unlocked. 2024 Jan 1;49:101547. https://doi.org/10.1016/j.imu.2024.101547

Gandomkar H, Nazari S, Hosseini P, Abdolhay HA. Genome-wide assessment and characterization of simple sequence repeats (SSRs) makers for Capoeta aculeata (Valenciennes, 1844) using NGS data. International Journal of Environmental Research and Education. 2022 May 10;2(2):16-28. https://doi.org/10.70102/IJARES/V2I2/4

Kumar R, Kumar P, Jolfaei A, Islam AN. An integrated framework for enhancing security and privacy in iot-based business intelligence applications. In2023 IEEE International Conference on Consumer Electronics (ICCE) 2023 Jan 6 (pp. 01-06). IEEE. https://doi.org/10.1109/ICCE56470.2023.10043450

Aravindhan S. A Flexible Structure's Active Vibration Suppression Using Smart Materials. Association Journal of Interdisciplinary Technics in Engineering Mechanics. 2023 Oct 9;1(1):55-61.

Alkaim AF, Khan M. Pharmacist-Led Medication Therapy Management: A Review of Its Effectiveness in Improving Patient Outcomes. Clinical Journal for Medicine, Health and Pharmacy. 2024 Dec 20;2(4):31-9.

Shahabadkar R, Govinda S, Firdose S. Integrated privacy preservation with novel encoding and encryption for securing video in internet-of-things. InComputer Science On-line Conference 2023 Apr 3 (pp. 217-227). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-031-35317-8_19

Donkor K, Zhao Z. The impact of digital transformation on business models: a study of industry disruption. Glob Perspect Manag. 2024;2(3):1-12.

Lee S, Lee G, Kim JW, Shin J, Lee MK. HETAL: efficient privacy-preserving transfer learning with homomorphic encryption. InInternational Conference on Machine Learning 2023 Jul 3 (pp. 19010-19035). PMLR.

Ghalami A, Naderi H. A new approach to trajectory data clustering. Int Acad J Sci Eng. 2016;3(1):41-52.

Alshammari A, El Hindi K. Privacy-Preserving Deep Learning Framework Based on Restricted Boltzmann Machines and Instance Reduction Algorithms. Applied Sciences. 2024 Feb 1;14(3):1224. https://doi.org/10.3390/app14031224

He D, Kumar N, Khan MK, Wang L, Shen J. Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Systems Journal. 2016 Dec 28;12(2):1621-31. https://doi.org/10.9756/IAJIR/V10I1/IAJIR1001

Kumar C, Chittora P. Secure and Privacy-Preserving Framework for IoT-Enabled Smart Grid Environment. Arabian Journal for Science and Engineering. 2024 Mar;49(3):3063-78. https://doi.org/10.1007/s13369-023-07900-y

Downloads

Published

2025-02-06

How to Cite

1.
Kumar Jaiswal V, Srinivasa Rao V. Using data mining techniques to identify factors associated with medication non-adherence. J Neonatal Surg [Internet]. 2025Feb.6 [cited 2025Mar.20];14(1S):506-11. Available from: https://jneonatalsurg.com/index.php/jns/article/view/1569

Most read articles by the same author(s)