{"title":"Construction of heterogeneous medical knowledge graph from electronic health records","authors":"R. Mythili, N. Parthiban, V. Kavitha","doi":"10.1080/09720529.2022.2068604","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068604","url":null,"abstract":"Abstract Knowledge graph (KG) is a knowledge organization that enables the users to quickly and accurately query the information required. It is stored in the form of triples. It finds its application in various fields of enterprises, academics, medical etc. In this paper, Medical Knowledge Graph is constructed from Electronic Health Records (EHR) that maps the relationships between the entities of patients, disease and drugs. The heterogeneous graph is constructed using different entities derived from distinct datasets and the information is extracted in the form of queries among the wide between the quantity demand and the wide variety of variables. The steps for construction of Medical Knowledge Graph are data collection, Named entity recognition, entity normalization, entity ranking, and Graph Neural Networks. The hybrid approach of Bi-directional Long Short-Term Memory Multi-Head Attention Conditional Random Field (BILSTM-MULATT-CRF) is used for Named Entity Recognition and the result of Precision 91.4%, Recall 90.15% and F1 score 90.77% is obtained.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"921 - 930"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41844829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A pragmatic approach to recover access time of Apriori algorithm by applying intersection on CSS for redefining FIS through matrix implementation in textual data","authors":"N. Verma, Vaishali Singh","doi":"10.1080/09720529.2022.2068601","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068601","url":null,"abstract":"Abstract Nowadays data analytics OLAP (online Analytical Processing) is mostly accepted domain of current researchers and the concept of data mining serves better for the same. There are so many data mining methodologies defined for data analytics. Mining Association rule is widely used in data mining methods for data categorization. Apriori Algorithm is popular method for defining n-element. Frequent item set form k number of huge transactional data set online transaction processing (OLTP) using Association Mining rule (AMR). In this paper, researchers executed original Apriori on transactional data set containing 35039 number of transactions, divided into three data sets DS-1 to DS-3 with 20039, 12000, 5000 number of transactions with variable length with minimum support of 30%, 60% and 80% respectively. Researchers carried out experimental work and compared results of Apriori Algorithm with our proposed algorithm (enhanced version of Apriori algorithm) on the same perimeter and state improvement with 11%, 30% and 27% of Rate of Improvements in DS-1 to Ds-3 respectively for 30% minimum support. Our proposed algorithm is working far much better then Apriori algorithm at each parameter which was included to conclude the results.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"871 - 878"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47604949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Gowri, R. Surendran, J. Jabez, Senduru Srinivasulud
{"title":"IoT forensics: What kind of personal data can be found on discarded, recycled, or re-sold IoT devices","authors":"S. Gowri, R. Surendran, J. Jabez, Senduru Srinivasulud","doi":"10.1080/09720529.2022.2072422","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072422","url":null,"abstract":"Abstract With the advancement in science and technology, the demand for electronic Internet of Things (IoT) devices has increased to store and process digital data. With the advancement in IoT technology, we are more reliant on IoT devices to perform our regular tasks. IoT Forensics deals with the investigation of IoT devices such as smartphones, tablets, smart watches, or any device which is connected to the Internet. The data on these devices can still be retrieved via IoT forensics even if they are destroyed, resold, or misplaced. Before discarding any IoT device, we must consider how to secure the data stored on them. We are then going to discuss the several types of personal data that could be retrieved from discarded IoT devices. Finally, we are going to discuss the protection measures for the safe disposal of IoT devices.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"999 - 1008"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44549047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Thyagarajan, D. Chithra, J. William Andrews, P. Rama Subramanian, S. Balaji, P. Sathishkumar
{"title":"Companion bot with voice and facial emotion detection with PID based computer vision","authors":"C. Thyagarajan, D. Chithra, J. William Andrews, P. Rama Subramanian, S. Balaji, P. Sathishkumar","doi":"10.1080/09720529.2022.2075069","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075069","url":null,"abstract":"Abstract We live in a world where technology embraces us and makes our lives easier. With increasing technological advances we feel the need for smart robotic assistants/companions to reduce the manual efforts taken by humans in day-to-day tasks and providing the necessary knowledge. In this paper, we develop a smart self companion robot that runs using human voice commands using some standard way of speech and this voice is converted into standard text form which is, in turn, converted into instructions and is fed to the robot, which further performs the necessary actions. The companion is fully automated with the capability of movement based on object tracking and voice response based on facial expression. The three main modules of this work are facial detection, emotion detection, and voice recognition. The bot is a wireless vehicle that will move along the human, interact with them depending on his/their emotions.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"903 - 911"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43003283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analysis of SPARQL usage for information retrieval in heterogeneous domains through various tools","authors":"Rupal Gupta, S. K. Malik","doi":"10.1080/09720529.2022.2072428","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072428","url":null,"abstract":"Abstract SPARQL is a Query Language and a protocol popularly used in web semantics for the information retrieval. It is standard language declared by World Wide Web Consortium for resource description framework. Due to the exponential popularity of semantic web, bigdata, cloud computing, graph databases and linked open data, SPARQL Queries are playing a vital role in the stated domain for managing data with different aspects. This paper summarizes SPARQL usage in various domains touching the latest emerging technologies in computer science and various other fields. A brief analysis has been done of various tools on which SPARQL protocol can be executed for different purposes and it has been analyzed that using such protocols will generate tremendous results in different application areas towards integration of semantic web with different technologies like cloud computing, Linked Open Data (LOD) , Graph Databases and others.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1031 - 1040"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42211854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies","authors":"Anees Ara, Avinash Sharma, D. Yadav","doi":"10.1080/09720529.2022.2075089","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075089","url":null,"abstract":"Abstract User authentication is a measurement challenge for handheld devices and online accounts such as bank accounts, social media accounts etc. because illegal access results in money loss and user privacy. Individual devices, online financial services, and intelligent spaces are three significant areas of concern for customer authentication procedures. Three ways have been identified for authentication factors: i) knowledge-factor, ii) Inherence factor, and iii) possession-factor. This study investigates two-way user authentication through image processing. CNN, RCNN, and Deepface are deep learning algorithms used for image recognition. We used imagechain for image storage and Blockchain for personal information storage (mobile number) to secure the database. The database is stored on an Ethereum-based blockchain. After determining whether the image is fake or real, match the webcam image with the imagechain; if both images match, the one-time password is given to the user’s cellphone number for login access. For image processing, Opencv is employed, and the Python library is used to execute machine and deep learning algorithms for user authentication. Test the proposed model on the 10 to 100 users for authentication. Accuracy of this experiment is 75.35, 76.33, 98.18 and cosine similarities of images are much better between images, but in case of fake image identification it achieved 97.35 % accuracy.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1137 - 1155"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47696173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Malik, Mohit Kumar, Vinay Kumar, A. Gautam, Shikha Verma, Sarvesh Kumar, Dinesh Goyal
{"title":"High level browser security in cloud computing services from cross site scripting attacks","authors":"M. Malik, Mohit Kumar, Vinay Kumar, A. Gautam, Shikha Verma, Sarvesh Kumar, Dinesh Goyal","doi":"10.1080/09720529.2022.2072434","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072434","url":null,"abstract":"Abstract Getting the public cloud is truly hard for associations. Therefore, IT divisions are searching for a cloud-passed on a security plan that gives satisfactory end-customer security. An attacker can send malicious script to web browser in form of JavaScript, Script, Flash or any other type of code. When such type code executes in the browser, cookies redirects it to attacker location. These types of attacks are known as XSS (Cross Site Script) attacks. Cloud security is a discipline of organization wellbeing focused on getting appropriate processing structures. This consolidates securing data private and across the online-based establishments, applications, and stages. Further requests of client with encrypted cookies are sent to web proxy where web proxy decrypts these requests and forward to the web server. Browser information base store the encoded treat which won’t be valuable for the assailant in the event that it takes to utilizing cross-site prearranging assault.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1073 - 1081"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49448424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amit Kumar Gupta, Pushpa Gothwal, D. Goyal, C. Travieso-González
{"title":"IoT-Galvanized pandemic special E-Toilet for generation of sanitized environment","authors":"Amit Kumar Gupta, Pushpa Gothwal, D. Goyal, C. Travieso-González","doi":"10.1080/09720529.2022.2068607","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068607","url":null,"abstract":"Abstract The entire world is enmeshing the pandemic COVID-19, which affected the public health and it is spread all over the world. Every country’s authority is making more and more efforts towards maintaining the public health as well as mental health and are developing the vaccination to control the COVID-19. As COVID-19 is an infected disease for which a sanitized environment must be chosen at top most priority to prevent infection. Most of the countries are facing the problem of incrementing the infection rate of COVID due to griminess problems. Most healthcare industries are also working to create a sanitized environment with incorporation of the Internet of Things (IoT) which is resulting in the smart health care appliances for generating the sanitized environment. In this paper the researchers have developed an IoT- Galvanized Pandemic Special E-Toilet for generation of sanitized environment which resolves the issues of griminess problem. The proposed architecture has been comprising with three levels of working methodology as Occupancy Check, Auto Flush and Auto control of Appliances using Mobile Application. It is implemented using a raspberry pi board, Arduino Uno as a core unit of the system with interfacing the peripherals: IR sensor, Ultrasonic sensor and HC05 Bluetooth module, servo motor, Relay module, CFL lamp and LED. The proposed architecture has been simulated individually using single piece of sensor, then later assembled all the peripheral together and simulated. The proposed architecture can be used in field of education, industries, corporate offices, multiplexes, hospitals etc.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"943 - 954"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49267008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amit Kumar, Ashutosh Kumar, Girraj Khandelwal, Y. Bhardwaj, V. Sharma, G. Sharma
{"title":"Improving the visual quality of a size deterministic visual cryptography scheme for Grayscale Images","authors":"Amit Kumar, Ashutosh Kumar, Girraj Khandelwal, Y. Bhardwaj, V. Sharma, G. Sharma","doi":"10.1080/09720529.2022.2075087","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075087","url":null,"abstract":"Abstract To enhance the security choices in transmission of information over the web, various methods such as cryptography, steganography and digital watermarking have been developed. Visual cryptography has developed in the past decade as an entity that splits the information into two parts in order to complete integration. This system is also secured in a lesser quantity. In this paper a secret message multi-share method is used. In the proposed work input picture is divided into eight portions. The eight portions shares are encrypted before embedding the image in the patchwork image, photo sharing and the image retrieved is the same as the hidden starting image. Results show that the proposed method has optimized the optimal time by 8%, improved PSNR by 11% and lower overhead communication.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1113 - 1123"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42765127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dinesh Goyal, Ruchi Goyal, S. Bhargava, Priyanka Sharma
{"title":"Disease prediction model for secure patient data over cloud using machine learning","authors":"Dinesh Goyal, Ruchi Goyal, S. Bhargava, Priyanka Sharma","doi":"10.1080/09720529.2022.2072438","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072438","url":null,"abstract":"Abstract Patient data at hospitals is non-sharable in current systems and cost of repeated medication is curse to the patients. Also medical treatment perspective changes at every hospital or doctor or diagnostic center. To resolve the issue of availability of medicinal past history of the patients & reduction in cost of treatment with decisive & secure availability of patient records, like prescriptions and lab reports, we implemented an ERP system over cloud in five hospitals. Based on data retrieved from the hospitals of registration (only to ensure privacy of patients) we implement data analytics using machine learning for the prediction of the disease of patients by tracking the record of medical history and also analyzed hospital and doctors information and performance. Our aim is to provide solution for less cost treatment and for regulation and monitoring of health care to Indian Medical Industry.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1183 - 1193"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41313484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}