Professional Documents
Culture Documents
Ebook The Internet of Medical Things Iomt Healthcare Transformation 1St Edition R J Hemalatha Online PDF All Chapter
Ebook The Internet of Medical Things Iomt Healthcare Transformation 1St Edition R J Hemalatha Online PDF All Chapter
https://ebookmeta.com/product/internet-of-medical-things-remote-
healthcare-systems-and-applications-1st-edition-d-jude-hemanth/
https://ebookmeta.com/product/internet-computing-and-internet-of-
things-1st-edition-hamid-r-arabnia/
https://ebookmeta.com/product/intelligent-internet-of-things-for-
smart-healthcare-systems-durgesh-srivastava/
https://ebookmeta.com/product/intelligent-internet-of-things-for-
healthcare-and-industry-1st-edition-uttam-ghosh/
Internet of Things and Data Mining for Modern
Engineering and Healthcare Applications (Chapman &
Hall/CRC Internet of Things) 1st Edition Ankan
Bhattacharya
https://ebookmeta.com/product/internet-of-things-and-data-mining-
for-modern-engineering-and-healthcare-applications-chapman-hall-
crc-internet-of-things-1st-edition-ankan-bhattacharya/
https://ebookmeta.com/product/internet-of-things-energy-industry-
and-healthcare-1st-edition-arun-kumar-rana-editor/
https://ebookmeta.com/product/medical-internet-of-things-
techniques-practices-and-applications-1st-edition-anirban-mitra/
https://ebookmeta.com/product/emerging-technologies-for-
healthcare-internet-of-things-and-deep-learning-models-1st-
edition-monika-mangla-editor/
https://ebookmeta.com/product/healthcare-systems-and-health-
informatics-using-internet-of-things-innovations-in-health-
informatics-and-healthcare-1st-edition-pawan-singh-mehra-editor/
Table of Contents
Cover
Title Page
Copyright
Preface
1 In Silico Molecular Modeling and Docking Analysis in Lung
Cancer Cell Proteins
1.1 Introduction
1.2 Methodology
1.3 Results and Discussion
1.4 Conclusion
References
2 Medical Data Classification in Cloud Computing Using Soft
Computing With Voting Classifier: A Review
2.1 Introduction
2.2 Access Control–Based Security
2.3 System Model
2.4 Data Classification
2.5 Related Work
2.6 Conclusion
References
3 Research Challenges in Pre-Copy Virtual Machine Migration in
Cloud Environment
3.1 Introduction
3.2 Existing Technology and Its Review
3.3 Research Design
3.4 Results
3.5 Discussion
3.6 Conclusion
References
4 Estimation and Analysis of Prediction Rate of Pre-Trained Deep
Learning Network in Classification of Brain Tumor MRI Images
4.1 Introduction
4.2 Classes of Brain Tumors
4.3 Literature Survey
4.4 Methodology
4.5 Conclusion
References
5 An Intelligent Healthcare Monitoring System for Coma Patients
5.1 Introduction
5.2 Related Works
5.3 Materials and Methods
5.4 Results and Discussion
5.5 Conclusion
References
6 Deep Learning Interpretation of Biomedical Data
6.1 Introduction
6.2 Deep Learning Models
6.3 Interpretation of Deep Learning With Biomedical Data
6.4 Conclusion
References
7 Evolution of Electronic Health Records
7.1 Introduction
7.2 Traditional Paper Method
7.3 IoMT
7.4 Telemedicine and IoMT
7.5 Cyber Security
7.6 Materials and Methods
7.7 Literature Review
7.8 Applications of Electronic Health Records
7.9 Results and Discussion
7.10 Challenges Ahead
7.11 Conclusion
References
8 Architecture of IoMT in Healthcare
8.1 Introduction
8.2 Preferences of the Internet of Things
8.3 IoMT Progress in COVID-19 Situations: Presentation
8.4 Major Applications of IoMT
References
9 Performance Assessment of IoMT Services and Protocols
9.1 Introduction
9.2 IoMT Architecture and Platform
9.3 Types of Protocols
9.4 Testing Process in IoMT
9.5 Issues and Challenges
9.6 Conclusion
References
10 Performance Evaluation of Wearable IoT-Enabled Mesh
Network for Rural Health Monitoring
10.1 Introduction
10.2 Proposed System Framework
10.3 Experimental Evaluation
10.4 Performance Evaluation
10.5 Conclusion
References
11 Management of Diabetes Mellitus (DM) for Children and Adults
Based on Internet of Things (IoT)
11.1 Introduction
11.2 Materials and Methods
11.3 Results and Discussion
11.4 Summary
11.5 Conclusion
References
12 Wearable Health Monitoring Systems Using IoMT
12.1 Introduction
12.2 IoMT in Developing Wearable Health Surveillance System
12.3 Vital Parameters That Can Be Monitored Using Wearable
Devices
12.4 Challenges Faced in Customizing Wearable Devices
12.5 Conclusion
References
13 Future of Healthcare: Biomedical Big Data Analysis and IoMT
13.1 Introduction
13.2 Big Data and IoT in the Healthcare Industry
13.3 Biomedical Big Data Types
13.4 Biomedical Data Acquisition Using IoT
13.5 Biomedical Data Management Using IoT
13.6 Impact of Big Data and IoMT in Healthcare
13.7 Discussions and Conclusions
References
14 Medical Data Security Using Blockchain With Soft Computing
Techniques: A Review
14.1 Introduction
14.2 Blockchain
14.3 Blockchain as a Decentralized Security Framework
14.4 Existing Healthcare Data Predictive Analytics Using Soft
Computing Techniques in Data Science
14.5 Literature Review: Medical Data Security in Cloud
Storage
14.6 Conclusion
References
15 Electronic Health Records: A Transitional View
15.1 Introduction
15.2 Ancient Medical Record, 1600 BC
15.3 Greek Medical Record
15.4 Islamic Medical Record
15.5 European Civilization
15.6 Swedish Health Record System
15.7 French and German Contributions
15.8 American Descriptions
15.9 Beginning of Electronic Health Recording
15.10 Conclusion
References
Index
End User License Agreement
List of Illustrations
Chapter 1
Figure 1.1 SOPMA plots for (a) EGFR, (b) K-ras oncogene
protein, and (c) TP53.
Figure 1.2 Ramachandran plots for (a) EGFR, (b) K-ras
oncogene protein, and (c) ...
Figure 1.3 ERRAT plots for (a) EGFR, (b) K-ras oncogene
protein, and (c) TP53.
Figure 1.4 Verify 3D plots for (a) EGFR, (b) K-ras oncogene
protein, and (c) TP5...
Chapter 2
Figure 2.1 Architecture for PHR system.
Figure 2.2 Data classification in cloud computing. company
information and resou...
Figure 2.3 Fuzzy classification block diagram.
Figure 2.4 Analysis framework architecture.
Chapter 3
Figure 3.1 Cloud computing.
Figure 3.2 Types of cloud.
Figure 3.3 Virtualization.
Figure 3.4 Phases of virtual machine migration.
Figure 3.5 Pre-copy algorithm.
Figure 3.6 Timeline for pre-copy.
Figure 3.7 Improved pre-copy live migration.
Figure 3.8 Iteration of time series–based pre-copy live
migration.
Figure 3.9 Structure and operations of MPLM.
Figure 3.10 Structure of TPO.
Figure 3.11 Structure of multiphase pre-copy live migration.
Figure 3.12 Pre-copy vs. improved pre-copy.
Figure 3.13 Low dirty and high dirty pages based on time
series.
Figure 3.14 Pre-copy vs. TPO.
Figure 3.15 TPO vs. multiphase.
Chapter 4
Figure 4.1 Design flow of the proposed system.
Figure 4.2 Comparative analysis of pre-trained networks for
brain tumor classifi...
Chapter 5
Figure 5.1 Block diagram.
Figure 5.2 Pulse oximeter and heart rate sensor.
Figure 5.3 Temperature sensor.
Figure 5.4 Complete hardware of the coma patient monitoring
system.
Figure 5.5 Eye blink detection.
Figure 5.6 Yawning detection.
Figure 5.7 Alert message page.
Figure 5.8 Subject testing.
Figure 5.9 Results of heart rate and SpO2.
Figure 5.10 EEG patterns in coma patient.
Chapter 6
Figure 6.1 Basic structural representation of deep learning
process.
Figure 6.2 Simple architecture with hidden layers.
Figure 6.3 Architectural models of deep learning.
Figure 6.4 Architecture of recurrent neural networks.
Figure 6.5 LSTM memory cell.
Figure 6.6 GRU cell.
Figure 6.7 Basic structural framework of convolutional neural
network (CNN).
Figure 6.8 Architectural framework for deep belief networks.
Figure 6.9 Simple architecture of deep stacking networks.
Chapter 9
Figure 9.1 IoMT healthcare system.
Figure 9.2 Platform architecture.
Figure 9.3 Communication protocol overview.
Figure 9.4 The MQTT publish and subscribe model for IoT.
Figure 9.5 CoAP message model.
Figure 9.6 CoAP request/response model.
Figure 9.7 AMQP interaction model with middleware.
Figure 9.8 AMQP capabilities.
Figure 9.9 AMQP for cloud connection.
Figure 9.10 DDS protocol Architecture.
Chapter 10
Figure 10.1 Architecture of wearable IoT-enabled rural health
monitoring system.
Figure 10.2 Body sensor node and its internal architecture.
Figure 10.3 System framework of health monitoring center
(HMC).
Figure 10.4 Sequence diagrams of mesh peering and routing
medical data.
Figure 10.5 GUI alert when the patient’s blood pressure and
sugar is critically ...
Figure 10.6 Energy consumption in HMC.
Figure 10.7 Survival rate.
Figure 10.8 End-to-end delay.
Chapter 11
Figure 11.1 Block diagram of the proposed system.
Figure 11.2 Components of the noninvasive glucose
monitoring system.
Figure 11.3 Prototype of the glucose monitoring system.
Figure 11.4 Output of glucose monitoring.
Chapter 13
Figure 13.1 Three important V of big data.
Figure 13.2 Applications of big data and IoT in healthcare.
Figure 13.3 Basic details available in an electronic health
record.
Figure 13.4 Commonly used big data management tools.
Chapter 14
Figure 14.1 General architecture and workflow of the
proposed system [7].
Figure 14.2 Remote patient monitoring [8].
Figure 14.3 Blockchain architecture categories [7].
Figure 14.4 Nodes in public vs. private Blockchain [8].
Figure 14.5 Scenarios of using Blockchain in different
healthcare situations [8]...
Figure 14.6 Potential applications of the Blockchain [10].
Figure 14.7 Characteristics of Blockchain.
Chapter 15
Figure 15.1 Evolution of EHR.
List of Tables
Chapter 1
Table 1.1 Physiochemical characters of EGFR, K-ras, and TP53
proteins as determi...
Table 1.2 The number disulfide bonds were quantitated by
Cys_Rec prediction prog...
Table 1.3 Secondary structure of the EGFR, K-ras oncogene
protein, and TP53.
Table 1.4 Composition of α-helix EGFR, K-ras oncogene
protein, and TP53.
Table 1.5 Validation of the EGFR, K-ras oncogene protein, and
TP53.
Table 1.6 Predicted active sites of the EGFR, K-ras oncogene
protein, and TP53.
Table 1.7 Docking result of the EGFR, K-ras oncogene protein,
and TP53.
Chapter 3
Table 3.1 Type 1 VMM Approach.
Table 3.2 Type 2 VMM Approach.
Chapter 4
Table 4.1 Various symptoms of brain tumors.
Table 4.2 Sample images used for classification purpose.
Table 4.3 Performance of AlexNet pre-trained network.
Table 4.4 Performance of GoogleNet pre-trained network.
Table 4.5 Performance of ResNet101 pre-trained network.
Table 4.6 Comparison of performance metrics between
AlexNet, GoogleNet, and ResN...
Table 4.7 Evaluation of accuracy and processing time of pre-
trained networks.
Chapter 6
Table 6.1 Applications of deep learning networks.
Chapter 10
Table 10.1 Blood glucose classification.
Table 10.2 Blood pressure classification.
Table 10.3 Symptoms and signs of diabetic types.
Table 10.4 DE parameter settings.
Scrivener Publishing
100 Cummings Center, Suite 541J
Beverly, MA 01915-6106
Advances in Learning Analytics for Intelligent Cloud-IoT Systems
Series Editors: Dr. Souvik Pal and Dr. Dac-Nhuong Le
Scope: The role of adaptation, learning analytics, computational
Intelligence, and data analytics in the field of Cloud-IoT Systems is
becoming increasingly essential and intertwined. The capability of an
intelligent system depends on various self-decision making algorithms
in IoT Devices. IoT based smart systems generate a large amount of
data (big data) that cannot be processed by traditional data processing
algorithms and applications. Hence, this book series involves different
computational methods incorporated within the system with the help
of Analytics Reasoning and Sense-making in Big Data, which is centered
in the Cloud and IoT-enabled environments.
The series seeks volumes that are empirical studies, theoretical and
numerical analysis, and novel research findings. The series encourages
cross-fertilization of highlighting research and knowledge of Data
Analytics, Machine Learning, Data Science, and IoT sustainable
developments.
Please send proposals to:
Dr. Souvik Pal
Department of Computer Science and Engineering
Global Institute of Management and Technology
Krishna Nagar
West Bengal, India
souvikpal22@gmail.com
Dr. Dac-Nhuong Le
Faculty of Information Technology, Haiphong University, Haiphong,
Vietnam
huongld@hus.edu.vn
Publishers at Scrivener
Martin Scrivener (martin@scrivenerpublishing.com)
Phillip Carmical (pcarmical@scrivenerpublishing.com)
The Internet of Medical
Things (IoMT)
Healthcare Transformation
Edited by
R.J. Hemalatha
D. Akila
D. Balaganesh
and
Anand Paul
This edition first published 2022 by John Wiley & Sons, Inc., 111 River Street,
Hoboken, NJ 07030, USA and Scrivener Publishing LLC, 100 Cummings Center, Suite
541J, Beverly, MA 01915, USA © 2022 Scrivener Publishing LLC
For more information about Scrivener publications please visit
www.scrivenerpublishing.com.
All rights reserved. No part of this publication may be reproduced, stored in a
retrieval system, or transmitted, in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise, except as permitted by law.
Advice on how to obtain permission to reuse material from this title is available at
http://www.wiley.com/go/permissions.
Wiley Global Headquarters
111 River Street, Hoboken, NJ 07030, USA
For details of our global editorial offices, customer services, and more information
about Wiley products visit us at www.wiley.com.
Limit of Liability/Disclaimer of Warranty
While the publisher and authors have used their best efforts in preparing this work,
they make no representations or warranties with respect to the accuracy or
completeness of the contents of this work and specifically disclaim all warranties,
including without limitation any implied warranties of merchantability or fitness for
a particular purpose. No warranty may be created or extended by sales
representatives, written sales materials, or promotional statements for this work.
The fact that an organization, website, or product is referred to in this work as a
citation and/or potential source of further information does not mean that the
publisher and authors endorse the information or services the organization, website,
or product may provide or recommendations it may make. This work is sold with
the understanding that the publisher is not engaged in rendering professional
services. The advice and strategies contained herein may not be suitable for your
situation. You should consult with a specialist where appropriate. Neither the
publisher nor authors shall be liable for any loss of profit or any other commercial
damages, including but not limited to special, incidental, consequential, or other
damages. Further, readers should be aware that websites listed in this work may have
changed or disappeared between when this work was written and when it is read.
Library of Congress Cataloging-in-Publication Data
ISBN 978-1-119-76883-8
Cover image: Pixabay.Com
Cover design by Russell Richardson
Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati,
Philippines
Printed in the USA
10 9 8 7 6 5 4 3 2 1
Preface
It is a pleasure for us to put forth this book, The Internet of Medical
Things (IoMT): Healthcare Transformation. Digital technologies have
come into effect in various sectors of our daily lives and it has been
successful in influencing and conceptualizing our day-to-day activities.
The Internet of Medical Things is one such discipline which seeks a lot
of interest as it combines various medical devices and allows these
devices to have a conversation among themselves over a network to
form a connection of advanced smart devices. This book helps to know
about IoMT in the health care sector that involves the latest
technological implementation in diagnostic level as well as therapeutic
level. The security and privacy of maintaining the health records is a
major concern and several solutions for the same has been discussed in
this book. It provides significant advantages for the wellbeing of people
by increasing the quality of life and reducing medical expenses. IoMT
plays a major role in maintaining smart healthcare system as the
security and privacy of the health records further leads to help the
health care sector to be more secure and reliable. Artificial Intelligence
is the other enabling technology that helps IoMT in building smart
defensive mechanisms for a variety of applications like providing
assistance for doctors in almost every area of their proficiencies such as
clinical decision-making. Through Machine Learning and Deep
Learning techniques, the system can learn normal and abnormal
decisions using the data generated by the health worker/professionals
and the patient feedback. This book demonstrates the connectivity
between medical devices and sensors is streamlining clinical workflow
management and leading to an overall improvement in patient care,
both inside care facility walls and in remote locations. This book would
be a good collection of state-of-the-art approaches for applications of
IoMT in various health care sectors. It will be very beneficial for the
new researchers and practitioners working in the field to quickly know
the best methods for IoMT.
• Chapter 1 concentrates on the study of the three-dimensional (3-
D) models of lung cancer cell line proteins (epidermal growth
factor (EGFR), K-Ras oncogene protein and tumor suppressor
(TP53)). The generation and their binding affinities with
curcumins, ellagic acid and quercetin through local docking were
assessed.
• Chapter 2 focuses on cloud computing and electronic health
record system service EHR used to protect the confidentiality of
patient sensitive information and must be encrypted before
outsourcing information. This chapter focuses on the effective use
of cloud data such as search keywords and data sharing and the
challenging problem associated with the concept of soft
computing.
• Chapter 3 elucidates the study of cloud computing concepts,
security concerns in clouds and data centers, live migration and its
importance for cloud computing, and the role of virtual machine
(VM) migration in cloud computing. It provides a holistic approach
towards the pre-copy migration technique thereby explore the way
for reducing the downtime and migration time. This chapter
compares different pre-copy algorithms and evaluates its
parameters for providing a better solution.
• Chapter 4 concentrates on Deep Learning that has gained more
interest in various fields like image classification, self-driven cars,
natural language processing and healthcare applications. The
chapter focuses on solving the complex problems in a more
effective and efficient manner. It elaborates for the reader how
deep learning techniques are useful for predicting and
classification of the brain tumor cells. Datasets are trained using
pre-trained neural networks such as Alexnet, Googlenet and
Resnet 101 and performance of these networks are analysed in
detail. Resnet 101 networks have achieved highest accuracy.
• Chapter 5 illustrates an intelligent healthcare monitoring system
for coma patients that examines the coma patient's vital signs on a
continuous basis, detects the movement happening in the patient,
and updates the information to the doctor and central station
through IoMT. Consistent tracking and observation of these health
issues improves medical assurance and allows for tracking coma
events.
• Chapter 6 details the Deep Learning process that resembles the
human functions in processing and defining patterns used for
decision-making. Deep learning algorithms are mainly designed
and developed using neural networks performing unsupervised
data that are unstructured. Biomedical data possess time and
frequency domain features for analysis and classification. Thus,
deep learning algorithms are used for interpretation and
classification of biomedical big data.
• Chapter 7 discusses how the electronic health records automates
and streamlines the clinician’s workflow and makes the process
easy. It has the ability to generate the complete history of the
patient and also help in assisting for the further treatment which
helps in the recovery of the patient in a more effective way. The
electronic health records are designed according to the
convenience depending on the sector it is being implemented. The
main aim of electronic health records was to make it available to
the concerned person wherever they are, to reduce the work load
to maintain clinical book records and use the details for research
purposes with the concerned persons acknowledgement.
• Chapter 8 elaborates technical architecture of IoMT in relation to
biomedical applications. These ideologies are widely used to
educate people regarding the medical applications using IoMT. It
also gives a detailed study about the future scope of IoMT in
healthcare.
• Chapter 9 provides knowledge on the different performance
assessment techniques and types of protocols that suits best data
transfer and increases safety. The chapter provides the best
protocol which helps in saving energy and is useful for the
customer. It will help the researchers to select the best IoT
protocol for healthcare applications. Testing tools and frameworks
provide knowledge to assess the protocols.
• Chapter 10 addresses the issue of a Health Monitoring Centre
(HMC) in rural areas. The HMC monitors and records continuously
the physiological parameters of the patients in care using wearable
biosensors. The elderly suffering from chronic diseases is
monitored periodically or continuously under the care of the
physician. To enhance the performance of the system a smart and
intelligent mesh backbone is integrated for fast transmission of the
critical medical data to a remote health IOT cloud server.
• Chapter 11 concentrates on Diabetes Mellitus (DM) which is one
of the most widely recognized perilous illnesses for all age groups
in the world. The patients need to settle on the best-individualized
choices about day-by-day management of their diabetes.
Noninvasive glucose sensor used to find out the glucose value of
patients from its fingertip and other sensors also connected to the
patient to get relevant data. A completely useful IoT-based eHealth
stage that wires humanoid robot help with diabetes and planned
successfully. The created platform encourages a constant coupled
network among patients and their caretakers over physical
separation and, in this manner, improving patient’s commitment
with their caretakers while limiting the cost, time, and exertion of
the conventional occasional clinic visits.
• Chapter 12 explores the concepts of wearable health monitoring
systems using IoMT technology. Additionally, this chapter also
provides a brief review about challenges and applications of
customized wearable healthcare system that are trending these
days. The basic idea is to have a detailed study about the recent
developments in IoMT technologies and the drawbacks, as well as
future advancements related to it. The recent innovations,
implications and key issues are discussed in the context of the
framework.
• Chapter 13 provides knowledge on biomedical big data analysis
which plays a huge impact in personalized medicine. Some
challenges in big data analysis like data acquisition, data accuracy,
data security are discussed. Huge volume of data in healthcare can
be managed by integrating biomedical data management. This
chapter will provide brief information on different software that
are used to manage data in healthcare domain. Impact of big data
and IoMT in healthcare will enhance data analytics research.
• Chapter 14 concentrates on blockchain which is a highly secure
and decentralized networking platform of multiple computers
called nodes. Predictive analysis, soft computing (SC) and
optimization and data science is becoming increasingly important.
In this chapter, the authors investigate privacy issues around large
cloud medical data in the remote cloud. Their proposed framework
ensures data privacy, integrity, and access control over the shared
data with better efficiency. It reduces the turnaround time for data
sharing, improves the decision-making process, and reduces the
overall cost while providing better security of electronic medical
records.
• Chapter 15 discusses the evolution of electronic health record
starting with the history and evolution of the health record system
in the Egyptian era when the first health record was written, all the
way to the modern computerized health record system. This
chapter also includes various documentation procedures for the
health records that were followed from the ancient times and by
other civilizations around the world.
Abstract
In this study, the three-dimensional (3D) models of lung cancer cell line proteins [epidermal growth
factor (EGFR), K-ras oncogene protein, and tumor suppressor (TP53)] were generated and their
binding affinities with curcumin, ellagic acid, and quercetin through local docking were assessed.
Firstly, Swiss model was used to build lung cancer cell line proteins and then visualized by the PyMol
software. Next, ExPASy ProtParam Proteomics server was used to evaluate the physical and chemical
parameters of the protein structures. Furthermore, the protein models were validated using
PROCHECK, ProQ, ERRAT, and Verify3D programs. Lastly, the protein models were docked with
curcumin, ellagic acid, and quercetin by using BSP-Slim server. All three protein models were
adequate and in exceptional standard. The curcumin showed binding energy with EGFR, K-ras
oncogene protein, and TP53 at 5.320, 2.730, and 1.633, kcal/mol, respectively. Besides that, the ellagic
acid showed binding energy of EGFR, K-ras oncogene protein, and TP53 at –2.892, 0.921, and 0.054
kcal/mol, respectively. Moreover, the quercetin showed binding energy of EGFR, K-ras oncogene
protein, and TP53 at –1.249, –1.154, and –0.809 kcal/mol, respectively. The EGFR had the strongest
bond with ellagic acid while K-ras oncogene protein and TP53 had the strongest interaction with
quercetin. In order to identify the appropriate function, all these potential drug candidates can be
further assessed through laboratory experiments.
Keywords: EGFR, K-ras, TP53, curcumin, ellagic acid, quercetin, docking
1.1 Introduction
Lung cancer is known to be the number one cause of cancer deaths among all the cancer in both men and
women in worldwide. According to a World Health Organization (WHO) survey, lung cancer caused 19.1
deaths per 100,000 in Malaysia, or 4,088 deaths per year (3.22% of all deaths) [1]. Moreover, there was a
record of 1.69 million of deaths worldwide in 2015 due to lung cancer. Furthermore, a research in UK
estimated that there will be 23.6 million of new cases of cancer worldwide each year by 2030 [1]. The
main cause of lung cancer deaths is smoking. Almost 8% of people died because of it. Furthermore, the
second reason is exposure to secondhand smoke. Thus, it is very clear that smoking is the leading risk
factor for lung cancer. However, not everyone who got lung cancer is smokers as many people with lung
cancer are former smokers while many others never smoked at all. Moreover, radiation exposure,
unhealthy lifestyle, secondhand smoke, pollution of air, genetic markers, prolongs inhalation of asbestos,
and chemicals as well as other factors can cause lung cancer non-smokers [2].
Furthermore, it seems that most lung cancer signs do not appear until the cancer has spread, although
some people with early lung cancer do have symptoms. Generally, the symptoms of lung cancer are a
cough that does not go away and instead gets worse, shortness of breath, chest pain, feeling tired or
weak, new onset of wheezing, and some lung cancer can even cause syndrome [3]. On top of that, a
number of tests can be conducted in order to look for cancerous cell such as X-ray image of lung that
could disclose the abnormal mass or nodule, a CT scan to exhibit small lesions in the lungs which may
not detected on X-ray, blood investigations, sputum cytology, and tissue biopsy [4]. Lung cancer
treatments being carried out are adjuvant therapy which may include radiation, chemotherapy, targeted
therapy, or immunotherapy.
Since they originate from the bronchi within the lungs, small-cell lung carcinoma (SCLC) and non-small-
cell lung carcinoma (NSCLC) are the two main clinic pathological classes for lung cancer. They are also
known as bronchogenic carcinomas because they arise from the bronchi within the lungs [4]. Lung
cancer is believed to be arising after a series of continuous pathological changes (preneoplastic lesions)
which very often discovered accompanying lung cancers as well as in the respiratory mucosa of smokers.
Apart from that, the genes involved in lung cancer are epidermal growth factor receptor (EGFR), KRAS,
MET, LKBI, BREF, ALK, RET, and tumor suppressor gene (TP53) [5]. The three most common genes in
lung cancer are EGFR, KRAS, and TP53, and the structure of these genes is explored in thus study. EGFR
is actually transmembrane protein that has cytoplasmic kinase movement and it transduces essential
development factor motioning from the extracellular milieu to the cell. According to da Cunha Santos,
more than 60% of NSCLCs expresses EGFR which has turned into an essential focus for the treatment of
these tumors [6]. In addition, the KRAS mutation is the most widely recognized oncogene driver change
in patients with NSCLC and presents a poor guess in the metastatic setting, making it an imperative focus
for tranquilize advancement. It is difficult to treat patients with KRAS mutations since there is no
targeted therapy yet [7]. Among the mutations, the most common mutation that found to occur in lung
cancer is TP53 mutations and its frequency becomes greater with tobacco consumption [8]. In this study,
three compounds (curcumin, ellagic acid, and quercetin) were used for docking with the three mutant
proteins. Curcumin has excellent safety profile that focus on different infections with solid confirmation
on molecule level. Thus, improvement in formulation criteria can aid in developing therapeutic drug [9].
Next, ellagic acid has the ability to bind with cancer cells to make them inactive and it is also effective to
resist cancer in rats and mice according to a research [10]. Quercetin is a pigment from plant (flavonoid)
which has anti-oxidant and anti-inflammatory effect. It has shown to inhibit the multiplication of cancer
cells according to Pao-Chen Kuo et al. [11].
Bioinformatics is a multidisciplinary discipline that creates methods and software tools for storing,
extracting, organizing, and interpreting biological data. To analyze biological data, a combination of
bioinformatics and computer science, statistics, physics, chemistry, mathematics, and engineering is
useful. Currently, this method is growing rapidly because it is cheap and quite faster than experimental
approaches. Computational biology tools such as protein modeling (e.g., Swiss Model, Easy Modeller, and
Modeller), molecular dynamic simulation (e.g., Gromacs and Amber), and docking (e.g., Autodock version
4.2, AutodockVina, Swissdock, and Haddock) helped design substrate-based drugs to study the
interaction between the target proteins (cancer cell proteins) and ligand (phytocomponents).
The aim of conducting this research is to initiate three-dimensional (3D) models of lung cancer line
proteins (EGFR, K-ras oncogene, and TP53) and to guesstimate their binding affinities with curcumin,
ellagic acid, and quercetin via docking approach.
1.2 Methodology
1.2.1 Sequence of Protein
The entire amino acid sequence of the EGFR (GI: 110002567), K-ras oncogene protein (GI: 186764), and
TP53 (GI: 1233272225) were obtained from National Center for Biotechnology Information Center for
Biotechnology Information (NCBI). Next, EGFR consists of 464 amino acids, K-ras oncogene protein
contains 188 amino acids, while TP53 consists of 346 amino acids.
Figure 1.1 SOPMA plots for (a) EGFR, (b) K-ras oncogene protein, and (c) TP53.
Table 1.3 Secondary structure of the EGFR, K-ras oncogene protein, and TP53.
Secondary structure Alpha helix (Hh) Extended strand (Ee) Beta turn (Tt) Random coil (CC)
EGFR 16.81 16.81 3.23 64.44
KRAS 43.62 21.81 7.45 27.13
TP53 18.79 18.21 3.18 59.83
Table 1.4 Composition of α-helix EGFR, K-ras oncogene protein, and TP53.
Amino acid Longest alpha helix Residues Shortest alpha helix Number of residues
EGFR α14 14 α3, α6, α11, α15 1
KRAS α11 20 α1,α10 1
TP53 α5 11 α7 1
Figure 1.2 Ramachandran plots for (a) EGFR, (b) K-ras oncogene protein, and (c) TP53.
Table 1.5 Validation of the EGFR, K-ras oncogene protein, and TP53.
1.4 Conclusion
In a nutshell, EGFR was successfully docked with curcumin, ellagic acid, and quercetin. Besides that, the
same approach of docking simulation was performed for K-ras oncogene protein and TP53. Among the
three protein models, EGFR had a strong interaction with ellagic acid due to the lowest energy value
while K-ras oncogene protein and TP53 had a strong interaction with quercetin as the binding energy
was the lowest. Consequently, result from this study will aid in designing a suitable structure-based drug.
However, wet lab must be carried out to verify the results of this study.
References
1. Cancer Research UK, Worldwide cancer statistics, 2012, https://www.cancerresearchuk.org/health-
professional/cancer-statistics/worldwide-cancer#collapseZero.
2. American Cancer Society, Lung cancer prevention and early detection, 2016,
https://www.cancer.org/cancer/lung-cancer/prevention-and-early-detection/signs-and-
symptoms.html.
3. American Cancer Society, Causes, risk factors and prevention, 2016,
https://www.cancer.org/cancer/non-small-cell-lung-cancer/causes-risks-prevention/ what causes.
4. Mayo Clinic, Lung cancer, 2018, https://www.mayoclinic.org/diseases-conditions/lung-
cancer/diagnosis-treatment/drc-20374627.
5. El-Telbany, A. and Patrick, C.M., Cancer genes in lung cancer. Genes Cancer, M3, 7–8, 467–480, 2012.
6. Santos, D.C., Sheperd, F.A., Tsao, M.S., EGFR mutations and lung cancer. Annu. Rev. Pathol.: Mechanisms
of Disease, 6, 49–69, 2016.
7. Bhattacharya, S., Socinski, M.A., T.F., KRAS mutant lung cancer: progress thus far on an elusive
therapeutic target. Clin. Transl. Med., 4, 35, 2015.
8. Halverson, A.R., Silwal-Pandit, L., Meza-Zepeda, L.A. et al., TP53 mutation spectrum in smokers and
never smoking lung cancer patients. Front. Genet., 7, 85, 2016.
9. Basnet, P. and Skalko-Basnet, N., Curcumin: An anti-inflammatory molecule from a curry spice on the
path to cancer treatment. Molecules, 6, 6, 4567–4598, 2011.
10. Healthline, Whyellagic acid is important?, 2020, https://www.healthline.com/health/ellagic-acid.
11. Kuo, P.-C., Liu, H.-F., Chao, J.-I., Survivin and p53 modulate quercetin-induced cell growth inhibition
and apoptosis in human lung carcinoma cells. J. Biol. Chem., 279, 53, 55875–55885, 2004.
12. Biasini, M., Bienert, S., Waterhouse, A., Arnold, K., Studer, G., Schmidt, T. et al., SWISS-MODEL:
Modelling protein tertiary and quaternary structure using evolutionary information. Nucleic Acids Res.,
42, W252-8, 2014.
13. Delano, W.L., The PyMOL molecular graphics system, 2001, http://www.pymol.org.
14. Gasteiger, E., Hoogland, C., Gattiker, A. et al., Protein identification and analysis tools on the ExPASy
server, in: The proteomics protocols handbook, J.M. Walker (Ed.), Humana Press, Totowa, 2015.
15. Prabi, L.G., Color protein sequence analysis, 1998, https://npsaprabi.ibcp.fr/cgi-
bin/npsa_automat.pl?page=/NPSA/npsa_color.html.
16. Costantini, S., Colonna, G., Facchiano, A.M., ESBRI: a web server for evaluating salt bridges in proteins.
Bioinformation, 3, 137–138, 2008.
17. Roy, S., Maheshwari, N., Chauhan, R. et al., Structure prediction and functional characterization of
secondary metabolite proteins of Ocimum. Bioinformation, 6, 8, 315–319, 2011.
18. Geourjon, C. and Deleage, G., SOPMA: significant improvements in protein secondary structure
prediction by consensus prediction from multiple alignments. Comput. Appl. Biosci., 11, 681–684, 1995.
19. Laskowski, R.A., MacArthur, M.W., Moss, D.S. et al., PROCHECK: a program to check the stereo
chemical quality of protein structures. J. Appl. Cryst., 26, 283–291, 1993.
20. Wallner, B. and Elofsson, A., Can correct protein models be identified? Protein Sci., 12, 1073–1086,
2003.
21. Colovos, C. and Yeates, T.O., Verification of protein structures: patterns of non-bonded atomic
interactions. Protein Sci., 2, 1511–1519, 1993.
22. Eisenberg, D., Luthy, R., Bowie, J.U., VERIFY3D: assessment of protein models with three- dimensional
profiles. Methods Enzymol., 77, 396–404, 1977.
23. Jayaram, B., Active site prediction server, 2004, http://www.scftio-iitd.res.in/dock/ActiveSite.jsp.
24. National Center for Biotechnology Information, Pubchem., 2017, https://pubchem.ncbi.nlm.nih.gov/.
25. Hui, S.L. and Yang, Z., BSP-SLIM: A blind low-resolution ligand-protein docking approach using
theoretically predicted protein structures. Proteins, 80, 93–110, 2012.
26. Kumar, S., Tsai, C.J., Ma, B. et al., Contribution of salt bridges toward protein thermo-stability. J.
Biomol. Struct. Dyn., 1, 79–86, 2000.
27. Kumar, S. and Nussinov, R., Salt bridge stability in monomeric proteins. J. Mol. Biol., 293, 1241–1255,
2009.
28. Kumar, S. and Nussinov, R., Relationship between ion pair geometries and electrostatic strengths in
proteins. Biophys. J., 83, 1595–1612, 2002.
29. Parvizpour, S., Shamsir, M.S., Razmara, J. et al., Structural and functional analysis of a novel
psychrophilic b-mannanase from Glaciozyma Antarctica PI12. J. Comput. Aided Mol. Des., 28, 6, 685–698,
2014.
30. Murugesan, D., Ponnusamy, R.D., Gopalan, D.K., Molecular docking study of active phytocompounds
from the methanolic leaf extract of vitexnegundo-against cyclooxygenase-2. Bangladesh J. Pharmacol., 9,
2, 146–53, 2014.
31. Balamurugan, V and Balakrishnan, V., Molecular docking studies of Moringaconcanensisnimmo leaf
phytocompounds for brain cancer. Res. Rev.: J. Life Sci., 8, 1, 26–34, 2018.
32. Santhanakrishnan, D., Sipriya, N., Chandrasekaran, B., Studies on the phytochemistry, spectroscopic
characterization and antibacterial efficacy of Salicornia Brachiata. Int. J. Pharm. Pharm. Sci., 6, 6430–
6432, 2014.
33. Kasilingam, T. and Elengoe, A., In silico molecular modeling and docking of apigenin against the lung
cancer cell proteins. Asian J. Pharm. Clin. Res., 11, 9, 246–252, 2018.
34. Ashwini, S., Varkey, S.P., Shantaram, M., Insilico docking of polyphenolic compounds against Caspase
3-HeLa cell line protein. Int. J. Drug Dev. Res., 9, 28–32, 2017.
35. Chakrabarty, N., Hossain, A., Barua, J., Kar, H., Akther, S., Al Mahabub, A., Majumder, M., Insilico
molecular docking of some isolated selected compounds of lantana camera against Alzheimer’s disease.
Biomed. J. Sci. Tech. Res., 12, 2, 9168–9171, 2018.
36. Supramaniam, G. and Elengoe, A., In silico molecular docking of glycyrrhizin and breast cancer cell
line proteins, in: Plant-Derived Bioactives, 1, 575–589, 2020.
37. Elengoe, A. and Sebestian, E., In silico molecular modelling and docking of allicin, epigallocatechin-3-
gallate and gingerol against colon cancer cell proteins. Asia Pac. J. Mol. Biol. Biotechnol., 4, 2851–67, 2020.
*Corresponding author: asitaelengoe@yahoo.com
2
Medical Data Classification in Cloud
Computing Using Soft Computing
With Voting Classifier: A Review
Saurabh Sharma1*, Harish K. Shakya1† and Ashish Mishra2‡
1Dept. of CSE, Amity School of Engineering & Technology, Amity
University (M.P.), Gwalior, India
2Department of CSE, Gyan Ganga Institute of Technology and
Sciences, Jabalpur, India
Abstract
In the current context, a tele-medical system is the rising medical
service where health professionals can use telecommunication
technology to treat, evaluate, and diagnose a patient. The data in the
healthcare system signifies a set of medical data that is sophisticated
and larger in number (X-ray, fMRI data, scans of the lungs, brain,
etc.). It is impossible to use typical hardware and software to
manage medical data collections. Therefore, a practical approach to
the equilibrium of privacy protection and data exchange is required.
To address these questions, several approaches are established,
most of the studies focusing on only a tiny problem with a single
notion. This review paper analyzes the data protection research
carried out in cloud computing systems and also looks at the major
difficulties that conventional solutions confront. This approach helps
researchers to better address existing issues in protecting the
privacy of medical data in the cloud system.
Keywords: Medical data, soft computing, fuzzy, cloud computing,
data privacy, SVM, FCM
2.1 Introduction
There are many definitions in Electronic Health Record (EHR), such as
the electronic record that holds patient information on a health record
system operated by healthcare providers [1]. Although EHR has a good
effect on healthcare services, development in many healthcare
institutions globally, particularly in poor nations, is delayed due to
numerous common problems. Patient data security has been a problem
since the beginning of medical history and is an important issue in
modern day. Initiated by the idea of confidentiality, the Oath of
Hippocrates has proved to be an honorable activity in clinical and
medical ethics. It is of highest importance to protect the privacy and
confidentiality of patient information; security is trustworthy. Medical
record security generally involves privacy and confidentiality [2]. Cloud
computing provides the option of accessing massive amounts of patient
information in a short period of time. This makes it easier for an
unauthorized person to obtain patient records. It confirms this feeling
by saying “illegal access to traditional medical records (paper-based)
has always been conceivable, but computer introduction increases a
little problem to a large problem.”
Cloud computing is a concept for easy, on-demand access to a common
pool of configurable computer resources (e.g., networks, servers,
storage, applications, and services), which may easily be provided and
disclosed with minimal administration effort or engagement from
service providers [4]. The newest, most exciting, and comprehensive
solution in the world of IT is cloud computing. Its major purpose is to
use the Internet or intranet to exchange resources for users [5]. Cloud
computing is an affordable, automatically scalable, multi-tenant, and
secure cloud service provider platform (CSP).
2.1.1.1 Capture
All data comes from someone, but regrettably, it is not always from
someone with flawless data management habits for many healthcare
providers. Collecting clean, comprehensive, precise, and correctly
structured data for numerous systems is a constant battle for
businesses, many of whom are not on the gaining side of the conflict.
In a recent investigation at an ophthalmology clinic, EHR data were
only 23.5% matched by patient-reporting data. When patients reported
three or more eye problems, their EHR data were absolutely not in
agreement.
Poor usability of EHRs, sophisticated processes, and an incomplete
understanding why big data is crucial to properly collect all can
contribute to quality problems that afflict data during its life cycle.
Providers can begin to improve the data capture routines by
prioritizing valuable data types for their specific projects, by enlisting
the data management and integrity expertise of professional health
information managers, and by developing clinical documentation
improvement programs to train clinicians on how to ensure data are
useful for downstream analysis.
2.1.1.2 Cleaning
Health providers are familiar with the necessity of cleanliness in both
the clinic and the operating room, but are not aware of the importance
of cleaning their data.
Dirty data can swiftly ruin a large data analytics project, especially if
multiple data sources are used to capture clinical or operational
elements in slightly different formats. Data cleaning—also known as
cleaning or scrubbing—guarantees accuracy, correctness, consistency,
relevance, and in no way corruption of datasets.
While most data cleaning activities are still done manually, certain IT
vendors provide automated scrubbing instruments that compare,
contrast, and rectify big data sets using logic rules. These technologies
may grow more sophisticated and accurate as machine learning
techniques continue to progress rapidly, lowering time and cost
necessary to guarantee high levels of accuracy and integrity in health
data stores.
2.1.1.3 Storage
Clinicians at the front line rarely worry about the location of their data,
yet it is a critical cost, safety, and performance issue for the IT
department. Due to the exponential growth in the amount of health
data, several suppliers can no longer manage the costs and implications
on local data centers.
While many firms are more convenient to store data in the premises,
which promises control over security, access, and up-time, the on-site
server network can be costly, hard to operate, and prone to data silo
production in various departments.
Cloud storage is becoming more and more common as costs decrease
and reliability increases. Nearly, 90% of healthcare firms use some
cloudbased IT infrastructure, including warehousing and applications
in a 2016 survey.
The cloud promises a smooth recovery from disasters, reduced upfront
costs, and simpler expansion—even though enterprises have to be
exceedingly careful to select partners who understand the significance
of HIPAA and other compliance and safety issues for health.
Many firms have a hybrid approach to their data store initiatives, which
can offer providers with diverse access and storage requirements the
most flexible and workable solution. However, providers should be
careful to ensure that separate systems can communicate and share
data with other sectors of the company when appropriate while
establishing a hybrid infrastructure.
2.1.1.4 Security
Data security for healthcare businesses is the number one issue,
particularly following a fast fire succession of high-profile violations,
hackings, and ransomware outbreaks. From phishing assaults, viruses,
and laptops left accidently in a cab, health information is exposed to an
almost endless range of dangers.
The HIPAA Security Rule offers a broad set of technological guarantees
for PHI storage organizations, including transmission security,
authentication procedures and access, and integrity and auditing
measures.
These precautions really lead to common sense safety processes, such
as the use of up-to-date anti-virus software, the setup of firewalls, the
encryption of sensitive data, and multi-factor authentication.
However, even the most closely secured data center can be overcome by
personnel who tend to give priority over long software updates and
sophisticated limits on their access to data or software.
Health organizations should often remind their staff members of the
important nature of data security standards and continuously examine
who has access to high-value data in order to prevent damage caused
by malevolent parties.
2.1.1.5 Stewardship
Health data has a long shelf-life, especially on the clinical side. In
addition to keeping patient data accessible for at least 6 years,
clinicians may choose to use de-identified datasets for research
projects, which is vital for continued stewardship and cure. For
additional objectives, such as quality measurement or performance
benchmarking, data may also be repurposed or re-assessed.
Understanding when and for what purposes the data were created—as
well as who utilized it previously, why, how, and when—is vital to
academics and data analysts.
The development of complete, accurate, and up-to-date metadata is an
important component of a successful data management plan. Metadata
enables analysts to precisely duplicate earlier questions that are critical
for scientific investigations and proper benchmarking and prevents the
creation of “data trash”.
Health organizations should employ a data manager to produce and
curate valuable metadata. A data controller may ensure that all pieces
have standard definitions and formats, are properly documented from
creation to deletion, and remain valuable for the tasks involved.
2.2.1 Authentication
Authentication is the process of establishing trust in user identity.
Certification assurance levels will be in accordance with the application
and nature and sensitivity to the risk involved. An increasing number of
cloud providers are reached using their previously certified standards
and user support and administration applications and data. Also, a
common two-factor authentication, in the form of strong
authentication, is, for example, to be used as online banking. In theory,
it should be protected using strong authentication networks. The
stricter requirements apply mainly to CSP employees. They also have
access to IT resources; just for example, it will be provided through
strong authentication, using a chip card or USB stick that can be
generated by hardware through hardware-based password
authentication system or media. This is really necessary to use on the
Internet. He went on to establish strict procedures that are the basis of
all relationships of trust between participants for relationships
between two actors. After the trust relationship is established through
a series of trusted from a certification authority, participants can be
used to authenticate each other in connection with [3]. There are a
variety of authentication methods and techniques that organizations
can choose as follows.
2.2.1.11 Authority
The integrity of cloud computing needs an important information
security to maintain relevant authority. It follows the following controls
and privileges in the process stream in cloud computing. The rights
management system should ensure that each role (including metadata)
can see the need to obtain the data function. Access control should be
based and the established role goes on and officers should be reviewed
regularly. In general, the model of least privilege should be used, and
the user and administrator only have the necessary rights for the CSP to
enable them to achieve their functions [14].
Even after the Erie canal was built and long lines of boats were
carrying the grain and other products of the West to New York, the
men of Virginia and Maryland did not give up the notion of still
making the trade of the western country come their way. They
planned the Chesapeake and Ohio canal, to reach the Ohio river,
and thought that other canals across the state of Ohio would let them
into lake Erie. By the Ohio river they would connect with New
Orleans and the upper Mississippi river, and through lake Erie they
could reach the towns and farms that border lake Huron, lake
Michigan, and lake Superior.
A canal along the Potomac valley had been talked of several
years before the Revolution, when Richard Henry Lee laid a plan for
it before the Assembly of Virginia. Doubtless others thought of it too,
as of the Erie canal, long before it was made. At the end of the War
of the Revolution Washington made a long journey into the wild
woods of New York. He went to the source of the Susquehanna at
Otsego lake, visited the portage between the Mohawk and Wood
creek, and saw for himself that New York had a great chance for
navigation and trade. But he had a natural love for his own Virginia,
and he did not intend to let New York go ahead of his native state.
His journeys across the mountains as a surveyor and as a soldier
gave him a knowledge of the Ohio country, and as he had himself
taken up much good land there, he wished to have an easy way, by
land or water, from the sea to the rich Ohio valley. So he thought
much about a canal to run by the side of the Potomac, and he joined
with others who felt as he did to form the Potomac Company. They