Artificial Neural Network Based Method for Classification of Gene Expression Data of Human Diseases along with Privacy Preserving
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 2
Abstract
In this paper, the author introduces a classification approach using Artificial Neural Network(ANN) with Back-Propagation learning technique for human diseases like Cancer and heart problems from clinical diagnosis data. Clinical diagnosis is done mostly by experienced doctors with expertise in this field. In many cases, the test results are not effective towards the diagnosis of the disease. The author is particular about the wrong diagnosis which leads to a wrong treatment. The author is using Artificial Neural Network technique to classify the disease with reduced number of DNA sequence. The accuracy is differing based on the training data set and validation data set. The other major issue is the privacy preserving of the patients. As we are sharing the critical data from clinical diagnostic centers, there is good chance of patient’s anonymity is revealed. To avoid this, the author is using a simple Privacy Preserving in Data Mining (PPDM) technique to crypt the identity of the patients as well as the critical data and discloses only the required data like DNA sequence to the research team, as they are not much interested in the identity or the owner of the diagnosis report.
Authors and Affiliations
Sathish Kumar Subramanian, Duraipandian N
Intrinsic and Extrinsic Motivation to E learning in Higher Education Institutions
There were many researches which were conducted about implementation of e learning in Higher Education Institutions, but few of them were focused on the motivation of e learning. Even though, there are many applications...
A Reference Model and a vision for manufacturing system for 2030
The manufacturing enterprises are now experiencing high pressure of competition. In addition, the advancement in computer software, hardware, networks, information technologies and integration has been gradually reshapin...
PERFORMANCE ANALYSIS OF EFFECT RATE OF CROSS LAYER BASED INTRUSION DETECTION FOR WIRELESS LAN
Wireless ad-hoc networks are vulnerable to various kinds of security threats and attacks due to relative ease of access to wireless medium and lack of a centralized infrastructure. Security is an alarming concern, as eve...
AN APPROACH TO GENERATE MST WITHOUT CHECKING CYCLE
Abstract: A minimum spanning tree of an undirected graph can be easily obtained using classical algorithms by Prim or Kruskal. MST generation is a NP hard problem. Now this paper represents an algorithm to find minimum s...
CONCEPTUAL THREE PHASE ITERATIVE MODEL OF KDD
KDD process includes how data is stored and accessed, how andwhat algorithms can apply to large amount of data efficiently,how results can be interpreted and visualized. KDD is theprocess of identifying valid, interestin...