Next Article in Journal
Co-Infection of SARS-CoV-2 and Klebsiella pneumoniae: A Systematic Review and Meta-Analysis
Next Article in Special Issue
Enhancing Medical Image Retrieval with UMLS-Integrated CNN-Based Text Indexing
Previous Article in Journal
Image-Guided Minimally Invasive Treatment Options for Degenerative Lumbar Spine Disease: A Practical Overview of Current Possibilities
Previous Article in Special Issue
Multi-Layer Preprocessing and U-Net with Residual Attention Block for Retinal Blood Vessel Segmentation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Framework for Data Assessment That Uses Edge Technology to Improve the Detection of Communicable Diseases

1
Department of Computer Engineering, Aligarh Muslim University, Aligarh 202002, India
2
School of Computing, Gachon University, Seongnam 13120, Republic of Korea
3
Department of Zoology, College of Science, King Saud University, Riyadh 11451, Saudi Arabia
*
Author to whom correspondence should be addressed.
Diagnostics 2024, 14(11), 1148; https://doi.org/10.3390/diagnostics14111148
Submission received: 22 April 2024 / Revised: 27 May 2024 / Accepted: 28 May 2024 / Published: 30 May 2024
(This article belongs to the Special Issue Medical Data Processing and Analysis—2nd Edition)

Abstract

:
Spreading quickly throughout populations, whether animal or human-borne, infectious illnesses provide serious risks and difficulties. Controlling their spread and averting disinformation requires effective risk assessment and epidemic identification. Technology-enabled data analysis on diseases allows for quick solutions to these problems. A Combinational Data Assessment Scheme intended to accelerate disease detection is presented in this paper. The suggested strategy avoids duplicate data replication by sharing data among edge devices. It uses indexed data gathering to improve early detection by using tree classifiers to discern between various kinds of information. Both data similarity and index measurements are considered throughout the data analysis stage to minimize assessment errors. Accurate risk detection and assessment based on information kind and sharing frequency are ensured by comparing non-linear accumulations with accurate shared edge data. The suggested system exhibits high accuracy, low mistakes, and decreased data repetition to improve overall effectiveness in illness detection and risk reduction.

1. Introduction

Communicable diseases are also known as transmissible diseases or infectious diseases. Some of the infectious diseases are COVID-19, Tuberculosis, AIDS, etc. Edge computing is widely used in identifying contagious diseases. An intelligent edge surveillance system uses edge computing to identify infectious diseases [1]. It is a remote sensing or monitoring system that is more effective and reliable than any other sensing system [2]. The smart edge system helps physicians, public health authorities, and hospitals to know the details about the affected person. This framework is mainly used to sense the communication chain of the infected people in society. This model detects the infected person and helps monitor their activities from the outside world. Edge computing stores the affected people’s data and records them safely and securely [3]. Infectious diseases or transmissible diseases can spread from one person to another by touching a contaminated surface or by physical contact with each other. The leading cause of infectious diseases is viruses and bacteria from animals or humans [4].
Communicable disease analysis is the main task performed in every healthcare department to provide a better environment for the people [5]. The analysis process helps to identify the affected or infected people from society by monitoring every person through a surveillance system. Without proper monitoring or analysis processes, infectious diseases will spread all around the surroundings and cause severe problems for the citizens of the whole world [6]. Fog computing is used to analyze contagious diseases. It is a real-time analysis process by the healthcare department with the help of collected records, which is used to provide a better environment for the people. It is more reliable and offers better performance when compared with any other analyzing process [7]. Edge computing is an information technology model that keeps the data storage and the computation process for the client closer. Edge computing is widely used to provide better service to the customer via networking technologies [8]. Diseases that are spread from one person to another by physical contact or touching contaminated surfaces are called communicable diseases or infectious diseases. Infectious diseases are more dangerous than non-communicable diseases [9].
To maximize efficiency as compared to conventional models and to improve estimation accuracy, deep learning models are frequently used to extract high-level spatial information [10]. They are also frequently used to identify and interpret biological data. The decision tree is a critical tool for examining predictions that may be used to efficiently and explicitly characterize beliefs. Despite its limits, it is a graph that shows every possible outcome using division techniques [11]. The COVID-19 pandemic presented unique challenges and opportunities to alter global healthcare systems. Under these circumstances, it is now necessary to use novel intelligence [12]. Technologies that offer the chance to provide virtual health services effectively. The theory and methods of edge computing, which help close the technological divide between network edges and the cloud, have emerged with the rapid rise of mobile communication. It can expedite the content delivery to raise the quality of networking service. It drives multimedia services across mobile networks with the help of system intelligence [13]. Artificial intelligence (AI) algorithms process and interpret large volumes of data, extracting insightful patterns and information that help with accurate diagnosis, therapy selection, and disease prognosis [14]. Healthcare practitioners can improve their decision-making processes and produce more individualized and successful interventions by utilizing AI-driven predictive modeling. Emerging technologies have transformed the field of infectious diseases, impacting different aspects of the ecosystem, such as diagnosis, monitoring, treatment of chronic illnesses, prevention, and tailored medicines [15]. The main contribution of the paper is stated below.
  • To present a Combinational Data Assessment Scheme (CDAS) to accelerate disease detection.
  • To improve early detection by using tree classifiers to discern between various kinds of information utilizing indexed data gathering.
  • To detect accurate risk and assessment based on information kind and sharing frequency; these are ensured by comparing non-linear accumulations with accurate shared edge data.
  • To improve overall effectiveness in illness detection and risk reduction by exhibiting high accuracy, low mistakes, and decreased data repetition.
The remaining part of the manuscript is divided into sections: Section 2 engages with related works, Section 3 covers proposed CDAS approaches and analysis, the performance analysis is covered in Section 4, and finally, Section 5 is covered with a conclusion along with future works.

2. Related Works

Dong et al. [16] proposed an edge perturbation method for predicting microRNA (miRNA)-disease association or the EPMDA method. It is used in the miRNA method for prediction. Structural Hamiltonian information is used to design a feature vector for each edge in the graph. The planned feature vector is used in the disease prediction process. Compared with the Human miRNA Disease Database, EPMDA is more effective and improves the value of AUC.
Wu et al. [17] proposed a learning framework for miRNA for the positive-unlabeled problem. For the negative extraction process, a semi-supervised K-means model is used. Training samples are generated using the sub-gagging method. The proposed method reduces the negative sample rate and helps find the exact names of the diseases using the positive sample set of information. The proposed method outperformed when comparing it with other traditional prediction methods, and the prediction accuracy rate was higher and more accurate than any other method.
M. Safa et al. [18] proposed a novel prediction method for cardio stress using a machine learning algorithm in IoT devices. The proposed method uses the K-nearest algorithm and supports vector machine approaches. Here, new information interacts with the old information to avoid the duplication of information that will be saved. The proposed framework outperformed the traditional prediction method by increasing the inaccuracy rate in the prediction process.
Pham et al. [19] proposed a new multiple-disease prediction method using a machine learning algorithm. This method helps to identify the relationship between the different types of diseases based on the categories. The proposed method helps analyze the graph by calculating both positive and negative sets and helps identify the symptoms of the disease. The experiment result shows that the proposed method outperformed the traditional method by increasing the multiple classification process and improving the efficiency rate of the prediction process.
Rahman et al. [20] found that to provide healthcare to all people, everywhere, technology is essential. To tackle the challenges of collecting, monitoring, and securely storing data on patients’ essential body parameters through sensor technology, a healthcare architecture based on blockchain is suggested. Elements such as an Ethereum-permissioned blockchain, an IoMT device, and a Markov state chain are utilized by the framework. The technology outperforms previous systems in terms of node and transaction scalability by an impressive 80%. The framework is evaluated in comparison to current methods for improved performance, and it employs smart contracts for access control.
Xu et al. [21] proposed a new pathogenic genes prediction method using a network embedding approach named multipath2vec. The pathogenic prediction process is most widely used for disease prediction in every medical healthcare center. A multipath method is used to identify the random walk in the gene–phenotype network. A learned vector is used to calculate the similarities of the unexpected path from the heterogeneous network—the proposed method, named the pathogenic genes prediction method (PGPM), results in high accuracy for the pathogenic prediction process.
Li et al. [22] invented a new prediction method named FCGCNMDA, which was a fully connected graph convolutional network for a mi-RNA disease-related approach. Edge weight is represented using a fully connected graph; then, it combines with mi-RNA features for disease prediction. AUC values are high when compared with traditional prediction models. The proposed FCGCNMDA method is more reliable and increases the exact miRNA disease prediction system.
A feature selection method was proposed by Khamparia et al. [23] and used a deep learning neural approach named genetic algorithm. Neuromuscular disorder prediction is performed using this method. The genetic algorithm identifies gene subsets, and the Bhattacharya coefficient method determines the most effective gene subsets. The proposed integrated method improves the accuracy rate and is more effective when compared with other integrated prediction methods.
Zhang et al. [24] proposed a new method for a miRNA–disease association named multiple meta-paths fusion graph embedding models. MiRNA–disease interactions are used to collect information about diseases. The graph embedding model calculates the info related to the miRNA disease. The proposed model is used as a self-learning approach for the disease prediction process. From the comparisons, it is seen that the proposed model outperformed the traditional prediction method.
Badidi, E [25] proposed Edge AI’s potential to enhance public health while reviewing its function in early health prediction. This article addressed the difficulties and constraints that Edge AI faces in predicting health outcomes early on. It also highlighted the need for further research to tackle these issues and how these technologies can be integrated into current healthcare systems to fully realize the potential of intelligent health technologies. It is also critical to keep up with new developments and moral dilemmas as Edge AI advances in early health prediction.
Al-Zinati et al. [26] introduced a redesigned bio-surveillance system that utilizes mobile edge computing and fog to detect how these technologies can be integrated into current healthcare systems to fully realize the potential of intelligent health technologies and localize biological threats. The order of fog nodes in the suggested architecture is responsible for compiling monitoring data from all across their respective regions and identifying any possible dangers. The evaluation results demonstrate the framework’s capacity to identify contaminated areas and pinpoint biological hazards. Furthermore, the outcomes demonstrate how well the reorganization mechanisms modify the environment structure to deal with the highly dynamic environment.
To solve the issues with manual blood smear examination in tracking patients and result verification, Kamal, L. and Raj, R. J. R. [27] suggested an improved convolutional neural network approach for automated blood cell recognition and categorization. The proposed method automatically detects whole blood cells in blood smear images by combining sophisticated image-processing methods and deep learning algorithms. With rigorous training and validation, the suggested model obtains remarkable metrics such as 91.88% accuracy, 91% precision, 91% recall, and an 88% F-score, outperforming traditional Computer-Aided Diagnosis systems in clinical labs.
Yadav et al. [28] provided a strategy for Computation Offloading using Reinforcement Learning (CORL) to reduce power consumption and latency in healthcare devices that use IoMT. By identifying the best resources to offload work to, the system overcomes the problems of low battery capacity and time restrictions caused by service delays. When tested in an iFogSim simulator with realistic assumptions, the experimental results demonstrate that the strategy reduces power consumption, delays data transmission, and makes the most efficient use of node resources in edge-enabled sensor networks.
Nandy et al. [29] introduced a novel healthcare system that utilizes Wearable Sensors (WSs) and an advanced Machine Learning (ML) model called Bag-of-Neural Network (BoNN) to remotely monitor health and anticipate the onset of diseases. Distributed edge devices gather patient health symptoms and preprocess data in the epidemic model. At centralized cloud servers, the BoNN model is used to detect COVID-19 disease on an improved dataset. On a benchmark dataset from Brazil called COVID-19, the system achieved a 99.8 percent accuracy rate.
Methods for edge perturbation, learning frameworks, multiple-disease prediction, healthcare architectures based on blockchain, methods for predicting pathogenic genes, and methods for feature selection are all covered in the research papers that are included in the text. Among the many healthcare-related topics covered in these articles are multipath2vec, disease prediction, and the prediction of pathogenic genes. New bio-surveillance systems that make use of mobile edge computing and fog are introduced, and edge AI shows promise for enhancing early health prediction. For automated blood cell recognition and categorization, an upgraded convolutional neural network method beats out the old Computer-Aided Diagnosis methods.

3. Proposed Combinational Data Assessment Scheme

The proposed scheme relies on sharing data between the edge devices to prevent multi-source replications. Television, multimedia, graphics, cell phones, etc., do not transmit infectious diseases. Most cases of these infections spread through close personal contact with an infected person, contaminated objects, or respiratory droplets. In order to stop the dissemination of false information, it is essential to use reliable sources while discussing the spread of infectious illnesses. It helps extend and prevent false information about contagious diseases. A preventer is a group of software and hardware components that collect and process information accumulated from the healthcare center environment. The disease is controlled through various sources with sensor units to collect data such as frequency occurring, disease matching, data features, etc. Figure 1 portrays the proposed scheme in a real-time environment.
The deploying technology for analyzing disease-related information swiftly responds to the above problems. In the proposed CDAS, precise data sources and edge device control are prevented using the detection/recommendations of the analysis. The classifier performs similarity checks, difference data identification, and indexing in this analysis scheme. The indexed data are selected alone for feature extraction to identify the risks, as shown in Figure 1. The proposed CDAS improves disease detection swiftness, disease outbreak, risk assessment, and controlling infectious disease spread.
The edge disease consists of a specialized control unit that performs the functions of the edge devices ( T V and M M ) through edge devices and analysis (A). The functions of the edge devices are maintained using aggregators. The CDAS method serves as a data source and detection/recommendation. The aggregation unit rectifies the edge devices; therefore, it is predominant in controlling the spread and preventing false information from being built. It contains the spread of infectious diseases pursued using the data sources from the analysis (A). The CDAS analysis can be performed by four methods, namely, occurring frequency, classifier, data features, and matching. The input of data sources from the sensor (A) is functioned by the aggregation, then the matching function is transmitted. Therefore, CDAS is designed for actual data and replicating data analysis.

3.1. Data Analysis

The aggregators notice human and animal health conditions from infectious diseases. The input can be related to increased body temperature, coughing, fatigue, etc. In a noticing sequence, the data source received (Ds) derived as:
D s = A ± ( A m a x × A m i n ) A + A m i n   s u c h   t h a t   ε = 1 2 π A A m i n A m a x α A 3 D s D s * }
where the variable α , denotes an active aggregator, and α A , A m a x and A m i n are the minimum and maximum data sources observed in varying instances. The variables A m a x keep information and previous information from being A m i n . They are used to avoid noticing incorrect information, and prior information is used to prevent false information and previous information from being noticed. In the sense of a hoax, the wrong information is estimated as the number of mismatching analyses observed at continuous A observations. Therefore, some conditions of error D s due to multi-source replications and disease detection swiftness α . This problem impacts the D s at a given instance, for which the normalization is computed as:
n D s = * * A m a x A m i n σ s 2   s u c h   t h a t   σ s = 2 A 3 A + j j + 1 A D s D s * D s 2 × 1 2 π A }
The above equation specifies that the normalization comes after the maximum A m a x and standard deviation A m i n data sources observed standard deviation σ s . Therefore, n D s is a normalized condition.
The symbols * and ∆ in Equations (1) and (2) stand to mean as follows: In mathematical equations, the symbol * usually means to multiply. The product of two integers, A and B, is represented by A * B. The delta sign, often used to indicate a change or difference between two values, is represented by ∆. The symbol ∆, when used in equations, can represent a change in a variable or a particular mathematical procedure tied to the idea of difference.
In contrast, it is the aggregation condition for which the proper estimation, therefore, D s is normalized. In comparison, increment A by j as A + j is the aggregation condition for which the appropriate estimation action D s is obtained. Based on D s and n D s , the instance of aggregation takes place, which is computed as follows:
ε D s , n D s = n D s D s a 3 n D s D s b 3 j D s * D s * α 3 , α A
As per the above Equation (3), the instance of aggregation for a sequence until α is achieved in transmitting information from the healthcare centers the following example of aggregation is observed using machine learning. In an infectious disease scenario, data from the source must be transformed into controls to manage the spread of the disease effectively and ensure high accuracy for a prompt response. Additionally, it is essential to prevent the dissemination of false information (‘t’) to meet the healthcare requirements of edge devices. In this process, the early detection of infectious disease is allowed to protect humans and animals. In this way, the machine available used in infectious disease or ε D s , n D s α is accessed. The output of the shared edge data of the machine learning is to find and separate the replicating data sequence through D s evaluating and an o p e r a t o r b a s e d analysis. Operator-based analysis refers to a method of data analysis that involves the use of mathematical operators or functions to manipulate and process data. This approach typically involves performing operations such as addition, subtraction, multiplication, division, comparison, or other mathematical functions on the data to derive meaningful insights or results. The first method of this learning is the frequency occurrence of the D s instance if ε is observed. The concentration on achieving j D s * D s * at any instance is the output for separating the data. As per the process, two sequences of sample inputs of D s at any varying instances of ϑ and τ are given as the input for the machine learning. Hence, in an ε aggregation, the sequence of disease detection takes place as per Equation (4).
ϑ = D s τ = 1 } , t h e   f i r s t   i n s t a n c e   i s   o b s e r v e d   ϑ = n D s τ                                                         = σ s * } , f o r   t h e   c o n s e c u t i v e   i n s t a n c e s   s u c h   t h a t , ϑ + τ                                                         = D s , i s   t h e   f i r s t   d a t a   s o u r c e   w h e r e   n D s                                                         × σ s * , i s   t h e   s e q u e n c e   o f   s a m p l e   d a t a   s o u r c e s }
The machine learning model assessment initiates from the sequence of sample inputs with the first edge device as D s . This D s is the ease of information analysis for evaluation; if the aggregation is observed in any varying instance, conjunction takes place. In Figure 2, the data analysis process is presented.
The conjunction process is performed using detected sequences based on occurrences. This occurrence factor is considered for identifying false (replicated) data. The specified data are segregated for further utilization. Here, the features associated with the classification are identified for detection (Figure 2). Therefore, in the machine learning used in infectious diseases, the shared edge data features are merged with a non-linear accumulation of data. The sequence of ϑ + τ = n D s × σ s * is analyzed to find the actual shared edge data in the edge devices. Machine learning classifies the process into two analyses of real data and replicating data based on the occurring frequency. The occurring frequency ε D s , n D s α functions and its related things served by the edge device are discussed as per Equation (5).
ε D s , n D s α = { n D s D s a 3 , ε D s , n D s j > ε n D s n D s D s b 3 , ε n D s j 0 ε D s , n D s = X D + j + 1 n n D s D s a 3 c o s   c o s X D δ n D s D s a 3 ε n D s + n D s D s b 3 s i n   s i n X D δ n D s D s a 3 ε n D s ε n D s = X D ± ε D s , n D s + α j 3 c o s α j }
where the variable X D denotes the partial output of the edge device, and δ is the disease outbreak by the crowd observed in D s . The frequency-varying instance can be analyzed by this occurring frequency method and then the classifier performs the next instance of functions. The classifier is used to identify the original data and replicate data in the edge device. If the classification is ε n D s j , then the method and its related thing are served by the machine learning. In this manner, the tree classifier method is deployed for classifying the data into two ways, namely, original data and replicating data, and then it is used for distinguishing contrast information analysis. For this purpose, two sequence data of D s at any instance of ϑ and τ are used as the input for the machine learning. From a given instance, ε D s , n D s followed by the tree classifier are analyzed by the machine learning method.
R ε D s , n D s = ϑ ( f ) ± τ D s f D s π   s u c h   t h a t   ϑ f D s D s = D s + π ( f ) τ D s * = ϑ π ( f ) }
As per the above Equation (6), the variable f is the output of the original data and π is the replicating data observed by the varying instance D s . In the above equation, ϑ f D s D s and τ D s * are the related thing that is used for classifying the data of the R ε D s , n D s . In this manner, the aggregation method either satisfies ϑ f D s D s or τ D s * for all the sigmoid based D s ± π ( f ) and ϑ ± π ( f ) . The true and false information of the above accumulation generates the non-linear ϑ ± τ to achieve the above classification. Therefore, the aggregation process of ϑ f D s D s and D s * and the non-linear accumulations of * and n D s together give the output of R ε D s , n D s at its shared edge data. The machine learning of tree classifier analyzes ϑ , τ and ε D s , n D s , and it is followed by the sigmoid-based classification through D s * and * . Figure 3 presents the data classification process.
The replication factor is classified for the input data sequence based on n ( D s ) . Such classifications are performed for 0 / 1 augmentation in identifying the difference. This requires the matching of different instances. The occurrence f 1 , f 2 , …, f n are used for matching different instances. This is extracted from the replication classified as presented in Figure 3. The output of the original data using the swift response D s , * , σ s is derived. Therefore, the first instance of replicating data provides indexed data collection and augments the early detection process. The replication processes are as computed in Equation (5) and (i.e.,) ( * = σ s ) = 1 is the output of the next instance, and hence, the occurring frequency is maintained without aggregation. Alternatively, the sequence of instance is observed, whereas the replicating data such as ϑ f D s D s or τ D s * impact the following data. Specifically, the occurring frequency of the above representation is either ϑ f D s D s or τ D s * . The data sources of the inputs ϑ and τ are actual shared data such that the probability of matching the data is 1 or 2 for the sequence. Based on this example, the π conditions (i.e.,) π > σ s * or π σ s * are analyzed. The π and its accumulations are matched for their features by preventing assessment errors and is computed as:
π = 2 ρ τ ρ ϑ   w h e r e   ϑ f D s D s   m a t c h i n g   w i t h   D s , i f   π > σ s *   e l s e   ϑ f D s D s   m a t c h i n g   t o   σ s   o r   * , i f   π σ s * }
where ρ τ and ρ ϑ denotes the accumulations of ϑ and τ in the given equations. It is a way to identify if all the accumulated data matched for their features can be accumulated with both ϑ and τ . Now, the shared information between the edge device to overcome the multi-source replications for the output of π > σ s * and π σ s * condition is derived in Equations (8) and (9).
f 1 = n D s 1 f 2 = n D s 2 + σ s * 1 ε α 1 f 3 = n D s 3 + σ s * 2 ε α 2   s u c h   t h a t   f n = n D s n + σ s * n + 1 ε α n + 1 , i f π > σ s * }
f 1 = D s 1 ± τ D s * 1 f 2 = D s 2 + τ D s * 2 π × ε α 1 f 3 = D s 3 + τ D s * 3 π × ε α 2 s u c h   t h a t   f n = D s n + τ D s * n π × ε α n + 1 , i f π σ s * }
The above-given representation is followed by the n sequence of the instance, where the early-detection D s is augmented for classifying the output of the tree classifier. Therefore, the aggregation operation as in Equation (4) is analyzed for its frequency occurrence concerning the above-mentioned conditions of π > σ s * and π σ s * , utilizing the following determinations. These matching processes require some data features and also secure communicable disease information. Figure 4 presents the data feature matching process.
The classified data are indexed based on f n , after which the similar data are grouped based on identified instances. The sequence is reselected if the similarity grouping fails and, hence, a new input is accessed for analysis (Figure 4). The data features in the sensitive information types and sharing frequency prevent similar data analysis, indexed data collection, and augmenting the early detection process. This requires a similar data analysis of f and π in Equation (6) for determining the instance of matching.
R ε D s , n D s = D s + π f f ϑ π f D s f D s π ,   f o r   m a t c h i n g   i n s t a n c e = ± D s f + π f n ϑ D s { 4 A m i n n D s + π , i f α = A   a n d   A m a x = 1 ± 4 A m a x n D s + π = ρ τ ρ ϑ + 4 A m a x n D s 2 = A m a x n D s , i f ρ τ ρ ϑ = 0   a n d   α m i n = 1 , a n d   α = A }
In this process, in the above Equation (10), 4 A m a x n D s + π denotes the sequence of matching instances, and the assessment error indicates the end of the input data sources. Similarly, the next instance of matching for R ε D s , n D s is designed for the similarity measures of the index, and the data are analyzed for the function π σ s * , as in Equation (11).
R ε D s , n D s = ± D s f + π f n ϑ D s = ± D s D s τ + π ( D s τ ) 3 ϑ D s , S i m i l a r i t y   m e a s u r e s   o f   d a t a = ± D s 3 2 π + D s π 3 + 2 π π τ 3 ϑ D s = ± D s 3 2 π + D s π 3 + 2 π π τ 3 ϑ D s ± D s 3 + D s τ ϑ D s , i f   π   i s   n e g l i g i b l e   π 1 = D s τ ϑ + D s 3 = D s τ D s 3 τ D s * i s   a s s e s m e n t   e r r o r }
As per the above equation, the similarity measures the D s analysis, as D s τ D s 3 is an assessment error during the sequence of ± 4 A m a x n D s + π . Therefore, the sequence of the instance as in Equation (11) occurs on R ε D s , n D s as in Equation (10). Now, preventing false information and spreading control are initiated. This spread control represents the changes in the communicable disease of the edge device.

3.2. Spread Control

In the spread controlling process, the edge device takes the aggregation-based data analysis and decides the functioning part of the devices. The overall working of the device is synchronized based on R ε D s , n D s outputs, respectively. Therefore, the initial spread control X D = 1 , such that if X D = 2 , then the edge device functions through signaling from the aggregation. This depends on the π condition R ε D s , n D s such that the probability of the spread control ( ρ X D ) is computed as:
ρ X D = c o u n t X D α × ( δ ) n + 1 D s f + π f n α A c o u n t X D α × ( δ π ) n + 1
From the given Equation (12), the probability of spread control is used to detect if the edge devices are working or not. If X D 1   > σ s * , then the count of X D is incremented by one which means the edge device is working; otherwise, it is not working. Where δ represents the futuristic estimation of the replacement of X D between 1 and 2 and this method is computed as:
δ = { j + 1 n π j i + j + 1 n c o u n t X D j , i f   π j < ρ X D , j n 2 i + j + 1 n c o u n t X D j , i f   π j ρ X D , j n
This futuristic computation of communicable disease spread controlling following all the instances of n . From these appropriate detection/recommendations of δ outputs in an unsynchronized edge device control, the δ is derived from a sequential set of information instances. The communicable disease control output ( D z ) is computed as the non-linear matching of ρ X D , R ε D s , n D s and π as:
D z = { R ε D s , n D s × ρ X D π , i f   π j < ρ X D , j n R ε D s , n D s × ρ X D + π c o u n t X D , i f   π j ρ X D , j n
In this process of detection, the result is represented as the state of the edge device of π j and c o u n t   X D for all the n . The result of D z is based on π j < ρ X D and π j ρ X D . Hence, ω > σ denotes a certain assessment of D s in n . Similarly, the communicable disease spread controlling for retaining the high accuracy and also less replication occurs. In the Figure 5 series, the sequences and errors for different normalization factors are presented.
An analysis of sequences and errors for different normalization factors is portrayed in Figure 5. The n D S optimizes the detection sequences by mitigating ε . This is recommended based on the classification R . This was pursued and hence the assessment errors were reduced. As the sequences migrate from v e to + v e normalization, error reduces. However, the alternate matching for f 1 to f n addresses the errors and thereby the normalization is retained. The ε [ . ] induces further sequences in identifying and mitigating errors. Therefore, as normalization increases, the error is reduced, stabilizing the data analysis. Figure 6 presents the replication and estimation ratio for different occurring frequency values.
The ε [ . ] in different D S inputs and R { . } functions reduce the replication by increasing the analysis. The estimations are based on Equation (7) followed by S D . This estimation increases the recommendations on classification for increasing the indexes and occurrences. The changes are updated in the subsequent classification instances, reducing errors. Therefore, the replications are confined without requiring additional computation. In the further estimations, f 1 to f n sequences are required to identify further ε [ . ] . This is required for reducing replications, through ε [ . ] maximization and sequence assigning. An analysis of the same is portrayed in Figure 6. In Figure 7, analysis for matching ratios for different ρ X D is presented.
The matching ratio for different spread control probabilities is presented in Figure 7. As the classification instances vary the matching ratio increases for different ε [ . ] . This is due to the R { . } in the multiple iterations as classified by the learning process. The recurrent analysis is performed based on matching instances post the n ( D S ) based on ϵ [ . ] . This is however performed for v e to + v e moves until the classification is before multiple iterations. Therefore, the matching increases as the ρ X D is high regardless of the data sources.
For edge device infectious disease monitoring, Algorithm 1 coordinates spread control. Based on signs of disease transmission and device operation, it calculates the spread probability, ρ X D . Counts are increased if device usage or communication is above predetermined levels. The control decisions are guided by δ , a futuristic estimation. Considering ρ X D and π, the spread of the disease control D z is calculated. To prevent duplication and stabilize data analysis, the program modifies device functioning and spread probability. Iteratively evaluating both illness incidence and gadget performance improves spread control tactics. Enhancing disease identification and response effectiveness in edge devices entails assessing spread probabilities, modifying device functionality, and reducing replication.
Algorithm 1: for Edge Device Spread Control in Infectious Disease Monitoring
Function   S p r e a d C o n t r o l ( D s , n ( D s ) , π , X D , σ s , * , α , A )
Input :   ( D s , n ( D s ) , π , X D , σ s , * , α , A )
Output :   Probability   of   spread   control   ( ρ X D )).
Futuristic   estimation   of   spread   control   ( δ ).
Communicable   disease   control   output   ( D z )
Step 1: Calculate SpreadControl()
if   X D > = 1   or   π > σ s / *
    I n c r e m e n t C o u n t ( X D )
      ρ X D = C a l c u l a t e S p r e a d C o n t r o l P r o b a b i l i t y ( X D , α , δ , π )
       if   π < ρ X D
    D z = R { ε [ D s , n ( D s ) ] } × ρ X D π
    else:
    D z = R { ε [ D s , n ( D s ) ] } × ρ X D + π / C o u n t ( X D )
Return   D z
Step   2 :   Function   C a l c u l a t e S p r e a d C o n t r o l P r o b a b i l i t y ( X D , α , δ , π ) :
      n u m e r a t o r = ( C o u n t ( X D ) ^ α ) × ( δ ) ^ ( n + 1 ) × ( ( D s ) f + π f ^ n )
      d e n o m i n a t o r = S u m m a t i o n ( α A ) [ C o u n t ( X D ) ^ α × ( δ π ) ^ ( n + 1 ) ]
      ρ X D = n u m e r a t o r / d e n o m i n a t o r
         Return   ρ X D
Step   3 :   Function   I n c r e m e n t C o u n t ( X D )
        Increment   the   count   of   X D b y 1
Step   4 :   Function   S u m m a t i o n ( α A )
        Perform   summation   over   all   instances   α f o r A
Step   5 :   Function   S p r e a d C o n t r o l A n a l y s i s ( D s , n D s , π , X D , σ _ s , * , α , A )
        Compute δ based on Equation (13)
        Compute   D z based on Equation (14)
         Return   D z
Step   6 :   Function   C a l c u l a t e δ ( π , α , C o u n t ( X D ) )
        if   π j < ρ X D , j n
    δ = ( j + 1 n π j ) / ( i + j + 1 n [ c o u n t ( X D ) ] j )
       else
         δ = 2 i + j + 1 n c o u n t X D j
       Return   δ
Data collection, pre-processing, analysis, and use are the four stages that make up the process flow for disease detection, followed by gathering data, cleaning them up, extracting features, training the model, evaluating it, discussing the results, and finally, training the model. Details regarding the dataset’s origins, infectious diseases, and data fields are provided. Addressing missing values, standardizing data, and eliminating duplicates are all part of data pre-processing. In order to detect diseases, feature extraction must be performed. During model training, algorithms, parameter adjustment, and validation procedures are utilized to train machine learning models. The study employs performance indicators such as sharing factor, replication ratio, error rate, and accuracy. The study of the results shows the results on improvement in sharing factors, correctness, decrease in errors, and replication. Disease detection and risk assessment are two areas where the suggested method shines, as discussed. See how the data assessment framework affects the efficacy of disease diagnosis and response with this step-by-step process flow.
Utilizing edge computing principles and devices, which are integral parts of our Combinational Data Assessment Scheme (CDAS), improves the efficacy of disease detection and response through the use of real-time data collection, rapid analysis, enhanced risk assessment, collaborative data sharing, and decentralized processing; it is clear that the suggested method is connected to edge technology.

4. Performance Analysis

The proposed scheme’s performance analysis is performed using the dataset [30] that contains information on different infectious diseases. The consistency in data availability with the observed and predicted values is used for similarity verification. This data source contains nine fields based on various categories. The experimental setup uses a standalone system that operates over eight data sources containing multiple instructions and 6–11 fields in common. The performance metrics used in this analysis are accuracy, error, replication ratio, and sharing factor. In the comparative analysis, the existing EPMDA [16], PGPM [21], FCGCNMDA [22], and miRNA [17] methods are used.

4.1. Accuracy

In Figure 8, the comparative analysis for accuracy under different data sources and classification sequences is analyzed. The proposed scheme identifies ε for the input D s such that the process mitigates the replication through R ε D s , n D s . Therefore, the classification identifies non-replicated input sequences for improving data analysis accuracy. This process is aided until different conditional experiments are required. Contrarily, the index-based data analysis is performed under controlled futuristic estimation that requires less data for normalization. The further process is controlled by matching conditions defined in Equation (7) for which multiple information types are analyzed. This ensures error-less computations in proceedings with data analysis. The classification learning is pursued in different iterations satisfying the conditions in Equation (7). In this classification, α = A is verified throughout the n sequences in the 4 A m a x n D s + π matching process. This reduces the errors in the intermediate classification sequences, for different input D s . Therefore, the process improves the accuracy of obtaining matching based on similar data under defined parameters.

4.2. Error

The proposed scheme reduces errors in data analysis by segregating replication and non-replication instances over different classification sequences. The τ D s * = ϑ π ( f ) analysis for the classifier process is utilized for deviating errors in the continuous data. Contrarily, the changes in sequences require continuous classification to achieve high accuracy. The proposed sigmoid-based information classification refines the false data from the non-classified sequences, deviating errors. The intermediate f 1 to f n sequences verify the matching or un-matching sequences with distinct conditions in validating the accumulated data. Hence, the further D s is analyzed using ε n D s estimation, preventing replicated occurrence, and improving the accuracy. The error in non-replicating sequences is classified using occurring frequency, preventing n D s . In this process, the previous occurrences and their classified sequence are identified for improving accuracy by reducing errors. The deviation σ s is mitigated by separating j D s * D s * such that the sequences are independently analyzed using machine learning. Therefore, as the input increases, the classification sequences are varied in confining the errors (refer to Figure 9).

4.3. Replication Ratio

The proposed scheme’s replication ratio is comparatively less as presented in Figure 10 for different data sources and classification sequences. The proposed scheme identifies σ s * such that the overlappings in different instances are classified in the first analysis. This analysis is carried out for the partial edge device outputs, reducing errors. In this error analysis, first, the replications are mitigated using ε D s , n D s predictions, D s + π ( f ) and ϑ π ( f ) . Further in the sigmoid classification, early detection of ( * = σ s ) = 1 is performed for identifying the false data. This identification is carried out using the learning process, in dividing multiple instances. Therefore, the validations in the replication are preceded using D s or σ s matching. For the classified instances, the input from the data sources is validated based on the above matching conditions, as defined in Equation (8). After this process, π > σ s * and π σ s * assessments are performed for identifying replicated sequences from multiple D s . Therefore, the sequences are mitigated from different intervals and sequences, preventing false data. As the learning relies on the non-recurrent continuous instance, the replications are less in the proposed scheme as presented above.

4.4. Sharing Factor

In Figure 11, the data-sharing factors from different D s and classification instances are presented. The data-sharing factor in the proposed scheme is high compared to the other methods. The input data are analyzed for their falseness and replication before sharing; the analyzed data are shared based on ρ X D . This probability is used for identifying the data requiring and non-requiring control measures for improving the distribution. In this process, the D z results in conditional validation for actual data shared and required data for the control process. Therefore, the actual data requirements are upheld with the presence of false data, provided the distributed data is error-free. In this process, machine learning is completely utilized for futuristic data estimation, in determining the actual data requirement. The proposed scheme provides R ε D s , n D s -based data distribution, improving the sharing rate. For different D s , the process is unanimous, preventing deviation-included data. Therefore, as the classification process increases, the sharing factor is leveraged compared to the other method, as represented above. In Table 1 and Table 2, the comparative analysis results are summarized.
The study follows a strict procedure to verify the accuracy, replication ratio, and sharing factor of the results. Determining the experimental setup, picking the right performance measurements, comparing the results to previous approaches, doing the math, drawing graphs, and talking about the results are all parts of this process. By checking that the results are credible and reliable, the author proves that the data assessment methodology proposed works to make illness diagnosis and response better. Graphs or tables are used to display the results visually so that they may be easily compared and understood. This procedure guarantees that the suggested data evaluation framework improves the efficacy of disease identification and response.
The Infectious Diseases dataset was used to evaluate the mathematical methods presented in the manuscript, which aim to forecast and prevent infectious diseases. Several diseases’ worth of data is included in the collection, which opens up possibilities for analysis and prediction modeling. In order to better understand the way, the suggested calculation methods detect disease patterns, reduce data replication, maximize data sharing, and minimize errors, the tests evaluate their accuracy, error rate, replication ratio, and sharing factor. It is essential to assess the strategies’ practicality in real-world situations.
The study developed a new Combinational Data Assessment Scheme (CDAS) using edge computing and AI to diagnose and prevent infectious diseases. Data collection, distribution, and analysis should be more precise and effective than traditional methods. Tree classifiers can improve indexed data-based early detection and discriminate data types. Considering data similarity and index measurements during analysis reduces assessment errors. Sharing frequency and information type can determine danger levels as compared to shared edge data. Minimal data replication, high precision, and low error rates improve efficacy. The authors submitted experimental results comparing CDAS to EPMDA, PGPM, and FCGCNMDA to support their claims. They found that CDAS increases data-sharing factors by 8.55%, reduces replication ratios by 11.83%, and increases accuracy by 14.77%. The study compares and quantifies the performance improvements of their new CDAS algorithm for infectious disease surveillance using edge computing resources. Future research could use this method with real-world edge deployments.
A real-world infectious disease dataset was used to test the CDAS approach. To understand the approach’s uniqueness and efficacy, more dataset information is needed. This includes data size, diversity and complexity, unique qualities or noise, and ground truth label and evaluation benchmark creation. This would show the complexity of real-world settings and the benefits of their edge computing and AI-based approach above previous methods. This would also inform CDAS expansion to other domains with similar data complexity.

4.5. Performance Metrics

Figure 12 shows a bar chart that compares various evaluation metrics across various algorithms and methodologies for a prediction or analysis job. Precision, recall, F1-Score, and mAP (mean Average Precision) are the evaluation measures displayed on the x-axis. Methods such as miRNAH7, CDAS, FCGCNMDA, PGPM, EPMDA, and PGPM are being compared. Generally speaking, CDAS performs the best across most metrics, as seen by having the highest bars, which represent the values for each statistic.
Findings: The proposed scheme achieves 14.77% high accuracy, 11.55% less error, 11.83% less replication ratio, and 8.55% less sharing factor.
Findings: The proposed CDAS improves accuracy and sharing factor by 13.6% and 10.35%, respectively. Moreover, it reduces the error and replication by 9.45% and 12.24% respectively.
In Table 3, the proposed method, CDAS is compared to edge devices in terms of resource constraints, computational intensity, data transmission requirements, latency considerations, and scalability and flexibility. CDAS must be optimized to efficiently utilize limited processing power, memory, and storage on edge devices, while edge devices typically have low-to-moderate computational intensity. CDAS data transmission requirements should consider bandwidth limitations and communication protocols of edge devices for seamless data exchange. Latency constraints should match the real-time processing capabilities of edge devices. CDAS should demonstrate adaptability to diverse edge computing environments and device configurations for optimal performance.
Several factors about computing resources and execution are compared in Table 3 between edge devices. The suggested Combinational Data Assessment Scheme (CDAS) approach is analyzed with features like resource constraints [25], computational intensity [22], data transmission [20], latency [28], along with scalability and flexibility [26].
(1)
Resources Constraints:
In contrast with CDAS’s high resource requirements, edge devices often have minimal processing capability, memory, and storage. Following the basic principles of edge computing, the comparison implies that CDAS needs to be adjusted to make the most efficient use of the limited resources [25] on edge devices.
(2)
Computational Intensity:
Compared to edge devices, having low-to-moderate computing capability [22], CDAS is defined as possessing moderate-to-high processing intensity. This comparison shows the significance of CDAS algorithms in being compatible with edge devices’ processing abilities in terms of complexity and real-time analytical capabilities for successful execution.
(3)
Data Transmission:
The data transmission requirements of CDAS are minimal, in contrast to the limited bandwidth and protocol specificity of many edge devices discussed in [20]. The comparison shows that for CDAS and edge devices to share data seamlessly, CDAS data transmission needs should consider bandwidth constraints and communication protocols.
(4)
Issues with Latency:
Contrasted with edge devices, CDAS is said to have latency [28] limitations ranging from low to moderate. According to the comparison, for decision making to be performed promptly, the latency restrictions of CDAS for detecting diseases should correspond to the real-time response rates that edge devices are capable of.
(5)
Scalability and Flexibility:
Edge computing settings and configurations of devices can vary, but CDAS presents them as highly scalable and flexible [26]. Based on the comparison, it seems that CDAS needs to show that it can adapt to varied edge computing contexts and perform well with different configurations of devices to be deployed effectively in various situations. For edge devices, optimizing CDAS to meet their processing capabilities, data transmission needs, latency limits, and scalability considerations is crucial. To make the most of edge computing and get around any challenges edge devices may have, CDAS has to pay attention to these features.

5. Conclusions

To improve the efficiency of data distribution in the control of infectious illnesses, the paper presents a combinational data evaluation method. Using edge computing and AI methods, the suggested plan makes data collection, sharing, and analysis more efficient. To facilitate easy collection and analysis and avoid duplication and falsification, data sources are first identified. To verify the similarity measure among inputs and the available data and prevent data manipulation, a recurrent tree classifier learning technique is utilized. Indexing of non-replicated sequences comes next, after classification based on occurrence frequency. The likelihood that the indexed data will make it easier to share knowledge about controlling diseases is confirmed, and the process is then repeated for aggregated data sources until replication-free indexed data that are appropriate for sharing are generated. Based on experimental study, the suggested technique reduces error and replication by 9.45% and 12.24%, respectively, while improving accuracy and sharing factor by 13.6% and 10.35%, respectively, for various classification sequences.

Author Contributions

Conceptualization, M.A. and H.M.; methodology, M.A. and H.M.; software, M.A. and H.M.; validation, M.A. and Z.A.; formal analysis, H.M. and Z.A.; resources, H.M. and Z.A.; data curation, Z.A.; writing—original draft preparation, M.A. and H.M.; writing—review and editing, M.A. and Z.A.; visualization, H.M. and Z.A.; funding acquisition, H.M. and Z.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (No.2021R1F1A1055408).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data that support the findings of this study are openly accessible at the following link: https://data.world/chhs/03e61434-7db8-4a53-a3e2-1d4d36d6848d, accessed on 20 March 2024.

Acknowledgments

The authors express their sincere appreciation to the Researcher Supporting Project Number (RSPD2024R1113) King Saud University, Riyadh, Saudi Arabia.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Adhikari, M.; Munusamy, A. iCovidCare: Intelligent health monitoring framework for COVID-19 using ensemble random forest in edge networks. Internet Things 2021, 14, 100385. [Google Scholar] [CrossRef]
  2. Aazam, M.; Zeadally, S.; Flushing, E.F. Task offloading in edge computing for machine learning-based smart healthcare. Comput. Netw. 2021, 191, 108019. [Google Scholar] [CrossRef]
  3. Zhou, J.R.; You, Z.H.; Cheng, L.; Ji, B.Y. Prediction of lncRNA-disease associations via an embedding learning HOPE in heterogeneous information networks. Mol. Ther.-Nucleic Acids 2021, 23, 277–285. [Google Scholar] [CrossRef] [PubMed]
  4. Sengupta, A.; Seal, A.; Panigrahy, C.; Krejcar, O.; Yazidi, A. Edge Information Based Image Fusion Metrics Using Fractional Order Differentiation and Sigmoidal Functions. IEEE Access 2020, 8, 88385–88398. [Google Scholar] [CrossRef]
  5. Yang, L.; Li, Z.; Ma, S.; Yang, X. Artificial intelligence image recognition based on 5G deep learning edge algorithm of Digestive endoscopy on medical construction. Alex. Eng. J. 2021, 61, 1852–1863. [Google Scholar] [CrossRef]
  6. Ojagh, S.; Cauteruccio, F.; Terracina, G.; Liang, S.H.L. Enhanced air quality prediction by edge-based spatiotemporal data preprocessing. Comput. Electr. Eng. 2021, 96, 107572. [Google Scholar] [CrossRef]
  7. Hosseini, M.P.; Tran, T.X.; Pompili, D.; Elisevich, K.; Soltanian-Zadeh, H. Multimodal data analysis of epileptic EEG and rs-fMRI via deep learning and edge computing. Artif. Intell. Med. 2020, 104, 101813. [Google Scholar] [CrossRef]
  8. Yang, F.; Wang, M. A review of systematic evaluation and improvement in the big data environment. Front. Eng. Manag. 2020, 7, 27–46. [Google Scholar] [CrossRef]
  9. Wang, B.; Sun, Y.; Duong, T.Q.; Nguyen, L.D.; Hanzo, L. Risk-aware identification of highly suspected COVID-19 cases in social iot: A joint graph theory and reinforcement learning approach. IEEE Access 2020, 8, 115655–115661. [Google Scholar] [CrossRef] [PubMed]
  10. Kumar, S.; Bhagat, V.; Sahu, P.; Chaube, M.K.; Behera, A.K.; Guizani, M.; Gravina, R.; Di Dio, M.; Fortino, G.; Curry, E.; et al. A novel multimodal framework for early diagnosis and classification of COPD based on CT scan images and multivariate pulmonary respiratory diseases. Comput. Methods Programs Biomed. 2024, 243, 107911. [Google Scholar] [CrossRef]
  11. Angelin, A.C.; Silas, S. Original Research Article Enabling edge computing-based coverage hole detection framework for lossless data tracking. J. Auton. Intell. 2024, 7. [Google Scholar] [CrossRef]
  12. Abdel-Basset, M.; Mohamed, R.; Chang, V. A Multi-Criteria Decision-Making Framework to Evaluate the Impact of Industry 5.0 Technologies: Case Study, Lessons Learned, Challenges and Future Directions. Inf. Syst. Front. 2024, 1–31. [Google Scholar] [CrossRef]
  13. Deebak, B.D.; Al-Turjman, F. EEI-IoT: Edge-Enabled Intelligent IoT Framework for Early Detection of COVID-19 Threats. Sensors 2023, 23, 2995. [Google Scholar] [CrossRef] [PubMed]
  14. Allami, R.H.; Yousif, M.G. Integrative AI-driven strategies for advancing precision medicine in infectious diseases and beyond: A novel multidisciplinary approach. arXiv 2023, arXiv:2307.15228. [Google Scholar]
  15. Abbo, L.M.; Vasiliu-Feltes, I. Disrupting the infectious disease ecosystem in the digital precision health era innovations and converging emerging technologies. Antimicrob. Agents Chemother. 2023, 67, e00751-23. [Google Scholar] [CrossRef] [PubMed]
  16. Dong, Y.; Sun, Y.; Qin, C.; Zhu, W. Epmda: Edge perturbation-based method for mirna-disease association prediction. IEEE/ACM Trans. Comput. Biol. Bioinform. 2019, 17, 2170–2175. [Google Scholar] [CrossRef]
  17. Wu, Y.; Zhu, D.; Wang, X.; Zhang, S. An ensemble learning framework for potential miRNA-disease association prediction with positive-unlabeled data. Comput. Biol. Chem. 2021, 95, 107566. [Google Scholar] [CrossRef] [PubMed]
  18. Cañón-Clavijo, R.E.; Montenegro-Marin, C.E.; Gaona-Garcia, P.A.; Ortiz-Guzmán, J. IoT Based System for Heart Monitoring and Arrhythmia Detection Using Machine Learning. J. Health. Eng. 2023. [Google Scholar] [CrossRef]
  19. Pham, T.; Tao, X.; Zhang, J.; Yong, J.; Li, Y.; Xie, H. Graph-based multi-label disease prediction model learning from medical data and domain knowledge. Knowl.-Based Syst. 2021, 235, 107662. [Google Scholar] [CrossRef]
  20. Rahman MZ, U.; Surekha, S.; Satamraju, K.P.; Mirza, S.S.; Lay-Ekuakille, A. A collateral sensor data sharing framework for decentralized healthcare systems. IEEE Sens. J. 2021, 21, 27848–27857. [Google Scholar] [CrossRef]
  21. Xu, B.; Liu, Y.; Yu, S.; Wang, L.; Dong, J.; Lin, H.; Yang, Z.; Wang, J.; Xia, F. A network embedding model for pathogenic genes prediction by multi-path random walking on heterogeneous network. BMC Med. Genom. 2019, 12, 188. [Google Scholar] [CrossRef]
  22. Li, J.; Li, Z.; Nie, R.; You, Z.; Bao, W. FCGCNMDA: Predicting miRNA-disease associations by applying fully connected graph convolutional networks. Mol. Genet. Genom. 2020, 295, 1197–1209. [Google Scholar] [CrossRef] [PubMed]
  23. Khamparia, A.; Singh, A.; Anand, D.; Gupta, D.; Khanna, A.; Kumar, N.A.; Tan, J. A novel deep learning-based multi-model ensemble method for the prediction of neuromuscular disorders. Neural Comput. Appl. 2020, 32, 11083–11095. [Google Scholar] [CrossRef]
  24. Zhang, L.; Liu, B.; Li, Z.; Zhu, X.; Liang, Z.; An, J. Predicting MiRNA-disease associations by multiple meta-paths fusion graph embedding model. BMC Bioinform. 2020, 21, 470. [Google Scholar] [CrossRef] [PubMed]
  25. Badidi, E. Edge AI for early detection of chronic diseases and the spread of infectious diseases: Opportunities, challenges, and future directions. Future Internet 2023, 15, 370. [Google Scholar] [CrossRef]
  26. Al-Zinati, M.; Alrashdan, R.; Al-Duwairi, B.; Aloqaily, M. A re-organizing biosurveillance framework based on fog and mobile edge computing. Multimed. Tools Appl. 2021, 80, 16805–16825. [Google Scholar] [CrossRef]
  27. Kamal, L.; Raj, R.J.R. Harnessing deep learning for blood quality assurance through complete blood cell count detection. e-Prime-Adv. Electr. Eng. Electron. Energy 2024, 7, 100450. [Google Scholar] [CrossRef]
  28. Yadav, R.; Zhang, W.; Elgendy, I.A.; Dong, G.; Shafiq, M.; Laghari, A.A.; Prakash, S. Smart healthcare: RL-based task offloading scheme for edge-enable sensor networks. IEEE Sens. J. 2021, 21, 24910–24918. [Google Scholar] [CrossRef]
  29. Nandy, S.; Adhikari, M.; Hazra, A.; Mukherjee, T.; Menon, V.G. Analysis of communicable disease symptoms using bag-of-neural network at edge networks. IEEE Sens. J. 2022, 23, 914–921. [Google Scholar] [CrossRef]
  30. Available online: https://data.world/chhs/03e61434-7db8-4a53-a3e2-1d4d36d6848d (accessed on 20 March 2024).
Figure 1. CDAS in Real-Time Environment using Different Classification Instances.
Figure 1. CDAS in Real-Time Environment using Different Classification Instances.
Diagnostics 14 01148 g001
Figure 2. Data Analysis Process for Detection of False Data in Infectious Disease Monitoring.
Figure 2. Data Analysis Process for Detection of False Data in Infectious Disease Monitoring.
Diagnostics 14 01148 g002
Figure 3. Error Analysis for Various Data Classification Process Sequences in Disease Detection.
Figure 3. Error Analysis for Various Data Classification Process Sequences in Disease Detection.
Diagnostics 14 01148 g003
Figure 4. Data Feature Matching Process for Disease Detection.
Figure 4. Data Feature Matching Process for Disease Detection.
Diagnostics 14 01148 g004
Figure 5. Identification of Overlapping Instances in the Sequences and Error for Different Normalization Factors.
Figure 5. Identification of Overlapping Instances in the Sequences and Error for Different Normalization Factors.
Diagnostics 14 01148 g005
Figure 6. Analysis of ε [ . ] Maximization and Sequence Assigning for Reduced Replications.
Figure 6. Analysis of ε [ . ] Maximization and Sequence Assigning for Reduced Replications.
Diagnostics 14 01148 g006
Figure 7. Matching Ratio Analysis for Different Spread Control Probabilities ρ X D .
Figure 7. Matching Ratio Analysis for Different Spread Control Probabilities ρ X D .
Diagnostics 14 01148 g007
Figure 8. Accuracy Analysis of Varying Data Sources and Classification Sequences.
Figure 8. Accuracy Analysis of Varying Data Sources and Classification Sequences.
Diagnostics 14 01148 g008
Figure 9. Error Analysis and Variation of Classification Sequences with Increasing Input.
Figure 9. Error Analysis and Variation of Classification Sequences with Increasing Input.
Diagnostics 14 01148 g009
Figure 10. Replication Ratio Comparison for Different Data Sources and Classification Instances.
Figure 10. Replication Ratio Comparison for Different Data Sources and Classification Instances.
Diagnostics 14 01148 g010
Figure 11. Data Sharing Factor from Various Data Sources and Classification Instances Analysis.
Figure 11. Data Sharing Factor from Various Data Sources and Classification Instances Analysis.
Diagnostics 14 01148 g011
Figure 12. Comparison of Performance Metrics Across Various Prediction Algorithms.
Figure 12. Comparison of Performance Metrics Across Various Prediction Algorithms.
Diagnostics 14 01148 g012
Table 1. Comparative Analysis Summary for Data Sources.
Table 1. Comparative Analysis Summary for Data Sources.
MetricsEPMDAPGPMFCGCNMDACDAS
Accuracy0.7260.7870.8520.936
Error0.0840.0720.0540.0315
Replication Ratio28.2223.6912.769.726
Sharing Factor0.6210.7780.8870.933
Table 2. Comparative Analysis Summary for Classification Sequences.
Table 2. Comparative Analysis Summary for Classification Sequences.
MetricsEPMDAPGPMFCGCNMDACDAS
Accuracy0.7180.7960.8860.936
Error0.0840.0720.0510.0375
Replication Ratio28.0523.5318.5211.122
Sharing Factor0.5990.6860.8930.933
Table 3. Comparison of computing resources and implementation.
Table 3. Comparison of computing resources and implementation.
ConsiderationProposed Method (CDAS)Edge DevicesComparison
Resource
Constraints
HighLimitedCDAS should be optimized to efficiently utilize limited processing power, memory, and storage on edge devices.
Computational
Intensity
Moderate-to-HighLow-to-ModerateCDAS algorithm complexity and real-time analysis capabilities should align with the processing capabilities of edge devices.
Data
Transmission
ModerateLimitedCDAS data transmission requirements should consider bandwidth limitations and communication protocols of edge devices for seamless data exchange.
Latency
Considerations
Low-to-ModerateLowCDAS latency constraints for disease detection should be compatible with the response times achievable by edge devices for real-time decision making.
Scalability
and Flexibility
HighVariableCDAS should demonstrate adaptability to different edge computing environments and device configurations for robust performance across settings.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Anjum, M.; Min, H.; Ahmed, Z. A Novel Framework for Data Assessment That Uses Edge Technology to Improve the Detection of Communicable Diseases. Diagnostics 2024, 14, 1148. https://doi.org/10.3390/diagnostics14111148

AMA Style

Anjum M, Min H, Ahmed Z. A Novel Framework for Data Assessment That Uses Edge Technology to Improve the Detection of Communicable Diseases. Diagnostics. 2024; 14(11):1148. https://doi.org/10.3390/diagnostics14111148

Chicago/Turabian Style

Anjum, Mohd, Hong Min, and Zubair Ahmed. 2024. "A Novel Framework for Data Assessment That Uses Edge Technology to Improve the Detection of Communicable Diseases" Diagnostics 14, no. 11: 1148. https://doi.org/10.3390/diagnostics14111148

APA Style

Anjum, M., Min, H., & Ahmed, Z. (2024). A Novel Framework for Data Assessment That Uses Edge Technology to Improve the Detection of Communicable Diseases. Diagnostics, 14(11), 1148. https://doi.org/10.3390/diagnostics14111148

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop