2021
DOI: 10.5815/ijeme.2021.02.05
|View full text |Cite
|
Sign up to set email alerts
|

Predictive Intelligent Decision Support Model in Forecasting of the Diabetes Pandemic Using a Reinforcement Deep Learning Approach

Abstract: Diabetes has since become global pandemicwhich must be diagnosed early enough if the patients are to survive a while longer. Traditional means of detection has its limitations and defects. The adoption of data mining tools and adaptation of machine intelligence is to yield an approach of predictive diagnosis that offers solution to task, which traditional means do not proffer low-cost-effective results. The significance thus, is to investigate data feats rippled with ambiguities and noise as well as simulate m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 17 publications
1
8
0
Order By: Relevance
“…The system properly set-up will achieve: (a) the honeypot can easily identify the system vulnerabilities as an adversary tries to access the honey-net and used them, (b) the honey-net will gathered data that seeks to identify which methods was employed by the adversary to capture data, (c) the honey-net will seek alternatives to such attack with various purposes aimed to capture, delete or alter data in the server, (d) knowing that some adversaries access a network via malicious script on a user browser and/or via malware -the honey-net will monitor, redirect any user to other sites via designated URLs and/or detect user source IP, (e) for connection logs recorded, the honey-net will show which attack was done more frequently on the web application, (f) honey-net will seeks to unveil the source IP address of the adversaries as it employs trace-back to track the source and origin of the attacks, (g) with the connection logs studied, it tells the net-administrator the pattern of attacks that were successful and those that failed, (h) the recorded data on the honeypot will also further show tools and techniques are employed by hackers (Ejeh et al, 2022;Ejim, 2017;Iskandarov, 2020;Ojugo & Ekurume, 2021b.…”
Section: Experimental Testbed Setupmentioning
confidence: 99%
“…The system properly set-up will achieve: (a) the honeypot can easily identify the system vulnerabilities as an adversary tries to access the honey-net and used them, (b) the honey-net will gathered data that seeks to identify which methods was employed by the adversary to capture data, (c) the honey-net will seek alternatives to such attack with various purposes aimed to capture, delete or alter data in the server, (d) knowing that some adversaries access a network via malicious script on a user browser and/or via malware -the honey-net will monitor, redirect any user to other sites via designated URLs and/or detect user source IP, (e) for connection logs recorded, the honey-net will show which attack was done more frequently on the web application, (f) honey-net will seeks to unveil the source IP address of the adversaries as it employs trace-back to track the source and origin of the attacks, (g) with the connection logs studied, it tells the net-administrator the pattern of attacks that were successful and those that failed, (h) the recorded data on the honeypot will also further show tools and techniques are employed by hackers (Ejeh et al, 2022;Ejim, 2017;Iskandarov, 2020;Ojugo & Ekurume, 2021b.…”
Section: Experimental Testbed Setupmentioning
confidence: 99%
“…Therefore, identifying the factors that increase customer churn is very important. In addition, the use of machine learning is ubiquitous from the classification of fake news [14] to the prediction of student performance [15], and it is not rare to be used for forecasting of the diabetes pandemic [16].…”
Section: Machine Learning Algorithmmentioning
confidence: 99%
“…Patient records and history are often not readily available to expert personnel to medical facilities other than where such records are created [5]. Other include: (a) issues of care coordination, (b) non-provision of telemedicine, as patients have access and control of their medical records [6]- [8], (c) corruption of patient records via tampering, stealing, or mishandling [9], and (d) patient record exchange with unauthorized medical experts with or without a patients' consent [10]- [12]. With EMRs -critical platform interoperability issues for data exchange, confidentiality, privacy, and security must be addressed urgently.…”
Section: Introductionmentioning
confidence: 99%