43
Views
0
CrossRef citations to date
0
Altmetric
Computers and Computing

A Real-Time Data Clustering Scheme Using K-Medoids Based Optimal Neural Network Approach for Integrating Demographics and Diagnosis Codes

&

References

  • National Center for Research Resources (US). Widening the Use of Electronic Health Record Data for Research, 2009.
  • X. Wang, D. Sontag, and F. Wang, “Unsupervised learning of disease progression models,” in Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014, pp. 85–94.
  • J. Reynolds, “Gambling on big data: Designing risk in social casino games,” Eur. J. Risk. Regul., Vol. 10, no. 1, pp. 116–31, 2019.
  • C. J. Chung, Y. Rhee, and H. Cha, “Big data analyses of Korea’s nation branding on Google and Facebook,” Korea Obs., Vol. 51, no. 1, pp. 151–74, 2020.
  • S. Paul, S. Saha, and R. T. Goswami, “Testbeds, attacks, and dataset generation for big data cluster: A system application for big data platform security analysis,” in Progress in Computing, Analytics and Networking, Singapore: Springer, 2020, pp. 545–54.
  • V. Sundararaj, S. Muthukumar, and R. S. Kumar, “An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks,” Comput. Secur., Vol. 77, pp. 277–88, 2018.
  • S. Vinu, “An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm,” Int. J. Intell. Eng. Syst., Vol. 9, no. 3, pp. 117–26, 2016.
  • V. Sundararaj, “Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction,” Int. J. Biomed. Eng. Technol., Vol. 31, no. 4, pp. 325, 2019.
  • V. Sundararaj, et al., “CCGPA-MPPT: Cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system,” Prog. Photovoltaics Res. Appl., Vol. 28, no. 11, pp. 1128–45, 2020.
  • S. Ravikumar, and D. Kavitha, “CNN-OHGS: CNN-oppositional-based Henry gas solubility optimization model for autonomous vehicle control system,” J. Field Rob. (2021).
  • S. Ravikumar, and D. Kavitha, “Iot based home monitoring system with secure data storage by Keccak–Chaotic sequence in cloud server,” J. Ambient. Intell. Humaniz. Comput., 1–13, 2020.
  • M. R. Rejeesh, “Interest point based face recognition using adaptive neuro fuzzy inference system,” Multimed. Tools. Appl., Vol. 78, no. 16, p. 22691–710, 2019.
  • D. Kavitha, and S. Ravikumar, “IOT and context-aware learning-based optimal neural network model for real-time health monitoring,” Trans. Emerging Telecommun. Technol., Vol. 32, no. 1, pp. e4132, 2021.
  • B. A. Hassan, and T. A. Rashid, “Datasets on statistical analysis and performance evaluation of backtracking search optimisation algorithm compared with its counterpart algorithms,” Data. Brief., Vol. 28, p. 105046, 2020.
  • B. A. Hassan, “CSCF: A chaotic sine cosine firefly algorithm for practical application problems,” Neural Comput. Appl., 1–20, 2020.
  • B. A. Hassan, T. A. Rashid, and S. Mirjalili, “Formal context reduction in deriving concept hierarchies from corpora using adaptive evolutionary clustering algorithm star,” Complex Intell. Syst., 1–16, 2021.
  • K. S. Haseena, S. Anees, and N. Madheswari, “Power optimization using EPAR protocol in MANET. International Journal of innovative science,” Eng. Technol., Vol. 6, pp. 430–36, 2014.
  • S. Nisha, and A. N. Madheswari, “Secured authentication for internet voting in corporate companies to prevent phishing attacks,” Int. J. Emerging Technol. Comput. Sci. Electron., Vol. 22, no. 1, pp. 45–9, 2016.
  • K. Albury, J. Burgess, B. Light, K. Race, and R. Wilken, “Data cultures of mobile dating and hook-up apps: Emerging issues for critical social science research,” Big. Data Soc., Vol. 4, no. 2, p. 2053951717720950, 2017.
  • E. T. Edirisinghe, and C. Hewawasam, “An investigation of the relationship of streetscape visual enclosure and the pedestrian movement in selected case studies in Colombo,” J. Eng., Vol. 8, no. 1, pp. 11–30, 2020.
  • A. Hearn, “Verified: Self-presentation, identity management, and selfhood in the age of big data,” Popular Commun., Vol. 15, no. 2, pp. 62–77, 2017.
  • W. Li, Z. Su, K. Zhang, A. Benslimane, and D. Fang, “Defending malicious check-in using big data analysis of indoor positioning system: An access point selection approach,” IEEE Trans. Network Sci. Eng., 2020.
  • G. Poulis, G. Loukides, S. Skiadopoulos, and A. Gkoulalas-Divanis, “Anonymizing datasets with demographics and diagnosis codes in the presence of utility constraints infor,” J. Biomed. Matics, Vol. 65, pp. 76–96, 2017.
  • A. Jabbar, P. Akhtar, and S. Dani, “Real-time big data processing for instantaneous marketing decisions: A problematization approach,” Ind. Mark. Manage., Vol. 90, pp. 558–69, 2020.
  • G. Vialetto, and M. Noro, “An innovative approach to design cogeneration systems based on big data analysis and use of clustering methods,” Energy Convers. Manage., Vol. 214, p. 112901, 2020.
  • K. Kumar, D. D. Shrimankar, and N. Singh, “Eratosthenes sieve based key-frame extraction technique for event summarization in videos,” Multimed. Tools. Appl., Vol. 77, no. 6, pp. 7383–404, 2018.
  • K. Kumar, and D. D. Shrimankar, “F-DES: Fast and deep event summarization,” IEEE Trans. Multimed., Vol. 20, no. 2, pp. 323–34, 2018.
  • K. Kumar, D. D. Shrimankar, and N. Singh, “Equal partition based clustering approach for event summarization in videos,” in 2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), IEEE, 2016, pp. 119–26.
  • K. Kumar, D. D. Shrimankar, and N. Singh, “Event bagging: A novel event summarization approach in multiview surveillance videos,” in 2017 International Conference on Innovations in Electronics, Signal Processing and Communication (IESC), IEEE, 2017, pp. 106–11.
  • K. Kumar, and D. D. Shrimankar, “Deep event learning boost-up approach: Delta,” Multimed. Tools. Appl., Vol. 77, no. 20, pp. 26635–55, 2018.
  • S. Sharma, S. N. Shivhare, N. Singh, and K. Kumar, “Computationally efficient ann model for small-scale problems,” in Machine intelligence and signal analysis, Singapore: Springer, 2019, pp. 423–35.
  • O. Choudhury, A. Gkoulalas-Divanis, T. Salonidis, I. Sylla, Y. Park, G. Hsu, and A. Das, “A syntactic approach for privacy-preserving federated learning,” ECAI 2020, 1762–69, 2020. IOS Press.
  • L. Sweeney, “k-anonymity: A model for protecting privacy,” Int. J. Uncertain. Fuzziness Knowl.-Based Syst., Vol. 10, no. 05, pp. 557–70, 2002.
  • G. Loukides, J. Liagouris, A. Gkoulalas-Divanis, and M. Terrovitis, “Disassociation for electronic health record privacy,” J. Biomed. Inform., Vol. 50, pp. 46–61, 2014.
  • G. Poulis, G. Loukides, A. Gkoulalas-Divanis, and S. Skiadopoulos, “Anonymizing data with relational and transaction attributes,” in Joint European Conference on Machine Learning and Knowledge Discovery in Databases, Berlin, Heidelberg: Springer, 2013, pp. 353–69.
  • T. Takahashi, K. Sabataka, and T. Mori, “Efficient and tailor-made anonymization for relational and transactional medical records,” in Workshop on Data Science for Social Good at KDD, 2014.
  • J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. W.-C. Fu, “Utility-based anonymization using local recoding,” in Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006, pp. 785–90.
  • L. Kaufman, and J. P. Rousseeuw. Finding Groups in Data: An Introduction to Cluster Analysis. Vol. 344. John Wiley and Sons, 2009.
  • L. Kaufman, and P. J. Rousseeuw, “Partitioning around medoids (program PAM),” in Finding Groups in Data: An Introduction to Cluster Analysis, vol. 344, Wiley, 1990, pp. 68–125.
  • E. S. M. El-Alfy, “Detection of phishing websites based on probabilistic neural networks and K-medoids clustering,” Comput. J., Vol. 60, no. 12, pp. 1745–59, 2017.
  • T. Zhang, Y. Liu, Y. Rao, X. Li, and Q. Zhao, “Optimal design of building environment with hybrid genetic algorithm, artificial neural network, multivariate regression analysis and fuzzy logic controller,” Build. Environ., Vol. 175, no. 106810, 2020.
  • D. Chen, S. Li, and L. Liao, “A recurrent neural network applied to optimal motion control of mobile robots with physical constraints,” Appl. Soft. Comput., Vol. 85, no. 105880, 2019.
  • Informs Data Mining Contest, Informs data mining contest data sets, 2008. Available: https://sites.google.com/site/informsdataminingcontest/data/.
  • Vermont Department of Health, Vermont uniform hospital discharge data sets, 2017. Available: http://www.healthvermont.gov/health-statistics-vital-records/healthcare-systems-reporting/hospital-discharge-data.
  • K. Finison, et al., “Risk-adjustment methods for all-payer comparative performance reporting in vermont,” BMC Health Serv. Res., Vol. 17, pp. 1–58, 2017.
  • R. C. de Amorim, and C. Hennig, “Recovering the number of clusters in data setswith noise features using feature rescaling factors,” Inf. Sci. (Ny), Vol. 324, pp. 126–45, 2015.
  • S. Bozonnet, N. W. Evans, and C. Fredouille, “The LIA-EURECOM RT’09 speaker diarization system: Enhancements in speaker modelling and cluster purification,” in 2010 IEEE International Conference on Acoustics, Speech and Signal Processing IEEE, Mar. 2010, pp. 4958–61.
  • J. Hämäläinen, S. Jauhiainen, and T. Kärkkäinen, “Comparison of internal clustering validation indices for prototype-based clustering,” Algorithms, Vol. 10, no. 3, p. 105, 2017.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.