A Comprehensive Study on Healthcare Datasets Using AI Techniques

被引:0
|
作者
Mistry, Sunit [1 ]
Wang, Lili [1 ,2 ]
Islam, Yousuf [3 ]
Osei, Frimpong Atta, Jr. [4 ]
机构
[1] Anhui Univ Sci & Technol, Sch Math & Big Data, Huainan 232000, Peoples R China
[2] Anhui Prov Engn Lab Big Data Anal & Early Warning, Huainan 232001, Peoples R China
[3] Cent South Univ, Sch Phys & Elect, Changsha 410083, Peoples R China
[4] Univ Oregon, Dept Comp Sci, Eugene, OR 97403 USA
关键词
healthcare; machine learning; NARX; logistic regression; data matching; PREDICTION; SELECTION; DATABASE; LINKAGE; MODELS; SYSTEM; TREES; RISK; TOOL;
D O I
10.3390/electronics11193146
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to greater accessibility, healthcare databases have grown over the years. In this paper, we practice locating and associating data points or observations that pertain to similar entities across several datasets in public healthcare. Based on the methods proposed in this study, all sources are allocated using AI-based approaches to consider non-unique features and calculate similarity indices. Critical components discussed include accuracy assessment, blocking criteria, and linkage processes. Accurate measurements develop methods for manually evaluating and validating matched pairs to purify connecting parameters and boost the process efficacy. This study aims to assess and raise the standard of healthcare datasets that aid doctors' comprehension of patients' physical characteristics by using NARX to detect errors and machine learning models for the decision-making process. Consequently, our findings on the mortality rate of patients with COVID-19 revealed a gender bias: female 15.91% and male 22.73%. We also found a gender bias with mild symptoms such as shortness of breath: female 31.82% and male 32.87%. With congestive heart disease symptoms, the bias was as follows: female 5.07% and male 7.58%. Finally, with typical symptoms, the overall mortality rate for both males and females was 13.2%.
引用
收藏
页数:19
相关论文
共 50 条
  • [41] Advancing cybersecurity: a comprehensive review of AI-driven detection techniques
    Salem, Aya H.
    Azzam, Safaa M.
    Emam, O. E.
    Abohany, Amr A.
    JOURNAL OF BIG DATA, 2024, 11 (01)
  • [42] A comprehensive evaluation of feature-based AI techniques for deepfake detection
    Neha Sandotra
    Bhavna Arora
    Neural Computing and Applications, 2024, 36 : 3859 - 3887
  • [43] A comprehensive survey of AI-enabled phishing attacks detection techniques
    Abdul Basit
    Maham Zafar
    Xuan Liu
    Abdul Rehman Javed
    Zunera Jalil
    Kashif Kifayat
    Telecommunication Systems, 2021, 76 : 139 - 154
  • [44] A comprehensive evaluation of feature-based AI techniques for deepfake detection
    Sandotra, Neha
    Arora, Bhavna
    NEURAL COMPUTING & APPLICATIONS, 2024, 36 (08): : 3859 - 3887
  • [45] A Comprehensive Exploration of Machine Learning and Explainable AI Techniques for Malware Classification
    Athira
    Baburaj, Drishya
    Gupta, Deepa
    2024 2ND WORLD CONFERENCE ON COMMUNICATION & COMPUTING, WCONF 2024, 2024,
  • [46] A Comprehensive Review of AI Techniques for Addressing Algorithmic Bias in Job Hiring
    Albaroudi, Elham
    Mansouri, Taha
    Alameer, Ali
    AI, 2024, 5 (01) : 383 - 404
  • [47] Assessment of Outliers in Alloy Datasets Using Unsupervised Techniques
    Wenzlick, Madison
    Mamun, Osman
    Devanathan, Ram
    Rose, Kelly
    Hawk, Jeffrey
    JOM, 2022, 74 (07) : 2846 - 2859
  • [48] Assessment of Outliers in Alloy Datasets Using Unsupervised Techniques
    Madison Wenzlick
    Osman Mamun
    Ram Devanathan
    Kelly Rose
    Jeffrey Hawk
    JOM, 2022, 74 : 2846 - 2859
  • [49] Assessing performance of artificial neural networks and re-sampling techniques for healthcare datasets
    Saul, Marcia
    Rostami, Shahin
    HEALTH INFORMATICS JOURNAL, 2022, 28 (01)
  • [50] A COMPREHENSIVE STUDY FOR INDOOR LOCALIZATION TECHNIQUES USING RECEIVED SIGNAL STRENGTH
    Obeidat, H. A.
    Abd-Alhameed, R. A.
    Elkazmi, E. A.
    Asif, R.
    Usman, M.
    See, C. H.
    Elmegri, F.
    Ghazaany, T. S.
    Sharon, Z.
    Noras, J. M.
    Jones, S. M. R.
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 13), 2013, : 405 - 414