4.6 Article

Sehaa: A Big Data Analytics Tool for Healthcare Symptoms and Diseases Detection Using Twitter, Apache Spark, and Machine Learning

期刊

APPLIED SCIENCES-BASEL
卷 10, 期 4, 页码 -

出版社

MDPI
DOI: 10.3390/app10041398

关键词

smart cities; healthcare; Apache Spark; disease detection; symptoms detection; Arabic language; Saudi dialect; Twitter; machine learning; big data; high performance computing (HPC)

资金

  1. Deanship of Scientific Research (DSR) at King Abdulaziz University, Jeddah [RG-6-611-40]

向作者/读者索取更多资源

Smartness, which underpins smart cities and societies, is defined by our ability to engage with our environments, analyze them, and make decisions, all in a timely manner. Healthcare is the prime candidate needing the transformative capability of this smartness. Social media could enable a ubiquitous and continuous engagement between healthcare stakeholders, leading to better public health. Current works are limited in their scope, functionality, and scalability. This paper proposes Sehaa, a big data analytics tool for healthcare in the Kingdom of Saudi Arabia (KSA) using Twitter data in Arabic. Sehaa uses Naive Bayes, Logistic Regression, and multiple feature extraction methods to detect various diseases in the KSA. Sehaa found that the top five diseases in Saudi Arabia in terms of the actual afflicted cases are dermal diseases, heart diseases, hypertension, cancer, and diabetes. Riyadh and Jeddah need to do more in creating awareness about the top diseases. Taif is the healthiest city in the KSA in terms of the detected diseases and awareness activities. Sehaa is developed over Apache Spark allowing true scalability. The dataset used comprises 18.9 million tweets collected from November 2018 to September 2019. The results are evaluated using well-known numerical criteria (Accuracy and F1-Score) and are validated against externally available statistics.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication

Abubakar Sadiq Mohammed, Eirini Anthi, Omer Rana, Neetesh Saxena, Pete Burnap

Summary: Industrial Cyber-Physical Systems (ICPS) rely on Supervisory Control and Data Acquisition (SCADA) for process monitoring and control. However, communication through insecure protocols such as Modbus, DNP3, and OPC Data Access makes these SCADA systems vulnerable to various attacks, including denial of service (DoS) attacks. This paper introduces a novel Field Flooding attack that exploits the packet memory structure of the Modbus protocol to perform a DoS attack on Programmable Logic Controllers (PLCs). The proposed mechanism, utilizing supervised machine learning with the XGBoost algorithm, achieves 99% accuracy in detecting this attack.

COMPUTERS & SECURITY (2023)

Article Computer Science, Software Engineering

Predicting machine behavior from Google cluster workload traces

Adnan Umer, Adnan Noor Mian, Omer Rana

Summary: This study analyzes machine failure and changes in machine lifecycle using Google cluster trace data set. A Markov chain-based model is proposed to predict machine states, and it is validated with actual data, showing a small error.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2023)

Article Computer Science, Theory & Methods

Semantics-based privacy by design for Internet of Things applications

Lamya Alkhariji, Suparna De, Omer Rana, Charith Perera

Summary: This research aims to develop a personal assistant that can provide answers to software engineers' questions about privacy protection during the design phase of IoT system development. The developed PARROT ontology, based on semantic web technologies and representative IoT use cases, can answer up to 58% of privacy-related questions.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Computer Science, Theory & Methods

HierFedML: Aggregator Placement and UE Assignment for Hierarchical Federated Learning in Mobile Edge Computing

Zichuan Xu, Dapeng Zhao, Weifa Liang, Omer F. Rana, Pan Zhou, Mingchu Li, Wenzheng Xu, Hao Li, Qiufen Xia

Summary: This article investigates the cost minimization problem of implementing federated learning requests in a mobile edge computing network and proposes an optimization framework and algorithms. The performance of the proposed algorithms is evaluated through simulations and experiments, showing that they outperform benchmark algorithms in reducing implementation cost.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2023)

Article Mathematics

Blockchain-Assisted Hybrid Harris Hawks Optimization Based Deep DDoS Attack Detection in the IoT Environment

Iyad Katib, Mahmoud Ragab

Summary: The centralized storage structure in IoT applications poses security, privacy, and single point of failure issues, which can be addressed by using blockchain technology. However, DDoS attacks have revealed limitations in blockchain-assisted IoT networks. This study proposes a hybrid Harris Hawks with sine cosine and deep learning-based intrusion detection system (H3SC-DLIDS) to recognize DDoS attacks in a blockchain-supported IoT environment.

MATHEMATICS (2023)

Article Computer Science, Information Systems

BlockFaaS: Blockchain-enabled Serverless Computing Framework for AI-driven IoT Healthcare Applications

Muhammed Golec, Sukhpal Singh Gill, Mustafa Golec, Minxian Xu, Soumya K. Ghosh, Salil S. Kanhere, Omer Rana, Steve Uhlig

Summary: This paper presents a framework called BlockFaaS that integrates serverless platform and blockchain architecture to support dynamic scalability, security, and privacy in AI-based healthcare applications. The results show that BlockFaaS outperforms other frameworks in terms of performance.

JOURNAL OF GRID COMPUTING (2023)

Article Computer Science, Hardware & Architecture

A scalable and flexible platform for service placement in multi-fog and multi-cloud environments

Sadoon Azizi, Pedram Farzin, Mohammad Shojafar, Omer Rana

Summary: Provisioning services for IoT devices faces challenges such as device heterogeneity, diverse QoS requirements, and availability of Cloud and Fog resources. FLEX is proposed as a platform for service placement in multi-Fog and multi-Cloud environments, which broadcasts service requirements and selects suitable providers based on factors like resources, location, QoS, and cost. The proposed algorithm, MCD1, shows significant performance improvements in reducing delay and cost compared to baseline methods and genetic algorithms.

JOURNAL OF SUPERCOMPUTING (2023)

Article Automation & Control Systems

Protocol-based fault detection filtering for memristive neural networks with dynamic quantization

Gang Qin, An Lin, Jun Cheng, Mengjie Hu, Iyad Katib

Summary: This study investigates the issue of event-triggered fault detection filtering for memristive neural networks with dynamic quantization in the discrete-time domain. A novel event-triggered protocol is proposed based on dynamic quantization parameter, fault occurrence probability, and network bandwidth utilization rate, and an asynchronous filter framework is developed to ensure the stability of the system.

JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS (2023)

Article Automation & Control Systems

Probabilistic event-triggered protocol for switched power systems under multi-strategy deception attack

Wei Kang, Gang Qin, Jun Cheng, Huaicheng Yan, Iyad Katib, Jinde Cao

Summary: This paper proposes a security control method for a discrete-time switched power system using a probabilistic event-triggered protocol, which effectively optimizes network resource utilization and improves system security and stability under multi-strategy deception attacks.

JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS (2023)

Article Computer Science, Artificial Intelligence

Adaptive neural network control for Markov jumping systems against deception attacks

Junhui Wu, Gang Qin, Jun Cheng, Jinde Cao, Huaicheng Yan, Iyad Katib

Summary: This paper proposes an innovative approach to mitigate the effects of deception attacks in Markov jumping systems by developing an adaptive neural network control strategy. The approach effectively approximates the unbounded false signals injected by deception attacks and establishes a connection between the joint Markov chain and controller.

NEURAL NETWORKS (2023)

Article Computer Science, Information Systems

Hybrid Hunter-Prey Optimization with Deep Learning-Based Fintech for Predicting Financial Crises in the Economy and Society

Iyad Katib, Fatmah Y. Assiri, Turki Althaqafi, Zenah Mahmoud Alkubaisy, Diaa Hamed, Mahmoud Ragab, Heung-Il Suk

Summary: Smart Fintech, empowered by data science and artificial intelligence, drives automated, intelligent, personalized financial and economic businesses, playing a crucial role in today's technology-driven society and economies.

ELECTRONICS (2023)

Review Computer Science, Information Systems

AI-based fog and edge computing: A systematic review, taxonomy and future directions

Sundas Iftikhar, Sukhpal Singh Gill, Chenghao Song, Minxian Xu, Mohammad Sadegh Aslanpour, Adel N. Toosi, Junhui Du, Huaming Wu, Shreya Ghosh, Deepraj Chowdhury, Muhammed Golec, Mohit Kumar, Ahmed M. Abdelmoniem, Felix Cuadrado, Blesson Varghese, Omer Rana, Schahram Dustdar, Steve Uhlig

Summary: This paper conducts a systematic literature review to analyze the applicability and challenges of AI and ML algorithms in resource management for fog/edge computing environments. Various machine learning, deep learning, and reinforcement learning techniques for edge AI management are discussed. A taxonomy of AI/ML-based resource management techniques for fog/edge computing is proposed, and existing techniques are compared based on this taxonomy. Open challenges and promising future research directions in AI/ML-based fog/edge computing are also identified and discussed.

INTERNET OF THINGS (2023)

Article Computer Science, Information Systems

PARROT: Interactive Privacy-Aware Internet of Things Application Design Tool

Nada Alhirabi, Stephanie Beaumont, Jose Tomas Llanos, Dulani Meedeniya, Omer Rana, Charith Perera

Summary: IoT applications often involve the collection and analysis of sensitive personal data, which requires higher levels of protection. However, software developers commonly neglect privacy practices. To address this issue, a design tool called PARROT is introduced, which helps developers design privacy-aware IoT applications and offers real-time feedback on potential privacy violations.

PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT (2023)

Article Computer Science, Information Systems

Modeling and Characterizing Service Interference in Dynamic Infrastructures

Victor Medel, Unai Arronategui, Omer Rana, Jose Angel Banares, Rafael Tolosana-Calasanz

Summary: Performance interference can occur in cloud systems when different services are executed on the same physical infrastructure, resulting in degraded performance. This study proposes a CFA-based model to estimate performance interference across containers caused by the use of CPU, memory, and IO. The model provides resource characterization through human comprehensible indices expressed as time series, enabling analysis of interference throughout the service execution lifetime. Experiments using real services executed in Docker containers show that the model accurately predicts overall execution time for different service combinations. This approach allows service designers to identify phases likely to cause greater interference and ensure only complementary services are hosted together, enabling more intelligent resource management and scheduling.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

Privacy Preserving and Serverless Homomorphic-Based Searchable Encryption as a Service (SEaaS)

Musfirah Ihtesham, Shahzaib Tahir, Hasan Tahir, Anum Hasan, Aiman Sultan, Saqib Saeed, Omer Rana

Summary: Serverless computing has experienced significant growth due to its adaptability and deployment agility, leading to an increased need for security measures such as searchable encryption. This paper introduces a novel privacy-preserving multiple keyword searchable encryption scheme within a serverless cloud environment, utilizing probabilistic encryption and fully homomorphic encryption to enable secure and efficient searches on encrypted data. Through rigorous testing on a real-world dataset, the proposed scheme demonstrates robust security and usability in preserving the privacy of search queries and access patterns.

IEEE ACCESS (2023)

暂无数据